Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
322s -
max time network
333s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
28/10/2023, 19:07
Behavioral task
behavioral1
Sample
Expensive.exe
Resource
win10v2004-20231020-en
General
-
Target
Expensive.exe
-
Size
2.1MB
-
MD5
9127de477fcc591eea0315222e9ab353
-
SHA1
3731c238313b43c908c5c10981f6e0f35bb6593f
-
SHA256
071523576cd4bb651eeecf43780cea7dd9bcba75e00382016bc6ce9d47129c98
-
SHA512
3999391dc6dd1e2e92d2d1318ee6b2306542c0e7d2977e73130283a3b44edce8b553663e17d54eb683ddf04096006a31d8b47b430309e38f199599f6c9947023
-
SSDEEP
24576:h2G/nvxW3Wwh0hcCTp8vHOBYpTy1h1SyhGfS3l2o4nFAwODRxWcKmBN3ialREy4z:hbA3tGhcqKIJT1fsFpO/kWiaUJz
Malware Config
Signatures
-
DcRat 63 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process 4168 schtasks.exe 4184 schtasks.exe 2112 schtasks.exe 4208 schtasks.exe 1476 schtasks.exe 3044 schtasks.exe 4884 schtasks.exe 2696 schtasks.exe 2112 schtasks.exe 3732 schtasks.exe 3600 schtasks.exe 1084 schtasks.exe 2812 schtasks.exe 400 schtasks.exe 5020 schtasks.exe 5020 schtasks.exe File created C:\Windows\RemotePackages\RemoteApps\088424020bedd6 SavesCommon.exe 3012 schtasks.exe 4688 schtasks.exe 2788 schtasks.exe 4712 schtasks.exe File created C:\Program Files\Windows Multimedia Platform\e1ef82546f0b02 SavesCommon.exe 1044 schtasks.exe Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation Expensive.exe 5000 schtasks.exe 4196 schtasks.exe 3416 schtasks.exe 1212 schtasks.exe 4292 schtasks.exe 880 schtasks.exe 2296 schtasks.exe 2512 schtasks.exe 2144 schtasks.exe 2760 schtasks.exe 3568 schtasks.exe 4472 schtasks.exe 492 schtasks.exe 2812 schtasks.exe 3108 schtasks.exe 2944 schtasks.exe 3748 schtasks.exe 2868 schtasks.exe 4632 schtasks.exe 2572 schtasks.exe 4320 schtasks.exe 1448 schtasks.exe 2332 schtasks.exe 4296 schtasks.exe 2108 schtasks.exe 4420 schtasks.exe 3504 schtasks.exe 656 schtasks.exe 2912 schtasks.exe 2568 schtasks.exe 4456 schtasks.exe 5108 schtasks.exe 3236 schtasks.exe 3740 schtasks.exe 4728 schtasks.exe 2332 schtasks.exe 544 schtasks.exe 4588 schtasks.exe 3992 schtasks.exe -
Process spawned unexpected child process 60 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4420 3668 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1044 3668 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1476 3668 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2112 3668 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4168 3668 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3504 3668 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2572 3668 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2812 3668 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3600 3668 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 656 3668 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2912 3668 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4728 3668 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4320 3668 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2144 3668 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4208 3668 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4196 3668 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2812 3668 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3108 3668 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2944 3668 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4588 3668 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 400 3668 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3748 3668 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4184 3668 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3732 3668 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2568 3668 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2868 3668 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4456 3668 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4296 3668 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5000 3668 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5020 3668 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2108 3668 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2332 3668 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4632 3668 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 544 3668 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2760 3668 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3012 3668 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3044 3668 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4688 3668 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2788 3668 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5108 3668 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3568 3668 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4472 3668 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3416 3668 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1084 3668 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3236 3668 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 492 3668 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 880 3668 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2296 3668 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3992 3668 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4884 3668 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2112 3668 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1212 3668 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4712 3668 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2696 3668 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3740 3668 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1448 3668 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2512 3668 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4292 3668 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5020 3668 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2332 3668 schtasks.exe 102 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" SavesCommon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" SavesCommon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" SavesCommon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" SavesCommon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" SavesCommon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" SavesCommon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe -
resource yara_rule behavioral1/files/0x0006000000022e57-10.dat dcrat behavioral1/files/0x0006000000022e57-11.dat dcrat behavioral1/memory/2452-12-0x0000000000DD0000-0x0000000000F76000-memory.dmp dcrat behavioral1/files/0x000700000001da98-37.dat dcrat behavioral1/files/0x000700000001da98-49.dat dcrat behavioral1/files/0x000700000001da98-50.dat dcrat behavioral1/files/0x0006000000022e57-54.dat dcrat behavioral1/files/0x000700000001db34-104.dat dcrat behavioral1/files/0x000700000001db34-103.dat dcrat behavioral1/files/0x000700000001db34-122.dat dcrat behavioral1/files/0x000700000001db34-131.dat dcrat -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 7 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation SavesCommon.exe Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation Expensive.exe Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation SavesCommon.exe Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation dllhost.exe Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation Expensive.exe -
