Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2022, 00:04
Static task
static1
Behavioral task
behavioral1
Sample
cda6fb9b5264e2fd62edd87458c89bfec48519f8f08374799791024ad2de7265.exe
Resource
win10v2004-20221111-en
General
-
Target
cda6fb9b5264e2fd62edd87458c89bfec48519f8f08374799791024ad2de7265.exe
-
Size
289KB
-
MD5
d0dc6a44b287b19296ec37b1b5d2c902
-
SHA1
5c5b53fa0c29a9d6292f941edb8cf67c24372adf
-
SHA256
cda6fb9b5264e2fd62edd87458c89bfec48519f8f08374799791024ad2de7265
-
SHA512
13c3718ece28aca82ae1323c9918be5bc0cbf47edf35e1e0fbdaefc28e44fe717fc74102436e61b79053ec6fec0df810cabb41c4173ecb225c8b2af60ed5532b
-
SSDEEP
6144:r5EiOL7re/IdRh/yJL9Wcf6QcwOk8UIkEq:VEHPre/IMWwOYI9q
Malware Config
Extracted
amadey
3.63
62.204.41.109/Nmkn5d9Dn/index.php
Extracted
djvu
http://ex3mall.com/lancer/get.php
-
extension
.znto
-
offline_id
bE95c2N1x4fARf4W3qmFCjkKPwfFkQaU9NpNBMt1
-
payload_url
http://uaery.top/dl/build2.exe
http://ex3mall.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-OKSOfVy04R Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0625Sduef
Extracted
redline
cham
31.41.244.98:4063
-
auth_value
a950c77ff7a47c51d23b247c81354ea4
Extracted
redline
8888888
82.115.223.15:15486
-
auth_value
e6af700eb78a392c4db1b1bb9017947c
Extracted
vidar
1.7
19
https://t.me/robloxblackl
https://steamcommunity.com/profiles/76561199458928097
-
profile_id
19
Signatures
-
DcRat 6 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\c8ed5026-ddb5-4746-9a75-220580a8bd81\\B9CF.exe\" --AutoStart" B9CF.exe 1532 schtasks.exe 5904 schtasks.exe 6040 schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cda6fb9b5264e2fd62edd87458c89bfec48519f8f08374799791024ad2de7265.exe 2884 schtasks.exe -
Detected Djvu ransomware 11 IoCs
resource yara_rule behavioral1/memory/4224-162-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4224-160-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4224-165-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1752-164-0x00000000022C0000-0x00000000023DB000-memory.dmp family_djvu behavioral1/memory/4224-166-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4224-230-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4224-247-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/3432-299-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/3432-301-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/3432-308-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/3432-403-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Detects LgoogLoader payload 2 IoCs
resource yara_rule behavioral1/memory/2216-236-0x0000000000D20000-0x0000000000D2D000-memory.dmp family_lgoogloader behavioral1/memory/2804-256-0x0000000000E10000-0x0000000000E1D000-memory.dmp family_lgoogloader -
Detects Smokeloader packer 2 IoCs
resource yara_rule behavioral1/memory/4356-133-0x00000000021A0000-0x00000000021A9000-memory.dmp family_smokeloader behavioral1/memory/240-189-0x0000000002060000-0x0000000002069000-memory.dmp family_smokeloader -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
LgoogLoader
A downloader capable of dropping and executing other malware families.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Blocklisted process makes network request 2 IoCs
flow pid Process 167 4260 rundll32.exe 188 4216 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 34 IoCs
pid Process 1752 B9CF.exe 3332 BF00.exe 1552 C059.exe 3480 nbveek.exe 5036 nbveek.exe 240 C2BB.exe 3816 C433.exe 4224 B9CF.exe 4452 CC33.exe 1784 chum.exe 3052 CFFD.exe 4312 nbveek.exe 4812 D5F9.exe 4080 portu1.exe 4904 E5E8.exe 3720 B9CF.exe 4636 nbveek.exe 3432 B9CF.exe 5188 linda5.exe 5328 nbveek.exe 5424 anon.exe 5512 build2.exe 5552 nbveek.exe 5676 leman.exe 5816 nbveek.exe 5864 build3.exe 5396 clim.exe 5436 build2.exe 4936 745548282-j0xYuta9G35m02YL.exe 3112 64BE.exe 4896 mstsca.exe 440 nbveek.exe 2028 Otfhfhweptay.exe 5964 nbveek.exe -
resource yara_rule behavioral1/files/0x000300000001e99e-192.dat vmprotect behavioral1/files/0x000300000001e99e-191.dat vmprotect behavioral1/memory/4812-195-0x0000000140000000-0x000000014061A000-memory.dmp vmprotect behavioral1/files/0x000b0000000223e8-203.dat vmprotect behavioral1/files/0x000b0000000223e8-204.dat vmprotect behavioral1/memory/4904-206-0x0000000140000000-0x000000014061A000-memory.dmp vmprotect -
Checks computer location settings 2 TTPs 11 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 64BE.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation C059.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation BF00.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation B9CF.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation linda5.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation B9CF.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation nbveek.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation build2.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation nbveek.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation leman.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation clim.exe -
Loads dropped DLL 5 IoCs
pid Process 5264 msiexec.exe 5436 build2.exe 5436 build2.exe 4260 rundll32.exe 4216 rundll32.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 4856 icacls.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts rundll32.exe -
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\c8ed5026-ddb5-4746-9a75-220580a8bd81\\B9CF.exe\" --AutoStart" B9CF.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\chum.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000001051\\chum.exe" nbveek.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\portu1.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000003051\\portu1.exe" nbveek.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\linda5.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000005051\\linda5.exe" nbveek.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clim.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000010051\\clim.exe" nbveek.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 26 api.2ip.ua 27 api.2ip.ua 84 api.2ip.ua -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2680 Process not Found 4192 chrome.exe -
Suspicious use of SetThreadContext 10 IoCs
description pid Process procid_target PID 1752 set thread context of 4224 1752 B9CF.exe 98 PID 3480 set thread context of 4312 3480 nbveek.exe 106 PID 4452 set thread context of 2216 4452 msedge.exe 117 PID 3052 set thread context of 2804 3052 CFFD.exe 132 PID 3480 set thread context of 4636 3480 nbveek.exe 148 PID 3720 set thread context of 3432 3720 B9CF.exe 150 PID 3480 set thread context of 5328 3480 nbveek.exe 155 PID 3480 set thread context of 5552 3480 nbveek.exe 157 PID 5512 set thread context of 5436 5512 build2.exe 170 PID 3112 set thread context of 3796 3112 64BE.exe 213 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\dfb8129e-f259-4597-9c88-47af77d501a5.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20221231010548.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 16 IoCs
