Analysis
-
max time kernel
123s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 14:32
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1K0MKoShIUCPYLiAjSuTULSDWj7H2Va_e/view?usp=drive_link
Resource
win10v2004-20241007-en
General
-
Target
https://drive.google.com/file/d/1K0MKoShIUCPYLiAjSuTULSDWj7H2Va_e/view?usp=drive_link
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation rundll32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation rundll32.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 2 drive.google.com 5 drive.google.com 8 drive.google.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 sdiagnhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz sdiagnhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString sdiagnhost.exe -
Enumerates system info in registry 2 TTPs 5 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS sdiagnhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU sdiagnhost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133758091936198373" chrome.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1784 chrome.exe 1784 chrome.exe 2364 sdiagnhost.exe 2364 sdiagnhost.exe 876 chrome.exe 876 chrome.exe 876 chrome.exe 876 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1784 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1784 wrote to memory of 4836 1784 chrome.exe 83 PID 1784 wrote to memory of 4836 1784 chrome.exe 83 PID 1784 wrote to memory of 2192 1784 chrome.exe 84 PID 1784 wrote to memory of 2192 1784 chrome.exe 84 PID 1784 wrote to memory of 2192 1784 chrome.exe 84 PID 1784 wrote to memory of 2192 1784 chrome.exe 84 PID 1784 wrote to memory of 2192 1784 chrome.exe 84 PID 1784 wrote to memory of 2192 1784 chrome.exe 84 PID 1784 wrote to memory of 2192 1784 chrome.exe 84 PID 1784 wrote to memory of 2192 1784 chrome.exe 84 PID 1784 wrote to memory of 2192 1784 chrome.exe 84 PID 1784 wrote to memory of 2192 1784 chrome.exe 84 PID 1784 wrote to memory of 2192 1784 chrome.exe 84 PID 1784 wrote to memory of 2192 1784 chrome.exe 84 PID 1784 wrote to memory of 2192 1784 chrome.exe 84 PID 1784 wrote to memory of 2192 1784 chrome.exe 84 PID 1784 wrote to memory of 2192 1784 chrome.exe 84 PID 1784 wrote to memory of 2192 1784 chrome.exe 84 PID 1784 wrote to memory of 2192 1784 chrome.exe 84 PID 1784 wrote to memory of 2192 1784 chrome.exe 84 PID 1784 wrote to memory of 2192 1784 chrome.exe 84 PID 1784 wrote to memory of 2192 1784 chrome.exe 84 PID 1784 wrote to memory of 2192 1784 chrome.exe 84 PID 1784 wrote to memory of 2192 1784 chrome.exe 84 PID 1784 wrote to memory of 2192 1784 chrome.exe 84 PID 1784 wrote to memory of 2192 1784 chrome.exe 84 PID 1784 wrote to memory of 2192 1784 chrome.exe 84 PID 1784 wrote to memory of 2192 1784 chrome.exe 84 PID 1784 wrote to memory of 2192 1784 chrome.exe 84 PID 1784 wrote to memory of 2192 1784 chrome.exe 84 PID 1784 wrote to memory of 2192 1784 chrome.exe 84 PID 1784 wrote to memory