Analysis
-
max time kernel
827s -
max time network
829s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
13-07-2024 22:42
Errors
General
-
Target
WaveInstaller.exe
-
Size
76KB
-
MD5
1b95a7fc10c0b54c7d807d1f7ee2b778
-
SHA1
75d3a2f1d104b8f4950f59da9e829d61943e3e44
-
SHA256
d2373e86e03b935c7c24993f2a567a7e9f3b477c460a4c061da4000de493fbd8
-
SHA512
b225f9052457b5de3728f1f2bf5cf17905de780823ccaa0139e0f559212a05bb177297d950783084cae87f4da217c94d8ad66124f0a3c6946bd5662a43395d4e
-
SSDEEP
1536:kpn26tWBE8jMMx4yBmEbTb1XyM6lk120w6hO2GRKVJjiS:kpn2FMniTb1IH0w6hOFRKnr
Malware Config
Extracted
xworm
email-champions.gl.at.ply.gg:50458
-
Install_directory
%Temp%
-
install_file
svchost.exe
-
telegram
https://api.telegram.org/bot6814850214:AAGtrnkhUh3vMq-wH7W5cvNuSWLdcy7mtis/sendMessage?chat_id=7094837950
Extracted
xworm
5.0
127.0.0.1:7777
OpzaMu4iTgsJXCov
-
install_file
USB.exe
Extracted
gurcu
https://api.telegram.org/bot6814850214:AAGtrnkhUh3vMq-wH7W5cvNuSWLdcy7mtis/sendMessage?chat_id=7094837950
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/memory/4472-847-0x00000000011D0000-0x00000000011DE000-memory.dmp disable_win_def -
Detect Xworm Payload 7 IoCs
resource yara_rule behavioral1/memory/4620-1-0x0000000000DE0000-0x0000000000DFA000-memory.dmp family_xworm behavioral1/files/0x000200000002aa9e-51.dat family_xworm behavioral1/files/0x000400000002abf6-783.dat family_xworm behavioral1/files/0x000200000002ac17-793.dat family_xworm behavioral1/files/0x000500000002abf6-804.dat family_xworm behavioral1/files/0x000200000002ac18-814.dat family_xworm behavioral1/memory/4472-816-0x00000000007F0000-0x0000000000800000-memory.dmp family_xworm -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "5" XClient.exe -
AgentTesla payload 2 IoCs
resource yara_rule behavioral1/files/0x000100000002ab4f-347.dat family_agenttesla behavioral1/memory/2328-348-0x0000026042ED0000-0x00000260430C4000-memory.dmp family_agenttesla -
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2036 powershell.exe 1584 powershell.exe 2896 powershell.exe 3576 powershell.exe 1008 powershell.exe 2120 powershell.exe -
Disables Task Manager via registry modification
-
Executes dropped EXE 19 IoCs
pid Process 1500 svchost.exe 2824 svchost.exe 3576 svchost.exe 4592 svchost.exe 4276 svchost.exe 240 svchost.exe 1168 svchost.exe 2328 XWorm V5.6.exe 2916 svchost.exe 3360 playit.exe 5332 svchost.exe 6068 XWorm V5.6.exe 5608 svchost.exe 4472 XClient.exe 4016 XClient.exe 3624 svchost.exe 6136 svchost.exe 276 svchost.exe 5880 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 2832 systemreset.exe -
Uses the VBS compiler for execution 1 TTPs
-
resource yara_rule behavioral1/files/0x000100000002ab54-344.dat vmprotect behavioral1/memory/2328-346-0x0000026025CA0000-0x0000026027BAE000-memory.dmp vmprotect -
Blocklisted process makes network request 4 IoCs
flow pid Process 30 2020 msiexec.exe 31 2020 msiexec.exe 32 2020 msiexec.exe 33 2020 msiexec.exe -
Enumerates connected drives 3 TTPs 47 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\F: systemreset.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ip-api.com -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\Recovery\ReAgent.xml systemreset.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\playit_gg\bin\playit.exe msiexec.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\Logs\PBR\Panther\Contents1.dir systemreset.exe File created C:\Windows\Logs\PBR\PushButtonReset.etl systemreset.exe File opened for modification C:\Windows\Logs\PBR\INF systemreset.exe File created C:\Windows\SystemTemp\~DF59D6A14781712E7C.TMP msiexec.exe File opened for modification C:\Windows\Logs\PBR\Panther\diagerr.xml systemreset.exe File created C:\Windows\Logs\PBR\Panther\setup.etl systemreset.exe File created C:\Windows\Logs\PBR\Panther\setupact.log systemreset.exe File created C:\Windows\Logs\PBR\Panther\_s_3809.tmp systemreset.exe File opened for modification C:\Windows\Logs\PBR\INF\setupapi.offline.log systemreset.exe File created C:\Windows\Logs\PBR\INF\setupapi.setup.log systemreset.exe File created C:\Windows\Logs\PBR\Panther\DDACLSys.log systemreset.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\{CCD2B416-4517-4AC6-89F2-364C9A5BF2C5}\ProductICO msiexec.exe File opened for modification C:\Windows\Logs\PBR\Panther systemreset.exe File created C:\Windows\Logs\PBR\Panther\cbs_intl.log systemreset.exe File opened for modification C:\Windows\Logs\PBR\DISM\dism.log systemreset.exe File opened for modification C:\Windows\Logs\PBR\Panther\setup.exe systemreset.exe File opened for modification C:\Windows\Logs\PBR\Panther\UnattendGC\diagwrn.xml systemreset.exe File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml systemreset.exe File opened for modification C:\Windows\Logs\PBR\CBS systemreset.exe File opened for modification C:\Windows\Logs\PBR\ResetConfig.ini systemreset.exe File created C:\Windows\Logs\PBR\ReAgent\ReAgent.xml systemreset.exe File opened for modification C:\Windows\Logs\PBR\INF\setupapi.setup.log systemreset.exe File created C:\Windows\Logs\PBR\DISM\dism.log systemreset.exe File created C:\Windows\Logs\PBR\Panther\setuperr.log systemreset.exe File created C:\Windows\Logs\PBR\Panther\UnattendGC\diagerr.xml systemreset.exe File opened for modification C:\Windows\Logs\PBR\Panther\setup.etl systemreset.exe File opened for modification C:\Windows\Logs\PBR\Panther\setupact.log systemreset.exe File opened for modification C:\Windows\Logs\PBR\BCDCopy.LOG systemreset.exe File opened for modification C:\Windows\Installer\e5ec215.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIC34E.tmp msiexec.exe File opened for modification C:\Windows\Logs\PBR\INF\setupapi.dev.log systemreset.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Logs\PBR\setupact.log systemreset.exe File created C:\Windows\Logs\PBR\Panther\unattend.xml systemreset.exe File opened for modification C:\Windows\Logs\PBR\WinRE systemreset.exe File opened for modification C:\Windows\Logs\PBR\SessionID.xml systemreset.exe File created C:\Windows\Logs\PBR\INF\setupapi.offline.log systemreset.exe File opened for modification C:\Windows\Logs\PBR\Panther\UnattendGC\setupact.log systemreset.exe File opened for modification C:\Windows\Logs\PBR\Panther\cbs_intl.log systemreset.exe File opened for modification C:\Windows\Logs\PBR\Timestamp.xml systemreset.