Analysis
-
max time kernel
66s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
25-04-2024 19:51
Static task
static1
General
-
Target
ab4523abcb1ed941a8f9b3a0e8665c8d6c3c3e1df66a5bb2bfaa0c43bc5d15ce.exe
-
Size
1.8MB
-
MD5
ce40fa2c7c0d6847ee6cf5c3d7e15506
-
SHA1
325317c47d3677428ced294f76e06390d937df7c
-
SHA256
ab4523abcb1ed941a8f9b3a0e8665c8d6c3c3e1df66a5bb2bfaa0c43bc5d15ce
-
SHA512
eabdeab6b978fc7bc7ad7c01910388486001eebf64ea49a72bcce5d64adf337b93685e0493f3b9c12a4158481dfd94d422652752aa200ef98db6227add1f80ae
-
SSDEEP
24576:kBmke3n2jurT4yN3+WS6Iq1m/wDiht3lkU5zMVwIoWwrnkhc1A/xd3QG43R:kBU3n2aHflWKRmht3WDrOnD6t4B
Malware Config
Extracted
amadey
4.17
http://193.233.132.167
-
install_dir
4d0ab15804
-
install_file
chrosha.exe
-
strings_key
1a9519d7b465e1f4880fa09a6162d768
-
url_paths
/enigma/index.php
Extracted
redline
@CLOUDYTTEAM
185.172.128.33:8970
Extracted
stealc
http://52.143.157.84
http://185.172.128.76
-
url_path
/c73eed764cc59dcb.php
Extracted
lumma
https://affordcharmcropwo.shop/api
https://cleartotalfisherwo.shop/api
https://worryfillvolcawoi.shop/api
https://enthusiasimtitleow.shop/api
https://dismissalcylinderhostw.shop/api
https://diskretainvigorousiw.shop/api
https://communicationgenerwo.shop/api
https://pillowbrocccolipe.shop/api
https://productivelookewr.shop/api
https://tolerateilusidjukl.shop/api
https://shatterbreathepsw.shop/api
https://shortsvelventysjo.shop/api
https://incredibleextedwj.shop/api
https://alcojoldwograpciw.shop/api
https://liabilitynighstjsko.shop/api
https://demonstationfukewko.shop/api
Signatures
-
Detect ZGRat V1 4 IoCs
Processes:
resource yara_rule behavioral1/memory/960-113-0x0000000000400000-0x0000000000592000-memory.dmp family_zgrat_v1 behavioral1/memory/100-114-0x00000000008F0000-0x0000000000BA8000-memory.dmp family_zgrat_v1 C:\Users\Admin\AppData\Roaming\configurationValue\trf.exe family_zgrat_v1 behavioral1/memory/4420-146-0x0000000000DC0000-0x0000000000E80000-memory.dmp family_zgrat_v1 -
Glupteba payload 8 IoCs
Processes:
resource yara_rule behavioral1/memory/6388-687-0x0000000000400000-0x0000000003005000-memory.dmp family_glupteba behavioral1/memory/6604-688-0x0000000000400000-0x0000000003005000-memory.dmp family_glupteba behavioral1/memory/6388-759-0x0000000000400000-0x0000000003005000-memory.dmp family_glupteba behavioral1/memory/6604-776-0x0000000000400000-0x0000000003005000-memory.dmp family_glupteba behavioral1/memory/1392-806-0x0000000000400000-0x0000000003005000-memory.dmp family_glupteba behavioral1/memory/3128-808-0x0000000000400000-0x0000000003005000-memory.dmp family_glupteba behavioral1/memory/1392-1030-0x0000000000400000-0x0000000003005000-memory.dmp family_glupteba behavioral1/memory/6388-1166-0x0000000000400000-0x0000000003005000-memory.dmp family_glupteba -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\configurationValue\trf.exe family_redline C:\Users\Admin\AppData\Roaming\configurationValue\keks.exe family_redline behavioral1/memory/3600-139-0x0000000000220000-0x0000000000272000-memory.dmp family_redline behavioral1/memory/4420-146-0x0000000000DC0000-0x0000000000E80000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\1000152001\jok.exe family_redline -
Processes:
Uni400uni.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Uni400uni.exe -
Processes:
Uni400uni.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\1000226001\Uni400uni.exe = "0" Uni400uni.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths Uni400uni.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
ab4523abcb1ed941a8f9b3a0e8665c8d6c3c3e1df66a5bb2bfaa0c43bc5d15ce.exechrosha.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ab4523abcb1ed941a8f9b3a0e8665c8d6c3c3e1df66a5bb2bfaa0c43bc5d15ce.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ chrosha.exe -
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exerundll32.exeflow pid process 131 4008 rundll32.exe 180 5104 rundll32.exe -
Downloads MZ/PE file
-
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
ab4523abcb1ed941a8f9b3a0e8665c8d6c3c3e1df66a5bb2bfaa0c43bc5d15ce.exechrosha.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ab4523abcb1ed941a8f9b3a0e8665c8d6c3c3e1df66a5bb2bfaa0c43bc5d15ce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ab4523abcb1ed941a8f9b3a0e8665c8d6c3c3e1df66a5bb2bfaa0c43bc5d15ce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion chrosha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion chrosha.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
chrosha.exeRegAsm.exeNewB.exeUni400uni.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\International\Geo\Nation chrosha.exe Key value queried \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\International\Geo\Nation RegAsm.exe Key value queried \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\International\Geo\Nation NewB.exe Key value queried \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\International\Geo\Nation Uni400uni.exe -
Executes dropped EXE 12 IoCs
Processes:
chrosha.exeswiiiii.exealexxxxxxxx.exekeks.exetrf.exegold.exeNewB.exeUni400uni.execap.exejok.exeswiiii.exe7wuGEJczI8PROwjcX9IOiM8F.exepid process 3520 chrosha.exe 5020 swiiiii.exe 100 alexxxxxxxx.exe 3600 keks.exe 4420 trf.exe 724 gold.exe 4404 NewB.exe 2712 Uni400uni.exe 2008 cap.exe 3968 jok.exe 5596 swiiii.exe 6084 7wuGEJczI8PROwjcX9IOiM8F.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
ab4523abcb1ed941a8f9b3a0e8665c8d6c3c3e1df66a5bb2bfaa0c43bc5d15ce.exechrosha.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Software\Wine ab4523abcb1ed941a8f9b3a0e8665c8d6c3c3e1df66a5bb2bfaa0c43bc5d15ce.exe Key opened \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Software\Wine chrosha.exe -
Loads dropped DLL 3 IoCs
Processes:
