Overview
overview
10Static
static
10084c57449c...0e.exe
windows7-x64
10084c57449c...0e.exe
windows10-2004-x64
1014b94844b9...c3.exe
windows7-x64
1014b94844b9...c3.exe
windows10-2004-x64
102daa514408...2e.exe
windows7-x64
102daa514408...2e.exe
windows10-2004-x64
102e6f094748...ec.exe
windows7-x64
2e6f094748...ec.exe
windows10-2004-x64
2e96b55980...ea.exe
windows7-x64
12e96b55980...ea.exe
windows10-2004-x64
134c392448f...ea.exe
windows7-x64
1034c392448f...ea.exe
windows10-2004-x64
1037d8add251...4c.exe
windows7-x64
1037d8add251...4c.exe
windows10-2004-x64
83a72653053...59.exe
windows7-x64
103a72653053...59.exe
windows10-2004-x64
1049aca08f5b...24.exe
windows7-x64
1049aca08f5b...24.exe
windows10-2004-x64
104a2ad49c93...9f.exe
windows7-x64
34a2ad49c93...9f.exe
windows10-2004-x64
35199b64b50...3c.exe
windows7-x64
5199b64b50...3c.exe
windows10-2004-x64
55c30024ae...15.exe
windows7-x64
1055c30024ae...15.exe
windows10-2004-x64
1056f7b48f38...59.exe
windows7-x64
1056f7b48f38...59.exe
windows10-2004-x64
105a96b92938...a4.exe
windows7-x64
105a96b92938...a4.exe
windows10-2004-x64
10606b88fce1...c4.exe
windows7-x64
1606b88fce1...c4.exe
windows10-2004-x64
36bda9faf71...4b.exe
windows7-x64
106bda9faf71...4b.exe
windows10-2004-x64
10Analysis
-
max time kernel
129s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2025, 13:01
Static task
static1
Behavioral task
behavioral1
Sample
084c57449c765416706301c723116da5073aa60da415c0eb3013239611135b0e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
084c57449c765416706301c723116da5073aa60da415c0eb3013239611135b0e.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
14b94844b99ac43c014ea73c3400097e3239a7307d1618e84159a741ab0e8ac3.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
14b94844b99ac43c014ea73c3400097e3239a7307d1618e84159a741ab0e8ac3.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
2daa5144081dd288c1dc936ec27b1c8bd709633450ceb73f235fccd1c3d3c62e.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
2daa5144081dd288c1dc936ec27b1c8bd709633450ceb73f235fccd1c3d3c62e.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
2e6f094748124800d8cf6bdb28bb8aa4caa066923cf3e9778dae8bcb2b6e85ec.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
2e6f094748124800d8cf6bdb28bb8aa4caa066923cf3e9778dae8bcb2b6e85ec.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
2e96b55980a827011a7e0784ab95dcee53958a1bb19f5397080a434041bbeeea.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
2e96b55980a827011a7e0784ab95dcee53958a1bb19f5397080a434041bbeeea.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral11
Sample
34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe
Resource
win7-20241023-en
Behavioral task
behavioral12
Sample
34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
49aca08f5b259860364fc224601a944aa17161bb1da688e24621038457472d24.exe
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
49aca08f5b259860364fc224601a944aa17161bb1da688e24621038457472d24.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
4a2ad49c934f9ae6ca6b5d0c7cc34f5e12d349640012fa8cf8eb7e2d3acd6c9f.exe
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
4a2ad49c934f9ae6ca6b5d0c7cc34f5e12d349640012fa8cf8eb7e2d3acd6c9f.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
5199b64b50f678d75f85cb0c3ac97d7df67f23471815e21236b1a790d008fe3c.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
5199b64b50f678d75f85cb0c3ac97d7df67f23471815e21236b1a790d008fe3c.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
55c30024aed833336eb4720a1a4a40c78496efb27b3c4d5c3f1d1b5935c12715.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
55c30024aed833336eb4720a1a4a40c78496efb27b3c4d5c3f1d1b5935c12715.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
56f7b48f3877743c44aef0f3e990b3387dd6185f1c40a7477f5b6bad64960659.exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
56f7b48f3877743c44aef0f3e990b3387dd6185f1c40a7477f5b6bad64960659.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
5a96b929383817aa298eec8cca019bcd984fcd71dd8ee353541392c1082756a4.exe
Resource
win7-20240729-en
Behavioral task
behavioral28
Sample
5a96b929383817aa298eec8cca019bcd984fcd71dd8ee353541392c1082756a4.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral29
Sample
