Analysis
-
max time kernel
89s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
23-10-2023 11:30
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20231020-en
General
-
Target
file.exe
-
Size
1.7MB
-
MD5
c1e80da312a1bd6a1f1aaa161018666c
-
SHA1
32e5f748d2e2cfae1be622e40f311915149416c7
-
SHA256
8c01f096725d70248403986433a2052358112499578c1e5ce68b1363709434bd
-
SHA512
3edf7efe24308d909f9709f281a5121c187d19823784feedc7f5d4ca9c42eb78c9f39ebf3c9c1d58956fd5881f2a230700bc11257f87d395032ab26a35a55552
-
SSDEEP
24576:cykJbJ36Orsbh8qXBxizQmEOUIx7qse9vvyDF4UMuohhDLFmEAfiVReF4EG9HfFs:Lkv36Ouh8qLiEldgYCx4L7YgaEH
Malware Config
Extracted
redline
homed
109.107.182.133:19084
Extracted
amadey
3.89
http://77.91.124.1/theme/index.php
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
kinder
109.107.182.133:19084
Extracted
redline
5141679758_99
https://pastebin.com/raw/8baCJyMF
Extracted
redline
YT&TEAM CLOUD
185.216.70.238:37515
Extracted
smokeloader
up3
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
89.23.100.93:4449
oonrejgwedvxwse
-
delay
1
-
install
true
-
install_file
calc.exe
-
install_folder
%AppData%
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
DcRat 7 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe 4000 schtasks.exe 1572 schtasks.exe 2868 schtasks.exe 5572 schtasks.exe 4768 schtasks.exe 4364 schtasks.exe -
Glupteba payload 5 IoCs
resource yara_rule behavioral2/memory/5784-1068-0x0000000002F40000-0x000000000382B000-memory.dmp family_glupteba behavioral2/memory/5784-1074-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/5784-1156-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/5784-1176-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/5784-1253-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 341F.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 341F.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 341F.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 341F.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 341F.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 7 IoCs
resource yara_rule behavioral2/memory/4956-48-0x0000000000400000-0x000000000043E000-memory.dmp family_redline behavioral2/memory/5540-770-0x00000000020C0000-0x000000000211A000-memory.dmp family_redline behavioral2/memory/1476-797-0x00000000006B0000-0x00000000006EE000-memory.dmp family_redline behavioral2/memory/5540-835-0x0000000000400000-0x000000000047E000-memory.dmp family_redline behavioral2/memory/6008-991-0x0000000000240000-0x000000000027E000-memory.dmp family_redline behavioral2/memory/4624-1065-0x00000000020C0000-0x000000000211A000-memory.dmp family_redline behavioral2/memory/4624-1064-0x0000000000400000-0x000000000047E000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 7 IoCs
description pid Process procid_target PID 2052 created 3256 2052 ACC6.exe 43 PID 2052 created 3256 2052 ACC6.exe 43 PID 2648 created 3256 2648 latestX.exe 43 PID 2052 created 3256 2052 ACC6.exe 43 PID 2648 created 3256 2648 latestX.exe 43 PID 2648 created 3256 2648 latestX.exe 43 PID 2648 created 3256 2648 latestX.exe 43 -
Async RAT payload 2 IoCs
resource yara_rule behavioral2/memory/1984-1128-0x00000000006A0000-0x00000000006B8000-memory.dmp asyncrat behavioral2/memory/2816-1207-0x00000000005A0000-0x00000000005B8000-memory.dmp asyncrat -
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\hosts latestX.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 5124 netsh.exe -
Stops running service(s) 3 TTPs
-
Checks computer location settings 2 TTPs 8 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation kos2.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation K.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation 88C0.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation 5IT0Kz2.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation explothe.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation 6Io5Sy6.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation toolspub2.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation 67E4.exe -
Executes dropped EXE 46 IoCs
pid Process 3600 PJ7bA32.exe 4052 aw7VQ41.exe 4720 DV7aS68.exe 1120 rc0NI19.exe 1496 1fd71ys1.exe 1460 2Go0820.exe 4976 3NB83xM.exe 3500 4dc387bG.exe 4808 5IT0Kz2.exe 3188 explothe.exe 1684 6Io5Sy6.exe 4360 2EDB.exe 3964 2F98.exe 2828 oA8aN0OZ.exe 2468 vr7Hn0Fs.exe 2088 aa7Qv2wR.exe 5612 32E5.exe 5584 IO8XZ7vA.exe 4592 1fi98vD9.exe 924 341F.exe 5712 35B6.exe 5540 3A3B.exe 1476 2aP062Zf.exe 5264 67E4.exe 5392 6A27.exe 2772 6B22.exe 2560 Conhost.exe 5956 6D36.exe 5784 31839b57a4f11171d6abc8bbc4451ee4.exe 5400 kos2.exe 6008 716D.exe 2648 latestX.exe 892 set16.exe 4624 776A.exe 1376 K.exe 5420 is-S17Q3.tmp 4932 MyBurn.exe 3780 MyBurn.exe 1984 88C0.exe 5336 toolspub2.exe 2052 ACC6.exe 1132 A15B.exe 2052 ACC6.exe 3476 explothe.exe 2816 calc.exe 6080 31839b57a4f11171d6abc8bbc4451ee4.exe -
Loads dropped DLL 11 IoCs
pid Process 5540 3A3B.exe 5540 3A3B.exe 5420 is-S17Q3.tmp 5420 is-S17Q3.tmp 5420 is-S17Q3.tmp 4624 776A.exe 4624 776A.exe 4496 rundll32.exe 3532 rundll32.exe 2816 calc.exe 2816 calc.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x0006000000022e0b-67.dat upx behavioral2/files/0x0006000000022e0b-69.dat upx behavioral2/memory/1684-68-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1684-96-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/files/0x0007000000022f65-700.dat upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 341F.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 11 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" aw7VQ41.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" DV7aS68.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2EDB.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" aa7Qv2wR.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" PJ7bA32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" rc0NI19.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" oA8aN0OZ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" vr7Hn0Fs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" IO8XZ7vA.exe Set value (str) \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\socks5 = "powershell.exe -windowstyle hidden -Command \"& 'C:\\Users\\Admin\\AppData\\Local\\Temp\\6B22.exe'\"" 6B22.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 1496 set thread context of 1804 1496 1fd71ys1.exe 94 PID 4976 set thread context of 3100 4976 3NB83xM.exe 98 PID 3500 set thread context of 4956 3500 4dc387bG.exe 101 PID 4592 set thread context of 5336 4592 1fi98vD9.exe 199 PID 2560 set thread context of 5336 2560 Conhost.exe 199 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 31839b57a4f11171d6abc8bbc4451ee4.exe -
Drops file in Program Files directory 12 IoCs
description ioc Process File created C:\Program Files (x86)\MyBurn\is-OD6QL.tmp is-S17Q3.tmp File created C:\Program Files (x86)\MyBurn\is-LVJ19.tmp is-S17Q3.tmp File created C:\Program Files (x86)\MyBurn\is-7DNQI.tmp is-S17Q3.tmp File created C:\Program Files (x86)\MyBurn\is-MFUIA.tmp is-S17Q3.tmp File created C:\Program Files (x86)\MyBurn\is-VMQRJ.tmp is-S17Q3.tmp File opened for modification C:\Program Files (x86)\MyBurn\unins000.dat is-S17Q3.tmp File created C:\Program Files (x86)\MyBurn\unins000.dat is-S17Q3.tmp File created C:\Program Files (x86)\MyBurn\is-DHPQU.tmp is-S17Q3.tmp File created C:\Program Files (x86)\MyBurn\Sounds\is-3CM79.tmp is-S17Q3.tmp File opened for modification C:\Program Files (x86)\MyBurn\MyBurn.exe is-S17Q3.tmp File created C:\Program Files (x86)\MyBurn\is-1H5L6.tmp is-S17Q3.tmp File created C:\Program Files (x86)\MyBurn\Sounds\is-L5I79.tmp is-S17Q3.tmp -
Launches sc.exe 6 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5252 sc.exe 5412 sc.exe 2248 sc.exe 2672 sc.exe 3268 sc.exe 2428 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 5012 5540 WerFault.exe 168 3876 5336 WerFault.exe 171 1356 4624 WerFault.exe 190 1572 2816 WerFault.exe 223 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe -
Creates scheduled task(s) 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1572 schtasks.exe 2868 schtasks.exe 5572 schtasks.exe 4768 schtasks.exe 4364 schtasks.exe 4000 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 5820 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2451 = "Saint Pierre Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-492 = "India Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-792 = "SA Western Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-602 = "Taipei Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1801 = "Line Islands Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-211 = "Pacific Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-601 = "Taipei Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1661 = "Bahia Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-331 = "E. Europe Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1721 = "Libya Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-651 = "AUS Central Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-152 = "Central America Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1472 = "Magadan Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2392 = "Aleutian Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-842 = "Argentina Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2492 = "Aus Central W. Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2791 = "Novosibirsk Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2371 = "Easter Island Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-262 = "GMT Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2871 = "Magallanes Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1912 = "Russia TZ 10 Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-382 = "South Africa Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2162 = "Altai Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2002 = "Cabo Verde Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-661 = "Cen. Australia Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-301 = "Romance Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-281 = "Central Europe Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2531 = "Chatham Islands Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-341 = "Egypt Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-671 = "AUS Eastern Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1931 = "Russia TZ 11 Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-931 = "Coordinated Universal Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2632 = "Norfolk Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2142 = "Transbaikal Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2571 = "Turks and Caicos Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-131 = "US Eastern Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-442 = "Arabian Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-681 = "E. Australia Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-272 = "Greenwich Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-371 = "Jerusalem Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2752 = "Tomsk Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2891 = "Sudan Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-112 = "Eastern Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-364 = "Middle East Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1862 = "Russia TZ 6 Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2452 = "Saint Pierre Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-561 = "SE Asia Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2751 = "Tomsk Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2532 = "Chatham Islands Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-342 = "Egypt Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-372 = "Jerusalem Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-3051 = "Qyzylorda Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2572 = "Turks and Caicos Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-11 = "Azores Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-682 = "E. Australia Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3100 AppLaunch.exe 3100 AppLaunch.exe 1804 AppLaunch.exe 1804 AppLaunch.exe 3256 Explorer.EXE 3256 Explorer.EXE 3256 Explorer.EXE 3256 Explorer.EXE 3256 Explorer.EXE 3256 Explorer.EXE 3256 Explorer.EXE 3256 Explorer.EXE 3256 Explorer.EXE 3256 Explorer.EXE 3256 Explorer.EXE 3256 Explorer.EXE 3256 Explorer.EXE 3256 Explorer.EXE 3256 Explorer.EXE 3256 Explorer.EXE 3256 Explorer.EXE 3256 Explorer.EXE 3256 Explorer.EXE 3256 Explorer.EXE 4156 msedge.exe 4156 msedge.exe 3256 Explorer.EXE 3256 Explorer.EXE 4052 msedge.exe 4052 msedge.exe 3256 Explorer.EXE 3256 Explorer.EXE 4188 msedge.exe 4188 msedge.exe 4284 msedge.exe 4284 msedge.exe 3256 Explorer.EXE 3256 Explorer.EXE 3256 Explorer.EXE 3256 Explorer.EXE 3256 Explorer.EXE 3256 Explorer.EXE 3256 Explorer.EXE 3256 Explorer.EXE 3256 Explorer.EXE 3256 Explorer.EXE 3256 Explorer.EXE 3256 Explorer.EXE 3256 Explorer.EXE 3256 Explorer.EXE 3256 Explorer.EXE 3256 Explorer.EXE 3256 Explorer.EXE 3256 Explorer.EXE 3256 Explorer.EXE 3256 Explorer.EXE 3256 Explorer.EXE 3256 Explorer.EXE 3256 Explorer.EXE 3256 Explorer.EXE 3256 Explorer.EXE 3256 Explorer.EXE 3256 Explorer.EXE 3256 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3256 Explorer.EXE -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 3100 AppLaunch.exe 5336 toolspub2.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1804 AppLaunch.exe Token: SeShutdownPrivilege 3256 Explorer.EXE Token: SeCreatePagefilePrivilege 3256 Explorer.EXE Token: SeShutdownPrivilege 3256 Explorer.EXE Token: SeCreatePagefilePrivilege 3256 Explorer.EXE Token: SeShutdownPrivilege 3256 Explorer.EXE Token: SeCreatePagefilePrivilege 3256 Explorer.EXE Token: SeShutdownPrivilege 3256 Explorer.EXE Token: SeCreatePagefilePrivilege 3256 Explorer.EXE Token: SeShutdownPrivilege 3256 Explorer.EXE Token: SeCreatePagefilePrivilege 3256 Explorer.EXE Token: SeShutdownPrivilege 3256 Explorer.EXE Token: SeCreatePagefilePrivilege 3256 Explorer.EXE Token: SeShutdownPrivilege 3256 Explorer.EXE Token: SeCreatePagefilePrivilege 3256 Explorer.EXE Token: SeShutdownPrivilege 3256 Explorer.EXE Token: SeCreatePagefilePrivilege 3256 Explorer.EXE Token: SeShutdownPrivilege 3256 Explorer.EXE Token: SeCreatePagefilePrivilege 3256 Explorer.EXE Token: 33 5884 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 5884 AUDIODG.EXE Token: SeShutdownPrivilege 3256 Explorer.EXE Token: SeCreatePagefilePrivilege 3256 Explorer.EXE Token: SeShutdownPrivilege 3256 Explorer.EXE Token: SeCreatePagefilePrivilege 3256 Explorer.EXE Token: SeShutdownPrivilege 3256 Explorer.EXE Token: SeCreatePagefilePrivilege 3256 Explorer.EXE Token: SeShutdownPrivilege 3256 Explorer.EXE Token: SeCreatePagefilePrivilege 3256 Explorer.EXE Token: SeShutdownPrivilege 3256 Explorer.EXE Token: SeCreatePagefilePrivilege 3256 Explorer.EXE Token: SeShutdownPrivilege 3256 Explorer.EXE Token: SeCreatePagefilePrivilege 3256 Explorer.EXE Token: SeShutdownPrivilege 3256 Explorer.EXE Token: SeCreatePagefilePrivilege 3256 Explorer.EXE Token: SeShutdownPrivilege 3256 Explorer.EXE Token: SeCreatePagefilePrivilege 3256 Explorer.EXE Token: SeShutdownPrivilege 3256 Explorer.EXE Token: SeCreatePagefilePrivilege 3256 Explorer.EXE Token: SeDebugPrivilege 924 341F.exe Token: SeShutdownPrivilege 3256 Explorer.EXE Token: SeCreatePagefilePrivilege 3256 Explorer.EXE Token: SeShutdownPrivilege 3256 Explorer.EXE Token: SeCreatePagefilePrivilege 3256 Explorer.EXE Token: SeShutdownPrivilege 3256 Explorer.EXE Token: SeCreatePagefilePrivilege 3256 Explorer.EXE