Resubmissions
13-02-2025 05:01
250213-fnkwtstpgw 1013-02-2025 04:24
250213-e1kk6atmaz 1013-02-2025 04:08
250213-eqe8patkgx 812-02-2025 23:56
250212-3yzt3azrdx 1012-02-2025 23:44
250212-3rgd5szmbm 1012-02-2025 23:19
250212-3a9dlazkep 1012-02-2025 13:32
250212-qs211ssrfr 1012-02-2025 03:00
250212-dhrfbaxnhm 1012-02-2025 02:51
250212-dcketaxnhz 10Analysis
-
max time kernel
1800s -
max time network
1801s -
platform
windows11-21h2_x64 -
resource
win11-20250211-en -
resource tags
arch:x64arch:x86image:win11-20250211-enlocale:en-usos:windows11-21h2-x64system -
submitted
13-02-2025 05:01
Static task
static1
Behavioral task
behavioral1
Sample
Downloaders.zip
Resource
win11-20250211-en
General
-
Target
Downloaders.zip
-
Size
12KB
-
MD5
94fe78dc42e3403d06477f995770733c
-
SHA1
ea6ba4a14bab2a976d62ea7ddd4940ec90560586
-
SHA256
16930620b3b9166e0ffbd98f5d5b580c9919fd6ccdcc74fb996f53577f508267
-
SHA512
add85726e7d2c69068381688fe84defe820f600e6214eff029042e3002e9f4ad52dde3b8bb28f4148cca1b950cd54d3999ce9e8445c4562d1ef2efdb1c6bdeff
-
SSDEEP
384:6BfwcSEp9ZjKXSBIDv4dDfjlMJ7HWTHWB:efACW6Dr8HWTHWB
Malware Config
Extracted
redline
wind
194.190.152.223:40355
-
auth_value
8834064a70f1a34ac1e47c2315ab253e
Extracted
njrat
v4.0
HacKed by Here
21.ip.gl.ply.gg:56106
Windows
-
reg_key
Windows
-
splitter
|-F-|
Extracted
azorult
http://195.245.112.115/index.php
Extracted
asyncrat
0.5.8
Default
159.100.19.137:7707
yBu0GW2G5zAc
-
delay
3
-
install
false
-
install_file
svchost.exe
-
install_folder
%AppData%
Extracted
redline
cheat
103.84.89.222:33791
Extracted
asyncrat
0.5.7B
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
127.0.0.1:8080
127.0.0.1:18274
6.tcp.eu.ngrok.io:6606
6.tcp.eu.ngrok.io:7707
6.tcp.eu.ngrok.io:8808
6.tcp.eu.ngrok.io:8080
6.tcp.eu.ngrok.io:18274
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
Detect Vidar Stealer 8 IoCs
resource yara_rule behavioral1/memory/1280-679-0x0000000000400000-0x000000000085E000-memory.dmp family_vidar_v7 behavioral1/memory/1280-755-0x0000000000400000-0x000000000085E000-memory.dmp family_vidar_v7 behavioral1/memory/1280-773-0x0000000000400000-0x000000000085E000-memory.dmp family_vidar_v7 behavioral1/memory/1280-779-0x0000000000400000-0x000000000085E000-memory.dmp family_vidar_v7 behavioral1/memory/1280-792-0x0000000000400000-0x000000000085E000-memory.dmp family_vidar_v7 behavioral1/memory/1280-799-0x0000000000400000-0x000000000085E000-memory.dmp family_vidar_v7 behavioral1/memory/980-1181-0x0000000000400000-0x000000000085E000-memory.dmp family_vidar_v7 behavioral1/memory/980-1231-0x0000000000400000-0x000000000085E000-memory.dmp family_vidar_v7 -
Njrat family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x001b00000002acd3-613.dat family_redline behavioral1/memory/2324-618-0x0000000000230000-0x000000000024C000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 6 IoCs
resource yara_rule behavioral1/memory/2568-965-0x0000000000670000-0x0000000000AE8000-memory.dmp family_sectoprat behavioral1/memory/2568-966-0x0000000000670000-0x0000000000AE8000-memory.dmp family_sectoprat behavioral1/memory/2900-1202-0x0000000000670000-0x0000000000AE8000-memory.dmp family_sectoprat behavioral1/memory/2900-1201-0x0000000000670000-0x0000000000AE8000-memory.dmp family_sectoprat behavioral1/memory/2900-2493-0x0000000000670000-0x0000000000AE8000-memory.dmp family_sectoprat behavioral1/memory/2568-2497-0x0000000000670000-0x0000000000AE8000-memory.dmp family_sectoprat -
Sectoprat family
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral1/memory/2696-920-0x0000000000400000-0x0000000000704000-memory.dmp family_stormkitty -
Stormkitty family
-
Vidar family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x002e00000002ad15-1466.dat family_asyncrat -
resource yara_rule behavioral1/files/0x000900000000d379-2689.dat cryptone -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7fOMOTQ.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ViGgA8C.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Bjkm5hE.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7fOMOTQ.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ViGgA8C.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7fOMOTQ.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7fOMOTQ.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7fOMOTQ.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Fe36XBk.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Fe36XBk.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Bjkm5hE.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\Version = "43,0,0,0" setup.exe Key created \REGISTRY\USER\S-1-5-21-2417498994-1216132997-487892065-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\ = "Microsoft Edge" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\StubPath = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.59\\Installer\\setup.exe\" --configure-user-settings --verbose-logging --system-level --msedge --channel=stable" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\Localized Name = "Microsoft Edge" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\IsInstalled = "1" setup.exe -
Downloads MZ/PE file 18 IoCs
flow pid Process 562 112 New Text Document mod.exe 1508 112 New Text Document mod.exe 3497 112 New Text Document mod.exe 12 1928 Process not Found 16 112 New Text Document mod.exe 117 112 New Text Document mod.exe 117 112 New Text Document mod.exe 117 112 New Text Document mod.exe 117 112 New Text Document mod.exe 117 112 New Text Document mod.exe 117 112 New Text Document mod.exe 15 112 New Text Document mod.exe 36 112 New Text Document mod.exe 122 112 New Text Document mod.exe 122 112 New Text Document mod.exe 3550 112 New Text Document mod.exe 1509 112 New Text Document mod.exe 3567 112 New Text Document mod.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 1068 netsh.exe -
Uses browser remote debugging 2 TTPs 13 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 3292 chrome.exe 132 msedge.exe 3640 msedge.exe 1796 chrome.exe 5436 chrome.exe 4120 chrome.exe 3476 chrome.exe 2460 msedge.exe 3892 msedge.exe 5428 chrome.exe 5644 chrome.exe 3576 chrome.exe 3436 msedge.exe -
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/files/0x002000000002ade1-910.dat net_reactor behavioral1/memory/2084-915-0x0000000000270000-0x00000000008B0000-memory.dmp net_reactor -
Checks BIOS information in registry 2 TTPs 22 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7fOMOTQ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7fOMOTQ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7fOMOTQ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Fe36XBk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Fe36XBk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Fe36XBk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7fOMOTQ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ViGgA8C.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Bjkm5hE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7fOMOTQ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7fOMOTQ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ViGgA8C.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Bjkm5hE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7fOMOTQ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Bjkm5hE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7fOMOTQ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7fOMOTQ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7fOMOTQ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ViGgA8C.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Bjkm5hE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ViGgA8C.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Fe36XBk.exe -
Drops startup file 5 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk winlog32.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk winlog32.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\5a58f9242b64263df668b949c7294533.exe Device2.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\5a58f9242b64263df668b949c7294533.exe Device2.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk winlog32.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 64 IoCs
pid Process 648 Device2.exe 4796 TaVOM7x.exe 4544 949wScO.exe 4980 949wScO.exe 1952 949wScO.exe 3592 949wScO.exe 1512 TaVOM7x.exe 3388 949wScO.exe 652 win.exe 1804 random.exe 1280 Bjkm5hE.exe 2972 Macromedia.com 392 cHSzTDjVl.exe 2324 wind.exe 1432 winlog32.exe 4832 7fOMOTQ.exe 1968 wind.exe 996 cHSzTDjVl.exe 2652 7fOMOTQ.exe 5084 7fOMOTQ.exe 3880 win.exe 4008 random.exe 3492 random.exe 4968 random.exe 3768 TimeUpdate.exe 1088 TimeUpdate.exe 3776 TimeUpdate.exe 2084 L5shRfh.exe 396 L5shRfh.exe 2696 L5shRfh.exe 1480 L5shRfh.exe 2156 L5shRfh.exe 3980 L5shRfh.exe 1796 L5shRfh.exe 828 random.exe 2820 7fOMOTQ.exe 2568 ViGgA8C.exe 1688 TaVOM7x.exe 2416 949wScO.exe 544 win.exe 980 Bjkm5hE.exe 1512 winlog32.exe 2224 wind.exe 3128 cHSzTDjVl.exe 3180 7fOMOTQ.exe 1400 random.exe 4404 TimeUpdate.exe 4700 L5shRfh.exe 1124 L5shRfh.exe 892 L5shRfh.exe 3344 L5shRfh.exe 2900 ViGgA8C.exe 1344 Fe36XBk.exe 5748 aaa%20(3).exe 5812 Macromedia.com 2112 aaa%20(3).exe 4412 random.exe 6732 setup.exe 6796 setup.exe 5940 setup.exe 3396 setup.exe 7120 setup.exe 3552 setup.exe 3616 setup.exe -
Identifies Wine through registry keys 2 TTPs 11 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2417498994-1216132997-487892065-1000\Software\Wine 7fOMOTQ.exe Key opened \REGISTRY\USER\S-1-5-21-2417498994-1216132997-487892065-1000\Software\Wine ViGgA8C.exe Key opened \REGISTRY\USER\S-1-5-21-2417498994-1216132997-487892065-1000\Software\Wine Fe36XBk.exe Key opened \REGISTRY\USER\S-1-5-21-2417498994-1216132997-487892065-1000\Software\Wine Fe36XBk.exe Key opened \REGISTRY\USER\S-1-5-21-2417498994-1216132997-487892065-1000\Software\Wine 7fOMOTQ.exe Key opened \REGISTRY\USER\S-1-5-21-2417498994-1216132997-487892065-1000\Software\Wine ViGgA8C.exe Key opened \REGISTRY\USER\S-1-5-21-2417498994-1216132997-487892065-1000\Software\Wine Bjkm5hE.exe Key opened \REGISTRY\USER\S-1-5-21-2417498994-1216132997-487892065-1000\Software\Wine 7fOMOTQ.exe Key opened \REGISTRY\USER\S-1-5-21-2417498994-1216132997-487892065-1000\Software\Wine 7fOMOTQ.exe Key opened \REGISTRY\USER\S-1-5-21-2417498994-1216132997-487892065-1000\Software\Wine 7fOMOTQ.exe Key opened \REGISTRY\USER\S-1-5-21-2417498994-1216132997-487892065-1000\Software\Wine Bjkm5hE.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2417498994-1216132997-487892065-1000\Software\Microsoft\Windows\CurrentVersion\Run\5a58f9242b64263df668b949c7294533 = "\"C:\\Users\\Admin\\Desktop\\a\\Device2.exe\" .." Device2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5a58f9242b64263df668b949c7294533 = "\"C:\\Users\\Admin\\Desktop\\a\\Device2.exe\" .." Device2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2417498994-1216132997-487892065-1000\Software\Microsoft\Windows\CurrentVersion\Run\Administrator = "C:\\ProgramData\\Microsoft\\csrss.exe" win.exe Set value (str) \REGISTRY\USER\S-1-5-21-2417498994-1216132997-487892065-1000\Software\Microsoft\Windows\CurrentVersion\Run\Internet Explorer = "C:\\Users\\Admin\\Documents\\Internet Explorer\\MSBuild\\Reference Assemblies.exe" 5689_4833.exe Set value (str) \REGISTRY\USER\S-1-5-21-2417498994-1216132997-487892065-1000\Software\Microsoft\Windows\CurrentVersion\Run\Internet Explorer = "C:\\Users\\Admin\\Documents\\Internet Explorer\\MSBuild\\Reference Assemblies.exe" 5689_4833.exe Set value (str) \REGISTRY\USER\S-1-5-21-2417498994-1216132997-487892065-1000\Software\Microsoft\Windows\CurrentVersion\Run\Internet Explorer = "C:\\Users\\Admin\\Documents\\Internet Explorer\\MSBuild\\Reference Assemblies.exe" 9358_8410.exe Set value (str) \REGISTRY\USER\S-1-5-21-2417498994-1216132997-487892065-1000\Software\Microsoft\Windows\CurrentVersion\Run\Internet Explorer = "C:\\Users\\Admin\\Documents\\Internet Explorer\\MSBuild\\Reference Assemblies.exeȀ" 9358_8410.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe -
Installs/modifies Browser Helper Object 2 TTPs 8 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ = "IEToEdge BHO" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ = "IEToEdge BHO" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\NoExplorer = "1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\NoExplorer = "1" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects setup.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 19 IoCs
flow ioc 1524 6.tcp.eu.ngrok.io 3437 6.tcp.eu.ngrok.io 15 raw.githubusercontent.com 3247 6.tcp.eu.ngrok.io 3618 6.tcp.eu.ngrok.io 14 raw.githubusercontent.com 122 raw.githubusercontent.com 1508 raw.githubusercontent.com 2045 6.tcp.eu.ngrok.io 2688 6.tcp.eu.ngrok.io 2952 6.tcp.eu.ngrok.io 3495 6.tcp.eu.ngrok.io 3537 6.tcp.eu.ngrok.io 3561 6.tcp.eu.ngrok.io 1336 6.tcp.eu.ngrok.io 1754 6.tcp.eu.ngrok.io 2297 6.tcp.eu.ngrok.io 3362 6.tcp.eu.ngrok.io 3645 6.tcp.eu.ngrok.io -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 Fe36XBk.exe File opened for modification \??\PHYSICALDRIVE0 Fe36XBk.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Microsoft Edge.lnk setup.exe -
Enumerates processes with tasklist 1 TTPs 4 IoCs
pid Process 3584 tasklist.exe 1824 tasklist.exe 4296 tasklist.exe 4632 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
pid Process 1280 Bjkm5hE.exe 4832 7fOMOTQ.exe 2652 7fOMOTQ.exe 5084 7fOMOTQ.exe 2820 7fOMOTQ.exe 2568 ViGgA8C.exe 980 Bjkm5hE.exe 3180 7fOMOTQ.exe 2900 ViGgA8C.exe 1344 Fe36XBk.exe 3312 Fe36XBk.exe -
Suspicious use of SetThreadContext 21 IoCs
description pid Process procid_target PID 4544 set thread context of 4980 4544 949wScO.exe 114 PID 4544 set thread context of 1952 4544 949wScO.exe 115 PID 4796 set thread context of 2140 4796 TaVOM7x.exe 121 PID 1512 set thread context of 1500 1512 TaVOM7x.exe 129 PID 4008 set thread context of 3504 4008 random.exe 213 PID 3492 set thread context of 2424 3492 random.exe 233 PID 4968 set thread context of 2644 4968 random.exe 234 PID 2084 set thread context of 2696 2084 L5shRfh.exe 249 PID 2084 set thread context of 1480 2084 L5shRfh.exe 250 PID 2156 set thread context of 3980 2156 L5shRfh.exe 257 PID 2156 set thread context of 1796 2156 L5shRfh.exe 258 PID 828 set thread context of 1932 828 random.exe 289 PID 4700 set thread context of 1124 4700 L5shRfh.exe 291 PID 4700 set thread context of 3344 4700 L5shRfh.exe 293 PID 1688 set thread context of 5840 1688 TaVOM7x.exe 314 PID 1400 set thread context of 2800 1400 random.exe 318 PID 4412 set thread context of 6844 4412 random.exe 364 PID 6860 set thread context of 5180 6860 5689_4833.exe 422 PID 6988 set thread context of 5932 6988 5689_4833.exe 427 PID 2980 set thread context of 6420 2980 9358_8410.exe 431 PID 868 set thread context of 6516 868 9358_8410.exe 434 -
