Resubmissions
05/08/2024, 10:44
240805-mtardaxfnh 1005/08/2024, 10:39
240805-mp375atekp 1005/08/2024, 10:24
240805-mfcc2stbqn 10Analysis
-
max time kernel
278s -
max time network
280s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
05/08/2024, 10:39
Static task
static1
General
-
Target
InjectorSOFTWARE.zip
-
Size
18.4MB
-
MD5
4087fb773df09b91e226c59bd9e400ca
-
SHA1
40680eee9d47ffa93b7c10cf4b9cd71038ff81c5
-
SHA256
35760704fdaef694cf129c2cf70d6edbe87adca57ce2073eeba6b39e97f4c5fe
-
SHA512
e67eaf7cfa49f0ff487f9762ecfea1930394e68232cbe9dc9c0924d3d8ecdbc522e6c210270f90ca19b0aff36b5449b8b5d63ffd416d95b48ebed91be8d5357a
-
SSDEEP
393216:r9qRuxNxl69OXuniRll7a08I7/3asKn1RtrbSZJZwP0M:ZtNxKOOixoxsSbSVwP0M
Malware Config
Extracted
lumma
https://clouddycuiomsnz.shop/api
https://empiredzmwnx.shop/api
https://boattyownerwrv.shop/api
https://rainbowmynsjn.shop/api
https://definitonizmnx.shop/api
https://creepydxzoxmj.shop/api
https://budgetttysnzm.shop/api
https://chippyfroggsyhz.shop/api
https://assumedtribsosp.shop/api
https://whimiscallysmmzn.shop/api
https://applyzxcksdia.shop/api
https://replacedoxcjzp.shop/api
https://declaredczxi.shop/api
https://catchddkxozvp.shop/api
https://arriveoxpzxo.shop/api
https://contemplateodszsv.shop/api
https://bindceasdiwozx.shop/api
https://conformfucdioz.shop/api
Extracted
lumma
https://clouddycuiomsnz.shop/api
https://empiredzmwnx.shop/api
https://boattyownerwrv.shop/api
https://rainbowmynsjn.shop/api
https://definitonizmnx.shop/api
https://creepydxzoxmj.shop/api
https://budgetttysnzm.shop/api
https://chippyfroggsyhz.shop/api
https://assumedtribsosp.shop/api
https://tenntysjuxmz.shop/api
https://whimiscallysmmzn.shop/api
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 7 IoCs
description pid Process procid_target PID 2696 created 3360 2696 Manufacture.pif 54 PID 700 created 3360 700 Manufacture.pif 54 PID 2364 created 3360 2364 Manufacture.pif 54 PID 2364 created 3360 2364 Manufacture.pif 54 PID 2436 created 3360 2436 Manufacture.pif 54 PID 3644 created 3360 3644 Manufacture.pif 54 PID 4348 created 3360 4348 Manufacture.pif 54 -
Executes dropped EXE 14 IoCs
pid Process 2696 Manufacture.pif 700 Manufacture.pif 1472 Manufacture.pif 4348 Manufacture.pif 2364 Manufacture.pif 1144 Manufacture.pif 4592 Manufacture.pif 2436 Manufacture.pif 2476 Manufacture.pif 3644 Manufacture.pif 4348 Manufacture.pif 1044 Manufacture.pif 1912 Manufacture.pif 4752 Manufacture.pif -
Loads dropped DLL 6 IoCs
pid Process 2616 Runner2.exe 2872 Runner2.exe 1316 Runner2.exe 796 Runner2.exe 2724 Runner2.exe 4512 Runner2.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Videos\Captures\desktop.ini bcastdvr.exe -
Enumerates processes with tasklist 1 TTPs 14 IoCs
pid Process 4592 tasklist.exe 1396 tasklist.exe 3552 tasklist.exe 3000 tasklist.exe 4980 tasklist.exe 4348 tasklist.exe 704 tasklist.exe 2724 tasklist.exe 2984 tasklist.exe 4756 tasklist.exe 4172 tasklist.exe 3528 tasklist.exe 3724 tasklist.exe 1428 tasklist.exe -
Suspicious use of SetThreadContext 12 IoCs
description pid Process procid_target PID 2616 set thread context of 4960 2616 Runner2.exe 93 PID 2696 set thread context of 1472 2696 Manufacture.pif 114 PID 700 set thread context of 4348 700 Manufacture.pif 116 PID 2872 set thread context of 4564 2872 Runner2.exe 123 PID 2364 set thread context of 4592 2364 Manufacture.pif 134 PID 2436 set thread context of 2476 2436 Manufacture.pif 152 PID 1316 set thread context of 2560 1316 Runner2.exe 157 PID 796 set thread context of 2016 796 Runner2.exe 162 PID 2724 set thread context of 3392 2724 Runner2.exe 179 PID 3644 set thread context of 1044 3644 Manufacture.pif 193 PID 4348 set thread context of 1912 4348 Manufacture.pif 194 PID 4512 set thread context of 5032 4512 Runner2.exe 201 -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\LankaTed Runner.exe File opened for modification C:\Windows\PractitionersSatisfactory Runner.exe File opened for modification C:\Windows\LankaTed Runner.exe File opened for modification C:\Windows\KellyAbsolute Runner.exe File opened for modification C:\Windows\PortugalBecause Runner.exe File opened for modification C:\Windows\KellyAbsolute Runner.exe File opened for modification C:\Windows\IntroductionRetention Runner.exe File created C:\Windows\rescache\_merged\3720402701\1568373884.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\ChuckIn Runner.exe File opened for modification C:\Windows\LankaTed Runner.exe File opened for modification C:\Windows\IntroductionRetention Runner.exe File opened for modification C:\Windows\IntroductionRetention Runner.exe File opened for modification C:\Windows\ReadsMess Runner.exe File opened for modification C:\Windows\DestinationsCafe Runner.exe File opened for modification C:\Windows\LankaTed Runner.exe File opened for modification C:\Windows\KellyAbsolute Runner.exe File opened for modification C:\Windows\PractitionersSatisfactory Runner.exe File opened for modification C:\Windows\KellyAbsolute Runner.exe File opened for modification C:\Windows\DestinationsCafe Runner.exe File opened for modification C:\Windows\ChuckIn Runner.exe File opened for modification C:\Windows\DestinationsCafe Runner.exe File opened for modification C:\Windows\PractitionersSatisfactory Runner.exe File created C:\Windows\rescache\_merged\3720402701\1568373884.