Analysis
-
max time kernel
279s -
max time network
282s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
16-02-2023 06:41
Static task
static1
Behavioral task
behavioral1
Sample
7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe
Resource
win10v2004-20220812-en
General
-
Target
7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe
-
Size
6.7MB
-
MD5
ae242bd1226aaa270e2e167c252c4555
-
SHA1
850aed65c3efce9090b4b6552075af3bc57e0659
-
SHA256
7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78
-
SHA512
1c2ae75fe6017957323251d3d8004e41e1f81e3c3c5dba23aecf3902d47e922b731b2ca7232e04d228b7c402140352c75ca77e88afb9de76688cf7b40abd0fa6
-
SSDEEP
98304:is5DZoRvVmqkGpsV7Owx7FYhX4vs/6uur+GZIB6TPgV6Vf4YiYcHR4cLJpB/EO:v+RvV9kGMxF8Es/6uCdZXF0N6AJrL
Malware Config
Signatures
-
Downloads MZ/PE file
-
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\HpSvc\Parameters\ServiceDll = "C:\\Program Files (x86)\\Ludashi\\lpi\\HpSvc.dll" ComputerZTray.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\HpSvc\ImagePath = "%SystemRoot%\\System32\\svchost.exe -k netsvcs" ComputerZTray.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ComputerZService.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate ComputerZService.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation ComputerZTray.exe -
Executes dropped EXE 21 IoCs
pid Process 2448 LdsHelper.exe 3540 ComputerZTray.exe 4752 computercenter.exe 2332 ComputerZService.exe 4556 dll_service.exe 5028 dll_service.exe 4260 dll_service.exe 1316 dll_service.exe 980 ComputerZService_x64.exe 1928 hdw_disk_scan.exe 440 ComputerZ_CN.exe 1744 web_host.exe 4456 CefView.exe 3444 CefView.exe 4868 ComputerZ_CN.exe 4844 ComputerZ_CN.exe 1772 ComputerZ_CN.exe 1380 web_host.exe 4780 CefView.exe 1152 CefView.exe 1360 CefView.exe -
Loads dropped DLL 64 IoCs
pid Process 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 2448 LdsHelper.exe 3540 ComputerZTray.exe 3540 ComputerZTray.exe 3540 ComputerZTray.exe 3540 ComputerZTray.exe 3540 ComputerZTray.exe 3540 ComputerZTray.exe 3540 ComputerZTray.exe 3540 ComputerZTray.exe 3540 ComputerZTray.exe 3540 ComputerZTray.exe 3540 ComputerZTray.exe 3540 ComputerZTray.exe 4860 svchost.exe 4860 svchost.exe 4752 computercenter.exe 4752 computercenter.exe 4752 computercenter.exe 3540 ComputerZTray.exe 4752 computercenter.exe 4752 computercenter.exe 2332 ComputerZService.exe 2332 ComputerZService.exe 4752 computercenter.exe 4752 computercenter.exe 4752 computercenter.exe 4752 computercenter.exe 4752 computercenter.exe 4752 computercenter.exe 4752 computercenter.exe 4752 computercenter.exe 4752 computercenter.exe 3540 ComputerZTray.exe 3540 ComputerZTray.exe 4860 svchost.exe 2332 ComputerZService.exe 4556 dll_service.exe 5028 dll_service.exe 4260 dll_service.exe 1316 dll_service.exe 980 ComputerZService_x64.exe 440 ComputerZ_CN.exe 440 ComputerZ_CN.exe 1744 web_host.exe 1744 web_host.exe 1744 web_host.exe 1744 web_host.exe 4456 CefView.exe 3444 CefView.exe 4868 ComputerZ_CN.exe 4868 ComputerZ_CN.exe 4844 ComputerZ_CN.exe 1772 ComputerZ_CN.exe 1380 web_host.exe 1380 web_host.exe 1380 web_host.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: ComputerZService.exe File opened (read-only) \??\L: ComputerZService.exe File opened (read-only) \??\M: ComputerZService.exe File opened (read-only) \??\S: ComputerZService.exe File opened (read-only) \??\Z: ComputerZService.exe File opened (read-only) \??\E: ComputerZService.exe File opened (read-only) \??\I: ComputerZService.exe File opened (read-only) \??\P: ComputerZService.exe File opened (read-only) \??\V: ComputerZService.exe File opened (read-only) \??\Y: ComputerZService.exe File opened (read-only) \??\F: ComputerZService.exe File opened (read-only) \??\G: ComputerZService.exe File opened (read-only) \??\K: ComputerZService.exe File opened (read-only) \??\O: ComputerZService.exe File opened (read-only) \??\T: ComputerZService.exe File opened (read-only) \??\U: ComputerZService.exe File opened (read-only) \??\A: ComputerZService.exe File opened (read-only) \??\J: ComputerZService.exe File opened (read-only) \??\N: ComputerZService.exe File opened (read-only) \??\Q: ComputerZService.exe File opened (read-only) \??\R: ComputerZService.exe File opened (read-only) \??\W: ComputerZService.exe File opened (read-only) \??\X: ComputerZService.exe File opened (read-only) \??\B: ComputerZService.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 12 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 ComputerZ_CN.exe File opened for modification \??\PhysicalDrive0 web_host.exe File opened for modification \??\PhysicalDrive0 ComputerZ_CN.exe File opened for modification \??\PhysicalDrive0 ComputerZService.exe File opened for modification \??\PhysicalDrive0 hdw_disk_scan.exe File opened for modification \??\PhysicalDrive0 ComputerZ_CN.exe File opened for modification \??\PhysicalDrive0 ComputerZ_CN.exe File opened for modification \??\PhysicalDrive0 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe File opened for modification \??\PhysicalDrive0 LdsHelper.exe File opened for modification \??\PhysicalDrive0 ComputerZTray.exe File opened for modification \??\PhysicalDrive0 computercenter.exe File opened for modification \??\PhysicalDrive0 web_host.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Ludashi\Utils\cef\locales\es-419.pak 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe File created C:\Program Files (x86)\Ludashi\Utils\cef\locales\he.pak 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe File created C:\Program Files (x86)\Ludashi\Utils\cef\locales\id.pak 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe File opened for modification C:\Program Files (x86)\Ludashi\Utils\cef\locales\ja.pak 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe File created C:\Program Files (x86)\Ludashi\Utils\cef\locales\sv.pak 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe File opened for modification C:\Program Files (x86)\Ludashi\CustDev.dat ComputerZTray.exe File created C:\Program Files (x86)\Ludashi\Utils\cef\cef.pak 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe File created C:\Program Files (x86)\Ludashi\Utils\cef\locales\el.pak 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe File created C:\Program Files (x86)\Ludashi\Utils\cef\locales\lt.pak 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe File created C:\Program Files (x86)\Ludashi\Utils\cef\locales\nb.pak 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe File created C:\Program Files (x86)\Ludashi\Utils\cef\locales\pl.pak 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe File opened for modification C:\Program Files (x86)\Ludashi\ComputerZ.set