resource yara_rule behavioral1/files/0x001900000002ae23-162.dat upx behavioral1/memory/652-166-0x0000000000EA0000-0x000000000140B000-memory.dmp upx behavioral1/memory/652-640-0x0000000000EA0000-0x000000000140B000-memory.dmp upx behavioral1/memory/652-704-0x0000000000EA0000-0x000000000140B000-memory.dmp upx behavioral1/memory/652-765-0x0000000000EA0000-0x000000000140B000-memory.dmp upx behavioral1/memory/652-775-0x0000000000EA0000-0x000000000140B000-memory.dmp upx behavioral1/memory/652-789-0x0000000000EA0000-0x000000000140B000-memory.dmp upx behavioral1/memory/652-794-0x0000000000EA0000-0x000000000140B000-memory.dmp upx behavioral1/memory/652-801-0x0000000000EA0000-0x000000000140B000-memory.dmp upx behavioral1/memory/652-803-0x0000000000EA0000-0x000000000140B000-memory.dmp upx behavioral1/memory/652-805-0x0000000000EA0000-0x000000000140B000-memory.dmp upx behavioral1/memory/3880-809-0x0000000000EA0000-0x000000000140B000-memory.dmp upx behavioral1/memory/3880-811-0x0000000000EA0000-0x000000000140B000-memory.dmp upx behavioral1/memory/652-812-0x0000000000EA0000-0x000000000140B000-memory.dmp upx behavioral1/memory/652-824-0x0000000000EA0000-0x000000000140B000-memory.dmp upx behavioral1/memory/652-826-0x0000000000EA0000-0x000000000140B000-memory.dmp upx behavioral1/memory/652-828-0x0000000000EA0000-0x000000000140B000-memory.dmp upx behavioral1/memory/652-842-0x0000000000EA0000-0x000000000140B000-memory.dmp upx behavioral1/memory/652-852-0x0000000000EA0000-0x000000000140B000-memory.dmp upx behavioral1/memory/652-859-0x0000000000EA0000-0x000000000140B000-memory.dmp upx behavioral1/memory/544-1160-0x0000000000EA0000-0x000000000140B000-memory.dmp upx behavioral1/memory/544-1162-0x0000000000EA0000-0x000000000140B000-memory.dmp upx behavioral1/memory/652-2578-0x0000000000EA0000-0x000000000140B000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Trust Protection Lists\Mu\Advertising setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Trust Protection Lists\Mu\Entities setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\vk_swiftshader_icd.json setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\show_third_party_software_licenses.bat setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\bg.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\BHO\ie_to_edge_bho_64.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Locales\nb.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{05EEEDBA-EFBD-4832-B6E6-66286CC15F18}\EDGEMITMP_EDB16.tmp\setup.exe MicrosoftEdge_X64_133.0.3065.59.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{05EEEDBA-EFBD-4832-B6E6-66286CC15F18}\EDGEMITMP_EDB16.tmp\setup.exe MicrosoftEdge_X64_133.0.3065.59.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\EdgeWebView.dat setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\ta.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Trust Protection Lists\Sigma\Staging setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Trust Protection Lists\Sigma\Social setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\qu.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\ur.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\vcruntime140.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\msedgewebview2.exe setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\fr.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Locales\ka.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Locales\lv.pak setup.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\delegatedWebFeatures.sccd setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\elevation_service.exe setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\7120_13383897454873882_7120.pma setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\msedge_100_percent.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\identity_proxy\resources.pri setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\pa.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\ug.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\msvcp140_codecvt_ids.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\vccorlib140.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\identity_proxy\win10\identity_helper.Sparse.Dev.msix setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Locales\hu.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\EBWebView\x86\EmbeddedBrowserWebView.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\v8_context_snapshot.bin setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Edge.dat setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\VisualElements\Logo.png setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\WidevineCdm\manifest.json setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Locales\lt.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{05EEEDBA-EFBD-4832-B6E6-66286CC15F18}\MicrosoftEdge_X64_133.0.3065.59.exe MicrosoftEdge_X64_133.0.3065.59.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\sr.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\MEIPreload\manifest.json setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Locales\km.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\MEIPreload\manifest.json setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\kok.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\EBWebView\x86\EmbeddedBrowserWebView.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Trust Protection Lists\Mu\LICENSE setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\el.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Locales\lo.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Locales\nl.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\identity_proxy\win10\identity_helper.Sparse.Canary.msix setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\identity_proxy\win10\identity_helper.Sparse.Canary.msix setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\identity_proxy\win11\identity_helper.Sparse.Stable.msix setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\pt-BR.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\identity_proxy\win11\identity_helper.Sparse.Canary.msix setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\ne.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\wdag.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\edge_feedback\mf_trace.wprp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\fr-CA.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\identity_proxy\win11\identity_helper.Sparse.Dev.msix setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\WidevineCdm\_platform_specific\win_x64\widevinecdm.dll.sig setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Locales\kok.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\edge_game_assist\VERSION setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Trust Protection Lists\Sigma\Entities setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\sk.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\oneds.dll setup.exe -
Drops file in Windows directory 41 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\metadata setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\metadata setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\metadata setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\metadata setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File opened for modification C:\Windows\SystemTemp\msedge_installer.log setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File opened for modification C:\Windows\AttacksContacted random.exe File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\SystemTemp\msedge_installer.log setup.exe File opened for modification C:\Windows\SystemTemp\msedge_installer.log setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File opened for modification C:\Windows\SystemTemp setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File opened for modification C:\Windows\SchedulesAb random.exe File opened for modification C:\Windows\ContainsBefore random.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp setup.exe File opened for modification C:\Windows\SystemTemp setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp\msedge_installer.log setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\metadata setup.exe File opened for modification C:\Windows\TokenDetroit random.exe File opened for modification C:\Windows\SystemTemp setup.exe File opened for modification C:\Windows\SystemTemp\msedge_installer.log setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Program crash 42 IoCs
pid pid_target Process procid_target 2088 4544 WerFault.exe 110 1400 3592 WerFault.exe 118 5040 3388 WerFault.exe 125 2136 3768 WerFault.exe 214 1140 3768 WerFault.exe 214 1796 3768 WerFault.exe 214 3180 3768 WerFault.exe 214 3436 1088 WerFault.exe 224 2900 1088 WerFault.exe 224 3908 1088 WerFault.exe 224 3020 1088 WerFault.exe 224 3000 3776 WerFault.exe 236 808 3776 WerFault.exe 236 4376 3776 WerFault.exe 236 3136 3776 WerFault.exe 236 1940 2084 WerFault.exe 246 2004 1480 WerFault.exe 250 1908 2156 WerFault.exe 256 2492 1796 WerFault.exe 258 336 2416 WerFault.exe 270 2928 4404 WerFault.exe 280 1320 4404 WerFault.exe 280 4128 4404 WerFault.exe 280 3068 4404 WerFault.exe 280 3068 4700 WerFault.exe 290 6000 1124 WerFault.exe 291 6184 3768 WerFault.exe 214 3740 3768 WerFault.exe 214 2788 1088 WerFault.exe 224 6140 1088 WerFault.exe 224 6216 3776 WerFault.exe 236 6328 3776 WerFault.exe 236 2484 3776 WerFault.exe 236 6196 1088 WerFault.exe 224 4192 3768 WerFault.exe 214 1448 3768 WerFault.exe 214 6444 1088 WerFault.exe 224 4272 1088 WerFault.exe 224 6832 3776 WerFault.exe 236 3668 3776 WerFault.exe 236 6308 4404 WerFault.exe 280 3972 4404 WerFault.exe 280 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aaa%20(3).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 949wScO.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language win.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language win.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cHSzTDjVl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9358_8410.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cHSzTDjVl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language L5shRfh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language L5shRfh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aaa%20(3).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5689_4833.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TimeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language L5shRfh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language L5shRfh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TaVOM7x.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 949wScO.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlog32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fe36XBk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5689_4833.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language extrac32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7fOMOTQ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7fOMOTQ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Macromedia.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9358_8410.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language L5shRfh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ViGgA8C.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 949wScO.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 949wScO.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wind.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TimeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlog32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlog32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TimeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TaVOM7x.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Macromedia.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7fOMOTQ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TimeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 949wScO.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 949wScO.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjkm5hE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language L5shRfh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wind.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjkm5hE.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3736 MicrosoftEdgeUpdate.exe 1180 MicrosoftEdgeUpdate.exe -
Checks SCSI registry key(s) 3 TTPs 61 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Capabilities explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 explorer.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Bjkm5hE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Bjkm5hE.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Bjkm5hE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Bjkm5hE.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1932 timeout.exe -
Enumerates system info in registry 2 TTPs 11 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SearchHost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SearchHost.exe -
