Analysis Overview
SHA256
5e471e38380ea1289c02d39543962ee2d94de903d00c7bfb53bf8510dac19dbf
Threat Level: Known bad
The file aka451.0.03.exe was found to be: Known bad.
Malicious Activity Summary
Hexon family
Hexon stealer
Uses browser remote debugging
Executes dropped EXE
Checks computer location settings
Reads user/profile data of web browsers
Loads dropped DLL
Drops startup file
Enumerates processes with tasklist
Unsigned PE
Command and Scripting Interpreter: PowerShell
Program crash
Browser Information Discovery
System Location Discovery: System Language Discovery
Enumerates physical storage devices
Enumerates system info in registry
Suspicious use of FindShellTrayWindow
Modifies registry class
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Modifies Internet Explorer settings
Suspicious use of SetWindowsHookEx
Kills process with taskkill
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Suspicious use of SendNotifyMessage
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-11-21 10:57
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Analysis: behavioral2
Detonation Overview
Submitted
2024-11-21 10:56
Reported
2024-11-21 11:00
Platform
win10v2004-20241007-en
Max time kernel
150s
Max time network
152s
Command Line
Signatures
Hexon family
Hexon stealer
Uses browser remote debugging
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\2p9m7YGyMFCUQTUFxkmWGMd4grN\aka45.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation | C:\Windows\system32\cscript.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\hexon_23da536920b5dab8.exe | N/A |
Drops startup file
| Description | Indicator | Process | Target |
| File created | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\startup.vbs | C:\Users\Admin\AppData\Local\Temp\2p9m7YGyMFCUQTUFxkmWGMd4grN\aka45.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2p9m7YGyMFCUQTUFxkmWGMd4grN\aka45.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2p9m7YGyMFCUQTUFxkmWGMd4grN\aka45.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2p9m7YGyMFCUQTUFxkmWGMd4grN\aka45.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\hexon_23da536920b5dab8.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2p9m7YGyMFCUQTUFxkmWGMd4grN\aka45.exe | N/A |
Loads dropped DLL
Reads user/profile data of web browsers
Enumerates processes with tasklist
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\tasklist.exe | N/A |
| N/A | N/A | C:\Windows\system32\tasklist.exe | N/A |
| N/A | N/A | C:\Windows\system32\tasklist.exe | N/A |
| N/A | N/A | C:\Windows\system32\tasklist.exe | N/A |
| N/A | N/A | C:\Windows\system32\tasklist.exe | N/A |
| N/A | N/A | C:\Windows\system32\tasklist.exe | N/A |
| N/A | N/A | C:\Windows\system32\tasklist.exe | N/A |
Browser Information Discovery
Enumerates physical storage devices
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\aka451.0.03.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | N/A |
Enumerates system info in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
Kills process with taskkill
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\taskkill.exe | N/A |
| N/A | N/A | C:\Windows\system32\taskkill.exe | N/A |
| N/A | N/A | C:\Windows\system32\taskkill.exe | N/A |
| N/A | N/A | C:\Windows\system32\taskkill.exe | N/A |
| N/A | N/A | C:\Windows\system32\taskkill.exe | N/A |
| N/A | N/A | C:\Windows\system32\taskkill.exe | N/A |
| N/A | N/A | C:\Windows\system32\taskkill.exe | N/A |
| N/A | N/A | C:\Windows\system32\taskkill.exe | N/A |
| N/A | N/A | C:\Windows\system32\taskkill.exe | N/A |
Modifies registry class
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-940901362-3608833189-1915618603-1000\{C5F7E3B2-8CA2-4408-B302-430031F7DFB4} | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\aka451.0.03.exe
"C:\Users\Admin\AppData\Local\Temp\aka451.0.03.exe"
C:\Users\Admin\AppData\Local\Temp\2p9m7YGyMFCUQTUFxkmWGMd4grN\aka45.exe
C:\Users\Admin\AppData\Local\Temp\2p9m7YGyMFCUQTUFxkmWGMd4grN\aka45.exe
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "wmic csproduct get uuid"
C:\Windows\System32\Wbem\WMIC.exe
wmic csproduct get uuid
C:\Users\Admin\AppData\Local\Temp\2p9m7YGyMFCUQTUFxkmWGMd4grN\aka45.exe
"C:\Users\Admin\AppData\Local\Temp\2p9m7YGyMFCUQTUFxkmWGMd4grN\aka45.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\unrealgame" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1872 --field-trial-handle=1876,i,14121511813569475723,14197320159181832372,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
C:\Users\Admin\AppData\Local\Temp\2p9m7YGyMFCUQTUFxkmWGMd4grN\aka45.exe
"C:\Users\Admin\AppData\Local\Temp\2p9m7YGyMFCUQTUFxkmWGMd4grN\aka45.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\unrealgame" --mojo-platform-channel-handle=2096 --field-trial-handle=1876,i,14121511813569475723,14197320159181832372,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "tasklist"
C:\Windows\system32\tasklist.exe
tasklist
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "where /r . cookies.sqlite"
C:\Windows\system32\where.exe
where /r . cookies.sqlite
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "tasklist"
C:\Windows\system32\tasklist.exe
tasklist
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "tasklist"
C:\Windows\system32\tasklist.exe
tasklist
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:/Program Files/Google/Chrome/Application/chrome.exe" --remote-debugging-port=9223 --profile-directory=Default --disable-gpu --no-sandbox --window-position=-32000,-32000
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x100,0x104,0x108,0xfc,0xf8,0x7ffd338acc40,0x7ffd338acc4c,0x7ffd338acc58
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-sandbox --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --use-gl=angle --use-angle=swiftshader-webgl --field-trial-handle=1984,i,3757971047925698413,8088402075625927289,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1980 /prefetch:2
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --no-appcompat-clear --field-trial-handle=1848,i,3757971047925698413,8088402075625927289,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1992 /prefetch:3
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --no-appcompat-clear --field-trial-handle=2052,i,3757971047925698413,8088402075625927289,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1756 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --no-sandbox --remote-debugging-port=9223 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=2900,i,3757971047925698413,8088402075625927289,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2920 /prefetch:1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --no-sandbox --remote-debugging-port=9223 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=2924,i,3757971047925698413,8088402075625927289,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2952 /prefetch:1
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --no-sandbox --remote-debugging-port=9223 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4052,i,3757971047925698413,8088402075625927289,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4028 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:/Program Files (x86)/Microsoft/Edge/Application/msedge.exe" --remote-debugging-port=9223 --profile-directory=Default --disable-gpu --no-sandbox --window-position=-32000,-32000
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd35ed46f8,0x7ffd35ed4708,0x7ffd35ed4718
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,4297786873540431809,3843552012099162943,131072 --no-sandbox --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2128 /prefetch:2
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,4297786873540431809,3843552012099162943,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --mojo-platform-channel-handle=2308 /prefetch:3
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,4297786873540431809,3843552012099162943,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --mojo-platform-channel-handle=2736 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-sandbox --remote-debugging-port=9223 --field-trial-handle=2120,4297786873540431809,3843552012099162943,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-sandbox --remote-debugging-port=9223 --field-trial-handle=2120,4297786873540431809,3843552012099162943,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-sandbox --remote-debugging-port=9223 --field-trial-handle=2120,4297786873540431809,3843552012099162943,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4608 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-sandbox --remote-debugging-port=9223 --field-trial-handle=2120,4297786873540431809,3843552012099162943,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4628 /prefetch:1
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "tasklist"
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "tasklist"
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "tasklist"
C:\Windows\system32\tasklist.exe
tasklist
C:\Windows\system32\tasklist.exe
tasklist
C:\Windows\system32\tasklist.exe
tasklist
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "where /r . *.sqlite"
C:\Windows\system32\where.exe
where /r . *.sqlite
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "taskkill /F /T /IM chrome.exe"
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "taskkill /F /T /IM msedge.exe"
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "taskkill /F /T /IM chrome.exe"
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "taskkill /F /T /IM msedge.exe"
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM EpicGamesLauncher.exe /F"
C:\Windows\system32\taskkill.exe
taskkill /F /T /IM chrome.exe
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "taskkill /F /T /IM chrome.exe"
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "taskkill /F /T /IM msedge.exe"
C:\Windows\system32\taskkill.exe
taskkill /F /T /IM msedge.exe
C:\Windows\system32\taskkill.exe
taskkill /IM EpicGamesLauncher.exe /F
C:\Windows\system32\taskkill.exe
taskkill /F /T /IM chrome.exe
C:\Windows\system32\taskkill.exe
taskkill /F /T /IM msedge.exe
C:\Windows\system32\taskkill.exe
taskkill /F /T /IM msedge.exe
C:\Windows\system32\taskkill.exe
taskkill /F /T /IM chrome.exe
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM javaw.exe /F"
C:\Windows\system32\taskkill.exe
taskkill /IM javaw.exe /F
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM Steam.exe /F"
C:\Windows\system32\taskkill.exe
taskkill /IM Steam.exe /F
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "tasklist"
C:\Windows\system32\tasklist.exe
tasklist
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "wscript "C:\Users\Admin\AppData\Local\Temp\d1e32e6de6d05880.vbs""
C:\Windows\system32\wscript.exe
wscript "C:\Users\Admin\AppData\Local\Temp\d1e32e6de6d05880.vbs"
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "cscript //B "C:\Users\Admin\AppData\Local\Temp\open.vbs""
C:\Windows\system32\cscript.exe
cscript //B "C:\Users\Admin\AppData\Local\Temp\open.vbs"
C:\Users\Admin\AppData\Local\Temp\hexon_23da536920b5dab8.exe
"C:\Users\Admin\AppData\Local\Temp\hexon_23da536920b5dab8.exe" HXN-TEST-7E561F93D321 discord
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "%windir%\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid"
C:\Windows\System32\reg.exe
C:\Windows\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\20241021-2116-1lcn5vo.591g.png" "
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe /nologo /r:"Microsoft.VisualBasic.dll" /win32manifest:"app.manifest" /out:"screenCapture_1.3.2.exe" "C:\Users\Admin\AppData\Local\Temp\SCREEN~1\SCREEN~1.BAT"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES39F7.tmp" "c:\Users\Admin\AppData\Local\Temp\screenCapture\CSC3DBC62D3CB0E433B928F584B5E51F4C.TMP"
C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe
screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\20241021-2116-1lcn5vo.591g.png"
C:\Users\Admin\AppData\Local\Temp\2p9m7YGyMFCUQTUFxkmWGMd4grN\aka45.exe
"C:\Users\Admin\AppData\Local\Temp\2p9m7YGyMFCUQTUFxkmWGMd4grN\aka45.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\Admin\AppData\Roaming\unrealgame" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1208 --field-trial-handle=1876,i,14121511813569475723,14197320159181832372,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 196.249.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 69.31.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 154.239.44.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | hexon.fun | udp |
| US | 172.67.169.156:443 | hexon.fun | tcp |
| US | 8.8.8.8:53 | 156.169.67.172.in-addr.arpa | udp |
| US | 172.67.169.156:443 | hexon.fun | tcp |
| US | 172.67.169.156:443 | hexon.fun | tcp |
| US | 8.8.8.8:53 | www.google.com | udp |
| GB | 172.217.16.228:443 | www.google.com | tcp |
| GB | 172.217.16.228:443 | www.google.com | udp |
| US | 8.8.8.8:53 | 35.200.250.142.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 234.187.250.142.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 228.16.217.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | dns.google | udp |
| US | 8.8.8.8:53 | dns.google | udp |
| US | 8.8.8.8:443 | dns.google | tcp |
| N/A | 127.0.0.1:9223 | tcp | |
| N/A | 127.0.0.1:9223 | tcp | |
| US | 8.8.8.8:53 | 72.32.126.40.in-addr.arpa | udp |
| N/A | 127.0.0.1:9223 | tcp | |
| N/A | 127.0.0.1:9223 | tcp | |
| US | 8.8.8.8:53 | api.gofile.io | udp |
| FR | 45.112.123.126:443 | api.gofile.io | tcp |
| US | 8.8.8.8:53 | store4.gofile.io | udp |
| FR | 31.14.70.245:443 | store4.gofile.io | tcp |
| US | 8.8.8.8:53 | 126.123.112.45.in-addr.arpa | udp |
| US | 172.67.169.156:443 | hexon.fun | tcp |
| US | 172.67.169.156:443 | hexon.fun | tcp |
| US | 8.8.8.8:53 | 245.70.14.31.in-addr.arpa | udp |
| US | 172.67.169.156:443 | hexon.fun | tcp |
| US | 172.67.169.156:443 | hexon.fun | tcp |
| US | 8.8.8.8:53 | 200.163.202.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 171.39.242.20.in-addr.arpa | udp |
| US | 172.67.169.156:443 | hexon.fun | tcp |
| US | 172.67.169.156:443 | hexon.fun | tcp |
| US | 172.67.169.156:443 | hexon.fun | tcp |
| US | 172.67.169.156:443 | hexon.fun | tcp |
| US | 172.67.169.156:443 | hexon.fun | tcp |
| US | 172.67.169.156:443 | hexon.fun | tcp |
| US | 8.8.8.8:53 | 88.210.23.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 43.229.111.52.in-addr.arpa | udp |
Files
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\System.dll
| MD5 | 0d7ad4f45dc6f5aa87f606d0331c6901 |
| SHA1 | 48df0911f0484cbe2a8cdd5362140b63c41ee457 |
| SHA256 | 3eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca |
| SHA512 | c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9 |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\nsis7z.dll
| MD5 | 80e44ce4895304c6a3a831310fbf8cd0 |
| SHA1 | 36bd49ae21c460be5753a904b4501f1abca53508 |
| SHA256 | b393f05e8ff919ef071181050e1873c9a776e1a0ae8329aefff7007d0cadf592 |
| SHA512 | c8ba7b1f9113ead23e993e74a48c4427ae3562c1f6d9910b2bbe6806c9107cf7d94bc7d204613e4743d0cd869e00dafd4fb54aad1e8adb69c553f3b9e5bc64df |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\chrome_100_percent.pak
| MD5 | acd0fa0a90b43cd1c87a55a991b4fac3 |
| SHA1 | 17b84e8d24da12501105b87452f86bfa5f9b1b3c |
| SHA256 | ccbca246b9a93fa8d4f01a01345e7537511c590e4a8efd5777b1596d10923b4b |
| SHA512 | 3e4c4f31c6c7950d5b886f6a8768077331a8f880d70b905cf7f35f74be204c63200ff4a88fa236abccc72ec0fc102c14f50dd277a30f814f35adfe5a7ae3b774 |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\chrome_200_percent.pak
| MD5 | 4610337e3332b7e65b73a6ea738b47df |
| SHA1 | 8d824c9cf0a84ab902e8069a4de9bf6c1a9aaf3b |
| SHA256 | c91abf556e55c29d1ea9f560bb17cc3489cb67a5d0c7a22b58485f5f2fbcf25c |
| SHA512 | 039b50284d28dcd447e0a486a099fa99914d29b543093cccda77bbefdd61f7b7f05bb84b2708ae128c5f2d0c0ab19046d08796d1b5a1cff395a0689ab25ccb51 |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\d3dcompiler_47.dll
| MD5 | 2191e768cc2e19009dad20dc999135a3 |
| SHA1 | f49a46ba0e954e657aaed1c9019a53d194272b6a |
| SHA256 | 7353f25dc5cf84d09894e3e0461cef0e56799adbc617fce37620ca67240b547d |
| SHA512 | 5adcb00162f284c16ec78016d301fc11559dd0a781ffbeff822db22efbed168b11d7e5586ea82388e9503b0c7d3740cf2a08e243877f5319202491c8a641c970 |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\ffmpeg.dll
| MD5 | a007299c49fa50aeff594655859780ae |
| SHA1 | d202f1f617023763a0e9418878e8ecac96be9fd4 |
| SHA256 | b78f0036621ad1d5833289f2ad509963ef78f1a89a3c7df0f1370fd2d35a2804 |
| SHA512 | 444c4baa1e1d941bd04f78184cec519c6eb53a83fbc3aa3ea30522bffc9ecde73ebe7b910c1a37c345429298ada3c0ffcb3e3849e21b2009487b5cd1a02cb2a9 |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\icudtl.dat
