Analysis
-
max time kernel
126s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
24-10-2023 06:41
Static task
static1
Behavioral task
behavioral1
Sample
f8ed25a26cb7dd2d994ce2c66cb0c7e4e077aa2c3834eb434dbfcf6ea2b41028.exe
Resource
win10v2004-20231020-en
General
-
Target
f8ed25a26cb7dd2d994ce2c66cb0c7e4e077aa2c3834eb434dbfcf6ea2b41028.exe
-
Size
1.5MB
-
MD5
d755572d755b945ac32b7b2e7702b599
-
SHA1
0d1b2fbb4f949ef97e991d316613952663d5ab6f
-
SHA256
f8ed25a26cb7dd2d994ce2c66cb0c7e4e077aa2c3834eb434dbfcf6ea2b41028
-
SHA512
5bc1125f2cc11cb40f7b892cac2fc91cb0e4ed3ffb642a0f8ff755886fdc41b9d0effc30e65779f9f000f94478c9ab47ea29c9ceb47f42581ecbc0bea7b58f5b
-
SSDEEP
24576:DywGFL8DEJ9jfEDMkZ3lKGrpMRyOwTCZoHMBK5VGGmjM8LkuUO1mn1/ZTb7:WF8gZA8ylTbMBK5VGGmjM8LEvn1/ZTb
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
grome
77.91.124.86:19084
Extracted
amadey
3.89
http://77.91.124.1/theme/index.php
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
Extracted
redline
kinza
77.91.124.86:19084
Extracted
smokeloader
up3
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
DcRat 4 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f8ed25a26cb7dd2d994ce2c66cb0c7e4e077aa2c3834eb434dbfcf6ea2b41028.exe 3808 schtasks.exe 1848 schtasks.exe 5156 schtasks.exe -
Glupteba payload 9 IoCs
resource yara_rule behavioral1/memory/5308-901-0x0000000002FF0000-0x00000000038DB000-memory.dmp family_glupteba behavioral1/memory/5308-904-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/5308-974-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/5308-1052-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/5308-1053-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/7092-1122-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/7092-1170-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/6712-1257-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/6712-1303-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 3B53.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 3B53.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 3B53.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 3B53.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 3B53.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 9 IoCs
resource yara_rule behavioral1/memory/3748-51-0x0000000000400000-0x000000000043E000-memory.dmp family_redline behavioral1/files/0x0007000000022ecc-511.dat family_redline behavioral1/files/0x0007000000022ecc-512.dat family_redline behavioral1/memory/1324-548-0x00000000005E0000-0x000000000063A000-memory.dmp family_redline behavioral1/memory/5648-575-0x0000000000B10000-0x0000000000B4E000-memory.dmp family_redline behavioral1/memory/1324-713-0x0000000000400000-0x000000000047E000-memory.dmp family_redline behavioral1/memory/3464-828-0x0000000000670000-0x00000000006CA000-memory.dmp family_redline behavioral1/memory/1848-863-0x0000000000850000-0x00000000008AA000-memory.dmp family_redline behavioral1/memory/3464-928-0x0000000000400000-0x000000000047A000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 9 IoCs
description pid Process procid_target PID 2064 created 3356 2064 latestX.exe 44 PID 2064 created 3356 2064 latestX.exe 44 PID 2064 created 3356 2064 latestX.exe 44 PID 2064 created 3356 2064 latestX.exe 44 PID 2064 created 3356 2064 latestX.exe 44 PID 6764 created 3356 6764 updater.exe 44 PID 6764 created 3356 6764 updater.exe 44 PID 6764 created 3356 6764 updater.exe 44 PID 6764 created 3356 6764 updater.exe 44 -
Blocklisted process makes network request 40 IoCs
flow pid Process 158 1848 schtasks.exe 165 1848 schtasks.exe 220 5328 rundll32.exe 222 5328 rundll32.exe 226 5328 rundll32.exe 231 5328 rundll32.exe 233 5328 rundll32.exe 234 5328 rundll32.exe 235 5328 rundll32.exe 237 5328 rundll32.exe 238 5328 rundll32.exe 239 5328 rundll32.exe 240 5328 rundll32.exe 241 5328 rundll32.exe 242 5328 rundll32.exe 243 5328 rundll32.exe 244 5328 rundll32.exe 245 5328 rundll32.exe 246 5328 rundll32.exe 247 5328 rundll32.exe 248 5328 rundll32.exe 249 5328 rundll32.exe 250 5328 rundll32.exe 251 5328 rundll32.exe 252 5328 rundll32.exe 253 5328 rundll32.exe 254 5328 rundll32.exe 255 5328 rundll32.exe 259 5328 rundll32.exe 262 5328 rundll32.exe 267 5328 rundll32.exe 268 5328 rundll32.exe 269 5328 rundll32.exe 270 5328 rundll32.exe 271 5328 rundll32.exe 272 5328 rundll32.exe 273 5328 rundll32.exe 274 5328 rundll32.exe 275 5328 rundll32.exe 276 5328 rundll32.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\hosts latestX.exe File created C:\Windows\System32\drivers\etc\hosts updater.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4076 netsh.exe -
Stops running service(s) 3 TTPs
-
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation 5Nc7JI9.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation explothe.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation 6Dx7Nn2.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation 68ED.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation kos2.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation K.exe -
Executes dropped EXE 47 IoCs
pid Process 3964 bH5uh23.exe 4004 NE4cb01.exe 4728 Ue2Tt51.exe 4520 Rl5BJ02.exe 3432 1wc71as3.exe 3864 2uw3144.exe 3016 3Et46Cx.exe 1124 4mu650gB.exe 3280 5Nc7JI9.exe 3216 explothe.exe 692 6Dx7Nn2.exe 5828 3582.exe 1752 362F.exe 5688 WN8hE6Sw.exe 5072 mN0VX7sr.exe 5876 EA9Cy3Rt.exe 5904 Dw7mK7LP.exe 3828 39CB.exe 4636 1MP94vJ0.exe 3808 3B53.exe 3664 3CF9.exe 1324 4111.exe 5648 2Qi221mQ.exe 3996 68ED.exe 2828 6B50.exe 3832 6D74.exe 4808 toolspub2.exe 3464 7072.exe 5308 31839b57a4f11171d6abc8bbc4451ee4.exe 2580 kos2.exe 2064 latestX.exe 5928 is-SJCT7.tmp 2124 set16.exe 1848 schtasks.exe 4776 K.exe 5928 is-SJCT7.tmp 6380 toolspub2.exe 6500 MyBurn.exe 6780 MyBurn.exe 6372 explothe.exe 7092 31839b57a4f11171d6abc8bbc4451ee4.exe 6712 csrss.exe 6764 updater.exe 6096 injector.exe 4396 windefender.exe 6264 windefender.exe 4148 explothe.exe -
Loads dropped DLL 7 IoCs
pid Process 3464 7072.exe 3464 7072.exe 5328 rundll32.exe 5928 is-SJCT7.tmp 5928 is-SJCT7.tmp 5928 is-SJCT7.tmp 6988 rundll32.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/4396-1308-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 3B53.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 13 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f8ed25a26cb7dd2d994ce2c66cb0c7e4e077aa2c3834eb434dbfcf6ea2b41028.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" Ue2Tt51.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" bH5uh23.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" WN8hE6Sw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" NE4cb01.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3582.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" EA9Cy3Rt.exe Set value (str) \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\socks5 = "powershell.exe -windowstyle hidden -Command \"& 'C:\\Users\\Admin\\AppData\\Local\\Temp\\6B50.exe'\"" 6B50.exe Set value (str) \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" Rl5BJ02.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" mN0VX7sr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP005.TMP\\\"" Dw7mK7LP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 31839b57a4f11171d6abc8bbc4451ee4.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3432 set thread context of 4376 3432 1wc71as3.exe 93 PID 1124 set thread context of 3748 1124 4mu650gB.exe 99 PID 4636 set thread context of 5136 4636 1MP94vJ0.exe 169 PID 4808 set thread context of 6380 4808 toolspub2.exe 202 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 31839b57a4f11171d6abc8bbc4451ee4.exe -