606b88fce1441e6d83e1fb2ba1b511e4a9e68f7fc01c55b7c53e08fd28f9a0c4.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
606b88fce1441e6d83e1fb2ba1b511e4a9e68f7fc01c55b7c53e08fd28f9a0c4.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
6bda9faf719bb7a55e822667d909086193d323d8fa06b1a3d62437fcf6a9e24b.exe
Resource
win7-20250207-en
Behavioral task
behavioral32
Sample
6bda9faf719bb7a55e822667d909086193d323d8fa06b1a3d62437fcf6a9e24b.exe
Resource
win10v2004-20250314-en
General
-
Target
37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe
-
Size
1.3MB
-
MD5
af24c3030002d1487c6455fdb1a09eec
-
SHA1
72732ddefce71c13297df596267260a5d8e892f3
-
SHA256
37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c
-
SHA512
470a0cf695add143555eaa45f3fe5c462edb1cea2cd1589b19f55029b488fae58da2bd588bf79cdb16eeb4518bc7b7189eba764d611d008b1b27145ca0e8a2e3
-
SSDEEP
24576:Auh7HYGSWwFda6lBbXUqcTGKcr5YrcRBlBnNmkE9pneHiAvuQnL1mp/DVmu6KUi0:Dhkkw7LNNmTDqnRmJDx61i0
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 2136 netsh.exe 1200 netsh.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 22 api.my-ip.io 23 api.my-ip.io -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 32 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 2108 37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe 2108 37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe 2108 37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe 2108 37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe 2108 37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe 2108 37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe 2108 37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe 2108 37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe 2108 37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe 2108 37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe 2108 37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe 2108 37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe 2108 37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe 2108 37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe 2108 37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe 2108 37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe 2108 37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe 2108 37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2468 2108 37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe 88 PID 2108 wrote to memory of 2468 2108 37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe 88 PID 2108 wrote to memory of 2468 2108 37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe 88 PID 2468 wrote to memory of 2288 2468 cmd.exe 90 PID 2468 wrote to memory of 2288 2468 cmd.exe 90 PID 2468 wrote to memory of 2288 2468 cmd.exe 90 PID 2288 wrote to memory of 3516 2288 net.exe 91 PID 2288 wrote to memory of 3516 2288 net.exe 91 PID 2288 wrote to memory of 3516 2288 net.exe 91 PID 2108 wrote to memory of 2716 2108 37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe 93 PID 2108 wrote to memory of 2716 2108 37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe 93 PID 2108 wrote to memory of 2716 2108 37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe 93 PID 2108 wrote to memory of 2936 2108 37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe 95 PID 2108 wrote to memory of 2936 2108 37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe 95 PID 2108 wrote to memory of 2936 2108 37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe 95 PID 2108 wrote to memory of 3456 2108 37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe 97 PID 2108 wrote to memory of 3456 2108 37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe 97 PID 2108 wrote to memory of 3456 2108 37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe 97 PID 2108 wrote to memory of 4228 2108 37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe 99 PID 2108 wrote to memory of 4228 2108 37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe 99 PID 2108 wrote to memory of 4228 2108 37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe 99 PID 4228 wrote to memory of 1980 4228 cmd.exe 101 PID 4228 wrote to memory of 1980 4228 cmd.exe 101 PID 4228 wrote to memory of 1980 4228 