Analysis
-
max time kernel
603s -
max time network
612s -
platform
windows11-21h2_x64 -
resource
win11-20241023-en -
resource tags
arch:x64arch:x86image:win11-20241023-enlocale:en-usos:windows11-21h2-x64system -
submitted
22-11-2024 12:48
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://samples.vx-underground.org/Samples/VirusSign%20Collection/2024.01/VirusSign.2024.01.23.7z
Resource
win11-20241023-en
General
-
Target
https://samples.vx-underground.org/Samples/VirusSign%20Collection/2024.01/VirusSign.2024.01.23.7z
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 728be67df4d1fdec24614f73db544291.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mmkbllhg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mmkbllhg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad a9faec2a2e4fe191d4fdb072edb84440.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" a9faec2a2e4fe191d4fdb072edb84440.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 728be67df4d1fdec24614f73db544291.exe -
Bdaejec family
-
Detects Bdaejec Backdoor. 2 IoCs
Bdaejec is backdoor written in C++.
resource yara_rule behavioral1/memory/1488-928-0x0000000000E70000-0x0000000000E79000-memory.dmp family_bdaejec_backdoor behavioral1/memory/1488-4964-0x0000000000E70000-0x0000000000E79000-memory.dmp family_bdaejec_backdoor -
Modifies firewall policy service 3 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules mDNSResponder.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4248760313-3670024077-2384670640-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4248760313-3670024077-2384670640-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cb45cab9f89fc82f0fbf1a07821249de.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rllvkse.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 722cf4067e0a696f3b5d86cad4017149.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d23b3a3cb8eb96acd265bbc526bb2ce3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoolsv.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoolsv.exe -
Renames multiple (63) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Manipulates Digital Signatures 1 TTPs 1 IoCs
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4248760313-3670024077-2384670640-1000\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\State = "146944" installer.tmp -
Modifies Windows Firewall 2 TTPs 3 IoCs
pid Process 8780 netsh.exe 9088 netsh.exe 7204 netsh.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d23b3a3cb8eb96acd265bbc526bb2ce3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cb45cab9f89fc82f0fbf1a07821249de.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rllvkse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rllvkse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 722cf4067e0a696f3b5d86cad4017149.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cb45cab9f89fc82f0fbf1a07821249de.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d23b3a3cb8eb96acd265bbc526bb2ce3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 722cf4067e0a696f3b5d86cad4017149.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorer.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 64 IoCs
pid Process 1512 2ae2c695ce895e44282d9cf2e561c549.exe 3408 2c8a126b7b205988f4c0748cd356b5cb.exe 848 8dc1ad3817c1ff1c7e22ab09fde6ddc8.exe 4880 8dc1ad3817c1ff1c7e22ab09fde6ddc8.tmp 3932 phpmaildelivery.exe 1396 52af1dae1bd1bff12d7f702c4c2004a8.exe 4896 60e4117cf4491d1402bc734afaba7fbd.exe 3000 722cf4067e0a696f3b5d86cad4017149.exe 3972 852dc0ab014f67ef4a792ce1dbcdaca6.exe 1840 2497a47d8190a5553b77795dbe6426cf.exe 4952 89412e1256f3b01fa57b46f3a6e57b95.exe 3388 a2bfa3c1d83e416940aa1bbb91f1f5ef.exe 4600 a3d6b86ae0f03599df8c0deaed2f3e2c.exe 4988 c1dc90eefa0eeca09d3ad2241484a220.exe 3464 alg.exe 920 d23b3a3cb8eb96acd265bbc526bb2ce3.exe 1488 gxFiQa.exe 2008 explorer.exe 2812 dac753da9ca30b07599f4c896459c29f.exe 1004 xqdliiuieswb.exe 2284 DiagnosticsHub.StandardCollector.Service.exe 3268 ddf78bfc06a60145fa3fecda7fb6e2b8.exe 3696 install.exe 3852 spoolsv.exe 756 52af1dae1bd1bff12d7f702c4c2004a8.exe 1824 fxssvc.exe 3548 elevation_service.exe 2288 maintenanceservice.exe 3272 svchost.exe 5068 msdtc.exe 424 52af1dae1bd1bff12d7f702c4c2004a8.exe 3344 OSE.EXE 904 PerceptionSimulationService.exe 4864 spoolsv.exe 4780 perfhost.exe 3360 locator.exe 2220 SensorDataService.exe 488 snmptrap.exe 3132 spectrum.exe 5072 ssh-agent.exe 3492 TieringEngineService.exe 4260 AgentService.exe 2784 rllvkse.exe 236 vds.exe 2472 vssvc.exe 2920 wbengine.exe 3636 WmiApSrv.exe 2300 SearchIndexer.exe 5436 916de7a46e1cdff12ded01aef1384cef.exe 5444 cb45cab9f89fc82f0fbf1a07821249de.exe 5796 916de7a46e1cdff12ded01aef1384cef.exe 5948 PerceptionSimulationService.exe 6056 916de7a46e1cdff12ded01aef1384cef.exe 6084 916de7a46e1cdff12ded01aef1384cef.exe 5140 msiexec.exe 1888 installer.exe 5924 installer.tmp 7656 MsiExec.exe 8152 MsiExec.exe 8232 mDNSResponder.exe 2592 Process not Found 8116 WXCastService.exe 6356 PinTaskbarTool.exe 4700 spectrum.exe -
Loads dropped DLL 64 IoCs
pid Process 4880 8dc1ad3817c1ff1c7e22ab09fde6ddc8.tmp 4880 8dc1ad3817c1ff1c7e22ab09fde6ddc8.tmp 4880 8dc1ad3817c1ff1c7e22ab09fde6ddc8.tmp 3696 install.exe 1888 installer.exe 5924 installer.tmp 5924 installer.tmp 5924 installer.tmp 7508 msiexec.exe 7656 MsiExec.exe 7656 MsiExec.exe 7656 MsiExec.exe 3116 MsiExec.exe 3116 MsiExec.exe 3116 MsiExec.exe 8044 MsiExec.exe 8044 MsiExec.exe 8152 MsiExec.exe 8204 MsiExec.exe 8204 MsiExec.exe 3932 phpmaildelivery.exe 7204 netsh.exe 8116 WXCastService.exe 8116 WXCastService.exe 8116 WXCastService.exe 8116 WXCastService.exe 8116 WXCastService.exe 8780 netsh.exe 9088 netsh.exe 1396 52af1dae1bd1bff12d7f702c4c2004a8.exe 1396 52af1dae1bd1bff12d7f702c4c2004a8.exe 6356 PinTaskbarTool.exe 3972 852dc0ab014f67ef4a792ce1dbcdaca6.exe 1396 52af1dae1bd1bff12d7f702c4c2004a8.exe 1396 52af1dae1bd1bff12d7f702c4c2004a8.exe 1396 52af1dae1bd1bff12d7f702c4c2004a8.exe 1396 52af1dae1bd1bff12d7f702c4c2004a8.exe 1396 52af1dae1bd1bff12d7f702c4c2004a8.exe 1396 52af1dae1bd1bff12d7f702c4c2004a8.exe 1396 52af1dae1bd1bff12d7f702c4c2004a8.exe 1396 52af1dae1bd1bff12d7f702c4c2004a8.exe 1396 52af1dae1bd1bff12d7f702c4c2004a8.exe 1396 52af1dae1bd1bff12d7f702c4c2004a8.exe 1396 52af1dae1bd1bff12d7f702c4c2004a8.exe 1396 52af1dae1bd1bff12d7f702c4c2004a8.exe 1396 52af1dae1bd1bff12d7f702c4c2004a8.exe 1396 52af1dae1bd1bff12d7f702c4c2004a8.exe 1396 52af1dae1bd1bff12d7f702c4c2004a8.exe 1396 52af1dae1bd1bff12d7f702c4c2004a8.exe 1396 52af1dae1bd1bff12d7f702c4c2004a8.exe 1396 52af1dae1bd1bff12d7f702c4c2004a8.exe 1396 52af1dae1bd1bff12d7f702c4c2004a8.exe 1396 52af1dae1bd1bff12d7f702c4c2004a8.exe 1396 52af1dae1bd1bff12d7f702c4c2004a8.exe 1396 52af1dae1bd1bff12d7f702c4c2004a8.exe 1396 52af1dae1bd1bff12d7f702c4c2004a8.exe 1396 52af1dae1bd1bff12d7f702c4c2004a8.exe 1396 52af1dae1bd1bff12d7f702c4c2004a8.exe 1396 52af1dae1bd1bff12d7f702c4c2004a8.exe 1396 52af1dae1bd1bff12d7f702c4c2004a8.exe 1396 52af1dae1bd1bff12d7f702c4c2004a8.exe 1396 52af1dae1bd1bff12d7f702c4c2004a8.exe 9456 746ab69b0b0036489f96e23bba1ce9da.exe 9508 WerFault.exe -
Modifies file permissions 1 TTPs 3 IoCs
pid Process 8784 icacls.exe 8744 icacls.exe 8928 icacls.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/3000-808-0x0000000000400000-0x0000000000A05000-memory.dmp themida behavioral1/memory/920-823-0x0000000000400000-0x0000000000A51000-memory.dmp themida behavioral1/files/0x001a00000002accb-829.dat themida behavioral1/memory/2008-986-0x0000000000400000-0x0000000000A05000-memory.dmp themida behavioral1/memory/3852-1044-0x0000000000400000-0x0000000000A05000-memory.dmp themida behavioral1/memory/3852-1136-0x0000000000400000-0x0000000000A05000-memory.dmp themida behavioral1/memory/3000-1135-0x0000000000400000-0x0000000000A05000-memory.dmp themida behavioral1/files/0x001a00000002ada3-1139.dat themida behavioral1/memory/2008-1260-0x0000000000400000-0x0000000000A05000-memory.dmp themida -
resource yara_rule behavioral1/files/0x001c00000002ab2d-613.dat vmprotect behavioral1/memory/1512-654-0x0000000000400000-0x0000000001BC9000-memory.dmp vmprotect -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" 52af1dae1bd1bff12d7f702c4c2004a8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA d23b3a3cb8eb96acd265bbc526bb2ce3.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorer.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spoolsv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spoolsv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rllvkse.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cb45cab9f89fc82f0fbf1a07821249de.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 722cf4067e0a696f3b5d86cad4017149.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: 746ab69b0b0036489f96e23bba1ce9da.exe File opened (read-only) \??\K: SearchIndexer.exe File opened (read-only) \??\I: SearchIndexer.exe File opened (read-only) \??\q: SearchIndexer.exe File opened (read-only) \??\w: SearchIndexer.exe File opened (read-only) \??\I: install.exe File opened (read-only) \??\J: install.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\K: SearchIndexer.exe File opened (read-only) \??\B: SearchIndexer.exe File opened (read-only) \??\Q: SearchIndexer.exe File opened (read-only) \??\Z: SearchIndexer.exe File opened (read-only) \??\a: SearchIndexer.exe File opened (read-only) \??\x: SearchIndexer.exe File opened (read-only) \??\Z: SearchIndexer.exe File opened (read-only) \??\U: 52af1dae1bd1bff12d7f702c4c2004a8.exe File opened (read-only) \??\E: SearchIndexer.exe File opened (read-only) \??\r: SearchIndexer.exe File opened (read-only) \??\B: SearchIndexer.exe File opened (read-only) \??\y: SearchIndexer.exe File opened (read-only) \??\J: 52af1dae1bd1bff12d7f702c4c2004a8.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\i: SearchIndexer.exe File opened (read-only) \??\m: SearchIndexer.exe File opened (read-only) \??\O: SearchIndexer.exe File opened (read-only) \??\v: SearchIndexer.exe File opened (read-only) \??\e: SearchIndexer.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\E: 746ab69b0b0036489f96e23bba1ce9da.exe File opened (read-only) \??\G: 746ab69b0b0036489f96e23bba1ce9da.exe File opened (read-only) \??\U: SearchIndexer.exe File opened (read-only) \??\Q: 52af1dae1bd1bff12d7f702c4c2004a8.exe File opened (read-only) \??\Z: 52af1dae1bd1bff12d7f702c4c2004a8.exe File opened (read-only) \??\W: SearchIndexer.exe File opened (read-only) \??\o: SearchIndexer.exe File opened (read-only) \??\X: SearchIndexer.exe File opened (read-only) \??\M: SearchIndexer.exe File opened (read-only) \??\w: SearchIndexer.exe File opened (read-only) \??\Z: SearchIndexer.exe File opened (read-only) \??\l: SearchIndexer.exe File opened (read-only) \??\H: SearchIndexer.exe File opened (read-only) \??\D: SearchIndexer.exe File opened (read-only) \??\Q: install.exe File opened (read-only) \??\A: SearchIndexer.exe File opened (read-only) \??\s: SearchIndexer.exe File opened (read-only) \??\P: SearchIndexer.exe File opened (read-only) \??\N: SearchIndexer.exe File opened (read-only) \??\H: install.exe File opened (read-only) \??\S: install.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\q: SearchIndexer.exe File opened (read-only) \??\T: SearchIndexer.exe File opened (read-only) \??\B: 52af1dae1bd1bff12d7f702c4c2004a8.exe File opened (read-only) \??\g: SearchIndexer.exe File opened (read-only) \??\N: install.exe File opened (read-only) \??\F: install.exe File opened (read-only) \??\S: SearchIndexer.exe File opened (read-only) \??\J: 746ab69b0b0036489f96e23bba1ce9da.exe File opened (read-only) \??\h: SearchIndexer.exe File opened (read-only) \??\P: SearchIndexer.exe File opened (read-only) \??\p: SearchIndexer.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\O: 746ab69b0b0036489f96e23bba1ce9da.exe File opened (read-only) \??\M: SearchIndexer.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\FxsTmp\american beastiality [free] titts .zip.exe 52af1dae1bd1bff12d7f702c4c2004a8.exe File opened for modification C:\Windows\system32\SgrmBroker.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\AppVClient.exe OSE.EXE File opened for modification C:\Windows\system32\AgentService.exe spectrum.exe File opened for modification C:\Windows\system32\SearchIndexer.exe msiexec.exe File opened for modification C:\Windows\System32\OpenSSH\ssh-agent.exe PerceptionSimulationService.exe File opened for modification C:\Windows\system32\AgentService.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\dllhost.exe OSE.EXE File created C:\Windows\SysWOW64\dnssd.dll msiexec.exe File opened for modification C:\Windows\System32\SensorDataService.exe spectrum.exe File opened for modification C:\Windows\system32\fxssvc.exe DiagnosticsHub.StandardCollector.Service.exe File created C:\Windows\System32\DriverStore\Temp\animal action lesbian .zip.exe 52af1dae1bd1bff12d7f702c4c2004a8.exe File opened for modification C:\Windows\system32\AgentService.exe PerceptionSimulationService.exe File opened for modification C:\Windows\system32\fxssvc.exe spectrum.exe File opened for modification C:\Windows\system32\fxssvc.exe elevation_service.exe File opened for modification C:\Windows\system32\AgentService.exe SearchIndexer.exe File opened for modification C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe PerceptionSimulationService.exe File opened for modification C:\Windows\System32\SensorDataService.exe PerceptionSimulationService.exe File opened for modification C:\Windows\system32\dllhost.exe 60e4117cf4491d1402bc734afaba7fbd.exe File opened for modification C:\Windows\system32\msiexec.exe 60e4117cf4491d1402bc734afaba7fbd.exe File opened for modification C:\Windows\system32\vssvc.exe 60e4117cf4491d1402bc734afaba7fbd.exe File created C:\Windows\SysWOW64\IME\SHARED\russian xxx big balls (Britney,Janette).mpeg.exe 52af1dae1bd1bff12d7f702c4c2004a8.exe File opened for modification C:\Windows\system32\spectrum.exe SearchIndexer.exe File opened for modification C:\Windows\system32\AppVClient.exe 60e4117cf4491d1402bc734afaba7fbd.exe File opened for modification C:\Windows\system32\AppVClient.exe SearchIndexer.exe File opened for modification C:\Windows\System32\SensorDataService.exe msiexec.exe File opened for modification C:\Windows\system32\AppVClient.exe spectrum.exe File opened for modification C:\Windows\system32\SgrmBroker.exe msiexec.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Caches\cversions.3.db spectrum.exe File opened for modification C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe OSE.EXE File opened for modification C:\Windows\system32\fxssvc.exe OSE.EXE File opened for modification C:\Windows\System32\OpenSSH\ssh-agent.exe SearchIndexer.exe File created C:\Windows\SysWOW64\Mjehfoqi.exe a9faec2a2e4fe191d4fdb072edb84440.exe File opened for modification C:\Windows\system32\dllhost.exe ssh-agent.exe File opened for modification C:\Windows\System32\OpenSSH\ssh-agent.exe spectrum.exe File opened for modification C:\Windows\system32\AppVClient.exe PerceptionSimulationService.exe File opened for modification C:\Windows\System32\SensorDataService.exe PerceptionSimulationService.exe File opened for modification C:\Windows\system32\SgrmBroker.exe PerceptionSimulationService.exe File opened for modification C:\Windows\system32\msiexec.exe perfhost.exe File created C:\Windows\system32\dnssd.dll msiexec.exe File opened for modification C:\Windows\system32\SgrmBroker.exe spectrum.exe File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe File opened for modification C:\Windows\system32\SgrmBroker.exe 60e4117cf4491d1402bc734afaba7fbd.exe File opened for modification C:\Windows\system32\TieringEngineService.exe 60e4117cf4491d1402bc734afaba7fbd.exe File opened for modification C:\Windows\system32\AgentService.exe 60e4117cf4491d1402bc734afaba7fbd.exe File opened for modification C:\Windows\system32\SgrmBroker.exe PerceptionSimulationService.exe File opened for modification C:\Windows\system32\AgentService.exe spectrum.exe File opened for modification C:\Windows\system32\locator.exe 60e4117cf4491d1402bc734afaba7fbd.exe File opened for modification C:\Windows\System32\OpenSSH\ssh-agent.exe 60e4117cf4491d1402bc734afaba7fbd.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\lesbian public .mpg.exe 52af1dae1bd1bff12d7f702c4c2004a8.exe File opened for modification C:\Windows\system32\dllhost.exe SearchIndexer.exe File opened for modification C:\Windows\system32\fxssvc.exe SearchIndexer.exe File opened for modification C:\Windows\system32\AppVClient.exe spectrum.exe File opened for modification C:\Windows\system32\dllhost.exe PerceptionSimulationService.exe File opened for modification C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe PerceptionSimulationService.exe File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\system32\dllhost.exe DiagnosticsHub.StandardCollector.Service.exe File created C:\Windows\SysWOW64\IME\SHARED\indian handjob licking sm .avi.exe 52af1dae1bd1bff12d7f702c4c2004a8.exe File opened for modification C:\Windows\system32\fxssvc.exe spectrum.exe File opened for modification C:\Windows\system32\msiexec.exe SearchIndexer.exe File opened for modification C:\Windows\System32\msdtc.exe 60e4117cf4491d1402bc734afaba7fbd.exe File opened for modification C:\Windows\system32\AgentService.exe SearchIndexer.exe File opened for modification C:\Windows\SysWOW64\Mjclapbl.exe Mmkbllhg.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Caches\cversions.3.db SensorDataService.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 3000 722cf4067e0a696f3b5d86cad4017149.exe 2008 explorer.exe 3852 spoolsv.exe 3272 svchost.exe 4864 spoolsv.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 7152 set thread context of 5352 7152 123dbeb8ccf400be1a26aaadc00b1b26.exe 284 -