pid pid_target Process procid_target 3120 3816 WerFault.exe 96 4740 4452 WerFault.exe 100 4804 4452 WerFault.exe 100 4540 3052 WerFault.exe 104 1540 3052 WerFault.exe 104 5588 4080 WerFault.exe 111 5296 4636 WerFault.exe 148 3392 3112 WerFault.exe 193 5092 3112 WerFault.exe 193 1144 3112 WerFault.exe 193 1904 3112 WerFault.exe 193 1404 3112 WerFault.exe 193 3456 3112 WerFault.exe 193 724 3112 WerFault.exe 193 4824 2028 WerFault.exe 211 4836 4192 WerFault.exe 218 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cda6fb9b5264e2fd62edd87458c89bfec48519f8f08374799791024ad2de7265.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C2BB.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C2BB.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C2BB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cda6fb9b5264e2fd62edd87458c89bfec48519f8f08374799791024ad2de7265.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cda6fb9b5264e2fd62edd87458c89bfec48519f8f08374799791024ad2de7265.exe -
Checks processor information in registry 2 TTPs 51 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Platform Specific Field 1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 64BE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 64BE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 64BE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision 64BE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Previous Update Revision 64BE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor 64BE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Platform Specific Field 1 64BE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz 64BE.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 64BE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Revision 64BE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data 64BE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status 64BE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision 64BE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Status rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString build2.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 64BE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Status 64BE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier 64BE.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 64BE.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor 64BE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data 64BE.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet 64BE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Revision rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 build2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 64BE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString 64BE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 64BE.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe -
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1532 schtasks.exe 5904 schtasks.exe 6040 schtasks.exe 2884 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 5708 timeout.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Toolbar Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" Process not Found Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Process not Found -
Modifies registry class 21 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Process not Found Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 Process not Found Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 Process not Found Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" Process not Found Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff Process not Found Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots Process not Found Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags Process not Found -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2680 Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4356 cda6fb9b5264e2fd62edd87458c89bfec48519f8f08374799791024ad2de7265.exe 4356 cda6fb9b5264e2fd62edd87458c89bfec48519f8f08374799791024ad2de7265.exe 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2680 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4356 cda6fb9b5264e2fd62edd87458c89bfec48519f8f08374799791024ad2de7265.exe 240 C2BB.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2680 Process not Found Token: SeCreatePagefilePrivilege 2680 Process not Found Token: SeShutdownPrivilege 2680 Process not Found Token: SeCreatePagefilePrivilege 2680 Process not Found Token: SeShutdownPrivilege 2680 Process not Found Token: SeCreatePagefilePrivilege 2680 Process not Found Token: SeShutdownPrivilege 2680 Process not Found Token: SeCreatePagefilePrivilege 2680 Process not Found Token: SeShutdownPrivilege 2680 Process not Found Token: SeCreatePagefilePrivilege 2680 Process not Found Token: SeShutdownPrivilege 2680 Process not Found Token: SeCreatePagefilePrivilege 2680 Process not Found Token: SeShutdownPrivilege 2680 Process not Found Token: SeCreatePagefilePrivilege 2680 Process not Found Token: SeShutdownPrivilege 2680 Process not Found Token: SeCreatePagefilePrivilege 2680 Process not Found Token: SeShutdownPrivilege 2680 Process not Found Token: SeCreatePagefilePrivilege 2680 Process not Found Token: SeShutdownPrivilege 2680 Process not Found Token: SeCreatePagefilePrivilege 2680 Process not Found Token: SeDebugPrivilege 4080 portu1.exe Token: SeShutdownPrivilege 2680 Process not Found Token: SeCreatePagefilePrivilege 2680 Process not Found Token: SeShutdownPrivilege 2680 Process not Found Token: SeCreatePagefilePrivilege 2680 Process not Found Token: SeShutdownPrivilege 2680 Process not Found Token: SeCreatePagefilePrivilege 2680 Process not Found Token: SeShutdownPrivilege 2680 Process not Found Token: SeCreatePagefilePrivilege 2680 Process not Found Token: SeShutdownPrivilege 2680 Process not Found Token: SeCreatePagefilePrivilege 2680 Process not Found Token: SeShutdownPrivilege 2680 Process not Found Token: SeCreatePagefilePrivilege 2680 Process not Found Token: SeShutdownPrivilege 2680 Process not Found Token: SeCreatePagefilePrivilege 2680 Process not Found Token: SeShutdownPrivilege 2680 Process not Found Token: SeCreatePagefilePrivilege 2680 Process not Found Token: SeShutdownPrivilege 2680 Process not