Analysis
-
max time kernel
450s -
max time network
446s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2024 20:07
General
-
Target
brhu.zip
-
Size
5.2MB
-
MD5
b4beead5a110d9ce24b1c26fa41e3e99
-
SHA1
b2e873487c4d90447d923b3b6b89995ffb456b8c
-
SHA256
a1356c9f60766482ea7590a16225a6a13497387345741da43d7cd5f33ab47576
-
SHA512
8f701a85322980c28f0742ff6b4ba549eef93c0462cfc27d56517d1d210c4016ebbe5ef064fa5346c65119dadb2916de04e5be4f689f4c2f68a949f2e9bd617b
-
SSDEEP
98304:taptf7h03fmRwldsRLvP43G9B7JgnZX0XRBx9dLCHi3mKJ2cWTju:tGf7jko4olEZX0L7dL2i37ncu
Malware Config
Extracted
darkcomet
Guest16
darkgvr.duckdns.org:1604
picaroon.duckdns.org:1604
DC_MUTEX-1F8AXR1
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
MuPduYiF2XAq
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/reverse_tcp
3.17.202.129:17362
Extracted
xenorat
127.0.0.1
Xeno_rat_nd8912d
-
delay
5000
-
install_path
nothingset
-
port
4444
-
startup_name
nothingset
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
Zula Hack
denkmisin.duckdns.org:5552
Windows Service
-
reg_key
Windows Service
-
splitter
|Hassan|
Signatures
-
Darkcomet family
-
Detect XenoRat Payload 2 IoCs
resource yara_rule behavioral1/files/0x000a000000023b8c-553.dat family_xenorat behavioral1/memory/2680-555-0x00000000009E0000-0x00000000009F0000-memory.dmp family_xenorat -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe" Robuk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" free.panel.exe -
Njrat family
-
Xenorat family
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation Robuk.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation free.panel.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation Zula Hack.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation msplayer.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Service.exe Windows Service.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Service.exe Windows Service.exe -
Executes dropped EXE 27 IoCs
pid Process 1964 Robuk.exe 4456 msdcsc.exe 1600 Robuk.exe 2908 bak.exe 3328 SqlBackupFree.exe 2416 SqlBackupFree.exe 2768 Robuk.exe 5092 floornite batle pas.exe 2680 xeno_rat_client.exe 3844 free.panel.exe 3184 msdcsc.exe 1836 free.panel.exe 3472 Zula Hack.exe 456 Windows Service.exe 4448 Zula Hack.exe 436 free vbuc.exe 3304 msplayer.exe 2104 Tor.exe 3184 free vbuc.exe 5016 free vbuc.exe 1176 floornite batle pas.exe 2288 Robuk.exe 4612 xeno_rat_client.exe 3916 Zula Hack.exe 2636 free.panel.exe 1924 floornite batle pas.exe 5028 xeno_rat_client.exe -
Loads dropped DLL 8 IoCs
pid Process 2908 bak.exe 2104 Tor.exe 2104 Tor.exe 2104 Tor.exe 2104 Tor.exe 2104 Tor.exe 2104 Tor.exe 2104 Tor.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\msdcsc.exe" Robuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" free.panel.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Service = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Service.exe\" .." Windows Service.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Service = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Service.exe\" .." Windows Service.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java_Updater = "C:\\Users\\Admin\\AppData\\Roaming\\MS WM Player\\msplayer.exe" msplayer.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini SqlBackupFree.exe File opened for modification C:\Windows\assembly\Desktop.ini SqlBackupFree.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000a000000023b85-645.dat autoit_exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\MSDCSC\msdcsc.exe Robuk.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\msdcsc.exe Robuk.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\ Robuk.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3184 set thread context of 1912 3184 msdcsc.exe 145 -