resource yara_rule behavioral1/files/0x001900000002ab2f-615.dat upx behavioral1/files/0x001300000002b3b9-6617.dat upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\action [free] ash hairy (Sandy,Jenna).avi.exe perfhost.exe File opened for modification C:\Program Files (x86)\LetsView\LetsView\api-ms-win-crt-convert-l1-1-0.dll installer.tmp File opened for modification C:\Program Files (x86)\LetsView\LetsView\SharpVectors.Converters.Wpf.dll installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\is-QKKS3.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\obs-transitions\locale\is-F9T14.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\is-R2MP6.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\obs-filters\is-P13L1.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\win-decklink\locale\is-B3BU0.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\obs-text\locale\is-RFN33.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\text-freetype2\locale\is-F63ML.tmp installer.tmp File created C:\Program Files\Internet Explorer\iediagcmd.exe- 37170af1a8f25b877ab61a71f73d49e9.exe File created C:\Program Files (x86)\LetsView\LetsView\data\libobs\is-OQBQ1.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\coreaudio-encoder\locale\is-RJNCV.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\enc-amf\locale\is-JHU19.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\obs-ffmpeg\locale\is-6N9LH.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\obs-filters\is-875LT.tmp installer.tmp File opened for modification C:\Program Files\Java\jdk-1.8\bin\jconsole.exe gxFiQa.exe File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\obs-transitions\locale\is-1IIGR.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\obs-x264\locale\is-115U7.tmp installer.tmp File opened for modification C:\Program Files (x86)\LetsView\LetsView\msvcp60.dll installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\obs-filters\locale\is-028TV.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\obs-outputs\locale\is-RGLSO.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\text-freetype2\locale\is-HI181.tmp installer.tmp File created C:\Program Files\Java\jdk-1.8\bin\javac.exe- 37170af1a8f25b877ab61a71f73d49e9.exe File created C:\Program Files\Java\jdk-1.8\bin\javadoc.exe- 37170af1a8f25b877ab61a71f73d49e9.exe File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\coreaudio-encoder\locale\is-TF12U.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\obs-transitions\luma_wipes\is-2QT2E.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\win-dshow\locale\is-SHG9M.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\win-wasapi\locale\is-LP312.tmp installer.tmp File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 746ab69b0b0036489f96e23bba1ce9da.exe File opened for modification C:\Program Files\dotnet\RCXD2E9.tmp 746ab69b0b0036489f96e23bba1ce9da.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe SearchIndexer.exe File opened for modification C:\Program Files (x86)\LetsView\LetsView\libx264-161.dll installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\is-S6B50.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\obs-ffmpeg\locale\is-IBF07.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\obs-libfdk\locale\is-RDKHD.tmp installer.tmp File created C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 746ab69b0b0036489f96e23bba1ce9da.exe File created C:\Program Files\Java\jdk-1.8\bin\jhat.exe- 37170af1a8f25b877ab61a71f73d49e9.exe File created C:\Program Files\Java\jdk-1.8\bin\jhat.exe 37170af1a8f25b877ab61a71f73d49e9.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msotd.exe gxFiQa.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.6.3102.0_x64__8wekyb3d8bbwe\Microsoft.MicrosoftSolitaireCollection.exe gxFiQa.exe File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\rtmp-services\locale\is-5BKIS.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\win-wasapi\locale\is-7L4H0.tmp installer.tmp File created C:\Program Files (x86)\Bonjour\Bonjour.Resources\zh_TW.lproj\About Bonjour.rtf msiexec.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstatd.exe gxFiQa.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.2104.12721.0_x64__8wekyb3d8bbwe\LocalBridge.exe gxFiQa.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\servertool.exe perfhost.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe perfhost.exe File opened for modification C:\Program Files (x86)\LetsView\LetsView\obs-plugins\32bit\win-capture.dll installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\obs-filters\locale\is-TVIBH.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\obs-qsv11\locale\is-LA51O.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\image-source\locale\is-2LDAA.tmp installer.tmp File opened for modification C:\Program Files\Internet Explorer\ielowutil.exe perfhost.exe File created C:\Program Files (x86)\LetsView\LetsView\Usb\is-MD7CR.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\win-dshow\locale\is-LDHEL.tmp installer.tmp File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOHTMED.EXE gxFiQa.exe File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\coreaudio-encoder\locale\is-A249A.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\obs-libfdk\locale\is-L3SS4.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\obs-transitions\locale\is-D3QJ8.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\obs-qsv11\locale\is-QF03S.tmp installer.tmp File created C:\Program Files\Java\jdk-1.8\bin\javaw.exe 37170af1a8f25b877ab61a71f73d49e9.exe File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\image-source\locale\is-7K31J.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\obs-text\locale\is-VL4A3.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\obs-transitions\luma_wipes\is-AHCHL.tmp installer.tmp -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor\spanish animal hardcore catfight gorgeoushorny .rar.exe 52af1dae1bd1bff12d7f702c4c2004a8.exe File created C:\Windows\SystemResources\Windows.ShellCommon.SharedResources\norwegian horse full movie .rar.exe 52af1dae1bd1bff12d7f702c4c2004a8.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared_31bf3856ad364e35_10.0.22000.1_none_5dc5ae7deb48ad33\norwegian handjob sleeping hole blondie .rar.exe 52af1dae1bd1bff12d7f702c4c2004a8.exe File created C:\Windows\WinSxS\InstallTemp\20241122125544126.0\mfc90.dll msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20241122125544126.1\mfc90deu.dll msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20241122125544126.1\mfc90enu.dll msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\6F9E66FF7E38E3A3FA41D89E8A906A4A msiexec.exe File created C:\Windows\CbsTemp\beast fetish uncut gorgeoushorny .mpg.exe 52af1dae1bd1bff12d7f702c4c2004a8.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_10.0.22000.1_none_52545308f2f94902\tyrkish sperm trambling voyeur ash (Sonja,Sonja).avi.exe 52af1dae1bd1bff12d7f702c4c2004a8.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-service-shared_31bf3856ad364e35_10.0.22000.1_none_dd4fd4f5b71d35a0\norwegian lesbian cumshot girls .rar.exe 52af1dae1bd1bff12d7f702c4c2004a8.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe ssh-agent.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-c..nt-shared.resources_31bf3856ad364e35_10.0.22000.1_en-us_0809ac1ed5f42ab0\malaysia horse [bangbus] swallow (Melissa).avi.exe 52af1dae1bd1bff12d7f702c4c2004a8.exe File created C:\Windows\WinSxS\amd64_microsoft.grouppolicy.admtmpleditor_31bf3856ad364e35_10.0.22000.1_none_3154e65b23d0a476\action trambling licking .avi.exe 52af1dae1bd1bff12d7f702c4c2004a8.exe File created C:\Windows\SystemTemp\~DFCA4EE0A6BC5364E7.TMP msiexec.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-h..public-utils-shared_31bf3856ad364e35_10.0.22000.1_none_c4795c793bc04b9f\lingerie hidden titts (Melissa,Ashley).avi.exe 52af1dae1bd1bff12d7f702c4c2004a8.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_10.0.22000.1_none_7181babcedfc2cb7\german cum [free] wifey .avi.exe 52af1dae1bd1bff12d7f702c4c2004a8.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sx-shared_31bf3856ad364e35_10.0.22000.1_none_8ee75e811e5371b5\bukkake [milf] .mpeg.exe 52af1dae1bd1bff12d7f702c4c2004a8.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-devdispitemprovider_31bf3856ad364e35_10.0.22000.1_none_3af716f9f57eaa43\trambling catfight mistress .zip.exe 52af1dae1bd1bff12d7f702c4c2004a8.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-h..public-utils-shared_31bf3856ad364e35_10.0.22000.1_none_ba24b227075f89a4\french nude horse hidden latex .rar.exe 52af1dae1bd1bff12d7f702c4c2004a8.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-vsssystemprovider_31bf3856ad364e35_10.0.22000.282_none_46594da2f97b0221\brasilian lesbian handjob licking upskirt (Christine,Samantha).mpeg.exe 52af1dae1bd1bff12d7f702c4c2004a8.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.22000.1_ja-jp_002ed3cf2729f602\chinese nude [milf] .mpeg.exe 52af1dae1bd1bff12d7f702c4c2004a8.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.22000.1_en-us_c1a4250497e5d3a1\blowjob [bangbus] .mpg.exe 52af1dae1bd1bff12d7f702c4c2004a8.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_10.0.22000.194_none_c86732cf526df578\gang bang sperm big shower .zip.exe 52af1dae1bd1bff12d7f702c4c2004a8.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-security-ntlmshared_31bf3856ad364e35_10.0.22000.1_none_1df03b70aacfd6a6\cum uncut feet sm .zip.exe 52af1dae1bd1bff12d7f702c4c2004a8.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe spectrum.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\asian cumshot sperm hot (!) cock sm .mpeg.exe 52af1dae1bd1bff12d7f702c4c2004a8.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe DiagnosticsHub.StandardCollector.Service.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.22000.1_es-es_051397fb20a66b89\beast girls beautyfull .mpeg.exe 52af1dae1bd1bff12d7f702c4c2004a8.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..acejoin-gptemplates_31bf3856ad364e35_10.0.22000.1_none_00f1b765c9b181cf\italian beastiality hardcore hot (!) shoes .zip.exe 52af1dae1bd1bff12d7f702c4c2004a8.exe File created C:\Windows\WinSxS\amd64_netfx-shared_netfx_20_perfcounter_31bf3856ad364e35_10.0.22000.1_none_a3948ec3ebe10e0b\tyrkish horse hardcore several models nipples upskirt .zip.exe 52af1dae1bd1bff12d7f702c4c2004a8.exe File created C:\Windows\WinSxS\InstallTemp\20241122125544142.2\9.0.21022.8.policy msiexec.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_10.0.22000.1_none_9e5a97e5d6ad4b6f\bukkake sleeping Øï (Karin).zip.exe 52af1dae1bd1bff12d7f702c4c2004a8.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe msiexec.exe File created C:\Windows\ServiceProfiles\NetworkService\Downloads\canadian nude horse [bangbus] sweet .rar.exe 52af1dae1bd1bff12d7f702c4c2004a8.exe File created C:\Windows\WinSxS\InstallTemp\20241122125544126.0\x86_Microsoft.VC90.MFC_1fc8b3b9a1e18e3b_9.0.21022.8_x-ww_a173767a.cat msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20241122125544126.1\mfc90ita.dll msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20241122125544126.2\vcomp90.dll msiexec.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.22000.1_ja-jp_5cf8dd932d0a9d40\spanish lesbian hot (!) glans bondage .mpeg.exe 52af1dae1bd1bff12d7f702c4c2004a8.exe File created C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\webapps\templates\american gay xxx big (Samantha,Sylvia).mpg.exe 52af1dae1bd1bff12d7f702c4c2004a8.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.22000.1_fr-fr_0283bc1e18a8d47f\russian action full movie stockings .rar.exe 52af1dae1bd1bff12d7f702c4c2004a8.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p..al-securitytemplate_31bf3856ad364e35_10.0.22000.1_none_442c309f5794952c\hardcore cumshot girls mistress .avi.exe 52af1dae1bd1bff12d7f702c4c2004a8.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-s..-kf-commondownloads_31bf3856ad364e35_10.0.22000.1_none_4967740657087a96\swedish kicking beastiality big wifey .mpeg.exe 52af1dae1bd1bff12d7f702c4c2004a8.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess_31bf3856ad364e35_10.0.22000.1_none_5b10fc4c4e155bd7\japanese beastiality blowjob uncut boots (Sonja).mpeg.exe 52af1dae1bd1bff12d7f702c4c2004a8.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-userexperience-desktop_31bf3856ad364e35_10.0.22000.318_none_82292a5c4e657627\webapps\templates\trambling animal girls .rar.exe 52af1dae1bd1bff12d7f702c4c2004a8.exe File created C:\Windows\WinSxS\amd64_netfx-aspnet-sharedcomponents_b03f5f7f11d50a3a_4.0.22000.1_none_7180b25a0bb6340b\lingerie big hole traffic .rar.exe 52af1dae1bd1bff12d7f702c4c2004a8.exe File created C:\Windows\InputMethod\SHARED\norwegian beast big beautyfull .avi.exe 52af1dae1bd1bff12d7f702c4c2004a8.exe File created C:\Windows\WinSxS\InstallTemp\20241122125544095.0\atl90.dll msiexec.exe File opened for modification C:\Windows\WinSxS\InstallTemp\20241122125544126.3 msiexec.exe File created C:\Windows\WinSxS\x86_microsoft.grouppolicy.admtmpleditor_31bf3856ad364e35_10.0.22000.1_none_d5364ad76b733340\spanish porn nude licking ash .mpg.exe 52af1dae1bd1bff12d7f702c4c2004a8.exe File created C:\Windows\WinSxS\amd64_netfx-aspnet_installsqlstatetemp_b03f5f7f11d50a3a_10.0.22000.1_none_dee53f64bd046ed4\british hardcore hardcore voyeur bedroom (Sarah,Christine).mpeg.exe 52af1dae1bd1bff12d7f702c4c2004a8.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ime-eashared-imepad_31bf3856ad364e35_10.0.22000.1_none_90cfdfd0a3fa1534\gay voyeur leather (Gina).rar.exe 52af1dae1bd1bff12d7f702c4c2004a8.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.22000.51_none_cf967fff3a651842\japanese fucking masturbation boots .mpg.exe 52af1dae1bd1bff12d7f702c4c2004a8.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-m..ineshared.resources_31bf3856ad364e35_10.0.22000.1_en-us_3a3058f0f2a8faa1\asian beast girls cock mature .avi.exe 52af1dae1bd1bff12d7f702c4c2004a8.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.22000.1_es-es_86163d9c2a4edbb0\russian horse porn sleeping .rar.exe 52af1dae1bd1bff12d7f702c4c2004a8.exe File created C:\Windows\WinSxS\amd64_netfx4-uninstallsqlstatetemplate_sql_b03f5f7f11d50a3a_4.0.15806.0_none_db71a9361b98b72c\black hardcore several models hole swallow .mpeg.exe 52af1dae1bd1bff12d7f702c4c2004a8.exe File created C:\Windows\SystemTemp\~DF2BA711E9C3251A3B.TMP msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20241122125544126.0\x86_Microsoft.VC90.MFC_1fc8b3b9a1e18e3b_9.0.21022.8_x-ww_a173767a.manifest msiexec.exe File created C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor.Resources\chinese xxx nude full movie leather (Karin,Liz).zip.exe 52af1dae1bd1bff12d7f702c4c2004a8.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\mssrv.exe 52af1dae1bd1bff12d7f702c4c2004a8.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-update-upshared_31bf3856ad364e35_10.0.22000.1_none_e3c61f6d6847265c\gay [bangbus] hotel .avi.exe 52af1dae1bd1bff12d7f702c4c2004a8.exe File opened for modification C:\Windows\Installer\MSIC0C3.tmp msiexec.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.22000.1_es-es_d129e87c6a0ae847\chinese sperm xxx full movie glans latex .avi.exe 52af1dae1bd1bff12d7f702c4c2004a8.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-devdispitemprovider_31bf3856ad364e35_10.0.22000.1_none_454bc14c29df6c3e\french beast licking glans bedroom .avi.exe 52af1dae1bd1bff12d7f702c4c2004a8.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 7180 sc.exe 5212 sc.exe 7596 sc.exe 7796 sc.exe -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral1/files/0x001900000002ab39-623.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 9 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
Program crash 7 IoCs
pid pid_target Process procid_target 5364 4896 WerFault.exe 121 5472 9436 WerFault.exe 244 688 5392 WerFault.exe 278 4448 2584 WerFault.exe 279 8004 3932 WerFault.exe 115 7376 3932 WerFault.exe 115 6804 6960 WerFault.exe 473 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WXCastService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 138c8aa320eabfb8ae03edf1131181d8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2d915b0f4be5a740b1309ec822ded106.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language installer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 89412e1256f3b01fa57b46f3a6e57b95.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddf78bfc06a60145fa3fecda7fb6e2b8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 52af1dae1bd1bff12d7f702c4c2004a8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a3d6b86ae0f03599df8c0deaed2f3e2c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 37170af1a8f25b877ab61a71f73d49e9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2ae2c695ce895e44282d9cf2e561c549.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 916de7a46e1cdff12ded01aef1384cef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 916de7a46e1cdff12ded01aef1384cef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dac753da9ca30b07599f4c896459c29f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c1dc90eefa0eeca09d3ad2241484a220.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gxFiQa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 52af1dae1bd1bff12d7f702c4c2004a8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 52af1dae1bd1bff12d7f702c4c2004a8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cb45cab9f89fc82f0fbf1a07821249de.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language installer.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8788124738a049121873efd820f82e0a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language phpmaildelivery.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 722cf4067e0a696f3b5d86cad4017149.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1b67eb4014d6eec3ae8aab7d17bb46f6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 746ab69b0b0036489f96e23bba1ce9da.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a5c4bb6771e1c8dd94853ed16a5db9a5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a2bfa3c1d83e416940aa1bbb91f1f5ef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DC9D.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d23b3a3cb8eb96acd265bbc526bb2ce3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xqdliiuieswb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2c8a126b7b205988f4c0748cd356b5cb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 916de7a46e1cdff12ded01aef1384cef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7e1bdcbe8a3a226828823a3a5c7f455e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8dc1ad3817c1ff1c7e22ab09fde6ddc8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 78d7503a02a12b5e3474e0009537f52f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 664c39ffa839bb078544404190958bc5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 72601c30c348d80832531ec130c94690.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PinTaskbarTool.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rllvkse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language perfhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 728be67df4d1fdec24614f73db544291.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mmkbllhg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2497a47d8190a5553b77795dbe6426cf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 60e4117cf4491d1402bc734afaba7fbd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 916de7a46e1cdff12ded01aef1384cef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2f5406f5f67fba09512874d5f7a0b4b4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a9faec2a2e4fe191d4fdb072edb84440.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8dc1ad3817c1ff1c7e22ab09fde6ddc8.tmp -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 6844 DC9D.tmp -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe -
