Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
29/10/2024, 23:14
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1300886873148756050/1300960864043663533/winws.exe?ex=6722bdb8&is=67216c38&hm=6421a3d612c9b6c41279c7a97310aba4b86dbc69dc16a3bc8027d28cde7073e8&
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
https://cdn.discordapp.com/attachments/1300886873148756050/1300960864043663533/winws.exe?ex=6722bdb8&is=67216c38&hm=6421a3d612c9b6c41279c7a97310aba4b86dbc69dc16a3bc8027d28cde7073e8&
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
https://cdn.discordapp.com/attachments/1300886873148756050/1300960864043663533/winws.exe?ex=6722bdb8&is=67216c38&hm=6421a3d612c9b6c41279c7a97310aba4b86dbc69dc16a3bc8027d28cde7073e8&
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
https://cdn.discordapp.com/attachments/1300886873148756050/1300960864043663533/winws.exe?ex=6722bdb8&is=67216c38&hm=6421a3d612c9b6c41279c7a97310aba4b86dbc69dc16a3bc8027d28cde7073e8&
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral5
Sample
https://cdn.discordapp.com/attachments/1300886873148756050/1300960864043663533/winws.exe?ex=6722bdb8&is=67216c38&hm=6421a3d612c9b6c41279c7a97310aba4b86dbc69dc16a3bc8027d28cde7073e8&
Resource
win11-20241007-en
General
-
Target
https://cdn.discordapp.com/attachments/1300886873148756050/1300960864043663533/winws.exe?ex=6722bdb8&is=67216c38&hm=6421a3d612c9b6c41279c7a97310aba4b86dbc69dc16a3bc8027d28cde7073e8&
Malware Config
Extracted
orcus
Roblox
89.23.100.155:1337
52641f3c61234743ba12f855fdae3135
-
autostart_method
Registry
-
enable_keylogger
true
-
install_path
%AppData%\Windows\Helper\WinHelper32.exe
-
reconnect_delay
10000
-
registry_keyname
WinHelper32.exe
-
taskscheduler_taskname
WinHelper32
-
watchdog_path
AppData\WinHelperWatchdog.exe
Signatures
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral5/memory/2164-270-0x00000000058F0000-0x00000000058FA000-memory.dmp disable_win_def -
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Uninstall Information\\StartMenuExperienceHost.exe\", \"C:\\Recovery\\WindowsRE\\wscript.exe\", \"C:\\blockComAgentdll\\msedge.exe\", \"C:\\Users\\Default User\\StartMenuExperienceHost.exe\", \"C:\\Program Files (x86)\\Microsoft.NET\\Primary Interop Assemblies\\RuntimeBroker.exe\"" RunShell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Uninstall Information\\StartMenuExperienceHost.exe\", \"C:\\Recovery\\WindowsRE\\wscript.exe\", \"C:\\blockComAgentdll\\msedge.exe\", \"C:\\Users\\Default User\\StartMenuExperienceHost.exe\", \"C:\\Program Files (x86)\\Microsoft.NET\\Primary Interop Assemblies\\RuntimeBroker.exe\", \"C:\\Users\\Admin\\AppData\\Roaming\\Windows\\Defender\\RunShell.exe\"" RunShell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Uninstall Information\\StartMenuExperienceHost.exe\"" RunShell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Uninstall Information\\StartMenuExperienceHost.exe\", \"C:\\Recovery\\WindowsRE\\wscript.exe\"" RunShell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Uninstall Information\\StartMenuExperienceHost.exe\", \"C:\\Recovery\\WindowsRE\\wscript.exe\", \"C:\\blockComAgentdll\\msedge.exe\"" RunShell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Uninstall Information\\StartMenuExperienceHost.exe\", \"C:\\Recovery\\WindowsRE\\wscript.exe\", \"C:\\blockComAgentdll\\msedge.exe\", \"C:\\Users\\Default User\\StartMenuExperienceHost.exe\"" RunShell.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" xdwd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" xdwd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" xdwd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" WinHelper32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" WinHelper32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" WinHelper32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection xdwd.exe -
Orcus family
-
Orcus main payload 1 IoCs
resource yara_rule behavioral5/files/0x001c00000002ab42-233.dat family_orcus -
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1576 4564 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1484 4564 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4648 4564 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1164 4564 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5112 4564 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4568 4564 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 576 4564 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4880 4564 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 916 4564 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2028 4564 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2248 4564 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4696 4564 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2856 4564 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4620 4564 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2344 4564 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4996 4564 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1560 4564 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2452 4564 schtasks.exe 93 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" WinHelper32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" WinHelper32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "1" xdwd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" xdwd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" xdwd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "1" WinHelper32.exe -