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\DestinationsCafe Runner.exe File opened for modification C:\Windows\PortugalBecause Runner.exe File opened for modification C:\Windows\PortugalBecause Runner.exe File opened for modification C:\Windows\KellyAbsolute Runner.exe File opened for modification C:\Windows\LankaTed Runner.exe File opened for modification C:\Windows\PortugalBecause Runner.exe File opened for modification C:\Windows\PractitionersSatisfactory Runner.exe File opened for modification C:\Windows\PortugalBecause Runner.exe File opened for modification C:\Windows\ChemicalsPrev Runner.exe File opened for modification C:\Windows\PractitionersSatisfactory Runner.exe File opened for modification C:\Windows\DestinationsCafe Runner.exe File opened for modification C:\Windows\KellyAbsolute Runner.exe File opened for modification C:\Windows\PractitionersSatisfactory Runner.exe File opened for modification C:\Windows\ChemicalsPrev Runner.exe File opened for modification C:\Windows\ReadsMess Runner.exe File opened for modification C:\Windows\ChuckIn Runner.exe File opened for modification C:\Windows\ChemicalsPrev Runner.exe File opened for modification C:\Windows\IntroductionRetention Runner.exe File opened for modification C:\Windows\ReadsMess Runner.exe File opened for modification C:\Windows\ChuckIn Runner.exe File opened for modification C:\Windows\ReadsMess Runner.exe File opened for modification C:\Windows\DestinationsCafe Runner.exe File opened for modification C:\Windows\PortugalBecause Runner.exe File opened for modification C:\Windows\LankaTed Runner.exe File opened for modification C:\Windows\ChuckIn Runner.exe File opened for modification C:\Windows\ChemicalsPrev Runner.exe File opened for modification C:\Windows\ChuckIn Runner.exe File opened for modification C:\Windows\PractitionersSatisfactory Runner.exe File opened for modification C:\Windows\ChuckIn Runner.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\1568373884.pri MicrosoftEdge.exe File opened for modification C:\Windows\KellyAbsolute Runner.exe File opened for modification C:\Windows\ReadsMess Runner.exe File opened for modification C:\Windows\DestinationsCafe Runner.exe File opened for modification C:\Windows\LankaTed Runner.exe File opened for modification C:\Windows\IntroductionRetention Runner.exe File opened for modification C:\Windows\ChemicalsPrev Runner.exe File opened for modification C:\Windows\IntroductionRetention Runner.exe File opened for modification C:\Windows\ChemicalsPrev Runner.exe File opened for modification C:\Windows\ReadsMess Runner.exe File opened for modification C:\Windows\ChemicalsPrev Runner.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1632 2600 WerFault.exe 101 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Runner2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Runner.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Runner2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Manufacture.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Manufacture.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Manufacture.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Manufacture.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Manufacture.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Manufacture.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Runner2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Runner.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Runner2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Runner.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Manufacture.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Manufacture.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Runner.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Runner2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Runner.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe -
Checks SCSI registry key(s) 3 TTPs 24 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags GamePanel.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags GamePanel.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_QEMU&PROD_HARDDISK\4&215468A5&0&000000 GamePanel.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags GamePanel.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags GamePanel.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags GamePanel.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags GamePanel.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags GamePanel.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_QEMU&PROD_HARDDISK\4&215468A5&0&000000 GamePanel.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags GamePanel.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 GamePanel.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 GamePanel.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags GamePanel.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags GamePanel.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags GamePanel.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags GamePanel.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_QEMU&PROD_HARDDISK\4&215468A5&0&000000 GamePanel.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 GamePanel.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_QEMU&PROD_HARDDISK\4&215468A5&0&000000 GamePanel.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 GamePanel.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 GamePanel.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 GamePanel.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_QEMU&PROD_HARDDISK\4&215468A5&0&000000 GamePanel.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_QEMU&PROD_HARDDISK\4&215468A5&0&000000 GamePanel.