Analysis
-
max time kernel
330s -
max time network
331s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
08-01-2025 21:32
Static task
static1
Behavioral task
behavioral1
Sample
classroom.cloud.1.1e32ad54-8afb-4c05-a1c5-6e3e40e93fe4.uksouth(2).msi
Resource
win11-20241007-en
General
-
Target
classroom.cloud.1.1e32ad54-8afb-4c05-a1c5-6e3e40e93fe4.uksouth(2).msi
-
Size
54.1MB
-
MD5
7ac4d934b4d49e2fe9376a5d6071e95a
-
SHA1
26f48f7235651115d4ae806b67867255fbff3498
-
SHA256
d933149df4213449714cf63a0d63d04cb632caa97845579eae269bf16b5badcf
-
SHA512
795429c6952e71ccd09259ce3bc4ccd6aa1a31ac193aff057ae160af8fa3000fcc7704ba3e5047c571797703fa4fbcfe7b3b40d89c2299c7bdb7c37138b64d11
-
SSDEEP
1572864:FTBHdo6SPs7HpTeowced2oC6ho5fstdq:FNNSPIpTeoVed22
Malware Config
Signatures
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
Netsupport family
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\nskbfltr.sys winst64.exe -
Sets service image path in registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\CiCStudent\ImagePath = "\"C:\\Program Files (x86)\\NetSupport\\classroom.cloud\\cicStudent.exe\" /* *" WINSTALL.EXE Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\nskbfltr\ImagePath = "\\SystemRoot\\system32\\drivers\\nskbfltr.sys" WINSTALL.EXE -
Blocklisted process makes network request 2 IoCs
flow pid Process 2 1388 msiexec.exe 4 1388 msiexec.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: CICPlugin.exe File opened (read-only) \??\M: CICPlugin64.exe File opened (read-only) \??\P: CICPlugin64.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\L: CICPlugin.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\P: CICPlugin.exe File opened (read-only) \??\R: CICPlugin.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\W: CICPlugin.exe File opened (read-only) \??\A: CICPlugin64.exe File opened (read-only) \??\Z: CICPlugin64.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\N: CICPlugin.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\K: CICPlugin64.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\T: CICPlugin64.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\U: CICPlugin.exe File opened (read-only) \??\V: CICPlugin.exe File opened (read-only) \??\B: CICPlugin64.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\A: CICPlugin.exe File opened (read-only) \??\B: CICPlugin.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\O: CICPlugin64.exe File opened (read-only) \??\V: CICPlugin64.exe File opened (read-only) \??\J: CICPlugin.exe File opened (read-only) \??\E: CICPlugin64.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\K: CICPlugin.exe File opened (read-only) \??\Q: CICPlugin.exe File opened (read-only) \??\L: CICPlugin64.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Q: CICPlugin64.exe File opened (read-only) \??\U: CICPlugin64.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\M: CICPlugin.exe File opened (read-only) \??\O: CICPlugin.exe File opened (read-only) \??\G: CICPlugin64.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\P: msiexec.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\AllowMultipleTSSessions = "0" WINSTALL.EXE -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\msctf.pdb cicStudent.exe File opened for modification C:\Windows\SysWOW64\cicStudent.pdb cicStudent.exe File opened for modification C:\Windows\SysWOW64\shlwapi.pdb cicStudent.exe File opened for modification C:\Windows\SysWOW64\psapi.pdb cicStudent.exe File opened for modification C:\Windows\SysWOW64\wininet.pdb cicStudent.exe File opened for modification C:\Windows\SysWOW64\Windows.Storage.pdb cicStudent.exe File opened for modification C:\Windows\SysWOW64\wkernel32.pdb cicStudent.exe File opened for modification C:\Windows\SysWOW64\MMDevAPI.pdb cicStudent.exe File opened for modification C:\Windows\SysWOW64\WinTypes.pdb cicStudent.exe File opened for modification C:\Windows\SysWOW64\audioses.pdb cicStudent.exe File opened for modification C:\Windows\SysWOW64\winmm.pdb cicStudent.exe File opened for modification C:\Windows\SysWOW64\winhttp.pdb cicStudent.exe File opened for modification C:\Windows\SysWOW64\wsspicli.pdb cicStudent.exe File opened for modification C:\Windows\SysWOW64\winsta.pdb cicStudent.exe File opened for modification C:\Windows\SysWOW64\profapi.pdb cicStudent.exe File opened for modification C:\Windows\SysWOW64\SHFOLDER.pdb cicStudent.exe File opened for modification C:\Windows\SysWOW64\msvcrt.pdb cicStudent.exe File opened for modification C:\Windows\SysWOW64\mpr.pdb cicStudent.exe File opened for modification C:\Windows\SysWOW64\wimm32.pdb cicStudent.exe File opened for modification C:\Windows\SysWOW64\wkernelbase.pdb cicStudent.exe File opened for modification C:\Windows\SysWOW64\wsock32.pdb cicStudent.exe File opened for modification C:\Windows\SysWOW64\combase.pdb cicStudent.exe File opened for modification C:\Windows\SysWOW64\userenv.pdb cicStudent.exe File opened for modification C:\Windows\SysWOW64\wkscli.pdb cicStudent.exe File opened for modification C:\Windows\SysWOW64\msvcp_win.pdb cicStudent.exe File opened for modification C:\Windows\SysWOW64\comdlg32.pdb cicStudent.exe File opened for modification C:\Windows\SysWOW64\setupapi.pdb cicStudent.exe File opened for modification C:\Windows\SysWOW64\CLBCatQ.pdb cicStudent.exe File opened for modification C:\Windows\SysWOW64\ucrtbase.pdb cicStudent.exe File opened for modification C:\Windows\SysWOW64\ws2_32.pdb cicStudent.exe File opened for modification C:\Windows\SysWOW64\srvcli.pdb cicStudent.exe File opened for modification C:\Windows\SysWOW64\bcryptprimitives.pdb cicStudent.exe File opened for modification C:\Windows\SysWOW64\wbemprox.pdb cicStudent.exe File created C:\Windows\SysWOW64\pcimsg.dll WINSTALL.EXE File created C:\Windows\system32\cicclient32provider.dll winst64.exe File opened for modification C:\Windows\SysWOW64\sechost.pdb cicStudent.exe File opened for modification C:\Windows\SysWOW64\wgdi32.pdb cicStudent.exe File opened for modification C:\Windows\SysWOW64\netutils.pdb cicStudent.exe File opened for modification C:\Windows\SysWOW64\msasn1.pdb cicStudent.exe File opened for modification C:\Windows\SysWOW64\wrpcrt4.pdb cicStudent.exe File opened for modification C:\Windows\SysWOW64\netapi32.pdb cicStudent.exe File opened for modification C:\Windows\SysWOW64\samcli.pdb cicStudent.exe File opened for modification C:\Windows\SysWOW64\wbemcomn.pdb cicStudent.exe File opened for modification C:\Windows\SysWOW64\nsi.pdb cicStudent.exe File opened for modification C:\Windows\SysWOW64\dhcpcsvc.pdb cicStudent.exe File opened for modification C:\Windows\SysWOW64\wintrust.pdb cicStudent.exe File opened for modification C:\Windows\SysWOW64\secur32.pdb cicStudent.exe File opened for modification C:\Windows\SysWOW64\wuxtheme.pdb cicStudent.exe File opened for modification C:\Windows\SysWOW64\Kernel.Appcore.pdb cicStudent.exe File opened for modification C:\Windows\SysWOW64\devobj.pdb cicStudent.exe File opened for modification C:\Windows\SysWOW64\iphlpapi.pdb cicStudent.exe File opened for modification C:\Windows\SysWOW64\wldap32.pdb cicStudent.exe File opened for modification C:\Windows\SysWOW64\dbgcore.pdb cicStudent.exe File opened for modification C:\Windows\SysWOW64\cfgmgr32.pdb cicStudent.exe File created C:\Windows\SysWOW64\DnaMsg.dll msiexec.exe File opened for modification C:\Windows\system32\cicclient32provider.dll winst64.exe File opened for modification C:\Windows\SysWOW64\wgdi32full.pdb cicStudent.exe File opened for modification C:\Windows\SysWOW64\oleaut32.pdb cicStudent.exe File opened for modification C:\Windows\SysWOW64\crypt32.pdb cicStudent.exe File opened for modification C:\Windows\SysWOW64\dnsapi.pdb cicStudent.exe File opened for modification C:\Windows\SysWOW64\wwin32u.pdb cicStudent.exe File opened for modification C:\Windows\SysWOW64\version.pdb cicStudent.exe File opened for modification C:\Windows\SysWOW64\winspool.pdb cicStudent.exe File opened for modification C:\Windows\SysWOW64\activeds.pdb cicStudent.