Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
98s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
23/10/2023, 03:37
Static task
static1
Behavioral task
behavioral1
Sample
3374138c17e2963f9d3945fd47b6dd8b2a4ba3444b2aafc53ef9f84075d285be.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
3374138c17e2963f9d3945fd47b6dd8b2a4ba3444b2aafc53ef9f84075d285be.exe
Resource
win10v2004-20231020-en
General
-
Target
3374138c17e2963f9d3945fd47b6dd8b2a4ba3444b2aafc53ef9f84075d285be.exe
-
Size
1.7MB
-
MD5
c40439ea5c28f543528143be84c0ee30
-
SHA1
3a72a4b51893666e59bd04e460d52bd083e4900b
-
SHA256
3374138c17e2963f9d3945fd47b6dd8b2a4ba3444b2aafc53ef9f84075d285be
-
SHA512
198880f596c8a378e3352698e5cea922b25b7e76af609964ee788f9c8312d800728247a6c0f4816a85b3390e2f49928c76134718412b7a793f1f451de1f66acf
-
SSDEEP
49152:RpiBEdMmSPcasbDs9UPtJeMhj5B/Ynqx02ZjIEzf:3iuibPctg9wJ//NtZjLz
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
homed
109.107.182.133:19084
Extracted
amadey
3.89
http://77.91.124.1/theme/index.php
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
Extracted
redline
kinder
109.107.182.133:19084
Extracted
redline
5141679758_99
https://pastebin.com/raw/8baCJyMF
Extracted
redline
YT&TEAM CLOUD
185.216.70.238:37515
Extracted
smokeloader
up3
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
89.23.100.93:4449
oonrejgwedvxwse
-
delay
1
-
install
true
-
install_file
calc.exe
-
install_folder
%AppData%
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
DcRat 6 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process 2276 schtasks.exe 4520 schtasks.exe 1116 schtasks.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3374138c17e2963f9d3945fd47b6dd8b2a4ba3444b2aafc53ef9f84075d285be.exe 380 schtasks.exe 5152 schtasks.exe -
Glupteba payload 7 IoCs
resource yara_rule behavioral2/memory/5952-1014-0x0000000002FE0000-0x00000000038CB000-memory.dmp family_glupteba behavioral2/memory/5952-1016-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/5952-1106-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/5952-1173-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/5952-1184-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/5900-1270-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/5900-1317-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" FC65.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" FC65.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 2yL8375.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 2yL8375.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" FC65.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" FC65.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 2yL8375.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 2yL8375.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 2yL8375.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 2yL8375.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" FC65.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 6 IoCs
resource yara_rule behavioral2/memory/3628-66-0x0000000000400000-0x000000000043E000-memory.dmp family_redline behavioral2/memory/4648-719-0x0000000001FE0000-0x000000000203A000-memory.dmp family_redline behavioral2/memory/1468-771-0x0000000000340000-0x000000000037E000-memory.dmp family_redline behavioral2/memory/4648-807-0x0000000000400000-0x000000000047E000-memory.dmp family_redline behavioral2/memory/5864-961-0x00000000005D0000-0x000000000060E000-memory.dmp family_redline behavioral2/memory/1256-1038-0x0000000002100000-0x000000000215A000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 9 IoCs
description pid Process procid_target PID 988 created 3092 988 6666.exe 36 PID 988 created 3092 988 6666.exe 36 PID 988 created 3092 988 6666.exe 36 PID 1344 created 3092 1344 latestX.exe 36 PID 1344 created 3092 1344 latestX.exe 36 PID 1344 created 3092 1344 latestX.exe 36 PID 1344 created 3092 1344 latestX.exe 36 PID 1344 created 3092 1344 latestX.exe 36 PID 3116 created 3092 3116 updater.exe 36 -
Async RAT payload 1 IoCs
resource yara_rule behavioral2/memory/6048-1068-0x0000000001F50000-0x0000000001F68000-memory.dmp asyncrat -
Blocklisted process makes network request 7 IoCs
flow pid Process 107 3920 powershell.exe 109 3920 powershell.exe 112 3920 powershell.exe 113 3920 powershell.exe 114 3920 powershell.exe 131 3920 powershell.exe 132 3920 powershell.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\hosts latestX.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4064 netsh.exe -
Stops running service(s) 3 TTPs
-
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1511405631-3522522280-778892991-1000\Control Panel\International\Geo\Nation 7xp9zm26.exe Key value queried \REGISTRY\USER\S-1-5-21-1511405631-3522522280-778892991-1000\Control Panel\International\Geo\Nation 3049.exe Key value queried \REGISTRY\USER\S-1-5-21-1511405631-3522522280-778892991-1000\Control Panel\International\Geo\Nation kos2.exe Key value queried \REGISTRY\USER\S-1-5-21-1511405631-3522522280-778892991-1000\Control Panel\International\Geo\Nation K.exe Key value queried \REGISTRY\USER\S-1-5-21-1511405631-3522522280-778892991-1000\Control Panel\International\Geo\Nation 6kT7XD0.exe Key value queried \REGISTRY\USER\S-1-5-21-1511405631-3522522280-778892991-1000\Control Panel\International\Geo\Nation explothe.exe -
Executes dropped EXE 49 IoCs
pid Process 4176 iu3BP40.exe 1504 rA9SU06.exe 1360 pB6JI64.exe 5032 JX1DP33.exe 760 zW0nu25.exe 4136 1jR42nF6.exe 4528 2yL8375.exe 3532 3gC51Pb.exe 3772 4KQ724Qj.exe 4112 5iW6zB3.exe 2372 6kT7XD0.exe 2156 explothe.exe 2104 7xp9zm26.exe 5504 F6C4.exe 760 xd5zi6Jq.exe 4492 gG2ZD8Ts.exe 1112 Wd0uP6qG.exe 5308 wO6ZO0iT.exe 5556 1zT83ZX9.exe 5572 F955.exe 3532 FB89.exe 4424 FC65.exe 4572 FE1C.exe 4648 1B7.exe 1468 2xF908er.exe 5620 3049.exe 852 330A.exe 1484 3424.exe 2124 sc.exe 2768 379F.exe 5952 31839b57a4f11171d6abc8bbc4451ee4.exe 5956 kos2.exe 5864 3A9E.exe 1344 latestX.exe 1256 404C.exe 5692 set16.exe 1736 is-M4B0J.tmp 3420 K.exe 3528 toolspub2.exe 2456 MyBurn.exe 5856 MyBurn.exe 6048 4F41.exe 5908 explothe.exe 3236 5472.exe 5544 5752.exe 988 6666.exe 5900 31839b57a4f11171d6abc8bbc4451ee4.exe 3116 updater.exe 6056 csrss.exe -
Loads dropped DLL 9 IoCs
pid Process 1736 is-M4B0J.tmp 1736 is-M4B0J.tmp 1736 is-M4B0J.tmp 1256 404C.exe 1256 404C.exe 6048 4F41.exe 6048 4F41.exe 6136 rundll32.exe 3560 rundll32.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x0006000000022de9-85.dat upx behavioral2/memory/2104-86-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/files/0x0006000000022de9-87.dat upx behavioral2/memory/2104-101-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/files/0x0006000000022f2a-640.dat upx -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features 2yL8375.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 2yL8375.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" FC65.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 13 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" F6C4.exe Set value (str) \REGISTRY\USER\S-1-5-21-1511405631-3522522280-778892991-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" iu3BP40.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" rA9SU06.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup5 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP005.TMP\\\"" zW0nu25.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3374138c17e2963f9d3945fd47b6dd8b2a4ba3444b2aafc53ef9f84075d285be.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" pB6JI64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" xd5zi6Jq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" Wd0uP6qG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" JX1DP33.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" gG2ZD8Ts.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP005.TMP\\\"" wO6ZO0iT.exe Set value (str) \REGISTRY\USER\S-1-5-21-1511405631-3522522280-778892991-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\socks5 = "powershell.exe -windowstyle hidden -Command \"& 'C:\\Users\\Admin\\AppData\\Local\\Temp\\3424.exe'\"" 3424.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 4136 set thread context of 4424 4136 1jR42nF6.exe 94 PID 3772 set thread context of 2592 3772 4KQ724Qj.exe 106 PID 4112 set thread context of 3628 4112 5iW6zB3.exe 108 PID 5556 set thread context of 5584 5556 1zT83ZX9.exe 179 PID 2124 set thread context of 3528 2124 sc.exe 200 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 31839b57a4f11171d6abc8bbc4451ee4.exe -
