Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
28-09-2024 23:06
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://crackia.com/topic/91908-exm-tweaking-utility-premium-v10-cracked/
Resource
win11-20240802-en
General
-
Target
https://crackia.com/topic/91908-exm-tweaking-utility-premium-v10-cracked/
Malware Config
Extracted
xworm
-
Install_directory
%LocalAppData%
-
install_file
USB.exe
-
pastebin_url
https://pastebin.com/raw/ZnhxAV6a
-
telegram
https://api.telegram.org/bot7538644364:AAHEMV7mmxz6PSRgzo0ORf3_n0BaazmrAqk/sendMessage?chat_id=7541917888
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot7538644364:AAHEMV7mmxz6PSRgzo0ORf3_n0BaazmrAqk/sendMessage?chat_id=7541917888
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x0002000000025af3-496.dat family_xworm behavioral1/memory/3316-550-0x0000000000CD0000-0x0000000000CFA000-memory.dmp family_xworm -
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 2 IoCs
resource yara_rule behavioral1/files/0x0002000000025af5-523.dat family_stormkitty behavioral1/memory/4432-552-0x0000000000250000-0x000000000028E000-memory.dmp family_stormkitty -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x0002000000025af5-523.dat family_asyncrat -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\msedge.lnk msedge.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\msedge.lnk msedge.exe -
Executes dropped EXE 4 IoCs
pid Process 3900 EXMservice.exe 3316 msedge.exe 4432 svchost.exe 3324 msedge.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 7 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\dccc7b2e6bd7e4e58e327adc076b1ca1\Admin@LBPSYPUR_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini svchost.exe File created C:\Users\Admin\AppData\Local\dccc7b2e6bd7e4e58e327adc076b1ca1\Admin@LBPSYPUR_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini svchost.exe File created C:\Users\Admin\AppData\Local\dccc7b2e6bd7e4e58e327adc076b1ca1\Admin@LBPSYPUR_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Camera Roll\desktop.ini svchost.exe File created C:\Users\Admin\AppData\Local\dccc7b2e6bd7e4e58e327adc076b1ca1\Admin@LBPSYPUR_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Saved Pictures\desktop.ini svchost.exe File created C:\Users\Admin\AppData\Local\dccc7b2e6bd7e4e58e327adc076b1ca1\Admin@LBPSYPUR_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Local\dccc7b2e6bd7e4e58e327adc076b1ca1\Admin@LBPSYPUR_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini svchost.exe File created C:\Users\Admin\AppData\Local\dccc7b2e6bd7e4e58e327adc076b1ca1\Admin@LBPSYPUR_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini svchost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 15 IoCs
flow ioc 112 pastebin.com 87 pastebin.com 88 pastebin.com 97 pastebin.com 99 pastebin.com 109 pastebin.com 110 pastebin.com 84 pastebin.com 98 pastebin.com 114 pastebin.com 91 pastebin.com 102 pastebin.com 104 pastebin.com 106 pastebin.com 107 pastebin.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 84 icanhazip.com -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
pid Process 4424 powershell.exe 3212 powershell.exe 2888 powershell.exe 2516 powershell.exe 3136 powershell.exe 1952 powershell.exe 2088 powershell.exe 1416 powershell.exe 1440 powershell.exe 556 powershell.exe 1008 powershell.exe 1480 powershell.exe 4060 powershell.exe 3880 powershell.exe 1480 powershell.exe 1596 powershell.exe 2592 powershell.exe 4228 powershell.exe 2132 powershell.exe 4824 powershell.exe 1816 powershell.exe 2876 powershell.exe 1008 powershell.exe 684 powershell.exe 3192 powershell.exe 4368 powershell.exe 4916 powershell.exe 2072 powershell.exe 388 powershell.exe 1648 powershell.exe 2108 powershell.exe 1320 powershell.exe 1868 powershell.exe 1252 powershell.exe 3700 powershell.exe 4456 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 5088 cmd.exe 3948 netsh.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier svchost.exe -
Delays execution with timeout.exe 32 IoCs
pid Process 4024 timeout.exe 5060 timeout.exe 4640 timeout.exe 2664 timeout.exe 4356 timeout.exe 3712 timeout.exe 3596 timeout.exe 4952 timeout.exe 4148 timeout.exe 2148 timeout.exe 3868 timeout.exe 4464 timeout.exe 1060 timeout.exe 3168 timeout.exe 2684 timeout.exe 3416 timeout.exe 1284 timeout.exe 4364 timeout.exe 5012 timeout.exe 1112 timeout.exe 1524 timeout.exe 5060 timeout.exe 776 timeout.exe 1204 timeout.exe 564 timeout.exe 1832 timeout.exe 4140 timeout.exe 5108 timeout.exe 3148 timeout.exe 4356 timeout.exe 3648 timeout.exe 4764 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 217070.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\EXM_Premium_Tweaking_Utility_1.0_Cracked.bat:Zone.Identifier msedge.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1176 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2028 msedge.exe 2028 msedge.exe 3460 msedge.exe 3460 msedge.exe 4452 identity_helper.exe 4452 identity_helper.exe 2084 msedge.exe 2084 msedge.exe 1728 msedge.exe 1728 msedge.exe 4060 powershell.exe 4060 powershell.exe 1648 powershell.exe 1648 powershell.exe 4432 svchost.exe 4432 svchost.exe 4432 svchost.exe 4432 svchost.exe 4432 svchost.exe 4432 svchost.exe 4432 svchost.exe 4432 svchost.exe 4432 svchost.exe 4432 svchost.exe 4432 svchost.exe 4432 svchost.exe 4432 svchost.exe 4432 svchost.exe 4432 svchost.exe 4432 svchost.exe 4432 svchost.exe 4432 svchost.exe 4432 svchost.exe 1416 powershell.exe 1416 powershell.exe 1252 powershell.exe 1252 powershell.exe 3136 powershell.exe 3136 powershell.exe 1008 powershell.exe 1008 powershell.exe 1596 powershell.exe 1596 powershell.exe 2108 powershell.exe 2108 powershell.exe 1952 powershell.exe 1952 powershell.exe 1440 powershell.exe 1440 powershell.exe 4456 powershell.exe 4456 powershell.exe 3700 powershell.exe 3700 powershell.exe 2592 powershell.exe 2592 powershell.exe 556 powershell.exe 556 powershell.exe 4916 powershell.exe 4916 powershell.exe 4228 powershell.exe 4228 powershell.exe 1480 powershell.exe 1480 powershell.exe 4424 powershell.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 14 IoCs
