Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
23/10/2023, 16:25
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231020-en
General
-
Target
file.exe
-
Size
1.5MB
-
MD5
ce40fcc1f95b0c6d4f7a21c08d49a17c
-
SHA1
703099eee297196e642eba4781f9542ba8fbfed8
-
SHA256
3dddb80ed9de80b4d7c31ecd952500294af3f235a6a0c52a5adfcb35a07a8a7a
-
SHA512
968632c5d9f97024d2ae63bd9794d351ad1d5a43ba5da392c01e6c7a7a035a2e4e9d1ceb084baf108b2bb39bd1d2d410fd0dbcc5ed5c26afe3bc847b3042c9be
-
SSDEEP
49152:ncNhZC2U+qtQFaQmk+YP4RHugqtrW+P2Zf:AC2URaas+YP4RHdqtrv2Z
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
http://yvzgz.cyou/index.php
https://yvzgz.cyou/index.php
Extracted
redline
grome
77.91.124.86:19084
Extracted
amadey
3.89
http://77.91.124.1/theme/index.php
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
Extracted
redline
kinza
77.91.124.86:19084
Extracted
redline
YT&TEAM CLOUD
185.216.70.238:37515
Extracted
smokeloader
up3
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
89.23.100.93:4449
oonrejgwedvxwse
-
delay
1
-
install
true
-
install_file
calc.exe
-
install_folder
%AppData%
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
DcRat 7 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe 3312 schtasks.exe 4264 schtasks.exe 5456 schtasks.exe 4760 schtasks.exe 5780 schtasks.exe 488 schtasks.exe -
Glupteba payload 6 IoCs
resource yara_rule behavioral2/memory/5132-1008-0x0000000002DC0000-0x00000000036AB000-memory.dmp family_glupteba behavioral2/memory/5132-1014-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/5132-1094-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/5132-1168-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/5132-1213-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/2344-1278-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 752.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 752.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 752.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 752.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 752.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 8 IoCs
resource yara_rule behavioral2/memory/4108-51-0x0000000000400000-0x000000000043E000-memory.dmp family_redline behavioral2/memory/5756-772-0x0000000000670000-0x00000000006AE000-memory.dmp family_redline behavioral2/memory/5364-777-0x00000000020A0000-0x00000000020FA000-memory.dmp family_redline behavioral2/memory/5364-822-0x0000000000400000-0x000000000047E000-memory.dmp family_redline behavioral2/memory/5296-940-0x0000000000320000-0x000000000035E000-memory.dmp family_redline behavioral2/memory/5404-982-0x00000000005D0000-0x000000000062A000-memory.dmp family_redline behavioral2/memory/4880-1069-0x00000000006D0000-0x000000000072A000-memory.dmp family_redline behavioral2/memory/5404-1071-0x0000000000400000-0x000000000047E000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 9 IoCs
description pid Process procid_target PID 6140 created 3344 6140 7B74.exe 25 PID 6140 created 3344 6140 7B74.exe 25 PID 6140 created 3344 6140 7B74.exe 25 PID 6052 created 3344 6052 latestX.exe 25 PID 6052 created 3344 6052 latestX.exe 25 PID 6052 created 3344 6052 latestX.exe 25 PID 6052 created 3344 6052 latestX.exe 25 PID 6052 created 3344 6052 latestX.exe 25 PID 3936 created 3344 3936 updater.exe 25 -
Async RAT payload 3 IoCs
resource yara_rule behavioral2/memory/4716-1012-0x00000000005A0000-0x00000000005B8000-memory.dmp asyncrat behavioral2/memory/4716-1018-0x0000000000400000-0x000000000043F000-memory.dmp asyncrat behavioral2/memory/1916-1161-0x0000000000480000-0x0000000000498000-memory.dmp asyncrat -
Blocklisted process makes network request 38 IoCs
flow pid Process 191 3052 rundll32.exe 192 3052 rundll32.exe 193 3052 rundll32.exe 195 3052 rundll32.exe 196 3052 rundll32.exe 197 3052 rundll32.exe 198 3052 rundll32.exe 199 3052 rundll32.exe 200 3052 rundll32.exe 201 3052 rundll32.exe 202 3052 rundll32.exe 203 3052 rundll32.exe 204 3052 rundll32.exe 205 3052 rundll32.exe 206 3052 rundll32.exe 208 3052 rundll32.exe 209 3052 rundll32.exe 210 3052 rundll32.exe 211 3052 rundll32.exe 212 3052 rundll32.exe 213 3052 rundll32.exe 214 3052 rundll32.exe 215 3052 rundll32.exe 216 3052 rundll32.exe 217 3052 rundll32.exe 218 3052 rundll32.exe 219 3052 rundll32.exe 220 3052 rundll32.exe 221 3052 rundll32.exe 222 3052 rundll32.exe 225 3052 rundll32.exe 226 3052 rundll32.exe 227 3052 rundll32.exe 228 3052 rundll32.exe 229 3052 rundll32.exe 230 3052 rundll32.exe 231 3052 rundll32.exe 232 3052 rundll32.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\hosts latestX.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 6004 netsh.exe -
Stops running service(s) 3 TTPs
-
Checks computer location settings 2 TTPs 7 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-984744499-3605095035-265325720-1000\Control Panel\International\Geo\Nation explothe.exe Key value queried \REGISTRY\USER\S-1-5-21-984744499-3605095035-265325720-1000\Control Panel\International\Geo\Nation 6Fw0zU1.exe Key value queried \REGISTRY\USER\S-1-5-21-984744499-3605095035-265325720-1000\Control Panel\International\Geo\Nation 4CCA.exe Key value queried \REGISTRY\USER\S-1-5-21-984744499-3605095035-265325720-1000\Control Panel\International\Geo\Nation kos2.exe Key value queried \REGISTRY\USER\S-1-5-21-984744499-3605095035-265325720-1000\Control Panel\International\Geo\Nation K.exe Key value queried \REGISTRY\USER\S-1-5-21-984744499-3605095035-265325720-1000\Control Panel\International\Geo\Nation 6057.exe Key value queried \REGISTRY\USER\S-1-5-21-984744499-3605095035-265325720-1000\Control Panel\International\Geo\Nation 5qE0fa6.exe -
Executes dropped EXE 52 IoCs
pid Process 3452 MN8Pv64.exe 2204 BX2ON51.exe 3580 YA0cB39.exe 4572 cj7aK37.exe 1584 1AE97zh4.exe 1676 2hF6730.exe 2856 3SO24vn.exe 2200 4gY147xN.exe 2252 5qE0fa6.exe 848 explothe.exe 2940 6Fw0zU1.exe 2780 FD1D.exe 1896 QJ3Lq4VF.exe 548 FE37.exe 972 sW4NY2sS.exe 3536 WP0Yp8Lx.exe 2276 NQ0Ug7uK.exe 1988 1vx90Vk3.exe 1996 55D.exe 3764 752.exe 5160 9D4.exe 5364 ED6.exe 5756 2Tt607sL.exe 6012 4CCA.exe 436 4FAA.exe 4120 51DD.exe 5168 toolspub2.exe 5132 31839b57a4f11171d6abc8bbc4451ee4.exe 5296 5317.exe 6112 kos2.exe 6052 latestX.exe 5404 cmd.exe 5436 set16.exe 3300 K.exe 3584 is-159JU.tmp 4716 6057.exe 228 toolspub2.exe 5152 67AB.exe 6088 MyBurn.exe 4880 6B56.exe 428 MyBurn.exe 6140 7B74.exe 3388 7F1E.exe 5460 explothe.exe 1916 calc.exe 3936 updater.exe 2344 31839b57a4f11171d6abc8bbc4451ee4.exe 2088 csrss.exe 6040 injector.exe 3104 explothe.exe 484 windefender.exe 4636 windefender.exe -
Loads dropped DLL 9 IoCs
pid Process 5364 ED6.exe 5364 ED6.exe 5404 cmd.exe 5404 cmd.exe 3584 is-159JU.tmp 3584 is-159JU.tmp 3584 is-159JU.tmp 3052 rundll32.exe 5312 rundll32.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x0008000000022df2-72.dat upx behavioral2/files/0x0008000000022df2-71.dat upx behavioral2/memory/2940-73-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2940-87-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/files/0x0006000000022f1f-602.dat upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 752.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 13 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" MN8Pv64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" BX2ON51.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" YA0cB39.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" FD1D.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" QJ3Lq4VF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" cj7aK37.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" WP0Yp8Lx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP005.TMP\\\"" NQ0Ug7uK.exe Set value (str) \REGISTRY\USER\S-1-5-21-984744499-3605095035-265325720-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" sW4NY2sS.exe Set value (str) \REGISTRY\USER\S-1-5-21-984744499-3605095035-265325720-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-984744499-3605095035-265325720-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\socks5 = "powershell.exe -windowstyle hidden -Command \"& 'C:\\Users\\Admin\\AppData\\Local\\Temp\\4FAA.exe'\"" 4FAA.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1584 set thread context of 328 1584 1AE97zh4.exe 84 PID 2200 set thread context of 4108 2200 4gY147xN.exe 89 PID 1988 set thread context of 5708 1988 1vx90Vk3.exe 157 PID 5168 set thread context of 228 5168 toolspub2.exe 182 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 31839b57a4f11171d6abc8bbc4451ee4.exe -