LdsHelper.exe File opened for modification C:\Program Files (x86)\Ludashi\Computerz.set ComputerZService.exe File opened for modification C:\Program Files (x86)\Ludashi\Utils\cef\locales\bg.pak 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe File opened for modification C:\Program Files (x86)\Ludashi\Utils\cef\locales\nb.pak 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe File created C:\Program Files (x86)\Ludashi\Utils\cef\snapshot_blob.bin 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe File opened for modification C:\Program Files (x86)\Ludashi\HardwareProtect.sys 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe File created C:\Program Files (x86)\Ludashi\HardwareProtect_x64.sys 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe File created C:\Program Files (x86)\Ludashi\{F9C87131-78E9-40ea-B87F-3F1C4E74F7A2}.tf 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe File opened for modification C:\Program Files (x86)\Ludashi\Utils\cef\locales\fil.pak 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe File opened for modification C:\Program Files (x86)\Ludashi\Utils\cef\locales\sr.pak 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe File created C:\Program Files (x86)\Ludashi\{C197777F-A774-4303-8F29-6A3FC5C9B787}.tf 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe File created C:\Program Files (x86)\Ludashi\Utils\cef\locales\sr.pak 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe File created C:\Program Files (x86)\Ludashi\Utils\cef\version.txt 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe File opened for modification C:\Program Files (x86)\Ludashi\Utils\cef\locales\hr.pak 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe File opened for modification C:\Program Files (x86)\Ludashi\Utils\cef\locales\fi.pak 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe File created C:\Program Files (x86)\Ludashi\Utils\cef\locales\fr.pak 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe File created C:\Program Files (x86)\Ludashi\Utils\cef\locales\hu.pak 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe File opened for modification C:\Program Files (x86)\Ludashi\Utils\cef\locales\hu.pak 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe File opened for modification C:\Program Files (x86)\Ludashi\Utils\cef\locales\sl.pak 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe File created C:\Program Files (x86)\Ludashi\Utils\cef\libGLESv2.dll 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe File opened for modification C:\Program Files (x86)\Ludashi\Utils\cef\locales\ar.pak 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe File opened for modification C:\Program Files (x86)\Ludashi\Utils\cef\locales\hi.pak 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe File created C:\Program Files (x86)\Ludashi\Utils\cef\locales\ru.pak 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe File opened for modification C:\Program Files (x86)\Ludashi\updatecfg.ini 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe File opened for modification C:\Program Files (x86)\Ludashi\Utils\cef\locales\gu.pak 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe File opened for modification C:\Program Files (x86)\Ludashi\Utils\cef\locales\ko.pak 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe File created C:\Program Files (x86)\Ludashi\Utils\cef\locales\sk.pak 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe File created C:\Program Files (x86)\Ludashi\Utils\cef\locales\zh-TW.pak 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe File created C:\Program Files (x86)\Ludashi\Utils\cef\widevinecdmadapter.dll 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe File opened for modification C:\Program Files (x86)\Ludashi\Utils\cef\locales\kn.pak 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe File opened for modification C:\Program Files (x86)\Ludashi\CustDev.dat-journal ComputerZTray.exe File created C:\Program Files (x86)\Ludashi\Utils\cef\locales\mr.pak 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe File created C:\Program Files (x86)\Ludashi\Utils\cef\locales\te.pak 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe File opened for modification C:\Program Files (x86)\Ludashi\Utils\cef\locales\vi.pak 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe File created C:\Program Files (x86)\Ludashi\Utils\cef\locales\ko.pak 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe File opened for modification C:\Program Files (x86)\Ludashi\Utils\cef\locales\bn.pak 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe File opened for modification C:\Program Files (x86)\Ludashi\Utils\cef\locales\de.pak 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe File created C:\Program Files (x86)\Ludashi\Utils\cef\locales\ml.pak 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe File opened for modification C:\Program Files (x86)\Ludashi\Utils\cef\locales\ro.pak 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe File opened for modification C:\Program Files (x86)\Ludashi\ComputerZ.set 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe File opened for modification C:\Program Files (x86)\Ludashi\Log\ComputerZ_HardwareDll.log dll_service.exe File opened for modification C:\Program Files (x86)\Ludashi\Utils\cef\cef_200_percent.pak 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe File created C:\Program Files (x86)\Ludashi\Utils\cef\locales\cs.pak 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe File created C:\Program Files (x86)\Ludashi\Utils\cef\locales\en-US.pak 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe File opened for modification C:\Program Files (x86)\Ludashi\Utils\cef\locales\en-US.pak 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe File created C:\Program Files (x86)\Ludashi\Utils\cef\locales\es.pak 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe File created C:\Program Files (x86)\Ludashi\Utils\cef\locales\hi.pak 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe File opened for modification C:\Program Files (x86)\Ludashi\Utils\cef\locales\it.pak 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe File created C:\Program Files (x86)\Ludashi\Utils\cef\locales\lv.pak 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe File opened for modification C:\Program Files (x86)\Ludashi\Utils\cef\LICENSE.txt 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe File created C:\Program Files (x86)\Ludashi\Utils\cef\locales\ms.pak 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe File created C:\Program Files (x86)\Ludashi\Utils\cef\locales\gu.pak 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe File opened for modification C:\Program Files (x86)\Ludashi\Utils\cef\locales\sv.pak 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\INF\c_media.PNF ComputerZService.exe File created C:\Windows\INF\c_display.PNF ComputerZService.exe File created C:\Windows\INF\c_monitor.PNF ComputerZService.exe File created C:\Windows\INF\c_diskdrive.PNF ComputerZService.exe File created C:\Windows\INF\c_volume.PNF ComputerZService.exe File created C:\Windows\INF\c_processor.PNF ComputerZService.