Executes dropped EXE 7 IoCs
pid Process 2452 SavesCommon.exe 4728 SppExtComObj.exe 2876 SavesCommon.exe 1620 dllhost.exe 2492 dllhost.exe 1460 dllhost.exe 1640 sihost.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SavesCommon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" SavesCommon.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dllhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SavesCommon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" SavesCommon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dllhost.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 39 ip-api.com -
Drops file in Program Files directory 12 IoCs
description ioc Process File created C:\Program Files\Uninstall Information\dllhost.exe SavesCommon.exe File created C:\Program Files\Uninstall Information\5b884080fd4f94 SavesCommon.exe File created C:\Program Files\Windows Multimedia Platform\SppExtComObj.exe SavesCommon.exe File created C:\Program Files\Windows Multimedia Platform\e1ef82546f0b02 SavesCommon.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\5940a34987c991 SavesCommon.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\66fc9ff0ee96c2 SavesCommon.exe File created C:\Program Files\Uninstall Information\5940a34987c991 SavesCommon.exe File created C:\Program Files\Uninstall Information\fontdrvhost.exe SavesCommon.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\dllhost.exe SavesCommon.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\sihost.exe SavesCommon.exe File created C:\Program Files\Windows Media Player\csrss.exe SavesCommon.exe File created C:\Program Files\Windows Media Player\886983d96e3d3e SavesCommon.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Speech\Common\lsass.exe SavesCommon.exe File created C:\Windows\RemotePackages\RemoteApps\conhost.exe SavesCommon.exe File opened for modification C:\Windows\RemotePackages\RemoteApps\conhost.exe SavesCommon.exe File created C:\Windows\RemotePackages\RemoteApps\088424020bedd6 SavesCommon.exe File created C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\dwm.exe SavesCommon.exe File created C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\6cb0b6c459d5d3 SavesCommon.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Creates scheduled task(s) 1 TTPs 60 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4472 schtasks.exe 4884 schtasks.exe 1212 schtasks.exe 4420 schtasks.exe 3012 schtasks.exe 2144 schtasks.exe 4196 schtasks.exe 1044 schtasks.exe 2112 schtasks.exe 4632 schtasks.exe 4728 schtasks.exe 3108 schtasks.exe 2812 schtasks.exe 2944 schtasks.exe 1476 schtasks.exe 3504 schtasks.exe 2868 schtasks.exe 2332 schtasks.exe 880 schtasks.exe 2812 schtasks.exe 4588 schtasks.exe 1084 schtasks.exe 5020 schtasks.exe 3044 schtasks.exe 3740 schtasks.exe 2512 schtasks.exe 5020 schtasks.exe 544 schtasks.exe 3600 schtasks.exe 4208 schtasks.exe 3732 schtasks.exe 4456 schtasks.exe 2108 schtasks.exe 656 schtasks.exe 3748 schtasks.exe 4184 schtasks.exe 2696 schtasks.exe 2568 schtasks.exe 4296 schtasks.exe 4688 schtasks.exe 5108 schtasks.exe 3416 schtasks.exe 492 schtasks.exe 4168 schtasks.exe 2572 schtasks.exe 2112 schtasks.exe 400 schtasks.exe 2760 schtasks.exe 5000 schtasks.exe 2788 schtasks.exe 3236 schtasks.exe 3992 schtasks.exe 4712 schtasks.exe 1448 schtasks.exe 2912 schtasks.exe 4320 schtasks.exe 4292 schtasks.exe 2332 schtasks.exe 3568 schtasks.exe 2296 schtasks.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3350690463-3549324357-1323838019-1000\{433DA53F-872C-4C80-A259-B10AC0ECA9C3} msedge.exe Key created \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000_Classes\Local Settings Expensive.exe Key created \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000_Classes\Local Settings SavesCommon.exe Key created \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000_Classes\Local Settings Expensive.exe Key created \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000_Classes\Local Settings SavesCommon.exe Key created \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000_Classes\Local Settings dllhost.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 452770.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2452 SavesCommon.exe 2452 SavesCommon.exe 2452 SavesCommon.exe 2452 SavesCommon.exe 2452 SavesCommon.exe 2452 SavesCommon.exe 4728 SppExtComObj.exe 4728 SppExtComObj.exe 2876 SavesCommon.exe 2876 SavesCommon.exe 2876 SavesCommon.exe 2876 SavesCommon.exe 2876 SavesCommon.exe 2876 SavesCommon.exe 2876 SavesCommon.exe 2876 SavesCommon.exe 2876 SavesCommon.exe 2876 SavesCommon.exe 2876 SavesCommon.exe 2876 SavesCommon.exe 2876 SavesCommon.exe 1620 dllhost.exe 1620 dllhost.exe 1620 dllhost.exe 1620 dllhost.exe 1620 dllhost.exe 1620 dllhost.exe 2492 dllhost.exe 2492 dllhost.exe 2492 dllhost.exe 2492 dllhost.exe 2492 dllhost.exe 2492 dllhost.exe 1460 dllhost.exe 1460 dllhost.exe 1460 dllhost.exe 1460 dllhost.exe 1460 dllhost.exe 1460 dllhost.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 4992 msedge.exe 4992 msedge.exe 980 msedge.exe 980 msedge.exe 2140 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 45 IoCs
pid Process 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 2452 SavesCommon.exe Token: SeDebugPrivilege 4728 SppExtComObj.exe Token: SeDebugPrivilege 2876 SavesCommon.exe Token: SeDebugPrivilege 1620 dllhost.exe Token: SeDebugPrivilege 2492 dllhost.exe Token: SeDebugPrivilege 1460 dllhost.exe Token: SeDebugPrivilege 5000 taskmgr.exe Token: SeSystemProfilePrivilege 5000 taskmgr.exe Token: SeCreateGlobalPrivilege 5000 taskmgr.exe Token: 33 5000 taskmgr.exe Token: SeIncBasePriorityPrivilege 5000 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 5000 taskmgr.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4212 Expensive.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3552 wrote to memory of 1412 3552 Expensive.exe 92 PID 3552 wrote to memory of 1412 3552 Expensive.exe 92 PID 3552 wrote to memory of 1412 3552 Expensive.exe 92 PID 1412 wrote to memory of 4404 1412 WScript.exe 96 PID 1412 wrote to memory of 4404 1412 WScript.exe 96 PID 1412 wrote to memory of 4404 1412 WScript.exe 96 PID 4404 wrote to memory of 2452 4404 cmd.exe 98 PID 4404 wrote to memory of 2452 4404 cmd.exe 98 PID 2452 wrote to memory of 1556 2452 SavesCommon.exe 112 PID 2452 wrote to memory of 1556 2452 SavesCommon.exe 112 PID 1556 wrote to memory of 1120 1556 cmd.exe 114 PID 1556 wrote to memory of 1120 1556 cmd.exe 114 PID 1556 wrote to memory of 4728 1556 cmd.exe 118 PID 1556 wrote to memory of 4728 1556 cmd.exe 118 PID 4212 wrote to memory of 5068 4212 Expensive.exe 126 PID 4212 wrote to memory of 5068 4212 Expensive.exe 126 PID 4212 wrote to memory of 5068 4212 Expensive.exe 126 PID 5068 wrote to memory of 4464 5068 WScript.exe 127 PID 5068 wrote to memory of 4464 5068 WScript.exe 127 PID 5068 