Drops file in Program Files directory 13 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\MyBurn\unins000.dat is-SJCT7.tmp File opened for modification C:\Program Files (x86)\MyBurn\MyBurn.exe is-SJCT7.tmp File created C:\Program Files (x86)\MyBurn\unins000.dat is-SJCT7.tmp File created C:\Program Files (x86)\MyBurn\Sounds\is-4G44C.tmp is-SJCT7.tmp File created C:\Program Files (x86)\MyBurn\Sounds\is-QVM3C.tmp is-SJCT7.tmp File created C:\Program Files (x86)\MyBurn\is-579SJ.tmp is-SJCT7.tmp File created C:\Program Files (x86)\MyBurn\is-R9CMD.tmp is-SJCT7.tmp File created C:\Program Files (x86)\MyBurn\is-5K0KT.tmp is-SJCT7.tmp File created C:\Program Files (x86)\MyBurn\is-6D0V8.tmp is-SJCT7.tmp File created C:\Program Files (x86)\MyBurn\is-N4HCV.tmp is-SJCT7.tmp File created C:\Program Files (x86)\MyBurn\is-52D9O.tmp is-SJCT7.tmp File created C:\Program Files (x86)\MyBurn\is-HGHSR.tmp is-SJCT7.tmp File created C:\Program Files\Google\Chrome\updater.exe latestX.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\Wanugegulaho milorahaxah mosuraxupib rusekutokefod bopujune 7072.exe File opened for modification C:\Windows\rss 31839b57a4f11171d6abc8bbc4451ee4.exe File created C:\Windows\rss\csrss.exe 31839b57a4f11171d6abc8bbc4451ee4.exe File created C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 11 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 6488 sc.exe 1184 sc.exe 6180 sc.exe 6160 sc.exe 6208 sc.exe 3520 sc.exe 6748 sc.exe 6792 sc.exe 6908 sc.exe 456 sc.exe 1784 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 5380 5136 WerFault.exe 169 824 3464 WerFault.exe 187 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3Et46Cx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3Et46Cx.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3Et46Cx.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3808 schtasks.exe 1848 schtasks.exe 5156 schtasks.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-31 = "Mid-Atlantic Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2431 = "Cuba Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-672 = "AUS Eastern Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-461 = "Afghanistan Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-272 = "Greenwich Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-211 = "Pacific Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-152 = "Central America Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-532 = "Sri Lanka Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1841 = "Russia TZ 4 Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-751 = "Tonga Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-201 = "US Mountain Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-632 = "Tokyo Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-691 = "Tasmania Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-81 = "Atlantic Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2452 = "Saint Pierre Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1411 = "Syria Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-721 = "Central Pacific Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2342 = "Haiti Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1871 = "Russia TZ 7 Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-391 = "Arab Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-572 = "China Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3016 3Et46Cx.exe 3016 3Et46Cx.exe 4376 AppLaunch.exe 4376 AppLaunch.exe 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE 3356 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3356 Explorer.EXE -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 3016 3Et46Cx.exe 6380 toolspub2.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 17 IoCs
pid Process 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4376 AppLaunch.exe Token: SeShutdownPrivilege 3356 Explorer.EXE Token: SeCreatePagefilePrivilege 3356 Explorer.EXE Token: SeShutdownPrivilege 3356 Explorer.EXE Token: SeCreatePagefilePrivilege 3356 Explorer.EXE Token: SeShutdownPrivilege 3356 Explorer.EXE Token: SeCreatePagefilePrivilege 3356 Explorer.EXE Token: SeShutdownPrivilege 3356 Explorer.EXE Token: SeCreatePagefilePrivilege 3356 Explorer.EXE Token: SeShutdownPrivilege 3356 Explorer.EXE Token: SeCreatePagefilePrivilege 3356 Explorer.EXE Token: SeShutdownPrivilege 3356 Explorer.EXE Token: SeCreatePagefilePrivilege 3356 Explorer.EXE Token: SeShutdownPrivilege 3356 Explorer.EXE Token: SeCreatePagefilePrivilege 3356 Explorer.EXE Token: SeShutdownPrivilege 3356 Explorer.EXE Token: SeCreatePagefilePrivilege 3356 Explorer.EXE Token: SeShutdownPrivilege 3356 Explorer.EXE Token: SeCreatePagefilePrivilege 3356 Explorer.EXE Token: SeShutdownPrivilege 3356 Explorer.EXE Token: SeCreatePagefilePrivilege 3356 Explorer.EXE Token: SeShutdownPrivilege 3356 Explorer.EXE Token: SeCreatePagefilePrivilege 3356 Explorer.EXE Token: SeShutdownPrivilege 3356 Explorer.EXE Token: SeCreatePagefilePrivilege 3356 Explorer.EXE Token: SeShutdownPrivilege 3356 Explorer.EXE Token: SeCreatePagefilePrivilege 3356 Explorer.EXE Token: SeShutdownPrivilege 3356 Explorer.EXE Token: SeCreatePagefilePrivilege 3356 Explorer.EXE Token: SeShutdownPrivilege 3356 Explorer.EXE Token: SeCreatePagefilePrivilege 3356 Explorer.EXE Token: SeShutdownPrivilege 3356 Explorer.EXE Token: SeCreatePagefilePrivilege 3356 Explorer.EXE Token: SeShutdownPrivilege 3356 Explorer.EXE Token: SeCreatePagefilePrivilege 3356 Explorer.EXE Token: SeShutdownPrivilege 3356 Explorer.EXE Token: SeCreatePagefilePrivilege 3356 Explorer.EXE Token: SeShutdownPrivilege 3356 Explorer.EXE Token: SeCreatePagefilePrivilege 3356 Explorer.EXE Token: SeDebugPrivilege 3808 3B53.exe Token: SeShutdownPrivilege 3356 Explorer.EXE Token: SeCreatePagefilePrivilege 3356 Explorer.EXE Token: SeShutdownPrivilege 3356 Explorer.EXE Token: SeCreatePagefilePrivilege 3356 Explorer.EXE Token: SeShutdownPrivilege 3356 Explorer.EXE Token: SeCreatePagefilePrivilege 3356 Explorer.EXE Token: SeShutdownPrivilege 3356 Explorer.EXE Token: SeCreatePagefilePrivilege 3356 Explorer.EXE Token: SeShutdownPrivilege 3356 Explorer.EXE Token: SeCreatePagefilePrivilege 3356 Explorer.EXE Token: SeShutdownPrivilege 3356 Explorer.EXE Token: SeCreatePagefilePrivilege 3356 Explorer.EXE Token: SeShutdownPrivilege 3356 Explorer.EXE Token: SeCreatePagefilePrivilege 3356 Explorer.EXE Token: SeShutdownPrivilege 3356 Explorer.EXE Token: SeCreatePagefilePrivilege 3356 Explorer.EXE Token: SeShutdownPrivilege 3356 Explorer.EXE Token: SeCreatePagefilePrivilege 3356 Explorer.EXE Token: SeShutdownPrivilege 3356 Explorer.EXE Token: SeCreatePagefilePrivilege 3356 Explorer.EXE Token: SeShutdownPrivilege 3356 Explorer.EXE Token: SeCreatePagefilePrivilege 3356 Explorer.EXE Token: SeShutdownPrivilege 3356 Explorer.EXE Token: SeCreatePagefilePrivilege 3356 Explorer.EXE -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 3356 Explorer.EXE 3356 Explorer.EXE -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2280 wrote to memory of 3964 2280 f8ed25a26cb7dd2d994ce2c66cb0c7e4e077aa2c3834eb434dbfcf6ea2b41028.exe 87 PID 2280 wrote to memory of 3964 2280 f8ed25a26cb7dd2d994ce2c66cb0c7e4e077aa2c3834eb434dbfcf6ea2b41028.exe 