pid Process 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4060 powershell.exe Token: SeIncreaseQuotaPrivilege 3024 WMIC.exe Token: SeSecurityPrivilege 3024 WMIC.exe Token: SeTakeOwnershipPrivilege 3024 WMIC.exe Token: SeLoadDriverPrivilege 3024 WMIC.exe Token: SeSystemProfilePrivilege 3024 WMIC.exe Token: SeSystemtimePrivilege 3024 WMIC.exe Token: SeProfSingleProcessPrivilege 3024 WMIC.exe Token: SeIncBasePriorityPrivilege 3024 WMIC.exe Token: SeCreatePagefilePrivilege 3024 WMIC.exe Token: SeBackupPrivilege 3024 WMIC.exe Token: SeRestorePrivilege 3024 WMIC.exe Token: SeShutdownPrivilege 3024 WMIC.exe Token: SeDebugPrivilege 3024 WMIC.exe Token: SeSystemEnvironmentPrivilege 3024 WMIC.exe Token: SeRemoteShutdownPrivilege 3024 WMIC.exe Token: SeUndockPrivilege 3024 WMIC.exe Token: SeManageVolumePrivilege 3024 WMIC.exe Token: 33 3024 WMIC.exe Token: 34 3024 WMIC.exe Token: 35 3024 WMIC.exe Token: 36 3024 WMIC.exe Token: SeIncreaseQuotaPrivilege 3024 WMIC.exe Token: SeSecurityPrivilege 3024 WMIC.exe Token: SeTakeOwnershipPrivilege 3024 WMIC.exe Token: SeLoadDriverPrivilege 3024 WMIC.exe Token: SeSystemProfilePrivilege 3024 WMIC.exe Token: SeSystemtimePrivilege 3024 WMIC.exe Token: SeProfSingleProcessPrivilege 3024 WMIC.exe Token: SeIncBasePriorityPrivilege 3024 WMIC.exe Token: SeCreatePagefilePrivilege 3024 WMIC.exe Token: SeBackupPrivilege 3024 WMIC.exe Token: SeRestorePrivilege 3024 WMIC.exe Token: SeShutdownPrivilege 3024 WMIC.exe Token: SeDebugPrivilege 3024 WMIC.exe Token: SeSystemEnvironmentPrivilege 3024 WMIC.exe Token: SeRemoteShutdownPrivilege 3024 WMIC.exe Token: SeUndockPrivilege 3024 WMIC.exe Token: SeManageVolumePrivilege 3024 WMIC.exe Token: 33 3024 WMIC.exe Token: 34 3024 WMIC.exe Token: 35 3024 WMIC.exe Token: 36 3024 WMIC.exe Token: SeDebugPrivilege 1648 powershell.exe Token: SeDebugPrivilege 3316 msedge.exe Token: SeDebugPrivilege 4432 svchost.exe Token: SeDebugPrivilege 1416 powershell.exe Token: SeDebugPrivilege 1252 powershell.exe Token: SeDebugPrivilege 3136 powershell.exe Token: SeDebugPrivilege 1008 powershell.exe Token: SeDebugPrivilege 1596 powershell.exe Token: SeDebugPrivilege 2108 powershell.exe Token: SeDebugPrivilege 1952 powershell.exe Token: SeDebugPrivilege 1440 powershell.exe Token: SeDebugPrivilege 4456 powershell.exe Token: SeDebugPrivilege 3700 powershell.exe Token: SeDebugPrivilege 2592 powershell.exe Token: SeDebugPrivilege 556 powershell.exe Token: SeDebugPrivilege 4916 powershell.exe Token: SeDebugPrivilege 4228 powershell.exe Token: SeDebugPrivilege 1480 powershell.exe Token: SeDebugPrivilege 4424 powershell.exe Token: SeDebugPrivilege 3212 powershell.exe Token: SeDebugPrivilege 2132 powershell.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
pid Process 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3460 wrote to memory of 2712 3460 msedge.exe 78 PID 3460 wrote to memory of 2712 3460 msedge.exe 78 PID 3460 wrote to memory of 952 3460 msedge.exe 79 PID 3460 wrote to memory of 952 3460 msedge.exe 79 PID 3460 wrote to memory of 952 3460 msedge.exe 79 PID 3460 wrote to memory of 952 3460 msedge.exe 79 PID 3460 wrote to memory of 952 3460 msedge.exe 79 PID 3460 wrote to memory of 952 3460 msedge.exe 79 PID 3460 wrote to memory of 952 3460 msedge.exe 79 PID 3460 wrote to memory of 952 3460 msedge.exe 79 PID 3460 wrote to memory of 952 3460 msedge.exe 79 PID 3460 wrote to memory of 952 3460 msedge.exe 79 PID 3460 wrote to memory of 952 3460 msedge.exe 79 PID 3460 wrote to memory of 952 3460 msedge.exe 79 PID 3460 wrote to memory of 952 3460 msedge.exe 79 PID 3460 wrote to memory of 952 3460 msedge.exe 79 PID 3460 wrote to memory of 952 3460 msedge.exe 79 PID 3460 wrote to memory of 952 3460 msedge.exe 79 PID 3460 wrote to memory of 952 3460 msedge.exe 79 PID 3460 wrote to memory of 952 3460 msedge.exe 79 PID 3460 wrote to memory of 952 3460 msedge.exe 79 PID 3460 wrote to memory of 952 3460 msedge.exe 79 PID 3460 wrote to memory of 952 3460 msedge.exe 79 PID 3460 wrote to memory of 952 3460 msedge.exe 79 PID 3460 wrote to memory of 952 3460 msedge.exe 79 PID 3460 wrote to memory of 952 3460 msedge.exe 79 PID 3460 wrote to memory of 952 3460 msedge.exe 79 PID 3460 wrote to memory of 952 3460 msedge.exe 79 PID 3460 wrote to memory of 952 3460 msedge.exe 79 PID 3460 wrote to memory of 952 3460 msedge.exe 79 PID 3460 wrote to memory of 952 3460 msedge.exe 79 PID 3460 wrote to memory of 952 3460 msedge.exe 79 PID 3460 wrote to memory of 952 3460 msedge.exe 79 PID 3460 wrote to memory of 952 3460 msedge.exe 79 PID 3460 wrote to memory of 952 3460 msedge.exe 79 PID 3460 wrote to memory of 952 3460 msedge.exe 79 PID 3460 wrote to memory of 952 3460 msedge.exe 79 PID 3460 wrote to memory of 952 3460 msedge.exe 79 PID 3460 wrote to memory of 952 3460 msedge.exe 79 PID 3460 wrote to memory of 952 3460 msedge.exe 79 PID 3460 wrote to memory of 952 3460 msedge.exe 79 PID 3460 wrote to memory of 952 3460 msedge.exe 79 PID 3460 wrote to memory of 2028 3460 msedge.exe 80 PID 3460 wrote to memory of 2028 3460 msedge.exe 80 PID 3460 wrote to memory of 4304 3460 msedge.exe 81 PID 3460 wrote to memory of 4304 3460 msedge.exe 81 PID 3460 wrote to memory of 4304 3460 msedge.exe 81 PID 3460 wrote to memory of 4304 3460 msedge.exe 81 PID 3460 wrote to memory of 4304 3460 msedge.exe 81 PID 3460 wrote to memory of 4304 3460 msedge.exe 81 PID 3460 wrote to memory of 4304 3460 msedge.exe 81 PID 3460 wrote to memory of 4304 3460 msedge.exe 81 PID 3460 wrote to memory of 4304 3460 msedge.exe 81 PID 3460 wrote to memory of 4304 3460 msedge.exe 81 PID 3460 wrote to memory of 4304 3460 msedge.exe 81 PID 3460 wrote to memory of 4304 3460 msedge.exe 81 PID 3460 wrote to memory of 4304 3460 msedge.exe 81 PID 3460 wrote to memory of 4304 3460 msedge.exe 81 PID 3460 wrote to memory of 4304 3460 msedge.exe 81 PID 3460 wrote to memory of 4304 3460 msedge.exe 81 PID 3460 wrote to memory of 4304 3460 msedge.exe 81 PID 3460 wrote to memory of 4304 3460 msedge.exe 81 PID 3460 wrote to memory of 4304 3460 msedge.exe 81 PID 3460 wrote to memory of 4304 3460 msedge.exe 81 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://crackia.com/topic/91908-exm-tweaking-utility-premium-v10-cracked/1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x104,0x108,0x10c,0x100,0x110,0x7ffd4a813cb8,0x7ffd4a813cc8,0x7ffd4a813cd82⤵PID:2712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1892,12639625851887268372,17171717507898806332,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1916 /prefetch:22⤵PID:952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1892,12639625851887268372,17171717507898806332,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2084 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1892,12639625851887268372,17171717507898806332,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2540 /prefetch:82⤵PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,12639625851887268372,17171717507898806332,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3512 /prefetch:12⤵PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,12639625851887268372,17171717507898806332,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3532 /prefetch:12⤵PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,12639625851887268372,17171717507898806332,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:12⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,12639625851887268372,17171717507898806332,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,12639625851887268372,17171717507898806332,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:12⤵PID:3428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1892,12639625851887268372,17171717507898806332,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5516 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,12639625851887268372,17171717507898806332,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1892,12639625851887268372,17171717507898806332,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5616 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,12639625851887268372,17171717507898806332,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,12639625851887268372,17171717507898806332,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5740 /prefetch:12⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,12639625851887268372,17171717507898806332,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5948 /prefetch:12⤵PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,12639625851887268372,17171717507898806332,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5964 /prefetch:12⤵PID:236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,12639625851887268372,17171717507898806332,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5740 /prefetch:12⤵PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,12639625851887268372,17171717507898806332,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6192 /prefetch:12⤵PID:2136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,12639625851887268372,17171717507898806332,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3712 /prefetch:12⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,12639625851887268372,17171717507898806332,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6184 /prefetch:12⤵PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1892,12639625851887268372,17171717507898806332,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6128 /prefetch:82⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:1728
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2884
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3872
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:892
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Downloads\EXM_Premium_Tweaking_Utility_1.0_Cracked.bat" "1⤵PID:4816
-
C:\Windows\system32\reg.exeReg.exe delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\SystemRestore" /v "RPSessionInterval" /f2⤵PID:3100
-
-
C:\Windows\system32\reg.exeReg.exe delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\SystemRestore" /v "DisableConfig" /f2⤵PID:4360
-
-
C:\Windows\system32\reg.exeReg.exe add "HKLM\Software\Microsoft\Windows NT\CurrentVersion\SystemRestore" /v "SystemRestorePointCreationFrequency" /t REG_DWORD /d 0 /f2⤵PID:1336
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ExecutionPolicy Unrestricted -NoProfile Enable-ComputerRestore -Drive 'C:\'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4060
-
-
C:\Windows\system32\reg.exeReg.exe ADD "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d "0" /f2⤵
- UAC bypass
PID:276
-
-
C:\Windows\system32\reg.exeReg.exe add "HKCU\CONSOLE" /v "VirtualTerminalLevel" /t REG_DWORD /d "1" /f2⤵PID:2884
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic path Win32_UserAccount where name="Admin" get sid | findstr "S-"2⤵PID:2124
-
C:\Windows\System32\Wbem\WMIC.exewmic path Win32_UserAccount where name="Admin" get sid3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3024
-
-
C:\Windows\system32\findstr.exefindstr "S-"3⤵PID:4408
-
-
-
C:\Windows\system32\chcp.comchcp 650012⤵PID:2888
-
-
C:\Windows\system32\chcp.comchcp 4372⤵PID:684
-
-
C:\Windows\system32\curl.execurl -g -k -L -# -o "C:\Users\Admin\AppData\Local\Temp\exm.zip" "https://github.com/anonyketa/EXM-Tweaking-Utility-Premium/releases/download/V1.0/exm.zip"2⤵PID:1008
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -NoProfile Expand-Archive 'C:\Users\Admin\AppData\Local\Temp\exm.zip' -DestinationPath 'C:\Exm\'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1648
-
-
C:\exm\EXMservice.exeEXMservice.exe2⤵
- Executes dropped EXE
PID:3900 -
C:\Users\Admin\msedge.exe"C:\Users\Admin\msedge.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3316 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "msedge" /tr "C:\Users\Admin\AppData\Local\msedge.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:1176
-
-
-
C:\Users\Admin\svchost.exe"C:\Users\Admin\svchost.exe"3⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4432 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All4⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
PID:5088 -
C:\Windows\SysWOW64\chcp.comchcp 650015⤵
- System Location Discovery: System Language Discovery
PID:1276
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile5⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
PID:3948
-
-
C:\Windows\SysWOW64\findstr.exefindstr All5⤵
- System Location Discovery: System Language Discovery
PID:2912
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid4⤵
