Analysis
-
max time kernel
353s -
max time network
354s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
14/09/2024, 12:54
Behavioral task
behavioral1
Sample
XCliaent.exe
Resource
win11-20240802-en
Errors
General
-
Target
XCliaent.exe
-
Size
80KB
-
MD5
84ef912e583e2085324aff1b1838ea02
-
SHA1
4cf9e83bb995c40e1b509090c2523954b19b31f4
-
SHA256
8ba3b9263bbf0baf8b955e53272b90dca4c7525fd42d1368386aa95ec71a434a
-
SHA512
b0b9fa353f413f1215bb8d49546a5914e80e96aacdc675c085371ea9f6797e332b77655f96abb99fff4105020f12f32a8b8ad36078a0f68de65bdb724995e56b
-
SSDEEP
1536:90YS2Xy3ynngKG6H08Dd7Kb2uFUMgNG6O6U9aOynP83yFzr2Hi+:90t2C3UhGwv7KbjF5GG60aOcEiFkX
Malware Config
Extracted
xworm
147.185.221.22:46682
127.0.0.1:46682
-
Install_directory
%Temp%
-
install_file
svchost.exe
Signatures
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/memory/1164-334-0x000000001B230000-0x000000001B23E000-memory.dmp disable_win_def -
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/memory/1164-1-0x0000000000150000-0x000000000016A000-memory.dmp family_xworm behavioral1/files/0x000900000002a99b-54.dat family_xworm -
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral1/memory/1164-507-0x000000001D3C0000-0x000000001D4DE000-memory.dmp family_stormkitty -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4256 powershell.exe 4876 powershell.exe 2728 powershell.exe 2864 powershell.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" XCliaent.exe -
Disables Task Manager via registry modification
-
Executes dropped EXE 6 IoCs
pid Process 4512 svchost.exe 2252 svchost.exe 1392 svchost.exe 708 svchost.exe 3724 svchost.exe 4568 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 3600 SystemSettingsAdminFlows.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: SystemSettingsAdminFlows.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ip-api.com -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\Recovery\ReAgent.xml SystemSettingsAdminFlows.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\XBackground.bmp" XCliaent.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\Logs\PBR\ReAgent\ReAgent.xml SystemSettingsAdminFlows.exe File created C:\Windows\Logs\PBR\Panther\DDACLSys.log SystemSettingsAdminFlows.exe File created C:\Windows\Logs\PBR\INF\setupapi.offline.log SystemSettingsAdminFlows.exe File opened for modification C:\Windows\Logs\PBR\CBS\CBS.log SystemSettingsAdminFlows.exe File created C:\Windows\Logs\PBR\Panther\actionqueue\oobeSystem.uaq SystemSettingsAdminFlows.exe File opened for modification C:\Windows\Logs\PBR\Panther\unattend.xml SystemSettingsAdminFlows.exe File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml UserOOBEBroker.exe File opened for modification C:\Windows\Logs\PBR\BCDCopy.LOG1 SystemSettingsAdminFlows.exe File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml SystemSettingsAdminFlows.exe File created C:\Windows\Logs\PBR\Panther\_s_3CBB.tmp SystemSettingsAdminFlows.exe File opened for modification C:\Windows\Logs\PBR\PushButtonReset.etl SystemSettingsAdminFlows.exe File opened for modification C:\Windows\Logs\PBR\BCDCopy.LOG2 SystemSettingsAdminFlows.exe File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log UserOOBEBroker.exe File created C:\Windows\Logs\PBR\Panther\_s_4067.tmp SystemSettingsAdminFlows.exe File opened for modification C:\Windows\Logs\PBR\setupact.log SystemSettingsAdminFlows.exe File opened for modification C:\Windows\Logs\PBR\BCDCopy.LOG SystemSettingsAdminFlows.exe File opened for modification C:\Windows\Logs\PBR\Panther\UnattendGC\setuperr.log SystemSettingsAdminFlows.exe File opened for modification C:\Windows\Logs\PBR\Panther\cbs_unattend.log SystemSettingsAdminFlows.exe File created C:\Windows\Logs\PBR\Panther\setuperr.log SystemSettingsAdminFlows.exe File opened for modification C:\Windows\Logs\PBR\DISM SystemSettingsAdminFlows.exe File created C:\Windows\Logs\PBR\Panther\UnattendGC\diagerr.xml SystemSettingsAdminFlows.exe File opened for modification C:\Windows\Panther\UnattendGC\setupact.log UserOOBEBroker.exe File opened for modification C:\Windows\Logs\PBR\Timestamp.xml SystemSettingsAdminFlows.exe File opened for modification C:\Windows\Logs\PBR\WinRE\bootstat.dat SystemSettingsAdminFlows.exe File created C:\Windows\Logs\PBR\Panther\_s_3EA1.tmp SystemSettingsAdminFlows.exe File created C:\Windows\Logs\PBR\Panther\cbs_unattend.log SystemSettingsAdminFlows.exe File created C:\Windows\Logs\PBR\Panther\setupact.log SystemSettingsAdminFlows.exe File opened for modification C:\Windows\Logs\PBR\Panther\setupact.log SystemSettingsAdminFlows.exe File opened for modification C:\Windows\Logs\PBR\ResetSession.xml SystemSettingsAdminFlows.exe File created C:\Windows\Logs\PBR\Panther\cbs_intl.log SystemSettingsAdminFlows.exe File opened for modification C:\Windows\Logs\PBR\INF\setupapi.offline.log SystemSettingsAdminFlows.exe File opened for modification C:\Windows\Logs\PBR\Panther\UnattendGC\diagwrn.xml SystemSettingsAdminFlows.exe File opened for modification C:\Windows\Logs\PBR\Panther\setuperr.log SystemSettingsAdminFlows.exe File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml UserOOBEBroker.exe File created C:\Windows\Logs\PBR\Panther\MainQueueOnline1.que SystemSettingsAdminFlows.exe File created C:\Windows\Logs\PBR\Timestamp.xml SystemSettingsAdminFlows.exe File opened for modification C:\Windows\Logs\PBR\ReAgent\ReAgent.xml SystemSettingsAdminFlows.exe File opened for modification C:\Windows\Logs\PBR\Panther\UnattendGC\setupact.log SystemSettingsAdminFlows.exe File