Drops file in Program Files directory 13 IoCs
description ioc Process File created C:\Program Files (x86)\MyBurn\is-CNHI1.tmp is-159JU.tmp File created C:\Program Files (x86)\MyBurn\is-IMGDT.tmp is-159JU.tmp File created C:\Program Files (x86)\MyBurn\is-RR8HD.tmp is-159JU.tmp File created C:\Program Files (x86)\MyBurn\Sounds\is-J30AL.tmp is-159JU.tmp File created C:\Program Files (x86)\MyBurn\is-TJ47E.tmp is-159JU.tmp File created C:\Program Files (x86)\MyBurn\is-DGJRG.tmp is-159JU.tmp File opened for modification C:\Program Files (x86)\MyBurn\unins000.dat is-159JU.tmp File opened for modification C:\Program Files (x86)\MyBurn\MyBurn.exe is-159JU.tmp File created C:\Program Files (x86)\MyBurn\is-609GE.tmp is-159JU.tmp File created C:\Program Files (x86)\MyBurn\unins000.dat is-159JU.tmp File created C:\Program Files (x86)\MyBurn\is-SGDIH.tmp is-159JU.tmp File created C:\Program Files (x86)\MyBurn\Sounds\is-5H585.tmp is-159JU.tmp File created C:\Program Files\Google\Chrome\updater.exe latestX.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\rss 31839b57a4f11171d6abc8bbc4451ee4.exe File created C:\Windows\rss\csrss.exe 31839b57a4f11171d6abc8bbc4451ee4.exe -
Launches sc.exe 6 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5196 sc.exe 4336 sc.exe 4976 sc.exe 2472 sc.exe 1952 sc.exe 2020 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 6068 5708 WerFault.exe 157 2848 5364 WerFault.exe 155 5848 5404 WerFault.exe 175 -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7F1E.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7F1E.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7F1E.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3SO24vn.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3SO24vn.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3SO24vn.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe -
Creates scheduled task(s) 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3312 schtasks.exe 4264 schtasks.exe 5456 schtasks.exe 4760 schtasks.exe 5780 schtasks.exe 488 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 5648 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-3142 = "South Sudan Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-11 = "Azores Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-361 = "GTB Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-161 = "Central Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-912 = "Mauritius Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-291 = "Central European Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2321 = "Sakhalin Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-732 = "Fiji Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2341 = "Haiti Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-622 = "Korea Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-151 = "Central America Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-571 = "China Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-681 = "E. Australia Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2612 = "Bougainville Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-662 = "Cen. Australia Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2432 = "Cuba Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-252 = "Dateline Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-362 = "GTB Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2591 = "Tocantins Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-162 = "Central Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2372 = "Easter Island Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-741 = "New Zealand Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2342 = "Haiti Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-441 = "Arabian Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-32 = "Mid-Atlantic Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-242 = "Samoa Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2181 = "Astrakhan Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2791 = "Novosibirsk Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-12 = "Azores Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-105 = "Central Brazilian Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-412 = "E. Africa Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1722 = "Libya Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-591 = "Malay Peninsula Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-385 = "Namibia Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2856 3SO24vn.exe 2856 3SO24vn.exe 328 AppLaunch.exe 328 AppLaunch.exe 3344 Explorer.EXE 3344 Explorer.EXE 3344 Explorer.EXE 3344 Explorer.EXE 3344 Explorer.EXE 3344 Explorer.EXE 3344 Explorer.EXE 3344 Explorer.EXE 3344 Explorer.EXE 3344 Explorer.EXE 3344 Explorer.EXE 3344 Explorer.EXE 3344 Explorer.EXE 3344 Explorer.EXE 3344 Explorer.EXE 3344 Explorer.EXE 3344 Explorer.EXE 3344 Explorer.EXE 3344 Explorer.EXE 3344 Explorer.EXE 3344 Explorer.EXE 3344 Explorer.EXE 3344 Explorer.EXE 3344 Explorer.EXE 3344 Explorer.EXE 3344 Explorer.EXE 3344 Explorer.EXE 3344 Explorer.EXE 3344 Explorer.EXE 3344 Explorer.EXE 3344 Explorer.EXE 3344 Explorer.EXE 3344 Explorer.EXE 3344 Explorer.EXE 3344 Explorer.EXE 3344 Explorer.EXE 3344 Explorer.EXE 3344 Explorer.EXE 3344 Explorer.EXE 3344 Explorer.EXE 3344 Explorer.EXE 3344 Explorer.EXE 3344 Explorer.EXE 3344 Explorer.EXE 3344 Explorer.EXE 3344 Explorer.EXE 3344 Explorer.EXE 3344 Explorer.EXE 3344 Explorer.EXE 3344 Explorer.EXE 3344 Explorer.EXE 3344 Explorer.EXE 3344 Explorer.EXE 3344 Explorer.EXE 3344 Explorer.EXE 3344 Explorer.EXE 3344 Explorer.EXE 3344 Explorer.EXE 3344 Explorer.EXE 3344 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3344 Explorer.EXE -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 2856 3SO24vn.exe 228 toolspub2.exe 3388 7F1E.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 328 AppLaunch.exe Token: SeShutdownPrivilege 3344 Explorer.EXE Token: SeCreatePagefilePrivilege 3344 Explorer.EXE Token: SeShutdownPrivilege 3344 Explorer.EXE Token: SeCreatePagefilePrivilege 3344 Explorer.EXE Token: SeShutdownPrivilege 3344 Explorer.EXE Token: SeCreatePagefilePrivilege 3344 Explorer.EXE Token: SeShutdownPrivilege 3344 Explorer.EXE Token: SeCreatePagefilePrivilege 3344 Explorer.EXE Token: SeShutdownPrivilege 3344 Explorer.EXE Token: SeCreatePagefilePrivilege 3344 Explorer.EXE Token: SeShutdownPrivilege 3344 Explorer.EXE Token: SeCreatePagefilePrivilege 3344 Explorer.EXE Token: SeShutdownPrivilege 3344 Explorer.EXE Token: SeCreatePagefilePrivilege 3344 Explorer.EXE Token: SeShutdownPrivilege 3344 Explorer.EXE Token: SeCreatePagefilePrivilege 3344 Explorer.EXE Token: SeShutdownPrivilege 3344 Explorer.EXE Token: SeCreatePagefilePrivilege 3344 Explorer.EXE Token: SeShutdownPrivilege 3344 Explorer.EXE Token: SeCreatePagefilePrivilege 3344 Explorer.EXE Token: 33 2196 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2196 AUDIODG.EXE Token: SeShutdownPrivilege 3344 Explorer.EXE Token: SeCreatePagefilePrivilege 3344 Explorer.EXE Token: SeShutdownPrivilege 3344 Explorer.EXE Token: SeCreatePagefilePrivilege 3344 Explorer.EXE Token: SeShutdownPrivilege 3344 Explorer.EXE Token: SeCreatePagefilePrivilege 3344 Explorer.EXE Token: SeShutdownPrivilege 3344 Explorer.EXE Token: SeCreatePagefilePrivilege 3344 Explorer.EXE Token: SeShutdownPrivilege 3344 Explorer.EXE Token: SeCreatePagefilePrivilege 3344 Explorer.EXE Token: SeShutdownPrivilege 3344 Explorer.EXE Token: SeCreatePagefilePrivilege 3344 Explorer.EXE Token: SeShutdownPrivilege 