DCRat payload 1 IoCs
resource yara_rule behavioral5/memory/848-347-0x000000001B1C0000-0x000000001B292000-memory.dmp family_dcrat_v2 -
Orcurs Rat Executable 2 IoCs
resource yara_rule behavioral5/files/0x001c00000002ab42-233.dat orcus behavioral5/memory/2164-260-0x00000000003F0000-0x00000000006F2000-memory.dmp orcus -
Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 104 powershell.exe 3912 powershell.exe 2460 powershell.exe 4976 powershell.exe 4872 powershell.exe 1152 powershell.exe 3880 powershell.exe 1436 powershell.exe -
Downloads MZ/PE file
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WinHelper32.exe javaw.exe -
Executes dropped EXE 14 IoCs
pid Process 576 winws.exe 3776 WinHelper32.exe 2164 xdwd.exe 3412 Boostrapper.exe 4288 WindowsInput.exe 1944 WindowsInput.exe 848 RunShell.exe 3972 WinHelper32.exe 2612 WinHelper32.exe 3584 hypercommonSvc.exe 1832 RuntimeBroker.exe 1280 WinHelperWatchdog.exe 1736 WinHelperWatchdog.exe 3568 msedge.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" xdwd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" WinHelper32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features xdwd.exe -
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RunShell = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows\\Defender\\RunShell.exe\"" RunShell.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000\Software\Microsoft\Windows\CurrentVersion\Run\wscript = "\"C:\\Recovery\\WindowsRE\\wscript.exe\"" RunShell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wscript = "\"C:\\Recovery\\WindowsRE\\wscript.exe\"" RunShell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\StartMenuExperienceHost = "\"C:\\Users\\Default User\\StartMenuExperienceHost.exe\"" RunShell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Program Files (x86)\\Microsoft.NET\\Primary Interop Assemblies\\RuntimeBroker.exe\"" RunShell.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000\Software\Microsoft\Windows\CurrentVersion\Run\StartMenuExperienceHost = "\"C:\\Users\\Default User\\StartMenuExperienceHost.exe\"" RunShell.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000\Software\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Program Files (x86)\\Microsoft.NET\\Primary Interop Assemblies\\RuntimeBroker.exe\"" RunShell.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000\Software\Microsoft\Windows\CurrentVersion\Run\RunShell = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows\\Defender\\RunShell.exe\"" RunShell.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000\Software\Microsoft\Windows\CurrentVersion\Run\StartMenuExperienceHost = "\"C:\\Program Files\\Uninstall Information\\StartMenuExperienceHost.exe\"" RunShell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\StartMenuExperienceHost = "\"C:\\Program Files\\Uninstall Information\\StartMenuExperienceHost.exe\"" RunShell.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000\Software\Microsoft\Windows\CurrentVersion\Run\msedge = "\"C:\\blockComAgentdll\\msedge.exe\"" RunShell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\msedge = "\"C:\\blockComAgentdll\\msedge.exe\"" RunShell.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA xdwd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "1" xdwd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WinHelper32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "1" WinHelper32.exe -
Hijack Execution Flow: Executable Installer File Permissions Weakness 1 TTPs 2 IoCs
Possible Turn off User Account Control's privilege elevation for standard users.
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" xdwd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" WinHelper32.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 8 raw.githubusercontent.com 21 raw.githubusercontent.com -
Drops file in System32 directory 5 IoCs
description ioc Process File created \??\c:\Windows\System32\uexpww.exe csc.exe File created C:\Windows\SysWOW64\WindowsInput.exe xdwd.exe File created C:\Windows\SysWOW64\WindowsInput.exe.config xdwd.exe File created C:\Windows\SysWOW64\WindowsInput.InstallState WindowsInput.exe File created \??\c:\Windows\System32\CSCAFE86041B48049A2AD46C45A28484B1D.TMP csc.exe -