opened for modification C:\Windows\Logs\PBR\DISM\dism.log SystemSettingsAdminFlows.exe File opened for modification C:\Windows\Logs\PBR\Panther\setup.exe SystemSettingsAdminFlows.exe File opened for modification C:\Windows\Logs\PBR\Panther\Contents0.dir SystemSettingsAdminFlows.exe File opened for modification C:\Windows\Logs\PBR\ReAgent SystemSettingsAdminFlows.exe File created C:\Windows\Logs\PBR\CBS\CBS.log SystemSettingsAdminFlows.exe File created C:\Windows\Logs\PBR\setupact.log SystemSettingsAdminFlows.exe File opened for modification C:\Windows\Panther\UnattendGC\setupact.log UserOOBEBroker.exe File created C:\Windows\Logs\PBR\INF\setupapi.offline.20210605_121033.log SystemSettingsAdminFlows.exe File created C:\Windows\Logs\PBR\DISM\dism.log SystemSettingsAdminFlows.exe File opened for modification C:\Windows\Logs\PBR\Panther\Contents1.dir SystemSettingsAdminFlows.exe File created C:\Windows\Logs\PBR\Panther\unattend.xml SystemSettingsAdminFlows.exe File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml UserOOBEBroker.exe File opened for modification C:\Windows\Logs\PBR\Panther SystemSettingsAdminFlows.exe File opened for modification C:\Windows\Logs\PBR\Panther\actionqueue\specialize.uaq SystemSettingsAdminFlows.exe File created C:\Windows\Logs\PBR\Panther\UnattendGC\diagwrn.xml SystemSettingsAdminFlows.exe File created C:\Windows\Logs\PBR\Panther\Contents1.dir SystemSettingsAdminFlows.exe File opened for modification C:\Windows\Logs\PBR\Panther\DDACLSys.log SystemSettingsAdminFlows.exe File created C:\Windows\Logs\PBR\ResetSession.xml SystemSettingsAdminFlows.exe File created C:\Windows\Logs\PBR\WinRE\bootstat.dat SystemSettingsAdminFlows.exe File opened for modification C:\Windows\Logs\PBR\ResetConfig.ini SystemSettingsAdminFlows.exe File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml SystemSettingsAdminFlows.exe File opened for modification C:\Windows\Logs\PBR\Panther\MainQueueOnline1.que SystemSettingsAdminFlows.exe File created C:\Windows\Logs\PBR\setuperr.log SystemSettingsAdminFlows.exe File created C:\Windows\Logs\PBR\Panther\diagerr.xml SystemSettingsAdminFlows.exe File created C:\Windows\Logs\PBR\Panther\UnattendGC\setupact.log SystemSettingsAdminFlows.exe File opened for modification C:\Windows\Logs\PBR\Panther\diagerr.xml SystemSettingsAdminFlows.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3716 sc.exe 904 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FileCoAuth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FileCoAuth.exe -
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 vds.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "142" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292114432" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292114432" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = 99ebff004cc2ff000091f8000078d4000067c000003e9200001a6800f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4290799360" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365268" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365268" LogonUI.exe -
Modifies registry class 29 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe Set value (data) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\MRUListEx = 010000000200000000000000ffffffff OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6 OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell\SniffedFolderType = "Generic" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell OpenWith.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202020202020202 OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1 OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\1 OpenWith.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2508 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4256 powershell.exe 4256 powershell.exe 4876 powershell.exe 4876 powershell.exe 2728 powershell.exe 2728 powershell.exe 2864 powershell.exe 2864 powershell.exe 1164 XCliaent.exe 1164 XCliaent.exe 1164 XCliaent.exe 1164 XCliaent.exe 1164 XCliaent.exe 1164 XCliaent.exe 1164 XCliaent.exe 1164 XCliaent.exe 1164 XCliaent.exe 1164 XCliaent.exe 1164 XCliaent.exe 1164 XCliaent.exe 1164 XCliaent.exe 1164 XCliaent.exe 1164 XCliaent.exe 1164 XCliaent.exe 1164 XCliaent.exe 1164 XCliaent.exe 1164 XCliaent.exe 1164 XCliaent.exe 1164 XCliaent.exe 1164 XCliaent.exe 1164 XCliaent.exe 1164 XCliaent.exe 1164 XCliaent.exe 1164 XCliaent.exe 1164 XCliaent.exe 1164 XCliaent.exe 1164 XCliaent.exe 1164 XCliaent.exe 1164 XCliaent.exe 1164 XCliaent.exe 1164 XCliaent.exe 1164 XCliaent.exe 1164 XCliaent.exe 1164 XCliaent.exe 1164 XCliaent.exe 1164 XCliaent.exe 1164 XCliaent.exe 1164 XCliaent.exe 1164 XCliaent.exe 1164 XCliaent.exe 1164 XCliaent.exe 1164 XCliaent.exe 1164 XCliaent.exe 1164 XCliaent.exe 1164 XCliaent.exe 1164 XCliaent.exe 1164 XCliaent.exe 1164 XCliaent.exe 1164 XCliaent.exe 1164 XCliaent.exe 1164 XCliaent.exe 1164 XCliaent.exe 1164 XCliaent.exe 1164 XCliaent.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1164 XCliaent.exe 1184 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
