Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
131s -
max time network
132s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
02/01/2025, 19:25
Static task
static1
Behavioral task
behavioral1
Sample
RavenGen.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
RavenGen.exe
Resource
win10ltsc2021-20241211-en
General
-
Target
RavenGen.exe
-
Size
6.1MB
-
MD5
c8aeb6df26f168f40e546ea284f3a12a
-
SHA1
8b6fd323ab0860e838e359b47cb0c432e37dd9bd
-
SHA256
a5795f05ca4de63e25ecfe7636a77e4d4e2d48963931f35dcad728dc4cd08956
-
SHA512
4f86e47e76ce8dd0b374142988d4e82849a96768443fb5e1c65cfc3b527578296125dce7fc7619afc8ef4df40eb3c098128c31137215ea73237fc1c07d78351c
-
SSDEEP
196608:bSkSIlLTUcwti7TQl2NgVg01MWAXAkuujCPX9YG9he5GnQCAJKN:OkSopwtQQl2aOtXADu8X9Y95GQLJ
Malware Config
Extracted
asyncrat
1.0.7
Default
51.89.44.68:8848
etb3t1tr5n
-
delay
1
-
install
true
-
install_file
svchost.exe
-
install_folder
%Temp%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x0026000000046551-7.dat family_asyncrat -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 8 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 252 chrome.exe 4584 chrome.exe 6012 chrome.exe 2176 msedge.exe 5076 msedge.exe 3096 msedge.exe 3432 chrome.exe 4600 chrome.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1411052346-3904498293-150013998-1000\Control Panel\International\Geo\Nation RavenGen.exe -
Executes dropped EXE 5 IoCs
pid Process 1808 svchost.exe 192 svchost.exe 5464 svchost.exe 5824 svchost.exe 2740 svchost.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1411052346-3904498293-150013998-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RavenGen.exe Key opened \REGISTRY\USER\S-1-5-21-1411052346-3904498293-150013998-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RavenGen.exe Key opened \REGISTRY\USER\S-1-5-21-1411052346-3904498293-150013998-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RavenGen.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 16 raw.githubusercontent.com 17 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 47 icanhazip.com -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\SystemTemp msedge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 5468 cmd.exe 5540 netsh.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 RavenGen.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RavenGen.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 5208 timeout.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 1 IoCs
pid Process 2328 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133803195564604583" chrome.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 3592 RavenGen.exe 3592 RavenGen.exe 3592 RavenGen.exe 3592 RavenGen.exe 3592 RavenGen.exe 3592 RavenGen.exe 3592 RavenGen.exe 3592 RavenGen.exe 3592 RavenGen.exe 3592 RavenGen.exe 3592 RavenGen.exe 3592 RavenGen.exe 3432 chrome.exe 3432 chrome.exe 3592 RavenGen.exe 3592 RavenGen.exe 3592 RavenGen.exe 3592 RavenGen.exe 3592 RavenGen.exe 3592 RavenGen.exe 3592 RavenGen.exe 3592 RavenGen.exe 3592 RavenGen.exe 3592 RavenGen.exe 3592 RavenGen.exe 3592 RavenGen.exe 3592 RavenGen.exe 3592 RavenGen.exe 3592 RavenGen.exe 3592 RavenGen.exe 3592 RavenGen.exe 3592 RavenGen.exe 3592 RavenGen.