- System Location Discovery: System Language Discovery
PID:4600 -
C:\Windows\SysWOW64\chcp.comchcp 650015⤵
- System Location Discovery: System Language Discovery
PID:1728
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid5⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2784
-
-
-
-
-
C:\Windows\system32\chcp.comchcp 650012⤵PID:4964
-
-
C:\Windows\system32\chcp.comchcp 4372⤵PID:420
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell.exe -command "& {Get-AppxPackage *Microsoft.BingWeather* | Remove-AppxPackage}2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1416
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak2⤵
- Delays execution with timeout.exe
PID:5060
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell.exe -command "& {Get-AppxPackage *Microsoft.GetHelp* | Remove-AppxPackage}2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1252
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak2⤵
- Delays execution with timeout.exe
PID:5108
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell.exe -command "& {Get-AppxPackage *Microsoft.Getstarted* | Remove-AppxPackage}2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3136
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak2⤵
- Delays execution with timeout.exe
PID:776
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell.exe -command "& {Get-AppxPackage *Microsoft.Messaging* | Remove-AppxPackage}2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1008
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak2⤵
- Delays execution with timeout.exe
PID:3148
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell.exe -command "& {Get-AppxPackage *Microsoft.Microsoft3DViewer* | Remove-AppxPackage}2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1596
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak2⤵
- Delays execution with timeout.exe
PID:1204
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell.exe -command "& {Get-AppxPackage *Microsoft.MicrosoftSolitaireCollection* | Remove-AppxPackage}2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2108
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak2⤵
- Delays execution with timeout.exe
PID:4356
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell.exe -command "& {Get-AppxPackage *Microsoft.MicrosoftStickyNotes* | Remove-AppxPackage}2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1952
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak2⤵
- Delays execution with timeout.exe
PID:4764
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell.exe -command "& {Get-AppxPackage *Microsoft.MixedReality.Portal* | Remove-AppxPackage}2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1440
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak2⤵
- Delays execution with timeout.exe
PID:5012
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell.exe -command "& {Get-AppxPackage *Microsoft.OneConnect* | Remove-AppxPackage}2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4456
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak2⤵
- Delays execution with timeout.exe
PID:3168
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell.exe -command "& {Get-AppxPackage *Microsoft.People* | Remove-AppxPackage}2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3700
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak2⤵
- Delays execution with timeout.exe
PID:564
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell.exe -command "& {Get-AppxPackage *Microsoft.Print3D* | Remove-AppxPackage}2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2592
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak2⤵
- Delays execution with timeout.exe
PID:1832
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell.exe -command "& {Get-AppxPackage *Microsoft.SkypeApp* | Remove-AppxPackage}2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:556
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak2⤵
- Delays execution with timeout.exe
PID:2684
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell.exe -command "& {Get-AppxPackage *Microsoft.WindowsAlarms* | Remove-AppxPackage}2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4916
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell.exe -command "& {Get-AppxPackage *Microsoft.WindowsCamera* | Remove-AppxPackage}2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4228
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak2⤵
- Delays execution with timeout.exe
PID:4024
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell.exe -command "& {Get-AppxPackage *microsoft.windowscommunicationsapps* | Remove-AppxPackage}2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1480
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak2⤵
- Delays execution with timeout.exe
PID:4952
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell.exe -command "& {Get-AppxPackage *Microsoft.WindowsMaps* | Remove-AppxPackage}2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4424
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak2⤵
- Delays execution with timeout.exe
PID:1112
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell.exe -command "& {Get-AppxPackage *Microsoft.WindowsFeedbackHub* | Remove-AppxPackage}2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:3212
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak2⤵
- Delays execution with timeout.exe
PID:3416
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell.exe -command "& {Get-AppxPackage *Microsoft.WindowsSoundRecorder* | Remove-AppxPackage}2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2132
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak2⤵
- Delays execution with timeout.exe
PID:5060
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell.exe -command "& {Get-AppxPackage *Microsoft.YourPhone* | Remove-AppxPackage}2⤵
- Command and Scripting Interpreter: PowerShell
PID:2888
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak2⤵
- Delays execution with timeout.exe
PID:1060
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell.exe -command "& {Get-AppxPackage *Microsoft.ZuneMusic* | Remove-AppxPackage}2⤵
- Command and Scripting Interpreter: PowerShell
PID:4824