cmd.exe 101 PID 1980 wrote to memory of 3888 1980 net.exe 102 PID 1980 wrote to memory of 3888 1980 net.exe 102 PID 1980 wrote to memory of 3888 1980 net.exe 102 PID 2108 wrote to memory of 3692 2108 37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe 103 PID 2108 wrote to memory of 3692 2108 37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe 103 PID 2108 wrote to memory of 3692 2108 37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe 103 PID 3692 wrote to memory of 3024 3692 cmd.exe 105 PID 3692 wrote to memory of 3024 3692 cmd.exe 105 PID 3692 wrote to memory of 3024 3692 cmd.exe 105 PID 3024 wrote to memory of 848 3024 net.exe 106 PID 3024 wrote to memory of 848 3024 net.exe 106 PID 3024 wrote to memory of 848 3024 net.exe 106 PID 2108 wrote to memory of 2704 2108 37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe 107 PID 2108 wrote to memory of 2704 2108 37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe 107 PID 2108 wrote to memory of 2704 2108 37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe 107 PID 2704 wrote to memory of 4816 2704 cmd.exe 110 PID 2704 wrote to memory of 4816 2704 cmd.exe 110 PID 2704 wrote to memory of 4816 2704 cmd.exe 110 PID 4816 wrote to memory of 4516 4816 net.exe 111 PID 4816 wrote to memory of 4516 4816 net.exe 111 PID 4816 wrote to memory of 4516 4816 net.exe 111 PID 2108 wrote to memory of 5076 2108 37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe 112 PID 2108 wrote to memory of 5076 2108 37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe 112 PID 2108 wrote to memory of 5076 2108 37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe 112 PID 5076 wrote to memory of 2136 5076 cmd.exe 114 PID 5076 wrote to memory of 2136 5076 cmd.exe 114 PID 5076 wrote to memory of 2136 5076 cmd.exe 114 PID 2108 wrote to memory of 468 2108 37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe 116 PID 2108 wrote to memory of 468 2108 37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe 116 PID 2108 wrote to memory of 468 2108 37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe 116 PID 468 wrote to memory of 1200 468 cmd.exe 118 PID 468 wrote to memory of 1200 468 cmd.exe 118 PID 468 wrote to memory of 1200 468 cmd.exe 118 PID 2108 wrote to memory of 2752 2108 37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe 121 PID 2108 wrote to memory of 2752 2108 37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe 121 PID 2108 wrote to memory of 2752 2108 37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe 121 PID 2752 wrote to memory of 4156 2752 cmd.exe 123 PID 2752 wrote to memory of 4156 2752 cmd.exe 123 PID 2752 wrote to memory of 4156 2752 cmd.exe 123 PID 4156 wrote to memory of 1784 4156 net.exe 124
Processes
-
C:\Users\Admin\AppData\Local\Temp\37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe"C:\Users\Admin\AppData\Local\Temp\37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net stop MSDTC2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SysWOW64\net.exenet stop MSDTC3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSDTC4⤵
- System Location Discovery: System Language Discovery
PID:3516
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c bcdedit /set {default} bootstatuspolicy ignoreallfailures2⤵
- System Location Discovery: System Language Discovery
PID:2716
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c bcdedit /set {default} recoveryenabled no2⤵
- System Location Discovery: System Language Discovery
PID:2936
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c wbadmin delete catalog -quiet2⤵
- System Location Discovery: System Language Discovery
PID:3456
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net stop SQLSERVERAGENT2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Windows\SysWOW64\net.exenet stop SQLSERVERAGENT3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLSERVERAGENT4⤵
- System Location Discovery: System Language Discovery
PID:3888
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net stop MSSQLSERVER2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Windows\SysWOW64\net.exenet stop MSSQLSERVER3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLSERVER4⤵
- System Location Discovery: System Language Discovery