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files (x86)\Pranas.NET\SqlBackupFree\SqlBackupFree.exe bak.exe File created C:\Program Files (x86)\Pranas.NET\SqlBackupFree\Xceed.Compression.dll bak.exe File created C:\Program Files (x86)\Pranas.NET\SqlBackupFree\Xceed.Compression.Formats.dll bak.exe File created C:\Program Files (x86)\Pranas.NET\SqlBackupFree\Xceed.FileSystem.dll bak.exe File created C:\Program Files (x86)\Pranas.NET\SqlBackupFree\Xceed.Zip.dll bak.exe File created C:\Program Files (x86)\Pranas.NET\SqlBackupFree\uninstall.exe bak.exe File created C:\Program Files (x86)\Pranas.NET\SqlBackupFree\WebCommon.dll bak.exe File created C:\Program Files (x86)\Pranas.NET\SqlBackupFree\Dart.PowerTCP.Ftp.dll bak.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly SqlBackupFree.exe File created C:\Windows\assembly\Desktop.ini SqlBackupFree.exe File opened for modification C:\Windows\assembly\Desktop.ini SqlBackupFree.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 26 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Robuk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bak.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language msplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language free vbuc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Robuk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Zula Hack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Robuk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language free.panel.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdcsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Zula Hack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language free vbuc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Robuk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language floornite batle pas.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xeno_rat_client.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language free.panel.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msplayer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage msplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xeno_rat_client.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language free.panel.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdcsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Zula Hack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Windows Service.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language free vbuc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xeno_rat_client.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral1/files/0x000a000000023b87-85.dat nsis_installer_1 behavioral1/files/0x000a000000023b87-85.dat nsis_installer_2 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 Taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A Taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName Taskmgr.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SqlBackupFree\shell\open\command bak.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SqlBackupFree\shell\open bak.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Robuk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.jobx bak.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.jobx\ = "SqlBackupFree" bak.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SqlBackupFree bak.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SqlBackupFree\DefaultIcon bak.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SqlBackupFree\DefaultIcon\ = "C:\\Program Files (x86)\\Pranas.NET\\SqlBackupFree\\SqlBackupFree.exe" bak.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ free.panel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SqlBackupFree\ = "SqlBackupFree job" bak.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SqlBackupFree\shell bak.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SqlBackupFree\shell\open\command\ = "C:\\Program Files (x86)\\Pranas.NET\\SqlBackupFree\\SqlBackupFree.exe \"%1\"" bak.exe -
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\MS WM Player\winmgmts:{impersonationLevel=impersonate}!\root\cimv2 msplayer.exe File opened for modification C:\Users\Admin\AppData\Roaming\MS WM Player\winmgmts:{impersonationLevel=impersonate}!\root\SecurityCenter2 msplayer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 548 msedge.exe 548 msedge.exe 464 msedge.exe 464 msedge.exe 436 free vbuc.exe 436 free vbuc.exe 436 free vbuc.exe 436 free vbuc.exe 3304 msplayer.exe 3304 msplayer.exe 2104 Tor.exe 2104 Tor.exe 2104 Tor.exe 2104 Tor.exe 3304 msplayer.exe 3304 msplayer.exe 3304 msplayer.exe 3304 msplayer.exe 3304 msplayer.exe 3304 msplayer.exe 3304 msplayer.exe 3304 msplayer.exe 3304 msplayer.exe 3304 msplayer.exe 3304 msplayer.exe 3304 msplayer.exe 3304 msplayer.exe 3304 msplayer.exe 3304 msplayer.exe 3304 msplayer.exe 3304 msplayer.exe 3304 msplayer.exe 3304 msplayer.exe 3304 msplayer.exe 3304 msplayer.exe 3304 msplayer.exe 3304 msplayer.exe 3304 msplayer.exe 3304 msplayer.exe 3304 msplayer.exe 3304 msplayer.exe 3304 msplayer.exe 3304 msplayer.exe 3304 msplayer.exe 3304 msplayer.exe 3304 msplayer.exe 3304 msplayer.exe 3304 msplayer.exe 3304 msplayer.exe 3304 msplayer.exe 3304 msplayer.exe 3304 msplayer.exe 3304 msplayer.exe 3304 msplayer.exe 3304 msplayer.exe 3304 msplayer.exe 3304 msplayer.exe 3304 msplayer.exe 3304 msplayer.exe 3304 msplayer.exe 3304 msplayer.exe 3304 msplayer.exe 3304 msplayer.exe 3304 msplayer.exe -