Found Token: SeCreatePagefilePrivilege 2680 Process not Found Token: SeShutdownPrivilege 2680 Process not Found Token: SeCreatePagefilePrivilege 2680 Process not Found Token: SeShutdownPrivilege 2680 Process not Found Token: SeCreatePagefilePrivilege 2680 Process not Found Token: SeShutdownPrivilege 2680 Process not Found Token: SeCreatePagefilePrivilege 2680 Process not Found Token: SeShutdownPrivilege 2680 Process not Found Token: SeCreatePagefilePrivilege 2680 Process not Found Token: SeShutdownPrivilege 2680 Process not Found Token: SeCreatePagefilePrivilege 2680 Process not Found Token: SeShutdownPrivilege 2680 Process not Found Token: SeCreatePagefilePrivilege 2680 Process not Found Token: SeDebugPrivilege 1784 chum.exe Token: SeShutdownPrivilege 2680 Process not Found Token: SeCreatePagefilePrivilege 2680 Process not Found Token: SeShutdownPrivilege 2680 Process not Found Token: SeCreatePagefilePrivilege 2680 Process not Found Token: SeShutdownPrivilege 2680 Process not Found Token: SeCreatePagefilePrivilege 2680 Process not Found Token: SeDebugPrivilege 4636 nbveek.exe Token: SeShutdownPrivilege 2680 Process not Found Token: SeCreatePagefilePrivilege 2680 Process not Found Token: SeShutdownPrivilege 2680 Process not Found Token: SeCreatePagefilePrivilege 2680 Process not Found Token: SeShutdownPrivilege 2680 Process not Found -
Suspicious use of FindShellTrayWindow 21 IoCs
pid Process 1080 msedge.exe 2680 Process not Found 2680 Process not Found 2680 Process not Found 1080 msedge.exe 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found 3796 rundll32.exe 2028 Otfhfhweptay.exe 4192 chrome.exe 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found 3796 rundll32.exe 2680 Process not Found 2680 Process not Found 2680 Process not Found 2680 Process not Found -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2028 Otfhfhweptay.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 5328 nbveek.exe 5328 nbveek.exe 4192 chrome.exe 2680 Process not Found 2680 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2680 wrote to memory of 1752 2680 Process not Found 87 PID 2680 wrote to memory of 1752 2680 Process not Found 87 PID 2680 wrote to memory of 1752 2680 Process not Found 87 PID 2680 wrote to memory of 3332 2680 Process not Found 88 PID 2680 wrote to memory of 3332 2680 Process not Found 88 PID 2680 wrote to memory of 3332 2680 Process not Found 88 PID 2680 wrote to memory of 1552 2680 Process not Found 89 PID 2680 wrote to memory of 1552 2680 Process not Found 89 PID 2680 wrote to memory of 1552 2680 Process not Found 89 PID 3332 wrote to memory of 3480 3332 BF00.exe 90 PID 3332 wrote to memory of 3480 3332 BF00.exe 90 PID 3332 wrote to memory of 3480 3332 BF00.exe 90 PID 1552 wrote to memory of 5036 1552 C059.exe 91 PID 1552 wrote to memory of 5036 1552 C059.exe 91 PID 1552 wrote to memory of 5036 1552 C059.exe 91 PID 2680 wrote to memory of 240 2680 Process not Found 92 PID 2680 wrote to memory of 240 2680 Process not Found 92 PID 2680 wrote to memory of 240 2680 Process not Found 92 PID 3480 wrote to memory of 1532 3480 nbveek.exe 93 PID 3480 wrote to memory of 1532 3480 nbveek.exe 93 PID 3480 wrote to memory of 1532 3480 nbveek.exe 93 PID 3480 wrote to memory of 2312 3480 nbveek.exe 95 PID 3480 wrote to memory of 2312 3480 nbveek.exe 95 PID 3480 wrote to memory of 2312 3480 nbveek.exe 95 PID 2680 wrote to memory of 3816 2680 Process not Found 96 PID 2680 wrote to memory of 3816 2680 Process not Found 96 PID 2680 wrote to memory of 3816 2680 Process not Found 96 PID 1752 wrote to memory of 4224 1752 B9CF.exe 98 PID 1752 wrote to memory of 4224 1752 B9CF.exe 98 PID 1752 wrote to memory of 4224 1752 B9CF.exe 98 PID 1752 wrote to memory of 4224 1752 B9CF.exe 98 PID 1752 wrote to memory of 4224 1752 B9CF.exe 98 PID 1752 wrote to memory of 4224 1752 B9CF.exe 98 PID 1752 wrote to memory of 4224 1752 B9CF.exe 98 PID 1752 wrote to memory of 4224 1752 B9CF.exe 98 PID 1752 wrote to memory of 4224 1752 B9CF.exe 98 PID 1752 wrote to memory of 4224 1752 B9CF.exe 98 PID 2312 wrote to memory of 3588 2312 cmd.exe 99 PID 2312 wrote to memory of 3588 2312 cmd.exe 99 PID 2312 wrote to memory of 3588 2312 cmd.exe 99 PID 2680 wrote to memory of 4452 2680 Process not Found 100 PID 2680 wrote to memory of 4452 2680 Process not Found 100 PID 2680 wrote to memory of 4452 2680 Process not Found 100 PID 2312 wrote to memory of 2904 2312 cmd.exe 101 PID 2312 wrote to memory of 2904 2312 cmd.exe 101 PID 2312 wrote to memory of 2904 2312 cmd.exe 101 PID 3480 wrote to memory of 1784 3480 nbveek.exe 102 PID 3480 wrote to memory of 1784 3480 nbveek.exe 102 PID 3480 wrote to memory of 1784 3480 nbveek.exe 102 PID 4224 wrote to memory of 4856 4224 B9CF.exe 105 PID 4224 wrote to memory of 4856 4224 B9CF.exe 105 PID 4224 wrote to memory of 4856 4224 B9CF.exe 105 PID 2680 wrote to memory of 3052 2680 Process not Found 104 PID 2680 wrote to memory of 3052 2680 Process not Found 104 PID 2680 wrote to memory of 3052 2680 Process not Found 104 PID 3480 wrote to memory of 4312 3480 nbveek.exe 106 PID 3480 wrote to memory of 4312 3480 nbveek.exe 106 PID 3480 wrote to memory of 4312 3480 nbveek.exe 106 PID 3480 wrote to memory of 4312 3480 nbveek.exe 106 PID 3480 wrote to memory of 4312 3480 nbveek.exe 106 PID 3480 wrote to memory of 4312 3480 nbveek.exe 106 PID 3480 wrote to memory of 4312 3480 nbveek.exe 106 PID 3480 wrote to memory of 4312 3480 nbveek.exe 106 PID 2680 wrote to memory of 4812 2680 Process not Found 108 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cda6fb9b5264e2fd62edd87458c89bfec48519f8f08374799791024ad2de7265.exe"C:\Users\Admin\AppData\Local\Temp\cda6fb9b5264e2fd62edd87458c89bfec48519f8f08374799791024ad2de7265.exe"1⤵
- DcRat
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4356
-
C:\Users\Admin\AppData\Local\Temp\B9CF.exeC:\Users\Admin\AppData\Local\Temp\B9CF.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\B9CF.exeC:\Users\Admin\AppData\Local\Temp\B9CF.exe2⤵
- DcRat
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\c8ed5026-ddb5-4746-9a75-220580a8bd81" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:4856
-
-
C:\Users\Admin\AppData\Local\Temp\B9CF.exe"C:\Users\Admin\AppData\Local\Temp\B9CF.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3720 -
C:\Users\Admin\AppData\Local\Temp\B9CF.exe"C:\Users\Admin\AppData\Local\Temp\B9CF.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
- Checks computer location settings
PID:3432 -
C:\Users\Admin\AppData\Local\c9526fa5-404e-4af2-9f8a-3373b7d1d668\build2.exe"C:\Users\Admin\AppData\Local\c9526fa5-404e-4af2-9f8a-3373b7d1d668\build2.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5512 -