of 2192 1784 chrome.exe 84 PID 1784 wrote to memory of 1948 1784 chrome.exe 85 PID 1784 wrote to memory of 1948 1784 chrome.exe 85 PID 1784 wrote to memory of 408 1784 chrome.exe 86 PID 1784 wrote to memory of 408 1784 chrome.exe 86 PID 1784 wrote to memory of 408 1784 chrome.exe 86 PID 1784 wrote to memory of 408 1784 chrome.exe 86 PID 1784 wrote to memory of 408 1784 chrome.exe 86 PID 1784 wrote to memory of 408 1784 chrome.exe 86 PID 1784 wrote to memory of 408 1784 chrome.exe 86 PID 1784 wrote to memory of 408 1784 chrome.exe 86 PID 1784 wrote to memory of 408 1784 chrome.exe 86 PID 1784 wrote to memory of 408 1784 chrome.exe 86 PID 1784 wrote to memory of 408 1784 chrome.exe 86 PID 1784 wrote to memory of 408 1784 chrome.exe 86 PID 1784 wrote to memory of 408 1784 chrome.exe 86 PID 1784 wrote to memory of 408 1784 chrome.exe 86 PID 1784 wrote to memory of 408 1784 chrome.exe 86 PID 1784 wrote to memory of 408 1784 chrome.exe 86 PID 1784 wrote to memory of 408 1784 chrome.exe 86 PID 1784 wrote to memory of 408 1784 chrome.exe 86 PID 1784 wrote to memory of 408 1784 chrome.exe 86 PID 1784 wrote to memory of 408 1784 chrome.exe 86 PID 1784 wrote to memory of 408 1784 chrome.exe 86 PID 1784 wrote to memory of 408 1784 chrome.exe 86 PID 1784 wrote to memory of 408 1784 chrome.exe 86 PID 1784 wrote to memory of 408 1784 chrome.exe 86 PID 1784 wrote to memory of 408 1784 chrome.exe 86 PID 1784 wrote to memory of 408 1784 chrome.exe 86 PID 1784 wrote to memory of 408 1784 chrome.exe 86 PID 1784 wrote to memory of 408 1784 chrome.exe 86 PID 1784 wrote to memory of 408 1784 chrome.exe 86 PID 1784 wrote to memory of 408 1784 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/file/d/1K0MKoShIUCPYLiAjSuTULSDWj7H2Va_e/view?usp=drive_link1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffaa685cc40,0x7ffaa685cc4c,0x7ffaa685cc582⤵PID:4836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1560,i,11716948106146638921,659474371443704089,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=300 /prefetch:22⤵PID:2192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2136,i,11716948106146638921,659474371443704089,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2188 /prefetch:32⤵PID:1948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2268,i,11716948106146638921,659474371443704089,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2296 /prefetch:82⤵PID:408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3120,i,11716948106146638921,659474371443704089,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3136 /prefetch:12⤵PID:2996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3124,i,11716948106146638921,659474371443704089,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:1756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3664,i,11716948106146638921,659474371443704089,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3680 /prefetch:12⤵PID:5088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4400,i,11716948106146638921,659474371443704089,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4856 /prefetch:12⤵PID:2840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5124,i,11716948106146638921,659474371443704089,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5264 /prefetch:82⤵PID:820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5388,i,11716948106146638921,659474371443704089,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4676 /prefetch:82⤵PID:1380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5372,i,11716948106146638921,659474371443704089,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5432 /prefetch:82⤵PID:2892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4760,i,11716948106146638921,659474371443704089,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3860 /prefetch:82⤵PID:5000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=208,i,11716948106146638921,659474371443704089,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5080 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:876
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3968
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:456
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3024
-
C:\Windows\system32\pcwrun.exeC:\Windows\system32\pcwrun.exe "C:\Users\Admin\Downloads\Setup.exe" ContextMenu1⤵PID:1332
-
C:\Windows\System32\msdt.exeC:\Windows\System32\msdt.exe -path C:\Windows\diagnostics\index\PCWDiagnostic.xml -af C:\Users\Admin\AppData\Local\Temp\PCWD220.xml /skip TRUE2⤵PID:780
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\pcwutl.dll,LaunchApplication "C:\Users\Admin\Downloads\Setup.exe"3⤵
- Checks computer location settings
PID:4932
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\pcwutl.dll,LaunchApplication "C:\Users\Admin\Downloads\Setup.exe"3⤵
- Checks computer location settings
PID:2000
-
-
-
C:\Windows\System32\sdiagnhost.exeC:\Windows\System32\sdiagnhost.exe -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:2364 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\eeyifjrq\eeyifjrq.cmdline"2⤵PID:2216
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD760.tmp" "c:\Users\Admin\AppData\Local\Temp\eeyifjrq\CSCF364699990234089B74A1D8CD07BCB6A.TMP"3⤵PID:5000
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ij5sm4fk\ij5sm4fk.cmdline"2⤵PID:4244
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD84A.tmp" "c:\Users\Admin\AppData\Local\Temp\ij5sm4fk\CSCCC364D431A2740D5A3641CE12FA828AC.TMP"3⤵PID:4680
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\3jwsmyqr\3jwsmyqr.cmdline"2⤵PID:3152
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESDCDE.tmp" "c:\Users\Admin\AppData\Local\Temp\3jwsmyqr\CSC3C8CAFC9E48141318383F23D8E43353.TMP"3⤵PID:1208
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5e033fa3b17db0398cab6dddadc3d0f21
SHA1b31c907d318f33a134e666c632697cea12440b6a