| MD5 | 2134e5dbc46fb1c46eac0fe1af710ec3 |
| SHA1 | dbecf2d193ae575aba4217194d4136bd9291d4db |
| SHA256 | ee3c8883effd90edfb0ff5b758c560cbca25d1598fcb55b80ef67e990dd19d41 |
| SHA512 | b9b50614d9baebf6378e5164d70be7fe7ef3051cfff38733fe3c7448c5de292754bbbb8da833e26115a185945be419be8dd1030fc230ed69f388479853bc0fcb |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\libEGL.dll
| MD5 | ca5bb0794b7700601e9438283d458665 |
| SHA1 | 7fcf090b19820b9450937be800575c526448b581 |
| SHA256 | 4a8be3b4d9fe790efdce38cff8f312a2f8276908d6703e0c6c37818e217cf1e3 |
| SHA512 | 36ebab858fe7e014837548575389e7df2e86676888e4a9039c736d0f2e6463102e68989b794d949ddb16d9bcce43ce55737fcf2a4b09b1667bf968a9540e9f32 |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\LICENSE.electron.txt
| MD5 | 4d42118d35941e0f664dddbd83f633c5 |
| SHA1 | 2b21ec5f20fe961d15f2b58efb1368e66d202e5c |
| SHA256 | 5154e165bd6c2cc0cfbcd8916498c7abab0497923bafcd5cb07673fe8480087d |
| SHA512 | 3ffbba2e4cd689f362378f6b0f6060571f57e228d3755bdd308283be6cbbef8c2e84beb5fcf73e0c3c81cd944d01ee3fcf141733c4d8b3b0162e543e0b9f3e63 |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\vulkan-1.dll
| MD5 | 6c70aab071c4febc5921e0d39811937a |
| SHA1 | 20d87b3a5333ea3f6d0d7b0333f2c30a281937aa |
| SHA256 | 2233fef6788711089fc5c1a008bfff6559cf2fc3e8363cd8a50196e90d1d9825 |
| SHA512 | 7f786c44376b59be7d7c51d3c40ecb80f30645551b582d042b641ea0a6464daf367ddf7eafaf00a1558e1f11570d99a699d33d224b01048d09f8f00ea501c4bf |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\vk_swiftshader_icd.json
| MD5 | 8642dd3a87e2de6e991fae08458e302b |
| SHA1 | 9c06735c31cec00600fd763a92f8112d085bd12a |
| SHA256 | 32d83ff113fef532a9f97e0d2831f8656628ab1c99e9060f0332b1532839afd9 |
| SHA512 | f5d37d1b45b006161e4cefeebba1e33af879a3a51d16ee3ff8c3968c0c36bbafae379bf9124c13310b77774c9cbb4fa53114e83f5b48b5314132736e5bb4496f |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\vk_swiftshader.dll
| MD5 | 750cbdfb01943e28e08708183ec208b5 |
| SHA1 | 1bee0cd3d0970834b2a47daf384354f243fd1ee0 |
| SHA256 | a6d295dcc3afcb55aa79eac5f896bceb15ccb2b798db3bb076ceeea78073791a |
| SHA512 | dbfdf76f40558ce2f23ca315b8719e283f0f22f46e733f37c2ae237fdafd23cf7962f36547ba1bb2d5b219de11546c3dc06859fac498a7da97df41018c0d80c4 |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\locales\af.pak
| MD5 | 7e51349edc7e6aed122bfa00970fab80 |
| SHA1 | eb6df68501ecce2090e1af5837b5f15ac3a775eb |
| SHA256 | f528e698b164283872f76df2233a47d7d41e1aba980ce39f6b078e577fd14c97 |
| SHA512 | 69da19053eb95eef7ab2a2d3f52ca765777bdf976e5862e8cebbaa1d1ce84a7743f50695a3e82a296b2f610475abb256844b6b9eb7a23a60b4a9fc4eae40346d |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\locales\am.pak
| MD5 | c6ef9c40b48a069b70ed3335b52a9a9c |
| SHA1 | d4a5fb05c4b493ecbb6fc80689b955c30c5cbbb4 |
| SHA256 | 73a1034be12abda7401eb601819657cd7addf011bfd9ce39f115a442bccba995 |
| SHA512 | 33c18b698040cd77162eb05658eca82a08994455865b70d1c08819dfac68f6db6b27d7e818260caa25310ff71cf128239a52c948fde098e75d1a319f478a9854 |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\locales\ar.pak
| MD5 | 56f6dc44cc50fc98314d0f88fcc2a962 |
| SHA1 | b1740b05c66622b900e19e9f71e0ff1f3488a98e |
| SHA256 | 7018884d3c60a9c9d727b21545c7dbbcc7b57fa93a16fa97deca0d35891e3465 |
| SHA512 | 594e38739af7351a6117b0659b15f4358bd363d42ffc19e9f5035b57e05e879170bbafe51aece62c13f2ae17c84efb2aed2fc19d2eb9dcb95ebd34211d61674e |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\locales\et.pak
| MD5 | a94e1775f91ea8622f82ae5ab5ba6765 |
| SHA1 | ff17accdd83ac7fcc630e9141e9114da7de16fdb |
| SHA256 | 1606b94aef97047863481928624214b7e0ec2f1e34ec48a117965b928e009163 |
| SHA512 | a2575d2bd50494310e8ef9c77d6c1749420dfbe17a91d724984df025c47601976af7d971ecae988c99723d53f240e1a6b3b7650a17f3b845e3daeefaaf9fe9b9 |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\locales\fi.pak
| MD5 | 5518b51d4af7f1b9d686cbea28b69e71 |
| SHA1 | df7f70846f059826c792a831e32247b2294c8e52 |
| SHA256 | 8ff1b08727c884d6b7b6c8b0a0b176706109ae7fe06323895e35325742fe5bd1 |
| SHA512 | b573050585c5e89a65fc45000f48a0f6aabccd2937f33a0b3fcbd8a8c817beaa2158f62a83c2cae6fcfb655f4a4f9a0c2f6505b41a90bc9d8ede74141ebc3266 |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\locales\hr.pak
| MD5 | 105472bc766a30bb71f13d86081de68d |
| SHA1 | d014103ad930889239efd92ecfdfcc669312af6c |
| SHA256 | a3a853a049735c7d474191dff19550a15503ecd20bafe44938eb12ea60e50b7c |
| SHA512 | ee7479d459eff8ec59206c2269df4e9fc1ca143e9b94a908eb8a5a1e16180bcc88f0b24d73c387f5853ea0418e737641f23146676232c1a3ac794611f7880f11 |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\locales\ro.pak
| MD5 | 19cfc7c8f1a2e4a2de1f9f64475469bc |
| SHA1 | bf6c4f373c19b03e116d2593c64e1ceca47d79dc |
| SHA256 | 3e725f7a791aed1fbed57f075ca11ce389a5bd425ccce3c00537dad27e5a8dd6 |
| SHA512 | ff5254e3a3676b8f5e74cba6661ae43d5739c7363c66cb17f74dce158dc36cee103885f055846dd320b932f2e7fbdc831bcee6293d423ff9b842b68644f633bd |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\locales\zh-TW.pak
| MD5 | 8f67a9f38ad36d7d4a6b48e63852208d |
| SHA1 | f087c85c51bdbdef5998cfc3790835da95da982a |
| SHA256 | 92f26e692dc1309558f90278425a7e83e56974b6af84dbd8cc90324785ee71ca |
| SHA512 | 623034bbdfdf5d331de78b630f403aeb9cef27b1827e0d29ec66ad69310f56c7db96c6775df0e749f8112a4a8e75754bcf987903d415fc7ae360e3c39e6e18e0 |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\StdUtils.dll
| MD5 | c6a6e03f77c313b267498515488c5740 |
| SHA1 | 3d49fc2784b9450962ed6b82b46e9c3c957d7c15 |
| SHA256 | b72e9013a6204e9f01076dc38dabbf30870d44dfc66962adbf73619d4331601e |
| SHA512 | 9870c5879f7b72836805088079ad5bbafcb59fc3d9127f2160d4ec3d6e88d3cc8ebe5a9f5d20a4720fe6407c1336ef10f33b2b9621bc587e930d4cbacf337803 |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\resources\elevate.exe
| MD5 | 792b92c8ad13c46f27c7ced0810694df |
| SHA1 | d8d449b92de20a57df722df46435ba4553ecc802 |
| SHA256 | 9b1fbf0c11c520ae714af8aa9af12cfd48503eedecd7398d8992ee94d1b4dc37 |
| SHA512 | 6c247254dc18ed81213a978cce2e321d6692848c64307097d2c43432a42f4f4f6d3cf22fb92610dfa8b7b16a5f1d94e9017cf64f88f2d08e79c0fe71a9121e40 |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\resources\app.asar
| MD5 | 6e828795b20b3a123049e28fe57d63fb |
| SHA1 | 836f94654a5f529f3db773b15dc3f37907941f05 |
| SHA256 | 162516cb7da8e367584196126b55e1a4365e6a2d5569ac24099601a23ba19bef |
| SHA512 | 36f5ff39bb4788a5c2491f4fbad833fccd1c7a136833d88ef1eb199d52be55aa5ff9b923f045f50d0335de61016ceeaa0fa374bebb260760f7ae8ee01f5384b3 |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\locales\zh-CN.pak
| MD5 | 9d4f54eb5a12cf4c2f34f5f538dff90b |
| SHA1 | c31b892ce78c733bde0571b6236170103cc9fe7a |
| SHA256 | 58b934a09858f037f1966a495e73d44416180afcdebfaefcee1f5e3377de63f7 |
| SHA512 | 46bf6099c50f7959a6f0800ec679b61a78efabe87985cad8dc0d7d0006470a9c61e659bde0258da6cf7ed6104749a157f5ad133f324479c3460a19fc14e31c37 |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\locales\vi.pak
| MD5 | 9274866d7c6314f43dd63ed293293e25 |
| SHA1 | 4af0e6ec1bcb99588810a9fb69c1dc2bbad892fc |
| SHA256 | dcbdc6d9e11dd10fc1364c10be5438ce2697f61ec5f32997c43b87238087c4e3 |
| SHA512 | 3c8c9e9960a49469af83cae31790a03e41846163c14d3dae45fd92a1a412c82075bdef3317baca02399eb53de0f9164c0a9a17b7cd63e0fa61c3e4617393c42e |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\locales\ur.pak
| MD5 | d7ec7d551dee1e1ef11be3e2820052f9 |
| SHA1 | d7f2d35841883103c2773fc093a9a706b2fe5d36 |
| SHA256 | 05e45371159075048db688564b6bc707e0891303c40f490c3db428b0edd36102 |
| SHA512 | 92e2d32fc106812e08163a26f202a5d0e7eb7028a871f3bc6cbc05ee6c7ce287032179322b19e396308968515bf214534a38d93afc259a780ad7ba8432fab56a |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\locales\uk.pak
| MD5 | e4c4e3700469704b936460ca1a90fcc0 |
| SHA1 | e809990fc07a1d39fe623046382699e648e343c0 |
| SHA256 | 29af2abc75a35bb9e3f9bc6e2904228ba651ea4e0ce8e9c7a2d7e272374b9ebb |
| SHA512 | 68e33f471c5bf2d4ed9cb00ace3e094ef102a5f1566a6e2c8a3007ef7fbd8a24c36eb36b08745f3608e70940444e9fc7a36fabe1a9945d1f00b4f3f28c7bdaf6 |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\locales\tr.pak
| MD5 | 9f24f44cac0997e1d0a6a419520f3bfe |
| SHA1 | edb61859cbb5d77c666aac98379d4155188f4ff5 |
| SHA256 | 3aff7dcbfb1a244cc29b290376b52cfb3e1f844c98facafea17b4a45ce064b8a |
| SHA512 | 65fbe2d7fea37db59b805d031f6ae85d628a51b254e76e8c2b4ef4b5153527b7e2412ed6a0961d174b8a5581b521b0436160fe5ed252f78303bcfde815733d81 |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\locales\th.pak
| MD5 | 293ad7c20c22d744e4db0fb001ec45bb |
| SHA1 | 486c9e0732306a45aceb633da2b3ded281197620 |
| SHA256 | d67d68f24d3347e244a7e8c3b63d47f18fcf37258256f48dad785cf98bb560fa |
| SHA512 | ac2b2dd82095925b3229958e89dcf5283bdce0273734a0c338f5a1aa8b014644806ca517f0fc2003669910e58fedf9c2ca7a009fa3f53d58c07bc5e9191f2e2f |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\locales\te.pak
| MD5 | 02415ded02cc7ac25e8f8d0e83365061 |
| SHA1 | 5a25bf63ec97dbeb37e64ab3825cbbce6326a5cf |
| SHA256 | 97024f0cfac78e0c738e771beea1e35f5a8eb2b132b3043b59ce4ecd6c153523 |
| SHA512 | 54e658c6d432b29b031be278e5b4396ac14b0f85e1f772a0a76c0431d4cbe2370ff2898077837688e2fb9700db1eab7a19e4e350a280a2ffad8176d861d93e45 |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\locales\ta.pak
| MD5 | a8beab6896018a6d37f9b2e5bdd7a78c |
| SHA1 | 64310684247219a14ac3ac3b4c8ebaa602c5f03a |
| SHA256 | c68b708ba61b3eeab5ae81d9d85d6e9f92e416ecfae92e8de9965608732384df |
| SHA512 | 73b0a31235bf4b7c5ad673f08717f3b4f03bcdf2a91440ee7228aa78c2d15dd2aed32498e23ded78ec35bc731dbe16b6a1c236a170f2a84123a464857686c7b5 |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\locales\sw.pak
| MD5 | ee8da42ffe40fbb916c56390e2cd99e8 |
| SHA1 | 6d824f56afe6b3605a881d2c26e69a46e6675347 |
| SHA256 | 192e248c7ac4644f8712cf5032da1c6063d70662216ccf084205f902253aa827 |
| SHA512 | 7befe72b073000bc35a31323d666fd51d105a188d59c4a85d76ee72b6c8c83a39a1beb935c1079def8e3ffa8c4bf6044cf4f3bef0f1c850c789b57e1144ff714 |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\locales\sv.pak
| MD5 | bbe0785c5f9591e8a1e7c4830fe949d6 |
| SHA1 | da4f3286079d50e1c04e923529e03e7d334c7fff |
| SHA256 | 0ad84f6f95fd7505862278a7c1c92d00a7e7dd4a765569e9c3086f55c1d7059d |
| SHA512 | 38bab6f3a6c9395d3b57e63168045ad2e8188b2f04751a15253e7226ec3043c9678a77be1eb27a3b2e751934a024f3ffc89fffd9f1e229e19638be318b53e961 |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\locales\sr.pak
| MD5 | cf160983a86b51ec42845f4e60ac9123 |
| SHA1 | 4d3bd86a7ef1eaadb8bec0b79ecc6c05b4273a48 |
| SHA256 | ef07512fb337005bb66696c69722a0d65bfb749b9d2f763f5b2ff2885cb247a4 |
| SHA512 | b909fc3614c3250856d2c502cbfed5eb6e398140b801669bf92427e7e8a5939b14052b9abf2c94749f1aea61946ff66be4978c68064196458733bcff0a963ffa |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\locales\sl.pak
| MD5 | 4d9d56ef0b176e7f7aa14270e964ec77 |
| SHA1 | 515aac37e4f25ca50bd52ea73889b70b1e79863d |
| SHA256 | 6ba684a8f06f7eb175955b15d30c7162d92c7e7c48864dfb853238263e1be8c7 |
| SHA512 | 740adbb7d8b039f98e187f45a1a87d0354136fb48b75262e508f720bfcbeb2746f04d31a57dccd50e37ddb5a1b7c0ad79a01cac6ba5fb98a9af272ad99fcb169 |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\locales\sk.pak
| MD5 | 793c442420f27d54410cdb8d8ecce5ff |
| SHA1 | 8995e9e29dbaaa737777e9c9449b67ca4c5b4066 |
| SHA256 | 5a9d6b77ca43c8ed344416d854c2d945d8613e6c7936445d6fe35e410c7190bb |
| SHA512 | 291e3d2300c973966d85e15a1b270ba05c83696271a7c7d4063b91097a942590c9797a4d22dfbe154564b779dac92fd12db0d5b63f5f0406f818b956b126e7e9 |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\locales\ru.pak
| MD5 | fc0e2fc09aa9089c5db75bab7a0754a7 |
| SHA1 | f3d1e3e1600ae188e801a81b6d233db9903b82df |
| SHA256 | 188b6405cb6c5b7c0b35050278a119c3ce41fb90883b9adb39fec15da0a05550 |
| SHA512 | 377e685d1d171d0a7158b56f356ca33d4493d07efa58d3c384e272e1b6829933552c69aff95215ae7d1a0f99616a20790708f5187ea10cfe46baa2bb522fc18f |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\locales\pt-PT.pak
| MD5 | acffa29064f40a014bc7fe13e5ff58a9 |
| SHA1 | 5a0890c94084075446264469818753f699a3d154 |
| SHA256 | 423e7ccb22d32276320ed72f07186188e095c577db5bce7309c8bd589a2a8858 |
| SHA512 | d4572c81fdd3b7b69d77544f68b23ae0b546158033be503dbaab736d3ca1188b18916688234fae9ea29fa430258b2d2b95a93d0e8b74919a62040b84902d3b6e |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\locales\pt-BR.pak
| MD5 | a23c805ee4d3d67c811b50826ca25a51 |
| SHA1 | c14fa8b9c7073fe88e188cfa4b34883faccc2c09 |
| SHA256 | 62be4fb0bd3b8be563516bfea3f0848924bb7afb0c563d02c1508608a4487e3b |
| SHA512 | c478bd2234eef73aa08085d29b916ad1471576ff213f972c9616757172d0cdec6e5d6797a1f2635ac17a0bac34964a298e4ab4336479456ce10330128cd68a53 |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\locales\pl.pak
| MD5 | 61c093fac4021062e1838a32d79399c2 |
| SHA1 | 84a47537ef58d2507cf7697ea7e1e27b1f812ee8 |
| SHA256 | 58067ec06973f5dd7afebbe57bffce3a3ed9f8e5093af8fcefdb6a65b2b68b22 |
| SHA512 | 475d9d4f27cbc23efd9acf75024f993bcf7a8279e658ccbd84c8ac810e1c828de4dac4141298865faf1bb8858a7a88a12d1a21c467e8c656533e364ceff7e5dc |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\locales\nl.pak
| MD5 | bc41967b2ff493e7f151c7721245739d |
| SHA1 | 7606133ddbb58492dbbf02c03a975fb48da1e26f |
| SHA256 | 3dbe5569f53d1314dcb1bc99540cf6a0fea45b6d67576fd0d14c688107892f32 |
| SHA512 | 9e395a3b5bbf64de3e474c56c4fb39879f107a9db246632cf6bb4b06160e05a82c0161d6496edb2bc29febb4a8f67ca7ea904167b860fd6da96636a6711cb593 |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\locales\nb.pak
| MD5 | 7576c2fa9199a4121bc4a50ff6c439c3 |
| SHA1 | 55e3e2e651353e7566ed4dbe082ffc834363752b |
| SHA256 | 2a3dfc6b41fa50fabed387cb8f05debbc530fa191366b30c9cb9eaae50686bd5 |
| SHA512 | 86c44e43609e6eb61273f23d2242aa3d4a0bfa0ea653a86c8b663fa833283cc85a4356f4df653e85080f7437b81ae6201a3ecf898a63780b5ca67faa26d669fe |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\locales\ms.pak
| MD5 | 9b3e2f3c49897228d51a324ab625eb45 |
| SHA1 | 8f3daec46e9a99c3b33e3d0e56c03402ccc52b9d |
| SHA256 | 61a3daae72558662851b49175c402e9fe6fd1b279e7b9028e49506d9444855c5 |
| SHA512 | 409681829a861cd4e53069d54c80315e0c8b97e5db4cd74985d06238be434a0f0c387392e3f80916164898af247d17e8747c6538f08c0ef1c5e92a7d1b14f539 |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\locales\mr.pak
| MD5 | 25f2b9842e2c4c026e0fc4bc191a6915 |
| SHA1 | 7de7f82badb2183f1f294b63ca506322f4f2aafa |
| SHA256 | 771eb119a20fcc5e742a932a9a8c360a65c90a5fe26ab7633419966ba3e7db60 |
| SHA512 | ac6d2eeb439351eee0cf1784b941f6dd2f4c8c496455479ca76919bf7767cca48a04ba25fccde74751baa7c90b907b347396235a3ce70f15c1b8e5388e5c6107 |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\locales\ml.pak
| MD5 | 3b1305ecca60fb5a7b3224a70398ead9 |
| SHA1 | 04e28fce93fc57360e9830e2f482028ffc58a0a2 |
| SHA256 | c10942f5333f0d710de4d3def7aa410c4576ffe476b3ea84aac736bfb9c40d67 |
| SHA512 | 68fdd944a153c16d18e73dd2aa75593f6ac13b8e87dbfb5bfccdd982a4f885bd9903c3ed1af781581cd3c5d42dd2ff21cc780f54fd71ab04a3237d08ed5a1554 |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\locales\lv.pak
| MD5 | e4f7d9e385cb525e762ece1aa243e818 |
| SHA1 | 689d784379bac189742b74cd8700c687feeeded1 |
| SHA256 | 523d141e59095da71a41c14aec8fe9ee667ae4b868e0477a46dd18a80b2007ef |
| SHA512 | e4796134048cd12056d746f6b8f76d9ea743c61fee5993167f607959f11fd3b496429c3e61ed5464551fd1931de4878ab06f23a3788ee34bb56f53db25bcb6df |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\locales\lt.pak
| MD5 | 96602a3f3b59faa997a4d337889fa02b |
| SHA1 | 94593a270b0d84c006e0959bc136b6c4987dfd3f |
| SHA256 | 51db5311de9dff41fb4eadda8ba7d5e492912f72c3754adaf8e3de23aba46f8a |
| SHA512 | dd45240494d09ad9a41be9d4056ed274e78a50dc85e6bff9438e707a84f65b77ebe522531370da99e50a6887d6063c29e9728b49df2b2b3c61362d774797fac2 |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\locales\ko.pak
| MD5 | b83bc27c5bc2bb4d0ff7934db87e12ad |
| SHA1 | 050f004e82f46053b6566300c9a7b1a6a6e84209 |
| SHA256 | ab3060e7d16de4d1536ff6dd4f82939a73388201ad7e2be15f3afee6a5aae0ef |
| SHA512 | b56b211587fe93a254198ca617cdecd8dc01e4561151a53173721665111c4d2440535f5f6b8a5a69a31840ea60124f4afd2c693d1fc4683fa2cf237c8ede5f0a |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\locales\kn.pak
| MD5 | a603f3d899ccdcd9af20dcd8f87d0ed8 |
| SHA1 | f476355d6ea5c05b35ad74c08e2edfe5ff2881ad |
| SHA256 | 3c11a589aab0c5d9e5c18e6a95dce7e613089d3598b8fe54e656a8d97e22a6fd |
| SHA512 | f6b008080cae44d680faaab02911f62e21d042c55fc5af87e719e9bc4102b282e58e67f19f37f60fe8ba99f5b8cfd4e70a61af9918a9ee8e3d8ae72555d31c15 |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\locales\ja.pak
| MD5 | f47efaa76f5200a6c0c23c33684d7bad |
| SHA1 | 9b24f6491a1171d3dfeae329e1f45ab3e3d9cf22 |
| SHA256 | 5b99d6a11d7b653681b2a2bb616cc1814451ad35c370d178b2ef6650465d4f2a |