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 18 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags ComputerZService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName ComputerZService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName ComputerZService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 ComputerZService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 ComputerZService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Service ComputerZService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID ComputerZService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\DeviceDesc ComputerZService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs ComputerZService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Service ComputerZService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID ComputerZService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Driver ComputerZService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags ComputerZService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\CompatibleIDs ComputerZService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Mfg ComputerZService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Driver ComputerZService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Mfg ComputerZService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\DeviceDesc ComputerZService.exe -
Enumerates system info in registry 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS ComputerZService.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BIOSReleaseDate ComputerZService.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BIOSVendor ComputerZService.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BIOSVersion ComputerZService.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosDate ComputerZService.exe -
Modifies data under HKEY_USERS 41 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs svchost.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 04000000010000001000000087ce0b7b2a0e4900e158719b37a893720f00000001000000140000006dca5bd00dcf1c0f327059d374b29ca6e3c50aa6530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b060105050703086200000001000000200000003e9099b5015e8f486c00bcea9d111ee721faba355a89bcf1df69561e3dc6325c14000000010000001400000045eba2aff492cb82312d518ba7a7219df36dc80f0b00000001000000120000004400690067006900430065007200740000001d00000001000000100000004f5f106930398d09107b40c3c7ca8f1c0300000001000000140000000563b8630d62d75abbc8ab1e4bdfb5a899b24d43190000000100000010000000749966cecc95c1874194ca7203f9b6202000000001000000bb030000308203b73082029fa00302010202100ce7e0e517d846fe8fe560fc1bf03039300d06092a864886f70d01010505003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ad0e15cee443805cb187f3b760f97112a5aedc269488aaf4cef520392858600cf880daa9159532613cb5b128848a8adc9f0a0c83177a8f90ac8ae779535c31842af60f98323676ccdedd3ca8a2ef6afb21f25261df9f20d71fe2b1d9fe1864d2125b5ff9581835bc47cda136f96b7fd4b0383ec11bc38c33d9d82f18fe280fb3a783d6c36e44c061359616fe599c8b766dd7f1a24b0d2bff0b72da9e60d08e9035c678558720a1cfe56d0ac8497c3198336c22e987d0325aa2ba138211ed39179d993a72a1e6faa4d9d5173175ae857d22ae3f014686f62879c8b1dae45717c47e1c0eb0b492a656b3bdb297edaaa7f0b7c5a83f9516d0ffa196eb085f18774f0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041445eba2aff492cb82312d518ba7a7219df36dc80f301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f300d06092a864886f70d01010505000382010100a20ebcdfe2edf0e372737a6494bff77266d832e4427562ae87ebf2d5d9de56b39fccce1428b90d97605c124c58e4d33d834945589735691aa847ea56c679ab12d8678184df7f093c94e6b8262c20bd3db32889f75fff22e297841fe965ef87e0dfc16749b35debb2092aeb26ed78be7d3f2bf3b726356d5f8901b6495b9f01059bab3d25c1ccb67fc2f16f86c6fa6468eb812d94eb42b7fa8c1edd62f1be5067b76cbdf3f11f6b0c3607167f377ca95b6d7af112466083d72704be4bce97bec3672a6811df80e70c3366bf130d146ef37f1f63101efa8d1b256d6c8fa5b76101b1d2a326a110719dade2c3f9c39951b72b0708ce2ee650b2a7fa0a452fa2f0f2 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\91C6D6EE3E8AC86384E548C299295C756C817B81 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\91C6D6EE3E8AC86384E548C299295C756C817B81\Blob = 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 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\91C6D6EE3E8AC86384E548C299295C756C817B81\Blob = 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 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 2448 LdsHelper.exe 2448 LdsHelper.exe 3540 ComputerZTray.exe 3540 ComputerZTray.exe 3540 ComputerZTray.exe 3540 ComputerZTray.exe 3540 ComputerZTray.exe 3540 ComputerZTray.exe 3540 ComputerZTray.exe 3540 ComputerZTray.exe 2332 ComputerZService.exe 2332 ComputerZService.exe 4860 svchost.exe 4860 svchost.exe 4752 computercenter.exe 4752 computercenter.exe 4860 svchost.exe 4860 svchost.exe 4752 computercenter.exe 4752 computercenter.exe 4752 computercenter.exe 4752 computercenter.exe 4752 computercenter.exe 4752 computercenter.exe 4752 computercenter.exe 4752 computercenter.exe 4556 dll_service.exe 4556 dll_service.exe 4752 computercenter.exe 4752 computercenter.exe 1928 hdw_disk_scan.exe 1928 hdw_disk_scan.exe 2332 ComputerZService.exe 2332 ComputerZService.exe 1928 hdw_disk_scan.exe 1928 hdw_disk_scan.exe 4752 computercenter.exe 4752 computercenter.exe 4752 computercenter.exe 4752 computercenter.exe 4752 computercenter.exe 4752 computercenter.exe 4456 CefView.exe 4456 CefView.exe 4456 CefView.exe 4456 CefView.exe 1928 hdw_disk_scan.exe 1928 hdw_disk_scan.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3540 ComputerZTray.exe -
Suspicious behavior: LoadsDriver 4 IoCs