Token: SeShutdownPrivilege 3256 Explorer.EXE Token: SeCreatePagefilePrivilege 3256 Explorer.EXE Token: SeShutdownPrivilege 3256 Explorer.EXE Token: SeCreatePagefilePrivilege 3256 Explorer.EXE Token: SeShutdownPrivilege 3256 Explorer.EXE Token: SeCreatePagefilePrivilege 3256 Explorer.EXE Token: SeShutdownPrivilege 3256 Explorer.EXE Token: SeCreatePagefilePrivilege 3256 Explorer.EXE Token: SeShutdownPrivilege 3256 Explorer.EXE Token: SeCreatePagefilePrivilege 3256 Explorer.EXE Token: SeShutdownPrivilege 3256 Explorer.EXE Token: SeCreatePagefilePrivilege 3256 Explorer.EXE Token: SeShutdownPrivilege 3256 Explorer.EXE Token: SeCreatePagefilePrivilege 3256 Explorer.EXE Token: SeDebugPrivilege 5392 6A27.exe Token: SeDebugPrivilege 1376 K.exe Token: SeShutdownPrivilege 3256 Explorer.EXE Token: SeCreatePagefilePrivilege 3256 Explorer.EXE -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2596 wrote to memory of 3600 2596 file.exe 86 PID 2596 wrote to memory of 3600 2596 file.exe 86 PID 2596 wrote to memory of 3600 2596 file.exe 86 PID 3600 wrote to memory of 4052 3600 PJ7bA32.exe 88 PID 3600 wrote to memory of 4052 3600 PJ7bA32.exe 88 PID 3600 wrote to memory of 4052 3600 PJ7bA32.exe 88 PID 4052 wrote to memory of 4720 4052 aw7VQ41.exe 90 PID 4052 wrote to memory of 4720 4052 aw7VQ41.exe 90 PID 4052 wrote to memory of 4720 4052 aw7VQ41.exe 90 PID 4720 wrote to memory of 1120 4720 DV7aS68.exe 91 PID 4720 wrote to memory of 1120 4720 DV7aS68.exe 91 PID 4720 wrote to memory of 1120 4720 DV7aS68.exe 91 PID 1120 wrote to memory of 1496 1120 rc0NI19.exe 92 PID 1120 wrote to memory of 1496 1120 rc0NI19.exe 92 PID 1120 wrote to memory of 1496 1120 rc0NI19.exe 92 PID 1496 wrote to memory of 1512 1496 1fd71ys1.exe 93 PID 1496 wrote to memory of 1512 1496 1fd71ys1.exe 93 PID 1496 wrote to memory of 1512 1496 1fd71ys1.exe 93 PID 1496 wrote to memory of 1804 1496 1fd71ys1.exe 94 PID 1496 wrote to memory of 1804 1496 1fd71ys1.exe 94 PID 1496 wrote to memory of 1804 1496 1fd71ys1.exe 94 PID 1496 wrote to memory of 1804 1496 1fd71ys1.exe 94 PID 1496 wrote to memory of 1804 1496 1fd71ys1.exe 94 PID 1496 wrote to memory of 1804 1496 1fd71ys1.exe 94 PID 1496 wrote to memory of 1804 1496 1fd71ys1.exe 94 PID 1496 wrote to memory of 1804 1496 1fd71ys1.exe 94 PID 1120 wrote to memory of 1460 1120 rc0NI19.exe 95 PID 1120 wrote to memory of 1460 1120 rc0NI19.exe 95 PID 1120 wrote to memory of 1460 1120 rc0NI19.exe 95 PID 4720 wrote to memory of 4976 4720 DV7aS68.exe 96 PID 4720 wrote to memory of 4976 4720 DV7aS68.exe 96 PID 4720 wrote to memory of 4976 4720 DV7aS68.exe 96 PID 4976 wrote to memory of 3100 4976 3NB83xM.exe 98 PID 4976 wrote to memory of 3100 4976 3NB83xM.exe 98 PID 4976 wrote to memory of 3100 4976 3NB83xM.exe 98 PID 4976 wrote to memory of 3100 4976 3NB83xM.exe 98 PID 4976 wrote to memory of 3100 4976 3NB83xM.exe 98 PID 4976 wrote to memory of 3100 4976 3NB83xM.exe 98 PID 4052 wrote to memory of 3500 4052 aw7VQ41.exe 99 PID 4052 wrote to memory of 3500 4052 aw7VQ41.exe 99 PID 4052 wrote to memory of 3500 4052 aw7VQ41.exe 99 PID 3500 wrote to memory of 4956 3500 4dc387bG.exe 101 PID 3500 wrote to memory of 4956 3500 4dc387bG.exe 101 PID 3500 wrote to memory of 4956 3500 4dc387bG.exe 101 PID 3500 wrote to memory of 4956 3500 4dc387bG.exe 101 PID 3500 wrote to memory of 4956 3500 4dc387bG.exe 101 PID 3500 wrote to memory of 4956 3500 4dc387bG.exe 101 PID 3500 wrote to memory of 4956 3500 4dc387bG.exe 101 PID 3500 wrote to memory of 4956 3500 4dc387bG.exe 101 PID 3600 wrote to memory of 4808 3600 PJ7bA32.exe 102 PID 3600 wrote to memory of 4808 3600 PJ7bA32.exe 102 PID 3600 wrote to memory of 4808 3600 PJ7bA32.exe 102 PID 4808 wrote to memory of 3188 4808 5IT0Kz2.exe 103 PID 4808 wrote to memory of 3188 4808 5IT0Kz2.exe 103 PID 4808 wrote to memory of 3188 4808 5IT0Kz2.exe 103 PID 2596 wrote to memory of 1684 2596 file.exe 104 PID 2596 wrote to memory of 1684 2596 file.exe 104 PID 2596 wrote to memory of 1684 2596 file.exe 104 PID 3188 wrote to memory of 4000 3188 explothe.exe 105 PID 3188 wrote to memory of 4000 3188 explothe.exe 105 PID 3188 wrote to memory of 4000 3188 explothe.exe 105 PID 1684 wrote to memory of 2492 1684 6Io5Sy6.exe 107 PID 1684 wrote to memory of 2492 1684 6Io5Sy6.exe 107 PID 3188 wrote to memory of 2124 3188 explothe.exe 108 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:3256 -
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- DcRat
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\PJ7bA32.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\PJ7bA32.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\aw7VQ41.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\aw7VQ41.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\DV7aS68.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\DV7aS68.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\rc0NI19.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\rc0NI19.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1fd71ys1.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1fd71ys1.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵PID:1512
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1804
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Go0820.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Go0820.exe7⤵
- Executes dropped EXE
PID:1460
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\3NB83xM.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\3NB83xM.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3100
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\4dc387bG.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\4dc387bG.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:4956
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\5IT0Kz2.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\5IT0Kz2.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F6⤵
- DcRat
- Creates scheduled task(s)
PID:4000
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵PID:2124
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:2496
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:N"7⤵PID:1676
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:R" /E7⤵PID:2068
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3488
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:1712
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:3396
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:4496
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\6Io5Sy6.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\6Io5Sy6.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\C2F2.tmp\C2F3.tmp\C2F4.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\6Io5Sy6.exe"4⤵PID:2492
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/login5⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4284 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x168,0x16c,0x170,0x144,0x174,0x7ffd6e5646f8,0x7ffd6e564708,0x7ffd6e5647186⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1944,4076930797314090429,3681194234370247443,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:86⤵PID:2884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,4076930797314090429,3681194234370247443,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:16⤵PID:3424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,4076930797314090429,3681194234370247443,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:16⤵PID:3600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1944,4076930797314090429,3681194234370247443,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2668 /prefetch:36⤵
- Suspicious behavior: EnumeratesProcesses
PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1944,4076930797314090429,3681194234370247443,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2556 /prefetch:26⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,4076930797314090429,3681194234370247443,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3796 /prefetch:16⤵PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,4076930797314090429,3681194234370247443,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4004 /prefetch:16⤵PID:1124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,4076930797314090429,3681194234370247443,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4816 /prefetch:16⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1944,4076930797314090429,3681194234370247443,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5444 /prefetch:86⤵PID:5728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1944,4076930797314090429,3681194234370247443,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5636 /prefetch:86⤵PID:5872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1944,4076930797314090429,3681194234370247443,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6236 /prefetch:86⤵PID:5800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1944,4076930797314090429,3681194234370247443,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6236 /prefetch:86⤵PID:5892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,4076930797314090429,3681194234370247443,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5688 /prefetch:16⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,4076930797314090429,3681194234370247443,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5712 /prefetch:16⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,4076930797314090429,3681194234370247443,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5912 /prefetch:16⤵PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,4076930797314090429,3681194234370247443,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5948 /prefetch:16⤵PID:5904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,4076930797314090429,3681194234370247443,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4816 /prefetch:16⤵PID:6120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,4076930797314090429,3681194234370247443,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5788 /prefetch:16⤵PID:6040
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/5⤵PID:568
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ffd6e5646f8,0x7ffd6e564708,0x7ffd6e5647186⤵PID:2808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,1585123961131571940,11997089552031244530,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:26⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,1585123961131571940,11997089552031244530,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:36⤵
- Suspicious behavior: EnumeratesProcesses
PID:4156
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/5⤵PID:3552
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x154,0x170,0x7ffd6e5646f8,0x7ffd6e564708,0x7ffd6e5647186⤵PID:2820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2208,16828629073229232525,4551324236507012786,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:36⤵
- Suspicious behavior: EnumeratesProcesses
PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,16828629073229232525,4551324236507012786,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2220 /prefetch:26⤵PID:1224
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2EDB.exeC:\Users\Admin\AppData\Local\Temp\2EDB.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4360 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\oA8aN0OZ.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\oA8aN0OZ.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vr7Hn0Fs.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vr7Hn0Fs.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\aa7Qv2wR.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\aa7Qv2wR.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\IO8XZ7vA.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\IO8XZ7vA.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5584 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1fi98vD9.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1fi98vD9.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4592 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵PID:5336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5336 -s 5409⤵
- Program crash
PID:3876
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2aP062Zf.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2aP062Zf.exe7⤵
- Executes dropped EXE
PID:1476
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2F98.exeC:\Users\Admin\AppData\Local\Temp\2F98.exe2⤵
- Executes dropped EXE
PID:3964
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\314E.bat" "2⤵PID:5400
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/login3⤵PID:5756
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd6e5646f8,0x7ffd6e564708,0x7ffd6e5647184⤵PID:5780
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/3⤵PID:5532
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd6e5646f8,0x7ffd6e564708,0x7ffd6e5647184⤵PID:5520
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\32E5.exeC:\Users\Admin\AppData\Local\Temp\32E5.exe2⤵
- Executes dropped EXE
PID:5612
-
-
C:\Users\Admin\AppData\Local\Temp\341F.exeC:\Users\Admin\AppData\Local\Temp\341F.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious use of AdjustPrivilegeToken
PID:924
-
-
C:\Users\Admin\AppData\Local\Temp\35B6.exeC:\Users\Admin\AppData\Local\Temp\35B6.exe2⤵
- Executes dropped EXE
PID:5712
-
-
C:\Users\Admin\AppData\Local\Temp\3A3B.exeC:\Users\Admin\AppData\Local\Temp\3A3B.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5540 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5540 -s 7923⤵
- Program crash
PID:5012
-
-
-
C:\Users\Admin\AppData\Local\Temp\67E4.exeC:\Users\Admin\AppData\Local\Temp\67E4.exe2⤵
- Checks computer location settings
- Executes dropped EXE
PID:5264 -
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"3⤵
- Checks computer location settings
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:5336
-
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"3⤵
- Executes dropped EXE
PID:5784 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:5552
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"4⤵
- Executes dropped EXE
- Checks for VirtualBox DLLs, possible anti-VM trick
- Modifies data under HKEY_USERS
PID:6080 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:876
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:5664
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:5124
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:1944
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:1424
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe5⤵PID:5724
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:5180
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- DcRat
- Creates scheduled task(s)
PID:5572
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:228
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f6⤵PID:5892
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:1176
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll6⤵PID:4256
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- DcRat
- Creates scheduled task(s)
PID:4364
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"6⤵PID:4868
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵PID:2820
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)8⤵
- Launches sc.exe
PID:2428
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\kos2.exe"C:\Users\Admin\AppData\Local\Temp\kos2.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
PID:5400 -
C:\Users\Admin\AppData\Local\Temp\set16.exe"C:\Users\Admin\AppData\Local\Temp\set16.exe"4⤵
- Executes dropped EXE
PID:892 -