rundll32.exerundll32.exerundll32.exepid process 2056 rundll32.exe 4008 rundll32.exe 5104 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\Pictures\wqty4p0TLsiIT9djxk8DmWKM.exe themida C:\Users\Admin\Pictures\Xsx2enmMx6SkVYfNR0W59wNb.exe themida -
Processes:
Uni400uni.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\1000226001\Uni400uni.exe = "0" Uni400uni.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths Uni400uni.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions Uni400uni.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
Uni400uni.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Uni400uni.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Uni400uni.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
-
Looks up external IP address via web service 8 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 350 ipinfo.io 298 api.myip.com 299 api.myip.com 301 ipinfo.io 302 ipinfo.io 346 api.myip.com 348 api.myip.com 349 ipinfo.io -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
ab4523abcb1ed941a8f9b3a0e8665c8d6c3c3e1df66a5bb2bfaa0c43bc5d15ce.exechrosha.exepid process 1600 ab4523abcb1ed941a8f9b3a0e8665c8d6c3c3e1df66a5bb2bfaa0c43bc5d15ce.exe 3520 chrosha.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
swiiiii.exealexxxxxxxx.exegold.exeUni400uni.exedescription pid process target process PID 5020 set thread context of 3624 5020 swiiiii.exe RegAsm.exe PID 100 set thread context of 960 100 alexxxxxxxx.exe RegAsm.exe PID 724 set thread context of 1136 724 gold.exe RegAsm.exe PID 2712 set thread context of 2296 2712 Uni400uni.exe regsvcs.exe -
Drops file in Windows directory 1 IoCs
Processes:
ab4523abcb1ed941a8f9b3a0e8665c8d6c3c3e1df66a5bb2bfaa0c43bc5d15ce.exedescription ioc process File created C:\Windows\Tasks\chrosha.job ab4523abcb1ed941a8f9b3a0e8665c8d6c3c3e1df66a5bb2bfaa0c43bc5d15ce.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exepid process 3052 sc.exe 5800 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 7 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1016 5020 WerFault.exe swiiiii.exe 3320 100 WerFault.exe alexxxxxxxx.exe 1448 724 WerFault.exe gold.exe 836 6492 WerFault.exe u4p0.0.exe 4452 2444 WerFault.exe u5go.0.exe 5608 7080 WerFault.exe jCdOHVmxOeSFD9RxGzWQ08sD.exe 1640 6084 WerFault.exe 7wuGEJczI8PROwjcX9IOiM8F.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2356 schtasks.exe 6932 schtasks.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
Processes:
msedge.exechrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Processes:
keks.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 keks.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 keks.exe -
Suspicious behavior: EnumeratesProcesses 37 IoCs
Processes:
ab4523abcb1ed941a8f9b3a0e8665c8d6c3c3e1df66a5bb2bfaa0c43bc5d15ce.exechrosha.exerundll32.exepowershell.exetrf.execap.exepowershell.exechrome.exemsedge.exemsedge.exepid process 1600 ab4523abcb1ed941a8f9b3a0e8665c8d6c3c3e1df66a5bb2bfaa0c43bc5d15ce.exe 1600 ab4523abcb1ed941a8f9b3a0e8665c8d6c3c3e1df66a5bb2bfaa0c43bc5d15ce.exe 3520 chrosha.exe 3520 chrosha.exe 4008 rundll32.exe 4008 rundll32.exe 4008 rundll32.exe 4008 rundll32.exe 4008 rundll32.exe 4008 rundll32.exe 4008 rundll32.exe 4008 rundll32.exe 4008 rundll32.exe 4008 rundll32.exe 5104 powershell.exe 5104 powershell.exe 5104 powershell.exe 4420 trf.exe 4420 trf.exe 2008 cap.exe 2008 cap.exe 2008 cap.exe 2008 cap.exe 4724 powershell.exe 4724 powershell.exe 2008 cap.exe 2008 cap.exe 2008 cap.exe 3620 chrome.exe 3620 chrome.exe 4724 powershell.exe 4724 powershell.exe 6044 msedge.exe 6044 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
chrome.exemsedge.exepid process 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
powershell.exetrf.exeregsvcs.execap.exepowershell.exechrome.exedescription pid process Token: SeDebugPrivilege 5104 powershell.exe Token: SeDebugPrivilege 4420 trf.exe Token: SeBackupPrivilege 4420 trf.exe Token: SeSecurityPrivilege 4420 trf.exe Token: SeSecurityPrivilege 4420 trf.exe Token: SeSecurityPrivilege 4420 trf.exe Token: SeSecurityPrivilege 4420 trf.exe Token: SeDebugPrivilege 2296 regsvcs.exe Token: SeDebugPrivilege 2008 cap.exe Token: SeDebugPrivilege 4724 powershell.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe -
Suspicious use of FindShellTrayWindow 51 IoCs
Processes:
chrome.exemsedge.exepid process 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe -
Suspicious use of SendNotifyMessage 48 IoCs
Processes:
chrome.exemsedge.exepid process 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrosha.exeswiiiii.exerundll32.exerundll32.exealexxxxxxxx.exeRegAsm.exegold.exeNewB.exedescription pid process target process PID 3520 wrote to memory of 5020 3520 chrosha.exe swiiiii.exe PID 3520 wrote to memory of 5020 3520 chrosha.exe swiiiii.exe PID 3520 wrote to memory of 5020 3520 chrosha.exe swiiiii.exe PID 5020 wrote to memory of 3624 5020 swiiiii.exe RegAsm.exe PID 5020 wrote to memory of 3624 5020 swiiiii.exe RegAsm.exe PID 5020 wrote to memory of 3624 5020 swiiiii.exe RegAsm.exe PID 5020 wrote to memory of 3624 5020 swiiiii.exe RegAsm.exe PID 5020 wrote to memory of 3624 5020 swiiiii.exe RegAsm.exe PID 5020 wrote to memory of 3624 5020 swiiiii.exe RegAsm.exe PID 5020 wrote to memory of 3624 5020 swiiiii.exe RegAsm.exe PID 5020 wrote to memory of 3624 5020 swiiiii.exe RegAsm.exe PID 5020 wrote to memory of 3624 5020 swiiiii.exe RegAsm.exe PID 3520 wrote to memory of 2056 3520 chrosha.exe rundll32.exe PID 3520 wrote to memory of 2056 3520 chrosha.exe rundll32.exe PID 3520 wrote to memory of 2056 3520 chrosha.exe rundll32.exe PID 2056 wrote to memory of 4008 2056 rundll32.exe rundll32.exe PID 2056 wrote to memory of 4008 2056 rundll32.exe rundll32.exe PID 4008 wrote to memory of 908 4008 rundll32.exe netsh.exe PID 4008 wrote to memory of 908 4008 rundll32.exe netsh.exe PID 4008 wrote to memory of 5104 4008 rundll32.exe powershell.exe PID 4008 wrote to memory of 5104 4008 rundll32.exe