pid Process 648 Process not Found 648 Process not Found 648 Process not Found 648 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe Token: SeDebugPrivilege 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe Token: SeDebugPrivilege 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe Token: SeDebugPrivilege 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe Token: SeDebugPrivilege 4752 computercenter.exe Token: SeIncBasePriorityPrivilege 2332 ComputerZService.exe Token: SeIncBasePriorityPrivilege 2332 ComputerZService.exe Token: 33 2332 ComputerZService.exe Token: SeIncBasePriorityPrivilege 2332 ComputerZService.exe Token: 33 2332 ComputerZService.exe Token: SeIncBasePriorityPrivilege 2332 ComputerZService.exe Token: 33 2332 ComputerZService.exe Token: SeIncBasePriorityPrivilege 2332 ComputerZService.exe Token: 33 2332 ComputerZService.exe Token: SeIncBasePriorityPrivilege 2332 ComputerZService.exe Token: 33 2332 ComputerZService.exe Token: SeIncBasePriorityPrivilege 2332 ComputerZService.exe Token: 33 2332 ComputerZService.exe Token: SeIncBasePriorityPrivilege 2332 ComputerZService.exe Token: 33 2332 ComputerZService.exe Token: SeIncBasePriorityPrivilege 2332 ComputerZService.exe Token: 33 2332 ComputerZService.exe Token: SeIncBasePriorityPrivilege 2332 ComputerZService.exe Token: 33 2332 ComputerZService.exe Token: SeIncBasePriorityPrivilege 2332 ComputerZService.exe Token: 33 2332 ComputerZService.exe Token: SeIncBasePriorityPrivilege 2332 ComputerZService.exe Token: 33 2332 ComputerZService.exe Token: SeIncBasePriorityPrivilege 2332 ComputerZService.exe Token: 33 2332 ComputerZService.exe Token: SeIncBasePriorityPrivilege 2332 ComputerZService.exe Token: 33 2332 ComputerZService.exe Token: SeIncBasePriorityPrivilege 2332 ComputerZService.exe Token: 33 2332 ComputerZService.exe Token: SeIncBasePriorityPrivilege 2332 ComputerZService.exe Token: 33 2332 ComputerZService.exe Token: SeIncBasePriorityPrivilege 2332 ComputerZService.exe Token: 33 2332 ComputerZService.exe Token: SeIncBasePriorityPrivilege 2332 ComputerZService.exe Token: 33 2332 ComputerZService.exe Token: SeIncBasePriorityPrivilege 2332 ComputerZService.exe Token: 33 2332 ComputerZService.exe Token: SeIncBasePriorityPrivilege 2332 ComputerZService.exe Token: 33 2332 ComputerZService.exe Token: SeIncBasePriorityPrivilege 2332 ComputerZService.exe Token: 33 2332 ComputerZService.exe Token: SeIncBasePriorityPrivilege 2332 ComputerZService.exe Token: 33 2332 ComputerZService.exe Token: SeIncBasePriorityPrivilege 2332 ComputerZService.exe Token: 33 2332 ComputerZService.exe Token: SeIncBasePriorityPrivilege 2332 ComputerZService.exe Token: 33 2332 ComputerZService.exe Token: SeIncBasePriorityPrivilege 2332 ComputerZService.exe Token: 33 2332 ComputerZService.exe Token: SeIncBasePriorityPrivilege 2332 ComputerZService.exe Token: 33 2332 ComputerZService.exe Token: SeIncBasePriorityPrivilege 2332 ComputerZService.exe Token: 33 2332 ComputerZService.exe Token: SeIncBasePriorityPrivilege 2332 ComputerZService.exe Token: 33 2332 ComputerZService.exe Token: SeIncBasePriorityPrivilege 2332 ComputerZService.exe Token: 33 2332 ComputerZService.exe Token: SeIncBasePriorityPrivilege 2332 ComputerZService.exe Token: 33 2332 ComputerZService.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3540 ComputerZTray.exe 3540 ComputerZTray.exe 440 ComputerZ_CN.exe 1744 web_host.exe 4456 CefView.exe 3444 CefView.exe -
Suspicious use of WriteProcessMemory 59 IoCs
description pid Process procid_target PID 4644 wrote to memory of 2448 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 90 PID 4644 wrote to memory of 2448 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 90 PID 4644 wrote to memory of 2448 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 90 PID 4644 wrote to memory of 3540 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 93 PID 4644 wrote to memory of 3540 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 93 PID 4644 wrote to memory of 3540 4644 7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe 93 PID 3540 wrote to memory of 4752 3540 ComputerZTray.exe 96 PID 3540 wrote to memory of 4752 3540 ComputerZTray.exe 96 PID 3540 wrote to memory of 4752 3540 ComputerZTray.exe 96 PID 3540 wrote to memory of 2332 3540 ComputerZTray.exe 98 PID 3540 wrote to memory of 2332 3540 ComputerZTray.exe 98 PID 3540 wrote to memory of 2332 3540 ComputerZTray.exe 98 PID 2332 wrote to memory of 4556 2332 ComputerZService.exe 99 PID 2332 wrote to memory of 4556 2332 ComputerZService.exe 99 PID 2332 wrote to memory of 4556 2332 ComputerZService.exe 99 PID 2332 wrote to memory of 5028 2332 ComputerZService.exe 100 PID 2332 wrote to memory of 5028 2332 ComputerZService.exe 100 PID 2332 wrote to memory of 5028 2332 ComputerZService.exe 100 PID 2332 wrote to memory of 4260 2332 ComputerZService.exe 101 PID 2332 wrote to memory of 4260 2332 ComputerZService.exe 101 PID 2332 wrote to memory of 4260 2332 ComputerZService.exe 101 PID 2332 wrote to memory of 1316 2332 ComputerZService.exe 102 PID 2332 wrote to memory of 1316 2332 ComputerZService.exe 102 PID 2332 wrote to memory of 1316 2332 ComputerZService.exe 102 PID 2332 wrote to memory of 980 2332 ComputerZService.exe 103 PID 2332 wrote to memory of 980 2332 ComputerZService.exe 103 PID 2332 wrote to memory of 1928 2332 ComputerZService.exe 106 PID 2332 wrote to memory of 1928 2332 ComputerZService.exe 106 PID 2332 wrote to memory of 1928 2332 ComputerZService.exe 106 PID 440 wrote to memory of 1744 440 ComputerZ_CN.exe 109 PID 440 wrote to memory of 1744 440 ComputerZ_CN.exe 109 PID 440 wrote to memory of 1744 440 ComputerZ_CN.exe 109 PID 1744 wrote to memory of 4456 1744 web_host.exe 110 PID 1744 wrote to memory of 4456 1744 web_host.exe 110 PID 1744 wrote to memory of 4456 1744 web_host.exe 110 PID 4456 wrote to memory of 3444 4456 CefView.exe 111 PID 4456 wrote to memory of 3444 4456 CefView.exe 111 PID 4456 wrote to memory of 3444 4456 CefView.exe 111 PID 3540 wrote to memory of 4868 3540 ComputerZTray.exe 112 PID 3540 wrote to memory of 4868 3540 ComputerZTray.exe 112 PID 3540 wrote to memory of 4868 3540 ComputerZTray.exe 112 PID 3540 wrote to memory of 4844 3540 ComputerZTray.exe 113 PID 3540 wrote to memory of 4844 3540 ComputerZTray.exe 113 PID 3540 wrote to memory of 4844 3540 ComputerZTray.exe 113 PID 3540 wrote to memory of 1772 3540 ComputerZTray.exe 114 PID 3540 wrote to memory of 1772 3540 ComputerZTray.exe 114 PID 3540 wrote to memory of 1772 3540 ComputerZTray.exe 114 PID 4868 wrote to memory of 1380 4868 ComputerZ_CN.exe 115 PID 4868 wrote to memory of 1380 4868 ComputerZ_CN.exe 115 PID 4868 wrote to memory of 1380 4868 ComputerZ_CN.exe 115 PID 1380 wrote to memory of 4780 1380 web_host.exe 116 PID 1380 wrote to memory of 4780 1380 web_host.exe 116 PID 1380 wrote to memory of 4780 1380 web_host.exe 116 PID 4780 wrote to memory of 1152 4780 CefView.exe 117 PID 4780 wrote to memory of 1152 4780 CefView.exe 117 PID 4780 wrote to memory of 1152 4780 CefView.exe 117 PID 4780 wrote to memory of 1360 4780 CefView.exe 118 PID 4780 wrote to memory of 1360 4780 CefView.exe 118 PID 4780 wrote to memory of 1360 4780 CefView.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe"C:\Users\Admin\AppData\Local\Temp\7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Program Files (x86)\Ludashi\Utils\LdsHelper.exe"C:\Program Files (x86)\Ludashi\Utils\LdsHelper.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:2448