3344 Explorer.EXE Token: SeCreatePagefilePrivilege 3344 Explorer.EXE Token: SeShutdownPrivilege 3344 Explorer.EXE Token: SeCreatePagefilePrivilege 3344 Explorer.EXE Token: SeShutdownPrivilege 3344 Explorer.EXE Token: SeCreatePagefilePrivilege 3344 Explorer.EXE Token: SeDebugPrivilege 3764 752.exe Token: SeShutdownPrivilege 3344 Explorer.EXE Token: SeCreatePagefilePrivilege 3344 Explorer.EXE Token: SeShutdownPrivilege 3344 Explorer.EXE Token: SeCreatePagefilePrivilege 3344 Explorer.EXE Token: SeShutdownPrivilege 3344 Explorer.EXE Token: SeCreatePagefilePrivilege 3344 Explorer.EXE Token: SeShutdownPrivilege 3344 Explorer.EXE Token: SeCreatePagefilePrivilege 3344 Explorer.EXE Token: SeShutdownPrivilege 3344 Explorer.EXE Token: SeCreatePagefilePrivilege 3344 Explorer.EXE Token: SeShutdownPrivilege 3344 Explorer.EXE Token: SeCreatePagefilePrivilege 3344 Explorer.EXE Token: SeShutdownPrivilege 3344 Explorer.EXE Token: SeCreatePagefilePrivilege 3344 Explorer.EXE Token: SeShutdownPrivilege 3344 Explorer.EXE Token: SeCreatePagefilePrivilege 3344 Explorer.EXE Token: SeShutdownPrivilege 3344 Explorer.EXE Token: SeCreatePagefilePrivilege 3344 Explorer.EXE Token: SeShutdownPrivilege 3344 Explorer.EXE Token: SeCreatePagefilePrivilege 3344 Explorer.EXE Token: SeShutdownPrivilege 3344 Explorer.EXE Token: SeCreatePagefilePrivilege 3344 Explorer.EXE -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1916 calc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4892 wrote to memory of 3452 4892 file.exe 79 PID 4892 wrote to memory of 3452 4892 file.exe 79 PID 4892 wrote to memory of 3452 4892 file.exe 79 PID 3452 wrote to memory of 2204 3452 MN8Pv64.exe 80 PID 3452 wrote to memory of 2204 3452 MN8Pv64.exe 80 PID 3452 wrote to memory of 2204 3452 MN8Pv64.exe 80 PID 2204 wrote to memory of 3580 2204 BX2ON51.exe 81 PID 2204 wrote to memory of 3580 2204 BX2ON51.exe 81 PID 2204 wrote to memory of 3580 2204 BX2ON51.exe 81 PID 3580 wrote to memory of 4572 3580 YA0cB39.exe 82 PID 3580 wrote to memory of 4572 3580 YA0cB39.exe 82 PID 3580 wrote to memory of 4572 3580 YA0cB39.exe 82 PID 4572 wrote to memory of 1584 4572 cj7aK37.exe 83 PID 4572 wrote to memory of 1584 4572 cj7aK37.exe 83 PID 4572 wrote to memory of 1584 4572 cj7aK37.exe 83 PID 1584 wrote to memory of 328 1584 1AE97zh4.exe 84 PID 1584 wrote to memory of 328 1584 1AE97zh4.exe 84 PID 1584 wrote to memory of 328 1584 1AE97zh4.exe 84 PID 1584 wrote to memory of 328 1584 1AE97zh4.exe 84 PID 1584 wrote to memory of 328 1584 1AE97zh4.exe 84 PID 1584 wrote to memory of 328 1584 1AE97zh4.exe 84 PID 1584 wrote to memory of 328 1584 1AE97zh4.exe 84 PID 1584 wrote to memory of 328 1584 1AE97zh4.exe 84 PID 4572 wrote to memory of 1676 4572 cj7aK37.exe 85 PID 4572 wrote to memory of 1676 4572 cj7aK37.exe 85 PID 4572 wrote to memory of 1676 4572 cj7aK37.exe 85 PID 3580 wrote to memory of 2856 3580 YA0cB39.exe 86 PID 3580 wrote to memory of 2856 3580 YA0cB39.exe 86 PID 3580 wrote to memory of 2856 3580 YA0cB39.exe 86 PID 2204 wrote to memory of 2200 2204 BX2ON51.exe 87 PID 2204 wrote to memory of 2200 2204 BX2ON51.exe 87 PID 2204 wrote to memory of 2200 2204 BX2ON51.exe 87 PID 2200 wrote to memory of 1784 2200 4gY147xN.exe 88 PID 2200 wrote to memory of 1784 2200 4gY147xN.exe 88 PID 2200 wrote to memory of 1784 2200 4gY147xN.exe 88 PID 2200 wrote to memory of 4108 2200 4gY147xN.exe 89 PID 2200 wrote to memory of 4108 2200 4gY147xN.exe 89 PID 2200 wrote to memory of 4108 2200 4gY147xN.exe 89 PID 2200 wrote to memory of 4108 2200 4gY147xN.exe 89 PID 2200 wrote to memory of 4108 2200 4gY147xN.exe 89 PID 2200 wrote to memory of 4108 2200 4gY147xN.exe 89 PID 2200 wrote to memory of 4108 2200 4gY147xN.exe 89 PID 2200 wrote to memory of 4108 2200 4gY147xN.exe 89 PID 3452 wrote to memory of 2252 3452 MN8Pv64.exe 90 PID 3452 wrote to memory of 2252 3452 MN8Pv64.exe 90 PID 3452 wrote to memory of 2252 3452 MN8Pv64.exe 90 PID 2252 wrote to memory of 848 2252 5qE0fa6.exe 91 PID 2252 wrote to memory of 848 2252 5qE0fa6.exe 91 PID 2252 wrote to memory of 848 2252 5qE0fa6.exe 91 PID 4892 wrote to memory of 2940 4892 file.exe 92 PID 4892 wrote to memory of 2940 4892 file.exe 92 PID 4892 wrote to memory of 2940 4892 file.exe 92 PID 848 wrote to memory of 3312 848 explothe.exe 93 PID 848 wrote to memory of 3312 848 explothe.exe 93 PID 848 wrote to memory of 3312 848 explothe.exe 93 PID 848 wrote to memory of 1536 848 explothe.exe 95 PID 848 wrote to memory of 1536 848 explothe.exe 95 PID 848 wrote to memory of 1536 848 explothe.exe 95 PID 2940 wrote to memory of 4336 2940 6Fw0zU1.exe 97 PID 2940 wrote to memory of 4336 2940 6Fw0zU1.exe 97 PID 1536 wrote to memory of 1296 1536 cmd.exe 99 PID 1536 wrote to memory of 1296 1536 cmd.exe 99 PID 1536 wrote to memory of 1296 1536 cmd.exe 99 PID 1536 wrote to memory of 4100 1536 cmd.exe 100 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:3344 -
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- DcRat
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MN8Pv64.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MN8Pv64.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\BX2ON51.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\BX2ON51.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\YA0cB39.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\YA0cB39.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cj7aK37.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cj7aK37.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1AE97zh4.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1AE97zh4.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:328
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2hF6730.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2hF6730.exe7⤵
- Executes dropped EXE
PID:1676
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\3SO24vn.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\3SO24vn.exe6⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2856
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\4gY147xN.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\4gY147xN.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:1784
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:4108
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\5qE0fa6.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\5qE0fa6.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F6⤵
- DcRat
- Creates scheduled task(s)
PID:3312
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:1296
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:N"7⤵PID:4100
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:R" /E7⤵PID:3568
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4012
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:4904
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:4988
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:5312
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\6Fw0zU1.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\6Fw0zU1.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\B5F2.tmp\B5F3.tmp\B5F4.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\6Fw0zU1.exe"4⤵PID:4336
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/login5⤵PID:4984
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x16c,0x170,0x174,0x148,0x178,0x7fff5d2f46f8,0x7fff5d2f4708,0x7fff5d2f47186⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,7327079376243315274,10099427419450500880,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:36⤵PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,7327079376243315274,10099427419450500880,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:26⤵PID:3400
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/5⤵PID:3920
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x13c,0x164,0x168,0x144,0x16c,0x7fff5d2f46f8,0x7fff5d2f4708,0x7fff5d2f47186⤵PID:4172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,17778890209157841831,2424114572081698866,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:26⤵PID:1116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,17778890209157841831,2424114572081698866,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:36⤵PID:1588