Suspicious behavior: GetForegroundWindowSpam 5 IoCs
pid Process 4188 7zFM.exe 3472 Zula Hack.exe 456 Windows Service.exe 3304 msplayer.exe 3188 Taskmgr.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 464 msedge.exe 464 msedge.exe 464 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 4188 7zFM.exe Token: 35 4188 7zFM.exe Token: SeSecurityPrivilege 4188 7zFM.exe Token: SeIncreaseQuotaPrivilege 1964 Robuk.exe Token: SeSecurityPrivilege 1964 Robuk.exe Token: SeTakeOwnershipPrivilege 1964 Robuk.exe Token: SeLoadDriverPrivilege 1964 Robuk.exe Token: SeSystemProfilePrivilege 1964 Robuk.exe Token: SeSystemtimePrivilege 1964 Robuk.exe Token: SeProfSingleProcessPrivilege 1964 Robuk.exe Token: SeIncBasePriorityPrivilege 1964 Robuk.exe Token: SeCreatePagefilePrivilege 1964 Robuk.exe Token: SeBackupPrivilege 1964 Robuk.exe Token: SeRestorePrivilege 1964 Robuk.exe Token: SeShutdownPrivilege 1964 Robuk.exe Token: SeDebugPrivilege 1964 Robuk.exe Token: SeSystemEnvironmentPrivilege 1964 Robuk.exe Token: SeChangeNotifyPrivilege 1964 Robuk.exe Token: SeRemoteShutdownPrivilege 1964 Robuk.exe Token: SeUndockPrivilege 1964 Robuk.exe Token: SeManageVolumePrivilege 1964 Robuk.exe Token: SeImpersonatePrivilege 1964 Robuk.exe Token: SeCreateGlobalPrivilege 1964 Robuk.exe Token: 33 1964 Robuk.exe Token: 34 1964 Robuk.exe Token: 35 1964 Robuk.exe Token: 36 1964 Robuk.exe Token: SeIncreaseQuotaPrivilege 4456 msdcsc.exe Token: SeSecurityPrivilege 4456 msdcsc.exe Token: SeTakeOwnershipPrivilege 4456 msdcsc.exe Token: SeLoadDriverPrivilege 4456 msdcsc.exe Token: SeSystemProfilePrivilege 4456 msdcsc.exe Token: SeSystemtimePrivilege 4456 msdcsc.exe Token: SeProfSingleProcessPrivilege 4456 msdcsc.exe Token: SeIncBasePriorityPrivilege 4456 msdcsc.exe Token: SeCreatePagefilePrivilege 4456 msdcsc.exe Token: SeBackupPrivilege 4456 msdcsc.exe Token: SeRestorePrivilege 4456 msdcsc.exe Token: SeShutdownPrivilege 4456 msdcsc.exe Token: SeDebugPrivilege 4456 msdcsc.exe Token: SeSystemEnvironmentPrivilege 4456 msdcsc.exe Token: SeChangeNotifyPrivilege 4456 msdcsc.exe Token: SeRemoteShutdownPrivilege 4456 msdcsc.exe Token: SeUndockPrivilege 4456 msdcsc.exe Token: SeManageVolumePrivilege 4456 msdcsc.exe Token: SeImpersonatePrivilege 4456 msdcsc.exe Token: SeCreateGlobalPrivilege 4456 msdcsc.exe Token: 33 4456 msdcsc.exe Token: 34 4456 msdcsc.exe Token: 35 4456 msdcsc.exe Token: 36 4456 msdcsc.exe Token: SeIncreaseQuotaPrivilege 1600 Robuk.exe Token: SeSecurityPrivilege 1600 Robuk.exe Token: SeTakeOwnershipPrivilege 1600 Robuk.exe Token: SeLoadDriverPrivilege 1600 Robuk.exe Token: SeSystemProfilePrivilege 1600 Robuk.exe Token: SeSystemtimePrivilege 1600 Robuk.exe Token: SeProfSingleProcessPrivilege 1600 Robuk.exe Token: SeIncBasePriorityPrivilege 1600 Robuk.exe Token: SeCreatePagefilePrivilege 1600 Robuk.exe Token: SeBackupPrivilege 1600 Robuk.exe Token: SeRestorePrivilege 1600 Robuk.exe Token: SeShutdownPrivilege 1600 Robuk.exe Token: SeDebugPrivilege 1600 Robuk.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4188 7zFM.exe 4188 7zFM.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe 3188 Taskmgr.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4456 msdcsc.exe 1912 iexplore.