Analysis
-
max time kernel
119s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
28-06-2024 17:30
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mega.nz/folder/NXQh2KbB#HrQ8HBcUHn1P4cpTaKzb8g
Resource
win10v2004-20240611-en
General
-
Target
https://mega.nz/folder/NXQh2KbB#HrQ8HBcUHn1P4cpTaKzb8g
Malware Config
Signatures
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 2140 netsh.exe 5684 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\Control Panel\International\Geo\Nation AntiPublic [v2.0] by Mico.exe -
Executes dropped EXE 7 IoCs
pid Process 5744 AntiPublic [v2.0] by Mico.exe 5908 Windows Explorer.exe 5968 AntiPublic [v2.0] by Mico.exe 5148 Windows Explorer.exe 5356 vshost.exe 224 libexec.lib 5416 winst.exe -
Loads dropped DLL 36 IoCs
pid Process 5148 Windows Explorer.exe 5148 Windows Explorer.exe 5148 Windows Explorer.exe 5148 Windows Explorer.exe 5148 Windows Explorer.exe 5148 Windows Explorer.exe 5148 Windows Explorer.exe 5148 Windows Explorer.exe 224 libexec.lib 5148 Windows Explorer.exe 5148 Windows Explorer.exe 5148 Windows Explorer.exe 5148 Windows Explorer.exe 5148 Windows Explorer.exe 5148 Windows Explorer.exe 5148 Windows Explorer.exe 5148 Windows Explorer.exe 5148 Windows Explorer.exe 5148 Windows Explorer.exe 5148 Windows Explorer.exe 5148 Windows Explorer.exe 5148 Windows Explorer.exe 5148 Windows Explorer.exe 5148 Windows Explorer.exe 5148 Windows Explorer.exe 5148 Windows Explorer.exe 5148 Windows Explorer.exe 5148 Windows Explorer.exe 5148 Windows Explorer.exe 5148 Windows Explorer.exe 224 libexec.lib 224 libexec.lib 224 libexec.lib 224 libexec.lib 5148 Windows Explorer.exe 5148 Windows Explorer.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x000700000002354a-480.dat upx behavioral1/memory/5148-487-0x00007FFB075E0000-0x00007FFB07BD0000-memory.dmp upx behavioral1/files/0x000700000002351b-505.dat upx behavioral1/memory/5148-512-0x00007FFB075B0000-0x00007FFB075D4000-memory.dmp upx behavioral1/files/0x0007000000023524-531.dat upx behavioral1/files/0x0007000000023523-530.dat upx behavioral1/files/0x0007000000023522-529.dat upx behavioral1/files/0x0007000000023521-528.dat upx behavioral1/files/0x0007000000023520-527.dat upx behavioral1/files/0x000700000002351f-526.dat upx behavioral1/files/0x000700000002351e-525.dat upx behavioral1/files/0x000700000002351d-524.dat upx behavioral1/files/0x000700000002351c-523.dat upx behavioral1/files/0x0007000000023519-522.dat upx behavioral1/files/0x0007000000023518-521.dat upx behavioral1/files/0x0007000000023517-520.dat upx behavioral1/files/0x000700000002354d-519.dat upx behavioral1/files/0x000700000002354c-518.dat upx behavioral1/files/0x000700000002354b-517.dat upx behavioral1/files/0x0007000000023548-516.dat upx behavioral1/files/0x0007000000023545-515.dat upx behavioral1/files/0x0007000000023543-514.dat upx behavioral1/memory/5148-513-0x00007FFB1B940000-0x00007FFB1B94F000-memory.dmp upx behavioral1/files/0x0007000000023544-511.dat upx behavioral1/memory/5148-536-0x00007FFB07590000-0x00007FFB075A9000-memory.dmp upx behavioral1/memory/5148-537-0x00007FFB1B800000-0x00007FFB1B80D000-memory.dmp upx behavioral1/memory/5148-543-0x00007FFB07540000-0x00007FFB0756D000-memory.dmp upx behavioral1/memory/5148-542-0x00007FFB07570000-0x00007FFB07589000-memory.dmp upx behavioral1/memory/5148-547-0x00007FFB07390000-0x00007FFB07506000-memory.dmp upx behavioral1/memory/5148-546-0x00007FFB07510000-0x00007FFB07533000-memory.dmp upx behavioral1/memory/5148-549-0x00007FFB07350000-0x00007FFB07383000-memory.dmp upx behavioral1/memory/5148-550-0x00007FFB07280000-0x00007FFB0734D000-memory.dmp upx behavioral1/memory/5148-551-0x00007FFB06D50000-0x00007FFB07279000-memory.dmp upx behavioral1/memory/5148-554-0x00007FFB06D30000-0x00007FFB06D45000-memory.dmp upx behavioral1/memory/5148-557-0x00007FFB06CD0000-0x00007FFB06CE4000-memory.dmp upx behavioral1/memory/5148-556-0x00007FFB06CF0000-0x00007FFB06D04000-memory.dmp upx behavioral1/memory/5148-555-0x00007FFB06D10000-0x00007FFB06D22000-memory.dmp upx behavioral1/memory/5148-559-0x00007FFB06B80000-0x00007FFB06BA2000-memory.dmp upx behavioral1/memory/5148-558-0x00007FFB06BB0000-0x00007FFB06CCC000-memory.dmp upx behavioral1/memory/5148-562-0x00007FFB06B60000-0x00007FFB06B77000-memory.dmp upx behavioral1/memory/5148-564-0x00007FFB06AD0000-0x00007FFB06AE1000-memory.dmp upx behavioral1/memory/5148-563-0x00007FFB075E0000-0x00007FFB07BD0000-memory.dmp upx behavioral1/memory/5148-565-0x00007FFB06B40000-0x00007FFB06B59000-memory.dmp upx behavioral1/memory/5148-566-0x00007FFB06AF0000-0x00007FFB06B3A000-memory.dmp upx behavioral1/memory/5148-570-0x00007FFB06AB0000-0x00007FFB06ACE000-memory.dmp upx behavioral1/memory/5148-571-0x00007FFB07590000-0x00007FFB075A9000-memory.dmp upx behavioral1/memory/5148-573-0x00007FFB063B0000-0x00007FFB06AA2000-memory.dmp upx behavioral1/memory/5148-568-0x00007FFB075B0000-0x00007FFB075D4000-memory.dmp upx behavioral1/memory/5148-575-0x00007FFB06370000-0x00007FFB063A8000-memory.dmp upx behavioral1/memory/5148-626-0x00007FFB07510000-0x00007FFB07533000-memory.dmp upx behavioral1/memory/5148-627-0x00007FFB07390000-0x00007FFB07506000-memory.dmp upx behavioral1/memory/5148-640-0x00007FFB07350000-0x00007FFB07383000-memory.dmp upx behavioral1/memory/5148-641-0x00007FFB07280000-0x00007FFB0734D000-memory.dmp upx behavioral1/memory/5148-642-0x00007FFB06D50000-0x00007FFB07279000-memory.dmp upx behavioral1/memory/5148-677-0x00007FFB06D30000-0x00007FFB06D45000-memory.dmp upx behavioral1/memory/5148-678-0x00007FFB1F540000-0x00007FFB1F54D000-memory.dmp upx behavioral1/memory/5148-721-0x00007FFB06D10000-0x00007FFB06D22000-memory.dmp upx behavioral1/memory/5148-719-0x00007FFB06370000-0x00007FFB063A8000-memory.dmp upx behavioral1/memory/5148-712-0x00007FFB06B80000-0x00007FFB06BA2000-memory.dmp upx behavioral1/memory/5148-703-0x00007FFB07390000-0x00007FFB07506000-memory.dmp upx behavioral1/memory/5148-696-0x00007FFB075B0000-0x00007FFB075D4000-memory.dmp upx behavioral1/memory/5148-715-0x00007FFB06AF0000-0x00007FFB06B3A000-memory.dmp upx behavioral1/memory/5148-718-0x00007FFB063B0000-0x00007FFB06AA2000-memory.dmp upx behavioral1/memory/5148-714-0x00007FFB06B40000-0x00007FFB06B59000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
flow ioc 158 discord.com 150 discord.com 151 discord.com 152 discord.com 155 discord.com 156 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 147 ip-api.com -
Hide Artifacts: Hidden Files and Directories 1 TTPs 1 IoCs
pid Process 5652 cmd.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5224 sc.exe -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral1/files/0x0009000000023513-412.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 9 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Collects information from the system 1 TTPs 1 IoCs
Uses WMIC.exe to find detailed system information.