| SHA512 | 67d130a66f03a4d1a0a30576b19fe44fa707cba764c6dcd355cbe891a2bcc0b25823ba2106e9271e06ada674f66824a5323b77d4984900516d2a8802af87960e |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\locales\it.pak
| MD5 | 7c981a25be0e02fba150e17d9669a536 |
| SHA1 | 3af10feb7cdc7bc091b80173301b1a3d4ef941d4 |
| SHA256 | ee2d2643ad7a8f97b7a6c070910866436cae0267a6691a3d8a88ed0948d8af49 |
| SHA512 | 445eecfa83e7635bc3442937bdf3b9c4a38ef3fbb7f07ca90a1d4222e1a29639f3fdce12b20e798888823f2d612e5972492b3786d37b256aec5c1c96cdb96b28 |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\locales\id.pak
| MD5 | bd9636e9c7dc7be4c7f53fb0b886be04 |
| SHA1 | 55421d0e8efcbef8c3b72e00a623fb65d33c953e |
| SHA256 | 5761ee7da9ca163e86e2023829d377a48af6f59c27f07e820731192051343f40 |
| SHA512 | 7c7e88ffd2b748e93122585b95850ded580e1136db39386ced9f4db0090e71394a1f9ceb937262c95969132c26bf6ce1684fbb97b6469ed10414171a2e8cc3a4 |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\locales\hu.pak
| MD5 | b338dcb0e672fb7b2910ce2f561a8e38 |
| SHA1 | cf18c82ec89f52753f7258cdb01203fbc49bed99 |
| SHA256 | bcdf39aa7004984cb6c13aac655b2e43efeb387ce7d61964b063d6cf37773f7a |
| SHA512 | f95f6a8e36d99680fb3cdb439f09439782bcc325923ec54bdc4aeb8ec85cf31a3a2216e40e2b06c73a2f5e7439d8178d8becac72781a6d79808067e8ccf3cac6 |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\locales\hi.pak
| MD5 | b7e4892b2030e4f916364856b6cc470a |
| SHA1 | b08ad51e98e3b6949f61f0b9251f7281818cd23e |
| SHA256 | 093119a99f008ab15d0e5b34cd16ec6b4313554e6c3cffe44502bfce51470e3e |
| SHA512 | ca453025d73228592a4bfe747a3ea08b86327f733032a64ced0fc0c9e2e00b02450f133e691b94be13a3e69e22b43bca512e5f77b0e490320f0bf8e65571bb46 |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\locales\he.pak
| MD5 | 93d9261f91bcd80d7f33f87bad35dda4 |
| SHA1 | a498434fd2339c5d6465a28d8babb80607db1b65 |
| SHA256 | 31661709ab05e2c392a7faeed5e863b718f6a5713d0d4bbdab28bc5fb6565458 |
| SHA512 | f213ff20e45f260174caa21eae5a58e73777cd94e4d929326deefbef01759d0200b2a14f427be1bb270dfcd2c6fb2fce789e60f668ac89ecf1849d7575302725 |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\locales\gu.pak
| MD5 | 7b5f52f72d3a93f76337d5cf3168ebd1 |
| SHA1 | 00d444b5a7f73f566e98abadf867e6bb27433091 |
| SHA256 | 798ea5d88a57d1d78fa518bf35c5098cbeb1453d2cb02ef98cd26cf85d927707 |
| SHA512 | 10c6f4faab8ccb930228c1d9302472d0752be19af068ec5917249675b40f22ab24c3e29ec3264062826113b966c401046cff70d91e7e05d8aadcc0b4e07fec9b |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\locales\fr.pak
| MD5 | 0445700799de14382201f2b8b840c639 |
| SHA1 | b2d2a03a981e6ff5b45bb29a594739b836f5518d |
| SHA256 | 9a57603f33cc1be68973bdd2022b00d9d547727d2d4dc15e91cc05ebc7730965 |
| SHA512 | 423f941ec35126a2015c5bb3bf963c8b4c71be5edfb6fc9765764409a562e028c91c952da9be8f250b25c82e8facec5cada6a4ae1495479d6b6342a0af9dda5f |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\locales\fil.pak
| MD5 | 3165351c55e3408eaa7b661fa9dc8924 |
| SHA1 | 181bee2a96d2f43d740b865f7e39a1ba06e2ca2b |
| SHA256 | 2630a9d5912c8ef023154c6a6fb5c56faf610e1e960af66abef533af19b90caa |
| SHA512 | 3b1944ea3cfcbe98d4ce390ea3a8ff1f6730eb8054e282869308efe91a9ddcd118290568c1fc83bd80e8951c4e70a451e984c27b400f2bde8053ea25b9620655 |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\locales\fa.pak
| MD5 | dcd3b982a52cdf8510a54830f270e391 |
| SHA1 | 3e0802460950512b98cd124ff9f1f53827e3437e |
| SHA256 | e70dfa2d5f61afe202778a3faf5ed92b8d162c62525db79d4ec82003d8773fa3 |
| SHA512 | 3d5b7fa1a685fa623ec7183c393e50007912872e22ca37fdc094badaefddeac018cc043640814a4df21bb429741dd295aa8719686461afa362e130b8e1441a12 |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\locales\es.pak
| MD5 | e9fa4cada447b507878a568f82266353 |
| SHA1 | 4a38f9d11e12376e4d13e1ee8c4e0d082d545701 |
| SHA256 | 186c596d8555f8db77b3495b7ad6b7af616185ca6c74e5dfb6c39f368e3a12a4 |
| SHA512 | 1e8f97ff3daad3d70c992f332d007f3ddb16206e2ff4cffd3f2c5099da92a7ad6fb122b48796f5758fe334d9fbf0bbae5c552414debbb60fe5854aaa922e206e |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\locales\es-419.pak
| MD5 | 5321c1e88c5c6fa20bdbc16043c6d0f6 |
| SHA1 | 07b35ed8f22edc77e543f28d36c5e4789e7723f4 |
| SHA256 | f7caa691599c852afb6c2d7b8921e6165418cc4b20d4211a92f69c877da54592 |
| SHA512 | 121b3547a8af9e7360774c1bd6850755b849e3f2e2e10287c612cf88fb096eb4cf4ee56b428ba67aeb185f0cb08d34d4fa987c4b0797436eea53f64358d2b989 |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\locales\en-US.pak
| MD5 | 5e3813e616a101e4a169b05f40879a62 |
| SHA1 | 615e4d94f69625dda81dfaec7f14e9ee320a2884 |
| SHA256 | 4d207c5c202c19c4daca3fddb2ae4f747f943a8faf86a947eef580e2f2aee687 |
| SHA512 | 764a271a9cfb674cce41ee7aed0ad75f640ce869efd3c865d1b2d046c9638f4e8d9863a386eba098f5dcedd20ea98bad8bca158b68eb4bdd606d683f31227594 |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\locales\en-GB.pak
| MD5 | 0db7f3a3ba228aa7f2457db1aa58d002 |
| SHA1 | bbf3469caadfa3d2469dd7e0809352ef21a7476d |
| SHA256 | cf5aca381c888de8aa6bbd1dcd609e389833cb5af3f4e8af5281ffd70cd65d98 |
| SHA512 | 9c46c8d12579bd8c0be230bbcdb31bdb537d2fea38000cf700547ca59e3139c18cc7cb3e74053475605132404c4c4591f651d2dad2ce7f413ccffd6acf7139e8 |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\locales\el.pak
| MD5 | 6922aaa87431699787c1489e89af17b9 |
| SHA1 | 6fb7771c9271ca2eeebe025a171bfa62db3527f7 |
| SHA256 | 800545f9134914649da91b90e7df65d8208014c3e12f2be551dfd6722bf84719 |
| SHA512 | 367ef8467631e17e0a71d682f5792a499e8578b6c22af93d9a919d9e78709ec2501df9599624f013b43f4c3e9fb825182193116dbead01874995d322b7a6e4d6 |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\locales\de.pak
| MD5 | ed329b35d10e81f55d611fe8748876f8 |
| SHA1 | 0d998732bb4c4d1faad5a5bc0a21d6c5672418d3 |
| SHA256 | 6facd562add58c4684ef4a40de9b63581fea71c5b83049ed8a2c2a2c929c45ce |
| SHA512 | bd713ff78e375fec3a04ab0c9476c0379f87efc6d18359c2a4d297303d78381081120c371848c8675f1f16dd4ab7284d81e5bfc9ae11ab33e12f96c12d89e764 |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\locales\da.pak
| MD5 | bb5252dc6f0f3c01ce3638138bf946c8 |
| SHA1 | bfb584b67c8ca51d94bff40809410553d54da1cf |
| SHA256 | c93f39d0ab9a2fab26977aa729261633225879ba6dc5ea8d0ca89814b2df9fa9 |
| SHA512 | e411fd3cc5285a6059c3fd80c3421253a4ce06b2d0cd1cd1efc25e88191a58fed176452d852922137268be2824e1e162cd4d4a6f8c695a50517a783d15b1c6e7 |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\locales\cs.pak
| MD5 | a934431d469d19a274243f88bb5ac6fb |
| SHA1 | 146845edc7442bf8641bc8b6c1a7e2c021fb01eb |
| SHA256 | 51c36a5acdad5930d8d4f1285315e66b2578f27534d37cd40f0625ee99852c51 |
| SHA512 | 562f07151e5392cbffb6b643c097a08045e9550e56712975d453a2ebaee0745fbfba99d69867eec560d1d58b58dff4f6035811b9d4f0b1b87547efa98f94d55d |
C:\Users\Admin\AppData\Local\Temp\2p9m7YGyMFCUQTUFxkmWGMd4grN\v8_context_snapshot.bin
| MD5 | 146e284750735ef4798527dc1cd0e741 |
| SHA1 | 6408985b7d05c768a62bcb912234f14e1898ffdb |
| SHA256 | 3820e8fa1077d02606fea8e1b3a9ca4bf7f4a71d0569d9a8ea9ee7a009d0ce80 |
| SHA512 | 46824df5d20e02fb72c3efd07bee6d832b1ab78c0163688fa84edb831cbfbef2dde12ba9da01f9dd49c4008bd3862a95699a2f6d55b8d4b3165976d3851c7278 |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\locales\ca.pak
| MD5 | 01acd6f7a4ea85d8e63099ce1262fbad |
| SHA1 | f654870d442938385b99444c2cacd4d6b60d2a0d |
| SHA256 | b48d1bad676f2e718cbe548302127e0b3567913a2835522d6dd90279a6d2a56a |
| SHA512 | 2bd13eca1a85c219e24a9deb5b767faa5dc7e6b3005d4eb772e3794233ed49cb94c4492538d18acc98658c01d941e35c6f213c18ac5480da151c7545eedeb4ab |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\locales\bn.pak
| MD5 | 8feb4092426a0c2c167c0674114b014d |
| SHA1 | 6fc9a1076723bfaf5301d8816543a05a82ad654d |
| SHA256 | fb0656a687555801edfb9442b9f3e7f2b009be1126f901cf4da82d67ac4ad954 |
| SHA512 | 3de40bdd18e9e7d3f2eceebf7c089e2250ce4d40412a18d718facba8f045e68b996978ef8b4d047b21d3424094056d16b5abb81bd0507f446b805d6b889522a7 |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\locales\bg.pak
| MD5 | 945de8a62865092b8100e93ea3e9828d |
| SHA1 | 18d4c83510455ce12a6ac85f9f33af46b0557e2e |
| SHA256 | f0e39893a39ce6133c1b993f1792207830b8670a6eb3185b7e5826d50fea7ba2 |
| SHA512 | 5f61160ff64b9490a1ad5517d8c1bb81af77d349541fed5045e7f6e5053b7d79b7e8f114630bfbe4d5af30258f70a6569462bfa39ccb765f8ca191f82ee04f3f |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\snapshot_blob.bin
| MD5 | 4ebd06bdf6cf8dacf6597586fd1704b5 |
| SHA1 | e6819ef37f99f91468f4b94370a4ab467a075a6d |
| SHA256 | 148e4b85983f0d27adecd9c6431b66379ac5538688f320e89d74ff6d48bb740b |
| SHA512 | 17ed5abe702748b4626b3ee6de4d0916738f095c913c2700eee06b65a2bbcaf72afc1f87af7ce0fcce8bd15fe6881508255d397a346c45a82c7791b9b9833ddf |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\resources.pak
| MD5 | 31c7d4b11ad95dfe539dd098e0fab736 |
| SHA1 | 5418682d939ce8485ecc9125b872c14ffec662c2 |
| SHA256 | a251019eb08f1e695e935d224544bda37c5ae092ba68a89fa1fe3bd19bde4f5c |
| SHA512 | f868a4afa4e0d5c561873d2a728e267f98da2df3fb90966e5736d496b6a24e71769a02b0346b27b7dcce11cbe07248e309f50a89977dc8e5bbc06d6cc31bf738 |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\LICENSES.chromium.html
| MD5 | 8303b3a19888f41062a614cd95b2e2d2 |
| SHA1 | a112ee5559c27b01e3114cf10050531cab3d98a6 |
| SHA256 | 9c088caac76cf5be69e0397d76fe9397017585cffdba327692ff1b3a6c00d68f |
| SHA512 | 281b2ecc99502a050ee69e31256dec135e8cb877d1a6ba9f1c975fcfb11c062980ee6061d2368b62f91e392953ae6235dd726a9d98e6efc1302f7ed713099179 |
C:\Users\Admin\AppData\Local\Temp\nsvA142.tmp\7z-out\libGLESv2.dll
| MD5 | 05b585464f18fe0e3bddb20527697d66 |
| SHA1 | 8bcec2f0b409afa9ff054e25f3ce85eb9bd50010 |
| SHA256 | 0bb7c6c08b569c1d2de90a40e6c142591e160a7c6cb15d21807f3404a48c4287 |
| SHA512 | f680ab9c3070f443c7359bb3f0c2032f5c58c88c7823e4592e8212ce8815ea5f463c86df113f5320944c62d3cb4e8d45b9b4dcaadccc1ac9bf203ae4bb52083c |
C:\Users\Admin\AppData\Local\Temp\ddbe4c70-a24d-4d99-afd9-e1e7e136d713.tmp.node
| MD5 | 04bfbfec8db966420fe4c7b85ebb506a |
| SHA1 | 939bb742a354a92e1dcd3661a62d69e48030a335 |
| SHA256 | da2172ce055fa47d6a0ea1c90654f530abed33f69a74d52fab06c4c7653b48fd |
| SHA512 | 4ea97a9a120ed5bee8638e0a69561c2159fc3769062d7102167b0e92b4f1a5c002a761bd104282425f6cee8d0e39dbe7e12ad4e4a38570c3f90f31b65072dd65 |
C:\Users\Admin\AppData\Local\Temp\8252a5a4-19e6-4bb9-9e2d-9e2b7da1cb46.tmp.node
| MD5 | 56192831a7f808874207ba593f464415 |
| SHA1 | e0c18c72a62692d856da1f8988b0bc9c8088d2aa |
| SHA256 | 6aa8763714aa5199a4065259af792292c2a7d6a2c381aa27007255421e5c9d8c |
| SHA512 | c82aa1ef569c232b4b4f98a3789f2390e5f7bf5cc7e73d199fe23a3f636817edfdc2fb49ce7f69169c028a9dd5ab9f63e8f64964bb22424fc08db71e85054a33 |
\??\pipe\crashpad_4668_BIZZPCCGESFXRKBA
| MD5 | d41d8cd98f00b204e9800998ecf8427e |
| SHA1 | da39a3ee5e6b4b0d3255bfef95601890afd80709 |
| SHA256 | e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 |
| SHA512 | cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports
| MD5 | d751713988987e9331980363e24189ce |
| SHA1 | 97d170e1550eee4afc0af065b78cda302a97674c |
| SHA256 | 4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945 |
| SHA512 | b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
| MD5 | c2d9eeb3fdd75834f0ac3f9767de8d6f |
| SHA1 | 4d16a7e82190f8490a00008bd53d85fb92e379b0 |
| SHA256 | 1e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66 |
| SHA512 | d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
| MD5 | e55832d7cd7e868a2c087c4c73678018 |
| SHA1 | ed7a2f6d6437e907218ffba9128802eaf414a0eb |
| SHA256 | a4d7777b980ec53de3a70aca8fb25b77e9b53187e7d2f0fa1a729ee9a35da574 |
| SHA512 | 897fdebf1a9269a1bf1e3a791f6ee9ab7c24c9d75eeff65ac9599764e1c8585784e1837ba5321d90af0b004af121b2206081a6fb1b1ad571a0051ee33d3f5c5f |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
| MD5 | 187f5bc9e42bf4d9519e7fd5038f7317 |
| SHA1 | aa23009f88fdc8b310ff4a5076833f227f3fb78b |
| SHA256 | e7ff7f09d90b748b9e208ca0a5f4bfaaa7183ec3a35929b28edfa531c796106d |
| SHA512 | 1423a427e635a9227122415f020a8c0c9246c9bac1c53617a9ea2650b4ad1393857f2695a20978cc2318fe40988600f1e0effb68ec825c65e69e7bf03c057ddf |
C:\Users\Admin\AppData\Local\Temp\passwords_0.db
| MD5 | a182561a527f929489bf4b8f74f65cd7 |
| SHA1 | 8cd6866594759711ea1836e86a5b7ca64ee8911f |
| SHA256 | 42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914 |
| SHA512 | 9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558 |
C:\Users\Admin\AppData\Local\Temp\d1e32e6de6d05880.vbs
| MD5 | 3b0eb6e8db7647485beab3edd82e7f0e |
| SHA1 | 55229a2aa8bfac99663a955074f8c4e76610bf60 |
| SHA256 | 16977b09e8acf51a45c3bd95a58f250fa8851fb5165c7045b68cd85e784e2e77 |
| SHA512 | 92be87929b74d8c967e3da75924157c6c9cb252b89890ea634e206df329fb82934251198f4d4b806cb87942a26d924654a001443db7042ea824731fe1e135bfa |
C:\Users\Admin\AppData\Local\Temp\open.vbs
| MD5 | 5869fb958416f84363b7fb0c0adee833 |
| SHA1 | a277e3cdf99065048be188add6b474b19f147e5c |
| SHA256 | 9b5bc2317375f956d7c4f45988fcd0e80651f38bb72188a999c3ed2c16a09a57 |
| SHA512 | 78ae70aa5f008dc7f976c1ef8d0e98f877e29d0dcf0b74fbe4cb76690e4104abaabbf359d47ef30024a94e22c63e20f78ee964a7fb2b0650c5fbbb0bc964a4c1 |
C:\Users\Admin\AppData\Local\Temp\pkg\f806f89dc41dde00ca7124dc1e649bdc9b08ff2eff5c891b764f3e5aefa9548c\sqlite3\build\Release\node_sqlite3.node
| MD5 | 66a65322c9d362a23cf3d3f7735d5430 |
| SHA1 | ed59f3e4b0b16b759b866ef7293d26a1512b952e |
| SHA256 | f806f89dc41dde00ca7124dc1e649bdc9b08ff2eff5c891b764f3e5aefa9548c |
| SHA512 | 0a44d12852fc4c74658a49f886c4bc7c715c48a7cb5a3dcf40c9f1d305ca991dd2c2cb3d0b5fd070b307a8f331938c5213188cbb2d27d47737cc1c4f34a1ea21 |
C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat
| MD5 | da0f40d84d72ae3e9324ad9a040a2e58 |
| SHA1 | 4ca7f6f90fb67dce8470b67010aa19aa0fd6253f |
| SHA256 | 818350a4fb4146072a25f0467c5c99571c854d58bec30330e7db343bceca008b |
| SHA512 | 30b7d4921f39c2601d94a3e3bb0e3be79b4b7b505e52523d2562f2e2f32154d555a593df87a71cddb61b98403265f42e0d6705950b37a155dc1d64113c719fd9 |
\??\c:\Users\Admin\AppData\Local\Temp\screenCapture\app.manifest
| MD5 | 8951565428aa6644f1505edb592ab38f |
| SHA1 | 9c4bee78e7338f4f8b2c8b6c0e187f43cfe88bf2 |
| SHA256 | 8814db9e125d0c2b7489f8c7c3e95adf41f992d4397ed718bda8573cb8fb0e83 |
| SHA512 | 7577bad37b67bf13a0d7f9b8b7d6c077ecdfb81a5bee94e06dc99e84cb20db2d568f74d1bb2cef906470b4f6859e00214beacca7d82e2b99126d27820bf3b8f5 |
\??\c:\Users\Admin\AppData\Local\Temp\screenCapture\CSC3DBC62D3CB0E433B928F584B5E51F4C.TMP
| MD5 | a6f2d21624678f54a2abed46e9f3ab17 |
| SHA1 | a2a6f07684c79719007d434cbd1cd2164565734a |
| SHA256 | ab96911d094b6070cbfb48e07407371ddb41b86e36628b6a10cdb11478192344 |
| SHA512 | 0b286df41c3887eecff5c38cbd6818078313b555ef001151b41ac11b80466b2f4f39da518ab9c51eeff35295cb39d52824de13e026c35270917d7274f764c676 |
C:\Users\Admin\AppData\Local\Temp\RES39F7.tmp
| MD5 | 0e96f718b9663c90e1527346cedab1d7 |
| SHA1 | 87322fb3248340c04b95d3b9351ea8d18518afdf |
| SHA256 | 6528e630690416265300944c433331fab9e48569e1b1cd909617f2b94e6c962c |
| SHA512 | 4b082072ba30150ce933aee8d3e1a373a430d3f66562a62ff06bc86834d71de630913814ce3ad35ea170cdad53a677798aeed8ce0243eb78c3a15d2ab2ed2625 |
C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe
| MD5 | b2c2a8c04dbee8353ee67c2ceedd8c3b |
| SHA1 | 2ef41e0c592afe703ed09aabe8fecfa6340ede32 |
| SHA256 | 2493dc042ffa9f936c2e041fd63f790016d3c3fbaf7f143fe9366b509f2c77eb |
| SHA512 | 084ee795791fa9973bbe53c6e246f60e800838edea0f043720e64d3d31c217738e9a3a9c788b3f3dea79b65f0b677a3294f1a2fc56eb65c2fb2cb6e13f1862a7 |
memory/3572-741-0x0000000000800000-0x000000000080A000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\20241021-2116-1lcn5vo.591g.png
| MD5 | 6513ad8ee7e29062c6891879075e9372 |
| SHA1 | 261e6cdb54bcc4bda303e03b026eca1cc167afc8 |
| SHA256 | 0eefc8619805c5b8449975ce846325cb09237ef34c31d3334d132c312bfa1aa7 |
| SHA512 | 1aca2e3c42bd2a48a9b596803b30aefe3fee81fc33e2330b0e82dd83d95e583c82f89099aa21f0678ae75515b6809d5366db9d894664a56111af592a0812ff6a |
memory/2536-750-0x000001C6D6630000-0x000001C6D6631000-memory.dmp
memory/2536-751-0x000001C6D6630000-0x000001C6D6631000-memory.dmp
memory/2536-752-0x000001C6D6630000-0x000001C6D6631000-memory.dmp
memory/2536-757-0x000001C6D6630000-0x000001C6D6631000-memory.dmp
memory/2536-756-0x000001C6D6630000-0x000001C6D6631000-memory.dmp
memory/2536-762-0x000001C6D6630000-0x000001C6D6631000-memory.dmp
memory/2536-761-0x000001C6D6630000-0x000001C6D6631000-memory.dmp
memory/2536-760-0x000001C6D6630000-0x000001C6D6631000-memory.dmp
memory/2536-759-0x000001C6D6630000-0x000001C6D6631000-memory.dmp
memory/2536-758-0x000001C6D6630000-0x000001C6D6631000-memory.dmp
Analysis: behavioral11
Detonation Overview
Submitted
2024-11-21 10:56
Reported
2024-11-21 11:00
Platform
win10v2004-20241007-en
Max time kernel
143s
Max time network
157s
Command Line
Signatures
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\d3dcompiler_47.dll,#1