87 PID 2280 wrote to memory of 3964 2280 f8ed25a26cb7dd2d994ce2c66cb0c7e4e077aa2c3834eb434dbfcf6ea2b41028.exe 87 PID 3964 wrote to memory of 4004 3964 bH5uh23.exe 88 PID 3964 wrote to memory of 4004 3964 bH5uh23.exe 88 PID 3964 wrote to memory of 4004 3964 bH5uh23.exe 88 PID 4004 wrote to memory of 4728 4004 NE4cb01.exe 90 PID 4004 wrote to memory of 4728 4004 NE4cb01.exe 90 PID 4004 wrote to memory of 4728 4004 NE4cb01.exe 90 PID 4728 wrote to memory of 4520 4728 Ue2Tt51.exe 91 PID 4728 wrote to memory of 4520 4728 Ue2Tt51.exe 91 PID 4728 wrote to memory of 4520 4728 Ue2Tt51.exe 91 PID 4520 wrote to memory of 3432 4520 Rl5BJ02.exe 92 PID 4520 wrote to memory of 3432 4520 Rl5BJ02.exe 92 PID 4520 wrote to memory of 3432 4520 Rl5BJ02.exe 92 PID 3432 wrote to memory of 4376 3432 1wc71as3.exe 93 PID 3432 wrote to memory of 4376 3432 1wc71as3.exe 93 PID 3432 wrote to memory of 4376 3432 1wc71as3.exe 93 PID 3432 wrote to memory of 4376 3432 1wc71as3.exe 93 PID 3432 wrote to memory of 4376 3432 1wc71as3.exe 93 PID 3432 wrote to memory of 4376 3432 1wc71as3.exe 93 PID 3432 wrote to memory of 4376 3432 1wc71as3.exe 93 PID 3432 wrote to memory of 4376 3432 1wc71as3.exe 93 PID 4520 wrote to memory of 3864 4520 Rl5BJ02.exe 94 PID 4520 wrote to memory of 3864 4520 Rl5BJ02.exe 94 PID 4520 wrote to memory of 3864 4520 Rl5BJ02.exe 94 PID 4728 wrote to memory of 3016 4728 Ue2Tt51.exe 95 PID 4728 wrote to memory of 3016 4728 Ue2Tt51.exe 95 PID 4728 wrote to memory of 3016 4728 Ue2Tt51.exe 95 PID 4004 wrote to memory of 1124 4004 NE4cb01.exe 98 PID 4004 wrote to memory of 1124 4004 NE4cb01.exe 98 PID 4004 wrote to memory of 1124 4004 NE4cb01.exe 98 PID 1124 wrote to memory of 3748 1124 4mu650gB.exe 99 PID 1124 wrote to memory of 3748 1124 4mu650gB.exe 99 PID 1124 wrote to memory of 3748 1124 4mu650gB.exe 99 PID 1124 wrote to memory of 3748 1124 4mu650gB.exe 99 PID 1124 wrote to memory of 3748 1124 4mu650gB.exe 99 PID 1124 wrote to memory of 3748 1124 4mu650gB.exe 99 PID 1124 wrote to memory of 3748 1124 4mu650gB.exe 99 PID 1124 wrote to memory of 3748 1124 4mu650gB.exe 99 PID 3964 wrote to memory of 3280 3964 bH5uh23.exe 100 PID 3964 wrote to memory of 3280 3964 bH5uh23.exe 100 PID 3964 wrote to memory of 3280 3964 bH5uh23.exe 100 PID 3280 wrote to memory of 3216 3280 5Nc7JI9.exe 101 PID 3280 wrote to memory of 3216 3280 5Nc7JI9.exe 101 PID 3280 wrote to memory of 3216 3280 5Nc7JI9.exe 101 PID 2280 wrote to memory of 692 2280 f8ed25a26cb7dd2d994ce2c66cb0c7e4e077aa2c3834eb434dbfcf6ea2b41028.exe 102 PID 2280 wrote to memory of 692 2280 f8ed25a26cb7dd2d994ce2c66cb0c7e4e077aa2c3834eb434dbfcf6ea2b41028.exe 102 PID 2280 wrote to memory of 692 2280 f8ed25a26cb7dd2d994ce2c66cb0c7e4e077aa2c3834eb434dbfcf6ea2b41028.exe 102 PID 3216 wrote to memory of 3808 3216 explothe.exe 103 PID 3216 wrote to memory of 3808 3216 explothe.exe 103 PID 3216 wrote to memory of 3808 3216 explothe.exe 103 PID 3216 wrote to memory of 2748 3216 explothe.exe 105 PID 3216 wrote to memory of 2748 3216 explothe.exe 105 PID 3216 wrote to memory of 2748 3216 explothe.exe 105 PID 692 wrote to memory of 4788 692 6Dx7Nn2.exe 107 PID 692 wrote to memory of 4788 692 6Dx7Nn2.exe 107 PID 2748 wrote to memory of 660 2748 cmd.exe 109 PID 2748 wrote to memory of 660 2748 cmd.exe 109 PID 2748 wrote to memory of 660 2748 cmd.exe 109 PID 2748 wrote to memory of 4488 2748 cmd.exe 110 PID 2748 wrote to memory of 4488 2748 cmd.exe 110 PID 2748 wrote to memory of 4488 2748 cmd.exe 110 PID 2748 wrote to memory of 4976 2748 cmd.exe 112 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3356 -
C:\Users\Admin\AppData\Local\Temp\f8ed25a26cb7dd2d994ce2c66cb0c7e4e077aa2c3834eb434dbfcf6ea2b41028.exe"C:\Users\Admin\AppData\Local\Temp\f8ed25a26cb7dd2d994ce2c66cb0c7e4e077aa2c3834eb434dbfcf6ea2b41028.exe"2⤵
- DcRat
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\bH5uh23.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\bH5uh23.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\NE4cb01.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\NE4cb01.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Ue2Tt51.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Ue2Tt51.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Rl5BJ02.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Rl5BJ02.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1wc71as3.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1wc71as3.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4376
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2uw3144.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2uw3144.exe7⤵
- Executes dropped EXE
PID:3864
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\3Et46Cx.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\3Et46Cx.exe6⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3016
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\4mu650gB.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\4mu650gB.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:3748
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\5Nc7JI9.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\5Nc7JI9.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F6⤵
- DcRat
- Creates scheduled task(s)
PID:3808
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:660
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:N"7⤵PID:4488
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:R" /E7⤵PID:4976
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:4472
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:832
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:2708
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:6988
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\6Dx7Nn2.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\6Dx7Nn2.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\F08A.tmp\F08B.tmp\F08C.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\6Dx7Nn2.exe"4⤵PID:4788
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/login5⤵PID:452
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x168,0x16c,0x170,0x144,0x174,0x7ff9658246f8,0x7ff965824708,0x7ff9658247186⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,14326870431569867459,3811921895927784549,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2212 /prefetch:26⤵PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,14326870431569867459,3811921895927784549,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:36⤵PID:4636