Drops file in Program Files directory 9 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\9e8d7a4ca61bd9 RunShell.exe File created C:\Program Files\Uninstall Information\StartMenuExperienceHost.exe RunShell.exe File created C:\Program Files (x86)\Windows Media Player\uk-UA\886983d96e3d3e hypercommonSvc.exe File created C:\Program Files (x86)\Windows Media Player\uk-UA\csrss.exe hypercommonSvc.exe File opened for modification C:\Program Files (x86)\Windows Media Player\uk-UA\csrss.exe hypercommonSvc.exe File created C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\RuntimeBroker.exe RunShell.exe File opened for modification C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\RuntimeBroker.exe RunShell.exe File created C:\Program Files\Windows Media Player\Icons\dllhost.exe RunShell.exe File created C:\Program Files\Uninstall Information\55b276f4edf653 RunShell.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Migration\WTR\msedge.exe hypercommonSvc.exe File created C:\Windows\Migration\WTR\61a52ddc9dd915 hypercommonSvc.exe -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File opened for modification C:\Users\Admin\Downloads\winws.exe:Zone.Identifier msedge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinHelper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinHelper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xdwd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Boostrapper.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winws.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinHelperWatchdog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinHelperWatchdog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinHelper32.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3776 PING.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings WinHelper32.exe Key created \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings Boostrapper.exe Key created \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings RunShell.exe Key created \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings hypercommonSvc.exe -
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 408567.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\winws.exe:Zone.Identifier msedge.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3776 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1576 schtasks.exe 5112 schtasks.exe 576 schtasks.exe 2028 schtasks.exe 2856 schtasks.exe 2344 schtasks.exe 4996 schtasks.exe 4648 schtasks.exe 1164 schtasks.exe 916 schtasks.exe 2248 schtasks.exe 4696 schtasks.exe 1560 schtasks.exe 1484 schtasks.exe 4568 schtasks.exe 4880 schtasks.exe 4620 schtasks.exe 2452 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3544 msedge.exe 3544 msedge.exe 2956 msedge.exe 2956 msedge.exe 4360 identity_helper.exe 4360 identity_helper.exe 4140 msedge.exe 4140 msedge.exe 1560 msedge.exe 1560 msedge.exe 1152 powershell.exe 1152 powershell.exe 2164 xdwd.exe 4736 powershell.exe 4736 powershell.exe 848 RunShell.exe 848 RunShell.exe 848 RunShell.exe 848 RunShell.exe 848 RunShell.exe 848 RunShell.exe 848 RunShell.exe 848 RunShell.exe 848 RunShell.exe 848 RunShell.exe 848 RunShell.exe 848 RunShell.exe 848 RunShell.exe 848 RunShell.exe 848 RunShell.exe 848 RunShell.exe 848 RunShell.exe 848 RunShell.exe 848 RunShell.exe 848 RunShell.exe 848 RunShell.exe 848 RunShell.exe 848 RunShell.exe 848 RunShell.exe 848 RunShell.exe 848 RunShell.exe 848 RunShell.exe 848 RunShell.exe 848 RunShell.exe 848 RunShell.exe 848 RunShell.exe 848 RunShell.exe 848 RunShell.exe 848 RunShell.exe 848 RunShell.exe 848 RunShell.exe 848 RunShell.exe 848 RunShell.exe 848 RunShell.exe 848 RunShell.exe 848 RunShell.exe 848 RunShell.exe 848 RunShell.exe 848 RunShell.exe 848 RunShell.exe 848 RunShell.exe 848 RunShell.exe 848 RunShell.exe 848 RunShell.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeDebugPrivilege 1152 powershell.exe Token: SeDebugPrivilege 2164 xdwd.exe Token: SeDebugPrivilege 4736 powershell.exe Token: SeDebugPrivilege 848 RunShell.exe Token: SeDebugPrivilege 3912 powershell.exe Token: SeDebugPrivilege 3880 powershell.exe Token: SeDebugPrivilege 2460 powershell.exe Token: SeDebugPrivilege 4976 powershell.exe Token: SeDebugPrivilege 1436 powershell.exe Token: SeDebugPrivilege 104 powershell.exe Token: SeDebugPrivilege 3972 WinHelper32.exe Token: SeDebugPrivilege 3584 hypercommonSvc.exe Token: SeDebugPrivilege 5016 powershell.exe Token: SeDebugPrivilege 1832 RuntimeBroker.exe Token: SeDebugPrivilege 1280 WinHelperWatchdog.exe Token: SeDebugPrivilege 1736 WinHelperWatchdog.exe Token: SeDebugPrivilege 3568 msedge.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 576 winws.exe 4340 javaw.exe 3776 WinHelper32.exe 3412 Boostrapper.exe 3972 WinHelper32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2956 wrote to memory of 2376 2956 msedge.exe 77 PID 2956 wrote to memory of 2376 2956 msedge.exe 77 PID 2956 wrote to memory of 1356 2956 msedge.exe 78 PID 2956 wrote to memory of 1356 2956 msedge.exe 78 PID 2956 wrote to memory of 1356 2956 msedge.exe 78 PID 2956 wrote to memory of 1356 2956 msedge.exe 78 PID 2956 wrote to memory of 1356 2956 msedge.exe 78 PID 2956 wrote to memory of 1356 2956 msedge.exe 78 PID 2956 wrote to memory of 1356 2956 msedge.exe 78 PID 2956 wrote to memory of 1356 2956 msedge.exe 78 PID 2956 wrote to memory of 1356 2956 msedge.exe 78 PID 2956 wrote to memory of 1356 2956 msedge.exe 78 PID 2956 wrote to memory of 1356 2956 msedge.exe 78 PID 2956 wrote to memory of 1356 2956 msedge.exe 78 PID 2956 wrote to memory of 1356 2956 msedge.exe 78 