wrote to memory of 4464 5068 WScript.exe 127 PID 4464 wrote to memory of 2876 4464 cmd.exe 129 PID 4464 wrote to memory of 2876 4464 cmd.exe 129 PID 2876 wrote to memory of 4212 2876 SavesCommon.exe 181 PID 2876 wrote to memory of 4212 2876 SavesCommon.exe 181 PID 4212 wrote to memory of 988 4212 cmd.exe 183 PID 4212 wrote to memory of 988 4212 cmd.exe 183 PID 4212 wrote to memory of 1620 4212 cmd.exe 185 PID 4212 wrote to memory of 1620 4212 cmd.exe 185 PID 1620 wrote to memory of 4412 1620 dllhost.exe 186 PID 1620 wrote to memory of 4412 1620 dllhost.exe 186 PID 1620 wrote to memory of 2472 1620 dllhost.exe 187 PID 1620 wrote to memory of 2472 1620 dllhost.exe 187 PID 4412 wrote to memory of 3016 4412 cmd.exe 189 PID 4412 wrote to memory of 3016 4412 cmd.exe 189 PID 2472 wrote to memory of 2492 2472 WScript.exe 190 PID 2472 wrote to memory of 2492 2472 WScript.exe 190 PID 4412 wrote to memory of 1460 4412 cmd.exe 191 PID 4412 wrote to memory of 1460 4412 cmd.exe 191 PID 980 wrote to memory of 2492 980 msedge.exe 203 PID 980 wrote to memory of 2492 980 msedge.exe 203 PID 3736 wrote to memory of 2192 3736 msedge.exe 205 PID 3736 wrote to memory of 2192 3736 msedge.exe 205 PID 980 wrote to memory of 4548 980 msedge.exe 207 PID 980 wrote to memory of 4548 980 msedge.exe 207 PID 980 wrote to memory of 4548 980 msedge.exe 207 PID 980 wrote to memory of 4548 980 msedge.exe 207 PID 980 wrote to memory of 4548 980 msedge.exe 207 PID 980 wrote to memory of 4548 980 msedge.exe 207 PID 980 wrote to memory of 4548 980 msedge.exe 207 PID 980 wrote to memory of 4548 980 msedge.exe 207 PID 980 wrote to memory of 4548 980 msedge.exe 207 PID 980 wrote to memory of 4548 980 msedge.exe 207 PID 980 wrote to memory of 4548 980 msedge.exe 207 PID 980 wrote to memory of 4548 980 msedge.exe 207 PID 980 wrote to memory of 4548 980 msedge.exe 207 PID 980 wrote to memory of 4548 980 msedge.exe 207 PID 980 wrote to memory of 4548 980 msedge.exe 207 PID 980 wrote to memory of 4548 980 msedge.exe 207 PID 980 wrote to memory of 4548 980 msedge.exe 207 PID 980 wrote to memory of 4548 980 msedge.exe 207 PID 980 wrote to memory of 4548 980 msedge.exe 207 PID 980 wrote to memory of 4548 980 msedge.exe 207 PID 980 wrote to memory of 4548 980 msedge.exe 207 PID 980 wrote to memory of 4548 980 msedge.exe 207 -
System policy modification 1 TTPs 15 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" SavesCommon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" SavesCommon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" SavesCommon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" SavesCommon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" SavesCommon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" SavesCommon.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Expensive.exe"C:\Users\Admin\AppData\Local\Temp\Expensive.exe"1⤵
- DcRat
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\surrogateproviderdriverIntoperf\k8nUohoQkvTUGj0po2uwSdLBobMX.vbe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\surrogateproviderdriverIntoperf\qA2M4OOY6O3ec5qA9l2THG0b.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Users\Admin\AppData\Roaming\surrogateproviderdriverIntoperf\SavesCommon.exe"C:\Users\Admin\AppData\Roaming\surrogateproviderdriverIntoperf\SavesCommon.exe"4⤵
- DcRat
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2452 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\L94qPR7yZC.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:1120
-
-
C:\Program Files\Windows Multimedia Platform\SppExtComObj.exe"C:\Program Files\Windows Multimedia Platform\SppExtComObj.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4728
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 7 /tr "'C:\Windows\RemotePackages\RemoteApps\conhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4420
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Windows\RemotePackages\RemoteApps\conhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1044
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 14 /tr "'C:\Windows\RemotePackages\RemoteApps\conhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1476
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Multimedia Platform\SppExtComObj.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2112
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Program Files\Windows Multimedia Platform\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4168
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows Multimedia Platform\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3504
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 7 /tr "'C:\odt\RuntimeBroker.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2572
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\odt\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2812
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 7 /tr "'C:\odt\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3600
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4936
-
C:\Users\Admin\AppData\Local\Temp\Expensive.exe"C:\Users\Admin\AppData\Local\Temp\Expensive.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\surrogateproviderdriverIntoperf\k8nUohoQkvTUGj0po2uwSdLBobMX.vbe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\surrogateproviderdriverIntoperf\qA2M4OOY6O3ec5qA9l2THG0b.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Users\Admin\AppData\Roaming\surrogateproviderdriverIntoperf\SavesCommon.exe"C:\Users\Admin\AppData\Roaming\surrogateproviderdriverIntoperf\SavesCommon.exe"4⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2876 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\8IoNCZb0oN.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:988
-
-
C:\Program Files (x86)\Mozilla Maintenance Service\logs\dllhost.exe"C:\Program Files (x86)\Mozilla Maintenance Service\logs\dllhost.exe"6⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1620 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\XtyrhNlxFP.bat"7⤵
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:28⤵PID:3016
-
-
C:\Program Files (x86)\Mozilla Maintenance Service\logs\dllhost.exe"C:\Program Files (x86)\Mozilla Maintenance Service\logs\dllhost.exe"8⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1460
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\a2987783-8f2e-4af3-a821-c030a5a9e0c1.vbs"7⤵
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Program Files (x86)\Mozilla Maintenance Service\logs\dllhost.exe"C:\Program Files (x86)\Mozilla Maintenance Service\logs\dllhost.exe"8⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2492
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 7 /tr "'C:\Users\Public\Videos\fontdrvhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:656
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Users\Public\Videos\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2912
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 9 /tr "'C:\Users\Public\Videos\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4728
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\backgroundTaskHost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4320