PID:848
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net stop vds2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\net.exenet stop vds3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop vds4⤵
- System Location Discovery: System Language Discovery
PID:4516
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall set currentprofile state off2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall set currentprofile state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2136
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh firewall set opmode mode=disable2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1200
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net stop SQLWriter2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\net.exenet stop SQLWriter3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLWriter4⤵
- System Location Discovery: System Language Discovery
PID:1784
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net stop SQLBrowser2⤵
- System Location Discovery: System Language Discovery
PID:2988 -
C:\Windows\SysWOW64\net.exenet stop SQLBrowser3⤵
- System Location Discovery: System Language Discovery
PID:2432 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLBrowser4⤵
- System Location Discovery: System Language Discovery
PID:4068
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net stop MSSQLSERVER2⤵
- System Location Discovery: System Language Discovery
PID:4532 -
C:\Windows\SysWOW64\net.exenet stop MSSQLSERVER3⤵
- System Location Discovery: System Language Discovery
PID:2800 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLSERVER4⤵
- System Location Discovery: System Language Discovery
PID:1336
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net stop MSSQL$CONTOSO12⤵
- System Location Discovery: System Language Discovery
PID:3200 -
C:\Windows\SysWOW64\net.exenet stop MSSQL$CONTOSO13⤵
- System Location Discovery: System Language Discovery
PID:2372 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$CONTOSO14⤵
- System Location Discovery: System Language Discovery
PID:2776
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\$Recycle.Bin\S-1-5-21-805952410-2104024357-1716932545-1000\desktop.ini.(MJ-BK6531972480)([email protected]).zxc
Filesize404B
MD5ede7fb142d9ec66697e0d115bc4110e2
SHA194075677e04f6a4cc23c16a0c612659121adb7ce
SHA2566014201c836abf68dab2b2c539fd6226d63ee91c23d52afb2935ff939fe0f84f
SHA512a021c60833fd8b8d168216cc8e670ce9c92ebbcc2e0b00c9af14efee4b94691cd352851b6f9d4b6734fafd0ee9b8fbcbb1ee01822882e8aa275c251cd324725b
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\css\main.css.(MJ-BK6531972480)([email protected]).zxc
Filesize64KB
MD581d588eca8f6f8ba976707c506691570
SHA1859d78191a510125f56c88700c13be668b833e95
SHA256958f4e58320adc08c6cca2089e8a6e850a9b5b367a4aecc36631739002ef069b
SHA51226e711f2a58e8a72dd2cbc85e8efb0b6b91a83028390903000faa8ea21820f83618a7b27cdb06f8028c7242abe93a2597aa24cd8f0b18ca700125539f6028d64
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\pdf-ownership-no-text.gif.(MJ-BK6531972480)([email protected]).zxc
Filesize234KB
MD5bd8ab7757d1535511fa6f178a197d149
SHA12438e03bee7c60732213d098da275dce973cbb5b
SHA25637156681cd4958b6185dacecf1f845f094937c7942969f4cf0bc6683b4fde732
SHA51204cb928b2cfcc9f51022e26fb712ea59b1568fa2c6929bb746c40690c7e544af064aa57813e011502594724cf1ad2061306a15a5453d756fa72678933a33b2cd
-
C:\Program Files (x86)\Microsoft\EdgeCore\132.0.2957.140\BHO\ie_to_edge_bho.dll.(MJ-BK6531972480)([email protected]).zxc
Filesize64KB
MD5f2547f59d64b8e8f29fae6f48aead7e4
SHA1f0a9c97956b4a4e443d15f5e8639df73406051fd
SHA25654d7ca24cb4647cdb990c3b244b475c9306c940a75dea354e74e558dbc2bae50
SHA5123483ed288d2fcd2830eebe6aeec1536d8f4263714206f099aa1934d008c40471dadb1de7a18b859efbdb7fff3e9f21173a816747be4410535f77e10ae6074029
-
C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\WidevineCdm\_platform_specific\win_x64\widevinecdm.dll.(MJ-BK6531972480)([email protected]).zxc
Filesize1.5MB
MD58718766654fbadf5b06769cbbce716d8
SHA11d580d7312f711f5c5e8bd77db617b599fe05789
SHA256c7ccd56c61c677e2148828a68858a57e2cb9884ce296e1abc8c90c84e6fd3d73
SHA512cead1dbddf69933bab5bbae50168fdd473fb642a6fd214f16418cbe9fa81ea14eb3dcf3b143afb740770792d37af8c447aa3c456f8c9119fdcedccbe5ab188e4