Checks processor information in registry 2 TTPs 16 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2497a47d8190a5553b77795dbe6426cf.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 2497a47d8190a5553b77795dbe6426cf.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 TieringEngineService.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz TieringEngineService.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4248760313-3670024077-2384670640-1000\SOFTWARE\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_BROWSER_EMULATION installer.tmp Set value (int) \REGISTRY\USER\S-1-5-21-4248760313-3670024077-2384670640-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\LetsView.exe = "11001" installer.tmp Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_BROWSER_EMULATION installer.tmp Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\LetsView.exe = "11001" installer.tmp Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION installer.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION installer.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_BROWSER_EMULATION installer.tmp Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\LetsView.exe = "11001" installer.tmp -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{AEB16279-B750-48F1-8586-97956060175A} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000bc6b77f0dd3cdb01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\C:\Windows\system32,@elscore.dll,-1 = "Microsoft Language Detection" SearchIndexer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{33154C99-BF49-443D-A73C-303A23ABBE97} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000884613f0dd3cdb01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\MPEG2Demultiplexer SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\C:\Windows\system32,@elscore.dll,-2 = "Microsoft Script Detection" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1133 = "Print" fxssvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.raw\OpenWithList SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpg SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-107 = "Microsoft Excel Comma Separated Values File" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9907 = "MIDI Sequence" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-142 = "Microsoft OneNote Table Of Contents" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1132 = "Store in a folder" fxssvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\@C:\Windows\system32\zipfldr.dll,-10195 = "Compressed (zipped) Folder" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithList SearchProtocolHost.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\@C:\Windows\System32\msxml3r.dll,-1 = "XML Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\@C:\Windows\System32\ieframe.dll,-913 = "MHTML Document" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpg\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-176 = "Microsoft PowerPoint Macro-Enabled Presentation" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4\OpenWithList SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\C:\Windows\system32,@elscore.dll,-6 = "Microsoft Cyrillic to Latin Transliteration" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1134 = "Microsoft Routing Extension" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\@%systemroot%\system32\FirewallControlPanel.dll,-12122 = "Windows Defender Firewall" MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cr2 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithList SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{1E589E9D-8A8D-46D9-A2F9-E6D4F8161EE9} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000c453a2f0dd3cdb01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\C:\Windows\system32,@elscore.dll,-9 = "Microsoft Bengali to Latin Transliteration" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\windows.storage.dll,-10152 = "File folder" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-123 = "Microsoft Word Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9914 = "Windows Media Audio/Video file" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-115 = "Microsoft Excel 97-2003 Worksheet" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithList SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.crw\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-177 = "Microsoft PowerPoint Macro-Enabled Slide Show" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1131 = "Route through e-mail" fxssvc.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpeg SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-125 = "Microsoft Word Template" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{5985FC23-2588-4D9A-B38B-7E7AFFAB3155} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000a685d0efdd3cdb01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\Default DirectSound Device SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\C:\Windows\system32,@elscore.dll,-7 = "Microsoft Devanagari to Latin Transliteration" SearchIndexer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{3DBEE9A1-C471-4B95-BBCA-F39310064458} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000006742caeedd3cdb01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\@windows.storage.dll,-34583 = "Saved Pictures" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{5383EF74-273B-4278-AB0C-CDAA9FD5369E} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000800089efdd3cdb01 SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{01BE4CFB-129A-452B-A209-F9D40B3B84A5} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000a685d0efdd3cdb01 SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{80009818-F38F-4AF1-87B5-EADAB9433E58} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000008f6896f0dd3cdb01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\@C:\Windows\System32\ieframe.dll,-10046 = "Internet Shortcut" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.crw SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9912 = "Windows Media Audio file" SearchProtocolHost.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BEEB932A-8D4A-4619-AEFE-A836F988B221}\VersionIndependentProgID\ = "Bonjour.DNSSDEventManager" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8FA0889C-5973-4FC9-970B-EC15C925D0CE}\TypeLib\ = "{18FBED6D-F2B7-4EC8-A4A4-46282E635308}" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5E93C5A9-7516-4259-A67B-41A656F6E01C}\ = "DNSSDRecord Class" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AFEE063C-05BA-4248-A26E-168477F49734}\InprocServer32\ = "C:\\Windows\\SysWOW64\\dnssdX.dll" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{5E93C5A9-7516-4259-A67B-41A656F6E01C}\VersionIndependentProgID msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BEEB932A-8D4A-4619-AEFE-A836F988B221}\AppID = "{56608F9C-223B-4CB6-813D-85EDCCADFB4B}" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{21AE8D7F-D5FE-45CF-B632-CFA2C2C6B498}\ProxyStubClsid\ = "{00020420-0000-0000-C000-000000000046}" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{29DE265F-8402-474F-833A-D4653B23458F}\TypeLib msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{7FD72324-63E1-45AD-B337-4D525BD98DAD}\NumMethods msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Win32Assemblies\Global\policy.9.0.Microsoft.VC90.ATL,version="9.0.21022.8",publicKeyToken="1fc8b3b9a1e18e3b",processorArchitecture="x86",type="win32-policy" = 7000550041002a007b006200350032006600360064004a004600280074007b004f00240077005d00460054005f00560043005f005200650064006900730074005f00410054004c005f007800380036003e007200240066004a005e005900430054006a003300560039002500590027007d002a0027002e00290000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\6F9E66FF7E38E3A3FA41D89E8A906A4A\FT_VC_Redist_ATL_x86 = "VC_Redist_12222_x86_enu" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\6F9E66FF7E38E3A3FA41D89E8A906A4A msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Bonjour.DNSSDRecord msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{29DE265F-8402-474F-833A-D4653B23458F} msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{21AE8D7F-D5FE-45CF-B632-CFA2C2C6B498}\ProxyStubClsid msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{7FD72324-63E1-45AD-B337-4D525BD98DAD}\TypeLib msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\1523EA646D34FC14C8FD9E203C58611D msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\6F9E66FF7E38E3A3FA41D89E8A906A4A\Language = "1033" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{BEEB932A-8D4A-4619-AEFE-A836F988B221}\ProgID msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{AFEE063C-05BA-4248-A26E-168477F49734}\ = "TXTRecord Class" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\6F9E66FF7E38E3A3FA41D89E8A906A4A\SourceList\Media msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Bonjour.DNSSDService\ = "DNSSDService Class" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Bonjour.TXTRecord msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Bonjour.TXTRecord.1\ = "TXTRecord Class" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{BEEB932A-8D4A-4619-AEFE-A836F988B221}\InprocServer32 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BEEB932A-8D4A-4619-AEFE-A836F988B221}\VersionIndependentProgID\ = "Bonjour.DNSSDEventManager" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\6F9E66FF7E38E3A3FA41D89E8A906A4A\FT_VC_Redist_CRT_x86 = "VC_Redist_12222_x86_enu" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\41A387AA3A7A33D3590FA953D1350011 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\6F9E66FF7E38E3A3FA41D89E8A906A4A\SourceList msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BEEB932A-8D4A-4619-AEFE-A836F988B221} msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Bonjour.DNSSDEventManager.1\CLSID msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{29DE265F-8402-474F-833A-D4653B23458F}\ProxyStubClsid\ = "{00020424-0000-0000-C000-000000000046}" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5E93C5A9-7516-4259-A67B-41A656F6E01C} msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8FA0889C-5973-4FC9-970B-EC15C925D0CE}\TypeLib\ = "{18FBED6D-F2B7-4EC8-A4A4-46282E635308}" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{8FA0889C-5973-4FC9-970B-EC15C925D0CE}\NumMethods msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{AFEE063C-05BA-4248-A26E-168477F49734} msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Bonjour.DNSSDEventManager\CLSID\ = "{BEEB932A-8D4A-4619-AEFE-A836F988B221}" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{29DE265F-8402-474F-833A-D4653B23458F}\ProxyStubClsid32\ = "{7FD72324-63E1-45AD-B337-4D525BD98DAD}" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{24CD4DE9-FF84-4701-9DC1-9B69E0D1090A}\VersionIndependentProgID msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BEEB932A-8D4A-4619-AEFE-A836F988B221}\InprocServer32\ThreadingModel = "Apartment" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{29DE265F-8402-474F-833A-D4653B23458F} msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\6F9E66FF7E38E3A3FA41D89E8A906A4A\FT_VC_Redist_OpenMP_x86 = "VC_Redist_12222_x86_enu" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{24CD4DE9-FF84-4701-9DC1-9B69E0D1090A} msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{24CD4DE9-FF84-4701-9DC1-9B69E0D1090A}\AppID = "{56608F9C-223B-4CB6-813D-85EDCCADFB4B}" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{24CD4DE9-FF84-4701-9DC1-9B69E0D1090A}\TypeLib\ = "{18FBED6D-F2B7-4EC8-A4A4-46282E635308}" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{AFEE063C-05BA-4248-A26E-168477F49734} msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8BFDDD6597F70844985D521E5FA22BF8\SourceList msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Win32Assemblies\Global\policy.9.0.Microsoft.VC90.MFC,version="9.0.21022.8",publicKeyToken="1fc8b3b9a1e18e3b",processorArchitecture="x86",type="win32-policy" = 7000550041002a007b006200350032006600360064004a004600280074007b004f00240077005d00460054005f00560043005f005200650064006900730074005f004d00460043005f007800380036003e0075004c007d0064004a00350068004c002b00340045002b0066002c00310071004a00280064002d0000000000 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7FD72324-63E1-45AD-B337-4D525BD98DAD} msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Bonjour.DNSSDRecord.1\CLSID\ = "{5E93C5A9-7516-4259-A67B-41A656F6E01C}" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Bonjour.DNSSDEventManager\ = "DNSSDEventManager Class" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{BEEB932A-8D4A-4619-AEFE-A836F988B221}\ProgID msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8BFDDD6597F70844985D521E5FA22BF8\SourceList\Net\2 = "C:\\ProgramData\\Apple\\Installer Cache\\Bonjour 3.1.0.1\\" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Win32Assemblies\Global msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Win32Assemblies\Global\Microsoft.VC90.MFC,version="9.0.21022.8",publicKeyToken="1fc8b3b9a1e18e3b",processorArchitecture="x86",type="win32" = 7000550041002a007b006200350032006600360064004a004600280074007b004f00240077005d00460054005f00560043005f005200650064006900730074005f004d00460043005f007800380036003e004b003000710064006800330043003000650037006e0021002e005f004c003d0048002e0036004f0000000000 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AFEE063C-05BA-4248-A26E-168477F49734} msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{BEEB932A-8D4A-4619-AEFE-A836F988B221}\VersionIndependentProgID msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Bonjour.DNSSDEventManager.1\ = "DNSSDEventManager Class" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{21AE8D7F-D5FE-45CF-B632-CFA2C2C6B498}\TypeLib msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{29DE265F-8402-474F-833A-D4653B23458F}\NumMethods msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9CE603A0-3365-4DA0-86D1-3F780ECBA110}\TypeLib\ = "{18FBED6D-F2B7-4EC8-A4A4-46282E635308}" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BEEB932A-8D4A-4619-AEFE-A836F988B221}\VersionIndependentProgID msiexec.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5\Blob = 040000000100000010000000cb17e431673ee209fe455793f30afa1c0f0000000100000014000000e91e1e972b8f467ab4e0598fa92285387dee94c953000000010000006300000030613021060b6086480186f8450107170630123010060a2b0601040182373c0101030200c0301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c07f000000010000002a000000302806082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030109000000010000002a000000302806082b0601050507030206082b0601050507030306082b0601050507030406082b060105050703016200000001000000200000009acfab7e43c8d880d06b262a94deeee4b4659989c3d0caf19baf6405e41ab7df1400000001000000140000007fd365a7c2ddecbbf03009f34339fa02af3331330b000000010000001200000056006500720069005300690067006e0000001d0000000100000010000000c6cbcafa17955c4cfd41eca0c654c3617e000000010000000800000000c0032f2df8d6016800000001000000000000000300000001000000140000004eb6d578499b1ccf5f581ead56be3d9b6744a5e5190000000100000010000000d8b5fb368468620275d142ffd2aade372000000001000000d7040000308204d3308203bba003020102021018dad19e267de8bb4a2158cdcc6b3b4a300d06092a864886f70d01010505003081ca310b300906035504061302555331173015060355040a130e566572695369676e2c20496e632e311f301d060355040b1316566572695369676e205472757374204e6574776f726b313a3038060355040b1331286329203230303620566572695369676e2c20496e632e202d20466f7220617574686f72697a656420757365206f6e6c79314530430603550403133c566572695369676e20436c6173732033205075626c6963205072696d6172792043657274696669636174696f6e20417574686f72697479202d204735301e170d3036313130383030303030305a170d3336303731363233353935395a3081ca310b300906035504061302555331173015060355040a130e566572695369676e2c20496e632e311f301d060355040b1316566572695369676e205472757374204e6574776f726b313a3038060355040b1331286329203230303620566572695369676e2c20496e632e202d20466f7220617574686f72697a656420757365206f6e6c79314530430603550403133c566572695369676e20436c6173732033205075626c6963205072696d6172792043657274696669636174696f6e20417574686f72697479202d20473530820122300d06092a864886f70d01010105000382010f003082010a0282010100af240808297a359e600caae74b3b4edc7cbc3c451cbb2be0fe2902f95708a364851527f5f1adc831895d22e82aaaa642b38ff8b955b7b1b74bb3fe8f7e0757ecef43db66621561cf600da4d8def8e0c362083d5413eb49ca59548526e52b8f1b9febf5a191c23349d843636a524bd28fe870514dd189697bc770f6b3dc1274db7b5d4b56d396bf1577a1b0f4a225f2af1c926718e5f40604ef90b9e400e4dd3ab519ff02baf43ceee08beb378becf4d7acf2f6f03dafdd759133191d1c40cb7424192193d914feac2a52c78fd50449e48d6347883c6983cbfe47bd2b7e4fc595ae0e9dd4d143c06773e314087ee53f9f73b8330acf5d3f3487968aee53e825150203010001a381b23081af300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106306d06082b0601050507010c0461305fa15da05b3059305730551609696d6167652f6769663021301f300706052b0e03021a04148fe5d31a86ac8d8e6bc3cf806ad448182c7b192e30251623687474703a2f2f6c6f676f2e766572697369676e2e636f6d2f76736c6f676f2e676966301d0603551d0e041604147fd365a7c2ddecbbf03009f34339fa02af333133300d06092a864886f70d0101050500038201010093244a305f62cfd81a982f3deadc992dbd77f6a5792238ecc4a7a07812ad620e457064c5e797662d98097e5fafd6cc2865f201aa081a47def9f97c925a0869200dd93e6d6e3c0d6ed8e606914018b9f8c1eddfdb41aae09620c9cd64153881c994eea284290b136f8edb0cdd2502dba48b1944d2417a05694a584f60ca7e826a0b02aa251739b5db7fe784652a958abd86de5e8116832d10ccdefda8822a6d281f0d0bc4e5e71a2619e1f4116f10b595fce7420532dbce9d515e28b69e85d35befa57d4540728eb70e6b0e06fb33354871b89d278bc4655f0d86769c447af6955cf65d320833a454b6183f685cf2424a853854835fd1e82cf2ac11d6a8ed636a msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5\Blob = 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 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\07E032E020B72C3F192F0628A2593A19A70F069E install.