GoLang User-Agent 64 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 721 Go-http-client/1.1 HTTP User-Agent header 1630 Go-http-client/1.1 HTTP User-Agent header 1853 Go-http-client/1.1 HTTP User-Agent header 2695 Go-http-client/1.1 HTTP User-Agent header 3069 Go-http-client/1.1 HTTP User-Agent header 1144 Go-http-client/1.1 HTTP User-Agent header 726 Go-http-client/1.1 HTTP User-Agent header 2065 Go-http-client/1.1 HTTP User-Agent header 690 Go-http-client/1.1 HTTP User-Agent header 2940 Go-http-client/1.1 HTTP User-Agent header 1711 Go-http-client/1.1 HTTP User-Agent header 2752 Go-http-client/1.1 HTTP User-Agent header 1003 Go-http-client/1.1 HTTP User-Agent header 1715 Go-http-client/1.1 HTTP User-Agent header 2981 Go-http-client/1.1 HTTP User-Agent header 1476 Go-http-client/1.1 HTTP User-Agent header 1126 Go-http-client/1.1 HTTP User-Agent header 2558 Go-http-client/1.1 HTTP User-Agent header 2696 Go-http-client/1.1 HTTP User-Agent header 1998 Go-http-client/1.1 HTTP User-Agent header 2546 Go-http-client/1.1 HTTP User-Agent header 2776 Go-http-client/1.1 HTTP User-Agent header 1139 Go-http-client/1.1 HTTP User-Agent header 1637 Go-http-client/1.1 HTTP User-Agent header 1942 Go-http-client/1.1 HTTP User-Agent header 1460 Go-http-client/1.1 HTTP User-Agent header 1857 Go-http-client/1.1 HTTP User-Agent header 2629 Go-http-client/1.1 HTTP User-Agent header 2764 Go-http-client/1.1 HTTP User-Agent header 2937 Go-http-client/1.1 HTTP User-Agent header 1635 Go-http-client/1.1 HTTP User-Agent header 1858 Go-http-client/1.1 HTTP User-Agent header 1143 Go-http-client/1.1 HTTP User-Agent header 1996 Go-http-client/1.1 HTTP User-Agent header 2012 Go-http-client/1.1 HTTP User-Agent header 2016 Go-http-client/1.1 HTTP User-Agent header 2936 Go-http-client/1.1 HTTP User-Agent header 1861 Go-http-client/1.1 HTTP User-Agent header 2831 Go-http-client/1.1 HTTP User-Agent header 2980 Go-http-client/1.1 HTTP User-Agent header 3068 Go-http-client/1.1 HTTP User-Agent header 1946 Go-http-client/1.1 HTTP User-Agent header 2302 Go-http-client/1.1 HTTP User-Agent header 1462 Go-http-client/1.1 HTTP User-Agent header 1571 Go-http-client/1.1 HTTP User-Agent header 2301 Go-http-client/1.1 HTTP User-Agent header 982 Go-http-client/1.1 HTTP User-Agent header 1710 Go-http-client/1.1 HTTP User-Agent header 1850 Go-http-client/1.1 HTTP User-Agent header 2238 Go-http-client/1.1 HTTP User-Agent header 2251 Go-http-client/1.1 HTTP User-Agent header 724 Go-http-client/1.1 HTTP User-Agent header 1697 Go-http-client/1.1 HTTP User-Agent header 1854 Go-http-client/1.1 HTTP User-Agent header 2617 Go-http-client/1.1 HTTP User-Agent header 1112 Go-http-client/1.1 HTTP User-Agent header 1001 Go-http-client/1.1 HTTP User-Agent header 1855 Go-http-client/1.1 HTTP User-Agent header 2459 Go-http-client/1.1 HTTP User-Agent header 2479 Go-http-client/1.1 HTTP User-Agent header 1282 Go-http-client/1.1 HTTP User-Agent header 1851 Go-http-client/1.1 HTTP User-Agent header 2255 Go-http-client/1.1 HTTP User-Agent header 2299 Go-http-client/1.1 -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppName = "ie_to_edge_stub.exe" setup.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\microsoft-edge setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\EdgeIntegration setup.exe Key created \REGISTRY\USER\S-1-5-21-2417498994-1216132997-487892065-1000\Software\Microsoft\Internet Explorer\GPU SearchHost.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Main setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppName = "ie_to_edge_stub.exe" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\ProtocolExecute setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\EdgeIntegration\AdapterLocations setup.exe Key created \REGISTRY\USER\S-1-5-21-2417498994-1216132997-487892065-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppPath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.59\\BHO" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Main\EnterpriseMode setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\Policy = "3" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\Policy = "3" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\ProtocolExecute\microsoft-edge setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\ = "IEToEdge Handler" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppPath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.59\\BHO" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2417498994-1216132997-487892065-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\EdgeIntegration\AdapterLocations\C:\Program Files (x86)\Microsoft\Edge\Application = "1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\ = "IEToEdge Handler" setup.exe Key created \REGISTRY\USER\S-1-5-21-2417498994-1216132997-487892065-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2417498994-1216132997-487892065-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\EnterpriseMode\MSEdgePath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application" setup.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133838969537329853" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Edge setup.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Edge\InstallerPinned = "0" setup.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2417498994-1216132997-487892065-1000_Classes\Local Settings\MuiCache SearchHost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2417498994-1216132997-487892065-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify\UserStartTime = "133837536055247293" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C9C2B807-7731-4F34-81B7-44FF7779522B}\1.0\ = "TypeLib for Interface {C9C2B807-7731-4F34-81B7-44FF7779522B}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3A84F9C2-6164-485C-A7D9-4B27F8AC009E}\AppID = "{6d2b5079-2f0b-48dd-ab7f-97cec514d30b}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeMHT\Application\AppUserModelId = "MSEdge" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B4BFCC3A-DB2C-424C-B029-7FE99A87C641}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-2417498994-1216132997-487892065-1000_Classes\Local Settings\MuiCache StartMenuExperienceHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3A84F9C2-6164-485C-A7D9-4B27F8AC009E}\ = "PDF Preview Handler" setup.exe Key created \REGISTRY\USER\S-1-5-21-2417498994-1216132997-487892065-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\Implemented Categories\{59FB2056-D625-48D0-A944-1A85B5AB2640}\ setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ProgID\ = "ie_to_edge_bho.IEToEdgeBHO.1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ie_to_edge_bho.IEToEdgeBHO\CLSID\ = "{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3A84F9C2-6164-485C-A7D9-4B27F8AC009E}\AppID = "{6d2b5079-2f0b-48dd-ab7f-97cec514d30b}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3A84F9C2-6164-485C-A7D9-4B27F8AC009E}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.59\\PdfPreview\\PdfPreviewHandler.dll" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\MSEdgeHTM\shell\open setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeHTM\Application\ApplicationDescription = "Browse the web" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeHTM\AppUserModelId = "MSEdge" setup.exe Key created \REGISTRY\USER\S-1-5-21-2417498994-1216132997-487892065-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.MicrosoftStickyNotes_8wekyb3d8bbwe\PersistedTitleBarData explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2417498994-1216132997-487892065-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "264" SearchHost.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib\{C9C2B807-7731-4F34-81B7-44FF7779522B}\1.0\0\win64 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ProgID\ = "ie_to_edge_bho.IEToEdgeBHO.1" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3A84F9C2-6164-485C-A7D9-4B27F8AC009E}\EnablePreviewHandler = "1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeHTM\DefaultIcon\ = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.59\\msedge.exe,0" setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2417498994-1216132997-487892065-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\WFlags = "0" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C9C2B807-7731-4F34-81B7-44FF7779522B}\ = "Interface {C9C2B807-7731-4F34-81B7-44FF7779522B}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ie_to_edge_bho.IEToEdgeBHO\ = "IEToEdgeBHO Class" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeHTM\Application\ApplicationCompany = "Microsoft Corporation" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithProgIds\MSEdgeMHT setup.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{C9C2B807-7731-4F34-81B7-44FF7779522B}\TypeLib setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\VersionIndependentProgID\ setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\VersionIndependentProgID\ = "ie_to_edge_bho.IEToEdgeBHO" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3A84F9C2-6164-485C-A7D9-4B27F8AC009E}\InProcServer32\ThreadingModel = "Apartment" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\MSEdgeHTM setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2417498994-1216132997-487892065-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "15138" SearchHost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2417498994-1216132997-487892065-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\WinPos1280x720x96(1).left = "250" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\microsoft-edge\ = "URL:microsoft-edge" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgePDF\shell\runas\command\ = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --do-not-de-elevate --single-argument %1" setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2417498994-1216132997-487892065-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "14012" SearchHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\ie_to_edge_bho.dll\AppID = "{31575964-95F7-414B-85E4-0E9A93699E13}" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\Implemented Categories setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ie_to_edge_bho.IEToEdgeBHO\ setup.exe Key created \REGISTRY\MACHINE\Software\Classes\.xml setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C9C2B807-7731-4F34-81B7-44FF7779522B}\1.0\0\win64\ = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.59\\elevation_service.exe" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeHTM\Application\ApplicationName = "Microsoft Edge" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeMHT\DefaultIcon\ = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.59\\msedge.exe,0" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeMHT\shell\open\command\ = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --single-argument %1" setup.exe Key created \REGISTRY\USER\S-1-5-21-2417498994-1216132997-487892065-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.WindowsTerminal_8wekyb3d8bbwe\StartTerminalOnLoginTask taskmgr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\Programmable\ setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.webp\OpenWithProgids\MSEdgeHTM setup.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{C9C2B807-7731-4F34-81B7-44FF7779522B}\ProxyStubClsid32 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeHTM\shell\open\command\ = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --single-argument %1" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\MSEdgePDF\shell\open setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgePDF\Application\ApplicationName = "Microsoft Edge" setup.exe Key created \REGISTRY\USER\S-1-5-21-2417498994-1216132997-487892065-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com SearchHost.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib\{C9C2B807-7731-4F34-81B7-44FF7779522B}\1.0 setup.exe Key created \REGISTRY\MACHINE\Software\Classes\.html setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.svg\OpenWithProgIds\MSEdgeHTM setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeHTM\shell\runas\ProgrammaticAccessOnly setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgePDF\ = "Microsoft Edge PDF Document" setup.exe Set value (data) \REGISTRY\USER\S-1-5-21-2417498994-1216132997-487892065-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify\IconStreams = 14000000070000000100010006000000140000007b0031004e005000310034005200370037002d0030003200520037002d0034005200350051002d004f003700340034002d00320052004f0031004e00520035003100390038004f0037007d005c0047006e00660078007a00740065002e0072006b007200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e907020050004300480020003900370025000d000a005a0072007a00620065006c0020003700320025000d000a0051007600660078002000340025000d000a004100720067006a0062006500780020003000250000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000033a06e3fd67ddb0100000000000000000000000047006e006600780020005a006e0061006e00740072006500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000050003a005c00480066007200650066005c004e0071007a00760061005c004e006300630051006e0067006e005c005900620070006e0079005c005a00760070006500620066006200730067005c00420061007200510065007600690072005c00420061007200510065007600690072002e0072006b00720000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f50100000000000000000000e9070200420061007200510065007600690072000a004800630071006e006700760061007400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003e43bf00887cdb01000000000000000000000000420061007200510065007600690072000a0041006200670020006600760074006100720071002000760061000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000007b005300330038004f0053003400300034002d0031005100340033002d0034003200530032002d0039003300300035002d00360037005100520030004f003200380053005000320033007d005c0072006b006300790062006500720065002e0072006b00720000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000e9070200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff75ae2078e323294282c1e41cb67d5b9c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000007b005300330038004f0053003400300034002d0031005100340033002d0034003200530032002d0039003300300035002d00360037005100520030004f003200380053005000320033007d005c0072006b006300790062006500720065002e0072006b00720000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000e9070200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff81ae2078e323294282c1e41cb67d5b9c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000007b005300330038004f0053003400300034002d0031005100340033002d0034003200530032002d0039003300300035002d00360037005100520030004f003200380053005000320033007d005c0072006b006300790062006500720065002e0072006b00720000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000e9070200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff82ae2078e323294282c1e41cb67d5b9c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000007b005300330038004f0053003400300034002d0031005100340033002d0034003200530032002d0039003300300035002d00360037005100520030004f003200380053005000320033007d005c0072006b006300790062006500720065002e0072006b00720000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000e9070200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff83ae2078e323294282c1e41cb67d5b9c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2417498994-1216132997-487892065-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\WorkFolders explorer.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{C9C2B807-7731-4F34-81B7-44FF7779522B} setup.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 5976 NOTEPAD.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1144 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2120 explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 648 Device2.exe 648 Device2.exe 648 Device2.exe 4380 taskmgr.exe 648 Device2.exe 648 Device2.exe 648 Device2.exe 648 Device2.exe 648 Device2.exe 648 Device2.exe 648 Device2.exe 648 Device2.exe 648 Device2.exe 648 Device2.exe 648 Device2.exe 648 Device2.exe 648 Device2.exe 648 Device2.exe 648 Device2.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 4 IoCs