-
-
C:\Program Files (x86)\Ludashi\ComputerZTray.exe"C:\Program Files (x86)\Ludashi\ComputerZTray.exe" /NoFloat /disable_panel /disable_temp_alarm /HideBand2⤵
- Sets DLL path for service in the registry
- Sets service image path in registry
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Program Files (x86)\Ludashi\computercenter.exe"C:\Program Files (x86)\Ludashi\computercenter.exe" "C:\Program Files (x86)\Ludashi\ComputerZTray.exe" /NoFloat /disable_panel /disable_temp_alarm /HideBand3⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4752
-
-
C:\Program Files (x86)\Ludashi\ComputerZService.exe"C:\Program Files (x86)\Ludashi\ComputerZService.exe"3⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Program Files (x86)\Ludashi\Utils\dll_service.exe"C:\Program Files (x86)\Ludashi\Utils\dll_service.exe" --dll="ComputerZ_HardwareDll.dll" --entry="DirectXVersionProcess" --wnd=661184⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:4556
-
-
C:\Program Files (x86)\Ludashi\Utils\dll_service.exe"C:\Program Files (x86)\Ludashi\Utils\dll_service.exe" --dll="ComputerZ_HardwareDll.dll" --entry="OpenCLTestProcess" --wnd=661184⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5028
-
-
C:\Program Files (x86)\Ludashi\Utils\dll_service.exe"C:\Program Files (x86)\Ludashi\Utils\dll_service.exe" --dll="ComputerZ_HardwareDll.dll" --entry="NvidiaMonitorSizeOfProcess" --wnd=661184⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4260
-
-
C:\Program Files (x86)\Ludashi\Utils\dll_service.exe"C:\Program Files (x86)\Ludashi\Utils\dll_service.exe" --dll="ComputerZ_HardwareDll.dll" --entry="WMITestProcess" --wnd=661184⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
PID:1316
-
-
C:\Program Files (x86)\Ludashi\ComputerZService_x64.exe"C:\Program Files (x86)\Ludashi\ComputerZService_x64.exe" --dll="HardwareEx_x64.dll" --entry="HardwareExProcess" --wnd=66118 --server --firstrun4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:980
-
-
C:\Program Files (x86)\Ludashi\Hardware\hdw_disk_scan.exe--ppid=23324⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
PID:1928
-
-
-
C:\Program Files (x86)\Ludashi\ComputerZ_CN.exe"C:\Program Files (x86)\Ludashi\ComputerZ_CN.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\{2CEDDB53-32D1-4845-8EB9-F7E9C8885455}\Utils\web_host.exe"C:\Users\Admin\AppData\Local\Temp\{2CEDDB53-32D1-4845-8EB9-F7E9C8885455}\Utils\web_host.exe" --url=C8Vn3GZkw6+pIVm+v79vE4XPL7VySuizNWtVjhXZreuYxQIFULIz19ljJByyjN8/4G0FntVQYvYDDy/eBha0chbzsjinkW/wW2R9XMIK2MfgkwYON3Bi3PdOyNYdb65MMNzfCERlowU= --wnd_title=AVD/yKOT9gy5+u+mgvNUS9pfK+CejpN9GXlcKSG3ey3mIkg5++HZOQ== --main= --icon_path=C:\Users\Admin\AppData\Local\Temp\{2CEDDB53-32D1-4845-8EB9-F7E9C8885455}\Themes\UI\icon\web_host.ico4⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\{2CEDDB53-32D1-4845-8EB9-F7E9C8885455}\Utils\cef\CefView.exe"C:\Users\Admin\AppData\Local\Temp\{2CEDDB53-32D1-4845-8EB9-F7E9C8885455}\Utils\cef\CefView.exe" --parent_wnd=20290 --tab_rect="0,0,0,0" --tab_ids="AD910BD1-C9EC-408d-BF4D-AA1C3424F00B" --cmd="" --disable-gpu --disable-gpu-compositing --enable_high_dpi --class_name="common_pop" --url="about:blank" --tab_group_ids="C9869BD2-7912-41ab-90DE-31D08A9DFD7D" --web_view_id=256 --disable-pinch --disable-web-security --disable-alt-f45⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\{2CEDDB53-32D1-4845-8EB9-F7E9C8885455}\Utils\cef\CefView.exe"C:\Users\Admin\AppData\Local\Temp\{2CEDDB53-32D1-4845-8EB9-F7E9C8885455}\Utils\cef\CefView.exe" --type=renderer --disable-gpu-compositing --disable-pinch --no-sandbox --lang=en-US --lang=zh-CN --log-file=disable.log --log-severity=disable --disable-extensions --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=24.0.0.221 --device-scale-factor=1 --num-raster-threads=1 --content-image-texture-target=3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553 --video-image-texture-target=3553 --disable-accelerated-video-decode --disable-webrtc-hw-encoding --disable-gpu-compositing --channel="4780.0.425419036\956490744" /prefetch:16⤵
- Executes dropped EXE
PID:1152
-
-
C:\Users\Admin\AppData\Local\Temp\{2CEDDB53-32D1-4845-8EB9-F7E9C8885455}\Utils\cef\CefView.exe"C:\Users\Admin\AppData\Local\Temp\{2CEDDB53-32D1-4845-8EB9-F7E9C8885455}\Utils\cef\CefView.exe" --type=utility --channel="4780.1.569955849\434510704" --lang=en-US --no-sandbox --no-sandbox --lang=zh-CN --log-file=disable.log --log-severity=disable /prefetch:86⤵
- Executes dropped EXE
PID:1360
-
-
-
-
-
C:\Program Files (x86)\Ludashi\ComputerZ_CN.exe"C:\Program Files (x86)\Ludashi\ComputerZ_CN.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
PID:4844
-
-
C:\Program Files (x86)\Ludashi\ComputerZ_CN.exe"C:\Program Files (x86)\Ludashi\ComputerZ_CN.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
PID:1772
-
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:3060
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s HpSvc1⤵
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4860
-
C:\Program Files (x86)\Ludashi\ComputerZ_CN.exe"C:\Program Files (x86)\Ludashi\ComputerZ_CN.exe" --from=deskshortcut1⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Users\Admin\AppData\Local\Temp\{2D2EAF59-87D7-4C47-9593-9F7311850E05}\Utils\web_host.exe"C:\Users\Admin\AppData\Local\Temp\{2D2EAF59-87D7-4C47-9593-9F7311850E05}\Utils\web_host.exe" --url=C8Vn3GZkw6+pIVm+v79vE4XPL7VySuizNWtVjhXZreu9fwtRIn8A6Ty3Y6BCzXTWRo7Hn/j8ugZYxPxnCZppVIJB4C6GdPKdW2R9XMIK2MfgkwYON3Bi3PdOyNYdb65MMNzfCERlowU= --wnd_title=AVD/yKOT9gy5+u+mgvNUS9pfK+CejpN9GXlcKSG3ey3mIkg5++HZOQ== --main=--from=deskshortcut --icon_path=C:\Users\Admin\AppData\Local\Temp\{2D2EAF59-87D7-4C47-9593-9F7311850E05}\Themes\UI\icon\web_host.ico2⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\{2D2EAF59-87D7-4C47-9593-9F7311850E05}\Utils\cef\CefView.exe"C:\Users\Admin\AppData\Local\Temp\{2D2EAF59-87D7-4C47-9593-9F7311850E05}\Utils\cef\CefView.exe" --parent_wnd=1026a --tab_rect="0,0,0,0" --tab_ids="86AF3F28-616E-4b80-B46F-B0A85919B8F2" --cmd="" --disable-gpu --disable-gpu-compositing --enable_high_dpi --class_name="common_pop" --url="about:blank" --tab_group_ids="5979D318-14A9-4ad8-9F12-9F356B211356" --web_view_id=256 --disable-pinch --disable-web-security --disable-alt-f43⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\{2D2EAF59-87D7-4C47-9593-9F7311850E05}\Utils\cef\CefView.exe"C:\Users\Admin\AppData\Local\Temp\{2D2EAF59-87D7-4C47-9593-9F7311850E05}\Utils\cef\CefView.exe" --type=renderer --disable-gpu-compositing --disable-pinch --no-sandbox --lang=en-US --lang=zh-CN --log-file=disable.log --log-severity=disable --disable-extensions --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=24.0.0.221 --device-scale-factor=1 --num-raster-threads=1 --content-image-texture-target=3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553 --video-image-texture-target=3553 --disable-accelerated-video-decode --disable-webrtc-hw-encoding --disable-gpu-compositing --channel="4456.0.1460396616\762700980" /prefetch:14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:3444