C:\Users\Admin\AppData\Local\Temp\is-HNKTV.tmp\is-S17Q3.tmp"C:\Users\Admin\AppData\Local\Temp\is-HNKTV.tmp\is-S17Q3.tmp" /SL4 $30242 "C:\Users\Admin\AppData\Local\Temp\set16.exe" 1281875 522245⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
PID:5420 -
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 206⤵PID:404
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 207⤵PID:2176
-
-
-
C:\Program Files (x86)\MyBurn\MyBurn.exe"C:\Program Files (x86)\MyBurn\MyBurn.exe" -i6⤵
- Executes dropped EXE
PID:4932
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Query6⤵PID:4692
-
-
C:\Program Files (x86)\MyBurn\MyBurn.exe"C:\Program Files (x86)\MyBurn\MyBurn.exe" -s6⤵
- Executes dropped EXE
PID:3780
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\K.exe"C:\Users\Admin\AppData\Local\Temp\K.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1376
-
-
-
C:\Users\Admin\AppData\Local\Temp\latestX.exe"C:\Users\Admin\AppData\Local\Temp\latestX.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
PID:2648
-
-
-
C:\Users\Admin\AppData\Local\Temp\6A27.exeC:\Users\Admin\AppData\Local\Temp\6A27.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5392
-
-
C:\Users\Admin\AppData\Local\Temp\6B22.exeC:\Users\Admin\AppData\Local\Temp\6B22.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2772
-
-
C:\Users\Admin\AppData\Local\Temp\6D36.exeC:\Users\Admin\AppData\Local\Temp\6D36.exe2⤵
- Executes dropped EXE
PID:5956
-
-
C:\Users\Admin\AppData\Local\Temp\716D.exeC:\Users\Admin\AppData\Local\Temp\716D.exe2⤵
- Executes dropped EXE
PID:6008
-
-
C:\Users\Admin\AppData\Local\Temp\776A.exeC:\Users\Admin\AppData\Local\Temp\776A.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4624 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4624 -s 7923⤵
- Program crash
PID:1356
-
-
-
C:\Users\Admin\AppData\Local\Temp\88C0.exeC:\Users\Admin\AppData\Local\Temp\88C0.exe2⤵
- Checks computer location settings
- Executes dropped EXE
PID:1984 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpB60C.tmp.bat""3⤵PID:4168
-
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
PID:5820
-
-
C:\Users\Admin\AppData\Roaming\calc.exe"C:\Users\Admin\AppData\Roaming\calc.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2816 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2816 -s 8085⤵
- Program crash
PID:1572
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "calc" /tr '"C:\Users\Admin\AppData\Roaming\calc.exe"' & exit3⤵PID:5408
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "calc" /tr '"C:\Users\Admin\AppData\Roaming\calc.exe"'4⤵
- DcRat
- Creates scheduled task(s)
PID:1572
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\A002.exeC:\Users\Admin\AppData\Local\Temp\A002.exe2⤵PID:2052
-
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe bacbeefdbc.sys,#13⤵PID:3044
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe bacbeefdbc.sys,#14⤵
- Loads dropped DLL
PID:3532
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\A15B.exeC:\Users\Admin\AppData\Local\Temp\A15B.exe2⤵
- Executes dropped EXE
PID:1132
-
-
C:\Users\Admin\AppData\Local\Temp\ACC6.exeC:\Users\Admin\AppData\Local\Temp\ACC6.exe2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
PID:2052
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /delete /f /tn "GoogleUpdateTaskMachineQC"2⤵PID:2820
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /create /f /tn "GoogleUpdateTaskMachineQC" /xml "C:\Users\Admin\AppData\Local\Temp\xhoymdsniflw.xml"2⤵
- DcRat
- Creates scheduled task(s)
PID:2868
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵PID:1860
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:5708
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:5260
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:5252
-
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:5412
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:2248
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:2672
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:3268
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵PID:4872
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:4968
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:3740
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:5280
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:5320
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:5328
-
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:4472
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /create /f /tn "GoogleUpdateTaskMachineQC" /xml "C:\Users\Admin\AppData\Local\Temp\xhoymdsniflw.xml"2⤵
- DcRat
- Creates scheduled task(s)
PID:4768 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2560
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3376
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2288
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4f4 0x4f01⤵
- Suspicious use of AdjustPrivilegeToken
PID:5884
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 5540 -ip 55401⤵PID:5172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 5336 -ip 53361⤵PID:1416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4624 -ip 46241⤵PID:6056
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:3476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2816 -ip 28161⤵PID:6084
-
C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exeC:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe1⤵PID:5176
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵PID:1356
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵PID:1588
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD55b8b2c531bb2b74591c3389d097f9d90
SHA14f09a062c327ad7563eb63a52f48e80676d5cb11
SHA256f91db28794f172d31ac6638936f7126f2ea934ff20dde7bed1f5203d6c45bfd7
SHA51258e3934ee98e49c9f9bd9f9410cd6827a39c4362ced894dca6502334136cf7afbf2850178340b45ff5001aa11925b3dc5ae3a3b195d966a773c5db90888e56bc
-
Filesize
152B
MD56dded92ec95cf9f22410bdeac841a00d
SHA183c32c23d53c59d654868f0b2a5c6be0a46249c2
SHA2561840d5c60c79874359414677662439087173c575d814c07ebe661ae1cebb639e
SHA512e13df653c0364be2b61619fe3d46799e10a565b41f33d3ce15e50397f8f9aa328e8c821212efe10cfe3b8283c1e8c7e9eb15f9674fc456837d6ee8c38bc8b0d8
-
Filesize
152B
MD56dded92ec95cf9f22410bdeac841a00d
SHA183c32c23d53c59d654868f0b2a5c6be0a46249c2
SHA2561840d5c60c79874359414677662439087173c575d814c07ebe661ae1cebb639e
SHA512e13df653c0364be2b61619fe3d46799e10a565b41f33d3ce15e50397f8f9aa328e8c821212efe10cfe3b8283c1e8c7e9eb15f9674fc456837d6ee8c38bc8b0d8
-
Filesize
152B
MD56dded92ec95cf9f22410bdeac841a00d
SHA183c32c23d53c59d654868f0b2a5c6be0a46249c2
SHA2561840d5c60c79874359414677662439087173c575d814c07ebe661ae1cebb639e
SHA512e13df653c0364be2b61619fe3d46799e10a565b41f33d3ce15e50397f8f9aa328e8c821212efe10cfe3b8283c1e8c7e9eb15f9674fc456837d6ee8c38bc8b0d8
-
Filesize
152B
MD56dded92ec95cf9f22410bdeac841a00d
SHA183c32c23d53c59d654868f0b2a5c6be0a46249c2
SHA2561840d5c60c79874359414677662439087173c575d814c07ebe661ae1cebb639e
SHA512e13df653c0364be2b61619fe3d46799e10a565b41f33d3ce15e50397f8f9aa328e8c821212efe10cfe3b8283c1e8c7e9eb15f9674fc456837d6ee8c38bc8b0d8
-
Filesize
152B
MD56f9bc20747520b37b3f22c169195824e
SHA1de0472972d51b2d9419ff0d714706bef0c6f81d8
SHA256a176ef484b676f39eaefe30f33df548ef0e4e3b34c4651ac3fb4351404d288b0
SHA512179e5be96746cfbcc9483de68527d96464f3ce6cb09dc4b5e546a93c5e1dad36ab842a4cdfa336169af4ca459bdc42a2cac72e577699a455ffb7efd9c1c80f11
-
Filesize
152B
MD56f9bc20747520b37b3f22c169195824e
SHA1de0472972d51b2d9419ff0d714706bef0c6f81d8
SHA256a176ef484b676f39eaefe30f33df548ef0e4e3b34c4651ac3fb4351404d288b0
SHA512179e5be96746cfbcc9483de68527d96464f3ce6cb09dc4b5e546a93c5e1dad36ab842a4cdfa336169af4ca459bdc42a2cac72e577699a455ffb7efd9c1c80f11
-
Filesize
152B
MD56dded92ec95cf9f22410bdeac841a00d
SHA183c32c23d53c59d654868f0b2a5c6be0a46249c2
SHA2561840d5c60c79874359414677662439087173c575d814c07ebe661ae1cebb639e
SHA512e13df653c0364be2b61619fe3d46799e10a565b41f33d3ce15e50397f8f9aa328e8c821212efe10cfe3b8283c1e8c7e9eb15f9674fc456837d6ee8c38bc8b0d8