-
C:\Program Files\7-Zip\descript.ion.(MJ-BK6531972480)([email protected]).zxc
Filesize641B
MD5452193e3d846bc362579c0b9d6ed5957
SHA1bc189bd76c0a2ee739dcf41b2176fd7fd0e83c56
SHA2562f77b90fba7424c72fee96057b87c9d4a6f3fa26ae9b3c1ceb9fa75222b115b8
SHA5126ab86ca89a673d46085fb7500dd42625451d9cf75a7233801b4c176a1e306d8329c85f4a8de77004d1a29b137b23ff43b49f9ac577aec18e32a198ac73f78e41
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\Extensions\external_extensions.json.(MJ-BK6531972480)([email protected]).zxc
Filesize374B
MD55c51f4b63e8c0a521896a47f226015ff
SHA1551947cf3e70989b530a322e63a54f838147e535
SHA2564176106a4863bff134d90a5e5f04ae55f5b515db049811688c89be4e64cb5e1b
SHA512d62ebd9ec34c871472dd3361159d89ee8290f8213b97c9c6c5db9fbfef6babe1885fc7f59ada43bcc1e8567b5e463fef0bf994a76734581376493794bd6f1c50
-
C:\Program Files\Java\jdk-1.8\jre\bin\plugin2\msvcp140.dll.(MJ-BK6531972480)([email protected]).zxc
Filesize558KB
MD53d7ef7bf41736c8319f44ae4e2ec4380
SHA10893d563dfa09343bf623cdaa543d9d88f7d4280
SHA2563c1b214bca310185cc56f63e2d3eece2579aafed48fd0a7deed30b033da2901b
SHA5129efacb37ee91151f2b09ed0236d9df5155e59cc41e66cb01f744a1100bf67979dc659d381ba928e180831341f96f59665e230d96f3798b6c9313120d1593c898
-
C:\Program Files\Java\jdk-1.8\jre\lib\ext\jfxrt.jar.(MJ-BK6531972480)([email protected]).zxc
Filesize1.9MB
MD50a57266b29928a67bfbf54d5b60189fe
SHA120dc782b6a9b052597105270fbb726f10b9e088a
SHA2562cfa4b13c9c058b7e4929323d2cf79936cee5176948fea9e6257ce3cefe5d4d9
SHA512fc2165e6a850a6e159e67b9a8ad215b2fede38fec8c558bf2d61934937dd576b0afd40f60bfd59b22159c2afb0079425c9da40d0369b8c5aa47f5c9921b69af1
-
C:\Program Files\Java\jdk-1.8\legal\javafx\webkit.md.(MJ-BK6531972480)([email protected]).zxc
Filesize320KB
MD535770f7828b97dc02389fcc05916c4f4
SHA166acfe402e357778b04bbfba2cf0b7b585aa210b
SHA25622343171e66996a86a0b855c1fd0c83de6cb3fb1c4a1a811f119ced31b50b45f
SHA5120aaa962b5c9a4cf5dff1f8868de6c7b67d8ab25ff5fe1a5de4afbf605c80db65e931d4b8482d7f30a7bfd3fe597937d80d0086883c8ccc294d4e2110904992a9
-
C:\Program Files\Java\jre-1.8\bin\plugin2\msvcp140.dll.(MJ-BK6531972480)([email protected]).zxc
Filesize558KB
MD5e4c0ca052481783e25c04b87e6f64fea
SHA1745e3a683a624ff977a22d06ed17c3bf0b6b40c8
SHA256fc8779e3150c161db40b18631077c5c3b54edc6ab2866d99826062005852d3e2
SHA512bb5e2e6b3876323ceb3da5fdb00c2aef59c5d839815d7b78e005e2609fed77a117cdccf06a6c5d3bf4ef6828ebf9598aa80f1701e3d104b3cf5a458ed0cb1615
-
C:\Program Files\Java\jre-1.8\lib\jfr.jar.(MJ-BK6531972480)([email protected]).zxc
Filesize561KB
MD58eda254bda6952ca445cdd937a7c50df
SHA14412e0b758aeb0b754cf18aa9b2eba239cf3a736
SHA25697ced149a2be4592f30dcd29735757f96c4cb4a5e1983e5c87cae29d14af638a
SHA5122d8e05968e1bd19faafcbcb5cabc681ed6ab53b3df1bcf3996c6df1225e962e905499ca97936ab069a3e1c013de0e851463a5a1d20cdf5524f0c5afee0c10543
-
C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-0018-0000-1000-0000000FF1CE.xml.(MJ-BK6531972480)([email protected]).zxc
Filesize514KB
MD5d404c5ab47121feda91815dce77bb87d
SHA16a90d39d1a6b5f08e6d7ca98e607253194b4ac79
SHA2566800df7a6b95fc247d19a4cd241382275d0bd2e507b2ea8996f9e41b7757356e
SHA512ca674ef47c61f7bb10afcc80be22a10e443ec5ed03fa822095797b06459349083b70e1023b8f8f1d780bbdf9ccbd3842a2f0e9a05ca9c381c8200a0271d2429f
-
C:\Program Files\Microsoft Office\root\Client\AppVLP.exe.(MJ-BK6531972480)([email protected]).zxc
Filesize496KB
MD547f42dbd4624b7b7be5e70425df05c38
SHA1a3cbdb77bf8853e42602f2065bfcec71123bc07e
SHA25699943785bd63b0fb87a5b4f1f0a4fff392616b7941d135f07e6c711f4cefea8b
SHA51253fd51e754aa3b71f2abf91b589aad9da2dbcaba684c2ea6926b44c6dae287d62028e33bf323ad0ad7ab78a6efd5aad76892f7cf51e0f272a455d589fd5589e8
-
C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Effects\Glossy.eftx.(MJ-BK6531972480)([email protected]).zxc
Filesize327KB
MD5489b4e57c8d9cc3546905decb47329e1
SHA1ebea5dde8d988e6fdae940b6ee102b235a5dfa8f
SHA256af677512a66741b85a0c60308f0327db0c935324f2c9027b9a8fd1e6ad6fa8e8
SHA512bac9d25e6794397bdded06fe115df3d0e80890d2db959d7f45098f04624db4eb6f4825924e321733c9df649943b7fea9c4c5ab65957d3571f47f56a8590df0a6
-
C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Effects\Grunge Texture.eftx.(MJ-BK6531972480)([email protected]).zxc
Filesize344KB