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Logs\PBR\CBS\CBS.log systemreset.exe File opened for modification C:\Windows\Logs\PBR\Panther\DDACLSys.log systemreset.exe File opened for modification C:\Windows\Logs\PBR\Panther\_s_39C0.tmp systemreset.exe File created C:\Windows\Installer\{CCD2B416-4517-4AC6-89F2-364C9A5BF2C5}\ProductICO msiexec.exe File created C:\Windows\Logs\PBR\Panther\UnattendGC\diagwrn.xml systemreset.exe File opened for modification C:\Windows\Logs\PBR\Panther\MainQueueOnline1.que systemreset.exe File opened for modification C:\Windows\Logs\PBR\Panther\actionqueue\specialize.uaq systemreset.exe File opened for modification C:\Windows\Logs\PBR\setupact.log systemreset.exe File created C:\Windows\Logs\PBR\INF\setupapi.dev.log systemreset.exe File opened for modification C:\Windows\Logs\PBR\Panther\cbs.log systemreset.exe File opened for modification C:\Windows\Logs\PBR\Panther\setuperr.log systemreset.exe File opened for modification C:\Windows\Logs\PBR\Panther\_s_3809.tmp systemreset.exe File opened for modification C:\Windows\Logs\PBR\BCDCopy.LOG2 systemreset.exe File opened for modification C:\Windows\Logs\PBR\Panther\diagwrn.xml systemreset.exe File opened for modification C:\Windows\Logs\PBR\Panther\_s_3624.tmp systemreset.exe File created C:\Windows\Logs\PBR\Panther\_s_3624.tmp systemreset.exe File created C:\Windows\Logs\PBR\Panther\actionqueue\specialize.uaq systemreset.exe File created C:\Windows\Logs\PBR\Panther\cbs_unattend.log systemreset.exe File created C:\Windows\Logs\PBR\Panther\setupinfo systemreset.exe File created C:\Windows\Logs\PBR\Panther\diagerr.xml systemreset.exe File opened for modification C:\Windows\Logs\PBR systemreset.exe File opened for modification C:\Windows\Logs\PBR\ReAgent systemreset.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 13 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 vds.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 vds.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vds.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName vds.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vds.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\AttributesTableCache = a2a0d0ebe5b9334487c068b6b72699c70000000000000000 vds.exe -
Enumerates system info in registry 2 TTPs 9 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer XWorm V5.6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion XWorm V5.6.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS XWorm V5.6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer XWorm V5.6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS XWorm V5.6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion XWorm V5.6.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\26\52C64B7E msiexec.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = 99ebff004cc2ff000091f8000078d4000067c000003e9200001a6800f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292114432" LogonUI.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4290799360" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292114432" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365268" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365268" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "224" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\614B2DCC71546CA4982F63C4A9B52F5C\Binaries msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\614B2DCC71546CA4982F63C4A9B52F5C\Version = "983053" msiexec.exe Set value (data) \REGISTRY\USER\S-1-5-21-126710838-2490174220-686410903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\0\MRUListEx = ffffffff XWorm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-126710838-2490174220-686410903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" XWorm V5.6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\614B2DCC71546CA4982F63C4A9B52F5C\Language = "1033" msiexec.exe Set value (data) \REGISTRY\USER\S-1-5-21-126710838-2490174220-686410903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1 = 14002e803accbfb42cdb4c42b0297fe99a87c6410000 XWorm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-126710838-2490174220-686410903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1 XWorm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-126710838-2490174220-686410903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" XWorm V5.6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\614B2DCC71546CA4982F63C4A9B52F5C\Assignment = "1" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\4AEF046202130BD4399AB6404AFE7E2D msiexec.exe Key created \REGISTRY\USER\S-1-5-21-126710838-2490174220-686410903-1000_Classes\Local Settings XWorm V5.6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ XWorm V5.6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\4AEF046202130BD4399AB6404AFE7E2D\614B2DCC71546CA4982F63C4A9B52F5C msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\614B2DCC71546CA4982F63C4A9B52F5C\SourceList\PackageName = "playit-windows-x86_64-signed.msi" msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-126710838-2490174220-686410903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" XWorm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-126710838-2490174220-686410903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" XWorm V5.6.exe Set value (data) \REGISTRY\USER\S-1-5-21-126710838-2490174220-686410903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\0 = 7a00310000000000ed582ab6100058574f524d357e312e36425900005e0009000400efbeed5819b6ed583bb62e00000013ab0200000001000000000000000000000000000000722c2900580057006f0072006d00200035002e00360020004200790020004e006500630072006f0077006f006c00660000001c000000 XWorm V5.6.exe Set value (data) \REGISTRY\USER\S-1-5-21-126710838-2490174220-686410903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202020202 XWorm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-126710838-2490174220-686410903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} XWorm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-126710838-2490174220-686410903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" XWorm V5.6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\614B2DCC71546CA4982F63C4A9B52F5C\SourceList\Media\DiskPrompt = "Playit Installation" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\614B2DCC71546CA4982F63C4A9B52F5C\SourceList\Media\1 = ";CD-ROM #1" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\614B2DCC71546CA4982F63C4A9B52F5C\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\Desktop\\" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-126710838-2490174220-686410903-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ XWorm V5.6.exe Set value (data) \REGISTRY\USER\S-1-5-21-126710838-2490174220-686410903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 XWorm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-126710838-2490174220-686410903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" XWorm V5.6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\614B2DCC71546CA4982F63C4A9B52F5C\SourceList\Net msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\614B2DCC71546CA4982F63C4A9B52F5C\Clients = 3a0000000000 msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-126710838-2490174220-686410903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\0\NodeSlot = "6" XWorm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-126710838-2490174220-686410903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" XWorm V5.6.exe Set value (str) \REGISTRY\USER\S-1-5-21-126710838-2490174220-686410903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" XWorm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-126710838-2490174220-686410903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" XWorm V5.6.exe Set value (str) \REGISTRY\USER\S-1-5-21-126710838-2490174220-686410903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell\SniffedFolderType = "Generic" XWorm V5.6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\614B2DCC71546CA4982F63C4A9B52F5C\ProductName = "playit" msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-126710838-2490174220-686410903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" XWorm V5.6.exe Set value (data) \REGISTRY\USER\S-1-5-21-126710838-2490174220-686410903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = 0100000000000000ffffffff XWorm V5.6.exe Set value (str) \REGISTRY\USER\S-1-5-21-126710838-2490174220-686410903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell\SniffedFolderType = "Generic" XWorm V5.6.exe Set value (data) \REGISTRY\USER\S-1-5-21-126710838-2490174220-686410903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 XWorm V5.6.exe Set value (data) \REGISTRY\USER\S-1-5-21-126710838-2490174220-686410903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02020202020202 XWorm V5.6.exe Set value (data) \REGISTRY\USER\S-1-5-21-126710838-2490174220-686410903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 XWorm V5.6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\614B2DCC71546CA4982F63C4A9B52F5C\AuthorizedLUAApp = "0" msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-126710838-2490174220-686410903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" XWorm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-126710838-2490174220-686410903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" XWorm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-126710838-2490174220-686410903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" XWorm V5.6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\614B2DCC71546CA4982F63C4A9B52F5C msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\614B2DCC71546CA4982F63C4A9B52F5C\SourceList\Net\1 = "C:\\Users\\Admin\\Desktop\\" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-126710838-2490174220-686410903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 XWorm V5.6.exe Set value (data) \REGISTRY\USER\S-1-5-21-126710838-2490174220-686410903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\MRUListEx = 00000000ffffffff XWorm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-126710838-2490174220-686410903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell XWorm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-126710838-2490174220-686410903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6 XWorm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-126710838-2490174220-686410903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\NodeSlot = "7" XWorm V5.6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\614B2DCC71546CA4982F63C4A9B52F5C\PackageCode = "CCDE5D5A893E22040BC73EAC637B5429" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\614B2DCC71546CA4982F63C4A9B52F5C\ProductIcon = "C:\\Windows\\Installer\\{CCD2B416-4517-4AC6-89F2-364C9A5BF2C5}\\ProductICO" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\614B2DCC71546CA4982F63C4A9B52F5C\InstanceType = "0" msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-126710838-2490174220-686410903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" XWorm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-126710838-2490174220-686410903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" XWorm V5.6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\614B2DCC71546CA4982F63C4A9B52F5C\Environment = "Binaries" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\614B2DCC71546CA4982F63C4A9B52F5C\AdvertiseFlags = "388" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\614B2DCC71546CA4982F63C4A9B52F5C\DeploymentFlags = "3" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-126710838-2490174220-686410903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU XWorm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-126710838-2490174220-686410903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} XWorm V5.6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\614B2DCC71546CA4982F63C4A9B52F5C\SourceList\Media msiexec.exe Key created \REGISTRY\USER\S-1-5-21-126710838-2490174220-686410903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\0 XWorm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-126710838-2490174220-686410903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg XWorm V5.6.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1516 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2000 vlc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2036 powershell.exe 2036 powershell.exe 1584 powershell.exe 1584 powershell.exe 1584 powershell.exe 2896 powershell.exe 2896 powershell.exe 2896 powershell.exe 3576 powershell.exe 3576 powershell.exe 3576 powershell.exe 4620 WaveInstaller.exe 4620 WaveInstaller.exe 4620 WaveInstaller.exe 4620 WaveInstaller.exe 4620 WaveInstaller.exe 4620 WaveInstaller.exe 4620 WaveInstaller.exe 4620 WaveInstaller.exe 4620 WaveInstaller.exe 4620 WaveInstaller.exe 4620 WaveInstaller.exe 4620 WaveInstaller.exe 4620 WaveInstaller.exe 4620 WaveInstaller.exe 4620 WaveInstaller.exe 4620 WaveInstaller.exe 4620 WaveInstaller.exe 4620 WaveInstaller.exe 4620 WaveInstaller.exe 4620 WaveInstaller.exe 4620 WaveInstaller.exe 4620 WaveInstaller.exe 4620 WaveInstaller.exe 4620 WaveInstaller.exe 4620 WaveInstaller.exe 4620 WaveInstaller.exe 4620 WaveInstaller.exe 4180 msiexec.exe 4180 msiexec.exe 4620 WaveInstaller.exe 4620 WaveInstaller.exe 4620 WaveInstaller.exe 4620 WaveInstaller.exe 4620 WaveInstaller.exe 4620 WaveInstaller.exe 3336 msedge.exe 3336 msedge.exe 3624 msedge.exe 3624 msedge.exe 4620 WaveInstaller.exe 4620 WaveInstaller.exe 4620 WaveInstaller.exe 4620 WaveInstaller.exe 4620 WaveInstaller.exe 4620 WaveInstaller.exe 4620 WaveInstaller.exe 4620 WaveInstaller.exe 4620 WaveInstaller.exe 4620 WaveInstaller.exe 4620 WaveInstaller.exe 4620 WaveInstaller.exe 4620 WaveInstaller.exe 4620 WaveInstaller.exe -