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\07E032E020B72C3F192F0628A2593A19A70F069E\Blob = 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 install.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\07E032E020B72C3F192F0628A2593A19A70F069E\Blob = 1900000001000000100000001f7e750b566b128ac0b8d6576d2a70a503000000010000001400000007e032e020b72c3f192f0628a2593a19a70f069e1d0000000100000010000000e3f9af952c6df2aaa41706a77a44c2031400000001000000140000000876cdcb07ff24f6c5cdedbb90bce284374675f76200000001000000200000005c58468d55f58e497e743982d2b50010b6d165374acf83a7d4a32db768c4408e0b0000000100000034000000430065007200740075006d002000540072007500730074006500640020004e006500740077006f0072006b002000430041000000090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b0601050507030853000000010000006500000030633021060b2a84680186f6770205010130123010060a2b0601040182373c0101030200c03021060b2a84680186f6770205010730123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00f0000000100000014000000a8569ccd21ef9cc5737c7a12df608c2cbc545df12000000001000000bf030000308203bb308202a3a00302010202030444c0300d06092a864886f70d0101050500307e310b300906035504061302504c31223020060355040a1319556e697a65746f20546563686e6f6c6f6769657320532e412e31273025060355040b131e43657274756d2043657274696669636174696f6e20417574686f72697479312230200603550403131943657274756d2054727573746564204e6574776f726b204341301e170d3038313032323132303733375a170d3239313233313132303733375a307e310b300906035504061302504c31223020060355040a1319556e697a65746f20546563686e6f6c6f6769657320532e412e31273025060355040b131e43657274756d2043657274696669636174696f6e20417574686f72697479312230200603550403131943657274756d2054727573746564204e6574776f726b20434130820122300d06092a864886f70d01010105000382010f003082010a0282010100e3fb7da372bac2f0c91487f56b014ee16e4007ba6d275d7ff75b2db35ac7515faba432a66187b66e0f86d2300297f8d76957a118395d6a6479c60159ac3c314a387cd204d24b28e8205f3b07a2cc4d73dbf3ae4fc756d55aa79689faf3ab68d423865927cf0927bcac6e72831c3072dfe0a2e9d2e1747519bd2a9e7b1554041bd74339ad5528c5e21abbf4c0e4ae384933cc76859f3945d2a49ef2128c51f87ce42d7ff5ac5feb169fb12dd1bacc9142774c25c990386fdbf0ccfb8e1e97593ed5604ee60528ed4979134bba48db2ff972d339cafe1fd83472f5b440cf3101c3ecde112d175d1fb850d15e19a769de073328ca5095f9a754cb54865045a9f9490203010001a3423040300f0603551d130101ff040530030101ff301d0603551d0e041604140876cdcb07ff24f6c5cdedbb90bce284374675f7300e0603551d0f0101ff040403020106300d06092a864886f70d01010505000382010100a6a8ad22ce013da6a3ff62d0489d8b5e72b07844e3dc1caf09fd2348fabd2ac4b95504b510a38d27de0b8263d0eede0c3779415b22b2b09a415ca670e0d4d077cb23d300e06c562fe1690d0dd9aabf218150d906a5a8ff9537d0aafee2b3f5992d45848ae54209d774022ff789d899e9bc27d4478dba0d461c77cf14a41cb9a431c49c28740334ff331926a5e90d74b73e97c676e82796a366dde1aef2415bca9856837370e4861ad23141ba2fbe2d135a766f4ee84e810e3f5b0322a012be6658114acb03c4b42a2a2d9617e03954bc48d376279d9a2d06a6c9ec39d2abdb9f9a0b27023529b14095e7f9e89c55881946d6b734f57ece399ad938f151f74f2c install.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5 msiexec.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\Downloads\VirusSign.2024.01.23.7z:Zone.Identifier firefox.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4880 8dc1ad3817c1ff1c7e22ab09fde6ddc8.tmp 4880 8dc1ad3817c1ff1c7e22ab09fde6ddc8.tmp 3000 722cf4067e0a696f3b5d86cad4017149.exe 3000 722cf4067e0a696f3b5d86cad4017149.exe 3000 722cf4067e0a696f3b5d86cad4017149.exe 3000 722cf4067e0a696f3b5d86cad4017149.exe 3000 722cf4067e0a696f3b5d86cad4017149.exe 3000 722cf4067e0a696f3b5d86cad4017149.exe 3000 722cf4067e0a696f3b5d86cad4017149.exe 3000 722cf4067e0a696f3b5d86cad4017149.exe 3000 722cf4067e0a696f3b5d86cad4017149.exe 3000 722cf4067e0a696f3b5d86cad4017149.exe 3000 722cf4067e0a696f3b5d86cad4017149.exe 3000 722cf4067e0a696f3b5d86cad4017149.exe 3000 722cf4067e0a696f3b5d86cad4017149.exe 3000 722cf4067e0a696f3b5d86cad4017149.exe 3000 722cf4067e0a696f3b5d86cad4017149.exe 3000 722cf4067e0a696f3b5d86cad4017149.exe 3000 722cf4067e0a696f3b5d86cad4017149.exe 3000 722cf4067e0a696f3b5d86cad4017149.exe 3000 722cf4067e0a696f3b5d86cad4017149.exe 3000 722cf4067e0a696f3b5d86cad4017149.exe 3000 722cf4067e0a696f3b5d86cad4017149.exe 3000 722cf4067e0a696f3b5d86cad4017149.exe 3000 722cf4067e0a696f3b5d86cad4017149.exe 3000 722cf4067e0a696f3b5d86cad4017149.exe 3000 722cf4067e0a696f3b5d86cad4017149.exe 3000 722cf4067e0a696f3b5d86cad4017149.exe 3000 722cf4067e0a696f3b5d86cad4017149.exe 3000 722cf4067e0a696f3b5d86cad4017149.exe 3000 722cf4067e0a696f3b5d86cad4017149.exe 3000 722cf4067e0a696f3b5d86cad4017149.exe 3000 722cf4067e0a696f3b5d86cad4017149.exe 3000 722cf4067e0a696f3b5d86cad4017149.exe 3000 722cf4067e0a696f3b5d86cad4017149.exe 3000 722cf4067e0a696f3b5d86cad4017149.exe 1396 52af1dae1bd1bff12d7f702c4c2004a8.exe 1396 52af1dae1bd1bff12d7f702c4c2004a8.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 4 IoCs
pid Process 3344 OpenWith.exe 3628 7zFM.exe 2008 explorer.exe 3272 svchost.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 684 Process not Found 684 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3404 firefox.exe Token: SeDebugPrivilege 3404 firefox.exe Token: SeDebugPrivilege 3404 firefox.exe Token: SeRestorePrivilege 3628 7zFM.exe Token: 35 3628 7zFM.exe Token: SeSecurityPrivilege 3628 7zFM.exe Token: SeSecurityPrivilege 3628 7zFM.exe Token: SeTakeOwnershipPrivilege 4896 60e4117cf4491d1402bc734afaba7fbd.exe Token: 33 4992 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4992 AUDIODG.EXE Token: SeAuditPrivilege 1824 fxssvc.exe Token: SeRestorePrivilege 3492 TieringEngineService.exe Token: SeManageVolumePrivilege 3492 TieringEngineService.exe Token: SeAssignPrimaryTokenPrivilege 4260 AgentService.exe Token: SeBackupPrivilege 2472 vssvc.exe Token: SeRestorePrivilege 2472 vssvc.exe Token: SeAuditPrivilege 2472 vssvc.exe Token: SeBackupPrivilege 2920 wbengine.exe Token: SeRestorePrivilege 2920 wbengine.exe Token: SeSecurityPrivilege 2920 wbengine.exe Token: 33 2300 SearchIndexer.exe Token: SeIncBasePriorityPrivilege 2300 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2300 SearchIndexer.exe Token: SeSecurityPrivilege 5140 msiexec.exe Token: SeCreateTokenPrivilege 3696 install.exe Token: SeAssignPrimaryTokenPrivilege 3696 install.exe Token: SeLockMemoryPrivilege 3696 install.exe Token: SeIncreaseQuotaPrivilege 3696 install.exe Token: SeMachineAccountPrivilege 3696 install.exe Token: SeTcbPrivilege 3696 install.exe Token: SeSecurityPrivilege 3696 install.exe Token: SeTakeOwnershipPrivilege 3696 install.exe Token: SeLoadDriverPrivilege 3696 install.exe Token: SeSystemProfilePrivilege 3696 install.exe Token: SeSystemtimePrivilege 3696 install.exe Token: SeProfSingleProcessPrivilege 3696 install.exe Token: SeIncBasePriorityPrivilege 3696 install.exe Token: SeCreatePagefilePrivilege 3696 install.exe Token: SeCreatePermanentPrivilege 3696 install.exe Token: SeBackupPrivilege 3696 install.exe Token: SeRestorePrivilege 3696 install.exe Token: SeShutdownPrivilege 3696 install.exe Token: SeDebugPrivilege 3696 install.exe Token: SeAuditPrivilege 3696 install.exe Token: SeSystemEnvironmentPrivilege 3696 install.exe Token: SeChangeNotifyPrivilege 3696 install.exe Token: SeRemoteShutdownPrivilege 3696 install.exe Token: SeUndockPrivilege 3696 install.exe Token: SeSyncAgentPrivilege 3696 install.exe Token: SeEnableDelegationPrivilege 3696 install.exe Token: SeManageVolumePrivilege 3696 install.exe Token: SeImpersonatePrivilege 3696 install.exe Token: SeCreateGlobalPrivilege 3696 install.exe Token: SeShutdownPrivilege 3696 install.exe Token: SeIncreaseQuotaPrivilege 3696 install.exe Token: SeCreateTokenPrivilege 3696 install.exe Token: SeAssignPrimaryTokenPrivilege 3696 install.exe Token: SeLockMemoryPrivilege 3696 install.exe Token: SeIncreaseQuotaPrivilege 3696 install.exe Token: SeMachineAccountPrivilege 3696 install.exe Token: SeTcbPrivilege 3696 install.exe Token: SeSecurityPrivilege 3696 install.exe Token: SeTakeOwnershipPrivilege 3696 install.exe Token: SeLoadDriverPrivilege 3696 install.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3404 firefox.exe 3404 firefox.exe 3404 firefox.exe 3404 firefox.exe 3404 firefox.exe 3404 firefox.exe 3404 firefox.exe 3404 firefox.exe 3404 firefox.exe 3404 firefox.exe 3404 firefox.exe 3404 firefox.exe 3404 firefox.exe 3404 firefox.exe 3404 firefox.exe 3404 firefox.exe 3404 firefox.exe 3404 firefox.exe 3404 firefox.exe 3404 firefox.exe 3404 firefox.exe 3628 7zFM.exe 3628 7zFM.exe 4880 8dc1ad3817c1ff1c7e22ab09fde6ddc8.tmp 3628 7zFM.exe 5924 installer.tmp 3628 7zFM.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe 7720 taskmgr.exe -
Suspicious use of SetWindowsHookEx 57 IoCs
pid Process 3404 firefox.exe 3404 firefox.exe 3404 firefox.exe 3404 firefox.exe 3404 firefox.exe 3404 firefox.exe 3404 firefox.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 4896 60e4117cf4491d1402bc734afaba7fbd.exe 3000 722cf4067e0a696f3b5d86cad4017149.exe 3972 852dc0ab014f67ef4a792ce1dbcdaca6.exe 4988 c1dc90eefa0eeca09d3ad2241484a220.exe 4988 c1dc90eefa0eeca09d3ad2241484a220.exe 1488 gxFiQa.exe 1840 2497a47d8190a5553b77795dbe6426cf.exe 3000 722cf4067e0a696f3b5d86cad4017149.exe 3000 722cf4067e0a696f3b5d86cad4017149.exe 2008 explorer.exe 2812 dac753da9ca30b07599f4c896459c29f.exe 3268 ddf78bfc06a60145fa3fecda7fb6e2b8.exe 3268 ddf78bfc06a60145fa3fecda7fb6e2b8.exe 3268 ddf78bfc06a60145fa3fecda7fb6e2b8.exe 3268 ddf78bfc06a60145fa3fecda7fb6e2b8.exe 1004 xqdliiuieswb.exe 2008 explorer.exe 2008 explorer.exe 3852 spoolsv.exe 3696 install.exe 4988 c1dc90eefa0eeca09d3ad2241484a220.exe 4988 c1dc90eefa0eeca09d3ad2241484a220.exe 3852 spoolsv.exe 3852 spoolsv.exe 3272 svchost.exe 3272 svchost.exe 3272 svchost.exe 4864 spoolsv.exe 4864 spoolsv.exe 4864 spoolsv.exe 1888 installer.exe 5924 installer.tmp 3268 ddf78bfc06a60145fa3fecda7fb6e2b8.exe 3268 ddf78bfc06a60145fa3fecda7fb6e2b8.exe 3268 ddf78bfc06a60145fa3fecda7fb6e2b8.exe 7132 7e1bdcbe8a3a226828823a3a5c7f455e.exe 3412 1b67eb4014d6eec3ae8aab7d17bb46f6.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4728 wrote to memory of 3404 4728 firefox.exe 79 PID 4728 wrote to memory of 3404 4728 firefox.exe 79 PID 4728 wrote to memory of 3404 4728 firefox.exe 79 PID 4728 wrote to memory of 3404 4728 firefox.exe 79 PID 4728 wrote to memory of 3404 4728 firefox.exe 79 PID 4728 wrote to memory of 3404 4728 firefox.exe 79 PID 4728 wrote to memory of 3404 4728 firefox.exe 79 PID 4728 wrote to memory of 3404 4728 firefox.exe 79 PID 4728 wrote to memory of 3404 4728 firefox.exe 79 PID 4728 wrote to memory of 3404 4728 firefox.exe 79 PID 4728 wrote to memory of 3404 4728 firefox.exe 79 PID 3404 wrote to memory of 2880 3404 firefox.exe 80 PID 3404 wrote to memory of 2880 3404 firefox.exe 80 PID 3404 wrote to memory of 2880 3404 firefox.exe 80 PID 3404 wrote to memory of 2880 3404 firefox.exe 80 PID 3404 wrote to memory of 2880 3404 firefox.exe 80 PID 3404 wrote to memory of 2880 3404 firefox.exe 80 PID 3404 wrote to memory of 2880 3404 firefox.exe 80 PID 3404 wrote to memory of 2880 3404 firefox.exe 80 PID 3404 wrote to memory of 2880 3404 firefox.exe 80 PID 3404 wrote to memory of 2880 3404 firefox.exe 80 PID 3404 wrote to memory of 2880 3404 firefox.exe 80 PID 3404 wrote to memory of 2880 3404 firefox.exe 80 PID 3404 wrote to memory of 2880 3404 firefox.exe 80 PID 3404 wrote to memory of 2880 3404 firefox.exe 80 PID 3404 wrote to memory of 2880 3404 firefox.exe 80 PID 3404 wrote to memory of 2880 3404 firefox.exe 80 PID 3404 wrote to memory of 2880 3404 firefox.exe 80 PID 3404 wrote to memory of 2880 3404 firefox.exe 80 PID 3404 wrote to memory of 2880 3404 firefox.exe 80 PID 3404 wrote to memory of 2880 3404 firefox.exe 80 PID 3404 wrote to memory of 2880 3404 firefox.exe 80 PID 3404 wrote to memory of 2880 3404 firefox.exe 80 PID 3404 wrote to memory of 2880 3404 firefox.exe 80 PID 3404 wrote to memory of 2880 3404 firefox.exe 80 PID 3404 wrote to memory of 2880 3404 firefox.exe 80 PID 3404 wrote to memory of 2880 3404 firefox.exe 80 PID 3404 wrote to memory of 2880 3404 firefox.exe 80 PID 3404 wrote to memory of 2880 3404 firefox.exe 80 PID 3404 wrote to memory of 2880 3404 firefox.exe 80 PID 3404 wrote to memory of 2880 3404 firefox.exe 80 PID 3404 wrote to memory of 2880 3404 firefox.exe 80 PID 3404 wrote to memory of 2880 3404 firefox.exe 80 PID 3404 wrote to memory of 2880 3404 firefox.exe 80 PID 3404 wrote to memory of 2880 3404 firefox.exe 80 PID 3404 wrote to memory of 2880 3404 firefox.exe 80 PID 3404 wrote to memory of 2880 3404 firefox.exe 80 PID 3404 wrote to memory of 2880 3404 firefox.exe 80 PID 3404 wrote to memory of 2880 3404 firefox.exe 80 PID 3404 wrote to memory of 2880 3404 firefox.exe 80 PID 3404 wrote to memory of 2880 3404 firefox.exe 80 PID 3404 wrote to memory of 2880 3404 firefox.exe 80 PID 3404 wrote to memory of 2880 3404 firefox.exe 80 PID 3404 wrote to memory of 2880 3404 firefox.exe 80 PID 3404 wrote to memory of 2880 3404 firefox.exe 80 PID 3404 wrote to memory of 2880 3404 firefox.exe 80 PID 3404 wrote to memory of 3580 3404 firefox.exe 81 PID 3404 wrote to memory of 3580 3404 firefox.exe 81 PID 3404 wrote to memory of 3580 3404 firefox.exe 81 PID 3404 wrote to memory of 3580 3404 firefox.exe 81 PID 3404 wrote to memory of 3580 3404 firefox.exe 81 PID 3404 wrote to memory of 3580 3404 firefox.exe 81 PID 3404 wrote to memory of 3580 3404 firefox.exe 81 PID 3404 wrote to memory of 3580 3404 firefox.exe 81 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url "https://samples.vx-underground.org/Samples/VirusSign%20Collection/2024.01/VirusSign.2024.01.23.7z"1⤵
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url https://samples.vx-underground.org/Samples/VirusSign%20Collection/2024.01/VirusSign.2024.01.23.7z2⤵
- Checks processor information in registry
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1992 -parentBuildID 20240401114208 -prefsHandle 1920 -prefMapHandle 1912 -prefsLen 23678 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {eddf7a1e-7ab1-4dd2-a443-e3dd5ce3a9e2} 3404 "\\.\pipe\gecko-crash-server-pipe.3404" gpu3⤵PID:2880
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2412 -parentBuildID 20240401114208 -prefsHandle 2388 -prefMapHandle 2384 -prefsLen 24598 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {327ff02f-b4e6-4b49-a434-6b9c433b0a37} 3404 "\\.\pipe\gecko-crash-server-pipe.3404" socket3⤵
- Checks processor information in registry
PID:3580
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2804 -childID 1 -isForBrowser -prefsHandle 1472 -prefMapHandle 2852 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {20e333e2-a736-4e17-a19b-62a1ad1b8f45} 3404 "\\.\pipe\gecko-crash-server-pipe.3404" tab3⤵PID:440
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3516 -childID 2 -isForBrowser -prefsHandle 3640 -prefMapHandle 3636 -prefsLen 29088 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {90903f2f-ad39-4667-930f-7ccc78fca2de} 3404 "\\.\pipe\gecko-crash-server-pipe.3404" tab3⤵PID:2856
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2732 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4440 -prefMapHandle 4432 -prefsLen 29088 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d7a9c6e6-86b8-4bdf-b691-cda107798a92} 3404 "\\.\pipe\gecko-crash-server-pipe.3404" utility3⤵
- Checks processor information in registry
PID:1044
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5640 -childID 3 -isForBrowser -prefsHandle 5628 -prefMapHandle 5624 -prefsLen 27172 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1f759fc7-93cb-45a7-8259-6d833dcc2115} 3404 "\\.\pipe\gecko-crash-server-pipe.3404" tab3⤵PID:1844
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5844 -childID 4 -isForBrowser -prefsHandle 5764 -prefMapHandle 5768 -prefsLen 27172 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6d86ddc6-2156-46cd-92b7-4e15562907fb} 3404 "\\.\pipe\gecko-crash-server-pipe.3404" tab3⤵PID:3504
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6048 -childID 5 -isForBrowser -prefsHandle 6040 -prefMapHandle 6036 -prefsLen 27172 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {35c4e05e-beb1-4daf-82e8-8923e253733e} 3404 "\\.\pipe\gecko-crash-server-pipe.3404" tab3⤵PID:1972
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1820
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3344
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Downloads\VirusSign.2024.01.23.7z"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3628
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\InstallLock.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}1⤵
- System Location Discovery: System Language Discovery
PID:2372
-
C:\Windows\SysWOW64\werfault.exewerfault.exe /h /shared Global\7034eb21bf3e4644be0275a18f6680ce /t 2784 /p 23721⤵PID:4720
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.131⤵PID:5076
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵PID:4356
-
C:\Users\Admin\Desktop\2ae2c695ce895e44282d9cf2e561c549.exe"C:\Users\Admin\Desktop\2ae2c695ce895e44282d9cf2e561c549.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1512
-
C:\Users\Admin\Desktop\2c8a126b7b205988f4c0748cd356b5cb.exe"C:\Users\Admin\Desktop\2c8a126b7b205988f4c0748cd356b5cb.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3408
-
C:\Users\Admin\Desktop\8dc1ad3817c1ff1c7e22ab09fde6ddc8.exe"C:\Users\Admin\Desktop\8dc1ad3817c1ff1c7e22ab09fde6ddc8.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:848 -
C:\Users\Admin\AppData\Local\Temp\is-J3296.tmp\8dc1ad3817c1ff1c7e22ab09fde6ddc8.tmp"C:\Users\Admin\AppData\Local\Temp\is-J3296.tmp\8dc1ad3817c1ff1c7e22ab09fde6ddc8.tmp" /SL5="$5029C,8034176,54272,C:\Users\Admin\Desktop\8dc1ad3817c1ff1c7e22ab09fde6ddc8.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:4880 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Query3⤵
- System Location Discovery: System Language Discovery
PID:3376
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Windows\system32\atl.dll"3⤵
- System Location Discovery: System Language Discovery
PID:3268
-
-
C:\Users\Admin\AppData\Local\PHP Mail Delivery\phpmaildelivery.exe"C:\Users\Admin\AppData\Local\PHP Mail Delivery\phpmaildelivery.exe" e2a8e94fe36daa7ea7ecc1a7702e339b3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3932 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3932 -s 8804⤵
- Program crash
PID:8004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3932 -s 8844⤵
- Program crash
PID:7376
-
-
-
-
C:\Users\Admin\Desktop\52af1dae1bd1bff12d7f702c4c2004a8.exe"C:\Users\Admin\Desktop\52af1dae1bd1bff12d7f702c4c2004a8.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1396 -