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/5⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1880 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ff9658246f8,0x7ff965824708,0x7ff9658247186⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2004,2299133954415715754,15359456079129802948,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 /prefetch:36⤵PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,2299133954415715754,15359456079129802948,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:26⤵PID:1232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2004,2299133954415715754,15359456079129802948,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2596 /prefetch:86⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,2299133954415715754,15359456079129802948,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:16⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,2299133954415715754,15359456079129802948,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:16⤵PID:1564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,2299133954415715754,15359456079129802948,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3960 /prefetch:16⤵PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,2299133954415715754,15359456079129802948,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4136 /prefetch:16⤵PID:5172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,2299133954415715754,15359456079129802948,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:16⤵PID:5340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,2299133954415715754,15359456079129802948,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:16⤵PID:5420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,2299133954415715754,15359456079129802948,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5892 /prefetch:86⤵PID:884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,2299133954415715754,15359456079129802948,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5892 /prefetch:86⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,2299133954415715754,15359456079129802948,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5976 /prefetch:16⤵PID:5300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,2299133954415715754,15359456079129802948,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6016 /prefetch:16⤵PID:5308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2004,2299133954415715754,15359456079129802948,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4356 /prefetch:86⤵PID:5676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,2299133954415715754,15359456079129802948,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4964 /prefetch:16⤵PID:3812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,2299133954415715754,15359456079129802948,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:16⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,2299133954415715754,15359456079129802948,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6592 /prefetch:16⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,2299133954415715754,15359456079129802948,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6552 /prefetch:16⤵PID:3112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,2299133954415715754,15359456079129802948,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6504 /prefetch:16⤵PID:2060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,2299133954415715754,15359456079129802948,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5944 /prefetch:16⤵PID:5384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,2299133954415715754,15359456079129802948,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:16⤵PID:6068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,2299133954415715754,15359456079129802948,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5580 /prefetch:16⤵PID:5580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,2299133954415715754,15359456079129802948,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6836 /prefetch:16⤵PID:5424
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/5⤵PID:400
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ff9658246f8,0x7ff965824708,0x7ff9658247186⤵PID:1612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2032,13604313772488624260,11464216323762048796,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2424 /prefetch:36⤵PID:2060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,13604313772488624260,11464216323762048796,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2044 /prefetch:26⤵PID:1844
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\3582.exeC:\Users\Admin\AppData\Local\Temp\3582.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5828 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\WN8hE6Sw.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\WN8hE6Sw.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5688 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\mN0VX7sr.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\mN0VX7sr.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\EA9Cy3Rt.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\EA9Cy3Rt.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5876 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\Dw7mK7LP.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\Dw7mK7LP.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5904 -
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\1MP94vJ0.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\1MP94vJ0.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4636 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵PID:5136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5136 -s 5409⤵
- Program crash
PID:5380
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\2Qi221mQ.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\2Qi221mQ.exe7⤵
- Executes dropped EXE
PID:5648
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\362F.exeC:\Users\Admin\AppData\Local\Temp\362F.exe2⤵
- Executes dropped EXE
PID:1752
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3797.bat" "2⤵PID:5384
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/login3⤵PID:5988
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9658246f8,0x7ff965824708,0x7ff9658247184⤵PID:780
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/3⤵PID:2016
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ff9658246f8,0x7ff965824708,0x7ff9658247184⤵PID:1840
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\39CB.exeC:\Users\Admin\AppData\Local\Temp\39CB.exe2⤵
- Executes dropped EXE
PID:3828
-
-
C:\Users\Admin\AppData\Local\Temp\3B53.exeC:\Users\Admin\AppData\Local\Temp\3B53.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious use of AdjustPrivilegeToken
PID:3808
-
-
C:\Users\Admin\AppData\Local\Temp\3CF9.exeC:\Users\Admin\AppData\Local\Temp\3CF9.exe2⤵
- Executes dropped EXE
PID:3664
-
-
C:\Users\Admin\AppData\Local\Temp\4111.exeC:\Users\Admin\AppData\Local\Temp\4111.exe2⤵
- Executes dropped EXE
PID:1324 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=4111.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.03⤵PID:5960
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9658246f8,0x7ff965824708,0x7ff9658247184⤵PID:5992
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=4111.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.03⤵PID:3224
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x9c,0x108,0x7ff9658246f8,0x7ff965824708,0x7ff9658247184⤵PID:1716
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\68ED.exeC:\Users\Admin\AppData\Local\Temp\68ED.exe2⤵
- Checks computer location settings
- Executes dropped EXE
PID:3996 -
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:6380
-
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"3⤵
- Executes dropped EXE
PID:5308 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:6352
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:7092 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:7164
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:4780
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:4076
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:5908
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:5864
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
PID:6712 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3908