-
Filesize
152B
MD56dded92ec95cf9f22410bdeac841a00d
SHA183c32c23d53c59d654868f0b2a5c6be0a46249c2
SHA2561840d5c60c79874359414677662439087173c575d814c07ebe661ae1cebb639e
SHA512e13df653c0364be2b61619fe3d46799e10a565b41f33d3ce15e50397f8f9aa328e8c821212efe10cfe3b8283c1e8c7e9eb15f9674fc456837d6ee8c38bc8b0d8
-
Filesize
152B
MD56dded92ec95cf9f22410bdeac841a00d
SHA183c32c23d53c59d654868f0b2a5c6be0a46249c2
SHA2561840d5c60c79874359414677662439087173c575d814c07ebe661ae1cebb639e
SHA512e13df653c0364be2b61619fe3d46799e10a565b41f33d3ce15e50397f8f9aa328e8c821212efe10cfe3b8283c1e8c7e9eb15f9674fc456837d6ee8c38bc8b0d8
-
Filesize
152B
MD56dded92ec95cf9f22410bdeac841a00d
SHA183c32c23d53c59d654868f0b2a5c6be0a46249c2
SHA2561840d5c60c79874359414677662439087173c575d814c07ebe661ae1cebb639e
SHA512e13df653c0364be2b61619fe3d46799e10a565b41f33d3ce15e50397f8f9aa328e8c821212efe10cfe3b8283c1e8c7e9eb15f9674fc456837d6ee8c38bc8b0d8
-
Filesize
47KB
MD5bdd151e061c193942be00002c4a44953
SHA1c005d3bf0e1aafdd1a2c95f606b413d83e2ae415
SHA256435f7f68b204283384477add4b89b2f6d3e29631db33753e71f6810611cb41c9
SHA5123de82142302d64c91b89912f03e7cd53645d5c5622482aa1970252a11bec9c3820245f3c00ce031482f1cbc159ef0d6f6f9dc690bdb4c43547aed3bab575d983
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD50183170daed55604660b8737ed90abef
SHA1029e698e5ca167202b8250b03c5df3a1a990b587
SHA25667e74be97db4e552dc346826b56b0e663fe839e6cb4d7b0b76b97e836041e80b
SHA51288840b945dc7081e1cfb29f5801058fbf43ece647875e29d19aaaf1c50935d5c725ee8a9d6958ca101ed1ff71b772ec63ebd8f9dfc15e9ab2e122de33fa5e202
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD579e4bdc55a17f205ffd8d01fada0923d
SHA18bd08deaee4fd44e231e6b34305a46293c7ba109
SHA256bd21a9057cb52a1500a954b4f09c83517453ac6dd442ed0d4f76b1b7e84cc45c
SHA51297eb3effb62dc6254eafa525d2249156a192c107d3c8f67675b72c44f2c0cf00f0fdaef3969d0c54a9109fa11c47956f6bd886b1dccc136dbbdfda5c39e35458
-
Filesize
7KB
MD56210c1b47a3334fa69e44dc93400ee94
SHA1597c03c8eb41cc884f5d8a0dacae59415da23091
SHA25622f47c842faa55e6b9116cf6bdf910b932adfaf02484db762c4afea273be1a9f
SHA51210de44ad5ef0096645cfc35428c855c31d1ba33514211e23a09578df3fd93b3b3e7bb62b372539edcaf87dc47c8ab39fc42442c39471367b64516615868ed5fe
-
Filesize
7KB
MD566e62a2a1c01fa5e3ac88dc07442a6d4
SHA18e492b1c4290e41d889ced308e5e295ae2145b61
SHA25608974771383580ad596f12ceae485ef4de1d2e67aa5428305997954dd845f678
SHA5124a3b047289dd14ac309a4a6eaa4d82e972022f17370a4f3a69e88433bfafb6258733dec1c364b6e80c0626768f02a5ac3dfa42943b83f7fdc1065670860f78aa
-
Filesize
5KB
MD5a5b431e53e050c88a92f15511658023d
SHA1d697a61aeeb548d161c4e1a8f1d8f7b9eecd181a
SHA2560e4080590f7328b529fc97d1a577a70a75b9a3b3a9b3c1de0f80b77bebc0aaa7
SHA51244e1dcd0cce7c8e270d5c16b5823048e7b70c5471c2095c9c148f339f3f0cbac1f97a838d7de050e46ad8e52252cca09371aa62a12694b9ffbdf03b911425d75
-
Filesize
24KB
MD5e05436aebb117e9919978ca32bbcefd9
SHA197b2af055317952ce42308ea69b82301320eb962
SHA256cc9bd0953e70356e31a957ad9a9b1926f5e2a9f6a297cdef303ac693a2a86b7f
SHA51211328e9514ffaa3c1eab84fae06595d75c8503bd5601adfd806182d46065752885a871b738439b356d1bb2c1ac71fc81e9d46bd2d0daa1b2ba0f40543bf952b9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\67673177-473f-42e1-99b9-cac7d7757d4b\index-dir\the-real-index
Filesize624B
MD5330dc777c6e6c1f1c44b622ab6cfa325
SHA1ccb8499ace0f7123bfb9cb40549640bdf24378ee
SHA256c75e59db7810df2b2daf40ca625270b35402fdf5284188603a956420b842e42c
SHA512b886684e0b4ff56144ce344ed9dcae91a31a02c2ca87eb21ae0efe691066ba9f320a4c2229ea866fb1645b1cf7f6558ac248cfa058da74ead17d86a76ea124bc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\67673177-473f-42e1-99b9-cac7d7757d4b\index-dir\the-real-index~RFe584dcd.TMP
Filesize48B
MD5ad4d83374a51b6635e09da3b855fc2b0
SHA1c9e681e5e48dc4e081138849a1f2fcfa40754804
SHA2563c5ffd89728fce677494f64f22fa42a03dc6a7039f8b668bab515a30098c5744
SHA512d8a485fd05dd2792e428e02d27efdc33bcfbdb2a32590d37df6fca11601122a0a48aba9f8b6b21f5f9a6a8ce363f07024b6681072ffe234c8821a87c60af0781
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\b0049744-8a86-46b1-be28-63872492e1de\index-dir\the-real-index
Filesize2KB
MD5562a00b72c56d1704977d36b6e2643b3
SHA11bfbe4af7a3bc5004dd421117d433815724ee29b
SHA2564d715bc313d6390c63ca741894bdd31ce0291b7ce0863efb242fd4e4efa7a773
SHA5126f234001ec8499f97753b7208302e5840c9641f4a79bd4e6d5c47b692d47e298acefaf84dd7a44fbc9daca641adcec144fb3c553664a88a52bc22da44c6d3472
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\b0049744-8a86-46b1-be28-63872492e1de\index-dir\the-real-index~RFe584d11.TMP
Filesize48B
MD5a1e5ad067e0eb9371e42897644218511
SHA1bb657ca5b3f6d7cf3888eaf4bee7187be11da7ac
SHA2569232068cbd87f94d7131c31b1ac716951190acfe9abd0d13dcc27833433e528a
SHA512667efc699335bdc9489444145066579f9889fc5d92c0b2a4dc6c4e70958afcc6ca4dcc92ff2f4df118df07eb2ec2458663856ef7dce82c50873ffc9dc0d8451e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\b6af3cdd-95fc-420e-92ab-e367f7f0e8b5\index
Filesize24B
MD554cb446f628b2ea4a5bce5769910512e
SHA1c27ca848427fe87f5cf4d0e0e3cd57151b0d820d
SHA256fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d
SHA5128f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize89B
MD5d1414f9b8aa6aa58b6d6e737ff1503ce
SHA1e5a8f7a07009a7a3a2f5b7c6362c3e5466354e02
SHA2564e1697eaf75c699690233e18e16ce7ca965fd7a56d4e12511152d35671aadce7
SHA51240e253f3264ef0d825c27746f170afa51df71deee84d5014e69fbc8f8c7a77711304bf251d4568a0a123a79d9f7f424daac60609de6f670bbbac575e82a366ab
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize146B
MD5818c2c5e94a32fe79640394d173d19de
SHA11406903dbf852c12826d95c17c77afeb954200ef
SHA25631727fb3d26ca7492b93dae9ee705122e4aa547af9b112b33ed819aeb7a44b4d
SHA512aa6b29ff6bdca97fdb8f79cdfdb4ce56ee378d4e6c98e48b0f274a9a7b2a803acaf410c3e368e7cb6c9b5b9e0f09c7ed2ec222b56a7395162adecc5ce18da466
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize155B
MD5a8976ff99374033df9f737ae9a00147f
SHA1a12360285db48af5059c72ca3a42b688004b1992
SHA256bc5d17f620a177e352b3efe71f17bc2968b4cf7ffa3c393f3ea23ef130f69311
SHA5129ea61073451dd12f5d8f72fed63cc4a787dfb6f8bae29cf9b79a0ba106100f7d3068e86f1f49c09ca928a73092b74a35c27b34febdd7e350db2bb0ebcb78ee77
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize212B
MD50de12a1f914a8e9f4ef581eede61b85f
SHA1f0124d39a97f25bae4686e72191bf085b027e1e2
SHA256c14b11e972fd0be0d554ee9bba32a44b73d0d2d944274831389e0d5c84ac6123
SHA512aa36d1a82c2cba959e4fe3b074fca059bd10c997bef40f3f9bd1f33360ec6e28f40d3e6a97bda922066e4bcbbbbc3a1871a3f7d32757bf7d1c2142c450962448
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize150B
MD5a4a1d4bfb594bad81679bad430926c69
SHA1cb759874cd05f1cdcada2038d4e2052d334960bd
SHA25664ff248e792b70c49daa38589d3e89203ded156798da22265440e5c31b077295
SHA512f3bd13fbba03e4f2ec04a8df03897d1549fc07a2600aa4c3b9448638e5812e9fd2efa9f521500cd5eda282d5f2923f8ff54e6da76b5aca789bb3ca449c44846d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize82B
MD5b72682dc18d073c06e2dbca3026366b3
SHA13f7a1a45841457cca8993922cf83643e61e0c1a7
SHA25698bfdcf55f4a37b3ff235f8219baf9f2287f4532ea1d6d828358881d37a45622
SHA512425beff834c6e0a14038e89cd3b4ca1584390d03f85c64cf7a121fc38822fdf586ec792c50f5bc4e049371acbbecb421ed03cf35af4822ca1ce6017e1a664679
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize153B
MD5e52c4f4a75e29cf1f1a3eaed9b253ce2
SHA1b7968d19c4a2437729a3f2d8cdd63a9be7e3e6e0
SHA256a4cec8af786521f0e58d341ec75ce3f594010541cf246d97c0876413e6e43ce1
SHA512d189050339f3c9024e8e11e411bc97ac967936f620fb7183a487729a8c6c844915208c4f7467100e3ef9dfff39019266aee785ae026510e3133f8f94f0c8c88a
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize96B
MD52f65d35bb768bdae521b2f5f264eb57e
SHA1eea4d60a12d2ee03586f10e43a906b5c47cd7841
SHA2567e68788c1897966fa28cf75a1e3ec7ccf22149df0cd2d669ed98e61949201913