C:\Users\Admin\Desktop\52af1dae1bd1bff12d7f702c4c2004a8.exe"C:\Users\Admin\Desktop\52af1dae1bd1bff12d7f702c4c2004a8.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:756
-
-
C:\Users\Admin\Desktop\52af1dae1bd1bff12d7f702c4c2004a8.exe"C:\Users\Admin\Desktop\52af1dae1bd1bff12d7f702c4c2004a8.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:424
-
-
C:\Users\Admin\Desktop\60e4117cf4491d1402bc734afaba7fbd.exe"C:\Users\Admin\Desktop\60e4117cf4491d1402bc734afaba7fbd.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4896 -
\??\f:\ac046f57780c222b275194c71b\install.exef:\ac046f57780c222b275194c71b\.\install.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4896 -s 13842⤵
- Program crash
PID:5364
-
-
C:\Users\Admin\Desktop\722cf4067e0a696f3b5d86cad4017149.exe"C:\Users\Admin\Desktop\722cf4067e0a696f3b5d86cad4017149.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3000 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2008 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3852 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3272 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4864
-
-
-
-
-
C:\Users\Admin\Desktop\852dc0ab014f67ef4a792ce1dbcdaca6.exe"C:\Users\Admin\Desktop\852dc0ab014f67ef4a792ce1dbcdaca6.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\installer.exe"C:\Users\Admin\AppData\Local\Temp\installer.exe" /VERYSILENT /SUPPRESSMSGBOXES /FORCECLOSEAPPLICATIONS /DIR="C:\Program Files (x86)\LetsView\LetsView" /LANG=English2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\is-TBC9R.tmp\installer.tmp"C:\Users\Admin\AppData\Local\Temp\is-TBC9R.tmp\installer.tmp" /SL5="$403A6,46659782,920064,C:\Users\Admin\AppData\Local\Temp\installer.exe" /VERYSILENT /SUPPRESSMSGBOXES /FORCECLOSEAPPLICATIONS /DIR="C:\Program Files (x86)\LetsView\LetsView" /LANG=English3⤵
- Manipulates Digital Signatures
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:5924 -
C:\Windows\SysWOW64\sc.exe"sc" stop LetsViewService4⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:7180
-
-
C:\Windows\SysWOW64\sc.exe"sc" delete LetsViewService4⤵
- Launches sc.exe
PID:5212
-
-
C:\Windows\SysWOW64\msiexec.exe"msiexec.exe" /i "C:\Program Files (x86)\LetsView\LetsView\Bonjour64.msi" /quiet4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:7508
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C ""C:\Program Files (x86)\LetsView\LetsView\usbmmidd_v2\wxcastservice_start.bat""4⤵PID:7368
-
C:\Windows\SysWOW64\sc.exesc create LetsViewService binPath= "C:\Program Files (x86)\LetsView\LetsView\usbmmidd_v2\..\WXCastService.exe" start= auto5⤵
- Launches sc.exe
PID:7596
-
-
C:\Windows\SysWOW64\sc.exesc start LetsViewService5⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:7796
-
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall firewall delete rule name="LetsView" program="C:\Program Files (x86)\LetsView\LetsView\LetsView.exe"4⤵
- Modifies Windows Firewall
- Loads dropped DLL
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:7204
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall firewall add rule name="LetsView" dir=in action=allow program="C:\Program Files (x86)\LetsView\LetsView\LetsView.exe" enable=yes4⤵
- Modifies Windows Firewall
- Loads dropped DLL
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:8780
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall firewall add rule name="LetsView" dir=out action=allow program="C:\Program Files (x86)\LetsView\LetsView\LetsView.exe" enable=yes4⤵
- Modifies Windows Firewall
- Loads dropped DLL
- Event Triggered Execution: Netsh Helper DLL
PID:9088
-
-
C:\Windows\SysWOW64\icacls.exe"icacls" "C:\ProgramData\LetsView\LetsView" /grant Users:(OI)(CI)(F) /t4⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:8784
-
-
C:\Windows\SysWOW64\icacls.exe"icacls" "C:\Program Files (x86)\LetsView\LetsView" /grant Users:(OI)(CI)(F) /t4⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:8744
-
-
C:\Windows\SysWOW64\icacls.exe"icacls" "C:\Users\Admin\Documents\LetsView\LetsView" /grant Users:(OI)(CI)(F) /t4⤵
- Modifies file permissions
PID:8928
-
-
C:\Users\Admin\AppData\Local\Temp\is-PLNMT.tmp\PinTaskbarTool.exe"C:\Users\Admin\AppData\Local\Temp\is-PLNMT.tmp\PinTaskbarTool.exe" /unpin "C:\Program Files (x86)\LetsView\LetsView\LetsView.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:6356
-
-
-
-
C:\Users\Admin\Desktop\2497a47d8190a5553b77795dbe6426cf.exe"C:\Users\Admin\Desktop\2497a47d8190a5553b77795dbe6426cf.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
PID:1840
-
C:\Users\Admin\Desktop\89412e1256f3b01fa57b46f3a6e57b95.exe"C:\Users\Admin\Desktop\89412e1256f3b01fa57b46f3a6e57b95.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4952
-
C:\Users\Admin\Desktop\a2bfa3c1d83e416940aa1bbb91f1f5ef.exe"C:\Users\Admin\Desktop\a2bfa3c1d83e416940aa1bbb91f1f5ef.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3388
-
C:\Users\Admin\Desktop\a3d6b86ae0f03599df8c0deaed2f3e2c.exe"C:\Users\Admin\Desktop\a3d6b86ae0f03599df8c0deaed2f3e2c.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4600
-
C:\Users\Admin\Desktop\c1dc90eefa0eeca09d3ad2241484a220.exe"C:\Users\Admin\Desktop\c1dc90eefa0eeca09d3ad2241484a220.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\gxFiQa.exeC:\Users\Admin\AppData\Local\Temp\gxFiQa.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1488 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\43c841d8.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:8428
-
-
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
PID:3464
-
C:\Users\Admin\Desktop\d23b3a3cb8eb96acd265bbc526bb2ce3.exe"C:\Users\Admin\Desktop\d23b3a3cb8eb96acd265bbc526bb2ce3.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
PID:920
-
C:\Users\Admin\Desktop\dac753da9ca30b07599f4c896459c29f.exe"C:\Users\Admin\Desktop\dac753da9ca30b07599f4c896459c29f.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2812 -
C:\Program Files (x86)\mhklkg\xqdliiuieswb.exe"C:\Program Files (x86)\mhklkg\xqdliiuieswb.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1004
-
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:2284
-
C:\Users\Admin\Desktop\ddf78bfc06a60145fa3fecda7fb6e2b8.exe"C:\Users\Admin\Desktop\ddf78bfc06a60145fa3fecda7fb6e2b8.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3268
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:1548
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004E0 0x00000000000004CC1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4992
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1824
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3548
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
PID:2288
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5068
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3344
-
C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exeC:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:904
-
C:\Windows\SysWow64\perfhost.exeC:\Windows\SysWow64\perfhost.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:4780
-
C:\Windows\system32\locator.exeC:\Windows\system32\locator.exe1⤵
- Executes dropped EXE
PID:3360
-
C:\Windows\System32\SensorDataService.exeC:\Windows\System32\SensorDataService.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks SCSI registry key(s)
PID:2220
-
C:\Windows\System32\snmptrap.exeC:\Windows\System32\snmptrap.exe1⤵
- Executes dropped EXE
PID:488
-
C:\Windows\system32\spectrum.exeC:\Windows\system32\spectrum.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks SCSI registry key(s)
PID:3132
-
C:\PROGRA~3\Mozilla\rllvkse.exeC:\PROGRA~3\Mozilla\rllvkse.exe -gbjuppd1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
PID:2784
-
C:\Windows\System32\OpenSSH\ssh-agent.exeC:\Windows\System32\OpenSSH\ssh-agent.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:5072
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s SharedRealitySvc1⤵PID:4884
-
C:\Windows\system32\TieringEngineService.exeC:\Windows\system32\TieringEngineService.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:3492
-
C:\Windows\system32\AgentService.exeC:\Windows\system32\AgentService.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4260
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Executes dropped EXE
PID:236
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2472
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2920
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
- Executes dropped EXE
PID:3636
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2300 -
C:\Windows\System32\SearchProtocolHost.exe"C:\Windows\System32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"2⤵
- Modifies data under HKEY_USERS
PID:5368
-
-
C:\Windows\system32\SearchFilterHost.exe"C:\Windows\system32\SearchFilterHost.exe" 944 2788 2356 928 {0E5DCEC5-7795-4E38-9621-94DFD9F9A421}2⤵
- Modifies data under HKEY_USERS
PID:6576
-
-
C:\Windows\system32\SearchFilterHost.exe"C:\Windows\system32\SearchFilterHost.exe" 944 2820 2816 928 {85EE815A-7738-4808-A14A-3AD87E32A3BF}2⤵PID:6656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4896 -ip 48961⤵PID:5344
-
C:\Users\Admin\Desktop\916de7a46e1cdff12ded01aef1384cef.exe"C:\Users\Admin\Desktop\916de7a46e1cdff12ded01aef1384cef.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5436 -
C:\Users\Admin\Desktop\916de7a46e1cdff12ded01aef1384cef.exe"C:\Users\Admin\Desktop\916de7a46e1cdff12ded01aef1384cef.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5796 -
C:\Users\Admin\Desktop\916de7a46e1cdff12ded01aef1384cef.exe"C:\Users\Admin\Desktop\916de7a46e1cdff12ded01aef1384cef.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6084
-
-
-
C:\Users\Admin\Desktop\916de7a46e1cdff12ded01aef1384cef.exe"C:\Users\Admin\Desktop\916de7a46e1cdff12ded01aef1384cef.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6056
-
-
C:\Users\Admin\Desktop\cb45cab9f89fc82f0fbf1a07821249de.exe"C:\Users\Admin\Desktop\cb45cab9f89fc82f0fbf1a07821249de.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
PID:5444
-
C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exeC:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5948
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:5140 -
C:\Windows\System32\MsiExec.exeC:\Windows\System32\MsiExec.exe -Embedding 0053DA954A68CDB36E3DE2C53963BD662⤵
- Executes dropped EXE
- Loads dropped DLL
PID:7656
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 8294247C0B694FD9D6213750A9B301D22⤵
- Loads dropped DLL
PID:3116
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 43FA280033C5106405595FF08473858B E Global\MSI00002⤵
- Loads dropped DLL
- Modifies data under HKEY_USERS
PID:8044
-
-
C:\Windows\System32\MsiExec.exe"C:\Windows\System32\MsiExec.exe" /Y "C:\Program Files\Bonjour\mdnsNSP.dll"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:8152
-
-
C:\Windows\syswow64\MsiExec.exe"C:\Windows\syswow64\MsiExec.exe" /Y "C:\Program Files (x86)\Bonjour\mdnsNSP.dll"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:8204
-
-
C:\Program Files\Bonjour\mDNSResponder.exe"C:\Program Files\Bonjour\mDNSResponder.exe"1⤵
- Modifies firewall policy service
- Executes dropped EXE
PID:8232
-
C:\Program Files (x86)\LetsView\LetsView\WXCastService.exe"C:\Program Files (x86)\LetsView\LetsView\usbmmidd_v2\..\WXCastService.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:8116
-
C:\Windows\system32\spectrum.exeC:\Windows\system32\spectrum.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
PID:4700
-
C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exeC:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe1⤵
- Drops file in System32 directory
PID:612
-
C:\Users\Admin\Desktop\78d7503a02a12b5e3474e0009537f52f.exe"C:\Users\Admin\Desktop\78d7503a02a12b5e3474e0009537f52f.exe"1⤵
- System Location Discovery: System Language Discovery
PID:9436 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9436 -s 2282⤵
- Program crash
PID:5472
-
-
C:\Users\Admin\Desktop\746ab69b0b0036489f96e23bba1ce9da.exe"C:\Users\Admin\Desktop\746ab69b0b0036489f96e23bba1ce9da.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:9456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 9436 -ip 94361⤵
- Loads dropped DLL
PID:9508
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
PID:7972 -
C:\Windows\System32\SearchProtocolHost.exe"C:\Windows\System32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"2⤵PID:9200
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Checks SCSI registry key(s)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:7720
-
C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exeC:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe1⤵PID:6604
-
C:\Windows\system32\spectrum.exeC:\Windows\system32\spectrum.exe1⤵
- Checks SCSI registry key(s)
PID:1916
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵
- Enumerates connected drives
PID:180 -
C:\Windows\System32\SearchProtocolHost.exe"C:\Windows\System32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"2⤵PID:7032
-
-
C:\Windows\system32\SearchFilterHost.exe"C:\Windows\system32\SearchFilterHost.exe" 944 2380 2628 924 {85EE815A-7738-4808-A14A-3AD87E32A3BF}2⤵PID:5480
-
-
C:\Users\Admin\Desktop\2f5406f5f67fba09512874d5f7a0b4b4.exe"C:\Users\Admin\Desktop\2f5406f5f67fba09512874d5f7a0b4b4.exe"1⤵
- System Location Discovery: System Language Discovery
PID:1788 -
C:\Users\Admin\Desktop\2f5406f5f67fba09512874d5f7a0b4b4.exe"C:\Users\Admin\Desktop\2f5406f5f67fba09512874d5f7a0b4b4.exe"2⤵PID:7536
-
C:\Users\Admin\Desktop\2f5406f5f67fba09512874d5f7a0b4b4.exe"C:\Users\Admin\Desktop\2f5406f5f67fba09512874d5f7a0b4b4.exe"3⤵PID:5268
-
-
-
C:\Users\Admin\Desktop\2f5406f5f67fba09512874d5f7a0b4b4.exe"C:\Users\Admin\Desktop\2f5406f5f67fba09512874d5f7a0b4b4.exe"2⤵PID:2820
-
-
C:\Users\Admin\Desktop\7e1bdcbe8a3a226828823a3a5c7f455e.exe"C:\Users\Admin\Desktop\7e1bdcbe8a3a226828823a3a5c7f455e.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:7132
-
C:\Users\Admin\Desktop\123dbeb8ccf400be1a26aaadc00b1b26.exe"C:\Users\Admin\Desktop\123dbeb8ccf400be1a26aaadc00b1b26.exe"1⤵
- Suspicious use of SetThreadContext
PID:7152 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
PID:5352
-
-
C:\Users\Admin\Desktop\138c8aa320eabfb8ae03edf1131181d8.exe"C:\Users\Admin\Desktop\138c8aa320eabfb8ae03edf1131181d8.exe"1⤵
- System Location Discovery: System Language Discovery
PID:8648 -
C:\Users\Admin\Desktop\138c8aa320eabfb8ae03edf1131181d8.exe"C:\Users\Admin\Desktop\138c8aa320eabfb8ae03edf1131181d8.exe"2⤵PID:6532
-
C:\Users\Admin\Desktop\138c8aa320eabfb8ae03edf1131181d8.exe"C:\Users\Admin\Desktop\138c8aa320eabfb8ae03edf1131181d8.exe"3⤵PID:6208
-
-
-
C:\Users\Admin\Desktop\138c8aa320eabfb8ae03edf1131181d8.exe"C:\Users\Admin\Desktop\138c8aa320eabfb8ae03edf1131181d8.exe"2⤵PID:9560
-
-
C:\Users\Admin\Desktop\664c39ffa839bb078544404190958bc5.exe"C:\Users\Admin\Desktop\664c39ffa839bb078544404190958bc5.exe"1⤵
- System Location Discovery: System Language Discovery
PID:8612 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/2⤵PID:7728
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x124,0x128,0x12c,0x100,0x130,0x7fff66c53cb8,0x7fff66c53cc8,0x7fff66c53cd83⤵PID:8024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1900,12394929441082141642,14827353354095062062,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1908 /prefetch:23⤵PID:6680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1900,12394929441082141642,14827353354095062062,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:33⤵PID:6896
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/login2⤵PID:9148
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7fff66c53cb8,0x7fff66c53cc8,0x7fff66c53cd83⤵PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,13743302157622043769,2635055674455919200,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2028 /prefetch:23⤵PID:572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2020,13743302157622043769,2635055674455919200,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2100 /prefetch:33⤵PID:9504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2020,13743302157622043769,2635055674455919200,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:83⤵PID:10124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,13743302157622043769,2635055674455919200,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:13⤵PID:5664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,13743302157622043769,2635055674455919200,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:13⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,13743302157622043769,2635055674455919200,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3832 /prefetch:13⤵PID:6408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,13743302157622043769,2635055674455919200,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3556 /prefetch:13⤵PID:9644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,13743302157622043769,2635055674455919200,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:13⤵PID:9628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,13743302157622043769,2635055674455919200,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:13⤵PID:9952
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/2⤵PID:3572
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7fff66c53cb8,0x7fff66c53cc8,0x7fff66c53cd83⤵PID:1152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1924,5622936032093353166,11213539159103803880,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1932 /prefetch:23⤵PID:9916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1924,5622936032093353166,11213539159103803880,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:33⤵PID:6656
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com2⤵PID:2652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.facebook.com/login2⤵PID:1796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://accounts.google.com2⤵PID:1060
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com2⤵PID:5228
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.facebook.com/login2⤵PID:4312
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com2⤵PID:9096
-
-
C:\Users\Admin\Desktop\728be67df4d1fdec24614f73db544291.exe"C:\Users\Admin\Desktop\728be67df4d1fdec24614f73db544291.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:8656 -
C:\Windows\SysWOW64\Mmkbllhg.exeC:\Windows\system32\Mmkbllhg.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:8532 -
C:\Windows\SysWOW64\Mjclapbl.exeC:\Windows\system32\Mjclapbl.exe3⤵PID:6016
-
C:\Windows\SysWOW64\Nnfnbmem.exeC:\Windows\system32\Nnfnbmem.exe4⤵PID:7176
-
C:\Windows\SysWOW64\Oapjjg32.exeC:\Windows\system32\Oapjjg32.exe5⤵PID:5588
-