Drops file in Program Files directory 13 IoCs
description ioc Process File created C:\Program Files (x86)\MyBurn\is-0FK7O.tmp is-M4B0J.tmp File created C:\Program Files (x86)\MyBurn\Sounds\is-NKNMN.tmp is-M4B0J.tmp File created C:\Program Files (x86)\MyBurn\is-7ALVR.tmp is-M4B0J.tmp File created C:\Program Files (x86)\MyBurn\is-N9VGS.tmp is-M4B0J.tmp File created C:\Program Files (x86)\MyBurn\is-16AGE.tmp is-M4B0J.tmp File created C:\Program Files (x86)\MyBurn\is-P2ET1.tmp is-M4B0J.tmp File opened for modification C:\Program Files (x86)\MyBurn\unins000.dat is-M4B0J.tmp File created C:\Program Files (x86)\MyBurn\unins000.dat is-M4B0J.tmp File opened for modification C:\Program Files (x86)\MyBurn\MyBurn.exe is-M4B0J.tmp File created C:\Program Files\Google\Chrome\updater.exe latestX.exe File created C:\Program Files (x86)\MyBurn\Sounds\is-FST1H.tmp is-M4B0J.tmp File created C:\Program Files (x86)\MyBurn\is-3J5JJ.tmp is-M4B0J.tmp File created C:\Program Files (x86)\MyBurn\is-BQBB5.tmp is-M4B0J.tmp -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss 31839b57a4f11171d6abc8bbc4451ee4.exe File created C:\Windows\rss\csrss.exe 31839b57a4f11171d6abc8bbc4451ee4.exe -
Launches sc.exe 6 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4448 sc.exe 1848 sc.exe 2124 sc.exe 1228 sc.exe 2000 sc.exe 1876 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 3420 5584 WerFault.exe 179 4996 1256 WerFault.exe 197 3008 6048 WerFault.exe 207 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Creates scheduled task(s) 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4520 schtasks.exe 1116 schtasks.exe 5152 schtasks.exe 380 schtasks.exe 2276 schtasks.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-571 = "China Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-741 = "New Zealand Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-731 = "Fiji Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-602 = "Taipei Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1911 = "Russia TZ 10 Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1892 = "Russia TZ 3 Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-241 = "Samoa Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2512 = "Lord Howe Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1471 = "Magadan Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2181 = "Astrakhan Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2451 = "Saint Pierre Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-12 = "Azores Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-31 = "Mid-Atlantic Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-492 = "India Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2611 = "Bougainville Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1862 = "Russia TZ 6 Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-142 = "Canada Central Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-271 = "Greenwich Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-391 = "Arab Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2491 = "Aus Central W. Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-3141 = "South Sudan Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-131 = "US Eastern Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1842 = "Russia TZ 4 Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2631 = "Norfolk Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2041 = "Eastern Daylight Time (Mexico)" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-332 = "E. Europe Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-212 = "Pacific Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-141 = "Canada Central Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-412 = "E. Africa Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-631 = "Tokyo Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2182 = "Astrakhan Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-91 = "Pacific SA Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-592 = "Malay Peninsula Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-502 = "Nepal Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4424 AppLaunch.exe 4424 AppLaunch.exe 4528 2yL8375.exe 4528 2yL8375.exe 4528 2yL8375.exe 4528 2yL8375.exe 2592 AppLaunch.exe 2592 AppLaunch.exe 3092 Explorer.EXE 3092 Explorer.EXE 3092 Explorer.EXE 3092 Explorer.EXE 3092 Explorer.EXE 3092 Explorer.EXE 3092 Explorer.EXE 3092 Explorer.EXE 3092 Explorer.EXE 3092 Explorer.EXE 3092 Explorer.EXE 3092 Explorer.EXE 3092 Explorer.EXE 3092 Explorer.EXE 3092 Explorer.EXE 3092 Explorer.EXE 3092 Explorer.EXE 3092 Explorer.EXE 3092 Explorer.EXE 3092 Explorer.EXE 3092 Explorer.EXE 3092 Explorer.EXE 3092 Explorer.EXE 3092 Explorer.EXE 3092 Explorer.EXE 3092 Explorer.EXE 3092 Explorer.EXE 3092 Explorer.EXE 3092 Explorer.EXE 3092 Explorer.EXE 3092 Explorer.EXE 3092 Explorer.EXE 3092 Explorer.EXE 3092 Explorer.EXE 3092 Explorer.EXE 3092 Explorer.EXE 3092 Explorer.EXE 3092 Explorer.EXE 3092 Explorer.EXE 3092 Explorer.EXE 3092 Explorer.EXE 3092 Explorer.EXE 3092 Explorer.EXE 3092 Explorer.EXE 3092 Explorer.EXE 3092 Explorer.EXE 3092 Explorer.EXE 3092 Explorer.EXE 3092 Explorer.EXE 3092 Explorer.EXE 3092 Explorer.EXE 3092 Explorer.EXE 3092 Explorer.EXE 3092 Explorer.EXE 3092 Explorer.EXE 3092 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3092 Explorer.EXE -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2592 AppLaunch.exe 3528 toolspub2.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4424 AppLaunch.exe Token: SeShutdownPrivilege 3092 Explorer.EXE Token: SeCreatePagefilePrivilege 3092 Explorer.EXE Token: SeShutdownPrivilege 3092 Explorer.EXE Token: SeCreatePagefilePrivilege 3092 Explorer.EXE Token: SeShutdownPrivilege 3092 Explorer.EXE Token: SeCreatePagefilePrivilege 3092 Explorer.EXE Token: SeShutdownPrivilege 3092 Explorer.EXE Token: SeCreatePagefilePrivilege 3092 Explorer.EXE Token: SeShutdownPrivilege 3092 Explorer.EXE Token: SeCreatePagefilePrivilege 3092 Explorer.EXE Token: SeShutdownPrivilege 3092 Explorer.EXE Token: SeCreatePagefilePrivilege 3092 Explorer.EXE Token: SeShutdownPrivilege 3092 Explorer.EXE Token: SeCreatePagefilePrivilege 3092 Explorer.EXE Token: SeShutdownPrivilege 3092 Explorer.EXE Token: SeCreatePagefilePrivilege 3092 Explorer.EXE Token: SeShutdownPrivilege 3092 Explorer.EXE Token: SeCreatePagefilePrivilege 3092 Explorer.EXE Token: SeShutdownPrivilege 3092 Explorer.EXE Token: SeCreatePagefilePrivilege 3092 Explorer.EXE Token: SeShutdownPrivilege 3092 Explorer.EXE Token: SeCreatePagefilePrivilege 3092 Explorer.EXE Token: 33 5316 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 5316 AUDIODG.EXE Token: SeShutdownPrivilege 3092 Explorer.EXE Token: SeCreatePagefilePrivilege 3092 Explorer.EXE Token: SeShutdownPrivilege 3092 Explorer.EXE Token: SeCreatePagefilePrivilege 3092 