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\NetSupport\classroom.cloud\DLL\dbgcore.pdb cicStudent.exe File created C:\Program Files (x86)\NetSupport\classroom.cloud\Locales\2074\pluginsoftwaremodule_RES.dll msiexec.exe File created C:\Program Files (x86)\NetSupport\classroom.cloud\api-ms-win-crt-environment-l1-1-0.dll msiexec.exe File created C:\Program Files (x86)\NetSupport\classroom.cloud\js\i18nTranslate.js msiexec.exe File created C:\Program Files (x86)\NetSupport\classroom.cloud\setroom.exe msiexec.exe File created C:\Program Files (x86)\NetSupport\classroom.cloud\GetUserLang.exe msiexec.exe File opened for modification C:\Program Files (x86)\NetSupport\classroom.cloud\shell32.pdb cicStudent.exe File created C:\Program Files (x86)\NetSupport\classroom.cloud\api-ms-win-core-processenvironment-l1-1-0.dll msiexec.exe File opened for modification C:\Program Files (x86)\NetSupport\classroom.cloud\samcli.pdb cicStudent.exe File opened for modification C:\Program Files (x86)\NetSupport\classroom.cloud\symbols\DLL\dbgcore.pdb cicStudent.exe File created C:\Program Files (x86)\NetSupport\classroom.cloud\Locales\3082\pluginsoftwaremodule_RES.dll msiexec.exe File created C:\Program Files (x86)\NetSupport\classroom.cloud\toastImageAndText.png msiexec.exe File created C:\Program Files (x86)\NetSupport\classroom.cloud\Safeguarding\DNANet.dll msiexec.exe File opened for modification C:\Program Files (x86)\NetSupport\classroom.cloud\dll\wntdll.pdb cicStudent.exe File created C:\Program Files (x86)\NetSupport\classroom.cloud\Locales\1028\cicToolbar_res.dll msiexec.exe File opened for modification C:\Program Files (x86)\NetSupport\classroom.cloud\DLL\audioses.pdb cicStudent.exe File created C:\Program Files (x86)\NetSupport\classroom.cloud\cicClient32Provider.dll msiexec.exe File opened for modification C:\Program Files (x86)\NetSupport\classroom.cloud\dll\wbemsvc.pdb cicStudent.exe File opened for modification C:\Program Files (x86)\NetSupport\classroom.cloud\dll\devobj.pdb cicStudent.exe File created C:\Program Files (x86)\NetSupport\classroom.cloud\Locales\2052\ManageADAccount_res.dll msiexec.exe File opened for modification C:\Program Files (x86)\NetSupport\classroom.cloud\symbols\DLL\dbghelp.pdb cicStudent.exe File opened for modification C:\Program Files (x86)\NetSupport\classroom.cloud\symbols\dll\WinTypes.pdb cicStudent.exe File created C:\Program Files (x86)\NetSupport\classroom.cloud\Locales\22538\PluginSoftwareModule64_res.dll msiexec.exe File created C:\Program Files (x86)\NetSupport\classroom.cloud\Locales\22538\pcicl32_res.dll msiexec.exe File created C:\Program Files (x86)\NetSupport\classroom.cloud\pcicapi.DLL msiexec.exe File created C:\Program Files (x86)\NetSupport\classroom.cloud\cpprest_2_10.dll msiexec.exe File created C:\Program Files (x86)\NetSupport\classroom.cloud\api-ms-win-core-sysinfo-l1-1-0.dll msiexec.exe File created C:\Program Files (x86)\NetSupport\classroom.cloud\injlib.dll msiexec.exe File opened for modification C:\Program Files (x86)\NetSupport\classroom.cloud\wintrust.pdb cicStudent.exe File opened for modification C:\Program Files (x86)\NetSupport\classroom.cloud\dll\advapi32.pdb cicStudent.exe File opened for modification C:\Program Files (x86)\NetSupport\classroom.cloud\version.pdb cicStudent.exe File opened for modification C:\Program Files (x86)\NetSupport\classroom.cloud\wsspicli.pdb cicStudent.exe File opened for modification C:\Program Files (x86)\NetSupport\classroom.cloud\symbols\dll\wbemcomn.pdb cicStudent.exe File created C:\Program Files (x86)\NetSupport\classroom.cloud\nspowershell.exe msiexec.exe File opened for modification C:\Program Files (x86)\NetSupport\classroom.cloud\msvcr100.i386.pdb cicStudent.exe File opened for modification C:\Program Files (x86)\NetSupport\classroom.cloud\symbols\dll\combase.pdb cicStudent.exe File opened for modification C:\Program Files (x86)\NetSupport\classroom.cloud\dll\PCICL32.pdb cicStudent.exe File opened for modification C:\Program Files (x86)\NetSupport\classroom.cloud\DLL\srvcli.pdb cicStudent.exe File created C:\Program Files (x86)\NetSupport\classroom.cloud\api-ms-win-core-errorhandling-l1-1-0.dll msiexec.exe File created C:\Program Files (x86)\NetSupport\classroom.cloud\cic_lock_image_ws.jpg msiexec.exe File created C:\Program Files (x86)\NetSupport\classroom.cloud\ActApp.exe msiexec.exe File created C:\Program Files (x86)\NetSupport\classroom.cloud\Safeguarding\CICSafeguardingAgent.exe msiexec.exe File opened for modification C:\Program Files (x86)\NetSupport\classroom.cloud\wbemprox.pdb cicStudent.exe File created C:\Program Files (x86)\NetSupport\classroom.cloud\Locales\3082\cicToolbar_res.dll msiexec.exe File created C:\Program Files (x86)\NetSupport\classroom.cloud\nskbfltr.sys msiexec.exe File opened for modification C:\Program Files (x86)\NetSupport\classroom.cloud\dll\ole32.pdb cicStudent.exe File opened for modification C:\Program Files (x86)\NetSupport\classroom.cloud\dll\wldap32.pdb cicStudent.exe File created C:\Program Files (x86)\NetSupport\classroom.cloud\Locales\1025\pcicl32_RES.dll msiexec.exe File opened for modification C:\Program Files (x86)\NetSupport\classroom.cloud\symbols\dll\msvcr100.i386.pdb cicStudent.exe File opened for modification C:\Program Files (x86)\NetSupport\classroom.cloud\symbols\dll\netapi32.pdb cicStudent.exe File opened for modification C:\Program Files (x86)\NetSupport\classroom.cloud\audioses.pdb cicStudent.exe File created C:\Program Files (x86)\NetSupport\classroom.cloud\Locales\2070\cicToolbar_res.dll msiexec.exe File created C:\Program Files (x86)\NetSupport\classroom.cloud\api-ms-win-crt-string-l1-1-0.dll msiexec.exe File created C:\Program Files (x86)\NetSupport\classroom.cloud\Safeguarding\eSafetyHookAppCIC.exe msiexec.exe File opened for modification C:\Program Files (x86)\NetSupport\classroom.cloud\dll\wsock32.pdb cicStudent.exe File created C:\Program Files (x86)\NetSupport\classroom.cloud\Locales\1029\pluginsoftwaremodule_RES.dll msiexec.exe File opened for modification C:\Program Files (x86)\NetSupport\classroom.cloud\symbols\dll\dwmapi.pdb cicStudent.exe File opened for modification C:\Program Files (x86)\NetSupport\classroom.cloud\PCICL32.pdb cicStudent.exe File opened for modification C:\Program Files (x86)\NetSupport\classroom.cloud\symbols\dll\Windows.Storage.pdb cicStudent.exe File opened for modification C:\Program Files (x86)\NetSupport\classroom.cloud\DLL\iphlpapi.pdb cicStudent.exe File opened for modification C:\Program Files (x86)\NetSupport\classroom.cloud\wbemsvc.pdb cicStudent.exe File created C:\Program Files (x86)\NetSupport\classroom.cloud\supporttool.exe msiexec.exe File created C:\Program Files (x86)\NetSupport\classroom.cloud\pluginiemodule.DLL msiexec.exe File created C:\Program Files (x86)\NetSupport\classroom.cloud\api-ms-win-core-debug-l1-1-0.dll msiexec.exe -