PID 2956 wrote to memory of 1356 2956 msedge.exe 78 PID 2956 wrote to memory of 1356 2956 msedge.exe 78 PID 2956 wrote to memory of 1356 2956 msedge.exe 78 PID 2956 wrote to memory of 1356 2956 msedge.exe 78 PID 2956 wrote to memory of 1356 2956 msedge.exe 78 PID 2956 wrote to memory of 1356 2956 msedge.exe 78 PID 2956 wrote to memory of 1356 2956 msedge.exe 78 PID 2956 wrote to memory of 1356 2956 msedge.exe 78 PID 2956 wrote to memory of 1356 2956 msedge.exe 78 PID 2956 wrote to memory of 1356 2956 msedge.exe 78 PID 2956 wrote to memory of 1356 2956 msedge.exe 78 PID 2956 wrote to memory of 1356 2956 msedge.exe 78 PID 2956 wrote to memory of 1356 2956 msedge.exe 78 PID 2956 wrote to memory of 1356 2956 msedge.exe 78 PID 2956 wrote to memory of 1356 2956 msedge.exe 78 PID 2956 wrote to memory of 1356 2956 msedge.exe 78 PID 2956 wrote to memory of 1356 2956 msedge.exe 78 PID 2956 wrote to memory of 1356 2956 msedge.exe 78 PID 2956 wrote to memory of 1356 2956 msedge.exe 78 PID 2956 wrote to memory of 1356 2956 msedge.exe 78 PID 2956 wrote to memory of 1356 2956 msedge.exe 78 PID 2956 wrote to memory of 1356 2956 msedge.exe 78 PID 2956 wrote to memory of 1356 2956 msedge.exe 78 PID 2956 wrote to memory of 1356 2956 msedge.exe 78 PID 2956 wrote to memory of 1356 2956 msedge.exe 78 PID 2956 wrote to memory of 1356 2956 msedge.exe 78 PID 2956 wrote to memory of 1356 2956 msedge.exe 78 PID 2956 wrote to memory of 3544 2956 msedge.exe 79 PID 2956 wrote to memory of 3544 2956 msedge.exe 79 PID 2956 wrote to memory of 1940 2956 msedge.exe 80 PID 2956 wrote to memory of 1940 2956 msedge.exe 80 PID 2956 wrote to memory of 1940 2956 msedge.exe 80 PID 2956 wrote to memory of 1940 2956 msedge.exe 80 PID 2956 wrote to memory of 1940 2956 msedge.exe 80 PID 2956 wrote to memory of 1940 2956 msedge.exe 80 PID 2956 wrote to memory of 1940 2956 msedge.exe 80 PID 2956 wrote to memory of 1940 2956 msedge.exe 80 PID 2956 wrote to memory of 1940 2956 msedge.exe 80 PID 2956 wrote to memory of 1940 2956 msedge.exe 80 PID 2956 wrote to memory of 1940 2956 msedge.exe 80 PID 2956 wrote to memory of 1940 2956 msedge.exe 80 PID 2956 wrote to memory of 1940 2956 msedge.exe 80 PID 2956 wrote to memory of 1940 2956 msedge.exe 80 PID 2956 wrote to memory of 1940 2956 msedge.exe 80 PID 2956 wrote to memory of 1940 2956 msedge.exe 80 PID 2956 wrote to memory of 1940 2956 msedge.exe 80 PID 2956 wrote to memory of 1940 2956 msedge.exe 80 PID 2956 wrote to memory of 1940 2956 msedge.exe 80 PID 2956 wrote to memory of 1940 2956 msedge.exe 80 -
System policy modification 1 TTPs 14 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "1" xdwd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" xdwd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" WinHelper32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" xdwd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" xdwd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" WinHelper32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" xdwd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "1" WinHelper32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" WinHelper32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableUIADesktopToggle = "0" WinHelper32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" xdwd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableUIADesktopToggle = "0" xdwd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" WinHelper32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" WinHelper32.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://cdn.discordapp.com/attachments/1300886873148756050/1300960864043663533/winws.exe?ex=6722bdb8&is=67216c38&hm=6421a3d612c9b6c41279c7a97310aba4b86dbc69dc16a3bc8027d28cde7073e8&1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x104,0x108,0x10c,0x100,0x110,0x7ff9a8e43cb8,0x7ff9a8e43cc8,0x7ff9a8e43cd82⤵PID:2376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1852,14198194376935239734,6307159841698945962,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1864 /prefetch:22⤵PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1852,14198194376935239734,6307159841698945962,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2404 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1852,14198194376935239734,6307159841698945962,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2504 /prefetch:82⤵PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,14198194376935239734,6307159841698945962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,14198194376935239734,6307159841698945962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:3716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,14198194376935239734,6307159841698945962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1852,14198194376935239734,6307159841698945962,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5620 /prefetch:82⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1852,14198194376935239734,6307159841698945962,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5912 