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 154.239.44.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 17.160.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 200.163.202.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 198.187.3.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 75.117.19.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 83.210.23.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 29.243.111.52.in-addr.arpa | udp |
Files
Analysis: behavioral23
Detonation Overview
Submitted
2024-11-21 10:56
Reported
2024-11-21 11:00
Platform
win10v2004-20241007-en
Max time kernel
138s
Max time network
156s
Command Line
Signatures
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\resources\elevate.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\resources\elevate.exe
"C:\Users\Admin\AppData\Local\Temp\resources\elevate.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 104.219.191.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 40.134.221.88.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 97.17.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 212.20.149.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 198.187.3.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 83.210.23.2.in-addr.arpa | udp |
Files
Analysis: behavioral4
Detonation Overview
Submitted
2024-11-21 10:56
Reported
2024-11-21 11:00
Platform
win10v2004-20241007-en
Max time kernel
92s
Max time network
152s
Command Line
Signatures
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Windows\SysWOW64\rundll32.exe |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\rundll32.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2424 wrote to memory of 2400 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 2424 wrote to memory of 2400 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 2424 wrote to memory of 2400 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\StdUtils.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\StdUtils.dll,#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2400 -ip 2400
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2400 -s 628
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 217.106.137.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 40.134.221.88.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 68.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 196.249.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 104.219.191.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 212.20.149.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 19.229.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 83.210.23.2.in-addr.arpa | udp |
Files
Analysis: behavioral6
Detonation Overview
Submitted
2024-11-21 10:56
Reported
2024-11-21 11:00
Platform
win10v2004-20241007-en
Max time kernel
92s
Max time network
143s
Command Line
Signatures
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Windows\SysWOW64\rundll32.exe |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\rundll32.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 5096 wrote to memory of 1996 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 5096 wrote to memory of 1996 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 5096 wrote to memory of 1996 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1996 -ip 1996
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1996 -s 612
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 97.17.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 140.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 217.106.137.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 197.87.175.4.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 198.187.3.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 98.117.19.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 240.221.184.93.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 14.227.111.52.in-addr.arpa | udp |
Files
Analysis: behavioral21
Detonation Overview
Submitted
2024-11-21 10:56
Reported
2024-11-21 11:00
Platform
win10v2004-20241007-en
Max time kernel
127s
Max time network
160s
Command Line
Signatures
Command and Scripting Interpreter: PowerShell
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: 33 | N/A | C:\Windows\system32\AUDIODG.EXE | N/A |
| Token: SeIncBasePriorityPrivilege | N/A | C:\Windows\system32\AUDIODG.EXE | N/A |
Processes
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\locales\uk.ps1
C:\Windows\system32\AUDIODG.EXE
C:\Windows\system32\AUDIODG.EXE 0x4bc 0x2f8
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 217.106.137.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 22.160.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 200.163.202.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 171.39.242.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 98.117.19.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 83.210.23.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 48.229.111.52.in-addr.arpa | udp |
Files
memory/4648-0-0x00007FF80F383000-0x00007FF80F385000-memory.dmp
memory/4648-1-0x000002394A720000-0x000002394A742000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_qioolmaq.r31.ps1
| MD5 | d17fe0a3f47be24a6453e9ef58c94641 |
| SHA1 | 6ab83620379fc69f80c0242105ddffd7d98d5d9d |
| SHA256 | 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7 |
| SHA512 | 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82 |
memory/4648-11-0x00007FF80F380000-0x00007FF80FE41000-memory.dmp
memory/4648-12-0x00007FF80F380000-0x00007FF80FE41000-memory.dmp
memory/4648-13-0x00007FF80F380000-0x00007FF80FE41000-memory.dmp
memory/4648-16-0x00007FF80F380000-0x00007FF80FE41000-memory.dmp
Analysis: behavioral28
Detonation Overview
Submitted
2024-11-21 10:56
Reported
2024-11-21 11:00
Platform
win7-20240729-en
Max time kernel
82s
Max time network
17s
Command Line
Signatures
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Windows\SysWOW64\rundll32.exe |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\rundll32.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsis7z.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsis7z.dll,#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2164 -s 220
Network
Files
Analysis: behavioral1
Detonation Overview
Submitted
2024-11-21 10:56
Reported
2024-11-21 11:00
Platform
win7-20241010-en
Max time kernel
15s
Max time network
19s
Command Line
Signatures
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2p9m7YGyMFCUQTUFxkmWGMd4grN\aka45.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\aka451.0.03.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\aka451.0.03.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\aka451.0.03.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\aka451.0.03.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2p9m7YGyMFCUQTUFxkmWGMd4grN\aka45.exe | N/A |
Enumerates physical storage devices
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\aka451.0.03.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeSecurityPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\aka451.0.03.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2220 wrote to memory of 1280 | N/A | C:\Users\Admin\AppData\Local\Temp\aka451.0.03.exe | C:\Users\Admin\AppData\Local\Temp\2p9m7YGyMFCUQTUFxkmWGMd4grN\aka45.exe |
| PID 2220 wrote to memory of 1280 | N/A | C:\Users\Admin\AppData\Local\Temp\aka451.0.03.exe | C:\Users\Admin\AppData\Local\Temp\2p9m7YGyMFCUQTUFxkmWGMd4grN\aka45.exe |
| PID 2220 wrote to memory of 1280 | N/A | C:\Users\Admin\AppData\Local\Temp\aka451.0.03.exe | C:\Users\Admin\AppData\Local\Temp\2p9m7YGyMFCUQTUFxkmWGMd4grN\aka45.exe |
| PID 2220 wrote to memory of 1280 | N/A | C:\Users\Admin\AppData\Local\Temp\aka451.0.03.exe | C:\Users\Admin\AppData\Local\Temp\2p9m7YGyMFCUQTUFxkmWGMd4grN\aka45.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\aka451.0.03.exe
"C:\Users\Admin\AppData\Local\Temp\aka451.0.03.exe"
C:\Users\Admin\AppData\Local\Temp\2p9m7YGyMFCUQTUFxkmWGMd4grN\aka45.exe
C:\Users\Admin\AppData\Local\Temp\2p9m7YGyMFCUQTUFxkmWGMd4grN\aka45.exe
Network
Files
\Users\Admin\AppData\Local\Temp\nszDE30.tmp\System.dll
| MD5 | 0d7ad4f45dc6f5aa87f606d0331c6901 |
| SHA1 | 48df0911f0484cbe2a8cdd5362140b63c41ee457 |
| SHA256 | 3eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca |
| SHA512 | c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9 |
\Users\Admin\AppData\Local\Temp\nszDE30.tmp\nsis7z.dll
| MD5 | 80e44ce4895304c6a3a831310fbf8cd0 |
| SHA1 | 36bd49ae21c460be5753a904b4501f1abca53508 |
| SHA256 | b393f05e8ff919ef071181050e1873c9a776e1a0ae8329aefff7007d0cadf592 |
| SHA512 | c8ba7b1f9113ead23e993e74a48c4427ae3562c1f6d9910b2bbe6806c9107cf7d94bc7d204613e4743d0cd869e00dafd4fb54aad1e8adb69c553f3b9e5bc64df |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\ffmpeg.dll
| MD5 | a007299c49fa50aeff594655859780ae |
| SHA1 | d202f1f617023763a0e9418878e8ecac96be9fd4 |
| SHA256 | b78f0036621ad1d5833289f2ad509963ef78f1a89a3c7df0f1370fd2d35a2804 |
| SHA512 | 444c4baa1e1d941bd04f78184cec519c6eb53a83fbc3aa3ea30522bffc9ecde73ebe7b910c1a37c345429298ada3c0ffcb3e3849e21b2009487b5cd1a02cb2a9 |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\icudtl.dat
| MD5 | 2134e5dbc46fb1c46eac0fe1af710ec3 |
| SHA1 | dbecf2d193ae575aba4217194d4136bd9291d4db |
| SHA256 | ee3c8883effd90edfb0ff5b758c560cbca25d1598fcb55b80ef67e990dd19d41 |
| SHA512 | b9b50614d9baebf6378e5164d70be7fe7ef3051cfff38733fe3c7448c5de292754bbbb8da833e26115a185945be419be8dd1030fc230ed69f388479853bc0fcb |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\LICENSE.electron.txt
| MD5 | 4d42118d35941e0f664dddbd83f633c5 |
| SHA1 | 2b21ec5f20fe961d15f2b58efb1368e66d202e5c |
| SHA256 | 5154e165bd6c2cc0cfbcd8916498c7abab0497923bafcd5cb07673fe8480087d |
| SHA512 | 3ffbba2e4cd689f362378f6b0f6060571f57e228d3755bdd308283be6cbbef8c2e84beb5fcf73e0c3c81cd944d01ee3fcf141733c4d8b3b0162e543e0b9f3e63 |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\LICENSES.chromium.html
| MD5 | 8303b3a19888f41062a614cd95b2e2d2 |
| SHA1 | a112ee5559c27b01e3114cf10050531cab3d98a6 |
| SHA256 | 9c088caac76cf5be69e0397d76fe9397017585cffdba327692ff1b3a6c00d68f |
| SHA512 | 281b2ecc99502a050ee69e31256dec135e8cb877d1a6ba9f1c975fcfb11c062980ee6061d2368b62f91e392953ae6235dd726a9d98e6efc1302f7ed713099179 |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\libGLESv2.dll
| MD5 | 05b585464f18fe0e3bddb20527697d66 |
| SHA1 | 8bcec2f0b409afa9ff054e25f3ce85eb9bd50010 |
| SHA256 | 0bb7c6c08b569c1d2de90a40e6c142591e160a7c6cb15d21807f3404a48c4287 |
| SHA512 | f680ab9c3070f443c7359bb3f0c2032f5c58c88c7823e4592e8212ce8815ea5f463c86df113f5320944c62d3cb4e8d45b9b4dcaadccc1ac9bf203ae4bb52083c |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\v8_context_snapshot.bin
| MD5 | 146e284750735ef4798527dc1cd0e741 |
| SHA1 | 6408985b7d05c768a62bcb912234f14e1898ffdb |
| SHA256 | 3820e8fa1077d02606fea8e1b3a9ca4bf7f4a71d0569d9a8ea9ee7a009d0ce80 |
| SHA512 | 46824df5d20e02fb72c3efd07bee6d832b1ab78c0163688fa84edb831cbfbef2dde12ba9da01f9dd49c4008bd3862a95699a2f6d55b8d4b3165976d3851c7278 |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\vulkan-1.dll
| MD5 | 6c70aab071c4febc5921e0d39811937a |
| SHA1 | 20d87b3a5333ea3f6d0d7b0333f2c30a281937aa |
| SHA256 | 2233fef6788711089fc5c1a008bfff6559cf2fc3e8363cd8a50196e90d1d9825 |
| SHA512 | 7f786c44376b59be7d7c51d3c40ecb80f30645551b582d042b641ea0a6464daf367ddf7eafaf00a1558e1f11570d99a699d33d224b01048d09f8f00ea501c4bf |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\vk_swiftshader_icd.json
| MD5 | 8642dd3a87e2de6e991fae08458e302b |
| SHA1 | 9c06735c31cec00600fd763a92f8112d085bd12a |
| SHA256 | 32d83ff113fef532a9f97e0d2831f8656628ab1c99e9060f0332b1532839afd9 |
| SHA512 | f5d37d1b45b006161e4cefeebba1e33af879a3a51d16ee3ff8c3968c0c36bbafae379bf9124c13310b77774c9cbb4fa53114e83f5b48b5314132736e5bb4496f |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\locales\bn.pak
| MD5 | 8feb4092426a0c2c167c0674114b014d |
| SHA1 | 6fc9a1076723bfaf5301d8816543a05a82ad654d |
| SHA256 | fb0656a687555801edfb9442b9f3e7f2b009be1126f901cf4da82d67ac4ad954 |
| SHA512 | 3de40bdd18e9e7d3f2eceebf7c089e2250ce4d40412a18d718facba8f045e68b996978ef8b4d047b21d3424094056d16b5abb81bd0507f446b805d6b889522a7 |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\locales\da.pak
| MD5 | bb5252dc6f0f3c01ce3638138bf946c8 |
| SHA1 | bfb584b67c8ca51d94bff40809410553d54da1cf |
| SHA256 | c93f39d0ab9a2fab26977aa729261633225879ba6dc5ea8d0ca89814b2df9fa9 |
| SHA512 | e411fd3cc5285a6059c3fd80c3421253a4ce06b2d0cd1cd1efc25e88191a58fed176452d852922137268be2824e1e162cd4d4a6f8c695a50517a783d15b1c6e7 |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\locales\en-GB.pak
| MD5 | 0db7f3a3ba228aa7f2457db1aa58d002 |
| SHA1 | bbf3469caadfa3d2469dd7e0809352ef21a7476d |
| SHA256 | cf5aca381c888de8aa6bbd1dcd609e389833cb5af3f4e8af5281ffd70cd65d98 |
| SHA512 | 9c46c8d12579bd8c0be230bbcdb31bdb537d2fea38000cf700547ca59e3139c18cc7cb3e74053475605132404c4c4591f651d2dad2ce7f413ccffd6acf7139e8 |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\locales\gu.pak
| MD5 | 7b5f52f72d3a93f76337d5cf3168ebd1 |
| SHA1 | 00d444b5a7f73f566e98abadf867e6bb27433091 |
| SHA256 | 798ea5d88a57d1d78fa518bf35c5098cbeb1453d2cb02ef98cd26cf85d927707 |
| SHA512 | 10c6f4faab8ccb930228c1d9302472d0752be19af068ec5917249675b40f22ab24c3e29ec3264062826113b966c401046cff70d91e7e05d8aadcc0b4e07fec9b |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\locales\lv.pak
| MD5 | e4f7d9e385cb525e762ece1aa243e818 |
| SHA1 | 689d784379bac189742b74cd8700c687feeeded1 |
| SHA256 | 523d141e59095da71a41c14aec8fe9ee667ae4b868e0477a46dd18a80b2007ef |
| SHA512 | e4796134048cd12056d746f6b8f76d9ea743c61fee5993167f607959f11fd3b496429c3e61ed5464551fd1931de4878ab06f23a3788ee34bb56f53db25bcb6df |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\locales\ru.pak
| MD5 | fc0e2fc09aa9089c5db75bab7a0754a7 |
| SHA1 | f3d1e3e1600ae188e801a81b6d233db9903b82df |
| SHA256 | 188b6405cb6c5b7c0b35050278a119c3ce41fb90883b9adb39fec15da0a05550 |
| SHA512 | 377e685d1d171d0a7158b56f356ca33d4493d07efa58d3c384e272e1b6829933552c69aff95215ae7d1a0f99616a20790708f5187ea10cfe46baa2bb522fc18f |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\locales\zh-TW.pak
| MD5 | 8f67a9f38ad36d7d4a6b48e63852208d |
| SHA1 | f087c85c51bdbdef5998cfc3790835da95da982a |
| SHA256 | 92f26e692dc1309558f90278425a7e83e56974b6af84dbd8cc90324785ee71ca |
| SHA512 | 623034bbdfdf5d331de78b630f403aeb9cef27b1827e0d29ec66ad69310f56c7db96c6775df0e749f8112a4a8e75754bcf987903d415fc7ae360e3c39e6e18e0 |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\resources\app.asar
| MD5 | 6e828795b20b3a123049e28fe57d63fb |
| SHA1 | 836f94654a5f529f3db773b15dc3f37907941f05 |
| SHA256 | 162516cb7da8e367584196126b55e1a4365e6a2d5569ac24099601a23ba19bef |
| SHA512 | 36f5ff39bb4788a5c2491f4fbad833fccd1c7a136833d88ef1eb199d52be55aa5ff9b923f045f50d0335de61016ceeaa0fa374bebb260760f7ae8ee01f5384b3 |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\StdUtils.dll
| MD5 | c6a6e03f77c313b267498515488c5740 |
| SHA1 | 3d49fc2784b9450962ed6b82b46e9c3c957d7c15 |
| SHA256 | b72e9013a6204e9f01076dc38dabbf30870d44dfc66962adbf73619d4331601e |
| SHA512 | 9870c5879f7b72836805088079ad5bbafcb59fc3d9127f2160d4ec3d6e88d3cc8ebe5a9f5d20a4720fe6407c1336ef10f33b2b9621bc587e930d4cbacf337803 |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\resources\elevate.exe
| MD5 | 792b92c8ad13c46f27c7ced0810694df |
| SHA1 | d8d449b92de20a57df722df46435ba4553ecc802 |
| SHA256 | 9b1fbf0c11c520ae714af8aa9af12cfd48503eedecd7398d8992ee94d1b4dc37 |
| SHA512 | 6c247254dc18ed81213a978cce2e321d6692848c64307097d2c43432a42f4f4f6d3cf22fb92610dfa8b7b16a5f1d94e9017cf64f88f2d08e79c0fe71a9121e40 |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\locales\zh-CN.pak
| MD5 | 9d4f54eb5a12cf4c2f34f5f538dff90b |
| SHA1 | c31b892ce78c733bde0571b6236170103cc9fe7a |
| SHA256 | 58b934a09858f037f1966a495e73d44416180afcdebfaefcee1f5e3377de63f7 |
| SHA512 | 46bf6099c50f7959a6f0800ec679b61a78efabe87985cad8dc0d7d0006470a9c61e659bde0258da6cf7ed6104749a157f5ad133f324479c3460a19fc14e31c37 |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\locales\vi.pak
| MD5 | 9274866d7c6314f43dd63ed293293e25 |
| SHA1 | 4af0e6ec1bcb99588810a9fb69c1dc2bbad892fc |
| SHA256 | dcbdc6d9e11dd10fc1364c10be5438ce2697f61ec5f32997c43b87238087c4e3 |
| SHA512 | 3c8c9e9960a49469af83cae31790a03e41846163c14d3dae45fd92a1a412c82075bdef3317baca02399eb53de0f9164c0a9a17b7cd63e0fa61c3e4617393c42e |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\locales\ur.pak
| MD5 | d7ec7d551dee1e1ef11be3e2820052f9 |
| SHA1 | d7f2d35841883103c2773fc093a9a706b2fe5d36 |
| SHA256 | 05e45371159075048db688564b6bc707e0891303c40f490c3db428b0edd36102 |