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2144
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4208
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 9 /tr "'C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\dwm.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4196
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\dwm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2812
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 8 /tr "'C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\dwm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3108
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\dllhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2944
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4588
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:400
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\WmiPrvSE.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3748
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4184
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3732
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\WindowsPowerShell\Modules\sihost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2568
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Program Files (x86)\WindowsPowerShell\Modules\sihost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2868
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\WindowsPowerShell\Modules\sihost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4456
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Media Player\csrss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4296
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Windows Media Player\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5000
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Media Player\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5020
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\TextInputHost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2108
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\TextInputHost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2332
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\TextInputHost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4632
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\cmd.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:544
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\cmd.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2760
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\cmd.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3012
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 10 /tr "'C:\odt\spoolsv.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3044
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\odt\spoolsv.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4688
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 13 /tr "'C:\odt\spoolsv.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2788
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\smss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5108
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\smss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3568
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\smss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4472
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 14 /tr "'C:\odt\dllhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3416
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\odt\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1084
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 11 /tr "'C:\odt\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3236
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:492
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:880
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2296
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 12 /tr "'C:\Users\Default User\explorer.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3992
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Users\Default User\explorer.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4884
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 7 /tr "'C:\Users\Default User\explorer.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2112
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\Program Files\Uninstall Information\dllhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1212
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files\Uninstall Information\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4712
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 10 /tr "'C:\Program Files\Uninstall Information\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2696
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 6 /tr "'C:\Program Files\Uninstall Information\fontdrvhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3740
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Program Files\Uninstall Information\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1448
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 12 /tr "'C:\Program Files\Uninstall Information\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2512
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 11 /tr "'C:\Users\Default User\System.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4292
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Users\Default User\System.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5020
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 12 /tr "'C:\Users\Default User\System.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2332
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5000
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffc1d8146f8,0x7ffc1d814708,0x7ffc1d8147182⤵PID:2492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,8084159078290566090,16768294948502856189,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,8084159078290566090,16768294948502856189,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,8084159078290566090,16768294948502856189,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:82⤵PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8084159078290566090,16768294948502856189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8084159078290566090,16768294948502856189,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3452 /prefetch:12⤵PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8084159078290566090,16768294948502856189,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8084159078290566090,16768294948502856189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8084159078290566090,16768294948502856189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:12⤵PID:2040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,8084159078290566090,16768294948502856189,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5524 /prefetch:82⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,8084159078290566090,16768294948502856189,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5524 /prefetch:82⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8084159078290566090,16768294948502856189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5724 /prefetch:12⤵PID:3336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8084159078290566090,16768294948502856189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5812 /prefetch:12⤵PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8084159078290566090,16768294948502856189,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6032 /prefetch:12⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8084159078290566090,16768294948502856189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5772 /prefetch:12⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8084159078290566090,16768294948502856189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5952 /prefetch:12⤵PID:3824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8084159078290566090,16768294948502856189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5588 /prefetch:12⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8084159078290566090,16768294948502856189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:3376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2176,8084159078290566090,16768294948502856189,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5796 /prefetch:82⤵PID:560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2176,8084159078290566090,16768294948502856189,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5772 /prefetch:82⤵
- Modifies registry class
PID:3812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8084159078290566090,16768294948502856189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3732 /prefetch:12⤵PID:1336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8084159078290566090,16768294948502856189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5896 /prefetch:12⤵PID:5252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8084159078290566090,16768294948502856189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6084 /prefetch:12⤵PID:5268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8084159078290566090,16768294948502856189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6356 /prefetch:12⤵PID:5916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8084159078290566090,16768294948502856189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6812 /prefetch:12⤵PID:5940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8084159078290566090,16768294948502856189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6368 /prefetch:12⤵PID:5932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8084159078290566090,16768294948502856189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4020 /prefetch:12⤵PID:5924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8084159078290566090,16768294948502856189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6792 /prefetch:12⤵PID:6116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8084159078290566090,16768294948502856189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6940 /prefetch:12⤵PID:5488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8084159078290566090,16768294948502856189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6344 /prefetch:12⤵PID:1036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8084159078290566090,16768294948502856189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6096 /prefetch:12⤵PID:5900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8084159078290566090,16768294948502856189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6964 /prefetch:12⤵PID:5208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8084159078290566090,16768294948502856189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6536 /prefetch:12⤵PID:5216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8084159078290566090,16768294948502856189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5596 /prefetch:12⤵PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8084159078290566090,16768294948502856189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5756 /prefetch:12⤵PID:3788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8084159078290566090,16768294948502856189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6044 /prefetch:12⤵PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8084159078290566090,16768294948502856189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6100 /prefetch:12⤵PID:5220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8084159078290566090,16768294948502856189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:12⤵PID:5376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8084159078290566090,16768294948502856189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=38 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6608 /prefetch:12⤵PID:3032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8084159078290566090,16768294948502856189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=39 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6096 /prefetch:12⤵PID:800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8084159078290566090,16768294948502856189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=42 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:12⤵PID:5472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2176,8084159078290566090,16768294948502856189,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=2660 /prefetch:82⤵PID:5484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8084159078290566090,16768294948502856189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=43 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:5504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8084159078290566090,16768294948502856189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=44 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5812 /prefetch:12⤵PID:5600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8084159078290566090,16768294948502856189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=46 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7228 /prefetch:12⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8084159078290566090,16768294948502856189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=47 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5716 /prefetch:12⤵PID:5640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8084159078290566090,16768294948502856189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=48 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7860 /prefetch:12⤵PID:5632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8084159078290566090,16768294948502856189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=45 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6372 /prefetch:12⤵PID:5576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2176,8084159078290566090,16768294948502856189,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=8468 /prefetch:82⤵PID:5420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8084159078290566090,16768294948502856189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=50 