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VendorId = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Settings\Cache\Cookies MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionHigh = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Settings MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Privacy MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\Active = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DataStore\LastCleanup = 0000000000000000 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3\{AEBA21FA-782A-4A90-978D-B7216 = 1a3761592352350c7a5f20172f1e1a190e2b017313371312141a152a MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Explorer MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Content MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Explorer MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\LastClosedHeight = "598" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Revision = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus\ACGPolicyState = "6" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Privacy\InProgressFlags = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\JumpListFirstRun = "3" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Settings\Cache\Content\CacheLimit = "256000" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = a8b6583424e7da01 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\ACGStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath\dummySetting = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-DXFeatureLevel = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\DXFeatureLevel = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\EnablementState = "1" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Privacy\ClearBrowsingHistoryOnStart = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\LowMic MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\PrivacyAdvanced = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\DeviceId = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Settings\Cache MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Explorer\Main\OperationalData = "1" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\SharedCookie_MRACMigrationDone = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer\Main MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-Revision = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Content\CacheLimit = "256000" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Cookies MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Explorer\Main MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DataStore\OneTimeCleanup = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active\{6AA8F405-D9D4-4F24-A211-728069509908} = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\SyncIEFirstTimeFullScan = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings MicrosoftEdge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2696 Manufacture.pif 2696 Manufacture.pif 2696 Manufacture.pif 2696 Manufacture.pif 2696 Manufacture.pif 2696 Manufacture.pif 700 Manufacture.pif 700 Manufacture.pif 700 Manufacture.pif 700 Manufacture.pif 700 Manufacture.pif 700 Manufacture.pif 2696 Manufacture.pif 2696 Manufacture.pif 2696 Manufacture.pif 2696 Manufacture.pif 700 Manufacture.pif 700 Manufacture.pif 700 Manufacture.pif 700 Manufacture.pif 2364 Manufacture.pif 2364 Manufacture.pif 2364 Manufacture.pif 2364 Manufacture.pif 2364 Manufacture.pif 2364 Manufacture.pif 2364 Manufacture.pif 2364 Manufacture.pif 2364 Manufacture.pif 2364 Manufacture.pif 2364 Manufacture.pif 2364 Manufacture.pif 2364 Manufacture.pif 2364 Manufacture.pif 2436 Manufacture.pif 2436 Manufacture.pif 2436 Manufacture.pif 2436 Manufacture.pif 2436 Manufacture.pif 2436 Manufacture.pif 2436 Manufacture.pif 2436 Manufacture.pif 2436 Manufacture.pif 2436 Manufacture.pif 3644 Manufacture.pif 3644 Manufacture.pif 3644 Manufacture.pif 3644 Manufacture.pif 3644 Manufacture.pif 3644 Manufacture.pif 4348 Manufacture.pif 4348 Manufacture.pif 4348 Manufacture.pif 4348 Manufacture.pif 4348 Manufacture.pif 4348 Manufacture.pif 3644 Manufacture.pif 3644 Manufacture.pif 3644 Manufacture.pif 3644 Manufacture.pif 4348 Manufacture.pif 4348 Manufacture.pif 4348 Manufacture.pif 4348 Manufacture.pif -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 5080 MicrosoftEdgeCP.exe 5080 MicrosoftEdgeCP.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 3724 tasklist.exe Token: SeDebugPrivilege 4348 tasklist.exe Token: SeDebugPrivilege 1428 tasklist.exe Token: SeDebugPrivilege 4592 tasklist.exe Token: SeDebugPrivilege 3552 tasklist.exe Token: SeDebugPrivilege 2724 tasklist.exe Token: SeDebugPrivilege 2984 tasklist.exe Token: SeDebugPrivilege 3000 tasklist.exe Token: SeDebugPrivilege 2976 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 2976 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 2976 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 2976 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 2468 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 2468 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 2468 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 2468 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 932 MicrosoftEdge.exe Token: SeDebugPrivilege 932 MicrosoftEdge.exe Token: SeDebugPrivilege 1396 tasklist.exe Token: SeDebugPrivilege 4756 tasklist.exe Token: SeDebugPrivilege 704 tasklist.exe Token: SeDebugPrivilege 4172 tasklist.exe Token: SeDebugPrivilege 3528 tasklist.exe Token: SeDebugPrivilege 4980 tasklist.exe -
Suspicious use of FindShellTrayWindow 21 IoCs
pid Process 2696 Manufacture.pif 2696 Manufacture.pif 2696 Manufacture.pif 700 Manufacture.pif 700 Manufacture.pif 700 Manufacture.pif 2364 Manufacture.pif 2364 Manufacture.pif 2364 Manufacture.pif 2436 Manufacture.pif 2436 Manufacture.pif 2436 Manufacture.pif 3644 Manufacture.pif 3644 Manufacture.pif 3644 Manufacture.pif 4348 Manufacture.pif 4348 Manufacture.pif 4348 Manufacture.pif 4752 Manufacture.pif 4752 Manufacture.pif 4752 Manufacture.pif -