Suspicious behavior: GetForegroundWindowSpam 4 IoCs
pid Process 2000 vlc.exe 4620 WaveInstaller.exe 6068 XWorm V5.6.exe 2832 systemreset.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4620 WaveInstaller.exe Token: SeDebugPrivilege 2036 powershell.exe Token: SeDebugPrivilege 1584 powershell.exe Token: SeDebugPrivilege 2896 powershell.exe Token: SeDebugPrivilege 3576 powershell.exe Token: SeDebugPrivilege 4620 WaveInstaller.exe Token: SeDebugPrivilege 1500 svchost.exe Token: SeDebugPrivilege 2824 svchost.exe Token: SeDebugPrivilege 3576 svchost.exe Token: SeDebugPrivilege 4592 svchost.exe Token: SeDebugPrivilege 4276 svchost.exe Token: SeDebugPrivilege 240 svchost.exe Token: SeRestorePrivilege 3164 7zG.exe Token: 35 3164 7zG.exe Token: SeSecurityPrivilege 3164 7zG.exe Token: SeSecurityPrivilege 3164 7zG.exe Token: SeDebugPrivilege 1168 svchost.exe Token: SeShutdownPrivilege 2020 msiexec.exe Token: SeIncreaseQuotaPrivilege 2020 msiexec.exe Token: SeDebugPrivilege 2916 svchost.exe Token: SeSecurityPrivilege 4180 msiexec.exe Token: SeCreateTokenPrivilege 2020 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2020 msiexec.exe Token: SeLockMemoryPrivilege 2020 msiexec.exe Token: SeIncreaseQuotaPrivilege 2020 msiexec.exe Token: SeMachineAccountPrivilege 2020 msiexec.exe Token: SeTcbPrivilege 2020 msiexec.exe Token: SeSecurityPrivilege 2020 msiexec.exe Token: SeTakeOwnershipPrivilege 2020 msiexec.exe Token: SeLoadDriverPrivilege 2020 msiexec.exe Token: SeSystemProfilePrivilege 2020 msiexec.exe Token: SeSystemtimePrivilege 2020 msiexec.exe Token: SeProfSingleProcessPrivilege 2020 msiexec.exe Token: SeIncBasePriorityPrivilege 2020 msiexec.exe Token: SeCreatePagefilePrivilege 2020 msiexec.exe Token: SeCreatePermanentPrivilege 2020 msiexec.exe Token: SeBackupPrivilege 2020 msiexec.exe Token: SeRestorePrivilege 2020 msiexec.exe Token: SeShutdownPrivilege 2020 msiexec.exe Token: SeDebugPrivilege 2020 msiexec.exe Token: SeAuditPrivilege 2020 msiexec.exe Token: SeSystemEnvironmentPrivilege 2020 msiexec.exe Token: SeChangeNotifyPrivilege 2020 msiexec.exe Token: SeRemoteShutdownPrivilege 2020 msiexec.exe Token: SeUndockPrivilege 2020 msiexec.exe Token: SeSyncAgentPrivilege 2020 msiexec.exe Token: SeEnableDelegationPrivilege 2020 msiexec.exe Token: SeManageVolumePrivilege 2020 msiexec.exe Token: SeImpersonatePrivilege 2020 msiexec.exe Token: SeCreateGlobalPrivilege 2020 msiexec.exe Token: SeBackupPrivilege 2160 vssvc.exe Token: SeRestorePrivilege 2160 vssvc.exe Token: SeAuditPrivilege 2160 vssvc.exe Token: SeBackupPrivilege 4180 msiexec.exe Token: SeRestorePrivilege 4180 msiexec.exe Token: SeRestorePrivilege 4180 msiexec.exe Token: SeTakeOwnershipPrivilege 4180 msiexec.exe Token: SeRestorePrivilege 4180 msiexec.exe Token: SeTakeOwnershipPrivilege 4180 msiexec.exe Token: SeRestorePrivilege 4180 msiexec.exe Token: SeTakeOwnershipPrivilege 4180 msiexec.exe Token: SeRestorePrivilege 4180 msiexec.exe Token: SeTakeOwnershipPrivilege 4180 msiexec.exe Token: SeRestorePrivilege 4180 msiexec.exe -
Suspicious use of FindShellTrayWindow 53 IoCs
pid Process 2000 vlc.exe 2000 vlc.exe 2000 vlc.exe 2000 vlc.exe 2000 vlc.exe 2000 vlc.exe 2000 vlc.exe 2000 vlc.exe 2000 vlc.exe 2000 vlc.exe 2000 vlc.exe 2000 vlc.exe 2000 vlc.exe 2000 vlc.exe 3164 7zG.exe 2020 msiexec.exe 2020 msiexec.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 6068 XWorm V5.6.exe 6068 XWorm V5.6.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 2000 vlc.exe 2000 vlc.exe 2000 vlc.exe 2000 vlc.exe 2000 vlc.exe 2000 vlc.exe 2000 vlc.exe 2000 vlc.exe 2000 vlc.exe 2000 vlc.exe 2000 vlc.exe 2000 vlc.exe 2000 vlc.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 6068 XWorm V5.6.exe 6068 XWorm V5.6.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 4620 WaveInstaller.exe 2000 vlc.exe 6068 XWorm V5.6.exe 6068 XWorm V5.6.exe 6068 XWorm V5.6.exe 6068 XWorm V5.6.exe 4472 XClient.exe 2832 systemreset.exe 5860 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4620 wrote to memory of 2036 4620 WaveInstaller.exe 86 PID 4620 wrote to memory of 2036 4620 WaveInstaller.exe 86 PID 4620 wrote to memory of 1584 4620 WaveInstaller.exe 91 PID 4620 wrote to memory of 1584 4620 WaveInstaller.exe 91 PID 4620 wrote to memory of 2896 4620 WaveInstaller.exe 93 PID 4620 wrote to memory of 2896 4620 WaveInstaller.exe 93 PID 4620 wrote to memory of 3576 4620 WaveInstaller.exe 95 PID 4620 wrote to memory of 3576 4620 WaveInstaller.exe 95 PID 4620 wrote to memory of 1516 4620 WaveInstaller.exe 97 PID 4620 wrote to memory of 1516 4620 WaveInstaller.exe 97 PID 4180 wrote to memory of 2212 4180 msiexec.exe 127 PID 4180 wrote to memory of 2212 4180 msiexec.exe 127 PID 3336 wrote to memory of 396 3336 msedge.exe 135 PID 3336 wrote to memory of 396 3336 msedge.exe 135 PID 3336 wrote to memory of 3068 3336 msedge.exe 136 PID 3336 wrote to memory of 3068 3336 msedge.exe 136 PID 3336 wrote to memory of 3068 3336 msedge.exe 136 PID 3336 wrote to memory of 3068 3336 msedge.exe 136 PID 3336 wrote to memory of 3068 3336 msedge.exe 136 PID 3336 wrote to memory of 3068 3336 msedge.exe 136 PID 3336 wrote to memory of 3068 3336 msedge.exe 136 PID 3336 wrote to memory of 3068 3336 msedge.exe 136 PID 3336 wrote to memory of 3068 3336 msedge.exe 136 PID 3336 wrote to memory of 3068 3336 msedge.exe 136 PID 3336 wrote to memory of 3068 3336 msedge.exe 136 PID 3336 wrote to memory of 3068 3336 msedge.exe 136 PID 3336 wrote to memory of 3068 3336 msedge.exe 136 PID 3336 wrote to memory of 3068 3336 msedge.exe 136 PID 3336 wrote to memory of 3068 3336 msedge.exe 136 PID 3336 wrote to memory of 3068 3336 msedge.exe 136 PID 3336 wrote to memory of 3068 3336 msedge.exe 136 PID 3336 wrote to memory of 3068 3336 msedge.exe 136 PID 3336 wrote to memory of 3068 3336 msedge.exe 136 PID 3336 wrote to memory of 3068 3336 msedge.exe 136 PID 3336 wrote to memory of 3068 3336 msedge.exe 136 PID 3336 wrote to memory of 3068 3336 msedge.exe 136 PID 3336 wrote to memory of 3068 3336 msedge.exe 136 PID 3336 wrote to memory of 3068 3336 msedge.exe 136 PID 3336 wrote to memory of 3068 3336 msedge.exe 136 PID 3336 wrote to memory of 3068 3336 msedge.exe 136 PID 3336 wrote to memory of 3068 3336 msedge.exe 136 PID 3336 wrote to memory of 3068 3336 msedge.exe 136 PID 3336 wrote to memory of 3068 3336 msedge.exe 136 PID 3336 wrote to memory of 3068 3336 msedge.exe 136 PID 3336 wrote to memory of 3068 3336 msedge.exe 136 PID 3336 wrote to memory of 3068 3336 msedge.exe 136 PID 3336 wrote to memory of 3068 3336 msedge.exe 136 PID 3336 wrote to memory of 3068 3336 msedge.exe 136 PID 3336 wrote to memory of 3068 3336 msedge.exe 136 PID 3336 wrote to memory of 3068 3336 msedge.exe 136 PID 3336 wrote to memory of 3068 3336 msedge.exe 136 PID 3336 wrote to memory of 3068 3336 msedge.exe 136 PID 3336 wrote to memory of 3068 3336 msedge.exe 136 PID 3336 wrote to memory of 3068 3336 msedge.exe 136 PID 3336 wrote to memory of 3624 3336 msedge.exe 137 PID 3336 wrote to memory of 3624 3336 msedge.exe 137 PID 3336 wrote to memory of 1936 3336 msedge.exe 138 PID 3336 wrote to memory of 1936 3336 msedge.exe 138 PID 3336 wrote to memory of 1936 3336 msedge.exe 138 PID 3336 wrote to memory of 1936 3336 msedge.exe 138 PID 3336 wrote to memory of 1936 3336 msedge.exe 138 PID 3336 wrote to memory of 1936 3336 msedge.exe 138 PID 3336 wrote to memory of 1936 3336 msedge.exe 138 PID 3336 wrote to memory of 1936 3336 msedge.exe 138 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\policies\system XClient.