pid Process 4468 WMIC.exe -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 1924 WMIC.exe -
Enumerates processes with tasklist 1 TTPs 5 IoCs
pid Process 4628 tasklist.exe 956 tasklist.exe 2404 tasklist.exe 1820 tasklist.exe 5852 tasklist.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 4992 ipconfig.exe 5240 NETSTAT.EXE -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 5960 systeminfo.exe -
Kills process with taskkill 11 IoCs
pid Process 800 taskkill.exe 5988 taskkill.exe 5480 taskkill.exe 5372 taskkill.exe 5668 taskkill.exe 5716 taskkill.exe 4280 taskkill.exe 5220 taskkill.exe 2020 taskkill.exe 1544 taskkill.exe 5180 taskkill.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell libexec.lib Key created \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8 libexec.lib Set value (int) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "4294967295" libexec.lib Set value (data) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\4\MRUListEx = ffffffff libexec.lib Set value (int) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\11\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" libexec.lib Set value (int) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1" libexec.lib Set value (data) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 libexec.lib Set value (data) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{B3690E58-E961-423B-B687-386EBFD83239}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000050000001800000030f125b7ef471a10a5f102608c9eebac0a000000a0000000b474dbf787420341afbaf1b13dcd75cf64000000a000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000e0859ff2f94f6810ab9108002b27b3d90500000058000000 libexec.lib Set value (str) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" libexec.lib Set value (int) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\4\NodeSlot = "11" libexec.lib Key created \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\11\ComDlg libexec.lib Set value (int) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1" libexec.lib Key created \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\0 libexec.lib Key created \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 libexec.lib Set value (int) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" libexec.lib Set value (int) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\IconSize = "16" libexec.lib Set value (int) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\IconSize = "16" libexec.lib Set value (int) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\11\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" libexec.lib Set value (data) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202 libexec.lib Key created \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\2 libexec.lib Set value (int) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\ComDlg\{5FA96407-7E77-483C-AC93-691D05850DE8}\FFlags = "1092616257" libexec.lib Set value (data) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 libexec.lib Set value (int) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "48" libexec.lib Set value (data) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = 01000000000000000300000002000000ffffffff libexec.lib Set value (data) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\MRUListEx = ffffffff libexec.lib Set value (data) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = 01000000030000000200000000000000ffffffff libexec.lib Key created \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell libexec.lib Key created \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2 libexec.lib Set value (str) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByKey:FMTID = "{B725F130-47EF-101A-A5F1-02608C9EEBAC}" libexec.lib Key created \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags libexec.lib Set value (int) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:PID = "0" libexec.lib Set value (data) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0e000000ffffffff libexec.lib Set value (data) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = 0100000000000000ffffffff libexec.lib Set value (data) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02020202 libexec.lib Key created \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{B3690E58-E961-423B-B687-386EBFD83239} libexec.lib Set value (data) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 libexec.lib Set value (int) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{B3690E58-E961-423B-B687-386EBFD83239}\FFlags = "1092616257" libexec.lib Set value (data) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1 = 14002e80922b16d365937a46956b92703aca08af0000 libexec.lib Key created \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656} libexec.lib Set value (str) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" libexec.lib Key created \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 libexec.lib Set value (int) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" libexec.lib Set value (int) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\11\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" libexec.lib Set value (int) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:PID = "0" libexec.lib Set value (int) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByDirection = "1" libexec.lib Set value (data) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\MRUListEx = ffffffff libexec.lib Key created \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4 libexec.lib Key created \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell libexec.lib Set value (str) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" libexec.lib Set value (int) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\IconSize = "16" libexec.lib Set value (str) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" libexec.lib Set value (int) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\11\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" libexec.lib Set value (data) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 libexec.lib Set value (int) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Mode = "4" libexec.lib Set value (data) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\0\0\MRUListEx = ffffffff libexec.lib Set value (int) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupView = "0" libexec.lib Set value (int) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{B3690E58-E961-423B-B687-386EBFD83239}\IconSize = "96" libexec.lib Set value (int) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByKey:PID = "14" libexec.lib Set value (str) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\Shell\SniffedFolderType = "Generic" libexec.lib Key created \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\11\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} libexec.lib Set value (data) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\2 = 14002e80d43aad2469a5304598e1ab02f9417aa80000 libexec.lib Set value (data) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\3 = 3a002e80aba36ff8d270c74f9c99fcbf05467f3a260001002600efbe11000000ece7597f2ebcda01d2841c812ebcda01263055bd2ebcda0114000000 libexec.lib Set value (str) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\SniffedFolderType = "Documents" libexec.lib Set value (data) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\0\MRUListEx = ffffffff libexec.lib -
Runs net.exe
-
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2572 schtasks.exe 6124 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2928 msedge.exe 2928 msedge.exe 452 msedge.exe 452 msedge.exe 4972 identity_helper.exe 4972 identity_helper.exe 956 msedge.exe 956 msedge.exe 5068 powershell.exe 5068 powershell.exe 5068 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 224 libexec.lib -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 5520 7zG.exe Token: 35 5520 7zG.exe Token: SeSecurityPrivilege 5520 7zG.exe Token: SeSecurityPrivilege 5520 7zG.exe Token: SeDebugPrivilege 5852 tasklist.exe Token: SeIncreaseQuotaPrivilege 5864 WMIC.exe Token: SeSecurityPrivilege 5864 WMIC.exe Token: SeTakeOwnershipPrivilege 5864 WMIC.exe Token: SeLoadDriverPrivilege 5864 WMIC.exe Token: SeSystemProfilePrivilege 5864 WMIC.exe Token: SeSystemtimePrivilege 5864 WMIC.exe Token: SeProfSingleProcessPrivilege 5864 WMIC.exe Token: SeIncBasePriorityPrivilege 5864 WMIC.exe Token: SeCreatePagefilePrivilege 5864 WMIC.exe Token: SeBackupPrivilege 5864 WMIC.exe Token: SeRestorePrivilege 5864 WMIC.exe Token: SeShutdownPrivilege 5864 WMIC.exe Token: SeDebugPrivilege 5864 WMIC.exe Token: SeSystemEnvironmentPrivilege 5864 WMIC.exe Token: SeRemoteShutdownPrivilege 5864 WMIC.exe Token: SeUndockPrivilege 5864 WMIC.exe Token: SeManageVolumePrivilege 5864 WMIC.exe Token: 33 5864 WMIC.exe Token: 34 5864 WMIC.exe Token: 35 5864 WMIC.exe Token: 36 5864 WMIC.exe Token: SeIncreaseQuotaPrivilege 1924 WMIC.exe Token: SeSecurityPrivilege 1924 WMIC.exe Token: SeTakeOwnershipPrivilege 1924 WMIC.exe Token: SeLoadDriverPrivilege 1924 WMIC.exe Token: SeSystemProfilePrivilege 1924 WMIC.exe Token: SeSystemtimePrivilege 1924 WMIC.exe Token: SeProfSingleProcessPrivilege 1924 WMIC.exe Token: SeIncBasePriorityPrivilege 1924 WMIC.exe Token: SeCreatePagefilePrivilege 1924 WMIC.exe Token: SeBackupPrivilege 1924 WMIC.exe Token: SeRestorePrivilege 1924 WMIC.exe Token: SeShutdownPrivilege 1924 WMIC.exe Token: SeDebugPrivilege 1924 WMIC.exe Token: SeSystemEnvironmentPrivilege 1924 WMIC.exe Token: SeRemoteShutdownPrivilege 1924 WMIC.exe Token: SeUndockPrivilege 1924 WMIC.exe Token: SeManageVolumePrivilege 1924 WMIC.exe Token: 33 1924 WMIC.exe Token: 34 1924 WMIC.exe Token: 35 1924 WMIC.exe Token: 36 1924 WMIC.exe Token: SeIncreaseQuotaPrivilege 5864 WMIC.exe Token: SeSecurityPrivilege 5864 WMIC.exe Token: SeTakeOwnershipPrivilege 5864 WMIC.exe Token: SeLoadDriverPrivilege 5864 WMIC.exe Token: SeSystemProfilePrivilege 5864 WMIC.exe Token: SeSystemtimePrivilege 5864 WMIC.exe Token: SeProfSingleProcessPrivilege 5864 WMIC.exe Token: SeIncBasePriorityPrivilege 5864 WMIC.exe Token: SeCreatePagefilePrivilege 5864 WMIC.exe Token: SeBackupPrivilege 5864 WMIC.exe Token: SeRestorePrivilege 5864 WMIC.exe Token: SeShutdownPrivilege 5864 WMIC.exe Token: SeDebugPrivilege 5864 WMIC.exe Token: SeSystemEnvironmentPrivilege 5864 WMIC.exe Token: SeRemoteShutdownPrivilege 5864 WMIC.exe Token: SeUndockPrivilege 5864 WMIC.exe Token: SeManageVolumePrivilege 5864 WMIC.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 5520 7zG.exe 224 libexec.lib -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 224 libexec.lib -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 452 wrote to memory of 1436 452 msedge.exe 82 PID 452 wrote to memory of 1436 452 msedge.exe 82 PID 452 wrote to memory of 1472 452 msedge.exe 83 PID 452 wrote to memory of 1472 452 msedge.exe 83 PID 452 wrote to memory of 1472 452 msedge.exe 83 PID 452 wrote to memory of 1472 452 msedge.exe 83 PID 452 wrote to memory of 1472 452 msedge.exe 83 PID 452 wrote to memory of 1472 452 msedge.exe 83 PID 452 wrote to memory of 1472 452 msedge.exe 83 PID 452 wrote to memory of 1472 452 msedge.exe 83 PID 452 wrote to memory of 1472 452 msedge.exe 83 PID 452 wrote to memory of 1472 452 msedge.exe 83 PID 452 wrote to memory of 1472 452 msedge.exe 83 PID 452 wrote to memory of 1472 452 msedge.exe 83 PID 452 wrote to memory of 1472 452 msedge.exe 83 PID 452 wrote to memory of 1472 452 msedge.exe 83 PID 