SHA256f57293b0bcafdcb05b3242add1e2d4b6598fd9a932042abc5ff50b91f2fb812b
SHA512aa1c51e877ac89983d3413481c2e06db97bf3237104174fea214b9fdda16a1cad3d14d144f73fb45f24354b86158edaab06ad8c92d130a34d0267f606ee51061
-
Filesize
47KB
MD5310e1da2344ba6ca96666fb639840ea9
SHA1e8694edf9ee68782aa1de05470b884cc1a0e1ded
SHA25667401342192babc27e62d4c1e0940409cc3f2bd28f77399e71d245eae8d3f63c
SHA51262ab361ffea1f0b6ff1cc76c74b8e20c2499d72f3eb0c010d47dba7e6d723f9948dba3397ea26241a1a995cffce2a68cd0aaa1bb8d917dd8f4c8f3729fa6d244
-
Filesize
649B
MD500dcb268b1f79624896be27e0d0998f9
SHA18bdeeef0e265ed39a432d471cbd2e7656e25132e
SHA256c6f2c197d97e462a7cecbbfc3494dc65e1a0ad7e016fc94bbdcdbc465df7d578
SHA512b909cfc04de577c07224f7d60fc03dc27ac9e9649e6a89cee652d31b783e7ed17eb07166a6b34cfb2a1c9e3eab4d4bc309634c2ca50ed44b34b97d8edf7df0fc
-
Filesize
336B
MD5fce50759d339bb4590562ba8427b36aa
SHA184b03fed766c48508bf3db46d35b2aafea8339a2
SHA256a6134b33a0121f638bc0e1feb1795b625c9d4bce8bcf1a4fa92859e123f9815f
SHA512cfd782bb7f25d171374aad5c3be6c72bd872a2050ba3707c56ea476ad7f9279f57676ec76dab84946cad840b2ee3eee59903e583cc3c42e83d5a546654f13366
-
Filesize
2KB
MD52f9e58700b6912adac40fecba51c5c31
SHA15dfa2d8719a485543c47884ccce03e9d0e288b67
SHA256d970defcc58a463cd325e8d29938ef68848f53596d8228f74e84c1cddd88d32d
SHA5125f4eb3d7564ebac10b5ce4580170e137a1dc0927cd00f7b7423c43fa234575a6bdbfabe0a18c95cf0d8f068050393a670325e950ffd051a231e82dee42d5d144
-
Filesize
5KB
MD55a2a6984c4b8d327feb47a9226543284
SHA1a54760b0f7bb42735a22cadd3e0e2984d0c7e768
SHA256335a7f4637478624f3d66e3f8e2e85edfd91a2aff75710f54ab21783f32a02a0
SHA512a179b139744c7c50bcaac560aee6b139b15d6a541dfd3f6f49960b2d085163f97237760a4f2b0ebe16456a74a7eba88bfa5c977e6a23bfb9fd9e241cb3f82575
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
859B
MD597c8804f281d00e92421c3d6b5c8c204
SHA1ed4d625624a87e705f24d9293ba1bd7ca57dfd2b
SHA2569570f10471bd46f9aa2b0b4fc0f4c6a6f4b0186729b04c72407ac5949736b942
SHA5124acee30a4a0d85f1eaa6607141fa6ed52cfb48ccd244745b55756f2b4e00b0031facc50763726ad64e8d73b80322aee2ddc4330b40193a73c57339641beb0a39
-
Filesize
10KB
MD54f995514f187e7dcb97239c8eaf1812b
SHA19caef61aae5cb6c74a1e2d822a16ab0a7ec52b73
SHA256162d13383877d62bd3b021157b2747ade65ed2395b62ee2f13ad6936f051ce30
SHA512ddda96ba15bc58ec2bd0611d3e92f559e343e315d0c9035c9bc453382864d51b712d0773df3cd57d0e66b8b38cb9c318e593c93fb217daf01d9c78418a730d51
-
Filesize
10KB
MD530225eba58902ff5cd5aa6618b7a2d38
SHA17d29b6ad0ddf6d593387c915ba8abd11a4d2c28c
SHA256d023e1a9b44a737cf06ac940a09763ee0d959202258ad55ba03490c510721d09
SHA512e6d777c427f8c91590038f56b7b77032af972a24f93e11bd9835497a5041fdca1a081bd55b7674fb18a12834c3ef55d873e4259b8a6501e2262af638102379fe
-
Filesize
9KB
MD5195b4865b38d183684765fbf0b044e99
SHA1fa1c898ac7dfc6c5f3b22e630da419ac7b82d454
SHA2561c72bb85c4ecd3eef5d5c82beb7df8b76a7aa2704ccbe57b870ee3cec6f5e379
SHA51244771064708f599ece009c3b8a40dd70f91f8e1a98b22bdd752fdf2e3362b87e0dca43e471785c8dac58701d7e6d6f90cbd75068b7613686bb67854c41c1d4a1