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1964 wrote to memory of 4456 1964 Robuk.exe 106 PID 1964 wrote to memory of 4456 1964 Robuk.exe 106 PID 1964 wrote to memory of 4456 1964 Robuk.exe 106 PID 4456 wrote to memory of 5104 4456 msdcsc.exe 107 PID 4456 wrote to memory of 5104 4456 msdcsc.exe 107 PID 4456 wrote to memory of 5104 4456 msdcsc.exe 107 PID 4456 wrote to memory of 1528 4456 msdcsc.exe 108 PID 4456 wrote to memory of 1528 4456 msdcsc.exe 108 PID 2908 wrote to memory of 3328 2908 bak.exe 113 PID 2908 wrote to memory of 3328 2908 bak.exe 113 PID 3328 wrote to memory of 464 3328 SqlBackupFree.exe 115 PID 3328 wrote to memory of 464 3328 SqlBackupFree.exe 115 PID 464 wrote to memory of 8 464 msedge.exe 116 PID 464 wrote to memory of 8 464 msedge.exe 116 PID 464 wrote to memory of 2980 464 msedge.exe 117 PID 464 wrote to memory of 2980 464 msedge.exe 117 PID 464 wrote to memory of 2980 464 msedge.exe 117 PID 464 wrote to memory of 2980 464 msedge.exe 117 PID 464 wrote to memory of 2980 464 msedge.exe 117 PID 464 wrote to memory of 2980 464 msedge.exe 117 PID 464 wrote to memory of 2980 464 msedge.exe 117 PID 464 wrote to memory of 2980 464 msedge.exe 117 PID 464 wrote to memory of 2980 464 msedge.exe 117 PID 464 wrote to memory of 2980 464 msedge.exe 117 PID 464 wrote to memory of 2980 464 msedge.exe 117 PID 464 wrote to memory of 2980 464 msedge.exe 117 PID 464 wrote to memory of 2980 464 msedge.exe 117 PID 464 wrote to memory of 2980 464 msedge.exe 117 PID 464 wrote to memory of 2980 464 msedge.exe 117 PID 464 wrote to memory of 2980 464 msedge.exe 117 PID 464 wrote to memory of 2980 464 msedge.exe 117 PID 464 wrote to memory of 2980 464 msedge.exe 117 PID 464 wrote to memory of 2980 464 msedge.exe 117 PID 464 wrote to memory of 2980 464 msedge.exe 117 PID 464 wrote to memory of 2980 464 msedge.exe 117 PID 464 wrote to memory of 2980 464 msedge.exe 117 PID 464 wrote to memory of 2980 464 msedge.exe 117 PID 464 wrote to memory of 2980 464 msedge.exe 117 PID 464 wrote to memory of 2980 464 msedge.exe 117 PID 464 wrote to memory of 2980 464 msedge.exe 117 PID 464 wrote to memory of 2980 464 msedge.exe 117 PID 464 wrote to memory of 2980 464 msedge.exe 117 PID 464 wrote to memory of 2980 464 msedge.exe 117 PID 464 wrote to memory of 2980 464 msedge.exe 117 PID 464 wrote to memory of 2980 464 msedge.exe 117 PID 464 wrote to memory of 2980 464 msedge.exe 117 PID 464 wrote to memory of 2980 464 msedge.exe 117 PID 464 wrote to memory of 2980 464 msedge.exe 117 PID 464 wrote to memory of 2980 464 msedge.exe 117 PID 464 wrote to memory of 2980 464 msedge.exe 117 PID 464 wrote to memory of 2980 464 msedge.exe 117 PID 464 wrote to memory of 2980 464 msedge.exe 117 PID 464 wrote to memory of 2980 464 msedge.exe 117 PID 464 wrote to memory of 2980 464 msedge.exe 117 PID 464 wrote to memory of 548 464 msedge.exe 118 PID 464 wrote to memory of 548 464 msedge.exe 118 PID 464 wrote to memory of 2212 464 msedge.exe 119 PID 464 wrote to memory of 2212 464 msedge.exe 119 PID 464 wrote to memory of 2212 464 msedge.exe 119 PID 464 wrote to memory of 2212 464 msedge.exe 119 PID 464 wrote to memory of 2212 464 msedge.exe 119 PID 464 wrote to memory of 2212 464 msedge.exe 119 PID 464 wrote to memory of 2212 464 msedge.exe 119 PID 464 wrote to memory of 2212 464 msedge.exe 119
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\brhu.zip"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4188
-
C:\Users\Admin\Desktop\Robuk.exe"C:\Users\Admin\Desktop\Robuk.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"C:\Windows\system32\MSDCSC\msdcsc.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵PID:5104
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵PID:1528
-
-
-
C:\Users\Admin\Desktop\Robuk.exe"C:\Users\Admin\Desktop\Robuk.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1600
-
C:\Users\Admin\Desktop\bak.exe"C:\Users\Admin\Desktop\bak.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Program Files (x86)\Pranas.NET\SqlBackupFree\SqlBackupFree.exe"C:\Program Files (x86)\Pranas.NET\SqlBackupFree\SqlBackupFree.exe" -install2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://sqlbackupandftp.com/thankyou/action.aspx?t=i&g=21ef605e-6365-46a9-93cf-3478a462a8123⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffa047546f8,0x7ffa04754708,0x7ffa047547184⤵PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,10930293377819308425,5673858086719117938,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:24⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,10930293377819308425,5673858086719117938,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,10930293377819308425,5673858086719117938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2948 /prefetch:84⤵PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,10930293377819308425,5673858086719117938,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:14⤵PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,10930293377819308425,5673858086719117938,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:14⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,10930293377819308425,5673858086719117938,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4756 /prefetch:14⤵PID:3948