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
287KB
MD54731241f01bab84b3b10f844d057dbb2
SHA1fe6190df827ed844a4507ecf01fc7b1cca0cc9f4
SHA256bb82423b24a3ab1b54bea0246e3478818aee2c625cf84b5128ef282915a8465d
SHA512cf0f0ae5369e91030502e546367893e9ee134ee27d0278a638e7c80e3c7fa4a254175665e3d27d326d65266afe350d842536877d1d4b0aef43b9b2d6068fa9a9
-
Filesize
287KB
MD54731241f01bab84b3b10f844d057dbb2
SHA1fe6190df827ed844a4507ecf01fc7b1cca0cc9f4
SHA256bb82423b24a3ab1b54bea0246e3478818aee2c625cf84b5128ef282915a8465d
SHA512cf0f0ae5369e91030502e546367893e9ee134ee27d0278a638e7c80e3c7fa4a254175665e3d27d326d65266afe350d842536877d1d4b0aef43b9b2d6068fa9a9
-
Filesize
3.6MB
MD5c308758bd0d70abf40693f9e4d19a2a7
SHA1b382bd754b2beffd87f5a86bdd939401e0203a8d
SHA2566584de3cd40de9e0428eaff6f549a9c78eaf4fc45d28be24205007521f9628c4
SHA512fae52d7e4417209bfbac80da4e69af2cc6d92b2976e03b53c9f36fc4bf253ecb7a46b62a2768a47a0c3706817d36a632f4f1fcd84c8d32cc93ab2af808af3e43
-
Filesize
3.6MB
MD5c308758bd0d70abf40693f9e4d19a2a7
SHA1b382bd754b2beffd87f5a86bdd939401e0203a8d
SHA2566584de3cd40de9e0428eaff6f549a9c78eaf4fc45d28be24205007521f9628c4
SHA512fae52d7e4417209bfbac80da4e69af2cc6d92b2976e03b53c9f36fc4bf253ecb7a46b62a2768a47a0c3706817d36a632f4f1fcd84c8d32cc93ab2af808af3e43
-
Filesize
82B
MD55d8e4b8efee134d714495dfca82f8bad
SHA118669a21535a060d45b493a3e9d33d18edc5243c
SHA25614f820c36e5eeadca86dc7b6d32070ba4890ca7719fd91f39bfdb2d8287c6eda
SHA512a6d24a47e12b3ca890c1205289a166bef8c7d37e3ffa556c3763ac0de8482b5da29ca583be3dbd5893ab26419f379b2da20dba3f83cad2d8675873359844b65b
-
Filesize
158B
MD54a7e2185dd9f92d9ef20a8dcfa846be8
SHA1b43e39ef4ea7e94daeabeb23c810ebf76a1e011e
SHA25633a690918078a2b0a6567952a58a97b13094b221820614907e35938e8e15f39d
SHA512d70396e930f2f1fb7e25abbd58f0f08da5c3340da1bee0737630d22253320328be2b23a8e34facdea6609a7fd8c892562dd58a82aaa1fd810b1ec7117bec5b4b
-
Filesize
158B
MD54a7e2185dd9f92d9ef20a8dcfa846be8
SHA1b43e39ef4ea7e94daeabeb23c810ebf76a1e011e
SHA25633a690918078a2b0a6567952a58a97b13094b221820614907e35938e8e15f39d
SHA512d70396e930f2f1fb7e25abbd58f0f08da5c3340da1bee0737630d22253320328be2b23a8e34facdea6609a7fd8c892562dd58a82aaa1fd810b1ec7117bec5b4b
-
Filesize
779KB
MD536306abfdc45a1cd4f0c21b7d7419ead
SHA1db1ea3080716e20071b6c1f6fb8469bc4b8109ce
SHA2569447277c3f36148d9af207331d101e8e21691b445fdf1073d11209c1c30a7057
SHA512a33c30d2d073dc30580c42744b903666fcfd97b0263d5515a41b31d07d26b81c6d86a6ed7378218a9930e5099e76c99f8519841746b7c1338a7d487527717d0c
-
Filesize
779KB
MD536306abfdc45a1cd4f0c21b7d7419ead
SHA1db1ea3080716e20071b6c1f6fb8469bc4b8109ce
SHA2569447277c3f36148d9af207331d101e8e21691b445fdf1073d11209c1c30a7057
SHA512a33c30d2d073dc30580c42744b903666fcfd97b0263d5515a41b31d07d26b81c6d86a6ed7378218a9930e5099e76c99f8519841746b7c1338a7d487527717d0c
-
Filesize
8.4MB
MD5e9042e8c7b59b84fb6f57517798cae52
SHA130ab0ec13983a6bd9037d3ad0ba7dfa5750f650c
SHA256151d5c2cdee63352a32010bba1b2fd34d39eb4fe4b8ad45d8acfb70715c63b20
SHA512e9e2f0d43400a21e796c3769c8a91546e6ae121ebe04788d1fb6d724595e2b3493720d756e54b6e25b7db6c3fedec8836042d44715dc23f95af5e2509db1f4d1
-
Filesize
8.4MB
MD5e9042e8c7b59b84fb6f57517798cae52
SHA130ab0ec13983a6bd9037d3ad0ba7dfa5750f650c
SHA256151d5c2cdee63352a32010bba1b2fd34d39eb4fe4b8ad45d8acfb70715c63b20
SHA512e9e2f0d43400a21e796c3769c8a91546e6ae121ebe04788d1fb6d724595e2b3493720d756e54b6e25b7db6c3fedec8836042d44715dc23f95af5e2509db1f4d1
-
Filesize
3.7MB
MD5b833bcb9bfe16563c36be0c430b848b9
SHA1a90866f92d6c8af51f58baf08a2982ada27233cb
SHA256e50ded7fa0ba74eb10bccc03f9fdb022d9fb6bbc68bc4755f7324e5f2cc36ebc
SHA5123c47f162c7503450d4c9ba1e499aa222e47211f96815db2f0d33659758cdcc27801271f33677142f8092cdbc80c7fd1910a29197846d61f073928afb40dc071b
-
Filesize
11.7MB
MD5af71a585a9e19d0dbbc121cac849f2b9
SHA1531e5bd0d8b0cfbcfec8b381cadf1a7af5b9d7a5
SHA25627a09cadc1b4737ffd8cfb989ba73385332e02cd1662771a449cb0454c3ca3a4
SHA512f83b55f1df7e6c32510a596555bdf7c41a0fb28666a5df68a15143c2daaf526284dc14b6e1d178ec2ad22222c6968eac3128259aba50c617475ff3af2aab86c3
-
Filesize
976KB
MD52ed7532cc0ffcc67f948c8d1469504c2
SHA13e84b817fd88786c680dbf5587b24035c0a2846c
SHA256d069c6509ba8608ab15f301f57016ba7dcce42e35201a4c2c4e97167e0ce54b7
SHA5127173c8bd56a2f6e103ad1fe684c5f0bb8aacaac07f705e7646057fe9c44f1b483650ec89d5c048cdb8b73b99f38147252ee863651e6de11582c275f61d274665
-
Filesize
976KB
MD52ed7532cc0ffcc67f948c8d1469504c2
SHA13e84b817fd88786c680dbf5587b24035c0a2846c
SHA256d069c6509ba8608ab15f301f57016ba7dcce42e35201a4c2c4e97167e0ce54b7
SHA5127173c8bd56a2f6e103ad1fe684c5f0bb8aacaac07f705e7646057fe9c44f1b483650ec89d5c048cdb8b73b99f38147252ee863651e6de11582c275f61d274665
-
Filesize
238KB
MD58786d469338c30e0ba9fedfc62bd5197
SHA15fb12028ceae9772f938e1b98b699f0e02e32718
SHA256beeaf8b72f7008e9adabacfcd85e32a50747a0dfb5c86802aeb973bd1f5c3d2f
SHA5125db1e5b78e62cda81a63e8e712e720f87a7c7a539237a55a9098c076f9fb4e0b5adb83383c23657b4ccc90c117e55e3946a399cdf3d15cb94444b203d9d6c45c
-
Filesize
238KB
MD58786d469338c30e0ba9fedfc62bd5197
SHA15fb12028ceae9772f938e1b98b699f0e02e32718
SHA256beeaf8b72f7008e9adabacfcd85e32a50747a0dfb5c86802aeb973bd1f5c3d2f
SHA5125db1e5b78e62cda81a63e8e712e720f87a7c7a539237a55a9098c076f9fb4e0b5adb83383c23657b4ccc90c117e55e3946a399cdf3d15cb94444b203d9d6c45c
-
Filesize
291KB
MD57eca0dc1aeb511d25576ccdb10eb5dc9
SHA1f58595dcc43d1609845914da67b2c118910460f6
SHA25600687641802ea47ba4d269c71321341d07ffe11e9acd40d389a46302ed1cdd1e
SHA512d6406b295037c3fbb5d6814917805aff8836c5eb50c3cc7cd827ef0725570a7b005af6c72faf374032a2463a01fc7115070c5d3fc047535aa0ab23ed4b64e28c
-
Filesize
291KB
MD57eca0dc1aeb511d25576ccdb10eb5dc9
SHA1f58595dcc43d1609845914da67b2c118910460f6
SHA25600687641802ea47ba4d269c71321341d07ffe11e9acd40d389a46302ed1cdd1e
SHA512d6406b295037c3fbb5d6814917805aff8836c5eb50c3cc7cd827ef0725570a7b005af6c72faf374032a2463a01fc7115070c5d3fc047535aa0ab23ed4b64e28c
-
Filesize
1.1MB
MD52706693dda10c6cc79eed24c56d4e5ef
SHA14f34ef1bd49273a0d260b9dab15c73eb0ccb6383
SHA2560edad8a1af22d5b97c1f324791c86243a6ecce7b5a9d2f30415af99aba9129c3
SHA5127e7f7ae894528587ba33b6e10999549bb9a2ec2748b5662fa1b8806e5f4ce33af47507b3ef2954f2747a76b5b7c775c1cd671061f577c5016d1f8ba165bbe21c
-