pid Process 4380 taskmgr.exe 648 Device2.exe 2120 explorer.exe 1432 winlog32.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 132 msedge.exe 132 msedge.exe 132 msedge.exe 132 msedge.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 112 New Text Document mod.exe Token: SeDebugPrivilege 4380 taskmgr.exe Token: SeSystemProfilePrivilege 4380 taskmgr.exe Token: SeCreateGlobalPrivilege 4380 taskmgr.exe Token: SeDebugPrivilege 648 Device2.exe Token: 33 648 Device2.exe Token: SeIncBasePriorityPrivilege 648 Device2.exe Token: 33 648 Device2.exe Token: SeIncBasePriorityPrivilege 648 Device2.exe Token: 33 648 Device2.exe Token: SeIncBasePriorityPrivilege 648 Device2.exe Token: 33 648 Device2.exe Token: SeIncBasePriorityPrivilege 648 Device2.exe Token: 33 648 Device2.exe Token: SeIncBasePriorityPrivilege 648 Device2.exe Token: 33 648 Device2.exe Token: SeIncBasePriorityPrivilege 648 Device2.exe Token: 33 648 Device2.exe Token: SeIncBasePriorityPrivilege 648 Device2.exe Token: 33 648 Device2.exe Token: SeIncBasePriorityPrivilege 648 Device2.exe Token: 33 648 Device2.exe Token: SeIncBasePriorityPrivilege 648 Device2.exe Token: 33 648 Device2.exe Token: SeIncBasePriorityPrivilege 648 Device2.exe Token: 33 648 Device2.exe Token: SeIncBasePriorityPrivilege 648 Device2.exe Token: 33 648 Device2.exe Token: SeIncBasePriorityPrivilege 648 Device2.exe Token: 33 648 Device2.exe Token: SeIncBasePriorityPrivilege 648 Device2.exe Token: 33 648 Device2.exe Token: SeIncBasePriorityPrivilege 648 Device2.exe Token: 33 648 Device2.exe Token: SeIncBasePriorityPrivilege 648 Device2.exe Token: 33 648 Device2.exe Token: SeIncBasePriorityPrivilege 648 Device2.exe Token: 33 648 Device2.exe Token: SeIncBasePriorityPrivilege 648 Device2.exe Token: 33 648 Device2.exe Token: SeIncBasePriorityPrivilege 648 Device2.exe Token: SeBackupPrivilege 2448 svchost.exe Token: SeRestorePrivilege 2448 svchost.exe Token: SeSecurityPrivilege 2448 svchost.exe Token: SeTakeOwnershipPrivilege 2448 svchost.exe Token: 35 2448 svchost.exe Token: 33 648 Device2.exe Token: SeIncBasePriorityPrivilege 648 Device2.exe Token: 33 648 Device2.exe Token: SeIncBasePriorityPrivilege 648 Device2.exe Token: 33 648 Device2.exe Token: SeIncBasePriorityPrivilege 648 Device2.exe Token: 33 648 Device2.exe Token: SeIncBasePriorityPrivilege 648 Device2.exe Token: 33 648 Device2.exe Token: SeIncBasePriorityPrivilege 648 Device2.exe Token: 33 648 Device2.exe Token: SeIncBasePriorityPrivilege 648 Device2.exe Token: 33 648 Device2.exe Token: SeIncBasePriorityPrivilege 648 Device2.exe Token: 33 648 Device2.exe Token: SeIncBasePriorityPrivilege 648 Device2.exe Token: 33 648 Device2.exe Token: SeIncBasePriorityPrivilege 648 Device2.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe 4380 taskmgr.exe -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 2120 explorer.exe 5268 SearchHost.exe 5588 StartMenuExperienceHost.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 5288 MiniSearchHost.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 112 wrote to memory of 648 112 New Text Document mod.exe 98 PID 112 wrote to memory of 648 112 New Text Document mod.exe 98 PID 648 wrote to memory of 1068 648 Device2.exe 101 PID 648 wrote to memory of 1068 648 Device2.exe 101 PID 112 wrote to memory of 4796 112 New Text Document mod.exe 109 PID 112 wrote to memory of 4796 112 New Text Document mod.exe 109 PID 112 wrote to memory of 4796 112 New Text Document mod.exe 109 PID 112 wrote to memory of 4544 112 New Text Document mod.exe 110 PID 112 wrote to memory of 4544 112 New Text Document mod.exe 110 PID 112 wrote to memory of 4544 112 New Text Document mod.exe 110 PID 4544 wrote to memory of 4980 4544 949wScO.exe 114 PID 4544 wrote to memory of 4980 4544 949wScO.exe 114 PID 4544 wrote to memory of 4980 4544 949wScO.exe 114 PID 4544 wrote to memory of 4980 4544 949wScO.exe 114 PID 4544 wrote to memory of 4980 4544 949wScO.exe 114 PID 4544 wrote to memory of 4980 4544 949wScO.exe 114 PID 4544 wrote to memory of 4980 4544 949wScO.exe 114 PID 4544 wrote to memory of 4980 4544 949wScO.exe 114 PID 4544 wrote to memory of 4980 4544 949wScO.exe 114 PID 4544 wrote to memory of 1952 4544 949wScO.exe 115 PID 4544 wrote to memory of 1952 4544 949wScO.exe 115 PID 4544 wrote to memory of 1952 4544 949wScO.exe 115 PID 4544 wrote to memory of 1952 4544 949wScO.exe 115 PID 4544 wrote to memory of 1952 4544 949wScO.exe 115 PID 4544 wrote to memory of 1952 4544 949wScO.exe 115 PID 4544 wrote to memory of 1952 4544 949wScO.exe 115 PID 4544 wrote to memory of 1952 4544 949wScO.exe 115 PID 4544 wrote to memory of 1952 4544 949wScO.exe 115 PID 4796 wrote to memory of 2140 4796 TaVOM7x.exe 121 PID 4796 wrote to memory of 2140 4796 TaVOM7x.exe 121 PID 4796 wrote to memory of 2140 4796 TaVOM7x.exe 121 PID 4796 wrote to memory of 2140 4796 TaVOM7x.exe 121 PID 4796 wrote to memory of 2140 4796 TaVOM7x.exe 121 PID 4796 wrote to memory of 2140 4796 TaVOM7x.exe 121 PID 4796 wrote to memory of 2140 4796 TaVOM7x.exe 121 PID 4796 wrote to memory of 2140 4796 TaVOM7x.exe 121 PID 4796 wrote to memory of 2140 4796 TaVOM7x.exe 121 PID 1512 wrote to memory of 1500 1512 TaVOM7x.exe 129 PID 1512 wrote to memory of 1500 1512 TaVOM7x.exe 129 PID 1512 wrote to memory of 1500 1512 TaVOM7x.exe 129 PID 1512 wrote to memory of 1500 1512 TaVOM7x.exe 129 PID 1512 wrote to memory of 1500 1512 TaVOM7x.exe 129 PID 1512 wrote to memory of 1500 1512 TaVOM7x.exe 129 PID 1512 wrote to memory of 1500 1512 TaVOM7x.exe 129 PID 1512 wrote to memory of 1500 1512 TaVOM7x.exe 129 PID 1512 wrote to memory of 1500 1512 TaVOM7x.exe 129 PID 112 wrote to memory of 652 112 New Text Document mod.exe 131 PID 112 wrote to memory of 652 112 New Text Document mod.exe 131 PID 112 wrote to memory of 652 112 New Text Document mod.exe 131 PID 112 wrote to memory of 1804 112 New Text Document mod.exe 133 PID 112 wrote to memory of 1804 112 New Text Document mod.exe 133 PID 112 wrote to memory of 1804 112 New Text Document mod.exe 133 PID 1804 wrote to memory of 2748 1804 random.exe 134 PID 1804 wrote to memory of 2748 1804 random.exe 134 PID 1804 wrote to memory of 2748 1804 random.exe 134 PID 2748 wrote to memory of 3584 2748 cmd.exe 136 PID 2748 wrote to memory of 3584 2748 cmd.exe 136 PID 2748 wrote to memory of 3584 2748 cmd.exe 136 PID 2748 wrote to memory of 1528 2748 cmd.exe 137 PID 2748 wrote to memory of 1528 2748 cmd.exe 137 PID 2748 wrote to memory of 1528 2748 cmd.exe 137 PID 2748 wrote to memory of 1824 2748 cmd.exe 139 PID 2748 wrote to memory of 1824 2748 cmd.exe 139 PID 2748 wrote to memory of 1824 2748 cmd.exe 139 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} = "1" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\ setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID setup.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\Downloaders.zip1⤵PID:2088
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:412
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7RDFEQkRFQTEtRTI3Qy00MjE5LUI1MUUtNTY4OTg5MEJBRTMzfSIgdXNlcmlkPSJ7RDVGQTA5NjItODRCRC00QUE0LTk4MjAtMjQ2M0ZDQ0E3MDRDfSIgaW5zdGFsbHNvdXJjZT0ibGltaXRlZCIgcmVxdWVzdGlkPSJ7Rjk5MTQ4MkYtQTNEMi00M0M5LTgxRjAtQjMyRjg2RjlFQTgyfSIgZGVkdXA9ImNyIiBkb21haW5qb2luZWQ9IjAiPjxodyBsb2dpY2FsX2NwdXM9IjIiIHBoeXNtZW1vcnk9IjQiIGRpc2tfdHlwZT0iMiIgc3NlPSIxIiBzc2UyPSIxIiBzc2UzPSIxIiBzc3NlMz0iMSIgc3NlNDE9IjEiIHNzZTQyPSIxIiBhdng9IjEiLz48b3MgcGxhdGZvcm09IndpbiIgdmVyc2lvbj0iMTAuMC4yMjAwMC40OTMiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIiBpc19pbl9sb2NrZG93bl9tb2RlPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7RSt4YkF6Nlk2c1UxMjg5YlM2cWw0VlJMYmtqZkJVR1RNSnNqckhyNDRpST0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7OEE2OUQzNDUtRDU2NC00NjNjLUFGRjEtQTY5RDlFNTMwRjk2fSIgdmVyc2lvbj0iMTIzLjAuNjMxMi4xMjMiIG5leHR2ZXJzaW9uPSIiIGxhbmc9ImVuIiBicmFuZD0iR0dMUyIgY2xpZW50PSIiIGluc3RhbGxhZ2U9IjEiIGluc3RhbGxkYXRldGltZT0iMTczOTI4MjMwMiIgb29iZV9pbnN0YWxsX3RpbWU9IjEzMzgzNzUzNTk3Mjc0MDAwMCI-PGV2ZW50IGV2ZW50dHlwZT0iMzEiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjIxNzk4NjIiIHN5c3RlbV91cHRpbWVfdGlja3M9IjUyOTg1NjYxNTIiLz48L2FwcD48L3JlcXVlc3Q-1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:1180
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"1⤵
- Downloads MZ/PE file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Users\Admin\Desktop\a\Device2.exe"C:\Users\Admin\Desktop\a\Device2.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Windows\SYSTEM32\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\Desktop\a\Device2.exe" "Device2.exe" ENABLE3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:1068
-
-
-
C:\Users\Admin\Desktop\a\TaVOM7x.exe"C:\Users\Admin\Desktop\a\TaVOM7x.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"3⤵PID:2140
-
-
-
C:\Users\Admin\Desktop\a\949wScO.exe"C:\Users\Admin\Desktop\a\949wScO.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4544 -s 10763⤵
- Program crash
PID:2088
-
-
C:\Users\Admin\Desktop\a\949wScO.exe"C:\Users\Admin\Desktop\a\949wScO.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4980
-
-
C:\Users\Admin\Desktop\a\949wScO.exe"C:\Users\Admin\Desktop\a\949wScO.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1952
-
-
-
C:\Users\Admin\Desktop\a\win.exe"C:\Users\Admin\Desktop\a\win.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:652
-
-
C:\Users\Admin\Desktop\a\random.exe"C:\Users\Admin\Desktop\a\random.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Turner Turner.cmd & Turner.cmd3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
PID:3584
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"4⤵
- System Location Discovery: System Language Discovery
PID:1528
-
-
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
PID:1824
-
-
C:\Windows\SysWOW64\findstr.exefindstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"4⤵
- System Location Discovery: System Language Discovery
PID:4412
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 7646614⤵
- System Location Discovery: System Language Discovery
PID:1472
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Fm4⤵
- System Location Discovery: System Language Discovery
PID:3880
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "Tunnel" Addresses4⤵PID:2360
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 764661\Macromedia.com + Totally + York + Drunk + Baghdad + Benz + Glasses + Pac + Tender + Racing + Deluxe + Derived 764661\Macromedia.com4⤵PID:3320
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Complement + ..\Soundtrack + ..\Plumbing + ..\Hills F4⤵
- System Location Discovery: System Language Discovery
PID:3772
-
-
C:\Users\Admin\AppData\Local\Temp\764661\Macromedia.comMacromedia.com F4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2972 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "AchillesGuard" /tr "wscript //B 'C:\Users\Admin\AppData\Local\GuardTech Solutions\AchillesGuard.js'" /sc onlogon /F /RL HIGHEST5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1144
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe5⤵PID:4800
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 154⤵PID:3180
-
-
-
-
C:\Users\Admin\Desktop\a\Bjkm5hE.exe"C:\Users\Admin\Desktop\a\Bjkm5hE.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:1280 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"3⤵
- Uses browser remote debugging
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:4120 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffdf8c9cc40,0x7ffdf8c9cc4c,0x7ffdf8c9cc584⤵PID:1480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1776,i,8502433522086110036,17035212150877023130,262144 --variations-seed-version=20250210-180233.097000 --mojo-platform-channel-handle=1764 /prefetch:24⤵PID:2152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2000,i,8502433522086110036,17035212150877023130,262144 --variations-seed-version=20250210-180233.097000 --mojo-platform-channel-handle=2060 /prefetch:34⤵PID:4604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2224,i,8502433522086110036,17035212150877023130,262144 --variations-seed-version=20250210-180233.097000 --mojo-platform-channel-handle=2380 /prefetch:84⤵PID:2180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3148,i,8502433522086110036,17035212150877023130,262144 --variations-seed-version=20250210-180233.097000 --mojo-platform-channel-handle=3152 /prefetch:14⤵
- Uses browser remote debugging
PID:3476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3192,i,8502433522086110036,17035212150877023130,262144 --variations-seed-version=20250210-180233.097000 --mojo-platform-channel-handle=3184 /prefetch:14⤵
- Uses browser remote debugging
PID:3292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4520,i,8502433522086110036,17035212150877023130,262144 --variations-seed-version=20250210-180233.097000 --mojo-platform-channel-handle=3692 /prefetch:14⤵
- Uses browser remote debugging
PID:3576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4764,i,8502433522086110036,17035212150877023130,262144 --variations-seed-version=20250210-180233.097000 --mojo-platform-channel-handle=4512 /prefetch:84⤵PID:4108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4760,i,8502433522086110036,17035212150877023130,262144 --variations-seed-version=20250210-180233.097000 --mojo-platform-channel-handle=4784 /prefetch:84⤵PID:4488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4728,i,8502433522086110036,17035212150877023130,262144 --variations-seed-version=20250210-180233.097000 --mojo-platform-channel-handle=4740 /prefetch:84⤵PID:1140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4960,i,8502433522086110036,17035212150877023130,262144 --variations-seed-version=20250210-180233.097000 --mojo-platform-channel-handle=4524 /prefetch:84⤵PID:4184
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"3⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:132 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffdf8ca3cb8,0x7ffdf8ca3cc8,0x7ffdf8ca3cd84⤵PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1848,1367055959797202311,6395699730596904202,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1864 /prefetch:24⤵PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1848,1367055959797202311,6395699730596904202,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:34⤵PID:3880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1848,1367055959797202311,6395699730596904202,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:84⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1848,1367055959797202311,6395699730596904202,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:14⤵
- Uses browser remote debugging
PID:2460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1848,1367055959797202311,6395699730596904202,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:14⤵
- Uses browser remote debugging
PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1848,1367055959797202311,6395699730596904202,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4052 /prefetch:24⤵PID:3360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1848,1367055959797202311,6395699730596904202,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2300 /prefetch:24⤵PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1848,1367055959797202311,6395699730596904202,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2244 /prefetch:24⤵PID:692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1848,1367055959797202311,6395699730596904202,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=4068 /prefetch:24⤵PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1848,1367055959797202311,6395699730596904202,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2128 /prefetch:24⤵PID:5084
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5084 -s 2005⤵PID:3360
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1848,1367055959797202311,6395699730596904202,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4320 /prefetch:14⤵
- Uses browser remote debugging
PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1848,1367055959797202311,6395699730596904202,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2868 /prefetch:14⤵