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 2176 msedge.exe 2176 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3592 RavenGen.exe Token: SeIncreaseQuotaPrivilege 1808 svchost.exe Token: SeSecurityPrivilege 1808 svchost.exe Token: SeTakeOwnershipPrivilege 1808 svchost.exe Token: SeLoadDriverPrivilege 1808 svchost.exe Token: SeSystemProfilePrivilege 1808 svchost.exe Token: SeSystemtimePrivilege 1808 svchost.exe Token: SeProfSingleProcessPrivilege 1808 svchost.exe Token: SeIncBasePriorityPrivilege 1808 svchost.exe Token: SeCreatePagefilePrivilege 1808 svchost.exe Token: SeBackupPrivilege 1808 svchost.exe Token: SeRestorePrivilege 1808 svchost.exe Token: SeShutdownPrivilege 1808 svchost.exe Token: SeDebugPrivilege 1808 svchost.exe Token: SeSystemEnvironmentPrivilege 1808 svchost.exe Token: SeRemoteShutdownPrivilege 1808 svchost.exe Token: SeUndockPrivilege 1808 svchost.exe Token: SeManageVolumePrivilege 1808 svchost.exe Token: 33 1808 svchost.exe Token: 34 1808 svchost.exe Token: 35 1808 svchost.exe Token: 36 1808 svchost.exe Token: SeIncreaseQuotaPrivilege 192 svchost.exe Token: SeSecurityPrivilege 192 svchost.exe Token: SeTakeOwnershipPrivilege 192 svchost.exe Token: SeLoadDriverPrivilege 192 svchost.exe Token: SeSystemProfilePrivilege 192 svchost.exe Token: SeSystemtimePrivilege 192 svchost.exe Token: SeProfSingleProcessPrivilege 192 svchost.exe Token: SeIncBasePriorityPrivilege 192 svchost.exe Token: SeCreatePagefilePrivilege 192 svchost.exe Token: SeBackupPrivilege 192 svchost.exe Token: SeRestorePrivilege 192 svchost.exe Token: SeShutdownPrivilege 192 svchost.exe Token: SeDebugPrivilege 192 svchost.exe Token: SeSystemEnvironmentPrivilege 192 svchost.exe Token: SeRemoteShutdownPrivilege 192 svchost.exe Token: SeUndockPrivilege 192 svchost.exe Token: SeManageVolumePrivilege 192 svchost.exe Token: 33 192 svchost.exe Token: 34 192 svchost.exe Token: 35 192 svchost.exe Token: 36 192 svchost.exe Token: SeShutdownPrivilege 3432 chrome.exe Token: SeCreatePagefilePrivilege 3432 chrome.exe Token: SeShutdownPrivilege 3432 chrome.exe Token: SeCreatePagefilePrivilege 3432 chrome.exe Token: SeSecurityPrivilege 6056 msiexec.exe Token: SeShutdownPrivilege 3432 chrome.exe Token: SeCreatePagefilePrivilege 3432 chrome.exe Token: SeShutdownPrivilege 3432 chrome.exe Token: SeCreatePagefilePrivilege 3432 chrome.exe Token: SeShutdownPrivilege 3432 chrome.exe Token: SeCreatePagefilePrivilege 3432 chrome.exe Token: SeIncreaseQuotaPrivilege 5464 svchost.exe Token: SeSecurityPrivilege 5464 svchost.exe Token: SeTakeOwnershipPrivilege 5464 svchost.exe Token: SeLoadDriverPrivilege 5464 svchost.exe Token: SeSystemProfilePrivilege 5464 svchost.exe Token: SeSystemtimePrivilege 5464 svchost.exe Token: SeProfSingleProcessPrivilege 5464 svchost.exe Token: SeIncBasePriorityPrivilege 5464 svchost.exe Token: SeCreatePagefilePrivilege 5464 svchost.exe Token: SeBackupPrivilege 5464 svchost.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3432 chrome.exe 2176 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3592 wrote to memory of 1808 3592 RavenGen.exe 93 PID 3592 wrote to memory of 1808 3592 RavenGen.exe 93 PID 3592 wrote to memory of 192 3592 RavenGen.exe 101 PID 3592 wrote to memory of 192 3592 RavenGen.exe 101 PID 3592 wrote to memory of 3432 3592 RavenGen.exe 103 PID 3592 wrote to memory of 3432 3592 RavenGen.exe 103 PID 3432 wrote to memory of 1096 3432 chrome.exe 104 PID 3432 wrote to memory of 1096 3432 chrome.exe 104 PID 3432 wrote to memory of 3300 3432 chrome.exe 105 PID 3432 wrote to memory of 3300 3432 chrome.exe 105 PID 3432 wrote to memory of 3300 3432 chrome.exe 105 PID 3432 wrote to memory of 3300 3432 chrome.exe 105 PID 3432 wrote to memory of 3300 3432 chrome.exe 105 PID 3432 wrote to memory of 3300 3432 chrome.exe 105 PID 3432 wrote to memory of 3300 3432 chrome.exe 105 PID 3432 wrote to memory of 3300 3432 chrome.exe 105 PID 3432 wrote to memory of 3300 3432 chrome.exe 105 PID 3432 wrote to memory of 3300 3432 chrome.exe 105 PID 3432 wrote to memory of 3300 3432 chrome.exe 105 PID 