| SHA512 | 92e2d32fc106812e08163a26f202a5d0e7eb7028a871f3bc6cbc05ee6c7ce287032179322b19e396308968515bf214534a38d93afc259a780ad7ba8432fab56a |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\locales\uk.pak
| MD5 | e4c4e3700469704b936460ca1a90fcc0 |
| SHA1 | e809990fc07a1d39fe623046382699e648e343c0 |
| SHA256 | 29af2abc75a35bb9e3f9bc6e2904228ba651ea4e0ce8e9c7a2d7e272374b9ebb |
| SHA512 | 68e33f471c5bf2d4ed9cb00ace3e094ef102a5f1566a6e2c8a3007ef7fbd8a24c36eb36b08745f3608e70940444e9fc7a36fabe1a9945d1f00b4f3f28c7bdaf6 |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\locales\tr.pak
| MD5 | 9f24f44cac0997e1d0a6a419520f3bfe |
| SHA1 | edb61859cbb5d77c666aac98379d4155188f4ff5 |
| SHA256 | 3aff7dcbfb1a244cc29b290376b52cfb3e1f844c98facafea17b4a45ce064b8a |
| SHA512 | 65fbe2d7fea37db59b805d031f6ae85d628a51b254e76e8c2b4ef4b5153527b7e2412ed6a0961d174b8a5581b521b0436160fe5ed252f78303bcfde815733d81 |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\locales\th.pak
| MD5 | 293ad7c20c22d744e4db0fb001ec45bb |
| SHA1 | 486c9e0732306a45aceb633da2b3ded281197620 |
| SHA256 | d67d68f24d3347e244a7e8c3b63d47f18fcf37258256f48dad785cf98bb560fa |
| SHA512 | ac2b2dd82095925b3229958e89dcf5283bdce0273734a0c338f5a1aa8b014644806ca517f0fc2003669910e58fedf9c2ca7a009fa3f53d58c07bc5e9191f2e2f |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\locales\te.pak
| MD5 | 02415ded02cc7ac25e8f8d0e83365061 |
| SHA1 | 5a25bf63ec97dbeb37e64ab3825cbbce6326a5cf |
| SHA256 | 97024f0cfac78e0c738e771beea1e35f5a8eb2b132b3043b59ce4ecd6c153523 |
| SHA512 | 54e658c6d432b29b031be278e5b4396ac14b0f85e1f772a0a76c0431d4cbe2370ff2898077837688e2fb9700db1eab7a19e4e350a280a2ffad8176d861d93e45 |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\locales\ta.pak
| MD5 | a8beab6896018a6d37f9b2e5bdd7a78c |
| SHA1 | 64310684247219a14ac3ac3b4c8ebaa602c5f03a |
| SHA256 | c68b708ba61b3eeab5ae81d9d85d6e9f92e416ecfae92e8de9965608732384df |
| SHA512 | 73b0a31235bf4b7c5ad673f08717f3b4f03bcdf2a91440ee7228aa78c2d15dd2aed32498e23ded78ec35bc731dbe16b6a1c236a170f2a84123a464857686c7b5 |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\locales\sw.pak
| MD5 | ee8da42ffe40fbb916c56390e2cd99e8 |
| SHA1 | 6d824f56afe6b3605a881d2c26e69a46e6675347 |
| SHA256 | 192e248c7ac4644f8712cf5032da1c6063d70662216ccf084205f902253aa827 |
| SHA512 | 7befe72b073000bc35a31323d666fd51d105a188d59c4a85d76ee72b6c8c83a39a1beb935c1079def8e3ffa8c4bf6044cf4f3bef0f1c850c789b57e1144ff714 |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\locales\sv.pak
| MD5 | bbe0785c5f9591e8a1e7c4830fe949d6 |
| SHA1 | da4f3286079d50e1c04e923529e03e7d334c7fff |
| SHA256 | 0ad84f6f95fd7505862278a7c1c92d00a7e7dd4a765569e9c3086f55c1d7059d |
| SHA512 | 38bab6f3a6c9395d3b57e63168045ad2e8188b2f04751a15253e7226ec3043c9678a77be1eb27a3b2e751934a024f3ffc89fffd9f1e229e19638be318b53e961 |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\locales\sr.pak
| MD5 | cf160983a86b51ec42845f4e60ac9123 |
| SHA1 | 4d3bd86a7ef1eaadb8bec0b79ecc6c05b4273a48 |
| SHA256 | ef07512fb337005bb66696c69722a0d65bfb749b9d2f763f5b2ff2885cb247a4 |
| SHA512 | b909fc3614c3250856d2c502cbfed5eb6e398140b801669bf92427e7e8a5939b14052b9abf2c94749f1aea61946ff66be4978c68064196458733bcff0a963ffa |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\locales\sl.pak
| MD5 | 4d9d56ef0b176e7f7aa14270e964ec77 |
| SHA1 | 515aac37e4f25ca50bd52ea73889b70b1e79863d |
| SHA256 | 6ba684a8f06f7eb175955b15d30c7162d92c7e7c48864dfb853238263e1be8c7 |
| SHA512 | 740adbb7d8b039f98e187f45a1a87d0354136fb48b75262e508f720bfcbeb2746f04d31a57dccd50e37ddb5a1b7c0ad79a01cac6ba5fb98a9af272ad99fcb169 |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\locales\sk.pak
| MD5 | 793c442420f27d54410cdb8d8ecce5ff |
| SHA1 | 8995e9e29dbaaa737777e9c9449b67ca4c5b4066 |
| SHA256 | 5a9d6b77ca43c8ed344416d854c2d945d8613e6c7936445d6fe35e410c7190bb |
| SHA512 | 291e3d2300c973966d85e15a1b270ba05c83696271a7c7d4063b91097a942590c9797a4d22dfbe154564b779dac92fd12db0d5b63f5f0406f818b956b126e7e9 |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\locales\ro.pak
| MD5 | 19cfc7c8f1a2e4a2de1f9f64475469bc |
| SHA1 | bf6c4f373c19b03e116d2593c64e1ceca47d79dc |
| SHA256 | 3e725f7a791aed1fbed57f075ca11ce389a5bd425ccce3c00537dad27e5a8dd6 |
| SHA512 | ff5254e3a3676b8f5e74cba6661ae43d5739c7363c66cb17f74dce158dc36cee103885f055846dd320b932f2e7fbdc831bcee6293d423ff9b842b68644f633bd |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\locales\pt-PT.pak
| MD5 | acffa29064f40a014bc7fe13e5ff58a9 |
| SHA1 | 5a0890c94084075446264469818753f699a3d154 |
| SHA256 | 423e7ccb22d32276320ed72f07186188e095c577db5bce7309c8bd589a2a8858 |
| SHA512 | d4572c81fdd3b7b69d77544f68b23ae0b546158033be503dbaab736d3ca1188b18916688234fae9ea29fa430258b2d2b95a93d0e8b74919a62040b84902d3b6e |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\locales\pt-BR.pak
| MD5 | a23c805ee4d3d67c811b50826ca25a51 |
| SHA1 | c14fa8b9c7073fe88e188cfa4b34883faccc2c09 |
| SHA256 | 62be4fb0bd3b8be563516bfea3f0848924bb7afb0c563d02c1508608a4487e3b |
| SHA512 | c478bd2234eef73aa08085d29b916ad1471576ff213f972c9616757172d0cdec6e5d6797a1f2635ac17a0bac34964a298e4ab4336479456ce10330128cd68a53 |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\locales\pl.pak
| MD5 | 61c093fac4021062e1838a32d79399c2 |
| SHA1 | 84a47537ef58d2507cf7697ea7e1e27b1f812ee8 |
| SHA256 | 58067ec06973f5dd7afebbe57bffce3a3ed9f8e5093af8fcefdb6a65b2b68b22 |
| SHA512 | 475d9d4f27cbc23efd9acf75024f993bcf7a8279e658ccbd84c8ac810e1c828de4dac4141298865faf1bb8858a7a88a12d1a21c467e8c656533e364ceff7e5dc |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\locales\nl.pak
| MD5 | bc41967b2ff493e7f151c7721245739d |
| SHA1 | 7606133ddbb58492dbbf02c03a975fb48da1e26f |
| SHA256 | 3dbe5569f53d1314dcb1bc99540cf6a0fea45b6d67576fd0d14c688107892f32 |
| SHA512 | 9e395a3b5bbf64de3e474c56c4fb39879f107a9db246632cf6bb4b06160e05a82c0161d6496edb2bc29febb4a8f67ca7ea904167b860fd6da96636a6711cb593 |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\locales\nb.pak
| MD5 | 7576c2fa9199a4121bc4a50ff6c439c3 |
| SHA1 | 55e3e2e651353e7566ed4dbe082ffc834363752b |
| SHA256 | 2a3dfc6b41fa50fabed387cb8f05debbc530fa191366b30c9cb9eaae50686bd5 |
| SHA512 | 86c44e43609e6eb61273f23d2242aa3d4a0bfa0ea653a86c8b663fa833283cc85a4356f4df653e85080f7437b81ae6201a3ecf898a63780b5ca67faa26d669fe |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\locales\ms.pak
| MD5 | 9b3e2f3c49897228d51a324ab625eb45 |
| SHA1 | 8f3daec46e9a99c3b33e3d0e56c03402ccc52b9d |
| SHA256 | 61a3daae72558662851b49175c402e9fe6fd1b279e7b9028e49506d9444855c5 |
| SHA512 | 409681829a861cd4e53069d54c80315e0c8b97e5db4cd74985d06238be434a0f0c387392e3f80916164898af247d17e8747c6538f08c0ef1c5e92a7d1b14f539 |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\locales\mr.pak
| MD5 | 25f2b9842e2c4c026e0fc4bc191a6915 |
| SHA1 | 7de7f82badb2183f1f294b63ca506322f4f2aafa |
| SHA256 | 771eb119a20fcc5e742a932a9a8c360a65c90a5fe26ab7633419966ba3e7db60 |
| SHA512 | ac6d2eeb439351eee0cf1784b941f6dd2f4c8c496455479ca76919bf7767cca48a04ba25fccde74751baa7c90b907b347396235a3ce70f15c1b8e5388e5c6107 |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\locales\ml.pak
| MD5 | 3b1305ecca60fb5a7b3224a70398ead9 |
| SHA1 | 04e28fce93fc57360e9830e2f482028ffc58a0a2 |
| SHA256 | c10942f5333f0d710de4d3def7aa410c4576ffe476b3ea84aac736bfb9c40d67 |
| SHA512 | 68fdd944a153c16d18e73dd2aa75593f6ac13b8e87dbfb5bfccdd982a4f885bd9903c3ed1af781581cd3c5d42dd2ff21cc780f54fd71ab04a3237d08ed5a1554 |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\locales\lt.pak
| MD5 | 96602a3f3b59faa997a4d337889fa02b |
| SHA1 | 94593a270b0d84c006e0959bc136b6c4987dfd3f |
| SHA256 | 51db5311de9dff41fb4eadda8ba7d5e492912f72c3754adaf8e3de23aba46f8a |
| SHA512 | dd45240494d09ad9a41be9d4056ed274e78a50dc85e6bff9438e707a84f65b77ebe522531370da99e50a6887d6063c29e9728b49df2b2b3c61362d774797fac2 |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\locales\ko.pak
| MD5 | b83bc27c5bc2bb4d0ff7934db87e12ad |
| SHA1 | 050f004e82f46053b6566300c9a7b1a6a6e84209 |
| SHA256 | ab3060e7d16de4d1536ff6dd4f82939a73388201ad7e2be15f3afee6a5aae0ef |
| SHA512 | b56b211587fe93a254198ca617cdecd8dc01e4561151a53173721665111c4d2440535f5f6b8a5a69a31840ea60124f4afd2c693d1fc4683fa2cf237c8ede5f0a |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\locales\kn.pak
| MD5 | a603f3d899ccdcd9af20dcd8f87d0ed8 |
| SHA1 | f476355d6ea5c05b35ad74c08e2edfe5ff2881ad |
| SHA256 | 3c11a589aab0c5d9e5c18e6a95dce7e613089d3598b8fe54e656a8d97e22a6fd |
| SHA512 | f6b008080cae44d680faaab02911f62e21d042c55fc5af87e719e9bc4102b282e58e67f19f37f60fe8ba99f5b8cfd4e70a61af9918a9ee8e3d8ae72555d31c15 |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\locales\ja.pak
| MD5 | f47efaa76f5200a6c0c23c33684d7bad |
| SHA1 | 9b24f6491a1171d3dfeae329e1f45ab3e3d9cf22 |
| SHA256 | 5b99d6a11d7b653681b2a2bb616cc1814451ad35c370d178b2ef6650465d4f2a |
| SHA512 | 67d130a66f03a4d1a0a30576b19fe44fa707cba764c6dcd355cbe891a2bcc0b25823ba2106e9271e06ada674f66824a5323b77d4984900516d2a8802af87960e |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\locales\it.pak
| MD5 | 7c981a25be0e02fba150e17d9669a536 |
| SHA1 | 3af10feb7cdc7bc091b80173301b1a3d4ef941d4 |
| SHA256 | ee2d2643ad7a8f97b7a6c070910866436cae0267a6691a3d8a88ed0948d8af49 |
| SHA512 | 445eecfa83e7635bc3442937bdf3b9c4a38ef3fbb7f07ca90a1d4222e1a29639f3fdce12b20e798888823f2d612e5972492b3786d37b256aec5c1c96cdb96b28 |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\locales\id.pak
| MD5 | bd9636e9c7dc7be4c7f53fb0b886be04 |
| SHA1 | 55421d0e8efcbef8c3b72e00a623fb65d33c953e |
| SHA256 | 5761ee7da9ca163e86e2023829d377a48af6f59c27f07e820731192051343f40 |
| SHA512 | 7c7e88ffd2b748e93122585b95850ded580e1136db39386ced9f4db0090e71394a1f9ceb937262c95969132c26bf6ce1684fbb97b6469ed10414171a2e8cc3a4 |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\locales\hu.pak
| MD5 | b338dcb0e672fb7b2910ce2f561a8e38 |
| SHA1 | cf18c82ec89f52753f7258cdb01203fbc49bed99 |
| SHA256 | bcdf39aa7004984cb6c13aac655b2e43efeb387ce7d61964b063d6cf37773f7a |
| SHA512 | f95f6a8e36d99680fb3cdb439f09439782bcc325923ec54bdc4aeb8ec85cf31a3a2216e40e2b06c73a2f5e7439d8178d8becac72781a6d79808067e8ccf3cac6 |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\locales\hr.pak
| MD5 | 105472bc766a30bb71f13d86081de68d |
| SHA1 | d014103ad930889239efd92ecfdfcc669312af6c |
| SHA256 | a3a853a049735c7d474191dff19550a15503ecd20bafe44938eb12ea60e50b7c |
| SHA512 | ee7479d459eff8ec59206c2269df4e9fc1ca143e9b94a908eb8a5a1e16180bcc88f0b24d73c387f5853ea0418e737641f23146676232c1a3ac794611f7880f11 |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\locales\hi.pak
| MD5 | b7e4892b2030e4f916364856b6cc470a |
| SHA1 | b08ad51e98e3b6949f61f0b9251f7281818cd23e |
| SHA256 | 093119a99f008ab15d0e5b34cd16ec6b4313554e6c3cffe44502bfce51470e3e |
| SHA512 | ca453025d73228592a4bfe747a3ea08b86327f733032a64ced0fc0c9e2e00b02450f133e691b94be13a3e69e22b43bca512e5f77b0e490320f0bf8e65571bb46 |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\locales\he.pak
| MD5 | 93d9261f91bcd80d7f33f87bad35dda4 |
| SHA1 | a498434fd2339c5d6465a28d8babb80607db1b65 |
| SHA256 | 31661709ab05e2c392a7faeed5e863b718f6a5713d0d4bbdab28bc5fb6565458 |
| SHA512 | f213ff20e45f260174caa21eae5a58e73777cd94e4d929326deefbef01759d0200b2a14f427be1bb270dfcd2c6fb2fce789e60f668ac89ecf1849d7575302725 |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\locales\fr.pak
| MD5 | 0445700799de14382201f2b8b840c639 |
| SHA1 | b2d2a03a981e6ff5b45bb29a594739b836f5518d |
| SHA256 | 9a57603f33cc1be68973bdd2022b00d9d547727d2d4dc15e91cc05ebc7730965 |
| SHA512 | 423f941ec35126a2015c5bb3bf963c8b4c71be5edfb6fc9765764409a562e028c91c952da9be8f250b25c82e8facec5cada6a4ae1495479d6b6342a0af9dda5f |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\locales\fil.pak
| MD5 | 3165351c55e3408eaa7b661fa9dc8924 |
| SHA1 | 181bee2a96d2f43d740b865f7e39a1ba06e2ca2b |
| SHA256 | 2630a9d5912c8ef023154c6a6fb5c56faf610e1e960af66abef533af19b90caa |
| SHA512 | 3b1944ea3cfcbe98d4ce390ea3a8ff1f6730eb8054e282869308efe91a9ddcd118290568c1fc83bd80e8951c4e70a451e984c27b400f2bde8053ea25b9620655 |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\locales\fi.pak
| MD5 | 5518b51d4af7f1b9d686cbea28b69e71 |
| SHA1 | df7f70846f059826c792a831e32247b2294c8e52 |
| SHA256 | 8ff1b08727c884d6b7b6c8b0a0b176706109ae7fe06323895e35325742fe5bd1 |
| SHA512 | b573050585c5e89a65fc45000f48a0f6aabccd2937f33a0b3fcbd8a8c817beaa2158f62a83c2cae6fcfb655f4a4f9a0c2f6505b41a90bc9d8ede74141ebc3266 |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\locales\fa.pak
| MD5 | dcd3b982a52cdf8510a54830f270e391 |
| SHA1 | 3e0802460950512b98cd124ff9f1f53827e3437e |
| SHA256 | e70dfa2d5f61afe202778a3faf5ed92b8d162c62525db79d4ec82003d8773fa3 |
| SHA512 | 3d5b7fa1a685fa623ec7183c393e50007912872e22ca37fdc094badaefddeac018cc043640814a4df21bb429741dd295aa8719686461afa362e130b8e1441a12 |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\locales\et.pak
| MD5 | a94e1775f91ea8622f82ae5ab5ba6765 |
| SHA1 | ff17accdd83ac7fcc630e9141e9114da7de16fdb |
| SHA256 | 1606b94aef97047863481928624214b7e0ec2f1e34ec48a117965b928e009163 |
| SHA512 | a2575d2bd50494310e8ef9c77d6c1749420dfbe17a91d724984df025c47601976af7d971ecae988c99723d53f240e1a6b3b7650a17f3b845e3daeefaaf9fe9b9 |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\locales\es.pak
| MD5 | e9fa4cada447b507878a568f82266353 |
| SHA1 | 4a38f9d11e12376e4d13e1ee8c4e0d082d545701 |
| SHA256 | 186c596d8555f8db77b3495b7ad6b7af616185ca6c74e5dfb6c39f368e3a12a4 |
| SHA512 | 1e8f97ff3daad3d70c992f332d007f3ddb16206e2ff4cffd3f2c5099da92a7ad6fb122b48796f5758fe334d9fbf0bbae5c552414debbb60fe5854aaa922e206e |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\locales\es-419.pak
| MD5 | 5321c1e88c5c6fa20bdbc16043c6d0f6 |
| SHA1 | 07b35ed8f22edc77e543f28d36c5e4789e7723f4 |
| SHA256 | f7caa691599c852afb6c2d7b8921e6165418cc4b20d4211a92f69c877da54592 |
| SHA512 | 121b3547a8af9e7360774c1bd6850755b849e3f2e2e10287c612cf88fb096eb4cf4ee56b428ba67aeb185f0cb08d34d4fa987c4b0797436eea53f64358d2b989 |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\locales\en-US.pak
| MD5 | 5e3813e616a101e4a169b05f40879a62 |
| SHA1 | 615e4d94f69625dda81dfaec7f14e9ee320a2884 |
| SHA256 | 4d207c5c202c19c4daca3fddb2ae4f747f943a8faf86a947eef580e2f2aee687 |
| SHA512 | 764a271a9cfb674cce41ee7aed0ad75f640ce869efd3c865d1b2d046c9638f4e8d9863a386eba098f5dcedd20ea98bad8bca158b68eb4bdd606d683f31227594 |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\locales\el.pak
| MD5 | 6922aaa87431699787c1489e89af17b9 |
| SHA1 | 6fb7771c9271ca2eeebe025a171bfa62db3527f7 |
| SHA256 | 800545f9134914649da91b90e7df65d8208014c3e12f2be551dfd6722bf84719 |
| SHA512 | 367ef8467631e17e0a71d682f5792a499e8578b6c22af93d9a919d9e78709ec2501df9599624f013b43f4c3e9fb825182193116dbead01874995d322b7a6e4d6 |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\locales\de.pak
| MD5 | ed329b35d10e81f55d611fe8748876f8 |
| SHA1 | 0d998732bb4c4d1faad5a5bc0a21d6c5672418d3 |
| SHA256 | 6facd562add58c4684ef4a40de9b63581fea71c5b83049ed8a2c2a2c929c45ce |
| SHA512 | bd713ff78e375fec3a04ab0c9476c0379f87efc6d18359c2a4d297303d78381081120c371848c8675f1f16dd4ab7284d81e5bfc9ae11ab33e12f96c12d89e764 |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\locales\cs.pak
| MD5 | a934431d469d19a274243f88bb5ac6fb |
| SHA1 | 146845edc7442bf8641bc8b6c1a7e2c021fb01eb |
| SHA256 | 51c36a5acdad5930d8d4f1285315e66b2578f27534d37cd40f0625ee99852c51 |
| SHA512 | 562f07151e5392cbffb6b643c097a08045e9550e56712975d453a2ebaee0745fbfba99d69867eec560d1d58b58dff4f6035811b9d4f0b1b87547efa98f94d55d |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\locales\ca.pak
| MD5 | 01acd6f7a4ea85d8e63099ce1262fbad |
| SHA1 | f654870d442938385b99444c2cacd4d6b60d2a0d |
| SHA256 | b48d1bad676f2e718cbe548302127e0b3567913a2835522d6dd90279a6d2a56a |
| SHA512 | 2bd13eca1a85c219e24a9deb5b767faa5dc7e6b3005d4eb772e3794233ed49cb94c4492538d18acc98658c01d941e35c6f213c18ac5480da151c7545eedeb4ab |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\locales\bg.pak
| MD5 | 945de8a62865092b8100e93ea3e9828d |
| SHA1 | 18d4c83510455ce12a6ac85f9f33af46b0557e2e |
| SHA256 | f0e39893a39ce6133c1b993f1792207830b8670a6eb3185b7e5826d50fea7ba2 |
| SHA512 | 5f61160ff64b9490a1ad5517d8c1bb81af77d349541fed5045e7f6e5053b7d79b7e8f114630bfbe4d5af30258f70a6569462bfa39ccb765f8ca191f82ee04f3f |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\locales\ar.pak
| MD5 | 56f6dc44cc50fc98314d0f88fcc2a962 |
| SHA1 | b1740b05c66622b900e19e9f71e0ff1f3488a98e |
| SHA256 | 7018884d3c60a9c9d727b21545c7dbbcc7b57fa93a16fa97deca0d35891e3465 |
| SHA512 | 594e38739af7351a6117b0659b15f4358bd363d42ffc19e9f5035b57e05e879170bbafe51aece62c13f2ae17c84efb2aed2fc19d2eb9dcb95ebd34211d61674e |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\locales\am.pak
| MD5 | c6ef9c40b48a069b70ed3335b52a9a9c |