Drops file in Windows directory 29 IoCs
description ioc Process File created C:\Windows\Installer\CloseHookApp64.exe MsiExec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\C01069FE26DA78A44A651C2F05AD9D7B\1.98.1 msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\C01069FE26DA78A44A651C2F05AD9D7B\1.98.1\mfc140.dll.5840D246_3D34_3071_9C86_D071F20CB55F msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\C01069FE26DA78A44A651C2F05AD9D7B\1.98.1\mfc140u.dll.5840D246_3D34_3071_9C86_D071F20CB55F msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\C01069FE26DA78A44A651C2F05AD9D7B\1.98.1\mfcm140.dll.5840D246_3D34_3071_9C86_D071F20CB55F msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\C01069FE26DA78A44A651C2F05AD9D7B\1.98.1\mfcm140.dll.5840D246_3D34_3071_9C86_D071F20CB55F msiexec.exe File opened for modification C:\Windows\Installer\{EF96010C-AD62-4A87-A456-C1F250DAD9B7}\ARPPRODUCTICON.exe msiexec.exe File created C:\Windows\Installer\e580b36.msi msiexec.exe File opened for modification C:\Windows\Installer\e580b36.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIF6C.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\C01069FE26DA78A44A651C2F05AD9D7B\1.98.1\mfc140u.dll.5840D246_3D34_3071_9C86_D071F20CB55F msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\C01069FE26DA78A44A651C2F05AD9D7B\1.98.1\mfcm140u.dll.5840D246_3D34_3071_9C86_D071F20CB55F msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File created C:\Windows\SystemTemp\~DF7DDF23D153BBF8AF.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSI10B5.tmp msiexec.exe File opened for modification C:\Windows\setupact.log WINSTALL.EXE File created C:\Windows\SystemTemp\~DF71452EA108F4FCED.TMP msiexec.exe File created C:\Windows\Installer\SourceHash{EF96010C-AD62-4A87-A456-C1F250DAD9B7} msiexec.exe File opened for modification C:\Windows\setuperr.log WINSTALL.EXE File created C:\Windows\Installer\e580b38.msi msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\C01069FE26DA78A44A651C2F05AD9D7B\1.98.1\mfc140.dll.5840D246_3D34_3071_9C86_D071F20CB55F msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\C01069FE26DA78A44A651C2F05AD9D7B\1.98.1\mfcm140u.dll.5840D246_3D34_3071_9C86_D071F20CB55F msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\SystemTemp\~DF3E62B9CEB731F879.TMP msiexec.exe File created C:\Windows\Installer\{EF96010C-AD62-4A87-A456-C1F250DAD9B7}\ARPPRODUCTICON.exe msiexec.exe File opened for modification C:\Windows\Installer\MSI13E3.tmp msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\C01069FE26DA78A44A651C2F05AD9D7B msiexec.exe File created C:\Windows\SystemTemp\~DF58308627233F1863.TMP msiexec.exe -
Executes dropped EXE 15 IoCs
pid Process 2472 WINSTALL.EXE 4864 winst64.exe 2804 cicStudent.exe 2564 GetUserLang.exe 396 cicStudent.exe 4196 GetUserLang.exe 2760 winst64.exe 432 Process not Found 3880 GetUserLang.exe 4828 CICPlugin.exe 4524 CICPlugin64.exe 4328 CICPlugin.exe 3828 CICPlugin64.exe 3472 Process not Found 2892 Process not Found -
Loads dropped DLL 64 IoCs
pid Process 1356 MsiExec.exe 1356 MsiExec.exe 1356 MsiExec.exe 4860 MsiExec.exe 1720 MsiExec.exe 2472 WINSTALL.EXE 4864 winst64.exe 2472 WINSTALL.EXE 2804 cicStudent.exe 2804 cicStudent.exe 2804 cicStudent.exe 2804 cicStudent.exe 2804 cicStudent.exe 2564 GetUserLang.exe 2804 cicStudent.exe 2804 cicStudent.exe 2804 cicStudent.exe 2804 cicStudent.exe 2804 cicStudent.exe 2804 cicStudent.exe 2804 cicStudent.exe 396 cicStudent.exe 396 cicStudent.exe 396 cicStudent.exe 396 cicStudent.exe 396 cicStudent.exe 4196 GetUserLang.exe 396 cicStudent.exe 2804 cicStudent.exe 396 cicStudent.exe 2760 winst64.exe 1388 msiexec.exe 396 cicStudent.exe 3244 Process not Found 1356 MsiExec.exe 396 cicStudent.exe 3880 GetUserLang.exe 4828 CICPlugin.exe 4828 CICPlugin.exe 4828 CICPlugin.exe 4524 CICPlugin64.exe 4524 CICPlugin64.exe 4524 CICPlugin64.exe 4828 CICPlugin.exe 1388 msiexec.exe 4524 CICPlugin64.exe 396 cicStudent.exe 1388 msiexec.exe 4328 CICPlugin.exe 3828 CICPlugin64.exe 3244 Process not Found 3244 Process not Found 3244 Process not Found 432 Process not Found 432 Process not Found 4824 msedge.exe 4824 msedge.exe 4204 msedge.exe 4204 msedge.exe 5544 Process not Found 5544 Process not Found 5852 identity_helper.exe 5852 identity_helper.exe 6076 msedge.exe -
Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
pid Process 1388 msiexec.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CICPlugin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GetUserLang.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cicStudent.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GetUserLang.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GetUserLang.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CICPlugin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINSTALL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cicStudent.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 00000000040000007daebf27fdc62d460000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000c01200000000ffffffff0000000027010100000800007daebf270000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d01200000000000020ed3a000000ffffffff0000000007000100006809007daebf27000000000000d012000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0ff3a0000000000000005000000ffffffff000000000700010000f87f1d7daebf27000000000000f0ff3a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000007daebf2700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Microsoft\Internet Explorer\Main\Isolation_old_student = "PMEM" cicStudent.exe Set value (str) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Microsoft\Internet Explorer\Main\Isolation = "PMIL" cicStudent.exe -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@%SystemRoot%\system32\powrprof.dll,-15 = "Balanced" cicStudent.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@%SystemRoot%\system32\powrprof.dll,-13 = "High performance" cicStudent.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@%SystemRoot%\system32\powrprof.dll,-11 = "Power saver" cicStudent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows Script\Settings MsiExec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows Script\Settings\JITDebug = "0" MsiExec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26 msiexec.