3432 wrote to memory of 3300 3432 chrome.exe 105 PID 3432 wrote to memory of 3300 3432 chrome.exe 105 PID 3432 wrote to memory of 3300 3432 chrome.exe 105 PID 3432 wrote to memory of 3300 3432 chrome.exe 105 PID 3432 wrote to memory of 3300 3432 chrome.exe 105 PID 3432 wrote to memory of 3300 3432 chrome.exe 105 PID 3432 wrote to memory of 3300 3432 chrome.exe 105 PID 3432 wrote to memory of 3300 3432 chrome.exe 105 PID 3432 wrote to memory of 3300 3432 chrome.exe 105 PID 3432 wrote to memory of 3300 3432 chrome.exe 105 PID 3432 wrote to memory of 3300 3432 chrome.exe 105 PID 3432 wrote to memory of 3300 3432 chrome.exe 105 PID 3432 wrote to memory of 3300 3432 chrome.exe 105 PID 3432 wrote to memory of 3300 3432 chrome.exe 105 PID 3432 wrote to memory of 3300 3432 chrome.exe 105 PID 3432 wrote to memory of 3300 3432 chrome.exe 105 PID 3432 wrote to memory of 3300 3432 chrome.exe 105 PID 3432 wrote to memory of 3300 3432 chrome.exe 105 PID 3432 wrote to memory of 3300 3432 chrome.exe 105 PID 3432 wrote to memory of 4852 3432 chrome.exe 106 PID 3432 wrote to memory of 4852 3432 chrome.exe 106 PID 3432 wrote to memory of 2840 3432 chrome.exe 107 PID 3432 wrote to memory of 2840 3432 chrome.exe 107 PID 3432 wrote to memory of 2840 3432 chrome.exe 107 PID 3432 wrote to memory of 2840 3432 chrome.exe 107 PID 3432 wrote to memory of 2840 3432 chrome.exe 107 PID 3432 wrote to memory of 2840 3432 chrome.exe 107 PID 3432 wrote to memory of 2840 3432 chrome.exe 107 PID 3432 wrote to memory of 2840 3432 chrome.exe 107 PID 3432 wrote to memory of 2840 3432 chrome.exe 107 PID 3432 wrote to memory of 2840 3432 chrome.exe 107 PID 3432 wrote to memory of 2840 3432 chrome.exe 107 PID 3432 wrote to memory of 2840 3432 chrome.exe 107 PID 3432 wrote to memory of 2840 3432 chrome.exe 107 PID 3432 wrote to memory of 2840 3432 chrome.exe 107 PID 3432 wrote to memory of 2840 3432 chrome.exe 107 PID 3432 wrote to memory of 2840 3432 chrome.exe 107 PID 3432 wrote to memory of 2840 3432 chrome.exe 107 PID 3432 wrote to memory of 2840 3432 chrome.exe 107 PID 3432 wrote to memory of 2840 3432 chrome.exe 107 PID 3432 wrote to memory of 2840 3432 chrome.exe 107 PID 3432 wrote to memory of 2840 3432 chrome.exe 107 PID 3432 wrote to memory of 2840 3432 chrome.exe 107 PID 3432 wrote to memory of 2840 3432 chrome.exe 107 PID 3432 wrote to memory of 2840 3432 chrome.exe 107 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1411052346-3904498293-150013998-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RavenGen.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1411052346-3904498293-150013998-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RavenGen.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\RavenGen.exe"C:\Users\Admin\AppData\Local\Temp\RavenGen.exe"1⤵
- Checks computer location settings
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:3592 -
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1808
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --headless=new --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --disable-gpu --disable-logging2⤵
- Uses browser remote debugging