powershell.exe PID 3520 wrote to memory of 100 3520 chrosha.exe alexxxxxxxx.exe PID 3520 wrote to memory of 100 3520 chrosha.exe alexxxxxxxx.exe PID 3520 wrote to memory of 100 3520 chrosha.exe alexxxxxxxx.exe PID 100 wrote to memory of 408 100 alexxxxxxxx.exe RegAsm.exe PID 100 wrote to memory of 408 100 alexxxxxxxx.exe RegAsm.exe PID 100 wrote to memory of 408 100 alexxxxxxxx.exe RegAsm.exe PID 100 wrote to memory of 960 100 alexxxxxxxx.exe RegAsm.exe PID 100 wrote to memory of 960 100 alexxxxxxxx.exe RegAsm.exe PID 100 wrote to memory of 960 100 alexxxxxxxx.exe RegAsm.exe PID 100 wrote to memory of 960 100 alexxxxxxxx.exe RegAsm.exe PID 100 wrote to memory of 960 100 alexxxxxxxx.exe RegAsm.exe PID 100 wrote to memory of 960 100 alexxxxxxxx.exe RegAsm.exe PID 100 wrote to memory of 960 100 alexxxxxxxx.exe RegAsm.exe PID 100 wrote to memory of 960 100 alexxxxxxxx.exe RegAsm.exe PID 960 wrote to memory of 3600 960 RegAsm.exe keks.exe PID 960 wrote to memory of 3600 960 RegAsm.exe keks.exe PID 960 wrote to memory of 3600 960 RegAsm.exe keks.exe PID 960 wrote to memory of 4420 960 RegAsm.exe trf.exe PID 960 wrote to memory of 4420 960 RegAsm.exe trf.exe PID 3520 wrote to memory of 724 3520 chrosha.exe gold.exe PID 3520 wrote to memory of 724 3520 chrosha.exe gold.exe PID 3520 wrote to memory of 724 3520 chrosha.exe gold.exe PID 724 wrote to memory of 1136 724 gold.exe RegAsm.exe PID 724 wrote to memory of 1136 724 gold.exe RegAsm.exe PID 724 wrote to memory of 1136 724 gold.exe RegAsm.exe PID 724 wrote to memory of 1136 724 gold.exe RegAsm.exe PID 724 wrote to memory of 1136 724 gold.exe RegAsm.exe PID 724 wrote to memory of 1136 724 gold.exe RegAsm.exe PID 724 wrote to memory of 1136 724 gold.exe RegAsm.exe PID 724 wrote to memory of 1136 724 gold.exe RegAsm.exe PID 724 wrote to memory of 1136 724 gold.exe RegAsm.exe PID 3520 wrote to memory of 4404 3520 chrosha.exe NewB.exe PID 3520 wrote to memory of 4404 3520 chrosha.exe NewB.exe PID 3520 wrote to memory of 4404 3520 chrosha.exe NewB.exe PID 4404 wrote to memory of 2356 4404 NewB.exe schtasks.exe PID 4404 wrote to memory of 2356 4404 NewB.exe schtasks.exe PID 4404 wrote to memory of 2356 4404 NewB.exe schtasks.exe PID 4404 wrote to memory of 2712 4404 NewB.exe Uni400uni.exe PID 4404 wrote to memory of 2712 4404 NewB.exe Uni400uni.exe PID 3520 wrote to memory of 5104 3520 chrosha.exe rundll32.exe PID 3520 wrote to memory of 5104 3520 chrosha.exe rundll32.exe PID 3520 wrote to memory of 5104 3520 chrosha.exe rundll32.exe PID 4404 wrote to memory of 2008 4404 NewB.exe cap.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
Uni400uni.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Uni400uni.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab4523abcb1ed941a8f9b3a0e8665c8d6c3c3e1df66a5bb2bfaa0c43bc5d15ce.exe"C:\Users\Admin\AppData\Local\Temp\ab4523abcb1ed941a8f9b3a0e8665c8d6c3c3e1df66a5bb2bfaa0c43bc5d15ce.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1600
-
C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exeC:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\1000147001\swiiiii.exe"C:\Users\Admin\AppData\Local\Temp\1000147001\swiiiii.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:3624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5020 -s 8003⤵
- Program crash
PID:1016
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Windows\system32\netsh.exenetsh wlan show profiles4⤵PID:908
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\084619521222_Desktop.zip' -CompressionLevel Optimal4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5104
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000148001\alexxxxxxxx.exe"C:\Users\Admin\AppData\Local\Temp\1000148001\alexxxxxxxx.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:100 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:408
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Users\Admin\AppData\Roaming\configurationValue\keks.exe"C:\Users\Admin\AppData\Roaming\configurationValue\keks.exe"4⤵
- Executes dropped EXE
- Modifies system certificate store
PID:3600
-
-
C:\Users\Admin\AppData\Roaming\configurationValue\trf.exe"C:\Users\Admin\AppData\Roaming\configurationValue\trf.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4420
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "RegAsm.exe"4⤵PID:5836
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 35⤵PID:1232
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 100 -s 3523⤵
- Program crash
PID:3320
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000149001\gold.exe"C:\Users\Admin\AppData\Local\Temp\1000149001\gold.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:724 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:1136
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 724 -s 3563⤵
- Program crash
PID:1448
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe"C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN NewB.exe /TR "C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe" /F3⤵
- Creates scheduled task(s)
PID:2356
-
-
C:\Users\Admin\AppData\Local\Temp\1000226001\Uni400uni.exe"C:\Users\Admin\AppData\Local\Temp\1000226001\Uni400uni.exe"3⤵
- UAC bypass
- Windows security bypass
- Checks computer location settings
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System policy modification
PID:2712 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\1000226001\Uni400uni.exe" -Force4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4724
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"4⤵PID:928
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2296 -
C:\Users\Admin\Pictures\7wuGEJczI8PROwjcX9IOiM8F.exe"C:\Users\Admin\Pictures\7wuGEJczI8PROwjcX9IOiM8F.exe"5⤵
- Executes dropped EXE
PID:6084 -
C:\Users\Admin\AppData\Local\Temp\u4p0.0.exe"C:\Users\Admin\AppData\Local\Temp\u4p0.0.exe"6⤵PID:6492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6492 -s 10207⤵