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/5⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4744 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7fff5d2f46f8,0x7fff5d2f4708,0x7fff5d2f47186⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2036,13385261313803067466,3532712437597432217,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2636 /prefetch:86⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,13385261313803067466,3532712437597432217,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3040 /prefetch:16⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,13385261313803067466,3532712437597432217,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3100 /prefetch:16⤵PID:1756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,13385261313803067466,3532712437597432217,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2956 /prefetch:16⤵PID:2944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,13385261313803067466,3532712437597432217,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2948 /prefetch:16⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2036,13385261313803067466,3532712437597432217,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 /prefetch:36⤵PID:1624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,13385261313803067466,3532712437597432217,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:26⤵PID:384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,13385261313803067466,3532712437597432217,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:16⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2036,13385261313803067466,3532712437597432217,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5684 /prefetch:86⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2036,13385261313803067466,3532712437597432217,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5732 /prefetch:86⤵PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,13385261313803067466,3532712437597432217,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6220 /prefetch:16⤵PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,13385261313803067466,3532712437597432217,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:16⤵PID:1752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,13385261313803067466,3532712437597432217,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6704 /prefetch:86⤵PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,13385261313803067466,3532712437597432217,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6704 /prefetch:86⤵PID:564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,13385261313803067466,3532712437597432217,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6432 /prefetch:16⤵PID:3404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,13385261313803067466,3532712437597432217,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6700 /prefetch:16⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,13385261313803067466,3532712437597432217,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5968 /prefetch:16⤵PID:5200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,13385261313803067466,3532712437597432217,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3544 /prefetch:16⤵PID:5936
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\FD1D.exeC:\Users\Admin\AppData\Local\Temp\FD1D.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\QJ3Lq4VF.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\QJ3Lq4VF.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sW4NY2sS.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sW4NY2sS.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:972 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\WP0Yp8Lx.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\WP0Yp8Lx.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3536 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\NQ0Ug7uK.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\NQ0Ug7uK.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\1vx90Vk3.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\1vx90Vk3.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1988 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵PID:5708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5708 -s 5409⤵
- Program crash
PID:6068
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\2Tt607sL.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\2Tt607sL.exe7⤵
- Executes dropped EXE
PID:5756
-
-
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1D2.bat" "2⤵PID:208
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/login3⤵PID:2772
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff5d2f46f8,0x7fff5d2f4708,0x7fff5d2f47184⤵PID:4832
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/3⤵PID:5748
-
-
-
C:\Users\Admin\AppData\Local\Temp\FE37.exeC:\Users\Admin\AppData\Local\Temp\FE37.exe2⤵
- Executes dropped EXE
PID:548
-
-
C:\Users\Admin\AppData\Local\Temp\55D.exeC:\Users\Admin\AppData\Local\Temp\55D.exe2⤵
- Executes dropped EXE
PID:1996
-
-
C:\Users\Admin\AppData\Local\Temp\752.exeC:\Users\Admin\AppData\Local\Temp\752.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious use of AdjustPrivilegeToken
PID:3764
-
-
C:\Users\Admin\AppData\Local\Temp\9D4.exeC:\Users\Admin\AppData\Local\Temp\9D4.exe2⤵
- Executes dropped EXE
PID:5160
-
-
C:\Users\Admin\AppData\Local\Temp\ED6.exeC:\Users\Admin\AppData\Local\Temp\ED6.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5364 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5364 -s 7763⤵
- Program crash
PID:2848
-
-
-
C:\Users\Admin\AppData\Local\Temp\4CCA.exeC:\Users\Admin\AppData\Local\Temp\4CCA.exe2⤵
- Checks computer location settings
- Executes dropped EXE
PID:6012 -
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5168 -
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:228
-
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"3⤵
- Executes dropped EXE
PID:5132 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:4304
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:2344 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:5500
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:5204
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:6004
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1900
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:5828
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
PID:2088 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:6056
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- DcRat
- Creates scheduled task(s)
PID:5780
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f6⤵PID:4984
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:5808 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵PID:4304
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:5544
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll6⤵
- Executes dropped EXE
PID:6040
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- DcRat
- Creates scheduled task(s)
PID:488
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"6⤵
- Executes dropped EXE
PID:484 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵PID:224
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)8⤵
- Launches sc.exe
PID:2020
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\kos2.exe"C:\Users\Admin\AppData\Local\Temp\kos2.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
PID:6112 -
C:\Users\Admin\AppData\Local\Temp\set16.exe"C:\Users\Admin\AppData\Local\Temp\set16.exe"4⤵
- Executes dropped EXE
PID:5436 -
C:\Users\Admin\AppData\Local\Temp\is-J39TB.tmp\is-159JU.tmp"C:\Users\Admin\AppData\Local\Temp\is-J39TB.tmp\is-159JU.tmp" /SL4 $60252 "C:\Users\Admin\AppData\Local\Temp\set16.exe" 1281875 522245⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
PID:3584 -
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 206⤵PID:5308