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ffcec1bcc40,0x7ffcec1bcc4c,0x7ffcec1bcc583⤵PID:1096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-logging --headless=new --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --use-gl=angle --use-angle=swiftshader-webgl --disable-logging --field-trial-handle=1924,i,1317626867760762358,4484995476215778097,262144 --disable-features=PaintHolding --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=1916 /prefetch:23⤵PID:3300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --no-appcompat-clear --disable-logging --field-trial-handle=1948,i,1317626867760762358,4484995476215778097,262144 --disable-features=PaintHolding --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=1960 /prefetch:33⤵PID:4852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --no-appcompat-clear --disable-logging --field-trial-handle=2156,i,1317626867760762358,4484995476215778097,262144 --disable-features=PaintHolding --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=2172 /prefetch:83⤵PID:2840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --no-appcompat-clear --disable-logging --remote-debugging-port=9222 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3080,i,1317626867760762358,4484995476215778097,262144 --disable-features=PaintHolding --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=3100 /prefetch:13⤵
- Uses browser remote debugging
PID:252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --no-appcompat-clear --disable-logging --remote-debugging-port=9222 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3104,i,1317626867760762358,4484995476215778097,262144 --disable-features=PaintHolding --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=3148 /prefetch:13⤵
- Uses browser remote debugging
PID:4600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --no-appcompat-clear --disable-logging --remote-debugging-port=9222 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4440,i,1317626867760762358,4484995476215778097,262144 --disable-features=PaintHolding --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=4428 /prefetch:13⤵
- Uses browser remote debugging
PID:4584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --no-appcompat-clear --disable-logging --field-trial-handle=4664,i,1317626867760762358,4484995476215778097,262144 --disable-features=PaintHolding --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=4360 /prefetch:83⤵PID:5736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --no-appcompat-clear --disable-logging --field-trial-handle=4696,i,1317626867760762358,4484995476215778097,262144 --disable-features=PaintHolding --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=4360 /prefetch:83⤵PID:5972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --no-appcompat-clear --disable-logging --field-trial-handle=4996,i,1317626867760762358,4484995476215778097,262144 --disable-features=PaintHolding --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=4704 /prefetch:83⤵PID:5132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --no-appcompat-clear --disable-logging --field-trial-handle=4992,i,1317626867760762358,4484995476215778097,262144 --disable-features=PaintHolding --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=4716 /prefetch:83⤵PID:5196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --no-appcompat-clear --disable-logging --field-trial-handle=5152,i,1317626867760762358,4484995476215778097,262144 --disable-features=PaintHolding --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=5164 /prefetch:83⤵PID:5248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --no-appcompat-clear --disable-logging --field-trial-handle=5144,i,1317626867760762358,4484995476215778097,262144 --disable-features=PaintHolding --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=4928 /prefetch:83⤵PID:5856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --extension-process --no-appcompat-clear --disable-logging --remote-debugging-port=9222 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5320,i,1317626867760762358,4484995476215778097,262144 --disable-features=PaintHolding --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=5344 /prefetch:23⤵