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,14198194376935239734,6307159841698945962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4636 /prefetch:12⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,14198194376935239734,6307159841698945962,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,14198194376935239734,6307159841698945962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:2136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,14198194376935239734,6307159841698945962,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6036 /prefetch:12⤵PID:2516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1852,14198194376935239734,6307159841698945962,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3868 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1852,14198194376935239734,6307159841698945962,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4644 /prefetch:82⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:1560
-
-
C:\Users\Admin\Downloads\winws.exe"C:\Users\Admin\Downloads\winws.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:576 -
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\Downloads\winws.exe"3⤵
- Drops startup file
- Suspicious use of SetWindowsHookEx
PID:4340 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:SystemDrive) -Force4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1152
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:SystemDrive) -Force4⤵
- Command and Scripting Interpreter: PowerShell
PID:4872
-
-
C:\Users\Admin\AppData\Roaming\WinSFXConnectDevicesPlatform\WinHelper32.exeC:\Users\Admin\AppData\Roaming\WinSFXConnectDevicesPlatform\WinHelper32.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3776 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Windows\Defender\yjJlDaeiCtZ3rPY3voT8EfypAtNWVOHqwTO.vbe"5⤵
- System Location Discovery: System Language Discovery
PID:2964 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Windows\Defender\zHxvwMPtXsd9EflNyF6bR38DTMh313hvK806W5p8W9mTT85g.bat" "6⤵
- System Location Discovery: System Language Discovery
PID:2576 -
C:\Users\Admin\AppData\Roaming\Windows\Defender\RunShell.exe"C:\Users\Admin\AppData\Roaming\Windows/Defender/RunShell.exe"7⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:848 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\1xwp4lxu\1xwp4lxu.cmdline"8⤵
- Drops file in System32 directory
PID:968 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD7CD.tmp" "c:\Windows\System32\CSCAFE86041B48049A2AD46C45A28484B1D.TMP"9⤵PID:2888
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Uninstall Information\StartMenuExperienceHost.exe'8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4976
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\wscript.exe'8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:3880
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\blockComAgentdll\msedge.exe'8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2460
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default User\StartMenuExperienceHost.exe'8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:3912
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\RuntimeBroker.exe'8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:104
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Windows\Defender\RunShell.exe'8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1436
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\RM3bvOfJXa.bat"8⤵PID:3172
-
C:\Windows\system32\chcp.comchcp 650019⤵PID:1064
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:29⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\RuntimeBroker.exe"C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\RuntimeBroker.exe"9⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1832
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\Windows\Defender\xdwd.exe"C:\Users\Admin\AppData\Roaming\Windows\Defender\xdwd.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- UAC bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Hijack Execution Flow: Executable Installer File Permissions Weakness
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2164 -
C:\Windows\SysWOW64\WindowsInput.exe"C:\Windows\SysWOW64\WindowsInput.exe" --install6⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4288
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose6⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4736
-
-
C:\Users\Admin\AppData\Roaming\Windows\Helper\WinHelper32.exe"C:\Users\Admin\AppData\Roaming\Windows\Helper\WinHelper32.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- UAC bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Hijack Execution Flow: Executable Installer File Permissions Weakness
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3972 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5016
-
-
C:\Users\Admin\AppData\Roaming\WinHelperWatchdog.exe"C:\Users\Admin\AppData\Roaming\WinHelperWatchdog.exe" /launchSelfAndExit "C:\Users\Admin\AppData\Roaming\Windows\Helper\WinHelper32.exe" 3972 /protectFile7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1280 -