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "5" XClient.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\WaveInstaller.exe"C:\Users\Admin\AppData\Local\Temp\WaveInstaller.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\WaveInstaller.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2036
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'WaveInstaller.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1584
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\svchost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2896
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3576
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\AppData\Local\Temp\svchost.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:1516
-
-
C:\Windows\SYSTEM32\CMD.EXE"CMD.EXE"2⤵PID:5556
-
C:\Windows\system32\systemreset.exesystemreset --factoryreset3⤵
- Loads dropped DLL
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2832
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:2440
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DisplayEnhancementService1⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1500
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2824
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3576
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4592
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4276
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:240
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\LimitWatch.wav"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2000
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:956
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\XWorm 5.6 By Necrowolf\" -ad -an -ai#7zMap2704:102:7zEvent248811⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3164
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1168
-
C:\Users\Admin\Desktop\XWorm 5.6 By Necrowolf\XWorm V5.6.exe"C:\Users\Admin\Desktop\XWorm 5.6 By Necrowolf\XWorm V5.6.exe"1⤵
- Executes dropped EXE
- Enumerates system info in registry
PID:2328
-
C:\Windows\System32\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\Desktop\playit-windows-x86_64-signed.msi"1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2020
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2916
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:2212
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:2160
-
C:\Program Files\playit_gg\bin\playit.exe"C:\Program Files\playit_gg\bin\playit.exe"1⤵
- Executes dropped EXE
PID:3360
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb0c293cb8,0x7ffb0c293cc8,0x7ffb0c293cd82⤵PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1908,17090720725132234243,11690627238186448976,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1916 /prefetch:22⤵PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1908,17090720725132234243,11690627238186448976,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2308 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1908,17090720725132234243,11690627238186448976,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2532 /prefetch:82⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,17090720725132234243,11690627238186448976,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1.25 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,17090720725132234243,11690627238186448976,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1.25 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,17090720725132234243,11690627238186448976,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1.25 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:12⤵PID:3312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,17090720725132234243,11690627238186448976,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1.25 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4616 /prefetch:12⤵PID:2492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,17090720725132234243,11690627238186448976,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1.25 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,17090720725132234243,11690627238186448976,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1.25 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:4120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,17090720725132234243,11690627238186448976,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1.25 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3536 /prefetch:12⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1908,17090720725132234243,11690627238186448976,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4896 /prefetch:82⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1908,17090720725132234243,11690627238186448976,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5648 /prefetch:82⤵PID:1144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,17090720725132234243,11690627238186448976,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1.25 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:12⤵PID:1624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,17090720725132234243,11690627238186448976,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1.25 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:2624
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2624
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe1⤵
- Executes dropped EXE
PID:5332
-
C:\Users\Admin\Desktop\XWorm 5.6 By Necrowolf\XWorm V5.6.exe"C:\Users\Admin\Desktop\XWorm 5.6 By Necrowolf\XWorm V5.6.exe"1⤵
- Executes dropped EXE
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:6068 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\cjhh45cc\cjhh45cc.cmdline"2⤵PID:4256
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESAD2C.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc7C8C901DD1C1464CA2ED339A8AC29A8B.TMP"3⤵PID:4264