-
Filesize
10KB
MD50b191d97e5da0329e888f608e59584da
SHA19e15694e0b0c50e625a132605c50e36846418b8d
SHA2564b232235dcbaadf36b7cd05ea899db80195bbb71e9ffba5963becf5e72193564
SHA5122db1ba988e8276606136bbe7a0fb95840e07386d010295b237315b6c90ce9944f87977f2e2054446607859bbaa1c6cfe682fd7797285b58f4984aa21f7152191
-
Filesize
10KB
MD55f703e248bda34857672648d65eb878a
SHA1f1ba7e55847e37165c3d59d57abf8de70de607da
SHA2569ca0148f628d1c8be9386bbf0274c08ef5d396c9f7db906972884a33da09d3b1
SHA512a324ca9e0c31e3c35cb062b09bb4b31be4947358dc6db35d92623de66d1710d312b4751ccc825cecaa057de3ae7c043f8e0fe9a749fbaffb007c6b539aa2dbfa
-
Filesize
9KB
MD5df6147518031e29b71b339d4353ca69d
SHA116714b992cead0b10753b18a8148d1925de6a582
SHA2564188e953596d6824bb4645529cfdfe6587912fae09a670fe627d8d56bd2df9b9
SHA51219c1694583caf9a8680e0778d8c27634f220a702bcb96e93987fd1f5b2cf68c12a5241d18aa966a9abd46522c9320b948612e7a3ff01487e09e668c05b11cf80
-
Filesize
10KB
MD5408e8ca16db5caa06135bcffa8a91642
SHA1f642b5c0e4562ae039070b37a813ea56cd392923
SHA256367c59d810334c1ea84d6d27cfd8656feb5d69817dc53b3e5016e4a53673e56a
SHA5126bbcfbfe2101de0da642f52e652c984c4b1c9fdfc522999c8cea28612e000fe7b059b6465bb7f6cad0a6c21a8bb2e8e265ce50dc890936d3336bf3e4dea9a912
-
Filesize
10KB
MD50114326f5467b2a3cba1c0df428bcb03
SHA1666cf71cc7f4241963727b948866aa4fde2e046f
SHA2564b3494e855bf0b4537e33edfeaf0165b2c65d3c2effb6ff502b5f9ffc8fd40f4
SHA512b289a51448231133b5b754c223175f31865e0022030a19580ba53bf9deac9011ac477e0e5659edebdc25c157fb653b3c4b943d467e1cde3a3d7ed45cf7c4b170
-
Filesize
116KB
MD57cc5d008ba671715abe39e5a07addda4
SHA1105eab5def269965073960fa4dc6da85930731d4
SHA256bde7d6a27c8750589ab9a541ef5ad4423280394b7a1b596d112313fd1759267a
SHA512ae079d7eae14b458cc81f23dfcb001437f95735952deba207014d0d8fa3cbfc27d82dc6434d00123a648f75dbec4128ffcf1ad4c5f9cd11cd2f2d3672b998ffb
-
Filesize
116KB
MD5b4dbe1dc95ee726440d8bfb764c2ed5a
SHA1c233c8656f1e7a2450f8dbda5d1f710d868c8e76
SHA256e78937c1c9b90ddb30ea59b729e0639ba146198adc1834a942cc265239987f34
SHA5120ffe814fbe1f2df0b707ef75b3b6ad2e47907bc53755b16830a4b69ef97ec4b754c748646d28de4da478f149b7b4271016ea05facc1ea09744bff07a74faebaa
-
Filesize
9KB
MD50163a41f347df1d4aee086c2a6adf6e3
SHA15ffe83bb8080c0b8a9638d7ac7e2c3b635046354
SHA256f96f78b4c17fe70e1bff1656b7d2337ad0f9573d52efda2cbed3a523de57e738
SHA5124852c27a2e4f9dae380eb7e0694b2741541d84a785c49dc533e715d7054e1431c9628e4e1d09a6c184576dbe3eac9ece2a3192d4ee42e33fe6f12b7a55751b8d
-
Filesize
708B
MD56d96814211dd62c20cc7b70d24509e41
SHA15cd721f717ada9bebfd87914dc60d544bfc6721a
SHA2565793deb04cde2e5a9e7fa7009a43f8138264d4d7a7e1c9992fc2e74ba019c745
SHA5121f95216125815a37facb15b3820e432330f92e8217cd3ee1b8510fb3bb50e0faf6b499a963228a28c1e7265254e95b8f0f845d1d3df493522bb8d3efeea1d6a3
-
Filesize
1KB
MD5a29161c08b6b21801f8fb70b9621b400
SHA1725e0389aa0a6ff74404380aaa6482177aabc068
SHA256051cafd123b2a8894d9904d4173ab9d560568af93c06b44ab030aa32cf1df056