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak2⤵
- Delays execution with timeout.exe
PID:4148
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell.exe -command "& {Get-AppxPackage *Microsoft.HEIFImageExtension* | Remove-AppxPackage}2⤵
- Command and Scripting Interpreter: PowerShell
PID:3880
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak2⤵
- Delays execution with timeout.exe
PID:3712
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell.exe -command "& {Get-AppxPackage *Microsoft.WebMediaExtensions* | Remove-AppxPackage}2⤵
- Command and Scripting Interpreter: PowerShell
PID:2072
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak2⤵
- Delays execution with timeout.exe
PID:3596
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell.exe -command "& {Get-AppxPackage *Microsoft.WebpImageExtension* | Remove-AppxPackage}2⤵
- Command and Scripting Interpreter: PowerShell
PID:2088
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak2⤵
- Delays execution with timeout.exe
PID:4356
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell.exe -command "& {Get-AppxPackage *Microsoft.3dBuilder* | Remove-AppxPackage}2⤵
- Command and Scripting Interpreter: PowerShell
PID:2516
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak2⤵
- Delays execution with timeout.exe
PID:2148
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -Command "Get-AppxPackage -allusers *bing* | Remove-AppxPackage"2⤵
- Command and Scripting Interpreter: PowerShell
PID:1816
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak2⤵
- Delays execution with timeout.exe
PID:3868
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -Command "Get-AppxPackage -allusers *bingfinance* | Remove-AppxPackage"2⤵
- Command and Scripting Interpreter: PowerShell
PID:2876
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak2⤵
- Delays execution with timeout.exe
PID:1284
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -Command "Get-AppxPackage -allusers *bingsports* | Remove-AppxPackage"2⤵
- Command and Scripting Interpreter: PowerShell
PID:4368
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak2⤵
- Delays execution with timeout.exe
PID:1524
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak2⤵
- Delays execution with timeout.exe
PID:3648
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -Command "Get-AppxPackage -allusers *CommsPhone* | Remove-AppxPackage"2⤵
- Command and Scripting Interpreter: PowerShell
PID:684
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak2⤵
- Delays execution with timeout.exe
PID:4640
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -Command "Get-AppxPackage -allusers *Drawboard PDF* | Remove-AppxPackage"2⤵
- Command and Scripting Interpreter: PowerShell
PID:388
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak2⤵
- Delays execution with timeout.exe
PID:4364
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -Command "Get-AppxPackage -allusers *Sway* | Remove-AppxPackage"2⤵
- Command and Scripting Interpreter: PowerShell
PID:1008
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak2⤵
- Delays execution with timeout.exe
PID:4464
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -Command "Get-AppxPackage -allusers *WindowsAlarms* | Remove-AppxPackage"2⤵
- Command and Scripting Interpreter: PowerShell
PID:1320
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -Command "Get-AppxPackage -allusers *WindowsPhone* | Remove-AppxPackage"2⤵
- Command and Scripting Interpreter: PowerShell
PID:1480
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak2⤵
- Delays execution with timeout.exe
PID:4140
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -Command "Get-AppxPackage -allusers *zune* | Remove-AppxPackage"2⤵
- Command and Scripting Interpreter: PowerShell
PID:1868
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak2⤵
- Delays execution with timeout.exe
PID:2664
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -Command "Get-AppxPackage Microsoft.MicrosoftEdge_41.16299.1004.0_netural__8wekyb3d8bbwe|Remove-AppxPackage"2⤵
- Command and Scripting Interpreter: PowerShell
PID:3192
-
-
C:\Windows\system32\chcp.comchcp 650012⤵PID:1060
-
-
C:\Users\Admin\AppData\Local\msedge.exeC:\Users\Admin\AppData\Local\msedge.exe1⤵
- Executes dropped EXE
PID:3324
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5B
MD5d276fd6b6eeeb1987e76d0388d813b9f
SHA1354c4f5863ef537c01f92b28f6d75e03010f9c75
SHA25635707f17136e25c293287356e308d7cb982521f8d8bd3f85d7894fce9346359c
SHA51204743373ed3fb06cb7e3e024823753737d305b467eea1e8f1cdc8536dad78efe703688e3ad810c556a10816d3e3a52f4dedfb9ff0d3f1141794cd46552433a47
-
Filesize
2KB
MD588dc70c361a22feac57b031dd9c1f02f
SHA1a9b4732260c2a323750022a73480f229ce25d46d
SHA25643244c0820ec5074e654ecd149fa744f51b2c1522e90285567713dae64b62f59
SHA51219c0532741ebc9751390e6c5ca593a81493652f25c74c8cab29a8b5b1f1efef8d511254a04f50b0c4a20724bae10d96d52af7a76b0c85ddc5f020d4cac41100c
-
Filesize
152B
MD5d30a5618854b9da7bcfc03aeb0a594c4
SHA17f37105d7e5b1ecb270726915956c2271116eab7
SHA2563494c446aa3cb038f1d920b26910b7fe1f4286db78cb3f203ad02cb93889c1a8
SHA512efd488fcd1729017a596ddd2950bff07d5a11140cba56ff8e0c62ef62827b35c22857bc4f5f5ea11ccc2e1394c0b3ee8651df62a25e66710f320e7a2cf4d1a77
-
Filesize
152B
MD503a56f81ee69dd9727832df26709a1c9
SHA1ab6754cc9ebd922ef3c37b7e84ff20e250cfde3b
SHA25665d97e83b315d9140f3922b278d08352809f955e2a714fedfaea6283a5300e53
SHA512e9915f11e74c1bcf7f80d1bcdc8175df820af30f223a17c0fe11b6808e5a400550dcbe59b64346b7741c7c77735abefaf2c988753e11d086000522a05a0f7781
-
Filesize
32KB
MD53a424bb561ae752690676fefb1bceb8f
SHA13d56a08693e150b38ce6ffcdc3d772a5b52f8ca2
SHA25653fc575fab4674e387d7ee82cfac0958744e8890d951ab96761057d4e88c9fef
SHA5129674cfa1f800d71678ff3f9ebf623c9c188f4467a8aec02c7ef5704b34866d751b1c6254f46fae86138e45035083de220f6658f8d0ae0df5b4e5aeb787a1edc1
-
Filesize
213KB
MD5f942900ff0a10f251d338c612c456948
SHA14a283d3c8f3dc491e43c430d97c3489ee7a3d320
SHA25638b76a54655aff71271a9ad376ac17f20187abd581bf5aced69ccde0fe6e2fd6
SHA5129b393ce73598ed1997d28ceeddb23491a4d986c337984878ebb0ae06019e30ea77448d375d3d6563c774856d6bc98ee3ca0e0ba88ea5769a451a5e814f6ddb41
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize744B
MD5778e0f8b61f9c6e401df7b179dbc77a7