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\sh3sqpur\sh3sqpur.cmdline"2⤵PID:2588
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES31C.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc4BB98C20A6B84635ABBACBACB05D2E87.TMP"3⤵PID:3192
-
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe1⤵
- Executes dropped EXE
PID:5608
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:5672
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004D8 0x00000000000004DC1⤵PID:1704
-
C:\Users\Admin\Desktop\XClient.exe"C:\Users\Admin\Desktop\XClient.exe"1⤵
- UAC bypass
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4472 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\Desktop\XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
PID:1008
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
PID:2120
-
-
C:\Users\Admin\Desktop\XClient.exe"C:\Users\Admin\Desktop\XClient.exe"1⤵
- Executes dropped EXE
PID:4016
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe1⤵
- Executes dropped EXE
PID:3624
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵PID:5608
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe1⤵
- Executes dropped EXE
PID:6136
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:5004
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe1⤵
- Executes dropped EXE
PID:276
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:3380
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Checks SCSI registry key(s)
PID:5672
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe1⤵
- Executes dropped EXE
PID:5880
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:1548
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:3724
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3985055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:5860
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Scripting
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2Scripting
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
186B
MD547069918e9e83eb02bff5ce5498c9bbd
SHA117ffee2e0ddfec27bba8c1a3550d57c7f92960d5
SHA256e7688a4bb28fbb7b562886e29da34887d6189a52041de39b538d5c2caf3c932e
SHA5127a0d2ed36988aa921e0e09779bb8defe38133c8f6add2159cceeee59f5083d391fea2f7bee961b5bba4767e75eea8a2670e7900290c17ce7cc80fae7e037a4c1
-
Filesize
118KB
MD54aacdcd43917f723e8743b1cfba57f91
SHA1e5c9a8af743ae3478a5ae15f5ca227a91ac53881
SHA256c9fb735672e6fc21ab2d52e97a4e8fc245b7c6eac9fb1a4f291d94218410daff
SHA512ad2653dd2fd05758c52811a988797a1a77ddf09c1106450de8bc5e71eb37c89222dca5f92d06977ad9f87924b46680a93f0ae0a148a5708cca664d12156d82a9
-
Filesize
980B
MD5cb0978861f75d11254f555ced43f06ca
SHA1984a7a6d04c723c43ebc72c31daa0f645e0e40f4
SHA256fc289be3de8ebc52c1d1f06d3f728c78d4e14f1138f83e10991849fe84739ac8
SHA512ee468f2510a95416f18589ba6c8322282d6b2a962a17c78d0ce56e0efa8672e9e68f234dca7905d3ee8b565f0cf1c5cf0eb8344521a00c27fc42978e9b05400b
-
Filesize
9KB
MD548b6e9b5d6f6394f8d7a5c59fe0c8c9c
SHA1d9935a2952d54d3d8689df968b671101a321de98
SHA25665398ec896cb1c3043ff329f49549771b219d1f379ef7bcff67afac41a4ff3b0
SHA512350df99052b8f9cfd6a6c259aa80a1dd48aed6b9247f206fdd800dd2d9b08e19f4cac04f0cd0912010f1f9937fc2360f311a4bca27182e2e254f021d27e16920
-
Filesize
4.4MB
MD5b52b1b1b92b4c4e96a9352becdc372b5
SHA10ae0aa823e4daa2f644c574f64281fd4f3a36d31
SHA2567dcc38a9820ccb0de9c5652fda9976d9f649f4239ac5e746a419f3076b324dd7
SHA5129e0ef219b2a8afffbaf21100c00a491a218e5a38690b7c033ce6c049544a85f12414b0f3be4099ed55cc69b05c4f0f6fac28392e91a70e4b4ccd255a4101b4fe
-
Filesize
60KB
MD5c712fb83c8fe9b8322282ed9f559ee9d
SHA163977902ca41d79951708d020c87bea8e883764a
SHA2561bbe51c724b41db39f670320aa3782b757bab73a213a25064c26e0f75f522da7
SHA51224988c164a4af2cd9a682366a39a61bdb522e8bc8712a277e9cac8e14304754a85edac1134eb350993446ba77943c4b3347fbd4c4a2fae9fa6d4f8ac13b4150f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FE17BEC2A573BC9AE36869D0274FFA19_6DA81F04C5F9EAD2CD0268808FCE61E1
Filesize727B
MD57a3b8457313a521e0d44f91765a4e041
SHA14ea8ecb5e7b4c11f4c491caf6cee7ced5ec4c267
SHA2562b08ecf53bb8b6c430659926148f896102dc80b5f38b0ec5efe122199659651c
SHA5127349fd1b8c490d540a8bb25f40587f9874ff5d9b1f9bdb2ea69db9218ebdbdccea5e4d6645fbd1098d051b008b1ebfd12a619c3a4d6fb54940705ab14933e159
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C42BC945025A34066DAB76EF3F80A05
Filesize314B
MD5cc0ca9ee2b710959f0b72f2351eb9a15
SHA1146ba05f449133fab1a5a6a8c521690d779d4d24
SHA25629774ccc860f0a940d0379dc78acaeffe754f3ab03d4d03fe78da926e23fa075
SHA5127fe8b5940cd73c1d3f37a45298bb9a1352e01c917237e60773dfee0387817df961e5e3cb0c750b947ff6afb75d502ca6f2059f79eda5ada33f484e497acc618f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FE17BEC2A573BC9AE36869D0274FFA19_6DA81F04C5F9EAD2CD0268808FCE61E1
Filesize478B
MD5a2e2d9fe85bb44683d948344bf5e783a
SHA1145bce53523b4977fbd50b475ffed918343d1fd3
SHA25618152df2185b0b687be8541e2cbec8b65b90ae1f5bf18bcaaa3c8b75a053c6b4
SHA512dab6e6474e57aaa800db65e967f375df39679ffe1bd947ed589663d835a4b95227efbeb11f56b8da8a936bcf3754f7d7ba002f3b2d21b410aed37a8ce340aedc
-
Filesize
1KB
MD5234b15e07d25b132557c3680f3941160
SHA17b7fb4f9930d496602dd5f8848451ee38a53f93d
SHA2560c72a8cd327215c6539efab3a1bcc2089f94716ccc8f87ffd13d5edec7a01e8e
SHA5127599af4d36a6c1a295093660d99351f06212dbe17949bb1ddac91b7f34c7568e2a489c3c6620213d0465608001ab08d69c6b32fadf431cc9aee6bf64f53c8b7f
-
Filesize
2KB
MD5627073ee3ca9676911bee35548eff2b8
SHA14c4b68c65e2cab9864b51167d710aa29ebdcff2e
SHA25685b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c
SHA5123c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb
-
Filesize
654B
MD52cbbb74b7da1f720b48ed31085cbd5b8
SHA179caa9a3ea8abe1b9c4326c3633da64a5f724964
SHA256e31b18f21621d9983bfdf1ea3e53884a9d58b8ffd79e0e5790da6f3a81a8b9d3
SHA512ecf02d5240e0c1c005d3ab393aa7eff62bd498c2db5905157e2bf6d29e1b663228a9583950842629d1a4caef404c8941a0c7799b1a3bd1eb890a09fdb7efcff9
-
Filesize
152B
MD5562b59fd3a3527ef4e850775b15d0836
SHA1ffd14d901f78138fc2eece97c5e258b251bc6752
SHA2560a64863cb40f9d3b13a7b768b62e8b4707dfee1d3e86a07e999acb87bd7d3430
SHA512ef9fd3d83ab85b18cf0e0d17e2c7d71936f783e3ae38005e5c78742560332f88be7c4c936d4dc4179e93fde0240d2882d71ef7038289c8cbddbfc4790c0603c2
-
Filesize
152B
MD5c1ff2a88b65e524450bf7c721960d7db
SHA1382c798fcd7782c424d93262d79e625fcb5f84aa
SHA2562d12365f3666f6e398456f0c441317bc8ad3e7b089feacc14756e2ae87379409
SHA512f19c08edf1416435a7628064d85f89c643c248d0979ece629b882f600956f0d8cd93efbe253fa3ec61ad205233a8804807600f845e53e5ed8949290b80fe42d3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize840B
MD54f28a56c92fcc4e61a75688d3802d07b
SHA15fc596ebeb15f339d4be54c428852bcf4f71c660
SHA256b325be40812e5236dbabf17a3501b24bac07e6039bedf2dbb6680b27a3e9fa87