452 wrote to memory of 1472 452 msedge.exe 83 PID 452 wrote to memory of 1472 452 msedge.exe 83 PID 452 wrote to memory of 1472 452 msedge.exe 83 PID 452 wrote to memory of 1472 452 msedge.exe 83 PID 452 wrote to memory of 1472 452 msedge.exe 83 PID 452 wrote to memory of 1472 452 msedge.exe 83 PID 452 wrote to memory of 1472 452 msedge.exe 83 PID 452 wrote to memory of 1472 452 msedge.exe 83 PID 452 wrote to memory of 1472 452 msedge.exe 83 PID 452 wrote to memory of 1472 452 msedge.exe 83 PID 452 wrote to memory of 1472 452 msedge.exe 83 PID 452 wrote to memory of 1472 452 msedge.exe 83 PID 452 wrote to memory of 1472 452 msedge.exe 83 PID 452 wrote to memory of 1472 452 msedge.exe 83 PID 452 wrote to memory of 1472 452 msedge.exe 83 PID 452 wrote to memory of 1472 452 msedge.exe 83 PID 452 wrote to memory of 1472 452 msedge.exe 83 PID 452 wrote to memory of 1472 452 msedge.exe 83 PID 452 wrote to memory of 1472 452 msedge.exe 83 PID 452 wrote to memory of 1472 452 msedge.exe 83 PID 452 wrote to memory of 1472 452 msedge.exe 83 PID 452 wrote to memory of 1472 452 msedge.exe 83 PID 452 wrote to memory of 1472 452 msedge.exe 83 PID 452 wrote to memory of 1472 452 msedge.exe 83 PID 452 wrote to memory of 1472 452 msedge.exe 83 PID 452 wrote to memory of 1472 452 msedge.exe 83 PID 452 wrote to memory of 2928 452 msedge.exe 84 PID 452 wrote to memory of 2928 452 msedge.exe 84 PID 452 wrote to memory of 2416 452 msedge.exe 85 PID 452 wrote to memory of 2416 452 msedge.exe 85 PID 452 wrote to memory of 2416 452 msedge.exe 85 PID 452 wrote to memory of 2416 452 msedge.exe 85 PID 452 wrote to memory of 2416 452 msedge.exe 85 PID 452 wrote to memory of 2416 452 msedge.exe 85 PID 452 wrote to memory of 2416 452 msedge.exe 85 PID 452 wrote to memory of 2416 452 msedge.exe 85 PID 452 wrote to memory of 2416 452 msedge.exe 85 PID 452 wrote to memory of 2416 452 msedge.exe 85 PID 452 wrote to memory of 2416 452 msedge.exe 85 PID 452 wrote to memory of 2416 452 msedge.exe 85 PID 452 wrote to memory of 2416 452 msedge.exe 85 PID 452 wrote to memory of 2416 452 msedge.exe 85 PID 452 wrote to memory of 2416 452 msedge.exe 85 PID 452 wrote to memory of 2416 452 msedge.exe 85 PID 452 wrote to memory of 2416 452 msedge.exe 85 PID 452 wrote to memory of 2416 452 msedge.exe 85 PID 452 wrote to memory of 2416 452 msedge.exe 85 PID 452 wrote to memory of 2416 452 msedge.exe 85 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 5696 attrib.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://mega.nz/folder/NXQh2KbB#HrQ8HBcUHn1P4cpTaKzb8g1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb1b6546f8,0x7ffb1b654708,0x7ffb1b6547182⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2240,6409452691317214374,5145772138152616110,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2256 /prefetch:22⤵PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2240,6409452691317214374,5145772138152616110,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2240,6409452691317214374,5145772138152616110,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:2416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,6409452691317214374,5145772138152616110,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,6409452691317214374,5145772138152616110,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:1340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2240,6409452691317214374,5145772138152616110,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4804 /prefetch:82⤵PID:460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2240,6409452691317214374,5145772138152616110,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5740 /prefetch:82⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2240,6409452691317214374,5145772138152616110,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5740 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2240,6409452691317214374,5145772138152616110,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5820 /prefetch:82⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,6409452691317214374,5145772138152616110,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5856 /prefetch:12⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2240,6409452691317214374,5145772138152616110,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5872 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,6409452691317214374,5145772138152616110,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1720 /prefetch:12⤵PID:920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,6409452691317214374,5145772138152616110,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4604 /prefetch:12⤵PID:372
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2824
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3140
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x30c 0x4901⤵PID:2108
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5164
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Very Fast AntiPublic [v2.0] Coded by Mico\" -spe -an -ai#7zMap15533:144:7zEvent204261⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5520
-
C:\Users\Admin\Downloads\Very Fast AntiPublic [v2.0] Coded by Mico\AntiPublic [v2.0] by Mico.exe"C:\Users\Admin\Downloads\Very Fast AntiPublic [v2.0] Coded by Mico\AntiPublic [v2.0] by Mico.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
PID:5744 -
C:\Users\Admin\AppData\Local\Temp\Windows Explorer.exe"C:\Users\Admin\AppData\Local\Temp\Windows Explorer.exe"2⤵
- Executes dropped EXE
PID:5908 -
C:\Users\Admin\AppData\Local\Temp\Windows Explorer.exe"C:\Users\Admin\AppData\Local\Temp\Windows Explorer.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5148 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"4⤵PID:5636