-
-
-
-
C:\Program Files (x86)\Pranas.NET\SqlBackupFree\SqlBackupFree.exe"C:\Program Files (x86)\Pranas.NET\SqlBackupFree\SqlBackupFree.exe"2⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Drops file in Windows directory
PID:2416 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ylavn2lp.cmdline"3⤵PID:2848
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES4C23.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC4C22.tmp"4⤵PID:4816
-
-
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\qiyjpnr3.cmdline"3⤵PID:2548
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES4CB0.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC4CAF.tmp"4⤵PID:1772
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5000
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3956
-
C:\Users\Admin\Desktop\Robuk.exe"C:\Users\Admin\Desktop\Robuk.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2768
-
C:\Users\Admin\Desktop\floornite batle pas.exe"C:\Users\Admin\Desktop\floornite batle pas.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5092
-
C:\Users\Admin\Desktop\xeno_rat_client.exe"C:\Users\Admin\Desktop\xeno_rat_client.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2680
-
C:\Users\Admin\Desktop\free.panel.exe"C:\Users\Admin\Desktop\free.panel.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3844 -
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3184 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1912
-
-
-
C:\Users\Admin\Desktop\free.panel.exe"C:\Users\Admin\Desktop\free.panel.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1836
-
C:\Users\Admin\Desktop\Zula Hack.exe"C:\Users\Admin\Desktop\Zula Hack.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:3472 -
C:\Users\Admin\AppData\Roaming\Windows Service.exe"C:\Users\Admin\AppData\Roaming\Windows Service.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:456
-
-
C:\Users\Admin\Desktop\Zula Hack.exe"C:\Users\Admin\Desktop\Zula Hack.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4448
-
C:\Users\Admin\Desktop\free vbuc.exe"C:\Users\Admin\Desktop\free vbuc.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:436 -
C:\Users\Admin\AppData\Roaming\MS WM Player\msplayer.exe"C:\Users\Admin\AppData\Roaming\MS WM Player\msplayer.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:3304 -
C:\Users\Admin\AppData\Roaming\MS WM Player\TorClient\Tor.exe"C:\Users\Admin\AppData\Roaming\MS WM Player\TorClient\Tor.exe" -f TorConfig3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2104
-
-
-
C:\Users\Admin\Desktop\free vbuc.exe"C:\Users\Admin\Desktop\free vbuc.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3184
-
C:\Users\Admin\Desktop\free vbuc.exe"C:\Users\Admin\Desktop\free vbuc.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5016
-
C:\Users\Admin\Desktop\floornite batle pas.exe"C:\Users\Admin\Desktop\floornite batle pas.exe"1⤵
- Executes dropped EXE
PID:1176
-
C:\Users\Admin\Desktop\Robuk.exe"C:\Users\Admin\Desktop\Robuk.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2288
-
C:\Users\Admin\Desktop\xeno_rat_client.exe"C:\Users\Admin\Desktop\xeno_rat_client.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4612
-
C:\Users\Admin\Desktop\Zula Hack.exe"C:\Users\Admin\Desktop\Zula Hack.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3916
-
C:\Users\Admin\Desktop\free.panel.exe"C:\Users\Admin\Desktop\free.panel.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2636
-
C:\Users\Admin\Desktop\floornite batle pas.exe"C:\Users\Admin\Desktop\floornite batle pas.exe"1⤵
- Executes dropped EXE
PID:1924
-
C:\Users\Admin\Desktop\xeno_rat_client.exe"C:\Users\Admin\Desktop\xeno_rat_client.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5028
-
C:\Windows\system32\launchtm.exelaunchtm.exe /21⤵PID:1468
-
C:\Windows\System32\Taskmgr.exe"C:\Windows\System32\Taskmgr.exe" /22⤵
- Checks SCSI registry key(s)
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3188