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 207⤵PID:2112
-
-
-
C:\Program Files (x86)\MyBurn\MyBurn.exe"C:\Program Files (x86)\MyBurn\MyBurn.exe" -i6⤵
- Executes dropped EXE
PID:6088
-
-
C:\Program Files (x86)\MyBurn\MyBurn.exe"C:\Program Files (x86)\MyBurn\MyBurn.exe" -s6⤵
- Executes dropped EXE
PID:428
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Query6⤵PID:1976
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\K.exe"C:\Users\Admin\AppData\Local\Temp\K.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
PID:3300
-
-
-
C:\Users\Admin\AppData\Local\Temp\latestX.exe"C:\Users\Admin\AppData\Local\Temp\latestX.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Program Files directory
PID:6052
-
-
-
C:\Users\Admin\AppData\Local\Temp\4FAA.exeC:\Users\Admin\AppData\Local\Temp\4FAA.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:436
-
-
C:\Users\Admin\AppData\Local\Temp\51DD.exeC:\Users\Admin\AppData\Local\Temp\51DD.exe2⤵
- Executes dropped EXE
PID:4120
-
-
C:\Users\Admin\AppData\Local\Temp\5317.exeC:\Users\Admin\AppData\Local\Temp\5317.exe2⤵
- Executes dropped EXE
PID:5296
-
-
C:\Users\Admin\AppData\Local\Temp\572F.exeC:\Users\Admin\AppData\Local\Temp\572F.exe2⤵PID:5404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5404 -s 7923⤵
- Program crash
PID:5848
-
-
-
C:\Users\Admin\AppData\Local\Temp\6057.exeC:\Users\Admin\AppData\Local\Temp\6057.exe2⤵
- Checks computer location settings
- Executes dropped EXE
PID:4716 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp8529.tmp.bat""3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5404 -
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
PID:5648
-
-
C:\Users\Admin\AppData\Roaming\calc.exe"C:\Users\Admin\AppData\Roaming\calc.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1916
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "calc" /tr '"C:\Users\Admin\AppData\Roaming\calc.exe"' & exit3⤵PID:5424
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "calc" /tr '"C:\Users\Admin\AppData\Roaming\calc.exe"'4⤵
- DcRat
- Creates scheduled task(s)
PID:4264
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\67AB.exeC:\Users\Admin\AppData\Local\Temp\67AB.exe2⤵
- Executes dropped EXE
PID:5152 -
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe cbeeadfacd.sys,#13⤵PID:5420
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe cbeeadfacd.sys,#14⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:3052
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6B56.exeC:\Users\Admin\AppData\Local\Temp\6B56.exe2⤵
- Executes dropped EXE
PID:4880
-
-
C:\Users\Admin\AppData\Local\Temp\7B74.exeC:\Users\Admin\AppData\Local\Temp\7B74.exe2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
PID:6140
-
-
C:\Users\Admin\AppData\Local\Temp\7F1E.exeC:\Users\Admin\AppData\Local\Temp\7F1E.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3388
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /delete /f /tn "GoogleUpdateTaskMachineQC"2⤵PID:2528
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /create /f /tn "GoogleUpdateTaskMachineQC" /xml "C:\Users\Admin\AppData\Local\Temp\xhoymdsniflw.xml"2⤵
- DcRat
- Creates scheduled task(s)
PID:5456
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:3540
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵PID:2764
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:4296
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:5196
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:4336
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:4976
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:2472
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:1952
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:2204
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:4636
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:1052
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:2612
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:5936
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵PID:2872
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:4152
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /create /f /tn "GoogleUpdateTaskMachineQC" /xml "C:\Users\Admin\AppData\Local\Temp\xhoymdsniflw.xml"2⤵
- DcRat
- Creates scheduled task(s)
PID:4760
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4740
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:400
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3856
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3488
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2f8 0x5001⤵
- Suspicious use of AdjustPrivilegeToken
PID:2196
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1724
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff5d2f46f8,0x7fff5d2f4708,0x7fff5d2f47181⤵PID:5776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 5708 -ip 57081⤵PID:5928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5364 -ip 53641⤵PID:6100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 5404 -ip 54041⤵PID:5672
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:5460
-
C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exeC:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
PID:3936
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:3104
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
PID:4636
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD584df16093540d8d88a327b849dd35f8c
SHA1c6207d32a8e44863142213697984de5e238ce644
SHA256220f89151a0f978b8bbe338b937af90417ae8c17b72a53f2acea7be2ac171a8c
SHA5123077ccda8f86f47c41978d6cbb1dcad344e36f236251c8fd8c58d1c48a59106aecfdbe306357b7ebcfe3300bec8ea10ee0e59434c799e8c40e40e6c3c1bd4098
-
Filesize
152B
MD584df16093540d8d88a327b849dd35f8c
SHA1c6207d32a8e44863142213697984de5e238ce644
SHA256220f89151a0f978b8bbe338b937af90417ae8c17b72a53f2acea7be2ac171a8c
SHA5123077ccda8f86f47c41978d6cbb1dcad344e36f236251c8fd8c58d1c48a59106aecfdbe306357b7ebcfe3300bec8ea10ee0e59434c799e8c40e40e6c3c1bd4098
-
Filesize
152B
MD584df16093540d8d88a327b849dd35f8c
SHA1c6207d32a8e44863142213697984de5e238ce644
SHA256220f89151a0f978b8bbe338b937af90417ae8c17b72a53f2acea7be2ac171a8c
SHA5123077ccda8f86f47c41978d6cbb1dcad344e36f236251c8fd8c58d1c48a59106aecfdbe306357b7ebcfe3300bec8ea10ee0e59434c799e8c40e40e6c3c1bd4098
-
Filesize
152B
MD584df16093540d8d88a327b849dd35f8c
SHA1c6207d32a8e44863142213697984de5e238ce644
SHA256220f89151a0f978b8bbe338b937af90417ae8c17b72a53f2acea7be2ac171a8c
SHA5123077ccda8f86f47c41978d6cbb1dcad344e36f236251c8fd8c58d1c48a59106aecfdbe306357b7ebcfe3300bec8ea10ee0e59434c799e8c40e40e6c3c1bd4098
-
Filesize
152B
MD5df4fb359f7b2fa8af30bf98045c57c44
SHA16d507359e1fd5be8f7c01fd4b291f81cf9561378
SHA2565ff7efcd90db74ff5a6fa467ba741889306ce510b95db8ebd3d5d292dfe587cc
SHA51292195f5fe36acb84ce5aeedf8654c2ec1d71ebde1e04a5dbce11df2831c3e085c0cd7132ed2c4bddcc3fd1e546c06021dbe5b7364e86054e6cbd6806e7be0463
-
Filesize
152B
MD5df4fb359f7b2fa8af30bf98045c57c44
SHA16d507359e1fd5be8f7c01fd4b291f81cf9561378
SHA2565ff7efcd90db74ff5a6fa467ba741889306ce510b95db8ebd3d5d292dfe587cc
SHA51292195f5fe36acb84ce5aeedf8654c2ec1d71ebde1e04a5dbce11df2831c3e085c0cd7132ed2c4bddcc3fd1e546c06021dbe5b7364e86054e6cbd6806e7be0463
-
Filesize
152B
MD584df16093540d8d88a327b849dd35f8c
SHA1c6207d32a8e44863142213697984de5e238ce644
SHA256220f89151a0f978b8bbe338b937af90417ae8c17b72a53f2acea7be2ac171a8c
SHA5123077ccda8f86f47c41978d6cbb1dcad344e36f236251c8fd8c58d1c48a59106aecfdbe306357b7ebcfe3300bec8ea10ee0e59434c799e8c40e40e6c3c1bd4098
-
Filesize
152B
MD584df16093540d8d88a327b849dd35f8c
SHA1c6207d32a8e44863142213697984de5e238ce644
SHA256220f89151a0f978b8bbe338b937af90417ae8c17b72a53f2acea7be2ac171a8c
SHA5123077ccda8f86f47c41978d6cbb1dcad344e36f236251c8fd8c58d1c48a59106aecfdbe306357b7ebcfe3300bec8ea10ee0e59434c799e8c40e40e6c3c1bd4098
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5c72888ec5af5f4cf96a73342b40ce435
SHA1a87d8221f684260bd88479b1d9453feca570fbc5
SHA256942c09b133fc1f904b563c31cfd08892e48fcd75a8ea618605af10742f036ef2