- Uses browser remote debugging
PID:6012
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All2⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:5468 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:5520
-
-
C:\Windows\system32\netsh.exenetsh wlan show profile3⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:5540
-
-
C:\Windows\system32\findstr.exefindstr All3⤵PID:5552
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid2⤵PID:5780
-
C:\Windows\system32\chcp.comchcp 650013⤵PID:5840
-
-
C:\Windows\system32\netsh.exenetsh wlan show networks mode=bssid3⤵
- Event Triggered Execution: Netsh Helper DLL
PID:5872
-
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9222 --headless=new --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --disable-gpu --disable-logging2⤵
- Uses browser remote debugging
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:2176 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=131.0.6778.109 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=131.0.2903.86 --initial-client-data=0x25c,0x260,0x264,0x258,0x304,0x7ffcf29d6070,0x7ffcf29d607c,0x7ffcf29d60883⤵PID:5780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --headless=new --string-annotations=is-enterprise-managed=no --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --subproc-heap-profiling --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=angle --use-angle=swiftshader-webgl --field-trial-handle=2256,i,17435563427957355058,3390742841295993401,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=2248 /prefetch:23⤵PID:5456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations=is-enterprise-managed=no --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --subproc-heap-profiling --field-trial-handle=2276,i,17435563427957355058,3390742841295993401,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=2724 /prefetch:33⤵PID:5436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations=is-enterprise-managed=no --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --subproc-heap-profiling --field-trial-handle=2836,i,17435563427957355058,3390742841295993401,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=2828 /prefetch:83⤵PID:5460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations=is-enterprise-managed=no --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --pdf-upsell-enabled --subproc-heap-profiling --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3636,i,17435563427957355058,3390742841295993401,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=3632 /prefetch:13⤵
- Uses browser remote debugging
PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations=is-enterprise-managed=no --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --instant-process --pdf-upsell-enabled --subproc-heap-profiling --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3704,i,17435563427957355058,3390742841295993401,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=3780 /prefetch:13⤵
- Uses browser remote debugging
PID:5076
-
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"2⤵
- Executes dropped EXE
PID:5824
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"2⤵
- Executes dropped EXE
PID:2740
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\57ed0d66-e240-4e18-aa84-b7fd4485f4bb.bat"2⤵PID:5184
-
C:\Windows\system32\chcp.comchcp 650013⤵PID:3836
-
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 35923⤵
- Kills process with taskkill
PID:2328
-
-
C:\Windows\system32\timeout.exetimeout /T 2 /NOBREAK3⤵
- Delays execution with timeout.exe
PID:5208