Explorer.EXE Token: SeShutdownPrivilege 3092 Explorer.EXE Token: SeCreatePagefilePrivilege 3092 Explorer.EXE Token: SeShutdownPrivilege 3092 Explorer.EXE Token: SeCreatePagefilePrivilege 3092 Explorer.EXE Token: SeShutdownPrivilege 3092 Explorer.EXE Token: SeCreatePagefilePrivilege 3092 Explorer.EXE Token: SeShutdownPrivilege 3092 Explorer.EXE Token: SeCreatePagefilePrivilege 3092 Explorer.EXE Token: SeShutdownPrivilege 3092 Explorer.EXE Token: SeCreatePagefilePrivilege 3092 Explorer.EXE Token: SeShutdownPrivilege 3092 Explorer.EXE Token: SeCreatePagefilePrivilege 3092 Explorer.EXE Token: SeShutdownPrivilege 3092 Explorer.EXE Token: SeCreatePagefilePrivilege 3092 Explorer.EXE Token: SeDebugPrivilege 4424 FC65.exe Token: SeDebugPrivilege 4648 1B7.exe Token: SeShutdownPrivilege 3092 Explorer.EXE Token: SeCreatePagefilePrivilege 3092 Explorer.EXE Token: SeShutdownPrivilege 3092 Explorer.EXE Token: SeCreatePagefilePrivilege 3092 Explorer.EXE Token: SeShutdownPrivilege 3092 Explorer.EXE Token: SeCreatePagefilePrivilege 3092 Explorer.EXE Token: SeShutdownPrivilege 3092 Explorer.EXE Token: SeCreatePagefilePrivilege 3092 Explorer.EXE Token: SeShutdownPrivilege 3092 Explorer.EXE Token: SeCreatePagefilePrivilege 3092 Explorer.EXE Token: SeShutdownPrivilege 3092 Explorer.EXE Token: SeCreatePagefilePrivilege 3092 Explorer.EXE Token: SeShutdownPrivilege 3092 Explorer.EXE Token: SeCreatePagefilePrivilege 3092 Explorer.EXE Token: SeShutdownPrivilege 3092 Explorer.EXE Token: SeCreatePagefilePrivilege 3092 Explorer.EXE Token: SeShutdownPrivilege 3092 Explorer.EXE Token: SeCreatePagefilePrivilege 3092 Explorer.EXE Token: SeShutdownPrivilege 3092 Explorer.EXE -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3076 wrote to memory of 4176 3076 3374138c17e2963f9d3945fd47b6dd8b2a4ba3444b2aafc53ef9f84075d285be.exe 87 PID 3076 wrote to memory of 4176 3076 3374138c17e2963f9d3945fd47b6dd8b2a4ba3444b2aafc53ef9f84075d285be.exe 87 PID 3076 wrote to memory of 4176 3076 3374138c17e2963f9d3945fd47b6dd8b2a4ba3444b2aafc53ef9f84075d285be.exe 87 PID 4176 wrote to memory of 1504 4176 iu3BP40.exe 89 PID 4176 wrote to memory of 1504 4176 iu3BP40.exe 89 PID 4176 wrote to memory of 1504 4176 iu3BP40.exe 89 PID 1504 wrote to memory of 1360 1504 rA9SU06.exe 90 PID 1504 wrote to memory of 1360 1504 rA9SU06.exe 90 PID 1504 wrote to memory of 1360 1504 rA9SU06.exe 90 PID 1360 wrote to memory of 5032 1360 pB6JI64.exe 91 PID 1360 wrote to memory of 5032 1360 pB6JI64.exe 91 PID 1360 wrote to memory of 5032 1360 pB6JI64.exe 91 PID 5032 wrote to memory of 760 5032 JX1DP33.exe 92 PID 5032 wrote to memory of 760 5032 JX1DP33.exe 92 PID 5032 wrote to memory of 760 5032 JX1DP33.exe 92 PID 760 wrote to memory of 4136 760 zW0nu25.exe 93 PID 760 wrote to memory of 4136 760 zW0nu25.exe 93 PID 760 wrote to memory of 4136 760 zW0nu25.exe 93 PID 4136 wrote to memory of 4424 4136 1jR42nF6.exe 94 PID 4136 wrote to memory of 4424 4136 1jR42nF6.exe 94 PID 4136 wrote to memory of 4424 4136 1jR42nF6.exe 94 PID 4136 wrote to memory of 4424 4136 1jR42nF6.exe 94 PID 4136 wrote to memory of 4424 4136 1jR42nF6.exe 94 PID 4136 wrote to memory of 4424 4136 1jR42nF6.exe 94 PID 4136 wrote to memory of 4424 4136 1jR42nF6.exe 94 PID 4136 wrote to memory of 4424 4136 1jR42nF6.exe 94 PID 760 wrote to memory of 4528 760 zW0nu25.exe 95 PID 760 wrote to memory of 4528 760 zW0nu25.exe 95 PID 3452 wrote to memory of 500 3452 cmd.exe 101 PID 3452 wrote to memory of 500 3452 cmd.exe 101 PID 5032 wrote to memory of 3532 5032 JX1DP33.exe 103 PID 5032 wrote to memory of 3532 5032 JX1DP33.exe 103 PID 5032 wrote to memory of 3532 5032 JX1DP33.exe 103 PID 1360 wrote to memory of 3772 1360 pB6JI64.exe 104 PID 1360 wrote to memory of 3772 1360 pB6JI64.exe 104 PID 1360 wrote to memory of 3772 1360 pB6JI64.exe 104 PID 3772 wrote to memory of 4640 3772 4KQ724Qj.exe 105 PID 3772 wrote to memory of 4640 3772 4KQ724Qj.exe 105 PID 3772 wrote to memory of 4640 3772 4KQ724Qj.exe 105 PID 3772 wrote to memory of 2592 3772 4KQ724Qj.exe 106 PID 3772 wrote to memory of 2592 3772 4KQ724Qj.exe 106 PID 3772 wrote to memory of 2592 3772 4KQ724Qj.exe 106 PID 3772 wrote to memory of 2592 3772 4KQ724Qj.exe 106 PID 3772 wrote to memory of 2592 3772 4KQ724Qj.exe 106 PID 3772 wrote to memory of 2592 3772 4KQ724Qj.exe 106 PID 1504 wrote to memory of 4112 1504 rA9SU06.exe 107 PID 1504 wrote to memory of 4112 1504 rA9SU06.exe 107 PID 1504 wrote to memory of 4112 1504 rA9SU06.exe 107 PID 4112 wrote to memory of 3628 4112 5iW6zB3.exe 108 PID 4112 wrote to memory of 3628 4112 5iW6zB3.exe 108 PID 4112 wrote to memory of 3628 4112 5iW6zB3.exe 108 PID 4112 wrote to memory of 3628 4112 5iW6zB3.exe 108 PID 4112 wrote to memory of 3628 4112 5iW6zB3.exe 108 PID 4112 wrote to memory of 3628 4112 5iW6zB3.exe 108 PID 4112 wrote to memory of 3628 4112 5iW6zB3.exe 108 PID 4112 wrote to memory of 3628 4112 5iW6zB3.exe 108 PID 4176 wrote to memory of 2372 4176 iu3BP40.exe 109 PID 4176 wrote to memory of 2372 4176 iu3BP40.exe 109 PID 4176 wrote to memory of 2372 4176 iu3BP40.exe 109 PID 2372 wrote to memory of 2156 2372 6kT7XD0.exe 110 PID 2372 wrote to memory of 2156 2372 6kT7XD0.exe 110 PID 2372 wrote to memory of 2156 2372 6kT7XD0.exe 110 PID 3076 wrote to memory of 2104 3076 3374138c17e2963f9d3945fd47b6dd8b2a4ba3444b2aafc53ef9f84075d285be.exe 111 PID 3076 wrote to memory of 2104 3076 3374138c17e2963f9d3945fd47b6dd8b2a4ba3444b2aafc53ef9f84075d285be.exe 111 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\3374138c17e2963f9d3945fd47b6dd8b2a4ba3444b2aafc53ef9f84075d285be.exe"C:\Users\Admin\AppData\Local\Temp\3374138c17e2963f9d3945fd47b6dd8b2a4ba3444b2aafc53ef9f84075d285be.exe"2⤵
- DcRat
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\iu3BP40.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\iu3BP40.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rA9SU06.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rA9SU06.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pB6JI64.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pB6JI64.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\JX1DP33.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\JX1DP33.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\zW0nu25.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\zW0nu25.exe7⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\1jR42nF6.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\1jR42nF6.exe8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"9⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4424
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\2yL8375.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\2yL8375.exe8⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
PID:4528
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\3gC51Pb.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\3gC51Pb.exe7⤵
- Executes dropped EXE
PID:3532
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\4KQ724Qj.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\4KQ724Qj.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:4640
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2592
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\5iW6zB3.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\5iW6zB3.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:3628
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\6kT7XD0.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\6kT7XD0.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
PID:2156 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F6⤵
- DcRat
- Creates scheduled task(s)
PID:380
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵PID:4520
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:N"7⤵PID:3984
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4576
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:R" /E7⤵PID:3492
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4400
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:4388
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:3524
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:3560
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\7xp9zm26.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\7xp9zm26.exe3⤵
- Checks computer location settings
- Executes dropped EXE
PID:2104 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\AB82.tmp\AB83.tmp\AB84.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\7xp9zm26.exe"4⤵PID:2816
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/login5⤵PID:4876
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x144,0x170,0x7ffaa7d146f8,0x7ffaa7d14708,0x7ffaa7d147186⤵PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,10724762423141072513,14981044152504312766,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:36⤵PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,10724762423141072513,14981044152504312766,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:26⤵PID:4060
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/5⤵PID:4288
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffaa7d146f8,0x7ffaa7d14708,0x7ffaa7d147186⤵PID:3560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,14447084911104977486,6372956745090136167,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:36⤵PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,14447084911104977486,6372956745090136167,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:26⤵PID:2116
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/5⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3468 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ffaa7d146f8,0x7ffaa7d14708,0x7ffaa7d147186⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,9748993418471240002,5701105883213000718,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:26⤵PID:1672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,9748993418471240002,5701105883213000718,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:36⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,9748993418471240002,5701105883213000718,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:86⤵PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9748993418471240002,5701105883213000718,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:16⤵PID:3344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9748993418471240002,5701105883213000718,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:16⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9748993418471240002,5701105883213000718,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3956 /prefetch:16⤵PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9748993418471240002,5701105883213000718,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4316 /prefetch:16⤵PID:1704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9748993418471240002,5701105883213000718,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:16⤵PID:660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2152,9748993418471240002,5701105883213000718,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3976 /prefetch:86⤵PID:5176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2152,9748993418471240002,5701105883213000718,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5404 /prefetch:86⤵PID:5260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,9748993418471240002,5701105883213000718,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5296 /prefetch:86⤵PID:5748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,9748993418471240002,5701105883213000718,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5296 /prefetch:86⤵PID:5764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9748993418471240002,5701105883213000718,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5932 /prefetch:16⤵PID:5844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9748993418471240002,5701105883213000718,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:16⤵PID:5836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9748993418471240002,5701105883213000718,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5764 /prefetch:16⤵PID:3464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9748993418471240002,5701105883213000718,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5740 /prefetch:16⤵PID:5128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9748993418471240002,5701105883213000718,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5944 /prefetch:16⤵PID:5676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9748993418471240002,5701105883213000718,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5864 /prefetch:16⤵PID:5728
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\F6C4.exeC:\Users\Admin\AppData\Local\Temp\F6C4.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5504 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xd5zi6Jq.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xd5zi6Jq.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:760 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\gG2ZD8Ts.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\gG2ZD8Ts.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Wd0uP6qG.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Wd0uP6qG.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\wO6ZO0iT.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\wO6ZO0iT.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5308 -
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\1zT83ZX9.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\1zT83ZX9.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5556 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵PID:5576
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵PID:5584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5584 -s 5409⤵
- Program crash
PID:3420
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\2xF908er.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\2xF908er.exe7⤵
- Executes dropped EXE
PID:1468
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\F955.exeC:\Users\Admin\AppData\Local\Temp\F955.exe2⤵
- Executes dropped EXE
PID:5572
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FAAE.bat" "2⤵PID:4840
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/login3⤵PID:1784
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffaa7d146f8,0x7ffaa7d14708,0x7ffaa7d147184⤵PID:5616
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/3⤵PID:100
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffaa7d146f8,0x7ffaa7d14708,0x7ffaa7d147184⤵PID:4932
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\FB89.exeC:\Users\Admin\AppData\Local\Temp\FB89.exe2⤵
- Executes dropped EXE
PID:3532
-
-
C:\Users\Admin\AppData\Local\Temp\FC65.exeC:\Users\Admin\AppData\Local\Temp\FC65.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious use of AdjustPrivilegeToken
PID:4424
-
-
C:\Users\Admin\AppData\Local\Temp\FE1C.exeC:\Users\Admin\AppData\Local\Temp\FE1C.exe2⤵
- Executes dropped EXE
PID:4572
-
-
C:\Users\Admin\AppData\Local\Temp\1B7.exeC:\Users\Admin\AppData\Local\Temp\1B7.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4648
-
-
C:\Users\Admin\AppData\Local\Temp\3049.exeC:\Users\Admin\AppData\Local\Temp\3049.exe2⤵
- Checks computer location settings
- Executes dropped EXE
PID:5620 -