SHA512e7ec38cb09ace5b77b53870f9a7c41c0768d8cd5e8292638e21f3c01523e553eaaca53e85f8ce1e4c9440c82fb2e722a771f3b46910316a3ef401280e387e8ff
-
Filesize
1KB
MD5f717c4811752465481e0330676bac11f
SHA1a9392cb3b2c2da4b136e3aa41cf00f7240ef4058
SHA2569b3802353a8d9dfd90639dfaa38ca5238f51ce34e38444b8af18cedac8d7cc00
SHA51262c928e7bae9db601c13a9f248f0983f5838448fc190eb1390d02f621f65d804242eb95794aa596d0b945582f01a15858ea2ebf5bc61e9ac1fe415afff1e64f3
-
Filesize
1KB
MD52afc2351083bcc4000421af20f2b7851
SHA1d2f1959e91918498da9df0beaa02abe766ed6e6a
SHA25652d1902cb7073c2855b69198d3c7fdd578ef7ebcde81f3e9b9779b83477edf6f
SHA512420f50529c4dfb7e71eb123a8a9613648f054721c36a0a1af4beae0dd2658a274b6b4231b034527fd862d3511a1ccd685325f074492f0eed923cc4e03123ffb9
-
Filesize
5KB
MD58e154b3735d50a90b8a01ad703249b2d
SHA1b85b2c843e6e82e010ac7dcdb49239d1b8bf57f4
SHA2568f7ea424974420a63828652c4e1aed96ee3121a0fc00498e860d10b624155492
SHA512de033bf2818c82cf18612b724637c3b6b084e5c9d984cde74c9ff8ffdf30bad50a2bd19a8aea41ad5d2ec7a2e925a3cd9bd89e8b7d615c92bf00e65459b8731f
-
Filesize
6KB
MD554f2e4e7c0540bc060ee8614ffc4ff95
SHA153882ba1de8325ce6bd6c20eb528061db2fdc13a
SHA256e75be4332088eff73e59bf7e102aeabdc6a81bbe9de32bbe9df2a3f28f225554
SHA512d96fe5888f7944f7f28f270cc6497434cad088ebec8684533c5aa27ace2c3a87c9bfa11dfbeb7922a3efd72b82534e517dedf1417178d5e0236a21027a962973
-
Filesize
6KB
MD5f85d29bf75e34b012a7d46f8e15d6a93
SHA117a08e5dd6876639f3d87db963fd49a46837746a
SHA2561609a16e91070babfff42dd3975c66167d3b0fb5d133a2bd09d54a4c116bb93d
SHA51266cf68b9011122ffea681f9284c3cb999321b4fe88fd00c3209526624c74c8deeeaee912ad17ba9888dfbec80211907f2aa0507301fac6052c19fe45de767bd1
-
Filesize
6KB
MD5f2e9275fda7e9dc170956e29cfb47def
SHA14eb3d8e57a7aa1dcb80b32c4cd633bb336a97d7e
SHA2566173d1a2d6fc110b646353f98a563f75c7fa2327588bd691ac6e99d550bd6b92
SHA512364d86bb817e9c5ad1916114d7df73344f7c0a09d864fa6cb6ec7eea40b279186534ee753ab5bd4fe7ee608d842f821f3d51de9d58e551e27637c7e9f995fb4b
-
Filesize
699B
MD5ae619f4e463e6a571f23fbb400acbb05
SHA15e97676a676c4f2869964f1d909fbe51ed4d813d
SHA2568ab09f5799e3f079494db71ed154a60c8b77255a7d2eacbdb45661987d9d771e
SHA512feaf3e7fb7f7fc202503359033010af0e0b48f006e3751b7483971387c184b75cca47e25021a39e160df42122771225238ff9731407ce1264385f8078d072bf4
-
Filesize
532B
MD53492bae84b9b316904407ee99010ca30
SHA14ddb9a72513d8ade85b473a2f2e43409b0640e69
SHA2567c2673adc4fca84f832622ff990e63c262b22f9e49d7e99a8f8bb581fd843626
SHA512f392b117d2072ecebd99720e0dcdade6e235472392e46407517d521922ac8cffc876f5df7a2fec32ce4d588bd11f32dd046541333eff335c36a56840b0f92656
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD529bdcf2584f3afdc2e494745fa591ce8
SHA1f6da62bf498ce992e3746884cbd45dc21d6cbed2
SHA256fc9bdd2b5884a9253f33e620223cedd4a5ee543e85ec13c1b72c909e24eabd6e
SHA512b8e2bf368a0916766daa04d2078b8ab1af30da7523b329bd6786c42e14ee65931c83f8a31683501ef63a9458c81b3dd1070a23d7d39564f16eaf50f9710f7bcc
-
Filesize
12KB
MD55da37b19d5f7850fd8f555dc526126ab
SHA15322eeac7d3bc881b3b649a01fd7123276a20378
SHA256d07dc3d181781dcc46d720161450623790464f8d0aad425b31696a1448271c3b
SHA512c98a270a197b3eeba3c0c09d6859b6ba23137cc6f77d74c495e2bf5829c1811969132a677da642de47db38c8637dd120b985d83437cb85c3eeab09db7c8347b6
-
Filesize
944B
MD5e3840d9bcedfe7017e49ee5d05bd1c46
SHA1272620fb2605bd196df471d62db4b2d280a363c6
SHA2563ac83e70415b9701ee71a4560232d7998e00c3db020fde669eb01b8821d2746f
SHA51276adc88ab3930acc6b8b7668e2de797b8c00edcfc41660ee4485259c72a8adf162db62c2621ead5a9950f12bfe8a76ccab79d02fda11860afb0e217812cac376
-
Filesize
944B
MD580b42fe4c6cf64624e6c31e5d7f2d3b3
SHA11f93e7dd83b86cb900810b7e3e43797868bf7d93
SHA256ee20a5b38a6674366efda276dbbf0b43eb54efd282acfc1033042f6b53a80d4d
SHA51283c1c744c15a8b427a1d3af677ec3bfd0353875a60fe886c41570981e17467ebbb59619b960ca8c5c3ab1430946b0633ea200b7e7d84ab6dca88b60c50055573
-
Filesize
944B
MD54093e5ab3812960039eba1a814c2ffb0
SHA1b5e4a98a80be72fccd3cc910e93113d2febef298
SHA256c0794e2b7036ce5612446a8b15e0c8387773bbc921f63cf8849f8a1f4ef3878c
SHA512f3555b45aa1a1dd5214716dc81a05905c4ecd5a3e1276d35e08c65623ab1d14d469b3b576a5d9638264c1222d73889d2cc1ee43fb579d9ca3fcddd9f557cac7b
-
Filesize
944B
MD5e07eea85a8893f23fb814cf4b3ed974c
SHA18a8125b2890bbddbfc3531d0ee4393dbbf5936fe
SHA25683387ce468d717a7b4ba238af2273da873b731a13cc35604f775a31fa0ac70ea
SHA5129d4808d8a261005391388b85da79e4c5396bdded6e7e5ce3a3a23e7359d1aa1fb983b4324f97e0afec6e8ed9d898322ca258dd7cda654456dd7e84c9cbd509df
-
Filesize
944B
MD5e47c3fa11e796c492a8388c946bf1636
SHA14a090378f0db26c6f019c9203f5b27f12fa865c7
SHA2564bb861850395dcc3bec4691e8b9f0fa733b8a2d568d460a9201d65250b12fee1
SHA5128d4af4eba3019cd060561f42cff11374eafe59da5e5ad677e41d0b9198b87d6d13706e760d13c70574ed1384993a1597f886d21fe6ecd0186379a1e93db30695
-
Filesize
1KB
MD570a7f8249074217d626c2d0a1504da53
SHA1e7812d0176615f1a128680b94563da78db1d68a6
SHA2560cb34a21527deb7d5f7b24437c063f378de1bbe15b8545e29ff22263abd20d8a
SHA5124b2a80d2cbfa559a9e50d4d7dd7b60ba7d2822230c8d6cc8ce3b883413ee43bd349ac5f6c5ab8d6db2d0c638566c2aa69521c67ff5a2ac511971cfd487edeae4
-
Filesize
1KB
MD580f826fd7e4c424cf92b5e2764fd03dd
SHA1c8cdb3b1cfc7d8cf9603664139b8b4083bde6db1
SHA256491faa3454fa62f169f4f9de6826d9c7dd72540aa2dd25eb9caee1faedb7eac0
SHA51237536aeae65fcfc82d48ecfc6eac9fa8fdac6b963d5308f0855b0bc422a1fd5c344a5614509bd340bddbc1772e096d138b84a4c5c7bd2176ab2532ab4f59b107
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
78KB
MD5488237f2f4cd7374bc292497dc4e147a
SHA14f579738a43aac8e433b924e38d65e66e82e25d4
SHA25677499407f86ed90057668b56474d4196ade85ba3f537decfeb0f804e4f927c3d
SHA5127dd1afa91c80ed70f04ef71590e81efd9689b996701f779a1976f0e1f2e74f3e07465f28fd952d4ec8db43d9a61c64b877ea98e2cf5b12bfea4a6e4c35d5e99d
-
Filesize
313B
MD5f3f06ceeeae5afe32c8078a24f3d110d
SHA1009e5231626abf85d5cc4581e3ad5a38b0c8273a
SHA256a77368cb807ac7b27b9b34e046c6c1741c5ebec9422977d204600750c5c3b373
SHA51234af3d9894c2b1cf584ad9c7e9a3b063a94e593e52baf711d146edb31612c3d1ade09796ea50d544882148fabec9c6d8609e3fd938eecca957fb65a7b3c1c440
-
Filesize
78KB
MD5c0132b5801af3c0ea6b6cdf07dc9268c
SHA16704143a4b5858cadb130d42d3b23f56e342d6ec
SHA256af00b6f8d2d5506d2ec6cefdc4430edc1697762729277efdc2603c75785b6e9f
SHA512a460ca14d7e24585d2f2ee0d8364b0e9b48c51e5c29ccfaa52b54ceb546d01fd93af256d5b4b2f1d1e499bd7f6773a84181bc158199bbaa8020239737ed2f6df
-
Filesize
290B
MD5443d6f67dfeb5edfab2503cfc09ac3af
SHA1bdf328f35e556c19d267eca8ddcffca8f1d3fda4
SHA2566e67c0c51c6398924ae3204463ce956675a6a31d76a3ebbaf783867b73077f37
SHA51270a5bc38f266c91073276ddddc91e68d7910fe4ea3238c919ecf45a268332e3967ecd76832572b2100c6166b61e1ec87abd127933be812b6c05ceab8382200bd
-
Filesize
76KB
MD51b95a7fc10c0b54c7d807d1f7ee2b778
SHA175d3a2f1d104b8f4950f59da9e829d61943e3e44