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"4⤵PID:2572
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name5⤵
- Detects videocard installed
- Suspicious use of AdjustPrivilegeToken
PID:1924
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic computersystem get Manufacturer"4⤵PID:3160
-
C:\Windows\System32\Wbem\WMIC.exewmic computersystem get Manufacturer5⤵
- Suspicious use of AdjustPrivilegeToken
PID:5864
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "gdb --version"4⤵PID:3772
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"4⤵PID:5344
-
C:\Windows\system32\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:5852
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path Win32_ComputerSystem get Manufacturer"4⤵PID:5180
-
C:\Windows\System32\Wbem\WMIC.exewmic path Win32_ComputerSystem get Manufacturer5⤵PID:5188
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"4⤵PID:5968
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid5⤵PID:5324
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"4⤵PID:5740
-
C:\Windows\system32\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:4628
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "attrib +h +s "C:\Users\Admin\AppData\Local\ExelaUpdateService\Exela.exe""4⤵
- Hide Artifacts: Hidden Files and Directories
PID:5652 -
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\ExelaUpdateService\Exela.exe"5⤵
- Views/modifies file attributes
PID:5696
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "schtasks /query /TN "ExelaUpdateService""4⤵PID:5708
-
C:\Windows\system32\schtasks.exeschtasks /query /TN "ExelaUpdateService"5⤵PID:3772
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "schtasks /create /f /sc onlogon /rl highest /tn "ExelaUpdateService" /tr "C:\Users\Admin\AppData\Local\ExelaUpdateService\Exela.exe""4⤵PID:6120
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "ExelaUpdateService" /tr "C:\Users\Admin\AppData\Local\ExelaUpdateService\Exela.exe"5⤵
- Scheduled Task/Job: Scheduled Task
PID:2572
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "schtasks /create /f /sc hourly /mo 1 /rl highest /tn "ExelaUpdateService2" /tr "C:\Users\Admin\AppData\Local\ExelaUpdateService\Exela.exe""4⤵PID:2008
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc hourly /mo 1 /rl highest /tn "ExelaUpdateService2" /tr "C:\Users\Admin\AppData\Local\ExelaUpdateService\Exela.exe"5⤵
- Scheduled Task/Job: Scheduled Task
PID:6124
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"4⤵PID:5128
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:5180
-
-
C:\Windows\system32\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:956
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 452"4⤵PID:5988
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 4525⤵
- Kills process with taskkill
PID:5480
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 1436"4⤵PID:5968
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 14365⤵
- Kills process with taskkill
PID:5372
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 1472"4⤵PID:5540
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 14725⤵
- Kills process with taskkill
PID:5668
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 2928"4⤵PID:5336
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 29285⤵
- Kills process with taskkill
PID:5716
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 2416"4⤵PID:3112
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 24165⤵
- Kills process with taskkill
PID:4280
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 1340"4⤵PID:4264
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 13405⤵
- Kills process with taskkill
PID:5220
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 460"4⤵PID:5264
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 4605⤵
- Kills process with taskkill
PID:800
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 5104"4⤵PID:2572
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 51045⤵
- Kills process with taskkill
PID:2020
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 5972"4⤵PID:5156
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 59725⤵
- Kills process with taskkill
PID:1544
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 920"4⤵PID:4056
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 9205⤵
- Kills process with taskkill
PID:5180
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 372"4⤵PID:5332
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 3725⤵
- Kills process with taskkill
PID:5988
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "cmd.exe /c chcp"4⤵PID:2712
-
C:\Windows\system32\cmd.execmd.exe /c chcp5⤵PID:2852
-
C:\Windows\system32\chcp.comchcp6⤵PID:2416
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "cmd.exe /c chcp"4⤵PID:3144
-
C:\Windows\system32\cmd.execmd.exe /c chcp5⤵PID:2928
-
C:\Windows\system32\chcp.comchcp6⤵PID:5108
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"4⤵PID:4216
-
C:\Windows\system32\tasklist.exetasklist /FO LIST5⤵
- Enumerates processes with tasklist
PID:2404
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell.exe Get-Clipboard"4⤵PID:652
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Get-Clipboard5⤵
- Suspicious behavior: EnumeratesProcesses
PID:5068
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "netsh wlan show profiles"4⤵PID:1528
-
C:\Windows\system32\netsh.exenetsh wlan show profiles5⤵
- Event Triggered Execution: Netsh Helper DLL
PID:5916