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- DcRat
- Blocklisted process makes network request
- Executes dropped EXE
- Creates scheduled task(s)
PID:1848
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f6⤵PID:4444
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:64
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1944
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll6⤵
- Executes dropped EXE
PID:6096
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- DcRat
- Creates scheduled task(s)
PID:5156
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"6⤵
- Executes dropped EXE
PID:4396 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵PID:6868
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)8⤵
- Launches sc.exe
PID:456
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\kos2.exe"C:\Users\Admin\AppData\Local\Temp\kos2.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\K.exe"C:\Users\Admin\AppData\Local\Temp\K.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
PID:4776
-
-
C:\Users\Admin\AppData\Local\Temp\set16.exe"C:\Users\Admin\AppData\Local\Temp\set16.exe"4⤵
- Executes dropped EXE
PID:2124
-
-
-
C:\Users\Admin\AppData\Local\Temp\latestX.exe"C:\Users\Admin\AppData\Local\Temp\latestX.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Program Files directory
PID:2064
-
-
-
C:\Users\Admin\AppData\Local\Temp\6B50.exeC:\Users\Admin\AppData\Local\Temp\6B50.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2828
-
-
C:\Users\Admin\AppData\Local\Temp\6D74.exeC:\Users\Admin\AppData\Local\Temp\6D74.exe2⤵
- Executes dropped EXE
PID:3832
-
-
C:\Users\Admin\AppData\Local\Temp\7072.exeC:\Users\Admin\AppData\Local\Temp\7072.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:3464 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3464 -s 7843⤵
- Program crash
PID:824
-
-
-
C:\Users\Admin\AppData\Local\Temp\76DC.exeC:\Users\Admin\AppData\Local\Temp\76DC.exe2⤵PID:5928
-
-
C:\Users\Admin\AppData\Local\Temp\7AA6.exeC:\Users\Admin\AppData\Local\Temp\7AA6.exe2⤵PID:1848
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵PID:6468
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:6320
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:1784
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:6792
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:6748
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:6488
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:6908
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵PID:1572
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:4224
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:4376
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:5336
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:1140
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:4456
-
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:6900
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2736
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:5892
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:1184
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:6180
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:6160
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:6208
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:3520
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:6228
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:6668
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:6276
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:7016
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:5668
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Modifies data under HKEY_USERS
PID:5692
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:6832
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:6600
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1988
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5144
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵PID:5676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 5136 -ip 51361⤵PID:5432
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3464 -ip 34641⤵PID:5316
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe bdddadbacd.sys,#11⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:5328
-
C:\Users\Admin\AppData\Local\Temp\is-H0LMB.tmp\is-SJCT7.tmp"C:\Users\Admin\AppData\Local\Temp\is-H0LMB.tmp\is-SJCT7.tmp" /SL4 $B0060 "C:\Users\Admin\AppData\Local\Temp\set16.exe" 1281875 522241⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
PID:5928 -
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe bdddadbacd.sys,#12⤵PID:5468
-
-
C:\Program Files (x86)\MyBurn\MyBurn.exe"C:\Program Files (x86)\MyBurn\MyBurn.exe" -i2⤵
- Executes dropped EXE
PID:6500
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 202⤵PID:6488
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 203⤵PID:6628
-
-
-
C:\Program Files (x86)\MyBurn\MyBurn.exe"C:\Program Files (x86)\MyBurn\MyBurn.exe" -s2⤵
- Executes dropped EXE
PID:6780
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Query2⤵PID:6772
-
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:6372
-
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
PID:6764
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
PID:6264
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:4148
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56dded92ec95cf9f22410bdeac841a00d
SHA183c32c23d53c59d654868f0b2a5c6be0a46249c2
SHA2561840d5c60c79874359414677662439087173c575d814c07ebe661ae1cebb639e
SHA512e13df653c0364be2b61619fe3d46799e10a565b41f33d3ce15e50397f8f9aa328e8c821212efe10cfe3b8283c1e8c7e9eb15f9674fc456837d6ee8c38bc8b0d8
-
Filesize
152B
MD56dded92ec95cf9f22410bdeac841a00d
SHA183c32c23d53c59d654868f0b2a5c6be0a46249c2
SHA2561840d5c60c79874359414677662439087173c575d814c07ebe661ae1cebb639e
SHA512e13df653c0364be2b61619fe3d46799e10a565b41f33d3ce15e50397f8f9aa328e8c821212efe10cfe3b8283c1e8c7e9eb15f9674fc456837d6ee8c38bc8b0d8
-
Filesize
152B
MD56f9bc20747520b37b3f22c169195824e
SHA1de0472972d51b2d9419ff0d714706bef0c6f81d8
SHA256a176ef484b676f39eaefe30f33df548ef0e4e3b34c4651ac3fb4351404d288b0
SHA512179e5be96746cfbcc9483de68527d96464f3ce6cb09dc4b5e546a93c5e1dad36ab842a4cdfa336169af4ca459bdc42a2cac72e577699a455ffb7efd9c1c80f11
-
Filesize
152B
MD56dded92ec95cf9f22410bdeac841a00d
SHA183c32c23d53c59d654868f0b2a5c6be0a46249c2
SHA2561840d5c60c79874359414677662439087173c575d814c07ebe661ae1cebb639e
SHA512e13df653c0364be2b61619fe3d46799e10a565b41f33d3ce15e50397f8f9aa328e8c821212efe10cfe3b8283c1e8c7e9eb15f9674fc456837d6ee8c38bc8b0d8
-
Filesize
152B
MD56dded92ec95cf9f22410bdeac841a00d
SHA183c32c23d53c59d654868f0b2a5c6be0a46249c2
SHA2561840d5c60c79874359414677662439087173c575d814c07ebe661ae1cebb639e
SHA512e13df653c0364be2b61619fe3d46799e10a565b41f33d3ce15e50397f8f9aa328e8c821212efe10cfe3b8283c1e8c7e9eb15f9674fc456837d6ee8c38bc8b0d8
-
Filesize
152B
MD56dded92ec95cf9f22410bdeac841a00d
SHA183c32c23d53c59d654868f0b2a5c6be0a46249c2
SHA2561840d5c60c79874359414677662439087173c575d814c07ebe661ae1cebb639e
SHA512e13df653c0364be2b61619fe3d46799e10a565b41f33d3ce15e50397f8f9aa328e8c821212efe10cfe3b8283c1e8c7e9eb15f9674fc456837d6ee8c38bc8b0d8
-
Filesize
152B
MD56dded92ec95cf9f22410bdeac841a00d
SHA183c32c23d53c59d654868f0b2a5c6be0a46249c2
SHA2561840d5c60c79874359414677662439087173c575d814c07ebe661ae1cebb639e
SHA512e13df653c0364be2b61619fe3d46799e10a565b41f33d3ce15e50397f8f9aa328e8c821212efe10cfe3b8283c1e8c7e9eb15f9674fc456837d6ee8c38bc8b0d8