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\NSReplayFile\Shell\Play\Command\ = "\"C:\\Program Files (x86)\\NetSupport\\classroom.cloud\\cicStudent.exe\" /r\"%1\"" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WMVFile\shell\show\command\ = "\"C:\\Program Files (x86)\\NetSupport\\classroom.cloud\\pcinssui.exe\" /ShowVideo \"%L\"" WINSTALL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\C01069FE26DA78A44A651C2F05AD9D7B\Finnish = "Student" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C01069FE26DA78A44A651C2F05AD9D7B\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WMVFile\shell\show WINSTALL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WMVFile\shell\show\ = "&Show with classroom.cloud Student" WINSTALL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\C01069FE26DA78A44A651C2F05AD9D7B\Polish = "Student" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C01069FE26DA78A44A651C2F05AD9D7B\AdvertiseFlags = "388" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C01069FE26DA78A44A651C2F05AD9D7B\SourceList msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C01069FE26DA78A44A651C2F05AD9D7B\SourceList\Media\DiskPrompt = "[1]" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\C01069FE26DA78A44A651C2F05AD9D7B\Russian = "Student" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WMVFile WINSTALL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\C01069FE26DA78A44A651C2F05AD9D7B msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\C01069FE26DA78A44A651C2F05AD9D7B\Common = "NSS" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\movfile WINSTALL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C01069FE26DA78A44A651C2F05AD9D7B\SourceList\Net msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\movfile\shell\show\ = "&Show with classroom.cloud Student" WINSTALL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\C01069FE26DA78A44A651C2F05AD9D7B\Spanish = "Student" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\.rpf msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AVIFile\shell\show\ = "&Show with classroom.cloud Student" WINSTALL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AVIFile\shell\show\command WINSTALL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\C01069FE26DA78A44A651C2F05AD9D7B\Japanese = "Student" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\C01069FE26DA78A44A651C2F05AD9D7B\Swedish = "Student" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\C01069FE26DA78A44A651C2F05AD9D7B\Turkish = "Student" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\NSReplayFile msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\movfile\shell\show WINSTALL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\movfile\shell\show\command WINSTALL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C01069FE26DA78A44A651C2F05AD9D7B\Clients = 3a0000000000 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WMVFile\shell\show\command WINSTALL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{7F2E59DC-D6DD-43E1-AF7B-C27AB2277498} winst64.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C01069FE26DA78A44A651C2F05AD9D7B\DeploymentFlags = "3" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C01069FE26DA78A44A651C2F05AD9D7B\Assignment = "1" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\NSReplayFile\BrowserFlags = "8" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mpegfile\shell WINSTALL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\C01069FE26DA78A44A651C2F05AD9D7B\InstalledByMSI = "Student" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mpegfile\shell\show\command\ = "\"C:\\Program Files (x86)\\NetSupport\\classroom.cloud\\pcinssui.exe\" /ShowVideo \"%L\"" WINSTALL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\C01069FE26DA78A44A651C2F05AD9D7B\Hungarian = "Student" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\MuiCache BackgroundTransferHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\C01069FE26DA78A44A651C2F05AD9D7B\Serbian = "Student" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\C01069FE26DA78A44A651C2F05AD9D7B\Czech = "Student" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C01069FE26DA78A44A651C2F05AD9D7B\InstanceType = "0" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C01069FE26DA78A44A651C2F05AD9D7B\AuthorizedLUAApp = "1" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C01069FE26DA78A44A651C2F05AD9D7B\Language = "1033" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C01069FE26DA78A44A651C2F05AD9D7B\Version = "23199745" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\C01069FE26DA78A44A651C2F05AD9D7B\Bulgarian = "Student" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\C01069FE26DA78A44A651C2F05AD9D7B\Chinese = "Student" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\C01069FE26DA78A44A651C2F05AD9D7B\Portuguese = "Student" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ASFFile\shell\show WINSTALL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mpegfile\shell\show WINSTALL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\C01069FE26DA78A44A651C2F05AD9D7B\German = "Student" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\NSReplayFile\EditFlags = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mpegfile\shell\show\command WINSTALL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{7F2E59DC-D6DD-43E1-AF7B-C27AB2277498}\InProcServer32\ThreadingModel = "Apartment" winst64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C01069FE26DA78A44A651C2F05AD9D7B\ProductName = "classroom.cloud Student" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\NSReplayFile\Shell msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\NSReplayFile\Shell\Play msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\movfile\shell WINSTALL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C01069FE26DA78A44A651C2F05AD9D7B\SourceList\Media\1 = "DISK1;1" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AVIFile\shell WINSTALL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AVIFile\shell\show\command\ = "\"C:\\Program Files (x86)\\NetSupport\\classroom.cloud\\pcinssui.exe\" /ShowVideo \"%L\"" WINSTALL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mpegfile WINSTALL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\NSReplayFile\Shell\ = "Play" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WMVFile\shell WINSTALL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix BackgroundTransferHost.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 396 cicStudent.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 1356 MsiExec.exe 1356 MsiExec.exe 1132 msiexec.exe 1132 msiexec.exe 1720 MsiExec.exe 1720 MsiExec.exe 2472 WINSTALL.EXE 2472 WINSTALL.EXE 2472 WINSTALL.EXE 2472 WINSTALL.EXE 2472 WINSTALL.EXE 2472 WINSTALL.EXE 2804 cicStudent.exe 2804 cicStudent.exe 396 cicStudent.exe 396 cicStudent.exe 4524 CICPlugin64.exe 4524 CICPlugin64.exe 3348 msedge.exe 3348 msedge.exe 4824 msedge.exe 4824 msedge.exe 5852 identity_helper.exe 5852 identity_helper.exe 6076 msedge.exe 6076 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4828 CICPlugin.exe 4524 CICPlugin64.