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"3⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3528
-
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"3⤵
- Executes dropped EXE
PID:5952 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:2088
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:5900 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4032
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:2656
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:4064
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:448
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:5872
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe5⤵
- Executes dropped EXE
PID:6056 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:64
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- DcRat
- Creates scheduled task(s)
PID:4520
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Blocklisted process makes network request
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3920
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f6⤵PID:1916
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Modifies data under HKEY_USERS
PID:5768
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll6⤵PID:1956
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- DcRat
- Creates scheduled task(s)
PID:5152
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"6⤵PID:5512
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵PID:4384
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)8⤵
- Launches sc.exe
PID:1228
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\kos2.exe"C:\Users\Admin\AppData\Local\Temp\kos2.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
PID:5956 -
C:\Users\Admin\AppData\Local\Temp\set16.exe"C:\Users\Admin\AppData\Local\Temp\set16.exe"4⤵
- Executes dropped EXE
PID:5692 -
C:\Users\Admin\AppData\Local\Temp\is-OIR0N.tmp\is-M4B0J.tmp"C:\Users\Admin\AppData\Local\Temp\is-OIR0N.tmp\is-M4B0J.tmp" /SL4 $10022A "C:\Users\Admin\AppData\Local\Temp\set16.exe" 1281875 522245⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
PID:1736 -
C:\Program Files (x86)\MyBurn\MyBurn.exe"C:\Program Files (x86)\MyBurn\MyBurn.exe" -i6⤵
- Executes dropped EXE
PID:2456
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 206⤵PID:3504
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 207⤵PID:5668
-
-
-
C:\Program Files (x86)\MyBurn\MyBurn.exe"C:\Program Files (x86)\MyBurn\MyBurn.exe" -s6⤵
- Executes dropped EXE
PID:5856
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Query6⤵PID:4060
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\K.exe"C:\Users\Admin\AppData\Local\Temp\K.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
PID:3420
-
-
-
C:\Users\Admin\AppData\Local\Temp\latestX.exe"C:\Users\Admin\AppData\Local\Temp\latestX.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Program Files directory
PID:1344
-
-
-
C:\Users\Admin\AppData\Local\Temp\330A.exeC:\Users\Admin\AppData\Local\Temp\330A.exe2⤵
- Executes dropped EXE
PID:852
-
-
C:\Users\Admin\AppData\Local\Temp\3424.exeC:\Users\Admin\AppData\Local\Temp\3424.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1484
-
-
C:\Users\Admin\AppData\Local\Temp\379F.exeC:\Users\Admin\AppData\Local\Temp\379F.exe2⤵
- Executes dropped EXE
PID:2768
-
-
C:\Users\Admin\AppData\Local\Temp\3A9E.exeC:\Users\Admin\AppData\Local\Temp\3A9E.exe2⤵
- Executes dropped EXE
PID:5864
-
-
C:\Users\Admin\AppData\Local\Temp\404C.exeC:\Users\Admin\AppData\Local\Temp\404C.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1256 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1256 -s 7923⤵
- Program crash
PID:4996
-
-
-
C:\Users\Admin\AppData\Local\Temp\4F41.exeC:\Users\Admin\AppData\Local\Temp\4F41.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6048 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6048 -s 7923⤵
- Program crash
PID:3008
-
-
-
C:\Users\Admin\AppData\Local\Temp\5472.exeC:\Users\Admin\AppData\Local\Temp\5472.exe2⤵
- Executes dropped EXE
PID:3236 -
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe fccbeacfea.sys,#13⤵PID:5772
-
-
-
C:\Users\Admin\AppData\Local\Temp\5752.exeC:\Users\Admin\AppData\Local\Temp\5752.exe2⤵
- Executes dropped EXE
PID:5544
-
-
C:\Users\Admin\AppData\Local\Temp\6666.exeC:\Users\Admin\AppData\Local\Temp\6666.exe2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
PID:988
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /delete /f /tn "GoogleUpdateTaskMachineQC"2⤵PID:2412
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /create /f /tn "GoogleUpdateTaskMachineQC" /xml "C:\Users\Admin\AppData\Local\Temp\xhoymdsniflw.xml"2⤵
- DcRat
- Creates scheduled task(s)
PID:2276
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:5260
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵PID:4344
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:2796
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:2000
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:1876
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:4448
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:1848
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Launches sc.exe
PID:2124
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵PID:2320
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:2080
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:5932
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:6108
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:1332
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:116
-
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:5408
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /create /f /tn "GoogleUpdateTaskMachineQC" /xml "C:\Users\Admin\AppData\Local\Temp\xhoymdsniflw.xml"2⤵
- DcRat
- Creates scheduled task(s)
PID:1116
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c regini "C:\Users\Admin\AppData\Roaming\random_1698032232.txt"1⤵
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Windows\system32\regini.exeregini "C:\Users\Admin\AppData\Roaming\random_1698032232.txt"2⤵PID:500
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4400
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5112
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4fc 0x3441⤵
- Suspicious use of AdjustPrivilegeToken
PID:5316
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5584 -ip 55841⤵PID:5020
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:5908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 1256 -ip 12561⤵PID:5436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 6048 -ip 60481⤵PID:5592
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe fccbeacfea.sys,#11⤵
- Loads dropped DLL
PID:6136
-
C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exeC:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
PID:3116
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵PID:5448
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵PID:1876
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD5f0fd986799e64ba888a8031782181dc7
SHA1df5a8420ebdcb1d036867fbc9c3f9ca143cf587c
SHA256a85af12749a97eeae8f64b767e63780978c859f389139cd153bedb432d1bfb4f
SHA51209d8b0a6e39139c1853b5f05b1f87bbed5f38b51562cd3da8eb87be1125e8b28c2a3409d4977359cf8551a76c045de39c0419ddcef6459d9f87e10a945545233
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
152B
MD584e6aebc5420fcda07eda960045ceffd
SHA153bb1515a7231d5c8671ae256ad22140da8ec8d3
SHA2562e78acc88895f3c1c89e9761005675a1f5708c04297990eefd62198681c84971
SHA51210c93637df89883142a142ac6b28651d6cc95c6fed0c6aa92adf9146efe4fd33fc9bc3a167b28f436feda58a4674826ab8c536d800c3ed464aee452c0089d044
-
Filesize
152B
MD52430f921ebfb431716d98779707a18a8
SHA1a4296a634347c0c30b3e101fdd2a10d5a87746ba