description pid Process Token: SeDebugPrivilege 1164 XCliaent.exe Token: SeDebugPrivilege 4256 powershell.exe Token: SeDebugPrivilege 4876 powershell.exe Token: SeDebugPrivilege 2728 powershell.exe Token: SeDebugPrivilege 2864 powershell.exe Token: SeDebugPrivilege 1164 XCliaent.exe Token: SeDebugPrivilege 4512 svchost.exe Token: SeDebugPrivilege 2252 svchost.exe Token: SeDebugPrivilege 1392 svchost.exe Token: SeBackupPrivilege 1180 vssvc.exe Token: SeRestorePrivilege 1180 vssvc.exe Token: SeAuditPrivilege 1180 vssvc.exe Token: SeDebugPrivilege 708 svchost.exe Token: SeDebugPrivilege 3724 svchost.exe Token: SeDebugPrivilege 4568 svchost.exe Token: SeBackupPrivilege 3600 SystemSettingsAdminFlows.exe Token: SeRestorePrivilege 3600 SystemSettingsAdminFlows.exe Token: SeSystemEnvironmentPrivilege 3600 SystemSettingsAdminFlows.exe Token: SeBackupPrivilege 3600 SystemSettingsAdminFlows.exe Token: SeRestorePrivilege 3600 SystemSettingsAdminFlows.exe Token: SeSecurityPrivilege 3600 SystemSettingsAdminFlows.exe Token: SeTakeOwnershipPrivilege 3600 SystemSettingsAdminFlows.exe Token: SeBackupPrivilege 3600 SystemSettingsAdminFlows.exe Token: SeRestorePrivilege 3600 SystemSettingsAdminFlows.exe Token: SeBackupPrivilege 3948 vssvc.exe Token: SeRestorePrivilege 3948 vssvc.exe Token: SeAuditPrivilege 3948 vssvc.exe Token: SeTakeOwnershipPrivilege 3600 SystemSettingsAdminFlows.exe Token: SeTakeOwnershipPrivilege 3600 SystemSettingsAdminFlows.exe Token: SeBackupPrivilege 3600 SystemSettingsAdminFlows.exe Token: SeRestorePrivilege 3600 SystemSettingsAdminFlows.exe Token: SeRestorePrivilege 3600 SystemSettingsAdminFlows.exe Token: SeRestorePrivilege 3600 SystemSettingsAdminFlows.exe Token: SeShutdownPrivilege 3600 SystemSettingsAdminFlows.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe -
Suspicious use of SendNotifyMessage 16 IoCs
pid Process 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe -
Suspicious use of SetWindowsHookEx 18 IoCs
pid Process 1164 XCliaent.exe 4968 MiniSearchHost.exe 1184 OpenWith.exe 1184 OpenWith.exe 1184 OpenWith.exe 1184 OpenWith.exe 1184 OpenWith.exe 1184 OpenWith.exe 1184 OpenWith.exe 1184 OpenWith.exe 1184 OpenWith.exe 1184 OpenWith.exe 1184 OpenWith.exe 1184 OpenWith.exe 1184 OpenWith.exe 1184 OpenWith.exe 3600 SystemSettingsAdminFlows.exe 2868 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1164 wrote to memory of 4256 1164 XCliaent.exe 82 PID 1164 wrote to memory of 4256 1164 XCliaent.exe 82 PID 1164 wrote to memory of 4876 1164 XCliaent.exe 84 PID 1164 wrote to memory of 4876 1164 XCliaent.exe 84 PID 1164 wrote to memory of 2728 1164 XCliaent.exe 86 PID 1164 wrote to memory of 2728 1164 XCliaent.exe 86 PID 1164 wrote to memory of 2864 1164 XCliaent.exe 88 PID 1164 wrote to memory of 2864 1164 XCliaent.exe 88 PID 1164 wrote to memory of 2508 1164 XCliaent.exe 90 PID 1164 wrote to memory of 2508 1164 XCliaent.exe 90 PID 1164 wrote to memory of 3280 1164 XCliaent.exe 105 PID 1164 wrote to memory of 3280 1164 XCliaent.exe 105 PID 3280 wrote to memory of 3140 3280 msedge.exe 106 PID 3280 wrote to memory of 3140 3280 msedge.exe 106 PID 3280 wrote to memory of 1420 3280 msedge.exe 107 PID 3280 wrote to memory of 1420 3280 msedge.exe 107 PID 3280 wrote to memory of 1420 3280 msedge.exe 107 PID 3280 wrote to memory of 1420 3280 msedge.exe 107 PID 3280 wrote to memory of 1420 3280 msedge.exe 107 PID 3280 wrote to memory of 1420 3280 msedge.exe 107 PID 3280 wrote to memory of 1420 3280 msedge.exe 107 PID 3280 wrote to memory of 1420 3280 msedge.exe 107 PID 3280 wrote to memory of 1420 3280 msedge.exe 107 PID 3280 wrote to memory of 1420 3280 msedge.exe 107 PID 3280 wrote to memory of 1420 3280 msedge.exe 107 PID 3280 wrote to memory of 1420 3280 msedge.exe 107 PID 3280 wrote to memory of 1420 3280 msedge.exe 107 PID 3280 wrote to memory of 1420 3280 msedge.exe 107 PID 3280 wrote to memory of 1420 3280 msedge.exe 107 PID 3280 wrote to memory of 1420 3280 msedge.exe 107 PID 3280 wrote to memory of 1420 3280 msedge.exe 107 PID 3280 wrote to memory of 1420 3280 msedge.exe 107 PID 3280 wrote to memory of 1420 3280 msedge.exe 107 PID 3280 wrote to memory of 1420 3280 msedge.exe 107 PID 3280 wrote to memory of 1420 3280 msedge.exe 107 PID 3280 wrote to memory of 1420 3280 msedge.exe 107 PID 3280 wrote to memory of 1420 3280 msedge.exe 107 PID 3280 wrote to memory of 1420 3280 msedge.exe 107 PID 3280 wrote to memory of 1420 3280 msedge.exe 107 PID 3280 wrote to memory of 1420 3280 msedge.exe 107 PID 3280 wrote to memory of 1420 3280 msedge.exe 107 PID 3280 wrote to memory of 1420 3280 msedge.exe 107 PID 3280 wrote to memory of 1420 3280 msedge.exe 107 PID 3280 wrote to memory of 1420 3280 msedge.exe 107 PID 3280 wrote to memory of 1420 3280 msedge.exe 107 PID 3280 wrote to memory of 1420 3280 msedge.exe 107 PID 3280 wrote to memory of 1420 3280 msedge.exe 107 PID 3280 wrote to memory of 1420 3280 msedge.exe 107 PID 3280 wrote to memory of 1420 3280 msedge.exe 107 PID 3280 wrote to memory of 1420 3280 msedge.exe 107 PID 3280 wrote to memory of 1420 3280 msedge.exe 107 PID 3280 wrote to memory of 1420 3280 msedge.exe 107 PID 3280 wrote to memory of 1420 3280 msedge.exe 107 PID 3280 wrote to memory of 1420 3280 msedge.exe 107 PID 3280 wrote to memory of 1472 3280 msedge.exe 108 PID 3280 wrote to memory of 1472 3280 msedge.exe 108 PID 3280 wrote to memory of 4240 3280 msedge.exe 109 PID 3280 wrote to memory of 4240 3280 msedge.exe 109 PID 3280 wrote to memory of 4240 3280 msedge.exe 109 PID 3280 wrote to memory of 4240 3280 msedge.exe 109 PID 3280 wrote to memory of 4240 3280 msedge.exe 109 PID 3280 wrote to memory of 4240 3280 msedge.exe 109 PID 3280 wrote to memory of 4240 3280 msedge.exe 109 PID 3280 wrote to memory of 4240 3280 msedge.exe 109 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\XCliaent.exe"C:\Users\Admin\AppData\Local\Temp\XCliaent.exe"1⤵
- Disables RegEdit via registry modification