MD52c2bc16bd360da961342748bb732a9bd
SHA115d35abd4e37ad327279d86b5b2072388cddeef4
SHA2562d1de6b9aa1958f2abaa689fc0375997a7f156e4fddb29c5ca82c80aafb96747
SHA512b86c6527e598a52ab7a3967df6ac446f4a0178027b918f9d8ca5d85f489c271391c1ad74e476237b9daac16ed2244d205a97dc92c4b2373cb5df84a276803dd4
-
C:\Program Files\Microsoft Office\root\Integration\C2RManifest.office32ww.msi.16.x-none.xml.(MJ-BK6531972480)([email protected]).zxc
Filesize331KB
MD5270b1fce8eca0c2d9d92698658f719d4
SHA1a5edbf4a56bb786bfc7b5a7cbcaf55d9f680e09c
SHA256fcea038fd7d0c43e5474eb33ba69409627ebb04d55a6c65d92799a8367f18d06
SHA512cb6546b4d128f66c862ea99f15f15684f2879753aad7ed054a19bb45601c2c0b8e7e49c792feccce6796575b6b7d68423aed3346a06143e42df7e6e53f5c22c6
-
C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Microsoft.Data.ConnectionUI.Dialog.dll.(MJ-BK6531972480)([email protected]).zxc
Filesize320KB
MD5dd227d5b95c111bb852bb33e875e6d78
SHA157cf60e3634a677c04b339fde4f4992400449905
SHA256e7f4d8c8fd63716763cfcc4a77c30c5bae8666308964dda705a2eee86963b9f4
SHA5128dfcce1123604c353215cac5cc65a13c2ad24b5a5faf7b82c6341b61756b33e960b955141f05f8f7c9c52ec081213b934bf700ab88d537a148a56981b79fbac3
-
C:\Program Files\Microsoft Office\root\Office16\JitV.dll.(MJ-BK6531972480)([email protected]).zxc
Filesize415KB
MD53a95171a00932a5d2463d8b6e63f2ffe
SHA1121507c0c9ab4d71cd57b25a4d3719fe31387782
SHA2564478b0a2f1957d38b8557d962449dea238c75e92163a52945ff4994082e79932
SHA51265f7934db7bf3510889825fd3b025473c49499353f32b23899e40385e52695781dc1a45f219e18b094056884278003498e3e36ef349b187b24dcc1da88f128cd
-
C:\Program Files\Microsoft Office\root\Office16\MSOSYNC.EXE.(MJ-BK6531972480)([email protected]).zxc
Filesize384KB
MD5909b7cca29a62bdc23cbc5d880480d67
SHA1c3d9bfdf54342847a26a269bca7c012d0c2832ba
SHA25664ff96220cd028804c862aaebfeedbb7f7f60ccf5df11a554ef4c8b382b98e3b
SHA51272de66f801b926698b77fbfc600a4530be76e8ea9eb8d131b6c18f6cff05f5f17360f83a806322bc1a355071e6916339de7ad4d2a0ea6a0cacec939c31120924
-
C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL075.XML.(MJ-BK6531972480)([email protected]).zxc
Filesize691KB
MD50be48b20b48d3b73bebdac504aec8443
SHA1c68c34c921212d23863fae1b517093dd3b9dabc6
SHA25692fc067f78d07a8a238d1ec0e2271da9fcbcddc66be1f745653d95c91236161e
SHA5128ebfe05da38fd2f72bd7c3c154f6d983baa9029dac2b2b6a497a44dec57bc13658677ada9f73a4738319d75044a22a718bb1487ca97183c3bb4c1a95213c0fae
-
C:\Program Files\Microsoft Office\root\rsod\excel.x-none.msi.16.x-none.boot.tree.dat.(MJ-BK6531972480)([email protected]).zxc
Filesize278KB
MD5d8f3fcf1fb42e13aebaddf2dbd70725c
SHA1b2e220ea44e4b7c089f87c8e50a57a7c35ba1b33
SHA25656105e5ab366e726fbf339a61603feabe9dc6c6fe2b2bfce3cc7bf1f54912688
SHA5128dbde6a63f6f166b694689fe8573fe5779dc1a58343d752339d17e653f2bef6c0ea75ebcf0423ce0219fa8e19c28b243204f7653c96ef433e286705ebac9f34b
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\System\ole db\xmlrw.dll.(MJ-BK6531972480)([email protected]).zxc
Filesize326KB
MD53b23757f0869a5ab30929be088fe301a
SHA1ee1c77f3ca7d4c3597089b7195974f9572af19ba
SHA256ec9f3c4f4b50c54d0691804f947c5562c2a521a15d0cd230361daef6f455df4c
SHA512c744ccbbd59c9f349dcf8a95944c4ee82590ff271b6c6b5f0889424118c29400ecef705a61d0d2c8a6e27c492fd87b7880773e50acbf883e48b4337a3c2cf2da
-
C:\Program Files\Mozilla Firefox\ipcclientcerts.dll.(MJ-BK6531972480)([email protected]).zxc
Filesize204KB
MD56692d16c1c89ad797aa9889b9a9385d8
SHA185f642a5e00bb30685361b027b7a5c410fe8a8c0
SHA2569f700ce83fdad4309b4de2186ce741eb21804cef10373ab94b0db441cc675064
SHA512a3fe34feb7cdb4b19032b4c462d5e2ea1da9a70e48f0791b413ebdf362afdb10b5b9f999f5da64a9dd708fd3352f3cc9e049d1e155f8af6d05a1a3312460eb24
-
C:\Program Files\ProtectOptimize.css.(MJ-BK6531972480)([email protected]).zxc
Filesize635KB
MD52aabb764769d5e30873669ea493b2779
SHA16ea80d024adc7731b7ce921f92a0d95aa99e9df2
SHA256791592a0dc59c69b23eff67697753d17f13f780903a8b6823f2ce0f9d9a2da5d
SHA512b62d6090b9e7e2b98fc7f43f183d73361f28bccbcde53c4cb47ed311c3882e29750625885f448b99fa8ff6219cb38a2ba1dbef5d1670193eeb92dfd28f4f11c4
-
C:\Program Files\VideoLAN\VLC\plugins\video_output\libdirect3d11_plugin.dll.(MJ-BK6531972480)([email protected]).zxc
Filesize128KB
MD50fc5458adb0a324486059d0c66c29cea
SHA120bcdeace1c1f1fafac752ad38240f99074af23c