C:\Users\Admin\AppData\Local\c9526fa5-404e-4af2-9f8a-3373b7d1d668\build2.exe"C:\Users\Admin\AppData\Local\c9526fa5-404e-4af2-9f8a-3373b7d1d668\build2.exe"6⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Checks processor information in registry
PID:5436 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\c9526fa5-404e-4af2-9f8a-3373b7d1d668\build2.exe" & exit7⤵PID:5408
-
C:\Windows\SysWOW64\timeout.exetimeout /t 68⤵
- Delays execution with timeout.exe
PID:5708
-
-
-
-
-
C:\Users\Admin\AppData\Local\c9526fa5-404e-4af2-9f8a-3373b7d1d668\build3.exe"C:\Users\Admin\AppData\Local\c9526fa5-404e-4af2-9f8a-3373b7d1d668\build3.exe"5⤵
- Executes dropped EXE
PID:5864 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"6⤵
- DcRat
- Creates scheduled task(s)
PID:5904
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\BF00.exeC:\Users\Admin\AppData\Local\Temp\BF00.exe1⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe"C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN nbveek.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe" /F3⤵
- DcRat
- Creates scheduled task(s)
PID:1532
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "nbveek.exe" /P "Admin:N"&&CACLS "nbveek.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb465ca805" /P "Admin:N"&&CACLS "..\cb465ca805" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:3588
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "nbveek.exe" /P "Admin:N"4⤵PID:2904
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "nbveek.exe" /P "Admin:R" /E4⤵PID:840
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:4436
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb465ca805" /P "Admin:N"4⤵PID:1316
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb465ca805" /P "Admin:R" /E4⤵PID:4816
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000001051\chum.exe"C:\Users\Admin\AppData\Local\Temp\1000001051\chum.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1784
-
-
C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe"C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe"3⤵
- Executes dropped EXE
PID:4312 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=nbveek.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.04⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:1080 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8714846f8,0x7ff871484708,0x7ff8714847185⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,16541138969426156696,11362678362391410024,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:25⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,16541138969426156696,11362678362391410024,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:35⤵PID:1336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,16541138969426156696,11362678362391410024,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2144 /prefetch:85⤵PID:3352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16541138969426156696,11362678362391410024,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:15⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16541138969426156696,11362678362391410024,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:15⤵PID:812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16541138969426156696,11362678362391410024,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4196 /prefetch:15⤵
- Suspicious use of SetThreadContext
PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2100,16541138969426156696,11362678362391410024,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5192 /prefetch:85⤵PID:664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16541138969426156696,11362678362391410024,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:15⤵PID:1388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16541138969426156696,11362678362391410024,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5728 /prefetch:15⤵PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2100,16541138969426156696,11362678362391410024,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5336 /prefetch:85⤵PID:5792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16541138969426156696,11362678362391410024,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:15⤵PID:5992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16541138969426156696,11362678362391410024,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:15⤵PID:6028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,16541138969426156696,11362678362391410024,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5320 /prefetch:85⤵PID:5224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings5⤵
- Drops file in Program Files directory
PID:5696 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf4,0xe0,0xdc,0x214,0xe8,0x7ff68a625460,0x7ff68a625470,0x7ff68a6254806⤵PID:6008
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,16541138969426156696,11362678362391410024,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5320 /prefetch:85⤵PID:5336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16541138969426156696,11362678362391410024,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6464 /prefetch:15⤵PID:1456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16541138969426156696,11362678362391410024,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6624 /prefetch:15⤵PID:5568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16541138969426156696,11362678362391410024,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6736 /prefetch:15⤵PID:3664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16541138969426156696,11362678362391410024,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6848 /prefetch:15⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2100,16541138969426156696,11362678362391410024,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2268 /prefetch:85⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2100,16541138969426156696,11362678362391410024,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1128 /prefetch:85⤵PID:5608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2100,16541138969426156696,11362678362391410024,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3416 /prefetch:85⤵PID:364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2100,16541138969426156696,11362678362391410024,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5940 /prefetch:85⤵PID:4364
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=nbveek.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.04⤵PID:4848
