Analysis Overview
SHA256
e8335db8f6d238699304e5d50e5499c84316bf25aaec46ec04be7a7b2bcd6cba
Threat Level: Likely malicious
The file ZoomInstaller.exe was found to be: Likely malicious.
Malicious Activity Summary
Command and Scripting Interpreter: PowerShell
Drops startup file
Loads dropped DLL
Checks computer location settings
Reads user/profile data of web browsers
Executes dropped EXE
Adds Run key to start application
Looks up external IP address via web service
Accesses cryptocurrency files/wallets, possible credential harvesting
Enumerates connected drives
Checks installed software on the system
Drops file in System32 directory
Program crash
System Location Discovery: System Language Discovery
Unsigned PE
Enumerates physical storage devices
Browser Information Discovery
Access Token Manipulation: Create Process with Token
Enumerates system info in registry
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Suspicious use of SetWindowsHookEx
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Modifies Internet Explorer settings
Suspicious behavior: EnumeratesProcesses
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2024-10-27 13:17
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Analysis: behavioral3
Detonation Overview
Submitted
2024-10-27 13:16
Reported
2024-10-27 13:20
Platform
win7-20240903-en
Max time kernel
122s
Max time network
125s
Command Line
Signatures
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\rundll32.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2476 wrote to memory of 2028 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 2476 wrote to memory of 2028 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 2476 wrote to memory of 2028 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 2476 wrote to memory of 2028 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 2476 wrote to memory of 2028 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 2476 wrote to memory of 2028 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 2476 wrote to memory of 2028 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\SpiderBanner.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\SpiderBanner.dll,#1
Network
Files
Analysis: behavioral7
Detonation Overview
Submitted
2024-10-27 13:16
Reported
2024-10-27 13:20
Platform
win7-20240903-en
Max time kernel
117s
Max time network
119s
Command Line
Signatures
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Windows\SysWOW64\rundll32.exe |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\rundll32.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2076 -s 220
Network
Files
Analysis: behavioral14
Detonation Overview
Submitted
2024-10-27 13:16
Reported
2024-10-27 13:21
Platform
win10v2004-20241007-en
Max time kernel
150s
Max time network
155s
Command Line
Signatures
Command and Scripting Interpreter: PowerShell
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\Zoom.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\Zoom.exe | N/A |
Drops startup file
| Description | Indicator | Process | Target |
| File created | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UpdateMC.exe | C:\Users\Admin\AppData\Local\Temp\UpdateMC.exe | N/A |
| File opened for modification | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UpdateMC.exe | C:\Users\Admin\AppData\Local\Temp\UpdateMC.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\temp00324124kwy9EN\MicrosoftRuntimeComponentsX86.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\UpdateMC.exe | N/A |
Reads user/profile data of web browsers
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Path = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpdateMC.exe" | C:\Users\Admin\AppData\Local\Temp\UpdateMC.exe | N/A |
Enumerates connected drives
| Description | Indicator | Process | Target |
| File opened (read-only) | \??\F: | C:\Users\Admin\AppData\Local\Temp\temp00324124kwy9EN\MicrosoftRuntimeComponentsX86.exe | N/A |
Looks up external IP address via web service
| Description | Indicator | Process | Target |
| N/A | api.ipify.org | N/A | N/A |
| N/A | api.ipify.org | N/A | N/A |
| N/A | api.ipify.org | N/A | N/A |
| N/A | api.db-ip.com | N/A | N/A |
| N/A | api.db-ip.com | N/A | N/A |
Drops file in System32 directory
Access Token Manipulation: Create Process with Token
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\cmd.exe | N/A |
Browser Information Discovery
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeShutdownPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\Zoom.exe | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\Zoom.exe | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\Zoom.exe | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\Zoom.exe | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\Zoom.exe | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\Zoom.exe | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\Zoom.exe | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\Zoom.exe | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\Zoom.exe | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\Zoom.exe | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\Zoom.exe | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\Zoom.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\Zoom.exe | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\Zoom.exe | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\Zoom.exe | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\Zoom.exe | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\Zoom.exe | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\Zoom.exe | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\Zoom.exe | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\Zoom.exe | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\Zoom.exe | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\Zoom.exe | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\Zoom.exe | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\Zoom.exe | N/A |
| Token: SeIncreaseQuotaPrivilege | N/A | C:\Windows\System32\Wbem\wmic.exe | N/A |
| Token: SeSecurityPrivilege | N/A | C:\Windows\System32\Wbem\wmic.exe | N/A |
| Token: SeTakeOwnershipPrivilege | N/A | C:\Windows\System32\Wbem\wmic.exe | N/A |
| Token: SeLoadDriverPrivilege | N/A | C:\Windows\System32\Wbem\wmic.exe | N/A |
| Token: SeSystemProfilePrivilege | N/A | C:\Windows\System32\Wbem\wmic.exe | N/A |
| Token: SeSystemtimePrivilege | N/A | C:\Windows\System32\Wbem\wmic.exe | N/A |
| Token: SeProfSingleProcessPrivilege | N/A | C:\Windows\System32\Wbem\wmic.exe | N/A |
| Token: SeIncBasePriorityPrivilege | N/A | C:\Windows\System32\Wbem\wmic.exe | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\System32\Wbem\wmic.exe | N/A |
| Token: SeBackupPrivilege | N/A | C:\Windows\System32\Wbem\wmic.exe | N/A |
| Token: SeRestorePrivilege | N/A | C:\Windows\System32\Wbem\wmic.exe | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\System32\Wbem\wmic.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\Wbem\wmic.exe | N/A |
| Token: SeSystemEnvironmentPrivilege | N/A | C:\Windows\System32\Wbem\wmic.exe | N/A |
| Token: SeRemoteShutdownPrivilege | N/A | C:\Windows\System32\Wbem\wmic.exe | N/A |
| Token: SeUndockPrivilege | N/A | C:\Windows\System32\Wbem\wmic.exe | N/A |
| Token: SeManageVolumePrivilege | N/A | C:\Windows\System32\Wbem\wmic.exe | N/A |
| Token: 33 | N/A | C:\Windows\System32\Wbem\wmic.exe | N/A |
| Token: 34 | N/A | C:\Windows\System32\Wbem\wmic.exe | N/A |
| Token: 35 | N/A | C:\Windows\System32\Wbem\wmic.exe | N/A |
| Token: 36 | N/A | C:\Windows\System32\Wbem\wmic.exe | N/A |
| Token: SeIncreaseQuotaPrivilege | N/A | C:\Windows\System32\Wbem\wmic.exe | N/A |
| Token: SeSecurityPrivilege | N/A | C:\Windows\System32\Wbem\wmic.exe | N/A |
| Token: SeTakeOwnershipPrivilege | N/A | C:\Windows\System32\Wbem\wmic.exe | N/A |
| Token: SeLoadDriverPrivilege | N/A | C:\Windows\System32\Wbem\wmic.exe | N/A |
| Token: SeSystemProfilePrivilege | N/A | C:\Windows\System32\Wbem\wmic.exe | N/A |
| Token: SeSystemtimePrivilege | N/A | C:\Windows\System32\Wbem\wmic.exe | N/A |
| Token: SeProfSingleProcessPrivilege | N/A | C:\Windows\System32\Wbem\wmic.exe | N/A |
| Token: SeIncBasePriorityPrivilege | N/A | C:\Windows\System32\Wbem\wmic.exe | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\System32\Wbem\wmic.exe | N/A |
| Token: SeBackupPrivilege | N/A | C:\Windows\System32\Wbem\wmic.exe | N/A |
| Token: SeRestorePrivilege | N/A | C:\Windows\System32\Wbem\wmic.exe | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\System32\Wbem\wmic.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\Wbem\wmic.exe | N/A |
| Token: SeSystemEnvironmentPrivilege | N/A | C:\Windows\System32\Wbem\wmic.exe | N/A |
| Token: SeRemoteShutdownPrivilege | N/A | C:\Windows\System32\Wbem\wmic.exe | N/A |
| Token: SeUndockPrivilege | N/A | C:\Windows\System32\Wbem\wmic.exe | N/A |
| Token: SeManageVolumePrivilege | N/A | C:\Windows\System32\Wbem\wmic.exe | N/A |
| Token: 33 | N/A | C:\Windows\System32\Wbem\wmic.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\Zoom.exe
"C:\Users\Admin\AppData\Local\Temp\Zoom.exe"
C:\Users\Admin\AppData\Local\Temp\Zoom.exe
"C:\Users\Admin\AppData\Local\Temp\Zoom.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\Zoom" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=1716 --field-trial-handle=1712,i,1576865860678582204,11569846539826167310,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version /prefetch:2
C:\Users\Admin\AppData\Local\Temp\Zoom.exe
"C:\Users\Admin\AppData\Local\Temp\Zoom.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\Zoom" --mojo-platform-channel-handle=2252 --field-trial-handle=1712,i,1576865860678582204,11569846539826167310,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version /prefetch:8
C:\Users\Admin\AppData\Local\Temp\Zoom.exe
"C:\Users\Admin\AppData\Local\Temp\Zoom.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Zoom" --app-user-model-id=us.zoom --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --no-sandbox --no-zygote --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=2484 --field-trial-handle=1712,i,1576865860678582204,11569846539826167310,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version /prefetch:1
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "%windir%\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid"
C:\Windows\System32\reg.exe
C:\Windows\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "%windir%\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid"
C:\Windows\System32\reg.exe
C:\Windows\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "%windir%\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid"
C:\Windows\System32\reg.exe
C:\Windows\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "%windir%\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid"
C:\Windows\System32\reg.exe
C:\Windows\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "powershell Start-Process "C:\Users\Admin\AppData\Local\Temp\temp00324124kwy9EN\MicrosoftRuntimeComponentsX86.exe" -Verb runAs"
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell Start-Process "C:\Users\Admin\AppData\Local\Temp\temp00324124kwy9EN\MicrosoftRuntimeComponentsX86.exe" -Verb runAs
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "%windir%\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid"
C:\Windows\System32\reg.exe
C:\Windows\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid
C:\Users\Admin\AppData\Local\Temp\temp00324124kwy9EN\MicrosoftRuntimeComponentsX86.exe
"C:\Users\Admin\AppData\Local\Temp\temp00324124kwy9EN\MicrosoftRuntimeComponentsX86.exe"
C:\Windows\System32\Wbem\wmic.exe
"wmic" csproduct get UUID
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command "Start-Process -FilePath 'C:\Users\Admin\AppData\Local\Temp\UpdateMC.exe' -Verb RunAs -WindowStyle hidden -ErrorAction SilentlyContinue"
C:\Users\Admin\AppData\Local\Temp\UpdateMC.exe
"C:\Users\Admin\AppData\Local\Temp\UpdateMC.exe"
C:\Users\Admin\AppData\Local\Temp\Zoom.exe
"C:\Users\Admin\AppData\Local\Temp\Zoom.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\Admin\AppData\Roaming\Zoom" --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=1136 --field-trial-handle=1712,i,1576865860678582204,11569846539826167310,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version /prefetch:8
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 228.249.119.40.in-addr.arpa | udp |
| US | 150.171.27.10:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 102.209.201.84.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 138.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.35.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | api.ipify.org | udp |
| US | 172.67.74.152:443 | api.ipify.org | tcp |
| US | 172.67.74.152:443 | api.ipify.org | tcp |
| US | 8.8.8.8:53 | 152.74.67.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | zoom.us10web.us | udp |
| US | 81.28.12.12:443 | zoom.us10web.us | tcp |
| US | 81.28.12.12:443 | zoom.us10web.us | tcp |
| US | 8.8.8.8:53 | deliverynetwork.observer | udp |
| DE | 199.247.4.86:443 | deliverynetwork.observer | tcp |
| US | 8.8.8.8:53 | 12.12.28.81.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 86.4.247.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | dns.google | udp |
| US | 8.8.8.8:53 | dns.google | udp |
| US | 8.8.8.8:53 | dns.google | udp |
| US | 8.8.8.8:53 | dns.google | udp |
| US | 8.8.8.8:443 | dns.google | tcp |
| US | 8.8.8.8:443 | dns.google | tcp |
| DE | 172.104.133.212:8080 | tcp | |
| DE | 172.104.133.212:8880 | 172.104.133.212 | tcp |
| US | 8.8.8.8:53 | o4506972866674688.ingest.us.sentry.io | udp |
| US | 34.120.195.249:443 | o4506972866674688.ingest.us.sentry.io | tcp |
| DE | 199.247.4.86:443 | deliverynetwork.observer | tcp |
| US | 8.8.8.8:53 | 212.133.104.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 249.195.120.34.in-addr.arpa | udp |
| DE | 172.104.133.212:8880 | 172.104.133.212 | tcp |
| US | 8.8.8.8:53 | api.db-ip.com | udp |
| US | 104.26.5.15:443 | api.db-ip.com | tcp |
| DE | 172.104.133.212:8880 | 172.104.133.212 | tcp |
| DE | 172.104.133.212:8880 | 172.104.133.212 | tcp |
| DE | 172.104.133.212:8880 | 172.104.133.212 | tcp |
| DE | 172.104.133.212:8880 | 172.104.133.212 | tcp |
| DE | 172.104.133.212:8880 | 172.104.133.212 | tcp |
| DE | 172.104.133.212:8880 | 172.104.133.212 | tcp |
| DE | 172.104.133.212:8880 | 172.104.133.212 | tcp |
| DE | 172.104.133.212:8880 | 172.104.133.212 | tcp |
| DE | 172.104.133.212:8880 | 172.104.133.212 | tcp |
| DE | 172.104.133.212:8880 | 172.104.133.212 | tcp |
| DE | 172.104.133.212:8880 | 172.104.133.212 | tcp |
| DE | 172.104.133.212:8885 | tcp | |
| DE | 172.104.133.212:8880 | 172.104.133.212 | tcp |
| US | 8.8.8.8:53 | 15.5.26.104.in-addr.arpa | udp |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8880 | 172.104.133.212 | tcp |
| DE | 172.104.133.212:8880 | 172.104.133.212 | tcp |
| DE | 172.104.133.212:8880 | 172.104.133.212 | tcp |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| US | 8.8.8.8:53 | 212.20.149.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 171.39.242.20.in-addr.arpa | udp |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| US | 8.8.8.8:53 | 73.190.18.2.in-addr.arpa | udp |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| US | 8.8.8.8:53 | 77.190.18.2.in-addr.arpa | udp |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| US | 8.8.8.8:53 | 55.36.223.20.in-addr.arpa | udp |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| US | 8.8.8.8:53 | 23.236.111.52.in-addr.arpa | udp |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp |
Files
C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dic
| MD5 | f3b25701fe362ec84616a93a45ce9998 |
| SHA1 | d62636d8caec13f04e28442a0a6fa1afeb024bbb |
| SHA256 | b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209 |
| SHA512 | 98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84 |
memory/3548-68-0x000001AFDB310000-0x000001AFDB332000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_3jkqrplp.rai.ps1
| MD5 | d17fe0a3f47be24a6453e9ef58c94641 |
| SHA1 | 6ab83620379fc69f80c0242105ddffd7d98d5d9d |
| SHA256 | 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7 |
| SHA512 | 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82 |
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
| MD5 | 6cf293cb4d80be23433eecf74ddb5503 |