C:\Windows\SysWOW64\Ojkkhlna.exeC:\Windows\system32\Ojkkhlna.exe6⤵PID:9100
-
C:\Windows\SysWOW64\Plmdhoca.exeC:\Windows\system32\Plmdhoca.exe7⤵PID:3640
-
C:\Windows\SysWOW64\Pkfjdj32.exeC:\Windows\system32\Pkfjdj32.exe8⤵PID:6324
-
C:\Windows\SysWOW64\Qmlmaemp.exeC:\Windows\system32\Qmlmaemp.exe9⤵PID:5468
-
C:\Windows\SysWOW64\Bnjibc32.exeC:\Windows\system32\Bnjibc32.exe10⤵PID:9892
-
C:\Windows\SysWOW64\Caohipan.exeC:\Windows\system32\Caohipan.exe11⤵PID:7396
-
C:\Windows\SysWOW64\Doohnc32.exeC:\Windows\system32\Doohnc32.exe12⤵PID:4860
-
C:\Windows\SysWOW64\Dbdjkmof.exeC:\Windows\system32\Dbdjkmof.exe13⤵PID:6136
-
C:\Windows\SysWOW64\Ekokibcd.exeC:\Windows\system32\Ekokibcd.exe14⤵PID:7416
-
C:\Windows\SysWOW64\Eegpbh32.exeC:\Windows\system32\Eegpbh32.exe15⤵PID:8212
-
C:\Windows\SysWOW64\Eenfcg32.exeC:\Windows\system32\Eenfcg32.exe16⤵PID:8360
-
C:\Windows\SysWOW64\Ffnbmjko.exeC:\Windows\system32\Ffnbmjko.exe17⤵PID:8684
-
C:\Windows\SysWOW64\Flodpp32.exeC:\Windows\system32\Flodpp32.exe18⤵PID:6384
-
C:\Windows\SysWOW64\Fpmmfo32.exeC:\Windows\system32\Fpmmfo32.exe19⤵PID:6172
-
C:\Windows\SysWOW64\Gndgmk32.exeC:\Windows\system32\Gndgmk32.exe20⤵PID:1044
-
C:\Windows\SysWOW64\Gilhpc32.exeC:\Windows\system32\Gilhpc32.exe21⤵PID:4776
-
C:\Windows\SysWOW64\Glmqania.exeC:\Windows\system32\Glmqania.exe22⤵PID:8548
-
C:\Windows\SysWOW64\Hiaakbhk.exeC:\Windows\system32\Hiaakbhk.exe23⤵PID:9384
-
C:\Windows\SysWOW64\Hopfii32.exeC:\Windows\system32\Hopfii32.exe24⤵PID:8172
-
C:\Windows\SysWOW64\Hejoeckl.exeC:\Windows\system32\Hejoeckl.exe25⤵PID:9396
-
C:\Windows\SysWOW64\Iecalbca.exeC:\Windows\system32\Iecalbca.exe26⤵PID:9840
-
C:\Windows\SysWOW64\Ighgadfo.exeC:\Windows\system32\Ighgadfo.exe27⤵PID:9388
-
C:\Windows\SysWOW64\Jcadkdjq.exeC:\Windows\system32\Jcadkdjq.exe28⤵PID:10108
-
C:\Windows\SysWOW64\Jnkbdmfa.exeC:\Windows\system32\Jnkbdmfa.exe29⤵PID:7408
-
C:\Windows\SysWOW64\Kojkmc32.exeC:\Windows\system32\Kojkmc32.exe30⤵PID:4932
-
C:\Windows\SysWOW64\Loaanb32.exeC:\Windows\system32\Loaanb32.exe31⤵PID:9176
-
C:\Windows\SysWOW64\Mqjqnchp.exeC:\Windows\system32\Mqjqnchp.exe32⤵PID:8060
-
C:\Windows\SysWOW64\Ncmfen32.exeC:\Windows\system32\Ncmfen32.exe33⤵PID:8148
-
C:\Windows\SysWOW64\Opmjpnag.exeC:\Windows\system32\Opmjpnag.exe34⤵PID:680
-
C:\Windows\SysWOW64\Ocnollek.exeC:\Windows\system32\Ocnollek.exe35⤵PID:6744
-
C:\Windows\SysWOW64\Pmmjeq32.exeC:\Windows\system32\Pmmjeq32.exe36⤵PID:7504
-
C:\Windows\SysWOW64\Pdnhbjgi.exeC:\Windows\system32\Pdnhbjgi.exe37⤵PID:7452
-
C:\Windows\SysWOW64\Adlddh32.exeC:\Windows\system32\Adlddh32.exe38⤵PID:7240
-
C:\Windows\SysWOW64\Bphndh32.exeC:\Windows\system32\Bphndh32.exe39⤵PID:6224
-
C:\Windows\SysWOW64\Baigck32.exeC:\Windows\system32\Baigck32.exe40⤵PID:6240
-
C:\Windows\SysWOW64\Caegoi32.exeC:\Windows\system32\Caegoi32.exe41⤵PID:3080
-
C:\Windows\SysWOW64\Ebepfgig.exeC:\Windows\system32\Ebepfgig.exe42⤵PID:8280
-
C:\Windows\SysWOW64\Fdmohapq.exeC:\Windows\system32\Fdmohapq.exe43⤵PID:5200
-
C:\Windows\SysWOW64\Gidkennl.exeC:\Windows\system32\Gidkennl.exe44⤵PID:6124
-
C:\Windows\SysWOW64\Gbdenboe.exeC:\Windows\system32\Gbdenboe.exe45⤵PID:8112
-
C:\Windows\SysWOW64\Iljfhf32.exeC:\Windows\system32\Iljfhf32.exe46⤵PID:3380
-
C:\Windows\SysWOW64\Jobekppo.exeC:\Windows\system32\Jobekppo.exe47⤵PID:8968
-
C:\Windows\SysWOW64\Jajdmjgg.exeC:\Windows\system32\Jajdmjgg.exe48⤵PID:9048
-
C:\Windows\SysWOW64\Kobnbnbl.exeC:\Windows\system32\Kobnbnbl.exe49⤵PID:4960
-
C:\Windows\SysWOW64\Kafcih32.exeC:\Windows\system32\Kafcih32.exe50⤵PID:7616
-
C:\Windows\SysWOW64\Mfaiqe32.exeC:\Windows\system32\Mfaiqe32.exe51⤵PID:5784
-
C:\Windows\SysWOW64\Mbmbqe32.exeC:\Windows\system32\Mbmbqe32.exe52⤵PID:5404
-
C:\Windows\SysWOW64\Ojpjmaod.exeC:\Windows\system32\Ojpjmaod.exe53⤵PID:9024
-
C:\Windows\SysWOW64\Oqolejbl.exeC:\Windows\system32\Oqolejbl.exe54⤵PID:1844
-
C:\Windows\SysWOW64\Pcihmd32.exeC:\Windows\system32\Pcihmd32.exe55⤵PID:9608
-
C:\Windows\SysWOW64\Ajlcpmgd.exeC:\Windows\system32\Ajlcpmgd.exe56⤵PID:4668
-
C:\Windows\SysWOW64\Ajopemdb.exeC:\Windows\system32\Ajopemdb.exe57⤵PID:4772
-
C:\Windows\SysWOW64\Aakdhfjl.exeC:\Windows\system32\Aakdhfjl.exe58⤵PID:6420
-
C:\Windows\SysWOW64\Bpdkdbko.exeC:\Windows\system32\Bpdkdbko.exe59⤵PID:9676
-
C:\Windows\SysWOW64\Cmbnceam.exeC:\Windows\system32\Cmbnceam.exe60⤵PID:9928
-
C:\Windows\SysWOW64\Dpjmfohf.exeC:\Windows\system32\Dpjmfohf.exe61⤵PID:8344
-
C:\Windows\SysWOW64\Ddhflnom.exeC:\Windows\system32\Ddhflnom.exe62⤵PID:7488
-
C:\Windows\SysWOW64\Dkidifpb.exeC:\Windows\system32\Dkidifpb.exe63⤵PID:5600
-
C:\Windows\SysWOW64\Egaadgdc.exeC:\Windows\system32\Egaadgdc.exe64⤵PID:6736
-
C:\Windows\SysWOW64\Fbqigoko.exeC:\Windows\system32\Fbqigoko.exe65⤵PID:1512
-
C:\Windows\SysWOW64\Fnjfboop.exeC:\Windows\system32\Fnjfboop.exe66⤵PID:7968
-
C:\Windows\SysWOW64\Gjgmho32.exeC:\Windows\system32\Gjgmho32.exe67⤵PID:7492
-
C:\Windows\SysWOW64\Gebkpgjm.exeC:\Windows\system32\Gebkpgjm.exe68⤵PID:7788
-
C:\Windows\SysWOW64\Hjeiimbl.exeC:\Windows\system32\Hjeiimbl.exe69⤵PID:7756
-
C:\Windows\SysWOW64\Jepphcpj.exeC:\Windows\system32\Jepphcpj.exe70⤵PID:9020
-
C:\Windows\SysWOW64\Jbfmgg32.exeC:\Windows\system32\Jbfmgg32.exe71⤵PID:8824
-
C:\Windows\SysWOW64\Llkalk32.exeC:\Windows\system32\Llkalk32.exe72⤵PID:7704
-
C:\Windows\SysWOW64\Mdaell32.exeC:\Windows\system32\Mdaell32.exe73⤵PID:7456
-
C:\Windows\SysWOW64\Nclhpb32.exeC:\Windows\system32\Nclhpb32.exe74⤵PID:1884
-
C:\Windows\SysWOW64\Ncqakaha.exeC:\Windows\system32\Ncqakaha.exe75⤵PID:7692
-
C:\Windows\SysWOW64\Oollkajp.exeC:\Windows\system32\Oollkajp.exe76⤵PID:1100
-
C:\Windows\SysWOW64\Pkaiaqcd.exeC:\Windows\system32\Pkaiaqcd.exe77⤵PID:9820
-
C:\Windows\SysWOW64\Qfncphmb.exeC:\Windows\system32\Qfncphmb.exe78⤵PID:5604
-
C:\Windows\SysWOW64\Alabhn32.exeC:\Windows\system32\Alabhn32.exe79⤵PID:5576
-
C:\Windows\SysWOW64\Bbbpfgff.exeC:\Windows\system32\Bbbpfgff.exe80⤵PID:5256
-
C:\Windows\SysWOW64\Cpmgpjoh.exeC:\Windows\system32\Cpmgpjoh.exe81⤵PID:9108
-
C:\Windows\SysWOW64\Cbcime32.exeC:\Windows\system32\Cbcime32.exe82⤵PID:5608
-
C:\Windows\SysWOW64\Dehkio32.exeC:\Windows\system32\Dehkio32.exe83⤵PID:6404
-
C:\Windows\SysWOW64\Ednebf32.exeC:\Windows\system32\Ednebf32.exe84⤵PID:6692
-
C:\Windows\SysWOW64\Ellflhpa.exeC:\Windows\system32\Ellflhpa.exe85⤵PID:5376
-
C:\Windows\SysWOW64\Egfdep32.exeC:\Windows\system32\Egfdep32.exe86⤵PID:1604
-
C:\Windows\SysWOW64\Fghajp32.exeC:\Windows\system32\Fghajp32.exe87⤵PID:7624
-
C:\Windows\SysWOW64\Flgfhffd.exeC:\Windows\system32\Flgfhffd.exe88⤵PID:9376
-
C:\Windows\SysWOW64\Fgacqo32.exeC:\Windows\system32\Fgacqo32.exe89⤵PID:5424
-
C:\Windows\SysWOW64\Gdhapbol.exeC:\Windows\system32\Gdhapbol.exe90⤵PID:3292
-
C:\Windows\SysWOW64\Hqeheb32.exeC:\Windows\system32\Hqeheb32.exe91⤵PID:4700
-
C:\Windows\SysWOW64\Hcimlmif.exeC:\Windows\system32\Hcimlmif.exe92⤵PID:6268
-
C:\Windows\SysWOW64\Idopgo32.exeC:\Windows\system32\Idopgo32.exe93⤵PID:10024
-
C:\Windows\SysWOW64\Injaed32.exeC:\Windows\system32\Injaed32.exe94⤵PID:9604
-
C:\Windows\SysWOW64\Jjekee32.exeC:\Windows\system32\Jjekee32.exe95⤵PID:2848
-
C:\Windows\SysWOW64\Jfaeee32.exeC:\Windows\system32\Jfaeee32.exe96⤵PID:5528
-
C:\Windows\SysWOW64\Khekkgej.exeC:\Windows\system32\Khekkgej.exe97⤵PID:7312
-
C:\Windows\SysWOW64\Kaplim32.exeC:\Windows\system32\Kaplim32.exe98⤵PID:2616
-
C:\Windows\SysWOW64\Ldjhafoo.exeC:\Windows\system32\Ldjhafoo.exe99⤵PID:6480
-
C:\Windows\SysWOW64\Mmdiol32.exeC:\Windows\system32\Mmdiol32.exe100⤵PID:7852
-
C:\Windows\SysWOW64\Nopeem32.exeC:\Windows\system32\Nopeem32.exe101⤵PID:3280
-
C:\Windows\SysWOW64\Oajamfeh.exeC:\Windows\system32\Oajamfeh.exe102⤵PID:8676
-
C:\Windows\SysWOW64\Anfddd32.exeC:\Windows\system32\Anfddd32.exe103⤵PID:648
-
C:\Windows\SysWOW64\Bndqebld.exeC:\Windows\system32\Bndqebld.exe104⤵PID:8628
-
C:\Windows\SysWOW64\Bbfbfp32.exeC:\Windows\system32\Bbfbfp32.exe105⤵PID:10172
-
C:\Windows\SysWOW64\Cbmigohm.exeC:\Windows\system32\Cbmigohm.exe106⤵PID:5160
-
C:\Windows\SysWOW64\Epihhp32.exeC:\Windows\system32\Epihhp32.exe107⤵PID:1984
-
C:\Windows\SysWOW64\Fhmpba32.exeC:\Windows\system32\Fhmpba32.exe108⤵PID:7764
-
C:\Windows\SysWOW64\Hpgnpl32.exeC:\Windows\system32\Hpgnpl32.exe109⤵PID:8036
-
C:\Windows\SysWOW64\Ihihem32.exeC:\Windows\system32\Ihihem32.exe110⤵PID:4396
-
C:\Windows\SysWOW64\Icfcceik.exeC:\Windows\system32\Icfcceik.exe111⤵PID:8288
-
C:\Windows\SysWOW64\Jfihjp32.exeC:\Windows\system32\Jfihjp32.exe112⤵PID:6440
-
C:\Windows\SysWOW64\Kgddpa32.exeC:\Windows\system32\Kgddpa32.exe113⤵PID:6960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6960 -s 240114⤵
- Program crash
PID:6804
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\Desktop\37170af1a8f25b877ab61a71f73d49e9.exe"C:\Users\Admin\Desktop\37170af1a8f25b877ab61a71f73d49e9.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:8564
-
C:\Users\Admin\Desktop\72601c30c348d80832531ec130c94690.exe"C:\Users\Admin\Desktop\72601c30c348d80832531ec130c94690.exe"1⤵
- System Location Discovery: System Language Discovery
PID:7864 -
C:\Users\Admin\Desktop\72601c30c348d80832531ec130c94690.exe"C:\Users\Admin\Desktop\72601c30c348d80832531ec130c94690.exe"2⤵PID:1816
-
C:\Users\Admin\Desktop\72601c30c348d80832531ec130c94690.exe"C:\Users\Admin\Desktop\72601c30c348d80832531ec130c94690.exe"3⤵PID:2416
-
-
-
C:\Users\Admin\Desktop\72601c30c348d80832531ec130c94690.exe"C:\Users\Admin\Desktop\72601c30c348d80832531ec130c94690.exe"2⤵PID:6064
-
-
C:\Users\Admin\Desktop\8788124738a049121873efd820f82e0a.exe"C:\Users\Admin\Desktop\8788124738a049121873efd820f82e0a.exe"1⤵
- System Location Discovery: System Language Discovery
PID:8388
-
C:\Users\Admin\Desktop\a5c4bb6771e1c8dd94853ed16a5db9a5.exe"C:\Users\Admin\Desktop\a5c4bb6771e1c8dd94853ed16a5db9a5.exe"1⤵
- System Location Discovery: System Language Discovery
PID:8292 -
C:\Users\Admin\AppData\Local\Temp\DC9D.tmp"C:\Users\Admin\AppData\Local\Temp\DC9D.tmp" --pingC:\Users\Admin\Desktop\a5c4bb6771e1c8dd94853ed16a5db9a5.exe 8D19E25F3835DD70A74D2A8C6A574E03965E65880A8D518FCE428CBFF6EBD13D657EF544BD82C811E7CEB0E968141B92D006D7A6E51A2FCBFBB3FB7DCD41F73F2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:6844 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Desktop\a5c4bb6771e1c8dd94853ed16a5db9a5.docx" /o ""3⤵PID:6256
-
-
-
C:\Users\Admin\Desktop\a9faec2a2e4fe191d4fdb072edb84440.exe"C:\Users\Admin\Desktop\a9faec2a2e4fe191d4fdb072edb84440.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:5260 -
C:\Windows\SysWOW64\Mjehfoqi.exeC:\Windows\system32\Mjehfoqi.exe2⤵PID:9144
-
C:\Windows\SysWOW64\Njokmnho.exeC:\Windows\system32\Njokmnho.exe3⤵PID:5208
-
C:\Windows\SysWOW64\Olcabpkl.exeC:\Windows\system32\Olcabpkl.exe4⤵PID:8136
-
C:\Windows\SysWOW64\Ohlolqom.exeC:\Windows\system32\Ohlolqom.exe5⤵PID:5740
-
C:\Windows\SysWOW64\Pkaaikhi.exeC:\Windows\system32\Pkaaikhi.exe6⤵PID:6032
-
C:\Windows\SysWOW64\Pabofdin.exeC:\Windows\system32\Pabofdin.exe7⤵PID:6428
-
C:\Windows\SysWOW64\Adhacobj.exeC:\Windows\system32\Adhacobj.exe8⤵PID:2032
-
C:\Windows\SysWOW64\Beaacp32.exeC:\Windows\system32\Beaacp32.exe9⤵PID:8252
-
C:\Windows\SysWOW64\Boqlmebj.exeC:\Windows\system32\Boqlmebj.exe10⤵PID:9708
-
C:\Windows\SysWOW64\Clgili32.exeC:\Windows\system32\Clgili32.exe11⤵PID:7576
-
C:\Windows\SysWOW64\Cdfgkjhg.exeC:\Windows\system32\Cdfgkjhg.exe12⤵PID:7648
-
C:\Windows\SysWOW64\Ddnmli32.exeC:\Windows\system32\Ddnmli32.exe13⤵PID:7928
-
C:\Windows\SysWOW64\Doenobpb.exeC:\Windows\system32\Doenobpb.exe14⤵PID:7500
-
C:\Windows\SysWOW64\Ekokibcd.exeC:\Windows\system32\Ekokibcd.exe15⤵PID:8140
-
C:\Windows\SysWOW64\Ekahobaa.exeC:\Windows\system32\Ekahobaa.exe16⤵PID:8196
-
C:\Windows\SysWOW64\Emqdiehd.exeC:\Windows\system32\Emqdiehd.exe17⤵PID:9252
-
C:\Windows\SysWOW64\Emendd32.exeC:\Windows\system32\Emendd32.exe18⤵PID:9012
-
C:\Windows\SysWOW64\Fiqhde32.exeC:\Windows\system32\Fiqhde32.exe19⤵PID:6596
-
C:\Windows\SysWOW64\Ficejddk.exeC:\Windows\system32\Ficejddk.exe20⤵PID:7772
-
C:\Windows\SysWOW64\Fejeoe32.exeC:\Windows\system32\Fejeoe32.exe21⤵PID:664
-
C:\Windows\SysWOW64\Gfibihab.exeC:\Windows\system32\Gfibihab.exe22⤵PID:5012
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\Desktop\ad087afff87484ff2b440865c9f1e170.exe"C:\Users\Admin\Desktop\ad087afff87484ff2b440865c9f1e170.exe"1⤵PID:5392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5392 -s 82⤵
- Program crash
PID:688
-
-
C:\Users\Admin\Desktop\af304404bd32790a5ce298a77ee57ea0.exe"C:\Users\Admin\Desktop\af304404bd32790a5ce298a77ee57ea0.exe"1⤵PID:2584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2584 -s 82⤵
- Program crash
PID:4448
-
-
C:\Users\Admin\Desktop\1b67eb4014d6eec3ae8aab7d17bb46f6.exe"C:\Users\Admin\Desktop\1b67eb4014d6eec3ae8aab7d17bb46f6.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3412
-
C:\Users\Admin\Desktop\2d915b0f4be5a740b1309ec822ded106.exe"C:\Users\Admin\Desktop\2d915b0f4be5a740b1309ec822ded106.exe"1⤵
- System Location Discovery: System Language Discovery
PID:6632 -
C:\Users\Admin\Desktop\2d915b0f4be5a740b1309ec822ded106.exe"C:\Users\Admin\Desktop\2d915b0f4be5a740b1309ec822ded106.exe"2⤵PID:1012
-
C:\Users\Admin\Desktop\2d915b0f4be5a740b1309ec822ded106.exe"C:\Users\Admin\Desktop\2d915b0f4be5a740b1309ec822ded106.exe"3⤵PID:5928
-
-
-
C:\Users\Admin\Desktop\2d915b0f4be5a740b1309ec822ded106.exe"C:\Users\Admin\Desktop\2d915b0f4be5a740b1309ec822ded106.exe"2⤵PID:7564
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 5392 -ip 53921⤵PID:9560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2584 -ip 25841⤵PID:5684
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:10088
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:8524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3932 -ip 39321⤵PID:6576
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:5348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 3932 -ip 39321⤵PID:8444
-
C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exeC:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe1⤵PID:10008
-
C:\Windows\system32\spectrum.exeC:\Windows\system32\spectrum.exe1⤵PID:9884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 6960 -ip 69601⤵PID:3372
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
4Windows Service
4Event Triggered Execution
3AppInit DLLs
1Component Object Model Hijacking
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
4Windows Service
4Event Triggered Execution
3AppInit DLLs
1Component Object Model Hijacking
1Netsh Helper DLL
1Defense Evasion
File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
3Disable or Modify System Firewall
2Modify Registry
6Subvert Trust Controls
2Install Root Certificate
1SIP and Trust Provider Hijacking
1Virtualization/Sandbox Evasion
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Network Share Discovery
1Peripheral Device Discovery
2Query Registry
7System Information Discovery
6System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
126KB
MD52b17714ce6bad08f6199aafb3653e71a
SHA13cf82535cfef1edd1f2ea80f9dee541f2e9eea4f
SHA2563327654a3467b0bc781b271e0f6720f6f5c57783cb4a2941545c05f57917aa0b
SHA512cb2ca3227136639f9b0a98dbb2ccfd1dfc1da747907d76f7f3877b86f2a5ab867e1063430d01de07f3b06e63b73ca64955cf41fb033f3a0c6e2b42dc560b018e
-
Filesize
2.4MB
MD54d960743dbc73f744f7d5b0913894fc8
SHA1fe7020225a455ce7b34705adaf00a6daac0d927b
SHA256f86ec6c3474ec416015e4b25f83eafd216c749bab00bbbe23a8c3819722ac17d
SHA512b06cb02f69577b7a05ce0389f2b4281a61d7cbe0192ccffb328916dd299832083369375e332a0d88cc6c3e7f42fae5edfda53d0ecfc9086f82a646d3d88dca89
-
Filesize
2.6MB
MD586e2b390629665fbc20e06dfbf01a48f
SHA1d9f4697a6f4eceea24735822cb1df501268ca0b0
SHA25646e31e284da64d6c2d366352b8a8abcf7db28d3e2a870d8fcf15c4a6fe0a6dd1
SHA51205ecd3be5779f39db09329dda4dce0e3c49ac5d3950e92833031622b53542dadbe9e2948df35faeb4c41dbc8e01992935087c4a2975c797bd008ae177f7c3fea
-
Filesize
14.7MB
MD59a3d12e0ca0dc54b0a51c1386567b850
SHA1a3fc4e9b83be02e1a2434c3a7a9b82c7eee52a11
SHA256c1eff3cd24f86ca95955c72b7c31e26ad7c2ccface305ed23cbe71451ec767ff
SHA5120a199987d0da15c7a3628a0c750fd34870d7add0772b2321cb375fdc632ab890d74c69de7a87bfc2a4bebf4ad23b156d0c4ee0fab0f0765b84da360c0403e91a
-
Filesize
18B
MD50ebd4c9db48f04f789e6254a92af4b97
SHA145f98976d001a97e4b18489cb73cca2aadcb1cf3
SHA25654550f5495ca78de8ab1b4d32ddec042077823cb5654808e9f9f003857125450
SHA5129b3ca441b80f23ff89094175bca2a2647d76e38277830420e933935a631a82ee010743410b632078750f4272cdc6b3362a56649ce9694a2c712367e0ab7f0e21
-
Filesize
544KB
MD59a1dd1d96481d61934dcc2d568971d06
SHA1f136ef9bf8bd2fc753292fb5b7cf173a22675fb3
SHA2568cebb25e240db3b6986fcaed6bc0b900fa09dad763a56fb71273529266c5c525
SHA5127ac1581f8a29e778ba1a1220670796c47fa5b838417f8f635e2cb1998a01515cff3ee57045dacb78a8ec70d43754b970743aba600379fe6d9481958d32d8a5aa
-
Filesize
1.5MB
MD5006042bdcf8aa526a8778afdf3c60932
SHA1c8a57b93c289c5d88d614ef9941e92d678d1a343
SHA25618dfbb33658be40293af23be8830358bb60bc1f190538dbf3cea285a16c6cbc2
SHA512352454e03d1f6c8e2ea105690606140cfc3ffb8ccde1ab0e901944c17eafe409dc1f2ef6ead253b403f5a2d8ff961dd6e7ec4d85ee9161ea15cb080c3fa3f1d7
-
Filesize
2.3MB
MD5cb66eb4581e33a1a99a2a04a613ad91a
SHA15cee57aee7b50e5294b664942de7b924f9c2dbf1
SHA256ad428e3506a5be4fea1908829fa55c9e7e516f687196cd4fc3cd64c5ad537c2d
SHA5126fe45386fc147a027f7943b31a306d405ba3faa8f55967abdd254c581572f4b13933181376835c7c9028cf1d828f0f11f2f88c4f7e2c11abde2866d024479d84
-
Filesize
684KB
MD550f289df0c19484e970849aac4e6f977
SHA13dc77c8830836ab844975eb002149b66da2e10be
SHA256b9b179b305c5268ad428b6ae59de10b4fe99cf0199bbc89b7017181905e97305
SHA512877d852ea1062b90e2fd2f3c4dc7d05d9697e9a9b2929c830a770b62741f6a11e06de73275eb871113f11143faf1cb40d99f7c247862ffb778d26833ed5d7e38
-
Filesize
281KB
MD53dc3594fb3b25c55081fe4b3226abbc2
SHA17eaddfd597fc76244f71f98877f7149c9e85dc9e
SHA2566d54694077faf07473196da7b7f1c6981c8ad6a462fcea4777a80cfc6bc5769e
SHA5128f268673c86e2c38d1713696ed25b75a565d8beb5b05ea755c9cbb12f625b8d4abfc1bb3f9f54c297ba4bd7dd9e465737c30f492aaef0034b0e1568ce13d2445
-
Filesize
2.1MB
MD5b8d69fa2755c3ab1f12f8866a8e2a4f7
SHA18e3cdfb20e158c2906323ba0094a18c7dd2aaf2d
SHA2567e0976036431640ae1d9f1c0b52bcea5dd37ef86cd3f5304dc8a96459d9483cd
SHA5125acac46068b331216978500f67a7fa5257bc5b05133fab6d88280b670ae4885ef2d5d1f531169b66bf1952e082f56b1ad2bc3901479b740f96c53ea405adda18
-
Filesize
224KB
MD561638126ef4fab72adddbe8053d1729b
SHA1129133f1b3e743999488f4bd3440cbb2c6fc49f2
SHA256449d2f7dd35dfb8a5c06dd64613aed7dda90fa4cf48238dca70893672987941f
SHA512c7c464a8553aaf586162a98ee74708b6cdb02588d99809656e06ed1fcc974a17cfb31d9f06540c218a91c85fdcf517ebc8877d96941debde26549f68a4e0fc0a
-
Filesize
4.0MB
MD570d3d83642c32f2434b1d7de6458d05b
SHA163b34676c8b7652af010f30f900e2dcbc95a0ab1
SHA2565a37e0219828126c70be497f77dc498b856c3fa62fbfeb109448f98cdca58535