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 664 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1388 msiexec.exe Token: SeIncreaseQuotaPrivilege 1388 msiexec.exe Token: SeSecurityPrivilege 1132 msiexec.exe Token: SeCreateTokenPrivilege 1388 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1388 msiexec.exe Token: SeLockMemoryPrivilege 1388 msiexec.exe Token: SeIncreaseQuotaPrivilege 1388 msiexec.exe Token: SeMachineAccountPrivilege 1388 msiexec.exe Token: SeTcbPrivilege 1388 msiexec.exe Token: SeSecurityPrivilege 1388 msiexec.exe Token: SeTakeOwnershipPrivilege 1388 msiexec.exe Token: SeLoadDriverPrivilege 1388 msiexec.exe Token: SeSystemProfilePrivilege 1388 msiexec.exe Token: SeSystemtimePrivilege 1388 msiexec.exe Token: SeProfSingleProcessPrivilege 1388 msiexec.exe Token: SeIncBasePriorityPrivilege 1388 msiexec.exe Token: SeCreatePagefilePrivilege 1388 msiexec.exe Token: SeCreatePermanentPrivilege 1388 msiexec.exe Token: SeBackupPrivilege 1388 msiexec.exe Token: SeRestorePrivilege 1388 msiexec.exe Token: SeShutdownPrivilege 1388 msiexec.exe Token: SeDebugPrivilege 1388 msiexec.exe Token: SeAuditPrivilege 1388 msiexec.exe Token: SeSystemEnvironmentPrivilege 1388 msiexec.exe Token: SeChangeNotifyPrivilege 1388 msiexec.exe Token: SeRemoteShutdownPrivilege 1388 msiexec.exe Token: SeUndockPrivilege 1388 msiexec.exe Token: SeSyncAgentPrivilege 1388 msiexec.exe Token: SeEnableDelegationPrivilege 1388 msiexec.exe Token: SeManageVolumePrivilege 1388 msiexec.exe Token: SeImpersonatePrivilege 1388 msiexec.exe Token: SeCreateGlobalPrivilege 1388 msiexec.exe Token: SeCreateTokenPrivilege 1388 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1388 msiexec.exe Token: SeLockMemoryPrivilege 1388 msiexec.exe Token: SeIncreaseQuotaPrivilege 1388 msiexec.exe Token: SeMachineAccountPrivilege 1388 msiexec.exe Token: SeTcbPrivilege 1388 msiexec.exe Token: SeSecurityPrivilege 1388 msiexec.exe Token: SeTakeOwnershipPrivilege 1388 msiexec.exe Token: SeLoadDriverPrivilege 1388 msiexec.exe Token: SeSystemProfilePrivilege 1388 msiexec.exe Token: SeSystemtimePrivilege 1388 msiexec.exe Token: SeProfSingleProcessPrivilege 1388 msiexec.exe Token: SeIncBasePriorityPrivilege 1388 msiexec.exe Token: SeCreatePagefilePrivilege 1388 msiexec.exe Token: SeCreatePermanentPrivilege 1388 msiexec.exe Token: SeBackupPrivilege 1388 msiexec.exe Token: SeRestorePrivilege 1388 msiexec.exe Token: SeShutdownPrivilege 1388 msiexec.exe Token: SeDebugPrivilege 1388 msiexec.exe Token: SeAuditPrivilege 1388 msiexec.exe Token: SeSystemEnvironmentPrivilege 1388 msiexec.exe Token: SeChangeNotifyPrivilege 1388 msiexec.exe Token: SeRemoteShutdownPrivilege 1388 msiexec.exe Token: SeUndockPrivilege 1388 msiexec.exe Token: SeSyncAgentPrivilege 1388 msiexec.exe Token: SeEnableDelegationPrivilege 1388 msiexec.exe Token: SeManageVolumePrivilege 1388 msiexec.exe Token: SeImpersonatePrivilege 1388 msiexec.exe Token: SeCreateGlobalPrivilege 1388 msiexec.exe Token: SeCreateTokenPrivilege 1388 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1388 msiexec.exe Token: SeLockMemoryPrivilege 1388 msiexec.exe -
Suspicious use of FindShellTrayWindow 40 IoCs
pid Process 1388 msiexec.exe 396 cicStudent.exe 396 cicStudent.exe 396 cicStudent.exe 396 cicStudent.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 1388 msiexec.exe 396 cicStudent.exe 396 cicStudent.exe 396 cicStudent.exe 396 cicStudent.exe 396 cicStudent.exe 396 cicStudent.exe 396 cicStudent.exe 396 cicStudent.exe -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 396 cicStudent.exe 396 cicStudent.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 396 cicStudent.exe 396 cicStudent.exe 396 cicStudent.exe 396 cicStudent.exe 396 cicStudent.exe 396 cicStudent.exe 396 cicStudent.exe 396 cicStudent.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2760 winst64.exe 4828 CICPlugin.exe 4524 CICPlugin64.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1132 wrote to memory of 1356 1132 msiexec.exe 80 PID 1132 wrote to memory of 1356 1132 msiexec.exe 80 PID 1132 wrote to memory of 1356 1132 msiexec.exe 80 PID 1132 wrote to memory of 884 1132 msiexec.exe 86 PID 1132 wrote to memory of 884 1132 msiexec.exe 86 PID 1132 wrote to memory of 4860 1132 msiexec.exe 88 PID 1132 wrote to memory of 4860 1132 msiexec.exe 88 PID 1132 wrote to memory of 4860 1132 msiexec.exe 88 PID 1132 wrote to memory of 1720 1132 msiexec.exe 90 PID 1132 wrote to memory of 1720 1132 msiexec.exe 90 PID 1132 wrote to memory of 1720 1132 msiexec.exe 90 PID 1132 wrote to memory of 2472 1132 msiexec.exe 92 PID 1132 wrote to memory of 2472 1132 msiexec.exe 92 PID 1132 wrote to memory of 2472 1132 msiexec.exe 92 PID 2472 wrote to memory of 4864 2472 WINSTALL.EXE 93 PID 2472 wrote to memory of 4864 2472 WINSTALL.EXE 93 PID 2804 wrote to memory of 2564 2804 cicStudent.exe 95 PID 2804 wrote to memory of 2564 2804 cicStudent.exe 95 PID 2804 wrote to memory of 2564 2804 cicStudent.exe 95 PID 2804 wrote to memory of 396 2804 cicStudent.exe 96 PID 2804 wrote to memory of 396 2804 cicStudent.exe 96 PID 2804 wrote to memory of 396 2804 cicStudent.exe 96 PID 396 wrote to memory of 4196 396 cicStudent.exe 97 PID 396 wrote to memory of 4196 396 cicStudent.exe 97 PID 396 wrote to memory of 4196 396 cicStudent.exe 97 PID 396 wrote to memory of 2760 396 cicStudent.exe 98 PID 396 wrote to memory of 2760 396 cicStudent.exe 98 PID 396 wrote to memory of 3880 396 cicStudent.exe 99 PID 396 wrote to memory of 3880 396 cicStudent.exe 99 PID 396 wrote to memory of 3880 396 cicStudent.exe 99 PID 396 wrote to memory of 4828 396 cicStudent.exe 100 PID 396 wrote to memory of 4828 396 cicStudent.exe 100 PID 396 wrote to memory of 4828 396 cicStudent.exe 100 PID 396 wrote to memory of 4524 396 cicStudent.exe 101 PID 396 wrote to memory of 4524 396 cicStudent.exe 101 PID 396 wrote to memory of 4328 396 cicStudent.exe 102 PID 396 wrote to memory of 4328 396 cicStudent.exe 102 PID 396 wrote to memory of 4328 396 cicStudent.exe 102 PID 396 wrote to memory of 3828 396 cicStudent.exe 103 PID 396 wrote to memory of 3828 396 cicStudent.exe 103 PID 4824 wrote to memory of 4204 4824 msedge.exe 105 PID 4824 wrote to memory of 4204 4824 msedge.exe 105 PID 4824 wrote to memory of 2592 4824 msedge.exe 106 PID 4824 wrote to memory of 2592 4824 msedge.exe 106 PID 4824 wrote to memory of 2592 4824 msedge.exe 106 PID 4824 wrote to memory of 2592 4824 msedge.exe 106 PID 4824 wrote to memory of 2592 4824 msedge.exe 106 PID 4824 wrote to memory of 2592 4824 msedge.exe 106 PID 4824 wrote to memory of 2592 4824 msedge.exe 106 PID 4824 wrote to memory of 2592 4824 msedge.exe 106 PID 4824 wrote to memory of 2592 4824 msedge.exe 106 PID 4824 wrote to memory of 2592 4824 msedge.exe 106 PID 4824 wrote to memory of 2592 4824 msedge.exe 106 PID 4824 wrote to memory of 2592 4824 msedge.exe 106 PID 4824 wrote to memory of 2592 4824 msedge.exe 106 PID 4824 wrote to memory of 2592 4824 msedge.exe 106 PID 4824 wrote to memory of 2592 4824 msedge.exe 106 PID 4824 wrote to memory of 2592 4824 msedge.exe 106 PID 4824 wrote to memory of 2592 4824 msedge.exe 106 PID 4824 wrote to memory of 2592 4824 msedge.exe 106 PID 4824 wrote to memory of 2592 4824 msedge.exe 106 PID 4824 wrote to memory of 2592 4824 msedge.exe 106 PID 4824 wrote to memory of 2592 4824 msedge.exe 106 PID 4824 wrote to memory of 2592 4824 msedge.exe 106 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\classroom.cloud.1.1e32ad54-8afb-4c05-a1c5-6e3e40e93fe4.uksouth(2).msi1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Loads dropped DLL