SHA512a2f5e7d64efc80cdff285cb02a03d265e7d6e479bcc3fa22ac1803332e91a9b409dcf13373a0813532ef4a62f13511f2818d1924274001f2b47e909d02ac858d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe583302.TMP
Filesize48B
MD5cd4f07a340f1114615b7afd300a4a0d9
SHA1ba3a58f6aa3a3873f0e1193709277e59c2269d65
SHA2564a746abc4399d8a2dfd57e2d6921e5bf7bfec2eab9416d28108609c7f19fbbf9
SHA51270b21b61b0b964e2e20062cd7afdd3b03f0ee85928468167d3c9a2dce0ac9b834c6bff61d39a94ccc303aa917c78797c6ca4f2fc3a791e75c7da8a5351dc3b0f
-
Filesize
1KB
MD51de3f221282bf2d94c3a310b66c48bb4
SHA164d72b2f14b96ce63832533ee327923305c51407
SHA256a7dc30dd0a133545843b4017f90580ace36a23db1bd17c8e33ce20b9d111b0b8
SHA512cbaf257a711af7742159b05485a9b3741d076d1b6a10c7ef21c13e360e0e9ff22e2552b23acdd22af5a99509873ad64b275a20b02b05bba1dce89f0ce955becc
-
Filesize
1KB
MD599af60053b9106693cd043951a746906
SHA10d0c7ba2d395ebb89c322706b7d27ad62d5c6d74
SHA25634bd2ff190ff5b37dbc2dfdd6e69d33fbab2b49b2884fa4973d15bde2c2e2941
SHA512b9a0a126f0ca2500612423e644a7a32e1338dfc4f769f46c20e743cd963ebbd6ad71d421f3b8059b850f44bb6b40d1a905164219446ba05b8bb46cdebf0aa847
-
Filesize
1KB
MD599e1ea1f38f84abcbfbe242e16d7adc2
SHA1e6505dcb1ff51575fc2579dc4be5273e9ce7d59d
SHA256245d4f46e0c2036eff51103b061fa88596ef7ad7e176a30bb71e1bd0a35380c1
SHA512315a7280203ebec708ddc956530718a8220221b108486348adea61116edd316c6b73c2c3f82368bfd80ec63016dbea5ed80696bf86686ed64ee51e32f6aea7e2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
2KB
MD55b8b2c531bb2b74591c3389d097f9d90
SHA14f09a062c327ad7563eb63a52f48e80676d5cb11
SHA256f91db28794f172d31ac6638936f7126f2ea934ff20dde7bed1f5203d6c45bfd7
SHA51258e3934ee98e49c9f9bd9f9410cd6827a39c4362ced894dca6502334136cf7afbf2850178340b45ff5001aa11925b3dc5ae3a3b195d966a773c5db90888e56bc
-
Filesize
2KB
MD5593691ae32bffff9fa85ceb66d9d93fd
SHA178c094b260220762780ba5eba59ebdef07efe954
SHA2568560cd9f348fd2847b5cde53ed2f575e1bae07565d28bfe90bcb63eabad6a6ba
SHA512f1841d153a4053902ebe63eded56956a9bd66f34c1cf7347cc03bc52a11fc3cb543bc09c531b3e7e36595f0da5b267190f983270e18b00681ef347776c18c1ba
-
Filesize
10KB
MD5e14286bf64280b672c319c282ec2b2f3
SHA1c2f82d08306573121d17f9a15b685408160832a9
SHA256eebf231bc9b7dfcfd5f31b2f50484bdb704b9d101581142a99b14937f76f4765
SHA512d79484b9c5833e93a2b87bfa81fbd563bea0becbe25352184705156f63bde913fd4603f5fcbfe2b061cfb10ba635c3bc6f129318ea9bb193e091fd9db1d78628
-
Filesize
10KB
MD51d53f9c0e06625b0f70648d7ef95e850
SHA18325d6775f75be1a75b17d5b2884e15193c8e764
SHA25646314fd4f54fbd34497b0e3e132b1907edb4ca8eda3702fda935d54bc977c804
SHA512c3b2ea77c858992ac831b56968219785e0ce233a4b6a1bb6bef07fee076b6f56ce615eda4ddb9bff54ed6e09be02003cc4ef896f6c3a999ede3a5c28326cb764
-
Filesize
2KB
MD55b8b2c531bb2b74591c3389d097f9d90
SHA14f09a062c327ad7563eb63a52f48e80676d5cb11
SHA256f91db28794f172d31ac6638936f7126f2ea934ff20dde7bed1f5203d6c45bfd7
SHA51258e3934ee98e49c9f9bd9f9410cd6827a39c4362ced894dca6502334136cf7afbf2850178340b45ff5001aa11925b3dc5ae3a3b195d966a773c5db90888e56bc
-
Filesize
2KB
MD5593691ae32bffff9fa85ceb66d9d93fd
SHA178c094b260220762780ba5eba59ebdef07efe954
SHA2568560cd9f348fd2847b5cde53ed2f575e1bae07565d28bfe90bcb63eabad6a6ba
SHA512f1841d153a4053902ebe63eded56956a9bd66f34c1cf7347cc03bc52a11fc3cb543bc09c531b3e7e36595f0da5b267190f983270e18b00681ef347776c18c1ba
-
Filesize
2KB
MD5593691ae32bffff9fa85ceb66d9d93fd
SHA178c094b260220762780ba5eba59ebdef07efe954
SHA2568560cd9f348fd2847b5cde53ed2f575e1bae07565d28bfe90bcb63eabad6a6ba
SHA512f1841d153a4053902ebe63eded56956a9bd66f34c1cf7347cc03bc52a11fc3cb543bc09c531b3e7e36595f0da5b267190f983270e18b00681ef347776c18c1ba
-
Filesize
1.7MB
MD5c55f65ecd180a4b8364e0716d3d04b26
SHA10be257a43e52742871c1f2cc9a5a1a34b220942f
SHA2563668c80ceac0f4763bd0f8da29eaaf2f684059e3c0e478e8302ca80794857c9d
SHA5123ae6f2aa4241287e585a7b7f62fd4a0c121c1ce0aaa64322e1d377813b9fc87801fc844ead722db7946692a82e9460536dac63047fba709fae181bad4f430b14
-
Filesize
1.7MB
MD5c55f65ecd180a4b8364e0716d3d04b26
SHA10be257a43e52742871c1f2cc9a5a1a34b220942f
SHA2563668c80ceac0f4763bd0f8da29eaaf2f684059e3c0e478e8302ca80794857c9d
SHA5123ae6f2aa4241287e585a7b7f62fd4a0c121c1ce0aaa64322e1d377813b9fc87801fc844ead722db7946692a82e9460536dac63047fba709fae181bad4f430b14
-
Filesize
180KB
MD50635bc911c5748d71a4aed170173481e
SHA16d92ff8b519e4a10759f75f3b3d9e1459ed4ff1b
SHA256a0330d75df7075206cf68d358e3acfc621062f35db43c2521b8ef5e7c9f317f1
SHA51250ea5d41497884b8aee43d6d7940186d6095055c4cd301ffa88407caf9935853dcfd852e81ab4671da21505ba284b0bae71a59fa50dd55dfa4c3ea7d0251651a
-
Filesize
180KB
MD50635bc911c5748d71a4aed170173481e
SHA16d92ff8b519e4a10759f75f3b3d9e1459ed4ff1b
SHA256a0330d75df7075206cf68d358e3acfc621062f35db43c2521b8ef5e7c9f317f1
SHA51250ea5d41497884b8aee43d6d7940186d6095055c4cd301ffa88407caf9935853dcfd852e81ab4671da21505ba284b0bae71a59fa50dd55dfa4c3ea7d0251651a
-
Filesize
180KB
MD50635bc911c5748d71a4aed170173481e
SHA16d92ff8b519e4a10759f75f3b3d9e1459ed4ff1b
SHA256a0330d75df7075206cf68d358e3acfc621062f35db43c2521b8ef5e7c9f317f1
SHA51250ea5d41497884b8aee43d6d7940186d6095055c4cd301ffa88407caf9935853dcfd852e81ab4671da21505ba284b0bae71a59fa50dd55dfa4c3ea7d0251651a
-
Filesize
4.2MB
MD5ea6cb5dbc7d10b59c3e1e386b2dbbab5
SHA1578a5b046c316ccb2ce6f4571a1a6f531f41f89c
SHA256443d03b8d3a782b2020740dc49c5cc97eb98ca4543b94427a0886df3f2a71132
SHA512590355ea716bac8372d0fac1e878819f2e67d279e32ef787ff11cbe8a870e04d1a77233e7f9f29d303ff11a90096ebae6c5a41f1ab94abb82c0710357fc23200
-
Filesize
124B
MD5dec89e5682445d71376896eac0d62d8b
SHA1c5ae3197d3c2faf3dea137719c804ab215022ea6
SHA256c3dea90ca98985007f0de66bf0197fdcd2d4a35e365135bf37a18a4895d81668
SHA512b746b79120d2ff8a9f3327b0bed99c70339155ea831c1eb9f412056fc8de36a0e3005378ba9102bd25ce6cc24fe1171f1a9c8453f33a9bcd6dd59e9ad0f8e186
-
Filesize
45KB
MD57e65536a8734d994381b94df542c681d
SHA16c8df2dfe8c6d04f0d1f15ce06c2d6bfbd8366ad
SHA256364f53238942781491cfb97ed08d72fa766d91db5c6b6dd58cb34e4f147f6452
SHA512a1c4d9dc3f79a7d3b6f160bbd40a089a45c8d4d039c8043231216e78a9d32c8ba7e6577e6eeba066440b2b042363df03f7c7d296090918ad4e0884938fae968e
-
Filesize
45KB
MD57e65536a8734d994381b94df542c681d
SHA16c8df2dfe8c6d04f0d1f15ce06c2d6bfbd8366ad
SHA256364f53238942781491cfb97ed08d72fa766d91db5c6b6dd58cb34e4f147f6452
SHA512a1c4d9dc3f79a7d3b6f160bbd40a089a45c8d4d039c8043231216e78a9d32c8ba7e6577e6eeba066440b2b042363df03f7c7d296090918ad4e0884938fae968e
-
Filesize
45KB
MD52fb691edc564c8421b8ba34376716341
SHA12fbf6780459214768935418714e268d09e3a1f4f
SHA2562641638f51a2ae3946f9ba5567138fd5336913ce1e27ee91dd826dde2c1baa01
SHA512b303462eb3eb27fa91b05c493a76bd9dcc6e03184b2755f1936a18f283937c1ac75a9d38ef0b3c65b628b570fae5d9692f6dfab640988482f5a2eb14c6239065
-
Filesize
1.6MB
MD540eb9ea6fc3236eba7a19cad7e24cab5
SHA12ea4d70ebad06980f711d58c934ccb85cd0a30e7
SHA2561b8a306830eac504d4e37d891cc22317fd0ab2b84706357fc07cd31739538f00
SHA5124f6491c92464e38539c3d40387cc73a30a2436b5e2b37a725797a173d31d2a483e9b3735af25dcb04f01e7c668b3e13bf7e0732595851019a3ca4b1f357eadef
-
Filesize
1.6MB
MD540eb9ea6fc3236eba7a19cad7e24cab5
SHA12ea4d70ebad06980f711d58c934ccb85cd0a30e7
SHA2561b8a306830eac504d4e37d891cc22317fd0ab2b84706357fc07cd31739538f00
SHA5124f6491c92464e38539c3d40387cc73a30a2436b5e2b37a725797a173d31d2a483e9b3735af25dcb04f01e7c668b3e13bf7e0732595851019a3ca4b1f357eadef
-
Filesize
1.6MB
MD5e315578479a85184f193014cdab99968
SHA1b88e4f0818866197dd31e563e9afc513b43efd96
SHA2569c780b78cf1c68191b59a8c4188637d970d51a5381177778414d35fc72d02dee
SHA512fe0945ce2e0f322af96840f97f05abf8922a5e94725c9c8c9763a4941548c57a7f34a32e960e6ceaa67e13ca3d747cd2f14d3c365b0dd23ab540c287ab0e4446
-
Filesize
1.6MB
MD5e315578479a85184f193014cdab99968
SHA1b88e4f0818866197dd31e563e9afc513b43efd96
SHA2569c780b78cf1c68191b59a8c4188637d970d51a5381177778414d35fc72d02dee
SHA512fe0945ce2e0f322af96840f97f05abf8922a5e94725c9c8c9763a4941548c57a7f34a32e960e6ceaa67e13ca3d747cd2f14d3c365b0dd23ab540c287ab0e4446
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
1.4MB
MD5a029584ec52010c23c5018a5d36d86e6