| SHA1 | d4a5fb05c4b493ecbb6fc80689b955c30c5cbbb4 |
| SHA256 | 73a1034be12abda7401eb601819657cd7addf011bfd9ce39f115a442bccba995 |
| SHA512 | 33c18b698040cd77162eb05658eca82a08994455865b70d1c08819dfac68f6db6b27d7e818260caa25310ff71cf128239a52c948fde098e75d1a319f478a9854 |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\locales\af.pak
| MD5 | 7e51349edc7e6aed122bfa00970fab80 |
| SHA1 | eb6df68501ecce2090e1af5837b5f15ac3a775eb |
| SHA256 | f528e698b164283872f76df2233a47d7d41e1aba980ce39f6b078e577fd14c97 |
| SHA512 | 69da19053eb95eef7ab2a2d3f52ca765777bdf976e5862e8cebbaa1d1ce84a7743f50695a3e82a296b2f610475abb256844b6b9eb7a23a60b4a9fc4eae40346d |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\vk_swiftshader.dll
| MD5 | 750cbdfb01943e28e08708183ec208b5 |
| SHA1 | 1bee0cd3d0970834b2a47daf384354f243fd1ee0 |
| SHA256 | a6d295dcc3afcb55aa79eac5f896bceb15ccb2b798db3bb076ceeea78073791a |
| SHA512 | dbfdf76f40558ce2f23ca315b8719e283f0f22f46e733f37c2ae237fdafd23cf7962f36547ba1bb2d5b219de11546c3dc06859fac498a7da97df41018c0d80c4 |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\snapshot_blob.bin
| MD5 | 4ebd06bdf6cf8dacf6597586fd1704b5 |
| SHA1 | e6819ef37f99f91468f4b94370a4ab467a075a6d |
| SHA256 | 148e4b85983f0d27adecd9c6431b66379ac5538688f320e89d74ff6d48bb740b |
| SHA512 | 17ed5abe702748b4626b3ee6de4d0916738f095c913c2700eee06b65a2bbcaf72afc1f87af7ce0fcce8bd15fe6881508255d397a346c45a82c7791b9b9833ddf |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\resources.pak
| MD5 | 31c7d4b11ad95dfe539dd098e0fab736 |
| SHA1 | 5418682d939ce8485ecc9125b872c14ffec662c2 |
| SHA256 | a251019eb08f1e695e935d224544bda37c5ae092ba68a89fa1fe3bd19bde4f5c |
| SHA512 | f868a4afa4e0d5c561873d2a728e267f98da2df3fb90966e5736d496b6a24e71769a02b0346b27b7dcce11cbe07248e309f50a89977dc8e5bbc06d6cc31bf738 |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\libEGL.dll
| MD5 | ca5bb0794b7700601e9438283d458665 |
| SHA1 | 7fcf090b19820b9450937be800575c526448b581 |
| SHA256 | 4a8be3b4d9fe790efdce38cff8f312a2f8276908d6703e0c6c37818e217cf1e3 |
| SHA512 | 36ebab858fe7e014837548575389e7df2e86676888e4a9039c736d0f2e6463102e68989b794d949ddb16d9bcce43ce55737fcf2a4b09b1667bf968a9540e9f32 |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\d3dcompiler_47.dll
| MD5 | 2191e768cc2e19009dad20dc999135a3 |
| SHA1 | f49a46ba0e954e657aaed1c9019a53d194272b6a |
| SHA256 | 7353f25dc5cf84d09894e3e0461cef0e56799adbc617fce37620ca67240b547d |
| SHA512 | 5adcb00162f284c16ec78016d301fc11559dd0a781ffbeff822db22efbed168b11d7e5586ea82388e9503b0c7d3740cf2a08e243877f5319202491c8a641c970 |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\chrome_200_percent.pak
| MD5 | 4610337e3332b7e65b73a6ea738b47df |
| SHA1 | 8d824c9cf0a84ab902e8069a4de9bf6c1a9aaf3b |
| SHA256 | c91abf556e55c29d1ea9f560bb17cc3489cb67a5d0c7a22b58485f5f2fbcf25c |
| SHA512 | 039b50284d28dcd447e0a486a099fa99914d29b543093cccda77bbefdd61f7b7f05bb84b2708ae128c5f2d0c0ab19046d08796d1b5a1cff395a0689ab25ccb51 |
C:\Users\Admin\AppData\Local\Temp\nszDE30.tmp\7z-out\chrome_100_percent.pak
| MD5 | acd0fa0a90b43cd1c87a55a991b4fac3 |
| SHA1 | 17b84e8d24da12501105b87452f86bfa5f9b1b3c |
| SHA256 | ccbca246b9a93fa8d4f01a01345e7537511c590e4a8efd5777b1596d10923b4b |
| SHA512 | 3e4c4f31c6c7950d5b886f6a8768077331a8f880d70b905cf7f35f74be204c63200ff4a88fa236abccc72ec0fc102c14f50dd277a30f814f35adfe5a7ae3b774 |
Analysis: behavioral3
Detonation Overview
Submitted
2024-11-21 10:56
Reported
2024-11-21 11:00
Platform
win7-20240903-en
Max time kernel
121s
Max time network
123s
Command Line
Signatures
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Windows\SysWOW64\rundll32.exe |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\rundll32.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\StdUtils.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\StdUtils.dll,#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 808 -s 220
Network
Files
Analysis: behavioral5
Detonation Overview
Submitted
2024-11-21 10:56
Reported
2024-11-21 11:00
Platform
win7-20240903-en
Max time kernel
121s
Max time network
124s
Command Line
Signatures
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Windows\SysWOW64\rundll32.exe |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\rundll32.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2912 -s 220
Network
Files
Analysis: behavioral8
Detonation Overview
Submitted
2024-11-21 10:56
Reported
2024-11-21 11:00
Platform
win10v2004-20241007-en
Max time kernel
146s
Max time network
150s
Command Line
Signatures
Browser Information Discovery
Enumerates system info in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Processes
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\LICENSES.chromium.html
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ffc507f46f8,0x7ffc507f4708,0x7ffc507f4718
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,16162768491553290497,9988710417264766878,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:2
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,16162768491553290497,9988710417264766878,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:3
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,16162768491553290497,9988710417264766878,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16162768491553290497,9988710417264766878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16162768491553290497,9988710417264766878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:1
C:\Windows\System32\CompPkgSrv.exe
C:\Windows\System32\CompPkgSrv.exe -Embedding
C:\Windows\System32\CompPkgSrv.exe
C:\Windows\System32\CompPkgSrv.exe -Embedding
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,16162768491553290497,9988710417264766878,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5412 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,16162768491553290497,9988710417264766878,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5412 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16162768491553290497,9988710417264766878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16162768491553290497,9988710417264766878,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16162768491553290497,9988710417264766878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16162768491553290497,9988710417264766878,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,16162768491553290497,9988710417264766878,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3124 /prefetch:2
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 104.219.191.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 138.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| N/A | 224.0.0.251:5353 | udp | |
| US | 8.8.8.8:53 | 217.106.137.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 197.87.175.4.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 171.39.242.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 98.117.19.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 19.229.111.52.in-addr.arpa | udp |
Files
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
| MD5 | 61cef8e38cd95bf003f5fdd1dc37dae1 |
| SHA1 | 11f2f79ecb349344c143eea9a0fed41891a3467f |
| SHA256 | ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e |
| SHA512 | 6fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d |
\??\pipe\LOCAL\crashpad_4848_IVIWWBRQSEBLTMIP
| MD5 | d41d8cd98f00b204e9800998ecf8427e |
| SHA1 | da39a3ee5e6b4b0d3255bfef95601890afd80709 |
| SHA256 | e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 |
| SHA512 | cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
| MD5 | 0a9dc42e4013fc47438e96d24beb8eff |
| SHA1 | 806ab26d7eae031a58484188a7eb1adab06457fc |
| SHA256 | 58d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151 |
| SHA512 | 868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\f21083c2-e0b5-4ce2-8c29-4e0aa0e4a886.tmp
| MD5 | c2792dbe0c2e417712b4158497756fff |
| SHA1 | 348969de3a6f87f4f7e638c65f98cfe4b5fd3ef9 |
| SHA256 | 6af0b5d3a14079b168dacef09027282a4095b58d86db3fc6c4cbdb330c90fc69 |
| SHA512 | f569b97e59aaa6cfbd131858c6b402125eb197b7a48827318b3b767a4b13acfab9289b13690e38eb99878de5d5067228df5b7e2da602026544128b384fc1a3b7 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT
| MD5 | 6752a1d65b201c13b62ea44016eb221f |
| SHA1 | 58ecf154d01a62233ed7fb494ace3c3d4ffce08b |
| SHA256 | 0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd |
| SHA512 | 9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State
| MD5 | ff75fab38d5ac839144da4564ec50e3d |
| SHA1 | caac5442e6126395e29c11faa120efad20395786 |
| SHA256 | ff2b47552620fa16996fda2441fbb2e29b0d88c5ef79e858a1c3cd6260992ed9 |
| SHA512 | 8e64ddf82a92b16598d8f934f5bca2e1527f98e0da728e8b9a415c04ed19a79805992172b76b573dc22ec32c996b92f0752da48abd9f1fba3da2882aa8d5b2c3 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
| MD5 | 24f5c6bcfae86e23ee23c220808342f8 |
| SHA1 | b814f46e97e2eb3f5725de2d5adf51207aadef3f |
| SHA256 | 3d79579263d0c232d27c614bf173fafbcf83bc63abc1d168b4deea01bcf716a5 |
| SHA512 | 0b6b52f8f560ae4568fbb7f44f6a9914b5638153ef43fdd4301a1df3c5f3e2fe71b329bc7f713e359d39d1a0b940428d47382a905978a45e663f7223c900b430 |
Analysis: behavioral10
Detonation Overview
Submitted
2024-11-21 10:56
Reported
2024-11-21 11:00
Platform
win10v2004-20241007-en
Max time kernel
151s
Max time network
158s
Command Line
Signatures
Hexon family
Hexon stealer
Uses browser remote debugging
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\aka45.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation | C:\Windows\system32\cscript.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\hexon_3f0583a018c9ea2e.exe | N/A |
Drops startup file
| Description | Indicator | Process | Target |
| File created | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\startup.vbs | C:\Users\Admin\AppData\Local\Temp\aka45.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\hexon_3f0583a018c9ea2e.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\aka45.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\aka45.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\hexon_3f0583a018c9ea2e.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\hexon_3f0583a018c9ea2e.exe | N/A |
Reads user/profile data of web browsers
Enumerates processes with tasklist
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\tasklist.exe | N/A |
| N/A | N/A | C:\Windows\system32\tasklist.exe | N/A |
| N/A | N/A | C:\Windows\system32\tasklist.exe | N/A |
| N/A | N/A | C:\Windows\system32\tasklist.exe | N/A |
| N/A | N/A | C:\Windows\system32\tasklist.exe | N/A |
| N/A | N/A | C:\Windows\system32\tasklist.exe | N/A |
| N/A | N/A | C:\Windows\system32\tasklist.exe | N/A |
Browser Information Discovery
Enumerates physical storage devices
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | N/A |
Enumerates system info in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
Kills process with taskkill
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\taskkill.exe | N/A |
| N/A | N/A | C:\Windows\system32\taskkill.exe | N/A |
| N/A | N/A | C:\Windows\system32\taskkill.exe | N/A |
| N/A | N/A | C:\Windows\system32\taskkill.exe | N/A |
| N/A | N/A | C:\Windows\system32\taskkill.exe | N/A |
| N/A | N/A | C:\Windows\system32\taskkill.exe | N/A |
| N/A | N/A | C:\Windows\system32\taskkill.exe | N/A |
| N/A | N/A | C:\Windows\system32\taskkill.exe | N/A |
| N/A | N/A | C:\Windows\system32\taskkill.exe | N/A |
Modifies registry class
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-493223053-2004649691-1575712786-1000\{316C25FB-D2D5-4B77-BA17-FC5857DF10F3} | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\aka45.exe
"C:\Users\Admin\AppData\Local\Temp\aka45.exe"
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "wmic csproduct get uuid"
C:\Windows\System32\Wbem\WMIC.exe
wmic csproduct get uuid
C:\Users\Admin\AppData\Local\Temp\aka45.exe
"C:\Users\Admin\AppData\Local\Temp\aka45.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\unrealgame" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1828 --field-trial-handle=1836,i,13559471466237259029,13406991141122602205,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
C:\Users\Admin\AppData\Local\Temp\aka45.exe
"C:\Users\Admin\AppData\Local\Temp\aka45.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\unrealgame" --mojo-platform-channel-handle=2044 --field-trial-handle=1836,i,13559471466237259029,13406991141122602205,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "tasklist"
C:\Windows\system32\tasklist.exe
tasklist
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "where /r . cookies.sqlite"
C:\Windows\system32\where.exe
where /r . cookies.sqlite
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "tasklist"
C:\Windows\system32\tasklist.exe
tasklist
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "tasklist"
C:\Windows\system32\tasklist.exe
tasklist
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:/Program Files/Google/Chrome/Application/chrome.exe" --remote-debugging-port=9223 --profile-directory=Default --disable-gpu --no-sandbox --window-position=-32000,-32000
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffeeea5cc40,0x7ffeeea5cc4c,0x7ffeeea5cc58
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-sandbox --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --use-gl=angle --use-angle=swiftshader-webgl --field-trial-handle=1988,i,14355283610805524283,3793854381205815755,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1984 /prefetch:2
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --no-appcompat-clear --field-trial-handle=1860,i,14355283610805524283,3793854381205815755,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1992 /prefetch:3
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --no-appcompat-clear --field-trial-handle=2076,i,14355283610805524283,3793854381205815755,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1712 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --no-sandbox --remote-debugging-port=9223 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=2860,i,14355283610805524283,3793854381205815755,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2880 /prefetch:1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --no-sandbox --remote-debugging-port=9223 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=2884,i,14355283610805524283,3793854381205815755,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3064 /prefetch:1
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --no-sandbox --remote-debugging-port=9223 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4012,i,14355283610805524283,3793854381205815755,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4024 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:/Program Files (x86)/Microsoft/Edge/Application/msedge.exe" --remote-debugging-port=9223 --profile-directory=Default --disable-gpu --no-sandbox --window-position=-32000,-32000
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffeeb9946f8,0x7ffeeb994708,0x7ffeeb994718
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,7244740579164983598,9781792203886096871,131072 --no-sandbox --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2124 /prefetch:2
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,7244740579164983598,9781792203886096871,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --mojo-platform-channel-handle=2252 /prefetch:3
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,7244740579164983598,9781792203886096871,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --mojo-platform-channel-handle=2668 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-sandbox --remote-debugging-port=9223 --field-trial-handle=2112,7244740579164983598,9781792203886096871,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-sandbox --remote-debugging-port=9223 --field-trial-handle=2112,7244740579164983598,9781792203886096871,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-sandbox --remote-debugging-port=9223 --field-trial-handle=2112,7244740579164983598,9781792203886096871,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4532 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-sandbox --remote-debugging-port=9223 --field-trial-handle=2112,7244740579164983598,9781792203886096871,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4412 /prefetch:1
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "tasklist"
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "tasklist"
C:\Windows\system32\tasklist.exe
tasklist
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "tasklist"
C:\Windows\system32\tasklist.exe
tasklist
C:\Windows\system32\tasklist.exe
tasklist
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "where /r . *.sqlite"