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "echo ####System Info#### & systeminfo & echo ####System Version#### & ver & echo ####Host Name#### & hostname & echo ####Environment Variable#### & set & echo ####Logical Disk#### & wmic logicaldisk get caption,description,providername & echo ####User Info#### & net user & echo ####Online User#### & query user & echo ####Local Group#### & net localgroup & echo ####Administrators Info#### & net localgroup administrators & echo ####Guest User Info#### & net user guest & echo ####Administrator User Info#### & net user administrator & echo ####Startup Info#### & wmic startup get caption,command & echo ####Tasklist#### & tasklist /svc & echo ####Ipconfig#### & ipconfig/all & echo ####Hosts#### & type C:\WINDOWS\System32\drivers\etc\hosts & echo ####Route Table#### & route print & echo ####Arp Info#### & arp -a & echo ####Netstat#### & netstat -ano & echo ####Service Info#### & sc query type= service state= all & echo ####Firewallinfo#### & netsh firewall show state & netsh firewall show config"4⤵PID:3888
-
C:\Windows\system32\systeminfo.exesysteminfo5⤵
- Gathers system information
PID:5960
-
-
C:\Windows\system32\HOSTNAME.EXEhostname5⤵PID:3668
-
-
C:\Windows\System32\Wbem\WMIC.exewmic logicaldisk get caption,description,providername5⤵
- Collects information from the system
PID:4468
-
-
C:\Windows\system32\net.exenet user5⤵PID:5624
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user6⤵PID:5312
-
-
-
C:\Windows\system32\query.exequery user5⤵PID:5644
-
C:\Windows\system32\quser.exe"C:\Windows\system32\quser.exe"6⤵PID:5968
-
-
-
C:\Windows\system32\net.exenet localgroup5⤵PID:4588
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup6⤵PID:5660
-
-
-
C:\Windows\system32\net.exenet localgroup administrators5⤵PID:5528
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup administrators6⤵PID:4188
-
-
-
C:\Windows\system32\net.exenet user guest5⤵PID:6032
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user guest6⤵PID:1748
-
-
-
C:\Windows\system32\net.exenet user administrator5⤵PID:2756
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user administrator6⤵PID:5748
-
-
-
C:\Windows\System32\Wbem\WMIC.exewmic startup get caption,command5⤵PID:1928
-
-
C:\Windows\system32\tasklist.exetasklist /svc5⤵
- Enumerates processes with tasklist
PID:1820
-
-
C:\Windows\system32\ipconfig.exeipconfig /all5⤵
- Gathers network information
PID:4992
-
-
C:\Windows\system32\ROUTE.EXEroute print5⤵PID:4592
-
-
C:\Windows\system32\ARP.EXEarp -a5⤵PID:5888
-
-
C:\Windows\system32\NETSTAT.EXEnetstat -ano5⤵
- Gathers network information
PID:5240
-
-
C:\Windows\system32\sc.exesc query type= service state= all5⤵
- Launches sc.exe
PID:5224
-
-
C:\Windows\system32\netsh.exenetsh firewall show state5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2140
-
-
C:\Windows\system32\netsh.exenetsh firewall show config5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:5684
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"4⤵PID:5268
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid5⤵PID:6132
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"4⤵PID:6124
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid5⤵PID:6028
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\AntiPublic [v2.0] by Mico.exe"C:\Users\Admin\AppData\Local\Temp\AntiPublic [v2.0] by Mico.exe"2⤵
- Executes dropped EXE
PID:5968 -
C:\ProgramData\vshost\vshost.exeC:\ProgramData\\vshost\\vshost.exe ,.3⤵
- Executes dropped EXE
PID:5356
-
-
C:\Users\Admin\Downloads\Very Fast AntiPublic [v2.0] Coded by Mico\libexec.liblibexec.lib3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:224 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/channel/UCzU7p1uxfpImOxvcAp1FfoQ?4⤵PID:3512
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffb1b6546f8,0x7ffb1b654708,0x7ffb1b6547185⤵PID:5972
-
-
-
-
C:\ProgramData\winst\winst.exeC:\ProgramData\\winst\\winst.exe al5Y7IRcuAXweQLAokqRyNaUMK3ZNgBO2Unt1sPmL8YHPGjBEMDysmjkESIFsvJD3⤵
- Executes dropped EXE
PID:5416
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:3012
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s fdPHost1⤵PID:5816
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Scheduled Task/Job
1Scheduled Task
1Persistence
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5db9081c34e133c32d02f593df88f047a
SHA1a0da007c14fd0591091924edc44bee90456700c6
SHA256c9cd202ebb55fe8dd3e5563948bab458e947d7ba33bc0f38c6b37ce5d0bd7c3e
SHA51212f9809958b024571891fae646208a76f3823ae333716a5cec303e15c38281db042b7acf95bc6523b6328ac9c8644794d39a0e03d9db196f156a6ee1fb4f2744
-
Filesize
152B
MD53a09f853479af373691d131247040276
SHA11b6f098e04da87e9cf2d3284943ec2144f36ac04
SHA256a358de2c0eba30c70a56022c44a3775aa99ffa819cd7f42f7c45ac358b5e739f
SHA512341cf0f363621ee02525cd398ae0d462319c6a80e05fd25d9aca44234c42a3071b51991d4cf102ac9d89561a1567cbe76dfeaad786a304bec33821ca77080016
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD52aba19b434d3500798c8b1566182a031
SHA1f33cbe1db80a85033ea9afececcf7e2b0996483a
SHA256c0ef1613286822990b30d9a9199ef32f390e79179bbb614fbebe7820a8a2f869
SHA51215f47bcee6d57d7eb089721c9743ffa46d17c0985d297c555cefd226b6ddc032938551d27cde9d75c59ff02881209c72260c5fe16e2be44a6b66416292871e6b
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
5KB
MD55b1bb84453cc9a16d3139b1fa5b4f163
SHA1f97bf14b47c6325b9cb931f230ec1202cf18d036
SHA256d03a0fdd106f4302856a8051ff7684004d91d461fe728fc30b4a8ce1f4186cff
SHA512f03c1111a713ec427c26f0cc6b7881f63d04f49475c43bbe562cab7cc83b899822b4d3df8db69a295bc924b0525786c65fd0ca12adabb1a3730b144ed8511361
-
Filesize
6KB
MD5d22fce286bedcfdb67dbf6afdf4c505d
SHA1eb264bab75b3406eb4e9189ccc717faccd69a2a2
SHA256285a71ac6eda26851a67a696661fb52cb6eb280cef55a522cc951c702bbeedd3
SHA512a2ceb51e60496d7f9ceb7554a10f3b02cd8afffc4e0b122a847013fa44fe90dc1d9f5f8a46cb875cf9824019b7671ed0f0766baf034af02fc1c249ca4e5492ff
-
Filesize
6KB
MD55928e6618816284d7a9d9d206e5869f4
SHA16522c42c477f426e3f9721af4cea1b465fcf7bd4
SHA25680df32364805f108e70f2682d9835875e66716147af2f6ca6a11ae5f9f8b7345