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd8,0x104,0x7ff8714846f8,0x7ff871484708,0x7ff8714847185⤵PID:1736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,7376669031027620191,14028030829677651893,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1832 /prefetch:25⤵PID:2236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,7376669031027620191,14028030829677651893,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:35⤵PID:4984
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000003051\portu1.exe"C:\Users\Admin\AppData\Local\Temp\1000003051\portu1.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4080 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 12364⤵
- Program crash
PID:5588
-
-
-
C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe"C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe"3⤵PID:4860
-
-
C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe"C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4636 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4636 -s 20004⤵
- Program crash
PID:5296
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000005051\linda5.exe"C:\Users\Admin\AppData\Local\Temp\1000005051\linda5.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
PID:5188 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" -y .\KAZ6L.QQp4⤵
- Loads dropped DLL
PID:5264
-
-
-
C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe"C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5328
-
-
C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe"C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe"3⤵
- Executes dropped EXE
PID:5552 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=nbveek.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.04⤵PID:4792
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8714846f8,0x7ff871484708,0x7ff8714847185⤵PID:3500
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=nbveek.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.04⤵PID:724
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8714846f8,0x7ff871484708,0x7ff8714847185⤵PID:5476
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000007001\anon.exe"C:\Users\Admin\AppData\Local\Temp\1000007001\anon.exe"3⤵
- Executes dropped EXE
PID:5424
-
-
C:\Users\Admin\AppData\Local\Temp\1000009001\leman.exe"C:\Users\Admin\AppData\Local\Temp\1000009001\leman.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
PID:5676 -
C:\Users\Admin\AppData\Local\Temp\d003af69b2\nbveek.exe"C:\Users\Admin\AppData\Local\Temp\d003af69b2\nbveek.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
PID:5816 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN nbveek.exe /TR "C:\Users\Admin\AppData\Local\Temp\d003af69b2\nbveek.exe" /F5⤵
- DcRat
- Creates scheduled task(s)
PID:6040
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main5⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- outlook_win_path
PID:4216
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000010051\clim.exe"C:\Users\Admin\AppData\Local\Temp\1000010051\clim.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
PID:5396 -
C:\Users\Admin\AppData\Local\Temp\745548282-j0xYuta9G35m02YL.exe"C:\Users\Admin\AppData\Local\Temp\745548282-j0xYuta9G35m02YL.exe"4⤵
- Executes dropped EXE
PID:4936
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
PID:4260
-
-
-
C:\Users\Admin\AppData\Local\Temp\C059.exeC:\Users\Admin\AppData\Local\Temp\C059.exe1⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe"C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe"2⤵
- Executes dropped EXE
PID:5036
-
-
C:\Users\Admin\AppData\Local\Temp\C2BB.exeC:\Users\Admin\AppData\Local\Temp\C2BB.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:240
-
C:\Users\Admin\AppData\Local\Temp\C433.exeC:\Users\Admin\AppData\Local\Temp\C433.exe1⤵
- Executes dropped EXE
PID:3816 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3816 -s 3482⤵
- Program crash
PID:3120
-
-
C:\Users\Admin\AppData\Local\Temp\CC33.exeC:\Users\Admin\AppData\Local\Temp\CC33.exe1⤵
- Executes dropped EXE
PID:4452 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"2⤵PID:2216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4452 -s 12722⤵
- Program crash
PID:4740
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4452 -s 12402⤵
- Program crash
PID:4804
-
-
C:\Users\Admin\AppData\Local\Temp\CFFD.exeC:\Users\Admin\AppData\Local\Temp\CFFD.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3052 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"2⤵PID:4700
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"2⤵PID:2804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3052 -s 12802⤵
- Program crash
PID:4540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3052 -s 12522⤵
- Program crash
PID:1540
-
-
C:\Users\Admin\AppData\Local\Temp\D5F9.exeC:\Users\Admin\AppData\Local\Temp\D5F9.exe1⤵
- Executes dropped EXE
PID:4812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3816 -ip 38161⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\E5E8.exeC:\Users\Admin\AppData\Local\Temp\E5E8.exe1⤵
- Executes dropped EXE
PID:4904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4452 -ip 44521⤵PID:2936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4452 -ip 44521⤵PID:5116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3052 -ip 30521⤵PID:1476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 3052 -ip 30521⤵PID:4840
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1524
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4080 -ip 40801⤵PID:5580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4636 -ip 46361⤵PID:1332
-
C:\Users\Admin\AppData\Local\Temp\64BE.exeC:\Users\Admin\AppData\Local\Temp\64BE.exe1⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Checks processor information in registry
PID:3112 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3112 -s 11122⤵
- Program crash
PID:3392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3112 -s 11202⤵
- Program crash
PID:5092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3112 -s 11522⤵
- Program crash
PID:1144
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3112 -s 11602⤵
- Program crash
PID:1904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3112 -s 12082⤵
- Program crash
PID:1404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3112 -s 12202⤵
- Program crash
PID:3456
-
-
C:\Users\Admin\AppData\Local\Temp\Otfhfhweptay.exe"C:\Users\Admin\AppData\Local\Temp\Otfhfhweptay.exe"2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2028 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2028 -s 4523⤵
- Program crash
PID:4824
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#612⤵
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- outlook_office_path
PID:3796 -