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5c6f056357c9182e3a81b9caa9bf5ed44
SHA1a330308a1c914b9ae2d09d2ae7477b5970b203d4
SHA256337a77866c866aac61f942e00fc47615a85c91f0f1e5db43e4f472ae49573580
SHA51207a2888015a929015f47bf4d811a150420d0079360d6016414c991853dfb764c1ac1eeaba151879bd7d984527b78ad9470dc86b9b2d188bb5fafc4cd67fbdc1b
-
Filesize
6KB
MD5df6472cfcd42f7d51a96e37074f494f3
SHA1b0368d0870f42f8b43a7416428b77568f7c5f010
SHA2560eb641478fd4c03fb0b93878031dd5b960e88dcc9146fd888a3cb98ea5393de8
SHA512c2d0ff4a08e9147733e22e7e7daa1be185b331d0af002d1045a00964a84905ae3b1a64d9d71d1a37abd35bf30fc5870f7d2221e2568912c778d184da128628cf
-
Filesize
7KB
MD54e0c6ce0d51f1de9f5a1c26694ed74e9
SHA124dcd79aec4f75bbd85539e04804ef92c8cd5e59
SHA256d385d524f7cd3831f756efbe5d4e7576b56d929b3eb39b64b08da9042c8a5190
SHA512f7d6eb329fb70991f748424598eece84cd58d536d6634fbea0999fb446e5327806bf1622b0fcfa9aebaafd934e49db2b53d6e8a412d8bc614f989af7e395596b
-
Filesize
7KB
MD5ac53c04e23cb7fcc92358b4a083cadf7
SHA117d9b1c70ad2df84cbc342ad74233b90fc9a6e98
SHA256987f32cdac7bdb56203a294372c2102cddc5b867c19f25c3cab7c2657c79f69f
SHA51211daec71f351a0587094cc2803bdfd414f0692fa12e9be369d361eae5cf6c24e9e563a0b287afdf69912ae1d23570cc3f669643ec91fc371177d4e558ec08dcc
-
Filesize
24KB
MD5e05436aebb117e9919978ca32bbcefd9
SHA197b2af055317952ce42308ea69b82301320eb962
SHA256cc9bd0953e70356e31a957ad9a9b1926f5e2a9f6a297cdef303ac693a2a86b7f
SHA51211328e9514ffaa3c1eab84fae06595d75c8503bd5601adfd806182d46065752885a871b738439b356d1bb2c1ac71fc81e9d46bd2d0daa1b2ba0f40543bf952b9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\ce85c272-a38f-4c3d-b9de-2c75d428a1d1\index-dir\the-real-index
Filesize624B
MD5f0c1c5ab805ae397d49f1d33ac6d87c4
SHA1fdc9da10441a068b162650d007fe07d774b9f97a
SHA2563e110c201353ccb1d2f2a990a45465577faec1546e6e5cf5c5326553867bd984
SHA5125de37704d8f06daff509eb9fb91cf541828accddf10cbe3b4a7d372e9e4540c8bbed380d6f4dcf6a88e023c3d9e42def48e2b85cbbd3e0f3abc68ebd416dbd2a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\ce85c272-a38f-4c3d-b9de-2c75d428a1d1\index-dir\the-real-index~RFe587d0b.TMP
Filesize48B
MD57ebe2b460a770e17ad10c11fc654b4e5
SHA1ad9293d2b9c5edbfa76f636f333ca5cb53c74a03
SHA256ff7a89880dfc9e83325b599b525a256d7a983d508b987b660a55f1d3842e2d50
SHA512b3e9c90d1b569d0d95ed619c9d419483e2b5321a622eef31c79f2d5536271580ae91c59b7807fc858f7a124f8bf60efb65d59cc4643f4f4416689e8d37453634
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize89B
MD56cf77004582e26f7b6a048221fb52714
SHA1a545e0d5d3fec4ac66672432a0f32e628884246d
SHA256c3c46182df716aeda477acf2a1c32fc2d6281a69874fb0f4e4dd58cf07b41a5c
SHA512668cde5166ada2898d386dce259b79df49022f3b0fee31105d38295a773e133a74078f051efe5eb401d1374760ec553529b89f098dd28755e7b2b04604fe6551
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize155B
MD567001995747b784d19b7d73b415663d2
SHA1aeeba00f717cd66ff6aa8d1f954643c0a26d6450
SHA25674dddcee3c0caed9f19efe11f1ac6891af727b49c3ee3c6dcef72dc1537888a7
SHA5126802a9bcc0c910278463da14f8429ff44e6588b2a37a0a968dac95b02c51f6ee49f8c7e5353fdd3020dbb401ddcec3537e76abb7d92350bb87ba8189633bb57a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize146B
MD528d61c2c85c4f47e9fffc2b435054622
SHA1f3c607f79c7c85d496c294364f3ce5e0bb75b1b2
SHA25678609cda963df5b9f0c5f2e90c4a0098342fcf76e8660ead87ddf8a4fd5aa45b
SHA51201a19c9ff829e1e8669cfff038ee9623107481a2a4c2fec9a603cfe2cfbaba1e134df7c9aa5abf45e180378e80b158e2deadb435c5bb9c25814e96151d66cf6d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize82B
MD5335b937a4cfd63d71ab187832bc8942a
SHA1a0855b50192b686cd744ac45c19ef9a8c1e8a266
SHA256b989b0ee1b8b8050340a46525d0bc19cb5fd420454a0cc82ccf0c088b4ed13af
SHA512d9538c97b85a67ddfb89be3ee84ebfa044534d2212f7b7775e141b1097b706c46e328e59050248273d2264297fec31920691c72a3b217250fb7b15514782a0a3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize151B
MD5016a327cfd3ece129ee9fe51dcb249fd
SHA1929efaad9b5173c0b49cee216c8530b6c785133a
SHA2564e5e06042d94d300e21488e87f265a932a4cfced1595f01b842b7dda9e624bcb
SHA5122e3aa22535bf4913f772b0285598ae16adc482263be62be7f98c0745fd8fdb47d5d9c7ce245379588739fa6dbeb064abfb3c0c7b800c4848b5b07bc49ddbd485
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize96B
MD5f4b00da02eb71302040967ac3790a523
SHA12004b9730bbe62c640e73565ab19123e5f640538
SHA256b07b6251540fde007eb90e422a7decfcf97266e9048cb8656518e16c6ea4ad38
SHA5121a0bc5b93cbacaed0b9019235c1724bd86c6d1698c793485965f625b9af4ef28381dc2f8adeddf7fb0368ea9c990d09707df3a058bdad4613a0008cbdca3c153
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe587068.TMP
Filesize48B
MD58c8ba550631cb586afb8e6a8c5345b4e
SHA1fcf7d711d38b7e12f556036373fa9bf2bcf310bd
SHA256e097ea420153ead73eeba9f9b2c450469b2e05c67c195b4a239b8295ee18a1cd
SHA512cf55443acadf15fa4df26c8b2f41ddb9f1deca02b3171c29e0e808b9dac025c59f480115182514c8f1794f90c9aa3869a8616c135103a1bf7eb4906902622673
-
Filesize
1KB
MD5d9dbec8fac735bb7f71e3e8a01d53944
SHA123afbba2c2dc2ad6fb3171fd8182e7cf14184bac
SHA256a43956f05c2d1d1755febd4d1c850569f9ccea84ceb9f368d438de0ac6ddb66a
SHA5129c4ea3b269396d6019aede62460602517d01720ff8f61dff5656fbfb9734c109449b3f5eb9a0b1706674c4fa4c6a4af03dc92478c024b781bbf650b8e7464d67
-
Filesize
1KB
MD5b6c70a270182de27d4b6c41cba0671c1
SHA1999af9078fb30a912fcbe9217ba70aa4ad8de1b2
SHA25620d3892acce160d386317e7cbdff2160e9368d5cd37776d28c184719a11eeaa1
SHA512befb3e8ab8fdb0a03f49e7082467e919dc4591ce528f92fa750ca351f044d262e798c2a334ed93a0bda37ad99c2b30f865b45041567ff2a4c0ac464bb00a5667
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD563d2e8b5edcd221bd625a1393dc0f475
SHA1fcfe350ce1e621901be79ff940d7eb152b6db1d3
SHA2563e668b4763c0d7c9750b2ccd10ee870e00a23b0ec95a46c0cccd2421eb78f5de
SHA512097b67d1e3c6c48a1df09816efe964721f40a459806d5f227d47f9555967c8b1397964f3d839ccc76b0d98ee367fdb298f908d8d4c0ba8e1bc20749af75b9e5a
-
Filesize
2KB
MD526e1e39d51da3d95485f59e2d541740b
SHA1564548ad250cbad9f6249b68f8ce1941946c3d18
SHA2564654c900df3aacc7446fd52abcffbd7c25f20803dfde9946f36720e7421cdc14
SHA512fae2718793422a4fe343d73db75841c4ee6fa7bae3b83a6d07b8dc14c8234ceb3e069cc1ed5d6707a6d47e13eea57627a4946eb2b63df1ccdfa79173d04b4507
-
Filesize
4.2MB
MD5ea6cb5dbc7d10b59c3e1e386b2dbbab5
SHA1578a5b046c316ccb2ce6f4571a1a6f531f41f89c
SHA256443d03b8d3a782b2020740dc49c5cc97eb98ca4543b94427a0886df3f2a71132
SHA512590355ea716bac8372d0fac1e878819f2e67d279e32ef787ff11cbe8a870e04d1a77233e7f9f29d303ff11a90096ebae6c5a41f1ab94abb82c0710357fc23200
-
Filesize
1.7MB
MD50a2c8bc6c80293890c5f759276ff6a11
SHA1d488442bce8e1c2ac2247e98c14ca2db4385800f
SHA25652bd35e92b25fa394ef3811f27f4d1bc260d51b515d9fea78fed85efc885fb7e
SHA512b21322d0ed09db70dc83697cc1cb9198ca8b39aeead50826677b73a11fe287cd00c05ca946b7d4fb9758c4de41300a451cfa23c711789a021de3b5cb95377143
-
Filesize
1.7MB
MD50a2c8bc6c80293890c5f759276ff6a11
SHA1d488442bce8e1c2ac2247e98c14ca2db4385800f
SHA25652bd35e92b25fa394ef3811f27f4d1bc260d51b515d9fea78fed85efc885fb7e
SHA512b21322d0ed09db70dc83697cc1cb9198ca8b39aeead50826677b73a11fe287cd00c05ca946b7d4fb9758c4de41300a451cfa23c711789a021de3b5cb95377143
-
Filesize
180KB
MD50635bc911c5748d71a4aed170173481e
SHA16d92ff8b519e4a10759f75f3b3d9e1459ed4ff1b
SHA256a0330d75df7075206cf68d358e3acfc621062f35db43c2521b8ef5e7c9f317f1
SHA51250ea5d41497884b8aee43d6d7940186d6095055c4cd301ffa88407caf9935853dcfd852e81ab4671da21505ba284b0bae71a59fa50dd55dfa4c3ea7d0251651a
-
Filesize
180KB
MD50635bc911c5748d71a4aed170173481e