SHA512b84c5615cc11c293444fbe44a3937a8b2d0bf5f871806dda6f4545b2cc5ace3626fc5340871f92207a15b21b8cf22400a2fdffead8afc5dcefab3089b93c6ccf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5e2f91a8d8011782e9e402290b849651b
SHA1f0aba877b31e06a61a2f949437a1d38bd2f98ece
SHA256d47854a9eabec1bd6a7fb5d166ddf5cbfae25c39700e40aa3613e2336b23edda
SHA512e6213325fb72d300eb8cf4af33a69986a9f2a7468866fbbd6c85f4a0beb04d1a6bb898f1b8cb3a1aa0ff82911f29819680d253189f5edd52a9a0385c08cbfc0f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57ab82.TMP
Filesize48B
MD5b03aed4f4c0252a94cf8bf85679a59f2
SHA1f797f4573222c338ee4bc5a6595e9a9cc4225588
SHA2568ff0319d3943be9cb7cd29fbd5a67d662571cffd87ec6fa2b08611ef58ae5b51
SHA512a289ee0bbf66820da9459cc27ca963940f9ccca7ef19eb682178e51febd72d8f8c1cf67bedc9538204356b38d65bc657915cc36e62a7518d03523ab43371efe5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD563db67285e3f2424b65be237c7e62651
SHA14129a25458b4f9b44094cfd490cdc909dfecf268
SHA256ab8e1b018de41bc347d1b892adea529965ff7c2ee31e75850052660d1b41bb58
SHA512b324d1241ed7797992d6ec5f306fac7611e70f3b79d0a4fb8dfa818d3d590031c3a0ab47698ef248e36065862dabac024945ce9fe4d495e5086fb4f879466744
-
Filesize
11KB
MD528b79657851868a7ced1b896bd1a9090
SHA1b25916f80f3fc75f129c10cd5cb3b0e77a8cc41b
SHA256f03c507533cfe159aaef3621dc5e775c20791e8abfd3d475609259c0969317d0
SHA512fff33217752020774cf18146cabb0c6e408a4aabe444ba8607582567ca177b0481b89118bce31c3e45160ecd90c7238b95683b5e7d4e321516a9dbd2b72c0bdd
-
Filesize
374KB
MD50ef2164668279568b8a2a300c1c1a31a
SHA18f0aac629009cac47cb66cc89d70d7818cae179c
SHA256d7615b2a03713189c343bae8eac750d12f146554cd766fba2bf153676096ffa3
SHA512f2a5a3c6d496f582f7f868eaeec9b5007824ce8616ab05f07fdc0293b7450130c2226b8b69b897982b7a22388a545986fd211de769decaf242ed3b2cbaf3ec3b
-
Filesize
12.6MB
MD5416d90082a860d48c4315066a0acfedb
SHA15596e599ac839cd3f89fceeec8efc7ba4fb34e87
SHA2569abbc3b39c02cec08bba97b4fcb7047af7546f141da3ebc5d4cc08e332b82d5d
SHA512d766010a3e158e52a33f6880466fafb4c67fa13689a2caac776a749af0103de6409cc9f7c790edb73a55c2b744c0a1de35376cf67419285f89ea0f5bee00d858
-
Filesize
116KB
MD5be8dbe2dc77ebe7f88f910c61aec691a
SHA1a19f08bb2b1c1de5bb61daf9f2304531321e0e40
SHA2564d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83
SHA5120da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655
-
Filesize
36KB
MD55f0d1334cf0c88d0a89d59d90d3c8d7f
SHA15651b9527da3870d5d38561d3d3d2a12b18b4762
SHA25665c1ea882322b224b56e94eb488b0eac29e8910752300ca629beb76885f43e87
SHA5120d3d6fbe13bd7ea89012b5f4b5b95aadf4a97537f2a6e7cb3c574fae5410effe3e3f04ea5147df4a627029e57e4a1ce60d99d9d384eedb0a6230edffce21865e
-
Filesize
48KB
MD549d7eeb9edf72ecc9aa1f3f7751f594c
SHA146a3bf76d817533fb2c9dda88cbf75f2dc1cee81
SHA25628a6b14c9d35e01d75abe386eb6a456b663e09c79ffa113e12d015ac75840b04
SHA512bbefd1ffb5052dbcc7eec55d6be6aa7604c1b35b0c16aa7448f280cf4aa34ff33207f3586aa548e8823a9aaabb7c4854eb982a7408c238966c46b5e5c7aeba0b
-
Filesize
71KB
MD52443ecaddfe40ee5130539024324e7fc
SHA1ea74aaf7848de0a078a1510c3430246708631108
SHA2569a5892ac0cd00c44cd7744d60c9459f302d5984ddb395caea52e4d8fd9bca2da
SHA5125896af78cf208e1350cf2c31f913aa100098dd1cf4bae77cd2a36ec7695015986ec9913df8d2ebc9992f8f7d48bba102647dc5ee7f776593ae7be36f46bd5c93
-
Filesize
58KB
MD57c1116e1656d8ab1192d927e8dd9607e
SHA15df70de7ed358a5cf95d3ef16bdd53db74c1e2f0
SHA256a0ab67ea3f27337ed0873d07901eff16f0e6eb58fa7436bb0bde15a35516acc3
SHA512004bdff5a4d76ad0d7ca3b000615de904660abccc737b3aadfee5488155e3f55612aed2bc7c1e14db07e7e784f35b779abcfe5217ea972a1bc6dd0bafad04699
-
Filesize
106KB
MD5402beeb25b14b6182335d6fd19fb1e4f
SHA12ad5900f0e9aa7e86329da9598cf8315926abb4c
SHA25666391f61f499833e083ed8ba90f08165224f7ae4a6d719bd3927cc11172736c1
SHA51254221bad46becfbac2001149f31438b99dc91b2a232fca61f0686f0a51c02bc47d226c9ed2873f7b17dabfc248a46826723297e2c3482e01d79fa7056366d1ab
-
Filesize
35KB
MD51707552b695aa251dc4a205b55eb92df
SHA13ef80ee38fdf87236b224e2faf743d5689714b45
SHA2569e513d47d56fb59ca9794b129153e75231d7d684b61cc6c7612bf4abda85b4b0
SHA51297b3947a5a446f45e9ca0b7d8cf945ba4eb42f38543ab67aee563aad8040ad332f1b51663e80352ea973998abbf255df6ec4cc38d795f7a02c20a453e852aed9
-
Filesize
86KB
MD53a53da080c83b709581e5a117b6e308e
SHA1efa5bf61d6b8384b8c4050fd6b579b3f13ff2ebf
SHA256779762b87cdf4bcebaa3a571f25324ea7b9e2c8b85833172acc0b58c6af5508c
SHA5122be3b2085032ed26b734a70a0a94b420ad4c9130cdda38b7dc4b9677d603b3631d1d013839940ae165be85f65400cb77b31804c8806b91b13d0fe1893a6c7254
-
Filesize
26KB
MD5326061e57a55149d68f3cc931d45ada1
SHA19e09ad5ca0551359e77b3cfedad4851f85672ec8
SHA256dbcce7f1ac98ce01e5e6fea036922ebad3e207e3e97ed07a6445e8f3e3bd66fa
SHA5123de46fcc8f4e5346a689c3d6cdd7aebc34b8d688b9e60b47e490a117514519c51663ea5f517c96c6b1b07892e533ae3cff40007dc6a8faa50afd71e8a7c09f44
-
Filesize
32KB
MD5b2b4b47fb5580a9d7c3d975f4d318660
SHA1da6e2913670c586b4cf729c8f639f305cce6ca74
SHA2568a210d5bf97189d4bb2d384d262c718eeb8ba549e3bc7a1300275433edcac6ef
SHA512f3ed282d79e5ae6229e94036439e0030fcf7a592a8227ce8759f1aafda91f1241282653ffd4635eb8acd00eb5ed3c1373d0dd86fb93dc836012d84a1f43f16dd
-
Filesize
25KB
MD553c0acf7733afe17cc0b2a4f39793724
SHA18c6304bad8e2c009fea48eb4c13c77b793b30a33
SHA2561dda443bd40f46ce6c60ebbbd7a8d38a9c6c696a8620834b4b62ae5d45fd5e7c
SHA512fdfb9e9d410746faa531c8f4007b4087b35bc1ea0ca00946f96ac5901eefe66bda2296021c004d070246d5a17afe6a65315c0d2ec7658761ef5d78a23b5f8df9
-
Filesize
43KB
MD514ab7774579ee7848cb48ab6a6364c6b
SHA13da679166989b6d944ba20ea0001929840bc5354
SHA256d1dd324fdf327b6b4af757ccb0863ef11901d34344bf78480ab0013b6c2b47de
SHA512d06b939303907851c4491c9564ed091cc06693f2a5eb5d7d098306fb0c7b96bfcc0bf993bf0edbc504e0681e4520d4d491d1c114547e6019e6b6cc1f4d0958d0
-
Filesize
56KB
MD578aa09523acdd53971d9ee0cc69c901e