- Event Triggered Execution: Installer Packages
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1388
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding C9B66D2420A877779D69D04B7750CE52 C2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1356
-
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:884
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 6860AC565BC508D9AAE98E79590D311B2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4860
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 168819B9C32BCC4142E54B55E4B10ACF E Global\MSI00002⤵
- Drops file in Windows directory
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:1720
-
-
C:\Program Files (x86)\NetSupport\classroom.cloud\WINSTALL.EXE"C:\Program Files (x86)\NetSupport\classroom.cloud\WINSTALL.EXE" /EV"classroom.cloud Student" /EC /Q /Q /I *2⤵
- Sets service image path in registry
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Program Files (x86)\NetSupport\classroom.cloud\winst64.exewinst64.exe /q /q /i3⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:4864
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
PID:4716
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2388
-
C:\Program Files (x86)\NetSupport\classroom.cloud\cicStudent.exe"C:\Program Files (x86)\NetSupport\classroom.cloud\cicStudent.exe" /* *1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Program Files (x86)\NetSupport\classroom.cloud\GetUserLang.exe"C:\Program Files (x86)\NetSupport\classroom.cloud\GetUserLang.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2564
-
-
C:\Program Files (x86)\NetSupport\classroom.cloud\cicStudent.exe"C:\Program Files (x86)\NetSupport\classroom.cloud\cicStudent.exe" * /VistaUI2⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Program Files (x86)\NetSupport\classroom.cloud\GetUserLang.exe"C:\Program Files (x86)\NetSupport\classroom.cloud\GetUserLang.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4196
-
-
C:\Program Files (x86)\NetSupport\classroom.cloud\winst64.exe"C:\Program Files (x86)\NetSupport\classroom.cloud\winst64.exe" /Q /Q /EB60206,13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2760
-
-
C:\Program Files (x86)\NetSupport\classroom.cloud\GetUserLang.exe"C:\Program Files (x86)\NetSupport\classroom.cloud\GetUserLang.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3880
-
-
C:\Program Files (x86)\NetSupport\classroom.cloud\CICPlugin.exe"C:\Program Files (x86)\NetSupport\classroom.cloud\CICPlugin.exe" /USER=SYSTEM3⤵
- Enumerates connected drives
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4828
-
-
C:\Program Files (x86)\NetSupport\classroom.cloud\CICPlugin64.exe"C:\Program Files (x86)\NetSupport\classroom.cloud\CICPlugin64.exe" /USER=SYSTEM3⤵
- Enumerates connected drives
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4524
-
-
C:\Program Files (x86)\NetSupport\classroom.cloud\CICPlugin.exe"C:\Program Files (x86)\NetSupport\classroom.cloud\CICPlugin.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4328
-
-
C:\Program Files (x86)\NetSupport\classroom.cloud\CICPlugin64.exe"C:\Program Files (x86)\NetSupport\classroom.cloud\CICPlugin64.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3828
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://java.com/1⤵
- Loads dropped DLL
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x104,0x108,0x10c,0xdc,0x110,0x7ff827933cb8,0x7ff827933cc8,0x7ff827933cd82⤵
- Loads dropped DLL
PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,18281320093702994561,2447071083961213830,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2044 /prefetch:22⤵PID:2592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2020,18281320093702994561,2447071083961213830,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2020,18281320093702994561,2447071083961213830,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2560 /prefetch:82⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,18281320093702994561,2447071083961213830,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:5200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,18281320093702994561,2447071083961213830,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:5208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,18281320093702994561,2447071083961213830,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1984 /prefetch:12⤵PID:6104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,18281320093702994561,2447071083961213830,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5904 /prefetch:82⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:5852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=2020,18281320093702994561,2447071083961213830,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5948 /prefetch:82⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:6076
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5396
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5452
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.131⤵
- Modifies registry class
PID:5904
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:5248
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵PID:1388
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵PID:1424
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
2Component Object Model Hijacking
1Installer Packages
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
2Component Object Model Hijacking
1Installer Packages
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD53101039e4f92a1152867bff072170c64
SHA1a49ea74a63dfeeeb6658e13a7c860d4dee74d681
SHA256cfecf3a6c74eafc6ab8883b186a8c198e88843dae6b0f09911221cd8f441a863
SHA5122350595bc88fc9eab0f475ad3a7327a01b398df5e1d46dbeac6ccc78c1c43ec960ca10a0c9403b8b8a76fc168c75b96e7278dc27a29983c8924bdfe49465225c
-
Filesize
303KB
MD53426d49120f48e536e7767175450a337
SHA186507fd056c7adaf3296a8941230a121967aeb24
SHA256b55bf64e38ca2d2fe9af3a6d2f95f9b08ab8166f5f40f3099f6d7c74ba491435
SHA5126f0c26a1d8b5ca77b48d88f687394edf970c079ed68a19df546e74d951c17e158574aff1fc88074b4f38b285ba05fe1a0fe92e0f09ec157530e2144e55372e03
-
Filesize
33KB
MD5dcaf9bf3061481f1d980c81444d657d1
SHA15c23e64f597e586fa78e8cfdecbea0f4bf2071b8
SHA25650dcabfcec447b99d118199d006ee3ac91b0fe3f590bc67e6b2b8893d9e87f86
SHA512fbcb957766bb2422307dba68d7ce24c3515f6a39b7bb812ba5b9d6ca9584e1042900f2854fed1a4564782880b04ce029d24281738eee8447c1ffdf1e28d925c8
-
Filesize
755KB
MD50e37fbfa79d349d672456923ec5fbbe3
SHA14e880fc7625ccf8d9ca799d5b94ce2b1e7597335
SHA2568793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18
SHA5122bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630
-
Filesize
31KB
MD599217812500d0ee8494dbb977ae54dfa
SHA1df0df5f249aab9c702fa48bd24338571c41bf06b
SHA2563cb1f60988010c08934ad7c527ff2a0cebd37f0669eb05fc534bc67af7f3f356