| SHA1 | 24fe4752df102c2ef492954d6b046cb5512ad408 |
| SHA256 | b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8 |
| SHA512 | 0f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00 |
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
| MD5 | d8b9a260789a22d72263ef3bb119108c |
| SHA1 | 376a9bd48726f422679f2cd65003442c0b6f6dd5 |
| SHA256 | d69d47e428298f194850d14c3ce375e7926128a0bfb62c1e75940ab206f8fddc |
| SHA512 | 550314fab1e363851a7543c989996a440d95f7c9db9695cce5abaad64523f377f48790aa091d66368f50f941179440b1fa94448289ee514d5b5a2f4fe6225e9b |
C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Google Chrome.lnk
| MD5 | b36835f5b463de59dc721fc1cfa29db2 |
| SHA1 | 669737df57038106dbe238eb759717d1478c38ab |
| SHA256 | 19bdee5e8686de03c4152478ac8e6e355635418bd227e002ad8e85af9ff035fa |
| SHA512 | a40ab223fe6adc5dc3dd4f02eba1128900db51a2060444c692503a7b9f8fc5d63d67e1af4a79172bfc0473627e5ca389213b4cc9b520f5f9fb002a5395cd0338 |
C:\Users\Admin\AppData\Roaming\Zoom\Network\Network Persistent State
| MD5 | eab200e4f639147dd26a8a8494c624e7 |
| SHA1 | d8e6d8798946a363e9333253cd118ca363cb387c |
| SHA256 | 84287bdb8a2f00c12539854532d5bc5574f916708cbca48285641c2e8210d7d4 |
| SHA512 | 3f894ed32419d512e6a66682f252d2088892f257dd893782eefd02252b56a56abb38f9ac07a1367bd4ec49e0c4058a2fd2fe499b125202398487444d3114cb6b |
C:\Users\Admin\AppData\Roaming\Zoom\Network\Network Persistent State~RFe591841.TMP
| MD5 | 2800881c775077e1c4b6e06bf4676de4 |
| SHA1 | 2873631068c8b3b9495638c865915be822442c8b |
| SHA256 | 226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974 |
| SHA512 | e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b |
memory/2600-209-0x00000213E50A0000-0x00000213E50A1000-memory.dmp
memory/2600-211-0x00000213E50A0000-0x00000213E50A1000-memory.dmp
memory/2600-210-0x00000213E50A0000-0x00000213E50A1000-memory.dmp
memory/2600-221-0x00000213E50A0000-0x00000213E50A1000-memory.dmp
memory/2600-220-0x00000213E50A0000-0x00000213E50A1000-memory.dmp
memory/2600-219-0x00000213E50A0000-0x00000213E50A1000-memory.dmp
memory/2600-218-0x00000213E50A0000-0x00000213E50A1000-memory.dmp
memory/2600-217-0x00000213E50A0000-0x00000213E50A1000-memory.dmp
memory/2600-216-0x00000213E50A0000-0x00000213E50A1000-memory.dmp
memory/2600-215-0x00000213E50A0000-0x00000213E50A1000-memory.dmp
Analysis: behavioral20
Detonation Overview
Submitted
2024-10-27 13:16
Reported
2024-10-27 13:20
Platform
win7-20240903-en
Max time kernel
122s
Max time network
128s
Command Line
Signatures
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 1292 wrote to memory of 2360 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\system32\WerFault.exe |
| PID 1292 wrote to memory of 2360 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\system32\WerFault.exe |
| PID 1292 wrote to memory of 2360 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\system32\WerFault.exe |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\libGLESv2.dll,#1
C:\Windows\system32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 1292 -s 88
Network
Files
Analysis: behavioral2
Detonation Overview
Submitted
2024-10-27 13:16
Reported
2024-10-27 13:20
Platform
win10v2004-20241007-en
Max time kernel
150s
Max time network
152s
Command Line
Signatures
Command and Scripting Interpreter: PowerShell
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Programs\zoom\Zoom.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Programs\zoom\Zoom.exe | N/A |
Drops startup file
| Description | Indicator | Process | Target |
| File created | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UpdateMC.exe | C:\Users\Admin\AppData\Local\Temp\UpdateMC.exe | N/A |
| File opened for modification | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UpdateMC.exe | C:\Users\Admin\AppData\Local\Temp\UpdateMC.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Programs\zoom\Zoom.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Programs\zoom\Zoom.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Programs\zoom\Zoom.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Programs\zoom\Zoom.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\temp003241243lXtnw\MicrosoftRuntimeComponentsX86.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\UpdateMC.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Programs\zoom\Zoom.exe | N/A |
Loads dropped DLL
Reads user/profile data of web browsers
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Path = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpdateMC.exe" | C:\Users\Admin\AppData\Local\Temp\UpdateMC.exe | N/A |
Checks installed software on the system
Enumerates connected drives
| Description | Indicator | Process | Target |
| File opened (read-only) | \??\F: | C:\Users\Admin\AppData\Local\Temp\temp003241243lXtnw\MicrosoftRuntimeComponentsX86.exe | N/A |
Looks up external IP address via web service
| Description | Indicator | Process | Target |
| N/A | api.ipify.org | N/A | N/A |
| N/A | api.ipify.org | N/A | N/A |
| N/A | api.ipify.org | N/A | N/A |
| N/A | api.db-ip.com | N/A | N/A |
| N/A | api.db-ip.com | N/A | N/A |
Drops file in System32 directory
Access Token Manipulation: Create Process with Token
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\cmd.exe | N/A |
Browser Information Discovery
Enumerates physical storage devices
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exe
"C:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exe"
C:\Users\Admin\AppData\Local\Programs\zoom\Zoom.exe
"C:\Users\Admin\AppData\Local\Programs\zoom\Zoom.exe"
C:\Users\Admin\AppData\Local\Programs\zoom\Zoom.exe
"C:\Users\Admin\AppData\Local\Programs\zoom\Zoom.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\Zoom" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=1636 --field-trial-handle=1640,i,4248689361129458158,13056498232649303706,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version /prefetch:2
C:\Users\Admin\AppData\Local\Programs\zoom\Zoom.exe
"C:\Users\Admin\AppData\Local\Programs\zoom\Zoom.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\Zoom" --mojo-platform-channel-handle=2324 --field-trial-handle=1640,i,4248689361129458158,13056498232649303706,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version /prefetch:8
C:\Users\Admin\AppData\Local\Programs\zoom\Zoom.exe
"C:\Users\Admin\AppData\Local\Programs\zoom\Zoom.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Zoom" --app-user-model-id=us.zoom --app-path="C:\Users\Admin\AppData\Local\Programs\zoom\resources\app.asar" --no-sandbox --no-zygote --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=2416 --field-trial-handle=1640,i,4248689361129458158,13056498232649303706,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version /prefetch:1
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "%windir%\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid"
C:\Windows\System32\reg.exe
C:\Windows\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "%windir%\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid"
C:\Windows\System32\reg.exe
C:\Windows\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "%windir%\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid"
C:\Windows\System32\reg.exe
C:\Windows\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "%windir%\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid"
C:\Windows\System32\reg.exe
C:\Windows\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "powershell Start-Process "C:\Users\Admin\AppData\Local\Temp\temp003241243lXtnw\MicrosoftRuntimeComponentsX86.exe" -Verb runAs"
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell Start-Process "C:\Users\Admin\AppData\Local\Temp\temp003241243lXtnw\MicrosoftRuntimeComponentsX86.exe" -Verb runAs
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "%windir%\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid"
C:\Windows\System32\reg.exe
C:\Windows\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid
C:\Users\Admin\AppData\Local\Temp\temp003241243lXtnw\MicrosoftRuntimeComponentsX86.exe
"C:\Users\Admin\AppData\Local\Temp\temp003241243lXtnw\MicrosoftRuntimeComponentsX86.exe"
C:\Windows\System32\Wbem\wmic.exe
"wmic" csproduct get UUID
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command "Start-Process -FilePath 'C:\Users\Admin\AppData\Local\Temp\UpdateMC.exe' -Verb RunAs -WindowStyle hidden -ErrorAction SilentlyContinue"
C:\Users\Admin\AppData\Local\Temp\UpdateMC.exe
"C:\Users\Admin\AppData\Local\Temp\UpdateMC.exe"
C:\Users\Admin\AppData\Local\Programs\zoom\Zoom.exe
"C:\Users\Admin\AppData\Local\Programs\zoom\Zoom.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\Admin\AppData\Roaming\Zoom" --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=3068 --field-trial-handle=1640,i,4248689361129458158,13056498232649303706,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version /prefetch:8
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 241.150.49.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 28.118.140.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | api.ipify.org | udp |
| US | 104.26.13.205:443 | api.ipify.org | tcp |
| US | 104.26.13.205:443 | api.ipify.org | tcp |
| US | 8.8.8.8:53 | 205.13.26.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | zoom.us10web.us | udp |
| US | 81.28.12.12:443 | zoom.us10web.us | tcp |
| US | 81.28.12.12:443 | zoom.us10web.us | tcp |
| US | 8.8.8.8:53 | 217.106.137.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 12.12.28.81.in-addr.arpa | udp |
| US | 8.8.8.8:53 | deliverynetwork.observer | udp |
| DE | 199.247.4.86:443 | deliverynetwork.observer | tcp |
| US | 8.8.8.8:53 | 13.86.106.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 86.4.247.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | dns.google | udp |
| US | 8.8.8.8:53 | dns.google | udp |
| US | 8.8.8.8:53 | dns.google | udp |
| US | 8.8.8.8:53 | dns.google | udp |
| US | 8.8.4.4:443 | dns.google | tcp |
| US | 8.8.8.8:443 | dns.google | tcp |
| US | 8.8.4.4:443 | dns.google | tcp |
| US | 8.8.8.8:443 | dns.google | tcp |
| US | 8.8.8.8:53 | 4.4.8.8.in-addr.arpa | udp |
| DE | 172.104.133.212:8080 | tcp | |
| DE | 172.104.133.212:8880 | 172.104.133.212 | tcp |
| US | 8.8.8.8:53 | o4506972866674688.ingest.us.sentry.io | udp |
| US | 34.120.195.249:443 | o4506972866674688.ingest.us.sentry.io | tcp |
| DE | 199.247.4.86:443 | deliverynetwork.observer | tcp |
| US | 8.8.8.8:53 | 212.133.104.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 249.195.120.34.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 200.163.202.172.in-addr.arpa | udp |
| DE | 172.104.133.212:8880 | 172.104.133.212 | tcp |
| US | 8.8.8.8:53 | api.db-ip.com | udp |
| US | 172.67.75.166:443 | api.db-ip.com | tcp |
| DE | 172.104.133.212:8880 | 172.104.133.212 | tcp |
| DE | 172.104.133.212:8880 | 172.104.133.212 | tcp |
| DE | 172.104.133.212:8880 | 172.104.133.212 | tcp |
| DE | 172.104.133.212:8880 | 172.104.133.212 | tcp |
| DE | 172.104.133.212:8880 | 172.104.133.212 | tcp |
| US | 8.8.8.8:53 | 171.39.242.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 166.75.67.172.in-addr.arpa | udp |
| DE | 172.104.133.212:8880 | 172.104.133.212 | tcp |
| DE | 172.104.133.212:8880 | 172.104.133.212 | tcp |
| DE | 172.104.133.212:8880 | 172.104.133.212 | tcp |
| DE | 172.104.133.212:8880 | 172.104.133.212 | tcp |
| DE | 172.104.133.212:8885 | tcp | |
| DE | 172.104.133.212:8880 | 172.104.133.212 | tcp |
| DE | 172.104.133.212:8880 | 172.104.133.212 | tcp |
| DE | 172.104.133.212:8880 | 172.104.133.212 | tcp |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8880 | 172.104.133.212 | tcp |
| DE | 172.104.133.212:8880 | 172.104.133.212 | tcp |
| DE | 172.104.133.212:8880 | 172.104.133.212 | tcp |
| US | 8.8.8.8:53 | 73.190.18.2.in-addr.arpa | udp |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| US | 8.8.8.8:53 | 77.190.18.2.in-addr.arpa | udp |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| US | 8.8.8.8:53 | 55.36.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 10.28.171.150.in-addr.arpa | udp |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp | |
| DE | 172.104.133.212:8885 | tcp | |
| N/A | 127.0.0.1:2342 | tcp |
Files
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\System.dll
| MD5 | 0d7ad4f45dc6f5aa87f606d0331c6901 |
| SHA1 | 48df0911f0484cbe2a8cdd5362140b63c41ee457 |
| SHA256 | 3eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca |
| SHA512 | c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9 |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\StdUtils.dll
| MD5 | c6a6e03f77c313b267498515488c5740 |
| SHA1 | 3d49fc2784b9450962ed6b82b46e9c3c957d7c15 |
| SHA256 | b72e9013a6204e9f01076dc38dabbf30870d44dfc66962adbf73619d4331601e |
| SHA512 | 9870c5879f7b72836805088079ad5bbafcb59fc3d9127f2160d4ec3d6e88d3cc8ebe5a9f5d20a4720fe6407c1336ef10f33b2b9621bc587e930d4cbacf337803 |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\SpiderBanner.dll
| MD5 | 17309e33b596ba3a5693b4d3e85cf8d7 |
| SHA1 | 7d361836cf53df42021c7f2b148aec9458818c01 |
| SHA256 | 996a259e53ca18b89ec36d038c40148957c978c0fd600a268497d4c92f882a93 |
| SHA512 | 1abac3ce4f2d5e4a635162e16cf9125e059ba1539f70086c2d71cd00d41a6e2a54d468e6f37792e55a822d7082fb388b8dfecc79b59226bbb047b7d28d44d298 |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\nsExec.dll
| MD5 | ec0504e6b8a11d5aad43b296beeb84b2 |
| SHA1 | 91b5ce085130c8c7194d66b2439ec9e1c206497c |
| SHA256 | 5d9ceb1ce5f35aea5f9e5a0c0edeeec04dfefe0c77890c80c70e98209b58b962 |
| SHA512 | 3f918f1b47e8a919cbe51eb17dc30acc8cfc18e743a1bae5b787d0db7d26038dc1210be98bf5ba3be8d6ed896dbbd7ac3d13e66454a98b2a38c7e69dad30bb57 |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\nsis7z.dll
| MD5 | 80e44ce4895304c6a3a831310fbf8cd0 |
| SHA1 | 36bd49ae21c460be5753a904b4501f1abca53508 |
| SHA256 | b393f05e8ff919ef071181050e1873c9a776e1a0ae8329aefff7007d0cadf592 |
| SHA512 | c8ba7b1f9113ead23e993e74a48c4427ae3562c1f6d9910b2bbe6806c9107cf7d94bc7d204613e4743d0cd869e00dafd4fb54aad1e8adb69c553f3b9e5bc64df |
C:\Users\Admin\AppData\Local\Programs\zoom\chrome_100_percent.pak
| MD5 | 4fc6564b727baa5fecf6bf3f6116cc64 |
| SHA1 | 6ced7b16dc1abe862820dfe25f4fe7ead1d3f518 |
| SHA256 | b7805392bfce11118165e3a4e747ac0ca515e4e0ceadab356d685575f6aa45fb |
| SHA512 | fa7eab7c9b67208bd076b2cbda575b5cc16a81f59cc9bba9512a0e85af97e2f3adebc543d0d847d348d513b9c7e8bef375ab2fef662387d87c82b296d76dffa2 |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\chrome_200_percent.pak
| MD5 | 47668ac5038e68a565e0a9243df3c9e5 |
| SHA1 | 38408f73501162d96757a72c63e41e78541c8e8e |
| SHA256 | fac820a98b746a04ce14ec40c7268d6a58819133972b538f9720a5363c862e32 |
| SHA512 | 5412041c923057ff320aba09674b309b7fd71ede7e467f47df54f92b7c124e3040914d6b8083272ef9f985eef1626eaf4606b17a3cae97cfe507fb74bc6f0f89 |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\d3dcompiler_47.dll
| MD5 | 2191e768cc2e19009dad20dc999135a3 |
| SHA1 | f49a46ba0e954e657aaed1c9019a53d194272b6a |
| SHA256 | 7353f25dc5cf84d09894e3e0461cef0e56799adbc617fce37620ca67240b547d |
| SHA512 | 5adcb00162f284c16ec78016d301fc11559dd0a781ffbeff822db22efbed168b11d7e5586ea82388e9503b0c7d3740cf2a08e243877f5319202491c8a641c970 |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\ffmpeg.dll
| MD5 | fa145097e0274da929aacd68c31338ab |
| SHA1 | a999806ef0c15593100e21bc8632d7b1806bac47 |
| SHA256 | c8476ee68088d72b9fab25703093df19237d14387016b77f472e10c99c9415ed |
| SHA512 | d4898eed2ea09cb9b1810d783558ee7bf284701734437fbd9e1035138216e1ddbddd77d588a0b722adc5c5fd4a245871537bfb9b168910fc2bffbd6cb78c3c9f |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\icudtl.dat
| MD5 | e0f1ad85c0933ecce2e003a2c59ae726 |
| SHA1 | a8539fc5a233558edfa264a34f7af6187c3f0d4f |
| SHA256 | f5170aa2b388d23bebf98784dd488a9bcb741470384a6a9a8d7a2638d768defb |
| SHA512 | 714ed5ae44dfa4812081b8de42401197c235a4fa05206597f4c7b4170dd37e8360cc75d176399b735c9aec200f5b7d5c81c07b9ab58cbca8dc08861c6814fb28 |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\LICENSE.electron.txt
| MD5 | 4d42118d35941e0f664dddbd83f633c5 |
| SHA1 | 2b21ec5f20fe961d15f2b58efb1368e66d202e5c |
| SHA256 | 5154e165bd6c2cc0cfbcd8916498c7abab0497923bafcd5cb07673fe8480087d |
| SHA512 | 3ffbba2e4cd689f362378f6b0f6060571f57e228d3755bdd308283be6cbbef8c2e84beb5fcf73e0c3c81cd944d01ee3fcf141733c4d8b3b0162e543e0b9f3e63 |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\libGLESv2.dll
| MD5 | 57c23aa2c39f11528e56a48ea1824036 |
| SHA1 | d4fbf180266eb210f8d83360cbbd3804249c60b8 |