SHA256d2373e86e03b935c7c24993f2a567a7e9f3b477c460a4c061da4000de493fbd8
SHA512b225f9052457b5de3728f1f2bf5cf17905de780823ccaa0139e0f559212a05bb177297d950783084cae87f4da217c94d8ad66124f0a3c6946bd5662a43395d4e
-
Filesize
1KB
MD5d40c58bd46211e4ffcbfbdfac7c2bb69
SHA1c5cf88224acc284a4e81bd612369f0e39f3ac604
SHA25601902f1903d080c6632ae2209136e8e713e9fd408db4621ae21246b65bfea2ca
SHA51248b14748e86b7d92a3ea18f29caf1d7b4b2e1de75377012378d146575048a2531d2e5aaeae1abf2d322d06146177cdbf0c2940ac023efae007b9f235f18e2c68
-
Filesize
37KB
MD5000547a0cf648bad479024e9e8825991
SHA1adae3a925165847f2e4ae3fa94aafb2d97fbf6dd
SHA256d8be10c95f9cd5182767de9b8e1b7ac7bc58f0eb3b5fb59588e8bcc4890632bf
SHA5125d09c193d86c26f732c64b2c75823828296433ade3aa5d251397e3e5c97325d2fb0c04b2432113966619a3ae8a408e6bfb66a0e3c2e58cb6bb9ab77fd833a4b8
-
Filesize
29.0MB
MD5c0241c872960312fd3071cff209fbc5e
SHA1131e432ea6128bbfb6bc1092012d4afd8e2aae27
SHA25620027c560483941c10d60098ea22ee973b647ad934377be62c88ee4acb2fc465
SHA512085c3324c4994eab79205f3522b31634b1963a7bb02a52a9820bd1e80a2ee150d24c370fa619f8f421b1fdb8b185bcffb21c42ea6f7f1352f2202b6f224afac6
-
Filesize
1.2MB
MD58ef41798df108ce9bd41382c9721b1c9
SHA11e6227635a12039f4d380531b032bf773f0e6de0
SHA256bc07ff22d4ee0b6fafcc12482ecf2981c172a672194c647cedf9b4d215ad9740
SHA5124c62af04d4a141b94eb3e1b0dbf3669cb53fe9b942072ed7bea6a848d87d8994cff5a5f639ab70f424eb79a4b7adabdde4da6d2f02f995bd8d55db23ce99f01b
-
Filesize
1.9MB
MD5bcc0fe2b28edd2da651388f84599059b
SHA144d7756708aafa08730ca9dbdc01091790940a4f
SHA256c6264665a882e73eb2262a74fea2c29b1921a9af33180126325fb67a851310ef
SHA5123bfc3d27c095dde988f779021d0479c8c1de80a404454813c6cae663e3fe63dc636bffa7de1094e18594c9d608fa7420a0651509544722f2a00288f0b7719cc8
-
Filesize
361KB
MD5e3143e8c70427a56dac73a808cba0c79
SHA163556c7ad9e778d5bd9092f834b5cc751e419d16
SHA256b2f57a23ecc789c1bbf6037ac0825bf98babc7bf0c5d438af5e2767a27a79188
SHA51274e0f4b55625df86a87b9315e4007be8e05bbecca4346a6ea06ef5b1528acb5a8bb636ef3e599a3820dbddcf69563a0a22e2c1062c965544fd75ec96fd9803fc
-
Filesize
1.4MB
MD59043d712208178c33ba8e942834ce457
SHA1e0fa5c730bf127a33348f5d2a5673260ae3719d1
SHA256b7a6eea19188b987dad97b32d774107e9a1beb4f461a654a00197d73f7fad54c
SHA512dd6fa02ab70c58cde75fd4d4714e0ed0df5d3b18f737c68c93dba40c30376cc93957f8eef69fea86041489546ce4239b35a3b5d639472fd54b80f2f7260c8f65
-
Filesize
238KB
MD5ad3b4fae17bcabc254df49f5e76b87a6
SHA11683ff029eebaffdc7a4827827da7bb361c8747e
SHA256e3e5029bf5f29fa32d2f6cdda35697cd8e6035d5c78615f64d0b305d1bd926cf
SHA5123d6ecc9040b5079402229c214cb5f9354315131a630c43d1da95248edc1b97627fb9ba032d006380a67409619763fb91976295f8d22ca91894c88f38bb610cd3
-
Filesize
39KB
MD52bb594cc8e2a2b6e616bf90c1f546374
SHA191626c0a705d7ad6e159beefff9348fc523086fc
SHA2565af02305c972451bee59cf3e524b04d400ca173f443b0cbb79d20e272a986ebe
SHA51233b7a84a38b5da388ba2edc34d289cc16bd169df9dda7a3110ab85ffaeb09c70a9d5ed9e0a338f04badf0721bf74d4af915be4692db7b6ac84b10ab1be02f04a
-
Filesize
17.9MB
MD549f6c848fc3b1f32ed96b08bca221e53
SHA10c1da68ae22f31f61ded840a42515793e1432a24
SHA2567926286cb142cc3d2511cde859dc78ea4d9a26b5007c80bc33879fc3e5800c0c
SHA5121cb5fea83ccecf175ec1ed6e381bf09f915115458869f05ebdbfbd2a92b6ec41f0a5d004e0bf74a80ccc68491554bb7df95d10242f22ce1429a2bcff124b5ba1
-
Filesize
2.3MB
MD593b91c8721ca2951ecceb0fc0e739cc8
SHA1f5ac76bae778acde000f72d5630d1a8983948705
SHA256727679568706156f635be9b786c61b8fecaf55894b902a014aa6a2a691fc3108
SHA5123887537ef47bf8adf0d5b137a7bfe52610eb1e6f3c37d6d3e778290cd88fe4f6643e50387b2a154cd370b71def316340c62046263054ade27ff5a3df1865ab65
-
Filesize
8KB
MD57001e4360565076295ab1df39769fd44
SHA1b00fd6b746d10f1be319b0745b680e258427d969
SHA25646a0b0b43d9510e3b82d920c888e7e3f24b31a7399d6a58c10e5bdd4dab44b86
SHA5125b501215f7739af14387d37607c5ea23cfb19d115bbeba473589d2080ea7f997c1ae1679a72e2e5e2b032dd9747a5e37c066e135d92688403f93c4fa9e935bef
-
Filesize
106B
MD56bbad43247e6cc9f218d2b27ba205b36
SHA1d956122f99e9ba11e4d359a1131d4892902f41da
SHA256fa3f1dd5f9b15c7815fdde58108e653e95aafcdc9297ed17277fbf3b2abce18a
SHA5122121f1b6a1a9399784db184d0c10e9671b0c1b2ab8a3eb8f5490592b991432a9e933921de371eda61d29bf82c82f35a25aa25b20c16c161f9b4ec5bdc0671910
-
Filesize
42B
MD500640b42e9a28a963ca485c4990b084b
SHA18f526c066dbae24d7cefd46ce3ceeba3258e1ae4
SHA256a8def4f1a9cbdf9bcd9e24c8761844fc0177de786aeec4513da3e9697ef5c6a2
SHA512df3e36529d9731d0176bc904efe17d7f659ef033c14932c93decd043e6b5887706da3ae17187f93cec6b85ae6a8673f3ab65d7f4aac549fa72bf73e5e18685a0
-
Filesize
66KB
MD5668d82b83f8c52c0e5368a44b7eaa5a4
SHA1069ec5b3f9ae609baafe6e59651dd361a9c6b33f
SHA256106beb7dabcde632548e4e752c3c6222936ba8ddc2cf7e4864296070bd0553e1
SHA512e475a3b75a9fbd00c80da10debf287cbfa06a7d583cbc886e42db81f9e0b32f2dc6c3676181d430699bfb2ffe0c71f5e40bd80836d5c2794840d7d1ab0d9b98d
-
Filesize
9KB
MD54fb335ec33ea01e924cbc4666efeff87
SHA1e3a3f60d353e43a03ea94bff4b4cf6a03ea4fe89
SHA256ea3d35211500020a12c1ec9542d39730e7933b0f86f01fc20077ffa33de812be
SHA512868b4dc706156ced40ccb9bd1d2c3f199338c2391fd28710ce19a8127afffb114cfb2bef1d89d2a9411325ea8c71271bdcbca37f2136dd2674cab4f20787f2dc
-
Filesize
11KB
MD5c2bd361af81944e8312e40f9184be816
SHA1aa596a796a6f18ace99faddbbe50b5be6da44055
SHA25634c3a7aa58f70864d901c27f8c770d56a10e70c6761d87e3a8da0e042245c986
SHA512083159226b2c5ab207d01998b4e882548c76e6d45c8130fe611fa98c55dd59320d4389eb626afb185e11f1d8169f6e4a2bc9ef2738aebdc208cff9cb14b86108
-
Filesize
1KB
MD5926d4155f67f7286f4b3e92b4a002b95
SHA16758a003745cf5d0feb817204df57c375c85323a
SHA256e254df8f41efe3bdefb5debaf0428c23056bcbc01249b70b1e089ecf9ac4ec0e
SHA5123e9595e49ad2fd8a9c36cdbf3465dc31a79e7babeadb0f5e1b11c34214aaea421f098c0a0f7376637afeb55515353339b904ffd16aa03401304670f8d375db0e
-
Filesize
1KB
MD533bc55734b06c4a09b1bfa353e6b2f66
SHA1438b65654fe262d2d4f165199fe11b562a5db5ee
SHA256ff2248d731fd6a2073971c89e3c394d4488bae559d7d574e7ee44a4cfe2226bd
SHA5120862aa479b2f3c555fd28d8ad69d1bfae166aeed6b50d752aba1cfbd4ff195cfb76f928f9e0cedc800f75ee01fbd9735718b7c49306cf35ef3930d9f5818edc0
-
Filesize
12.8MB
MD55a88eb4155644e85139ecb197d49e2ec
SHA1efabf8040a48c9de2e7f9c7c12cf03b913665397
SHA2562581cb51c2eb72064e70774f1f1f682fc6c6cfedbfe380397267709b732a1e2e
SHA512eba576512a9ee50e6d1b6db102ccce4d5504815ba19198d59d6cadacb155389eb007eca5d5fc90bc6233562764ba76a87ba476791199f10c7b9d8defe5cbe029
-
\??\Volume{973b34ea-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{26c6ed10-d366-4880-81e8-28168bdd5ba3}_OnDiskSnapshotProp
Filesize6KB
MD58ee08288f3c67b4ae9e102fbd3757cad
SHA1b9cb097e0061f05e26dfe164b8a0633369271338
SHA256774c452f502f4067b18bc148cad6f83f89ebb5161eb70ee477f8898221d250bb
SHA5124884b4f0f3b7f28316e41eed925e4889209310624df2aa4897336efe7d6fca893f65e9e32cd3e192da1049a1325402b855db209212b2cd3e1849beeee3bb45d6