SHA512801bf960846f636b1263a219c859cbf4a9c143d0c076a0b593bd5ca61085fc36ad6443a67e408ca140acfe1a3db6112b3105c6c459f3c7be5e0428cf21cbe226
-
Filesize
7.3MB
MD50b6d88695106ba895eff00da393d5865
SHA1e1ac54ac03a4d7e97ef3ada245dbc28e4cae9fd9
SHA256d707d4da17a07c495a5ce282b766d01797d54602e20d76effa9003a6beb1acd1
SHA512c56b384dc38d46f19d895a389391eb59e8b13aa542211cd0d063e9478e569003ea90b9685abdd4cad8fedf597d698bf1a022c22cd314fbf1b8b303e1469abe9f
-
Filesize
1.2MB
MD5b7add7928db7c60b81b783766799aff8
SHA1198ae0b23ccc035fdfaaef8bd7c8d84ea7920d1f
SHA2564bc6aa2a95cf961b58e3edef2bcfc54bfb598426ded4d3cf6b58297e31c58e91
SHA5125a7e8f910fcee1169557462ce774e06ff0419474eced6d2a23c13fa8f8955729d4ec7a0d6b510b0a22c9bdd851c9bf56407af95faaf9c0bd2644da71bb712f2d
-
Filesize
227KB
MD572d513167a6f92a6dba7aff033269fb0
SHA1f0022f343dab594eb3eda6be884bcc09df718feb
SHA2565cec001d13e50f280d2a932586a349291886e70d727c63be1b0ed0e9989e303c
SHA512a5e06840ec116c10afbfc809232b6b12cbd2881681cde9c823bf7e1ee8a9293f4200d172a8ae8523f3227ed46ac29ced8abe311c46fad9b29d91c43bfaaae5ca
-
Filesize
743KB
MD54526ba183e49463e1352772606787180
SHA15803f9f8f8fd82cf4e2ad32db8313c1dbf8ece85
SHA256a87cd4f66d54ec06d3bd75a6a54cbbb5838433376e38b1400200332a1192d49b
SHA5124a0686ec6f79fc45405320b9d69c2cd4f4e8050b20921c1475a1f5ba6787c2f75aed54c0baf27b4161e17ca1a49731a533ee3e1e0a1df15b53ca8afc35db9fe3
-
Filesize
1.4MB
MD5f9cf2db8b99dc50eab538c4d860ac1a4
SHA1b261c9e7f082eb8649afab9a677e022f84fd2823
SHA256865864a32aee78e588764f37847522fdb0bd1940ecd73b3c49d8f68b4d5bad71
SHA51259660740b58b1761a4658aeb02f669f1fd8a3fcb07c162a86b9565c5f9219cb993cc9d94b43b1d39edcd5032b478b8a9b3a388fb82449ca82a83e3c6dd94c02d
-
Filesize
33KB
MD5f046947fc0215fda61b173e6632f2522
SHA1ea80f54f5ea5057138eac3be5cebc65a758730e6
SHA2568d93e4a3952682cb6769d061f24ba3698907e8da13c3372e87550acd0e7753eb
SHA5127134db57d13075436fd6135b1d9de8efcaaffe912fef56975209cdd218d7f8b8234b47ec0fef0a401fe137c7b490258e7c14a89b4f70416035d635cf940d59c5
-
Filesize
102KB
MD5a4d7dbec9f09eca4c73bddc111f759a2
SHA1d72c24be3725f439f9c42e0b92ea57cbbe56773f
SHA2568b0c10049712f99f976c1c7a2aeecaac05f485356d20ff52085d188bc857c64c
SHA512e968985c27895b0a60cb5cde0cf91eff1533d605af337dbf097d4d4eaeca15ef2c622760ceb2740b6a8e29345156d099a2af412ea2d1f92804f7202cc2d91586
-
Filesize
238KB
MD5092b95b9308e2827a3b1598add0e306d
SHA110321c34bbe5982c3005188afa94d1ce73964f2e
SHA256a3cdd51d7a6260e352ad6de5451f4164228ef8150c77c02e5dab3b38f964307f
SHA51220464945cdb7662e4d9f2226ad5e32ff5cff53f08e803bac1cd0a45063534e5b12aacd5661aedfe8ef5064ff56d6b147ecb9430d17e2d9ef4bb13fb7626c01cf
-
Filesize
842KB
MD598a75771d452d5d5fafb9bdc091c512d
SHA167a0e43a56a15082453a9d4940e832155a3057c4
SHA256fa87e30988d3f55399042a2eae90eae0e1934cebd11c6e10168fb40a0395da72
SHA5129dd3d0ed053976379b96064d14c1246df0fc6e09a2683d79d6c005622f5f64e208e45fa75df41e9854671ad093c9b4c8f2274aef623173e36f553733866e3c39
-
Filesize
609KB
MD539a26074fff53bb65ed23219b8c335c8
SHA1a60b0476c1089b7395fbdbd18bc70cf897ab7181
SHA256a4759b4c935ec37ea341cb41d3222faecb87c25ad3add3359d64261f51785f64
SHA51261101f515fbda08849cbeb980098c1bc71ff45f4316a6a8547cc4a3382818176ea3d5b937d9499c7c04cd0941205ae2356855be42fb81fef209e1724599b338c
-
Filesize
429KB
MD51d8c79f293ca86e8857149fb4efe4452
SHA17474e7a5cb9c79c4b99fdf9fb50ef3011bef7e8f
SHA256c09b126e7d4c1e6efb3ffcda2358252ce37383572c78e56ca97497a7f7c793e4
SHA51283c4d842d4b07ba5cec559b6cd1c22ab8201941a667e7b173c405d2fc8862f7e5d9703e14bd7a1babd75165c30e1a2c95f9d1648f318340ea5e2b145d54919b1
-
Filesize
328B
MD526e28c01461f7e65c402bdf09923d435
SHA11d9b5cfcc30436112a7e31d5e4624f52e845c573
SHA256d96856cd944a9f1587907cacef974c0248b7f4210f1689c1e6bcac5fed289368
SHA512c30ec66fecb0a41e91a31804be3a8b6047fc3789306adc106c723b3e5b166127766670c7da38d77d3694d99a8cddb26bc266ee21dba60a148cdf4d6ee10d27d7
-
Filesize
32KB
MD51c2143adeab91d77eb5a9624bd28b283
SHA15f8bb1a5a6ae56af8bbd60acd1c4c67cfd8e26b1
SHA256f897746f7fc866b9fc100f36d6896b883e55b08c5ae9e7d8358fcdb937c6c097
SHA5120d9a5c2130496f4ef4b06ad55be7ba84190a36e0d8412fa11e816ef53bbae413cb11742c053644d6f4df44d19746db0ea420d0426b83eb1a298d42e9e48d11a2
-
Filesize
48KB
MD593a96634b8d685f265eb7bd2b49f4d40
SHA1d0ebf9a80161dd0a273f14ce331b5e8112dfc81a
SHA2561173b0c5bfbf11bb6a928ae8dd9f6c909720043772ebbf589b11d07516742963
SHA51217b4a4fa0f7844d735413cea553218d3dd763dae915509aac6ff82ab409ab6f2f3c8eab31b6c9308c51c0d4e91c155b65e25eddd1ed9d84ab1c6e2fe7c2e48de
-
Filesize
54KB
MD5c10a0306999ba7d7c598155c4d503019
SHA16f7674088d27cec8ba4deb84e603fdabce20da3c
SHA25613590eab09c5d40d54a7ae1fa7beabb838187d782d02ede5a5bb21110117e452
SHA512b5d1e13f3c4200ffed17053122efb989df55a417567466452243181991498b875ae3ac88120724376038cf5e59b79320387eee5104491054b036d10eaa4b2ddc
-
Filesize
397B
MD51776504eea61cb14d645e4ecf7f66fed
SHA15902f0fa83a830bfc9d1befa3583330354389a26
SHA256ebeabcbf16e7a50062ca7271a94359b5e1a648d84ab14e05974a293c56740bed
SHA512e396290024f37579886f07e8924ba0ad5c95818fb3d7dc24263684a72d97ff0cf9eeaf85498d28bf22d8beb2c4c08eeea08839b26259b243cc3bae39eb851710
-
Filesize
1KB
MD53cdcf8f9b05de85c7e7008e7f4a70123
SHA14f2c894e8c86200efcb93ad0ebd85296d48f360c
SHA25627f2bfa146d2d50ae0694bc4d0fbec7e47642396099fc078e4b567048e7a439e
SHA51293f240508610c8cabdadeaf35049204d65985c10f6e3e44a6acef1ff0da62993460e35a6ed3e5b442e32ac751312efe4f03b6b1104b0adb5beb653d71750d3e6
-
Filesize
45KB
MD5472665ab748444f211531025e1abb9d1
SHA1a34c7579723f6cba9cb1c4b6494bcc659854710d
SHA256c5426e49c295507fb5b72628a7bea1b4bbe673e07b27d8ecf8b3734a4bd0612d
SHA51257487771f4b65abb9b4226d5243b57eebbbf04bc894aada7b341e592a1f32a7c417139bc29f4e4bd21e92ddfec472e9effa1b22ac9603d7199198de63b73653c
-
Filesize
81KB
MD58e65e033799eb9fd46bc5c184e7d1b85
SHA1e1cc5313be1f7df4c43697f8f701305585fe4e71
SHA256be38a38e22128af9a529af33d1f02dd24b2a344d29175939e229cf3a280673e4
SHA512e0207fe2c327e7a66c42f23b3cbabc771d3819275dc970a9fa82d7af5f26606685644b8ea511f87ec511eb3a086a9506adec96c01c1b80b788c253bd0d459fbd
-
Filesize
335KB
MD565c4909e7184be52bbe4403587fe116c
SHA1c624ba2f8b13a5eb68fd09590e4d92fc90a393f6
SHA256969163068ac5a2587ac3afd7d849dfe431a3e1f48bfa4ad9c1b9a5d72a99a055
SHA512f1008a52fdc37f252e678f7ed515feb0fdb48dcab1a5a0e142d77f0c4a5792ab3390e4e29aa5d2477308406373d1d2e4e6237ad5aed772c57d53c776ddb23e07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\357F04AD41BCF5FE18FCB69F60C6680F_63B8E89846540A9A5AB10630E3861342
Filesize1KB
MD591f72cd29793b2244cd11526ba718bde
SHA104165a2f569468fc7c273630c4bc63be781ab844
SHA256208bb7fcc9ee35961be8d3e028f3b318a530cea5a9ba1aff329e1c579f25e4cc
SHA512a95c815bdebb039e26cbea4d023c0aebcf74fba34afb5d958de26ee24eb7d17b610169bd8c1f000053296228dd14a792b2bcd3eec5c22656b197941e557a7598
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9CB4373A4252DE8D2212929836304EC5_1AB74AA2E3A56E1B8AD8D3FEC287554E
Filesize1KB
MD57f96e346182b3bf61b256cdeb61ba4f0
SHA1ce61ada47bc16ded28c7d0df6161a8a3c9e58152
SHA256e47c2d5c97804825973404864450ee38869f435b6dbb1f5504ded6447e6c5200
SHA51297e90c8b5da406504c621f6d4e8cc6c3980b935fcb20b536734167a9302f97b52bb48fa037ea2ed4cf6e6c4918210c0e9e517cec5d0dd501d4c9817d567cec3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B039FEA45CB4CC4BBACFC013C7C55604_50385F8EB1F713E33924A830D7A2A41C
Filesize1KB