Filesize
1.1MB
MD52706693dda10c6cc79eed24c56d4e5ef
SHA14f34ef1bd49273a0d260b9dab15c73eb0ccb6383
SHA2560edad8a1af22d5b97c1f324791c86243a6ecce7b5a9d2f30415af99aba9129c3
SHA5127e7f7ae894528587ba33b6e10999549bb9a2ec2748b5662fa1b8806e5f4ce33af47507b3ef2954f2747a76b5b7c775c1cd671061f577c5016d1f8ba165bbe21c
-
Filesize
477KB
MD591d986307ab1e56f7f77710664cdb70d
SHA118fe10c7b1ec55632c03b9f06f9d881a022c970a
SHA256d85bfd004e2ca8dbdfa72a4bdcb1510df76ed56d46ef5128500883c8c7f7c8fb
SHA512480659e912ef3053a4542eb2e8eaa3a70df92569e9834d950d9d7ee07e8c9d740b59f1eaed90276454ab71211da41d2f3d945cc486539cba7be3a5c5c0a61e32
-
Filesize
477KB
MD591d986307ab1e56f7f77710664cdb70d
SHA118fe10c7b1ec55632c03b9f06f9d881a022c970a
SHA256d85bfd004e2ca8dbdfa72a4bdcb1510df76ed56d46ef5128500883c8c7f7c8fb
SHA512480659e912ef3053a4542eb2e8eaa3a70df92569e9834d950d9d7ee07e8c9d740b59f1eaed90276454ab71211da41d2f3d945cc486539cba7be3a5c5c0a61e32
-
Filesize
24.2MB
MD5009b2a92ea877e1c8b33b13cc17137d4
SHA1fe41711307e7a596e5b30f0ac00d7b75a6002d04
SHA2566af751a5f0b73c1ccb723afd0089ea7bcecf0e302afe03f10040fb9c11ce05c1
SHA5126b68d45bd7707e4bfa3bf8ed0bb9f73205c5c002c634d9e6619a1e7996859d6cf6624037b8cb0c730a7965d8dd7566121401bf4726484814879cb6372684fc0f
-
Filesize
24.2MB
MD5009b2a92ea877e1c8b33b13cc17137d4
SHA1fe41711307e7a596e5b30f0ac00d7b75a6002d04
SHA2566af751a5f0b73c1ccb723afd0089ea7bcecf0e302afe03f10040fb9c11ce05c1
SHA5126b68d45bd7707e4bfa3bf8ed0bb9f73205c5c002c634d9e6619a1e7996859d6cf6624037b8cb0c730a7965d8dd7566121401bf4726484814879cb6372684fc0f
-
Filesize
956KB
MD5d4bedaf01cc67ad161cd454cff3ddb93
SHA136571a19ae58c8ae9d1505cc0b6b673be47b1756
SHA256019380b69ab5410d923abc86487d636e28dc51fb03015ef15b7c5be7be13b4b3
SHA512d121d8d2676f6426aa94ee31af93c60ce72b451c8d48cf1e98ce844fba997da859a2140e7d2f4fd2c34ca9f1fd1ace3b8a84c8befa74d035879a036b0671ea3c
-
Filesize
1.2MB
MD50e426bd24d7a8b9058622259a6da352b
SHA1ab833eee8362f1f32537a436e1fb95b810010db4
SHA256a876bee4db2c330ca4d6e959ba878c28a2032d2da4a03a1a4b5e1dae9c8612d5
SHA512d7c90110f053158db57e1d1d6d9790dff03efda64b2186a0b0da26bde06d58a77d580cfc497ebe037cdf7da398292b7b1e35b377f52bd6f60f5699aca4f39200
-
Filesize
241KB
MD508d4addb59ec78303aeeb2b08030defb
SHA1ea058e83945ef8e20712ff1c7659d528362d1b46
SHA256c27454a2e8b56665a9282fd774b8568da3aad3a00b1ff673c5115a28acdb5f25
SHA512ef792cda42ebca4ea3c6547b0c7f4d1aa603cb71922db154b96b22deef6ba22d1a5cb23849cf168281aaf7c956fbd46976e929ae15f3295491724c363e567b6c
-
Filesize
288KB
MD55a0f33714bf8ae637fb6800473819af7
SHA1b788684a669362765f472083fc316f7d36c0eeaf
SHA256f2e0d6fa5d7590bfc694ffe222e503dc7171ce585bde4feec3f165899caf09a1
SHA51271113af332c7e78a8cf9a1a7221d4c10c8b6db6f61f739b3ed3755d50e130dbe26e6a73e2c370be5fb9c89ea3f711f5027a19e8df32920407fe8fb67a5236dae
-
Filesize
1.7MB
MD52d3d1b3fd61d0230161b1c43e367df45
SHA1a1090c691dd54b9bc2509c0e81d00cfeb6c2db32
SHA256fb3b48b2980ac6cbecd7c579a58e0358dcfe03ea2d66c839e965627c4612a619
SHA512217f7f1f41c26e0ac9910d10f0ff2d538acc0156595244f33d4bce018a8097d1911d5a668e3a6d889e5147b27a40b7cd6904e2d8e1d49dd53eb184468fdb1764
-
Filesize
871KB
MD5789ff3ad5461728f393f86ffc0351fc6
SHA1c5d994ac9dfe8440ddc9fd4c8cebe9776cf13356
SHA256ae9ea86fcc401d29e5b92e2cb6e6b6fe0cfbee7408f781b2e217a509a533cc94
SHA512c7500c88125b278de8e17a602d96d26b703aabbbd3624913afa0e56d313ec0a8abc0080794061de8e5f4688bf45c0aa136019509420437222e8452e5da8c62c1
-
Filesize
104KB
MD5e3de14a4c2e1ea9c73d6e865a0fab837
SHA1489f2b30c5e6c2af516e69ccad1f96d34411e66c
SHA25623785aa5bae50bf822f3b2306fda41743b5937d770a8d9f391fae8f50497e20b
SHA512941d8ec98afa5acd4b6a9d52c126e86c1e1f3460660171f70631124a422ec24b7f3c9ceca17eca01142b398a71cda045e136ffd420c01eba8cc4c883ef0cb0ef
-
Filesize
871KB
MD5789ff3ad5461728f393f86ffc0351fc6
SHA1c5d994ac9dfe8440ddc9fd4c8cebe9776cf13356
SHA256ae9ea86fcc401d29e5b92e2cb6e6b6fe0cfbee7408f781b2e217a509a533cc94
SHA512c7500c88125b278de8e17a602d96d26b703aabbbd3624913afa0e56d313ec0a8abc0080794061de8e5f4688bf45c0aa136019509420437222e8452e5da8c62c1
-
Filesize
164KB
MD548484aa35450ac9595af42af04dd7f4e
SHA1734653c55ba2a66e893b3884e9fe31d57851051c
SHA25604b4b37315904097e7d12d72400dd43c3f1afa39147f974299e506a152a75542
SHA512cafcb978b36c0ad7aa4255f207dcd7b69c32217c959f03c4a63dd6f67d4f9a7e1fd008787f2ba38deabeefb5e4b58c1a7e274baf327005ad35e33b0f00758a3c
-
Filesize
281KB
MD5b235e69a3ae8f02e68bb94190bd238f9
SHA17747450aa888f6a59258c574a2a5a0cef5a06d54
SHA256c4a019be64262055113cbc0be66d57eb56d750fd0cf57af623d589c94d3dc1c1
SHA5129cb74d447accfed346292370de31cef6b1c53a29b7d9a4b147dc50840941cee6ee65147ca8dc71c7cf4491e88fee1c6f0a86183c65f2bf22ab8cb38a4eef489a
-
Filesize
111KB
MD581c7432015c24ed91800f759dc2bfabc
SHA1d94828fd9dca99f840701437a1c041f647c58dfc
SHA256b3b6820713c5c8e6354eb8a48f83d18ab7253b2dbec38d2b6e49a550fb18edea
SHA512950067663e276aee30a912602c8ba7a00bc18d8e9cb3417da51be068a44e6e54eb31d6f8ec92e68ec84275926abd75517ec0c289ddb804d952fc0bce3c795ca4
-
Filesize
392KB
MD5fdc2298ccfff6d6b43c2d0f7779ef9dd
SHA18bb48b41cf55f9baf177eee720ad7cf3fe3ebce0
SHA25697e71f6b65f749b070d47d22bf0c5776d79180e19cd4bbbb5a9a33da037ef5c3
SHA5120024dd6e63e6de0d7b585ea0f03eb6bd4dd30104a70861eb2b09bbe7d577a4f25a6941f0dd2513b51a73b979a174d92afc81507085e2d784dfc7b81e7414c8a7
-
Filesize
10.3MB
MD5214063c2e8eb56472421ffcf066fcc5e
SHA10802b450986e2c954fa13018e3fda122a57b7c47
SHA256ed93f5fc7d3bc958b15f4f57a149abd16cf58c985dbac75d592cc41c3acf7345
SHA5127e5f8b00a00b4130db7bb69d863001d24b38c510d1294487878bc224c673dc280c1962e477048720caa81d6cd237a37c4b947c8490dd4822de43b1b1a96b8ff5
-
Filesize
425KB
MD5019559fa067a3d9393d6ef37eed4719c
SHA135fbd0221ac8bad7a14f8d7fa86750d89fd595bb
SHA256eff4f5d5632a3ffdc06ee91b80f429df3a85d3b4c73916a2a08fac433230bdbd
SHA51248b6fc945d356ca57e0c72249f39d1fd1adbec6276050c0cce247d725a3a1162a3c61c0badcbd0180f16abd705969f1ad7ab2f9de331b1e3521bd0c959b96eba
-
Filesize
779KB
MD5f6deffeb114254e0bcece46eb8951a5b
SHA1b1ba2d37c6fb3776e525ae0de522e6939715f36b
SHA2567d2d9b02acbee9a0afe04d6e7f9d3f4336ca9e31cfa0ad73c8bfc031fb0058e0
SHA5129e2f830e08bf8aaac84c7b757a7bbc5b763141710015ae41dc075effb375fd7915700be05d78a9661be8d3543ae02029f02d15e1c21f98988e16800d607427da
-
Filesize
554KB
MD5c6494b04750e6757252e88cf5c061530
SHA1e8e0becd8e5daa11529e5d5c3ae3051db6b0ebdd
SHA2562d7fcf14674527f524f3ec19d090b9c8367cfc7db6533b4e88c6a769836c5597
SHA512fc45d135239d3273813fb22ba59620b2bf1ce973cab9f7b8a59d47d4347fc7a5f8c3ef97a51c2e859f2f081d8e9e90b7e79ef41371835efb02ea379a2d19952a
-
Filesize
87KB
MD5c4e602bd780397e61daab7394ae39b28
SHA181abf2e28c681d99999a7c046e0629d03031f898
SHA256e10a0a93fa88bcae6618fcb71051cf3c893bc19409ad6fb9578c2bd8a8fb77f4
SHA51201e9247813038f4a66f4dc1642542984a95e2ee8d0d1580a52ad7cf5c51e5d8e2fb904a3438955d9600a9f22a51d88cea1f663df309153959beb2099c4efa1fe
-