SHA25600f6f17a7fdfde9da965c8236df95a72c6698f36274a632908d22039a2a828d1
SHA5128ceaae534e5558b6ef3f0db80527d8d79a1aeb369d3bca85d7e92da4ac5c9cad83e604e5f566e957cbf027192b1308c61098f7b493d5232efbc4a15082737a55
-
Filesize
152B
MD52430f921ebfb431716d98779707a18a8
SHA1a4296a634347c0c30b3e101fdd2a10d5a87746ba
SHA25600f6f17a7fdfde9da965c8236df95a72c6698f36274a632908d22039a2a828d1
SHA5128ceaae534e5558b6ef3f0db80527d8d79a1aeb369d3bca85d7e92da4ac5c9cad83e604e5f566e957cbf027192b1308c61098f7b493d5232efbc4a15082737a55
-
Filesize
152B
MD52430f921ebfb431716d98779707a18a8
SHA1a4296a634347c0c30b3e101fdd2a10d5a87746ba
SHA25600f6f17a7fdfde9da965c8236df95a72c6698f36274a632908d22039a2a828d1
SHA5128ceaae534e5558b6ef3f0db80527d8d79a1aeb369d3bca85d7e92da4ac5c9cad83e604e5f566e957cbf027192b1308c61098f7b493d5232efbc4a15082737a55
-
Filesize
152B
MD52430f921ebfb431716d98779707a18a8
SHA1a4296a634347c0c30b3e101fdd2a10d5a87746ba
SHA25600f6f17a7fdfde9da965c8236df95a72c6698f36274a632908d22039a2a828d1
SHA5128ceaae534e5558b6ef3f0db80527d8d79a1aeb369d3bca85d7e92da4ac5c9cad83e604e5f566e957cbf027192b1308c61098f7b493d5232efbc4a15082737a55
-
Filesize
152B
MD52430f921ebfb431716d98779707a18a8
SHA1a4296a634347c0c30b3e101fdd2a10d5a87746ba
SHA25600f6f17a7fdfde9da965c8236df95a72c6698f36274a632908d22039a2a828d1
SHA5128ceaae534e5558b6ef3f0db80527d8d79a1aeb369d3bca85d7e92da4ac5c9cad83e604e5f566e957cbf027192b1308c61098f7b493d5232efbc4a15082737a55
-
Filesize
152B
MD52430f921ebfb431716d98779707a18a8
SHA1a4296a634347c0c30b3e101fdd2a10d5a87746ba
SHA25600f6f17a7fdfde9da965c8236df95a72c6698f36274a632908d22039a2a828d1
SHA5128ceaae534e5558b6ef3f0db80527d8d79a1aeb369d3bca85d7e92da4ac5c9cad83e604e5f566e957cbf027192b1308c61098f7b493d5232efbc4a15082737a55
-
Filesize
152B
MD52430f921ebfb431716d98779707a18a8
SHA1a4296a634347c0c30b3e101fdd2a10d5a87746ba
SHA25600f6f17a7fdfde9da965c8236df95a72c6698f36274a632908d22039a2a828d1
SHA5128ceaae534e5558b6ef3f0db80527d8d79a1aeb369d3bca85d7e92da4ac5c9cad83e604e5f566e957cbf027192b1308c61098f7b493d5232efbc4a15082737a55
-
Filesize
152B
MD584e6aebc5420fcda07eda960045ceffd
SHA153bb1515a7231d5c8671ae256ad22140da8ec8d3
SHA2562e78acc88895f3c1c89e9761005675a1f5708c04297990eefd62198681c84971
SHA51210c93637df89883142a142ac6b28651d6cc95c6fed0c6aa92adf9146efe4fd33fc9bc3a167b28f436feda58a4674826ab8c536d800c3ed464aee452c0089d044
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
7KB
MD578cd46c0b078433b207033492f3389b5
SHA1995da1431a47ddbd05c48f989f5d9e9ba9a291d2
SHA2566d1a6f0547dbf35ea6b5e408050e54d0f2c0e9068b1c970313d7c4356a07b307
SHA512e872fe8fa81970d9ea7e6e6c72887a40202fbe64e800e5f3c86cf62b59a62cbbd15eba9071cdb623b85e6b764d3c21fbf2907867bd128734dd5c448a89a58486
-
Filesize
5KB
MD5ce6e281f8cbffcf365cb3c3cd55fd084
SHA10db0b2d6538fad7dc983d0c78ae4b340e81dda6c
SHA25601a0e9d28bf48fbef79b7710354c5c001c18b9e0300efa73efe675df3b0c5bfd
SHA512e78bd30692c35179f093b87d608c8f8a3444a18989cae854ef2c92bec675200d4b1500c7010e21bf9259c78c4d2adc206b31dd40034e2837e771d93bb6e77228
-
Filesize
7KB
MD5f3f030fdf65564b78ef475f5b09bd309
SHA16e3b2444712f21948cd02359cfb3bb423f7c1f44
SHA256e1d700899d31a8f7f6a259d235a37ad5d1930057d1f389955766dd9fb21385a9
SHA512a3f100ccf88e44b9aac62e4042118fc340494d74b8f1d6e5d299a9b474fe9f5eb2b92b10167dd5e54b08f985cbe08a87770662717fd66a7fa3f6a74a0c383710
-
Filesize
24KB
MD5eebb87276d4d8c8e86399953f1fd5d76
SHA12c1b7f15617dad6c5621c1a4dcd4f9e85b50c969
SHA25667b90d14705ba0d32de1a712d96cee5ff1ba058c11206bc892e11ae77f985bc8
SHA5129e48898e2dab7bf7b0b23242a2379d04bd717a76c8d2362b413cbae2d29ef2e50ae9cc5c4521a6092e53e12e64a2576bb13afff815574204e722d48cf041dccf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\6c0a67f9-f4e0-4e26-b475-f43e49f62824\index-dir\the-real-index
Filesize2KB
MD500d5ea1225154d424ae0b2b047d09b88
SHA1539ccff7fe912cdaf89424588797755d2f90c3b6
SHA2565aec437bb240da0f52f45e42f87203c4c59a627cd0da7441c90b08371e275d96
SHA512bf907ba5b8e10a880332ec14648fb90fa8ecf23048dd0d91dcf9ff33308666bcfaab806d230c7be1cf48860d93dab915212f5b5ca04100b2fe37999f15ef988c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\6c0a67f9-f4e0-4e26-b475-f43e49f62824\index-dir\the-real-index~RFe5822f4.TMP
Filesize48B
MD50396d28c68a3ae14ecd9eee9103d20cb
SHA1e04125eed198be08f79ff42f6d00d00b68346890
SHA2566fd4209ba84534b1722db8d39cde4263533fbaa5e289972672a41e70edf108de
SHA5126037df3069383183ad340dd4a18de2b7f541d6e4345d3aa9c7039022f03188166c720419441742b61b4d9618f4931695ddd92b07d5d685f836390c75a8d3697f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\f83453f6-47f8-4c24-b79f-140b25b7ebed\index-dir\the-real-index
Filesize624B
MD5960466b471d1a02bd165c18bc25221f4
SHA180aeba46a105b3821de01d8a65eafd058b5db4c5
SHA2562a81d1f3adc779f2a96d863ea1dee12c4220b061e8fba92a717613242518992f
SHA51255c6433c630638cc6d19f14652ae19474d3925b0b33044d6def0e0ed3fc289b1832b2ed01437f8c97e862d8ea8990927d0a065ea1fbf7b3bccc647dda48ec8b4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\f83453f6-47f8-4c24-b79f-140b25b7ebed\index-dir\the-real-index~RFe582584.TMP
Filesize48B
MD50fada65613e25c3a1d90ec18e91c4b23
SHA10a19a3ff3d0c2cb999281677cae5340d55de11d1
SHA256abd8ad3e4d2a9115f718b458ad3b6d71dc88745773beb0d3681540ec637a3ad1
SHA5120b98bd0d09e26260520c646476de3efa2a4184b289990e950dbf6db35680ce68eaebe6e63092622b867771c8a72218c57a6651210449dcb7832f874b0f95ee1f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize89B
MD5731f42895e431a13aeffe7f423b614a4
SHA1480b935cdf6243eb4dd4c14fa0be9a702aea158e
SHA256fb4c5ec9d7600862eacb9d8967accb184acc42959ee74c2697a3ab2cd6cee5b3
SHA51247ae349d62194946e5b0efa92f2d789d51b62438e1459dbf2c95a279afa0c374f54bab3d1eb0db3967230059aafd7f90f4dc18b53091dac2b2764113bba354b0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize146B
MD5b13a2d5a54babccfcc832952c0610e5c
SHA142213801d464b70c7e5ae972e1204f5bab48321c
SHA256da5891174853e39e117a3d67ed683bdc1b3bd5e42e173212874e78ed886798ee
SHA5128063d8d14969503bcafe65d46800f9c9975db871de4032aed56e6a3851e72bfb0d4e9bc1ceda21c1f0cb82cde7996cd0afcaeddfdcd82f0d89aebecef44d96bf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize82B
MD5cbe72d74d25a10414bd3bf5a1da67e98
SHA19cdc664240cdc9a7087004e554ba10ee14274b6d
SHA256d1af11978cec32a6286a6169dc102af0d7bc06e17d79c2060db4ce9d0ba8d4b3
SHA51291c49d68c737b438538787edd7c4c58638b0d80c7a2bebd53ed96ff0f96cfc0d979f5cb0cd6a659172c1b045e3f5fc32610093c658521413d56f53e46e6e03dd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize155B
MD523bf3f622289b258849c50e313d3dc3c
SHA1525b0eb780235de8ce71f05d2aa2e574d68c9096
SHA256215db2452b00bd77768f834f815c1b42b5388e9aba35300b9694acf38ea503bd
SHA512e2a51727a649ea61db60c9a9e19ba2bc8ec429966ea0ee7a8f1447a7bdbcd6055594372c4c1474cef6e79c52647640355413317208325a51f3ce44ed904790fe
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize153B
MD5961948f7127a83469bf125005260e6e9
SHA1a85d449bce9bc4f51e74ce847f113f827924cad1
SHA2562b92b92967e94a187f71563d86e40ecfc5dbae94aaa1727f3d0cd4b8e257350c
SHA512044950ef9e52fd415be65afa9f8a52f8a6fab2a247e02fd33049cc062f1cb4387b6af2a31b8788f6eb703f96c30aa5abea8110210dd36613d7b708b4bc70b6d9
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize96B
MD5708ec61fbaf755e080ab24a8339346c6
SHA1d87aebe3400318bed11ff226397d848108c9224f
SHA2565d43f558f5c1cbf379e1c85217c30c8b6d975435725d12071d6b76206951f034
SHA51254df720ed814a9b6c5bf94ec262716ec1b4b7420db50425b34aa8e12ca5b1cdf7ded15a8dcb233a4e7daa3f815799c3f013a7b10d4889eca4c95b5c40376c287
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe581a59.TMP
Filesize48B
MD5dd121e93ea18eae5c9af3a10e35cb17e
SHA102cd2a3f4a845c5ba78910f17fe0258358cc35ee
SHA25660e6d585e50656adc96b0fc01f03ebdda937c2bb9d3327cca7ead4ede21a659b
SHA512ebc43e6a7dcf58e127e581b209ddc71cb0d47d733f6058fc8a9d2b14fe2bba1031f808396551c7c36d18d53d54e86f921c8914b9a10126b6b427c51b0a7b8230