SHA16d92ff8b519e4a10759f75f3b3d9e1459ed4ff1b
SHA256a0330d75df7075206cf68d358e3acfc621062f35db43c2521b8ef5e7c9f317f1
SHA51250ea5d41497884b8aee43d6d7940186d6095055c4cd301ffa88407caf9935853dcfd852e81ab4671da21505ba284b0bae71a59fa50dd55dfa4c3ea7d0251651a
-
Filesize
180KB
MD50635bc911c5748d71a4aed170173481e
SHA16d92ff8b519e4a10759f75f3b3d9e1459ed4ff1b
SHA256a0330d75df7075206cf68d358e3acfc621062f35db43c2521b8ef5e7c9f317f1
SHA51250ea5d41497884b8aee43d6d7940186d6095055c4cd301ffa88407caf9935853dcfd852e81ab4671da21505ba284b0bae71a59fa50dd55dfa4c3ea7d0251651a
-
Filesize
79B
MD5403991c4d18ac84521ba17f264fa79f2
SHA1850cc068de0963854b0fe8f485d951072474fd45
SHA256ef6e942aefe925fefac19fa816986ea25de6935c4f377c717e29b94e65f9019f
SHA512a20aaa77065d30195e5893f2ff989979383c8d7f82d9e528d4833b1c1236aef4f85284f5250d0f190a174790b650280ffe1fbff7e00c98024ccf5ca746e5b576
-
Filesize
221KB
MD573089952a99d24a37d9219c4e30decde
SHA18dfa37723afc72f1728ec83f676ffeac9102f8bd
SHA2569aa54a5b73fe93d789ec1707ebd41ff824fcf6ba34b18d97ebc566cee8cbce60
SHA5127088b995c0f6425ad4460b1f286d36e5b7ca3d79308febfac7f212e630b00569239e0b22455198739d20b1fbae1b70c24c22f41a34bab19a793aaa31164aa2d2
-
Filesize
221KB
MD573089952a99d24a37d9219c4e30decde
SHA18dfa37723afc72f1728ec83f676ffeac9102f8bd
SHA2569aa54a5b73fe93d789ec1707ebd41ff824fcf6ba34b18d97ebc566cee8cbce60
SHA5127088b995c0f6425ad4460b1f286d36e5b7ca3d79308febfac7f212e630b00569239e0b22455198739d20b1fbae1b70c24c22f41a34bab19a793aaa31164aa2d2
-
Filesize
11KB
MD5d2ed05fd71460e6d4c505ce87495b859
SHA1a970dfe775c4e3f157b5b2e26b1f77da7ae6d884
SHA2563a119008fd025a394f6fb93a0c941e1dc0fa1f9c7606a674388f21d99dfe116f
SHA512a15efc7c5ddd82ea612444b5df530d11da43bbaaf7f7ae4801c8063c8cffe4538cd47e27639e380b9d1c7e342575169e06af4b298a8faf635865dc4f9dc11b8e
-
Filesize
568B
MD5bcbb9cb105a5466367c5f6ceb38e614a
SHA1be7f3382e1a4a78428c8285e961c65cefb98affb
SHA256878c05348c1269420ec01dd070212589b5118eba58a4592f89fc36b2a5860d8d
SHA512efed12dc71ded17bde4a2f7849ef77d80db75d29c52351f6338f4a9ab5d8b42ba7b9fdca7eb472866819749587f79eb3c6b73e0398f4813b51f300d9a65b0fbf
-
Filesize
87KB
MD5c8ad58c944be841eec62302659254086
SHA1297a71cda27087c0dba56717758d077fca85e1f1
SHA256cc1e8d68a21727b46136d3fdd2b8e269ea8c7c2d5b07c406a90911612f1d250e
SHA51240a017c76fa97c6f785b3d223c789117baac86ba7e0696a8dd07ef507a7550d569d9f0d75e2086e4ef2bd17c97e8acd7918aaf128faf154ad8ec5ca82b94d8b9
-
Filesize
87KB
MD5c8ad58c944be841eec62302659254086
SHA1297a71cda27087c0dba56717758d077fca85e1f1
SHA256cc1e8d68a21727b46136d3fdd2b8e269ea8c7c2d5b07c406a90911612f1d250e
SHA51240a017c76fa97c6f785b3d223c789117baac86ba7e0696a8dd07ef507a7550d569d9f0d75e2086e4ef2bd17c97e8acd7918aaf128faf154ad8ec5ca82b94d8b9
-
Filesize
87KB
MD51df514c24279f0e0033aaa13b8a584ce
SHA1e7edfdbfb3efdbe0cf8e9fa676eddbb5ffff6e75
SHA2561f40a08d08c1f16b8fda3ad9eae20b77f9a0a61ffae1584114fae5e83e8fa325
SHA512c1ff16a13ca4defd02ba9ad342093ba13fe450ca32c1224d411491b05cecc010be5d840f30a7663fea251c4dd708f7a0f10830641396303f4eeb24bd84c51eb8
-
Filesize
1.5MB
MD59c116e409e7a246990846e9aa0c36d6e
SHA1bdda2918baa83129c3fefef1f4af6626cc24acb6
SHA256232cd58d2ff091a237e5b4bb84a149aad77afa71ed68c72de9875e9c64a801d7
SHA512be6e3b2cec48a23ce8849c06a396c2ae677edaa6ecfd3fc85d3e72ab3d00cec3776f263281764bc318df2e390cedb29fe15bc3d1568403eda241aac9f7864a22
-
Filesize
1.5MB
MD59c116e409e7a246990846e9aa0c36d6e
SHA1bdda2918baa83129c3fefef1f4af6626cc24acb6
SHA256232cd58d2ff091a237e5b4bb84a149aad77afa71ed68c72de9875e9c64a801d7
SHA512be6e3b2cec48a23ce8849c06a396c2ae677edaa6ecfd3fc85d3e72ab3d00cec3776f263281764bc318df2e390cedb29fe15bc3d1568403eda241aac9f7864a22
-
Filesize
1.4MB
MD5a2a6afc002586ba0a8be4159a2c7c458
SHA1cdcb8c27e8244a69205204e717c09cd6942ad21a
SHA25614277650415a8d038675c46c25aba99803216783405e1c407b615cf4540e440b
SHA512b79b6cf27eeee49cb35a0942a4c861cc9fd04bc44d8f5cb3a9adf6fe2ccf4442f26080a0d06147eaab00b35a2ccc027a5f9a2ca39bf44ae9f915ed88e4ba5e84
-
Filesize
1.4MB
MD5a2a6afc002586ba0a8be4159a2c7c458
SHA1cdcb8c27e8244a69205204e717c09cd6942ad21a
SHA25614277650415a8d038675c46c25aba99803216783405e1c407b615cf4540e440b
SHA512b79b6cf27eeee49cb35a0942a4c861cc9fd04bc44d8f5cb3a9adf6fe2ccf4442f26080a0d06147eaab00b35a2ccc027a5f9a2ca39bf44ae9f915ed88e4ba5e84
-
Filesize
219KB
MD54e95a96612f19b6294216e5450159a89
SHA18a582f7581994aeab035825041b544ea297c56b8
SHA25699a35c29d3e14bf349554a43317736f2f965301cc2e799f1297d4012bdbc22af
SHA5124bec556b13a20764264cfbfeed8334c636d7ff0959f59adbc87bd53e320f6b734eb337b294b4af7edd86177b5b0b6e304333f1752a8e3de9386e073470278651
-
Filesize
219KB
MD54e95a96612f19b6294216e5450159a89
SHA18a582f7581994aeab035825041b544ea297c56b8
SHA25699a35c29d3e14bf349554a43317736f2f965301cc2e799f1297d4012bdbc22af
SHA5124bec556b13a20764264cfbfeed8334c636d7ff0959f59adbc87bd53e320f6b734eb337b294b4af7edd86177b5b0b6e304333f1752a8e3de9386e073470278651
-
Filesize
1.2MB
MD571bbb07d0ce1c2f44c94bbbbd7a6ee3e
SHA11a74167b43aa600193a4e5a9eb8ae934c2bad486
SHA2561d664531f749645acf737440d845c0642d789a3f9182ccbad248ebbc80687184
SHA5127ce133ee43fe385f239124e4118d4a331399b44d7a79f78b9c1427f8042105683a4ec8da3608f06817831bd0b5a5fd29b17ecba4fd4d3e0ff385d30a2b47e9c8
-
Filesize
1.2MB
MD571bbb07d0ce1c2f44c94bbbbd7a6ee3e
SHA11a74167b43aa600193a4e5a9eb8ae934c2bad486
SHA2561d664531f749645acf737440d845c0642d789a3f9182ccbad248ebbc80687184
SHA5127ce133ee43fe385f239124e4118d4a331399b44d7a79f78b9c1427f8042105683a4ec8da3608f06817831bd0b5a5fd29b17ecba4fd4d3e0ff385d30a2b47e9c8
-
Filesize
1.4MB
MD5ae0906d5611ef0facdf22812a3ad80f8
SHA141b5f82cf7eed0db889916a386201e7a1079a876
SHA256a75741442d308c552abb9143ecd683fa8b0d8c707a811fde2beeef217e38ae7d
SHA5129163592782867b883db5826ad7bfa1d53e7f56c32e080f3680470e62b1a522e1945a3e06b3f995a49b6b49959b3ea09b520de590db8ce852fe1bcebbe1ce2202
-
Filesize
1.4MB
MD5ae0906d5611ef0facdf22812a3ad80f8
SHA141b5f82cf7eed0db889916a386201e7a1079a876
SHA256a75741442d308c552abb9143ecd683fa8b0d8c707a811fde2beeef217e38ae7d
SHA5129163592782867b883db5826ad7bfa1d53e7f56c32e080f3680470e62b1a522e1945a3e06b3f995a49b6b49959b3ea09b520de590db8ce852fe1bcebbe1ce2202
-
Filesize
1.9MB
MD5f6a960e73b56f4fa26437ac5e12d7773
SHA196b2c9aa721bdd672501e5b07d12f61b6db86886
SHA25668285c53ce6f94bd947ead934a14efca01ae117452fe559954e943748713f93c
SHA512f8f13dbc76b5a2c3736a350ed2a973e7ba47ec20e2de6bd509ac8f67916e44b34fe06aee7973b2387e190277c8d4a479dabf833618eeecdd290ff4db46b6d3a9
-
Filesize
1.9MB
MD5f6a960e73b56f4fa26437ac5e12d7773
SHA196b2c9aa721bdd672501e5b07d12f61b6db86886
SHA25668285c53ce6f94bd947ead934a14efca01ae117452fe559954e943748713f93c
SHA512f8f13dbc76b5a2c3736a350ed2a973e7ba47ec20e2de6bd509ac8f67916e44b34fe06aee7973b2387e190277c8d4a479dabf833618eeecdd290ff4db46b6d3a9
-
Filesize
698KB
MD5184035206440741d17bb69db0ca283b1
SHA1beae10b7a688ce106e7ac19f29e1f3d699f8281b
SHA25655665a1b2333b69f39a3e9a9ae7346741661d926ce06d4c0d6a92049f9849663
SHA512bea6bfae8ec1a1ed205117558c7a43b845962f8ea819c653019c6d1bdabefcfa40bb92dc5fae24136f53f6b7e2237868342add268aacaefe2659ef35e17fc5f5
-
Filesize
698KB
MD5184035206440741d17bb69db0ca283b1
SHA1beae10b7a688ce106e7ac19f29e1f3d699f8281b
SHA25655665a1b2333b69f39a3e9a9ae7346741661d926ce06d4c0d6a92049f9849663
SHA512bea6bfae8ec1a1ed205117558c7a43b845962f8ea819c653019c6d1bdabefcfa40bb92dc5fae24136f53f6b7e2237868342add268aacaefe2659ef35e17fc5f5
-
Filesize
30KB
MD56cbf56b8e0a63fffc4e3b253932fa5a0
SHA16ad8026531eb53a6a2ff0705c28bec944e0c78b0
SHA256e1a3b6ff1f77a51cfdb7f8b942a169b814c7a4337d82faeaf70592efecb51d53