SHA512656ba2fcecb0a4b5012adbed917cee121ccd7b2890b7bc85ce55c7b224951a5fbb355f6d929c47633f95eb5836451149e1d29bd164e386d12c8171c932b43d06
-
Filesize
1.3MB
MD5a16e462f8a078e87520b56d2f48f5bd9
SHA1cf22b557ee71a12f07a2af8dccb21a455feb6611
SHA256eb324ee8852c09a10ad84f9542f6cbff52621dc6f75ef17d21976bcfb52f27bd
SHA512022c262321cfd27c9467a940320bb35378027eb3b35fbbe252e6700d6dccabd017ec7d25c3643e1d2962d9ef7e335270987354caeef6d8e16b6ff7c0902f7c97
-
Filesize
2.1MB
MD51b3ce862745bb9d17d3c1cb2f80b25e3
SHA1a77f718801b16e67b42d5e92efb3dbcee37b7662
SHA2566c8874f67ac79065ba9db0f95f5f9e2584be618cca12e08eb7469fd07eb67c28
SHA512938373d609244fedc883d6185ea3eae006c0c49f442433e87fe15a627fede7cda72f61e184172db5eeff77e655c04ace95863d98755189a7fdaef3d7abf6b667
-
Filesize
232KB
MD5c61c2c1195b141a5e02b1b77ab4f5e71
SHA1a1be9e7738d678482197a46c617fe3d4fcdb5c57
SHA256b030aa723cde26db16c76db4a67506565924ed8855b1f39aebc6d9b0ec90ab43
SHA512b1d4e272e8bc3fe3569e7a63381683cec7a2357fe9cf006dff76d0a1ffc5aeb25e3fe4cc1c7011f3f44f5fb5255eb67ac2ac1e5372ce0fca536cd6c1c50f9526
-
Filesize
2.6MB
MD5f2e161162def9b01d0da016d5f1d8c72
SHA17240449024e742ba6ba39de5885e9bd290d8ed31
SHA256f7c1b79bbd7fd294b948871fa7d6130caadf101471cb4d69185cd0e7103a1b10
SHA5123bbd85522d70f5aaa02eab07a23da47ab6f36e06deab8a5a9ea63557c96fb41bf3d16c62cabcdddcb458a442754228f69532db376df5260d004547484e067758
-
Filesize
1.0MB
MD52597aa6ae97e33320dfcb968c18128b3
SHA19366e7a9c66809a7480119ef241b95fd82cb55ba
SHA25609812edc4f8ab46b6d3535542b35c578bfc3da81ff56ff7148e539fcf90ef7da
SHA5124999d490f3a95ba3d5a08b93dd1555969cc15b2295c8294304b19b6b55b0957bb7ef4c3a632c19998835bd8f1637b22298b897733cd910d25d13855dedf36bce
-
Filesize
23KB
MD5f63d14c000dfcadf2394c737edaeaec9
SHA11c9d16d93f58d2c0a4708ffeaddf9d2c26ef33e8
SHA256ea8543b0eab31dece2b50ef45a2585f4de09af35c68d9a63152944f8a831ac29
SHA5124cffa0d1c4c1a1ddb91ade23e17a76dac807174d022115592caec2d0927af8188455e0c7b8273972de4e27e4bb816e83deed70551075b6effd4f32aecf994053
-
Filesize
23KB
MD5952fc862806f000e37d22897243c2bc4
SHA12da507ba99d86deee0fed3238e5e9fb170a562d2
SHA256955f386e3af5d87a46dcb2064967e34eb25a44ca3d2436e54bd5b84f4a2ab2ee
SHA512c74263c02d2066c0ff8a236c9fc620e2e088b3c1d3b54852de45f7b7dfbea799ffef41787919a196ff4e7ff03d1c7dc1bb2b876f1c7f829e04aa577ff728ef05
-
Filesize
44KB
MD5f0f1575cb0a27c0815cd6a6ee694c7a1
SHA1347aabf545b26e24293e7983a34a88fb1f132ed3
SHA2567f1b10f0679401e5360f7e0baf903035728a631c03056b7d40dbb6ae734fecae
SHA5126713667c5a1cc7d8aef24b3214f045411d41f1d0c14a4d994ec4f53302d9293bb56360e30c51f31542ad67d540b0f0c9f0530783481bc810d1634b127e48989a
-
Filesize
23KB
MD55aab08e129caf5c4595f21142e3c32bd
SHA11ee57e2d3e4939945939d4df180c1f9128fb2582
SHA256ee8ecfd717dfde63ff423f21fca560d80ec333ebfe2d55aba23fb7a1c4bffaaf
SHA5125b5481ff4d75762419322ed491eb932b7a2dc89497f15a5cb020406de717e9463e3494974945b0ff459b2acff2c314c42ebecf5580d4a40e9e3d555bbc0cfe2d
-
Filesize
17KB
MD5ce9a2f5a7fcfff341d6d901ad919a2ab
SHA1341f9d9a0b3fd8cfbefe0169b148dcc55688ee93
SHA256cc36a44467f41cf2dc91c126e368e357b28a0d57101472d2dfd1c06a4091cdf7
SHA5121f53e652b042ee27fe05b11ccda2ed9ae9a8f44b948b8658aa7a2d7ad2f5bd94ea16f3d9a92e65a8c65b7480517f1d05a066a4fb8d961b927d0d305399ca4e8f
-
Filesize
238KB
MD53f1c773a2e54f4d27b29c3fc1edd7d43
SHA1ef9a5cefd1f3c76b0fa5c8ea4a261dc46e59d185
SHA256ac66bafa0e7196b9f7b4a83b9625b32e83db7731418ecd0f4a8de474f7355254
SHA512d6636ba0c800757d361212169f770d3799cc46583c79e0b9cc7cc49c565b86849e8965fe0783100bfb8039f12b717db88f95062e7b6b6f67a7f8bd38144a4297
-
Filesize
250KB
MD5aa9c1de3041eb75aeee90b85ff66c9dd
SHA183cba1e082732d95f278434fd25374104e25c668
SHA25657b8145816b5d189842e350fc030e5a4def3a8990e489aa68dafec2b34e50171
SHA512fa75c0de232e497540cce6f27dc0b0457860255a0822a6db297942ae91159dffaf4d35367aabcf9b2e235766a204210afee13e2e00cd0016403956a8a63a78a2
-
Filesize
33KB
MD54c6887f8c8c66f0b2db5a8b347931b70
SHA11a71320873155f84de67bc16324c8ca0e503be04
SHA256a080df509685780d81ee32d86eac7ab15b5831090678f63b5741b57fd8a9969c
SHA5123e1cc423bcde71a24457b5f9756241c0bc0f9b1f434eafc84ec733f124bbcf6f9a1e104caf402ef2d60a96b895842a8e6b18cffc59936e6c4873a3be92cace8f
-
Filesize
1.2MB
MD5cbb81a903dc88f69ff9107f11bded306
SHA14466021a5d98b59b61c7d45a8f5dd695226b9056
SHA2565719bb2ab3c985570662a12789a2dfd37acd6aa3bb743eb75fa271256455956f
SHA51293e8e2e62b27686a2ca2dd4db7ae59349730e233f88ce83fd55969df1b16b9c382751987a76ba6b451bdda2dc080f7cf93a915e2517a783d16018813e3b27d13
-
Filesize
143KB
MD533b4c87f18b4c49114d7a8980241657a
SHA1254c67b915e45ad8584434a4af5e06ca730baa3b
SHA256587296f3ff624295079471e529104385e5c30ddc46462096d343c76515e1d662
SHA51242b48b4dcd76a8b2200cfafddc064c053a9d1a4b91b81dee9153322c0b2269e4d75f340c1bf7e7750351fb656445efaf1e1fe0f7e543497b247dd3f83f0c86f9
-
Filesize
56KB
MD58e4a401d4862a3ab07d4e7e17cbdfc78
SHA18ff6d2c100a2ba9b8159b9f733da011c8e448534
SHA2566e25f414dd65440cd0c285990f4eef789a831fff640dadb4afdf79a5dfd95bc2
SHA51274477239112082429db839be011cbe3d7d8fa66c9b8089dc93b18c1392ae57c935f39446227049e6f7f29e86122d191fa4f2f8d59b87f1f7b6eba3ae4d61a579
-
Filesize
1024KB
MD52872694b28d9f9c66b8bd167edeb0162
SHA122bb444625c72d478d440a08fd4f9a1347161a8d
SHA256e91c18582542a2ae0a1a9bf1f47e7f8c3b083db4e9bd9a814caca67e30c3b611
SHA5122baab54f0d4373c6ab07320abb192f4b6f37f77ebff0f7bd88a2c7479614231249fee49ba273b04a59c0e7803b288b93d316bd466ca672e6a4b43359446b5157
-
Filesize
152B
MD57bed1eca5620a49f52232fd55246d09a
SHA1e429d9d401099a1917a6fb31ab2cf65fcee22030
SHA25649c484f08c5e22ee6bec6d23681b26b0426ee37b54020f823a2908ab7d0d805e
SHA512afc8f0b5b95d593f863ad32186d1af4ca333710bcfba86416800e79528616e7b15f8813a20c2cfa9d13688c151bf8c85db454a9eb5c956d6e49db84b4b222ee8
-
Filesize
152B
MD55431d6602455a6db6e087223dd47f600
SHA127255756dfecd4e0afe4f1185e7708a3d07dea6e
SHA2567502d9453168c86631fb40ec90567bf80404615d387afc7ec2beb7a075bcc763
SHA512868f6dcf32ef80459f3ea122b0d2c79191193b5885c86934a97bfec7e64250e10c23e4d00f34c6c2387a04a15f3f266af96e571bbe37077fb374d6d30f35b829
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD51f8c8a82ea9948a113a1d937917bce87
SHA1a1c75dff159cce8a54c6f9508201573f47e8c012
SHA256947a278ad676f979f039371bac3938d4ee00f78d40b3596d144e3b1294992624
SHA512a7cf06e0b58f2739a3121ec1dd375e17a763ae205611e909a9a5c6e9c76bddcf83643a6cb8060c00d252e293487222fc04edef9cf489d2d7db6aaf348214f265
-
Filesize
1KB
MD5976d027614e8745cd642e71756838d17
SHA163307481d6c874d05136ce359c756ee87dc6875e
SHA25697b739645ec1f23bd41771ec701290441bbaf51190e7a0618d10e175488144cb
SHA5122883b6338278ecef1217e756fe22e6d26dfda678d8a5a87b31d6bfba1a37c761e60500f472cbd6191a55bd334c05d3eb19800dd117e9cada99624fb9a2c13345
-
Filesize
6KB
MD51713ac7c45a73729b4ea3a4fca2dd9c8
SHA19bb2fc99af0dc77bf7aa65e33f1493639633601e
SHA256eac988bd97c0b80f9e776f9f93a9d6759e24481c634e9870d378169c11a4e456
SHA512ddc43a53d98455b954e905e2a2db90f4266e5ee1de1d2860625ce4d5f7de00984cd10340b76f1700d10355c04f456964dddedbd42b77811ad51b0383d880be68
-
Filesize
7KB
MD5c4ff5502f5f930e05151fcff90d2b108
SHA150330777224006c4450497198b57c67af8121ff1
SHA25625e4405423d2d9991a7e28d62f3eba4c81048e9bd7cf1e8bd571833db12820ce
SHA512e4174d56d236ab9af99469d457b2eaa8b3ded3da8de3729ed2cae1267f42f0b200418fcecb702d229709d3fba5e68a194864f5e443fc7e0b0700fa0b9f7cbd95
-
Filesize
5KB
MD5253d88b629f865fa76936128245eb0b1
SHA19fbec712cb5a11f3a9a58837b82d434699a3b89e
SHA2569b81ee32506a2864d1d7d0ac3bc2367dbeb2c645b7bf3b87e4c15b47e84fc556
SHA5127474b81b18232b673af5cdb59c6adf1a3e64eeb2f821705724e112d32617e0693f429343a3d241bcc2cd886bafb0546951c99a3e584e228d3ae7d4475336f8b2
-
Filesize
1KB
MD504679f692edc63261e19a732dd980884
SHA10902b4d309ed209f031b738e1d79785848b09cde
SHA256bfa883eeee2ca25672a5606f5ef03a6e9ce7f1da119cd889ea792e33261028d7
SHA5128e9468a430798cac47c369f3e223b5faaf298746261201ae6aa136150df82edf198dfb4f5765d8e03b0b0f91a2806651030d47247806c0813a6efaf3de8255d7
-
Filesize
1KB
MD54dafc7ceb999eb2303a373e2492954cb
SHA14a14576c5f229474e2cb72ca17b5dfe471cfbd3f
SHA2567c2b0eea66aa5236058217f268b9f2b7276069198d4318060dfe5f561bcf2960
SHA512255ecfc60322c9c54c622de5d86cb4202ccd3144fc650409f2c079250948ed2bc9133c58d8a53f9f82bb3103ae831aa7aa3a3bd06b7989c43a3fef3bcbdf850e
-
Filesize
10KB
MD5195217fb01de1bc8161460cff5f9392d
SHA1963bdf6ef05464efbd015c3be1be7b610ba11789
SHA256014366bd23e4e20f1d51252eb41464641fbc9a8d73698b4798c305be7f511025
SHA5122e618d7713ec062c46fb822ae469892e89d94a804d129df300dabffac765a9fde2063f83baec12f16921ea11790d2ad5a9241f76934f89056c64eded6311b51b
-
Filesize
8KB
MD51c5943f15cc083beba359f1ee0d789bf
SHA192b193253bb95c4e62728b96f32c1d13fb968bc1
SHA2562840f48af70a175573cbbf197948b5d47e251feb9ec615a68f3b56621800691d
SHA5120c8e49ee60ce6345581fc41c6250bed28ecaa6e854520c3fddccd2d1bc8fd97f42408bceb393ec5e132a30ed93f5cb2544a6cf283118ca48b0c80461e58109c7
-
Filesize
10KB
MD59b7858a7d3d9b738db367e52bcfa143c
SHA147f59e28fba787bb51201f491fae0fbfeaab518f
SHA25622d8178552d78a8e4e2b082042c48a4266520eda3a872a0dfbfa0ab736501459
SHA5121dbaefb8a3b3162849142cb2887669c67ce05c3345d79c5cef1eb88630eb99fbd06b3a5c972aee7042e8dc7a57df234163efcb0bd684f38f49f240f3db25c3f1
-
Filesize
4B
MD5d3b07384d113edec49eaa6238ad5ff00
SHA1f1d2d2f924e986ac86fdf7b36c94bcdf32beec15
SHA256b5bb9d8014a0f9b1d61e21e796d78dccdf1352f23cd32812f4850b878ae4944c
SHA5120cf9180a764aba863a67b6d72f0918bc131c6772642cb2dce5a34f0a702f9470ddc2bf125c12198b1995c233c34b4afd346c54a2334c350a948a51b6e8b4e6b6
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\5l9wod5l.default-release\activity-stream.discovery_stream.json
Filesize20KB
MD52572598d7c15a0616052063d78cff06b
SHA11397b4c68e0a4cf405469290da32ac726cf6958f
SHA256ff11b09037690ec82db2ee20dba61fb317be7caa003667064cb1d300c973457b
SHA51244f9b305612ccf2171dbde9f9cb790b9f0c7dd39d701c3a8e479e5bc8acffb85dfe7cdffef997de1235eb84074813ab708d10c0dbd90a25a04c6e54ed35d00a8
-
Filesize
4.6MB
MD55ba7ade4a340aed79e482015cf61432e
SHA1654822a0891d85cf555a4c65211fd9f338697df3
SHA256275d7eea99a8d3c1f6398da2e6d52e7056d63fffa535759281960e42e63d7873
SHA5123732c9263367f037a842e42f44e7b3d9f3da2daf26f3729500938ae6abb8c0d0f9cbb813d59fbe073add83250aff943ce28806f6d66993f3acb6d351f39e5ddf
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\BackgroundTransferApi\3ffa8609-d028-4398-bf51-d82378f32b7a.down_data
Filesize555KB
MD55683c0028832cae4ef93ca39c8ac5029
SHA1248755e4e1db552e0b6f8651b04ca6d1b31a86fb
SHA256855abd360d8a8d6974eba92b70cbd09ce519bc8773439993f9ab37cb6847309e
SHA512aba434bd29be191c823b02ea9b639beb10647bbe7759bbffdaa790dfb1ec2c58d74c525ef11aacda209e4effe322d1d3a07b115446c8914b07a3bce4d8a0e2c3
-
Filesize
4B
MD520879c987e2f9a916e578386d499f629
SHA1c7b33ddcc42361fdb847036fc07e880b81935d5d
SHA2569f2981a7cc4d40a2a409dc895de64253acd819d7c0011c8e80b86fe899464e31
SHA512bcdde1625364dd6dd143b45bdcec8d59cf8982aff33790d390b839f3869e0e815684568b14b555a596d616252aeeaa98dac2e6e551c9095ea11a575ff25ff84f
-
Filesize
891KB
MD5ad087afff87484ff2b440865c9f1e170
SHA1b61d20d7e2dae22cb90c502c87fe7daeee472011
SHA2564e3ce5599bcb597123b52dab26e949570da27df2a7ada221e03a0808af0934fa
SHA512d9a66b921a1aba43e1b0eb5d31ed8fb9634d232e2f6fddc4d515d43f69d089bcdf77b23a08e33ebebd44de3f779ab34c7a86365b9a128075534ce57b5dbfb2d5
-
Filesize
1.5MB
MD5957da06875c8f016ad9b5f1530c10e62
SHA1b1e874699b4d998c04c6dd92f02a6617fa23df42
SHA2561cd3e66de43406da414dd4df5d53e9736df78448072fe699722e0c028b287dd0
SHA512101417691812a46f43ea69b94af4c7427dc2de4ee2f946c9540fd781ed9fb89ec544adadda5cbfeb6be455895e419ff46e77966ed52daf3a2ae708a1d3bc7093
-
Filesize
446KB
MD5071c3a4e1bb9aad59877dec3ce4df288
SHA1a8d4d2bf97d35f8b78e4a9d30de3399462e126e5
SHA256aeded2cef94cbce1f9f9be2ac5a0a6ef9c2fcaf5b63db48fd10ebafd2d9258fb
SHA512bb317ec4433e7da31ca4dbd769bc40175954fefc7b11267a34a0c005efa91d1cc7e35e3843144a5bb65ec25da4c71afe32ecc1ad8c706a05f6a228c296ac38e9
-
Filesize
33KB
MD56aabccd370e10a320ceff52749f275d6
SHA16611973dde041255b7abe9ed7e001f6ca0883c13
SHA256b832d79d892ed8ae636d857d317a628951f4ebe18d63b1d8b8c5fcc9a16cba00
SHA512dc44fd95c749f363a4ed954015bb59b9a648df86bc226432a343c83c130cdad3c303623dcaf890203b8255a2b6d7b298d0b42e113f329b7ae31126d72fdc5cba
-
Filesize
15KB
MD5261fb2d987a8a5586a578f572d633abe
SHA16552c06419a658fffe58b83aebe23e51acb61c70
SHA256e3e7a75d62653a6d796c79872a0363723ee4e5c22dc9d313e1bc94d7ead2e123
SHA512813f3cf5f4ff685fcf2ed60008062c51eabfbf9ab12075d3aff677f55865020dbf299ab70239cb10078d6c9a28a455efdb824d193456f770e5d3e549d72c8f7a
-
Filesize
253KB
MD5064f61f58cc1628cb19b21e4aaf79172
SHA159b507f88064075478bc09aeec32d50dcc15501c
SHA2561d6c896dfb0a477dd098dcb9ab72462f09f6308f67b1a2f68e209e34b1a82daf
SHA512b9fcc01306413e6bed560615268e6c147ac8c5ff00e9883a50aae1aa456f6814f55353e91a61f56c1693b902e348334286ce7363b322a236da96dd734ace5d62
-
Filesize
762B
MD5ead999b2fa3386b16793ada28f07e761
SHA116097d741f977670c6647053516da719f4dcf720
SHA2565710cd99aa072264c0c0e260c39210410b7069f105a268e4320c2553a8f61514
SHA512aa970547baa7539e9efb980774e047eead72ef9bcb3b829174e9ef78c00069f2b09fc24e7fd71ea59fc4d09eb6aec1cd28b86c2a249f95050a9c44083b782e1a
-
Filesize
2KB
MD514531377496910f7248ccd6f2029663c
SHA123be608d4d22d713caf0468273e6564718b3def2
SHA256adb3f9f9b1befdab084569d639caa767511106f2ac962cee9bf7577d0b58e92b
SHA512370f0b9aa4ba9390d65392cbf86b5f241420c788afae807bd7221eb2e909e4670eeff8962f24c4f89d67025f55468b65a414219146e3329f92f59aac2edd3480
-
Filesize
15KB
MD5ff56feae040bbc42e2cc64b45b8b1bb2
SHA17a2c1a2419fe490de623025b0b744a0adbcb4ea3
SHA256d15c675a5862da0d444825666487624ce180f484fcc0502a0b8085154897febc
SHA512dc89d15fe5b03b303b07677470352b1bd61d2a4c5b7343a72a5d0eea94b21041a19b0ab121560e0a350ddeb6a636eff9e3095a7ed525ac2bb8e674748c1888a5
-
Filesize
45.4MB
MD5df9ca22ae7a8c24d359ebe38f64c0981
SHA1b7b7e10fe537b3a63ad2a4d4c79b1564d0abccf1
SHA2563e273bae3be79827fc6d8bda508c16f5b55bc7e000ce82fd217a05953fa100d7
SHA512c1d5a1c020031fe3a8e0c135ce33b75b6b5fcee49d6594ff3bd6e5df856e9d47a13f40e3bb45f176645970418cbbcc6e771a86bb0067308cfb2b6f884ad84c99
-
Filesize
687KB
MD5a90f30b21c6431f45de9ec987b113019
SHA1f7790c43c97e60a3c4bb451985d505f4b7d6379d
SHA256fbfb64ceec0495504fe4fa921e278cefb6fd113b2d905715ad2536eb91b72988
SHA5122371562d4a8175c58ecd714b4245939b35e719dd5c17b1062c42ace059fa4dff1fb2c9510ced55e8b6a893a9e5478d8467116f3fd14665e65c7a5464df0f89e7
-
Filesize
130KB
MD5f7b445a6cb2064d7b459451e86ca6b0e
SHA1b05b74a1988c10df8c73eb9ca1a41af2a49647b7
SHA256bd03543c37feb48432e166fe3898abc2a7fe854b1113ee4d5d284633b4605377
SHA5129cf6d791132660d5246f55d25018ad0cf2791de9f6032531b9aca9a6c84396b8aeca7a9c0410f835637659f396817d8ba40f45d3b80c7907cccbe275a345a465
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
13KB
MD5a813d18268affd4763dde940246dc7e5
SHA1c7366e1fd925c17cc6068001bd38eaef5b42852f
SHA256e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64
SHA512b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
Filesize
928KB
MD5c5dd7ad7321076f9591da113023688f1
SHA17e42bf3e8dd1250eb21e32e2a8eb860e8ea9cf1b
SHA256775d8099322279707c6061ec09e2b165ee35e55cf30aa63c181a60bcb8342186
SHA512ea699e8afd31d812e85cd20a4865918ac83a7be52781756e32185693f66ff5d5af4302a7a400d8ace958417608d5ba9c269e9e14583fb497e1c08f72c53ec5b6
-
Filesize
163B
MD5bde7a905d055b8ecb6df1bbf474f4f76
SHA191e5dff81215b1edd18e3cf22b49d0da12403f67
SHA25639886420010d9b59b67a037b74f6d6a4a886adb1046cc6711439a6748f14a57e
SHA5129a7a211d094ea5553794e7808bf846b75d55b275e594ffa3acc4b0eeda3da4f3fdab44a9f1bf2f338175dffd1820b13fd6d517e8e4a6ffb4d9f35426e2113241
-
Filesize
221B
MD5e79bff711a49a96ea922dc3f0dec1f73
SHA1d819629b7eebe527a8474f3e72f077a851ed4743
SHA2562a2205ffef136e4ee18a7ac56e8c30cc3523de27c4d36e39de6ad5e6a02a3518
SHA512a5104745e72a46d04ba3ceebfc253e2356a68cddc2dccd7c34584c2b4d8886251812194b9585fd1e7dc481c037ed621bdacd6223c345bb780a7bbcdb144099d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5l9wod5l.default-release\AlternateServices.bin
Filesize8KB
MD52a9fb3ff6c293509b2ba1b945f9e92b5
SHA1fc2605ee7ff8b24e0ac8735646b39cd1ef0a0891
SHA256efed10865691c4a26d1b84495a22b338d587ca51d56ff6b692004ec61a9db515
SHA51282f2b53e45a821a06c469a3b6c9b955d92db37299c4ecc536780380d286b38e97bba22a190f8dfe7b69ef30d831243060efde4f783bc5eb67e2bf7dedbcfbc5c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5l9wod5l.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5c33a04f1ad52230a0db52fb1a1078bd8
SHA1ab5aae79a75836e77b38f5dea0290cc308fcc20c
SHA256e21457c3ce25f02b70f5ef3266d5516622d73f076c00846651b4b75304cd67cb
SHA512df9e951c237cd892d000c7cdd2fbd1f4c82d650cf044d12796394fd491b66717d0777b822510eafda097cc9fba57a5afc0cb34ca32215f9bed3614dccc5a0ab0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5l9wod5l.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD582420dfad593311118234bf02ff5189a
SHA1f4db0c794d02ffa166a0dfe67e1ebcf1f5b176a6
SHA256d23ccebd8d0fb69406dda124ea8f0f169be3ab7569c3c4a8eb5ea99087ea5689
SHA5129aff9a7a54f430dedaf46881095975c2a7a36b3bed1a8902074aba0807da91f568b1743d2f4582b5d8fcfdc11ed4f7d45e8b33fc415d938dbc19690bb5c17673
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5l9wod5l.default-release\datareporting\glean\db\data.safe.tmp
Filesize23KB
MD595f0ad0506f62061e54352fc97c30b67
SHA15eb5d27a587492089a4422c16199177cf0b8ae5c
SHA256e54d030b006dc8c29964e88d7cbe0b6ac3d83fe1d9a49bbbc4e51285522bdfe1
SHA5126b331de9d7ee9a95b690dd545041788286cb04895780d179ef548533d266f1660991e98d5ba48514844291ef7bea3a3c46786d96b6ca9ed254d8eb0fc8700389
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5l9wod5l.default-release\datareporting\glean\db\data.safe.tmp
Filesize23KB
MD5037583e4be9e1b374a04556bac8de072
SHA18cffdf8dc86874809573f112503ef24a6c0254da
SHA2564ebb1610b80d200f11e859f23c417b86c550e521750abb05af7378053e552444
SHA512a9eef2835febe793357051d0863145b9a40a0fb4c05aaaaa8fe688e6cdf79285f86fca56f2a2d9792b37da060a1e78d722f58d7061a2b7ddbd584cf135510856
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5l9wod5l.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD57fadd8389c3a206d8b3638577539474c
SHA158cc0eaea86af4785b2c33f70308c0276d71c89b
SHA2564a49146a73dfdcbe5e3d7579d175f814e68692611a3bf40d488111d145106394
SHA5127f30f240ec12fadb3e362beb01351e6d05ac51b3337e6c29a1c5de0d1c38df4c25609b4f61c8c632507fb36a4200a90f88dd378525d7535f9d8a5624d114dfcd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5l9wod5l.default-release\datareporting\glean\pending_pings\7ed9df2b-f179-4cea-8a36-e466c688190f
Filesize982B
MD5d598da8033b420b8e26b36b145b71bdb
SHA16ad75ba833cf9d43f3386c2d16a1932720fac6ad
SHA25658a446c593aa9491ab6b33d60e127f262dc6a8ca45eafb235517fe90b1f8db2e
SHA5123002fbbcec9d3cdd43548580afbb4adf82601a1fed22230daf35afde307b246cce42060e89054e51fc6e8133e076e7d0c18005b3e4e5094f56d6a6bc41340f29
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5l9wod5l.default-release\datareporting\glean\pending_pings\8a704b80-b6b9-4146-a444-bc4ff5d1754f
Filesize25KB