SHA2566db27df94febd1a3fe6b690bc88bd8054408ef4edb7195529ddbe9f83a8454ea
SHA512a0d61f1233fd70d75e1c3b5e854c419dfa12e9125c46823ad13b1566a06937de719cde61f557c352c7eb5c0015fb1e9f7428476b57d7834b9d99bbf2677de5b5
-
C:\Program Files\VideoLAN\VLC\plugins\video_output\libglwin32_plugin.dll.(MJ-BK6531972480)([email protected]).zxc
Filesize128KB
MD5d785f8b2f7db18bc373c634fb84600ca
SHA18aa31f0f248d48d7c1bf069aee4d3d32944bc8f4
SHA2562c4da509c5b56ba39cbafed516ab27ec990afd08b8b9a3dcf82b2371555ad277
SHA51207748c3954173e30bf24d2c93cd562ec1619192d51851b9970835a316614531e10b8e2864c329a4f6cccbc686d5fae5463da540d1cdae0ad49c172e3c54b25b0
-
C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Formats.Asn1.dll.(MJ-BK6531972480)([email protected]).zxc
Filesize193KB
MD5948c46dc329a94e5abdd08dab03496d1
SHA1639dd19737db1794bdf9ca0324ff02f897a4c5aa
SHA25600f1961143b8c2270247e5825a98faa74b183a0c389f4b9b3d525ea06fccfa5c
SHA512f19d493ffaeb949b61827cc85ecc3c5bf7d8b9d4e9a937b3c70537a25329517ede0342ce3da1d11766d66d3f34dd32759341f73e333343682a07b8ffd6714c97
-
C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\mscordbi.dll.(MJ-BK6531972480)([email protected]).zxc
Filesize1.2MB
MD53ae1dfac97a0966f92fb8a3bfc8fe59f
SHA1aae6f2d5a20c0a57162f68ca95498b64b15d41ea
SHA2565d13beb3d0a339949c588cdcba3fa6fdccb2e6e5231a7b2828903926640ecf46
SHA51256ef7afa903d5d9af1b017716ec0404e4404c4c0b6c8b2a509e8df4412f6d9b9ff2f9d7ff625bdbeb8eea948134a9e64370c3def4da2d35c11eeebd68a50e106
-
C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Private.Xml.dll.(MJ-BK6531972480)([email protected]).zxc
Filesize2.1MB
MD500069403802ad9c525bf326e7bc4685c
SHA1c9fa67d9f029cd4beff1b445159986ff02c6c1ef
SHA256c08ca6218f30fc3e762fe492a7bfd5865cc38251387dc9cbd192e66df808395f
SHA51254020b2203c229f3a51e1d6e2f9817e85c5d3ae3c2b1b43d944f99ae6f3a502566c66792a7926646c50d26e4336b9d2a103ef56c72187cd5a12ed608bbc78925
-
C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\msquic.dll.(MJ-BK6531972480)([email protected]).zxc
Filesize477KB
MD54c01dbc3aa136d8a6a6d01417b822649
SHA1a7b2c0daa1840afb56f28085ae65df99689ec2aa
SHA25613e13febeed684f77830fd359a4384e96e97889bcecce0424d0cf631450185a4
SHA51226112151884aa9f148e3443e11d96f23be89b24fa21bc4d93afecf7b45302437b19f41e0ec152c4178989db6ac37aedf2a1df2c1ff9a99ca81c99c432de4ae85
-
C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Net.WebSockets.dll.(MJ-BK6531972480)([email protected]).zxc
Filesize186KB
MD5752761fd2a46b01810013405f44e33d6
SHA1beb44ea3f6ac9b86ad4551b52e746235eb663033
SHA256ea000a0e5c5fa50d3d21206bdcdcb097a6c9b9524f040cbd6db9a82f059597fa
SHA512a15de28ef45a57246602c8b3b4ad0d82ca942c5d70b8cd256b3ba5578ab3c194381679242f58479a05d3f7ca32fafcde4d17b632bc1ef9551f6f647f6376b776
-
C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Security.Principal.Windows.dll.(MJ-BK6531972480)([email protected]).zxc
Filesize182KB
MD56bd24924f96c5199ee1eb259327b8497
SHA1ce87560cf296fb03d0ddc4acd1ba176289ac12b2
SHA256c6916ca23a6b25646b9cc8c9823fca001bc02e60b5630f7ae841be22a36c6853
SHA512e8b5ef6a911b80d572fd46d8ba3fcdcae89ec17dffb2aa6813a8465e7d16918fb3f890fecdc61b68efac5d77700ab33812a7e11b17a0d1bc788e10397504677a
-
C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\System.Xaml.dll.(MJ-BK6531972480)([email protected]).zxc
Filesize1.4MB
MD5b60bcb80312e09354e27290abfc582fb
SHA1441fd9990ee3aa7695700d9c27dfab70afd4a774
SHA256b8ceb8489db472355e453b4fe72f8a04909ba7fb4d795044ab22748d8a4f4758
SHA512b3d486099e63be2aeda848f413e6c548b5bcc872308c413f5ff48f37ef820e0d85393bc2f7769b936083da1bf357615eb6de884c0326ba0a1a47e89a77e820ee
-
C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\DirectWriteForwarder.dll.(MJ-BK6531972480)([email protected]).zxc
Filesize514KB
MD56ed15b6d0615fb01bf17f6ae93b1b459
SHA12b196ed853b9d6b3664b1443ceb39272f5135de7
SHA256e2ae278c0d8c8a7d092ab22b5e955b4e05ea3f4a281dbbeae7841590536dea8f
SHA51232b0283281a125a12beebbcd5328f6844170278dfc583b5fc2409fa0280aa6f6611bb1e1ef1b7a5f8f2c137f12c0986dd153379ab65639ac5245c8a7c1d84945
-
C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\zh-Hans\System.Windows.Forms.resources.dll.(MJ-BK6531972480)([email protected]).zxc
Filesize312KB
MD5a070135114c3e156d6d32cb6b10ac012
SHA12e73b487627a08488709766cfa59c1699eabd699
SHA256c23933f7f0b689a7040951ded30400646c4ae3ddfb468da9127f22bcf2c92e99