| SHA256 | ee039e42a4948e9f26ece8515f3c699014fa7803ae597cd3427fa1548962f9af |
| SHA512 | 77487060b824cc70b30b30b144b8f174fd08ca6a298fd8c8f45d8417b90b7914a0d135edab39d6a5b2b883d49e9386da382a9ce5c52dc07ecd147f49118efa63 |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\libEGL.dll
| MD5 | 5db499ae909083620e47eeea1623b2af |
| SHA1 | bc23303d6885b8f5c3fb84b3fecdf1a678e94a25 |
| SHA256 | 7bee4e33d89e5a4f2b3bc74d632f7c773ae9a399b6b2ba6d29b1192e25695a8b |
| SHA512 | d656bfa6d59c495d85eee872b372f7fba24f89101c38de1de904ece0d9ffa6eb93de81fdf674efa5ef724ea73188b908b8ad32cfee03c656accb835683929311 |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\snapshot_blob.bin
| MD5 | d20922aefcad14dc658a3c6fd5ff6529 |
| SHA1 | 75ce20814bdbe71cfa6fab03556c1711e78ca706 |
| SHA256 | b6bea91727efb8c88e7c059856553d3a47abd883e60dd60efc01b04dc6eec621 |
| SHA512 | dbd63a9f01feb3c389c11b55d720b5d689558626041fb1dd27ded2be602e5e2a8d210f785fde025d7b9959f81de3df7fef06981269b58be564df05aec190dd1c |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\resources.pak
| MD5 | 0e69910860463d5045ec257234bd8dd4 |
| SHA1 | 33c923c33129d1dccf0bb2dcbe8af983a7000444 |
| SHA256 | 1d241f5d4403a6e802e898c61e4753f8508ae4dda8fcb7750558ec1ecade52c6 |
| SHA512 | f6bb7c7b51bb202877739801498522095637caf8a03e2e1f2c6319fede3d3ca656f552061e171ec5e35e176c267fe278c326805d760add1371590bed58e12375 |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\LICENSES.chromium.html
| MD5 | 1ca87d8ee3ce9e9682547c4d9c9cb581 |
| SHA1 | d25b5b82c0b225719cc4ee318f776169b7f9af7a |
| SHA256 | 000ae5775ffa701d57afe7ac3831b76799e8250a2d0c328d1785cba935aab38d |
| SHA512 | ec07b958b4122f0776a6bded741df43f87ba0503b6a3b9cc9cbe6188756dcde740122314e0578175123aaa61381809b382e7e676815c20c3e671a098f0f39810 |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\vk_swiftshader.dll
| MD5 | 583b1d71cd7b847ba02d734c508cd92f |
| SHA1 | d63966aeafa951d51967620c606e9b97399699c4 |
| SHA256 | 680ea3717671c896d516517ff322976ab708f18862135be4216a27ad57353dcc |
| SHA512 | cbb0659ccac9344ed9bb151443a30c106711fa1b15234e6f1225ef28a679c6b3f0a24a6ca1d9baff46155c39ff4e08e3ac96e1da32d665be9a5728956012f193 |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\vk_swiftshader_icd.json
| MD5 | 8642dd3a87e2de6e991fae08458e302b |
| SHA1 | 9c06735c31cec00600fd763a92f8112d085bd12a |
| SHA256 | 32d83ff113fef532a9f97e0d2831f8656628ab1c99e9060f0332b1532839afd9 |
| SHA512 | f5d37d1b45b006161e4cefeebba1e33af879a3a51d16ee3ff8c3968c0c36bbafae379bf9124c13310b77774c9cbb4fa53114e83f5b48b5314132736e5bb4496f |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\vulkan-1.dll
| MD5 | 47af18d68dc7cf271f0a92707f783f64 |
| SHA1 | 64594e92a1cd7042cf6367b1843abed210db3d78 |
| SHA256 | d5df2f59cc8b32abd6178250e7d1370a7f37270cc727449e21778080b5e29cd2 |
| SHA512 | 2e8fefeccc25e5fcb448fd874f99b8d1466a8148ffe80e1f6ac2105d18bb93e529681ff0ba38e515f52ed4df9ac091fee0782afe5e093fd83c3045a60409fc10 |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\v8_context_snapshot.bin
| MD5 | 1e4da0bc6404552f9a80ccde89fdef2b |
| SHA1 | 838481b9e4f1d694c948c0082e9697a5ed443ee2 |
| SHA256 | 2db4a98abe705ef9bc18e69d17f91bc3f4c0f5703f9f57b41acb877100718918 |
| SHA512 | 054917652829af01977e278cd0201c715b3a1280d7e43035507e4fa61c1c00c4cd7ed521c762aebd2ea2388d33c3d4d4b16cee5072d41e960021b6f38745a417 |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\locales\am.pak
| MD5 | 4eaa15771058480f5c574730c6bf4090 |
| SHA1 | 2b0322aae5a0927935062ea89bd8bd129fa77961 |
| SHA256 | b05dcb8136751aee5eced680a5bad935e386bfce657dd283d3ec00ee722fd740 |
| SHA512 | b67e7dd24eadc91d4cd920f8864cfb23a9c67b2cecd54ec97e01705636604ce504dc417d6af1c53f374b58eddf71a12bb82248bd8fd68307161d4833342681a9 |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\locales\af.pak
| MD5 | 862a2262d0e36414abbae1d9df0c7335 |
| SHA1 | 605438a96645b9771a6550a649cddbb216a3a5b1 |
| SHA256 | 57670eae6d1871e648ad6148125ee82d08575bec5b323459fc14c3831570774a |
| SHA512 | a789a4cad72106a5c64d27709b129c4ae6284076f147b7c3fcb808b557a3468b4efe3ede28033f981335d5eab986532c0497ddd6ed24b76189fe49366692ee73 |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\locales\bg.pak
| MD5 | 0e8005b17ac49f50fb60f116f822840d |
| SHA1 | f2486da277de22e5741356f8e73e60b7a7492510 |
| SHA256 | 50e4f6b9c387adf4baba3377c61d99326cc3987928d8d60b88d1ac29352820ea |
| SHA512 | 5df18bbeabd56e70d4c5a80dee5b7ce48259000665941634937e556e3b3a1c6403aa45c410f6f755607549c9dd35d722987b447c50efca51228ffeca4628756d |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\locales\ar.pak
| MD5 | 2b2dfafb0d258c1d2b58e51ae1ee9ab5 |
| SHA1 | 2a538491ff4023d29bdf2a053447c6016138d9f2 |
| SHA256 | ea49bc2ceb6b185030eaa0ee0155feca90e632390417299113b02fbe365ff731 |
| SHA512 | 6b629ed83edfea1b1ff3c379009332e413c420de651a24160fae859e1e0948fbebab99c9da714df6dfad3b9e472dece7bee95815ceca428183f4ac0bd6d42ff3 |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\locales\da.pak
| MD5 | 0e4207e2cf5741a8968617df9174a681 |
| SHA1 | bf9b7558141ad30bbc921992e48d48cd6d6ab475 |
| SHA256 | 438d2b1fd396c2108ca3902f69eeb372219edd5d95fe70970d8ee9e64556c9a4 |
| SHA512 | 4ed8368013912c408f7e5f7b4f6f1748834e5506307b92f4b669c557efd27363a55b4e2918eb7707e798878c9492b765f24ab9c90e843f54e8641c4646bc72da |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\locales\cs.pak
| MD5 | 70f320d38d249b48091786bd81343afc |
| SHA1 | 367decdcdad33369250af741b45bdc2ca3b41ab3 |
| SHA256 | 1c9448ea3aefce1a7e1491e73af91af772d8b22d538676a2beab690558e668fa |
| SHA512 | 02b08ed9261fd021e367995551defaf4b4f54c357409a362f4d2470423644913375cac444f62153ec2963a84880a30a36f827dbfacdd76a6222838c276cf5082 |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\locales\ca.pak
| MD5 | d193a3ac614f64f4754c9df5cf00e880 |
| SHA1 | 0da0f7c1a4048074f6fe9d70704aa93ff75e42f9 |
| SHA256 | 4ecfa3785ab52564e0bd7dda04d59a30163561588a04f3bd1b1b71de051d2c53 |
| SHA512 | e85d18951f9a1a86514d577f9b19a4b3727523c15b4ccdd17217f6fdf69a0e774a36874108a05de1be3dcee1720b0cb19eced2d3283f57f41f5f9c5e233e1c68 |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\locales\bn.pak
| MD5 | c8173f0cc63ca9e02c07abec94892b53 |
| SHA1 | 2688b199cc40bb2082247fa451eac1304608e48b |
| SHA256 | e6adcfb4f3b3bccd4a27edadc168b503c36551cd6b27fb24043efeb21f691ce5 |
| SHA512 | 3d2317430722dc15c5d938fa55235af1caa03dcff7a574b44d37d89e7cf2c94dd2e84518b3eeca4a5a8dbec1b99d94aed97429aaf55c63998002d50ce9cb5019 |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\locales\de.pak
| MD5 | 141045fc1f94f93e82db06db4f7321c8 |
| SHA1 | d63d226c531a710359cb65f4e6aa190f593b4d54 |
| SHA256 | 47253e2fcf0e4691f29b3ebbe8f888a97b28d6aeaf73ab000857a6b8d0907ff3 |
| SHA512 | 85c27fdc9a2cb9310bfbb05d0bcd668eb2156a37765d8fb59496739f6f1eae12afcbaadf5eea8f2db2ad8c8a0602f83500bff9cb71a429174a80bee16ec10118 |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\locales\el.pak
| MD5 | 16bcd10bc81dd8a5b3ad76c90cfb9614 |
| SHA1 | 240395860971fb9205d28602d4d4995007ee5c75 |
| SHA256 | 6a06d1d6b566214f7c3b693052beec488f7aae5ceeca26781a5d66fade39388b |
| SHA512 | 353a26b21848f4dd30b3aa1f4196b23571e177893ec6912db4570493664ed987e688fd66c04e509ecc58233476ebe59453260bc3569136f275fcd681ae54a174 |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\locales\es.pak
| MD5 | d584992a0670c5771147c01266d17362 |
| SHA1 | d6e70e43585564d520e4b1777fac0b1e7bc6ed37 |
| SHA256 | f6a01c26bc18dcf701e1d4b6ff76602f14c4bb9adf9dd176c9107d5aedb4503f |
| SHA512 | 39db436a05955a3ad3b54ace4f2f0e8a313797d3ae8eda9cf1cab6f2ea1edba0a82c30f3b589b8c5399ed06e9fcf4ce9059d3d5a07472f05ab1f0819e42d5b73 |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\locales\es-419.pak
| MD5 | 088de6d12071ea5cf8d4a618ed45e7d5 |
| SHA1 | f12a76d18b84b17906f5f8cfc78cbb370b026b09 |
| SHA256 | d1019c780e836e0c30fe01928d23ecdd0ca04ed8ee886adb3428e3683e4ed6ea |
| SHA512 | 8da7326cf99cce53d7ccbec0c177ff9cf6dc0009431d6c89b3e8f0475bbcd0dac4c888460b535c1070ced62f1bf1c614bb0fbe9c5583e66c42f30d6e025ed7d6 |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\locales\en-US.pak
| MD5 | 809b600d2ee9e32b0b9b586a74683e39 |
| SHA1 | 99d670c66d1f4d17a636f6d4edc54ad82f551e53 |
| SHA256 | 0db4f65e527553b9e7bee395f774cc9447971bf0b86d1728856b6c15b88207bb |
| SHA512 | 9dfbe9fe0cfa3fcb5ce215ad8ab98e042760f4c1ff6247a6a32b18dd12617fc033a3bbf0a4667321a46a372fc26090e4d67581eaab615bf73cc96cb90e194431 |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\locales\en-GB.pak
| MD5 | a1aa885be976f3c27a413389ea88f05f |
| SHA1 | 4c7940540d81bee00e68883f0e141c1473020297 |
| SHA256 | 4e4d71f24f5eea6892b961fcda014fc74914c1340366f9c62f0535e9b94ae846 |
| SHA512 | 8b6d67e09fbe7a2152a71532a82c1e301d56cdde34b83a9f17d9f471e258b255d5b2d4a0c39f38581da3a31cec24fb403156a8e493560d7206e1ec3db7e68b72 |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\locales\hi.pak
| MD5 | 18bdd1d8d1d5c6a5fb2678abaa1ef6a9 |
| SHA1 | e40602e86e758a518ec70bb6a9cfa23107955301 |
| SHA256 | 1f49622ec6682c90e03fc42c319074565cf9d3532a2a4e3798e2f6cc159b2e8a |
| SHA512 | c859118e7c1be0642ba9bb1112a98a8fa7114a00711f578971a55aab7254b1ee9bb3899c852b79a002596f29e02f487267aca7033e38cbfd14c90b2989b9595e |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\locales\ja.pak
| MD5 | dfd5ab27c326a1e1f87943a3079a2af2 |
| SHA1 | 3aaa73a6668e1249e4d51c8fa8e0c6868fde9da6 |
| SHA256 | 8260f4c9500b64d541386a8515fd0c9ddef82e3f044951b7b51a33ad81c1128f |
| SHA512 | d701674fb6e19bcdf297b19a9fe3b81c7f446019a8c2fd3e90e19294765b1e8ad4f0e40e4bac65b2db313a4f83eb050b5871ee4d74f9ea372208b7abd76c524f |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\locales\nl.pak
| MD5 | b525894276852be4ab42ab7044fa164f |
| SHA1 | d3d035522265718def8125f5c4a1d3e74832dc2a |
| SHA256 | c7a18764ca908ec7f66c48cae2be06fef95213d7a5580b45f9bacee474456167 |
| SHA512 | 36b11f1df92df27b007fd640b589c6b7b30cd889bc297635bdaa40bfcb4332ff20911edfd23ce74c1c8963dd658f77bf4b9af50d3c281717f58eb23a598783bc |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\locales\nb.pak
| MD5 | bf9bfdfab1479bb52254329d7aa229ff |
| SHA1 | cd9ff35321731b839ea6e5f31f5de0bfb475666b |
| SHA256 | 96747543d9b2dbfb4482d4c24d7818d366545b2476633ad4fec8cc958ab760d3 |
| SHA512 | ba8e62d0a87c532ff46f2129724dd2f1bfdebd99c2606e0b9608cd07841776faeca15d04ec6241020c232d4c07809d718f40cf4ad9231d6a8996d55973486629 |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\locales\ms.pak
| MD5 | d22cfc1b78320157685839f14253fa1d |
| SHA1 | 0cfcb5c176d708e26bbca2427be611ce6609eb93 |
| SHA256 | c7b56e9ca2f75b4414c13144ff4deee1459c2a7cde79730d863ab234cd4c2f8b |
| SHA512 | 2eed40c50a63e362dfe2f172d16e4545f5b19c673e71db674bb004e4e6a4cf793ed4a44ee80d86b05aaa6cc4356c207476afdedc2b35017421ea9b9fa6ebc81d |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\locales\mr.pak
| MD5 | f26bc5673e02a93212220d71cf1bbac2 |
| SHA1 | 8d0ab40fc2b35b75f99538951acfbf6a348c73a3 |
| SHA256 | 0877f2e75e0b9f5e709f0a0bf7cc793a02ff5bbb28bd6a8b6b6012760c1bbff3 |
| SHA512 | 9f3a629dfa116cd92892d120f0fdecc5f57043dad232311bdc8c218ae9317f49e655b8b8dc8399639231f2321013190a667d22b6b2735bbcbc375c438dce9aaf |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\locales\ml.pak
| MD5 | b690b0f01954735e1bcea9c2fb2ac4e4 |
| SHA1 | 8d98860e202b15a712822322058e80a06c471bb8 |
| SHA256 | 83d187cd70048f4129fa65ba148c74a04a47ee1f14218e7c85b36fe83e87b5e3 |
| SHA512 | 786f08019a0917d0b3f29aa2d1885db6a6f995990fd8faaf41a9630f8347b4d210a844cc6690a41b4af37d60e11f41fd2675df1a01bab5915e20cd9bc69b4541 |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\locales\lv.pak
| MD5 | 393c296fabe0c4c64a7d6b576d7d2cf7 |
| SHA1 | 16c0605e5829cde9738e1cd3344a59b74fa1f819 |
| SHA256 | 91642c04de64f88a5c49b4eeaf5d627554e60d56fc40e7cd58cd2601b0d3dbf2 |
| SHA512 | 067cccb059d4526c104880a26ebf04c7e2498c49c5641abdc91785e859bc0be1475ec58cae9ad1eb076f26fb9215ac246155e123baa13c06a05e4f22a002c2ad |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\locales\lt.pak
| MD5 | edb2c872a4fec5367cbe68035ef0ecc7 |
| SHA1 | b4d42bcc83c98dda1ea2ef962d097f6fb3d25c71 |
| SHA256 | 1bd385b780f3d13d41f8cf782a322e37be889aee273ffde3d8959e0ebcaabd0b |
| SHA512 | dd801a1aac2242e3f532e968b4c9639a2c8bf3eccc17470d9aa8bd6730ae4be3e7276fb782c7908bb6f87d3ade20a40c644b9db5d2201d96d91fd95ebdf429c9 |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\locales\ko.pak
| MD5 | cd2310448ba6689cc73d0b2e6dd2791f |
| SHA1 | 7827179d3fb98a5abc2ad38e20d942b83b397235 |
| SHA256 | cba6b7633cce796407821264e176a6266f80c1799ade16bf16893d68144236c6 |
| SHA512 | c3069bab640ae43856330bb8b3a0e0a4ca058a68a0fc03b8efc0ce1dc2b517f11380fbc641221e29b4a527d685ece72107fb83cdb9b539390eaf6a30c21bf36d |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\locales\kn.pak
| MD5 | 59e6642f09ce97cfa4a4173413a1b036 |
| SHA1 | 777a96a4aefbe138f26c8697e66633452285eb2c |
| SHA256 | 58d16195170f76e40e18ee0ac2e10e1b73bcfd083821158927a7d67a51bcbc42 |
| SHA512 | 66deb67a4ce1914f5f27bb6423e5be62e05d0a36320accbe653572a437ce033ed5d26858a62d8c57476b34e1718d580f34ab44a3886d8d22d17f642d70f0138e |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\locales\it.pak
| MD5 | e0e5580e8882f0eae4b5b21e6c7828d4 |
| SHA1 | 51e32e51458b5839112ed9dcaf500403c45ac1cd |
| SHA256 | a7f555e7e797e1de1a66cfca8c7b709b0e542ca62e7de96e034701fcef316d0c |
| SHA512 | 1a2a4948a5538158e6dab7ca7b3b780ec7a66a0aadb889fd451e07b32336ea08b88b5d57759e335fa967f3b4bb1282e952b97e496d798758159c70eed2e5acb2 |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\locales\id.pak
| MD5 | 6a406a9adb5c25e35c6838828ef30c17 |
| SHA1 | 2a1ea1dcb75217ace04254644845cd038df6a980 |
| SHA256 | af63384cf7d1d39e57decd823dff7538ab2b1e7e36e9ac61238477f7889d1d46 |
| SHA512 | ac7afa288b768a730027db0780b0f7c9f42ef990e4e22751ef1dc85e4841579a6e252293fb04d61b0cb591ccaa5c74d37bbd380afa15308c80ea32070019a361 |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\locales\hu.pak
| MD5 | 0b62fc2b60b8a92dc506550339766139 |
| SHA1 | abf0b1ae99ae40d87f86ee04bdba467674fc1039 |
| SHA256 | 6ca150d0fc35492bafb411bbc520f3b34da6399969fa9685ae74201623882560 |
| SHA512 | aab6058e2f41282ac5a9394cdcd503efdeb6b9eb8b9a64cc1215e31a806e60a34966b6823f91a97bfb81656d91ccfef3a226165811e6f4208fa436e1d04c1242 |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\locales\hr.pak
| MD5 | d80178f9df2b72a24a7dc58b5aa13229 |
| SHA1 | cda864bbfc6935cb4e3e30a6eaeabbab5264d01d |
| SHA256 | e442d083c32d752d1ef2225d84a4f1a91efab768e86fc63a7ed22c10fbf7e520 |
| SHA512 | c08380fc0c415a529a035e6e9c0eebc719766c656a3d9e3a782f21b4fef320688e1d11de8c3a5d0e59a102c9fbadcc960478a17c534500e137f4cb0e697ec9b9 |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\locales\he.pak
| MD5 | ec16b50e6575cd6863df282847cac3b0 |
| SHA1 | a59e089951c3a5dcfac165774c68651055b829e0 |
| SHA256 | c3955c97b6998f1806f8871fd3137f6f504bdd091f8bd1ff5ab8cd089474ae8e |
| SHA512 | 3c640430e3391be156aab26f6057e966348dff50ea946a02db947e2316d3a915c29f329faa26725a90af4d06ead7c7fc28cfa7573033b2b9546fd8e4d2bb7ab1 |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\locales\gu.pak
| MD5 | a9e6d8e291ffec28551fccf4d1b06896 |
| SHA1 | adc9784433fbf2ee89bcfe05baea21beb1820570 |
| SHA256 | 716ea0433e19edb5113dc8a25ae67c2587bc17c7fb63a93ac473bdcef8f72d34 |
| SHA512 | 3a60002dc6a9008cac78bbc050fc36d1053bfbd21ecf4d0579b2780985d4e7a7aec94483d8b0b8dd7a899b8435d54a27bba68917a23945431183eda021722697 |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\locales\fr.pak
| MD5 | 59e1e573153a209c56ae3bcb390b898f |
| SHA1 | 45f8a5469651c032c453b14bd68c85cdd6c75fc2 |
| SHA256 | 976622fb851378f57f81423e5625e40d0753d7a5e34caed2c39e4b130a3427b8 |
| SHA512 | 91f1b88ffb9f3362fbab7d607a68c4ca65e6b89fef7de0c986067ef7fd013c0ce35bce328ff3546cb7aafc296993e46a908ac506bb6a141088cfbc5ead948ba4 |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\locales\fil.pak
| MD5 | cbb431da002cc8b3be6e9fe546cd9543 |
| SHA1 | 19fbf2715098fc9f8faba1ac3b805e6680bbcca4 |
| SHA256 | ab107369d45e105a4cb4f2f6bc8da2a8c1b6c65d5e94a7ab3e703e619c083dae |
| SHA512 | 3cabbfd021e5814587dad266c4f5c9f624e9d9278f22658dafd65ff2ad2bdc5f6df8a8672614b296cea826819211e12f8e77f183007c0a79075e2f0980b99911 |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\locales\fi.pak
| MD5 | a9fc339d49ea069bd81380ae1fa0ef11 |
| SHA1 | 5f376072f38e94e252d72c5660d8120a41d73469 |
| SHA256 | e6454458dfbe150112c37f8b02f8c72c593af22e8be16980ebc854ad113fb763 |
| SHA512 | 3bee6723485a9eae4aa9bfd4e7fb490ce7a0aa12cbe41443b8bd28a26fe552cd31f4a1487bd98c6bc7774df1ea16b1de94ed0f52af59baf9e17b3db815404c4d |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\locales\fa.pak