SHA512cb8c22c91d59b745d5a923d7ce2bee8e046b3c77714ed06c5f2d0c4d43286cff2820b20c8e1c971e36b0935e193182e5b558808aa5755114dcf715db0933757d
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD5c215394c228fd65ff951cdc553363edf
SHA1abf82f4b4f4576a440c85fa0522b5cd2a554f49a
SHA25695efb047ea974235fd7cceb51aa77472ac231e69a34d1a0ad496c5d4dd93277f
SHA5121e387d0f46fc3e35746cff1f6be98c5a032dbdb662e09c8c6b27e2a0a6c1cf986362fc7578dc15490fde7385812a694198558ac7bcde350ec553f01b190c29de
-
Filesize
7KB
MD5cb562763d215723aa3d0a4ed14cc240d
SHA179ab6f38d9f2f255fd6dee0f69752a08e48d047c
SHA2565fd0c2894aaea8f096bd5ead82c17f0879986a5c477f20ac6e466bb0c863bf83
SHA512a7f4a60d8b2218b4e65459611f54251942601a916e2a049108dbb39418dd51a14194bb5333022dbb2160c58666150fda84e865735ea61b43164c45f460e593f8
-
Filesize
5KB
MD5ea86213efcbaf9e3cbea7ee715643dac
SHA177944b98d6cca0fe36fe739c6c9a96bc49d96ccd
SHA2569fbf1440ff3d21769a80655661f23dc86044b00805478448245c892d9e893e00
SHA512f5a81b375f9da766abfc61d5944fd29923889a3f54f71afc325fac79992766752b7f0c1555864bd5322c98b549bdbe9f78a6922b526a0f67dd04ae48e448c4a5
-
Filesize
7KB
MD5e99793edb19a08d39c71791383bd46d2
SHA1660d4cf3224a1b84e181a021d2079556de74d3dd
SHA2564c65b4f0c0fe4dabc56d9cb63e7a144b1b4af88561d6453474841224a28c4c5e
SHA512b457d678ba7515d64d3f799650f2789fd668a7775b8adfe34b40b352cbe4a9328b2dc7cc9922710e557231e630b37e959ebb88c872c7048ced51ad33d5da1bac
-
Filesize
24KB
MD5918ecd7940dcab6b9f4b8bdd4d3772b2
SHA17c0c6962a6cd37d91c2ebf3ad542b3876dc466e4
SHA2563123072fba0ea8e8f960dd213659a0c96ce2b58683593b8ea84efac772b25175
SHA512c96044501a0a6a65140bc7710a81d29dac35fc6a6fd18fbb4fa5d584e9dc79a059e51cbe063ca496d72558e459ffa6c2913f3893f0a3c0f8002bbca1d1b98ea2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\e4f02bf8-b53b-4f57-abd1-beca05800ef9\index-dir\the-real-index
Filesize2KB
MD555afc6785581f69c6d5b9dc3abbec1e2
SHA1a8ec07b8879523dbad6a338e1dc8d448961085b1
SHA256e9b32b04115eeda69960d026f1e8a251b28d9f7e657fc527cc0c14f56447e23f
SHA512430a4143c83cc43eb2c1f3e96a55cb558f17cd71e71e4b07ee79753b48aba3a4ef9b8eafdb17ed798504cc12c0fe1a457fa1ef633b533973352308b59db2a92c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\e4f02bf8-b53b-4f57-abd1-beca05800ef9\index-dir\the-real-index~RFe5837c4.TMP
Filesize48B
MD5b8108315e74a6c3ee18467a0f4e332be
SHA1a9cdf0e3a58624227f335a5c192f7023a0191faf
SHA256dd8e3b70d8786cfb3f8d269ecbcb1ce17e78fc9e554e97d8726d3c8e27449873
SHA512b307d2b8e5a7115ceb1ec41fc2fd31175e553d64a758590e7c47e5f350c3dcd77d55c9e984f0519d43e3baf2238abc1e8e91238515e9e39ee857e4a858421907
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\e800f6ad-b3a1-498b-9d81-62bfc44cb501\index-dir\the-real-index
Filesize624B
MD5c3a390c587db8979df74e7457c4347ea
SHA1a28e9ccc84756b9d45c1a2bd6223f48bb5f3c5f8
SHA256bde164551bb0c005edae039eeca98d7ae4029a8adfe10c44b98455fcbb9f476c
SHA5123f4d403c7f2fef430afbba198a617b468c9a4f880bbf0289d0c7c08436d8b54636d5d99884f48195ddc5b6ab7da8db4b72933c2ca1e6964b8ae2366f14494ec8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\e800f6ad-b3a1-498b-9d81-62bfc44cb501\index-dir\the-real-index~RFe583d81.TMP
Filesize48B
MD5db1b4e026c126f9645ea8ad70b5fb3ff
SHA17052484deb3a2a2e186b0458268472230d81eb9a
SHA256c3abf154c6dbc85048fab219537dc0ceb85e77faddb681a616d32586abc6ed46
SHA51225f3743aeb3c1f79065592b09dbfc08cca535bd6da6787cb29827393627b5ed80e8d6cefbcaf99e2abcfb28acb69c269de1bb7167c4acb800d786a2df979eb4c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize89B
MD57c85a3628bf08055e4d5cc9284fabb98
SHA1c54cecd30c4c6c207e30586c56f3d244a5b36cc8
SHA2561c5de252d1541141648437416e326b39cb93c3c654592a8023b601fc20dce6a5
SHA512508068c30afbafaaa4a26d292eff5f5f63e866f9da2896c0dccbd195f89475162c8325bce8607da17af7507be526685d55b8c04a836fa198ad883b9d22ce1c26
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize146B
MD5d5476efa3606f995ae618eb404557955
SHA11d13d317cc5afd9a388428c4a2366ac6563e6b2c
SHA2565372b6a40ebe06771c47357d0e6cf54b95d1f433e32154e1d37fc929d54a88da
SHA512ee7a937d1a1b08082a77ed93a1fc77ff7d11094856139556f20432d071b73fd1014827cd6624a0a43aa96f130df00b8872b5fd90b36d42593e40cb9d0c0402f7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize155B
MD517c0d4f244a03608f6112e1686fb3df6
SHA16f4fec4d7c691fdb8ce66088c3467c881f2e3fdd
SHA256ebb22da636f159933cbc65432cf52ab24a08642171fd91c84a5fa120d175443f
SHA512cda89ca76bfdc553f428d9882288faf3427e9ee5debf6a83ab48125cd507fbd1b3af21950d1c3c4de7725b0ebf4253b01c68dcd1032159cdc56bd8a6f44e424f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize82B
MD57802c9c56cfba95e9168f4eda14d69cd
SHA12161047de1362aef2d63ea03bd124071203feaca
SHA25674e9a77cf4d4f7e424c8db53cf35bd95493279ce5b2bf0828bcb71f9f33f7fc9
SHA5127b2bc0b9a4e15b1c284c5c03c7f1127d9783d4d5b91244ed42877cfdfd68f149b49c50d5d139f885bc6c1d30e7d66b1395f39829992e99fa9128ddec63f286ea
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize153B
MD5a0f43d742a11e8cd0bf8f0caa4cb7ebd
SHA117602926c9e75c2fc974efba005491f1a066dd67
SHA2565277f85311fdffc7aec72deaa2841fb7c7ee32e87ec2f59a5407c988e0569bd4
SHA51269c7a66a0b7e72a17874dfee316f40ea7a25a0c95999ed385d3ced78854338cf7fbe1fbd82c42f845943fd5c1dbaf248751da8d06e9726946685054229abe02f
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize96B
MD58fce37574842d3c86f9a9148914a924c
SHA17ec34ba62c28cb71c27e0b5da92cbb4f81b7884f
SHA256892c11b84ab412279655316ede2173bd0fb02f76ec0809e7672c384e8cfeb47c
SHA5125257c277965a41380fab7552a741a531382ac3309c2928537e2a0af6c784fdd58477dc078aaac75cb01f835238a8243a018f5c9589543bb9197a983253b67777
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe5824f8.TMP
Filesize48B
MD542ebc45b98ed25a6b515381fe1b4d2a1
SHA1adfab85d399752aa73a7734ee9c8332d9a1d2158
SHA256908ed600dc4cd44345c4b98611f4606ecad1b347392fd4610546265e63ea8a5d
SHA5128022981349af3a3024b4a268d1b7d91db04e80b19a7f0b940e9ae66e4766be847840e46b2ca2d0ff1a18d1527e9172869ed1396489623a55c5b8a76964f5db6a
-
Filesize
1KB
MD5539e24b3953b4ab30268e79284909610
SHA14011522e977385f93dedb24137d8b15b70bdbe47
SHA2567df951cd1c9c1e19657a1e8265886599356231163e0e44b65b04f78c5649739e
SHA5129e7c9ef43855f90481af2b6765a30e89f437c15d2e3af051c7ec5ab38bf59fdc858d764eb424f38cb869ce27410f05872f2d023c55eac1d0e282aed5007b24f2
-
Filesize
1KB
MD5f6b8f776c6207f0a868b1c6958b278dd
SHA14d4d5f3914d11f65d2956b62a98deaae8400604d
SHA256b2ddf35636397334754698b3ea4249dc3b32f94d1639d9b3e94d780120a9e968
SHA51273cc3019d6411b3941f6a439ea4cb9eeeef2a7bb882b33d0521c961a9635671e5652506630aced10f6ea869d4bce30d22a15fb36276c98ff141867c030225882
-
Filesize
1KB
MD50c3752a5ae996eaf1871a174935b9b17
SHA1392321061c7ecb894ffdef0c774576b13eb52ff0
SHA256d3bba10731e6a4b0646772ade73d66742174c4d63c78cb37c3c03148a08ede8b
SHA5128e8234695c5c851182facf8ffb72e72a722a9327e886862cbc364d14fe5db6aaad9cefc537789d9d7828c64794a64d50677c964fd2474c4facbd0b6b72538a52
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
2KB
MD5ab01e65d0cc19e90ed023613fda98380
SHA15b1c7a78960fbead3a4714e6fad00eccb00ded96
SHA256d380fd5294fe64049fdf5c7f6f95d7d498568432719929ececef9d8bcd014f11
SHA51226fcea297b84a2d5ab4dd85de8724cd964514578a47a3612e8ac5dc9dce0d9ae0f73e16c7f7502ce32c5fb87a1c1b67a895e121a066d249135c31ac38ffde4af
-
Filesize
2KB
MD5ab01e65d0cc19e90ed023613fda98380
SHA15b1c7a78960fbead3a4714e6fad00eccb00ded96
SHA256d380fd5294fe64049fdf5c7f6f95d7d498568432719929ececef9d8bcd014f11
SHA51226fcea297b84a2d5ab4dd85de8724cd964514578a47a3612e8ac5dc9dce0d9ae0f73e16c7f7502ce32c5fb87a1c1b67a895e121a066d249135c31ac38ffde4af
-
Filesize
2KB
MD5ab01e65d0cc19e90ed023613fda98380
SHA15b1c7a78960fbead3a4714e6fad00eccb00ded96
SHA256d380fd5294fe64049fdf5c7f6f95d7d498568432719929ececef9d8bcd014f11
SHA51226fcea297b84a2d5ab4dd85de8724cd964514578a47a3612e8ac5dc9dce0d9ae0f73e16c7f7502ce32c5fb87a1c1b67a895e121a066d249135c31ac38ffde4af
-
Filesize
10KB
MD5fa148b933fff5a3732e3414a16543ff8
SHA17e96de7c1d6e9206065977cf6802ea3fb85143b4
SHA256244f883a9d164efd9bdcd856a137bfee2fc54cd95a9fe5a7da725e27f34697ef
SHA512a695fff40bd88268172b71745fdd9392d3ee162de8161396f01e09d400a93ee8d405a395b2bcb7d56ad43108ab3e16937f12c1e02d73d4617f79eb1fcf9ef696
-
Filesize
10KB
MD56dc5aeec188935ddb9a912e46febc06e