SHA1dfa1c483099fb3fe19ff3948aa51b18771fd8bc5
SHA256e31b319717621b0e619df1da33b3137dd28479506a6918697083fe3bb43de77f
SHA51208dfaf259f8214802c85eaf8e183b65c0d4b8b500dc106382a98b402f2b593ec963d062f0cc59c4941fe537b28f57b79cf1e2dfbf02258aeb2be4ed743184451
-
Filesize
20KB
MD5eaf1776cb5f13c32ad7888037741c068
SHA1765dd1c393502862ff0dd29174bd0e6995a64955
SHA2564a8e836b9b3c40dc26d57af2582c92179b5c143cc9d645da6ca4ac0f18b3742e
SHA5123d099ad6f2442a9e8b9f45bfd9b5cdddd13f843dc3a125f33942926646537c09ddb3df0994d0dbb607363c6e4b9e63c26121accdb357ea7760289f0220ed2100
-
Filesize
116KB
MD5e5f970800fe388ce54a380a6bde9f5a1
SHA1016e9232f64beffaca021fccd17dcb8b2eccad64
SHA256ae23fb881ef86d5a998a5f56ce54da483002cea437cbf8c3762a36f88e03891c
SHA51241c9c7acca05b7ced96ac97fe2fe8d17e82301df9bec6a9bdb897173556895db45d67595a6cba63cb0ce672ac30e460e7278fb0addf80bb3c853bc3a37f93611
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
2KB
MD577b8eeb62f6e742e78f541e8aaca54e9
SHA19c08c316881fbcc62848ff196a55b9f5db2eb698
SHA25626cb734489276e5380a6e6cd26188b376608cd70210a4b6c9e6d860e581a7f31
SHA512f3e20e00e2f5af87a0bdc5195b20afdad0c8a28cedb0cbefb9df554cca9894fda65fe724dbb0616768196d766c9b308deb4cb1ee8845ddddbf8f619edc5ad78a
-
Filesize
5KB
MD528281835469457c27fbc62f6a6f2f7cc
SHA10bbed5f990a1f9b475a7f3dbb2c20487372eff97
SHA25658740d10087513c8bb3e29ca12f64650f1524b51ef7c297915ef27c02be69471
SHA51273dcadd2b7153c5d181dded58dc7d539caca47256211098b3bc3228313101a0a0f24c80eedbe4712d9875719f489212feb06fc76049cdc083831f8b93a730ceb
-
Filesize
6KB
MD5f4d8dee44cfe9802aaaf3bc2f6f7abc5
SHA193aa3ea5471cce87a02bdfd2b71adfebc41e54c8
SHA25601ba3d9e7d12c4c6ed146e6f745a3e3a88d4dfaa56548cda9f5d10f917e6789a
SHA51285b7576ebc3691eea771b7f105311e8cc075968e3e9d21075f047dad5fd9271d44da0aec462d6e1932fbb1dbfc744fa8663094f3271cc8f2e80a4b27f018a485
-
Filesize
7KB
MD506d7826a195ee891fe876c309dbf29bd
SHA125eb2a1be141702d4b3b33654922e05918198ccf
SHA25651fab0a80d89a84b62cf41bb948b1f1ea35f2f3ddfdcd0a2bb60758ce2fa336e
SHA5127413ac1d07fe2679d36d0a8d776bece912b9c131dc768147b2452b22f9fb888e199801ffdc333b2cda3115f62cb4e53574dc3c856ceb8e2935d989df0fb65184
-
Filesize
6KB
MD5f5579ae57d905788d0a94847de95600e
SHA14a731afa3b29c71fbe8df16a78db2d54c3e09368
SHA25615502d1f625f8cb48ac7767d8096af761dd926987af3a81f8174d6715cc09821
SHA512b63401f643ec309da3533a946afce3f16486ffb35e525d5c2770e01509c7b2e87aeb3a10b5c526aa5da50d6038ce35ab229b9733ba7b4c2a0b1ab98f41ec9784
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\7a7900728ee0d4f5a270f7a3f0e134839df593ed\fef3024c-6b5a-4f4d-a0aa-c0d79ae7f5c5\index-dir\the-real-index
Filesize72B
MD531a6d36ea2bf349895a66f5eeb8bcd6a
SHA1fe2af64d59f5782a34037c3e2205cc9b2ccadca6
SHA25656c0b91126f5c662a289ed0952570dc0e60f1cb8e5e0dbe9c0c15f21b909fc65
SHA51244f972711ee2bc2b0505d1ef774a2c8a432e6f8747d98a3dabfa76a4b17486935ac458499e854290be1413bb150ed130001c37136ac5a1240cb94d973f46bfb4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\7a7900728ee0d4f5a270f7a3f0e134839df593ed\fef3024c-6b5a-4f4d-a0aa-c0d79ae7f5c5\index-dir\the-real-index~RFe5820e1.TMP
Filesize48B
MD5f9a6f7e2ea35a4e3942b885abd4d80ab
SHA173b4c4128f45885dbe47e598c5b9a8959d0e8321
SHA2562926de5e22eefb328ac4115ff63b6b03c962691cb99d74401d5286512db6192e
SHA512812e72e426b94cb42083465f0d656089bc0ff7be0bef237a1ccbf56e088cd0e3ee6ed71b16bad4e8cba0f1719b134686516c47273afc81310743879a3b199ea2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\7a7900728ee0d4f5a270f7a3f0e134839df593ed\index.txt
Filesize116B
MD5d9743326d1ce03e6930ec3a6f6a4f78d
SHA13864e32122c3abe08423f4be7ae112fc2477cb8d
SHA256b3ebf4c054deea8b2039b2f8bb6f40643324be7292fb9c6a6a8716018d4d0fbe
SHA512dffd525fd83a94378dc2c6f9cfb66a963c11a1da644494c30f649af76b8a190ebf77b82bf854a7becbc7d6ea1fc57e60f44dc24bf49baaecb19d38d9a01cca98
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\7a7900728ee0d4f5a270f7a3f0e134839df593ed\index.txt
Filesize110B
MD59350d83b9dbfcdc5f21a69705e89935c
SHA16866b2984821ad2c341c9ae79d396fe4b6d3a1d4
SHA256dc57711a525fe28ff416a5e695a97ac459d13ec151209978b07b0f4ee67b2040
SHA512d18ceb71880cb9ac465a6e4402f3bb7245a7d576bffa0fda2dc00e311c1ef1aeab8e66fdc2ade65add5f27f2943a7624b3304865e59f834fc5872b8984d5b8e1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5ec49f7dafaa0c12ac772fce53b8f8fa6
SHA1aece1efa4695138ac84041b50a485e76bfa23ffe
SHA256448db60cdd0b466dab5ba3cc0c04d6ea57eaaddd85817bd6f793e27d7385b4b6
SHA5129cda1bd8ef27b6aded8fd83a46a67d9bb87ea81e666fb9833af4289c1b211ef19b053a34b8f10eb9c9d6a88e61202b9a487a58c62e6411ab6796362bfa281e5d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe581f99.TMP
Filesize48B
MD52450d4c505ee86c32ebf2adb56178fc2
SHA14d8086980bb7e15709c7e2d8f68acb34efe25f37
SHA2565767971198b01eb7348132710875e3a56c2dc1ac9bf76503ceb43c6d58fffba6
SHA512a1bcd1dc949aa88533fa9110e0262c58c4b95c03f386fd25afc1ecb7afc3b603d10327394b27e2858426221f09c8a1232eb7fe90b415136deca82ce5b2a48a02
-
Filesize
1KB
MD5db76efd658bb76fb065b32c813d59bc2
SHA1aa38e0a89b07c889dc55be9cfcaa1c6c8ffba7f8
SHA256476a4491c5b29981d29dce45ee59ab67971456a43c097b63f62e294f9076a48f
SHA512a49dfdc1cce5d1b2cbd910ce0f3632197198457b50ab00b957a89ca6cd01dc5956b22ffda00e1542a47a80da8d150eacd60f65a26064682a8850a615f047babf
-
Filesize
1KB
MD51e84f10a86eeebcef890914c6ea7ad7e
SHA10f5559a5ba01557f0bac1cd681eaf21405974ff3
SHA256357e289b1cea3f56bfec2254c2b6c11d91e55f99cfbada1da311489b38038361
SHA5127cf028fcbf7f9d0f7e76eeb06e280c61ec15b59680e066c39843a5063feca2263e9ac00299ff7889ea3df1c465215b4a8930d3f9a1ca2e2ae1d40b88f47dc3c1
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD57813fa8ca52db5080e3a232bfc22a5c8
SHA149fa9654eb773958cb04e32af7c8f4660b6a85df
SHA256f28bb2585a21ccece1052470423168ebab5ccd0a64bcdf464c0dc490b37e8d2f
SHA512a57aa4e858171887c2adc20fe35b620457d58ed0ceae35062afb59a4544d34da20643f8ea1a3dacb043c66f54bc151349c8e7413f1cadc2ce25f9b860cde65c1
-
Filesize
10KB
MD57648e0a1de33548e73e44e5b7f827797
SHA1dacd7c924c25a4b1c938f4c6c40bec8408af54e9
SHA2569e6f979fddc1dd5ae9a7fa45bc0a26ca0695157e5144a6961185ad305187e877
SHA512e924ef3e38cde982ce70afdb53614b4d5b94b97dce723696a3da8d2ea9dcb3eaee9d8afcc5594adb74d2a222f423c540f2e8f3eb602f1b55a60e90df8da68c71
-
Filesize
1KB
MD546a4b947bc06c61e5bdc22793e08745a
SHA1ae4d49cc15443598e498cf6d151a2d8cedb8a748