| MD5 | e2bee9eeeac231de237100fae0aa77c7 |
| SHA1 | 5e5eeb59656e2f8f4f62bc618966d38cc06a385b |
| SHA256 | 7a856070430e3cfad15b96b153b1cb483cca9a1b9a43453df3707b09c748a3f2 |
| SHA512 | 5593c4a48e679f0f6283c3bca69838f581b6f928cc7170737778458393b6b85fab0e6ca390bc5da840f4b79de9e638015bf341c1a95e8f99770886f5354ecff6 |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\locales\et.pak
| MD5 | e7ea23d6304d5d600d884f4e3b3cb2d7 |
| SHA1 | 99fbef7eb1bde7df398cce9faf6c7c357769334a |
| SHA256 | 292eb18ec61502b0e952b447f73a66143c56dd95f170981945e5aab53a6b32b3 |
| SHA512 | 23dfa1161d11faf440241b1f48f2ddbc8ec086a8e18da351734656551f0f54fe4c94b490c0d3ecc378a3de7f7713a1626a7a6c21da2500b9597b44fd08197d50 |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\resources\app-update.yml
| MD5 | ee62ce88d7f9c13a83adced0dfc3c988 |
| SHA1 | 4e7dd0ca6c5d99e7bf155f86e511a8aa0910201f |
| SHA256 | 583942571a2eeb6ef68c430e446278f6b5d5813c137822b904e1ea3ef3c2662b |
| SHA512 | 5c514b6255b17b714dc8e172fbfe37a3f427f2457b06da2570ae50df6fed1b9428f54ace9bca0729eac15cdf3c68fba6e02d966dd7a247f92f8be4115fe51f26 |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\locales\zh-TW.pak
| MD5 | 1eb532e97b84db33a50055bbd7d36200 |
| SHA1 | 7aaf0560a16a9754059871a000d237964f3ab0c8 |
| SHA256 | 6a43c8fac5a0ce7c7a21b30ac7bc2167488e17c81c76c00f0b92b49e9e46e469 |
| SHA512 | c946d82bd6ced6e61b35acaf7ace1a61f226c4891caaeeeec9ce4a3ab45e6f43c35dbb388d6d5fa925ed020d7d10f951fa2048269d0585ad3b723f5ad8f4eabc |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\locales\zh-CN.pak
| MD5 | d1145f2dcb13c5ba797df5a0792553c8 |
| SHA1 | e8d9604300d6413fc896d252a0261be2dfdebfbd |
| SHA256 | 6a9a1f5b7674da36f20cb76af7e3e75e9e56873539e8a3b32895ebba439af83a |
| SHA512 | f54adffc7d40866fd53dbb238687116d46354f79580877b5d4d93840494e604deaeaeb7e825f6a00d020f3c58d1fb9df8af667feb64c86f243ecab57765623e9 |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\locales\vi.pak
| MD5 | e088be14dded779f50feabc4906d5ae7 |
| SHA1 | 0eeca2c7ea82a03b6373c84adf1a890f29e18b05 |
| SHA256 | 25aeee59775ae38b21a091107022312fc228f96dbea906042bf3626b7cf86b98 |
| SHA512 | af9d1e415a6d06c28df9abaae1f337bf4dd3e323dfd5560df5fb35d01c6801b9145072ee85ab4c524c489fb6cdea956ce327b8c4f6820197d76fc2f33171ca3d |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\locales\ur.pak
| MD5 | 29403f3d5c8f6ae2a768de2fbe8b368e |
| SHA1 | da83015565980ea1a24f5493be6311f06427269e |
| SHA256 | 2520ba8471c840aa075075524c4ad2bde10f43fa7a1b623aa14555180ecd30ef |
| SHA512 | a0709280adec39633ca19daf9f8bac6c17a999101246778a63cd9e172dbea2f281b20ce197290c4af6c7601ee7956da42f17e31461a1bd8b8a4bce3c36dc87b7 |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\locales\uk.pak
| MD5 | 83e5f0092b6d72403b60fe0e1e228331 |
| SHA1 | 989ed480b7ef55dfc9ccfbef1a5b9b0e104693d8 |
| SHA256 | 29d68d90512ee9952635c7e074d5ab210531d93ae24c11a8f91bca20b685e9a2 |
| SHA512 | 9895928ee516db7d4395b2788135a814031b9ba45e3a837e633bc253b08d6f380e4078d4d3fd51ae37502a39ff45a0166969fb62365e890f4960a51040b20941 |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\locales\tr.pak
| MD5 | 193f0c0a8218f05657e2590ea4ee6004 |
| SHA1 | dd3ffd7f67f72de879903a231271c20aee56f695 |
| SHA256 | 676d46d19d1673eeff4f5e908aec3b53a6273c440e69e7d655ced6c70531cb9a |
| SHA512 | 28606d710d44c9a82c2849fa5ef989bac1afab53cdea99a825f80aa41dbd38a9ad6f0f44935f45439922ca2bdddc89c61f8ffcb999aa13fa45558551d5216e1d |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\locales\th.pak
| MD5 | a4d1594635d26330ace7054bc025b76d |
| SHA1 | bc4874a6a3b1d1886f05858ef2f653ab3520451c |
| SHA256 | f06a45f0395c3e42e42c46de2c19a2a104661b47be6f9ee97f8c68b05706ef1e |
| SHA512 | 731485b139ba0ed80dac5e582ec36f53a805a867ad33551741b805e851a9d2356fb1894232395d4fdb200defc988bcf6d51e58834b542c398c1012e389953a3d |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\locales\te.pak
| MD5 | d262c33a8c2b4949dff36cc1980e5f05 |
| SHA1 | e1ad725c388c4a1a386b4ab6170601863c943c29 |
| SHA256 | 09ab1ac2b69f868539d4f2e59dfea8c3c2f418a5455777e4c91d13c5ee55ab4c |
| SHA512 | 0202f6ac32878926422d542ea96b0bcf8b168f8ec6b928121c368711856fd5f4781a24b15851cdb5892246b355d0dd37504d4599b24e9fe8a723b8dfbfeed29b |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\locales\ta.pak
| MD5 | d50aa6815b63aff8c443622cb8bfd849 |
| SHA1 | fd247855e6e428109e7bf2e0018580cc6e0663c8 |
| SHA256 | 6348cc2d385b9808fdf1b815914dbfb26f552da4d10f85b2613a5e6e9f95b8fa |
| SHA512 | 620e2f9ab9998c68d667e32ad9bbfa2569f7a60fbc2a67d7492c6c215af2a1037708e38b4ed7932074d29a140581fe0ffedddb362133a941966044b98eaa50db |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\locales\sw.pak
| MD5 | 9808a9df2da0844b1ce1a2a4213c48d0 |
| SHA1 | 541f24f006ddb3361ff1e5015f097ab799120fc4 |
| SHA256 | 1949953d638f266ce74d84c020174c074780166b880e7c2ec38bc6047bbb8ecc |
| SHA512 | 66b256e02ce11ea0273cc5bfa78e56faf8b250208d1e868bf4af77cbefd1c891708573d63873a5d02436f884544a6550176afcd3a8220cd35d64b88987e94404 |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\locales\sv.pak
| MD5 | a813b566c9e630910e6ca946defb7202 |
| SHA1 | 2e25d2479715a572c096ce19b8dfd7a6da5339eb |
| SHA256 | 48a71912e4843b03358fede7176b2e57ced83d3a1344a92b989886374dbded62 |
| SHA512 | b348404135e147cef93c246c826107f9df170b294e9d0cbf576d2812d0ff3d2b7794ab5aba55cf729fcf7135a495d2ff591db62fa61e2998290ff02538a0e48c |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\locales\sr.pak
| MD5 | 5d70a218b7dcccab0406fa9239ef800b |
| SHA1 | cd231758f84a0d56545d0a234a58757a18a58d0c |
| SHA256 | a2bc6b064ff1f7b15707f61bd76ddd9d889bd982c4182e9e74272d39c6235c85 |
| SHA512 | ef6f71e0d9782b5ed6706d9226c1a7fb5a4323b8dc8de25737c7dcca87d04c16b545372127670de312079be993823f565de1aaaf5ad833bec5baa0856c19b0f3 |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\locales\sl.pak
| MD5 | ff14d5f9484350396780bea7f3bc64ec |
| SHA1 | de097f12b70b552824de69141d6ee1969275eca4 |
| SHA256 | b174c4c49654f7d65d223568c700bfaace74238447ae63171787236ce2aab00e |
| SHA512 | 011bcc3980d21e0900d1da334a28b72623b22b527a4fc3d96a8f78fb055dc87cd1433a63d8b4414a0a86cf2ded5833a395214910b17433a0545e04d1ce4875b8 |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\locales\sk.pak
| MD5 | fd001b1b02597bbf16baf3f0baf3c6e4 |
| SHA1 | e4c703fc115e02833fe08caab1e62775b5812473 |
| SHA256 | f9cd222838721a618c23c8f6493bc9699c795c0063998f1a8d506b4b7a297cdc |
| SHA512 | 0ee991da6b8ba1bcc3cc27abc645af43bb93edddbf182496aafeeb401d71ae10716335ee0197f1987c21b3abb441aaac968b9a76e75ae77fcba4cc48847f5b1d |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\locales\ru.pak
| MD5 | 9ef6fd52dec5613f9e80204a84c7f2ba |
| SHA1 | fbb8c9db815126fca3c62c810432a71b6965f2aa |
| SHA256 | d0068b9ddf8a9e6a5b1186bd0e00ed9f09224ed56ba7e653e2d54158d938c6f2 |
| SHA512 | 0fb442ef86f75ca2cf58a677bd25ffb7c420f98250fac7f5f25e2272d4e7dc505a5f3eb3665b62bec189496154b05a1462b6f17a0e9aeafc1517b71e2d813953 |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\locales\ro.pak
| MD5 | 938e62fca60d7b54e9c54cdd1f745f06 |
| SHA1 | 5a61a1ef3ae855ff436c5d7f45b6ec271a5228aa |
| SHA256 | 82e69f505222125ea62f8e90d8030d82a1bd49871192cb4274a8fd9d0e03d577 |
| SHA512 | d3f43881fc951c961cfb34babaa6eba2aa9175865dc07542dc529ab1c11d15703c03a7e8193c004b004d13f0a0672bccb2fcdd1cd88f32add159c337281d6d5f |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\locales\pt-PT.pak
| MD5 | 4816d83e54beaa2f94c671d56361c04e |
| SHA1 | 5cae66c0b7079d778ac87ad48777afd85b172d2f |
| SHA256 | a903ca2a8e52f987e23d040de7403b58d925a6c39668d3bc0822fb2aadd34cb1 |
| SHA512 | 0d3a39e1205ce9366818cb51d38db035b80448dc1e2d2d6bbd7d5df693641582043b45b4a78bbf2334159616187dc85a51e623bb6878b1498d9bc7acd2a6ffab |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\locales\pt-BR.pak
| MD5 | 8dabbceb430a6bc190ee344541fa8e2b |
| SHA1 | 44c7da04bac8c9ee67c8d6a0eeb491cf7ffd2479 |
| SHA256 | 6d54f87f6c8b5e01bd0da9a961236344e95e85c3dc55fc92a34542777d6f6275 |
| SHA512 | 4d36d527f1769501d1fce208738028d5ba142716a6243798212d5a2403dc5c950dcb3399e571cf3a11b1f35d845a6ba6798c38074d0ed66c894b1c18ab800159 |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\locales\pl.pak
| MD5 | 7b5d41611b92b24ec8b36b66feb11f9a |
| SHA1 | 3d6c36f404c29d59a24970585931860453f5c88a |
| SHA256 | 69e16e41f5fe7fa18557b938874f20cda6879f3cc616ead9a815c1381fe94158 |
| SHA512 | 16ba52cc799132e4525d220ed595d3969d4cecf163ccea6b62fe2211003b0cc44090c4d384e9cc4e32800181b7f7e0810da5a0d2c908f4625ff8382cfa3c177e |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\resources\elevate.exe
| MD5 | 792b92c8ad13c46f27c7ced0810694df |
| SHA1 | d8d449b92de20a57df722df46435ba4553ecc802 |
| SHA256 | 9b1fbf0c11c520ae714af8aa9af12cfd48503eedecd7398d8992ee94d1b4dc37 |
| SHA512 | 6c247254dc18ed81213a978cce2e321d6692848c64307097d2c43432a42f4f4f6d3cf22fb92610dfa8b7b16a5f1d94e9017cf64f88f2d08e79c0fe71a9121e40 |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\resources\app.asar
| MD5 | afe1fe8e5ce7b3053c25c902dbc7b03c |
| SHA1 | 863ae3691ec74079f9f7dd80e408f54394a380eb |
| SHA256 | ab76b6072c9e36a5bc40b33d58e814c66489a2cf87ae6e5b04732118c1c88852 |
| SHA512 | 4b4a576da43d61a6af302102ea96f26ba83a7ed351fed92a1cd164ee50e3a1eec05ca3f372d6bd8b01b044a925f45eb600e3e1607acfe6164bce6cc893135591 |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\7z-out\resources\app.asar.unpacked\resources\favicon.ico
| MD5 | 96990db652ae46b73e46baa7b314b447 |
| SHA1 | 0782b2596100dd393bf96475ea533f9f6f0305e1 |
| SHA256 | 4c1dd4dc46d1b7c6aee2f25d8977733670f80920180c220ac04440958120ceb0 |
| SHA512 | 8250f56f30bbd57600018465c505fefacb06d46e3ea26c23a5e8a2f460f47bacf3ee5a536c335fc74c7523e4ac71882b48a4f71a8e90f34663c608e88fef13a1 |
C:\Users\Admin\AppData\Local\Programs\zoom\resources\app.asar.unpacked\resources\icon.png
| MD5 | a2cf889708d9c4959c6808b4584848e4 |
| SHA1 | 9b95116c7bb7f367985ff873ca690713b3f68746 |
| SHA256 | 4363016ccf3541c84ae6a1eee83f507fb2b775aa89b9d6c8163875640267f9e9 |
| SHA512 | 2f388a8ca8b74338fc7af7ce4e817f2f7517cf49ce55bfa26a44ea73ec0cfbce189c259d577b2e5e66e3af465936df021359fee1bb2b10c95c58f0712e76f542 |
C:\Users\Admin\AppData\Local\Temp\nseDC19.tmp\WinShell.dll
| MD5 | 1cc7c37b7e0c8cd8bf04b6cc283e1e56 |
| SHA1 | 0b9519763be6625bd5abce175dcc59c96d100d4c |
| SHA256 | 9be85b986ea66a6997dde658abe82b3147ed2a1a3dcb784bb5176f41d22815a6 |
| SHA512 | 7acf7f8e68aa6066b59ca9f2ae2e67997e6b347bc08eb788d2a119b3295c844b5b9606757168e8d2fbd61c2cda367bf80e9e48c9a52c28d5a7a00464bfd2048f |
C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dic
| MD5 | f3b25701fe362ec84616a93a45ce9998 |
| SHA1 | d62636d8caec13f04e28442a0a6fa1afeb024bbb |
| SHA256 | b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209 |
| SHA512 | 98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84 |
memory/5844-838-0x0000023D34BB0000-0x0000023D34BD2000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_somwrv3e.hcw.ps1
| MD5 | d17fe0a3f47be24a6453e9ef58c94641 |
| SHA1 | 6ab83620379fc69f80c0242105ddffd7d98d5d9d |
| SHA256 | 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7 |
| SHA512 | 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82 |
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
| MD5 | 6cf293cb4d80be23433eecf74ddb5503 |
| SHA1 | 24fe4752df102c2ef492954d6b046cb5512ad408 |
| SHA256 | b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8 |
| SHA512 | 0f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00 |
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
| MD5 | d8b9a260789a22d72263ef3bb119108c |
| SHA1 | 376a9bd48726f422679f2cd65003442c0b6f6dd5 |
| SHA256 | d69d47e428298f194850d14c3ce375e7926128a0bfb62c1e75940ab206f8fddc |
| SHA512 | 550314fab1e363851a7543c989996a440d95f7c9db9695cce5abaad64523f377f48790aa091d66368f50f941179440b1fa94448289ee514d5b5a2f4fe6225e9b |
C:\Users\Admin\Desktop\Zoom.lnk
| MD5 | f630948aaa8966547ef3a3e1b7440fa2 |
| SHA1 | b28d103c79ff13966a7919621249d594482d985a |
| SHA256 | fe46ef7ae91716aef55139f7e962127ada86c8bea17e979d2c07984339e42a57 |
| SHA512 | 919600f3e36da6ea0b634a3fb6abfa1d51764a59d9ad7dc2b3eaa2332796654d01598fa5f5b865eea2349e0caea4df18d17544792a56220e1b2aa499de502cf5 |
C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Google Chrome.lnk
| MD5 | b36835f5b463de59dc721fc1cfa29db2 |
| SHA1 | 669737df57038106dbe238eb759717d1478c38ab |
| SHA256 | 19bdee5e8686de03c4152478ac8e6e355635418bd227e002ad8e85af9ff035fa |
| SHA512 | a40ab223fe6adc5dc3dd4f02eba1128900db51a2060444c692503a7b9f8fc5d63d67e1af4a79172bfc0473627e5ca389213b4cc9b520f5f9fb002a5395cd0338 |
C:\Users\Admin\AppData\Roaming\Zoom\Network\Network Persistent State~RFe592fb1.TMP
| MD5 | 2800881c775077e1c4b6e06bf4676de4 |
| SHA1 | 2873631068c8b3b9495638c865915be822442c8b |
| SHA256 | 226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974 |
| SHA512 | e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b |
C:\Users\Admin\AppData\Roaming\Zoom\Network\Network Persistent State
| MD5 | a1f7de6deec1b21242619cddbe5d7f06 |
| SHA1 | 4a4027c13a4804cfcc4b3aba0b3a84e4aa10cbfb |
| SHA256 | bac9fd203cb05af20f2eacaef6d8dab2fe1975c98fa31584b4e1ce752bf32a1c |
| SHA512 | 3d7b2b3b4324cbebca3964fdbf4a1fc02fa08b1cde862ccf188d0f8a1a3741bed07d77399258030aece6643ccc1433abe6361ed6c6b0a7bc53b2b3b33966a31c |
memory/5752-964-0x0000023854F20000-0x0000023854F21000-memory.dmp
memory/5752-963-0x0000023854F20000-0x0000023854F21000-memory.dmp
memory/5752-962-0x0000023854F20000-0x0000023854F21000-memory.dmp
memory/5752-974-0x0000023854F20000-0x0000023854F21000-memory.dmp
memory/5752-973-0x0000023854F20000-0x0000023854F21000-memory.dmp
memory/5752-972-0x0000023854F20000-0x0000023854F21000-memory.dmp
memory/5752-971-0x0000023854F20000-0x0000023854F21000-memory.dmp
memory/5752-970-0x0000023854F20000-0x0000023854F21000-memory.dmp
memory/5752-969-0x0000023854F20000-0x0000023854F21000-memory.dmp
memory/5752-968-0x0000023854F20000-0x0000023854F21000-memory.dmp
Analysis: behavioral11
Detonation Overview
Submitted
2024-10-27 13:16
Reported
2024-10-27 13:21
Platform
win7-20241010-en
Max time kernel
119s
Max time network
153s
Command Line
Signatures
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
Modifies Internet Explorer settings
| Description | Indicator | Process | Target |
| Set value (data) | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F32460B1-9465-11EF-A5FC-C670A0C1054F} = "0" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b131900000000020000000000106600000001000020000000bf54bfb3fa0dd8ac1b10484c6968df9aa1c6754249ad115cc157a4785890ec08000000000e80000000020000200000004de7c3f3d2cb01c116b65e5ff9aacab898a6f9299077133662ba7fc482ce00b020000000862dfe655d8003f3d52564e3f0f796193553c58b836c3d5ed429a38a54b5b70f40000000ba98361d11ff07708ee2b74719b8cff2cee59024a04f5474f9734de57d86b90b85a27ab17472491552a2e7082443d59de05ee3a092f29404741523d056bafd0b | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0172dc97228db01 | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "436196979" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
Suspicious use of FindShellTrayWindow
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| N/A | N/A | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
| N/A | N/A | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
| N/A | N/A | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
| N/A | N/A | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 1668 wrote to memory of 2040 | N/A | C:\Program Files\Internet Explorer\iexplore.exe | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE |
| PID 1668 wrote to memory of 2040 | N/A | C:\Program Files\Internet Explorer\iexplore.exe | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE |
| PID 1668 wrote to memory of 2040 | N/A | C:\Program Files\Internet Explorer\iexplore.exe | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE |
| PID 1668 wrote to memory of 2040 | N/A | C:\Program Files\Internet Explorer\iexplore.exe | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE |
Processes
C:\Program Files\Internet Explorer\iexplore.exe
"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\LICENSES.chromium.html
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1668 CREDAT:275457 /prefetch:2
Network
| Country | Destination | Domain | Proto |
| US | 204.79.197.200:443 | ieonline.microsoft.com | tcp |
| US | 204.79.197.200:443 | ieonline.microsoft.com | tcp |
| US | 204.79.197.200:443 | ieonline.microsoft.com | tcp |
Files
C:\Users\Admin\AppData\Local\Temp\Cab46B3.tmp
| MD5 | 49aebf8cbd62d92ac215b2923fb1b9f5 |
| SHA1 | 1723be06719828dda65ad804298d0431f6aff976 |