- Sets desktop wallpaper using registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XCliaent.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4256
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XCliaent.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4876
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\svchost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2728
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2864
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\AppData\Local\Temp\svchost.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\How To Decrypt My Files.html2⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff9e2b73cb8,0x7ff9e2b73cc8,0x7ff9e2b73cd83⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1896,11493738038646806409,3942366199505092203,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1904 /prefetch:23⤵PID:1420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1896,11493738038646806409,3942366199505092203,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2424 /prefetch:33⤵PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1896,11493738038646806409,3942366199505092203,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2676 /prefetch:83⤵PID:4240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,11493738038646806409,3942366199505092203,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:13⤵PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,11493738038646806409,3942366199505092203,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:13⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,11493738038646806409,3942366199505092203,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:13⤵PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,11493738038646806409,3942366199505092203,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:13⤵PID:1196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,11493738038646806409,3942366199505092203,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:13⤵PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,11493738038646806409,3942366199505092203,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:13⤵PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1896,11493738038646806409,3942366199505092203,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5104 /prefetch:83⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1896,11493738038646806409,3942366199505092203,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5368 /prefetch:83⤵PID:1640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,11493738038646806409,3942366199505092203,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2324 /prefetch:13⤵PID:652
-
-
-
C:\Windows\System32\sc.exe"C:\Windows\System32\sc.exe" stop wuauserv2⤵
- Launches sc.exe
PID:3716
-
-
C:\Windows\System32\sc.exe"C:\Windows\System32\sc.exe" config wuauserv start=disabled2⤵
- Launches sc.exe
PID:904
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4512
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2252
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4968
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2248
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1240
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1392
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1180
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\How To Decrypt My Files.html1⤵PID:292
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff9e2b73cb8,0x7ff9e2b73cc8,0x7ff9e2b73cd82⤵PID:3936
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1184
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:708
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:3592
-
C:\Windows\System32\oobe\UserOOBEBroker.exeC:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding1⤵
- Drops file in Windows directory
PID:4484
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exeC:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding1⤵
- System Location Discovery: System Language Discovery
PID:4912
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3724
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4568
-
C:\Windows\System32\oobe\UserOOBEBroker.exeC:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding1⤵
- Drops file in Windows directory
PID:3208
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exeC:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding1⤵
- System Location Discovery: System Language Discovery
PID:3200
-
C:\Windows\system32\SystemSettingsAdminFlows.exe"C:\Windows\system32\SystemSettingsAdminFlows.exe" FeaturedResetPC1⤵
- Loads dropped DLL
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3600
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:3964
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Checks SCSI registry key(s)
PID:4380
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:2460
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3948
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa39f5855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:2868
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
186B
MD547069918e9e83eb02bff5ce5498c9bbd
SHA117ffee2e0ddfec27bba8c1a3550d57c7f92960d5
SHA256e7688a4bb28fbb7b562886e29da34887d6189a52041de39b538d5c2caf3c932e
SHA5127a0d2ed36988aa921e0e09779bb8defe38133c8f6add2159cceeee59f5083d391fea2f7bee961b5bba4767e75eea8a2670e7900290c17ce7cc80fae7e037a4c1
-
Filesize
115KB
MD5dcffb49bd7922a9c4d654fd6253e8196
SHA12549d2685947592df2bb0099d94250010d6627c5
SHA256e1f138ef4b43a0dde6114be4921e116db45f1437244a717bc9f5a3a309a91219