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
621KB
MD5465cf770e36f1f90a9118b3c0ca38244
SHA1097acd7966d5096c7d25053eae91d856c350ae2a
SHA2562fd9acd22964cb987f37a954bb35c01c22d18b33fbff2e97d39b53c2445403da
SHA512f55fb1abf852b48459d715c90c08661e8aadcab975fd6e7168f4c9e434a47611efa6b1c3dbb22ce80a1ec12e2b76f6b98fe48660b773c68f7bc067b211c5d16a
-
Filesize
21KB
MD5d9773a2554d27b403ad9f7272ffa5059
SHA1452ddccca31afabce16b433dedd840a502e1e4b4
SHA256f12e050368c36c1589c6f5caafc9708253abf2988fd60d5ee0554b8e9f4374ee
SHA512813619d21a59ccbba0430d05031f8237c818f433c84f3a9b6bfc7727d1ef306ecb965d90f9e409cf9a13a1b0864beb46e44477e18119a16187b318a9f2c7a1d3
-
Filesize
196KB
MD53889fc80b89cce2811ceeaabf89f807e
SHA19a122d50c6d6492dd37f04983c409241b433d57f
SHA2562804515fea28f5af62aabbad63f0d3660601237c61edd99f351b9a8d042b3f0f
SHA512e113186f830f6e93e0d809e3cb02374f426965b8ef1ad5c3f6f61a3c17459058a40d3754a04ead5c4aa32e4f6fdf7d02d074005a9860625a6bac7012ed20fb0e
-
Filesize
124KB
MD5744b43e230e0d44168bd885d57c06072
SHA17b3f490d00f81877f63ace31cfef0ea81f7b4143
SHA256fdc0b0e4c34b2f33be418736f4143509e65dd7d14216edfc5a8eadd1b17601bb
SHA5125c0b46261fc9676655684dfe48283170716fc33c1aa4de1c1070ab03fae3de98461665da492d5d23583aa7f2460b25fd745e53099e58a5ba1e24e7291ed188ab
-
Filesize
280KB
MD55f30e02c205dd190b84516e8cdd3aa61
SHA141169d6c3b1ef183349bd31e7be6ef0a9a7df990
SHA25625f3e2385b620b48ecf0f7eb3c900e7feca8597a5848a9744c2d60758b989817
SHA5127a253f23922ffb7e037f9d781cec4bf81e86863b3e3322cac8782357d34b4f0bc2e84c0087daaec05af4169f183fec852d8d92e9677c88e75577864899b22603
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5457A8CE4B2A7499F8299A013B6E1C7C_D734EC3DD00546F46D368325396086B0
Filesize5B
MD55bfa51f3a417b98e7443eca90fc94703
SHA18c015d80b8a23f780bdd215dc842b0f5551f63bd
SHA256bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128
SHA5124cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5457A8CE4B2A7499F8299A013B6E1C7C_D734EC3DD00546F46D368325396086B0
Filesize398B
MD5d425fcc2556370534717d80c83ecba3f
SHA141e7101facce30ea68083d1318949fc07f42383b
SHA256e350bea3a5d5dde6d80e16430d63bdfa219f322531b9258f24c4f8fa9ae6183a
SHA512dd2e5f01c32322cb76b422c911f2841b0aa8582a970ff9dc549772b8c01f3036b5814bbe589b33452117a7f4524364234e09a791ee715058501644ffdb47dfb6
-
Filesize
312B
MD5f2f49ca9c234b152efb2d2152c7cf459
SHA18df377ad960cf6da714d9d220f88b85c578d5962
SHA256ac82c08f4181f55e107f596014c7d38cd9f27e883381859a1dffe4cb4be15fb9
SHA512093b52bca3b51d420f251ac1cd93512b89b5ed023748da0d8cbc92b38e8257412d86a4affa837bb32ed7da1802025952bd5ff04b4f047553ee8bccb29753b662
-
Filesize
408B
MD542157868488d3ef98c00e3fa12f064be
SHA1aad391be9ac3f6ce1ced49583690486a5f4186fb
SHA256b9520170e84597186ba5cc223b9c2773f70d0cda088950bae2182e3b2237995c
SHA5128f4a4bd63ceefc34158ea23f3a73dcc2848eeacdba8355d1251a96b4e0c18e2f3b0c4939be359f874f81fe4ee63283b8be43a70fe2dbaa2e64784333d10a2471
-
Filesize
152B
MD537f660dd4b6ddf23bc37f5c823d1c33a
SHA11c35538aa307a3e09d15519df6ace99674ae428b
SHA2564e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8
SHA512807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d
-
Filesize
152B
MD5d7cb450b1315c63b1d5d89d98ba22da5
SHA1694005cd9e1a4c54e0b83d0598a8a0c089df1556
SHA25638355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031
SHA512df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5b1cf393446e8ea4657ffb42b66a68826
SHA1210a4d44473fd33f75cf3397f57f03d0b86468c8
SHA256709773a5175c95604ff69b15368b8789c26c173aff74d50f6565f950b39181f8
SHA512f5aa4eb7fad64d31dccb37a18eab68f1e6c0a18df82e07b03d4331ebd98a431e9eae2e429e71e3a59e2e78427a492ddd5b899e695ef08fb7f178fa48329b264e
-
Filesize
1KB
MD549172fae588a936968726ef34efdfb99
SHA1fcbfda0f5bc6cec9e180d29cfc60f9eb339d7f71
SHA256f5134ad6e179649fe857e9988446bbe06d572daf60cc96c0d82d81cd353aa9e0
SHA51284bc87328ef9b8773026f46e3b5e82a48a7000839b61c151386d521582c27134e9053c90b8497b62c11f8836bdcaef582b2e40d97aedfe93e198a495e111b062
-
Filesize
5KB
MD5e0306b03c868eacbdc77eb2aba94083b
SHA1b25afb208a26a074e77e4148db76a633286587c7
SHA256ccf013a0c107df6085884708f6f428266579291cfeb2ee3c84dd0cddc1695e30
SHA5125a71ac20529e33b4de2a4bc81320c76b22ea940b3bcddca0365e21f945386e7d56c76a53cf9de0b747e51d79b276c98f25bc8c245fd8165d735a6069206bbdb1
-
Filesize
7KB
MD5e53c3ff57e6a5263ab4454007b25938e
SHA1048a1f1bb56776390aceeb1eba84e114851d2e59
SHA2563a849917a9060b381afa7116f1fe65cdb99373f3b3841e813eb85fbe9266b697