C:\Windows\SysWOW64\schtasks.exeschtasks /End /tn \Microsoft\Windows\Wininet\CacheTask3⤵PID:724
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3112 -s 14602⤵
- Program crash
PID:724
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Executes dropped EXE
PID:4896 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"2⤵
- DcRat
- Creates scheduled task(s)
PID:2884
-
-
C:\Users\Admin\AppData\Local\Temp\d003af69b2\nbveek.exeC:\Users\Admin\AppData\Local\Temp\d003af69b2\nbveek.exe1⤵
- Executes dropped EXE
PID:440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3112 -ip 31121⤵PID:5772
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3112 -ip 31121⤵PID:5600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3112 -ip 31121⤵PID:6120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3112 -ip 31121⤵PID:5644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 3112 -ip 31121⤵PID:1136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3112 -ip 31121⤵PID:4536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3112 -ip 31121⤵PID:3148
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2028 -ip 20281⤵PID:5692
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --no-first-run --no-default-browser-check --silent-launch --disable-backgrounding-occluded-windows --disable-background-timer-throttling --ran-launcher --profile-directory="Default"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Enumerates system info in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4192 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff871944f50,0x7ff871944f60,0x7ff871944f702⤵PID:4204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1668,2135578047286785356,6797780335899014649,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1684 /prefetch:22⤵PID:6008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1668,2135578047286785356,6797780335899014649,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1752 /prefetch:82⤵PID:6128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1668,2135578047286785356,6797780335899014649,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2268 /prefetch:82⤵PID:1704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1668,2135578047286785356,6797780335899014649,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3544 /prefetch:82⤵PID:3700
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4192 -s 37362⤵
- Program crash
PID:4836
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3144
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 548 -p 4192 -ip 41921⤵PID:3148
-
C:\Users\Admin\AppData\Local\Temp\d003af69b2\nbveek.exeC:\Users\Admin\AppData\Local\Temp\d003af69b2\nbveek.exe1⤵
- Executes dropped EXE
PID:5964
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize2KB
MD59d77c9193735a61912ff3bccb47168a7
SHA1aee81c528117867ca69f22f93aa2ca710f908b6e
SHA25679b78c9e1d9c4fb6c08413757fee9d3d2fdb15415f6b8b9cd9c3bd67a235ba95
SHA512c70ae8ed0d68f38b217f4b6ac809050f27f71e6de140712c56ecf7c55896ae518993c55193bc282097580a3f7c869424789aa3c3cc8ecc81c394f8e15c1f77bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53
Filesize471B
MD5bd1f22c6a46115c96d8edff7797a01ad
SHA1f40dc543024d901f9eb351d794df914e8bc7f72a
SHA256f7f29d3af9e2630b75a65c9a658d6964eb45a60d4e5f7b72b317699548ca1bde
SHA512cb61bbe0d071cc935767346f4006157ee7d1beaba0e7bd59966575c321c77ac359c8c4e6521bc4e778285e835101ae1c898fbbc6681d4eb8cc17fa2d99dda31f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize1KB
MD5a2b3de2676790ac64a1bc51ba3e667d1
SHA12a7f7090fed2ddd299339197428a9fafc3fd349b
SHA256aa8cdcc9c8c19d24037aa62dfb529b22d25a7eb3927d35f59572c153c81c5a4a
SHA512ab9e80a077a2fe486630e4d7fb159994224fce41c6fbc6197cc600e4fac86d504e8b3d1670ca628fb45792498be42a80e1c6b0af4b3e7451bc039222ea123ef5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize488B
MD5178a7eecfece4eb4a6ead18a6481f728
SHA17f3e6f219f018550e929ed34d4d828a533f15547
SHA25649e2863ee8475be426645c733ae1305b81d70646ec373ed349550215c749a20b
SHA512f003b71b5078b788a5b97e0ba0854ca565841ef9cca67dbe074131438195f8e732665a53b783a55ba33b4e121b466ddecda26bff633474d75c50b05b43e83f65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53
Filesize442B
MD566521138d2422ed5b718147fb9ec3075
SHA18f4976caa2c62e66c52ab67daccb2296bc215435
SHA25644bfc711a0f59ba2c8a568d5a05a736cfe41fafdae61acdd752acf200e586088
SHA5125bf0ba368e2fdad729c004f98788b64a66b6b14f7f057856df1dadcf9b80f388af3ec1e7717aa2cdf4ea290ed3967cc529372fcec47056948cbbdde8488337bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize482B
MD5ff51c9f94a88efe003bd30bd8c72fca2
SHA1bef559651c275180eb59ddeb9dd63067f9992140
SHA256cd1a9ba19ecace73cabb8b65bcb246cf76e5a3dcc3e26c1499b5fb6e9b9b1e93
SHA51285140d2e5a07cec90dabd1c9fe59d2eac9a8debae16ee1ca01bd4fdf484bffbb62464a405dcfb86ed49b3ea06fb95843db15d05e455af089fdf4768c39d5f307
-
Filesize
152B
MD5a58a7931227f93b9a54bc982c0d99582
SHA17591b129f025f2003039a81830b9cd5d7043d3e2
SHA256a6751ef5a8d88960e0fc22e205155f766e840d13c46c962166f35e3bf8367ac0
SHA51224eec66ba6b79cebb2b920cdad34f9b68fcc9503a2e4bc718ddf3d39b8f959ee1c7b0e73079b31a0e8acc98960fcedeb7e49f38b8f5036aa21294048f7f1a79b
-
Filesize
152B
MD5a58a7931227f93b9a54bc982c0d99582
SHA17591b129f025f2003039a81830b9cd5d7043d3e2
SHA256a6751ef5a8d88960e0fc22e205155f766e840d13c46c962166f35e3bf8367ac0
SHA51224eec66ba6b79cebb2b920cdad34f9b68fcc9503a2e4bc718ddf3d39b8f959ee1c7b0e73079b31a0e8acc98960fcedeb7e49f38b8f5036aa21294048f7f1a79b
-
Filesize
152B
MD5a58a7931227f93b9a54bc982c0d99582
SHA17591b129f025f2003039a81830b9cd5d7043d3e2
SHA256a6751ef5a8d88960e0fc22e205155f766e840d13c46c962166f35e3bf8367ac0
SHA51224eec66ba6b79cebb2b920cdad34f9b68fcc9503a2e4bc718ddf3d39b8f959ee1c7b0e73079b31a0e8acc98960fcedeb7e49f38b8f5036aa21294048f7f1a79b
-
Filesize
152B
MD56102471af38b45f30decc8db2f59a8e2
SHA135428c52f58b3a35d5028929b6298d6b95d6bdec
SHA25657e3a5210c5872fc5d56b4111a4d07e512ef54a79128391084c167c101a9d7c4
SHA5121040720fe63680c7a17ced8026e3a2e31e0e73066bd0c3d74e5cd4a19c0e6f23dc30e0a41f62d92c0b9cc9840895ece4b3d36a200816e400feec49e54599b3fe
-
Filesize
152B
MD56102471af38b45f30decc8db2f59a8e2
SHA135428c52f58b3a35d5028929b6298d6b95d6bdec
SHA25657e3a5210c5872fc5d56b4111a4d07e512ef54a79128391084c167c101a9d7c4
SHA5121040720fe63680c7a17ced8026e3a2e31e0e73066bd0c3d74e5cd4a19c0e6f23dc30e0a41f62d92c0b9cc9840895ece4b3d36a200816e400feec49e54599b3fe
-
Filesize
152B
MD56102471af38b45f30decc8db2f59a8e2
SHA135428c52f58b3a35d5028929b6298d6b95d6bdec
SHA25657e3a5210c5872fc5d56b4111a4d07e512ef54a79128391084c167c101a9d7c4
SHA5121040720fe63680c7a17ced8026e3a2e31e0e73066bd0c3d74e5cd4a19c0e6f23dc30e0a41f62d92c0b9cc9840895ece4b3d36a200816e400feec49e54599b3fe
-
Filesize
20KB
MD5c402718b04dac7142d24245c470f74d0