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --string-annotations=is-enterprise-managed=no --field-trial-handle=4056,i,6673326894638893842,871609780509303087,262144 --variations-seed-version --mojo-platform-channel-handle=780 /prefetch:81⤵PID:1596
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1716
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5808
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:6056
-
C:\Program Files (x86)\Microsoft\Edge\Application\131.0.2903.86\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\131.0.2903.86\elevation_service.exe"1⤵PID:1104
Network
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Netsh Helper DLL
1Modify Authentication Process
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\_locales\en\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
280B
MD5cfcbadee7b1893b722888585ccb436bd
SHA1a0291f4cb1fa4c0aed5b00cbf2133ec02de91f46
SHA256a0597ea481309b6ee5f6da663205a6181534ef0d63a76a4129964c0f3add54bd
SHA51207c16650e30651d862d8dec9c9d29267d722ce180db463477f4a34133a8766a6e6105affaa00ca95cc758d4bb7d393cc8cac30fccbf727c6adad97b02659ae47
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\32a1880b-9e73-4892-a908-e0fdbcfee380.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
37KB
MD5a2c70433dafa06a6a7478534c6c356ac
SHA10cf4a6c2c422120e2360b854ad6c6db52ca89a83
SHA25613a9d5faf74110ea0e09dc7f3fb555afc20e2d47648fa6f6c4a0c5b56385d4fb
SHA512966a216267beec5c31a8c173ab9096d867579ec2992091939ff20beb78e2a24b75add0be76d1c63439d574d003e94cd31c6a11e271bceb35eb1651806310a082
-
Filesize
152B
MD54663e43219297b901319fb59a8f3b672
SHA166f83e522e61e94c075b909c5182f09eec837218
SHA2565aab26898f7a316eebd2c067735b49abb9c28074a7815ba572c1cb8b0131f035
SHA5123cd800475fcef820aaa65be2cf6463f49996bdc008f665d940ad98067e6afb7ef30cae40f260b33aecc3d981e719d339986c2e7a077d1fa6a8174b153999d9f0
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
C:\Users\Admin\AppData\Local\af988e18efb1e7f0a87d8de63bbda9ab\Admin@WYKESHLM_en-US\Browsers\Firefox\Bookmarks.txt
Filesize220B
MD52ab1fd921b6c195114e506007ba9fe05
SHA190033c6ee56461ca959482c9692cf6cfb6c5c6af
SHA256c79cfdd6d0757eb52fbb021e7f0da1a2a8f1dd81dcd3a4e62239778545a09ecc
SHA5124f0570d7c7762ecb4dcf3171ae67da3c56aa044419695e5a05f318e550f1a910a616f5691b15abfe831b654718ec97a534914bd172aa7a963609ebd8e1fae0a5
-
C:\Users\Admin\AppData\Local\af988e18efb1e7f0a87d8de63bbda9ab\Admin@WYKESHLM_en-US\Browsers\Microsoft Edge\Cookies.txt
Filesize2KB
MD5d48cca56e342f903670e74296bee14ac
SHA1a13a4a8ac64eacb8a4a6468a30abb3953b6cd94e
SHA256d9bf00ea94fb8dbbe8f74db6cc2d74bc1fe78b3435bcacfc923b772ec2214e5e
SHA51296db627ac8264d2aaf02d3183d6ebe8eb6c74313fb573ce34018aa6ee1a2991dfe33fc84ee124fb90e48b8a4ca23f99185c81ffbdf9dbb82977cc6807e144f19
-
Filesize
6KB
MD575066bc681be65247639c19138497a76
SHA1aeca3421b5393fd1ca1aa4994dfef2d74a0a90af
SHA2564f82b7600b0180fea8cfce2207f96e25ab6c72580cbeb2b1a486b3963c102103
SHA51290e8718a907a01f4d64fa499efb13ddbdc75ed4309e300effc494d61ac5ba7801e46d40a88048558fee62b1b6a4921148924f996bafd2775050e9e1ae23084ae
-
C:\Users\Admin\AppData\Local\af988e18efb1e7f0a87d8de63bbda9ab\Admin@WYKESHLM_en-US\System\Process.txt
Filesize3KB
MD58e1ad8cfd4966487a9067d2e7adb1472
SHA12b37f915ed99aed78ef8dc470aeffa8f83a53b98
SHA2561035c9f176744c3dc35b72b4d4560c949404dc3cc1797cb911ed08b34a377ad3
SHA5127e05b4918f771066a22426e13707133f24fbc5eb25f6181740c036306ab13ab634358400de242cc71e839b4e0542871d629ffdf12e6c7079e0c46a338e3d0601
-
C:\Users\Admin\AppData\Local\af988e18efb1e7f0a87d8de63bbda9ab\Admin@WYKESHLM_en-US\System\Process.txt
Filesize3KB
MD5fc3df2118d6cd356141888eba694ce55
SHA16cfe7e3d0ea0b581ab11e1a5212bb023e71a3f10