SHA151aca12aa11f72af9e9f64b756e2382cdeb6c2c5
SHA25643b7251114870179498059ecb85bec3b5d5e01adedafac37cb818ec363f7ddbe
SHA512508696f48115be43ba71538b9ac8202d0bc02f65068cbcf1061760e92c088a7c1dccd5b6dece9a5e863e55cc289ee401a6026bccb757d6e6e70838b11e52fa26
-
Filesize
2KB
MD5892b29d75fd14e86d13afc3c65b5276e
SHA1f94b6d900605d7f4186030ce4426c38bd6c6c56a
SHA256f42a52a01738c49bdd756fd2917bda949ab6ec17c2235d3b0da162aa58316bee
SHA5123245f16c04ead48d60de8c9530e0e794705eade8235a1514262c59d7a457cbc51cce6d4fcb0daa6e3c063a22f4a9f21a494993494647f49aa0ca46e1ff52e9b5
-
Filesize
2KB
MD5892b29d75fd14e86d13afc3c65b5276e
SHA1f94b6d900605d7f4186030ce4426c38bd6c6c56a
SHA256f42a52a01738c49bdd756fd2917bda949ab6ec17c2235d3b0da162aa58316bee
SHA5123245f16c04ead48d60de8c9530e0e794705eade8235a1514262c59d7a457cbc51cce6d4fcb0daa6e3c063a22f4a9f21a494993494647f49aa0ca46e1ff52e9b5
-
Filesize
2KB
MD5892b29d75fd14e86d13afc3c65b5276e
SHA1f94b6d900605d7f4186030ce4426c38bd6c6c56a
SHA256f42a52a01738c49bdd756fd2917bda949ab6ec17c2235d3b0da162aa58316bee
SHA5123245f16c04ead48d60de8c9530e0e794705eade8235a1514262c59d7a457cbc51cce6d4fcb0daa6e3c063a22f4a9f21a494993494647f49aa0ca46e1ff52e9b5
-
Filesize
4.2MB
MD5ea6cb5dbc7d10b59c3e1e386b2dbbab5
SHA1578a5b046c316ccb2ce6f4571a1a6f531f41f89c
SHA256443d03b8d3a782b2020740dc49c5cc97eb98ca4543b94427a0886df3f2a71132
SHA512590355ea716bac8372d0fac1e878819f2e67d279e32ef787ff11cbe8a870e04d1a77233e7f9f29d303ff11a90096ebae6c5a41f1ab94abb82c0710357fc23200
-
Filesize
124B
MD5dec89e5682445d71376896eac0d62d8b
SHA1c5ae3197d3c2faf3dea137719c804ab215022ea6
SHA256c3dea90ca98985007f0de66bf0197fdcd2d4a35e365135bf37a18a4895d81668
SHA512b746b79120d2ff8a9f3327b0bed99c70339155ea831c1eb9f412056fc8de36a0e3005378ba9102bd25ce6cc24fe1171f1a9c8453f33a9bcd6dd59e9ad0f8e186
-
Filesize
1.7MB
MD56a6d8ab14fd0cc7a7d8abbd0c1579464
SHA13b3594c61246f692ed1b35e8cb59478a5d34b089
SHA25616f72e18e82b49e6e5fb73c127ca02d84abd538f3b0b78b9729f8ccfa5f9ad96
SHA512b10acc4194334f80ed7a03f22981aa32e23affcb20a9b1dc3e869ba6e593abd5777da6095a267062086e716eec8ec94c1934e0e58c25f154ac9e1991a836b2a3
-
Filesize
1.7MB
MD56a6d8ab14fd0cc7a7d8abbd0c1579464
SHA13b3594c61246f692ed1b35e8cb59478a5d34b089
SHA25616f72e18e82b49e6e5fb73c127ca02d84abd538f3b0b78b9729f8ccfa5f9ad96
SHA512b10acc4194334f80ed7a03f22981aa32e23affcb20a9b1dc3e869ba6e593abd5777da6095a267062086e716eec8ec94c1934e0e58c25f154ac9e1991a836b2a3
-
Filesize
180KB
MD50635bc911c5748d71a4aed170173481e
SHA16d92ff8b519e4a10759f75f3b3d9e1459ed4ff1b
SHA256a0330d75df7075206cf68d358e3acfc621062f35db43c2521b8ef5e7c9f317f1
SHA51250ea5d41497884b8aee43d6d7940186d6095055c4cd301ffa88407caf9935853dcfd852e81ab4671da21505ba284b0bae71a59fa50dd55dfa4c3ea7d0251651a
-
Filesize
180KB
MD50635bc911c5748d71a4aed170173481e
SHA16d92ff8b519e4a10759f75f3b3d9e1459ed4ff1b
SHA256a0330d75df7075206cf68d358e3acfc621062f35db43c2521b8ef5e7c9f317f1
SHA51250ea5d41497884b8aee43d6d7940186d6095055c4cd301ffa88407caf9935853dcfd852e81ab4671da21505ba284b0bae71a59fa50dd55dfa4c3ea7d0251651a
-
Filesize
180KB
MD50635bc911c5748d71a4aed170173481e
SHA16d92ff8b519e4a10759f75f3b3d9e1459ed4ff1b
SHA256a0330d75df7075206cf68d358e3acfc621062f35db43c2521b8ef5e7c9f317f1
SHA51250ea5d41497884b8aee43d6d7940186d6095055c4cd301ffa88407caf9935853dcfd852e81ab4671da21505ba284b0bae71a59fa50dd55dfa4c3ea7d0251651a
-
Filesize
45KB
MD5d47666e1f07f52778be724e662338044
SHA1b2f5093c41f44323f0e8550d00969fe97b76847d
SHA25666f72bf041a3911680050b9ff6cf8cdaaff3349362d1cd7ebf7602f33699c574
SHA512ead36e28c25a02d4a6d17ac6dec8175ed4b35253258228388a8cc6dc3188da3bb1b9cb2999c9ac25937fb3ec157d885ba79ccb1c0b8a69ce9456966215f2db16
-
Filesize
45KB
MD5d47666e1f07f52778be724e662338044
SHA1b2f5093c41f44323f0e8550d00969fe97b76847d
SHA25666f72bf041a3911680050b9ff6cf8cdaaff3349362d1cd7ebf7602f33699c574
SHA512ead36e28c25a02d4a6d17ac6dec8175ed4b35253258228388a8cc6dc3188da3bb1b9cb2999c9ac25937fb3ec157d885ba79ccb1c0b8a69ce9456966215f2db16
-
Filesize
45KB
MD549fa98328a2bb050dba070ce8553aede
SHA19dc607553c27d68c16632a724d6d0700b7ce285b
SHA256e52078439008f080e75fcbaca6b7e21a9c688bc6f26926c0e96ee298522f9c2e
SHA512db34e7be7f819c3d83cafbfa682d564297fc38ef301de14c787aa540310f122ac826fefafc1e324a974830778e758ec61888b8ba94dae99bdc53fd4c94ab2c6a
-
Filesize
1.4MB
MD5e6a959a8b4e1460212bb7847bbc4e7aa
SHA1a554e55ccacdd3da181ef8a2c5764e8a6a2faefc
SHA25664ef4bf30e14fc9fa71c10bd085d39654dc5f7903b911f4e90a9b351c2c41882
SHA512e3ad98d9c24e5aacc05273ad80a4efddfcd3be836ea2156bcbac6eacb0fe53ea4096ce667f69517bfc823810ddc4a9bfcddb571aaff8c05c29d56f668bfdde18
-
Filesize
1.4MB
MD5e6a959a8b4e1460212bb7847bbc4e7aa
SHA1a554e55ccacdd3da181ef8a2c5764e8a6a2faefc
SHA25664ef4bf30e14fc9fa71c10bd085d39654dc5f7903b911f4e90a9b351c2c41882
SHA512e3ad98d9c24e5aacc05273ad80a4efddfcd3be836ea2156bcbac6eacb0fe53ea4096ce667f69517bfc823810ddc4a9bfcddb571aaff8c05c29d56f668bfdde18
-
Filesize
1.5MB
MD53121f08aa7ae7b61929df7a389ac84f7
SHA1620ee7275eab91592f4dd780be099536d9318104
SHA256e3c012fbe8dca4a671fd89afc825599082e13ee20f97282f8716c5024765dd2e
SHA512772862256084e730e60e3afa16596b9334e5d9ac8ebf560585c3c8a0407845c824ced5e878c32e762630e09cf7ec81e9bb90ebc143e196ed9d66123d4a743ee4
-
Filesize
1.5MB
MD53121f08aa7ae7b61929df7a389ac84f7
SHA1620ee7275eab91592f4dd780be099536d9318104
SHA256e3c012fbe8dca4a671fd89afc825599082e13ee20f97282f8716c5024765dd2e
SHA512772862256084e730e60e3afa16596b9334e5d9ac8ebf560585c3c8a0407845c824ced5e878c32e762630e09cf7ec81e9bb90ebc143e196ed9d66123d4a743ee4
-
Filesize
219KB
MD5f33a619c22fe75839239ff060d6880fa
SHA162f648780a48a3e4d9b274bf0109b4527d006e53
SHA256af2e1cfc88e8ef97dc862794ce3f6a3b8e44efb6bbf2e46c7fd968102fdc5255
SHA5129e88cb5079a5555bcc8f3c7d35131e2acf20784bec7e295191bd9869d078ef5b2d02ec63e981e31b5069078415f261d9825b9355893afde07df9a097179e05ad
-
Filesize
219KB
MD5f33a619c22fe75839239ff060d6880fa
SHA162f648780a48a3e4d9b274bf0109b4527d006e53
SHA256af2e1cfc88e8ef97dc862794ce3f6a3b8e44efb6bbf2e46c7fd968102fdc5255
SHA5129e88cb5079a5555bcc8f3c7d35131e2acf20784bec7e295191bd9869d078ef5b2d02ec63e981e31b5069078415f261d9825b9355893afde07df9a097179e05ad
-
Filesize
1.2MB
MD5d50b0507b058a106ac6f96fd9d765f2d
SHA160ec65bdc063c63218da2458133772a7822346af
SHA2562b885fc30cc3c30ae20e89c7aa71d0828af4eefbb7e270af4b57c22e8222da4b
SHA51234771d8635ab739417aaf1db1cfbe109d78150337ab06f9cc6c52981f9f96f6fcac5ec6c81b91d607a16d5ad33f05972afc67341b259e5bb0c2e57898e57335c
-
Filesize
1.2MB
MD5d50b0507b058a106ac6f96fd9d765f2d
SHA160ec65bdc063c63218da2458133772a7822346af
SHA2562b885fc30cc3c30ae20e89c7aa71d0828af4eefbb7e270af4b57c22e8222da4b
SHA51234771d8635ab739417aaf1db1cfbe109d78150337ab06f9cc6c52981f9f96f6fcac5ec6c81b91d607a16d5ad33f05972afc67341b259e5bb0c2e57898e57335c
-
Filesize
1.4MB
MD5bf33f0525e5e6e6a5a7e6c8ecf823869
SHA1e3e4dc47f377cc458df0fd8b979324fc045bb2db
SHA256410a0036effcfda2560b11633d1b13696599d0136377fe2c8bf517fea29992a1
SHA5123b1b689e33ba1b97539201d8801db1b7931e9f5fdca1bc8c77fb10015b50cbe6e24028d03e2c18b2c1308ee77dda4a4466724969875769d3793ef2f9959cfd66
-
Filesize
1.4MB
MD5bf33f0525e5e6e6a5a7e6c8ecf823869
SHA1e3e4dc47f377cc458df0fd8b979324fc045bb2db
SHA256410a0036effcfda2560b11633d1b13696599d0136377fe2c8bf517fea29992a1
SHA5123b1b689e33ba1b97539201d8801db1b7931e9f5fdca1bc8c77fb10015b50cbe6e24028d03e2c18b2c1308ee77dda4a4466724969875769d3793ef2f9959cfd66
-
Filesize
1.9MB
MD5926dada2729ee3a9e410b6f0cf1ca34c
SHA13602347ae5c2349d9749d81c678b59a352394ffd
SHA2569cc90bd83223d97d6f337f68499a749cb894c5bf83a5292fe874112ce0c31d91
SHA51231d64261a36ef38b517f7e9d43b623bfe8407e7d1822f9e4719ab6e1cae36c2dc50e4c92e3aef8147083c8a7315cf9613a2db4b315abd80fd0774304625adbcd
-
Filesize
1.9MB
MD5926dada2729ee3a9e410b6f0cf1ca34c
SHA13602347ae5c2349d9749d81c678b59a352394ffd
SHA2569cc90bd83223d97d6f337f68499a749cb894c5bf83a5292fe874112ce0c31d91
SHA51231d64261a36ef38b517f7e9d43b623bfe8407e7d1822f9e4719ab6e1cae36c2dc50e4c92e3aef8147083c8a7315cf9613a2db4b315abd80fd0774304625adbcd
-
Filesize
697KB
MD55a15f93d379eea5239d227eab848e488
SHA1bab931de798a3aa783762e6cc9241549d5915de9
SHA2566c60966b2c933b87eadc968cdd6a9d78b16f1cc32ef11538402df6c898cb29b2