SHA512405525edb90d452c693595cc770e98e25bc172086a09d6b9aae2f64da7e9e95aa01f46da76d136153ebf6c967a68c30d9082993967c397a409e6963c7799fefe
-
Filesize
974B
MD52d94428bc3bf39c5aba0b0473412dc4e
SHA1880e4890b3d7fd8b9d46c68f4523458428285c00
SHA2565b6d126d1251972caf85c4f54d23f230d28e287d796ee86f5c815d7ef38e7bc8
SHA512c5d9a8450631990c7b3b4a52542084de1da7deb4b57a63544d76e1f8547ead8e81ab6cc8537605c07b48cb473fe96798c74a25d346a249238383d2c8ebab51d6
-
Filesize
2KB
MD5627073ee3ca9676911bee35548eff2b8
SHA14c4b68c65e2cab9864b51167d710aa29ebdcff2e
SHA25685b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c
SHA5123c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb
-
Filesize
654B
MD52cbbb74b7da1f720b48ed31085cbd5b8
SHA179caa9a3ea8abe1b9c4326c3633da64a5f724964
SHA256e31b18f21621d9983bfdf1ea3e53884a9d58b8ffd79e0e5790da6f3a81a8b9d3
SHA512ecf02d5240e0c1c005d3ab393aa7eff62bd498c2db5905157e2bf6d29e1b663228a9583950842629d1a4caef404c8941a0c7799b1a3bd1eb890a09fdb7efcff9
-
Filesize
152B
MD5b0177afa818e013394b36a04cb111278
SHA1dbc5c47e7a7df24259d67edf5fbbfa1b1fae3fe5
SHA256ffc2c53bfd37576b435309c750a5b81580a076c83019d34172f6635ff20c2a9d
SHA512d3b9e3a0a99f191edcf33f3658abd3c88afbb12d7b14d3b421b72b74d551b64d2a13d07db94c90b85606198ee6c9e52072e1017f8c8c6144c03acf509793a9db
-
Filesize
152B
MD59af507866fb23dace6259791c377531f
SHA15a5914fc48341ac112bfcd71b946fc0b2619f933
SHA2565fb3ec65ce1e6f47694e56a07c63e3b8af9876d80387a71f1917deae690d069f
SHA512c58c963ecd2c53f0c427f91dc41d9b2a9b766f2e04d7dae5236cb3c769d1f048e4a342ea75e4a690f3a207baa1d3add672160c1f317abfe703fd1d2216b1baf7
-
Filesize
5KB
MD563f4d461ddbb1a560e08b75d3688aa39
SHA196040dce1183a479a7645b2ee0bf0b8db3aef9e9
SHA256c726b29b91eef92ad7588fe6d4a506191edb144a45f08f054c3db9e7fb03aa30
SHA5122c8de04bff18106848a5a529a7c37e8fd6fa12911b709a87aa7f52619ace2fcb6d1ccf8b61c16b8fe36ce40ca6ec8b2dd3cd415e6a86948214952413954cec81
-
Filesize
5KB
MD5fdcf5b637778920139cd6c0b819af631
SHA1074392e5fbbb56d1a3675fd00c26f69090ba398e
SHA2567f1a7aced6d21ee8c9e439bd8c9b623ab6b2c518127d25c5716c6410049a97be
SHA5120b65d15cc6613ebf6b3b592fbdc5552716bbc5bc8f673384d0f731cae3b71124ebdac229a4bd7be95e66e193f46aaebd31080c087e0d7e0db680c419c0d1e338
-
Filesize
5KB
MD528386833adebce4b3283c78f1b56aed9
SHA1fbea2d3800694416dd268bcda2fd34718e064d3c
SHA2562bac69e9bebcef5fae29240f01edaf60e564f70518d03aaacb782970547d5eae
SHA512ff241f23d181847f4396d04d9bc446897aefd8051d6e7ba8ded5843e10483928e3b3774e65ce5d497fa30eda98382af5862ddd6232991dc2abd80114228d4187
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD54bd8fbf6a92c2485d6563abbb67d4a16
SHA1e0850ea027f17b82534047cf425304420ef70abd
SHA256c7c09449c64d9175df911f47710712d8b7fdc82ea05149d12a0ee96ed8833751
SHA51239d81b7708e4848e4cf33a5272a79e8cd74618adf576095f5e0d01e27dc51107a25dc635045ad80e500c2b97c5db59c1dec4b059fceddc8f06918628a13f16cd
-
Filesize
10KB
MD5c12dc35114132c7b41bcfa906cfbf4e1
SHA14c61b5cf48104f9e3bf9bdeab338f2166e3285c0
SHA256ed917a0448b46062e2746d7c632209f41b3b5ffe110dce208c7000cf13394715
SHA51256a871c9a91a46dda616ab78ed915a0221e838f9f387d2716f0e9c4f51138f9675f01fe59db5c13d797c94f0d36f82e440698a57a467a04c078924d0a11c1e2f
-
Filesize
10KB
MD52ff3d77479537b59f1fcb18896f8181b
SHA10a809280b4e843f41d19b3c22b31831f03a419a4
SHA2567cb4ad00a8f6fd76a77c722d5ea6cabb1723b3f3b2ce2aa2fce3619bee965248
SHA5122baf4b5f25a41e9910915143196e461bd829115ceab709f9e64a1083188d3336eb89a307cfd7da130983648587d52a2004c5c6023c0a9a1b0fdc0a159df34098
-
Filesize
264KB
MD5c8bc0ac153df53827fc5225b2df3c7c3
SHA128858df3346c87b50cd7d63580179d0fc76b0956
SHA25661b5370fe01ec8a441534c4ff431b2fcd98a41667f2fcb5c547468bd02268bf3
SHA512285914357386a4a33aa17183970adac6f4937c341f80d0a16b6bb49711cda2c92ce0d0152935b5a6daddae1b04014d9bc2135530222c6672b892af9e431db0f3
-
Filesize
944B
MD5d0a4a3b9a52b8fe3b019f6cd0ef3dad6
SHA1fed70ce7834c3b97edbd078eccda1e5effa527cd
SHA25621942e513f223fdad778348fbb20617dd29f986bccd87824c0ae7f15649f3f31
SHA5121a66f837b4e7fb6346d0500aeacb44902fb8a239bce23416271263eba46fddae58a17075e188ae43eb516c841e02c87e32ebd73256c7cc2c0713d00c35f1761b
-
Filesize
944B
MD5781da0576417bf414dc558e5a315e2be
SHA1215451c1e370be595f1c389f587efeaa93108b4c
SHA25641a5aef8b0bbeea2766f40a7bba2c78322379f167c610f7055ccb69e7db030fe
SHA51224e283aa30a2903ebe154dad49b26067a45e46fec57549ad080d3b9ec3f272044efaaed3822d067837f5521262192f466c47195ffe7f75f8c7c5dcf3159ea737
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize10KB
MD530f9f69bd4cb3ca8ed4af465e6bf3b72
SHA11f7bf3625d683c1af38485d1eb39152949648749
SHA256fbb114871abc3901711a5f204cb370f1cc1602ad89fa0c8155288ec72e4eaf36
SHA512ae96746716d0b47912c191ca52db48ee40aca9591444c1f0ffbc913346be1fff1e9f71c6e66cb4c175fd308e04a504367dd56bf84920f94c65142cd8508258c2
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
80KB
MD584ef912e583e2085324aff1b1838ea02
SHA14cf9e83bb995c40e1b509090c2523954b19b31f4
SHA2568ba3b9263bbf0baf8b955e53272b90dca4c7525fd42d1368386aa95ec71a434a
SHA512b0b9fa353f413f1215bb8d49546a5914e80e96aacdc675c085371ea9f6797e332b77655f96abb99fff4105020f12f32a8b8ad36078a0f68de65bdb724995e56b
-
Filesize
247KB
MD5f18639f02d445b5cc056e9d2ea176e33
SHA1e4eebf1f7f720b278db0442e548204ec00adc7e9
SHA25686977b7263eb6f0fa44b82a361665bcdf5a94d92d58cd5c2dea6c4ab24591a76
SHA512eac68a7c9e2f897708fbc42ec8f131dede51db89898a3a97ce344ad2022a50314b08677a9fe13ca7e5c965bbc1f74428d72705397129209eac1a8d940fb0c140
-
Filesize
301KB
MD5a90db60657baae3ea6a744d3bd7583dd
SHA14849fecac6640179390d4fc3aecd14e3bc9b1169
SHA256e73b0ceedc33ed7d3c5a4ee24a4cb2fe427a710749febb84e1e61c147e24d5be