C:\Users\Admin\AppData\Roaming\WinHelperWatchdog.exe"C:\Users\Admin\AppData\Roaming\WinHelperWatchdog.exe" /watchProcess "C:\Users\Admin\AppData\Roaming\Windows\Helper\WinHelper32.exe" 3972 "/protectFile"8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1736
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\Windows\Defender\Boostrapper.exe"C:\Users\Admin\AppData\Roaming\Windows\Defender\Boostrapper.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3412 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\blockComAgentdll\l2A594olLEJWUEUfw4GfnauDbYxQl.vbe"6⤵
- System Location Discovery: System Language Discovery
PID:792 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\blockComAgentdll\Q5HIcCBrM4kJ2gRS.bat" "7⤵
- System Location Discovery: System Language Discovery
PID:5040 -
C:\blockComAgentdll\hypercommonSvc.exe"C:\blockComAgentdll/hypercommonSvc.exe"8⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3584 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\kvAdD40QhI.bat"9⤵PID:3176
-
C:\Windows\system32\chcp.comchcp 6500110⤵PID:3364
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost10⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3776
-
-
C:\Windows\Migration\WTR\msedge.exe"C:\Windows\Migration\WTR\msedge.exe"10⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3568
-
-
-
-
-
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1852,14198194376935239734,6307159841698945962,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=3876 /prefetch:22⤵PID:3408
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:848
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2032
-
C:\Windows\SysWOW64\WindowsInput.exe"C:\Windows\SysWOW64\WindowsInput.exe"1⤵
- Executes dropped EXE
PID:1944
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 13 /tr "'C:\Program Files\Uninstall Information\StartMenuExperienceHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1576
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Program Files\Uninstall Information\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1484
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 11 /tr "'C:\Program Files\Uninstall Information\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4648
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wscriptw" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\wscript.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1164
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wscript" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\wscript.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5112
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wscriptw" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\wscript.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4568
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "msedgem" /sc MINUTE /mo 9 /tr "'C:\blockComAgentdll\msedge.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:576
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "msedge" /sc ONLOGON /tr "'C:\blockComAgentdll\msedge.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4880
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "msedgem" /sc MINUTE /mo 6 /tr "'C:\blockComAgentdll\msedge.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:916
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 10 /tr "'C:\Users\Default User\StartMenuExperienceHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2028
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Users\Default User\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2248
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 11 /tr "'C:\Users\Default User\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4696
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2856
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4620
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2344
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RunShellR" /sc MINUTE /mo 8 /tr "'C:\Users\Admin\AppData\Roaming\Windows\Defender\RunShell.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4996
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RunShell" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Roaming\Windows\Defender\RunShell.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1560
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RunShellR" /sc MINUTE /mo 6 /tr "'C:\Users\Admin\AppData\Roaming\Windows\Defender\RunShell.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2452
-
C:\Users\Admin\AppData\Roaming\Windows\Helper\WinHelper32.exeC:\Users\Admin\AppData\Roaming\Windows\Helper\WinHelper32.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2612
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
6Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5627073ee3ca9676911bee35548eff2b8
SHA14c4b68c65e2cab9864b51167d710aa29ebdcff2e
SHA25685b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c
SHA5123c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb
-
Filesize
425B
MD5bb27934be8860266d478c13f2d65f45e
SHA1a69a0e171864dcac9ade1b04fc0313e6b4024ccb
SHA25685ad0d9909461517acf2e24ff116ca350e9b7000b4eefb23aa3647423c9745b4