SHA5127cad21630a4bb709de194305ff56eb30c14bf1fd0df2cc0e7aa991bcb090fe05515d8d48530cb528012271ac597b715af9f33dcf625bce8cf6b6ffd01d389d2f
-
Filesize
697KB
MD55a15f93d379eea5239d227eab848e488
SHA1bab931de798a3aa783762e6cc9241549d5915de9
SHA2566c60966b2c933b87eadc968cdd6a9d78b16f1cc32ef11538402df6c898cb29b2
SHA5127cad21630a4bb709de194305ff56eb30c14bf1fd0df2cc0e7aa991bcb090fe05515d8d48530cb528012271ac597b715af9f33dcf625bce8cf6b6ffd01d389d2f
-
Filesize
30KB
MD5b0cfa65bbeb6129a5355ba5fd9f1ac11
SHA187f37aee9fb0bb45a79f0c8e9677ac6f5203951f
SHA2561989dcd6e167bbb15aa5cd8107d7e9d9eee7e165da35fdbae1ccf21458ac8b88
SHA512fc06f52c36dbc302c2f6b58861b620844069e67170929800b7746da5f6fb6c9e9e7ff13bcefceb6a2fb76c26ae292c0cad96fdfd00e5fd5580a5e8838dae01d1
-
Filesize
30KB
MD5b0cfa65bbeb6129a5355ba5fd9f1ac11
SHA187f37aee9fb0bb45a79f0c8e9677ac6f5203951f
SHA2561989dcd6e167bbb15aa5cd8107d7e9d9eee7e165da35fdbae1ccf21458ac8b88
SHA512fc06f52c36dbc302c2f6b58861b620844069e67170929800b7746da5f6fb6c9e9e7ff13bcefceb6a2fb76c26ae292c0cad96fdfd00e5fd5580a5e8838dae01d1
-
Filesize
871KB
MD5270fe4bb93c0279cf61254e45b00d806
SHA1a58a5b9e6b7da9cb79e77509a8919b24cb4b8cea
SHA2565a7998f2a6f20fd3873fc8cd09dd67739a07d8a9ced338d2b4cb8adc30c646f5
SHA512f7b0ba90b16148ee0145570ed0ff2c4d4fd47701e0f8300a97f926e2d90efe946517b92f01259fb76750cb6b5686de4fb248788ce409314512f4dafef2c201e6
-
Filesize
871KB
MD5270fe4bb93c0279cf61254e45b00d806
SHA1a58a5b9e6b7da9cb79e77509a8919b24cb4b8cea
SHA2565a7998f2a6f20fd3873fc8cd09dd67739a07d8a9ced338d2b4cb8adc30c646f5
SHA512f7b0ba90b16148ee0145570ed0ff2c4d4fd47701e0f8300a97f926e2d90efe946517b92f01259fb76750cb6b5686de4fb248788ce409314512f4dafef2c201e6
-
Filesize
572KB
MD5b8d477f33ea17a69c51403aef076e358
SHA1e52bd3eaf40652073fbdeba394daf257534663c0
SHA25609aadb08c937d8c1f1e3606b483a1d4f88b57c29b829157e462f1393a97fa109
SHA51278dbd3ca775547f87d670f8f3edf2ff43b73b9cab2c486a62d6e589de4538a9604332d1b538c46214b107c72864caf9a5b216fc90787977b54eb613a1fbd3285
-
Filesize
572KB
MD5b8d477f33ea17a69c51403aef076e358
SHA1e52bd3eaf40652073fbdeba394daf257534663c0
SHA25609aadb08c937d8c1f1e3606b483a1d4f88b57c29b829157e462f1393a97fa109
SHA51278dbd3ca775547f87d670f8f3edf2ff43b73b9cab2c486a62d6e589de4538a9604332d1b538c46214b107c72864caf9a5b216fc90787977b54eb613a1fbd3285
-
Filesize
1.6MB
MD51a426cb8f9ac97c1bea72cab4f1c2546
SHA132e7fa3372dc121c27e1f66c3ef1122af1ceb3d6
SHA2562852e1a8a77e92bf2f3f79c01f4b61c75e5b62f9d9a2da9d76011b9727092b6d
SHA512059cf67e3e5f2dd1fcd0b6c9b0cb36421febc8364c107ae2bbbb0d3539ebb0ab042a2ba8f206aeede561c1eab387ae467a49dfeb2ce22854e38a090b9df7bf0b
-
Filesize
1.6MB
MD51a426cb8f9ac97c1bea72cab4f1c2546
SHA132e7fa3372dc121c27e1f66c3ef1122af1ceb3d6
SHA2562852e1a8a77e92bf2f3f79c01f4b61c75e5b62f9d9a2da9d76011b9727092b6d
SHA512059cf67e3e5f2dd1fcd0b6c9b0cb36421febc8364c107ae2bbbb0d3539ebb0ab042a2ba8f206aeede561c1eab387ae467a49dfeb2ce22854e38a090b9df7bf0b
-
Filesize
180KB
MD5ddf6b527f049362343494f4de88d6343
SHA12f78fcedcfd8bec5865f9415cb06b2a208a15c56
SHA256ee8a7c06a995129e7052b677acfd62142746430eaad70b4c62639c86396de09a
SHA512a74a7c5acddc16b82e79db12978412d33a1cc330cf9df3a876685c3c01f6c63c999ec11fb8e42a55e0e9165587a8eabcb5fa14841e4cc585aca378948e8a9361
-
Filesize
180KB
MD5ddf6b527f049362343494f4de88d6343
SHA12f78fcedcfd8bec5865f9415cb06b2a208a15c56
SHA256ee8a7c06a995129e7052b677acfd62142746430eaad70b4c62639c86396de09a
SHA512a74a7c5acddc16b82e79db12978412d33a1cc330cf9df3a876685c3c01f6c63c999ec11fb8e42a55e0e9165587a8eabcb5fa14841e4cc585aca378948e8a9361
-
Filesize
675KB
MD542b7fb4256ba07d39aee6da51ecf8881
SHA1b8bf59e704e439a4bb777ce5dee295c5284a17e7
SHA256dbe4252962999efe766d815e7d1a5e445558984e83583ae174fbe98b8fdfa295
SHA5126eb47a4d58d09180e76ac4cd49f154efc24248f70d567216edb45cf910a1e995aa399b2666e4aca31b560ac82c845701b5fad9617bd0af425648794ab46a846e
-
Filesize
675KB
MD542b7fb4256ba07d39aee6da51ecf8881
SHA1b8bf59e704e439a4bb777ce5dee295c5284a17e7
SHA256dbe4252962999efe766d815e7d1a5e445558984e83583ae174fbe98b8fdfa295
SHA5126eb47a4d58d09180e76ac4cd49f154efc24248f70d567216edb45cf910a1e995aa399b2666e4aca31b560ac82c845701b5fad9617bd0af425648794ab46a846e
-
Filesize
1.8MB
MD5fd9aa923da79ee295ed876435bcc69a6
SHA164802e945a438728913e659820ff9d0339301211
SHA2569c17f4fb104dae51f4f67cee8aef67f7f3a403fb5695faf4d69c33521401a519
SHA5123e3a0651a8e28f041c8e260371164ab6929a64adddb8e41ef707c893a22b98ece11837845ba6a324629e42caa43b5dade8c6bf5ac3b2e207a9863929c6c83b6d
-
Filesize
1.8MB
MD5fd9aa923da79ee295ed876435bcc69a6
SHA164802e945a438728913e659820ff9d0339301211
SHA2569c17f4fb104dae51f4f67cee8aef67f7f3a403fb5695faf4d69c33521401a519
SHA5123e3a0651a8e28f041c8e260371164ab6929a64adddb8e41ef707c893a22b98ece11837845ba6a324629e42caa43b5dade8c6bf5ac3b2e207a9863929c6c83b6d
-
Filesize
8KB
MD5ac65407254780025e8a71da7b925c4f3
SHA15c7ae625586c1c00ec9d35caa4f71b020425a6ba
SHA25626cd9cc9a0dd688411a4f0e2fa099b694b88cab6e9ed10827a175f7b5486e42e
SHA51227d87730230d9f594908f904bf298a28e255dced8d515eb0d97e1701078c4405f9f428513c2574d349a7517bd23a3558fb09599a01499ea54590945b981b17ab
-
Filesize
116B
MD5ec6aae2bb7d8781226ea61adca8f0586
SHA1d82b3bad240f263c1b887c7c0cc4c2ff0e86dfe3
SHA256b02fffaba9e664ff7840c82b102d6851ec0bb148cec462cef40999545309e599
SHA512aa62a8cd02a03e4f462f76ae6ff2e43849052ce77cca3a2ccf593f6669425830d0910afac3cf2c46dd385454a6fb3b4bd604ae13b9586087d6f22de644f9dfc7
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
219KB
MD5f33a619c22fe75839239ff060d6880fa
SHA162f648780a48a3e4d9b274bf0109b4527d006e53
SHA256af2e1cfc88e8ef97dc862794ce3f6a3b8e44efb6bbf2e46c7fd968102fdc5255
SHA5129e88cb5079a5555bcc8f3c7d35131e2acf20784bec7e295191bd9869d078ef5b2d02ec63e981e31b5069078415f261d9825b9355893afde07df9a097179e05ad
-
Filesize
219KB
MD5f33a619c22fe75839239ff060d6880fa
SHA162f648780a48a3e4d9b274bf0109b4527d006e53
SHA256af2e1cfc88e8ef97dc862794ce3f6a3b8e44efb6bbf2e46c7fd968102fdc5255
SHA5129e88cb5079a5555bcc8f3c7d35131e2acf20784bec7e295191bd9869d078ef5b2d02ec63e981e31b5069078415f261d9825b9355893afde07df9a097179e05ad
-
Filesize
219KB
MD5f33a619c22fe75839239ff060d6880fa
SHA162f648780a48a3e4d9b274bf0109b4527d006e53
SHA256af2e1cfc88e8ef97dc862794ce3f6a3b8e44efb6bbf2e46c7fd968102fdc5255
SHA5129e88cb5079a5555bcc8f3c7d35131e2acf20784bec7e295191bd9869d078ef5b2d02ec63e981e31b5069078415f261d9825b9355893afde07df9a097179e05ad
-
Filesize
1.5MB
MD5665db9794d6e6e7052e7c469f48de771
SHA1ed9a3f9262f675a03a9f1f70856e3532b095c89f
SHA256c1b31186d170a2a5755f15682860b3cdc60eac7f97a2db9462dee7ca6fcbc196
SHA51269585560e8ac4a2472621dd4da4bf0e636688fc5d710521b0177461f773fcf2a4c7ddb86bc812ecb316985729013212ccfa4992cd1c98f166a4a510e17fcae74
-
Filesize
5.6MB
MD5bae29e49e8190bfbbf0d77ffab8de59d
SHA14a6352bb47c7e1666a60c76f9b17ca4707872bd9
SHA256f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87
SHA5129e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2
-
Filesize
1.5MB
MD5b224196c88f09b615527b2df0e860e49
SHA1f9ae161836a34264458d8c0b2a083c98093f1dec
SHA2562a11969fcc1df03533ad694a68d56f0e3a67ce359663c3cf228040ab5baa5ed8
SHA512d74376c5bd3ba19b8454a17f2f38ab64ad1005b6372c7e162230c822c38f6f8c7d87aef47ef04cb6dceedc731046c30efa6720098cc39b15addd17c809b8296d
-
Filesize
260KB
MD5f39a0110a564f4a1c6b96c03982906ec
SHA108e66c93b575c9ac0a18f06741dabcabc88a358b
SHA256f794a557ad952ff155b4bfe5665b3f448453c3a50c766478d070368cab69f481
SHA512c6659f926f95a8bed1ff779c8445470c3089823abe8c1199f591c313ecee0bd793478cdaab95905c0e8ae2a2b18737daabe887263b7cde1eaaa9ee6976ff7d00
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
273B
MD5a5b509a3fb95cc3c8d89cd39fc2a30fb
SHA15aff4266a9c0f2af440f28aa865cebc5ddb9cd5c
SHA2565f3c80056c7b1104c15d6fee49dac07e665c6ffd0795ad486803641ed619c529
SHA5123cc58d989c461a04f29acbfe03ed05f970b3b3e97e6819962fc5c853f55bce7f7aba0544a712e3a45ee52ab31943c898f6b3684d755b590e3e961ae5ecd1edb9
-
Filesize
239KB
MD51f200351be27f8b58dc855e8ce66fca5
SHA15e4eece380483b2dde6dabe0cc68b407b012303d
SHA256da40f76c0139def5b1a6a3be97792a1d7e5165398b1c3943ac294a7f1ac0f989
SHA5127320414828541c0d1134695bb2ccdbcb9da83fa184096566c76e68fce5548c6558f911cec7c889c1e32fe6f8fd595d6beb729e220944b8d4b89737e385aad08d