SHA51208fb08ccee2139c4b615dc05bfb73459c67db8732cc75804112a938a4694126b7fcee44f915d57cadfe95a8f9b4a5f04b7384c59486342b982f304f8a21b9f0b
-
Filesize
10KB
MD5a0069c575766dcaa939185465ee67385
SHA14aca3db469eca00e7149ee530b4ebb4f7f83ebb1
SHA256d507f03512ef93e552e5b2d03708cd1b025fa460f180cf4e15e31205cc10db8c
SHA512a7d8de482d7e23e9ee8ed102b515ca5bbbf2f06cc4cf645f717dc1c87b50a52bf5ef381a03d41a5376b471f5cff7bbeb12433a0785d7fd2b85296379fb18344e
-
Filesize
488KB
MD5b5df1bdc6f983288a3f69e3839b549cb
SHA1ac08d27211a1c5a3a3373209f288e511cb5d782a
SHA25656738974652ee1a319fc07136eeddb7d734efe21e85fa4c0828f7971847097ea
SHA5120355b37b5e3eb8bd93230fe9ce9eaf1bca762d0be3591a25fc1223222aabf922306a10ad9d43ea78c9345d59b1bfe3e9e4ec65ce2d350fd8feb2d782be5ac556
-
Filesize
462KB
MD5d98b6194b0857f0a2887314b231316f9
SHA1a431ad3431ce056ffd21ab6910c19371bd1068ca
SHA256d056541b95ce4ec4286589c13c003678220c2631c82414d688c9ae9eaca383e9
SHA512c0b5d7806c1f8fb9ba6b03ab756d22f099d3e074a0eaf98fde2b1de85699120fa7171bc6772fe8400aa0c2da480d1c3b49fd762ace9b531aede0150372534dca
-
Filesize
207KB
MD525fa4df20afe568b4139aef46c487f5f
SHA152197790487463f0cb7dcf40aaefa6b93c6ba6d0
SHA25612bddcdf045eb46578a3fa5f492d81353268dc7c74ea62c3eae00d9bc6a1e058
SHA512f13ba33f27d812569d0c8c2ee3850ebece6442769df5d9b31c5ce35030dbdf2ccd24d87cef5ea7aec2303f58b05eda407da87e8983e5d074d8c2c72fa26d2104
-
Filesize
274KB
MD5bbd23585eca8df536f28d7d38fbbdf40
SHA109d95aeccea71ec67246d3dc9f5c4dc887500283
SHA2568023768a9d94c393756751f5086df28ed7355fc9fa71e0f9d00631596e9ccd38
SHA512901e597825153117e7ea24726fbfc861cbfb039f65d315bebc009e8ae528da2c7dc52367479e89a4ed40aba6a0f2c97ca9c4c5c42e1827afe7ed9a0db05d6bfa
-
Filesize
341KB
MD55e9cec64421f8ec6cfecb079d4be4233
SHA113022eab7308891af9c74e95e2b0af8112008d35
SHA256142215cb8584c8a824b27a23762eaa609fd6f1e459716db86cfb848d02ee5c7f
SHA5120291a286f1868f2c7c4f51566ea350474604e153b6206297ea428ddda9df916bf62a6af5939b052d2e6790aab518f8bd7ae807d50fe042c70c55d541189f5d77
-
Filesize
529KB
MD5c68e94aa237cb4cc1aa41e4c21665f03
SHA1ed50b7b9ebf29dd1be2db03f55fb4e913367d8d7
SHA2565cec809feced0af0ab6cd1c94b81c09c0ec7b6bd0caed4245d23077f75d09aae
SHA5123ae3a462a8785c7c9aa9a18fe540a14905f091d5602b7778ef356952741123d27486d7c22af2a6fa7ab8843c8fd16545699225f29a52f8da6d78fc74a83eacde
-
Filesize
314KB
MD5b88f4d868019de75c9f03e85b4b6b9a1
SHA142cb0a539de3f76d5db17994ca07b70945f1178c
SHA25602b539876bdf6cbcede8fd3e4e70337975d104e356bdf5970af818c7371aee1b
SHA51232d68fb213ebe38a2cb51b6625cafaf6506e632e95a2d51118b70d3e3efa4ff313c131df2777c51f573b46eccb58aa7ce854ef3db02fea7342a41116ebdb452e
-
Filesize
234KB
MD5c880b36d1ea85a0a8c13a9252c654790
SHA1a4e717c7c5932cd167cff2d8824d0359cb0c8964
SHA256b1c8d3aaca4ab81962d5a964b7c9cdb2a6f5ec788304fdb441aba088ce0f86cd
SHA5123d48875f1753d47fcceb0a32ba3101cc2f04af4cdc0aca754b9ca332b979db3a788d35c1e152d644605d786edd64c375f0f4710ee7f1a76ae16f37ffabe4e85a
-
Filesize
220KB
MD53773184c83ec2f0a57eac6614a07a6e1
SHA1997e3dacad7834b35d5cecb0eb82eb09880f77cc
SHA256a79a80010957331f8209e656f1655f718df5b4420767a8a2c7af2c4bd5dea9f9
SHA5128c1a7d60f06710bcac29bde05b3628c7a47fe3efdd6990e7e1d37f324f85b098f68473e2cad066ca4f1763bbb2911d65005417e04a1ee4716a885a4cb001c02f
-
Filesize
368KB
MD544fa7f740edc5a258b4c4152dbdb7d91
SHA1012d15aaf381edbfd632119bfdcc86be5939e33e
SHA256df1486092247b3d0dbfb743e4b9433486706760ce527efcd4d12a1810805ad72
SHA51222adaebacca34c85c8ccf87a955cb6225047ef4eb92e726b9104806550d541b87f4d0fcb8f895932cbc255740c4a1af8ad271f379ed6cf109a30eec1a52e9797
-
Filesize
194KB
MD5e29da7c8538a3e8392ae1a1c8ed512f8
SHA1a5f7b79b0a8ca23d16d512a7f2d721b4720c6284
SHA256d3e178f9e866a2c31432fed6a5f1b80f0652686b62ddcae697f14a8a033f834f
SHA51215d00cba1c9ef0cdad6b110460817ce299307cc42f145970eaecc7f740eb8c9dae669d5a2d1ea947b28523b714af15aa6835f1ffa6452c2ccb0665d0e684e011
-
Filesize
2KB
MD5a4cd0f222a3d61b14539d9c227844baf
SHA14896334759933ee0dd10b17c134b86fe1499d499
SHA2565cbe3f571479da0b2ea73265fc834f59918f4db33170d02fb9bed9ccbb6d1dd5
SHA5127f3e8c82ff8d5254f951bc86e3a7812848e00379314cca4144ac4b5bb340c4188b1bcead0f5b89492653d7b7d4506c3b50336008d9b67e062446998562a12f22
-
Filesize
22B
MD576cdb2bad9582d23c1f6f4d868218d6c
SHA1b04f3ee8f5e43fa3b162981b50bb72fe1acabb33
SHA2568739c76e681f900923b900c9df0ef75cf421d39cabb54650c4b9ad19b6a76d85
SHA5125e2f959f36b66df0580a94f384c5fc1ceeec4b2a3925f062d7b68f21758b86581ac2adcfdde73a171a28496e758ef1b23ca4951c05455cdae9357cc3b5a5825f
-
Filesize
408KB
MD56ae9a1a3f5b15be0428497ce013ae703
SHA14040af4cee80765e738986b5b616aedd30dd9659
SHA256164c453fedca3b068df823e19e6f1b118482130f4d08eae26af31cb21887bcdb
SHA51213818a2c970066596a726e72bbcdebe1df833864455207aaa8d3ba66e7270708a187a6f00d1464976471469f80aedaf074729ad360183cad2bbf5e5e41408f5e
-
Filesize
261KB
MD591e31e47b8fa922e661c498b471364d3
SHA1039cda747377b417bd857652a6d91ce9e9eed5f2
SHA256c5db1b01e859e064d2edf9f1ee71767252d38f1678bbcbe6aaea8f82e0fdd604
SHA51241c640fc80ab9cd4e7a83745aecb95076f5192921d9a45a0fb3dce5d89c791121daecca8e4a65c8a25b4b35fbde466eff756467ded60a2d3587490624bfd83ba
-
Filesize
395KB
MD5235b03c81ac97346e8d7a87f4291520b
SHA1a7b1593678144addfe427940279d0b25f1ecda96
SHA256d0869c060749422d0871653da05bbc7bcc545a412985c5fda89c4dd775517bef
SHA512668f9b391b9c0b2872f84bae22b454abe6b86fef4b8ccc80e1bc90336f04ddd9f11491baae4158778d75b165d374ca3b08484823115273f696916c4ccaeb3b31
-
Filesize
381KB
MD534f5a20d0987e403222534118a700fd3
SHA1cf6c89a66d3f0168c83664487074584f3ba569d6
SHA2562962976ac4cba72a9e0ab46b8b8bbbcc3b234ce7c4b081173f788d90affef0f1
SHA512da24c4cd3b88ff19f674072ba8deeb4c9e51de3ce04cc60f104d4fbd8f967aa815a670e817e9c043feab7712ac08637c1f9cd1b799f6d274f6d5cb5e512779c4