C:\Windows\system32\where.exe
where /r . *.sqlite
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "taskkill /F /T /IM chrome.exe"
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "taskkill /F /T /IM msedge.exe"
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "taskkill /F /T /IM chrome.exe"
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "taskkill /F /T /IM msedge.exe"
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "taskkill /F /T /IM chrome.exe"
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "taskkill /F /T /IM msedge.exe"
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM EpicGamesLauncher.exe /F"
C:\Windows\system32\taskkill.exe
taskkill /F /T /IM msedge.exe
C:\Windows\system32\taskkill.exe
taskkill /F /T /IM chrome.exe
C:\Windows\system32\taskkill.exe
taskkill /F /T /IM msedge.exe
C:\Windows\system32\taskkill.exe
taskkill /F /T /IM chrome.exe
C:\Windows\system32\taskkill.exe
taskkill /IM EpicGamesLauncher.exe /F
C:\Windows\system32\taskkill.exe
taskkill /F /T /IM chrome.exe
C:\Windows\system32\taskkill.exe
taskkill /F /T /IM msedge.exe
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM javaw.exe /F"
C:\Windows\System32\Conhost.exe
\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\system32\taskkill.exe
taskkill /IM javaw.exe /F
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM Steam.exe /F"
C:\Windows\System32\Conhost.exe
\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\system32\taskkill.exe
taskkill /IM Steam.exe /F
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "tasklist"
C:\Windows\System32\Conhost.exe
\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\system32\tasklist.exe
tasklist
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "wscript "C:\Users\Admin\AppData\Local\Temp\5a4122f69aa994d8.vbs""
C:\Windows\system32\wscript.exe
wscript "C:\Users\Admin\AppData\Local\Temp\5a4122f69aa994d8.vbs"
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "cscript //B "C:\Users\Admin\AppData\Local\Temp\open.vbs""
C:\Windows\System32\Conhost.exe
\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\system32\cscript.exe
cscript //B "C:\Users\Admin\AppData\Local\Temp\open.vbs"
C:\Users\Admin\AppData\Local\Temp\hexon_3f0583a018c9ea2e.exe
"C:\Users\Admin\AppData\Local\Temp\hexon_3f0583a018c9ea2e.exe" HXN-TEST-7E561F93D321 discord
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "%windir%\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid"
C:\Windows\System32\reg.exe
C:\Windows\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\20241021-5008-86qve4.dehgh.png" "
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe /nologo /r:"Microsoft.VisualBasic.dll" /win32manifest:"app.manifest" /out:"screenCapture_1.3.2.exe" "C:\Users\Admin\AppData\Local\Temp\SCREEN~1\SCREEN~1.BAT"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESFFBD.tmp" "c:\Users\Admin\AppData\Local\Temp\screenCapture\CSC10195BCFCFFC4453B6378B7961903328.TMP"
C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe
screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\20241021-5008-86qve4.dehgh.png"
C:\Users\Admin\AppData\Local\Temp\aka45.exe
"C:\Users\Admin\AppData\Local\Temp\aka45.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\Admin\AppData\Roaming\unrealgame" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1284 --field-trial-handle=1836,i,13559471466237259029,13406991141122602205,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 97.17.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 41.134.221.88.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 71.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 149.220.183.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | hexon.fun | udp |
| US | 104.21.27.182:443 | hexon.fun | tcp |
| US | 104.21.27.182:443 | hexon.fun | tcp |
| US | 104.21.27.182:443 | hexon.fun | tcp |
| US | 8.8.8.8:53 | 182.27.21.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 10.180.250.142.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 35.200.250.142.in-addr.arpa | udp |
| US | 8.8.8.8:53 | www.google.com | udp |
| GB | 172.217.16.228:443 | www.google.com | tcp |
| GB | 172.217.16.228:443 | www.google.com | udp |
| US | 8.8.8.8:53 | 228.16.217.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | dns.google | udp |
| US | 8.8.8.8:53 | dns.google | udp |
| US | 8.8.8.8:443 | dns.google | tcp |
| US | 8.8.8.8:53 | 154.239.44.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | api.gofile.io | udp |
| FR | 45.112.123.126:443 | api.gofile.io | tcp |
| US | 8.8.8.8:53 | store4.gofile.io | udp |
| US | 8.8.8.8:53 | 126.123.112.45.in-addr.arpa | udp |
| FR | 31.14.70.245:443 | store4.gofile.io | tcp |
| US | 104.21.27.182:443 | hexon.fun | tcp |
| US | 8.8.8.8:53 | 245.70.14.31.in-addr.arpa | udp |
| US | 104.21.27.182:443 | hexon.fun | tcp |
| US | 104.21.27.182:443 | hexon.fun | tcp |
| US | 104.21.27.182:443 | hexon.fun | tcp |
| US | 8.8.8.8:53 | 18.31.95.13.in-addr.arpa | udp |
| US | 104.21.27.182:443 | hexon.fun | tcp |
| US | 104.21.27.182:443 | hexon.fun | tcp |
| US | 104.21.27.182:443 | hexon.fun | tcp |
| US | 104.21.27.182:443 | hexon.fun | tcp |
| US | 104.21.27.182:443 | hexon.fun | tcp |
| US | 8.8.8.8:53 | 98.117.19.2.in-addr.arpa | udp |
| US | 104.21.27.182:443 | hexon.fun | tcp |
| US | 8.8.8.8:53 | 69.208.201.84.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| N/A | 127.0.0.1:9223 | tcp | |
| N/A | 127.0.0.1:9223 | tcp | |
| N/A | 127.0.0.1:9223 | tcp | |
| N/A | 127.0.0.1:9223 | tcp | |
| US | 8.8.8.8:53 | udp | |
| US | 8.8.8.8:53 | udp | |
| US | 8.8.8.8:53 | udp |
Files
C:\Users\Admin\AppData\Local\Temp\e22fb117-2270-4da5-9716-3cbdc3c65c22.tmp.node
| MD5 | 04bfbfec8db966420fe4c7b85ebb506a |
| SHA1 | 939bb742a354a92e1dcd3661a62d69e48030a335 |
| SHA256 | da2172ce055fa47d6a0ea1c90654f530abed33f69a74d52fab06c4c7653b48fd |
| SHA512 | 4ea97a9a120ed5bee8638e0a69561c2159fc3769062d7102167b0e92b4f1a5c002a761bd104282425f6cee8d0e39dbe7e12ad4e4a38570c3f90f31b65072dd65 |
C:\Users\Admin\AppData\Local\Temp\736f1b37-5067-45e5-a8bd-3714fc87348c.tmp.node
| MD5 | 56192831a7f808874207ba593f464415 |
| SHA1 | e0c18c72a62692d856da1f8988b0bc9c8088d2aa |
| SHA256 | 6aa8763714aa5199a4065259af792292c2a7d6a2c381aa27007255421e5c9d8c |
| SHA512 | c82aa1ef569c232b4b4f98a3789f2390e5f7bf5cc7e73d199fe23a3f636817edfdc2fb49ce7f69169c028a9dd5ab9f63e8f64964bb22424fc08db71e85054a33 |
\??\pipe\crashpad_4536_EERMDNMKENRNFCCN
| MD5 | d41d8cd98f00b204e9800998ecf8427e |
| SHA1 | da39a3ee5e6b4b0d3255bfef95601890afd80709 |
| SHA256 | e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 |
| SHA512 | cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports
| MD5 | d751713988987e9331980363e24189ce |
| SHA1 | 97d170e1550eee4afc0af065b78cda302a97674c |
| SHA256 | 4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945 |
| SHA512 | b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
| MD5 | 37f660dd4b6ddf23bc37f5c823d1c33a |
| SHA1 | 1c35538aa307a3e09d15519df6ace99674ae428b |
| SHA256 | 4e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8 |
| SHA512 | 807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
| MD5 | d7cb450b1315c63b1d5d89d98ba22da5 |
| SHA1 | 694005cd9e1a4c54e0b83d0598a8a0c089df1556 |
| SHA256 | 38355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031 |
| SHA512 | df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
| MD5 | 89db968052c39efe04632df91f2dd217 |
| SHA1 | 538cd3f16a6aa0281549808e25b1ed0e4144ab86 |
| SHA256 | 9618789dfa68b9be677b0ffacda757573a5f68328d3d52abefcf600451ace715 |
| SHA512 | 3092604025fcd5b8e21c1d4569b38160a1bebfa36c5797c9a33db479062f3b791f4ce97e789f39fdaafca435107fefcdb5b93b6d2d6672ebbfde8f8d55490bce |
C:\Users\Admin\AppData\Local\Temp\5a4122f69aa994d8.vbs
| MD5 | d36f0f964e393c9f39a17989cfa6ca13 |
| SHA1 | eafb252b8399c89fc4b12ee2e3aec3de8244de16 |
| SHA256 | d5a405c173fde714f0175182d6b4fd2d9d3124ce792b15947ccda0d46e3c9624 |
| SHA512 | ad178d8e244ac165707adf635a9dd634f3443836d191572861d200fc9051e0c76ebfb3a39c92d96a76ebe08245fa76dd4ecf6aa713a61a517ca1473e0055a82e |
C:\Users\Admin\AppData\Local\Temp\passwords_0.db
| MD5 | a182561a527f929489bf4b8f74f65cd7 |
| SHA1 | 8cd6866594759711ea1836e86a5b7ca64ee8911f |
| SHA256 | 42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914 |
| SHA512 | 9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558 |
C:\Users\Admin\AppData\Local\Temp\open.vbs
| MD5 | 18e987daa5c759137aef3eacce179914 |
| SHA1 | 3399b103ec2fa39f885c56028fe9eba06d9d481b |
| SHA256 | 2ad79c3b3deeef6cd5d0975dde6ec1958f2e3463ff229d3d75536cd1ee3b33bc |
| SHA512 | ddcd43bc9db8692fae31e7175bfafb67b1b7bc48e7f44dd9bc445d08657c1038eb791a0f5055a8e40f4a5a0b78a80185acc8941416125c05e55306be9e61d02b |
C:\Users\Admin\AppData\Local\Temp\pkg\f806f89dc41dde00ca7124dc1e649bdc9b08ff2eff5c891b764f3e5aefa9548c\sqlite3\build\Release\node_sqlite3.node
| MD5 | 66a65322c9d362a23cf3d3f7735d5430 |
| SHA1 | ed59f3e4b0b16b759b866ef7293d26a1512b952e |
| SHA256 | f806f89dc41dde00ca7124dc1e649bdc9b08ff2eff5c891b764f3e5aefa9548c |
| SHA512 | 0a44d12852fc4c74658a49f886c4bc7c715c48a7cb5a3dcf40c9f1d305ca991dd2c2cb3d0b5fd070b307a8f331938c5213188cbb2d27d47737cc1c4f34a1ea21 |
C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat
| MD5 | da0f40d84d72ae3e9324ad9a040a2e58 |
| SHA1 | 4ca7f6f90fb67dce8470b67010aa19aa0fd6253f |
| SHA256 | 818350a4fb4146072a25f0467c5c99571c854d58bec30330e7db343bceca008b |
| SHA512 | 30b7d4921f39c2601d94a3e3bb0e3be79b4b7b505e52523d2562f2e2f32154d555a593df87a71cddb61b98403265f42e0d6705950b37a155dc1d64113c719fd9 |
\??\c:\Users\Admin\AppData\Local\Temp\screenCapture\app.manifest
| MD5 | 8951565428aa6644f1505edb592ab38f |
| SHA1 | 9c4bee78e7338f4f8b2c8b6c0e187f43cfe88bf2 |
| SHA256 | 8814db9e125d0c2b7489f8c7c3e95adf41f992d4397ed718bda8573cb8fb0e83 |
| SHA512 | 7577bad37b67bf13a0d7f9b8b7d6c077ecdfb81a5bee94e06dc99e84cb20db2d568f74d1bb2cef906470b4f6859e00214beacca7d82e2b99126d27820bf3b8f5 |
memory/1772-188-0x0000000000C40000-0x0000000000C4A000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe
| MD5 | 175cd96a8feb517d9f533cd0056b6eda |
| SHA1 | 92eb709e1c8f57b240153a64cc941702fd21450f |
| SHA256 | 5c8dd8e2adb1789d4c285e3beb289960c87d5337f4d1126783e030a2e06b9a65 |
| SHA512 | 2648ac56bc99abad4f483f98929f5b0496edbc90085711e4d4936e35b7e061151dc37818e8e5934a7e461814f8b58bbd50f3beedf49b0d189f772b91b8714ceb |
C:\Users\Admin\AppData\Local\Temp\RESFFBD.tmp
| MD5 | cb0de0a194ec04cc51e0f149fe2402d7 |
| SHA1 | f5e2b4d8705d2e60ed40a5af415448a01156b8c9 |
| SHA256 | eee74486c592845856cc6a0e3e45743d1d0a69ff2d67832ea272f02c1597f967 |
| SHA512 | 8b3bb63ce15b1d7883f72ca6d34c784a673ee6b26f0a7ec424c53a56e3f056937a48559dd07ab251c45987a25ca8ce135f8a4ef1f40db679c9ce1d8e56669119 |
\??\c:\Users\Admin\AppData\Local\Temp\screenCapture\CSC10195BCFCFFC4453B6378B7961903328.TMP
| MD5 | a6f2d21624678f54a2abed46e9f3ab17 |
| SHA1 | a2a6f07684c79719007d434cbd1cd2164565734a |
| SHA256 | ab96911d094b6070cbfb48e07407371ddb41b86e36628b6a10cdb11478192344 |
| SHA512 | 0b286df41c3887eecff5c38cbd6818078313b555ef001151b41ac11b80466b2f4f39da518ab9c51eeff35295cb39d52824de13e026c35270917d7274f764c676 |
C:\Users\Admin\AppData\Local\Temp\20241021-5008-86qve4.dehgh.png
| MD5 | 77c63f211884037c4ec064c8935e8d66 |
| SHA1 | 27a0245c17004c5e34ab789e98afac62ae6cf590 |
| SHA256 | 2500137a2699299e4314ccf6a0fe3185835a7d514edf5a49e53dcccd73165342 |
| SHA512 | 2c297057e426698c52e68387f1854d57a794b122b765711e3bd7ef002e4e2fde3be56a316100e57e5a721def08cec564eceabb03b564ba8567a172a95a825307 |
memory/1444-194-0x0000021BC8B70000-0x0000021BC8B71000-memory.dmp
memory/1444-195-0x0000021BC8B70000-0x0000021BC8B71000-memory.dmp
memory/1444-196-0x0000021BC8B70000-0x0000021BC8B71000-memory.dmp
memory/1444-200-0x0000021BC8B70000-0x0000021BC8B71000-memory.dmp
memory/1444-201-0x0000021BC8B70000-0x0000021BC8B71000-memory.dmp
memory/1444-206-0x0000021BC8B70000-0x0000021BC8B71000-memory.dmp
memory/1444-205-0x0000021BC8B70000-0x0000021BC8B71000-memory.dmp
memory/1444-204-0x0000021BC8B70000-0x0000021BC8B71000-memory.dmp
memory/1444-203-0x0000021BC8B70000-0x0000021BC8B71000-memory.dmp
memory/1444-202-0x0000021BC8B70000-0x0000021BC8B71000-memory.dmp
Analysis: behavioral20
Detonation Overview
Submitted
2024-11-21 10:56
Reported
2024-11-21 11:00
Platform
win7-20240903-en
Max time kernel
119s
Max time network
127s
Command Line
Signatures
Command and Scripting Interpreter: PowerShell
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Processes
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\locales\uk.ps1
Network
Files
memory/2168-4-0x000007FEF558E000-0x000007FEF558F000-memory.dmp
memory/2168-5-0x000000001B640000-0x000000001B922000-memory.dmp
memory/2168-6-0x00000000005E0000-0x00000000005E8000-memory.dmp
memory/2168-7-0x000007FEF52D0000-0x000007FEF5C6D000-memory.dmp
memory/2168-8-0x000007FEF52D0000-0x000007FEF5C6D000-memory.dmp
memory/2168-9-0x000007FEF52D0000-0x000007FEF5C6D000-memory.dmp
memory/2168-10-0x000007FEF52D0000-0x000007FEF5C6D000-memory.dmp
Analysis: behavioral15
Detonation Overview
Submitted
2024-11-21 10:56
Reported
2024-11-21 11:00
Platform
win10v2004-20241007-en
Max time kernel
144s
Max time network
156s
Command Line
Signatures
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\libEGL.dll,#1
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 217.106.137.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.214.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 134.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 196.249.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 200.163.202.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 98.117.19.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
Files
Analysis: behavioral29
Detonation Overview
Submitted
2024-11-21 10:56
Reported
2024-11-21 11:00
Platform
win10v2004-20241007-en
Max time kernel
92s
Max time network
149s
Command Line
Signatures
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Windows\SysWOW64\rundll32.exe |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\rundll32.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 4780 wrote to memory of 1780 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 4780 wrote to memory of 1780 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 4780 wrote to memory of 1780 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsis7z.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsis7z.dll,#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1780 -ip 1780
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1780 -s 612
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 196.249.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 75.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 217.106.137.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 200.163.202.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 171.39.242.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 83.210.23.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 19.229.111.52.in-addr.arpa | udp |
Files
Analysis: behavioral17
Detonation Overview
Submitted
2024-11-21 10:56
Reported
2024-11-21 11:00
Platform
win10v2004-20241007-en
Max time kernel
145s
Max time network
156s
Command Line
Signatures
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\libGLESv2.dll,#1
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 97.17.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 40.134.221.88.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 134.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 196.249.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 212.20.149.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 198.187.3.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 75.117.19.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 83.210.23.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 14.227.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
Files
Analysis: behavioral19
Detonation Overview
Submitted
2024-11-21 10:56
Reported
2024-11-21 11:00
Platform
win10v2004-20241007-en
Max time kernel
149s
Max time network
159s
Command Line
Signatures
Command and Scripting Interpreter: PowerShell
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Processes
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\locales\af.ps1
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 217.106.137.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 73.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 196.249.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 197.87.175.4.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 15.164.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 75.117.19.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.214.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 43.229.111.52.in-addr.arpa | udp |