SHA5127684dbf65526ebd72d437ea66d2c23f3ddef23407548b40f87a36b772f0c429b34789995d601f8c4ed45c70c9cc87837808e76f68ea7e0b432d6c4334ae1dcbe
-
C:\ProgramData\Microsoft\ClickToRun\MachineData\Catalog\Packages\{9AC08E99-230B-47E8-9721-4577B7F124EA}\{1A8308C7-90D1-4200-B16E-646F163A08E8}\Manifest.xml.(MJ-BK6531972480)([email protected]).zxc
Filesize21KB
MD54ee32de0eea83a60e33636e2c36479e4
SHA10344272d0788efee3961bc799028915ca1c76e86
SHA2567550c97fe0e0b71923a161a678603c9c0fc9e93bf424f11ea112edfb660825b8
SHA5120a1d5f25e93653f9be0095e24b6a9bb1d3186895d1078b55795fa39c10d6f4e9e520c89c54c20944f943690bef4598a75566ff03c60a77eb484479f09ffeee05
-
C:\ProgramData\Microsoft\Windows\Caches\{6AF0698E-D558-4F6E-9B3C-3716689AF493}.2.ver0x0000000000000002.db.(MJ-BK6531972480)([email protected]).zxc
Filesize289KB
MD5713c1173b3eb8497a8b408c693c99e4e
SHA1c7fb1bb1d5f93990c9f9a20b1faed9461ebe615c
SHA2560ec4b4b0b2e255dae496f35e8f81d1f0cfca037c393d734db6d13703d5226971
SHA5122d5f702ffa3f6bfb8ec63471a3074307babbda34fbd614fa9532c1abe8687a23e7759265453924ba923743cfdad09cfa4dc594f1e1595846ca8015d331b368a9
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe.(MJ-BK6531972480)([email protected]).zxc
Filesize79KB
MD57d96d77ca9766d1305b07b82447b8d47
SHA16f508c2207239336eb38301200000109ec46ee2e
SHA2562defaa513cd1d97b7387891e065ca0cb5fc545e6c2ac07ef1820549d9ed99c8a
SHA512162615c057cde6c98e809d6f847238468ba87a47e13e586682c78454b8dba8fa5bb3f8c65a938a43ebe52d36e5077daeb0e2d57dbd4d96c7c493b3265be6bbcd
-
Filesize
1KB
MD58bc5abf02e24755cf46bfc97e3d52052
SHA11db87723f86acb1fc7847bdc6e6a768170d6165a
SHA2567d3867c84102a4f1086aed27d166f26262a5c1b2299c13007de4998dca89baef
SHA5128dd6000cd06ba9f1626bcbb0b8258161072a7d084f3b003fc341314105864cbbf3b2f4d928f8bbe98c40ae654d38c8d3984ad39a12457e1db807f56a734e04b1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_000008.(MJ-BK6531972480)([email protected]).zxc
Filesize21KB
MD53889a922acfbb9434f30aca6670c46a7
SHA1daf0013bd8228c8c80f8ffdc7b3bc9f3632f2295
SHA25621b97a0f0b1eb8c204053d600cf98125dc5064be05888b36ee5e276a11e95295
SHA5125908a8cbc527b52b5939b6051d53636cbc6cc9435d94677c889e38011008c139e33103c1d89a0f16e7f606959d71f45fda40c4a0d2a385cee0adca849134abd8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\History.(MJ-BK6531972480)([email protected]).zxc
Filesize192KB
MD51a02c3a8f488d85613e4163183b43762
SHA1edb98122b4ea9ffb47916be42fdb1f769b277104
SHA2561ddf985b8fa148b96765f395d228325ac710b3f6986c51b10429cb307743658a
SHA512122c4b2b6ec8ab47cebe6fe47b6015c628b651c6fefa00c9ff13c5fe5508763a40bd9e0425af010bde2761906c667b509cdfa9212cd5d75bf7020c919f84c6fb
-
C:\Users\Admin\Pictures\ResizeSuspend.crw.(MJ-BK6531972480)([email protected]).zxc
Filesize128KB
MD5d98e8457f8f639575b5a0cd4afd2513f
SHA1f0ac814baa0b7faf104b948a91689a275530bf63
SHA25642f58d8a9c870c4bc22d6a55e124cb480f8aa9003610c924f6942cff3f9fec2c
SHA512847ae485123d75f39649cf663a265702167f6363522b4c0b835cb88a5aca13a95e876881b345ac1614e87c94117838da4f1aa088506128262266b70626231bc4
-
C:\Users\Admin\Pictures\WatchMeasure.raw.(MJ-BK6531972480)([email protected]).zxc
Filesize128KB
MD5f7192cfbed9a6ab91c4d68889725a493
SHA1f4badf0b7cd40722c3f7acb7f5bc6b6cd2651a4a
SHA25614752de6cf26b8874d9b9bd29847725781138accf277dc4c292ee318b4f5408a
SHA512b261c5f9c824709aefc86d1d8472c2c0bdd5ab2460c43549d74157914d120b39be7ccc934b7a8f5ebc87fb0479b418ef5ec41f579c2e316fc5212abfef981cc8
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
C:\d9c22b4eaa3c0b9c12c7\2010_x64.log.html.(MJ-BK6531972480)([email protected]).zxc
Filesize85KB
MD54807922a0a299431fc03dd1a9a434015
SHA12c77cb07f083d2b209fa6f1a8f5a94e7b9958c73
SHA256a2a6a2185c58327d90c7062ebbb62397e21c93baad1aaf1d37d8822e55ee0478
SHA5127474e38350d5721f46d4d02966ef1e8d484a105c52653a52a85cf089bb3f4116a73a98128e2d681cc30515f6df035b27a0373de07b549bcf70023747ab2d90c4
-
C:\dfe2e59cddd00040f555dab607351a1d\2010_x86.log.html.(MJ-BK6531972480)([email protected]).zxc
Filesize81KB
MD5e1d2dbbd64a278ca56038048a8ed7d8c
SHA19877b448b7627afd0336a80815237bcb13ddf1bf
SHA25669a188c10d428c40ca0f8f32abadd3cabccb250bc50141db38e435b578188b71
SHA512f63a8c6ae8e7282c852e254637121d71cf4000de02af28d699ff1eebca546f8a85f05e3b72054f27bff4876d2f0ebf7ae336d317b8ee1717e771d6bde1a27c9e