-
Filesize
448KB
MD57d403119ef397829e0a35277f1b3cdf0
SHA1a513dca5f4022417485b314186f4cf61b2d67e5a
SHA256eabcfe2995236889a1266b2b5bfb2567f8f153ee122d93f8665404f8f1373459
SHA51269fb361c4a322d31727fff1dff3f65c31aee7a4cde1e4071c934d319724f65da00759c0b4932b312eb57cdc75596909470cce4c5c4a4d536f37a0635a06bc54f
-
Filesize
475KB
MD5152ad2920c53588059a2de14430a0a5d
SHA150003b3878d49751e14e3f6ce66c5a325b325494
SHA2562dea899eaedc83084c27e46a099136e1ca351be58ab34395a90839db33458e15
SHA5120d9c000b1332771282a5565ead2ecb4e049a20e3f6454e3f1b93e98e00cd64bcf4014c9ea493448b20bdf4092a811c10fc850f5dbe608d0110714a70c909fea4
-
Filesize
502KB
MD526afc1191a683b8d2a9ee486094f877c
SHA1ee193fc0ba1d9da964eee3bd9af9a5e9fdd3d494
SHA25606129d29c448a18088b43ea7e4d50c1e1ee9673649c0e32abd87aca4465c3fe4
SHA5129b0e35646b42bd4cc1c41e5dd69f6e42297b1bf5234ad0e8732d20f35d0d93f6d4e4c0b04e6f721e578917dcd0bb204683647ef3313ddad6f19d1e92ac1db66c
-
Filesize
555KB
MD5541fc70e730fb3dafca9f7d893165cff
SHA17afdeabd5e2316ab7263911c5ee76064cfbd0d88
SHA256ebd39a89dd989828802734a9333a180ebb4b5781e4ae2c9b13c47a3537de2e4a
SHA5121dc2d8e662baa9dd1ee44fd107c74fe9c5c248246f191054ea1d10e5ad1c9c3c411a9c3b35d36dfc2b89a97148e2d284d0503c71d9e5fab7b8f96368d029696b
-
Filesize
287KB
MD54e731f917aa584fa587671fbb17797c1
SHA1e8c257018c95cccf1ef22b55243f1cd4a0c4d628
SHA25689052c353e2a8c0e5e4821f34d52a49396e51343787fba29b091d8aaaf2cd0bf
SHA512d5e983457282b8e89b717f6ce71efa756e0cbb738a2384fa2340311cf14b506ac2a2d285bf0a6ee982e49c476cd0434cd6fc3cb019bcc4ec733cc77986640a60
-
Filesize
763KB
MD55816436489515cf455d4b740f39cb248
SHA10129a02e2412fbdb4fdb24a3283cbdc50e94f413
SHA256ff2a3b751c41d053c019408e206bde5c1e10b4a1b532c8ce79e10b2375e60816
SHA512e7ebfc3b0a44d1d4a89b2784a60d6885598b4c86e378393e70135f6f142eaf1824f0f2969417ad3538b1058c95bd8f57b98c18631a7f1f86fa16abf259aa6dfa
-
Filesize
354KB
MD57740676c5c015a3da8c0b72f91a0764b
SHA183530337fa7dd99d00aa2681409e569d558ed3bd
SHA256319e7500492b6383b1da80876d05e83ccb026264ac58e49bf6810d289d6e6e8a
SHA512d3ac677987233bd9598b76f2e2e9a1d39a6ea5a274dfaeb2a7b0cbc5da328cb1be5d5a0c342e24a48d1d1c2bf2d26bf913fb2120428b149a316d8e5139c7b727
-
Filesize
515KB
MD56fadae9eb07fc02091b378d7e68ac84b
SHA12077e4420d4187ab46a44f485f925bb7721625d4
SHA256ee13eda24e5a62b8551d15cb99fdabae9dc8256ed017baf79aa535c7a01e5317
SHA512fbc5fc01a2d86e7d277488c514031390fa0862652d1413899177dc52d76139184150d9df70b1824c3357da7f9be7736b4866c967e3a9074e21db6751728500b6
-
Filesize
14KB
MD55b345096a9273a4d095881a0e5871482
SHA1e2146ca2c60c548248319a1fbf13635213d242cf
SHA256e9af552f8dd69da50f33111db9609f5185ae99069c9523729bd3f8a5df2437a0
SHA512a4f8e3c358cb1eb6957a4ae8065c37c9fb8d89720a12105d3710e535c2aeed8aea7499ca0d48da86d5a489ee8701b4edc6363d68f7f0914ca72f8d0efc441d30
-
Filesize
328KB
MD5992a3ee1bbf8e7ad2ac40b894ceebea8
SHA1657084d58b67251ffcadae97bb8a8281d38bd12a
SHA256dd909a7d9880ac33ac976930259def011a0cb9e72db929e28ca348637b4784aa
SHA5128477ba0ff4684a260dc9c8c75577548b36e6f84568efdbe2c238baff889218d779b75e588cb8ef50c54d17c0df22801cd5b218fddad6dab52549f05d68b23db2
-
Filesize
542KB
MD5ccaf1ca0e7ed9bb8219165b54c79c723
SHA124b75ca6b955a7345e9a49bf9648afb6f99a593e
SHA256fbb94ac7ad8e3af0a2d92169a6c364b1ad7e6425ec75dcce7ccb5995f982922f
SHA5129c42bce120195a23f20a3eafd2b173c686691970cc863ff922fefbbcf05c3741fd440644273c0a8c6e292b0d5301f6d8716f6dbe7653d2d8afb26bd2eaa579fb
-
Filesize
435KB
MD5d3db75f06ab5172ac91c0bb36cf6b3a2
SHA1971055618cd060c4fd5f8cf6fb4a59fa9e7386b2
SHA25661cf6097ae88aea2000034ea646e1d0bbe8c59ed1e6a7ba7b11f49d7f935324d
SHA51277d052e4c2d9440a838f4dc8dfa0d3293e8d02a90b83ff8f7ea77605f33573cc38992482b4ad34b10543e5e10f95342c029531c070c1d5f44a7f8202d2640dc9
-
Filesize
18KB
MD59a404e99029f880e452d4395b5df470b
SHA1661d921cedc7d84010ec9e362e62364632726efc
SHA25638060c7fd1abf6bfdadb5688d71647a330f51c1bee7be34143c1b79d664b2395
SHA512918d7cd143d034a2964a597c88a936d172e88d844d8f819849f388a629cc410e620fad705bb712a3a64ec25fe00cf68d1ed99404fa5bc8c72e9d1bdf962fa8de
-
Filesize
15KB
MD5ad5e8b222e79050a6df5efdbc3902ff4
SHA18afb8667ae61548e93b6aefb581c65295b605a0c
SHA256f88ecb983154420d94a54c96b13037bcd35a553eff58c7e6745bdb3de4babdc9
SHA512eb877f2688bbaa0ee47c654f4677f4fcb07ba8133dfbd9e5abaddd9277759169001b4535acc47a7bf2562422fd2c12d91ffa92655a351f7a20b207deae5dbc6b
-
Filesize
421KB
MD5925c8ddd1c9d346412de2d52f6856ec7
SHA1e4a54bc574b48c0013b4246d18c4a50ddf62dffb
SHA256af52956467fe8327c09e1c74aa8458e0763c6c1082ce774c60dde31ee0330884
SHA5123428f6acb8fd5afd826ef2fdcad5ac9b902df5fcc44f7c0711e7b611abc2a2af269f8d7213abc2b3d48d25336880b3045d81b53b3d867b489e360e2050769327
-
Filesize
11.1MB
MD5ed3036173fb244e6f48eb2c0420c0ec1
SHA179293eb2c47ae02615cba5a868869eddc9bcfcfc
SHA256223d039282faae8092d2cfe5e7667ea4a3e8d2fd1e3611f36be433281634a170
SHA512918b56062f7ff1e0877e85aca8b0d175d3355fe98da7424562255324acdcd264929ec83feb10b0c05c3319c3a9fb10a9512d527c8c6e6a9a8b5500af38ba3b5a
-
C:\Users\Admin\NTUSER.DAT{2fa72cf3-34ca-11ed-acae-cbf1edc82a99}.TMContainer00000000000000000001.regtrans-ms.ENC
Filesize16B
MD5540f1d8449c802400da389a88e1ebfcf
SHA1db17189f0040b73702b1086f54178956cf0396cc
SHA256cfb398eb87665241943d0b6b1def71c858f55b96832a81542465c2ed5ba4f0d1
SHA5122261bc55457cb57d69491589f0a86797be54ac0cc3e7edca8cc42ca58b3e02908b50d14ebb4aeac645eef362f467b116292579cb38b1d30f03f2f85e761ce95f
-
Filesize
2KB
MD574d3d574bbf76b32274c20f5a4efeada
SHA14f1233f93ead2c5c74516106b3fc6acb8f366318
SHA256546d1d4251af138cc9d8579ed80aa352f7270e75fbe2a00bb713ff9e212c334b