- Program crash
PID:836
-
-
-
C:\Users\Admin\AppData\Local\Temp\u4p0.2\run.exe"C:\Users\Admin\AppData\Local\Temp\u4p0.2\run.exe"6⤵PID:5696
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe7⤵PID:5520
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:5820
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe8⤵PID:1312
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\u4p0.3.exe"C:\Users\Admin\AppData\Local\Temp\u4p0.3.exe"6⤵PID:6420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6084 -s 15446⤵
- Program crash
PID:1640
-
-
-
C:\Users\Admin\Pictures\ymrr2awxIWyKaF4yuqvF6kJB.exe"C:\Users\Admin\Pictures\ymrr2awxIWyKaF4yuqvF6kJB.exe"5⤵PID:6388
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:6884
-
-
C:\Users\Admin\Pictures\ymrr2awxIWyKaF4yuqvF6kJB.exe"C:\Users\Admin\Pictures\ymrr2awxIWyKaF4yuqvF6kJB.exe"6⤵PID:6852
-
-
-
C:\Users\Admin\Pictures\DuHaGWCWszdp8qWBK4xXnZap.exe"C:\Users\Admin\Pictures\DuHaGWCWszdp8qWBK4xXnZap.exe"5⤵PID:6604
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:4652
-
-
C:\Users\Admin\Pictures\DuHaGWCWszdp8qWBK4xXnZap.exe"C:\Users\Admin\Pictures\DuHaGWCWszdp8qWBK4xXnZap.exe"6⤵PID:6628
-
-
-
C:\Users\Admin\Pictures\wqty4p0TLsiIT9djxk8DmWKM.exe"C:\Users\Admin\Pictures\wqty4p0TLsiIT9djxk8DmWKM.exe"5⤵PID:3344
-
-
C:\Users\Admin\Pictures\0Ubkx6TgbJE3KY3i5zpFvo6d.exe"C:\Users\Admin\Pictures\0Ubkx6TgbJE3KY3i5zpFvo6d.exe"5⤵PID:4556
-
C:\Users\Admin\AppData\Local\Temp\7zSF894.tmp\Install.exe.\Install.exe /RvdidblCuX "385118" /S6⤵PID:4884
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m where.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"7⤵PID:4644
-
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True8⤵PID:5252
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True9⤵PID:6152
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True10⤵PID:7072
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bWycNackLSywaqkmgR" /SC once /ST 19:54:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\JMPZeWvHhArmqROvY\NwfPJCCpQqPYDzK\kKNTNCB.exe\" em /nhsite_idbwH 385118 /S" /V1 /F7⤵
- Creates scheduled task(s)
PID:6932
-
-
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"4⤵PID:4844
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000227001\cap.exe"C:\Users\Admin\AppData\Local\Temp\1000227001\cap.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2008 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --load-extension="C:\Users\Admin\AppData\Local\Temp\Extension"4⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3620 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa827fab58,0x7ffa827fab68,0x7ffa827fab785⤵PID:908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1692 --field-trial-handle=2044,i,2706588155704615504,3124682816198816532,131072 /prefetch:25⤵PID:5252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1924 --field-trial-handle=2044,i,2706588155704615504,3124682816198816532,131072 /prefetch:85⤵PID:5260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1948 --field-trial-handle=2044,i,2706588155704615504,3124682816198816532,131072 /prefetch:85⤵PID:5268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3056 --field-trial-handle=2044,i,2706588155704615504,3124682816198816532,131072 /prefetch:15⤵PID:5484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3092 --field-trial-handle=2044,i,2706588155704615504,3124682816198816532,131072 /prefetch:15⤵PID:5492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4164 --field-trial-handle=2044,i,2706588155704615504,3124682816198816532,131072 /prefetch:15⤵PID:5820
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --load-extension="C:\Users\Admin\AppData\Local\Temp\Extension"4⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1324 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ffa7f8246f8,0x7ffa7f824708,0x7ffa7f8247185⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,194048807118566709,16466286370500173723,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:25⤵PID:6036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,194048807118566709,16466286370500173723,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:6044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,194048807118566709,16466286370500173723,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:85⤵PID:6096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,194048807118566709,16466286370500173723,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:15⤵PID:6140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,194048807118566709,16466286370500173723,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:15⤵PID:5200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,194048807118566709,16466286370500173723,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3772 /prefetch:15⤵PID:6184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,194048807118566709,16466286370500173723,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4560 /prefetch:15⤵PID:6680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,194048807118566709,16466286370500173723,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:15⤵PID:6688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,194048807118566709,16466286370500173723,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4576 /prefetch:15⤵PID:100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,194048807118566709,16466286370500173723,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:15⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,194048807118566709,16466286370500173723,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:15⤵PID:6900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,194048807118566709,16466286370500173723,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5952 /prefetch:85⤵PID:4592