SHA51282599ddd8514bcbf895f1091c426de24e1758f29c339a6f52098008197b81a7517ed044209124c05b2ab5f9a5ed3666917ca9a89f8f7e42956db1a08f5ba178c
-
Filesize
1KB
MD54e090b29e7b412628d0d2a0f2cf8b449
SHA123a0c235bdf4bec8d6b6414c255d59b53567dd59
SHA2564acca5efd44bfa1484ac47569174d6880f55839fb537ca917c52c30fc4ff9621
SHA51266b8cea77664d7f4965d470d79913eec01e3c33980ac922327d629cdaebe510c8d2fe9ab7afaac48de25b784fdadcb2f711d5a8a83d8e5f64d1e682caac6be93
-
Filesize
1KB
MD55803bb1e392554e81170c5a8635fa3b3
SHA1b3b65cde3faf576bb4d2555e56fb5a266362cf8a
SHA25632719ba31898a9d16351b3739e42a9f84526d4113c06f5020d6c003b22366220
SHA512002f0a88d14e4e8173eb25e86ecd9b59e9be5225736cd540f93cab665b57c727efca05900ab8d6e6f260813b753d3133a5d6998a34c781253ac4938ca81fe9df
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
5KB
MD58da0853ce11ed5a8afc323a43742b1a6
SHA13017f59f4f869bb043f9fad47456e1932b665b5d
SHA25676d0d3d5f6fa642549bbda02690a381c9e2b2dca5095b078c5fbbead98400c7a
SHA51233f7cbc3ead5a3f26372bccec19ea8ee7dbb3d415ff397d9750eb934a8b4769f0efdbc198071e1ed284bff695fe9a8003f01b067829e57c64146dd881d0668c8
-
Filesize
3KB
MD5f4f4d176c3e9c9570176ea941134570e
SHA1e8f51bc306413ea5af24edd370c49724c31803bf
SHA2567bd4388e3cd74510ffd2267676bcd0ba60693e2db6bddeec5f5a82aec7a61425
SHA5128e63beafe67e2be2a8051f19311bd8d7fdd2ea58ed7736e8ee7eb39fa9ba8b14617ba076034879e8bd5693d353f9b627faa55d8c6b700a7cdb8e6e212057138a
-
Filesize
49KB
MD5edf1259cd24332f49b86454ba6f01eab
SHA17f5aa05727b89955b692014c2000ed516f65d81e
SHA256ab41c00808adad9cb3d76405a9e0aee99fb6e654a8bf38df5abd0d161716dc27
SHA512a6762849fedd98f274ca32eb14ec918fdbe278a332fda170ed6d63d4c86161f2208612eb180105f238893a2d2b107228a3e7b12e75e55fde96609c69c896eba0
-
Filesize
16KB
MD5925f0b68b4de450cabe825365a43a05b
SHA1b6c57383a9bd732db7234d1bb34fd75d06e1fb72
SHA2565b1be3f6c280acfe041735c2e7c9a245e806fd7f1bf6029489698b0376e85025
SHA512012aadec4ed60b311f2b5374db3a2e409a0708272e6217049643bf33353ab49e4e144d60260b04e3ae29def8a4e1b8ada853a93972f703ca11b827febe7725af
-
Filesize
453B
MD560a20ce28d05e3f9703899df58f17c07
SHA198630abc4b46c3f9bd6af6f1d0736f2b82551ca9
SHA256b71bc60c5707337f4d4b42ba2b3d7bcd2ba46399d361e948b9c2e8bc15636da2
SHA5122b2331b2dd28fb0bbf95dc8c6ca7e40aa56d4416c269e8f1765f14585a6b5722c689bceba9699dfd7d97903ef56a7a535e88eae01dfcc493ceabb69856fff9aa
-
Filesize
6KB
MD52c81a148f8e851ce008686f96e5bf911
SHA1272289728564c9af2c2bd8974693a099beb354ad
SHA2561a2381382671147f56cf137e749cb8a18f176a16793b2266a70154ee27971437
SHA512409c2e953672b0399987ec85c7113c9154bc9d6ca87cf523485d9913bb0bf92a850638c84b8dc07a96b6366d406a094d32dc62dd76417c0d4e4ae86d8fcb8bbb
-
Filesize
65KB
MD579134a74dd0f019af67d9498192f5652
SHA190235b521e92e600d189d75f7f733c4bda02c027
SHA2569d6e3ed51893661dfe5a98557f5e7e255bbe223e3403a42aa44ea563098c947e
SHA5121627d3abe3a54478c131f664f43c8e91dc5d2f2f7ddc049bc30dfa065eee329ed93edd73c9b93cf07bed997f43d58842333b3678e61aceac391fbe171d8461a3
-
Filesize
10KB
MD5d7309f9b759ccb83b676420b4bde0182
SHA1641ad24a420e2774a75168aaf1e990fca240e348