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6116 /prefetch:12⤵PID:5736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8084159078290566090,16768294948502856189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=51 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8048 /prefetch:12⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8084159078290566090,16768294948502856189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=52 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:12⤵PID:5760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8084159078290566090,16768294948502856189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=53 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1936 /prefetch:12⤵PID:5292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8084159078290566090,16768294948502856189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=55 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7004 /prefetch:12⤵PID:6012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,8084159078290566090,16768294948502856189,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=7152 /prefetch:22⤵PID:5556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8084159078290566090,16768294948502856189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=57 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8132 /prefetch:12⤵PID:656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xb4,0x108,0x7ffc1d8146f8,0x7ffc1d814708,0x7ffc1d8147182⤵PID:2192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,1599190554612206399,16596299873474108274,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,1599190554612206399,16596299873474108274,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:1296
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3988
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3552
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x44c 0x2ec1⤵PID:6008
-
C:\Program Files (x86)\WindowsPowerShell\Modules\sihost.exe"C:\Program Files (x86)\WindowsPowerShell\Modules\sihost.exe"1⤵
- Executes dropped EXE
PID:1640
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5d8957e18549671aedf4dec7556d6c76e
SHA1d87b7d9e128d5c20a6274dfb7196e46d58208cc4
SHA2560f4b7a13f661f8383d2e06b45bf7403fb7068dab6bed5de593359b6852a30549
SHA512b4c3e235ae3867f220b30e7cd87bc403828c3621716e79984c68b46531a4f8976fe07b82770c1777ac677d157de0adb40c6db86b7736c9adf3bb0e454eb599e1
-
Filesize
1.6MB
MD5d8957e18549671aedf4dec7556d6c76e
SHA1d87b7d9e128d5c20a6274dfb7196e46d58208cc4
SHA2560f4b7a13f661f8383d2e06b45bf7403fb7068dab6bed5de593359b6852a30549
SHA512b4c3e235ae3867f220b30e7cd87bc403828c3621716e79984c68b46531a4f8976fe07b82770c1777ac677d157de0adb40c6db86b7736c9adf3bb0e454eb599e1
-
Filesize
1.6MB
MD5d8957e18549671aedf4dec7556d6c76e
SHA1d87b7d9e128d5c20a6274dfb7196e46d58208cc4
SHA2560f4b7a13f661f8383d2e06b45bf7403fb7068dab6bed5de593359b6852a30549
SHA512b4c3e235ae3867f220b30e7cd87bc403828c3621716e79984c68b46531a4f8976fe07b82770c1777ac677d157de0adb40c6db86b7736c9adf3bb0e454eb599e1
-
Filesize
1.6MB
MD5d8957e18549671aedf4dec7556d6c76e
SHA1d87b7d9e128d5c20a6274dfb7196e46d58208cc4
SHA2560f4b7a13f661f8383d2e06b45bf7403fb7068dab6bed5de593359b6852a30549
SHA512b4c3e235ae3867f220b30e7cd87bc403828c3621716e79984c68b46531a4f8976fe07b82770c1777ac677d157de0adb40c6db86b7736c9adf3bb0e454eb599e1
-
Filesize
1.6MB
MD5d8957e18549671aedf4dec7556d6c76e
SHA1d87b7d9e128d5c20a6274dfb7196e46d58208cc4
SHA2560f4b7a13f661f8383d2e06b45bf7403fb7068dab6bed5de593359b6852a30549
SHA512b4c3e235ae3867f220b30e7cd87bc403828c3621716e79984c68b46531a4f8976fe07b82770c1777ac677d157de0adb40c6db86b7736c9adf3bb0e454eb599e1
-
Filesize
1.6MB
MD5d8957e18549671aedf4dec7556d6c76e
SHA1d87b7d9e128d5c20a6274dfb7196e46d58208cc4
SHA2560f4b7a13f661f8383d2e06b45bf7403fb7068dab6bed5de593359b6852a30549
SHA512b4c3e235ae3867f220b30e7cd87bc403828c3621716e79984c68b46531a4f8976fe07b82770c1777ac677d157de0adb40c6db86b7736c9adf3bb0e454eb599e1
-
Filesize
1.6MB
MD5d8957e18549671aedf4dec7556d6c76e
SHA1d87b7d9e128d5c20a6274dfb7196e46d58208cc4
SHA2560f4b7a13f661f8383d2e06b45bf7403fb7068dab6bed5de593359b6852a30549
SHA512b4c3e235ae3867f220b30e7cd87bc403828c3621716e79984c68b46531a4f8976fe07b82770c1777ac677d157de0adb40c6db86b7736c9adf3bb0e454eb599e1
-
Filesize
1KB
MD5c6ecc3bc2cdd7883e4f2039a5a5cf884
SHA120c9dd2a200e4b0390d490a7a76fa184bfc78151
SHA256b3d90663a46ee5333f8f99df4d43c0c76bf3902e3ba3ab36c0903027176d340d
SHA512892a8f8e50ff350e790e1543032c64b3e1c050198b1810f89b6ce8a23de947a3e8299e880f0e79da7e4b5373a6b95e7dd7814cd5d7406a1553ef104ff2ff091e
-
Filesize
1KB
MD5c6ecc3bc2cdd7883e4f2039a5a5cf884
SHA120c9dd2a200e4b0390d490a7a76fa184bfc78151
SHA256b3d90663a46ee5333f8f99df4d43c0c76bf3902e3ba3ab36c0903027176d340d
SHA512892a8f8e50ff350e790e1543032c64b3e1c050198b1810f89b6ce8a23de947a3e8299e880f0e79da7e4b5373a6b95e7dd7814cd5d7406a1553ef104ff2ff091e
-
Filesize
152B
MD5483924abaaa7ce1345acd8547cfe77f4
SHA14190d880b95d9506385087d6c2f5434f0e9f63e8
SHA2569a111c2b76c1b5f6d4f702502b9ff4326b7b5682921c2760286dd073824cb684
SHA512e4ac0a0d5f06e056901c68488e34358a32a5bc7aeffcd82af7eba6043d0fa35eaa67a67c3716dcb661aaca441677819bcba7d35bc4efc6103f3ce32f78e32310
-
Filesize
152B
MD5483924abaaa7ce1345acd8547cfe77f4
SHA14190d880b95d9506385087d6c2f5434f0e9f63e8
SHA2569a111c2b76c1b5f6d4f702502b9ff4326b7b5682921c2760286dd073824cb684
SHA512e4ac0a0d5f06e056901c68488e34358a32a5bc7aeffcd82af7eba6043d0fa35eaa67a67c3716dcb661aaca441677819bcba7d35bc4efc6103f3ce32f78e32310
-
Filesize
152B
MD5483924abaaa7ce1345acd8547cfe77f4
SHA14190d880b95d9506385087d6c2f5434f0e9f63e8
SHA2569a111c2b76c1b5f6d4f702502b9ff4326b7b5682921c2760286dd073824cb684
SHA512e4ac0a0d5f06e056901c68488e34358a32a5bc7aeffcd82af7eba6043d0fa35eaa67a67c3716dcb661aaca441677819bcba7d35bc4efc6103f3ce32f78e32310
-
Filesize
152B
MD5483924abaaa7ce1345acd8547cfe77f4
SHA14190d880b95d9506385087d6c2f5434f0e9f63e8
SHA2569a111c2b76c1b5f6d4f702502b9ff4326b7b5682921c2760286dd073824cb684
SHA512e4ac0a0d5f06e056901c68488e34358a32a5bc7aeffcd82af7eba6043d0fa35eaa67a67c3716dcb661aaca441677819bcba7d35bc4efc6103f3ce32f78e32310
-
Filesize
152B
MD5483924abaaa7ce1345acd8547cfe77f4
SHA14190d880b95d9506385087d6c2f5434f0e9f63e8
SHA2569a111c2b76c1b5f6d4f702502b9ff4326b7b5682921c2760286dd073824cb684
SHA512e4ac0a0d5f06e056901c68488e34358a32a5bc7aeffcd82af7eba6043d0fa35eaa67a67c3716dcb661aaca441677819bcba7d35bc4efc6103f3ce32f78e32310
-
Filesize
21KB
MD56fa92461bcbf001dcac18f3139aaff20
SHA18bda973b6ac863acdcdc97b08a84d3d589c600ec
SHA256690fb0274e131258e1c0ebed40fec1181f838a0a9f9c4bdc79e8f80362c66545
SHA5121389d5bf14108a6e5a557fea2b04f83073d7f994c8f4f7e5680f0a6a603ea70def020b0205587369b9afda0afc5a094c3c882dee73c246d0b34eff314e9c5fd8
-
Filesize
77KB
MD5f5ab5fcb66b8badd4face615d9ef345f
SHA12ea38f6d6c224df475d2269069af2208b3e41f2b
SHA2568fbb3acf2a0b56de4eefa703a32cb860dcc62b55d3569a32f724d91d7c2f1f21
SHA512504309e1139a3eb4a87b9a1374b45e6de194023c98f34996d9d22c51aeafada06f0145e45a21671dc8b88075debf0fb8ad3acc5b955f34808b71550aac32a4c0
-
Filesize
94KB
MD5afff3da2c1797f69e8f1afb97ab882bc
SHA1251ec136a505cfe9841035d6c63863de2fd1f4fc