SHA5125e6f400a77242777b36a235d68e023d33ffded2dd9f988d1204c169849d995a0aa46e2bc267429f0fd5e234d4e9bba1d9a79104c55889adc953509ed73f9cf8b
-
Filesize
1000B
MD53ce641e3b0dcb645856091154792bba9
SHA1265ca7deccb64b150a9cc7305772900c4cc7d610
SHA2565b456bc5ed47dc00b5ce358507b1adac6903612913a1cb0241baa72ba69dff25
SHA5129c3737c553481491fb2a97af96a11dc07a10549f426aa392fa39e98cecaec1aaef71fb46a92c56df5dd9691593f1c6b027a9a48037741cf74309c5f2e425116f
-
Filesize
923B
MD5d96583ff37f257a3de30e5749f3ba0b8
SHA1c9ccca544871302f3d5457915f666d96d468bdff
SHA256fe74377974241a855e9c548eb8d0dd375aa2face23cef0d0647fa65205eff4ac
SHA5122b341c6a2aeaac181b3d7c01cba1e034c2ef2a04b284173773f8343b513f25c251790d1ec6aa01eb91f9a403359092bc53f15d45b778d05640470d31c1578d96
-
Filesize
7KB
MD5de11c3dbf318faf34dada8b1adf49188
SHA1645387470c2a02219a0250329be287031739c8cc
SHA256163c49b7df3a27ed82ff7dc8603ff5e25759ed0f7d0a9d5a4c42a734e8551430
SHA512b8b5f2becf5a4bf35689be5fe884f0bbb7552272638905f178e3cc4af9eacca7d572ae9eae4037b40d307e953f5f284daa50ee89abbbc7e29e9ad4232e51852f
-
Filesize
106B
MD5b20a0a7888f049908ce398a8f776fa95
SHA1b58acd77085ee976c0adf024e107cc1f5044d8e4
SHA2563a4a5c1f10f6dbba24c58479cc4825e4e66bbd2354211a426cc84a0e2149d5d5
SHA512dc20ac28b8d204c64897ad7435547e8fb165361ce982b3597e51461b40db9c26297eb0a640e42ed2eb40b19908ea78024bbc1b5a08338e105eaaefa1738a0867
-
Filesize
42B
MD5dbb06a32a4106cdfe0902b4d83cb079a
SHA157759d6ae104cd503c284604d6c1b0930c7a50ff
SHA256a9b07d89e4f29552f295a12a17328dbdc1c6346304bb5677858a5291d8bc4e45
SHA512acc9613527514347a10b00043a4c82919b19dd535f6cc18a883af7185eb4ed6ddd763a439200573f1dbe71664c558560295a236230682c6eb646a96d8b7e9d9e
-
Filesize
66KB
MD5668d82b83f8c52c0e5368a44b7eaa5a4
SHA1069ec5b3f9ae609baafe6e59651dd361a9c6b33f
SHA256106beb7dabcde632548e4e752c3c6222936ba8ddc2cf7e4864296070bd0553e1
SHA512e475a3b75a9fbd00c80da10debf287cbfa06a7d583cbc886e42db81f9e0b32f2dc6c3676181d430699bfb2ffe0c71f5e40bd80836d5c2794840d7d1ab0d9b98d
-
Filesize
14KB
MD5c18d45d4633b1326c29458ddf99c05a1
SHA16c5e4d47d65629a1d98accffb830169962b42841
SHA2560b5754bf14cf041e27b93f7ac89ec1035c5ed9b4c2f01482585a4b887f19c6d7
SHA512c08b3bb99f7542e2829406c243887fceb94e4d5a0d5a56fb5f2a0e69e1e63957e3914ab4dad23d067e1025701e15a6ebe62b002c0c9714e37ed3919d16f495f3
-
Filesize
1KB
MD50c67566cfc337e11455b57c7aad0f99d
SHA193fb3650da854007ba8daa0cc08a3d941b98abf6
SHA2567ece821882abbc5fef68c6e538b03daa0a0653a408decaf2958b54ade27c9319
SHA512fad37bc7cb143582b9100b1fef47ea0b39086486e89f01c6b1ac17630aca9262acbbab072cabbc9b383133a66e96c70ea98f000d65ce4dfd69b637b8e4b5a938
-
Filesize
957B
MD5e45bfd106bdad85331ab81383e74158d
SHA101d0de55d1001d2f205307beb243e46638c913ed
SHA256cb05383659f8106594d7edc30481d286f95693370671a956e2e820074cfec699
SHA512f98bb9648276cf8e1e9236b6bc8e74815623d8287115955fce173fe868c4418685402eb8770a2cd6b9961ee5f22b9d5368c7b44df54edf08a60877396c4b9a65
-
Filesize
959B
MD505d4811a680820dabdc2a1ab9625ce07
SHA17fcac70c17f965efc0d85f6a3d6acf6c63d24823
SHA256b2412be19ee1235b2d9294b591450e3f2f48df390ec66e3d4b1a86994040accf
SHA512c1e3ddeb623f71807f66aeb83c06c7a16e767a92e27b426b9a953763a36d4bb4c581b5f357f064e6b5a7469b9af35f7f39b653022ae203caad5d9609ed7934f8
-
Filesize
424KB
MD5dadc489578ed824aaf6287ce34cbbc31
SHA1e3ed6e21178e021919fc8d8e29888feeb33c4990
SHA256e8ae1725b26f46854d0fe0cf8699909960eacae605c19d66308664f1d8ab9ab7
SHA5126964c49a1c168006c85223bc475145ecdbc768dafb24fdac25e100c905c508e99d92a7fed7fab0d5e618af97a56ab0a73a7c5774d560a340393ee23ab8a3a18a
-
Filesize
49KB
MD56283c8335606d2f67f242e3216d0d7c8
SHA1e59996a72ddd32ee97108c98323b6755e9e58a43
SHA25619522e05687b73626f6cc74eba546df3e82d2ba0a6071f4c05bbbd9692331938
SHA5127024960505794a8c8ce21a8fd97100397d030ead85adf21a8e5fd0acc7cf93df3c447ab3e48b053acc17521f49d38842bc2c20ffec401f3c9863ebb50636a403
-
Filesize
28KB
MD531a9f5936f645d7f2703e0bce543f28b
SHA110a4539f107bab094c43fb41c7d95a56cb490757
SHA256b82ba82ec912d1cbd8a5280b8baa0002c5ffbec27dbf83096aeebe2d260fd24c
SHA5124c8db3fcccb4dfce61ac600dd725eb4c72b650b460fa4e5aafddb8dff6cf1dd1b9cf080bd75374427250293ed939348fb6402b22972d18fbccec609984f15f0c
-
Filesize
30KB
MD5a7a79adab888ba09b6f958595aa34ece
SHA1ea9ad77140d24fb3b4019c5d5ca901905b0a9ae7
SHA2563054246df6ed163f65f97895b5fc806539788a7e798d71ed02fc3497165017bf
SHA5124f05a288b5f7bdd16a6ac9e5766104a391e0fda5dfbf0607c332c0a8695d7f3384d773c64bd2fa1136a02131ad13cb2722907d47a9d031cbb20a2f840e07a6a8
-
Filesize
28KB
MD50c4bcb55082f59fd18e8a04d898a590e
SHA17cd749149f57911eecc9ca413a48ee2632c1625f
SHA25665551e4ee242d9fe94a2f115154cf7d7ee6a21d07fb1d09150e2704740d6d751
SHA512ac83ccc83b32bf4c874e807c1946b22215256a3e602efafc9455f7375752a0245ead0d41cdf6c696e38fecb66b74bed898133ccaeb4c19ac751facb060a45ba3
-
Filesize
39KB
MD5f15cc0840f972a886480cecad2f12ccb
SHA14bb0744de02792a1883816850dc0e008b1783953
SHA2568e7c930202e91dc4dfd5bcae1defc564c0245e78538bfd5565e1ae5b2758c4ae
SHA5121d193d927317a5a64ff45f05d79d424548ffda3acd2d529c516779dcf7f5f6ede3a619ac82df89b2a1f2ca32468f425453a4105797cd66d1464820c1ed831711
-
Filesize
89KB
MD5a63c992d0d9f15a8455384c17783e5b8
SHA1d7d286d91403e2a40b3a9f7c3efc223975246296
SHA2568ed6765ab21fdf88bb02a56eec481819b70bfd630d20c3b77c308fc5104cd370
SHA512d3c2dfee2c19d055a25c951020fe7418b02eeb13555304842fcc22371fbb8705f8b78523d06e4826638bfbaf42dc1d92fbf2e9ac1227fbe9f04acfd8406f2edc
-
Filesize
109KB
MD5776ac5cf01139338be3a17941c312b4f
SHA168d67c99394987d6c759e35a969349de0581516e
SHA25690e6dd8e9c5a8642feadea6dc20807a84388c5295ae6daac075da0ed31480d90
SHA5120e99eaf7a8db97fac3a132c0a0fb879388d05651c8dbb54d4e29ba83ff619494785425d5c45a7ef3ebba66fdb8c1ecfc13a56997dab5ffe37c05e2833546e0b5