| SHA256 | b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f |
| SHA512 | bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b |
C:\Users\Admin\AppData\Local\Temp\Tar4772.tmp
| MD5 | 4ea6026cf93ec6338144661bf1202cd1 |
| SHA1 | a1dec9044f750ad887935a01430bf49322fbdcb7 |
| SHA256 | 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8 |
| SHA512 | 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 691e77c8c6cbb4e9673a0e4d1ae5dbd0 |
| SHA1 | 824d2fe3e2a2d60024dffea339f905f14e4eba60 |
| SHA256 | 306aaf4a6aa3b46ace34a784a5c8d17ffea91cfd18a17f0947d9daf0a0a11db6 |
| SHA512 | 89f840868ab9f2ab415d6125b94afbf88b42c870374ebf74adfd3660f88509068ae48345d92c5ab8ed8a49926e11608c334bed37396671a550c32966d9f214e9 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | e986c06c0345ad3f080e079445f6f6e7 |
| SHA1 | bb9af84ce1c915bbac785eaa5e7c795afe8720e7 |
| SHA256 | 5c2deae20d71da8085299c27bdba738bdef6198631154345e5692d024bcb6550 |
| SHA512 | f4db1214ae899cfaa0f52f0cad87aec99b4d055f8064ab1129499e77b03f2deb865e2dace7b6955cc0cdf8c3e79779d51b13e35766f4efcc8db3f74e023009c6 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 9ab2e326e8ae37619a7185572638b7b3 |
| SHA1 | bc19afa9c63d793c47164cebff7ad8fcad3f4b78 |
| SHA256 | cd73368789bf1e7654816cba7cbd13888d0f60b2ca5e1fcc8983edff5cb299aa |
| SHA512 | 4d1a9eafc46d8358fb6f80b1409e0d0b09b23b0e3d82b3272e02c15c3f3ae63a36930fbf3b5db8a8db75aa2849b9cd7de2672d4c483df59922137b12f596cd94 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | a14e2089bd25593dd19a998fa9212a3d |
| SHA1 | 24df91e128e5e8cf7ee8e3af3e67bf9f199442df |
| SHA256 | e87f25992b1fdc15b09c2715466423826f24dcb3a1c3ccac89cbc7917f57f86a |
| SHA512 | 4b0e3bac6591c0e8021d36c9202eea1f2ce8c1ad8c7e594349fb8f56c11ffed52b612fe4be6edf2c5aab684ab0b4c4ebb45a472decba50b39d516b309703bee8 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 2f0152a27592f1e0bb33cd5868585a34 |
| SHA1 | 4781003c3ac78b666b51ce2182d2e0f22901549f |
| SHA256 | 1e48e9d52013ec8544589a3704b621ede7e117cf37c54ecce14f9f367b9861c3 |
| SHA512 | 61e20b2474f541e0d9153770f11a0fed3435552342af39392a8b56e7b8427548caec599e074dc44926f88b7af180308069b18000fe242c1ba2b0269d761426b6 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 4d64fe3d43e9e9f83ede1509127eed90 |
| SHA1 | ca8881a7e874dedd5b76e7bdce43d7761d7361c3 |
| SHA256 | d87a6d69de26dad442304e44e5f25a6d265552398aaa09cc5fb43c2260ca155e |
| SHA512 | 312caf8a7c04a5cca73aa0a24ca6d1a2a72eaa17c7b9849bf97ae6d6c6704cbfdbc13a5154585c734fab4320b26a9c6afb98fd4fbf6b94754131fd569d84e374 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | bab4170c209a0f19042b9be510f068a5 |
| SHA1 | 5721afd739e78b62244b6431eab2760b721edece |
| SHA256 | 466e896d2cbcd39e2b5cb6457b7725353440faa1893a439b4f151ddea3d9929c |
| SHA512 | 498ae8f82870184271d236a65e33b4211da25cdc98a16bf25f6b1ad446682c9f7e7e7bf68617d6a2df865bb7e744f0b42c0ee23addcf947d414439e31b61cabe |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 29897eb660c64925cdf6cc246000982b |
| SHA1 | 0c6631bc32a979fb28ac4d993aed6d1cf9317762 |
| SHA256 | 2108ddb4fbfbc26e2181c4649d6f9e279fd81578d4e73cf3b2bfd78b272a16f5 |
| SHA512 | 03a012e3e470e72dc63fd4b6bb70a984cb4bc1d27ffbaec6225fb4ce9f43d876539fc96fd957df18cdbb955e5639700ed55c20001f6a8d376a09bda3802e26fc |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | f6a52aa5a690099f9396870096057da6 |
| SHA1 | fe3bf33fda80da15582060cd8404ac6897b5afbf |
| SHA256 | e3e3383e7b40787852f3fc207be95e987eede52af4fc837948f3c89e267e208a |
| SHA512 | 12c2a4879057e4f453686cd31d5ef16c066c4e61e43792c98a33fe44071aa092989e3d31120054288b9ddee20996e7eef1e545bd09ef7f6999f21d1cb2ed0913 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | f0036a0b9298781b80acfc1fee07781b |
| SHA1 | b43a00bbffd22c8f7a4ce4e4e9398130c87eeeb3 |
| SHA256 | 599de0eeab106b6d7ec1cdc2d1994db63530d226e33802ead62cfcbc2bead3cc |
| SHA512 | b75ce6f02a6c5d3660c1562df384ec1ed3fe2dbc29a422fe8a6bc8192c969e40b8f5e94a6c09cd1eab59dba3ed1edd7f25e823eca955f0570f348b40ed00f5ac |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 82df2661a7e97676a15e0f5e9b2ebfad |
| SHA1 | cdd836f485b409cd0914726622c3eac6fefd7241 |
| SHA256 | 425a4e6eed77faca95374f9c6dd3b1ec95342b04512afd1b0132e453c4658864 |
| SHA512 | fcb908f845d642e6331b36ccc2c24da766c769f8aed8e6a87073d677814cb8e4d97f433a5c71275fc4bd221767d176e30b2aae1b210bcab739b9be55df9dc710 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 3556ed2cb71ff29fb718abcd3376a6fe |
| SHA1 | bdca2714f3dd36d75711f01e35af5c989e9a8a61 |
| SHA256 | 1cccfc8cbd9b81e4454f188774163d9911786271a1d2535e4f03edb4b2d77625 |
| SHA512 | e11ba2a002c3a01eefa056bc81839a2a551fd1181baf3d3b8d7cf89db99decaa3bcd334733deb861e8a186ac0b3874ea84bc0e7793191b04ded6eb6305668e5c |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | a9b83d77df237b96e454a0c7501abb98 |
| SHA1 | 10df064bc8fa05633750d4e56a06faade62bb724 |
| SHA256 | a4a125eec5a3c382ff908f05f572cb5a5505ae14b69240763685183cebd0570d |
| SHA512 | 02e355a3d3387d64357b6a437573082f5b59aeda51e7f0e90570f02add39ae2e46dcc2b6a54026677ceb5750f0c6db0e1dbdd1f55f74067a9f06666102e58c24 |
Analysis: behavioral18
Detonation Overview
Submitted
2024-10-27 13:16
Reported
2024-10-27 13:20
Platform
win7-20240903-en
Max time kernel
119s
Max time network
131s
Command Line
Signatures
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\libEGL.dll,#1
Network
Files
Analysis: behavioral29
Detonation Overview
Submitted
2024-10-27 13:16
Reported
2024-10-27 13:20
Platform
win10v2004-20241007-en
Max time kernel
135s
Max time network
139s
Command Line
Signatures
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Windows\SysWOW64\rundll32.exe |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\rundll32.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2916 wrote to memory of 1996 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 2916 wrote to memory of 1996 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 2916 wrote to memory of 1996 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsExec.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsExec.dll,#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 1996 -ip 1996
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1996 -s 612
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 58.55.71.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 20.160.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.35.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 200.163.202.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 171.39.242.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 69.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 79.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 22.236.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 55.36.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 10.28.171.150.in-addr.arpa | udp |
Files
Analysis: behavioral1
Detonation Overview
Submitted
2024-10-27 13:16
Reported
2024-10-27 13:20
Platform
win7-20241010-en
Max time kernel
120s
Max time network
129s
Command Line
Signatures
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Programs\zoom\Zoom.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Programs\zoom\Zoom.exe | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Checks installed software on the system
Enumerates physical storage devices
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeSecurityPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exe
"C:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exe"
C:\Users\Admin\AppData\Local\Programs\zoom\Zoom.exe
"C:\Users\Admin\AppData\Local\Programs\zoom\Zoom.exe"
Network
Files
\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\System.dll
| MD5 | 0d7ad4f45dc6f5aa87f606d0331c6901 |
| SHA1 | 48df0911f0484cbe2a8cdd5362140b63c41ee457 |
| SHA256 | 3eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca |
| SHA512 | c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9 |
\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\StdUtils.dll
| MD5 | c6a6e03f77c313b267498515488c5740 |
| SHA1 | 3d49fc2784b9450962ed6b82b46e9c3c957d7c15 |
| SHA256 | b72e9013a6204e9f01076dc38dabbf30870d44dfc66962adbf73619d4331601e |
| SHA512 | 9870c5879f7b72836805088079ad5bbafcb59fc3d9127f2160d4ec3d6e88d3cc8ebe5a9f5d20a4720fe6407c1336ef10f33b2b9621bc587e930d4cbacf337803 |
\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\SpiderBanner.dll
| MD5 | 17309e33b596ba3a5693b4d3e85cf8d7 |
| SHA1 | 7d361836cf53df42021c7f2b148aec9458818c01 |
| SHA256 | 996a259e53ca18b89ec36d038c40148957c978c0fd600a268497d4c92f882a93 |
| SHA512 | 1abac3ce4f2d5e4a635162e16cf9125e059ba1539f70086c2d71cd00d41a6e2a54d468e6f37792e55a822d7082fb388b8dfecc79b59226bbb047b7d28d44d298 |
\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\nsExec.dll
| MD5 | ec0504e6b8a11d5aad43b296beeb84b2 |
| SHA1 | 91b5ce085130c8c7194d66b2439ec9e1c206497c |
| SHA256 | 5d9ceb1ce5f35aea5f9e5a0c0edeeec04dfefe0c77890c80c70e98209b58b962 |
| SHA512 | 3f918f1b47e8a919cbe51eb17dc30acc8cfc18e743a1bae5b787d0db7d26038dc1210be98bf5ba3be8d6ed896dbbd7ac3d13e66454a98b2a38c7e69dad30bb57 |
\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\nsis7z.dll
| MD5 | 80e44ce4895304c6a3a831310fbf8cd0 |
| SHA1 | 36bd49ae21c460be5753a904b4501f1abca53508 |
| SHA256 | b393f05e8ff919ef071181050e1873c9a776e1a0ae8329aefff7007d0cadf592 |
| SHA512 | c8ba7b1f9113ead23e993e74a48c4427ae3562c1f6d9910b2bbe6806c9107cf7d94bc7d204613e4743d0cd869e00dafd4fb54aad1e8adb69c553f3b9e5bc64df |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\chrome_200_percent.pak
| MD5 | 47668ac5038e68a565e0a9243df3c9e5 |
| SHA1 | 38408f73501162d96757a72c63e41e78541c8e8e |
| SHA256 | fac820a98b746a04ce14ec40c7268d6a58819133972b538f9720a5363c862e32 |
| SHA512 | 5412041c923057ff320aba09674b309b7fd71ede7e467f47df54f92b7c124e3040914d6b8083272ef9f985eef1626eaf4606b17a3cae97cfe507fb74bc6f0f89 |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\chrome_100_percent.pak
| MD5 | 4fc6564b727baa5fecf6bf3f6116cc64 |
| SHA1 | 6ced7b16dc1abe862820dfe25f4fe7ead1d3f518 |
| SHA256 | b7805392bfce11118165e3a4e747ac0ca515e4e0ceadab356d685575f6aa45fb |
| SHA512 | fa7eab7c9b67208bd076b2cbda575b5cc16a81f59cc9bba9512a0e85af97e2f3adebc543d0d847d348d513b9c7e8bef375ab2fef662387d87c82b296d76dffa2 |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\d3dcompiler_47.dll
| MD5 | 2191e768cc2e19009dad20dc999135a3 |
| SHA1 | f49a46ba0e954e657aaed1c9019a53d194272b6a |
| SHA256 | 7353f25dc5cf84d09894e3e0461cef0e56799adbc617fce37620ca67240b547d |
| SHA512 | 5adcb00162f284c16ec78016d301fc11559dd0a781ffbeff822db22efbed168b11d7e5586ea82388e9503b0c7d3740cf2a08e243877f5319202491c8a641c970 |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\ffmpeg.dll
| MD5 | fa145097e0274da929aacd68c31338ab |
| SHA1 | a999806ef0c15593100e21bc8632d7b1806bac47 |
| SHA256 | c8476ee68088d72b9fab25703093df19237d14387016b77f472e10c99c9415ed |
| SHA512 | d4898eed2ea09cb9b1810d783558ee7bf284701734437fbd9e1035138216e1ddbddd77d588a0b722adc5c5fd4a245871537bfb9b168910fc2bffbd6cb78c3c9f |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\icudtl.dat
| MD5 | e0f1ad85c0933ecce2e003a2c59ae726 |
| SHA1 | a8539fc5a233558edfa264a34f7af6187c3f0d4f |
| SHA256 | f5170aa2b388d23bebf98784dd488a9bcb741470384a6a9a8d7a2638d768defb |
| SHA512 | 714ed5ae44dfa4812081b8de42401197c235a4fa05206597f4c7b4170dd37e8360cc75d176399b735c9aec200f5b7d5c81c07b9ab58cbca8dc08861c6814fb28 |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\libEGL.dll
| MD5 | 5db499ae909083620e47eeea1623b2af |
| SHA1 | bc23303d6885b8f5c3fb84b3fecdf1a678e94a25 |
| SHA256 | 7bee4e33d89e5a4f2b3bc74d632f7c773ae9a399b6b2ba6d29b1192e25695a8b |
| SHA512 | d656bfa6d59c495d85eee872b372f7fba24f89101c38de1de904ece0d9ffa6eb93de81fdf674efa5ef724ea73188b908b8ad32cfee03c656accb835683929311 |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\LICENSE.electron.txt
| MD5 | 4d42118d35941e0f664dddbd83f633c5 |
| SHA1 | 2b21ec5f20fe961d15f2b58efb1368e66d202e5c |
| SHA256 | 5154e165bd6c2cc0cfbcd8916498c7abab0497923bafcd5cb07673fe8480087d |
| SHA512 | 3ffbba2e4cd689f362378f6b0f6060571f57e228d3755bdd308283be6cbbef8c2e84beb5fcf73e0c3c81cd944d01ee3fcf141733c4d8b3b0162e543e0b9f3e63 |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\libGLESv2.dll
| MD5 | 57c23aa2c39f11528e56a48ea1824036 |
| SHA1 | d4fbf180266eb210f8d83360cbbd3804249c60b8 |
| SHA256 | ee039e42a4948e9f26ece8515f3c699014fa7803ae597cd3427fa1548962f9af |
| SHA512 | 77487060b824cc70b30b30b144b8f174fd08ca6a298fd8c8f45d8417b90b7914a0d135edab39d6a5b2b883d49e9386da382a9ce5c52dc07ecd147f49118efa63 |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\snapshot_blob.bin
| MD5 | d20922aefcad14dc658a3c6fd5ff6529 |
| SHA1 | 75ce20814bdbe71cfa6fab03556c1711e78ca706 |
| SHA256 | b6bea91727efb8c88e7c059856553d3a47abd883e60dd60efc01b04dc6eec621 |
| SHA512 | dbd63a9f01feb3c389c11b55d720b5d689558626041fb1dd27ded2be602e5e2a8d210f785fde025d7b9959f81de3df7fef06981269b58be564df05aec190dd1c |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\resources.pak
| MD5 | 0e69910860463d5045ec257234bd8dd4 |
| SHA1 | 33c923c33129d1dccf0bb2dcbe8af983a7000444 |
| SHA256 | 1d241f5d4403a6e802e898c61e4753f8508ae4dda8fcb7750558ec1ecade52c6 |
| SHA512 | f6bb7c7b51bb202877739801498522095637caf8a03e2e1f2c6319fede3d3ca656f552061e171ec5e35e176c267fe278c326805d760add1371590bed58e12375 |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\LICENSES.chromium.html
| MD5 | 1ca87d8ee3ce9e9682547c4d9c9cb581 |
| SHA1 | d25b5b82c0b225719cc4ee318f776169b7f9af7a |
| SHA256 | 000ae5775ffa701d57afe7ac3831b76799e8250a2d0c328d1785cba935aab38d |
| SHA512 | ec07b958b4122f0776a6bded741df43f87ba0503b6a3b9cc9cbe6188756dcde740122314e0578175123aaa61381809b382e7e676815c20c3e671a098f0f39810 |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\v8_context_snapshot.bin
| MD5 | 1e4da0bc6404552f9a80ccde89fdef2b |
| SHA1 | 838481b9e4f1d694c948c0082e9697a5ed443ee2 |
| SHA256 | 2db4a98abe705ef9bc18e69d17f91bc3f4c0f5703f9f57b41acb877100718918 |
| SHA512 | 054917652829af01977e278cd0201c715b3a1280d7e43035507e4fa61c1c00c4cd7ed521c762aebd2ea2388d33c3d4d4b16cee5072d41e960021b6f38745a417 |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\vk_swiftshader.dll
| MD5 | 583b1d71cd7b847ba02d734c508cd92f |
| SHA1 | d63966aeafa951d51967620c606e9b97399699c4 |
| SHA256 | 680ea3717671c896d516517ff322976ab708f18862135be4216a27ad57353dcc |
| SHA512 | cbb0659ccac9344ed9bb151443a30c106711fa1b15234e6f1225ef28a679c6b3f0a24a6ca1d9baff46155c39ff4e08e3ac96e1da32d665be9a5728956012f193 |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\vk_swiftshader_icd.json
| MD5 | 8642dd3a87e2de6e991fae08458e302b |
| SHA1 | 9c06735c31cec00600fd763a92f8112d085bd12a |
| SHA256 | 32d83ff113fef532a9f97e0d2831f8656628ab1c99e9060f0332b1532839afd9 |
| SHA512 | f5d37d1b45b006161e4cefeebba1e33af879a3a51d16ee3ff8c3968c0c36bbafae379bf9124c13310b77774c9cbb4fa53114e83f5b48b5314132736e5bb4496f |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\vulkan-1.dll
| MD5 | 47af18d68dc7cf271f0a92707f783f64 |
| SHA1 | 64594e92a1cd7042cf6367b1843abed210db3d78 |
| SHA256 | d5df2f59cc8b32abd6178250e7d1370a7f37270cc727449e21778080b5e29cd2 |
| SHA512 | 2e8fefeccc25e5fcb448fd874f99b8d1466a8148ffe80e1f6ac2105d18bb93e529681ff0ba38e515f52ed4df9ac091fee0782afe5e093fd83c3045a60409fc10 |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\locales\bn.pak
| MD5 | c8173f0cc63ca9e02c07abec94892b53 |
| SHA1 | 2688b199cc40bb2082247fa451eac1304608e48b |
| SHA256 | e6adcfb4f3b3bccd4a27edadc168b503c36551cd6b27fb24043efeb21f691ce5 |
| SHA512 | 3d2317430722dc15c5d938fa55235af1caa03dcff7a574b44d37d89e7cf2c94dd2e84518b3eeca4a5a8dbec1b99d94aed97429aaf55c63998002d50ce9cb5019 |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\locales\bg.pak
| MD5 | 0e8005b17ac49f50fb60f116f822840d |
| SHA1 | f2486da277de22e5741356f8e73e60b7a7492510 |
| SHA256 | 50e4f6b9c387adf4baba3377c61d99326cc3987928d8d60b88d1ac29352820ea |
| SHA512 | 5df18bbeabd56e70d4c5a80dee5b7ce48259000665941634937e556e3b3a1c6403aa45c410f6f755607549c9dd35d722987b447c50efca51228ffeca4628756d |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\locales\ca.pak
| MD5 | d193a3ac614f64f4754c9df5cf00e880 |
| SHA1 | 0da0f7c1a4048074f6fe9d70704aa93ff75e42f9 |
| SHA256 | 4ecfa3785ab52564e0bd7dda04d59a30163561588a04f3bd1b1b71de051d2c53 |
| SHA512 | e85d18951f9a1a86514d577f9b19a4b3727523c15b4ccdd17217f6fdf69a0e774a36874108a05de1be3dcee1720b0cb19eced2d3283f57f41f5f9c5e233e1c68 |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\locales\ar.pak
| MD5 | 2b2dfafb0d258c1d2b58e51ae1ee9ab5 |