SHA2567f8951f76bd3351798a7bd5548a2b8efa71df5050bc51d2fd87f21304e0b9578
SHA512f8f98d66c3fc4f920dfb5dfdc121e8e647890688625cfa32499735320fd18b4d3c9cc97ef9de13d04acdcc92d9048b795305d31e6f1bdd507dd063d74c761cfc
-
Filesize
119KB
MD50bb2294f6074015b27580108354606fc
SHA13af0c644865eb00f36b1ba906de3bacfa42058e7
SHA256b7c30206ff137cc4c9ba8d6d8cc92447922fc89d5777d09147a130bc26c56128
SHA5129a2bdc8e5e9cf22d18b02d1dae41a368ef326450ff9b916d1182fc2d2175a4b7ac201685f64611f5e038a2d0cd2e3906e00cfa8e305e99a7bfb0400f7cf08abd
-
Filesize
18KB
MD56bca30121add7f93f24309ddb89f204f
SHA1503a54cf705bcf54ad0a8edb82879bfdffc44ab3
SHA256f9f73673ce0d0d61650d4ef46ccdad5d04e4dbefb2841ecde1676793a248e133
SHA512238a1a9f032e9c5ffbcfd1ca8889cf99082e214944c37c718adaf0559d7152438faacf3f6bd26cf52b78eb0fbaba8168bd3c4f8dad6e52e0175495dd3ca1cd73
-
Filesize
28KB
MD5fb286e8aaf59d8c4ba4d8904230d16b5
SHA1a0fe812723b7c75f423f5cf4a48d7d1a0f4a3f2b
SHA256d36d5696d432de434ad19765846d10cf4b8597f6fda999ab45594a77b294e4dc
SHA51254781ec9f2901d2fda82a0a95741947dd93dee1522bf1c85bf537c174eeb00e38e627349f691d43e0bd9758a0eee37b24799e2d61734f02cdffc04b97299cc08
-
Filesize
132KB
MD50c3ea0fc719ede2b46098c7b26e19a0d
SHA119ab85176b1d16328ef1b27fe0ef49b296a5115b
SHA256513d7154516b3f40bd1baba1cd5eb06489af844d221f75a4e64a8dc82c2ab21e
SHA5120f34bb96e882c508fc92c088b866952b966f709b32951a14d47b54b18669524a808d2d3320867e75364e2e8a6a5bf1d955abd9b7c70095da7514ecc7465f0f08
-
Filesize
70KB
MD5c82168b3e85da9f1c4ce258c515bffb8
SHA12ebc8bfe30548162b44111db40cad6236e494431
SHA2560d7498eb41cec89989b6e10573ac22f6b48b4a2d60ee030feae87b7f8c79c94b
SHA5120807a53b933722ad45756151f7aa138519ae1945a200094163422d88c3440f34448e11eb8788f43afc440b3647143b97c9ef8ef8606d6840518b316786630267
-
Filesize
47KB
MD53818c380007d938d124a9513e5525330
SHA1d8584e08de0414859227c3f1128a7a4a3935f9fd
SHA256b0cd59390b8ed61ab1319a316b7dc6ba6e85fdbf5f01e91a46d45dd6053cbcf9
SHA512c93abc457e9507790a80f42cc78c1893b9138ac05442f6153336a637b4cb332ddd8793ea94ddc96170269a32e739ab3b933e157873352d1289d2b5fd90880ab1
-
Filesize
64KB
MD5ecc9ae757d465088f9bccda117fdf9dd
SHA1c4ff1f1de8780e6f5b8a96f341a8eaf8b06c66a9
SHA256da91b50df12765d64d49c43dde7b30c51586a817ab35858aa0e2f59f3f5ff060
SHA512a92a7d9b2539413971f9f6f6f267dbc9918d228df102b85611ee09e156ad1f808d4de1f21b07a8d655fbf2e94b4fb28ffa31ed359c2fbf68c8c1b1d2f4a073d1
-
Filesize
70KB
MD54942d7d3a37c68bb8db6681e23bce99b
SHA1f6b3dab6006a555890c55e96f06544acd3b4d376
SHA2564308cf3f15b3a81591d5026e528ac1fbb038b2cde209ea7837f65f73a1686f9d
SHA512422d205cefd30bedf0ca809b67498d310c489c34dcfb0f779d5cc98585f92b220f1f5f84c5a86af19d4514d95fdfcf56a9904d6f63576354a42aebc8fe310bf2
-
Filesize
30KB
MD56fc8c8c731f114fc2ccabb65b6f6544b
SHA185972bf9eea42fe61e328c66160ab8bb7fbbf683
SHA25675078b6d4fde9ed54908b2ab174c180dbf6d3d1a67b63a8edc749bde6c27f3a5
SHA5121002b3158a60a79a41d63467ad9233e62e780bc723d3eecbe3b1b8d4da395bee3daaed360d056da6ec967c36dd02183e4a4b9f2ef2e48a785221293b2167389c
-
Filesize
58KB
MD520e29a0c1d34ea8f344bc6fbe79879f2
SHA1393da7126113c972bc677d6ee54fe20b88167ab2
SHA256615c0743fb37e27da2b564015aabce06b4797bb8bdd2a92964aab4188173b4c4
SHA512c2e96cee1e7ef001eaf729816da20dbf62fb326d68e1dfb5cbe8273d2d2fc06fc9dcf30e97f764464b578db01a58764df9072649f65613047365b26113c5b347
-
Filesize
18KB
MD5027097b89d818c10e751246adbcdd77d
SHA1fa42a2f8c8a6589ca1d48cea0c2b6681d12de392
SHA2569c9f778efb44ccc645d943153fab1a462e1bc6b363b6a752d431bafa755f391b
SHA512556f845f2b1962a89dd1e457b8bbac2ff50eec06f1c740da16dcda1b4bae9ca01ca437a73cc76356c88f44d395d9dadcbeda25f5a3c7df09d4b073d26d4d0a9f
-
Filesize
230KB
MD59c48a0a5bd9686c757787bf4de4d332f
SHA19ac19a0d956bf1ed3335b3d9465cfdde99815f4e
SHA25637062435ac62d6fa676dc75b1daa3721284b593e66e96854e00d1537daa0aa24
SHA512c8f5f1082f3e5845346e3b463a2c6ac827b8c83e36f2da6b9f134980f674aea1293b5b7c9e80674bed7cf8276fbb19a82372b629d118b7b83e2b0bb29176ad7c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize4KB
MD53ae9ebe55bad0bb2cf87441dcc40dc40
SHA136c659bba64650646eda67bfdb051426b61bc1c9
SHA2562140eaed49d95ffaf94304c4939a14ad9da781302edf56d694db28cfddbaa0c5
SHA51289974b555c0063479adf80104c984029143ffc858c62d997bbb5eac193b85b28a0f895cf64bdb483caafedd067a96386e049d165af032f321896b70a23f19623
-
Filesize
7KB
MD5b5949ac1d0f4cb1387508682d2ccba27
SHA1203e96b240fad161c8d02bc2da4bfedf3c5f019b
SHA2561d71a09c61ff5344bae8ee2049fb1dd2ef3690a899afead3d89b93fd41739da7
SHA512568ee6dbf67ffeb5ec43eec52a0d76568777edf316eeab1205a5cb2e903289e5cd7e63785943cfc36a6761c00a3e2f1f30f46c51ecbed2f7b7279d2b6ae6411a
-
Filesize
11KB
MD5fb0bfc8dda2a1bdf8ff7a5ee196cf57a
SHA1d11ff7ca32787f9c3c281858099cb86d477ff845
SHA256c00e88fc959d6a850af2a9ed03176c02d343417ef82f1e7270349de8e5c1c655
SHA5124ea5184281e1dfe60363fca9797060a5ae280455464f37990a7b7237fbb2845440ffb8410782449da6590503b2e3348ba04ad39446c9a9627eeba23be41560dd
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD589fb19034c3b2a3ef0277409699454a7
SHA1e38ea62203f8dc1fa961605382b19cad0a2f607d
SHA25686222b4361dddb22355356093c19194d72d484efa4ec1a88b611052cf98f9286
SHA51215ca79fe398c8a37d85b09a75185bc2612b935fcc5adf739f0bda02aa45d2d49276e1c63b2873301779d6f479c3dc66d9b47ecb2e7d3e700ea697e48b09d710b
-
Filesize
7KB
MD5a8af125cd3c6cecaa3c89699cd778997
SHA1007358f5ef76831e0c770a44b8cf23cef9fd0ccc
SHA256b083be06158eca4fffb64957debfb58d3c415908bb6838c371cf3ade42e35a60
SHA5121c75dca239571dfaf5d9436835425bf8aa00503b321dbd96ff15e55cdd623cd7a38c320203d478ae4d133cdf5d6a475e63d7b07a5f2badf6cab66f228066ee86
-
Filesize
9KB
MD505c60a1aac11c807923314b74b127de7
SHA14ccf3af005766689c2da6e0a17f1084bc3b58c50
SHA2560b93a3db7608b21ae2ef114a247ced175f931f40a86662b57fc8679d6366108e
SHA51279304c6ddad55f4dfe90880200d00d948a603865dc28c49a277c4223dcfa954e4b2fa7ddacb6583d487029be90b1576b068d84e6c1119c8b8c602837cb5be196
-
Filesize
10KB
MD5b0450c36e60bded57ee568030932df9d
SHA1e38c0d70af2c346f52b9a4bd124d72b3942a9cb2
SHA256aae8e27b65fd3f3a82bd31afdcf94b3679781560359476d21a82f13de2bb6b21
SHA512b9a993c66b786128ce03834705506144b58b712b8ad20391cd9cbf72a37e0462aa17e90111f1ad67ba0a8ee9f41a6a2c2227850acc4d5a0c120e8c3493c7748d
-
Filesize
11KB
MD52f02345fcd01e7a6c03e8e6ab6cef866
SHA1109152804fb369551311d7c09c83dcdd2872ac76
SHA2567d772bcc5bc5643b5aecffa2ad0d03f6fdcd981a856f957aa11d37b257cbe58e
SHA5120f6f41995165d7c2c446e80e60551af27dd582540b5eb0b5f53d51a7d83405374dbb6fb2af71b5e2383e71949bc22a8295447dba3efaa95226c32591ffebbd55
-
Filesize
13KB
MD5c696217cb2838ce097196e45939b7133
SHA1e301b2d18583274d2f864776f6393cafe7eac96c
SHA256f31c22258264f621396c85238d991ecf9d0fe83d17bc293f5547e00f88f0c0f7
SHA51209f686288e9ff8e66d9c184ae15f1349ecd85438f0e83f9df89b4b081aca4f1426ab25813c25a3ece52cd92259ab734f440fefae5e40e6130f9fd9b226be5bb3
-
Filesize
5KB
MD59191bcc0f6c3276d1cf59c4de22af5df
SHA10bbc7569a27f32160eb059f416c6cdc75ea4f8b0
SHA25673d295e12a19c8768600431bdc4aaa1a4c2e5aa5e888033ae3b284e575e25ab0
SHA512d97762c69ed6bdeee8a86985bba4e4b8c016fcb4796045f887aec62973bead74b3f372675af1af015198e728331aab6015283c322a2b602fff00a01449118016
-
Filesize
24KB
MD51c706d53e85fb5321a8396d197051531
SHA10d92aa8524fb1d47e7ee5d614e58a398c06141a4
SHA25680c44553381f37e930f1c82a1dc2e77acd7b955ec0dc99d090d5bd6b32c3c932