-
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main2⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:5104
-
-
C:\Users\Admin\AppData\Local\Temp\1000152001\jok.exe"C:\Users\Admin\AppData\Local\Temp\1000152001\jok.exe"2⤵
- Executes dropped EXE
PID:3968
-
-
C:\Users\Admin\AppData\Local\Temp\1000153001\swiiii.exe"C:\Users\Admin\AppData\Local\Temp\1000153001\swiiii.exe"2⤵
- Executes dropped EXE
PID:5596 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:6652
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000181001\file300un.exe"C:\Users\Admin\AppData\Local\Temp\1000181001\file300un.exe"2⤵PID:6864
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\1000181001\file300un.exe" -Force3⤵PID:6172
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"3⤵PID:6244
-
C:\Users\Admin\Pictures\jCdOHVmxOeSFD9RxGzWQ08sD.exe"C:\Users\Admin\Pictures\jCdOHVmxOeSFD9RxGzWQ08sD.exe"4⤵PID:7080
-
C:\Users\Admin\AppData\Local\Temp\u5go.0.exe"C:\Users\Admin\AppData\Local\Temp\u5go.0.exe"5⤵PID:2444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2444 -s 10166⤵
- Program crash
PID:4452
-
-
-
C:\Users\Admin\AppData\Local\Temp\u5go.2\run.exe"C:\Users\Admin\AppData\Local\Temp\u5go.2\run.exe"5⤵PID:8
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe6⤵PID:6320
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe7⤵PID:4992
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\u5go.3.exe"C:\Users\Admin\AppData\Local\Temp\u5go.3.exe"5⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe"C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD16⤵PID:5888
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7080 -s 14445⤵
- Program crash
PID:5608
-
-
-
C:\Users\Admin\Pictures\erMtpOSc107aaTZJAsgxRQcT.exe"C:\Users\Admin\Pictures\erMtpOSc107aaTZJAsgxRQcT.exe"4⤵PID:1392
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:6372
-
-
C:\Users\Admin\Pictures\erMtpOSc107aaTZJAsgxRQcT.exe"C:\Users\Admin\Pictures\erMtpOSc107aaTZJAsgxRQcT.exe"5⤵PID:1856
-
-
-
C:\Users\Admin\Pictures\h5LEqMbe44jzFQ93hZyKig23.exe"C:\Users\Admin\Pictures\h5LEqMbe44jzFQ93hZyKig23.exe"4⤵PID:3128
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:5544
-
-
C:\Users\Admin\Pictures\h5LEqMbe44jzFQ93hZyKig23.exe"C:\Users\Admin\Pictures\h5LEqMbe44jzFQ93hZyKig23.exe"5⤵PID:6644
-
-
-
C:\Users\Admin\Pictures\Xsx2enmMx6SkVYfNR0W59wNb.exe"C:\Users\Admin\Pictures\Xsx2enmMx6SkVYfNR0W59wNb.exe"4⤵PID:5644
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000208001\install.exe"C:\Users\Admin\AppData\Local\Temp\1000208001\install.exe"2⤵PID:2420
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\GameServerClient\installg.bat" "3⤵PID:5240
-
C:\Windows\SysWOW64\sc.exeSc delete GameServerClient4⤵
- Launches sc.exe
PID:3052
-
-
C:\Program Files (x86)\GameServerClient\GameService.exeGameService remove GameServerClient confirm4⤵PID:8
-
-
C:\Program Files (x86)\GameServerClient\GameService.exeGameService install GameServerClient "C:\Program Files (x86)\GameServerClient\GameServerClient.exe"4⤵PID:5632
-
-
C:\Program Files (x86)\GameServerClient\GameService.exeGameService start GameServerClient4⤵PID:4892
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\GameServerClient\installc.bat" "3⤵PID:404
-
C:\Windows\SysWOW64\sc.exeSc delete GameServerClientC4⤵
- Launches sc.exe
PID:5800
-
-
C:\Program Files (x86)\GameServerClient\GameService.exeGameService remove GameServerClientC confirm4⤵PID:5308
-
-
C:\Program Files (x86)\GameServerClient\GameService.exeGameService install GameServerClientC "C:\Program Files (x86)\GameServerClient\GameServerClientC.exe"4⤵PID:4392
-
-
C:\Program Files (x86)\GameServerClient\GameService.exeGameService start GameServerClientC4⤵PID:6900
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7ZSfx000.cmd" "3⤵PID:6728
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5020 -ip 50201⤵PID:4512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 100 -ip 1001⤵PID:3912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 724 -ip 7241⤵PID:1992
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:5732
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:6372
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:6596
-
C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exeC:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe1⤵PID:6544
-
C:\Program Files (x86)\GameServerClient\GameService.exe"C:\Program Files (x86)\GameServerClient\GameService.exe"1⤵PID:6848
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:5896
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:5404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 6492 -ip 64921⤵PID:3760
-
C:\Program Files (x86)\GameServerClient\GameService.exe"C:\Program Files (x86)\GameServerClient\GameService.exe"1⤵PID:6896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2444 -ip 24441⤵PID:6368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 7080 -ip 70801⤵PID:5008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 6084 -ip 60841⤵PID:1848
-
C:\Users\Admin\AppData\Local\Temp\JMPZeWvHhArmqROvY\NwfPJCCpQqPYDzK\kKNTNCB.exeC:\Users\Admin\AppData\Local\Temp\JMPZeWvHhArmqROvY\NwfPJCCpQqPYDzK\kKNTNCB.exe em /nhsite_idbwH 385118 /S1⤵PID:1316
-
C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exeC:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe1⤵PID:5060
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify Tools
3Modify Registry
5Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5126f4231c6a3db73450a7a1842fe1930
SHA16803bef141264a65f2c0af1c82049aa5c8b300c2
SHA2560268be5c268c2f3ac0b375f7e19014ac3fd8dc550adb8f8b7123e7b5a3164759
SHA51287495b0a9746d627bce118b61c4f14392060f2aeec0c38ad284daba510b9333bc5bc045f93baf3ca5ccd55162d2acb468dde9834da4a65d5d58abec14f6dd2d2
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
6KB
MD58b0af3a6d20cbc6795e7b20ef5277fa1
SHA194ff28feb77c1357680385547f02e98e49d2a8da