SHA512445214a399fa277142a266e368f4e9746a063caf7f83d21d4f06333177d2f16a08264283856176bc78434ce1c828a896e1d5d2002729d9e4903ae9be57d8ec17
-
Filesize
30KB
MD56cbf56b8e0a63fffc4e3b253932fa5a0
SHA16ad8026531eb53a6a2ff0705c28bec944e0c78b0
SHA256e1a3b6ff1f77a51cfdb7f8b942a169b814c7a4337d82faeaf70592efecb51d53
SHA512445214a399fa277142a266e368f4e9746a063caf7f83d21d4f06333177d2f16a08264283856176bc78434ce1c828a896e1d5d2002729d9e4903ae9be57d8ec17
-
Filesize
1.9MB
MD5f6a960e73b56f4fa26437ac5e12d7773
SHA196b2c9aa721bdd672501e5b07d12f61b6db86886
SHA25668285c53ce6f94bd947ead934a14efca01ae117452fe559954e943748713f93c
SHA512f8f13dbc76b5a2c3736a350ed2a973e7ba47ec20e2de6bd509ac8f67916e44b34fe06aee7973b2387e190277c8d4a479dabf833618eeecdd290ff4db46b6d3a9
-
Filesize
871KB
MD5bbab50c2243efb788ff759154983f52e
SHA1be71fe59597516e857d426085c1a540d79f0c2bf
SHA2566dcba2f79884ed867904c6fbc789e84ec48e039ab70e9fcedf84051154dcedf9
SHA512aadb847ec959ea5ec8ea01eb6d39e499e3e975ddc6419bc3611b68afe1f31a6349a3f247582d298e8e98785991a7c338ee79f1f59fe60b9bce0a0814efa2c0be
-
Filesize
871KB
MD5bbab50c2243efb788ff759154983f52e
SHA1be71fe59597516e857d426085c1a540d79f0c2bf
SHA2566dcba2f79884ed867904c6fbc789e84ec48e039ab70e9fcedf84051154dcedf9
SHA512aadb847ec959ea5ec8ea01eb6d39e499e3e975ddc6419bc3611b68afe1f31a6349a3f247582d298e8e98785991a7c338ee79f1f59fe60b9bce0a0814efa2c0be
-
Filesize
574KB
MD56b6115f6f7ffdc0ff0a547cd3174cb5d
SHA114936b57f5635e8b665ea878069a9615eb3df04d
SHA2566272e272f7392cc11b4c6aed200bc96355ea5eb6cd138d1d4cd94c801e766dda
SHA51264eb4e475da77ca43fd83fac5566290b1900e1bc9532b28de4631ab65df9c9bd6bcd907508956763a647ae7c3abfe1601f69503ecf6b4589c1afe08a19e92cee
-
Filesize
574KB
MD56b6115f6f7ffdc0ff0a547cd3174cb5d
SHA114936b57f5635e8b665ea878069a9615eb3df04d
SHA2566272e272f7392cc11b4c6aed200bc96355ea5eb6cd138d1d4cd94c801e766dda
SHA51264eb4e475da77ca43fd83fac5566290b1900e1bc9532b28de4631ab65df9c9bd6bcd907508956763a647ae7c3abfe1601f69503ecf6b4589c1afe08a19e92cee
-
Filesize
1.6MB
MD529e9546e7fe835b413a5d65599213b53
SHA164d6d2eca4e197a390702a08b074c5ef6da2fa32
SHA256d65b10dc2c1598935786fd0d562aaee9c9fc6b7d6f950da6de13db6686cab814
SHA512e556877abd79052f3d3bc6175971001531f363745d396aa96302218cf11b4fc94980f946aae758ff14d8cc8af4d9dcb26503142e2d1cded2d21ab37ddc009658
-
Filesize
1.6MB
MD529e9546e7fe835b413a5d65599213b53
SHA164d6d2eca4e197a390702a08b074c5ef6da2fa32
SHA256d65b10dc2c1598935786fd0d562aaee9c9fc6b7d6f950da6de13db6686cab814
SHA512e556877abd79052f3d3bc6175971001531f363745d396aa96302218cf11b4fc94980f946aae758ff14d8cc8af4d9dcb26503142e2d1cded2d21ab37ddc009658
-
Filesize
180KB
MD529638720632f86a01a52ebf0511f44ae
SHA16b18fd13bcca7fa5274d9f27624bd24384054441
SHA256f39b1d8abe70952da23d0c4e362f05aad23ff3ceb7b4a4330195dc0fd7fdf961
SHA512d020ee8a56a49b8fa2c63089079f0e7abe28ec25e4b8b8978846dd725fdf3863e590448ce33f44c5859640df2ce537ad90dada57d7027730003c37ca44027a8a
-
Filesize
180KB
MD529638720632f86a01a52ebf0511f44ae
SHA16b18fd13bcca7fa5274d9f27624bd24384054441
SHA256f39b1d8abe70952da23d0c4e362f05aad23ff3ceb7b4a4330195dc0fd7fdf961
SHA512d020ee8a56a49b8fa2c63089079f0e7abe28ec25e4b8b8978846dd725fdf3863e590448ce33f44c5859640df2ce537ad90dada57d7027730003c37ca44027a8a
-
Filesize
675KB
MD5835e4bc3352406e5993f009ab920c4bc
SHA1cffc4da68691f51b1e8b477da565822b924b665d
SHA2562bd907a8ea391e6aaf4b8593a2efb8046a2887239b79099e22d62f66105a93db
SHA5122140b3feb27dda7df1b35c4d11ed7332215566e87fa7ebfdd3e560c761ffc571b7a2dba170ccf78d5962c2b5c47ce27a323c6ca58e349f0a20f839f0813feb51
-
Filesize
675KB
MD5835e4bc3352406e5993f009ab920c4bc
SHA1cffc4da68691f51b1e8b477da565822b924b665d
SHA2562bd907a8ea391e6aaf4b8593a2efb8046a2887239b79099e22d62f66105a93db
SHA5122140b3feb27dda7df1b35c4d11ed7332215566e87fa7ebfdd3e560c761ffc571b7a2dba170ccf78d5962c2b5c47ce27a323c6ca58e349f0a20f839f0813feb51
-
Filesize
1.8MB
MD555d3507f18e2f4b729e2d39b42ed30f7
SHA11e0e1f566dc8332c78ab12e7bd3228530e3f9a7d
SHA2567a64de4e9ba61ab53f06e9ca11804a1855928bf2062ce7002f7942075fc9feae
SHA512a546e95c790e6f0c7945b6f063107ce796bffd7bb1e3151820e9e1d50aeb5818ac56af8696dbae0c4042c96795f5ac178a6bf97517b10a94e6f945606c885afa
-
Filesize
1.8MB
MD555d3507f18e2f4b729e2d39b42ed30f7
SHA11e0e1f566dc8332c78ab12e7bd3228530e3f9a7d
SHA2567a64de4e9ba61ab53f06e9ca11804a1855928bf2062ce7002f7942075fc9feae
SHA512a546e95c790e6f0c7945b6f063107ce796bffd7bb1e3151820e9e1d50aeb5818ac56af8696dbae0c4042c96795f5ac178a6bf97517b10a94e6f945606c885afa
-
Filesize
8KB
MD5ac65407254780025e8a71da7b925c4f3
SHA15c7ae625586c1c00ec9d35caa4f71b020425a6ba
SHA25626cd9cc9a0dd688411a4f0e2fa099b694b88cab6e9ed10827a175f7b5486e42e
SHA51227d87730230d9f594908f904bf298a28e255dced8d515eb0d97e1701078c4405f9f428513c2574d349a7517bd23a3558fb09599a01499ea54590945b981b17ab
-
Filesize
116B
MD5ec6aae2bb7d8781226ea61adca8f0586
SHA1d82b3bad240f263c1b887c7c0cc4c2ff0e86dfe3
SHA256b02fffaba9e664ff7840c82b102d6851ec0bb148cec462cef40999545309e599
SHA512aa62a8cd02a03e4f462f76ae6ff2e43849052ce77cca3a2ccf593f6669425830d0910afac3cf2c46dd385454a6fb3b4bd604ae13b9586087d6f22de644f9dfc7
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
219KB
MD54e95a96612f19b6294216e5450159a89
SHA18a582f7581994aeab035825041b544ea297c56b8
SHA25699a35c29d3e14bf349554a43317736f2f965301cc2e799f1297d4012bdbc22af
SHA5124bec556b13a20764264cfbfeed8334c636d7ff0959f59adbc87bd53e320f6b734eb337b294b4af7edd86177b5b0b6e304333f1752a8e3de9386e073470278651
-
Filesize
219KB
MD54e95a96612f19b6294216e5450159a89
SHA18a582f7581994aeab035825041b544ea297c56b8
SHA25699a35c29d3e14bf349554a43317736f2f965301cc2e799f1297d4012bdbc22af
SHA5124bec556b13a20764264cfbfeed8334c636d7ff0959f59adbc87bd53e320f6b734eb337b294b4af7edd86177b5b0b6e304333f1752a8e3de9386e073470278651
-
Filesize
219KB
MD54e95a96612f19b6294216e5450159a89
SHA18a582f7581994aeab035825041b544ea297c56b8
SHA25699a35c29d3e14bf349554a43317736f2f965301cc2e799f1297d4012bdbc22af
SHA5124bec556b13a20764264cfbfeed8334c636d7ff0959f59adbc87bd53e320f6b734eb337b294b4af7edd86177b5b0b6e304333f1752a8e3de9386e073470278651
-
Filesize
1.5MB
MD5665db9794d6e6e7052e7c469f48de771
SHA1ed9a3f9262f675a03a9f1f70856e3532b095c89f
SHA256c1b31186d170a2a5755f15682860b3cdc60eac7f97a2db9462dee7ca6fcbc196
SHA51269585560e8ac4a2472621dd4da4bf0e636688fc5d710521b0177461f773fcf2a4c7ddb86bc812ecb316985729013212ccfa4992cd1c98f166a4a510e17fcae74
-
Filesize
5.6MB
MD5bae29e49e8190bfbbf0d77ffab8de59d
SHA14a6352bb47c7e1666a60c76f9b17ca4707872bd9
SHA256f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87
SHA5129e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2
-
Filesize
1.5MB
MD5b224196c88f09b615527b2df0e860e49
SHA1f9ae161836a34264458d8c0b2a083c98093f1dec
SHA2562a11969fcc1df03533ad694a68d56f0e3a67ce359663c3cf228040ab5baa5ed8
SHA512d74376c5bd3ba19b8454a17f2f38ab64ad1005b6372c7e162230c822c38f6f8c7d87aef47ef04cb6dceedc731046c30efa6720098cc39b15addd17c809b8296d
-
Filesize
260KB
MD5f39a0110a564f4a1c6b96c03982906ec
SHA108e66c93b575c9ac0a18f06741dabcabc88a358b
SHA256f794a557ad952ff155b4bfe5665b3f448453c3a50c766478d070368cab69f481
SHA512c6659f926f95a8bed1ff779c8445470c3089823abe8c1199f591c313ecee0bd793478cdaab95905c0e8ae2a2b18737daabe887263b7cde1eaaa9ee6976ff7d00
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
273B
MD5a5b509a3fb95cc3c8d89cd39fc2a30fb
SHA15aff4266a9c0f2af440f28aa865cebc5ddb9cd5c
SHA2565f3c80056c7b1104c15d6fee49dac07e665c6ffd0795ad486803641ed619c529
SHA5123cc58d989c461a04f29acbfe03ed05f970b3b3e97e6819962fc5c853f55bce7f7aba0544a712e3a45ee52ab31943c898f6b3684d755b590e3e961ae5ecd1edb9