| SHA1 | 2a538491ff4023d29bdf2a053447c6016138d9f2 |
| SHA256 | ea49bc2ceb6b185030eaa0ee0155feca90e632390417299113b02fbe365ff731 |
| SHA512 | 6b629ed83edfea1b1ff3c379009332e413c420de651a24160fae859e1e0948fbebab99c9da714df6dfad3b9e472dece7bee95815ceca428183f4ac0bd6d42ff3 |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\locales\cs.pak
| MD5 | 70f320d38d249b48091786bd81343afc |
| SHA1 | 367decdcdad33369250af741b45bdc2ca3b41ab3 |
| SHA256 | 1c9448ea3aefce1a7e1491e73af91af772d8b22d538676a2beab690558e668fa |
| SHA512 | 02b08ed9261fd021e367995551defaf4b4f54c357409a362f4d2470423644913375cac444f62153ec2963a84880a30a36f827dbfacdd76a6222838c276cf5082 |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\locales\da.pak
| MD5 | 0e4207e2cf5741a8968617df9174a681 |
| SHA1 | bf9b7558141ad30bbc921992e48d48cd6d6ab475 |
| SHA256 | 438d2b1fd396c2108ca3902f69eeb372219edd5d95fe70970d8ee9e64556c9a4 |
| SHA512 | 4ed8368013912c408f7e5f7b4f6f1748834e5506307b92f4b669c557efd27363a55b4e2918eb7707e798878c9492b765f24ab9c90e843f54e8641c4646bc72da |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\locales\en-GB.pak
| MD5 | a1aa885be976f3c27a413389ea88f05f |
| SHA1 | 4c7940540d81bee00e68883f0e141c1473020297 |
| SHA256 | 4e4d71f24f5eea6892b961fcda014fc74914c1340366f9c62f0535e9b94ae846 |
| SHA512 | 8b6d67e09fbe7a2152a71532a82c1e301d56cdde34b83a9f17d9f471e258b255d5b2d4a0c39f38581da3a31cec24fb403156a8e493560d7206e1ec3db7e68b72 |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\locales\es.pak
| MD5 | d584992a0670c5771147c01266d17362 |
| SHA1 | d6e70e43585564d520e4b1777fac0b1e7bc6ed37 |
| SHA256 | f6a01c26bc18dcf701e1d4b6ff76602f14c4bb9adf9dd176c9107d5aedb4503f |
| SHA512 | 39db436a05955a3ad3b54ace4f2f0e8a313797d3ae8eda9cf1cab6f2ea1edba0a82c30f3b589b8c5399ed06e9fcf4ce9059d3d5a07472f05ab1f0819e42d5b73 |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\locales\fil.pak
| MD5 | cbb431da002cc8b3be6e9fe546cd9543 |
| SHA1 | 19fbf2715098fc9f8faba1ac3b805e6680bbcca4 |
| SHA256 | ab107369d45e105a4cb4f2f6bc8da2a8c1b6c65d5e94a7ab3e703e619c083dae |
| SHA512 | 3cabbfd021e5814587dad266c4f5c9f624e9d9278f22658dafd65ff2ad2bdc5f6df8a8672614b296cea826819211e12f8e77f183007c0a79075e2f0980b99911 |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\locales\hi.pak
| MD5 | 18bdd1d8d1d5c6a5fb2678abaa1ef6a9 |
| SHA1 | e40602e86e758a518ec70bb6a9cfa23107955301 |
| SHA256 | 1f49622ec6682c90e03fc42c319074565cf9d3532a2a4e3798e2f6cc159b2e8a |
| SHA512 | c859118e7c1be0642ba9bb1112a98a8fa7114a00711f578971a55aab7254b1ee9bb3899c852b79a002596f29e02f487267aca7033e38cbfd14c90b2989b9595e |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\locales\kn.pak
| MD5 | 59e6642f09ce97cfa4a4173413a1b036 |
| SHA1 | 777a96a4aefbe138f26c8697e66633452285eb2c |
| SHA256 | 58d16195170f76e40e18ee0ac2e10e1b73bcfd083821158927a7d67a51bcbc42 |
| SHA512 | 66deb67a4ce1914f5f27bb6423e5be62e05d0a36320accbe653572a437ce033ed5d26858a62d8c57476b34e1718d580f34ab44a3886d8d22d17f642d70f0138e |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\locales\mr.pak
| MD5 | f26bc5673e02a93212220d71cf1bbac2 |
| SHA1 | 8d0ab40fc2b35b75f99538951acfbf6a348c73a3 |
| SHA256 | 0877f2e75e0b9f5e709f0a0bf7cc793a02ff5bbb28bd6a8b6b6012760c1bbff3 |
| SHA512 | 9f3a629dfa116cd92892d120f0fdecc5f57043dad232311bdc8c218ae9317f49e655b8b8dc8399639231f2321013190a667d22b6b2735bbcbc375c438dce9aaf |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\locales\ru.pak
| MD5 | 9ef6fd52dec5613f9e80204a84c7f2ba |
| SHA1 | fbb8c9db815126fca3c62c810432a71b6965f2aa |
| SHA256 | d0068b9ddf8a9e6a5b1186bd0e00ed9f09224ed56ba7e653e2d54158d938c6f2 |
| SHA512 | 0fb442ef86f75ca2cf58a677bd25ffb7c420f98250fac7f5f25e2272d4e7dc505a5f3eb3665b62bec189496154b05a1462b6f17a0e9aeafc1517b71e2d813953 |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\locales\zh-CN.pak
| MD5 | d1145f2dcb13c5ba797df5a0792553c8 |
| SHA1 | e8d9604300d6413fc896d252a0261be2dfdebfbd |
| SHA256 | 6a9a1f5b7674da36f20cb76af7e3e75e9e56873539e8a3b32895ebba439af83a |
| SHA512 | f54adffc7d40866fd53dbb238687116d46354f79580877b5d4d93840494e604deaeaeb7e825f6a00d020f3c58d1fb9df8af667feb64c86f243ecab57765623e9 |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\resources\app-update.yml
| MD5 | ee62ce88d7f9c13a83adced0dfc3c988 |
| SHA1 | 4e7dd0ca6c5d99e7bf155f86e511a8aa0910201f |
| SHA256 | 583942571a2eeb6ef68c430e446278f6b5d5813c137822b904e1ea3ef3c2662b |
| SHA512 | 5c514b6255b17b714dc8e172fbfe37a3f427f2457b06da2570ae50df6fed1b9428f54ace9bca0729eac15cdf3c68fba6e02d966dd7a247f92f8be4115fe51f26 |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\locales\zh-TW.pak
| MD5 | 1eb532e97b84db33a50055bbd7d36200 |
| SHA1 | 7aaf0560a16a9754059871a000d237964f3ab0c8 |
| SHA256 | 6a43c8fac5a0ce7c7a21b30ac7bc2167488e17c81c76c00f0b92b49e9e46e469 |
| SHA512 | c946d82bd6ced6e61b35acaf7ace1a61f226c4891caaeeeec9ce4a3ab45e6f43c35dbb388d6d5fa925ed020d7d10f951fa2048269d0585ad3b723f5ad8f4eabc |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\locales\vi.pak
| MD5 | e088be14dded779f50feabc4906d5ae7 |
| SHA1 | 0eeca2c7ea82a03b6373c84adf1a890f29e18b05 |
| SHA256 | 25aeee59775ae38b21a091107022312fc228f96dbea906042bf3626b7cf86b98 |
| SHA512 | af9d1e415a6d06c28df9abaae1f337bf4dd3e323dfd5560df5fb35d01c6801b9145072ee85ab4c524c489fb6cdea956ce327b8c4f6820197d76fc2f33171ca3d |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\locales\ur.pak
| MD5 | 29403f3d5c8f6ae2a768de2fbe8b368e |
| SHA1 | da83015565980ea1a24f5493be6311f06427269e |
| SHA256 | 2520ba8471c840aa075075524c4ad2bde10f43fa7a1b623aa14555180ecd30ef |
| SHA512 | a0709280adec39633ca19daf9f8bac6c17a999101246778a63cd9e172dbea2f281b20ce197290c4af6c7601ee7956da42f17e31461a1bd8b8a4bce3c36dc87b7 |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\locales\uk.pak
| MD5 | 83e5f0092b6d72403b60fe0e1e228331 |
| SHA1 | 989ed480b7ef55dfc9ccfbef1a5b9b0e104693d8 |
| SHA256 | 29d68d90512ee9952635c7e074d5ab210531d93ae24c11a8f91bca20b685e9a2 |
| SHA512 | 9895928ee516db7d4395b2788135a814031b9ba45e3a837e633bc253b08d6f380e4078d4d3fd51ae37502a39ff45a0166969fb62365e890f4960a51040b20941 |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\resources\elevate.exe
| MD5 | 792b92c8ad13c46f27c7ced0810694df |
| SHA1 | d8d449b92de20a57df722df46435ba4553ecc802 |
| SHA256 | 9b1fbf0c11c520ae714af8aa9af12cfd48503eedecd7398d8992ee94d1b4dc37 |
| SHA512 | 6c247254dc18ed81213a978cce2e321d6692848c64307097d2c43432a42f4f4f6d3cf22fb92610dfa8b7b16a5f1d94e9017cf64f88f2d08e79c0fe71a9121e40 |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\resources\app.asar.unpacked\resources\icon.png
| MD5 | a2cf889708d9c4959c6808b4584848e4 |
| SHA1 | 9b95116c7bb7f367985ff873ca690713b3f68746 |
| SHA256 | 4363016ccf3541c84ae6a1eee83f507fb2b775aa89b9d6c8163875640267f9e9 |
| SHA512 | 2f388a8ca8b74338fc7af7ce4e817f2f7517cf49ce55bfa26a44ea73ec0cfbce189c259d577b2e5e66e3af465936df021359fee1bb2b10c95c58f0712e76f542 |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\resources\app.asar.unpacked\resources\favicon.ico
| MD5 | 96990db652ae46b73e46baa7b314b447 |
| SHA1 | 0782b2596100dd393bf96475ea533f9f6f0305e1 |
| SHA256 | 4c1dd4dc46d1b7c6aee2f25d8977733670f80920180c220ac04440958120ceb0 |
| SHA512 | 8250f56f30bbd57600018465c505fefacb06d46e3ea26c23a5e8a2f460f47bacf3ee5a536c335fc74c7523e4ac71882b48a4f71a8e90f34663c608e88fef13a1 |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\resources\app.asar
| MD5 | afe1fe8e5ce7b3053c25c902dbc7b03c |
| SHA1 | 863ae3691ec74079f9f7dd80e408f54394a380eb |
| SHA256 | ab76b6072c9e36a5bc40b33d58e814c66489a2cf87ae6e5b04732118c1c88852 |
| SHA512 | 4b4a576da43d61a6af302102ea96f26ba83a7ed351fed92a1cd164ee50e3a1eec05ca3f372d6bd8b01b044a925f45eb600e3e1607acfe6164bce6cc893135591 |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\locales\tr.pak
| MD5 | 193f0c0a8218f05657e2590ea4ee6004 |
| SHA1 | dd3ffd7f67f72de879903a231271c20aee56f695 |
| SHA256 | 676d46d19d1673eeff4f5e908aec3b53a6273c440e69e7d655ced6c70531cb9a |
| SHA512 | 28606d710d44c9a82c2849fa5ef989bac1afab53cdea99a825f80aa41dbd38a9ad6f0f44935f45439922ca2bdddc89c61f8ffcb999aa13fa45558551d5216e1d |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\locales\th.pak
| MD5 | a4d1594635d26330ace7054bc025b76d |
| SHA1 | bc4874a6a3b1d1886f05858ef2f653ab3520451c |
| SHA256 | f06a45f0395c3e42e42c46de2c19a2a104661b47be6f9ee97f8c68b05706ef1e |
| SHA512 | 731485b139ba0ed80dac5e582ec36f53a805a867ad33551741b805e851a9d2356fb1894232395d4fdb200defc988bcf6d51e58834b542c398c1012e389953a3d |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\locales\te.pak
| MD5 | d262c33a8c2b4949dff36cc1980e5f05 |
| SHA1 | e1ad725c388c4a1a386b4ab6170601863c943c29 |
| SHA256 | 09ab1ac2b69f868539d4f2e59dfea8c3c2f418a5455777e4c91d13c5ee55ab4c |
| SHA512 | 0202f6ac32878926422d542ea96b0bcf8b168f8ec6b928121c368711856fd5f4781a24b15851cdb5892246b355d0dd37504d4599b24e9fe8a723b8dfbfeed29b |
\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\WinShell.dll
| MD5 | 1cc7c37b7e0c8cd8bf04b6cc283e1e56 |
| SHA1 | 0b9519763be6625bd5abce175dcc59c96d100d4c |
| SHA256 | 9be85b986ea66a6997dde658abe82b3147ed2a1a3dcb784bb5176f41d22815a6 |
| SHA512 | 7acf7f8e68aa6066b59ca9f2ae2e67997e6b347bc08eb788d2a119b3295c844b5b9606757168e8d2fbd61c2cda367bf80e9e48c9a52c28d5a7a00464bfd2048f |
memory/2268-588-0x0000000003CD0000-0x0000000003CD2000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\locales\ta.pak
| MD5 | d50aa6815b63aff8c443622cb8bfd849 |
| SHA1 | fd247855e6e428109e7bf2e0018580cc6e0663c8 |
| SHA256 | 6348cc2d385b9808fdf1b815914dbfb26f552da4d10f85b2613a5e6e9f95b8fa |
| SHA512 | 620e2f9ab9998c68d667e32ad9bbfa2569f7a60fbc2a67d7492c6c215af2a1037708e38b4ed7932074d29a140581fe0ffedddb362133a941966044b98eaa50db |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\locales\sw.pak
| MD5 | 9808a9df2da0844b1ce1a2a4213c48d0 |
| SHA1 | 541f24f006ddb3361ff1e5015f097ab799120fc4 |
| SHA256 | 1949953d638f266ce74d84c020174c074780166b880e7c2ec38bc6047bbb8ecc |
| SHA512 | 66b256e02ce11ea0273cc5bfa78e56faf8b250208d1e868bf4af77cbefd1c891708573d63873a5d02436f884544a6550176afcd3a8220cd35d64b88987e94404 |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\locales\sv.pak
| MD5 | a813b566c9e630910e6ca946defb7202 |
| SHA1 | 2e25d2479715a572c096ce19b8dfd7a6da5339eb |
| SHA256 | 48a71912e4843b03358fede7176b2e57ced83d3a1344a92b989886374dbded62 |
| SHA512 | b348404135e147cef93c246c826107f9df170b294e9d0cbf576d2812d0ff3d2b7794ab5aba55cf729fcf7135a495d2ff591db62fa61e2998290ff02538a0e48c |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\locales\sr.pak
| MD5 | 5d70a218b7dcccab0406fa9239ef800b |
| SHA1 | cd231758f84a0d56545d0a234a58757a18a58d0c |
| SHA256 | a2bc6b064ff1f7b15707f61bd76ddd9d889bd982c4182e9e74272d39c6235c85 |
| SHA512 | ef6f71e0d9782b5ed6706d9226c1a7fb5a4323b8dc8de25737c7dcca87d04c16b545372127670de312079be993823f565de1aaaf5ad833bec5baa0856c19b0f3 |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\locales\sl.pak
| MD5 | ff14d5f9484350396780bea7f3bc64ec |
| SHA1 | de097f12b70b552824de69141d6ee1969275eca4 |
| SHA256 | b174c4c49654f7d65d223568c700bfaace74238447ae63171787236ce2aab00e |
| SHA512 | 011bcc3980d21e0900d1da334a28b72623b22b527a4fc3d96a8f78fb055dc87cd1433a63d8b4414a0a86cf2ded5833a395214910b17433a0545e04d1ce4875b8 |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\locales\sk.pak
| MD5 | fd001b1b02597bbf16baf3f0baf3c6e4 |
| SHA1 | e4c703fc115e02833fe08caab1e62775b5812473 |
| SHA256 | f9cd222838721a618c23c8f6493bc9699c795c0063998f1a8d506b4b7a297cdc |
| SHA512 | 0ee991da6b8ba1bcc3cc27abc645af43bb93edddbf182496aafeeb401d71ae10716335ee0197f1987c21b3abb441aaac968b9a76e75ae77fcba4cc48847f5b1d |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\locales\ro.pak
| MD5 | 938e62fca60d7b54e9c54cdd1f745f06 |
| SHA1 | 5a61a1ef3ae855ff436c5d7f45b6ec271a5228aa |
| SHA256 | 82e69f505222125ea62f8e90d8030d82a1bd49871192cb4274a8fd9d0e03d577 |
| SHA512 | d3f43881fc951c961cfb34babaa6eba2aa9175865dc07542dc529ab1c11d15703c03a7e8193c004b004d13f0a0672bccb2fcdd1cd88f32add159c337281d6d5f |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\locales\pt-PT.pak
| MD5 | 4816d83e54beaa2f94c671d56361c04e |
| SHA1 | 5cae66c0b7079d778ac87ad48777afd85b172d2f |
| SHA256 | a903ca2a8e52f987e23d040de7403b58d925a6c39668d3bc0822fb2aadd34cb1 |
| SHA512 | 0d3a39e1205ce9366818cb51d38db035b80448dc1e2d2d6bbd7d5df693641582043b45b4a78bbf2334159616187dc85a51e623bb6878b1498d9bc7acd2a6ffab |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\locales\pt-BR.pak
| MD5 | 8dabbceb430a6bc190ee344541fa8e2b |
| SHA1 | 44c7da04bac8c9ee67c8d6a0eeb491cf7ffd2479 |
| SHA256 | 6d54f87f6c8b5e01bd0da9a961236344e95e85c3dc55fc92a34542777d6f6275 |
| SHA512 | 4d36d527f1769501d1fce208738028d5ba142716a6243798212d5a2403dc5c950dcb3399e571cf3a11b1f35d845a6ba6798c38074d0ed66c894b1c18ab800159 |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\locales\pl.pak
| MD5 | 7b5d41611b92b24ec8b36b66feb11f9a |
| SHA1 | 3d6c36f404c29d59a24970585931860453f5c88a |
| SHA256 | 69e16e41f5fe7fa18557b938874f20cda6879f3cc616ead9a815c1381fe94158 |
| SHA512 | 16ba52cc799132e4525d220ed595d3969d4cecf163ccea6b62fe2211003b0cc44090c4d384e9cc4e32800181b7f7e0810da5a0d2c908f4625ff8382cfa3c177e |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\locales\nl.pak
| MD5 | b525894276852be4ab42ab7044fa164f |
| SHA1 | d3d035522265718def8125f5c4a1d3e74832dc2a |
| SHA256 | c7a18764ca908ec7f66c48cae2be06fef95213d7a5580b45f9bacee474456167 |
| SHA512 | 36b11f1df92df27b007fd640b589c6b7b30cd889bc297635bdaa40bfcb4332ff20911edfd23ce74c1c8963dd658f77bf4b9af50d3c281717f58eb23a598783bc |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\locales\nb.pak
| MD5 | bf9bfdfab1479bb52254329d7aa229ff |
| SHA1 | cd9ff35321731b839ea6e5f31f5de0bfb475666b |
| SHA256 | 96747543d9b2dbfb4482d4c24d7818d366545b2476633ad4fec8cc958ab760d3 |
| SHA512 | ba8e62d0a87c532ff46f2129724dd2f1bfdebd99c2606e0b9608cd07841776faeca15d04ec6241020c232d4c07809d718f40cf4ad9231d6a8996d55973486629 |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\locales\ms.pak
| MD5 | d22cfc1b78320157685839f14253fa1d |
| SHA1 | 0cfcb5c176d708e26bbca2427be611ce6609eb93 |
| SHA256 | c7b56e9ca2f75b4414c13144ff4deee1459c2a7cde79730d863ab234cd4c2f8b |
| SHA512 | 2eed40c50a63e362dfe2f172d16e4545f5b19c673e71db674bb004e4e6a4cf793ed4a44ee80d86b05aaa6cc4356c207476afdedc2b35017421ea9b9fa6ebc81d |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\locales\ml.pak
| MD5 | b690b0f01954735e1bcea9c2fb2ac4e4 |
| SHA1 | 8d98860e202b15a712822322058e80a06c471bb8 |
| SHA256 | 83d187cd70048f4129fa65ba148c74a04a47ee1f14218e7c85b36fe83e87b5e3 |
| SHA512 | 786f08019a0917d0b3f29aa2d1885db6a6f995990fd8faaf41a9630f8347b4d210a844cc6690a41b4af37d60e11f41fd2675df1a01bab5915e20cd9bc69b4541 |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\locales\lv.pak
| MD5 | 393c296fabe0c4c64a7d6b576d7d2cf7 |
| SHA1 | 16c0605e5829cde9738e1cd3344a59b74fa1f819 |
| SHA256 | 91642c04de64f88a5c49b4eeaf5d627554e60d56fc40e7cd58cd2601b0d3dbf2 |
| SHA512 | 067cccb059d4526c104880a26ebf04c7e2498c49c5641abdc91785e859bc0be1475ec58cae9ad1eb076f26fb9215ac246155e123baa13c06a05e4f22a002c2ad |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\locales\lt.pak
| MD5 | edb2c872a4fec5367cbe68035ef0ecc7 |
| SHA1 | b4d42bcc83c98dda1ea2ef962d097f6fb3d25c71 |
| SHA256 | 1bd385b780f3d13d41f8cf782a322e37be889aee273ffde3d8959e0ebcaabd0b |
| SHA512 | dd801a1aac2242e3f532e968b4c9639a2c8bf3eccc17470d9aa8bd6730ae4be3e7276fb782c7908bb6f87d3ade20a40c644b9db5d2201d96d91fd95ebdf429c9 |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\locales\ko.pak
| MD5 | cd2310448ba6689cc73d0b2e6dd2791f |
| SHA1 | 7827179d3fb98a5abc2ad38e20d942b83b397235 |
| SHA256 | cba6b7633cce796407821264e176a6266f80c1799ade16bf16893d68144236c6 |
| SHA512 | c3069bab640ae43856330bb8b3a0e0a4ca058a68a0fc03b8efc0ce1dc2b517f11380fbc641221e29b4a527d685ece72107fb83cdb9b539390eaf6a30c21bf36d |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\locales\ja.pak
| MD5 | dfd5ab27c326a1e1f87943a3079a2af2 |
| SHA1 | 3aaa73a6668e1249e4d51c8fa8e0c6868fde9da6 |
| SHA256 | 8260f4c9500b64d541386a8515fd0c9ddef82e3f044951b7b51a33ad81c1128f |
| SHA512 | d701674fb6e19bcdf297b19a9fe3b81c7f446019a8c2fd3e90e19294765b1e8ad4f0e40e4bac65b2db313a4f83eb050b5871ee4d74f9ea372208b7abd76c524f |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\locales\it.pak
| MD5 | e0e5580e8882f0eae4b5b21e6c7828d4 |
| SHA1 | 51e32e51458b5839112ed9dcaf500403c45ac1cd |
| SHA256 | a7f555e7e797e1de1a66cfca8c7b709b0e542ca62e7de96e034701fcef316d0c |