SHA256cfb3a77b3253147bd861785834cbb682bd05f12ff668d4715d5a5108af65f87e
SHA5124a377a2be6977d898288fa5bad6063dca88a98bcad0966b7da09aa910d15aee3c9e4337582006156824487c1189a1a042abeec86f52a90928bbffe33f5eda45f
-
Filesize
17KB
MD509fe3d49f9e8e5a1e563116117230ec4
SHA1a3089988629515f201e81170f5f3bf246aef5e6c
SHA2569bacff2046a8041a391d925b9928ee71a04b93bcbcee6212b3998a6ecec04491
SHA512715cde091e1e951578a0a71ecb2023b5a46b33b8248fec9ce58220490da70f3c5320d005ca24e572925c5829c6fa3287f46853cde61439d43eefd4eb64773f16
-
Filesize
127KB
MD5c0510a4a4999c4aded61fdb40c96a53d
SHA12e702d8ac0d6eddc03af04605e3ae00310f85eaf
SHA2564d7531b69f45f25c6817a4fa5a481d1e21b2090e5cc30beee51e5f395606c259
SHA51289813ccf3d13cecc762da0adb0ea3a7d5e9771160f300bd6745e0f3db003abdd68f93abcc570c7951a0ecbbeed9d7a6a6572e4334369184efe2b3882e117053a
-
Filesize
3KB
MD5fe3aab3ae544a134b68e881b82b70169
SHA1926e9b4e527ae1bd9b3b25726e1f59d5a34d36a6
SHA256bda499e3f69d8fe0227e734bbb935dc5bf0050d37adf03bc41356dfcb5bcca0b
SHA5123fbd3499d98280b6c79c67b0ee183b27692dbc31acf103b4f8ca4dcdf392afff2b3aad500037f4288581ed37e85f45c3bbb5dcde11cddf3ef0609f44b2ecb280
-
Filesize
152B
MD5cb138796dbfb37877fcae3430bb1e2a7
SHA182bb82178c07530e42eca6caf3178d66527558bc
SHA25650c55ba7baeebe1fa4573118edbca59010d659ea42761148618fb3af8a1c9bdd
SHA512287471cccbe33e08015d6fc35e0bcdca0ec79bebc3a58f6a340b7747b5b2257b33651574bc83ed529aef2ba94be6e68968e59d2a8ef5f733dce9df6404ad7cc5
-
Filesize
152B
MD5a9519bc058003dbea34765176083739e
SHA1ef49b8790219eaddbdacb7fc97d3d05433b8575c
SHA256e034683bc434a09f5d0293cb786e6a3943b902614f9211d42bed47759164d38b
SHA512a1b67ccf313173c560ead25671c64de65e3e2599251926e33ce8399fde682fce5cb20f36ee330fcd8bb8f7a9c00ef432da56c9b02dfd7d3f02865f390c342b53
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
5KB
MD5f0bca6b4fa800341c48411783c9241f8
SHA17b5c88e2cad3906f3985df3bf3896826f5fbd3ce
SHA2568925ab7ecbc38cd7ca2cb38f92373d276932b6cb18c2bdb55831adfb9f7aa7c9
SHA5121a1daea6aa68abde9d62097a38127317edc83fa81221a8cbdb31e42950d440f9132f48d7fed37bf38b7a80e66e2b687291b1349c22ced562af6bc3169fea77a7
-
Filesize
6KB
MD50efedb4922e7b00e381557d5a98368f6
SHA1beb7a60edea414a383b6601caa043891d1dcfd97
SHA25660b871123ba77dab5623141fd1a7171a8725b948ab0987c9815fbbcb01fccf4c
SHA5127e0e46486afcefcf339dc56e81d0779c95626462cf1dfadd19b7b4b17efaffad6ad992d211e9dbc652cb31aba8a2d5ccd1541b94cef7dcf9075c09d4984fdf89
-
Filesize
25KB
MD514ec3223bd49a54bf0432b2ed4ccb62c
SHA1f5c871b6a735d9aeee87f358b25be77c906a08e9
SHA256910bbb6e82034aa47c94c94cef03abd378e1f6602d75fceaa965c02895d4f86b
SHA512e4c66f469f09de731ac1210324aa142104409df1811b84566f6e7c0ef46b6ed3a6fbaf8ad6c2ea7b588e90c8ff397c067b6364e0e11ae3471e2e792ff64c5fdc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d544007dbf97f4fb3bcc97cee189ca31
SHA1b0a0e02feea0f5d0fdc8e6bc0dd98f48f4c83a6d
SHA2560617addd55b531873219d0c4d2bc4b0d0fab932062ef0ac92ff61e784ae075e8
SHA51249883a18ebabbe8a39bb66fc82ecde1d4ea267a738664659879b48210a8dd5b86b671ed23507a62db7f6dd29e8678ad8bd441e182206581a5726859340bb1b6a
-
Filesize
1KB
MD5baa7aea69f1fc6de5c6744a3de244d9c
SHA17ac32cd8e4afa29cbb6c04bb8727735c29ebadc5
SHA256adb474e336b151cf28ead952e8248f9ec8daf30aadc78e716822d9c27f6dde69
SHA5124927c72a9d778a8343f812714356150069349e39937f2e32c62f19ffee226b94eada91756f07f96e22472252f20185177038b3e1e1dd7b8920d676e4e2198f0c
-
Filesize
321KB
MD51c7d0f34bb1d85b5d2c01367cc8f62ef
SHA133aedadb5361f1646cffd68791d72ba5f1424114
SHA256e9e09c5e5d03d21fca820bd9b0a0ea7b86ab9e85cdc9996f8f1dc822b0cc801c
SHA51253bf85d2b004f69bbbf7b6dc78e5f021aba71b6f814101c55d3bf76e6d058a973bc58270b6b621b2100c6e02d382f568d1e96024464e8ea81e6db8ccd948679d
-
Filesize
2.7MB
MD531841361be1f3dc6c2ce7756b490bf0f
SHA1ff2506641a401ac999f5870769f50b7326f7e4eb
SHA256222393a4ab4b2ae83ca861faee6df02ac274b2f2ca0bed8db1783dd61f2f37ee
SHA51253d66fa19e8db360042dadc55caaa9a1ca30a9d825e23ed2a58f32834691eb2aaaa27a4471e3fc4d13e201accc43160436ed0e9939df1cc227a62a09a2ae0019
-
Filesize
460KB
MD5b22521fb370921bb5d69bf8deecce59e
SHA13d4486b206e8aaac14a3cf201c5ac152a2a7d4ea
SHA256b30d10e292f89f4d288839974f71f6b703d6d9a9ae698ea172a2b64364e77158
SHA5121f7d64ba5266314ed18f577f0984706c21f4f48e8cdb069130e4435c2bcdf219f8dd27e4d3bf3a373f4db4c01e30efe8d7f4d87f4d8cbbbeaf9c7043f685994c
-
Filesize
418KB
MD50099a99f5ffb3c3ae78af0084136fab3
SHA10205a065728a9ec1133e8a372b1e3864df776e8c
SHA256919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226
SHA5125ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6
-
Filesize
304KB
MD58510bcf5bc264c70180abe78298e4d5b
SHA12c3a2a85d129b0d750ed146d1d4e4d6274623e28
SHA256096220045877e456edfea1adcd5bf1efd332665ef073c6d1e9474c84ca5433f6
SHA5125ff0a47f9e14e22fc76d41910b2986605376605913173d8ad83d29d85eb79b679459e2723a6ad17bc3c3b8c9b359e2be7348ee1c21fa2e8ceb7cc9220515258d
-
Filesize
158KB
MD5586f7fecacd49adab650fae36e2db994
SHA135d9fb512a8161ce867812633f0a43b042f9a5e6
SHA256cf88d499c83da613ad5ccd8805822901bdc3a12eb9b15804aeff8c53dc05fc4e
SHA512a44a2c99d18509681505cf70a251baf2558030a8648d9c621acc72fafcb2f744e3ef664dfd0229baf7c78fb72e69f5d644c755ded4060dcafa7f711d70e94772
-
Filesize
782KB
MD57fabf15848c951f6665ec449c8c77098
SHA1f9ef6114a8e2d3838d0cadd4a71d6baf95e133cf
SHA256a440e88b2c1d1746b82ffaadaef0571a14f3d76dbabba87b0c3de6ac5eff2f35
SHA5124e8b84b13bf04befb12d2f1b2f36a1a7285be640315c1a8eb61137f77ca2202b62892d95fee02debaa75ca3b5d782a5d0a7a08a010206929187504a91e9ddb0a
-
Filesize
2.4MB
MD56184676075afacb9103ae8cbf542c1ed
SHA1bc757642ad2fcfd6d1da79c0754323cdc823a937
SHA256a0b0b39b69005a2d39a8b8271a3518aa0a55148b794d2b4995b3c87ed183b23b
SHA512861ac361b585a069f2274b577b30f2a13baf72a60acd4f22da41885aee92c3975445150822f1072590d7b574ff54eb3abde6a6c4f800988ab9ff4344884f41fa
-
Filesize
789KB
MD58026082d59bac905bcc4098c69b98743
SHA15c8bffce653aa3b6c3e14d5f02927648b5ca8768
SHA256f6bfa172fb2a124980f8134f6b5c765e7af52133a0c828e87d05b40a1a3f5005