- Uses browser remote debugging
PID:3640
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\3ec2v" & exit3⤵
- System Location Discovery: System Language Discovery
PID:3260 -
C:\Windows\SysWOW64\timeout.exetimeout /t 104⤵
- Delays execution with timeout.exe
PID:1932
-
-
-
-
C:\Users\Admin\Desktop\a\cHSzTDjVl.exe"C:\Users\Admin\Desktop\a\cHSzTDjVl.exe"2⤵
- Executes dropped EXE
PID:392
-
-
C:\Users\Admin\Desktop\a\wind.exe"C:\Users\Admin\Desktop\a\wind.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2324
-
-
C:\Users\Admin\Desktop\a\winlog32.exe"C:\Users\Admin\Desktop\a\winlog32.exe"2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:1432
-
-
C:\Users\Admin\Desktop\a\7fOMOTQ.exe"C:\Users\Admin\Desktop\a\7fOMOTQ.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4832
-
-
C:\Users\Admin\Desktop\a\random.exe"C:\Users\Admin\Desktop\a\random.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4008 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"3⤵PID:3504
-
-
-
C:\Users\Admin\Desktop\a\TimeUpdate.exe"C:\Users\Admin\Desktop\a\TimeUpdate.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3768 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3768 -s 7843⤵
- Program crash
PID:2136
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3768 -s 8083⤵
- Program crash
PID:1140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3768 -s 8243⤵
- Program crash
PID:1796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3768 -s 8523⤵
- Program crash
PID:3180
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3768 -s 8843⤵
- Program crash
PID:6184
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3768 -s 9083⤵
- Program crash
PID:3740
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3768 -s 9203⤵
- Program crash
PID:4192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3768 -s 9283⤵
- Program crash
PID:1448
-
-
-
C:\Users\Admin\Desktop\a\L5shRfh.exe"C:\Users\Admin\Desktop\a\L5shRfh.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2084 -
C:\Users\Admin\Desktop\a\L5shRfh.exe"C:\Users\Admin\Desktop\a\L5shRfh.exe"3⤵
- Executes dropped EXE
PID:396
-
-
C:\Users\Admin\Desktop\a\L5shRfh.exe"C:\Users\Admin\Desktop\a\L5shRfh.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2696
-
-
C:\Users\Admin\Desktop\a\L5shRfh.exe"C:\Users\Admin\Desktop\a\L5shRfh.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1480 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1480 -s 13444⤵
- Program crash
PID:2004
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2084 -s 8523⤵
- Program crash
PID:1940
-
-
-
C:\Users\Admin\Desktop\a\ViGgA8C.exe"C:\Users\Admin\Desktop\a\ViGgA8C.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2568
-
-
C:\Users\Admin\Desktop\a\Fe36XBk.exe"C:\Users\Admin\Desktop\a\Fe36XBk.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1344
-
-
C:\Users\Admin\Desktop\a\aaa%20(3).exe"C:\Users\Admin\Desktop\a\aaa%20(3).exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5748
-
-
C:\Users\Admin\Desktop\a\5689_4833.exe"C:\Users\Admin\Desktop\a\5689_4833.exe"2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:6860 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"3⤵
- System Location Discovery: System Language Discovery
PID:5180
-
-
-
C:\Users\Admin\Desktop\a\9358_8410.exe"C:\Users\Admin\Desktop\a\9358_8410.exe"2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2980 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"3⤵
- System Location Discovery: System Language Discovery
PID:6420
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4380
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {c82192ee-6cb5-4bc0-9ef0-fb818773790a} -Embedding1⤵PID:4904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 4544 -ip 45441⤵PID:2124
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SDRSVC1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2448
-
C:\Users\Admin\Desktop\a\949wScO.exe"C:\Users\Admin\Desktop\a\949wScO.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3592 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3592 -s 10482⤵
- Program crash
PID:1400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3592 -ip 35921⤵PID:1344
-
C:\Users\Admin\Desktop\a\TaVOM7x.exe"C:\Users\Admin\Desktop\a\TaVOM7x.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1500
-
-
C:\Users\Admin\Desktop\a\949wScO.exe"C:\Users\Admin\Desktop\a\949wScO.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3388 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3388 -s 10002⤵
- Program crash
PID:5040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3388 -ip 33881⤵PID:3988
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:132
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4976
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:2288
-
C:\Users\Admin\Desktop\a\wind.exe"C:\Users\Admin\Desktop\a\wind.exe"1⤵
- Executes dropped EXE
PID:1968
-
C:\Users\Admin\Desktop\a\cHSzTDjVl.exe"C:\Users\Admin\Desktop\a\cHSzTDjVl.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:996
-
C:\Users\Admin\Desktop\a\7fOMOTQ.exe"C:\Users\Admin\Desktop\a\7fOMOTQ.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2652
-
C:\Users\Admin\Desktop\a\7fOMOTQ.exe"C:\Users\Admin\Desktop\a\7fOMOTQ.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5084
-
C:\Users\Admin\Desktop\a\win.exe"C:\Users\Admin\Desktop\a\win.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3880
-
C:\Users\Admin\Desktop\a\random.exe"C:\Users\Admin\Desktop\a\random.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3492 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2424
-
-
C:\Users\Admin\Desktop\a\random.exe"C:\Users\Admin\Desktop\a\random.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4968 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"2⤵PID:2644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3768 -ip 37681⤵PID:3412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3768 -ip 37681⤵PID:2392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 3768 -ip 37681⤵PID:2792
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3768 -ip 37681⤵PID:4664
-
C:\Users\Admin\Desktop\a\TimeUpdate.exe"C:\Users\Admin\Desktop\a\TimeUpdate.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1088 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1088 -s 7842⤵
- Program crash
PID:3436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1088 -s 8082⤵
- Program crash
PID:2900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1088 -s 8322⤵
- Program crash
PID:3908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1088 -s 8442⤵
- Program crash
PID:3020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1088 -s 9162⤵
- Program crash
PID:2788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1088 -s 9362⤵
- Program crash
PID:6140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1088 -s 9122⤵
- Program crash
PID:6196
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1088 -s 9442⤵
- Program crash
PID:6444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1088 -s 9562⤵
- Program crash
PID:4272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1088 -ip 10881⤵PID:2972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1088 -ip 10881⤵PID:1504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1088 -ip 10881⤵PID:4036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1088 -ip 10881⤵PID:3500
-
C:\Users\Admin\Desktop\a\TimeUpdate.exe"C:\Users\Admin\Desktop\a\TimeUpdate.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3776 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3776 -s 7562⤵
- Program crash
PID:3000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3776 -s 7802⤵
- Program crash
PID:808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3776 -s 8002⤵
- Program crash
PID:4376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3776 -s 8282⤵
- Program crash
PID:3136
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3776 -s 8882⤵
- Program crash
PID:6216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3776 -s 8882⤵
- Program crash
PID:6328
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3776 -s 8842⤵
- Program crash
PID:2484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3776 -s 9002⤵
- Program crash
PID:6832
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3776 -s 9042⤵
- Program crash
PID:3668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 3776 -ip 37761⤵PID:756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 3776 -ip 37761⤵PID:788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3776 -ip 37761⤵PID:5060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3776 -ip 37761⤵PID:2836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 2084 -ip 20841⤵PID:1516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1480 -ip 14801⤵PID:3764
-
C:\Users\Admin\Desktop\a\L5shRfh.exe"C:\Users\Admin\Desktop\a\L5shRfh.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2156 -
C:\Users\Admin\Desktop\a\L5shRfh.exe"C:\Users\Admin\Desktop\a\L5shRfh.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3980
-
-
C:\Users\Admin\Desktop\a\L5shRfh.exe"C:\Users\Admin\Desktop\a\L5shRfh.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1796 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1796 -s 12723⤵
- Program crash
PID:2492
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2156 -s 8722⤵
- Program crash
PID:1908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2156 -ip 21561⤵PID:1140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1796 -ip 17961⤵PID:1504
-
C:\Users\Admin\Desktop\a\random.exe"C:\Users\Admin\Desktop\a\random.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:828 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"2⤵PID:1932
-
-
C:\Users\Admin\Desktop\a\7fOMOTQ.exe"C:\Users\Admin\Desktop\a\7fOMOTQ.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2820
-
C:\Users\Admin\Desktop\a\TaVOM7x.exe"C:\Users\Admin\Desktop\a\TaVOM7x.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1688 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"2⤵PID:5840
-
-
C:\Users\Admin\Desktop\a\949wScO.exe"C:\Users\Admin\Desktop\a\949wScO.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2416 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2416 -s 10162⤵
- Program crash
PID:336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2416 -ip 24161⤵PID:3368
-
C:\Users\Admin\Desktop\a\win.exe"C:\Users\Admin\Desktop\a\win.exe"1⤵
- Executes dropped EXE
PID:544
-
C:\Users\Admin\Desktop\a\Bjkm5hE.exe"C:\Users\Admin\Desktop\a\Bjkm5hE.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:980 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"2⤵
- Uses browser remote debugging
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:1796 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffde573cc40,0x7ffde573cc4c,0x7ffde573cc583⤵PID:3744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1864,i,10152136378571682942,7200558549366698543,262144 --variations-seed-version=20250210-180233.097000 --mojo-platform-channel-handle=1860 /prefetch:23⤵PID:5160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2092,i,10152136378571682942,7200558549366698543,262144 --variations-seed-version=20250210-180233.097000 --mojo-platform-channel-handle=2340 /prefetch:33⤵PID:5216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2124,i,10152136378571682942,7200558549366698543,262144 --variations-seed-version=20250210-180233.097000 --mojo-platform-channel-handle=2348 /prefetch:83⤵PID:5224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3080,i,10152136378571682942,7200558549366698543,262144 --variations-seed-version=20250210-180233.097000 --mojo-platform-channel-handle=3224 /prefetch:13⤵
- Uses browser remote debugging
PID:5428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3088,i,10152136378571682942,7200558549366698543,262144 --variations-seed-version=20250210-180233.097000 --mojo-platform-channel-handle=3248 /prefetch:13⤵
- Uses browser remote debugging
PID:5436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3852,i,10152136378571682942,7200558549366698543,262144 --variations-seed-version=20250210-180233.097000 --mojo-platform-channel-handle=4312 /prefetch:83⤵PID:5632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4624,i,10152136378571682942,7200558549366698543,262144 --variations-seed-version=20250210-180233.097000 --mojo-platform-channel-handle=4652 /prefetch:13⤵
- Uses browser remote debugging
PID:5644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4780,i,10152136378571682942,7200558549366698543,262144 --variations-seed-version=20250210-180233.097000 --mojo-platform-channel-handle=4292 /prefetch:83⤵PID:5852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4288,i,10152136378571682942,7200558549366698543,262144 --variations-seed-version=20250210-180233.097000 --mojo-platform-channel-handle=4916 /prefetch:83⤵PID:5928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4912,i,10152136378571682942,7200558549366698543,262144 --variations-seed-version=20250210-180233.097000 --mojo-platform-channel-handle=5060 /prefetch:83⤵PID:6080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5068,i,10152136378571682942,7200558549366698543,262144 --variations-seed-version=20250210-180233.097000 --mojo-platform-channel-handle=4440 /prefetch:83⤵PID:6700
-
-
-
C:\Users\Admin\Desktop\a\winlog32.exe"C:\Users\Admin\Desktop\a\winlog32.exe"1⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1512
-
C:\Users\Admin\Desktop\a\wind.exe"C:\Users\Admin\Desktop\a\wind.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2224
-
C:\Users\Admin\Desktop\a\cHSzTDjVl.exe"C:\Users\Admin\Desktop\a\cHSzTDjVl.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3128
-
C:\Users\Admin\Desktop\a\7fOMOTQ.exe"C:\Users\Admin\Desktop\a\7fOMOTQ.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3180
-
C:\Users\Admin\Desktop\a\random.exe"C:\Users\Admin\Desktop\a\random.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1400 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2800
-
-
C:\Users\Admin\Desktop\a\TimeUpdate.exe"C:\Users\Admin\Desktop\a\TimeUpdate.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4404 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4404 -s 7642⤵
- Program crash
PID:2928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4404 -s 7842⤵
- Program crash
PID:1320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4404 -s 8042⤵
- Program crash
PID:4128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4404 -s 8362⤵
- Program crash
PID:3068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4404 -s 8922⤵
- Program crash
PID:6308
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4404 -s 8682⤵
- Program crash
PID:3972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4404 -ip 44041⤵PID:960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4404 -ip 44041⤵PID:556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4404 -ip 44041⤵PID:5100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 4404 -ip 44041⤵PID:2756
-
C:\Users\Admin\Desktop\a\L5shRfh.exe"C:\Users\Admin\Desktop\a\L5shRfh.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4700 -