SHA2561908bd33c8281cbfbd255640b579eeefbea9dceab10621d71787435ddf44912e
SHA512fcf4e1fbd8b284dd8ec071cd1e775a3413d0c7c9f12a00032995dd92a4caee1bcbdc45c073d6940209a8046f19f12ddfcfc52162d8f822996c9825320d1d49ea
-
Filesize
1KB
MD57c4c0e444617352870bc2278b84e2a9d
SHA1d2f877fb9f0e44b1bac967e019edc2f3fbce865c
SHA2563facd02ada8d9b9823047ff9d94dd40052ba683da9e34c7c3faa42f532ecc8c3
SHA51254e019e145c3de6801de3db740ee4f666ec40963f8013bb25d0d2416f77015d92f410f420061c7983baf8b37e245070d04922d963d60133194970d8db35c8c12
-
Filesize
1KB
MD57d9c1d9a5887c81a9dbed8ed8f8a9447
SHA10393529da6a78aebcbe2ff0bf9cc6f6954ea4b97
SHA256a7166aec2dfb1318d89500b9eb3c528d1d833c3c7ea246935785f315068b3ea8
SHA512c9cce847f2eeed58d6f96ddeea116352ee23306fe2dc4f1d1434afdecd62b0fd0a71cf705fdaab119270961c6e1c62863728cedeac8c7925803ea4de8feb16e1
-
Filesize
1KB
MD53c9647de3e0caaf42dadb633aea86645
SHA137a8a901e5dd7ae2f3997461767252e1216d9bb4
SHA2562c207e69c008c5bca4b1bb312671f9d512d4955a0878b0cfbe184786d06bff3a
SHA512e2b37ae112659c0f5b8e522fdfc84b5480a3dd4749f0544e6447013037e96ee01b8f29c9f823ee6800482dbcf71ac5150bb36bf9c51099cbc5af1428166f8d05
-
Filesize
1KB
MD5b66d556bb78775af8348f4fe7c526b53
SHA1e10ceace66372523ee110ed54e1c91f5d1b974e8
SHA256259753cd961b84896713afe3b74fd40469d5e9e10d3fa9e44588f8e0b6114552
SHA51257dfa682d0dc0c019b1bf4ba8ea2d854089936bb053f225a8dddf387d20da10682da25cf93fa00d94297dec70b93ac7ddedf0c488021908e24c5dd32dac81886
-
Filesize
1KB
MD5764cf0ac25cd033b40fec61167ea1a8d
SHA166306736722cb1a514e0b7dcadd8e773dfebccfa
SHA25664aa19cb71d77451a8633cae645678a944e20db46234f1e250611336d2909b55
SHA512fbc08ecf902d20317b8dd58b9a498c81cd3763ffd229d771b4c6113f4447282b327ce698496a5518b39e5d3871ce76ae9f4938b7db2e243b47ca585b0a7666fe
-
Filesize
1KB
MD5d7640826ef32042c3756bc1739eb9afb
SHA10ab8e231adc574bf906b08682f46dbe34dd83c24
SHA256ee756c00d0109cd4cc0d997f32d66a0072c934c03a1dd69943a4d16d67025ca5
SHA5124132db4fcca141744e546e43ddc3266c9cc61d9333495fb03356911d1ba0829d193662905b70b645b949eee232763b7056c4f04c127b5a2cdbfc1948e548bf07
-
Filesize
64B
MD51a11402783a8686e08f8fa987dd07bca
SHA1580df3865059f4e2d8be10644590317336d146ce
SHA2569b1d1b468932a2d88548dc18504ac3066f8248079ecb083e919460bdb88398c0
SHA5125f7f9f76d9d12a25fdc5b8d193391fb42c37515c657250fe01a9bfd9fe4cc4eab9d5ec254b2596ac1b9005f12511905f19fdae41f057062261d75bd83254b510
-
Filesize
1KB
MD5904c9e9f7251b6f4037f077a4a4685a4
SHA10d9a7308a129a6dd618166a66acf6b04849dd769
SHA25696fd6fdaeaa66389e084b9770a75c0bcadf2d78980657c9c6055ff3fb068eb45
SHA512b16ce62361a39ff934843cc8fd8bd51d97cd2371a4aa40467f3b18788766c30409685c17f376a68e80bb1f83df95f455f155d9adef75ee46edce3bc4fcfc5a2d
-
Filesize
1KB
MD599b04392e00286e5ab2a246837ad934b
SHA1d009e8c6d76b038b1bb586d03876d367a03ac7d9
SHA25687bcd9e5418949b818feaa5b16b347efe3f1e2395249d482f18493c5accf09d5
SHA512ca1abcdd503953c0ce8ed1369455baa689e11ba81ec71fe4b13278eed0723ae752cdaf599227f2c9cea02e3a8e3ab0f0d71d34a2fcce94a4ecd2613eeb82f53d
-
Filesize
1KB
MD5da24b6ec1bffe9fc151dcfc11055b41e
SHA1d6c6128ed6ee54c564492bd0a9401f9dd79af0df
SHA2565a13c0c58f40c535a3f759db12e522355ed53ae9f5a51917347ee94933df4430
SHA512cf8d6c7ce47e70a0bb984668c74c2a6ab27f08b8f71dbac6696d1d1b34d6349548e3a433cfec8b9c3d8cd048e15c27c13960c041c331cab821eeffa8a146eb6b
-
Filesize
1KB
MD5e114b05af588511cb3553411f10a79d9
SHA197ff52d84f178a88e7c34da2523f43a747a6e87b
SHA2569ec4c669309b6a96056e31f2d6f458372298c3db08043fc1ff922458f74c749d
SHA5129b107563d02007b91fce87e5027624954740e51e4cfb806a78675ecf4ef257b3511bc4cd420e40431b63c711ad80aa57e9ba0f444a4a5b19c9cb05cb69781ffd
-
Filesize
1KB
MD5783183aa8cb63406b85dd38280f59333
SHA19783aa9b8c84fedd8bba0c95a67c90042412382b
SHA25619c13ab10cd3f2be4ab6de6b180b5d3495034d1c6bde60e275f259eb0cb50ea2
SHA51204b7f2d62e288178329beb1a89c1d1b4d519b80d1f90dd19264ba771c2c79544dbbe6f454ab75706a62e46ad8739de0d5d9a371314e67f1d30302166723e7eab
-
Filesize
1KB
MD54f66cf8b16e296843d1e79cffcbc1019
SHA1c7d04e8dde3cfb8788acdab3938848d72bd2a34e
SHA256f8b233cbd6d3d011dafc258f0d2481c3db8f51ba7f67d06c57d15db70922f6c9
SHA51223db866e45e9e37f79b82bff12f67d7e49c9612837234f54d33ae0836c0d2d507634ab82bc0b7b7a27a517b71b0c8309112b895c92917f8dc87729f89898a155
-
Filesize
1KB
MD51891bc086cf1852c0df15adbba011c9e
SHA1aad4c2481f14087b3acab9db1ed4c0dc512bfffc
SHA25664694ef31cb617509c71768910598290065e3675a119fac7a72f0b1b97616835
SHA51263cba536d83823b4366865dd7a31d8c09fd7fd1b1d9e38d9722e6dfd79c79bc54043742ee955150a4422ff0d61504d2f0d3a20c9e0ee0f817b94f2c74977ec37
-
Filesize
1KB
MD5f63706b4cc012f2394d5aa7544c917f7
SHA1e8fed218423dfbf28dd63c892954b985bdc5e2e6
SHA256c32b57730a635bfc3dcc2514ecc06344fc5b9897840a7ac2bfecab6d0c7b81b6
SHA512cfa9e38054e4350749fc4d8f651d75dbf3352ada9bad2b1dbfdc0f831970dbc6a925e87a250c30879fcaf09a50bb080a554f65fad4dc6c5ee9a8db6e66dec4b2
-
Filesize
1KB
MD5662272f30cab743f3dc90cadacd1d5a3
SHA1720becdd8777d7d25bc96afcaa9fe55fefc39ca5
SHA256b47f30842cfb762b7440b62b144809fc0d473532789788ee0cf17fdf8cc57ef6
SHA51203bfa7cf44072a2d56bc71a992ea2c8405a4f3dc399fb859a927d72e3fb9df8e0131ff5287b242494fb46c604bae26b4e213623252c29dc57e1028ab0e7c4f24
-
Filesize
1KB
MD58de5ec1a5042545322f257a6d75ffc3b
SHA184629666f590659b7208120aa91f0041a25b5e44
SHA256058df0be360081caca9732e3d7febf5e46eb69606242d18cfb4dd0795d71a065
SHA512c53e73d10b99d30d065b21f149e9a21ab77d393c9295062375355b887d8c755323ed7e7ce81549ad38282e37bdb829311115cc3d691623cfcde9fe9be1d2c719
-
Filesize
1KB
MD588f9ea1d100f5352ec61d1dc90d457e9
SHA1106a2f1a0efad68d3a6c4224e6e8ea97803444d0
SHA256b6f2fbe74673599fa5b2b66b726d21acd156b6470de6d2512da49c4dbf7f7a77
SHA512ee27cf000804e89583b60fc75f36ca06e96269b5ffca55e1843dabc4e30296ac7cdc67d8918873a91ba9af922a2669382626975800d8354f718c3e0d7ebdc333
-
Filesize
1KB
MD57d73bd7948ab5f98e3244b92c3cca48e
SHA1aed762cebc35c21f8919768b7da85e5ac11743d9
SHA2567274937a5bb9bd9f7d5b83725100b360bbff13b0b8d08183e2e832cdd8e13308
SHA5127bcfc36c64f8094e67697a4170c5837c54d2cd5563f860b029938ab4b9dfbdae11b28a28a38657c74ad218cb04d861ddac987bef7ba08708b53268f8ffad4833
-
Filesize
1KB
MD59ca134a3e3385dae5d23873681ce26b7
SHA110000b56a35a30b8ed3183de9d707c9381e5d27d
SHA256f5c3ef52aefe9cc4fa107b3cdae89c67783cca22b4dea70ba64081db990116af
SHA512b757667095afdfd98c2b86c29d81c84b257d55ea931bffd7d7de9feefbb456a355b4d91c104d5356051ce3e7f46b3a0bfa7326f048323d119cf25d946ff751a1