-
Filesize
1KB
MD5f645b28847bb259277a77d23fb441e87
SHA117ffc2392dc35f46cee7227129b69775060ee5f5
SHA256948a13d0d1a6d0fd0fe87f30dd668b44706ba70b9db840c98ee11992c5760135
SHA512e351836cff9a5489d15b206a3bba82695b20d8c411a9a4e962ab99ff421e9d10a6063d6a9781f3b3c7626c8b99ea2c7f6a82c13f3e6cdea1f79234113ab2012e
-
Filesize
1KB
MD5823c727f9707b6adb0f3d8fe2319095a
SHA1c36559be6338cd526197155c389463116adca0ea
SHA256a502bce1dc41846d03a22741aa4c89f2b74536b2943967aebed77ca6ab022a39
SHA512491984950a6418c04e948816dd7f65b088de7b6a6bc0e176c0bd6e5abe8d29d4580ddfb0afdefdf7a9f06e90ab9c2cc6dc33b200c68d0554d494db8ea3487771
-
Filesize
1KB
MD5d155446ce349ff1f790bfc1cf18b29c6
SHA170fe0bc0c87e76ee40dce125834f9d1c07042888
SHA2561584648fff6f5e2633899a511edd4a2f796269acb06e20b5542d0fe185eaa296
SHA512e2288a6b04bad010f9b899b1bba3e250357cf2582da23f81aafe4843be770a7ca926c15803cd55e636771c0a278f85c4d278bf1a07dde36c6e130b499a9b20ed
-
Filesize
1KB
MD5f427b3ac9bdf40f1cbf0bc07e638a203
SHA1a90fa716bf99cd2dcba48a3cfcb8e8e631bd4552
SHA2564aca9e766b637d0755a6017ee6ca158a6930af8e28fed2b0340b8e1f50619822
SHA5127258560227dea9fe23f4f2409b362fe97658150d7ede8b391ea3397b6aacfdebf3ae234e2594175a1d7e184331b80753e24ea98685bc4d4c7a8cca3e0195f9af
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
2KB
MD5d480101c2ef4ebd53682e18f36940714
SHA103979e1288a53f5ab7d1b039f581cae500fd5e77
SHA2568ac1471f4df4d573a5a77500545ebafcd7dd4b65ac19e764b677958af23bd95b
SHA5124b6dd8c8312b654b816d600f1c7b8520060f55caafb752471611c652ba9e7258ea856ea5bb6dfa322ae0edce825100d3c37861ef95fba1341b1f0dc6893e7b31
-
Filesize
10KB
MD5166bb07558a36bbeb157d315344d92cf
SHA11eab86c8349e2bdbac8301b3ed66ed77802c2d5a
SHA2566c3a8dfc11969fe8c828133a2e6cdc1e7fe8dec9b8cdd7dc441bc1d4b0f8179a
SHA5126a39667a6fe1bb9c8be79b7744d3c25e4c7e9ced6ad13a171fb5c6df273a5f8b97ac337393d77d8efc96749ec47215b8cdd6ac8f49be27e9e86000b96c4eaf4e
-
Filesize
2KB
MD5d480101c2ef4ebd53682e18f36940714
SHA103979e1288a53f5ab7d1b039f581cae500fd5e77
SHA2568ac1471f4df4d573a5a77500545ebafcd7dd4b65ac19e764b677958af23bd95b
SHA5124b6dd8c8312b654b816d600f1c7b8520060f55caafb752471611c652ba9e7258ea856ea5bb6dfa322ae0edce825100d3c37861ef95fba1341b1f0dc6893e7b31
-
Filesize
2KB
MD5d480101c2ef4ebd53682e18f36940714
SHA103979e1288a53f5ab7d1b039f581cae500fd5e77
SHA2568ac1471f4df4d573a5a77500545ebafcd7dd4b65ac19e764b677958af23bd95b
SHA5124b6dd8c8312b654b816d600f1c7b8520060f55caafb752471611c652ba9e7258ea856ea5bb6dfa322ae0edce825100d3c37861ef95fba1341b1f0dc6893e7b31
-
Filesize
2KB
MD58f72dfda14ac764d53b8f627c5285e67
SHA1981c6b86377cfb0dc8d6e5001a87670f5797ad26
SHA256309f8442028aea6cd6f24d0ddddd5772afee9139a6275f2c60be285370328063
SHA5123b03e65a94028d3050527454d1cb5d1f0808ef9b012f91762a352d39c613e64fb045393306c905aa4ea192187aff0c8a770f4ee2f03f9ad6ef700960dcff48e2
-
Filesize
2KB
MD58f72dfda14ac764d53b8f627c5285e67
SHA1981c6b86377cfb0dc8d6e5001a87670f5797ad26
SHA256309f8442028aea6cd6f24d0ddddd5772afee9139a6275f2c60be285370328063
SHA5123b03e65a94028d3050527454d1cb5d1f0808ef9b012f91762a352d39c613e64fb045393306c905aa4ea192187aff0c8a770f4ee2f03f9ad6ef700960dcff48e2
-
Filesize
2KB
MD58f72dfda14ac764d53b8f627c5285e67
SHA1981c6b86377cfb0dc8d6e5001a87670f5797ad26
SHA256309f8442028aea6cd6f24d0ddddd5772afee9139a6275f2c60be285370328063
SHA5123b03e65a94028d3050527454d1cb5d1f0808ef9b012f91762a352d39c613e64fb045393306c905aa4ea192187aff0c8a770f4ee2f03f9ad6ef700960dcff48e2
-
Filesize
4.2MB
MD5ea6cb5dbc7d10b59c3e1e386b2dbbab5
SHA1578a5b046c316ccb2ce6f4571a1a6f531f41f89c
SHA256443d03b8d3a782b2020740dc49c5cc97eb98ca4543b94427a0886df3f2a71132
SHA512590355ea716bac8372d0fac1e878819f2e67d279e32ef787ff11cbe8a870e04d1a77233e7f9f29d303ff11a90096ebae6c5a41f1ab94abb82c0710357fc23200
-
Filesize
124B
MD5dec89e5682445d71376896eac0d62d8b
SHA1c5ae3197d3c2faf3dea137719c804ab215022ea6
SHA256c3dea90ca98985007f0de66bf0197fdcd2d4a35e365135bf37a18a4895d81668
SHA512b746b79120d2ff8a9f3327b0bed99c70339155ea831c1eb9f412056fc8de36a0e3005378ba9102bd25ce6cc24fe1171f1a9c8453f33a9bcd6dd59e9ad0f8e186
-
Filesize
1.5MB
MD57bb9f60231c3d93db01ec83cfa97d892
SHA1fc1d21c3778209babc826a7625a97216ebb0bc27
SHA25644f5529c37c06621ff86769e7b8d01004140d3b3142c50947fe02cae5b1332c1
SHA5120e3eec9d3bc779989ff702d62cfdd3c77a1a51923b635cb334b0f8960ee14dddd61444d790c74236c460f81c73ceafeab55cf7544fd6090a1919f7a675f2db12
-
Filesize
1.5MB
MD57bb9f60231c3d93db01ec83cfa97d892
SHA1fc1d21c3778209babc826a7625a97216ebb0bc27
SHA25644f5529c37c06621ff86769e7b8d01004140d3b3142c50947fe02cae5b1332c1
SHA5120e3eec9d3bc779989ff702d62cfdd3c77a1a51923b635cb334b0f8960ee14dddd61444d790c74236c460f81c73ceafeab55cf7544fd6090a1919f7a675f2db12
-
Filesize
45KB
MD5eb183828897a75c6ed94cda0e20f1514
SHA1d728fb07cf29524c75dc0204d55917c3d2471c47
SHA256cda65dacca3571a496e2737fee0570bf174cd5c76f3cd4ea033fcc794996aeba
SHA512c340af828906676d5e3f8ad55d721e7b1df7b309ff00497b1a3c99e61a2eafec40b66fcae55197d604b15ff76bc788cef4fbeca97f1e8b021e453b5ac5dcc2a5
-
Filesize
45KB
MD57d795c8841010dc8c421582c23bd4f67
SHA189ec6b3faab3fa90b976584c40713e5f4bc58229
SHA256a8046c61dc8360841c29e2cfcaa86961d93a520670def6302770e213b00f39c1
SHA51252cf70a9c39c95552ddfdf53fb1898f477f523bfc46c5452b80604c057f4688531357795b4cdf6f08ffe0e2b71aabc50720ccc2d774493830b2f248c7147b47d
-
Filesize
45KB
MD57d795c8841010dc8c421582c23bd4f67
SHA189ec6b3faab3fa90b976584c40713e5f4bc58229
SHA256a8046c61dc8360841c29e2cfcaa86961d93a520670def6302770e213b00f39c1
SHA51252cf70a9c39c95552ddfdf53fb1898f477f523bfc46c5452b80604c057f4688531357795b4cdf6f08ffe0e2b71aabc50720ccc2d774493830b2f248c7147b47d
-
Filesize
1.6MB
MD5c1bcc4a5d216fdde9d9428d933b25123
SHA19f6a59a6e5ef2d21cc9cbbd9096c54439c5081fb
SHA2568839f27d66ff930599228e1bcc8f8c069c408e2d2b73b077cce2ece568f6ec8f
SHA512c853ce3c9dff8706fd0fa460b58a2644cce30e06fbe467790f02a351a9df93f9614882ad31cb78fd8fa92b66794d5a2849cbcf5613c31ebe651b94911291d0d5
-
Filesize
1.6MB
MD5c1bcc4a5d216fdde9d9428d933b25123
SHA19f6a59a6e5ef2d21cc9cbbd9096c54439c5081fb
SHA2568839f27d66ff930599228e1bcc8f8c069c408e2d2b73b077cce2ece568f6ec8f
SHA512c853ce3c9dff8706fd0fa460b58a2644cce30e06fbe467790f02a351a9df93f9614882ad31cb78fd8fa92b66794d5a2849cbcf5613c31ebe651b94911291d0d5
-
Filesize
1.3MB
MD5baec8ec6ab19aa9dfd409a87b9ed2021
SHA16da7bb04c5881a386026dde49f1747605b47b9ae
SHA256d263aaa03508a0ac7bb6792789e7f626e5e835bd5f8aaaa2aad0918c6af9ef7b
SHA51270459faa974d1e5b5b8b46369c8dde713461eebc40c4094a67067421c6fc9987a38747ae21d375680f9e2e5319e66876d6407302419c715524b742c7050ab464
-
Filesize
1.3MB
MD5baec8ec6ab19aa9dfd409a87b9ed2021
SHA16da7bb04c5881a386026dde49f1747605b47b9ae
SHA256d263aaa03508a0ac7bb6792789e7f626e5e835bd5f8aaaa2aad0918c6af9ef7b
SHA51270459faa974d1e5b5b8b46369c8dde713461eebc40c4094a67067421c6fc9987a38747ae21d375680f9e2e5319e66876d6407302419c715524b742c7050ab464
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
1.1MB
MD5c64c2a5b675218b51d0ba3d7cf956e86
SHA1bfc5b85b81ca4b28d2208ca35679fffc422c32d0
SHA25616388c8f8aa864c4c990b6ee69b505728b89cf32420c14d838271b01908e105d
SHA5126ab0b6004ece25328d4c529f37194137aba106f66b28fa6257b46d79dc7e22ea4d07f66ef70c55b9ef5f3ef901fdec85342c9fe2486e403f8419d1226003ada4
-
Filesize
1.4MB
MD525145be9c81f6f328db125eda1bfbd35
SHA1509f8f17ce967ebc5b9b5b2e9c6de4555d5e1c8f
SHA256a07b140ffc88632a45cc5f79371727f16662125ea279fe3c11b1b30fcb0e11c0
SHA5123b6849d563f2a289d6975ee35ad12bba0b83b15f2d6462a5644f411abda27b47d382f5a97300f9f4e02ed3080902687e25caf754ecdcfcea15d3ba1a5064b3e2
-
Filesize
1.4MB
MD525145be9c81f6f328db125eda1bfbd35
SHA1509f8f17ce967ebc5b9b5b2e9c6de4555d5e1c8f
SHA256a07b140ffc88632a45cc5f79371727f16662125ea279fe3c11b1b30fcb0e11c0
SHA5123b6849d563f2a289d6975ee35ad12bba0b83b15f2d6462a5644f411abda27b47d382f5a97300f9f4e02ed3080902687e25caf754ecdcfcea15d3ba1a5064b3e2