SHA25651d06affd4db0e4b37d35d0e85b8209d5fab741904e8d03df1a27a0be102324f
SHA5127284f2d48e1747bbc97a1dab91fb57ff659ed9a05b3fa78a7def733e809c15834c15912102f03a81019261431e9ed3c110fd96539c9628c55653e7ac21d8478d
-
Filesize
11KB
MD5acf1a7b8aab4c6efda423d4842a10a85
SHA1ac55b84b81527ad1224a85640c5a2555b19b685d
SHA256af0a7036a5f650570990f2d562a7c7636b6eaa54f53b6ce3f43aaa070188dafa
SHA51222e5a8b633a0189e836adb0c34c84b5029e8069e2f0a77803da91ce2b0da14b8fa231ddd1f1b164992d534b8a4ccc51c270e8ff2ff3f2f34536432b4abfc04e5
-
Filesize
356B
MD53ddd32c70975c779ed297aa2c1eb678d
SHA130f534505e97fe4abed2f6ad00f26e0519ff0a98
SHA256d853331c3f9007fb6468ef4dd6f4f8d6b3e6c51af5bb8cf5d395048f10977a54
SHA5129ba009d518976e9c1b75a4e198d8c8d0492fbc95b7f73a71b3532f346cf5db40707d4e5c366c1ee9e32fd5762664d1bed557e28a5af6a9b48c672c614dfccca7
-
Filesize
652B
MD5420301de5bff36dcec97406e8155a640
SHA13ece3a6375cdb73df2b052ff0ac3aa7b46b0b624
SHA256ad5799fbabd2e5cbc0b89c583af1d80dbd51c969fb42f6e55d314954506a0dc9
SHA5120152cd4e4533b1849427b10cbc6f3f07223b3f1ff7ac5cc931d141d8551368037d56e58689f97d06672997160047abc4b271aa1cd261a6d4d52b29d17ac808d1
-
Filesize
652B
MD5c1b6133a77f00a4af62468fdf789e432
SHA1aff1877b4e196a1af73519909e378d90f10d8907
SHA256597837cef447afbfc97c07cf5a78bf541655f182fb689ed3971871667c5efc73
SHA512753df1832d284e5f16e312dfe21e004a9026af3621b06ced1e98821daab87f4e3320362cf8f98712fad5ae2bdddf0e24398e81b7807f447e2c35a026fe5c7ca6
-
Filesize
5KB
MD5fc2e5c90a6cb21475ea3d4254457d366
SHA168f9e628a26eb033f1ee5b7e38d440cfd598c85d
SHA25658fcc3cfb1e17e21401e2a4b2452a6e5b8a47163008b54fdcdcc8cadff7e5c77
SHA512c54b9ce28fa71d7e3629cdd74ac9f23cba873506f1b5825acc2aa407414ed603af4c846dcf388c579f8324e3538e63b26f90421ea9d7fcdd3b277c21bad1a5b6
-
Filesize
356B
MD5e45b827980a8165b615015c88089856d
SHA17d2d7f257c09009ee4a4815f9e8c59095b9b90af
SHA25683458212e5d034f9c1efb45516a1150ebfb3a3ca76c63070e1609b92c5361eb5
SHA51212e2aa9b5baefa9b05fe662dfae554250b1b4ba5e9b872c8e64e66185167e4490b48cf21802eb4c1bf77268365cd04391e38737bfefed29fa247e44857192287
-
Filesize
652B
MD50b6e95f5ec6006d7fe20deaebc9a266b
SHA15859606070127641aa34b0c6f20eeac72b77367b
SHA25655f592db5814717968b525c1a8197269365129a09c0ffb3647f29c28e839e878
SHA5122cef5413477170489dd34fb4f4dd7ef57a586a5382e2703985dd4fd0ea044a34ba80ce62f5544261c969a32f3f2e250bf1c753f57bf8a6b10ce2e1e35def099f
-
Filesize
791B
MD53880de647b10555a534f34d5071fe461
SHA138b108ee6ea0f177b5dd52343e2ed74ca6134ca1
SHA256f73390c091cd7e45dac07c22b26bf667054eacda31119513505390529744e15e
SHA5122bf0a33982ade10ad49b368d313866677bca13074cd988e193b54ab0e1f507116d8218603b62b4e0561f481e8e7e72bdcda31259894552f1e3677627c12a9969
-
Filesize
356B
MD5c530b1538cd7a4cc418a7cfe38561310
SHA1989cbc9d9c0132a8aef423524aeba27349e46c30
SHA25666eac12d665295a8fbd3a37560ce221218294605ebf678ed772c981fd9f1b4e3
SHA512c44d43a400732248fed951d90b6b1af763456a0dc2c43d8c6cf9a95fb8c1f34e8d3df5e7b34ba6ff758b2e106276bc5d30ec673857399ced4894600d4d71d308