SHA5127e64764bc06d3e55b9ed91c2ad635b0e522f9c671ef1d972097f7c8cc8f91f2bbf44864317ba33b6868ee32321f09f62af9c9fcd7d5a758a83d1af915e3d269a
-
Filesize
10KB
MD56a4db9a08139e2d5e247b5a24f2dd6f6
SHA1849e349c097ca03aadcf33c3e3d2bb51c297b1f8
SHA25608cc549e2f8609634d8eb8f6eae0dedde7e151ea52b5ec80532624af08d1ec61
SHA512818c1e56d6ccd6a69706c5d7078738f45d991ce4fed8bb3780d30cfe1bbb4027cc813e6f80d99f05cfd3d24c105bd00ae87f2e5f4b3fca48d8ee5f1cb14ff560
-
Filesize
1KB
MD512d926a3cd5305bea1f04252c95efa89
SHA1fd9cdb2726c4fe6141224ef33ef76ddf4dc13776
SHA2561a7d3df6a644e0180c9d8c08922f03d4a5fc0b1a021ac526046663b4109cde0d
SHA5128665e5a6281f7f98039b42eddedffc41fd7e615a2d8a537b2271dd8d293a04a5d4a23d7076ba3ef29fa2281191e482cf67981115d8f220c00a7545bbe4c8587e
-
Filesize
1KB
MD5e0e67ea5a5e8516969a199613e12eb3f
SHA1dc6af5f07b02c99504e2bbf59d1c6628d37619f3
SHA2569fa33030dbefd228b578821df892b0ed561561d2492e4cb07d3a3a5d7de598d4
SHA51296162d46f49d12bf2c2aba2035afccd19e325dee2045dcd3624a18ae8ed78e4146bdd14ce8002b0e3e8573360395331eb2db60270757b86d87f18d29c3689d59
-
Filesize
14KB
MD5eee2912bd1ee421cf1f1dfb1cc327d97
SHA1c5d3741ddb195718c9b17923eb6abfb7a732bdc1
SHA256e560384c5298ee2123e8340e716b2c4680f51b4d0347995ba3290dbd1130c6c0
SHA5121808a068386c790d8ad5096d9fededcfa6e5688e3a68f2499418456c9cafd7b837c811298e6570212155b4a3d6038c1749cfcd9d1b86f090f66d1a5301adecb2
-
Filesize
689B
MD5cf7c0ded82423a991af309ed98c50bdb
SHA18c35e8b04e834739b0d0225dc6d93d100768ed40
SHA256f2f2f73a81f1a9687b525c13925bf46948da1de6a6960fb74a633ed6fa8b998e
SHA5122d7e8c47ebe3323313d2f9130c72f87ad235de85287356e089ec1f5cb5a5b1a6293132e548a4af21d7548b7ec59e7d455f26195d9a9829d72ee02c0df87d43d9
-
Filesize
657B
MD521150a97e818e995b674f04c313853d0
SHA140171edd76b9ca1dacd44af986575caff7526adc
SHA256f75de6942981d7f912c60bfa7686b4080415661a3302782437591695c525e7d8
SHA5129e20c2f699524424fd96381f44bb484225baff78efa306509d27e5449fa6d3df44624f79348b7325ad59bc190a1ce65cf4dd55c80b7dead7ec817cb0828454f6
-
Filesize
694B
MD52f3619c71defa5bc9010cfc9fb29fcf3
SHA1a738b80010f6cf6d4b598525ab3bd5935ececf7c
SHA2567e408f16c32026c71360e3744f9dbc3aa2a31d3fdef71dfaef5820918947f74c
SHA5129b306ec4acd215eeea7261ed86a5eb7e9ea158d38e0549fe0b95b6effb7617eb5e19b85db0fb3c986ebe9c02a82a3ac2267e787e9a27f4645d03f32c137d0085
-
Filesize
397B
MD56fa704e560fd4b122d6ba6488d330ff5
SHA104a6168d6ea86440d53e14822b1f62335eb9bc38
SHA2565edeac2f23354944eadff3af9e1bd8070820aacf7871a99c7e43c5df98e7daed
SHA512116aa67533acd4d0b04199f899b229ed37944b4719bec5d8f7642fd6ca5fcc5fa4b56c9ebb45d46279b4105dc4f28a94893936f60de01799597ca3e6952f6641
-
Filesize
8KB
MD5a32ad1db36f2ab47eea25e38f3b583be
SHA151b666f864eac26b594077751aa6488cb416caa1
SHA2561546e823b7a9313d48e3e404ce1bc228d4969dc43a835cf06ee0e5baf40b4783
SHA5125155c404ccd117394860a57e43f0462928fe6051fe3bfb40abfeaa724aceca1085121c02431044bcee6332c764e5e0da0c72b0678cc207293d91224847ff63ab
-
Filesize
12KB
MD576c0c55f0ec71b5655d179f2c7073d4a
SHA1c061acff4fdbecd7808758379ff3d45b1c9012cf
SHA256cda1f564c7ff85e6c5b49e4b9950a79dac5f64280d1d27e068a77f90c15d1dfa
SHA512b719d1ad38e3f2bfbe2a3985d7e20c09f7bc41e58739787eda3aef9973fea292615c60b9d520ecd13fcf08b7c51cfc4bb7558af2ad67bb1d218a6fd5ccd6aeaa
-
Filesize
1.9MB
MD5db239662a89319db0d7e407f500048b7
SHA13af69f69c01424b133974b61cc5fd9f48284f55f
SHA25691e61d73ff28c8ef120fac82bb1d7fee3e0deb8ecf5c25b74c48dc4aa0d4b555
SHA512e4547c526c77848080a4ca565db6a016b110267f90359df4559364055245de53913fe5ca97b1ea8f326233505c1d6388582ba891cec993301209a62a0fe40fce
-
Filesize
2.3MB
MD5a3acfe36ee6fdf5498b049e3ba4ef526
SHA1994bccda34d3f47742d7e2cd64c895e6b82d22d3
SHA256c72708f2cf5b1c76cd3b44800e0bc9727b257ce4af8b545f4c64eb61f8b0c4f9
SHA5129f8fa1f194d9043d56e5ef75aecaa61a210991420de70bb98fdd36791a02c20ff086ac11a6ea8f258b3ed6bdfe18a24bfba07568d2eae5a81106fe0beda59416
-
Filesize
702KB
MD58cc9cbd4ff4855c05d102ac6d5263c55
SHA188f23c6661997aefb9e54ce202ccb75e66c46d69
SHA2568a851002a11a2115ce37397500a236c94a750c2bbc998482e7aeea957ad65fa7
SHA5122532d0c2f02223f68b8f3785c65fdd7265446008b8e574dda1241fc883544e1cb78b83ce45d1a8ccf78d0853afccfe3b64c5d8e82343b0d09a9c788e905aee2b
-
Filesize
510KB
MD522cf4f72397a339fc945fd1ff1ba988b
SHA11d55f910ff6058a2ac198f8040f3d38607ee105f
SHA25644c3f712c08a02e5504316ea8aa77bced35ed0db00425a3ba2de71e2562c5f1d