MD5324bc4cc7ed7dcf41283d6d2586bd43a
SHA137b8b7d0127f7bf137154990252d731066114db9
SHA256589f0bae2dab92a8772d12e18a6ada129f7d6b6601b06884dea6a83368dddbae
SHA512027aa2ccaf62f42559fa0044f51d7e0f4ba6b590d11460f801709874d8c3955be118089bcc436178d1c32a679ab7941269efd8836f31f741fdb05a6a45ddcafe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\357F04AD41BCF5FE18FCB69F60C6680F_63B8E89846540A9A5AB10630E3861342
Filesize536B
MD5fe7726371e064cb8ba43c462426a8c1e
SHA10743ece609d97978c97b0870f1d27bdea5474308
SHA256103200053e13568b003840249b8342ae22a4356a81403f2b128cf4aa1ce97184
SHA5121a64329d1c585eac665b0d0d6252c29813bfdf4bc775c8f919b4152ad446e8957d2ae6bdd40120a8fad397ded6f47be42a315a291ce1a0cd35d2e799bb4bd8d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9CB4373A4252DE8D2212929836304EC5_1AB74AA2E3A56E1B8AD8D3FEC287554E
Filesize536B
MD5af3c659bee0cbc9c677bcac0f0608e44
SHA14aa382be14df0c278f88ef083c67677f50f381fe
SHA25601082a3a4e8b6d29f5fcdb514b8befe81538c95686ac674477bb268135bb6463
SHA51277486bd74cd19d9fbc1abc758b0b96f5ce06ab407cd0dfdb3336fb4d1234e7630651152995bd51acd4df303338251f9d2fd871c5ee9fd6061cbd2d842e007321
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B039FEA45CB4CC4BBACFC013C7C55604_50385F8EB1F713E33924A830D7A2A41C
Filesize508B
MD59a671a7e432ce18c544d53ccc8f20c02
SHA13624ac4511819b5fc6cd5994eb5af105b889048a
SHA256ea5f2be546d73b708b9ab7a8e9bc4531dda5421ba208583df9da28e886158645
SHA512fe24e83a5d1fc81beabd775325df120826e8c86f8b36752bb5cec10e0d3432c8654fd93335bc48269728c04adc665eef2b083f862cd762e83a1f8e3631a3ad04
-
Filesize
152B
MD5e11c77d0fa99af6b1b282a22dcb1cf4a
SHA12593a41a6a63143d837700d01aa27b1817d17a4d
SHA256d96f9bfcc81ba66db49a3385266a631899a919ed802835e6fb6b9f7759476ea0
SHA512c8f69f503ab070a758e8e3ae57945c0172ead1894fdbfa2d853e5bb976ed3817ecc8f188eefd5092481effd4ef650788c8ff9a8d9a5ee4526f090952d7c859f3
-
Filesize
152B
MD5c0a1774f8079fe496e694f35dfdcf8bc
SHA1da3b4b9fca9a3f81b6be5b0cd6dd700603d448d3
SHA256c041da0b90a5343ede7364ccf0428852103832c4efa8065a0cd1e8ce1ff181cb
SHA51260d9e87f8383fe3afa2c8935f0e5a842624bb24b03b2d8057e0da342b08df18cf70bf55e41fa3ae54f73bc40a274cf6393d79ae01f6a1784273a25fa2761728b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\758a585b-4124-4386-8c15-53c4a552028c.tmp
Filesize650B
MD5260f3c402c2ffd3f9966fa2e895c16d5
SHA14d7b93cb4ac2ce38056b85807566c43f9183e863
SHA256d661e2553066f91b62f38c66c48f34a9297793e6d33d8bd68acec55c39321659
SHA51214769485597571eb3482a80ff180a22fc130a71371b3db33d8a5bc17dd63c5b1c8fc135607f071d81c4cc8838d1852eda00c82178be7bb7c49203044475e973f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize696B
MD5d1fb69c967ed4807cf9424abd3ed4fc6
SHA1455f43b0e74ecacddf9c9eddc497a21e188880ac
SHA2561d5c6ff4216384e67e4ec271cf8fcc322cf6929942c42180d1f42702c128c2a9
SHA5120b1cc8f3c695678650ae567234955436649a7ae89cff3d708b357eacaddb3ca8e674c4d06895a513c2994848b1dce5215818f3562625a83c96b655b1828032e9
-
Filesize
5KB
MD52eb7f6895e9cb76e00d2fef760ac78e5
SHA160d42edf30b7cda76a533b39417a0a001cb4c887
SHA256c46d9ca0882d6fd9e9bd5be3ef1cd44faae75b0113e4f79677201f1b58a2fd69
SHA512aa0528a3d7c5ed9d7574899bbf01e8b49b92e4e517a3b87a8d7e841c7a4eb8458e8c81fdfc190e518feccf22d0403dc36bf7dc8190aac585a0e423ba7636c45a
-
Filesize
6KB
MD5258f15b61251999cfb4ad484e43d4a7c
SHA165adfd70ab90f32ad38fcb8c469fabefc4fb423e
SHA2566a2addb4e39eeb52177d9027f829f046ab2640966433948a7b470cae8564e4b1
SHA512b37d75e8643509fbc52a109537ce2be88e3f960c2b4815f7a1cd7884ffde0377c1d95c55c4d5f3c15bf776cb8361465aa683562b33e95667395e2451d7dc8867
-
Filesize
6KB
MD578ee7b387aefb327e36e7da59072e848
SHA1e61aac1e1aef2319e408a2d7b0dd3859aa4e25e0
SHA25617fd7b2f89d95e095f32f5079059dac4105a9c255bfaa0f8432c5e72047a5ccd
SHA5129a1112a4986b7f7095a9cd2303351eb125c58b0f2830830b4753443be497bc476694dc213f73dd7fd1e1b225d121422911d5e8bf2f9f15311e7ccdc93504b730
-
Filesize
871B
MD5bc2d7fe79a67ec016678a6e633d627d9
SHA12413ca846a1dbc31141c7f4d4645681b7233e8d0
SHA2564033c96e5b88a0cb465a65b30aab2662702881c216f5a211eb36e89b9e70e3cd
SHA512d034b5bb51fed23dd29259b94ade49e8864c8a399b30ab807ffc84ab25fbfd68e314f4ab03d1d4f4c3d305a7d490f979adf10746491e6a5c443e5288f035e4c1
-
Filesize
871B
MD5a15a2c9954247564d706d025f29ca4e2
SHA16f7bdc878d5953480ffdd50163aac87770378695
SHA256d3869e8967aa4fbe8a625723029353a718ff20a3f0d13f75e032bd2415d381d3
SHA512ad198f1203652ea26e5925766ed00e0edce13daa2af8c30cf20a4b653e241b7327c0b259d6698a1c5f0cd2f4fae1e8045ebb2691691e3358222f3f483f13a337
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5708880e7e66aad1533e02d604dd0f679
SHA1cb8fa8e706456f2719d4a76916920a3ce3259d48
SHA2560b6fc1a672c9479b035dd1ce452820d0f5c2bbc4c8701ad6116ebbb48ddc145c
SHA512e0d20900d2f45aa4889b3ccc7ec5194e385c9e43e04abc8e8b45016547ae3bfce38588883fc2ff2214837df64272ac90d2c55a5ddfbcbf46585e32a8c3b14cf2
-
Filesize
10KB
MD543ff1a1a582479b467c0d3bf54185cac
SHA1fec1a37d74f97c868400dceced5ef271490e160e
SHA256389cd3e6097a529ccae1891998fc06b8588c94c7655b879c4c0f31a77693ae2c
SHA512aec46c9b1467abcd160c9da386d2caaca71cf735238be8b4bf706782ecdd686d78d8fce7b9e8595efa3da5e5928986af245e3a1be19c84e4806c17ac514bdf3c
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\BackgroundTransferApi\2b4dba63-46a9-491c-b1ea-4618611a7f63.down_data
Filesize555KB
MD55683c0028832cae4ef93ca39c8ac5029
SHA1248755e4e1db552e0b6f8651b04ca6d1b31a86fb
SHA256855abd360d8a8d6974eba92b70cbd09ce519bc8773439993f9ab37cb6847309e
SHA512aba434bd29be191c823b02ea9b639beb10647bbe7759bbffdaa790dfb1ec2c58d74c525ef11aacda209e4effe322d1d3a07b115446c8914b07a3bce4d8a0e2c3
-
Filesize
169KB
MD50e6fda2b8425c9513c774cf29a1bc72d
SHA1a79ffa24cb5956398ded44da24793a2067b85dd0
SHA256e946b2fae0b36c43064463a8c16a2774adac30c4188c5af90e9338b903c501c9
SHA512285bb7759a1214abed36162ac8be2d48df17a05278c4de97562448e20fd43b635563a6819f37e23d92a5f5ed0205a68bffe43dac0d3a67513bd0303b4e7f89aa
-
Filesize
153KB
MD5a1b7850763af9593b66ee459a081bddf
SHA16e45955fae2b2494902a1b55a3873e542f0f5ce4
SHA25641b8e92deba5206c78817236ed7f44df95636ca748d95fab05f032f5aec186af
SHA512a87a302a9a0d19d7ce293b42f5e7bc09664b21307a5321f226157fcc57eb2df2b59c6651878cb23969a182c82b55e8671ff00f8462194b81a907974a49cb25b1
-
Filesize
504KB
MD5caef4649c1b75f44c360a5574a4b9917
SHA1a6070bd5c7258a12ae286456fbb7c5d2197d0871
SHA256a84649e3f049f9209754cdbbdd0b09962b1a7c979271e263581dbe792e98d66e
SHA512367872252bd58ab56400eedab653f7ccae852d20328d698b413ee31e5039660ea255f4e276680651767398a32ba90af2cb12a6a05a0f8eedd7900cd97cb1c2f1
-
Filesize
24.6MB
MD5e32d7ff04abe620e10a1d4086095a166
SHA13994e79982fbb1294675796999d9f79810f9499f
SHA25612f40496245c29161350e5479b9ecc22f18017737c6d566cbb29f4aeb7f31b29
SHA5126149b2318f75cf6cf19cb5abe4f51d2866ec1e3444d27c089f9fd346f155152aa9a53421576c171ff57df2bae9294b3e9ff253b1713b052e9228b881753d599d
-
\??\Volume{27bfae7d-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{1d7883b4-6a3f-4314-9cac-398483f08f45}_OnDiskSnapshotProp
Filesize6KB
MD55f77dc193f3d43300b347601d4956fae
SHA1a71c3370bb5c40b8d14eab566fa9d35fe014dfc3
SHA256dec16962c973292486032f4bd14bc03719c13ff12607ccd7f7f6fcfcfbd96160
SHA5120971bb5405671c00c0814636e34cf2fe921f2d467038b2cdf61b6ea57f8af43f434c2f5573cec438a7cff714aa99011ae18b7af0af7d1f998d7f5711a1f2c5e7