C:\Users\Admin\Desktop\a\L5shRfh.exe"C:\Users\Admin\Desktop\a\L5shRfh.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1124 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1124 -s 12803⤵
- Program crash
PID:6000
-
-
-
C:\Users\Admin\Desktop\a\L5shRfh.exe"C:\Users\Admin\Desktop\a\L5shRfh.exe"2⤵
- Executes dropped EXE
PID:892
-
-
C:\Users\Admin\Desktop\a\L5shRfh.exe"C:\Users\Admin\Desktop\a\L5shRfh.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3344
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4700 -s 8362⤵
- Program crash
PID:3068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4700 -ip 47001⤵PID:4828
-
C:\Users\Admin\Desktop\a\ViGgA8C.exe"C:\Users\Admin\Desktop\a\ViGgA8C.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2900
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1124 -ip 11241⤵PID:5948
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5176
-
C:\Windows\System32\NOTEPAD.EXE"C:\Windows\System32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Turner.cmd1⤵
- Opens file in notepad (likely ransom note)
PID:5976
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Turner.cmd"1⤵PID:3032
-
C:\Windows\system32\tasklist.exetasklist2⤵
- Enumerates processes with tasklist
PID:4296
-
-
C:\Windows\system32\findstr.exefindstr /I "opssvc wrsa"2⤵PID:1156
-
-
C:\Windows\system32\tasklist.exetasklist2⤵
- Enumerates processes with tasklist
PID:4632
-
-
C:\Windows\system32\findstr.exefindstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"2⤵PID:484
-
-
C:\Windows\system32\cmd.execmd /c md 7646612⤵PID:324
-
-
C:\Windows\system32\extrac32.exeextrac32 /Y /E Fm2⤵PID:5772
-
-
C:\Windows\system32\findstr.exefindstr /V "Tunnel" Addresses2⤵PID:5444
-
-
C:\Windows\system32\cmd.execmd /c copy /b 764661\Macromedia.com + Totally + York + Drunk + Baghdad + Benz + Glasses + Pac + Tender + Racing + Deluxe + Derived 764661\Macromedia.com2⤵PID:1520
-
-
C:\Windows\system32\cmd.execmd /c copy /b ..\Complement + ..\Soundtrack + ..\Plumbing + ..\Hills F2⤵PID:5256
-
-
C:\Users\Admin\AppData\Local\Temp\764661\Macromedia.comMacromedia.com F2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5812 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe3⤵PID:6328
-
-
-
C:\Windows\system32\choice.exechoice /d y /t 152⤵PID:5944
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2120 -
C:\Users\Admin\Desktop\a\aaa%20(3).exe"C:\Users\Admin\Desktop\a\aaa%20(3).exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2112
-
-
C:\Users\Admin\Desktop\a\random.exe"C:\Users\Admin\Desktop\a\random.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4412 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"3⤵PID:6844
-
-
-
C:\Users\Admin\Desktop\a\winlog32.exe"C:\Users\Admin\Desktop\a\winlog32.exe"2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:6512
-
-
C:\Users\Admin\Desktop\a\aaa%20(3).exe"C:\Users\Admin\Desktop\a\aaa%20(3).exe"2⤵PID:3508
-
-
C:\Users\Admin\Desktop\a\Fe36XBk.exe"C:\Users\Admin\Desktop\a\Fe36XBk.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3312
-
-
C:\Users\Admin\Desktop\a\5689_4833.exe"C:\Users\Admin\Desktop\a\5689_4833.exe"2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:6988 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"3⤵PID:5932
-
-
-
C:\Users\Admin\Desktop\a\9358_8410.exe"C:\Users\Admin\Desktop\a\9358_8410.exe"2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:868 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"3⤵PID:6516
-
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5588
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca1⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5268
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:6276
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3768 -ip 37681⤵PID:3536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3768 -ip 37681⤵PID:6108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1088 -ip 10881⤵PID:2140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1088 -ip 10881⤵PID:5928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3776 -ip 37761⤵PID:6244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 3776 -ip 37761⤵PID:6404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3776 -ip 37761⤵PID:3952
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{05EEEDBA-EFBD-4832-B6E6-66286CC15F18}\MicrosoftEdge_X64_133.0.3065.59.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{05EEEDBA-EFBD-4832-B6E6-66286CC15F18}\MicrosoftEdge_X64_133.0.3065.59.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable1⤵
- Drops file in Program Files directory
PID:6744 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{05EEEDBA-EFBD-4832-B6E6-66286CC15F18}\EDGEMITMP_EDB16.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{05EEEDBA-EFBD-4832-B6E6-66286CC15F18}\EDGEMITMP_EDB16.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{05EEEDBA-EFBD-4832-B6E6-66286CC15F18}\MicrosoftEdge_X64_133.0.3065.59.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- System policy modification
PID:6732 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{05EEEDBA-EFBD-4832-B6E6-66286CC15F18}\EDGEMITMP_EDB16.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{05EEEDBA-EFBD-4832-B6E6-66286CC15F18}\EDGEMITMP_EDB16.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{05EEEDBA-EFBD-4832-B6E6-66286CC15F18}\EDGEMITMP_EDB16.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x23c,0x240,0x244,0x218,0x248,0x7ff7e6626a68,0x7ff7e6626a74,0x7ff7e6626a803⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:6796
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{05EEEDBA-EFBD-4832-B6E6-66286CC15F18}\EDGEMITMP_EDB16.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{05EEEDBA-EFBD-4832-B6E6-66286CC15F18}\EDGEMITMP_EDB16.tmp\setup.exe" --msedge --channel=stable --system-level --verbose-logging --create-shortcuts=2 --install-level=13⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:5940 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{05EEEDBA-EFBD-4832-B6E6-66286CC15F18}\EDGEMITMP_EDB16.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{05EEEDBA-EFBD-4832-B6E6-66286CC15F18}\EDGEMITMP_EDB16.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{05EEEDBA-EFBD-4832-B6E6-66286CC15F18}\EDGEMITMP_EDB16.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x23c,0x240,0x244,0x218,0x248,0x7ff7e6626a68,0x7ff7e6626a74,0x7ff7e6626a804⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3396
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --msedge --channel=stable --register-package-identity --verbose-logging --system-level3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
PID:7120 -
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x23c,0x240,0x244,0x218,0x248,0x7ff6bb176a68,0x7ff6bb176a74,0x7ff6bb176a804⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3616
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --msedge --channel=stable --remove-deprecated-packages --verbose-logging --system-level3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3552 -
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x23c,0x240,0x244,0x218,0x248,0x7ff6bb176a68,0x7ff6bb176a74,0x7ff6bb176a804⤵
- Drops file in Windows directory
PID:5728
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --msedge --channel=stable --update-game-assist-package --verbose-logging --system-level3⤵
- Drops file in Windows directory
PID:3372 -
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x23c,0x240,0x244,0x218,0x248,0x7ff6bb176a68,0x7ff6bb176a74,0x7ff6bb176a804⤵
- Drops file in Windows directory
PID:3428
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1088 -ip 10881⤵PID:1664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 3768 -ip 37681⤵PID:6208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 200 -p 3768 -ip 37681⤵PID:6392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1088 -ip 10881⤵PID:6332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1088 -ip 10881⤵PID:6128
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7RDFEQkRFQTEtRTI3Qy00MjE5LUI1MUUtNTY4OTg5MEJBRTMzfSIgdXNlcmlkPSJ7RDVGQTA5NjItODRCRC00QUE0LTk4MjAtMjQ2M0ZDQ0E3MDRDfSIgaW5zdGFsbHNvdXJjZT0ic2NoZWR1bGVyIiByZXF1ZXN0aWQ9InszODFBOENGRC00QzU5LTQ2NUUtOTRBQi0zOTNCOTRFRjUwOEJ9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iMiIgcGh5c21lbW9yeT0iNCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjIyMDAwLjQ5MyIgc3A9IiIgYXJjaD0ieDY0IiBwcm9kdWN0X3R5cGU9IjQ4IiBpc193aXA9IjAiIGlzX2luX2xvY2tkb3duX21vZGU9IjAiLz48b2VtIHByb2R1Y3RfbWFudWZhY3R1cmVyPSIiIHByb2R1Y3RfbmFtZT0iIi8-PGV4cCBldGFnPSImcXVvdDtWUFFvUDFGK2ZxMTV3UnpoMWtQTDRQTXBXaDhPUk1CNWl6dnJPQy9jaGpRPSZxdW90OyIvPjxhcHAgYXBwaWQ9IntGM0M0RkUwMC1FRkQ1LTQwM0ItOTU2OS0zOThBMjBGMUJBNEF9IiB2ZXJzaW9uPSIxLjMuMTk1LjQzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSIiIGJyYW5kPSJJTkJYIiBjbGllbnQ9IiIgaW5zdGFsbGFnZT0iMSIgY29ob3J0PSJycmZAMC40NCI-PHVwZGF0ZWNoZWNrLz48cGluZyByPSIyIiByZD0iNjYxNiIgcGluZ19mcmVzaG5lc3M9Ins1MkQ0NjVGOS0wMUYxLTQ1MTQtODVCMi0zRkU1QjVEMzlERUZ9Ii8-PC9hcHA-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-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-PGV2ZW50IGV2ZW50dHlwZT0iMTQiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjE0NDkyNzIzMzIyIiBzb3VyY2VfdXJsX2luZGV4PSIwIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-PGV2ZW50IGV2ZW50dHlwZT0iMTUiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjE0NTA2MDMzODQ0IiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-PGV2ZW50IGV2ZW50dHlwZT0iMyIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMTk2NzU3IiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSIxNTExNTc5MjQyOCIgc291cmNlX3VybF9pbmRleD0iMCIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIgdXBkYXRlX2NoZWNrX3RpbWVfbXM9IjEzOTAiIGRvd25sb2FkX3RpbWVfbXM9IjkxMzA4NyIgZG93bmxvYWRlZD0iMTc4NjA0MDg4IiB0b3RhbD0iMTc4NjA0MDg4IiBwYWNrYWdlX2NhY2hlX3Jlc3VsdD0iMCIgaW5zdGFsbF90aW1lX21zPSI2MDk3NiIvPjxwaW5nIGFjdGl2ZT0iMSIgYT0iMiIgcj0iMiIgYWQ9IjY2MTYiIHJkPSI2NjE2IiBwaW5nX2ZyZXNobmVzcz0iezNBNDYzQURCLUExNTMtNDZGNS1CNjIxLTU4NDVBRTAzQ0JFMH0iLz48L2FwcD48YXBwIGFwcGlkPSJ7RjMwMTcyMjYtRkUyQS00Mjk1LThCREYtMDBDM0E5QTdFNEM1fSIgdmVyc2lvbj0iMTMyLjAuMjk1Ny4xNDAiIG5leHR2ZXJzaW9uPSIiIGxhbmc9IiIgYnJhbmQ9IklOQlgiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIxIiBjb2hvcnQ9InJyZkAwLjU3IiB1cGRhdGVfY291bnQ9IjEiPjx1cGRhdGVjaGVjay8-PHBpbmcgcj0iMiIgcmQ9IjY2MTYiIHBpbmdfZnJlc2huZXNzPSJ7NTY0REJGNkQtMzg1My00NDg0LUIxNjgtNTQ3REQ0OTg2NDQ2fSIvPjwvYXBwPjwvcmVxdWVzdD41⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:3736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3776 -ip 37761⤵PID:6684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 3776 -ip 37761⤵PID:6888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4404 -ip 44041⤵PID:3752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4404 -ip 44041⤵PID:6480
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:5288
-
C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.2104.12721.0_x64__8wekyb3d8bbwe\LocalBridge.exe"C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.2104.12721.0_x64__8wekyb3d8bbwe\LocalBridge.exe" /InvokerPRAID: Microsoft.MicrosoftOfficeHub notifications1⤵PID:6688
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Browser Extensions
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Component Object Model Hijacking
1Netsh Helper DLL
1Modify Authentication Process
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Component Object Model Hijacking
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Authentication Process
1Modify Registry
5Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
5Credentials In Files
5Discovery
Browser Information Discovery
1Peripheral Device Discovery
2Process Discovery
1Query Registry
9System Information Discovery
6System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.8MB
MD51b3e9c59f9c7a134ec630ada1eb76a39
SHA1a7e831d392e99f3d37847dcc561dd2e017065439
SHA256ce78ccfb0c9cdb06ea61116bc57e50690650b6b5cf37c1aebfb30c19458ee4ae
SHA512c0e50410dc92d80ff7bc854907774fc551564e078a8d38ca6421f15cea50282c25efac4f357b52b066c4371f9b8d4900fa8122dd80ab06ecbd851c6e049f7a3e
-
Filesize
64KB
MD5b5ad5caaaee00cb8cf445427975ae66c
SHA1dcde6527290a326e048f9c3a85280d3fa71e1e22
SHA256b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8
SHA51292f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
1008B
MD5d222b77a61527f2c177b0869e7babc24
SHA13f23acb984307a4aeba41ebbb70439c97ad1f268
SHA25680dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747
SHA512d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff
-
Filesize
40B
MD5e388a8d82c6789aa2080bd8ab0c91f97
SHA17542e98cbfe057b3c98a9006b8634302dc1d141e
SHA256e5d207e745a36a95c6f954742900bc7b79b68bbdd7df2de895d42a44484888e3
SHA51273aee3690e118cda5e80014aba8313a1c421ee5f1bef04157632325d35fad636799c7090c6282b9c1ed8905d22bd3bbdddad95c476a5a54e1c6992731c7a3192
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\00ea65a4-2484-4caf-ac2b-04776b41178e.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
2KB
MD51351c5ba7a1a2e1e93fa48b8cb33f409
SHA1708c6e89b86216cefe82274797121f9018a63631
SHA256432b061027a1d72ded52703ea86850da92107221d4bf523d49a920d6ababcbc1
SHA512e11fa665238b978f03247fd166e3fa5fe157daf6ab1f04873b7d3efdc7a09501763cc7acb5ab760beef82f77aa1a1fbad19792f925e0d4a77e254d4903b0285d
-
Filesize
2KB
MD51f02e7952f3356fd4c89ff3cf4ad59d8
SHA1672f798fab650e058ac3351cd6a2f0566bf35599
SHA256001fe58a14673cdba2f5ca125f0e5050e75813ad27c79f21ce424ca5da29f902
SHA51279181ba5dd53b7ed2979df73f58f44f7ff4e20fb8affa53d22c47c665228d88b3869d4899c2bd148479e7990e073c3356355919d0bd89548024c4b1ba8143bba
-
Filesize
1KB
MD53d13f5bc5b876d4db6c500037219b824
SHA12406fc5be680727b1c45fb4232929ecc99fe74d1
SHA25647246314021f3a0e8095376af8da0dc2ed242e0e24cdcc4f649daf2f70ba9885
SHA51206da9cd16fa02f67e128f4cb93faa8ac699876f9e718e7559b3fcd2d4c8fc21ae83125cf42606d4ab9c1adedcd4fb0483230c454d1dc967cb822f19b003acbe8
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
189B
MD54e10263183031c12c9b4cd572efa1007
SHA192da69ef5c54a1f57f194429c0fcbbb899192177
SHA256258dd8cf8071758f567b6120a72ab2c9ce457edce962998bf47120a1fd47d519
SHA51281e5abf45fbdf7ff5b9bc97c2acbb557c3275f31de6d4c5f7485900c95a430e4137723d67bfc63779bb820ddb0fe86469815f9e90c619235631a9ee0338445b2
-
Filesize
8KB
MD55152adc1daa3e8c42fdad1c95447d5a8
SHA1a2774918ec8039935af56fd793b6dae0101d85dd
SHA256c0455a49132a266ad83b967e737d9c2df50b4789452c689026af8eccea3dc4b7
SHA51245baf14c5167c22f46f2566d75fba50de5f8c02f96c0c1f8a13903fca43c97c4706f429acf133a3bdfaabd9c4a96ad20c05bb30fd2799ef03230e3dd6084c559
-
Filesize
8KB
MD5c2586e11ccde0986bbcf27ec3bfcbb83
SHA17cba9017173c222086d874f2474386b81d4d070e
SHA256dfd7638b04bdbf8c8d251e220e6822eaccaf9acbf40998efff45fd0606db942a
SHA512075388f69bd6bafd48457a82f4d1de20772cc15cb39e27766cffea370a98ae23c57ec602de1424dd87b47ec7ee3c9f520777800816a42d9a230742d39b619d18
-
Filesize
8KB
MD51a0f87a2e66a4c0a8a4c8080b25d441d
SHA1e6dc1fe0798e0a0f6bf7429512eb1f4d505d310a
SHA256458f2e83254cf701966486cd85e2aa532b1eb4bac80b6c209898a8f4b2b99e7e
SHA512d9b1b35583032be94276f97c659bf2a0edfdf02651a304eb693924adf4f93476c17bc45704c413d609335db597f3cba4d0c129f293a9784d2d511639c4768bf9