SHA10dc49919b9f8cfebc80e1d3f8abfcf3dc89ec692
SHA25614aa8aadc48c13eb63751a9bf09fa47df092ee9d06b2b4b6b640b96372a5b814
SHA512c9b688a4c3f6e64d1e1256e834dd9f7460c32acf49af77fe30cffd9cab776a679ce809463d0e70b123e777c04939af2074da01a4ceebb8a83fe81f296b0fa986
-
Filesize
70KB
MD5e5e3377341056643b0494b6842c0b544
SHA1d53fd8e256ec9d5cef8ef5387872e544a2df9108
SHA256e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25
SHA51283f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef
-
Filesize
112KB
MD530e375798049100677ea16b7c578a4ee
SHA1bcab7401a5f34ac0e6f795ece8d3ed12944ae99f
SHA256ea5c90cfc97f429a2f9e0b1e9b16778b5b19bd8e83a896a30002de70af84e1ce
SHA512f8ae930e26ecfe06dc30d4f39858b0eec6b4a81a8139883712505b5c6b58504d463d986ef58c7151a247fe157c6013b570b9d39e1d4a860061e37e0419900582
-
Filesize
2KB
MD50f7127d155da6e9b78ec4b986dd077b4
SHA148d4ec4a79e6539be6bc2a42e992f5df62fdcabe
SHA256e1450c2e3d1009d3cfa912f04ab764530922a1b90b4abadc836f5e6787a2895c
SHA512c3e83197806d80de273977f07ae130aa96d105cecfbb9f4a32765f2c4f70349c399527332b23debe9b25213a2760dc1b77d9b88d0f3b908e581f854808bb4ac2
-
Filesize
175KB
MD5169229c688e201e1fb1d771c181dd9ab
SHA1316d8d6f1cdf6b1e092e101367596f25dbfc0423
SHA25656ff585dc2f196033368c6e2a695df8d9835d93244a7a1c3a83ec1b56b5adb0e
SHA5126e71798834669d2601061ec9dfc2822310a7867c6bc9a85ee53824632786a53629fbd21de448c8f7884c330a3eae9ea2905253ae979e9741a6dafa7d1158d5c3
-
Filesize
175KB
MD5169229c688e201e1fb1d771c181dd9ab
SHA1316d8d6f1cdf6b1e092e101367596f25dbfc0423
SHA25656ff585dc2f196033368c6e2a695df8d9835d93244a7a1c3a83ec1b56b5adb0e
SHA5126e71798834669d2601061ec9dfc2822310a7867c6bc9a85ee53824632786a53629fbd21de448c8f7884c330a3eae9ea2905253ae979e9741a6dafa7d1158d5c3
-
Filesize
407KB
MD5df4c7edd23bb7372e1709fac73511156
SHA12bdb19765c10af7b11a007b8ebffde1208ff181a
SHA2568d94d2a5e68bd6ea96ff0ecb4b553e2e140342036b043a52ef3f5ffea5a537a4
SHA512595f4abcbf1034d83245d898576e76342b02a3e2285ccc8ce49cc77c533ecaa23ccb516f1453bba942c044e6e9696eb27ee130344826ea9fee4c24b69ab473c7
-
Filesize
407KB
MD5df4c7edd23bb7372e1709fac73511156
SHA12bdb19765c10af7b11a007b8ebffde1208ff181a
SHA2568d94d2a5e68bd6ea96ff0ecb4b553e2e140342036b043a52ef3f5ffea5a537a4
SHA512595f4abcbf1034d83245d898576e76342b02a3e2285ccc8ce49cc77c533ecaa23ccb516f1453bba942c044e6e9696eb27ee130344826ea9fee4c24b69ab473c7
-
Filesize
1.3MB
MD509af06066d61c2e0c74fcdceec984c54
SHA193f8fface5f06bfd471069d7d8569aba6fc86225
SHA25686af6b02e481e4f01f09b760ed51e5a2d634fcad3d56a28296b8466bd97a13ca
SHA512650834c5c12bcfd14dbca9e69f16340d54a1fd7af2e12acaefff68bbd9400ce7fdabc6c54caf06eabbe5713fdc039d33bdee7bf87670950bd092c9ab0951251c
-
Filesize
1.3MB
MD509af06066d61c2e0c74fcdceec984c54
SHA193f8fface5f06bfd471069d7d8569aba6fc86225
SHA25686af6b02e481e4f01f09b760ed51e5a2d634fcad3d56a28296b8466bd97a13ca
SHA512650834c5c12bcfd14dbca9e69f16340d54a1fd7af2e12acaefff68bbd9400ce7fdabc6c54caf06eabbe5713fdc039d33bdee7bf87670950bd092c9ab0951251c
-
Filesize
175KB
MD52349397fdf914d0576d0fe91f11cf3df
SHA185d55023a559134335dd2e0597cc4156d61e628c
SHA256bfa05495a883c00ed74509a32a2a55f5b07004729cd991dcf9ad82133f8d63ba
SHA51298a18ae02b2ac56dce74cace0913e7186fc31ebc31ad10014a392fa6282dad0a5da75aa464c476c3479153f3290d522f543754e4e8ea0e2919168eb74475645a
-
Filesize
175KB
MD52349397fdf914d0576d0fe91f11cf3df
SHA185d55023a559134335dd2e0597cc4156d61e628c
SHA256bfa05495a883c00ed74509a32a2a55f5b07004729cd991dcf9ad82133f8d63ba
SHA51298a18ae02b2ac56dce74cace0913e7186fc31ebc31ad10014a392fa6282dad0a5da75aa464c476c3479153f3290d522f543754e4e8ea0e2919168eb74475645a
-
Filesize
752KB
MD5e6133ea9349d980fe1bc6775ba9a4851
SHA15d86f79b568274a26a3956cf27f1e0ca2c2f8000
SHA256b0129df41ef3e0ee1ba9adf39d14b0b3c6d94c2f1cc161f37066a652de902cb4
SHA512111856c90096f685812cd4495d4ad7bda6a262b836b8ae6836fefbc5115d1877a3d6d7208e296521dac427cf0a10a5bd9b7b3f80cce24a9fdfa22569392dd2c5
-
Filesize
752KB
MD5e6133ea9349d980fe1bc6775ba9a4851
SHA15d86f79b568274a26a3956cf27f1e0ca2c2f8000
SHA256b0129df41ef3e0ee1ba9adf39d14b0b3c6d94c2f1cc161f37066a652de902cb4
SHA512111856c90096f685812cd4495d4ad7bda6a262b836b8ae6836fefbc5115d1877a3d6d7208e296521dac427cf0a10a5bd9b7b3f80cce24a9fdfa22569392dd2c5
-
Filesize
752KB
MD5e6133ea9349d980fe1bc6775ba9a4851
SHA15d86f79b568274a26a3956cf27f1e0ca2c2f8000
SHA256b0129df41ef3e0ee1ba9adf39d14b0b3c6d94c2f1cc161f37066a652de902cb4
SHA512111856c90096f685812cd4495d4ad7bda6a262b836b8ae6836fefbc5115d1877a3d6d7208e296521dac427cf0a10a5bd9b7b3f80cce24a9fdfa22569392dd2c5
-
Filesize
752KB
MD5e6133ea9349d980fe1bc6775ba9a4851
SHA15d86f79b568274a26a3956cf27f1e0ca2c2f8000
SHA256b0129df41ef3e0ee1ba9adf39d14b0b3c6d94c2f1cc161f37066a652de902cb4
SHA512111856c90096f685812cd4495d4ad7bda6a262b836b8ae6836fefbc5115d1877a3d6d7208e296521dac427cf0a10a5bd9b7b3f80cce24a9fdfa22569392dd2c5
-
Filesize
752KB
MD5e6133ea9349d980fe1bc6775ba9a4851
SHA15d86f79b568274a26a3956cf27f1e0ca2c2f8000
SHA256b0129df41ef3e0ee1ba9adf39d14b0b3c6d94c2f1cc161f37066a652de902cb4
SHA512111856c90096f685812cd4495d4ad7bda6a262b836b8ae6836fefbc5115d1877a3d6d7208e296521dac427cf0a10a5bd9b7b3f80cce24a9fdfa22569392dd2c5
-
Filesize
235KB
MD5868acb586930934b250c949e4c3e180e
SHA1d5c992c5f3c5f14205d5e6548979190dd039460a
SHA2564dd88158eabf16c0f154abcb4513042d1aeb4714ece7a3260f089de288b21cd5
SHA512285570bd404ef80b442cf397cb64e896394b2dc125eb3c4517e21224d63f2cb10df6748881a91c6ebb2027db082697ea7230502ce8df103e76d8256f70bbfcf1
-
Filesize
235KB
MD5868acb586930934b250c949e4c3e180e
SHA1d5c992c5f3c5f14205d5e6548979190dd039460a
SHA2564dd88158eabf16c0f154abcb4513042d1aeb4714ece7a3260f089de288b21cd5
SHA512285570bd404ef80b442cf397cb64e896394b2dc125eb3c4517e21224d63f2cb10df6748881a91c6ebb2027db082697ea7230502ce8df103e76d8256f70bbfcf1
-
Filesize
235KB
MD5868acb586930934b250c949e4c3e180e
SHA1d5c992c5f3c5f14205d5e6548979190dd039460a
SHA2564dd88158eabf16c0f154abcb4513042d1aeb4714ece7a3260f089de288b21cd5
SHA512285570bd404ef80b442cf397cb64e896394b2dc125eb3c4517e21224d63f2cb10df6748881a91c6ebb2027db082697ea7230502ce8df103e76d8256f70bbfcf1
-
Filesize
235KB
MD5868acb586930934b250c949e4c3e180e
SHA1d5c992c5f3c5f14205d5e6548979190dd039460a
SHA2564dd88158eabf16c0f154abcb4513042d1aeb4714ece7a3260f089de288b21cd5
SHA512285570bd404ef80b442cf397cb64e896394b2dc125eb3c4517e21224d63f2cb10df6748881a91c6ebb2027db082697ea7230502ce8df103e76d8256f70bbfcf1
-
Filesize
288KB
MD55cb4b6a7abc41706660ac0ac9a1d5c49
SHA19b47c837c3fc0d2e865eb80e4d9cb216347abd6f
SHA25668c5d7e0ec839389a2bdcb437be65420ee26dfeb22506632b018f194c6820ee1
SHA51236c426d8330d69ff6e2ad9dcbdbdad2b27dccda2b42c0d109c57065e209746b78227a713b50d237d5da9a580da747f2b22005d2dd7c94e3d89fc9b9eade0a5cb
-
Filesize
288KB
MD55cb4b6a7abc41706660ac0ac9a1d5c49
SHA19b47c837c3fc0d2e865eb80e4d9cb216347abd6f