SHA512304339d26694f1225a23014862676f759c9332ea43ab53c9cb665346228dbed5ece4dca5e41b4d577fdf18ea70f7c61cda852e5122a7fbcf3bdfec5acc0f9f42
-
Filesize
65KB
MD522e35bea6a2653c8393db13a83b0cf97
SHA131adf1873277d5c64f1533a257de3f4fd67d6ad8
SHA2562e8af331adb9cd46185ae5f7982157267ef3c6e4ccdd943226ee5aec8455fae8
SHA512666fd393f101f25855a63e75b023bff28c91bde2490c7bb83925049f6aa07519b2814659974dca642446afcfd80216dd36062dc270e2377989c56580e67680fb
-
Filesize
1.8MB
MD5ce40fa2c7c0d6847ee6cf5c3d7e15506
SHA1325317c47d3677428ced294f76e06390d937df7c
SHA256ab4523abcb1ed941a8f9b3a0e8665c8d6c3c3e1df66a5bb2bfaa0c43bc5d15ce
SHA512eabdeab6b978fc7bc7ad7c01910388486001eebf64ea49a72bcce5d64adf337b93685e0493f3b9c12a4158481dfd94d422652752aa200ef98db6227add1f80ae
-
Filesize
7KB
MD5d8f0b154a3dda574d039f01b2e0b1c96
SHA12bd3059ec526d17dc35f40608ad543af31c07608
SHA25675b3e40f14cdc4b11837fb76516f9475fd72802081b81069c036894af2f8ad42
SHA512926c7a0e540c08c2ae15de4192fa72faa31bb9cf0d8efe9a77d9ed11f1768ee55900a8bcaa7786f0865a082fdb88d5bfd43356d0b141fcc108d67442c2b2c6fb
-
Filesize
1KB
MD59ab0f9320495b406fddb6de1730652cc
SHA1a6d35a74dc53289794c9a05dc1ad8c03878e153a
SHA256ab913781705a8841f3c3973af4cfeb14c7ed9919a08ff810b920dca17d69cbd1
SHA512c527057c8af9cb4a55a71ff5a8010706119fd19b5c354dae046cd498f350c422b10578a3e3c2423e385c81d76d3ece3b057c5f02f8c7b76769e18c5e2aa023fe
-
Filesize
841B
MD59358845d5150234f2c91c6c9b8f73ede
SHA1bcc689cb7b97b8f726c966706e1c39e90194744a
SHA25630c327ec2dab6b33eaac97c17c036f199c986f949d75fe56c87fe84ebc965b60
SHA512fa6b069f29e176cfb7dd036b38bddf09c3114b85ad3b41d29f1195ef4196c8d80374abbf636411447d76b65312c72c625af3f9463d9342ab07710fd2b4a19d5c
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2KB
MD5ccce5fc9545cec7332eb053c61a7848d
SHA1cef400e4e7deffbb1f1e31abb4b3965b7e91c5c6
SHA256a5184523dc35238866d81eab1c54e8618cf2ee4e7f55ebbac5d9e7f8bec12be0
SHA51299c6087462f008b994817baf3be00621e3dcad9c9e1faa3223980dc549761b38a54b367cbf54ba4e0323c960d3d239c1b3d07c7c41f12e015946032a4fdc09b2
-
Filesize
3KB
MD59a6383cc1f4421edc559c59c76fea420
SHA1c52aecdea66d6571100ce0c064560d5ab1b89dee
SHA256a3b00d4e582efd8ae46835e1278e7b03141c360a7ae459eca37379da12a32c8a
SHA5125eb2ae71602ed464fe3740248743661755f52cf63d6edde0ef9c9cbe395a8979dc44b59367a8c9cd9c4b71b954358e5af296da6bb96d32fe12a0faa5a953eb98
-
Filesize
20KB
MD542c395b8db48b6ce3d34c301d1eba9d5
SHA1b7cfa3de344814bec105391663c0df4a74310996
SHA2565644546ecefc6786c7be5b1a89e935e640963ccd34b130f21baab9370cb9055d
SHA5127b9214db96e9bec8745b4161a41c4c0520cdda9950f0cd3f12c7744227a25d639d07c0dd68b552cf1e032181c2e4f8297747f27bad6c7447b0f415a86bd82845
-
Filesize
20KB
MD549693267e0adbcd119f9f5e02adf3a80
SHA13ba3d7f89b8ad195ca82c92737e960e1f2b349df
SHA256d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f
SHA512b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2
-
Filesize
275KB
MD553171755c9957358f9acad9f47430c5d
SHA1a5c2e5ebeaf4aaafd831036d53da96cf7b83b35d
SHA2562f11332d4ac622931ef49c52ad73773bfdd6de5ce833b1fff0362170256e6bc5
SHA512ec89bd7a628b9f006d693166d0442bcf6401362175a93abdf80fa674933819d1ab745d85e65cd87d2208b8ed22c3941875bfb9844deba5dfc552d1f11e197369
-
Filesize
1.6MB
MD5d1ba9412e78bfc98074c5d724a1a87d6
SHA10572f98d78fb0b366b5a086c2a74cc68b771d368
SHA256cbcea8f28d8916219d1e8b0a8ca2db17e338eb812431bc4ad0cb36c06fd67f15
SHA5128765de36d3824b12c0a4478c31b985878d4811bd0e5b6fba4ea07f8c76340bd66a2da3490d4871b95d9a12f96efc25507dfd87f431de211664dbe9a9c914af6f
-
Filesize
1.3MB
MD51e8237d3028ab52821d69099e0954f97
SHA130a6ae353adda0c471c6ed5b7a2458b07185abf2
SHA2569387488f9d338e211be2cb45109bf590a5070180bc0d4a703f70d3cb3c4e1742
SHA512a6406d7c18694ee014d59df581f1f76e980b68e3361ae680dc979606a423eba48d35e37f143154dd97fe5f066baf0ea51a2e9f8bc822d593e1cba70ead6559f3
-
Filesize
1.5MB
MD510d51becd0bbce0fab147ff9658c565e
SHA14689a18112ff876d3c066bc8c14a08fd6b7b7a4a
SHA2567b2db9c88f60ed6dd24b1dec321a304564780fdb191a96ec35c051856128f1ed
SHA51229faf493bb28f7842c905adc5312f31741effb09f841059b53d73b22aea2c4d41d73db10bbf37703d6aeb936ffacbc756a3cc85ba3c0b6a6863ef4d27fefcd29
-
Filesize
85KB
MD5a723bf46048e0bfb15b8d77d7a648c3e
SHA18952d3c34e9341e4425571e10f22b782695bb915
SHA256b440170853bdb43b66497f701aee2901080326975140b095a1669cb9dee13422
SHA512ca8ea2f7f3c7af21b5673a0a3f2611b6580a7ed02efa2cfd8b343eb644ff09682bde43b25ef7aab68530d5ce31dcbd252c382dd336ecb610d4c4ebde78347273
-
Filesize
3.7MB
MD578d3ca6355c93c72b494bb6a498bf639
SHA12fa4e5df74bfe75c207c881a1b0d3bc1c62c8b0e
SHA256a1dd547a63b256aa6a16871ed03f8b025226f7617e67b8817a08444df077b001
SHA5121b2df7bee2514aee7efd3579f5dd33c76b40606d07dba69a34c45747662fad61174db4931bca02b058830107959205e889fee74f8ccc9f6e03f9fd111761f4ea
-
Filesize
2.4MB
MD59fb4770ced09aae3b437c1c6eb6d7334
SHA1fe54b31b0db8665aa5b22bed147e8295afc88a03
SHA256a05b592a971fe5011554013bcfe9a4aaf9cfc633bdd1fe3a8197f213d557b8d3
SHA512140fee6daf23fe8b7e441b3b4de83554af804f00ecedc421907a385ac79a63164bd9f28b4be061c2ea2262755d85e14d3a8e7dc910547837b664d78d93667256
-
Filesize
4.6MB
MD5397926927bca55be4a77839b1c44de6e
SHA1e10f3434ef3021c399dbba047832f02b3c898dbd
SHA2564f07e1095cc915b2d46eb149d1c3be14f3f4b4bd2742517265947fd23bdca5a7
SHA512cf54136b977fc8af7e8746d78676d0d464362a8cfa2213e392487003b5034562ee802e6911760b98a847bddd36ad664f32d849af84d7e208d4648bd97a2fa954
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-4084619521-2220719027-1909462854-1000\76b53b3ec448f7ccdda2063b15d2bfc3_338e918a-08d3-477c-81e2-0f9a71d72db8
Filesize2KB
MD50158fe9cead91d1b027b795984737614
SHA1b41a11f909a7bdf1115088790a5680ac4e23031b
SHA256513257326e783a862909a2a0f0941d6ff899c403e104fbd1dbc10443c41d9f9a
SHA512c48a55cc7a92cefcefe5fb2382ccd8ef651fc8e0885e88a256cd2f5d83b824b7d910f755180b29eccb54d9361d6af82f9cc741bd7e6752122949b657da973676
-
C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Google Chrome.lnk
Filesize2KB
MD56be04c9f1afaea089659629ec31a0c75