SHA1e15972b2ce482712a6076536a2ee33ac5f0bfcac
SHA2566e778bac115204796aef74f98a293b7ec10de0801b2f8296d260448870993e5f
SHA512bbb6928709786dec35580e6e256e446cec2f3468266fc93523c9ada126be3df8e898fcec989a6108f042cf8315f6e00bf78fe12c0dfb3ec3f6e7eae808e206a1
-
Filesize
65KB
MD5d674ccf80fb5b1e1b09d2437ee572af7
SHA176cb6ca0715b27cf0e654ddd5655670df0d16e2a
SHA256b094a056b5d4f012b6acbf70be5a0fafc0ef7a3ba7173179ac601da475464d7a
SHA512747a79b06ba5b196dc1f9709ee4980c6955a5047b923ad101df878e84ee17b18ae44c55a0cc5ab378382a6203ee7b9969f41966715a3dbb7aa2e09fe1e273696
-
Filesize
24KB
MD5b21b864e357ccd72f35f2814bd1e6012
SHA12ff0740c26137c6a81b96099c1f5209db33ac56a
SHA256ce9e2a30c20e6b83446d9ba83bb83c5570e1b1da0e87ff467d1b4fc090da6c53
SHA51229667eb0e070063ef28b7f8cc39225136065340ae358ad0136802770b2f48ac4bda5e60f2e2083f588859b7429b9ea3bad1596a380601e3b2b4bb74791df92a3
-
Filesize
1.4MB
MD56e706e4fa21d90109df6fce1b2595155
SHA15328dd26b361d36239facff79baca1bab426de68
SHA256ce9b9f16ce0d9abdbac3307115d91eaf279c5152336ccbe8830151b41c802998
SHA512c7e377e2854ad5b5c3fb23593817ad6345bf8a78d842ff2a45c3be135fad6bb27b67c5b6c01b26e7c1b1b12ea0814f4f6b6a522bbfa689b89fa50d3652799b34
-
Filesize
1.6MB
MD5443fd07a22ff1a688a3505d35f3c3dd1
SHA1ab9f501aa1d3d523b45f8170e53981672cd69131
SHA256f9c87ec6401039fd03b7c6732c74d1abfdb7c07c8e9803d00effe4c610baa9ee
SHA5121de390d5d9872c9876662f89c57173391ecd300cabde69c655b2ade7eea56e67376839607cac52572111b88a025797060653dc8bb987c6a165f535b245309844
-
Filesize
29KB
MD50d1c6b92d091cef3142e32ac4e0cc12e
SHA1440dad5af38035cb0984a973e1f266deff2bd7fc
SHA25611ee9c7fb70c3756c0392843245935517171b95cc5ba0d696b2c1742c8d46fb6
SHA5125d514ecab93941e83c008f0e9749f99e330949580884bf4850b11cac08fe1ac4ac50033e8888045fe4a9d8b4d2e3ea667b39be18f77266d00f8d7d6797260233
-
Filesize
222KB
MD5364a71831c9bd0a09eeeceb6980c58c7
SHA19d084ccb83e12ddccd17250a009362d720e6271c
SHA2563b20fb46f41234f8f7bbe342cfebfbbce5708d963cf5c7792d1237a1bc7b2676
SHA5125abe19130f9306fd6fc3644412ef6c8c5b7da970cfaed69657a6cb62d431abfbba64fefcbfa82910d17d744e299e3ba5036bd490223b2bf28689cf2e70633dce
-
Filesize
87KB
MD5c79cb140401e870e562e451700f8dc42
SHA1387c7aa25ae47c92968ffccd861ee4b0074b1f37
SHA25660820b343d07f51d2d056c72475b4efbf1432bc50834faeb7d93a7974da3cdf8
SHA51285b161fec6bb114efd7c1191b67db254c038ae510ee16fefc3ec7f6572002cdb7aecbc6215fa2e1773fdd9e3f6eca76ad41c9ed3ce4e41db3036f673127834d4
-
Filesize
65KB
MD535da4143951c5354262a28dee569b7b2
SHA1b07cb6b28c08c012eecb9fd7d74040163cdf4e0e
SHA256920350a7c24c46339754e38d0db34ab558e891da0b3a389d5230a0d379bee802
SHA5122976667732f9ee797b7049d86fd9beeb05409adb7b89e3f5b1c875c72a4076cf65c762632b7230d7f581c052fce65bb91c1614c9e3a52a738051c3bc3d167a23
-
Filesize
1.6MB
MD5476ab587f630eb4f9c21e88a065828b0
SHA1d563e0d67658861a5c8d462fcfa675a6840b2758
SHA2567cf19201904e4e7db4e5e44cd92d223fb94ddd43da04a03d11e388bf41686b8b
SHA5123d67e49a09777e6fab36c37cf3a7c2768382eb1c850638b0064e2b00479f74251bb70290fe62971944344ee88b7803ee1697a374a62c7f7c45a556c820800676
-
Filesize
25KB
MD52b57ad3042174698a12ff119c21488ea
SHA133fdbd701caee66fcc1beb979c8e866a77124f03
SHA256aef792adfaf8e1b6cdfd3a9b721abc8f66b4fdc21778c9fae5d39385ab003e27
SHA512623332bed6e9ae88a0d313e15f6565ca7ffc71f728ca842cebae80b24c669c82188080b6646ee402fb7b5d26163a4456a170271c1da9992e3c918d4432825999
-
Filesize
630KB
MD5017a83acbd1f1e17aea2b062bea62fd7
SHA1ca387752322a61b1884cb52d6a38cdbd4cddcc2f
SHA25664eec6403b2a8bf8be8554704eff4c6d9e146afbbb655f34a70e0334e3cca3e8
SHA51296d151290d45f94f0c656d277a7490810711b55f559a0e15efb65d7cba8869b08118f5429a8c8ee7a705bf87fe3f2013e560b950dd3d2b1a40965bacbf9e108b
-
Filesize
295KB
MD57fef4897fcaeedd98ee1410a7abd2841
SHA17cce279ca32e3ada8344d8cb098e33729a18cd4f
SHA2564d3bea0a4627d1f43e20ace9b889e52ab93cbcf4562029b0f6db19fd4722077d
SHA512897f30c9ccfd32776a61a4d6aa80b03f0174ecc4d9368898489a934345bfd32a9c71bee95000cdca9a12e4c85ab0789888928984de6eadeb95252c5468e8fd40
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
13.3MB
MD5aa00c2fe5657b15170d24802a113c390
SHA13b30f1f09eb61529cf528e072e2afa3657d4bc4a
SHA2565aa0c986ff6868867c9928b266e931de1c1ff792024c0c99b95b548ac2b9224a
SHA512edf031b1f1d606319b31bb31a6f7150af2e9079eb40828727e05b67a8b74257f4eb36112d7b14531a84b30c3deee3d366ec902aa3bc6a2dc46649e6b1710978f
-
Filesize
12.0MB
MD5557e1abf66da31d24b3149476e0aca9b
SHA16c54cfd0404a90a0ab31d0befee2f17881841321
SHA2568ceda1fa60605fd27361022d6ccfb32c9b0a93ea1a5049db2ef27f9d53fbe892
SHA512435bd28e2ca35e74ac8203c0dbb312201eb919943c69bc2a9aba13f5c95a0bff07b10ec66c69b6214e8dfe8eb4888adbafeffefb06d2fa811907f9a9050545da
-
Filesize
745KB
MD56caae90a0558d3079becd37a0c10dc83
SHA13d6a51b1f4851f1f77696c9f946a37a07138ed0a
SHA256c4bff67c99ffd034ad0af11fcce2befe93e60313d1d306d565af9cfba0129a6c
SHA51267780dbd0a0080bd5756f12101735e8a2ad0f85af0a93d539c313968b2e4fbd592d569eec385c99f434c6082359d88920da4ae096e9b00f0a3e6e2fd3c3a5781
-
Filesize
238KB
MD54e6a7ee0e286ab61d36c26bd38996821
SHA1820674b4c75290f8f667764bfb474ca8c1242732
SHA256f67daf4bf2ad0e774bbd53f243e66806397036e5fde694f3856b27bc0463c0a3
SHA512f9d99d960afce980421e654d1d541c1fdb81252615c48eed5c4a5c962cb20123d06dbdf383a37a476aa41e4ffabca30e95a8735739c35f66efbaa1dee8a9ba8a
-
Filesize
235KB
MD51777e7eeecf8b7342624d4ddf1fc5e26
SHA1bc5e70b1723e504289022e337eab5794e059597b
SHA256ac08061261b6ea77987e248815b62ac349fd233de1aebe4e69caa3cb0fead7d3
SHA512a223f2fe0c068d34392d58c9bf9e5e4f074f784a648403e1ba3f8fdb656b0d8b401c07b08759ad13983bc35d6ef67ad600b82e9fab193bc6707e6b9cd9e9e7c1
-
Filesize
211KB
MD559238144771807b1cbc407b250d6b2c3
SHA16c9f87cca7e857e888cb19ea45cf82d2e2d29695
SHA2568baa5811836c0b4a64810f6a7d6e1d31d7f80350c69643dc9594f58fd0233a7b
SHA512cf2f8b84526ae8a1445a2d8a2b9099b164f80a7b7290f68058583b0b235395d749ad0b726c4e36d5e901c18d6946fd9b0dd76c20016b65dc7a3977f68ee4a220