SHA51287dd77feac509a25b30c76c119752cc25020cca9c53276c2082aef2a8c75670ef67e1e70024a63d44ae442b64f4bc464aee6691e80c525376bb7421929cfa3bb
-
Filesize
2KB
MD5d0c46cad6c0778401e21910bd6b56b70
SHA17be418951ea96326aca445b8dfe449b2bfa0dca6
SHA2569600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02
SHA512057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949
-
Filesize
152B
MD5003b92b33b2eb97e6c1a0929121829b8
SHA16f18e96c7a2e07fb5a80acb3c9916748fd48827a
SHA2568001f251d5932a62bfe17b0ba3686ce255ecf9adb95a06ecb954faa096be3e54
SHA51218005c6c07475e6dd1ec310fe511353381cf0f15d086cf20dc6ed8825c872944185c767f80306e56fec9380804933aa37a8f12c720398b4b3b42cb216b41cf77
-
Filesize
152B
MD5051a939f60dced99602add88b5b71f58
SHA1a71acd61be911ff6ff7e5a9e5965597c8c7c0765
SHA2562cff121889a0a77f49cdc4564bdd1320cf588c9dcd36012dbc3669cf73015d10
SHA512a9c72ed43b895089a9e036aba6da96213fedd2f05f0a69ae8d1fa07851ac8263e58af86c7103ce4b4f9cfe92f9c9d0a46085c066a54ce825ef53505fdb988d1f
-
Filesize
113KB
MD57cf417d06a24c1ade73ec6d8ae589077
SHA1128516790f9c6d8ac1d33a9f1f2b854162d94942
SHA256270723a06c0f917204923693f09cc0d6cd2cc9cefd59fc051cfbf920d26f17d8
SHA5123f5615b04489cfc755e19efc30fe619026dfacd250bb1c1677e1c55ceb6f69a80d0f05760c157696985e1090c34e8e403b453e5680fb981f274bdd66e2fcb5bb
-
Filesize
186B
MD5094ab275342c45551894b7940ae9ad0d
SHA12e7ce26fe2eb9be641ae929d0c9cc0dfa26c018e
SHA256ef1739b833a1048ee1bd55dcbac5b1397396faca1ad771f4d6c2fe58899495a3
SHA51219d0c688dc1121569247111e45de732b2ab86c71aecdde34b157cfd1b25c53473ed3ade49a97f8cb2ddc4711be78fa26c9330887094e031e9a71bb5c29080b0d
-
Filesize
5KB
MD5a08811213468bf8442574c68f8f476ee
SHA1b6a527b5ffbb9ab33690e726a5ae282245cc081c
SHA2564893e1383257ebe58f906ffc149b62ebf43ce5f2985aa235efc33cdfca3b8d37
SHA512210f7b6a0f5eb68a721ba7aac4bed96ac8e96f87afd0fc8374eb2b07d32ec1edabca6269eff10313d6bb1daef760069fceda0376f0688660af18b336665fdfce
-
Filesize
5KB
MD5cd8bab9c5db3c7b0ca042e99f1139568
SHA1f0e4e14ca609c13551c0485f127cb26fbf1db850
SHA2567e55294dcf96ef55d2d2cedd0d8d677236648909e8f8bb2d634411dff09bdd91
SHA5126af832db9121eae600b574e3ff75f933489146317d6052162a22b853752a02c9d5897f1a3d64cb304d7919afde50630c51400c967ed5f2b833f1dac130275f66
-
Filesize
5KB
MD5c7c787bc0c72f81301190c899c80512a
SHA179c336ecf8a6d771a58530aca7fc14398c57b53c
SHA2565b0bff9db9168045f9d7f1ac6380dfd009340d15a1298a24d3410c9fc38f76b6
SHA512c5dd43fb3a2d818852222848ee3e3ca9ebcf4a090d80a0ecffd1c345f30e4b71ee84b10a72e1950db5adcbef3244cbb2c7bcb8ededb0dd2f5ce431daecb7213e
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5ad6f09e540aa9cfd5cdf9fc28f5f3c9f
SHA16c5f1f779d817b238e9793afa3c247faeaa40697
SHA25651fb2e0bafc435dbc45931edf9e99272761caefb9f30e521a2585b6904391580
SHA512811c932d9ee8baae022e71e337c89548b0de8e3f45efe520beb530c7de49ec3457d35bd5e1c0d0ade29998400806db95e258baa1ba7671c4e22bfb0a4551de40
-
Filesize
11KB
MD58e0a2e74bf16886f7fa795ebb66acb96
SHA102e69d0d44aced7f8c5ca820fee1575440b834b4
SHA256e48b6ce2f747a45398bc5ceb22d3e9dc8147bd286273da2ab755ccce26a65fc0
SHA512572ef9fdd5bf53997c5176e68391462b241f499d08463e502c17e28dbe434ca83d667005f17bebfb12cae6cce588f525ae987142af806c2db1ad0c76109ab076
-
Filesize
8KB
MD5375490311ca68f4e6f4d636781903788
SHA171973f109e84ce952339509decf3bc58091c3e06
SHA25610af59c7c9dfc37b9bf68a1b4f1a34272f8af0f45c41c4b9f192c8afc71b9bc3
SHA51207c7f521e855f2515b407b674d8508a450bd236e120f1544dcdc63b4b7e2c4e1ac5b26e5150b1c8d8249cc79266fc7eca4089b50f7dfe84db8f1c11df7e13746
-
Filesize
944B
MD5e3840d9bcedfe7017e49ee5d05bd1c46
SHA1272620fb2605bd196df471d62db4b2d280a363c6
SHA2563ac83e70415b9701ee71a4560232d7998e00c3db020fde669eb01b8821d2746f
SHA51276adc88ab3930acc6b8b7668e2de797b8c00edcfc41660ee4485259c72a8adf162db62c2621ead5a9950f12bfe8a76ccab79d02fda11860afb0e217812cac376
-
Filesize
18KB
MD57033c289c90d0f9ed16ac4ed6652c972
SHA1eea04bee9b322003832b9514d6b291ed1b75abe1
SHA256fa2ef70e69d8d10d2addd0df92a86509855d33f6d5f2cc5319aae2b9a4a9b5e5
SHA512bc3d81aeab954a01f30bbe151d15cfd8d568e00abd9014f88a8913a3ecd3bbb2a5fe9ad136bb779e029ff35acc80cad428e68293c34e4d5908e5046d5a5564fe
-
Filesize
944B
MD56344564097353c8e7e68991fffa80d88
SHA12ac4d108a30ec3fbd2938b0563eb912415ea7c62
SHA256d0af6d69f8bc0c98e9fb61dead6327bbc8b4f5292529313515382d8f883de0da
SHA512e2b37a9001a91cb05483d72f88bd70a61ca5655939c2290fd1580710eec9d8d26a5fedbcb5223f5413b5dcc46f1d8b6b408e57be0e4ad4b37b55cbce9023a303
-
Filesize
1KB
MD533af950a420084e5735a89bfc66608ea
SHA17051ccb9e33949c19ec62027146dfa5024cd546e
SHA2569b31ba5fa8422dc2461a1c9525883d81a92da3a0abc4d16ac17287eba0707024
SHA512ca4a7658aace5a33b7dc67c8962d78b87f72481ca8a9413670abcd83d2cf261811a4074af792fba9afcf51821759e2156f05272d1ac43a9dbf599ef1f3991752
-
Filesize
257B
MD57897162a852cb1b3dd7faffe284ebde3
SHA1103ba53f9271a246e7fafba303354593066cd767
SHA2566bb6ecbca17efb83ee94a839e5883e286886023a8e10aaff8005f611ff369076
SHA512fea40032dd637efef6269cf7292adb2178e3905000f17407ae05081a871c43349c1667dc9e14c9dc68c8eaea7d0272551654a1f303c8509d99d081854365d07e
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
163B
MD55c50d98736b363a6cbae193a93b31f78
SHA12645e2dcf1605b5b76abfe9dda6d0fc8df362bbf
SHA256bdf69702883a50b209edb42d8663bfd81b79c39e61c6c230f1e389184ae9cda1