Suspicious use of SendNotifyMessage 21 IoCs
pid Process 2696 Manufacture.pif 2696 Manufacture.pif 2696 Manufacture.pif 700 Manufacture.pif 700 Manufacture.pif 700 Manufacture.pif 2364 Manufacture.pif 2364 Manufacture.pif 2364 Manufacture.pif 2436 Manufacture.pif 2436 Manufacture.pif 2436 Manufacture.pif 3644 Manufacture.pif 3644 Manufacture.pif 3644 Manufacture.pif 4348 Manufacture.pif 4348 Manufacture.pif 4348 Manufacture.pif 4752 Manufacture.pif 4752 Manufacture.pif 4752 Manufacture.pif -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 932 MicrosoftEdge.exe 5080 MicrosoftEdgeCP.exe 2976 MicrosoftEdgeCP.exe 5080 MicrosoftEdgeCP.exe 3048 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2916 wrote to memory of 4988 2916 Runner.exe 80 PID 2916 wrote to memory of 4988 2916 Runner.exe 80 PID 2916 wrote to memory of 4988 2916 Runner.exe 80 PID 4988 wrote to memory of 3724 4988 cmd.exe 82 PID 4988 wrote to memory of 3724 4988 cmd.exe 82 PID 4988 wrote to memory of 3724 4988 cmd.exe 82 PID 4988 wrote to memory of 3516 4988 cmd.exe 83 PID 4988 wrote to memory of 3516 4988 cmd.exe 83 PID 4988 wrote to memory of 3516 4988 cmd.exe 83 PID 4988 wrote to memory of 4348 4988 cmd.exe 85 PID 4988 wrote to memory of 4348 4988 cmd.exe 85 PID 4988 wrote to memory of 4348 4988 cmd.exe 85 PID 4988 wrote to memory of 2520 4988 cmd.exe 86 PID 4988 wrote to memory of 2520 4988 cmd.exe 86 PID 4988 wrote to memory of 2520 4988 cmd.exe 86 PID 4988 wrote to memory of 2208 4988 cmd.exe 87 PID 4988 wrote to memory of 2208 4988 cmd.exe 87 PID 4988 wrote to memory of 2208 4988 cmd.exe 87 PID 4988 wrote to memory of 4456 4988 cmd.exe 89 PID 4988 wrote to memory of 4456 4988 cmd.exe 89 PID 4988 wrote to memory of 4456 4988 cmd.exe 89 PID 2616 wrote to memory of 4960 2616 Runner2.exe 93 PID 2616 wrote to memory of 4960 2616 Runner2.exe 93 PID 2616 wrote to memory of 4960 2616 Runner2.exe 93 PID 2616 wrote to memory of 4960 2616 Runner2.exe 93 PID 2616 wrote to memory of 4960 2616 Runner2.exe 93 PID 2616 wrote to memory of 4960 2616 Runner2.exe 93 PID 2616 wrote to memory of 4960 2616 Runner2.exe 93 PID 2616 wrote to memory of 4960 2616 Runner2.exe 93 PID 2616 wrote to memory of 4960 2616 Runner2.exe 93 PID 4988 wrote to memory of 1556 4988 cmd.exe 94 PID 4988 wrote to memory of 1556 4988 cmd.exe 94 PID 4988 wrote to memory of 1556 4988 cmd.exe 94 PID 4988 wrote to memory of 2696 4988 cmd.exe 95 PID 4988 wrote to memory of 2696 4988 cmd.exe 95 PID 4988 wrote to memory of 2696 4988 cmd.exe 95 PID 4988 wrote to memory of 808 4988 cmd.exe 97 PID 4988 wrote to memory of 808 4988 cmd.exe 97 PID 4988 wrote to memory of 808 4988 cmd.exe 97 PID 676 wrote to memory of 4572 676 Runner.exe 99 PID 676 wrote to memory of 4572 676 Runner.exe 99 PID 676 wrote to memory of 4572 676 Runner.exe 99 PID 4572 wrote to memory of 1428 4572 cmd.exe 106 PID 4572 wrote to memory of 1428 4572 cmd.exe 106 PID 4572 wrote to memory of 1428 4572 cmd.exe 106 PID 4572 wrote to memory of 4808 4572 cmd.exe 107 PID 4572 wrote to memory of 4808 4572 cmd.exe 107 PID 4572 wrote to memory of 4808 4572 cmd.exe 107 PID 4572 wrote to memory of 4592 4572 cmd.exe 108 PID 4572 wrote to memory of 4592 4572 cmd.exe 108 PID 4572 wrote to memory of 4592 4572 cmd.exe 108 PID 4572 wrote to memory of 4536 4572 cmd.exe 109 PID 4572 wrote to memory of 4536 4572 cmd.exe 109 PID 4572 wrote to memory of 4536 4572 cmd.exe 109 PID 4572 wrote to memory of 3396 4572 cmd.exe 110 PID 4572 wrote to memory of 3396 4572 cmd.exe 110 PID 4572 wrote to memory of 3396 4572 cmd.exe 110 PID 4572 wrote to memory of 1372 4572 cmd.exe 111 PID 4572 wrote to memory of 1372 4572 cmd.exe 111 PID 4572 wrote to memory of 1372 4572 cmd.exe 111 PID 4572 wrote to memory of 700 4572 cmd.exe 112 PID 4572 wrote to memory of 700 4572 cmd.exe 112 PID 4572 wrote to memory of 700 4572 cmd.exe 112 PID 4572 wrote to memory of 916 4572 cmd.exe 113
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3360
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\InjectorSOFTWARE.zip2⤵PID:4136
-
-
C:\Users\Admin\Desktop\New folder\Runner.exe"C:\Users\Admin\Desktop\New folder\Runner.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k move Calvin Calvin.cmd & Calvin.cmd & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3724
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe opssvc.exe"4⤵
- System Location Discovery: System Language Discovery
PID:3516
-
-
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4348
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe bdservicehost.exe ekrn.exe nswscsvc.exe sophoshealth.exe"4⤵
- System Location Discovery: System Language Discovery
PID:2520
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 2323334⤵PID:2208
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "MenuHelenSpringsAmateur" Predict4⤵
- System Location Discovery: System Language Discovery
PID:4456
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b Expansion + Lights + Finish + Susan + Pretty 232333\N4⤵
- System Location Discovery: System Language Discovery
PID:1556
-
-
C:\Users\Admin\AppData\Local\Temp\232333\Manufacture.pifManufacture.pif N4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2696
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 54⤵PID:808
-
-
-
-
C:\Users\Admin\Desktop\New folder\Runner2.exe"C:\Users\Admin\Desktop\New folder\Runner2.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4960
-
-
-
C:\Windows\System32\GamePanel.exe"C:\Windows\System32\GamePanel.exe" 00000000000D0056 /startuptips2⤵
- Checks SCSI registry key(s)
PID:5032
-
-