SHA51200bb15022eaa3682f246dd5c8c000e881356c7a31b5b6fcd8a212a1f02b58ea1afa9014d1f3468488b7abf10bfc0a3eb602639ad9d0fdd5cd45c8d82f6d627d7
-
Filesize
90KB
MD59b602a5dcf36e4c9c2cb4db7db1794ae
SHA153fba632e974d82bbee2ac79dce65a0720f57177
SHA256245c88e93a77167595fd69123b83ef1b92c1df57cec05e0039df67c2180b239b
SHA51206c935849638c8d28c99d14bb30925ab0083354ee852e693205cc013f863c848e38bb5c57d82e84abf6222a39301099866f9ff7aa5fffbc362701008b2449f07
-
Filesize
658KB
MD59a0826b3f29e1139da03cb6cbbc24e1a
SHA1bc501b29486a1d695e51b4617714bc02675fb124
SHA25658bf2b3caa78e4d8184591c70ae98eca8f828260127662d533165bc981ebb634
SHA512ae835269d118e6b56cdfdb153f0737547145970166d45a5df83daa8c925ea55049f72bf99b64d44bc92625fc052070d48d86497df94b986deb1ff402b16df753
-
Filesize
43KB
MD590fb7351598d38fcfe4bbec3105eec9c
SHA10e2c5d186f421cc058557b311083575399f3ccc7
SHA25613439cc861f1ec089daf3cb4b49f18ed447016b333d14081eb12e3bd0bf58ab0
SHA51255731c105b1cce1ca085dd83364271a547ab05ea5a6348fccfb2c5d812381eb3aee553ecd2a54708f4533a900dca90274193f35bb984a7042c20833c75c7e71c
-
Filesize
668KB
MD5f5c49e039b5060308e90b3e4828442c5
SHA194beaa059a141a83a5b0b8c5729c62abc6ffb1fa
SHA256d5005624ba18bdc47350cb9b975beb84903e36449e39c70e3c24193abb97e25a
SHA512f7a2ee383e2ea63b9bb8eeb2b0f0c2861f05ffb14a5a7056dbc81e60e57fd5e17899ff20e217b9c8657df833002143fe8ed1114dcbb95a247c1559681370b7da
-
Filesize
72KB
MD5db1af8db93035e7d79ec78e0151ae530
SHA10cdb435a3cd50c0df47acabee8dc6dd54eb9c797
SHA2569b4e3718bb031b287972e371087544eebc7015102343f8f885d6654de066ee8b
SHA5127136551ab50afb1adc5a29b4526a14c3b6dc1e6f57d53b2e0b0a2c15eb5d2afd3e87149046b4cc09d1a86c1734bdc884bc5b38ef71da39be24967e445c80b055
-
Filesize
4.3MB
MD5e0ea62bbeb2655be6bcdf13051e7b507
SHA12185a7ffa38932a8e6905669eac7da9a92779701
SHA256c207e02a921a3c0ad14fa3e408edd2558378cb4ff803b335fb1dcd4bc5880c9a
SHA51231905c3e96e3a245ccf003d9d87fba11e45336ea9443e882c3fd25c6a3fa46531a96418d008ec17dad3f5ed0ff2062fd6eae6c652bf2b08998d104544b07153c
-
Filesize
756KB
MD5aa8f114ffa8ef8294b989bcd5b4c1b14
SHA143dfe1126d9be396a068d55842ab9234932c92ad
SHA256a910b622169246ed5ceee3f3ef2817bbcfc7c6591bf6dba3a3feb6fb58a9dad0
SHA5126176f4f5ebfe6a16202615406d7f22f4da7525d4f4dae30d73bf2e85a7403b10e3015cedc14ae890f1315d2249929a0b7c789932c1af6af8e7f26234d9b6191c
-
Filesize
40KB
MD5a47f2402fa31c5a7a03447f4b26638b7
SHA1bfbd1a604cb83ff08723acec7bf464b1e544873d
SHA2568a7f29a7c99940b8438d966bc8755b02ced6f8a491449dc7d2437e13d70ee8d7
SHA512358f1a45a7cb94c7d71f964095d2183274d8bc543e918c0c15d48edf62da88d0e0380e9dd97ce8892bfec20fdc5f0d9e78fa03b684927472c68736c33d1887e0
-
Filesize
652B
MD5cff981faa3e279a6003bd7ea671caa34
SHA1a7a3160516a09342720538aa915ffb0be9cd0dc7
SHA2565482cc7cbbde6007d10100cc4c2eaa34b58c8287f260cc6c2678a5079f42042a
SHA51272bda764b2a67f336ed5a30ab66adf1887b03cc6000572045de7ec98aa85ea47b366aebafb94c3f75c36acbe5d94d29032d9162c98e3611b0c5553f7a7519151
-
Filesize
652B
MD5192fed7692bd2df587572c6fd2b4cc4a
SHA16d3af123a3ad567547efc4033bd0985aff1e0595
SHA256a3d1af1f2b88b7e79c2ed2c5b298d328e8d5e81d9321e3bbe3ae721e77b1e20f
SHA512733a6e9fff7cddcb2d77ac7925fd1042ce85ff77fd19fcc729f8db7b376eb5f3431179b2470d3f41d4730c722b689439babd0a4c3b44c6e70aadbd139ced4a41
-
Filesize
10KB
MD5fc6f1cac32473d95fa5ecfc06f883e45
SHA159ef048a16cb4d37b61e7827a52b02cb026d1173
SHA256d2cfc35f405e25dda6a923dd3dd3b5eeac18074eb3803cd33c296a33be961e85
SHA5123fc5af1458ba69b6af97f1c7a2fe5373a3e0b050d7b4befb672c3adbaf5a1d9e31a1af6288c304d8e3041a6d185d9f26a525609e6322a410d5709ae9e07b83b3
-
Filesize
598B
MD5e1e1d26bb424e764c029e364135a3bb9
SHA1608c701e5903ca9a6cfae0fc65c8b8f5fd12fd1c
SHA25650bca36ffcb9289160fa652f19a9e7d4285681f16c16d842d30f04a49a104a3b
SHA512fae3f360e697e2554b24b090c654d9b0a588954230d3d9765ce01ab30445bfb6396a04d2da5cb1aa7d63de1d6e9abc641cc3540fab3480d8a1edee80fc297466
-
Filesize
22KB
MD54ce30fbab9e5d28fc61b204ac3925ffa
SHA17cbb264b9287dc6f8f50d0cb515284cb8a7496bf
SHA2564347234b359a8d5ebebb8c60539dacdc0b9f56430eaf9486e83da87349ad4713
SHA512543ca5f602eb11d4496cd11d40ff1bf7c7ec4dd0ec2967ea5c4cfdbf8ad62b2e7f2471200b74fd87b59c53c0645f1ea961f62c4093062e0e971fba61ef9dcb88
-
Filesize
598B
MD58fb5f6dea3d2bca4809dcdbd5650460d
SHA120fde04c6852fca85c0e30d37e5c513b16455c72
SHA256e9a722e398c8310f21056f5faf785afcf9ace69096bf5558a7d9b3bc045910a0
SHA512546eb6671b6c4f91bd7b543854466c71737ac674834618a4ff141b5454d8df05d642025e311cc4aef1501c79fce0d9b8b3e1acdb1e5d44d47780af73e8608ce7