MD5de75a1208e590b69e8faa21a0390944b
SHA1df24d1188573c39f0c1a7a03480b3d909217cfa2
SHA25632e5827c65b61d2999cc28c5330ccd56e077c76c2ccd6828934e72d29b89f32c
SHA512ae8f619babff46c1b413533a1205fab5aa5f0564ff820241fbbbd73f99d353a862395eaa9639201518002e282e540a856707f6d849ea1bf056237f39934d89bb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5l9wod5l.default-release\datareporting\glean\pending_pings\9fc60297-b5a9-4a47-9d09-89daa3b21e4c
Filesize671B
MD5fea4043998e00454a2a4636e39c5e4e3
SHA1639c54daa8d1c65602784e8ca569f0136ef99bca
SHA256278098289ac2fc4394a37ef9d69187687ffeb9cc3d7a81303f7652117db986de
SHA512b78560a278f500faf028d09638f1c72e9e7ca155a1077f5e8171124427639318407715a6500a52b93ac681275ab2b0d5f560662820ad894971a8cc69491846f3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5l9wod5l.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5l9wod5l.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5l9wod5l.default-release\gmp-widevinecdm\4.10.2710.0\LICENSE.txt.tmp
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5l9wod5l.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5l9wod5l.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5l9wod5l.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll.lib.tmp
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5l9wod5l.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll.sig.tmp
Filesize1KB
MD536e5ee071a6f2f03c5d3889de80b0f0d
SHA1cf6e8ddb87660ef1ef84ae36f97548a2351ac604
SHA2566be809d16e0944386e45cf605eae0cd2cf46f111d1a6fe999fec813d2c378683
SHA51299b61896659e558a79f0e9be95286ebf01d31d13b71df6db4923406e88b3ba72584ef2b62e073b2f5e06901af2c7d1b92d3d12187fe5b4b29c9dd2678444f34e
-
Filesize
11KB
MD5eeda0c4e750368049ea414209df812f8
SHA16def3814aa1790502ea82072f802053702539204
SHA256e4f1483644fa981559f2e4ecd815dd9910b5e11ada5bbce4bf0d8adc29953f6a
SHA512fdb7885507304b38d581e2df5aea7cb856181eb7dfbb722a0b98ee69c64410d010f5818300d18307707f97ed569783d4a2c2f4b5c0f9d3fc4006261f58084fda
-
Filesize
10KB
MD5f8b9c24ac23aed4c978f8735d551f071
SHA11b6d7169ba7b79ed2ac738d59360f036f2cb9606
SHA2566d9d127879233b32b8bc9e3de343de3b94c6e89b0c8544d1e279802123b31ce7
SHA512a8afe07efe2aa16b4a89b0fc0f5524d408837e1eeb119a3eb0c0ce2bae222a211cd844d2600d75d78d5bea53080b27bf3162e4d68bc09cec8ce0f5a6354bae4d
-
Filesize
11KB
MD52b2e55c0465518d8a9609c0a3e2a6c1d
SHA10d384e94d53fcb3ec169aa455368c942dc9cf424
SHA25622e8cfe6d20c6cdc1d2e238e5f68aa17d52e742638fc079193c930bfaebca481
SHA512c6f91e3c05168fdc537966309e04499c2c4234ebe6232cef8567c4a9a9a8cd3937744ac24bf3c04895df8d134b6ea1c9fc9553946a476fec51b0b977e8a6e53c
-
Filesize
10KB
MD58d1dd489e8599b829f6be8dc84cf4559
SHA12409339e689572399a8727da3c67d2b2e6632a95
SHA256a2e5a02a1ed8bac51c0b5186f9feb28796dc2c876f024fd38f3cb479f001aebb
SHA512f67596307c05c3bfc2d6378de61b6d0a49a03813932b451b454599905f32923f23dbfd0f6df1b371933540c5d11424c3b1ebfe6ef3c22971bb963a3e983c5350
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5l9wod5l.default-release\sessionCheckpoints.json.tmp
Filesize288B
MD5948a7403e323297c6bb8a5c791b42866
SHA188a555717e8a4a33eccfb7d47a2a4aa31038f9c0
SHA2562fca1f29b73dd5b4159fa1eb16e69276482f5224ba7d2219a547039129a51f0e
SHA51217e2f65c33f47c8bb4beca31db2aff3d4bbb6c2d36924057f9f847e207bdcb85ffcbb32c80dd06862ffc9b7f0bd3f5e2e65b48bb1bc3363732751101d5596b1a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5l9wod5l.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize384KB
MD502d072f833c65310fd757b934a7a6568
SHA1ceeb9a131438011ab2228bf34481ea55276bbc06
SHA2564bec1858237e420cb1c623d9003fcc88e3b3c8109268f5a5f51d051ec7360efe
SHA5127d4a462c4c9993637a98a8fa0ff4d41cf4b65fc28265c58a5874a1f457bcef818a640edaa5f84d8857ea65874ee9a189e4055dca81a89c5f3b5716171da1fc40
-
Filesize
7.7MB
MD506516ae789bcf2d83549f3b7fcf03121
SHA1041e065f4077ffe74bafc1e1c321e3534e5ea34d
SHA25646484172d5885dd6e3cd25779428275695acac186f5bc074b01310c6fad7cccd
SHA5122030e5a845c5ce4c7d9e710fe3036b6fadc9a291e213d09639fde88cb301b087189b6d6feb8aef6662a56112966cf590d993228b8bf506923c6e49d1b3166b97
-
Filesize
8.1MB
MD51ab9968333d6e6633b6e05fd5d64bfd0
SHA11b642a8c354b852c5b24f69bac5878a69d987d84
SHA256406eacacc270bca34bf09f1aae1e383449734306a14edc03c1e33dcdaa6285cd
SHA512fdfd4f029a2e04766b102496515ab21055698a8de9f1fb15e571476a7508f30c0ced8b5c1f8f8246c2494cd3f6a7c4ef4623b096d10f104630b6d91440e6b0a0
-
Filesize
7.0MB
MD523105baa90603928fccd3df2e4d249ab
SHA1964c538bb09861d338005a0b8c9a652b39880da5
SHA2569904278ec3ed9cb81866b89e176843c48853fa4bc0cfb0e801d5768dba7a8d75
SHA51229ff2efbfe2207e4ecba7d1f93d0afc2aa1671a66f46e80523eda0b9688382c0c43c93d704d903cd45dc2562e7fcbcfe51da333a7847de5261cbd74dc7065eb2
-
Filesize
8.8MB
MD52ae2c695ce895e44282d9cf2e561c549
SHA10fca80c7c0303fa8d1b47060e31810a55af8744d
SHA2560b6f82664e8115ab3ae001a8ce44770e497379c536d6cbd3bb53bdf34d5c8ae3
SHA5120f4326a463b39923f1e3c13268eae276b9c11373194ed6ee7e5decca54d11e687dadd3d6959ff883f9c7356370e83a49631f51a3a672750891a870bce74d320c
-
Filesize
6.2MB
MD52c8a126b7b205988f4c0748cd356b5cb
SHA197df99d1c13bb25de6169c3002231cff74a28d69
SHA256e712e958dfc0c603d48927f739c77a03a67e7a1e5ca9700f3b193d48ad420af4
SHA5125a0dc46898e26090b2dd8092466c05c8fc0536f07665f3aa34f0aa61d54f6388f944a32ce44e10b1d71a84fbdddc264ff333a6a7e34f6ec7ee690b5d8a403a3b
-
Filesize
6.3MB
MD57342642da22b92c0bcef96780c83b186
SHA12840e688205b650c4867be29b102c4b5d96e1806
SHA256e112a24f040e48a18a9cfc70cbd14ed37f1f84ccf563e69d8f70f86d12cfea2e
SHA512f3aac13b51901182c74f5c9f3bb3c011cf0d02b4b022e78bc0a3bbd0258112956f8fd2a79552d31dd632f247627a3f9ee3772aa53e6d8a3ebc26e0dd2ae43b32
-
Filesize
8.1MB
MD58420193c75bc82d502c4d9b64a8fd512
SHA162b13ccfeca47ef29eb8fefd3ffefc0e370164f1
SHA2564349cb62d38ba526dc3b38b876d99730ad28c49003a808b920dbda35797262b8
SHA5124f8cf5d21347e4d2ea07919500da7fcc2ae74c7ddb98b495ce6196cf2fc6eabb3814f49ca89c34f135857a5bd5616bb878592ec65168a1668cf2871276028440
-
Filesize
7.9MB
MD58dc1ad3817c1ff1c7e22ab09fde6ddc8
SHA1e15c65b727016d5c97b3298ee34525d788f3fc10
SHA25650a47fbe371765748794930df73cddbbaab7cd06d0a5f6611007861f2630a18b
SHA51235cecaff17e13911c82b7ac12eeab24b23f126a3f31845f3ff91704d4ba4970b97f5c834b484d9e0c46f96791007f1dc9817e186c989f61637afbb459d95ffe2
-
Filesize
9.6MB
MD590e6e61c1d798ec4c0b7114166cc9b44
SHA13c7fa502c37c2ef3d93b2f0560dd4790c1e74ced
SHA2565890543029f39e693f4f2d204616505a109e05b05887aeb2082308ad34fd5e30
SHA51290a105d242e1a0c4fdfdc19f8ea5a2b03c839919972afab2ce7936a076582accf73820814b4bcd64fd638ef90c8ce5ecf691430ee61dd0dd25e647c7e76eccd0
-
Filesize
7.2MB
MD598d45eeec939622d8ed5f8f8703dc41a
SHA11784da1f14dc65bc9296bc745852f3580821855e
SHA2563a5caba2f2f18cbcd207268146760d2ae88d26ba83d17b557fd7a12da28e0fb1
SHA512e3bc49ba5f90c61d6e70e9a0e069323b641360470419e8b610ee4b5faeb63b07b802ef70432dec2a9bc0e0c6590a9d4b971b319002afb0b31655f1fae30a9f57
-
Filesize
572KB
MD50fdb0caa9aa9105166793ca2328aec93
SHA16d49cfd77a0ba9764c518f2bbddc0a28729fbbc4
SHA2564090e8dd89ecdef10d4fea3afdecc5f3f7188eec91fa59a20ead856eeb86e36b
SHA512e3faf9a22a93d5bffe29fc4512463ce68c9749240dcf7472d60f23e921d8721a5d54a2d88cb2d8eaba52e019b99aac57a155613c9ec89d0f6e75d563f6c113ea
-
Filesize
1.1MB
MD505107fa8ca60a91926998a0e3a2b80c9
SHA1e509f646e24fad46d0a2db324a1a4d5fb58bb325
SHA25635e95aac4f0d0c5b008b8e03940c9be7e410d43e703d299792e463171e924e83
SHA51284d747bc309093fd4e1789412735a8faf7ae34968d401f5bbd242c71086b17a6bb1446fe40f4907d7351f47c3af069c166a2d984be583d9505c7dba09d0f8f19
-
Filesize
769KB
MD53b98782dbb0274e65c6d53a2ec69970f
SHA110a56fc8a7ecd914fb7ab0ea9e41cd991ea167ff
SHA2563245a70fe008c33fd18a936fd353092dd10bd2f377bc51f26b8214f5283234f9
SHA512e6b5516971e865ea3430e28e1c723338107469bba1e46b38420e69b3fd0ad5ee1a81d9a6c53ffd8e080334bc30c371dead236e90af4af3f524643b0cc140fbc3
-
Filesize
453KB
MD5f632f34a9b3aa3df159f0f1cb3130ffb
SHA14b3495360b8db44c6fa71f2f7913c4314e5f7453
SHA2569e7e7af0a1e641a72dba5685e1fd5fda17c38c653c5515ee360ccf8aaf81eee2
SHA512b0278edec4ee6c8fcbd4b21e6ead8d3b9382c22f180f4bd3ad67699dd12c3d147a159323fbf77ea0862ca8e1370b9ac2a3301aceaef8e947ebbfde186e0871c8
-
Filesize
809KB
MD5764cf332c9d92af0118cbdd35264fdb4
SHA1c419527cdb2bb6f81b09380a813ee044188167d1
SHA256ddbdc556e14e58b924a2e164c0d20920b0df3f07ababb9942414c30ac017ee0e
SHA512479a723f6ab8804db9bf3e6c58e48f45937eb63c625d85849cd9272eb74336491417cf2433432d26aebcb065a94769a585ac41f5274270f85ac7c897ed2502d7
-
Filesize
848KB
MD536b11bfb3fdc6c58c93ae15e4668c068
SHA19b0205cd4304a4f3ca8b33a0857c59c479419188
SHA25623d9300e412f2b31821d185763e515c4aeae51388eb1f591d6d451900d3adb6b
SHA512e6a919811ec3c11a877d72b5c551e97051a90428f8bbc2869adc512fc8bcc01f9f0ec6c5cfd81372fb1217a9302fa85d43ded421fa18645fdab936881a4eb03c
-
Filesize
1.1MB
MD588f20c81eb699445c23ed19d1b53cdc1
SHA19b1073c392bd3ebca4ba39800ea9e050daa55114
SHA2562c77a0d63f3b708a189bab9524013d93c5a7a6221e55bb8b02e6c21d8bbb59f3
SHA512298746ed644c21888a9278cf791e788fcec0e1f99856034e0c4f01f6cc6a6225a27d9f99652a01ec12beb738c7d87981cb4f4544dfdd41eed7bef77a8925203a
-
Filesize
1.1MB
MD59ffe33114d6b9ccad9321101aa39016b
SHA1c08a8044a76454c98c3728005dbaa838d993c0ac
SHA25652aef6964ade8560cee868d4dfbceabe418c1e8e19e5029b05dfc3b1b4c6b805
SHA512992068ff762b1b2b51280acd69f3042759721d6587c2962ad67fa00825cc4bd229225606d432a7f20359f7bee5da098c933a27a65da9a5105bbf6d1a3ebb0033
-
Filesize
13KB
MD55b43ae75db055d388e90b1b3945cfd74
SHA1ed8ae1a621c44e5a4aa2ff0f85efdb6daa0911f6
SHA256f2d45a7304a583803726edb2c1dde97be17558465ee8757ab4119802febfbb7d
SHA512482f702e2a8400a6ecccdf804247cf8def3d55848764739fcef597cb44820c2be66327bca0fd343f2fca4e263319a4415d30eb21b193475055c1b715cc6a30d8
-
Filesize
2KB
MD5d1dacfb4494be3ef0cfa57f79f251e8f
SHA116de10600bd3c897017520bb3035caea8bb924ce
SHA256ab30b82735a7e58533e4ad509412845d21171578aef1f9424ea78126e017db63
SHA512965a84ad7a9ba2b93f8ee3fbcdfda068484f6b684cd5076e90bf5730c722681d31dfae454cf0e569eeeaee81cc269b998a4f0cfff7ea22c5186bd087d7596837
-
Filesize
19KB
MD54f905551c864dc49a6e8877f51a30553
SHA1a25686e702448f1ba1fe2b9640842118aac09036
SHA256bc49886a19dda278f96a04c7d82a7fe16cd78dff36afbda6e4b5671a2a6176a6
SHA512c17901c10525a86ed9b941ca106121db3d8fa8c91e9c241de83c552fac09eed4f2e22a6467665610c2ceeb2b477712b620dd5712c0f679a3a5b776db25301c99
-
Filesize
730KB
MD5766adbeaf9b0badd9cf2c646dc323a70
SHA1a90ed8a3eb05f162851e8faf528c81ca54233b0b
SHA256cb102ea46360e886f7082cd80791ec531d43bd635ede47223d871923358afd1f
SHA512514e63715049a91b2248bf18c903bd7c26626164688b31b4ac73e9c2e852e963731bcde4af1c16099b1b9286b2eb18600bb0717bde2ce4ee9de8309578295f8d
-
Filesize
927KB
MD57091312a0e7831843423da52e484362c
SHA11c56aa24004c1e411cdcd8cfa19a515ab22b65b2
SHA2563c468d633b4d76fda0792fa5233934e329e4dc9942766e3b53545ad5889a1ad4
SHA5123d3dd7655c5c7e2b591363d96253821bc6f64913b88276cafe9b499cb5e1ec7a2a94bef840e81406a3f3d68bbabdf9d58dd421df21ec9b613dd129082f07dae8
-
Filesize
967KB
MD5048af6fcaf80caa620de3a975624eaec
SHA1f082ab295a3ca00d760e7e4a5a4961783f5560a2
SHA2564532611c3359765ee12e148710c0fd80743eb930b025ca251be62813b01f53f2
SHA5128db00b18a59a1a781dd13af7353a155b732ca5c9ac8d96cff6cebb291ce14ef77886a27d8d3f86044bea5c57a9d6e9a89e66ded4fd8077d05333a4e51b85f8c7
-
Filesize
1006KB
MD572e672de39cf1728c79a4bcfd77b49c9
SHA19f305130f4558335e5332d84796f773170561d0d
SHA256bcc73f53354a5021e36ed6d7395838e6c16a1b5e7a56c638f988f81ed12fe66e
SHA5124275b1a3e3a49ad6d0da80d4d576801b8087001a7ef9526c7f0ae9d2318a62aa70e44c46d836822a7006f3feef444b4f7ecf2b89525ae3657db47099c0876374
-
Filesize
532KB
MD52599dde5ec90f76e9bbc7a52150304b0
SHA1aab2e3ad36fb78bf271f04c7c7a93673ad1afc69
SHA2568de98aa92e7571cf0132ea1cb67a61af884e526be3c6eccf9d51c2c16374140c
SHA51290b7a8ef76056421acffb86715af0dc263757d5aea452f35d34c4fd43807e9c5ad7323357c9261461bdcf8400d0885653eda2bd1c4f9b0886a98c51297cc743c
-
Filesize
888KB
MD574da8cb0dd0033e4908c30aa82310bbe
SHA1dacc04e1ee268c17324dbddc05ad63a619063abc
SHA256c75c0ea41ebee88340cbf405d4bcbd743d66f04acfd98187c2af10c7588619e6
SHA5124e9b316235376de3b2dadb6beded9db428e95ef8a41c61e9c8bdb4cdb4f53d9bc7fefd706eb77ef5880339893d5e97eab5b5b225e32b80c89fee1eabc5e3fbcb
-
Filesize
493KB
MD5bdfcd2ab00609add8734a90097cfde01
SHA177df8c2c65556e51f1fec0727eb0b232a15b9a61
SHA256baa5ed77440cda0aea8544cdab14de868cd98228439418344e3921572ea58872
SHA5125a17e621961905bc253269d9e81ef667a5dca849e66c88e26ff00b4204b4a22f47d74f5839c3639e01c80ab0b09fc39f9bcf1e4920f960c1ff140242cf14b3a0
-
Filesize
1.0MB
MD516021336c8ecae54da8523f7959cf4a2
SHA11a9e3a2210ba0161b0ed7d72c5ee53c41a331e31
SHA25646b48693283f50d8446465c265fea4bdee87b626cb18fba484a473886c148f9d
SHA5127d18468aad665acc638bb5d551dc468da761fad18f1add1f30102f6608ad19f625be34e3f3bb7a9cef4cd58cc2bd150012bd77f10604eb56ce1daf26dd7ed0a6
-
Filesize
690KB
MD55aad0540decf186de5899d3d7b5e8704
SHA13df25152744daf649b8d7e3a25035a1ab393931a
SHA256e36ab2aab96a6bcf89fe0a9dc37a3640ac5b746b191e3c06d97a18a7240ed158
SHA512f8561df52f1533399f5b53f464d61f9da505f06e5fa2e536306c4a7ff43c231f95bec3908a1b45dc41e2c4e839fd67b04d545438fae721b74721b24e64e6f027
-
Filesize
12KB
MD51c99e067d66e938547ebcedfd23ab001
SHA18f73c0cf9b3c83aefcaea0e60e28429f4991722a
SHA256bbe6727353277197ad281b704561a2a4c512581da2341621460b34c2c2cc730e
SHA5128ceffaafd1a96f86456a8b149ee636d8b6600750a5cef097de9be15be87d9bfef00cfa0e01cd9da86f7ff190be883815f9f709c7542ecf6435d24825c1657793
-
Filesize
414KB
MD570df862f964781e54ee4eefd715f0dca
SHA1230ed14f90d34b85392bad88f3fc7c36b09c09c2
SHA25646137da1059d07e2158de0651c5b9cb66ba4fd0579819dd0283ca95e6d329830
SHA51261fec344d2098a1efe7cfd6942e9c1553d0328cffd9193a52ecd62482a52beca14904879f76c95425cce0a3ba69e03a4ebf00efc0375a412b793afaa4f12fcc6
-
Filesize
1.6MB
MD5cccdb82679b32f6fb7e69f5470216910
SHA17ad9722e20565914d964fdd56ce14be885162b2c
SHA2568ac9632e95bf7d5e74f9c44ad4033cd6499e36f43186ca8cd68ef5600ba5c949
SHA5126ee4ebe41287cb904f521c76959e0e041bc553e072ec9348af1bafdafe4f8fd2ee96b421575740f0393ed0e9dcf5301031dac353f62035ee722a5c58671e6dd1
-
Filesize
651KB
MD52f66daa11493eeb1e3ec37f61d2e79c2
SHA19d9decac861f979c43023653901df848183b7a5f
SHA2562386e3efccef62031b5e4277f88314c8a1ea4551ca1f0107f590c9d77c339e6f
SHA5129f968c848cfd61908759b52217a73caa7313006bd7b1e7cd19ce51a040e4dfbe1001853602ecebd4206daaecb6dd31f539f5db27121f58ffc71dfbdfb17199a6
-
Filesize
611KB
MD54a17ddfa1cc4375486444c8a63c3aea6
SHA130740b343c2cb10a6a99b1b90277caa018b6b895
SHA256e5cbc8c2a0883dbc911adc85ca76be0d572244f73569cd4a40710cd2d83ec3af
SHA5127a26463d28dd69e4422ef0c0e7516abe3d0099d692a458bd09b91d82b78118bb7dd4fd329bc65ada191fd768318eaf90d6e74d0ece1881f8b899d1ecf974da61
-
Filesize
10KB
MD5ae1438f0f3b8b8cad28463166a268251
SHA1911b759bbbf646830c6312d018dd126903d9637b
SHA2561d7ec7bb54817f2f758c13778894a7580df32e4cb8fc11baa8bd99b4ed230160
SHA512997ec25c604b0865da3bc279953a5d643277ae9aeddd1fe0e82178ee4fd75f303584573b9826ca6ae207fb68e1cf1e07ddd06c4bae379d911242932e14d47d3d
-
Filesize
21KB
MD57079891932a64f097abafd233055a1e9
SHA1246d95feafe67689d49a5a4cadba18d3ac1914e5
SHA256c97189b50e5e92be09966d4732b6d61a2e435b2935d60c09989e555ae442e7a1
SHA5126e9ee6427d7cc2474dc634b088cf3f35d06dfb734d2b63fbbc794f4083b4b5754379daff4804bf5024b1b430aa5e50fa6d839d3473ceeed3043d373c85e9862a
-
Filesize
6.1MB
MD5a990ef3ce5928f2f44a79d38f191b6f2
SHA1547404121a55fddadd2c3c0a272febacd4af4e51
SHA256b0ba287fcfc9c161576a5f8644b185e0a0f8f5a42ff4394c4fee9eb197c5d026
SHA512585369498846116b0d1665d66c34e502297181e8a76914f53b2d91f0bb4247196e3b80e4b8e9d552a77e946b20ac3ba916d119c5cb21b8b56824f9ef71dc7aa5
-
Filesize
8.3MB
MD5a9e438dac2104210d1296e927c292ab3
SHA1de017d2d00d4224cc6c4dd8e44ff7cc6c4063964
SHA256260e23a28410f82ad2c5056e875133df23a1ff629ea2d72627316e0ef4d7ba64
SHA512c256b3bc7cf34b3028283784202ec34ca383a8e7c1ac6225921bf396782813e26c0a6b8e6e3c60fb1abc7edc41d20c6fe73f1e75d4276f8d40e041e47272e897
-
Filesize
9.9MB
MD5b7e824d9eb8b9ab79293c98eeac6a992
SHA13b5cb249f6b58e45390a053c3717ca9c34315a54
SHA2560395a6aee423c5b12fb4d4cfff37c3e7ee8e6bea40a57209544a8100b648e4f7
SHA512e6219ba91810d41a785b8ed93591d2bd7d2ea57b61f9ad0420c23498e1dcab4ed91fa4a6ca96bc1956bce5e9e62086dac7cc329826d018b077ef67170d17706a
-
Filesize
9.5MB
MD5be92ca6ffa6b2a373b7258c1e69ea79f
SHA10bf9ec9186eebd5421ea540b7b8b8dc8382b79bb
SHA2565d81ab696a95d71aba99f0c15709682ff1a3aeb142f53969786f6d9a61bbcf17
SHA512daefa47813cc0adc7b4579057af80092d4927c125f83119dd396936c37126a3b633816817a93a8bab9cd1400d41565e8277aab92a51411229c010b25477aa9c1
-
Filesize
5.6MB
MD5c9ec9591d98ddcc339d97d41d24d1386
SHA16aa1267a18a62947049855bf2eb568022d9d2a2e
SHA25621563beeb4ea7d3862c7397d85ab7f0d27f52713c5643ebccbbd3e6ef3146c52
SHA512333913d8e4872f2ac80ac2b5459ccc92548b97cc0f74571157620c87434dbdcfb58f5a8b32fdeb507de109e14633f0410c16a81f7f15ec5135db09d2b9f6d638
-
Filesize
76KB
MD5950087e828e1b7426f703678e446c799
SHA1c9f28be9b9f810132ec8d78c161e5a232491e60e
SHA2568a41eaa0d699f48661c2560aeffe4b0432cf755f1b15e31ac9aff667d498b3ee
SHA5129ab24bf84a4534e219df132a0b43874c1d6410ef802c69e65c5aaf3d0c46085470690851ef23303f9a48076e8ae552d816903e02c43c1af83e6fc3457d2acb93
-
Filesize
75KB
MD56f8e3e4f72620bddc633f0175f47161e
SHA153ed75a208cc84f1a065e9e4ece356371cac0341
SHA2562adf199f6baf245f0b07d31a3a1401d4262c3e6c98b8f10df923ceb2c937291e
SHA51280187277e78f59b7ea71ed3caa55452e730d93b8c296d5820d470776a428cbb7e7fead87240e811436f85e4d89df2b9f31d6d16658d21abf59395cab7074a869
-
Filesize
227KB
MD5e0951d3cb1038eb2d2b2b2f336e1ab32
SHA1500f832b1fcd869e390457ff3dc005ba5b8cca96
SHA256507ac60e145057764f13cf1ad5366a7e15ddc0da5cc22216f69e3482697d5e88
SHA51234b9c5ed9dd8f384ecf7589e824c3acc824f5f70a36517d35f6d79b0296fbccb699c3ec1e86e749d34643934bf2e20a9c384a5586d368af9887b7c2cede9bfb8
-
Filesize
2.5MB
MD5ec5eb6f2a11dafce3e6dc3426053fbf4
SHA19bf0bece5bd1c86488654fab9a3972cde182b84e
SHA256dd9f71ce810f953632cdfe034c9f40568e61cd9cdef8cbe7cbbb5f2cd1c03567
SHA512550ee479940f03ce867e50e2672cb60e45c1b98e9bda5cd95e89100487fc2c8e86671753af60c77c27caeb9073385fe902248e52aef9eacb6f32172d26adc9aa
-
Filesize
567KB
MD5c10e2e346a920ee238efd96a5104bb5e
SHA13b48a64b5ced0ab7baac10705ff291b0879c07c8
SHA25623aa316f028048327634d0eb81c931d3c19d5ca3e346a1cec2f8587a64516422
SHA512ae3ac69e5840b198d1a62fc737f6a7d630f430699ffa1fb084b52d8912335fae9a5ccacc64b5f461df61b14fd1a5ccc9e8cd4d698c999eef9713b309a6fe6923
-
Filesize
183B
MD57749375050ed9525816e6d801b75c2d5
SHA11d817afb3909d76225bf70b3637e9ab629e633d0
SHA2564ec4fc006cf047c196ebc959a9263da714fcbdcb990b5d6d81956c6f932be5a5
SHA512ef35c6518bfc80cd4a90cc09c5aa7bd75bf13e34ccfe176c5e48cff82fcb24d87a8ae4ed66240c3f3c4b391e754ba7b8fa1d673bef6ab56fcc36921aff468ca7
-
Filesize
17KB
MD59147a93f43d8e58218ebcb15fda888c9
SHA18277c722ba478be8606d8429de3772b5de4e5f09
SHA256a75019ac38e0d3570633fa282f3d95d20763657f4a2fe851fae52a3185d1eded
SHA512cc9176027621a590a1d4f6e17942012023e3fabc3316bc62c4b17cd61ce76bf5cf270bd32da95dba7ddf3163e84114be1103a6f810ca1a05d914712895f09705