C:\Users\Admin\Desktop\New folder\Runner.exe"C:\Users\Admin\Desktop\New folder\Runner.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k move Calvin Calvin.cmd & Calvin.cmd & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1428
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe opssvc.exe"4⤵
- System Location Discovery: System Language Discovery
PID:4808
-
-
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4592
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe bdservicehost.exe ekrn.exe nswscsvc.exe sophoshealth.exe"4⤵
- System Location Discovery: System Language Discovery
PID:4536
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 2323334⤵
- System Location Discovery: System Language Discovery
PID:3396
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b Expansion + Lights + Finish + Susan + Pretty 232333\N4⤵PID:1372
-
-
C:\Users\Admin\AppData\Local\Temp\232333\Manufacture.pifManufacture.pif N4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:700
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 54⤵PID:916
-
-
-
-
C:\Users\Admin\Desktop\New folder\Runner2.exe"C:\Users\Admin\Desktop\New folder\Runner2.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2600 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2600 -s 8683⤵
- Program crash
PID:1632
-
-
-
C:\Windows\System32\GamePanel.exe"C:\Windows\System32\GamePanel.exe" 0000000000020346 /startuptips2⤵
- Checks SCSI registry key(s)
PID:4180
-
-
C:\Users\Admin\AppData\Local\Temp\232333\Manufacture.pifC:\Users\Admin\AppData\Local\Temp\232333\Manufacture.pif2⤵
- Executes dropped EXE
PID:1472
-
-
C:\Users\Admin\AppData\Local\Temp\232333\Manufacture.pifC:\Users\Admin\AppData\Local\Temp\232333\Manufacture.pif2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4348
-
-
C:\Users\Admin\Desktop\New folder\Runner.exe"C:\Users\Admin\Desktop\New folder\Runner.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2744 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k move Calvin Calvin.cmd & Calvin.cmd & exit3⤵PID:4112
-
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3552
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe opssvc.exe"4⤵
- System Location Discovery: System Language Discovery
PID:2340
-
-
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2724
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe bdservicehost.exe ekrn.exe nswscsvc.exe sophoshealth.exe"4⤵PID:4908
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 2323334⤵
- System Location Discovery: System Language Discovery
PID:1388
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "MenuHelenSpringsAmateur" Predict4⤵PID:96
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b Expansion + Lights + Finish + Susan + Pretty 232333\N4⤵PID:2000
-
-
C:\Users\Admin\AppData\Local\Temp\232333\Manufacture.pifManufacture.pif N4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2364
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 54⤵
- System Location Discovery: System Language Discovery
PID:1428
-
-
-
-
C:\Users\Admin\Desktop\New folder\Runner2.exe"C:\Users\Admin\Desktop\New folder\Runner2.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2872 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"3⤵PID:4564
-
-
-
C:\Windows\System32\GamePanel.exe"C:\Windows\System32\GamePanel.exe" 000000000004034E /startuptips2⤵
- Checks SCSI registry key(s)
PID:1104
-
-
C:\Users\Admin\AppData\Local\Temp\232333\Manufacture.pifC:\Users\Admin\AppData\Local\Temp\232333\Manufacture.pif2⤵
- Executes dropped EXE
PID:1144
-
-
C:\Users\Admin\AppData\Local\Temp\232333\Manufacture.pifC:\Users\Admin\AppData\Local\Temp\232333\Manufacture.pif2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4592
-
-
C:\Users\Admin\Desktop\New folder\Runner.exe"C:\Users\Admin\Desktop\New folder\Runner.exe"2⤵
- Drops file in Windows directory
PID:3708 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k move Calvin Calvin.cmd & Calvin.cmd & exit3⤵PID:508
-
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2984
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe opssvc.exe"4⤵PID:4164
-
-
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3000
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe bdservicehost.exe ekrn.exe nswscsvc.exe sophoshealth.exe"4⤵
- System Location Discovery: System Language Discovery
PID:3724
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 2323334⤵
- System Location Discovery: System Language Discovery
PID:4572
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "MenuHelenSpringsAmateur" Predict4⤵
- System Location Discovery: System Language Discovery
PID:168
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b Expansion + Lights + Finish + Susan + Pretty 232333\N4⤵
- System Location Discovery: System Language Discovery
PID:2664
-
-
C:\Users\Admin\AppData\Local\Temp\232333\Manufacture.pifManufacture.pif N4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2436
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 54⤵PID:4784
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\232333\Manufacture.pifC:\Users\Admin\AppData\Local\Temp\232333\Manufacture.pif2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2476
-
-
C:\Users\Admin\Desktop\New folder\Runner2.exe"C:\Users\Admin\Desktop\New folder\Runner2.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1316 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2560
-
-
-
C:\Windows\System32\GamePanel.exe"C:\Windows\System32\GamePanel.exe" 0000000000070344 /startuptips2⤵
- Checks SCSI registry key(s)
PID:216
-
-
C:\Users\Admin\Desktop\New folder\Runner2.exe"C:\Users\Admin\Desktop\New folder\Runner2.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:796 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2016