-
Filesize
8KB
MD58055b25d2759fcbd10c4b178ca6a32b3
SHA1559f5a73b9c67a8344328a8c4f6488fe216c6b57
SHA256b4993a2897ace69cda168971933c797a5955de8df36a2b90e4332d0d585f62f3
SHA512e2f744a86312a4a318c8249af0ff05de414984f8ed5f273eeb766189e97c8b3d12b926ac647b52fcd1564364c88a57c4729719fd32e02d0460c7a0e5fa35a171
-
Filesize
8KB
MD55fb48f069dadbebacc372bcc15d0e406
SHA1210fab4adfdadf959dad17a7bed25243cf038889
SHA2563769e5596a431fdf8c62f94686f6ffdf56abe46ec5f6bb4c4c026e70fcdd7625
SHA5125ea4601ce945f4de229384128914e9c841e85ddba1af928aa6233b49a3cb0aaf62d3f7aab2ee0877f55e2a46061f8b6492c552f70740d13cc0bd948a10f07fb5
-
Filesize
8KB
MD504745a2f5150e366e683f8ed9464bc0e
SHA13dd65a4bc59d93a5906514060e3b744611c6d12c
SHA2563177717fdb038178275b93e496e6ea6079af44aee4a8ba3adb624302fb62cae8
SHA5128fda4b3c18f4252b864cc599d39438f57eee68fcec39d661671d024f2c4f89ceb6efa9bce1135d0c6f5446e4955b9498838ad92708ad20e7cbc087257e88fbc4
-
Filesize
8KB
MD5e691009d9ae75aae07ca4367920381bd
SHA17f1fc1d32a58028b1e7ca6bf555dd0d73530caf5
SHA256e056f976fcbf792490abd96fe48276fdcbb46f9d714d4c71235018c042de567f
SHA512690d6b2f4264f17a4703931344e397281dc34c81f8c50a809d7557eb0a92be475750a49565577cfeeea60792ecc65791fac871d3c1d3e0cefb1b1c05a9854509
-
Filesize
8KB
MD561ad5576d815bc17e4251d5102b9cef1
SHA13e3a4fe537b36aa89d2ccf4af400d045bf0c43fd
SHA256989e56e7619a48482db2505227fdcf9aad40bccb72c5f900b91f2c3d95a1ecd5
SHA512147f8af662c83ff1995c9e5d615a1ec1777f75f8f61a7df3cd38480be6c0a45972ba89f5e44c873666f1ae1ed7ec6b83da4ddbf3a0d86c50ed7edfadceab90c8
-
Filesize
8KB
MD59964339719acab144cffb994feb31724
SHA16599a6aae84f152ed3a774abaff27c897062f68c
SHA256256027d81078485556f65c89ade79446842f4fd7ccb09cfc890edb771826e7d6
SHA512a4008588629c38cb2a623d13ca23e88cdf57d7d0a465a65a6c682657957fef06cd211a636b20cead682081087eb604a58c8f68ae4d3cb635815b0b1920fbf21c
-
Filesize
8KB
MD5d56cdc41a480c37ef43e74061bbc1bb7
SHA1c2f97b03a6c6fc03dfaa8fcda5aaac23ced3fe63
SHA256b0a2591aa860382ea350d2d2b0629ae1c7af0dc3f9b89ad1c985436bb252e402
SHA5126fba676b1fe85dea8c205ab783e849c05de4f13a8e34c57817b3c0d007c3dda9ff9a2f88ce44a9ec14b882f8a2c3de286d13875e72abb51954e26d6301447931
-
Filesize
8KB
MD571f263ca5ba2795672fcfdefa73a6514
SHA10b345f207573791e6e895fcc5f385816cf025b0b
SHA2563e877d045e9bc14c8f8dbd043f66c80840cd604948a29df662532e0daa4dbf6d
SHA512d0ff64517bf880a000687ddfbbf5eba1c15c0488a07cc1f16c3b2f5d432d4dc05eca34a2bd1889aa39beb95bd0b7dde2bca51f80ac4455aebd257a5c3c15438f
-
Filesize
8KB
MD5789b071491d4247d080895695f3e6299
SHA1ba4066c54228d1a745ec81e9da4596ee0c0e234e
SHA256d226a9bb867d8be4995566e43b2c6edd46f06ff0f570f80cdd1ebbf94997930a
SHA512f33072fba5f71a467b642c56f9ef54837d7478c576d1dfc409e7d3f903b560aa9aef31114a95fae930cd055527b219e6d7001f5102147261dda2dfc196273028
-
Filesize
8KB
MD5e4a7baf93d37393c35bd3a8041ebb072
SHA104913ae5630f3e7b3e2a092af68b943960f03157
SHA2562e6d0c5fbc18b932ef4b42860fc88c62f8ee42e0ecf68cb8fe2b1b36f012b238
SHA512c51c3b70694f167f2d5583bc20970aa538cf27caf8d1b591a43dd05e8b726909a7e3340c15c352df7edd39c1f1341b1d0d20f7ac8e9e78347da0de4baa287898
-
Filesize
8KB
MD56b4dd361ffcdcc11378776c97162ccf7
SHA1e46a1f7901b01eb1c758ef08479fc7603bccf606
SHA2566a11c2893f24588b72f3243c4835a17c57ca39a8ae6a5e5d722321be467a6c2d
SHA51205254d5c64a7d332d0793aa85442867d08ee61513d5e28b4a16f4b4691e3b1163892264af0e8f67c4440bd69e132fd70931eed203cd9d4c0a842b2ced1074d5b
-
Filesize
8KB
MD5e62d793d4bf3531cadb189e1d7d195b2
SHA1f871e3ec57f1d19f19b8c350a99a07a3dae71332
SHA256f0be6b28295545458b9285aea2c23933e3e71c499c03faa198bdf9daa841267b
SHA5124794f76d2e3afdfac45bad399725bd8ee487fcba3526a18cd34c9f8cdcb9c9069bf5b2393dab22ef3bad677e2759b91a524f1ff7062c5744ef82730404766099
-
Filesize
8KB
MD5badb9c6db288822540abc06e3db31d3e
SHA1093bba15b039037e11276ddf4e905b73e2ea4b4a
SHA25656054840d6bd3d0e6890a4348df7b5cc835ab96ba44a3995ef03e68b6adf8b93
SHA5121fd027ec2f4d246d26e009c35aa06b6b2b0279c72ab4ce1288a7614450ab19a53a98b099e780a65ce4ca710f76ba5dafd4dbd64fce1150e4756cb7ac3f6946df
-
Filesize
13KB
MD5105af90fc3006ec7c95bf9b1c34302df
SHA1073013ae629c00d1cbf625bee794cc0cd1f9b6fa
SHA256378a05cf678eaf4decb980407f42666f264c4085da387daaea4a652f198f7001
SHA512beb321a8f49e82392707e1d0b09a8da6ab882b87dfa1c8330a92d545f872fddb29a5c8790eb71fe5bbaa7497f7d6552ddb2f10e442b344c0f15fc9d93b4ba2ea
-
Filesize
247KB
MD525d05c9228ecc6aaa253670cd50a4604
SHA13f07a73ecbb3da79e25ed355cc304ac64e4d77c3
SHA256620ef91ce24947795efd3de982092ba2b98b61177704f63988931b3eaf5ddf7c
SHA512163d8bdd8e7541e3d85450c19aa466e0ea08e9ee6628e8a53991e9752b4faf7120fa52d509e0e4abcf55bb2374116591bde5fba2ddd05582613178f1bf7d3ff4
-
Filesize
247KB
MD5f12a6f7b7ff0bffa15536cdfe3c0d3e9
SHA10ecbc2a46e05de19b4b5ba248a856900fe48fd8e
SHA2567d3a2a0457768c3cdaeb8dbb1d13881c12999f54b28c2b567c771cf53485cc78
SHA51224f22a423d8b3d17d6ff623d63d23f6bb8402ac4d97c94c5e74ba6fc26c9511bcd09dc667971cad31f26c1b5b6888deb1559ea032b52d371b4ce56f0e798b9ba
-
Filesize
152B
MD5601ce2abb603e36824720f68d9572fab
SHA19139cb22b081ccba9c548252df3f74678c101cad
SHA256fad8ae5bf8471db17a344746a32fdfae1b0e457498a25b5129909209506fbfc9
SHA51217765022996fe81a0ce8e30d60970c19ef6b4df9ca2782063c6a724d70e2a1aad1db4282a7875caafde192dfb17cf495b6b53b71f0967b9411bfd963ba949b97
-
Filesize
152B
MD5c743f011d7ed53768d6263de076110e3
SHA106a2242398c6120019439f767d965dca0b09be9e
SHA25650a22e70855487f9a451bcd09fb033c0aea8a1f3743821fd99faf0a4eb396813
SHA512339942620fccb0c49d87f0c99370feeb5cb3aebf60064bf5ab3fddad7f8c3c1330284690b148068fc94e64fc2d9bc9657f5a6d038e1a653f314f5fe0c394f240
-
Filesize
5KB
MD5ef5227e8de0d21ae9dd7d3972ce0fdbd
SHA18e50921295dc304c4df6adaa13adef54d0766a4b
SHA256ad44d207fce39e71b6a1ae4a3543dd148844f36c6f7c299b8d24839f54f30e59
SHA51269c0e1fc66da03dc94377b4ec28452653842eb2a21239e8399edf3134a7b4e51d603dbe2277fb96ffa05fe652e6cb9032be40f424554ff4ad2d83c3b18040aca
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
925KB
MD562d09f076e6e0240548c2f837536a46a
SHA126bdbc63af8abae9a8fb6ec0913a307ef6614cf2
SHA2561300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49
SHA51232de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f
-
Filesize
764B
MD541c199d56ee88613939ba36689b5272f
SHA1c8ea27720461568200a6b1e65b26fcf34e0c40fa
SHA256bc9e83d6b316359195dd0e515be2163998a0100587f2f8a2105352afc8ef48e4
SHA51266511d865cdeb5039a660cd9551477c126d36eccaafa189c4c3dd97a31d4009a772e4138efc05ea0a840310c2f7b9a8ea1257432c310b706a06d9b052d306df2
-
Filesize
122KB
MD5db32131c3970c57d0ad200b8c586b9c8
SHA1adb5d20e012b668ad6cc77c166ade302607795dc
SHA256edd149ee8fc4e9ba7b0633b0b34bbc60f49fd4af949bbd06cdc46effcf9ec4a5
SHA512d57b106d8cfee5459492e945cfd2d1c28727b5f8e1e48c7ec39f64d1f1c0856d7a898b2e6abe964abca2df610e4d6384c14696fe79d6da87c6ac52dbc85e4783
-
Filesize
64KB
MD5ec2a94df8c01a560e0604c640b26ccdd
SHA11ac09f3302b2df40302a050cee5ba5b119291215
SHA256f0d88e80b23da7e59e76dd18d6b39737c577df9689ae49126ccafe5fbaeb5b5b
SHA512bbe7b24db1451d425e3b241075ed6dc564d798fa504b3e0d75edf876e582599d1709836062fbc7d5175d85eb179b635db3c940a89c20863f9dcd739b0f8b44ec
-
Filesize
131KB
MD57aa824f055dc532c3e713734d5733577
SHA1d354d68335a862ab729ffae878b6f8a3cc774d97
SHA2566812a48a86b7a9ca84cffe83f8678db2c495b09866fbe1a204f9bfe39854cd49
SHA512e10d26b7d3156b9cda0d66cfbf31aaac7238e77d0fd0cd0c4e415f71867a0b3ca5254acbeda09109fb6f7bc2f92bb89682e52e7906af5ceb245db3c7a565e33c
-
Filesize
30KB
MD5f1548e92e0b2ffc07e003c7fae9ed9b9
SHA1575ba8922ebbec527d150ec7c65992feace266db
SHA2566b5b3edb8182fc38389ea991a97bc5bd798349e19aa9cacf413f415a3afbc0b5
SHA5129f7dd7bedfe3ae8d4c8caebe241ca25a6f77d52c085b5aadc8ac5ea91ffdfe06c1c776854d2a953e11eed4437c1a851f6fa3388988e2220e57e23bbb7130b470
-
Filesize
109KB
MD5e31afb9405514fd5b7ca3a02c5697de3
SHA1d0c67c8ac6be3ba39586c2364a80d82ea07e9898
SHA256d857088b8baa02a812fbeda516c74dc40907ddcd3e4d6a5be91b6c23042bd620
SHA5120a6ba0aa91608b66fbc90857fd784a381619eb1781472b711f9c4123beec84e9ccbd269c062fd9071c1a0d5d5bbc694d700d562cba34076df6ed06b9ab146b88
-
Filesize
478KB
MD5d772c64b8f02e063f7f8b1cea9509574
SHA12aa72a8f3e6474e0d9d23cbf88b72cf60415a82b
SHA2565c61934f8c63bd21694d648b69f70f426e8a462525c0ff6e4484464267961461
SHA5126a497260969280d67c2ebbaddd24312e10fb4bfeecbc7f3f85d7ca6ca7c9afcbf1a2257f566a6cedf685abf9ec2c28ab7f643b173c52c6089578b7615d382c5c
-
Filesize
120KB
MD562ee0376f7b66f93856090027793c5ae
SHA1358d6750df4765fea465451f1024892c132a8b5e
SHA256312044d1badf072170a55deab7e126bcd766826ce201febc4a8dd74a7783f391
SHA51274562de1769ffffdffc5518428bcdb5eadbd972f69ca37fa0971bf89f30ebaf41dacf2fe0b5373ffa0e1fe792f1bcb0aea0085ed0f94097cbfe5c23f3ee1edeb
-
Filesize
87KB
MD544af3d9f2851fc9d3758542d4b83beb0
SHA100e5819a99f6bd7b8a91c56a20b4a04603ba1fdc
SHA2566ec134b5a0eac1fac5216470cef1fd3a4d1a8d061d429030a9d12f7978aed5a9
SHA512633b59dc281727cd5321b8135d0b5929bb0d37b7123913b777ddf2dbc7f5d3e71e4d7377750c97d4398596edb5b18f53d514356833613e5b0713bb0438a96e6f
-
Filesize
62KB
MD5354d8dade537bd6b724e2c0385910994
SHA13fbfaf7a3806875311b74f8152d803a6385b6956
SHA256ccb09907d574bb0f0e90db133039589205342f74d6410592841f1fb49b0b8678
SHA5121a4869a55a65b2aa8f80e9284955ba66636da8dfbdb528d5b31b2ce469181403577708ed2c899c68c61ab9b9d33c140a8b8aa0c52ce94c375812a9e537527363
-
Filesize
70KB
MD56f2d9e28fc8288ba6a6858607da20564
SHA1195eee4913f5a2d43ef717d7e4afed13f28c9ab9
SHA25678e49500799a356e0ead812924ee64ba4a89031845df0c4b4d3a7c704d2ea84a
SHA512fe930932d16863726ed3afd771d0a7d7ef0501ff5057325d0e7cb3466ded3783168736ef2b3c46774c7df09b441b82b455288b7eeb80c6ac39e0b64197d7cd95
-
Filesize
50KB
MD5c4af150b901a67bd95170ce3449b5c95
SHA195daab7704c8f186c963260596f274b0ae6f4fad
SHA25653c65f7778006abe3ff0f8b696b80f22eea2f642313ef7c8b489aae884645852
SHA51230078fdf0a5e69aa8df65f275ac26f75fb1ce548b231367cb7ef94cd1deddd3f5171dbe56f924c5c79c587f187f7563ffc482e6690b2e275bd823e231a66b42d
-
Filesize
17KB
MD58302276f879565bfcf18de8278fa2df2
SHA15ade1c7516c3299b9a3572766a6512ef079f1aa1
SHA256dd59aeaa649c3116f43228bf8da6614ae31d57e2da00777ab3b3e8dacd14258a
SHA512515352faf704f9026bf22df113089d13ff0c9de6059efc28fef9d1371ca49618a55fa19c414a8493cf354e525b288bc342732d88aa3fe3143e3fea58107dbade
-
Filesize
79KB
MD54bfd15f3a354c7a93533787429a3a645
SHA10a114c1d163c1417b97f21e21b48778b87fd9ad3
SHA25631d5191e194b80b12101da35ab1a87a1d99db2ef2ee884855a02dedda29c5632
SHA512333ac5f64e86f67a472bdcdcb69ce85fe670da874bc7f5c18398e390b5ecb767e945c3ab13e9ba7ad65ca4c7e367c3cdf99e52a478d3f9e1ac0f6bcd0decdca6
-
Filesize
16KB
MD5425b602e6ea940bb9e497a890e8c8475
SHA18d051d75568c4b6d74331a7f7868d2fc4fd2b28f
SHA256ce3130aac328a5d25aa6eb28684046916b41e6758f87f7d64e1edb4baba8c06b
SHA512e1c7e2e05b8c93085e751bf91ff8b1cc2522b2faed0f9d23ace8b2adad51f8033566d3a5e8d3bb313bd0b00d7f1e0f0291d85427fe79991385d3209910096c24
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
114KB
MD5ea6fa6999e1adda72bcadfbbafc7e41f
SHA13b3ff3ad8c7aa0cc57dae6b19736f5d1502f301a
SHA256f57750af4365e35010fc96e7e087e1e15f39752831997338b20e82eaf9382b4a
SHA512b029cc7b1817a7f3a1987aed4333469f672f213f1726322f6e0830290fad7c689fe19e3e20869ad4b9606e86b10cbb795e23637e5c67f795a73ffa377fc59a63
-
Filesize
46KB
MD514ccc9293153deacbb9a20ee8f6ff1b7
SHA146b4d7b004ff4f1f40ad9f107fe7c7e3abc9a9f3
SHA2563195ce0f7aa2eae2b21c447f264e2bd4e1dc5208353ac72d964a750de9a83511
SHA512916f2178be05dc329461d2739271972238b22052b5935883da31e6c98d2697bd2435c9f6a2d1fcafb4811a1d867c761055532669aac2ea1a3a78c346cdeba765
-
Filesize
20KB
MD522be08f683bcc01d7a9799bbd2c10041
SHA12efb6041cf3d6e67970135e592569c76fc4c41de
SHA256451c2c0cf3b7cb412a05347c6e75ed8680f0d2e5f2ab0f64cc2436db9309a457
SHA5120eef192b3d5abe5d2435acf54b42c729c3979e4ad0b73d36666521458043ee7df1e10386bef266d7df9c31db94fb2833152bb2798936cb2082715318ef05d936
-
Filesize
112KB
MD587210e9e528a4ddb09c6b671937c79c6
SHA13c75314714619f5b55e25769e0985d497f0062f2
SHA256eeb23424586eb7bc62b51b19f1719c6571b71b167f4d63f25984b7f5c5436db1
SHA512f8cb8098dc8d478854cddddeac3396bc7b602c4d0449491ecacea7b9106672f36b55b377c724dc6881bee407c6b6c5c3352495ed4b852dd578aa3643a43e37c0
-
Filesize
96KB
MD540f3eb83cc9d4cdb0ad82bd5ff2fb824
SHA1d6582ba879235049134fa9a351ca8f0f785d8835
SHA256cdd772b00ae53d4050150552b67028b7344bb1d345bceb495151cc969c27a0a0
SHA512cdd4dbf0b1ba73464cd7c5008dc05458862e5f608e336b53638a14965becd4781cdea595fd6bd18d0bf402dccffd719da292a6ce67d359527b4691dc6d6d4cc2
-
Filesize
711KB
MD52dd19037ea4075a2e4699ff64b4b0dec
SHA105e68dc8f98dbd6140690fe666b208b59f20b3f2
SHA2566b0e779a7cec6e77c55187c1321750d89ab7fd7fdeaeb56ce4d951fe61536f6c
SHA51299b4748bf4da51e5dc8a360f989675859495dfc7cfe3087757896bd0a75b6d77366dc420eddceb6df55741d70a60d3e9fc2879c9fb9a8607c589d3d2aaa04733
-
Filesize
652KB
MD5bfa5f82fe14d849ca161b2b8ccc0d466
SHA1901280041cbe8adedbc07eecc9d5b2d867c91e37
SHA25628da4e96d9f1d203250d201d53ee8db10552c38e3e7cbfce277ba247c1766513
SHA51211ff2954a95dd62a868ca443147a83cfa9cb6480dc1c951fd7a66c898b9d423bf47a280eef3fab438fb2969100342e944994d7e937029e7802ba38f55ae188e7
-
Filesize
769KB
MD511fde0ef8ec65560aa552d011b659a1a
SHA1bc230fac6c1791aad70cea6e3dff495ba9432fce
SHA256136030878290e5d8908dab50027b4af36f3f837556a7f3cfa268643d349e4bed
SHA5129b9f44f2a15df4f92a2fd0e97ca6e9feb26efa1d2a6e3eceac1c1b5a64312aa87d821e0361605a85407a9771fc2f3e52d2ffeeb736277b07985677871e69ebba
-
Filesize
340KB
MD529dfb30bc9deb838571f64bdfcfec8d1
SHA136debb5f3604e27851e61736f095bcee8689f484
SHA25668222ebe79199d1839b324df2deca81bc8c3d515177d857ddf0bd7938c0d810c
SHA5129a04189afeec0d9638e8e920ca94311db7aa181aeb598af7f75bcedaafa45e3b6e986a4baeaa679a076a188f9464e7d9f68ee69ef1fb388524411e5915e51e8e
-
Filesize
13KB
MD574761b5cbc4404a32b054fc77ddc238a
SHA1bad7ab765aa71f7c0bc60dbe8e1bf63dda8c52cc
SHA256ace9a2e48c2b7ea244a3dc4c595ee0bdfa32fea85fb82f94a702b1c24dd0c9d2
SHA512ec89604448c5cf2594da7e3a4337b86459a3ced79ecfc0b5b5fb5905b3ea96e610da96e2ddd7d13a351c7c5d9e7e62b30bc5918c6fd7cd5da5ca864e60b25f0d
-
Filesize
282KB
MD5c13f5e2860a05cd1ca0abd274c9a0e8f
SHA153a3e3517b6dbabcbadc458c316561dfbafb6df9
SHA256a8270df4cc5c90a23910ee3b3d435c5a205b42dcc8dcbe74f3556f9889056a4e
SHA512dad7bd1f5e68c0fa7b2169d64ddbe606c25a427fbb8d191ad57b957671aec74a75b74279b03931ce64f416550b33d33c397467cc0691745d93f6707776e931f8
-
Filesize
301KB
MD56cc9143222bee30cb61b26cbce483c1c
SHA145ccf3c83fb2b2854a667f88ef2a8dd6e0737ab3
SHA2565105fba731a697228077c26b9a05a4cb94f9088fbd809f50d23028f028b6d97c
SHA512d78201be89db88285dec56658a3fab5b33da794562a5e05b5443742d9a0ab88f9615707ef9730f4205d7b53efdc297f09a5beea7d6a5e14f04c771c6b2d14988
-
Filesize
11KB
MD5418ca7a93ec243af9d119c0b3ee83757
SHA114b3c15833701c9954d63e6847ee9c70fbceb84b
SHA256f5c62a3ff328d2cf3a7a2028ff0ba612b063960e962fc8a1fde04aefb1018c01
SHA5122d06963a262105070467eb94e3b1f32cabe0f204f3ea2f209150a07c494a9f03de61a089f3b319c73fac9d7e63fcf45ef9822b1ec9d783e6036671831ca5c88d
-
Filesize
613KB
MD59654a767fae970d2dc2a58f6087ad732
SHA1bf616b1eb0685e033df51c271b0095319f827ee6
SHA256d03f8d6adf36750939eb64910c60ce3a8b1da6ccf504ab6395bb57e7adf10012
SHA5128953090603feae52e5829a3165cb5b08506bd9df2550ac7a07a01201db385f5bb822900d36f1d873a13de437edf83985cc1fbf0ff9a15693fe7f12e42c89475b
-
Filesize
535KB
MD5fc5bec7e9d1ed818f6872b5633d2c867
SHA14f8fd90e154a7e915a84a2f6662ad8d880d7d55d
SHA256332dac9098562f264550e1269e562830b41c859f8d4beb54a788cb0925907364