SHA512cb21cfde10e35cf39a04a4dbccedb7cf54d8fa04b276ba7f7cc0ea0412af0d3bb603288deea71ebfc1786c28b5e62b551aeb14589ae9c9ee1e13904f441cf072
-
Filesize
9KB
MD57a195b6c9de2d5cab015f649da6931a1
SHA189f7372dd92a90a8e13b74ee512b464412e4cf9b
SHA25630183935449a625c2a61f6342dc3b9907028194173f2e3d594eaa3126ee316bc
SHA5123c2aeef85b51e7f955072fba042bcedf8dd0b66ad813def58c0134355665ba56a713d58005a322561c62be5777d0adea2803da214459f362f22fe2a0dba5a1c7
-
Filesize
4.9MB
MD572982e4d77aaee2ef6d16876037b3dbe
SHA1bfffbe69bfc0cb1fb5e23199dba5ea69c4f3d9df
SHA256bbe1c2a2af47b4e32fa9b6e8a44da455473604bd1aae5481524403f878a86662
SHA512cb28f33f6c3acaa74ddb3e9f50922e764926fbf2b8a3d7317f13b57f6f30e259a5a8b0213c77dee27cf542ad860762909c1f46f695f2b2c45bb778de957f02db
-
Filesize
2.2MB
MD5f21f63c5ac1e7afc50125b10c75e30af
SHA109be95306a2e9f48934b6f3ec4e789eefaaefc94
SHA256a4bf1fbf3c41613a6ca44ec770bca60ed1a23206bd01a2296513c302ff63e046
SHA512681ba321321fe8c856a1d6d3de10f23e4f313d943e0e83abfa4ab575cc8932b8be28024eaec282f21dabafa4848b9305d4a15bbd3db7591bccf46d1ee369d58c
-
Filesize
427KB
MD58d860de39a47014bb85432844205defc
SHA116b6485662cc4b57af26f1ee2fe5e5595156264d
SHA2566f64566b9adc350458221bc7312acaa09290c58241659336b9921c3dcf27fbbb
SHA512c76408b4390d9aeae243f7333c5acdc68b6fe08efd1694c774069627d09e91e97ab1a5ccf55b60a247f3b00e8b95166d3dfcc41ac92150f00dfb897480a5a539
-
Filesize
3.0MB
MD5c33b516c2f5105562cc621929d2f3a5a
SHA1ac89044573fc5b586b43c1bf784c3bcc50a46c1f
SHA25642fcea19c41fd2e09ce01b6f0f48027f7f58aac75f93b7aeae8d24af7eb23f3c
SHA512eace4742d8f75a2093cfeab3cd20f8ddb23514f6d5a598b16927621afc6e2bc4dff58d775e0c2c261f7c1ffc20a4b7d1004fe1ef8c7f904d8ef1cd94636caec6
-
Filesize
249B
MD55299f191d092a082374029620d0184cd
SHA1154c0f2d892c0dde9914e1d2e114995ab5f1a8cb
SHA2569c46745f3776d8f344029103da41e060516a4bf324e7238b112a3069abececf9
SHA512670159a1352e91ad4739903c7d5bbca2b91e81ab542ac6b4532db8701d5bf01b900909812164db6ce4dbdc2fc1af59593d9abc84daff835de07eb7d383869e39
-
C:\Users\Admin\AppData\Roaming\Windows\Defender\zHxvwMPtXsd9EflNyF6bR38DTMh313hvK806W5p8W9mTT85g.bat
Filesize104B
MD5b33c8997ecd39b1b7e8af929abd526c7
SHA1e30e21ca9e74d508cfc35e9affd57a7fbc089a77
SHA25671340cb564242cd1454892eaa33aae6eaf8e444d9301731753a9aa993bb9785c
SHA512394a9df69628162228d6a8934d6df532d5055a65a41788ef7d2b8170fae3bd586d80c8592ebc10e32650b81d43efd2eefdef865523d687b6def20fe4374afefc
-
Filesize
217B
MD55671dedf50bf0cf8dc9308d28901a49d
SHA16dfab43ab6d386da67e0b009b31d3a82beec03dd
SHA25677b50da9d2e4bf111aeb478fbdf84367df25c405cc78047f0a5a52e263eecfef
SHA5127e79ffcd8f0e9d4493230b7863c1e9f1f0012deab5e41ac4d0d7c2a8fde2256ca553819914ac6464bca8d3fd47fbeb016f6e73f849820dce8320401d1d326c37
-
Filesize
21KB
MD5f6285edd247fa58161be33f8cf662d31
SHA1e2b49bca43cd0bd6cc1eee582ba58f0ed6de1470
SHA256bc16993d1a774793044ca37eb2ce84ecbdb5c578e3c710ed82879e07dcef2fec
SHA5126f3e6073a1dafc679da1caa4a4c9cb7cc2da79c3f81034d7b7b7b1d855fd5421cbb517a7d3f9520f49d4d3b7f9577f4f8f92486994c8b78fabff5033b390a788
-
Filesize
349B
MD589817519e9e0b4e703f07e8c55247861
SHA14636de1f6c997a25c3190f73f46a3fd056238d78
SHA256f40dfaa50dcbff93611d45607009158f798e9cd845170939b1d6088a7d10ee13
SHA512b017cb7a522b9c6794f3691cb7266ec82f565a90d7d07cc9beb53b939d2e9bf34275bc25f6f32d9a9c7136a0aab2189d9556af7244450c610d11ed7a4f584ba3
-
Filesize
98B
MD51316b7f40530ee0c903a091d248c63dd
SHA16e9322f825d3d18a712458d98430a54b17c9f904
SHA25643c1d785f81931b200e0be0a9fc40a736f26f397fda6571e26f52c21acf1065f
SHA5121c9a435ca6d25466b715d2d4505dc33d42ab33fe192e89820929ee01b1962a2128c0ce9281ae96d27a9c18a4d035e55d912f673e17c6e7936d96160fea253345
-
Filesize
1.9MB
MD5c9cda0ef2f246e5a640c25ff468a87a4
SHA144c7046f6251c49905cc569d1836361d0ae7856a
SHA256cc66b2f2a0bcd9104078ed351c6b313a488f6b895c5fef9743b227c0397c4d6f
SHA5122731df92281b29a4421b5071891676a4048bb39378956674c99dddea5b27f7684c71b7e3808942fd758c3c60e3eae93da535de95d702a3ae6f8829aae598ff21
-
Filesize
211B
MD5386552a2a95b01f9b62bbf076f55204a
SHA14b202d016dc86a72837fdcb080caea7b8761842c
SHA256be3ca473daa12562ac27843de069cca900d4413f08703b0cefee87303b8ec414
SHA512dbba55a57db75cb351606a7dbc89cd0cf37dd333fa7456f94c6c2f9fd0480af28a27c29ca411cc5745c9929a92222123f770a870b046a84b25b23f4417ec62c4
-
Filesize
398B
MD5fbc061fa90933f317ded3325b86dc67d
SHA1b3a34a7182fefb7bfd9ee956ed2fd0b6a3a2c626
SHA2568f54081ae7a3612b30cf97ab03cfc9184721e460746cb3e8f8f730ebbeab7766
SHA512f3dad7784e4e0ff1b5640916d4f009835752d91dab97097b65cc31d73c44203c6b84e55b98980754ba9c13c12a50abfc6dbd429a3b9ec48f091b67dcd31bdb0b
-
Filesize
235B
MD51c8b8cb854d0026c9003e1b346d170de
SHA136d0061ccd2bbafc9ac6b91771b0ae42166fecbf
SHA256d8fe785b022932ba53ec585fe6acfc0125a6b607d6cc6873ac2024884c9bc90d
SHA512d9da789858a7b518f4f4f0ae7e84ff3eb6f9de323cf138121c18cc16d1940025a4f2afab974f71416a8cbbccea937b5063a52b155480b0f0cbf62d9ada7ad322
-
Filesize
1KB
MD57900d176b9cdbbde19613359be2ccd9b
SHA179136520641dd7be900091daec74b15c9537d71f
SHA256bfd9f0d5dc52c3e289afe9ea4e675e1d9d7f24a9f5fca6fcf25005cf4ec76832
SHA512dc41823539b0d0c0bc287aea339afc8f21e9d7e69eb7015d07176e4ff9af08d54c595758a94340ccd06761e870648848e3501d1995f12792998d94b5970e9cf8