Files
memory/4888-0-0x00007FF857033000-0x00007FF857035000-memory.dmp
memory/4888-1-0x0000027347A30000-0x0000027347A52000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_3asckyae.vak.ps1
| MD5 | d17fe0a3f47be24a6453e9ef58c94641 |
| SHA1 | 6ab83620379fc69f80c0242105ddffd7d98d5d9d |
| SHA256 | 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7 |
| SHA512 | 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82 |
memory/4888-11-0x00007FF857030000-0x00007FF857AF1000-memory.dmp
memory/4888-12-0x00007FF857030000-0x00007FF857AF1000-memory.dmp
memory/4888-13-0x00007FF857030000-0x00007FF857AF1000-memory.dmp
memory/4888-16-0x00007FF857030000-0x00007FF857AF1000-memory.dmp
Analysis: behavioral7
Detonation Overview
Submitted
2024-11-21 10:56
Reported
2024-11-21 11:00
Platform
win7-20240903-en
Max time kernel
117s
Max time network
136s
Command Line
Signatures
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
Modifies Internet Explorer settings
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 206d1054043cdb01 | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7F2DE691-A7F7-11EF-A087-5EE01BAFE073} = "0" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc500000000002000000000010660000000100002000000027883af60a46f0776bacbddfb90b8ea59cc37484593da5b567ffbe4e01524c97000000000e80000000020000200000002a8e5e566b9dc3c05eece49cc3ddf2b0247852e92be3cf29c463e2bbcd0b025c2000000014cea93f7f019636d5fd559bb78621b50647401640f5818bd046eae8adb4f3c44000000084b5051505ce8ec9e0ed002dcce29602f1226b4123548cafd8678fe895b9448d37e467a563d3fd18138aab127c9fe70ec1a2585d3ac5900995274070f9280b36 | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "438348558" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
Suspicious use of FindShellTrayWindow
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| N/A | N/A | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
| N/A | N/A | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
| N/A | N/A | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
| N/A | N/A | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 3064 wrote to memory of 3068 | N/A | C:\Program Files\Internet Explorer\iexplore.exe | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE |
| PID 3064 wrote to memory of 3068 | N/A | C:\Program Files\Internet Explorer\iexplore.exe | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE |
| PID 3064 wrote to memory of 3068 | N/A | C:\Program Files\Internet Explorer\iexplore.exe | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE |
| PID 3064 wrote to memory of 3068 | N/A | C:\Program Files\Internet Explorer\iexplore.exe | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE |
Processes
C:\Program Files\Internet Explorer\iexplore.exe
"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\LICENSES.chromium.html
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3064 CREDAT:275457 /prefetch:2
Network
| Country | Destination | Domain | Proto |
| US | 204.79.197.200:443 | ieonline.microsoft.com | tcp |
| US | 204.79.197.200:443 | ieonline.microsoft.com | tcp |
| US | 204.79.197.200:443 | ieonline.microsoft.com | tcp |
Files
C:\Users\Admin\AppData\Local\Temp\CabE35E.tmp
| MD5 | 49aebf8cbd62d92ac215b2923fb1b9f5 |
| SHA1 | 1723be06719828dda65ad804298d0431f6aff976 |
| SHA256 | b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f |
| SHA512 | bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | c276f210e11fe39c61df8f83596e209d |
| SHA1 | 39cb8e2646e55e9ef5cd727683b8c21089a170e7 |
| SHA256 | 2376abad0b2665280208952cdbea53146bb4dd4ee14dd6201ca6b8d82bf00bae |
| SHA512 | 5c2177bd74b0d4bdf6dffb4aab84a780f255045452938516c5f2dad63cb76affbe64f7f4eb5e3ef20c6522bfdae66b54708f4031bd1c341b507bf11d4d41341c |
C:\Users\Admin\AppData\Local\Temp\TarE42E.tmp
| MD5 | 4ea6026cf93ec6338144661bf1202cd1 |
| SHA1 | a1dec9044f750ad887935a01430bf49322fbdcb7 |
| SHA256 | 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8 |
| SHA512 | 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | f520f249430ac71e523c81065b96b77e |
| SHA1 | c5d34b045477c5dbfc0e1bc15c998a71a388cb30 |
| SHA256 | 98bbd98f8336af7c1cd671598f4c187a34ee3c2ca867ad8a7b60be20cc4ebf87 |
| SHA512 | 355b1622f202accb59c7e2225aacd271e935e56d1bf2ebe6b33aa452404e1a2e796d474169d8a235c9d11ee538afb89a79dc391e3a951b9f34940a39e4502ff1 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 2c957cf36022432222118c033cb14dae |
| SHA1 | 4dc6c047723dda3c2a942e6c1cf00c4f3e57f86c |
| SHA256 | 9cfed8b6ed59bce016771b4146fc42d9ebf4021ecea76ae804db709d37ad045d |
| SHA512 | 883091a88e7550a1d24e2625e97cfd114b848b0ce34e8e6ca0c224ccae9ad418cf04225978b8f6768d3ad1a445d61a67b26a6165a4ce4bded702ad0698700f34 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 6799a0f64fa22034ef398de7a093e6fe |
| SHA1 | 02b50c608a3d4e25bac86292cb81665f09464c8f |
| SHA256 | 12a8d010c3717fd5483c8796e8990decd2b2c1d2490c2178f5e8e6ce7ab8cd68 |
| SHA512 | 3f278a89c1e0d9fd3d7304982190aa5af1418430da51370400c181dfd042542fe71199eddff0fc9a2915475c2f8d3c87b0a0b01c3a330027b4780321f5a0fa21 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 72c60524e7428557611a8eeac8f246e0 |
| SHA1 | 5c498832b0db9c9bd5f152694669ab4cad7e695a |
| SHA256 | dcb48ec15cde1bf648c558f4a33d9f531fd8136806fb94e93035e43be9a97aff |
| SHA512 | 92676588fac4c5ac5fb38b6d07cf31dab53bf9679bf23eff6d42aec6f07cfde3408da067f05c6a83a4cb16b7b2a32d49f2eb3b16520ec7177c25d8d4c5a52a14 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | d4f92df06b6948f9620ffd7315e7eac2 |
| SHA1 | d1d9ac60013d22493d7a5c862ffc9fea03ba3046 |
| SHA256 | 76e4dd2f2a2cca1c1fe603daf21466c95657356f7ef87e9afb0aab14d02b7f6d |
| SHA512 | daec4ce200152a602c75c484312cf5c6a66828a0a3c3aeab3022cb2ea9bd4c577abc5388b40d96eb8237704588e4b8c48f4e464e2aaac7dc2e38b1fd9bc09912 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | f3a78abd9f25e54f1a288ac625df3054 |
| SHA1 | ff02a5ba20748a7a00957c1f3145caf585ae106a |
| SHA256 | 69808b946bd0edd450f8c85879469673b7b93d9766293ab071cd0eac047d73d4 |
| SHA512 | c88627d1bcd0ebad997cd42ef3b776e9bbf8cb348901342cd64c0bafb314ef9b17c8a4c9dc3891a675019b12e635492b4aa5d377ce1e73512dd6931d62d41687 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | a2d6cc995427367baf1513b589dcfb8d |
| SHA1 | 84ef37fb708ca2a32135cec89c5522927704bf7a |
| SHA256 | 306a5da621f7427e0ad4b1a06c7c3f2f32cb9fe3050b650b3dda2ea28cd6cc4d |
| SHA512 | 0feccec3d7b98fa610323a477851f3134831a3ce6b82413004389a359f31dbc62904141f566fd792dc77f7847b73321d060c38d4f30568c5ddad5d13c380b581 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 944b28bb8dfea2c6eab50706ce00a449 |
| SHA1 | 96f9b5816e32e4c7facdc4f51eecfb3e8f857665 |
| SHA256 | 2c61acffbf22ca6fd0658d013434008d480de543d1db814b4790d328adc9d669 |
| SHA512 | ec2fabb38067c40e7b0010fa3e786421bb5d90e7fdc1ace9ce7454a124b3ae14c09119e990d022d4104c76519fe0522acf65c85e1c6f2da534f9586085a11dd5 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | a25aa7db7de4666012a3d6b12b285243 |
| SHA1 | 98530f0d01acf733c4c7d46e9e3b3c7b831e6bb9 |
| SHA256 | 0874e7b567199a00cbd4490bbc6f4c4d4e19b630d2b7a1960809a9e81cb504d0 |
| SHA512 | fd73e2bb3314e871a815bf393ded4056cabc078f97d711194c26691f65afbe2bbffda77f29c55032e831c9498b442a8ce4e653fe8c122f5cf7dba4a8a551c09c |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 6411f365a148ccbb8c0cf1fb34d5ae70 |
| SHA1 | 6eb3c8f665a5aecf1bfd23c8f3bf28b73f45f2c9 |
| SHA256 | fb088a8caed52a9229598bc5c76b371e2f2d51479ab4564aaab5af08b459ed0c |
| SHA512 | e8a07b4f12584f20d8e3872a79f02a28fda0a949af5fceb343d6aa52e6ec53a4060dc8707c871a74bb41c302e66ca71942c781d638e670d3b32bf388e632bde4 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | f77018a5c41d2245e2858dc110cf8100 |
| SHA1 | e6efeba4da7343500012bd3aa28c269c8e37fd4b |
| SHA256 | 7c0a9f94b3e17df33a48974db2f536108aa464863b800385c7cafafe9528f7df |
| SHA512 | c3561d69fdd3d006603e289251b3090469a1002aea0a169f21f299c32c9c285c7136b408ce6f2d0f3ef5fe132fe734b78ead5c6e2942f4accf421c677e0233ba |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 612ec3772e1c905e2dcbac31783cc3f3 |
| SHA1 | 4fb546a420dc55b653627ffee5ed40eb45bce381 |
| SHA256 | 05a32c12fcda173f3bcdb555b7fd04bbe795d25e33174da7c69c41e6d8a41073 |
| SHA512 | d9df8494b1d1490bc7f75d9ccdf04246302651fa508ef9068fb7fc66882a5986a5859cbe92f14e3954029a25be6f4376b04ecb063d683f439600a519f08229cf |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | cc2cfee78f68c7f8a11640e59dceeaf1 |
| SHA1 | 05d3bc6ea575b6d4d91331e5d0370f27af5474b1 |
| SHA256 | e82018149b0b48c2ace3aff0aa222ec9e0db6f8cb734a2b0f62fe15e9dd9f106 |
| SHA512 | 7fdb6bd77605231b18019c7e0ed242218cc7f0c8c0111e51743f7322cb4d3fb33e39d7fb528b5b6152d0c231238837b36138dc373fa4891ad9f4710b84d23468 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 359336f827ae08a1ace0cf15b8c13d8b |
| SHA1 | 5dc3dbfc43dc5e732eba5bf4e1d3d419de259853 |
| SHA256 | cfe9940880c912d9d27b1dfd60b761e2a510357985230f0889acf232b85e3b9f |
| SHA512 | 0262c7c4bf43800d00efccb102f231c58d1a0d6d3977dc2d2a5d8986a2c788c25b4fb1fc2f0ef892ff99f95d9876d7b426d15cc175fc8d4512181687622c985b |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | fd8e52693530427ce87c3facb2a3a5d5 |
| SHA1 | eb591309d81e32996835382d86e9ae8b402f6ff2 |
| SHA256 | 6b69644eb712ec0724fbbdc38bb534cbe9ae19181fe2dae71f797fee9ab2cca0 |
| SHA512 | 6a61c19270aa5888aa4231422b7e6b335677cdea44e562556bbde713f2dfdbf41db1649952dc8cce932dd65e1c67f79e319afc16e30b9a356568cf88bdbdb242 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 96921034866c8f15885b2da50b8d03ea |
| SHA1 | 324d48ab29348f96e147f7016f66d8fa6044e683 |
| SHA256 | 8a42bb57e007e277143b47ebee2121e1a3fbd33e54055242da2aa0b6c6ec5cc9 |
| SHA512 | 28f8991c79fcab0eaa3d049b10f8d77b6eb867744888b6524534e9229aa8a1c934d7a69b83e19d3394ab0281fa5f8e1dd09e22d42dd397eec9ff3d785fb46da8 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 03fb02f36cc24507be3e2c08b54ecd2d |
| SHA1 | 8aec3ff60b761fa0a9ad501301d8a34437d710bd |
| SHA256 | 721ef99c721ada0296470fcc04126ae527c915acd9891d47f98a919dd1971f1b |
| SHA512 | ec99a99af7dfb9dd3c678ab298d1eadb2f575cee57a0c9ef3937235bc3baefe820a6435c02c4eb95dfcaf007362f6751d32f51d756e5ac49ebc36a2a62bbfa4b |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | be9883c7022a6efb7ea251d54e8fa941 |
| SHA1 | a7e1d18a0c95248d133f71ea790b92a82dfb2693 |
| SHA256 | 45aad296789412709d2db372f854e06ee87c93b59e6dfe6c88883962a40fbe00 |
| SHA512 | 1d8a24808c712d836ba22336915c46a65802d75939f5c3e8576023850aff88362a51b32c3986aa34ece89f49e112b40cd6c0eebbc636fe66f10d4a0eba545bb9 |
Analysis: behavioral16
Detonation Overview
Submitted
2024-11-21 10:56
Reported
2024-11-21 11:00
Platform
win7-20241023-en
Max time kernel
119s
Max time network
129s
Command Line
Signatures
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\libGLESv2.dll,#1
Network
Files
Analysis: behavioral12
Detonation Overview
Submitted
2024-11-21 10:56
Reported
2024-11-21 11:00
Platform
win7-20241010-en
Max time kernel
122s
Max time network
139s
Command Line
Signatures
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\ffmpeg.dll,#1
Network
Files
Analysis: behavioral13
Detonation Overview
Submitted
2024-11-21 10:56
Reported
2024-11-21 11:00
Platform
win10v2004-20241007-en
Max time kernel
144s
Max time network
160s
Command Line
Signatures
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\ffmpeg.dll,#1
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 217.106.137.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 17.160.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 154.239.44.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 200.163.202.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 198.187.3.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.214.232.199.in-addr.arpa | udp |
Files
Analysis: behavioral14
Detonation Overview
Submitted
2024-11-21 10:56
Reported
2024-11-21 11:00
Platform
win7-20240708-en
Max time kernel
117s
Max time network
125s
Command Line
Signatures
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\libEGL.dll,#1
Network
Files
Analysis: behavioral18
Detonation Overview
Submitted
2024-11-21 10:56
Reported
2024-11-21 11:00
Platform
win7-20240903-en
Max time kernel
121s
Max time network
129s
Command Line
Signatures
Command and Scripting Interpreter: PowerShell
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Processes
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\locales\af.ps1
Network
Files
memory/2344-4-0x000007FEF5AAE000-0x000007FEF5AAF000-memory.dmp
memory/2344-7-0x000007FEF57F0000-0x000007FEF618D000-memory.dmp
memory/2344-8-0x000007FEF57F0000-0x000007FEF618D000-memory.dmp
memory/2344-6-0x00000000022C0000-0x00000000022C8000-memory.dmp
memory/2344-9-0x000007FEF57F0000-0x000007FEF618D000-memory.dmp
memory/2344-5-0x000000001B550000-0x000000001B832000-memory.dmp
memory/2344-10-0x000007FEF57F0000-0x000007FEF618D000-memory.dmp
memory/2344-11-0x000007FEF57F0000-0x000007FEF618D000-memory.dmp
Analysis: behavioral25
Detonation Overview
Submitted
2024-11-21 10:56
Reported
2024-11-21 11:00
Platform
win10v2004-20241007-en
Max time kernel
147s
Max time network
157s
Command Line
Signatures
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\vk_swiftshader.dll,#1
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 104.219.191.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 40.134.221.88.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 64.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 154.239.44.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 196.249.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 212.20.149.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 15.164.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 75.117.19.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 88.210.23.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 48.229.111.52.in-addr.arpa | udp |
Files
Analysis: behavioral26
Detonation Overview
Submitted
2024-11-21 10:56
Reported
2024-11-21 11:01
Platform
win7-20241010-en
Max time kernel
7s
Max time network
20s
Command Line
Signatures
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 3008 wrote to memory of 2552 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\system32\WerFault.exe |
| PID 3008 wrote to memory of 2552 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\system32\WerFault.exe |
| PID 3008 wrote to memory of 2552 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\system32\WerFault.exe |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\vulkan-1.dll,#1
C:\Windows\system32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 3008 -s 92
Network
Files
Analysis: behavioral27
Detonation Overview
Submitted
2024-11-21 10:56
Reported
2024-11-21 11:00
Platform
win10v2004-20241007-en
Max time kernel
145s
Max time network
156s
Command Line
Signatures
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\vulkan-1.dll,#1
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 104.219.191.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 22.160.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 217.106.137.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 197.87.175.4.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.31.95.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 75.117.19.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 43.229.111.52.in-addr.arpa | udp |
Files
Analysis: behavioral9
Detonation Overview
Submitted
2024-11-21 10:56
Reported
2024-11-21 11:00
Platform
win7-20240903-en
Max time kernel
121s
Max time network
126s
Command Line
Signatures
Processes
C:\Users\Admin\AppData\Local\Temp\aka45.exe
"C:\Users\Admin\AppData\Local\Temp\aka45.exe"
Network
Files
Analysis: behavioral22
Detonation Overview
Submitted
2024-11-21 10:56
Reported
2024-11-21 11:00
Platform
win7-20240903-en
Max time kernel
120s
Max time network
125s
Command Line
Signatures
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\resources\elevate.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\resources\elevate.exe
"C:\Users\Admin\AppData\Local\Temp\resources\elevate.exe"
Network
Files
Analysis: behavioral24
Detonation Overview
Submitted
2024-11-21 10:56
Reported
2024-11-21 11:00
Platform
win7-20240903-en
Max time kernel
118s
Max time network
124s
Command Line
Signatures
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2516 wrote to memory of 2336 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\system32\WerFault.exe |
| PID 2516 wrote to memory of 2336 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\system32\WerFault.exe |
| PID 2516 wrote to memory of 2336 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\system32\WerFault.exe |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\vk_swiftshader.dll,#1
C:\Windows\system32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 2516 -s 80