-
-
-
C:\Windows\System32\GamePanel.exe"C:\Windows\System32\GamePanel.exe" 00000000000902F2 /startuptips2⤵
- Checks SCSI registry key(s)
PID:680
-
-
C:\Users\Admin\Desktop\New folder\Runner.exe"C:\Users\Admin\Desktop\New folder\Runner.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:196 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k move Calvin Calvin.cmd & Calvin.cmd & exit3⤵
- System Location Discovery: System Language Discovery
PID:2340 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1396
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe opssvc.exe"4⤵
- System Location Discovery: System Language Discovery
PID:5032
-
-
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4756
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe bdservicehost.exe ekrn.exe nswscsvc.exe sophoshealth.exe"4⤵PID:3988
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 2323334⤵
- System Location Discovery: System Language Discovery
PID:2872
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "MenuHelenSpringsAmateur" Predict4⤵
- System Location Discovery: System Language Discovery
PID:1232
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b Expansion + Lights + Finish + Susan + Pretty 232333\N4⤵
- System Location Discovery: System Language Discovery
PID:2548
-
-
C:\Users\Admin\AppData\Local\Temp\232333\Manufacture.pifManufacture.pif N4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3644
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 54⤵
- System Location Discovery: System Language Discovery
PID:1376
-
-
-
-
C:\Users\Admin\Desktop\New folder\Runner2.exe"C:\Users\Admin\Desktop\New folder\Runner2.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2724 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3392
-
-
-
C:\Windows\System32\GamePanel.exe"C:\Windows\System32\GamePanel.exe" 00000000000903E0 /startuptips2⤵
- Checks SCSI registry key(s)
PID:1944
-
-
C:\Users\Admin\Desktop\New folder\Runner.exe"C:\Users\Admin\Desktop\New folder\Runner.exe"2⤵
- Drops file in Windows directory
PID:4128 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k move Calvin Calvin.cmd & Calvin.cmd & exit3⤵
- System Location Discovery: System Language Discovery
PID:3584 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:704
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe opssvc.exe"4⤵
- System Location Discovery: System Language Discovery
PID:4736
-
-
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4172
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe bdservicehost.exe ekrn.exe nswscsvc.exe sophoshealth.exe"4⤵
- System Location Discovery: System Language Discovery
PID:3708
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 2323334⤵
- System Location Discovery: System Language Discovery
PID:2608
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b Expansion + Lights + Finish + Susan + Pretty 232333\N4⤵
- System Location Discovery: System Language Discovery
PID:3112
-
-
C:\Users\Admin\AppData\Local\Temp\232333\Manufacture.pifManufacture.pif N4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4348
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 54⤵
- System Location Discovery: System Language Discovery
PID:2868
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\232333\Manufacture.pifC:\Users\Admin\AppData\Local\Temp\232333\Manufacture.pif2⤵
- Executes dropped EXE
PID:1044
-
-
C:\Users\Admin\AppData\Local\Temp\232333\Manufacture.pifC:\Users\Admin\AppData\Local\Temp\232333\Manufacture.pif2⤵
- Executes dropped EXE
PID:1912
-
-
C:\Users\Admin\Desktop\New folder\Runner.exe"C:\Users\Admin\Desktop\New folder\Runner.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2508 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k move Calvin Calvin.cmd & Calvin.cmd & exit3⤵
- System Location Discovery: System Language Discovery
PID:5072 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3528
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe opssvc.exe"4⤵PID:4748
-
-
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4980
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe bdservicehost.exe ekrn.exe nswscsvc.exe sophoshealth.exe"4⤵PID:4964
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 2323334⤵PID:2444
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "MenuHelenSpringsAmateur" Predict4⤵PID:1892
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b Expansion + Lights + Finish + Susan + Pretty 232333\N4⤵PID:1052
-
-
C:\Users\Admin\AppData\Local\Temp\232333\Manufacture.pifManufacture.pif N4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4752
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 54⤵
- System Location Discovery: System Language Discovery
PID:2168
-
-
-
-
C:\Users\Admin\Desktop\New folder\Runner2.exe"C:\Users\Admin\Desktop\New folder\Runner2.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4512 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"3⤵
- System Location Discovery: System Language Discovery
PID:5032
-
-
-
C:\Windows\System32\GamePanel.exe"C:\Windows\System32\GamePanel.exe" 000000000010032E /startuptips2⤵PID:2596
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2652
-
C:\Windows\System32\bcastdvr.exe"C:\Windows\System32\bcastdvr.exe" -ServerName:Windows.Media.Capture.Internal.BroadcastDVRServer1⤵
- Drops desktop.ini file(s)
PID:584
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:932
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:2920
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:5080
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2976
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2468