| SHA512 | 1a2a4948a5538158e6dab7ca7b3b780ec7a66a0aadb889fd451e07b32336ea08b88b5d57759e335fa967f3b4bb1282e952b97e496d798758159c70eed2e5acb2 |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\locales\id.pak
| MD5 | 6a406a9adb5c25e35c6838828ef30c17 |
| SHA1 | 2a1ea1dcb75217ace04254644845cd038df6a980 |
| SHA256 | af63384cf7d1d39e57decd823dff7538ab2b1e7e36e9ac61238477f7889d1d46 |
| SHA512 | ac7afa288b768a730027db0780b0f7c9f42ef990e4e22751ef1dc85e4841579a6e252293fb04d61b0cb591ccaa5c74d37bbd380afa15308c80ea32070019a361 |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\locales\hu.pak
| MD5 | 0b62fc2b60b8a92dc506550339766139 |
| SHA1 | abf0b1ae99ae40d87f86ee04bdba467674fc1039 |
| SHA256 | 6ca150d0fc35492bafb411bbc520f3b34da6399969fa9685ae74201623882560 |
| SHA512 | aab6058e2f41282ac5a9394cdcd503efdeb6b9eb8b9a64cc1215e31a806e60a34966b6823f91a97bfb81656d91ccfef3a226165811e6f4208fa436e1d04c1242 |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\locales\hr.pak
| MD5 | d80178f9df2b72a24a7dc58b5aa13229 |
| SHA1 | cda864bbfc6935cb4e3e30a6eaeabbab5264d01d |
| SHA256 | e442d083c32d752d1ef2225d84a4f1a91efab768e86fc63a7ed22c10fbf7e520 |
| SHA512 | c08380fc0c415a529a035e6e9c0eebc719766c656a3d9e3a782f21b4fef320688e1d11de8c3a5d0e59a102c9fbadcc960478a17c534500e137f4cb0e697ec9b9 |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\locales\he.pak
| MD5 | ec16b50e6575cd6863df282847cac3b0 |
| SHA1 | a59e089951c3a5dcfac165774c68651055b829e0 |
| SHA256 | c3955c97b6998f1806f8871fd3137f6f504bdd091f8bd1ff5ab8cd089474ae8e |
| SHA512 | 3c640430e3391be156aab26f6057e966348dff50ea946a02db947e2316d3a915c29f329faa26725a90af4d06ead7c7fc28cfa7573033b2b9546fd8e4d2bb7ab1 |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\locales\gu.pak
| MD5 | a9e6d8e291ffec28551fccf4d1b06896 |
| SHA1 | adc9784433fbf2ee89bcfe05baea21beb1820570 |
| SHA256 | 716ea0433e19edb5113dc8a25ae67c2587bc17c7fb63a93ac473bdcef8f72d34 |
| SHA512 | 3a60002dc6a9008cac78bbc050fc36d1053bfbd21ecf4d0579b2780985d4e7a7aec94483d8b0b8dd7a899b8435d54a27bba68917a23945431183eda021722697 |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\locales\fr.pak
| MD5 | 59e1e573153a209c56ae3bcb390b898f |
| SHA1 | 45f8a5469651c032c453b14bd68c85cdd6c75fc2 |
| SHA256 | 976622fb851378f57f81423e5625e40d0753d7a5e34caed2c39e4b130a3427b8 |
| SHA512 | 91f1b88ffb9f3362fbab7d607a68c4ca65e6b89fef7de0c986067ef7fd013c0ce35bce328ff3546cb7aafc296993e46a908ac506bb6a141088cfbc5ead948ba4 |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\locales\fi.pak
| MD5 | a9fc339d49ea069bd81380ae1fa0ef11 |
| SHA1 | 5f376072f38e94e252d72c5660d8120a41d73469 |
| SHA256 | e6454458dfbe150112c37f8b02f8c72c593af22e8be16980ebc854ad113fb763 |
| SHA512 | 3bee6723485a9eae4aa9bfd4e7fb490ce7a0aa12cbe41443b8bd28a26fe552cd31f4a1487bd98c6bc7774df1ea16b1de94ed0f52af59baf9e17b3db815404c4d |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\locales\fa.pak
| MD5 | e2bee9eeeac231de237100fae0aa77c7 |
| SHA1 | 5e5eeb59656e2f8f4f62bc618966d38cc06a385b |
| SHA256 | 7a856070430e3cfad15b96b153b1cb483cca9a1b9a43453df3707b09c748a3f2 |
| SHA512 | 5593c4a48e679f0f6283c3bca69838f581b6f928cc7170737778458393b6b85fab0e6ca390bc5da840f4b79de9e638015bf341c1a95e8f99770886f5354ecff6 |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\locales\et.pak
| MD5 | e7ea23d6304d5d600d884f4e3b3cb2d7 |
| SHA1 | 99fbef7eb1bde7df398cce9faf6c7c357769334a |
| SHA256 | 292eb18ec61502b0e952b447f73a66143c56dd95f170981945e5aab53a6b32b3 |
| SHA512 | 23dfa1161d11faf440241b1f48f2ddbc8ec086a8e18da351734656551f0f54fe4c94b490c0d3ecc378a3de7f7713a1626a7a6c21da2500b9597b44fd08197d50 |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\locales\es-419.pak
| MD5 | 088de6d12071ea5cf8d4a618ed45e7d5 |
| SHA1 | f12a76d18b84b17906f5f8cfc78cbb370b026b09 |
| SHA256 | d1019c780e836e0c30fe01928d23ecdd0ca04ed8ee886adb3428e3683e4ed6ea |
| SHA512 | 8da7326cf99cce53d7ccbec0c177ff9cf6dc0009431d6c89b3e8f0475bbcd0dac4c888460b535c1070ced62f1bf1c614bb0fbe9c5583e66c42f30d6e025ed7d6 |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\locales\en-US.pak
| MD5 | 809b600d2ee9e32b0b9b586a74683e39 |
| SHA1 | 99d670c66d1f4d17a636f6d4edc54ad82f551e53 |
| SHA256 | 0db4f65e527553b9e7bee395f774cc9447971bf0b86d1728856b6c15b88207bb |
| SHA512 | 9dfbe9fe0cfa3fcb5ce215ad8ab98e042760f4c1ff6247a6a32b18dd12617fc033a3bbf0a4667321a46a372fc26090e4d67581eaab615bf73cc96cb90e194431 |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\locales\el.pak
| MD5 | 16bcd10bc81dd8a5b3ad76c90cfb9614 |
| SHA1 | 240395860971fb9205d28602d4d4995007ee5c75 |
| SHA256 | 6a06d1d6b566214f7c3b693052beec488f7aae5ceeca26781a5d66fade39388b |
| SHA512 | 353a26b21848f4dd30b3aa1f4196b23571e177893ec6912db4570493664ed987e688fd66c04e509ecc58233476ebe59453260bc3569136f275fcd681ae54a174 |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\locales\de.pak
| MD5 | 141045fc1f94f93e82db06db4f7321c8 |
| SHA1 | d63d226c531a710359cb65f4e6aa190f593b4d54 |
| SHA256 | 47253e2fcf0e4691f29b3ebbe8f888a97b28d6aeaf73ab000857a6b8d0907ff3 |
| SHA512 | 85c27fdc9a2cb9310bfbb05d0bcd668eb2156a37765d8fb59496739f6f1eae12afcbaadf5eea8f2db2ad8c8a0602f83500bff9cb71a429174a80bee16ec10118 |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\locales\am.pak
| MD5 | 4eaa15771058480f5c574730c6bf4090 |
| SHA1 | 2b0322aae5a0927935062ea89bd8bd129fa77961 |
| SHA256 | b05dcb8136751aee5eced680a5bad935e386bfce657dd283d3ec00ee722fd740 |
| SHA512 | b67e7dd24eadc91d4cd920f8864cfb23a9c67b2cecd54ec97e01705636604ce504dc417d6af1c53f374b58eddf71a12bb82248bd8fd68307161d4833342681a9 |
C:\Users\Admin\AppData\Local\Temp\nsjA8CE.tmp\7z-out\locales\af.pak
| MD5 | 862a2262d0e36414abbae1d9df0c7335 |
| SHA1 | 605438a96645b9771a6550a649cddbb216a3a5b1 |
| SHA256 | 57670eae6d1871e648ad6148125ee82d08575bec5b323459fc14c3831570774a |
| SHA512 | a789a4cad72106a5c64d27709b129c4ae6284076f147b7c3fcb808b557a3468b4efe3ede28033f981335d5eab986532c0497ddd6ed24b76189fe49366692ee73 |
Analysis: behavioral5
Detonation Overview
Submitted
2024-10-27 13:16
Reported
2024-10-27 13:20
Platform
win7-20240903-en
Max time kernel
120s
Max time network
123s
Command Line
Signatures
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Windows\SysWOW64\rundll32.exe |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\rundll32.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\StdUtils.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\StdUtils.dll,#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2384 -s 220
Network
Files
Analysis: behavioral13
Detonation Overview
Submitted
2024-10-27 13:16
Reported
2024-10-27 13:21
Platform
win7-20241010-en
Max time kernel
122s
Max time network
132s
Command Line
Signatures
Processes
C:\Users\Admin\AppData\Local\Temp\Zoom.exe
"C:\Users\Admin\AppData\Local\Temp\Zoom.exe"
Network
Files
Analysis: behavioral15
Detonation Overview
Submitted
2024-10-27 13:16
Reported
2024-10-27 13:20
Platform
win10v2004-20241007-en
Max time kernel
135s
Max time network
141s
Command Line
Signatures
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\d3dcompiler_47.dll,#1
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 28.118.140.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 134.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.35.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 228.249.119.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 197.87.175.4.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 171.39.242.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 73.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 22.236.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 45.19.74.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 10.27.171.150.in-addr.arpa | udp |
Files
Analysis: behavioral21
Detonation Overview
Submitted
2024-10-27 13:16
Reported
2024-10-27 13:21
Platform
win10v2004-20241007-en
Max time kernel
146s
Max time network
151s
Command Line
Signatures
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\libGLESv2.dll,#1
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 150.171.27.10:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 104.219.191.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.214.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 22.160.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 209.205.72.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 212.20.149.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 198.187.3.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 73.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 45.19.74.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 13.227.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 10.28.171.150.in-addr.arpa | udp |
Files
Analysis: behavioral30
Detonation Overview
Submitted
2024-10-27 13:16
Reported
2024-10-27 13:20
Platform
win7-20240903-en
Max time kernel
121s
Max time network
123s
Command Line
Signatures
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Windows\SysWOW64\rundll32.exe |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\rundll32.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsis7z.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsis7z.dll,#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2372 -s 220
Network
Files
Analysis: behavioral8
Detonation Overview
Submitted
2024-10-27 13:16
Reported
2024-10-27 13:21
Platform
win10v2004-20241007-en
Max time kernel
142s
Max time network
151s
Command Line
Signatures
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Windows\SysWOW64\rundll32.exe |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\rundll32.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 4592 wrote to memory of 4116 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 4592 wrote to memory of 4116 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 4592 wrote to memory of 4116 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4116 -ip 4116
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4116 -s 612
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 149.220.183.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 67.209.201.84.in-addr.arpa | udp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 150.171.27.10:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 10.27.171.150.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 2.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.35.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 154.239.44.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 212.20.149.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.42.69.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 77.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 22.236.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
Files
Analysis: behavioral23
Detonation Overview
Submitted
2024-10-27 13:16
Reported
2024-10-27 13:20
Platform
win10v2004-20241007-en
Max time kernel
146s
Max time network
152s
Command Line
Signatures
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\resources\elevate.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\resources\elevate.exe
"C:\Users\Admin\AppData\Local\Temp\resources\elevate.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 28.118.140.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 150.171.28.10:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 172.214.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 10.28.171.150.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 73.31.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 104.219.191.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 200.163.202.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 198.187.3.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 73.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 45.19.74.20.in-addr.arpa | udp |
Files
Analysis: behavioral27
Detonation Overview
Submitted
2024-10-27 13:16
Reported
2024-10-27 13:20
Platform
win10v2004-20241007-en
Max time kernel
130s
Max time network
141s
Command Line
Signatures
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\vulkan-1.dll,#1
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 76.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 97.17.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 104.219.191.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 200.163.202.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 171.39.242.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 71.209.201.84.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 43.229.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 55.36.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 10.27.171.150.in-addr.arpa | udp |
Files
Analysis: behavioral28
Detonation Overview
Submitted
2024-10-27 13:16
Reported
2024-10-27 13:21
Platform
win7-20240903-en
Max time kernel
121s
Max time network
123s
Command Line
Signatures
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Windows\SysWOW64\rundll32.exe |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\rundll32.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsExec.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsExec.dll,#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1788 -s 220
Network
Files
Analysis: behavioral22
Detonation Overview
Submitted
2024-10-27 13:16
Reported
2024-10-27 13:21
Platform
win7-20241023-en
Max time kernel
118s
Max time network
130s
Command Line
Signatures
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\resources\elevate.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\resources\elevate.exe
"C:\Users\Admin\AppData\Local\Temp\resources\elevate.exe"
Network
Files
Analysis: behavioral25
Detonation Overview
Submitted
2024-10-27 13:16
Reported
2024-10-27 13:20
Platform
win10v2004-20241007-en
Max time kernel
133s
Max time network
161s
Command Line
Signatures
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\vk_swiftshader.dll,#1
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 209.205.72.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 98.209.201.84.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 4.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.35.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 58.55.71.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 149.220.183.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 200.163.202.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 171.39.242.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 69.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 45.19.74.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 48.229.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 55.36.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
Files
Analysis: behavioral4
Detonation Overview
Submitted
2024-10-27 13:16
Reported
2024-10-27 13:21
Platform
win10v2004-20241007-en
Max time kernel
136s
Max time network
154s
Command Line
Signatures
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\rundll32.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 4888 wrote to memory of 212 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 4888 wrote to memory of 212 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 4888 wrote to memory of 212 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\SpiderBanner.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\SpiderBanner.dll,#1
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 154.239.44.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 68.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.35.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 228.249.119.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 200.163.202.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 198.187.3.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 69.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.214.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 48.229.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 88.156.103.20.in-addr.arpa | udp |
Files
Analysis: behavioral6
Detonation Overview
Submitted
2024-10-27 13:16
Reported
2024-10-27 13:20
Platform
win10v2004-20241007-en
Max time kernel
139s
Max time network
141s
Command Line
Signatures
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Windows\SysWOW64\rundll32.exe |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\rundll32.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 3676 wrote to memory of 2532 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 3676 wrote to memory of 2532 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 3676 wrote to memory of 2532 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\StdUtils.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\StdUtils.dll,#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2532 -ip 2532