SHA1058733134b70d8d556535a297d393946e1dcabc2
SHA2562781ebebaf6b6da8cd0be7550152f15ae66824911acce6c499912ac240d86f3d
SHA512af4b4f31047f7664038cdc7c15f7d91ff0562e92ed1017683506ed2868324b9c49476049c85f9cb4c586c9b589fd992f433deca9e5bef9a140213e904215d73d
-
Filesize
1.4MB
MD5a029584ec52010c23c5018a5d36d86e6
SHA1058733134b70d8d556535a297d393946e1dcabc2
SHA2562781ebebaf6b6da8cd0be7550152f15ae66824911acce6c499912ac240d86f3d
SHA512af4b4f31047f7664038cdc7c15f7d91ff0562e92ed1017683506ed2868324b9c49476049c85f9cb4c586c9b589fd992f433deca9e5bef9a140213e904215d73d
-
Filesize
1.4MB
MD5a7b72161c18c2bb3474aa5290a77c23b
SHA1f0c267adacbb9e9b9ee344c0ad3c23a69449f03a
SHA2566aed704bbe586363924e8ffe3b70231947a4fb6a53b088bd03d29cc5e384da42
SHA512e4f3d959ffc07b38763c189a95e2a58976220252b82ee5fed2f79d113cd0cc324e89feb0370a62da37026e92d2f3b5bd74e4fbf63985f8d35dc4de294ead9e09
-
Filesize
1.4MB
MD5a7b72161c18c2bb3474aa5290a77c23b
SHA1f0c267adacbb9e9b9ee344c0ad3c23a69449f03a
SHA2566aed704bbe586363924e8ffe3b70231947a4fb6a53b088bd03d29cc5e384da42
SHA512e4f3d959ffc07b38763c189a95e2a58976220252b82ee5fed2f79d113cd0cc324e89feb0370a62da37026e92d2f3b5bd74e4fbf63985f8d35dc4de294ead9e09
-
Filesize
1.9MB
MD554d27aec8c5f05fcabdbad2c97ffd625
SHA16e8215c173d7f4079fbcc13bf645e6e8e907718c
SHA256428b5e514b65da390b7e7093da93eb8207c83a9e70778d116ad92a9b968e7769
SHA5124b3ea8256021557e5ac3822b62ddb6a4d34373a6dcf14a9e10cb93b4ad8441268a71ca65a3955386b4bb6228b01cd55c2ef8472cde05b740018274120e31094b
-
Filesize
1.9MB
MD554d27aec8c5f05fcabdbad2c97ffd625
SHA16e8215c173d7f4079fbcc13bf645e6e8e907718c
SHA256428b5e514b65da390b7e7093da93eb8207c83a9e70778d116ad92a9b968e7769
SHA5124b3ea8256021557e5ac3822b62ddb6a4d34373a6dcf14a9e10cb93b4ad8441268a71ca65a3955386b4bb6228b01cd55c2ef8472cde05b740018274120e31094b
-
Filesize
1.9MB
MD554d27aec8c5f05fcabdbad2c97ffd625
SHA16e8215c173d7f4079fbcc13bf645e6e8e907718c
SHA256428b5e514b65da390b7e7093da93eb8207c83a9e70778d116ad92a9b968e7769
SHA5124b3ea8256021557e5ac3822b62ddb6a4d34373a6dcf14a9e10cb93b4ad8441268a71ca65a3955386b4bb6228b01cd55c2ef8472cde05b740018274120e31094b
-
Filesize
935KB
MD52d08a83c6d431c37fb253b1f56f2dc16
SHA1b13715e9672c3636a254c6eb5f97a19d4322d557
SHA25607e21b763006b3d54c2877cc735a2fe459ddd145917e8a0e16b19bb67811b59b
SHA512400591304083d3d1600530212610ed14a53c4e8eca58603eec6f089852592e45e453e0ef5fea939f01281e952b10ac25992b5189b1a32094261e807f8e6ced90
-
Filesize
935KB
MD52d08a83c6d431c37fb253b1f56f2dc16
SHA1b13715e9672c3636a254c6eb5f97a19d4322d557
SHA25607e21b763006b3d54c2877cc735a2fe459ddd145917e8a0e16b19bb67811b59b
SHA512400591304083d3d1600530212610ed14a53c4e8eca58603eec6f089852592e45e453e0ef5fea939f01281e952b10ac25992b5189b1a32094261e807f8e6ced90
-
Filesize
872KB
MD56f0981758097c18bf9496ff619571994
SHA1c4619799e51a57f0fc20866565f494066ed283f0
SHA256e168fdac4b0a3020fd908f06c78dcbf8cac1cd5fc70798dfa845ae345636fabf
SHA512d6bbd9cc82f6977403be1543c33fcbe506d1e6fa9647a94cf7a412d6fe1b381cb03736787b00ea102d02ffee057baaf1ec5c31cbc04221183f2cf09f2867904c
-
Filesize
872KB
MD56f0981758097c18bf9496ff619571994
SHA1c4619799e51a57f0fc20866565f494066ed283f0
SHA256e168fdac4b0a3020fd908f06c78dcbf8cac1cd5fc70798dfa845ae345636fabf
SHA512d6bbd9cc82f6977403be1543c33fcbe506d1e6fa9647a94cf7a412d6fe1b381cb03736787b00ea102d02ffee057baaf1ec5c31cbc04221183f2cf09f2867904c
-
Filesize
1.6MB
MD5dc169c429fc214291f3fccd46e0a0f4a
SHA156eca1bfc9237e0264623858c36d82cdd8b5ce07
SHA2569d8edf4ead299677eeca1c331442aa314784ff659b8125cdc88d993f7c577aed
SHA5126ba89e6a8758a4e71cbd03ce10967c266c64f77df5c2ee76322c0492c5dcc3dc25a22c4fb95a3feccdfd440f4a6107e9ddc6e418f3fc07b22123392775893c31
-
Filesize
1.6MB
MD5dc169c429fc214291f3fccd46e0a0f4a
SHA156eca1bfc9237e0264623858c36d82cdd8b5ce07
SHA2569d8edf4ead299677eeca1c331442aa314784ff659b8125cdc88d993f7c577aed
SHA5126ba89e6a8758a4e71cbd03ce10967c266c64f77df5c2ee76322c0492c5dcc3dc25a22c4fb95a3feccdfd440f4a6107e9ddc6e418f3fc07b22123392775893c31
-
Filesize
458KB
MD59aefabb3891dbd67c09415ba0eb04a5d
SHA10f382c6072a628b9587c8300eb91016dcff82e76
SHA25688ea323910ebefecb33f7eafbb76ef72e6f47b88030e5df3b63ca4bce860a08e
SHA5128b22120049cda3c7e279eb67dcccfbe50cd03e96aa7660ce4cb69b247f9234385a9c0bcf0f78fd2cf20eab7364fe374e11edb7223a989bb5744db65c276883e9
-
Filesize
458KB
MD59aefabb3891dbd67c09415ba0eb04a5d
SHA10f382c6072a628b9587c8300eb91016dcff82e76
SHA25688ea323910ebefecb33f7eafbb76ef72e6f47b88030e5df3b63ca4bce860a08e
SHA5128b22120049cda3c7e279eb67dcccfbe50cd03e96aa7660ce4cb69b247f9234385a9c0bcf0f78fd2cf20eab7364fe374e11edb7223a989bb5744db65c276883e9
-
Filesize
875KB
MD573d86751a127f28504b4239773c328be
SHA1a7b5a37edc0841e9a269b827bb0bf28ae0d8c330
SHA256e0923f519bbf0f9c43922d26954359eed1c352db6deda6e655f838a44d655030
SHA512464df937ab7ed3a7af81f18d5238019b4268a78dfd8b9d0df6a459c5fd19dfa480c441ce2f20f8b63dcba806e6fc646beaa6b778b52fedee7077739634bad3e0
-
Filesize
875KB
MD573d86751a127f28504b4239773c328be
SHA1a7b5a37edc0841e9a269b827bb0bf28ae0d8c330
SHA256e0923f519bbf0f9c43922d26954359eed1c352db6deda6e655f838a44d655030
SHA512464df937ab7ed3a7af81f18d5238019b4268a78dfd8b9d0df6a459c5fd19dfa480c441ce2f20f8b63dcba806e6fc646beaa6b778b52fedee7077739634bad3e0
-
Filesize
180KB
MD50635bc911c5748d71a4aed170173481e
SHA16d92ff8b519e4a10759f75f3b3d9e1459ed4ff1b
SHA256a0330d75df7075206cf68d358e3acfc621062f35db43c2521b8ef5e7c9f317f1
SHA51250ea5d41497884b8aee43d6d7940186d6095055c4cd301ffa88407caf9935853dcfd852e81ab4671da21505ba284b0bae71a59fa50dd55dfa4c3ea7d0251651a
-
Filesize
180KB
MD50635bc911c5748d71a4aed170173481e
SHA16d92ff8b519e4a10759f75f3b3d9e1459ed4ff1b
SHA256a0330d75df7075206cf68d358e3acfc621062f35db43c2521b8ef5e7c9f317f1
SHA51250ea5d41497884b8aee43d6d7940186d6095055c4cd301ffa88407caf9935853dcfd852e81ab4671da21505ba284b0bae71a59fa50dd55dfa4c3ea7d0251651a
-
Filesize
8KB
MD5ac65407254780025e8a71da7b925c4f3
SHA15c7ae625586c1c00ec9d35caa4f71b020425a6ba
SHA25626cd9cc9a0dd688411a4f0e2fa099b694b88cab6e9ed10827a175f7b5486e42e
SHA51227d87730230d9f594908f904bf298a28e255dced8d515eb0d97e1701078c4405f9f428513c2574d349a7517bd23a3558fb09599a01499ea54590945b981b17ab
-
Filesize
116B
MD5ec6aae2bb7d8781226ea61adca8f0586
SHA1d82b3bad240f263c1b887c7c0cc4c2ff0e86dfe3
SHA256b02fffaba9e664ff7840c82b102d6851ec0bb148cec462cef40999545309e599
SHA512aa62a8cd02a03e4f462f76ae6ff2e43849052ce77cca3a2ccf593f6669425830d0910afac3cf2c46dd385454a6fb3b4bd604ae13b9586087d6f22de644f9dfc7
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
1.5MB
MD5665db9794d6e6e7052e7c469f48de771
SHA1ed9a3f9262f675a03a9f1f70856e3532b095c89f
SHA256c1b31186d170a2a5755f15682860b3cdc60eac7f97a2db9462dee7ca6fcbc196
SHA51269585560e8ac4a2472621dd4da4bf0e636688fc5d710521b0177461f773fcf2a4c7ddb86bc812ecb316985729013212ccfa4992cd1c98f166a4a510e17fcae74
-
Filesize
5.6MB
MD5bae29e49e8190bfbbf0d77ffab8de59d
SHA14a6352bb47c7e1666a60c76f9b17ca4707872bd9
SHA256f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87
SHA5129e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2
-
Filesize
1.5MB
MD5b224196c88f09b615527b2df0e860e49
SHA1f9ae161836a34264458d8c0b2a083c98093f1dec
SHA2562a11969fcc1df03533ad694a68d56f0e3a67ce359663c3cf228040ab5baa5ed8
SHA512d74376c5bd3ba19b8454a17f2f38ab64ad1005b6372c7e162230c822c38f6f8c7d87aef47ef04cb6dceedc731046c30efa6720098cc39b15addd17c809b8296d
-
Filesize
260KB
MD5f39a0110a564f4a1c6b96c03982906ec
SHA108e66c93b575c9ac0a18f06741dabcabc88a358b
SHA256f794a557ad952ff155b4bfe5665b3f448453c3a50c766478d070368cab69f481
SHA512c6659f926f95a8bed1ff779c8445470c3089823abe8c1199f591c313ecee0bd793478cdaab95905c0e8ae2a2b18737daabe887263b7cde1eaaa9ee6976ff7d00
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
273B
MD5a5b509a3fb95cc3c8d89cd39fc2a30fb
SHA15aff4266a9c0f2af440f28aa865cebc5ddb9cd5c
SHA2565f3c80056c7b1104c15d6fee49dac07e665c6ffd0795ad486803641ed619c529
SHA5123cc58d989c461a04f29acbfe03ed05f970b3b3e97e6819962fc5c853f55bce7f7aba0544a712e3a45ee52ab31943c898f6b3684d755b590e3e961ae5ecd1edb9