SHA512d43867392c553d4afffa45a1b87a74e819964011fb1226ee54e23a98fc63ca80e266730cec6796a2afa435b1ea28aed72c55eae1ae5d31ec778f53be3e2162fc
-
Filesize
3KB
MD5623b00c6878c50681fc6c1a2094661a8
SHA1b7a9cd989b3f9b6b890b19559511a039ccdff102
SHA2565262856b410dadff3c0b88842b06c6d7f6a803bdc3bb9ff486b90db636c415e0
SHA51246b06020cec525d631187e5f9fa67fe5f222a8fdc5f40f0fe94b5da3fdaa9e1301e6ba35c44ba221f00711e5e19437849a41baa222e89c0a96b7f65a21cf2428
-
Filesize
3KB
MD5cf636fce4b3fc2f828d4e4c0cf79e7a3
SHA136a830c6fbf97233b9d7e6a47b707e71c9edcc54
SHA2569e1386dec8707e165ca5aaf89cb13653c20a5d2c515cf5e7562c241fe5b18ee8
SHA512ebbd99d3f14b7dc046af9abb9b0f0a6717181936877f8ce6831581c72ab99bb0cfdc5e507b5a10b14922602315188c4ed22677f5a406cbb47a05245ccce93fed
-
Filesize
4KB
MD51b12bf498715363c41499e8e29541d17
SHA15e54b7c74e7cbda7d9129ed5b46e059afd3dca3e
SHA256e96ff63ffd98774677024869dec0cbbe0d7b3b7626ab1fd82404fffb2b1284b2
SHA5124991216fe2fda256e2f72c24453904573cc5f74dd39c62c155137ac5d4d6324cfdc9a2927af9a5b8d86e6e679baac37a55d903ec0cacdc22b7815dab65dd1644
-
Filesize
4KB
MD54281d549f67fbe095b4bbafb043160cd
SHA18b206cb390711c4a15464f44585297039b2d5041
SHA25611b35e2fab425e4cf36ca30c9e8a3f34ce8e1853ca0ce155c7c641dfc1989039
SHA51213e82b2b1bfc36f1e3ec6d93e61fb09f8c7763c31f97f0edfabffbbf66c5d069f9467f8a9048180f4471f5de9a7cf3bd6fdb30b826fecc36a3b473686c5deb46
-
Filesize
4KB
MD5dab64eaf593ed895b0f0928f5d69b415
SHA17e364d88be6723f4cc1632fb924e6ea0d00b3e77
SHA256d83ad91887e4a22eff7247bca65e122acd817d8e7006cc42eb2a52502109a098
SHA5128ea857eb110555adc0612d87957f7c8da8357610667107589be9673c8ad4c450465ce687ea584aa60a09470ffa3a29eb03c4646f66d1705eb10c8b323b9ea0fa
-
Filesize
1KB
MD5cea625478d3c99138e83a69f104bdcab
SHA1d13f75f6b6d6dbc5dc68ff5f4532d12a7f9d2c6e
SHA256689f0821164de88c25f944a2405340ac27f8f021ec73ea8963ff2abc32445545
SHA512f3c2d2b67458c98df692a6697d67e8cb635a84ed01b23649775c7e53c28e2f72480309362bbfe76b730ab3bb4b68da9e01140cff289be3e605d19c770a902e2d
-
Filesize
203B
MD5280e76b58c5b19ca6f57f317b5f4ef7f
SHA17ad4f3bf1b537203753d4a1cde875d4999c24519
SHA2567c6ed470adb374be6dce244ddd323ad21effb7a9654a4a73b95637abdcfca460
SHA512d656b45dfb2390a451efa28ae3a281e3d9cbf38a16798f455d6759eed12dadd45565e8afd34af8019fbdb3f5310b145c94502e63f2ab566fee47d9b2ad0829f1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
2KB
MD58e565e40b6ee2314426bf41a2287ae4e
SHA1271427fd4db03c594a1c7b8da5f02091ccdb28c7
SHA256acd5b474e2c697d6ded9257b69bada75593c16ee1702d16d3e428448e77e130d
SHA5129665a6e72b7fb43b464dbb8faefb235e7f77d6f1d548c6836e53feae799db8f4baa83c3f3779dfa261a9fd4cab1049adacc802eb855c1dbcdad7a7201756d8c6
-
Filesize
10KB
MD5409fa61b7efc0f7b4f2a03af44a7878e
SHA1431060da267272176466b7e71998f7a5e18460a1
SHA256aa89a6b06401cbe9632ba0ae12cea7524ace3121333474d20283d13b47fdfa5e
SHA512d8be021f839765ca42321a8cf0c3825b5d84f2c1dabdaa255b2110b4096ff6afe8153cebeaf7911c4d14610be51182e04d098a217300f14a64c878c9c69f3de5
-
Filesize
12KB
MD5ec8eb91fbbf3e5041174d6073e101db6
SHA144e42a6ef2e695923125e6ea1abb804fc209c2e8
SHA25607c0eff071852e0aa52676961304287eedfd36a7477792e239c51ce7cb4a57b8
SHA5123e8094cbbf39155fd39b75627c1beea11315288c2205f90f749f5e71adebda4421b9d56a68fab81d53e8f571c4765438e0656f0e2ea82f17dfc03cb18fcb24b3
-
Filesize
11KB
MD562f88d1d4ad12d6a071953515b8ce172
SHA11c6dc4e3964d9fc28d97babb010db41b1b907a58
SHA256cca4e5763d1ca70fdd7fd655166f4ef6ca40d75d37922351c5d01e0550af1bbb
SHA5129364692a24396fe46c69291014e436cc4c57732775595dcd01704cdc9b1bf00155416e5984fdfe4b131d65ba19367ca9b51042552e2f7ff57a2d7cc1142ff037
-
Filesize
12KB
MD52d99929a148953ddcccebf4a7147f87c
SHA10449345d57b7e25f0380f43ac51926ca7bef38d1
SHA25615dcb7443c2d9b14e646b3f40286d022d166f580329102f88145b11dc18943fd
SHA51285eb98b536baf6ee57aae99345913db559bf8a4d078009b94938ab65b40f7232693fbfcd0abc1aba3ba6319ffca6279c0a73c1a048e493615ddd358119a94922
-
Filesize
2KB
MD58e565e40b6ee2314426bf41a2287ae4e
SHA1271427fd4db03c594a1c7b8da5f02091ccdb28c7
SHA256acd5b474e2c697d6ded9257b69bada75593c16ee1702d16d3e428448e77e130d
SHA5129665a6e72b7fb43b464dbb8faefb235e7f77d6f1d548c6836e53feae799db8f4baa83c3f3779dfa261a9fd4cab1049adacc802eb855c1dbcdad7a7201756d8c6
-
Filesize
232B
MD5a373b4c7ef3b7b6fe740f87ce7e1292a
SHA14f4811303fb68d3ebc905ab583b2485e9a4a29bf
SHA256466201c7de397a3adbe966440404fef73b27b7eb7beebad4004f43c5d0e89d10
SHA5121d96b975768d368166a6d073284cf95d60705d36424275c8c87491c64972f8a97907e81a45846b70b99ce30d0b3acf4092c6c6cd065e7b8fd3b5c037962853c1
-
Filesize
226B
MD5e361fdc9d8eed5f004da0ae9b955648b
SHA19adc1e959dd8a1836b06773de6f99d90fd245c09
SHA256d62d6b5add9039c8a7013c62f74b2a7cf716ffcf8e9f9d9f3f248a80954698da
SHA512a330e95e25d88d63057ccba935bf5e069b893135b85333533bdf6b71225eeb7aa316c8e2ea86c609c3ef075b5cda970f8d5508b6dd089497aa25652b4d30ca56
-
Filesize
232B
MD57dcd1208e63ad551fc796f9cd232b520
SHA11214c432b7e4a652f904af20263d98587c304cb5
SHA256ec575194ec99fe648fe5ad837722020bd00866b94ff07c555776648517a09c3e
SHA51238acfc8a875ff795d45163ff6939fd188f8e8398870ffc99f5317d62443452f575545b94ae9df9b5e05118c6845bf660b2874f44bd919c240b572cef6ef1c7d4
-
Filesize
743B
MD550bf9c9f9c91e87fc2e01c32c13795df
SHA14b2c813fb31f9348a7d95243e1b4bdf1bbaf7416
SHA256d72c07f5e24f0ad867d90a9f49a57b967622a27f29d009e30f2843187701b0f5
SHA512f210692f562677949a5460f31d09a34df999adb415dbc49688a47861fe0aaa1a44b7b4e438f187c20c25391f4aad25dac9b101404af4a424204b1068b880baed
-
Filesize
1.6MB
MD5d8957e18549671aedf4dec7556d6c76e
SHA1d87b7d9e128d5c20a6274dfb7196e46d58208cc4
SHA2560f4b7a13f661f8383d2e06b45bf7403fb7068dab6bed5de593359b6852a30549
SHA512b4c3e235ae3867f220b30e7cd87bc403828c3621716e79984c68b46531a4f8976fe07b82770c1777ac677d157de0adb40c6db86b7736c9adf3bb0e454eb599e1
-
Filesize
1.6MB
MD5d8957e18549671aedf4dec7556d6c76e
SHA1d87b7d9e128d5c20a6274dfb7196e46d58208cc4
SHA2560f4b7a13f661f8383d2e06b45bf7403fb7068dab6bed5de593359b6852a30549
SHA512b4c3e235ae3867f220b30e7cd87bc403828c3621716e79984c68b46531a4f8976fe07b82770c1777ac677d157de0adb40c6db86b7736c9adf3bb0e454eb599e1
-
Filesize
1.6MB
MD5d8957e18549671aedf4dec7556d6c76e
SHA1d87b7d9e128d5c20a6274dfb7196e46d58208cc4
SHA2560f4b7a13f661f8383d2e06b45bf7403fb7068dab6bed5de593359b6852a30549
SHA512b4c3e235ae3867f220b30e7cd87bc403828c3621716e79984c68b46531a4f8976fe07b82770c1777ac677d157de0adb40c6db86b7736c9adf3bb0e454eb599e1
-
Filesize
239B
MD5445deffc476f599610ccfbc026c5719c
SHA1ad2d330d80df0f2cb2bf9ee8e70566cd201cee04
SHA25615324a0079a4e21407a0a0211fe8daec86eddd0f6ffc44878f8c0239a4f23cde
SHA51292d38ef6d21319ec5927316943e2ef665df2a89fec9563fd85e317214322052e8f77f0027e859fcaa4d785b6be47ac9a56b99629dc487903f619d25477a9d018
-
Filesize
59B
MD5a0cf60494714328654ae0acf46d72cc0
SHA161bbcde48028567053eca470fcca76776bdc5d17
SHA256b93da684a52006130321ff31e4f0f4af96ecd5bf2bfc347b24b6a596153319a7
SHA5125fa41265ccbab182c5126c93471e18d45498378bd6d763466c278518c9e50f9c7bc31438c8cd6e9060931025c1bea942393b68428f1bdda927d7d0c216a01749
-
Filesize
4.4MB
MD5a4d53c34646c0e12a0dfc7ba47d71572
SHA1de4c2427555543446fdac26d52f478084ade5275
SHA25600028582c2776153eed9df9970c70c416e5e7a38968fdd0ad32f7809d02634c8
SHA5129d0aeff237a5cbb8cbc3c4bd705eb2e4d78a0847b25590bbbe88efec699bf898662d188c9e3fc9e47a644b87bd5e392477a908b996369640c234128ea1947ffc