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:5040
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:3048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42B
MD584cfdb4b995b1dbf543b26b86c863adc
SHA1d2f47764908bf30036cf8248b9ff5541e2711fa2
SHA256d8988d672d6915b46946b28c06ad8066c50041f6152a91d37ffa5cf129cc146b
SHA512485f0ed45e13f00a93762cbf15b4b8f996553baa021152fae5aba051e3736bcd3ca8f4328f0e6d9e3e1f910c96c4a9ae055331123ee08e3c2ce3a99ac2e177ce
-
Filesize
154B
MD51d65a1ec1541627947d0b6b5bbf04790
SHA1f0f5e95e388305202d15209244a113100114a8aa
SHA25681eff477e13eab3ae44f8e83e2672c37d29546d0f34c41ece03f4f1495d75d8a
SHA512429cb2c8d4efef69744a71773944ce7c27279abde26684a9be7d368ea70bd5b518e5ccf9dd84ec7b082eb2e419ed95cf7c22474c8ce370e64ff5fdbf8dbd7293
-
Filesize
924KB
MD5848164d084384c49937f99d5b894253e
SHA13055ef803eeec4f175ebf120f94125717ee12444
SHA256f58d3a4b2f3f7f10815c24586fae91964eeed830369e7e0701b43895b0cefbd3
SHA512aabe1cf076f48f32542f49a92e4ca9f054b31d5a9949119991b897b9489fe775d8009896408ba49ac43ec431c87c0d385daead9dbbde7ef6309b0c97bbaf852a
-
Filesize
471KB
MD54fdb1a12770b4c88fd6d2aaa9ca9a2b4
SHA195a1e665ec99a6c40c262a2b9a261821f9c7dbf0
SHA2560e404a8a95dd932bccd8ae3f6f459fc47a83a0afefcadca898689e1535fada33
SHA512f1350d31d268650afa0503ae0e1020a00444960d4dcda126f6f6c4b19884f3ac86ddf569375d83df7a7ba6c5fe1ed1221fd9719e61e82ae53e7bb7e75e493092
-
Filesize
64KB
MD5503b49562d47ec3d7bac36b283a000fe
SHA1029d7b6a7d1b95854a440e54791ae9ed07550741
SHA256c223cc0ced87549593bec6a286adcfb8f4be8fdc0360ea01858fed6331825803
SHA51226d85f3eff8f27d783a492c5f870eab761282f189ad5843d380032eb6f7e7dbfe54d43d7c1388f86ab434eb35cccadc00c5bd2afecab6f8a34966e4a0b970787
-
Filesize
20KB
MD51433355c586c2fdec518f4d8f7dafeeb
SHA1608bed0c126a348cb2cace3cc3ba7adf0010b2d0
SHA256247708f95834307b851966f2daa882ea3fd40ac7e7313fc3c052449a66291235
SHA5128495bcc89a28fc3dfb4d70e3829b8a174221ebb1675b8c2d0d499ba6e39b284e5c36f60a06737dd77e8c7ad7348a1efca82b66a21be8b47a59122e3c2b93e9b1
-
Filesize
8KB
MD5bc5912b3c47f2501e116404c987ff631
SHA1766d3a265a538dbe0e6dcd279ccfba8d55e46f13
SHA2562ed934b6e69455fbc61ad10cbfe607e5f1705779151eced7b69a64992218a18b
SHA512992eba3da27deb8fa19a9dcd1eb8446658022a51547bed64b9e6100a9a90a88754c8b2ffcfef822ef6511ebf52d5d0ff2811433f057f04b76f3afb28d97a59dc
-
Filesize
5KB
MD51d07a7c3edcbe811c97d8aa87fadcf0c
SHA1335313821207c6aec6d7de786611faedfa8d4e94
SHA256deffd4ca1108b05f99199e8158a76cd7ae4549ee72f94063f47549030c1c1b40
SHA512043262d2a5a0188ebfa2d34e4891805bea74c20f8bb3b9c0fb5ad6f5e965d14d3e12da6c0a0d65ebb89adca47bd262ceb994cdcc728f210e2ac04d6894880fa2
-
Filesize
13KB
MD5f15de6944e5309dd1d193a167bdc991c
SHA18b6733bd71553e2c17374bc3795db8d0ac6c6822
SHA2563c6810e428bb9906405feee07c73b8055203a1e1da49edfcb53c1bc345464239
SHA512c344568aeea9857c2d35b50955a515623d7e1d246dc0904dacb4c5f829091ad0a659be9df1044abd7bc0abe73c5139736504dfa8f2be0c449f9d464b01aaf7a9
-
Filesize
18KB
MD57220dbb3b385e6826eb1667ab3c43536
SHA1b351714eb11190df8207238159c473288f1c62b3
SHA25665ffa38d175e37791622354055e40bdbf080927a0d2364c6a7b01c8ea2705c6c
SHA512b24f21f550731cf3b4649497ba3bf688406db5aafea0bede8275056002605bf7de1eed88f14f25d778e5f7c70372a31997ccf50c6828a42995d2d9c99308ddf6
-
Filesize
60KB
MD5aeda8b49d380003d29a7382764632d74
SHA1c0ce4bd4c15126c8c43f0e33c3bccd9ec37ba87d
SHA25698220c2e4af3987a59a4c6edc16c34e5670511438b9c3a4fdb5005ddf438fb8e
SHA512909b6e77bf9052a0e3e1d56f903e4910d19e7ac92537ef47d25b3bcc6c0d70558f0cd89ff939c17b20a1dd575605da378eee98d8bb9a61eb11322a970208bafc
-
Filesize
146KB
MD58cc545443bf8df3db7c6f71297041dc2
SHA1b78fdd8d81e4deaac5bcfc1e415d7887468766d5
SHA256d257f366a170793acd2c73f905daa38bffdedc50dee8965886e96946c3b9180a
SHA51284078c5221ac2bcfbc30bdbaef76d87352870dfa740e2b8a3ea7404ab26ee4857b79a68f4ad573c1dec5dc7280d909fbdd4df20919cf06e108d487a7ce9932b9
-
Filesize
42KB
MD5c9c7aae72d8a772209022357fa1042db
SHA1d2561c89d954115d346e9688537763fa9f514027
SHA2569007c6e36f4d0d0a256c69b3e8c8c4531e5e1806dde1bf1a89e8b1794a8c9662
SHA5122eb874ab86ec14109a1df14cee548b5b94c66d480dd06bea57e3ec70a205a9971a4ee163d4022713032c4424d36f60efdc3b7fd9396b992a68326a403a9473b2
-
Filesize
66KB
MD52db81a29f6f362968a4d18a2f9157835
SHA1facce20c827e2c9daf3b6bfcccc180813f4e5576
SHA256f516d152ab3c28d8fe1928d81a6240749f0970f989d1e0f7a7514ef83b272968
SHA512bd92a0cdec8831c318b3f7e60eaea84e7228576076c623dfd08d4f19b2ba821ad3448aea3cada7c6d298a48e268748450b86f35dc71ddbb6bb43c5c67308bc95
-
Filesize
29KB
MD54cc23bf57f0b0ca6cecd68b966662e19
SHA1661f549d23d248204f43ed0cef7d278397bbf11a
SHA2560b875d3d77935029d2006157b19de0c352e77db84c57b2f2e9d50bdcb933d797
SHA5127c3e6424c91231c83fd5f2e0883d64118ce31a10fdf48ad58cec3f513de9098fa3ce375cc0a0470a1ad328b26ca095bfed2b8ce454861b57b7dd4cb55d2f8a1e
-
Filesize
47KB
MD5bc2f8b48336a3ead427b00a921e45b32
SHA1ad931ce9176fd4920b95acc9771edb70306373ef
SHA25601a35f509a574ac3d99818c163bdf60e2434c7b1950c6dd5e134d319eb25a07e
SHA51201969689fb4ca1fc8dc29e44fc990266534fe430a19346513e2074652b6b3f3c08ebfa5d435195760fa46c3a9285c780ecc3ef77e06b07062f6944d858cbfa49
-
Filesize
46KB
MD5ec77542b519d4338cfef2ff2ddd7020d
SHA1de98c0306fdb71788fdcf5c41563b6a75c0e9fe3
SHA256469efc5e64c1ce9c73262c33d9c8bb61522fa5d513da5d643dd53bce888e67fd
SHA51243059826eee08430cc6240206918ea3f9a9b624bbe72d8d4b4d472d021e26a3954381e419dedc7ad26b58898a6255489dad8fa048469656c5711512a1c24b1f7
-
Filesize
47KB
MD5a1717c93352d8da83751780f8f6ca13d
SHA1835c8c725530de58bbee7c324bfbb0f655a3e894
SHA2563d8181335a2802b75911d4f6e6296804c52ef9f39460e1949d143df4f8339b00
SHA5127020d2b331b1fc08abbdf001b4ae5ba04197175edad1027edf90bc35670398d234e87107a1462d73dfec917b76172805afa83474a878cc863f5911d6204df777
-
Filesize
28KB
MD538f2602bdbd93847ff53d489449ed190
SHA17c2399c082840f944e2c7dc68109b06fa06b4272