SHA25668c5d7e0ec839389a2bdcb437be65420ee26dfeb22506632b018f194c6820ee1
SHA51236c426d8330d69ff6e2ad9dcbdbdad2b27dccda2b42c0d109c57065e209746b78227a713b50d237d5da9a580da747f2b22005d2dd7c94e3d89fc9b9eade0a5cb
-
Filesize
288KB
MD500691958a7163e957faff165dff1cabc
SHA19499e03ff36b01afa4f997a0b9d800b4432d3c33
SHA256a06c4d1ee65e4a6ec3948c0c75de1938b743bad88908ab2bc598b94a5ba0fdd9
SHA5125509b52c5b4a09502b46514afe780126d93ae32a0043910e14719650326881df25f55d55d14cb6a488ffa3a193e12c53ac8bef872967a300d1e8172af98e73c7
-
Filesize
288KB
MD500691958a7163e957faff165dff1cabc
SHA19499e03ff36b01afa4f997a0b9d800b4432d3c33
SHA256a06c4d1ee65e4a6ec3948c0c75de1938b743bad88908ab2bc598b94a5ba0fdd9
SHA5125509b52c5b4a09502b46514afe780126d93ae32a0043910e14719650326881df25f55d55d14cb6a488ffa3a193e12c53ac8bef872967a300d1e8172af98e73c7
-
Filesize
1.9MB
MD53bf7bbc0f949e65080db6e99d3767e13
SHA12b3c06b550d5a2171e40a7edc390c88aa258c422
SHA256d06bf8cf6f3e3c5869453c9e444d66390f2c2ddec8d8ebe6cec0207a368d31f3
SHA512d70cdcbe611289c08b2a5787b173f220372d9c43137e96ff18a019c8078c1737f72a8bdfc6cfbf77e7c406196981cc339e47c73b13c43ce85c24b8762d93b87d
-
Filesize
1.9MB
MD53bf7bbc0f949e65080db6e99d3767e13
SHA12b3c06b550d5a2171e40a7edc390c88aa258c422
SHA256d06bf8cf6f3e3c5869453c9e444d66390f2c2ddec8d8ebe6cec0207a368d31f3
SHA512d70cdcbe611289c08b2a5787b173f220372d9c43137e96ff18a019c8078c1737f72a8bdfc6cfbf77e7c406196981cc339e47c73b13c43ce85c24b8762d93b87d
-
Filesize
1.9MB
MD53bf7bbc0f949e65080db6e99d3767e13
SHA12b3c06b550d5a2171e40a7edc390c88aa258c422
SHA256d06bf8cf6f3e3c5869453c9e444d66390f2c2ddec8d8ebe6cec0207a368d31f3
SHA512d70cdcbe611289c08b2a5787b173f220372d9c43137e96ff18a019c8078c1737f72a8bdfc6cfbf77e7c406196981cc339e47c73b13c43ce85c24b8762d93b87d
-
Filesize
1.9MB
MD53bf7bbc0f949e65080db6e99d3767e13
SHA12b3c06b550d5a2171e40a7edc390c88aa258c422
SHA256d06bf8cf6f3e3c5869453c9e444d66390f2c2ddec8d8ebe6cec0207a368d31f3
SHA512d70cdcbe611289c08b2a5787b173f220372d9c43137e96ff18a019c8078c1737f72a8bdfc6cfbf77e7c406196981cc339e47c73b13c43ce85c24b8762d93b87d
-
Filesize
3.5MB
MD5ba2d41ce64789f113baa25ad6014d9ef
SHA12a613d52de7beddced943814a65f66d8e465fc58
SHA256fc78c2fc16065bc118f812c5b9df3fa2d2194fee2e684393d151270c7a89c646
SHA5121029c6936334ba5905dbe6cbd190e8c6f200a20545e6ad65ac35ccd7e10aed217648e74c103acfcf5136d239ec7b241ab379e52c9f7502fd5d9da793c4f78301
-
Filesize
3.5MB
MD5ba2d41ce64789f113baa25ad6014d9ef
SHA12a613d52de7beddced943814a65f66d8e465fc58
SHA256fc78c2fc16065bc118f812c5b9df3fa2d2194fee2e684393d151270c7a89c646
SHA5121029c6936334ba5905dbe6cbd190e8c6f200a20545e6ad65ac35ccd7e10aed217648e74c103acfcf5136d239ec7b241ab379e52c9f7502fd5d9da793c4f78301
-
Filesize
3.5MB
MD5ba2d41ce64789f113baa25ad6014d9ef
SHA12a613d52de7beddced943814a65f66d8e465fc58
SHA256fc78c2fc16065bc118f812c5b9df3fa2d2194fee2e684393d151270c7a89c646
SHA5121029c6936334ba5905dbe6cbd190e8c6f200a20545e6ad65ac35ccd7e10aed217648e74c103acfcf5136d239ec7b241ab379e52c9f7502fd5d9da793c4f78301
-
Filesize
3.5MB
MD5ba2d41ce64789f113baa25ad6014d9ef
SHA12a613d52de7beddced943814a65f66d8e465fc58
SHA256fc78c2fc16065bc118f812c5b9df3fa2d2194fee2e684393d151270c7a89c646
SHA5121029c6936334ba5905dbe6cbd190e8c6f200a20545e6ad65ac35ccd7e10aed217648e74c103acfcf5136d239ec7b241ab379e52c9f7502fd5d9da793c4f78301
-
Filesize
1.4MB
MD52b1b4ca74de6abc2e7fb491a0a36e840
SHA11409db9104a9bd58bd09a9e5c634ae659e9db0cc
SHA2568a67cd3edbedb5ee2820e4b445afa8ec641f4420258ca65a8b12a7874af14fb4
SHA512fd60125bb24a0ad185ca46d306c0ad6a08bf57e4ddd6e104aa908f3463d9a7b8ed015d911cbfcef291cc69beed634a2d2a459a9269e30bd548c323830d1c350b
-
Filesize
1.4MB
MD52b1b4ca74de6abc2e7fb491a0a36e840
SHA11409db9104a9bd58bd09a9e5c634ae659e9db0cc
SHA2568a67cd3edbedb5ee2820e4b445afa8ec641f4420258ca65a8b12a7874af14fb4
SHA512fd60125bb24a0ad185ca46d306c0ad6a08bf57e4ddd6e104aa908f3463d9a7b8ed015d911cbfcef291cc69beed634a2d2a459a9269e30bd548c323830d1c350b
-
Filesize
235KB
MD5868acb586930934b250c949e4c3e180e
SHA1d5c992c5f3c5f14205d5e6548979190dd039460a
SHA2564dd88158eabf16c0f154abcb4513042d1aeb4714ece7a3260f089de288b21cd5
SHA512285570bd404ef80b442cf397cb64e896394b2dc125eb3c4517e21224d63f2cb10df6748881a91c6ebb2027db082697ea7230502ce8df103e76d8256f70bbfcf1
-
Filesize
235KB
MD5868acb586930934b250c949e4c3e180e
SHA1d5c992c5f3c5f14205d5e6548979190dd039460a
SHA2564dd88158eabf16c0f154abcb4513042d1aeb4714ece7a3260f089de288b21cd5
SHA512285570bd404ef80b442cf397cb64e896394b2dc125eb3c4517e21224d63f2cb10df6748881a91c6ebb2027db082697ea7230502ce8df103e76d8256f70bbfcf1
-
Filesize
235KB
MD5868acb586930934b250c949e4c3e180e
SHA1d5c992c5f3c5f14205d5e6548979190dd039460a
SHA2564dd88158eabf16c0f154abcb4513042d1aeb4714ece7a3260f089de288b21cd5
SHA512285570bd404ef80b442cf397cb64e896394b2dc125eb3c4517e21224d63f2cb10df6748881a91c6ebb2027db082697ea7230502ce8df103e76d8256f70bbfcf1
-
Filesize
235KB
MD5868acb586930934b250c949e4c3e180e
SHA1d5c992c5f3c5f14205d5e6548979190dd039460a
SHA2564dd88158eabf16c0f154abcb4513042d1aeb4714ece7a3260f089de288b21cd5
SHA512285570bd404ef80b442cf397cb64e896394b2dc125eb3c4517e21224d63f2cb10df6748881a91c6ebb2027db082697ea7230502ce8df103e76d8256f70bbfcf1
-
Filesize
235KB
MD5868acb586930934b250c949e4c3e180e
SHA1d5c992c5f3c5f14205d5e6548979190dd039460a
SHA2564dd88158eabf16c0f154abcb4513042d1aeb4714ece7a3260f089de288b21cd5
SHA512285570bd404ef80b442cf397cb64e896394b2dc125eb3c4517e21224d63f2cb10df6748881a91c6ebb2027db082697ea7230502ce8df103e76d8256f70bbfcf1
-
Filesize
235KB
MD5868acb586930934b250c949e4c3e180e
SHA1d5c992c5f3c5f14205d5e6548979190dd039460a
SHA2564dd88158eabf16c0f154abcb4513042d1aeb4714ece7a3260f089de288b21cd5
SHA512285570bd404ef80b442cf397cb64e896394b2dc125eb3c4517e21224d63f2cb10df6748881a91c6ebb2027db082697ea7230502ce8df103e76d8256f70bbfcf1
-
Filesize
235KB
MD5868acb586930934b250c949e4c3e180e
SHA1d5c992c5f3c5f14205d5e6548979190dd039460a
SHA2564dd88158eabf16c0f154abcb4513042d1aeb4714ece7a3260f089de288b21cd5
SHA512285570bd404ef80b442cf397cb64e896394b2dc125eb3c4517e21224d63f2cb10df6748881a91c6ebb2027db082697ea7230502ce8df103e76d8256f70bbfcf1
-
Filesize
752KB
MD5e6133ea9349d980fe1bc6775ba9a4851
SHA15d86f79b568274a26a3956cf27f1e0ca2c2f8000
SHA256b0129df41ef3e0ee1ba9adf39d14b0b3c6d94c2f1cc161f37066a652de902cb4
SHA512111856c90096f685812cd4495d4ad7bda6a262b836b8ae6836fefbc5115d1877a3d6d7208e296521dac427cf0a10a5bd9b7b3f80cce24a9fdfa22569392dd2c5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Microsoft Edge.lnk
Filesize2KB
MD5a609a0f424f40630e4e7ef967eedcb0c
SHA18c72d03b9dbd89089840143a731e54ada31d8848
SHA2563d3b5ec462e8cc6812c5201780ac02fdb72fe863fb88a07274490d51f72adc25
SHA512efc19c14c02d1b2aa36a7927729b7331095aa15a043a3b3e277afe0c2199e2e293c9cc7070c47627abfe4b6ce1eba80466cef80a165e09f2240f294cd11f9c9e