SHA512075edb8222a18bbd5a14cd4f72e6007cc4b9c27b1b34dc03eca39b0603c9a433ec8280114ed7d53cc34891788916b2a48da4072aa6116999eeff53987c148225
-
Filesize
750KB
MD5612be8edcfdc62b6b724ff53e47ff5d1
SHA1da81ce12578922ad08f1b85e6205310c3134978a
SHA256c564ee6dd0228672d828768db2fa4e23201f2a24e8a7d22e547f8749d0c81eca
SHA51289bc6f25ec5249c8e9ac71694f2b7d15ab93173bca1b57e3535efc4debdf8241a8924af60259ac65e5e12d134f5d5927a7dddac4a7fc99b31b2f20b5bef69218
-
Filesize
438KB
MD5bb84238d6af83fa1149ca40427b40b3c
SHA141b63a154e09319d03b237ffd19d6b7e4217b7ac
SHA256c66bb34f52e9020e3a0bc0a02ecd960f7cd6012359be6eae5ad8ab7f5858c0cd
SHA5126523d3b68de0787664e19d763baaebd370a59abed7906f6e0d57d1a5e0f71c9d84769df94571a2ba10d132e7674f281df6385d78db8e8b46f2489ad6f31861a2
-
Filesize
574KB
MD5571d797c50563cf6a4b3f206579cd57c
SHA14398910c579fe75bd8f37cc1c73539f56cc0ce2c
SHA256ea7d738b56851227ec32d0e167107643353136fd3e1c5e6a28662e4cbb6d4b4f
SHA512c370ae0c0787af0feb2ad40a86bc15bb19bcd09a51b595545246a45a3b48f72f8d11360cacee4a40890648282a0e6fbdfa26319f5b0830cf0b0ea830d0ae20f5
-
Filesize
379KB
MD58c9c305b759e568578d2e9103e6603bb
SHA117e15815fba6d9ae6c735f214230be738d95938c
SHA2560e831949037e14f0186660235856b54bc031d0dc53f38deee9b077365191dc3a
SHA512d88e010e22404cc0d8dc10a0c422ac93caba593e3d4c0e08e2190e3f0603273fbbbc7fa5053ec1f212fcda8155e311994f75663eb858a54d2ead164dc92de833
-
Filesize
321KB
MD5c7af9a18ae02434829a41edf4c856bc8
SHA1c853ef8c8243eaf74ac1e7fbd1261bacbc6113f9
SHA25654e20a3e40482d201f16129c683ffd1e1e383bd7a3c43f727437d01408deb2ea
SHA51207f6f5ff246f58026e778f1a59e1722eaff8b1b862f7762cdf70f82023c29175cdeaeff59f3388fc29528577e54a081545d1a05a5b9978aa5e5af44018c8e913
-
Filesize
418KB
MD5a343d6cee3931e9a20b9a1d905cd36e1
SHA1b95e6172980623e56ec2e7c6ba5ecfe55dca8e30
SHA256ecd9d0ed0719b91870e97859d125c60b68f105a66b8081ac86622d04b92dbfcf
SHA512257658be967f7028efc3db0debd24271b88989f3ad1ce1836c4b2ed2e5dd7ab218389d6756a978760b3711e74b5e54558469aa283ccccb510d0d0619aab93a5a
-
Filesize
2KB
MD50b4cfcad705f51e0d5575792c4f92dd1
SHA1bc035d85c558971f29cf6d82cf126a83d576052d
SHA256d8d079acd57b2d87fe3be2ad466d24cd5c7e3f9907c83c27441258f0d127ccf5
SHA512094da5c914716797884fb4b139f57443bb4a689433e5ad57240a998bfdf24087776bad566ee398528a4068ee0e2aee68e8b28b4e26a732cbfe2f4158deb21fe8
-
Filesize
516KB
MD556418833b017534592305a6fdc6dfb99
SHA12927bc11d9b10c1a27640d40ddd404a4f912d0bb
SHA25602af43965c60d2bd4752ffb6729efe56fb8b1cee521f2dfab6e4e52eeb514dc2
SHA5122e745eec504bed30c200bbebe1efeae38eeaceb2e5f68cf3bc9437d0bb5ad0abb0b73f5e137a8f19b70598157918d1ab392710e2c08145541409e711d71c7655
-
Filesize
11KB
MD53d22ae6f2a5b74d3a031d39997f84883
SHA1844fbd0927eb5a4153297f15d38b713ca0ca60a8
SHA2567a5eca59d59e4cc78a8b5c5290b2b76d8e3abcbb560759025b47edc345765b1c
SHA51290e221ea2b641c706f032bfd198bb68cd182991c05e9f3ff55196f26ad211b7c1dcc2f0fbd3292f28f0815b0fa8c9d09e161fa98440d4a784205ee75c5fd8de8
-
Filesize
555KB
MD5decfe264ac6f82cb050e4a737abd68ce
SHA1f16ef1828ca8f84ef6b853eb458fde9fbda1c0a8
SHA2565565aa2100695be6af430c46b1527447e0857fe337df98a6d0e72e69ed6454ab
SHA512a8433bf603fd9a2b28938d2833e374f08e2530a96a85d49011968d199c6fb6ce2d8834c97fa27bbc5dc2fb3412f8bde1f1a5f56a124cce295e92812e94e3bbc7
-
Filesize
672KB
MD53842eaec1cade9f5ead94a3e66ecc2e4
SHA12bfcd36830567966118b37ecb45c98c5617c8e54
SHA2563856dc7f317468f5290fd9e5ec704bd4b47dc99569831829ff95105226a779af
SHA5127d80e2cc61e766eac42710b65ebceffc651191f1561066da74df7715af4e3995edd024d4024facb9aba52f5d4f92d58411a85e1e2a0f3c0d5ed4d464548e2036
-
Filesize
1.1MB
MD5ff6a4b0c09216bd75fd152ee8a5646d8
SHA14214845220fefc4b86b45d27bbe2bab0923be7b2
SHA256662f5a4a4b527d8999cf0f7df6c468a4bdc2a4f01e916ce3103b629100b3e987
SHA512d7fc5326ec91ad67d7c3056b7330e959f14f4fab86b61d4a9029477600c0bea2b9f1cafd080fe308f06406952fc72fc2c2ee08643ec9b9d891fc74433f7e0e36
-
Filesize
477KB
MD51d5b1e93256443105a0d74fb76c15995
SHA10c270a54e1edcbd8b1f49345645bfbc96466dde9
SHA256bb1d823c26bca962fb3132564b33681b3989b4b3a02ec8e1f363454698d496d3
SHA5128cf46f16d676323d518314320d4f22d09a545dd93767b9df2a0584ab531af56fe1ba4e7af5347f0ad27f74ea2de577bbcdc5cf7448bb34618fcb4749b3b1c02a
-
Filesize
808KB
MD5fc96cd6f4bf8bfc68377b370be9a3ced
SHA17fc5151fc4654b567a0023edd33c7c4bebf6441d
SHA256a51ae139c98decfd33a6604671abe7c1aad1cb0cddb4c7b9312fddb580d8b0e5
SHA5126ed6c25c0a208a1041ec5b3d21344f1e7abfef2cc0c3c23b6eaa798bab188d60312cf34816e060dd7c67136f6024b1505230a5a57bc5c0ab3c16621b6927912c
-
Filesize
730KB
MD58625505c8bbe0a61629390244575f6b9
SHA1cbbd6564caf5a32e37790e1d9cc4a08cdad11756
SHA256d495b5cbe1929e8980370010d94e20bd1e0a6d1053fe3dae6724552cbb4d6448
SHA51287d72adbdfc0f42d6d61bd8014107570a4b4b8befb89db7f9316c510438604c5e9066eb572e949e73939b5edc25a111523f94e968f3180e32871cc60fa52ea12
-
Filesize
457KB
MD589048b6043f54394cd0ef2eb6869e3c5
SHA11afe07d14389fd04aefcb6d98d0b14f142ee4e13
SHA256db09a86ee6de7b592a5c1eb61b5b7162eba7a2473851577e769dd983934619ba
SHA5126d3a79b77cd5f7efc1be46e61e92ee78cda70f4aed8591dfa55da2a1056138d19f50c79e6ea96895adee53b99f03a5de55c6dfd32777374e429a1db96e166d08
-
Filesize
496KB
MD5caeb1ed0b7f6f281d74fc690a425580b
SHA19116e1df5220e4c299d30e390ec47bb109cef180
SHA2566c0f95a2ab4d3ae9059e9df1afaec4044b00dac5dfc70ac11fbefa1edf010a99
SHA51205eb6ef01e7e509ee1980e9f2e030c35895368cc5b697386795a8cedb43357c761e2200ede82dcb7e8fa68af338c46b6e5df870a4564b3357d996dfd20b8d08a
-
Filesize
399KB
MD5173bc5a7b0493bf7e3025cec73b0b00a
SHA1b5b1ac745320e191718bbcb3dce6d42c451f1534
SHA256f47bf599755a0ed007981c5d744dd96b34507a7473ba1dd79fba30b18a1f0589
SHA512abbbac27a09f2e804d7e74163323d40cd03c689fb4fe1d7f9987161a3b57687454fb61ac3938114a5ca13085c9f3f9e66ac6f9b1db6d8c911390bdaefcac012f
-
Filesize
594KB
MD5a078085995899ec1c1167ae2f0a6be36
SHA12dbf8d643a4f7cb99bc1a5a63e3f39848ebf54fa
SHA256091de1c6e00061139cc7bbede25377aeb26de9466b22b696e7c708ca38b44c3b
SHA512b979346eaae153bea03209dfc9eb614ddaf6e872e3d2bbb4ccf193414d7bd0cf59fadbc10898c2bdd2960bf58e1aeb3faab4a307fd9fe40d76bed80cc24ab704
-
Filesize
10KB
MD58fdd9c01e7d340fa51888b597b2f97e2
SHA1df8250ff675febdaeda4436e27d5f9d51f046bcf
SHA256bd7d22233de2141af39018d0fa14edbe491d3aea2132fe66e756f1cabcc24139
SHA51278fdf73715c226fe06bb91b829f127676d85b6a9ca87719e821895fba323ec2ba8a180404bab7f97de2b743bbd8860d0db06e6d23a8226a887e4b1ba05d7ba58
-
Filesize
691KB
MD57860beaf8abb312a5bb26672094bfee0
SHA1333a574486b9e735f1576bad3af886cf5cc001b1
SHA25615ea205b40b4ea9aa1ddda10909ac40760d07f562059c4cc64b5d82b2972b80f
SHA512d495092e26727355d561fe67fe64fad99fd127b830f1fada9e072a2ddb6cba844b9abdd2b444e670edc207144d308d429c4e93d5d2a65ecf91e2844d0f328adc
-
Filesize
633KB
MD58f6f5a5bce4b0e7fb7f12f272ac674a2
SHA128d343b6425aaf4120260002f9be26eeff458430
SHA256022a1fb018bf9befba37bd2a310c4b06e7f66f1691e9b2d890d3e2d37c2ee007
SHA512cadddc83a6694cc372f51dff86dcc79dc2062d1f1c601cdd9f581a1b38432a45842a86111982bc17e5481d727a8c99658ee5c115feb56de69c2fe4c24e1faafa
-
Filesize
788KB
MD52027ed463782c95558ae859b919a044d
SHA180e04d2c760f79a8e88de362b4b3880c8e213a5d
SHA256c2edf67c7f8f635dec2fe349cd66a7370b5375f3f31cd10ca47e0537664d326c
SHA512608aa8097fbb82b74d48988135a97436ec03987ec7aaa3f86d86e58ccc5200a715614e27d7dcad7271b8b4ecde5bae9163412d60e814d59d08c5dc6a444917a5
-
Filesize
360KB
MD5ad1ddefcf043d782052b19f3ffabe27e
SHA15b61b9e7ab9addd94c9c1744a846f005069e046d
SHA25610e6036f6a436468aad3b6be411d23e01c5f85c2bda86cd227700559834e658f
SHA512c8844e7b9d5673416a31257bc30f5044bf38cb2e56873f75e5760913d599c8ea6c439f1baa746cb19cf31962b87d37e95989b24ad58a772e19e35f436598acfc
-
Filesize
12.0MB
MD5230ba53f680cb571ac552e432bcbadec
SHA13b00ccfac07fdb44091a475ca68258b7ba6bf06e
SHA256df1752ef6e8594fe04a654cbebf85b053bae8300bde3c8260f290169fa1c2190
SHA5126e98cbd9108b99b8ce0fb54e065da5a76a1ad96803f11c24e786a37899f05abdc4058555f16f928624736ec38224e23109bfcbc9c7d61f297d254daeece9633c
-
Filesize
1.7MB
MD580ba9e1bcb2784536b8f2e76b8dcfbfa
SHA179edbca0319f234c1d225622bdfcc9e1bb7dbb8c
SHA2563be1430f6e176995dc99efd1f96fa4956f9b6ab8eaaa50fa2316a66179939725
SHA51261e580058a63bb2c71d30910ca247b9b7ec7a0fd1b1cc14b313c3c3c0232f56e81bb4176e8a3ddc7d5348d26299f6cdcbae7b8c6a1973c0c6fee25341320e0ca
-
Filesize
2.0MB
MD5b348884fc13a1a86e9e3a38a647ccd24
SHA198a1579a9bd8cdc22a0e67a8abc65ceaa437aeed
SHA2566fe6353ce95442b04be3391b5ca97532d67ce99201a1f5ee90bd687eb6db09b9
SHA512cd990195510f0785e163ddd4bc0138ca94aacf8322bcd693fd8467e411bad8bd5f01b0060693ebd3c1bccd56ad926076623018147ebffa6df03db5b20b9a27d9
-
Filesize
4.3MB
MD58fc7fdf551243486b3f6df49aa0aba95
SHA1e27b15d5d1c7d2bb084b8fdc079bb9a5b2c3e11c
SHA2563476d1c8f84ef2e51bceb17e1562a15f46e01c66f329bb56cdcba9b25c62ff17
SHA512d3c80c6a92ccff818a444b8aacba27fd89ed828aa0f75e2c7b73bf9dee2c0bcd6f51a090eaece6b320bd26d323e7272e966bbbaa70ae9bb6f875ab9177f00959
-
Filesize
362KB
MD5f7427f659921dd8679055660f2f2d133
SHA14fa88cbe2adc57f01065b6181414374a708301fe
SHA25604d5614f2cb141eeb0d15a89bbd10912ef52336c9c7f3aa33125adaeac77b055
SHA5129c4bbd5710174f3a762d85eec79d28ad104ca6882b34fb903e47adec9351be177c23ed6db575e308299f19dc00be840b3bc3c7e56074639f94f784a26ebc307c
-
Filesize
1.7MB
MD50f2e0a4daa819b94536f513d8bb3bfe2
SHA14f73cec6761d425000a5586a7325378148d67861
SHA2568afc16be658f69754cc0654864ffed46c97a7558db0c39e0f2d5b870c1ff6e39
SHA51280a35414c2be58deec0f3382a8e949a979f67d4f02c2700cf0da4b857cdcc8daa6b00ce2bcc3864edb87446086fe3f547a60580449935dbad5fb5f08dda69f1b
-
Filesize
48KB
MD5e21a2d8b6ff3cbf029e1b88ba6524c24
SHA16733bd4f7ade164e77a00cf3e2b2d6ace316326e
SHA2564928399916b4be98730ff68ca10207e3a13bf2739bfb4d5193d9e80461b12f57
SHA512e58eae8dca54b146bc61ff61c83a1761f8013ad3900c2fb02a5cc81b2f12174de5956ce2d4e3e936e8c07bcb8baf7f76587f0fe7e42e498de9acbc85afe54f77
-
Filesize
2.1MB
MD5b1209205d9a5af39794bdd27e98134ef
SHA11528163817f6df4c971143a1025d9e89d83f4c3d
SHA2568d7b5e82a483a74267934b095f8f817bdc8b9524dffdd8cc5e343eca792264bd
SHA51249aa4fcbfded0c155922fe25efce847882b980c8a08d9b78c1a67cc3eb90449e7c8fbafc3420b63725f60ece9bd9c563904387052ae2d457cabeaa384a2e9bf8
-
Filesize
6.2MB
MD53cb427c5f783752ea688c135b516dbb4
SHA18a9e0937d7db2b951f50c7cc1f0ebf42aaafb21b
SHA256230b143294c018f8fc6c36581be214e2d3725546bba0a241da12854052806005
SHA512f35074310eb13beb43039b440af695500e0eb4ff9634a820be9838e6bddeda8ca7d05ef969fe21f2ffd856bb88022d6e6c0b3b59cb131b90dcae22fe238f9697
-
Filesize
1.2MB
MD5ef3f2edb89050825affe0aed1c80bf8e
SHA16ed7c0d75b78467d2a7656bae0a8e604b8fc81b8
SHA256c6d01b2e8def4ed400fcadc09e8d3b452bcd2bf30a7cf8b6570fcf6065590330
SHA5123ce6d4baf58229bc02df388fcbb353e9c5070cf2bf4cbb4ae960e95187ca8cc0f3afdd6fbf1c74763b47313135e15fdcbf2e258b13075576ccf66ea92e8a3639
-
Filesize
4.9MB
MD5bb91831f3ef310201e5b9dad77d47dc6
SHA17ea2858c1ca77d70c59953e121958019bc56a3bd
SHA256f1590a1e06503dc59a6758ed07dc9acc828e1bc0cd3527382a8fd89701cffb2b
SHA512e8ff30080838df25be126b7d10ae41bf08fe8f2d91dbd06614f22fde00a984a69266f71ec67ed22cb9b73a1fcb79b4b183a0709bf227d2184f65d3b1a0048ece
-
Filesize
6.5MB
MD5bb8575526575a9c31e68797e9bd30ac2
SHA1f6f37311e16dabc8e736b66b75a49d1991bcbb39
SHA2567d717188690482e495079dffc3c45966e3b02a2f4711f1cb187ea2e91200cad6
SHA51255c8c97d7f6de2fdb8a05400c4103bcd4674255493e1a4ae279fcb3c4a82a47c4d7c8f635985aaeba321e5d86788325bcb06be27b96a74a59095c28de1f25da6
-
Filesize
1.7MB
MD5f662cb18e04cc62863751b672570bd7d
SHA11630d460c4ca5061d1d10ecdfd9a3c7d85b30896
SHA2561e9ff1fc659f304a408cff60895ef815d0a9d669a3d462e0046f55c8c6feafc2
SHA512ce51435c8fb272e40c323f03e8bb6dfa92d89c97bf1e26dc960b7cab6642c2e4bc4804660d0adac61e3b77c46bca056f6d53bedabcbeb3be5b6151bf61cee8f4
-
Filesize
45KB
MD58123d15bb6100a19ac103b4ec3d592bf
SHA1713d2344beb28d34864768e7b2c0463044bdc014
SHA25668e92585378abdd8a5e6ba42c20a66558ebbcc964c08ba3ce56d020568ebf16d
SHA512ca048fc1aa53af7b517c2b894e038ed7e413690f2a9e9838c0a5624f9530b20ec8ca22c8d99b8b7ed1e049753970880ee047de984557e2e6c28a55ba2c974351
-
Filesize
112KB
MD5043fe9d1a841d94435f8882125769b0c
SHA1f410048ce061a747048dee6166ef001a6448871d
SHA256d9f20fbf64170d65d1a1f2fd66a997913cab8ddb1389df8b1fd1e7ae0f1d0b5b
SHA51240f15d849cf49a6965c7feb86f52fdcb96b84e4bd3f3aba26010e7ac44168cbbd27ee97bab4e34dbff0550e64eb65f2fb403a96bd8fc9275fdbb573d4bd3ffcc
-
Filesize
846KB
MD5c3d89e95bfb66f5127ac1f2f3e1bd665
SHA1bd79a4a17cc8ad63abdde20d9de02d55d54903f9
SHA2565d07ad572a6a37d07d0b7ca990087960ad8850d7cfc56b8c7270c826c70fb56b
SHA512d85116e24cf07f3063837fab1859ae6d9313dd269e28844900cbebe7521df8c65db97bc122bb097e9887d686bdf8f786b93a06208d762fded9035d2c6448a111
-
Filesize
9.8MB
MD5db3632ef37d9e27dfa2fd76f320540ca
SHA1f894b26a6910e1eb53b1891c651754a2b28ddd86
SHA2560513f12c182a105759497d8280f1c06800a8ff07e1d69341268f3c08ecc27c6d
SHA5124490b25598707577f0b1ba1f0fbe52556f752b591c433117d0f94ce386e86e101527b3d1f9982d6e097e1fcb724325fdd1837cc51d94c6b5704fd8df244648fd
-
Filesize
1.8MB
MD532209e84fd84647f73b26de04f463616
SHA15b93e15e5cb6e722b9b666a11fb9b3d176256608
SHA25630ac79ee949ae381c57c715b556ec21e39445a4746e7262b99f9cc2aa6907f61
SHA512f9d87a796f410ede2041fbc1a596b050c0cdf319d7c24a34b112c1c612192c568772cc8af554571d2efc20c45decf6acccdf20cdb12be42bfd4fdea75abe4daa
-
Filesize
90KB
MD56d3655bcfb40f42bef2f6aaba024813a
SHA15e04e5eb1c10d95104749fb9b6f711f3bc138cfc
SHA256bce04503c570b1499c3a432f5911db751e26c9fa28b158d34f050239699f7ac1
SHA512fcf553c553fa192b9eda8744eadbac0f028b072635d9e1db411a7504e639f2d7c3662f1800c22b072e29dcb6508bae672e799c373c97ce906ea640c7a77fb16b
-
Filesize
27KB
MD5741b73ac32f93409f2eff52fc470acd7
SHA1145518dd63cd26471db279c04671ecc581ff19ba
SHA256533ffecb86555b7eb74923b557f289b5a7f1c820baa3e0ec76a1bcf27aa06bad
SHA5120027f14ca6dedd8f9f4ceb87fc38888be18782fba3262144555a2b72355b9baf37f03b80274dace7a6d2fbec3012e54db17be26d20ca124a4b4b8b7a9fc49ec8
-
Filesize
2KB
MD59fc3d8aa28af4ad6cfd975f7ff2dc408
SHA1a0307888aa794ce4fb65658a78cee2e470cf5446
SHA2568c4c202bdd5336382cd12653dd38c0c88ea9287662df357bbfcd6240a09d0b12
SHA512fdf24bd11c5f3d102955d0c2589ac62ad1d1c04ac393590dfa1a9a3cd5ec46f9ef068f1c0f8117a4c26aafc1b475de28311d2f5d2ab5f2157264df7f5b5eb184
-
Filesize
1000B
MD5c5218804508a69ab3338f915231cf925
SHA1ca60fd67a93c0cd93a3b9d286eb28fca188e3683
SHA2560c96207fe6ffedd82a3ad3626ac06c8993786482091432c7c086d306163ca777
SHA5129e761c5e4a1d797b6cc8006ca368c7624c63a7144aab2fda7644af55f1468890a96a9fac68f7418e340d2dc27180ba062f269cb5b79ef9163ead156fd7e09570
-
Filesize
2KB
MD54c3b016f0bb8052168e0544c3c7d2794
SHA19cb7c5525ec867c92ed3002dc4e2e7879f0bb04b
SHA256c1778714571d8dda81458a87b165581d7a327d0975f730380dde485bfd69dbac
SHA512b16d26e8d544588da98b1f956115d96145a385d6fd41ec8e10d63b0c33135cfdcc5ce7ffd13483f1ded2c357e586b83c31454232c8f76514605646cbe8c2fe9a
-
Filesize
2KB
MD589460dfaa3702f5e30d7f117e1f503da
SHA146463864a788afac3b39db172cda2b7cd8694c77
SHA256d3875b3f7771ed03e2bfe8006d6087c47f6677539e873145aaa7f5ea1e9c6557
SHA51235775d23d03c3296105b99ccaacfa6c06e30a268e38d6138b5273a8dc37159177b14635372374034dd865ef55ae603ae519cfb5488c3bdbdf2ffafddbd70d46b
-
Filesize
923B
MD56f63c1d89d4e491f08c4d3a669703ab3
SHA135506791df0dcc8ccc704fc4b578540ddd6fea8b
SHA2564f9bbe4a92c6812263dab95fc4552db27bda79fbfa5460c0615da9ddf14b3344
SHA512c994b7ea864765c9f414e3f3974ca8b526f8ee43e998a5118282373f6761dfb1b856e9ae70baebeddcee3fa2bb1507809e85fe9d2c55ad21054fccfd6437b824