SHA256bc053cd44fa3d5fb83ce217f4f5dc56204a6e9ae9008080b33dee5ce958368fb
SHA512c5a76062bd4e02d27602ffb3cfa705952768739c5074acdf85ec5a968d87f340343e03d3118033b96054cd7f05b9cccb8f9401ddd50240af8a3fc5e0b14d5678
-
Filesize
52KB
MD503bb2608f5f8dd012beaf4811c74ff57
SHA181652ee81940fcc93b6310a8549f8769e0dcf927
SHA256d4fc239c6733667c3cbf448572e0732cd7e0fda8968077f06f5e07de806249e9
SHA512e8664f3b0ece01edcc71e0d522d8992b817a8cfce86cb2e0f243ef83557f83b54b745705942dee5c39ee0ce046eb587a3267b48499e9690f5af4d77fb5446007
-
Filesize
47KB
MD57c2899d655f06fb0bdf69b2ce8a84b2f
SHA1a49118b7a646247b7c8ba68c0f29c9601f3024d9
SHA25671acfec7b10a9cd5b0ff64cdfada09f146050bc8671dada415e91181b55cc984
SHA512b9c440e0e3cc3e33948f5cbf89ad10d0791c84965c27d98a887bcc3b57a9a78e26100c3020009a08c9239fb8e6fc8bd7a8511fe5c664bf3bca2ff2b3b3567a6e
-
Filesize
66KB
MD5f4bce82e1a91bf61bc12e566b7fcd21d
SHA168024c75c18308c0aefcd1b4e43d8bd75110c457
SHA25625b399aa3994d3c6c071ae126ac8386b198b6efa70f037a1866dc2af18d585c9
SHA5123251058aa9e29e0436cc660b80e429cf4dd326085f3ddd1f0fb64c4b343af2fd6e92191809a31067b34ac3436008a34fc788fd567a1cbce02d12eaf27a24450f
-
Filesize
17KB
MD56c1c62f4cef7702dbf2a4d0892e230b0
SHA1a9c1776a789ee260015ff5ca0cbfe57edc5fb704
SHA2560c8148a308e34701b5cdef5fe729dcf4bbfa1fe9dda40bcc45f7c4c63ef1dbb3
SHA512f08cdfc62b0aec34b57d33fdf221c83ed654240c4854c35b9fe75603d53f89794e63a40d320ae06570ca974ac3a628ad3ea40c3908d09ee6c337a0f849d59a8d
-
Filesize
179B
MD59859e9000a8a9116d73a0daff8cf4eda
SHA18e2fcac1b04019800ddec1da4939754f93bebb89
SHA256d9fa12836f1a795e4b7aea63438afd1628db01e38b0b373c42674e7b08832225
SHA5129f07e18608b5afd241761805b7f5b74c039f199f8b22664ce7b745e0f897dda3c9b84d8fbc486896c25bb11c33d7b4f1214af0691dfdbb3aa49f6865cd1bb29e
-
Filesize
37KB
MD5040be569f177171b4733539998501a77
SHA1bce941b812c9087757136fad9dfcde341830e1a2
SHA256de7417e0aa3461b488c06088d22ccc1ac029bfd67ace834fd8e9d109c6d4d536
SHA512c4768554b69c8b2404cf408cc2773c53334fe02b27731c2e7c0c4ee57c45f2ff4e933ca2042adb602e6c7e8f4532ce771f0c1984e55e95980e7c33e477cba523
-
Filesize
6KB
MD5063d7bfa15802b259705405a0c98f1ba
SHA146dd85304e2ad0e7b17b7ba0cf8eb32d7aa7e73e
SHA256366dedddbcefe46c993816db51721c1a6d463f885cf91ea37a1707711cec494f
SHA512b696a021d9f73779d14e28bec7bb865a3cabd134e3751f250f507b708c1cdefbacd2374e0d59a2fbddf1610026446fd924d385b5943d9c7d37986b32c58ff2d9
-
Filesize
66KB
MD55fa2f5c9839153a65a91a615d152bb3b
SHA1b56fb3d2664a703f6dab0dfe8faf760222b0be7a
SHA256954c5254c1b3bdf67a2cc590c8a0a0007390d7ae5cf2d39fda07ffa3f6fc4c29
SHA5129046f3117863944a5a141ab560de1db91915c67d7d2d2f9be1f63c1d35f11b155fcb9a839f6ce89ebbd76cb4a056cecd31dcbcc60607a77e039c8c2868f5368d
-
Filesize
40KB
MD5053f39ed7e64fd13d379894195d9dc44
SHA18063791bddbcdac297f4cdebc84741e9a585489d
SHA2561effe0d4d9e4e197eaa8f4597f1e22277454a53b3bd01bb7dc700ff272760a28
SHA5128f4613bf451c576459e6936fc1ca3e7f2990a484e377499751dd669fc2d136cb0acd841db516c28f08a8b6955a871bc520c3764cd35554cb6581b73284c0be9a
-
Filesize
46KB
MD53a92e7ff423fe5c7c40f42ce3e9af6e4
SHA130c0f3748be0324bff1443954d74f7366ffc5dfb
SHA256f77846134b9acd81f72a2b10b16571a2dc4b8b70b2e7008e54d2340c48569101
SHA512746e4fbf9aef5624ed18b46089f9d34901902b46a8e6081618c11524d6b9faf9f99db07888a17ae02b6600394ac68a2fc3b781e796de79432638f206ef4696eb
-
Filesize
53KB
MD5c9dc84cb3898a5e24ebcfee1b3f9dc5f
SHA1972079d65c31dc8982f98f1976a8c3913882d706
SHA2561601a870c0ad402852b9a3ff191afec62e5272426ad6ee87d0cefc98a19ba0ed
SHA51288985317cfd5bc128d340ea7520048d87eaf2847f631cd375ac0ffe85302b4975c72d5d6b6d1c7a6f83649fbb4f8f13c4837bd0fa921f8ea648764816d4b5a86
-
Filesize
26KB
MD5b7a11bffe009c47ed5f3bff893c3c058
SHA1eadfd773d19b03766739a2d873ee35a31e95ddda
SHA25667d47d2bf1a7bd132aa43d4a363f0a26be0458a4b7b80f6f0fbd3a484ad18b6a
SHA51208f1114fd09c866465bb3f352435271fcb553c8e5cf8bdbf3402db26bf4d133d03de2e8b0be65a37abf9272df219339310f0aebc9fb75023dd7508384119821d
-
Filesize
175KB
MD5859f6eef94ac9d053bd984d79f524b93
SHA130dab95859880a0754681ecfd7b97ef498d3d8f9
SHA256b68e986c42ce291c96a0541c3f5ad428f9e176e25508ca8c762e1c6fdcc89a28
SHA512efb4002f65799d421146d3e4ab82d3d9984ca7772565d922686a36ab1f47e018d03f5392fc0abee2e482425466059cce457f6d5d41d8789daa48132650e7981f
-
Filesize
27KB
MD5e3276a8cb70b701b69155cb10a230c42
SHA18765545e96df259f179c4803fb5bdd11a68f59fd
SHA256c11a2061e458239832352e15836356da77442cef1e2f217491a248c21658bb53
SHA51277b0d6dbb0915e84a6185d54415cb0291a36480ef429f81360c0fadc8cd75de918733ef82eda014f365d388aae0646ba9ee72f99f06e77a788e47d3bfbbdd24e
-
Filesize
46KB
MD5aba2142787a23cb46bcf18ff001b6299
SHA1b20b8eef5e95d4cb5a3cf6c2a50ae19dce773ee6
SHA256614191139a925d09762b19e4a8475d281853a460dac6b39882c4332ebca6a328
SHA512b537aaf54f61b4ffca421e58cd019fd309a1cdb2dcc026761ca14b9d2811c877321200f655814b20ab9779d3d2b44006bd66a0b02c1da5699c4c026c97981955
-
Filesize
65KB
MD524f82dcbcfd2280b0ddcca567247ff21
SHA1e3c21a28260d481fc8c13e85f34213c7236a6d4f
SHA2561204683d5669a70204ead35f292a2e01fadc55939a085ad6e29d295f95b8fd80
SHA5126a87bfa8c1b9fb4d23f7582e39a9ffea53cfce59fccf806cf9195d340d60752822ad396574ad016d5d039776f258d20b4a118430d897d89e57822d9ceb3cfeb7
-
Filesize
190B
MD5b0d27eaec71f1cd73b015f5ceeb15f9d
SHA162264f8b5c2f5034a1e4143df6e8c787165fbc2f
SHA25686d9f822aeb989755fac82929e8db369b3f5f04117ef96fd76e3d5f920a501d2
SHA5127b5c9783a0a14b600b156825639d24cbbc000f5066c48ce9fecc195255603fc55129aaaca336d7ce6ad4e941d5492b756562f2c7a1d151fcfc2dabac76f3946c
-
Filesize
512KB
MD5a77a9cf718826505c24aaef8806e99a9
SHA1279289ce25e61574a43db2842c8232eacbbef2a0
SHA2565a82c3e9d4216bb25582bb6e815de8550957c7e98e67c64e2c2e2f039192f1c1
SHA512c8ffbe90aa69177e2aa4287a7cb7d8af00a3519d02537e75ed8d4081ecda00f04f90f27215efc027bfbcd58dffb2323e30f4bd98dd825c3786ba7b97f1dd7296