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2532 -s 628
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 209.205.72.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.214.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 76.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.35.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 149.220.183.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 200.163.202.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 171.39.242.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 69.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 23.236.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 88.156.103.20.in-addr.arpa | udp |
Files
Analysis: behavioral10
Detonation Overview
Submitted
2024-10-27 13:16
Reported
2024-10-27 13:20
Platform
win10v2004-20241007-en
Max time kernel
148s
Max time network
151s
Command Line
Signatures
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Windows\SysWOW64\rundll32.exe |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\rundll32.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 5000 wrote to memory of 4252 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 5000 wrote to memory of 4252 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 5000 wrote to memory of 4252 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\WinShell.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\WinShell.dll,#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4252 -ip 4252
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4252 -s 612
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 217.106.137.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 20.160.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.214.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 88.156.103.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 136.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 154.239.44.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 171.39.242.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 197.87.175.4.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 73.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 43.229.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 55.36.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 89.65.42.20.in-addr.arpa | udp |
Files
Analysis: behavioral16
Detonation Overview
Submitted
2024-10-27 13:16
Reported
2024-10-27 13:20
Platform
win7-20240903-en
Max time kernel
118s
Max time network
125s
Command Line
Signatures
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\ffmpeg.dll,#1
Network
Files
Analysis: behavioral17
Detonation Overview
Submitted
2024-10-27 13:16
Reported
2024-10-27 13:20
Platform
win10v2004-20241007-en
Max time kernel
144s
Max time network
157s
Command Line
Signatures
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\ffmpeg.dll,#1
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 149.220.183.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 105.209.201.84.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 68.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.35.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 58.55.71.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 212.20.149.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 198.187.3.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 73.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 102.209.201.84.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 13.227.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 77.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 10.28.171.150.in-addr.arpa | udp |
Files
Analysis: behavioral24
Detonation Overview
Submitted
2024-10-27 13:16
Reported
2024-10-27 13:20
Platform
win7-20241010-en
Max time kernel
120s
Max time network
128s
Command Line
Signatures
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 840 wrote to memory of 1920 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\system32\WerFault.exe |
| PID 840 wrote to memory of 1920 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\system32\WerFault.exe |
| PID 840 wrote to memory of 1920 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\system32\WerFault.exe |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\vk_swiftshader.dll,#1
C:\Windows\system32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 840 -s 80
Network
Files
Analysis: behavioral26
Detonation Overview
Submitted
2024-10-27 13:16
Reported
2024-10-27 13:20
Platform
win7-20240903-en
Max time kernel
117s
Max time network
124s
Command Line
Signatures
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 1716 wrote to memory of 1800 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\system32\WerFault.exe |
| PID 1716 wrote to memory of 1800 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\system32\WerFault.exe |
| PID 1716 wrote to memory of 1800 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\system32\WerFault.exe |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\vulkan-1.dll,#1
C:\Windows\system32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 1716 -s 88
Network
Files
Analysis: behavioral9
Detonation Overview
Submitted
2024-10-27 13:16
Reported
2024-10-27 13:20
Platform
win7-20240903-en
Max time kernel
119s
Max time network
122s
Command Line
Signatures
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Windows\SysWOW64\rundll32.exe |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\rundll32.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\WinShell.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\WinShell.dll,#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2656 -s 220
Network
Files
Analysis: behavioral12
Detonation Overview
Submitted
2024-10-27 13:16
Reported
2024-10-27 13:21
Platform
win10v2004-20241007-en
Max time kernel
145s
Max time network
155s
Command Line
Signatures
Browser Information Discovery
Enumerates system info in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Processes
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\LICENSES.chromium.html
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff481446f8,0x7fff48144708,0x7fff48144718
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,3084207039809039559,11023163887292070983,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2036 /prefetch:2
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2024,3084207039809039559,11023163887292070983,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 /prefetch:3
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2024,3084207039809039559,11023163887292070983,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,3084207039809039559,11023163887292070983,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,3084207039809039559,11023163887292070983,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:1
C:\Windows\System32\CompPkgSrv.exe
C:\Windows\System32\CompPkgSrv.exe -Embedding
C:\Windows\System32\CompPkgSrv.exe
C:\Windows\System32\CompPkgSrv.exe -Embedding
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,3084207039809039559,11023163887292070983,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5368 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,3084207039809039559,11023163887292070983,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5368 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,3084207039809039559,11023163887292070983,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,3084207039809039559,11023163887292070983,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,3084207039809039559,11023163887292070983,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5680 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,3084207039809039559,11023163887292070983,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,3084207039809039559,11023163887292070983,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2484 /prefetch:2
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 150.171.28.10:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 71.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 149.220.183.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| N/A | 224.0.0.251:5353 | udp | |
| US | 8.8.8.8:53 | 154.239.44.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 212.20.149.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 171.39.242.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 69.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 11.227.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 55.36.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 88.16.208.104.in-addr.arpa | udp |
Files
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
| MD5 | f426165d1e5f7df1b7a3758c306cd4ae |
| SHA1 | 59ef728fbbb5c4197600f61daec48556fec651c1 |
| SHA256 | b68dfc21866d0abe5c75d70acc54670421fa9b26baf98af852768676a901b841 |
| SHA512 | 8d437fcb85acb0705bf080141e7a021740901248985a76299ea8c43e46ad78fb88c738322cf302f6a550caa5e79d85b36827e9b329b1094521b17cf638c015b6 |
\??\pipe\LOCAL\crashpad_4716_CKQSNQDOCJOPBHXJ
| MD5 | d41d8cd98f00b204e9800998ecf8427e |
| SHA1 | da39a3ee5e6b4b0d3255bfef95601890afd80709 |
| SHA256 | e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 |
| SHA512 | cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
| MD5 | 6960857d16aadfa79d36df8ebbf0e423 |
| SHA1 | e1db43bd478274366621a8c6497e270d46c6ed4f |
| SHA256 | f40b812ce44e391423eb66602ac0af138a1e948aa8c4116045fef671ef21cd32 |
| SHA512 | 6deb2a63055a643759dd0ae125fb2f68ec04a443dbf8b066a812b42352bbcfa4517382ed0910c190c986a864559c3453c772e153ee2e9432fb2de2e1e49ca7fe |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
| MD5 | 31f411ba673d4505ef92da75b7742462 |
| SHA1 | ccba2df80b18dadef443dfc0f6dca04cae8e8edf |
| SHA256 | e9796e46699a95b7d41e4f3f146aff1136f68508a909e0ff60b26cb05528fa7f |
| SHA512 | 6e3e90ddb9da303e26dac004baa10031c5ed141c3819be9002d9e2aea0dd10e84d0739c9d0c432fed7ba226221effd22faf77c78926f8dbcc942ddd045173bee |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT
| MD5 | 6752a1d65b201c13b62ea44016eb221f |
| SHA1 | 58ecf154d01a62233ed7fb494ace3c3d4ffce08b |
| SHA256 | 0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd |
| SHA512 | 9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\8585a8c1-2527-4b43-ba84-f1632f51cd19.tmp
| MD5 | 1ecf0f4b6a6a3de1eee723c4a491738e |
| SHA1 | a82c0d146ec34155ec4d92edc144d7d3c58b6008 |
| SHA256 | 2d68505fe6e95d6dfb326916100c9c0c2086060bc654e8816d7f02fd11ce5d04 |
| SHA512 | 685253da9489e38516cd4ec0ca71af735e98ef1497b26513eb2bee8882477785d658a9a3122a9baa0ab04a259949fac906c315a759f30df558fde3fc9616fc0e |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
| MD5 | 316c00b33fadcfdadf110d6aaf94fba3 |
| SHA1 | 72cdff142f67d9ca0d02e4f448a33aca489212a6 |
| SHA256 | e71d53244067a426b33b8806bdf48d3df30e193ccefc566aa1f19b4f7a2ea242 |
| SHA512 | 942cbb37b8c530de864407228ba9f27ef338a91fb3b6b3c93880733ac7283dbe75a103c5eb40db78b0363f1e9a3296c90599e9d391d5bfab024841b10aac7464 |
Analysis: behavioral19
Detonation Overview
Submitted
2024-10-27 13:16
Reported
2024-10-27 13:20
Platform
win10v2004-20241007-en
Max time kernel
145s
Max time network
160s
Command Line
Signatures
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\libEGL.dll,#1
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 104.219.191.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 136.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 88.156.103.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 28.118.140.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 228.249.119.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 209.205.72.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 58.55.71.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 197.87.175.4.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.42.69.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 69.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.35.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 43.229.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 45.19.74.20.in-addr.arpa | udp |
Files
Analysis: behavioral31
Detonation Overview
Submitted
2024-10-27 13:16
Reported
2024-10-27 13:20
Platform
win10v2004-20241007-en
Max time kernel
130s
Max time network
147s
Command Line
Signatures
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Windows\SysWOW64\rundll32.exe |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\rundll32.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 1180 wrote to memory of 3616 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 1180 wrote to memory of 3616 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 1180 wrote to memory of 3616 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsis7z.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsis7z.dll,#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3616 -ip 3616
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3616 -s 612
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 149.220.183.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 150.171.28.10:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 66.209.201.84.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 10.28.171.150.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 75.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 228.249.119.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 200.163.202.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 171.39.242.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 75.209.201.84.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 11.227.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 69.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
Files
Analysis: behavioral32
Detonation Overview
Submitted
2024-10-27 13:16
Reported
2024-10-27 13:20
Platform
win7-20241010-en
Max time kernel
9s
Max time network
19s
Command Line
Signatures
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\$R0\Uninstall Zoom.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe | N/A |
Enumerates physical storage devices
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\$R0\Uninstall Zoom.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\$R0\Uninstall Zoom.exe
"C:\Users\Admin\AppData\Local\Temp\$R0\Uninstall Zoom.exe"
C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe
"C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe" _?=C:\Users\Admin\AppData\Local\Temp\$R0\
Network
Files
\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe
| MD5 | 7c4cbbb76687aaaccbbb2f0ab82e53c5 |
| SHA1 | 189b3e4c40473380dcb292660254b08d329f7965 |
| SHA256 | 906ea05fd420f671fa3c27452e5a45acf02a0225a3306dea11d73bac18914997 |
| SHA512 | d68f326e205a7dbd20729f263cbdce28dc35c5938eff83fd4907167b5e9d4f5c116423fbd0668a7af1367e962fc49461c6a071f0dab730047e6b63503e35c424 |
\Users\Admin\AppData\Local\Temp\nszF336.tmp\System.dll
| MD5 | 0d7ad4f45dc6f5aa87f606d0331c6901 |
| SHA1 | 48df0911f0484cbe2a8cdd5362140b63c41ee457 |
| SHA256 | 3eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca |
| SHA512 | c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9 |
\Users\Admin\AppData\Local\Temp\nszF336.tmp\StdUtils.dll
| MD5 | c6a6e03f77c313b267498515488c5740 |
| SHA1 | 3d49fc2784b9450962ed6b82b46e9c3c957d7c15 |
| SHA256 | b72e9013a6204e9f01076dc38dabbf30870d44dfc66962adbf73619d4331601e |
| SHA512 | 9870c5879f7b72836805088079ad5bbafcb59fc3d9127f2160d4ec3d6e88d3cc8ebe5a9f5d20a4720fe6407c1336ef10f33b2b9621bc587e930d4cbacf337803 |
\Users\Admin\AppData\Local\Temp\nszF336.tmp\nsExec.dll
| MD5 | ec0504e6b8a11d5aad43b296beeb84b2 |
| SHA1 | 91b5ce085130c8c7194d66b2439ec9e1c206497c |
| SHA256 | 5d9ceb1ce5f35aea5f9e5a0c0edeeec04dfefe0c77890c80c70e98209b58b962 |
| SHA512 | 3f918f1b47e8a919cbe51eb17dc30acc8cfc18e743a1bae5b787d0db7d26038dc1210be98bf5ba3be8d6ed896dbbd7ac3d13e66454a98b2a38c7e69dad30bb57 |
\Users\Admin\AppData\Local\Temp\nszF336.tmp\WinShell.dll
| MD5 | 1cc7c37b7e0c8cd8bf04b6cc283e1e56 |
| SHA1 | 0b9519763be6625bd5abce175dcc59c96d100d4c |
| SHA256 | 9be85b986ea66a6997dde658abe82b3147ed2a1a3dcb784bb5176f41d22815a6 |
| SHA512 | 7acf7f8e68aa6066b59ca9f2ae2e67997e6b347bc08eb788d2a119b3295c844b5b9606757168e8d2fbd61c2cda367bf80e9e48c9a52c28d5a7a00464bfd2048f |