SHA160a6a306a313828e0d3543ad16707386e472a06b
SHA256e7048762751ab3eb2c6836457fb1bfb82ab6cb2904b940ea7826cf3253f906b7
SHA512af8e2b80ddc33573db265980b02f97f1cbce0c30033492bccc25eb04152566d372748d435a0c113a4b5c781d55ee9b29d476e18c9dab359985122b74edbd1c21
-
C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Microsoft Edge.lnk
Filesize2KB
MD5a4212f5a9c80fcfa5683f9b707a6a777
SHA1d785c31d97428030cfe9bcba2b1bd3d17dfbfa5b
SHA25636218eb95ad023a16e41c0d95a7512ec687fb2675546df8c01cd593edc7ca5f1
SHA5129ed20102bf36b198e7c46e35fd5e3f392a2fc25017eef7f6c6ecc7175aabc9546cabd81ee2b67c5c457c7dd5c6075f0ff63f5405fda30be321ace137deee6e62
-
Filesize
109KB
MD5154c3f1334dd435f562672f2664fea6b
SHA151dd25e2ba98b8546de163b8f26e2972a90c2c79
SHA2565f431129f97f3d56929f1e5584819e091bd6c854d7e18503074737fc6d79e33f
SHA5121bca69bbcdb7ecd418769e9d4befc458f9f8e3cee81feb7316bb61e189e2904f4431e4cc7d291e179a5dec441b959d428d8e433f579036f763bbad6460222841
-
Filesize
1.2MB
MD5f35b671fda2603ec30ace10946f11a90
SHA1059ad6b06559d4db581b1879e709f32f80850872
SHA25683e3df5bec15d5333935bea8b719a6d677e2fb3dc1cf9e18e7b82fd0438285c7
SHA512b5fa27d08c64727cef7fdda5e68054a4359cd697df50d70d1d90da583195959a139066a6214531bbc5f20cd4f9bc1ca3e4244396547381291a6a1d2df9cf8705
-
Filesize
304KB
MD50c582da789c91878ab2f1b12d7461496
SHA1238bd2408f484dd13113889792d6e46d6b41c5ba
SHA256a6ab532816fbb0c9664c708746db35287aaa85cbb417bef2eafcd9f5eaf7cf67
SHA512a1b7c5c13462a7704ea2aea5025d1cb16ddd622fe1e2de3bbe08337c271a4dc8b9be2eae58a4896a7df3ad44823675384dbc60bdc737c54b173909be7a0a086a
-
Filesize
750KB
MD520ae0bb07ba77cb3748aa63b6eb51afb
SHA187c468dc8f3d90a63833d36e4c900fa88d505c6d
SHA256daf6ae706fc78595f0d386817a0f8a3a7eb4ec8613219382b1cbaa7089418e7d
SHA512db315e00ce2b2d5a05cb69541ee45aade4332e424c4955a79d2b7261ab7bd739f02dc688224f031a7a030c92fa915d029538e236dbd3c28b8d07d1265a52e5b2
-
Filesize
2KB
MD547be4995cef01a9463033d4c3d5245ef
SHA10d66fe664a37479beed1a728988da83974aafd4b
SHA25684a6855d1ce855be6603c87f06ee402a881f4e6d70e22156e27f3e22be1bc7b6
SHA51235d81cbdd9cc643fca211a2ee791e49d2e78b73797bd08214b0b374cf89883a86fbe21cb062075c34ffb2a49f62f90e477748d7db813be3f28094270a4a43c6a
-
Filesize
2KB
MD587254ef30944906eef975522f82fe5d7
SHA13b269b8f0b05811773d1d55d12f9ec4379f36aa9
SHA256a3868f88949d3054c0d538213eaddaf4b6344f2b1d1f41e8a25867a693f4138d
SHA512f9160b7524e36a398fd0cb504634693de1fbb87a1b87c8cb8ba2112c192c35c2b34b1bfd2b6dd3db4fd9c46a22e08c4e92f13969c366353c4627e915b45a9f0a
-
Filesize
6.8MB
MD5d981fb3fc1f28bea729db051c75dae08
SHA1d5eea12045a6d998da1a362f70748fc09874d0b4
SHA256aa5689332012817778e4ef3602e918297c567c4d573b463f86e8d98fef2eb48f
SHA512a93576bc04ac5b1ba129913c3d4e5100cf7f0f8bd7a4c9a21ce3af645624890006e087eefa5d0cbd804b7b96ebc13cf32a722b8c1d66d409879f41d5bfa974cb
-
Filesize
419KB
MD53a5041ca3d4237acf4f7f37cfb108958
SHA175eeefe5cd0c1a8dda4499d8fd80566bbcdce135
SHA25602a279413de15834ab05e5d8d5467d489f646044e505b08706e83da20792a3e5
SHA51209bef646a85c362c1e6b52b50382397ee38c8c9f047db16d2f20c2333578a06b714c16d1cda7678b8eab398577b51c7251029ec2a5f8896de385c27508fb2f0a
-
Filesize
5.4MB
MD569f6614893028c60394f744c7ebc1551
SHA1ccd4a9f86876ddbfe2bc86a2b17a4cbc1857b1dd
SHA256b96a4de2d4f97380388b6b515e8cdef28a92f358a7d487be3463828303d8661d
SHA5124a40bcf25303accf93bb15e281a53ee0cda93c1f7c1ede741338b8080daa0a61c6751c5d11ed8ceeec520782913f748298b5016565a31f47c980d8e868461855
-
Filesize
7KB
MD55b423612b36cde7f2745455c5dd82577
SHA10187c7c80743b44e9e0c193e993294e3b969cc3d
SHA256e0840d2ea74a00dcc545d770b91d9d889e5a82c7bedf1b989e0a89db04685b09
SHA512c26a1e7e96dbd178d961c630abd8e564ef69532f386fb198eb20119a88ecab2fe885d71ac0c90687c18910ce00c445f352a5e8fbf5328f3403964f7c7802414c
-
Filesize
5.7MB
MD5806f295ff14699677790ca246cb69864
SHA15ff2e05176ea77a6a12ed50ac8836757dd342829
SHA2568f1fb3595585747a418c6fc186c36e3c0a98d80cc81c5df56e8faeb5b2421fb6
SHA512ecb12e1d799c107f39b998851938b428b1d81906615505aff3ab8426bba06d9d827e29405d8de26761341e57ef38c059d6ec68309df938326771c11dde7175a8
-
Filesize
4.1MB
MD56cceb09090aac6e098fe94ccf89d0b88
SHA1dc3d20a6759f88bd43ceec6462add30e3b7eb10e
SHA2569af5c4844ec982b2434f0a8aa760a901d3eca5cb8759bb048712395a6c85b7de
SHA512f5008f37a744003711612850c87bb66e3a603704eafa20abdbb35362dbe4cba02e9a40ac21a0ad818a0dbaa612c68c89f6be4c18cc27c927ee0d92a21210e0fc
-
Filesize
2KB
MD585deec65e16c4202676771c20a0c6822
SHA1e393d00707d69e39098f4eb054561566f068eebc
SHA256e166e39510a22a0bae4cff6bd42ba41508db86ab2fd7cbb57d62162b7fd9de04
SHA512356557c99494b4fa7faf0591fa6d7286e26573044f124d3522e6d0421f452b4210fda2d6ee8b2df64c3592c91104ef2ddaa864283b7b6ba9b7eed44cf06de313
-
Filesize
2KB
MD5d5a0f29bba4c1168f89e71912c285769
SHA109c64b0d31007b9a856badd9b50e96c5252a298d
SHA256dc2fc28066f901dcb1d516c0926b8d87180f8f5aba4b04bc7137b61062b5d45c
SHA512ca89e86a17508b73f9b1bbbdd22dfe5793be88ecb0d0eb0d77633d8c579e7343141b6722b39a26f3c0d790232edbd4255d7e58ac88b4a20094b2bd9c6e38467b
-
Filesize
2KB
MD5f5f7eaf36eaf49c04a6acda81c5a698d
SHA1fdf66e542f5619b972aa05c0519b0b44f9af0fb9
SHA256781e78cd6f664a585d187a4010d45d30213872207133f0bf87a2d201f45cffd3
SHA5128f0a3c70fcdc6194bc50a151dd8a61e7c0386e69ec45fe74fbf2c983249f8ca869bcb93dd2c79e99f58ccdd428d608131cb0fe5701a24f1ff755fcaf7b8d653b
-
Filesize
127B
MD57cc972a3480ca0a4792dc3379a763572
SHA1f72eb4124d24f06678052706c542340422307317
SHA25602ad5d151250848f2cc4b650a351505aa58ac13c50da207cc06295c123ddf5e5
SHA512ff5f320356e59eaf8f2b7c5a2668541252221be2d9701006fcc64ce802e66eeaf6ecf316d925258eb12ee5b8b7df4f8da075e9524badc0024b55fae639d075b7
-
Filesize
127B
MD58ef9853d1881c5fe4d681bfb31282a01
SHA1a05609065520e4b4e553784c566430ad9736f19f
SHA2569228f13d82c3dc96b957769f6081e5bac53cffca4ffde0ba1e102d9968f184a2
SHA5125ddee931a08cfea5bb9d1c36355d47155a24d617c2a11d08364ffc54e593064011dee4fea8ac5b67029cab515d3071f0ba0422bb76af492a3115272ba8feb005
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e