-
Filesize
1KB
MD5aa8fe1e6774956aa14ba580e8d75e3ca
SHA1ef2f85b6d7319fbba93de4362ca740705b3fe794
SHA256aa726fd5796bed6f43568bbbdbcb6cbc6225f0e00a8ca0ee03673cc64e214289
SHA5127d7ebc15e88078f18cb79de7a53981cfae3297019726afd744a80c8a4191566e0cf69f6dd8589081f9dd8327f5c8a95b8ddb4e7e8aa494919750546e519f56ea
-
Filesize
1KB
MD55b6180c1731b8138b86cdce4773af387
SHA11521d2d37255125b915ad02649b3e23466470635
SHA25684f8a633a391836492dbf23c4069766b99c4cfb2cf01a7a5db7353bf3d82ef5f
SHA51261615c621b1691f226297ed6fc7f529d3a2801ec1eb0e028bfbee7c9a380b50b96e4a1a777a3fbec26f3705b6ea492a8f4e129fc4ff6111ffd42f338c449449d
-
Filesize
1KB
MD5486458bf8899b7b433cf164db1f1fd06
SHA1ee36467694b9ac0137e1e7582b170945552da21b
SHA256f4e56d3e70a5435fc8434ac6efac87422366d67a71fcadb5cab5536128f0455c
SHA512139e39ab09468bebfe07d79bcb074b4bafa15d33bbd2da22f5f16dbd624ae451c80f77eb926040b22ad5af38acee3b43d27ec018dfdd20b2cf5a7143ff546327
-
Filesize
1KB
MD50069ed5c091fe887056157516e148ac7
SHA16f0f8f3972a408a7e07a752c755e247bab6f0a68
SHA25650fd38b4f37aacec05cbfd9156a6cae3754c122b476af4d5e0fc7d1e18a2a375
SHA512e18d4111efc2ad1fc0cf8e17de5b7ebdee577251fae6bfa2ee9123aa8cfbabd7eed909b1efd248c7fb2801ecf01ac6f73feb6f09e00c31268e4aabfd2c6f6cb6
-
Filesize
1KB
MD56c9d4f27304e67234a592e6863c9e974
SHA130b322bce5cf4ccb306f62a744401981d680e663
SHA256bcb03eb61440421b39c6ca0c06fed58ada350a5d7ddc61660bec966f8acb363d
SHA5122128389246ffddcb56bdcc34318f716c6c560a0283a21f0599dfc224e2763111aaecbbd7051d27abe84461a80618bdb45fdee16cea5b091410fdc106f9be29ed
-
Filesize
1KB
MD539f5711c3a046ec6691a27ee5625e0f9
SHA1947f2e78b5a2a22205f45a1bf8df58713f2da1fc
SHA2567e16c4e943b3219267f65456c8ea3dbfb5bb6520bcecfa5f492fa5c1ec5cce85
SHA5123748d62aa4571ea10025261ab444808a1c368c31ca5bd2b0b284532a9b178fa3190b94f0ab05dbac6fccc8a7adfb61da271971720cafc3870b8a50d56d225b7f
-
Filesize
1KB
MD5d11a95a6f33fbcc1f00d08a0d0bf44a1
SHA1a71ebb4a05c5d9abc895a4296261845837d32711
SHA25656dd004895a223f1dc7a20c5dd533c9dfe23fe565167cc55ae3102d7a189be25
SHA512bcc764c69acda7ec37c21ba03bc3d3d07219bcfb18f9703f68c5c79fbacf44c196b656f29fcc6628798a91e7498fa1bcfb97fb575000e1546924f71f770c5ccd
-
Filesize
1KB
MD544968b49b5cea2282fb611c841744c1a
SHA10950c0e3cdd661682041f586423b5db337035013
SHA2566114af4e242819bbde4b82e3450979cf2fa5aea56a1ed7a8e62da40d9c2221e2
SHA5126481d0a1c50462a4d9fe5aca05da3adaaadf2b1edd9d92bd134bb020e87e3bea1887c93575b841901fbe6a7fff5d786b93c7289b18e430840178667ac0e49633
-
Filesize
1KB
MD5e5a5dfcfb4999cdf1d54036cdcbe5474
SHA105d06141c51d06f8f39c8fcff7f91bd797ec5641
SHA2564719bb00ce5bda2d48c46260b0a38afa472de13ff54cce552b3efb7fd4511d52
SHA51293bf409aa75fda6b8bf9b4adffdbd7a689db48a87f38f8e6f754508a2b9593800b5e0e861f015a359ab4f6a1d288c3c857265b83d11883a4e241ba11b10675b9
-
Filesize
1KB
MD573fee7ddcd1f687c7a84512a502cbe81
SHA1cae11254e084d863c53bf5c0ca8568ba274dc105
SHA256ccb966168cf718db0a78eea991615cfb2a376b0b9270c68d88c04117a38659f1
SHA5123af986f383ff23c4a53f2f3f6800b39f1cdbff26738ebcf466f10bafbb59f4b9cede1a8f577a6eb519d356638a432c0a76d0766c06cc1eb827a508c6574e03e0
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
13.3MB
MD557a6527690625bea4e4f668e7db6b2aa
SHA1c5799fd94999d128203e81e22c6d9fdb86e167ee
SHA256076e01b09f9c5cccc273b2f7dfa1a1efccc1a8e8ebf98a7eee756024b93bad17
SHA512d86c7f79989eb0781e15f8631048506ffab338f933ddfedbcc2c7464447770beaf21b7ed3cba2ebb97be5ffdc9a450f2df2e2313efaeb8e8101f2ee53c066e4e
-
C:\Users\Admin\AppData\Local\dccc7b2e6bd7e4e58e327adc076b1ca1\Admin@LBPSYPUR_en-US\Browsers\Edge\Cookies.txt
Filesize1KB
MD5d6635892564658262c44a4f8db099ec3
SHA1588b3cf4302ac52dc86ab858153b9034e8de1ae1
SHA256078ce84e9fe7f7169af20edd6775e2a5f6a86fb551b1f1f2714a1368d4c66b78
SHA5123223acd479dc3fb92cf7ef8e65eba9649b2e17592bc0f028c682825398e8804f9038f1c7b974de4a3b45e3ec1e9af62c1757a412de1f7e7f1d2c177689c961de
-
C:\Users\Admin\AppData\Local\dccc7b2e6bd7e4e58e327adc076b1ca1\Admin@LBPSYPUR_en-US\Browsers\Edge\Cookies.txt
Filesize1KB
MD5a168b8f9b1d4efe85efe5d018b17b039
SHA1476ec2d3ba4bab4acfd0b1ee92006baa7a6ec1be
SHA25618722046a35d7deafedc46d102b319ad59548e571418679d0af672fabf781ce8
SHA512f1596d59a1740fcf546431fbffc9275b67167920687e564623bdd43d0419e83376554d15b2868213e979da1951be333567d76a69b6c2e628b65e71a83d5a5f80
-
C:\Users\Admin\AppData\Local\dccc7b2e6bd7e4e58e327adc076b1ca1\Admin@LBPSYPUR_en-US\Browsers\Firefox\Bookmarks.txt
Filesize105B
MD52e9d094dda5cdc3ce6519f75943a4ff4
SHA15d989b4ac8b699781681fe75ed9ef98191a5096c
SHA256c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142
SHA512d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7
-
C:\Users\Admin\AppData\Local\dccc7b2e6bd7e4e58e327adc076b1ca1\Admin@LBPSYPUR_en-US\System\Process.txt
Filesize4KB
MD543264eec65971679a3dc084f665e2234
SHA1517b0c58e101edc5677f1b45824688fbf93bafff
SHA256cae347f146d7173cdf5b8bc2809260c7480e0ad91a5c9f728bebe991ac4085f5
SHA512bd86f7b3675a7642a6b004b98ad3ddb4339046d7ac9accfeaef26b10f3eac1e2c34cc1df089cb7cbe87e4447928c7a54b5f8c0b3eb655648bcadc8bd35518bcf
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98
-
Filesize
672KB
MD5f9ca73d63fe61c4c401528fb470ce08e
SHA1584f69b507ddf33985673ee612e6099aff760fb1
SHA25616431cc14917abeb316e0bc44045440a8f86b7ac4fdd0dce99de6435d493ecca
SHA5126fd03320ec84baf09a16a127c2c0ed3c265906fcb1a3b807c13001e775c396b66539238392438a8f290be04b8b8684050736331f8f99dbe8b868b44f154dd9de
-
Filesize
146KB
MD5f1c2525da4f545e783535c2875962c13
SHA192bf515741775fac22690efc0e400f6997eba735
SHA2569e6985fdb3bfa539f3d6d6fca9aaf18356c28a00604c4f961562c34fa9f11d0f
SHA51256308ac106caa84798925661406a25047df8d90e4b65b587b261010293587938fa922fbb2cfdedfe71139e16bfcf38e54bb31cbcc00cd244db15d756459b6133
-
Filesize
226KB
MD51bea6c3f126cf5446f134d0926705cee
SHA102c49933d0c2cc068402a93578d4768745490d58
SHA2561d69b5b87c4cd1251c5c94461a455659febb683eab0ebd97dd30da2319ffc638
SHA512eb9f423f6adb5e686a53f5f197e6b08455f8048d965a9ec850838fdf4724ef87f68945c435ace5a48a9a7226006a348e97586335d0246ea0dc898a412dea5df3
-
Filesize
12.0MB
MD5aab9c36b98e2aeff996b3b38db070527
SHA14c2910e1e9b643f16269a2e59e3ada80fa70e5fa
SHA256c148cc14f15b71a2d3f5e6bce6b706744f6b373a7e6c090c14f46f81d2d6e82f
SHA5120db75756a041a7cda6b384718581aaf11e6873614465dd56e81f17ad171cffe380e288a3c2ee540222190392904921f26df8a1d66d4108051c60fc8e5b2df779