SHA2561f1e6acf93e3b424c9463faed674cfdb028ccc4d2362682d457a70d12e1a418d
SHA51202881847422f996adce6aa81b334855340d0a1140cf79099d6756ae27654954045daee3e7c9781cf8974e827bd18c0849401814448895f636ef4fd0193deb82c
-
C:\Users\Admin\AppData\Local\af988e18efb1e7f0a87d8de63bbda9ab\Admin@WYKESHLM_en-US\System\Process.txt
Filesize4KB
MD5aa06ce20304f22f2e1e0347edd343973
SHA124caf1c2e0d15fb94d6c7793f2bcf57bdb64dae4
SHA256d225123567675be57f724e310435b02f9eef169d0aef5b279219e71b24980ea5
SHA5123bfcef59c8f4fb8bd0d6236abf767270bebac49d2f2c329fd58a198b76fda06fe055ff98c31402adb85b8f62ae8a9dc71d41ec2ff5820d4461a0c89f94d6c84a
-
C:\Users\Admin\AppData\Local\af988e18efb1e7f0a87d8de63bbda9ab\Admin@WYKESHLM_en-US\System\Process.txt
Filesize580B
MD575b24a0a92ffe1ef6cc531b0e3e5f636
SHA121af27c8b4e3c3ae28012841e43b82001a425148
SHA256d1d9062a833b0d6acdb6935860ded7558bd20a512b4a1b04987750c08cf87885
SHA5125558e19a5875a75e94c7651477806018f1bcb65767adae330bf5be67e43848d4020bfdae8a6d5b325f1e23ea71d32bbff191c6e757f96ff4f89b197fbe8ba8a8
-
C:\Users\Admin\AppData\Local\af988e18efb1e7f0a87d8de63bbda9ab\Admin@WYKESHLM_en-US\System\Process.txt
Filesize933B
MD59b05ea64237f1a367b141b13db574efb
SHA11d39f508aae106deee8da81d6ca43a14372f08e6
SHA256dc10708c8cfa6615c3e95b35ffbc582a04526647474f4eae1c34003f533bd32f
SHA512b3f279a9f54c0aa93c6785be91fe526ef50030b8c1c79727d77f624fbb4b8e6394a0eadca293804c1dae01b7aa6ea6c0f3b438bd74d5a6bf8c8cc8c2c25f2e82
-
C:\Users\Admin\AppData\Local\af988e18efb1e7f0a87d8de63bbda9ab\Admin@WYKESHLM_en-US\System\Process.txt
Filesize1KB
MD5e7bb866b228c1cd190551ce235b82032
SHA1770a3b0229d653f51a9df89cb305eccfedcb129b
SHA256cfad3dd37d4ffd6675bc293a973062ecc7a0048370faa20e4a978307c99a2cdf
SHA512b09fe7a3d2fa388a516635e3a6ccd0326d9ace715256fa10700b9de8831adf3a4024feb20d99b9a64d2ddc79d3e1b38757dc3f96cedd5b7daff4606fdd6f5d27
-
C:\Users\Admin\AppData\Local\af988e18efb1e7f0a87d8de63bbda9ab\Admin@WYKESHLM_en-US\System\Process.txt
Filesize1KB
MD57133dc14312789f121cdea64a7dcd682
SHA1ba7f054fef637d4d95e133039e37d02336b54c0a
SHA25649894a60ab0a68887e3723cfaef60aeccf3e50ee05fa32df6883485735d16103
SHA512c233fdd0e006063fefdfab537e3f18ba99d257b3dfc25e4c719b2b995f1006a5046d21a2347d8c819bb7435a37f54f1d502434bcd5e00e295af8ec33041f984b
-
C:\Users\Admin\AppData\Local\af988e18efb1e7f0a87d8de63bbda9ab\Admin@WYKESHLM_en-US\System\Process.txt
Filesize2KB
MD511c18a243cd5ef2818587c1293ff708b
SHA158257e36b2c0ae3577f96623958907910c5941ae
SHA2567e9a82f99782e94570690c77fca0b4d50ab3453b7ba6b7d422959d8c830fb19d
SHA512f2fe9316ab3a88f82865d2ed45b2e379aa57ee55a7bc2e36c59c78c990cfbdc4c083370f80e2dd342cca348bf610a354a983408d2561969cef5687bcd6c3648d
-
C:\Users\Admin\AppData\Local\af988e18efb1e7f0a87d8de63bbda9ab\Admin@WYKESHLM_en-US\System\Process.txt
Filesize3KB
MD5b1475c790798c1d3c515622f7e41dd2b
SHA15c9b451822587302974deafcc0f4838b6749d977
SHA25600b819bbc44676d8c5848bc20feaa6369552ac4efd8361f2e8ccb9f75429beaf
SHA5128cacc0249413cb801f3e80e0890c5242ec78376f42e8042c6e44910fa3c5ab3f4aa88a8ea73976cf24a87119c7ab5c255b6e421d292308c0a3140c35a4e816af
-
Filesize
2B
MD5d3d9446802a44259755d38e6d163e820
SHA1b1d5781111d84f7b3fe45a0852e59758cd7a87e5
SHA2564a44dc15364204a80fe80e9039455cc1608281820fe2b24f1e5233ade6af1dd5
SHA5123c11e4f316c956a27655902dc1a19b925b8887d59eff791eea63edc8a05454ec594d5eb0f40ae151df87acd6e101761ecc5bb0d3b829bf3a85f5432493b22f37
-
Filesize
63KB
MD567ca41c73d556cc4cfc67fc5b425bbbd
SHA1ada7f812cd581c493630eca83bf38c0f8b32b186
SHA25623d2e491a8c7f2f7f344764e6879d9566c9a3e55a3788038e48b346c068dde5b
SHA5120dceb6468147cd2497adf31843389a78460ed5abe2c5a13488fc55a2d202ee6ce0271821d3cf12bc1f09a4d6b79a737ea3bccfc2bb87f89b3fff6410fa85ec02