Filesize
677KB
MD5c7053f00f6267d5a5e9cc09df392a651
SHA1b324e8f786faa6f80f3a6f0fb6523eb270e8af7f
SHA256ddb9a485fef65a3a92ef94f9169a1ad3996d92d450ac947052eef91be1f0dd79
SHA512cb78b7c913e8222210037a2cd903781fd99f23bc4433e23de50f4ddc0b8631b94bf730e23729130e0866cccf4272e49160f49d8c87fb7f9a3bed43a9128f899a
-
Filesize
1.9MB
MD5e68618982c94bc388d59de8cae81ea5a
SHA16f472bec25b114292221c87b24aa883f2eb64448
SHA2563cb47fd6f2e653382c93006dd47eb9d2aca6b47e80c05992a5355cb9843c97ee
SHA51291c56505ca14d2d621407d5dc0e33c4c10416d4061bd30a5a3d8e9f56f34d02b0a588cbb92d39590249c069e3aceb34bbf826d2539750c4f3fc7343e3d4d5c65
-
Filesize
1.8MB
MD51c659410366b145d81cdbf3c92878faf
SHA1e87c7811afc4b2fc7c08750a03027381c4cb609e
SHA2568238b12809fa9540566b373e97e3947a8543d27def5a6cdca428d8516256dffb
SHA512c82fe7e7943cb9c6d2f5e9f5904ae41096182d2ae777460721f563781305cff9296d470fb118fb4e30ea29f55e67f230de41e604dc418c8fbecd206353487ebb
-
Filesize
551KB
MD55d5ff285798b4fb701632f92a598142d
SHA1709d2346fd44ae3171afc065589f0db547b49eaf
SHA256d9dec9914a31e6396349186659c6ffb351cfb0766a8b5f9108fbaa41c92462d5
SHA512456a41902614f7c838c1cf68a96f551fad428629ac8f0738091f4b9ce73b3862f63ff95d6856f93ddff64578d05998aa0927c29fd03d94b15fe78b121692b942
-
Filesize
551KB
MD55d5ff285798b4fb701632f92a598142d
SHA1709d2346fd44ae3171afc065589f0db547b49eaf
SHA256d9dec9914a31e6396349186659c6ffb351cfb0766a8b5f9108fbaa41c92462d5
SHA512456a41902614f7c838c1cf68a96f551fad428629ac8f0738091f4b9ce73b3862f63ff95d6856f93ddff64578d05998aa0927c29fd03d94b15fe78b121692b942
-
Filesize
551KB
MD55d5ff285798b4fb701632f92a598142d
SHA1709d2346fd44ae3171afc065589f0db547b49eaf
SHA256d9dec9914a31e6396349186659c6ffb351cfb0766a8b5f9108fbaa41c92462d5
SHA512456a41902614f7c838c1cf68a96f551fad428629ac8f0738091f4b9ce73b3862f63ff95d6856f93ddff64578d05998aa0927c29fd03d94b15fe78b121692b942
-
Filesize
411KB
MD547b2c31bc568b8692b607bef27f4fa1d
SHA100e542b7fca1ee66030adaf40c8bbfaade17dd87
SHA25636200786c7e9c0b66636b0be13b8d15ceeb21ea797b59b4bd118ac21e3417207
SHA512bcd09ff477433baf937da073157f1800e0a03a95f792d7b62cb4f0d52b5d6446698192186dcbaf090d9a0627a5c1711d2b1f9d8589495e91268900bde8ea7f19
-
Filesize
1.1MB
MD56cf181e7db1b5d7776ddf5044c6188a9
SHA14da3f1865575d3eee8d420ac61015b7b9ef3c4d5
SHA2564f66bf85f00110ca3ee21d1e038b25c97c13e2f91cd514217ad59fca23ac5c02
SHA512d2ca52fa7362d7cb830807981b03efd4c78e9bfee2917b16b6b87b9f17393dbf2f938acc68f1f0aef7f55f7d6bf7113c4c06bd4aa1be1d2d196ab86ee050a294
-
Filesize
1.9MB
MD57c450e5f5ce44c5acb8f3b27f5f1dded
SHA1095c36b0db24a11389d901540e8b76c7aea518b0
SHA256480c4c286a55562468d29da6771d38020d81c0af9d3883be10fd4a2f3b50d0ec
SHA512c70a53d23d70cf93f3f9f40fbcb3cb7d49378185aa0c97683439900f5f2dae0cb7f6e279c856d56299dc993ffca786cd8e52239f2f2806096073f21bb00b63a4
-
Filesize
727KB
MD575654073797ec30585cb0d0531f741a3
SHA18d6ea13c4f767191a286fd012b20443772d4341d
SHA256db382ea923e2ec3da7f004b932faa7854ac723efd3a4d01d87f96d4bb5f145d7
SHA512ea13fb5c67344540398ee4467c66301681f1bf452bdc7a739d8eb611b98c89cf845e424283f0862e2bcf8650a7f803bf884e6e54f971b2bdd1ccd2a9e2cc103d
-
Filesize
727KB
MD575654073797ec30585cb0d0531f741a3
SHA18d6ea13c4f767191a286fd012b20443772d4341d
SHA256db382ea923e2ec3da7f004b932faa7854ac723efd3a4d01d87f96d4bb5f145d7
SHA512ea13fb5c67344540398ee4467c66301681f1bf452bdc7a739d8eb611b98c89cf845e424283f0862e2bcf8650a7f803bf884e6e54f971b2bdd1ccd2a9e2cc103d
-
Filesize
727KB
MD575654073797ec30585cb0d0531f741a3
SHA18d6ea13c4f767191a286fd012b20443772d4341d
SHA256db382ea923e2ec3da7f004b932faa7854ac723efd3a4d01d87f96d4bb5f145d7
SHA512ea13fb5c67344540398ee4467c66301681f1bf452bdc7a739d8eb611b98c89cf845e424283f0862e2bcf8650a7f803bf884e6e54f971b2bdd1ccd2a9e2cc103d
-
Filesize
727KB
MD575654073797ec30585cb0d0531f741a3
SHA18d6ea13c4f767191a286fd012b20443772d4341d
SHA256db382ea923e2ec3da7f004b932faa7854ac723efd3a4d01d87f96d4bb5f145d7
SHA512ea13fb5c67344540398ee4467c66301681f1bf452bdc7a739d8eb611b98c89cf845e424283f0862e2bcf8650a7f803bf884e6e54f971b2bdd1ccd2a9e2cc103d
-
Filesize
839KB
MD5551e02af61cd1324f18ad0951f87eba7
SHA18a33d2332f345bb29b7409b7173f590473cc1f2a
SHA256affe4376e85fb36d30c31ee3cecb5dbd82e97d87d1fd04aff2b35789055189f3
SHA512e686f1883ebc1ea02a086e916ea315b4404c931e7b854bb31cf38d87a3ad51f840bd6ea0d0fed4489d33e6e9396f345285a76f3f235f94ad2bb3b1ef115e7268
-
Filesize
457KB
MD539bbb7af971f719b5b2aea41defff699
SHA137483ba9fb0bba070a11a7e81bbcbb02b624edad
SHA25616ff1a3abe13bb4f406ebcb1badcd90d29bc1244cae587b8b560c13e4b6b9af8
SHA5122f2db044bfe42f6c3acc3acb3959db8a739b0057b43b1a920c6c5b899c96368333e799f4106531a457a383d32d892599c53bc7efc6e1856d2263bd1f0f617de8
-
Filesize
457KB
MD539bbb7af971f719b5b2aea41defff699
SHA137483ba9fb0bba070a11a7e81bbcbb02b624edad
SHA25616ff1a3abe13bb4f406ebcb1badcd90d29bc1244cae587b8b560c13e4b6b9af8
SHA5122f2db044bfe42f6c3acc3acb3959db8a739b0057b43b1a920c6c5b899c96368333e799f4106531a457a383d32d892599c53bc7efc6e1856d2263bd1f0f617de8
-
Filesize
1.4MB
MD5bcad5c8aeb6756c24e1c3d2d62a3e6a9
SHA14082d5561dcb55f81d2751ae98ab01f113361885
SHA2564bf0a6d8c9ddbd671ceefe0e58d39e942bcf631cd7aa43604fbd1aaa41a5f814
SHA5122998794ae6693b0330990ce7fdfdea0cd37b05a7142d293805c2067237349387eab0cf60fc32e6840de74979b8048e6557a76a5472865a9178dcd97e5a8d1862
-
Filesize
1.4MB
MD5bcad5c8aeb6756c24e1c3d2d62a3e6a9
SHA14082d5561dcb55f81d2751ae98ab01f113361885
SHA2564bf0a6d8c9ddbd671ceefe0e58d39e942bcf631cd7aa43604fbd1aaa41a5f814
SHA5122998794ae6693b0330990ce7fdfdea0cd37b05a7142d293805c2067237349387eab0cf60fc32e6840de74979b8048e6557a76a5472865a9178dcd97e5a8d1862
-
Filesize
90KB
MD5cdf53b97941b9140fdb70420cf8b0d09
SHA1c72caf3a88984b8ee78fd94a2a72e0c6105da1b0
SHA256602dae8b624b29498c5c13d58f65a3697b82e238bf7870c9f5c93eda3cc7ec8a
SHA512012231f4e7a0940e983f50c2aa4635734e72c7d760c21d51b31330db2e15b4ef4e2f4f2cf84320be65a1aeb9fe31c5844c10277d3df929a9ab3a35daf8a1d5ba
-
Filesize
238KB
MD58786d469338c30e0ba9fedfc62bd5197
SHA15fb12028ceae9772f938e1b98b699f0e02e32718
SHA256beeaf8b72f7008e9adabacfcd85e32a50747a0dfb5c86802aeb973bd1f5c3d2f
SHA5125db1e5b78e62cda81a63e8e712e720f87a7c7a539237a55a9098c076f9fb4e0b5adb83383c23657b4ccc90c117e55e3946a399cdf3d15cb94444b203d9d6c45c
-
Filesize
1.1MB
MD52706693dda10c6cc79eed24c56d4e5ef
SHA14f34ef1bd49273a0d260b9dab15c73eb0ccb6383
SHA2560edad8a1af22d5b97c1f324791c86243a6ecce7b5a9d2f30415af99aba9129c3
SHA5127e7f7ae894528587ba33b6e10999549bb9a2ec2748b5662fa1b8806e5f4ce33af47507b3ef2954f2747a76b5b7c775c1cd671061f577c5016d1f8ba165bbe21c
-
Filesize
74.3MB
MD5dbdeda5c627771ca871dfc1bfc830843
SHA1016a0fc4b0b8a80c9ddb7d59997851139b225238
SHA2563d01828c32f3fbd23aecbd4e5213eaff3b62256ee947ba9fd8f04294e14ca47e
SHA5127713fc4166004bade360d3c764d663b07316dfec6d71b2ca336af0e959da8f51bc8e04389b2fde732fd24a4cd6e5b60c0e54fd6cad9681ca6402c6d41c78c02b