-
Filesize
1.1MB
MD57c2664dc7d9142e51a0139d77f47eefd
SHA1b38f4e538f45b0a804f69d8b73b615c11654bf83
SHA256ce8cf5e3d9e39b72eafc6c7664483d06f31e7d0da1b72cf9a493e219f486b757
SHA5126b276bd34479ca92a7abf3e760368bf823f82aab87aaead3ebf50aff123e153963fcb6f297f08f789ddb35b0ecb5bdd5237e38090d414aebcd6ccf7b240792d1
-
Filesize
1.1MB
MD57c2664dc7d9142e51a0139d77f47eefd
SHA1b38f4e538f45b0a804f69d8b73b615c11654bf83
SHA256ce8cf5e3d9e39b72eafc6c7664483d06f31e7d0da1b72cf9a493e219f486b757
SHA5126b276bd34479ca92a7abf3e760368bf823f82aab87aaead3ebf50aff123e153963fcb6f297f08f789ddb35b0ecb5bdd5237e38090d414aebcd6ccf7b240792d1
-
Filesize
1.0MB
MD52fd3f76818a4bd3ebd81cc55fd5ed70c
SHA17185bede6489338c081f3d2e7a42d931c5516665
SHA25604864b8c88c06bb2310fde7eb47070379c8730fb890a8b87c1a5ad13d6630e1f
SHA512d42441a821d97eb53d39a88ebfe0d5b0549c0cdb098ff11bad5bb38ca7d1f27e51ef447323a07fca01b56b5e1b746b81747678766daaa987bdb8879fa0474cad
-
Filesize
1.0MB
MD52fd3f76818a4bd3ebd81cc55fd5ed70c
SHA17185bede6489338c081f3d2e7a42d931c5516665
SHA25604864b8c88c06bb2310fde7eb47070379c8730fb890a8b87c1a5ad13d6630e1f
SHA512d42441a821d97eb53d39a88ebfe0d5b0549c0cdb098ff11bad5bb38ca7d1f27e51ef447323a07fca01b56b5e1b746b81747678766daaa987bdb8879fa0474cad
-
Filesize
897KB
MD573578ec9f0721605f0eb0ede673aee95
SHA1dafae2a895b9d9c600ee8331ff32a752e5dd292c
SHA256a64d860773b763d23476a06c4b34b60f14727e418646a8479a0a1d01d6e35218
SHA512b1fa5beabd51bb45acce76f1709ea74827a6d3ec8bd2de19a5750bec96e2b3c50345600baf6274e0cc237d4250d9f71adb31796195e02de38462ec503f261602
-
Filesize
897KB
MD573578ec9f0721605f0eb0ede673aee95
SHA1dafae2a895b9d9c600ee8331ff32a752e5dd292c
SHA256a64d860773b763d23476a06c4b34b60f14727e418646a8479a0a1d01d6e35218
SHA512b1fa5beabd51bb45acce76f1709ea74827a6d3ec8bd2de19a5750bec96e2b3c50345600baf6274e0cc237d4250d9f71adb31796195e02de38462ec503f261602
-
Filesize
688KB
MD573ca1db9b459f0d0f4b24309814ced3e
SHA11ec7836d80ee05199642a1d34d45ef2b2c4a8f57
SHA256075d1c3ff918d6a91f7f53a151169fab08c81b1a6ca3124e1bf336ea070c3eaf
SHA51237a2e9122485c33458dbf9400544a7d9d6f19f6c16edd2a8e4554f11ee1d19e3029790ac4ee70d1d06d77dbd7cf266f7d5901975d2f11d6205fb36e9fa4c0f5b
-
Filesize
688KB
MD573ca1db9b459f0d0f4b24309814ced3e
SHA11ec7836d80ee05199642a1d34d45ef2b2c4a8f57
SHA256075d1c3ff918d6a91f7f53a151169fab08c81b1a6ca3124e1bf336ea070c3eaf
SHA51237a2e9122485c33458dbf9400544a7d9d6f19f6c16edd2a8e4554f11ee1d19e3029790ac4ee70d1d06d77dbd7cf266f7d5901975d2f11d6205fb36e9fa4c0f5b
-
Filesize
180KB
MD5b32c18e30ec6146d23f806b8ead5c7ce
SHA14f89f91082df1cf6903001d39f119b5c27355a42
SHA25614668e8b263be0857361977d2dc3192d5bd31989d308fcd8965f67cc0ae8d2a5
SHA512928649daa11f415dc476f15c587181911c57c5ff95bcedef7d08b9f5d87d14493f0992b402bce019d0982366b45d0bf62c949e905f9a6f400e8529d7c11b9603
-
Filesize
180KB
MD50635bc911c5748d71a4aed170173481e
SHA16d92ff8b519e4a10759f75f3b3d9e1459ed4ff1b
SHA256a0330d75df7075206cf68d358e3acfc621062f35db43c2521b8ef5e7c9f317f1
SHA51250ea5d41497884b8aee43d6d7940186d6095055c4cd301ffa88407caf9935853dcfd852e81ab4671da21505ba284b0bae71a59fa50dd55dfa4c3ea7d0251651a
-
Filesize
180KB
MD50635bc911c5748d71a4aed170173481e
SHA16d92ff8b519e4a10759f75f3b3d9e1459ed4ff1b
SHA256a0330d75df7075206cf68d358e3acfc621062f35db43c2521b8ef5e7c9f317f1
SHA51250ea5d41497884b8aee43d6d7940186d6095055c4cd301ffa88407caf9935853dcfd852e81ab4671da21505ba284b0bae71a59fa50dd55dfa4c3ea7d0251651a
-
Filesize
492KB
MD534cfe579d26c0b363267696aa24793d1
SHA1abdfc7d3696238d045b2fbf1e8a1c65915c9f8b1
SHA25634f90987363c4cdb04002d7ba702fee382aa87ed1d48f37539f28e05bd1554c2
SHA512b91aae192fbfab292a4552ea78cad51bd5e2c7ce01d47bd601e5e00b0e219b98c43a5425df0dd151eb25bbd9dd3f43b4448ef7f6b39bbbf651ba55a09538e339
-
Filesize
492KB
MD534cfe579d26c0b363267696aa24793d1
SHA1abdfc7d3696238d045b2fbf1e8a1c65915c9f8b1
SHA25634f90987363c4cdb04002d7ba702fee382aa87ed1d48f37539f28e05bd1554c2
SHA512b91aae192fbfab292a4552ea78cad51bd5e2c7ce01d47bd601e5e00b0e219b98c43a5425df0dd151eb25bbd9dd3f43b4448ef7f6b39bbbf651ba55a09538e339
-
Filesize
875KB
MD573d86751a127f28504b4239773c328be
SHA1a7b5a37edc0841e9a269b827bb0bf28ae0d8c330
SHA256e0923f519bbf0f9c43922d26954359eed1c352db6deda6e655f838a44d655030
SHA512464df937ab7ed3a7af81f18d5238019b4268a78dfd8b9d0df6a459c5fd19dfa480c441ce2f20f8b63dcba806e6fc646beaa6b778b52fedee7077739634bad3e0
-
Filesize
875KB
MD573d86751a127f28504b4239773c328be
SHA1a7b5a37edc0841e9a269b827bb0bf28ae0d8c330
SHA256e0923f519bbf0f9c43922d26954359eed1c352db6deda6e655f838a44d655030
SHA512464df937ab7ed3a7af81f18d5238019b4268a78dfd8b9d0df6a459c5fd19dfa480c441ce2f20f8b63dcba806e6fc646beaa6b778b52fedee7077739634bad3e0
-
Filesize
265KB
MD515fe972bcfd9189d826083838645b850
SHA1d2bf7fee68e358fa71b942b8ae92e483536abf86
SHA256ec739f26f487bcc65718bb8c28a5e3adf817a18e01952bd888f618a57c1e61d4
SHA51230f7c8daa78ba9bb32d5dca56440fd9b1d36336f496521920ab41737787c1c8e0bcdd714b72249e0ab52908d7918afcaf9e0b3f5ba2a8a2888e9adb538810cfe
-
Filesize
265KB
MD515fe972bcfd9189d826083838645b850
SHA1d2bf7fee68e358fa71b942b8ae92e483536abf86
SHA256ec739f26f487bcc65718bb8c28a5e3adf817a18e01952bd888f618a57c1e61d4
SHA51230f7c8daa78ba9bb32d5dca56440fd9b1d36336f496521920ab41737787c1c8e0bcdd714b72249e0ab52908d7918afcaf9e0b3f5ba2a8a2888e9adb538810cfe
-
Filesize
8KB
MD5ac65407254780025e8a71da7b925c4f3
SHA15c7ae625586c1c00ec9d35caa4f71b020425a6ba
SHA25626cd9cc9a0dd688411a4f0e2fa099b694b88cab6e9ed10827a175f7b5486e42e
SHA51227d87730230d9f594908f904bf298a28e255dced8d515eb0d97e1701078c4405f9f428513c2574d349a7517bd23a3558fb09599a01499ea54590945b981b17ab
-
Filesize
116B
MD5ec6aae2bb7d8781226ea61adca8f0586
SHA1d82b3bad240f263c1b887c7c0cc4c2ff0e86dfe3
SHA256b02fffaba9e664ff7840c82b102d6851ec0bb148cec462cef40999545309e599
SHA512aa62a8cd02a03e4f462f76ae6ff2e43849052ce77cca3a2ccf593f6669425830d0910afac3cf2c46dd385454a6fb3b4bd604ae13b9586087d6f22de644f9dfc7
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
1.5MB
MD5665db9794d6e6e7052e7c469f48de771
SHA1ed9a3f9262f675a03a9f1f70856e3532b095c89f
SHA256c1b31186d170a2a5755f15682860b3cdc60eac7f97a2db9462dee7ca6fcbc196
SHA51269585560e8ac4a2472621dd4da4bf0e636688fc5d710521b0177461f773fcf2a4c7ddb86bc812ecb316985729013212ccfa4992cd1c98f166a4a510e17fcae74
-
Filesize
5.6MB
MD5bae29e49e8190bfbbf0d77ffab8de59d
SHA14a6352bb47c7e1666a60c76f9b17ca4707872bd9
SHA256f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87
SHA5129e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2
-
Filesize
1.5MB
MD5b224196c88f09b615527b2df0e860e49
SHA1f9ae161836a34264458d8c0b2a083c98093f1dec
SHA2562a11969fcc1df03533ad694a68d56f0e3a67ce359663c3cf228040ab5baa5ed8
SHA512d74376c5bd3ba19b8454a17f2f38ab64ad1005b6372c7e162230c822c38f6f8c7d87aef47ef04cb6dceedc731046c30efa6720098cc39b15addd17c809b8296d
-
Filesize
260KB
MD5f39a0110a564f4a1c6b96c03982906ec
SHA108e66c93b575c9ac0a18f06741dabcabc88a358b
SHA256f794a557ad952ff155b4bfe5665b3f448453c3a50c766478d070368cab69f481
SHA512c6659f926f95a8bed1ff779c8445470c3089823abe8c1199f591c313ecee0bd793478cdaab95905c0e8ae2a2b18737daabe887263b7cde1eaaa9ee6976ff7d00
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
273B
MD5a5b509a3fb95cc3c8d89cd39fc2a30fb
SHA15aff4266a9c0f2af440f28aa865cebc5ddb9cd5c
SHA2565f3c80056c7b1104c15d6fee49dac07e665c6ffd0795ad486803641ed619c529
SHA5123cc58d989c461a04f29acbfe03ed05f970b3b3e97e6819962fc5c853f55bce7f7aba0544a712e3a45ee52ab31943c898f6b3684d755b590e3e961ae5ecd1edb9
-
Filesize
78B
MD52d245696c73134b0a9a2ac296ea7c170
SHA1f234419d7a09920a46ad291b98d7dca5a11f0da8
SHA256ed83e1f6850e48029654e9829cbf6e2cdff82f55f61d1449f822e448f75e8930
SHA512af0b981ef20aa94aff080fbd2030556fe47c4cc563885b162e604f72bc70c4a0eee4ee57ce4ea8964e6363a32ba34f8bee933db30d3d61392c42299621a4fc79