Resubmissions
28-11-2024 02:19
241128-cr9sks1kht 1027-11-2024 21:08
241127-zyzyaawqgn 1027-11-2024 20:16
241127-y145caymbs 1027-11-2024 20:13
241127-yzlxdavlen 1027-11-2024 19:53
241127-yl61dsxpcs 1027-11-2024 19:38
241127-ycrjcaxkfx 1027-11-2024 19:03
241127-xqsswsslej 1027-11-2024 19:03
241127-xqf44aslcr 327-11-2024 19:02
241127-xpxqfsslan 327-11-2024 18:32
241127-w6pkqs1mek 10Analysis
-
max time kernel
612s -
max time network
619s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
09-05-2024 01:27
Static task
static1
Behavioral task
behavioral1
Sample
4363463463464363463463463.exe
Resource
win11-20240426-en
Behavioral task
behavioral2
Sample
New Text Document mod.exe
Resource
win11-20240426-en
Behavioral task
behavioral3
Sample
New Text Document mod.exe
Resource
win11-20240508-en
Errors
General
-
Target
New Text Document mod.exe
-
Size
8KB
-
MD5
69994ff2f00eeca9335ccd502198e05b
-
SHA1
b13a15a5bea65b711b835ce8eccd2a699a99cead
-
SHA256
2e2e035ece4accdee838ecaacdc263fa526939597954d18d1320d73c8bf810c2
-
SHA512
ced53147894ed2dfc980bcb50767d9734ba8021f85842a53bb4bb4c502d51b4e9884f5f74c4dd2b70b53cafbe2441376675f7bd0f19bb20a3becb091a34fb9f3
-
SSDEEP
96:y7ov9wc1dN1Unh3EHJ40CUJCrQt0LpCBIW12nEtgpH9GIkQYQoBNw9fnmK5iLjTv:yZyTFJfCB20LsBIW12n/eIkQ2BNg5S1
Malware Config
Extracted
risepro
147.45.47.126:58709
Extracted
remcos
RemoteHost
107.173.4.16:2560
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-KDW6BI
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
- startup_value
-
take_screenshot_option
false
-
take_screenshot_time
5
Extracted
asyncrat
0.5.8
Default
NvCHbLc8lsi9
-
delay
3
-
install
false
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.ai/raw/o87oy6ywss
Extracted
redline
7001210066
https://pastebin.com/raw/KE5Mft0T
Extracted
redline
5637482599
https://pastebin.com/raw/NgsUAPya
Extracted
redline
5345987420
https://pastebin.com/raw/KE5Mft0T
Extracted
socks5systemz
http://ejwxuuw.ua/search/?q=67e28dd8655ba77a135ffe187c27d78406abdd88be4b12eab517aa5c96bd86ec90864e845a8bbc896c58e713bc90c91d36b5281fc235a925ed3e06d6bd974a95129070b616e96cc92be510b866db51b9e34eed4c2b14a82966836f23d7f210c7ee90983ac56d9516
Signatures
-
Detect Blackmoon payload 2 IoCs
resource yara_rule behavioral2/files/0x000200000002aa62-1274.dat family_blackmoon behavioral2/files/0x000400000002aa67-1331.dat family_blackmoon -
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral2/memory/1732-1530-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral2/memory/4260-1837-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral2/memory/4844-1846-0x0000000000400000-0x0000000000422000-memory.dmp family_redline -
Socks5Systemz
Socks5Systemz is a botnet written in C++.
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x000200000002aa5d-1219.dat family_asyncrat -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ PCHunter64_pps.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ PCHunter64_new.exe -
NirSoft MailPassView 1 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral2/memory/2052-711-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 1 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral2/memory/560-717-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView -
Nirsoft 3 IoCs
resource yara_rule behavioral2/memory/2052-711-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft behavioral2/memory/1576-718-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral2/memory/560-717-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run EhStorAuthn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\5TELDBLX3N = "C:\\Program Files (x86)\\Xhx0ly\\ebmhghbpxvappzw.exe" EhStorAuthn.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4816 powershell.exe -
Downloads MZ/PE file
-
Sets file execution options in registry 2 TTPs 14 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\%E7%A6%81%E6%AD%A2%E6%B3%A8%E9%94%[email protected] %E7%A6%81%E6%AD%A2%E6%B3%A8%E9%94%[email protected] Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\%E5%85%81%E8%AE%B8%E6%B3%A8%E9%94%[email protected] %E5%85%81%E8%AE%B8%E6%B3%A8%E9%94%[email protected] Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\%E7%A6%81%E6%AD%A2%E6%B3%A8%E9%94%[email protected] %E7%A6%81%E6%AD%A2%E6%B3%A8%E9%94%[email protected] Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\%E5%85%81%E8%AE%B8%E6%B3%A8%E9%94%[email protected] %E5%85%81%E8%AE%B8%E6%B3%A8%E9%94%[email protected] Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\%E7%A6%81%E6%AD%A2%E6%B3%A8%E9%94%[email protected] %E7%A6%81%E6%AD%A2%E6%B3%A8%E9%94%[email protected] Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\%E7%A6%81%E6%AD%A2%E6%B3%A8%E9%94%[email protected] %E7%A6%81%E6%AD%A2%E6%B3%A8%E9%94%[email protected] Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\%E7%A6%81%E6%AD%A2%E6%B3%A8%E9%94%[email protected] %E7%A6%81%E6%AD%A2%E6%B3%A8%E9%94%[email protected] Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\%E7%A6%81%E6%AD%A2%E6%B3%A8%E9%94%[email protected] %E7%A6%81%E6%AD%A2%E6%B3%A8%E9%94%[email protected] Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\%E5%85%81%E8%AE%B8%E6%B3%A8%E9%94%[email protected] %E5%85%81%E8%AE%B8%E6%B3%A8%E9%94%[email protected] Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\%E7%A6%81%E6%AD%A2%E6%B3%A8%E9%94%[email protected] %E7%A6%81%E6%AD%A2%E6%B3%A8%E9%94%[email protected] Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\%E7%A6%81%E6%AD%A2%E6%B3%A8%E9%94%[email protected] %E7%A6%81%E6%AD%A2%E6%B3%A8%E9%94%[email protected] Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\%E7%A6%81%E6%AD%A2%E6%B3%A8%E9%94%[email protected] %E7%A6%81%E6%AD%A2%E6%B3%A8%E9%94%[email protected] Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\%E7%A6%81%E6%AD%A2%E6%B3%A8%E9%94%[email protected] %E7%A6%81%E6%AD%A2%E6%B3%A8%E9%94%[email protected] Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\%E5%85%81%E8%AE%B8%E6%B3%A8%E9%94%[email protected] %E5%85%81%E8%AE%B8%E6%B3%A8%E9%94%[email protected] -
Sets service image path in registry 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\rvfxxoxqfvffclggn\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\a\\rvfxxoxqfvffclggn.sys" PCHunter64_new.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\PCHunter64_ppsas\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\a\\PCHunter64_ppsas.sys" PCHunter64_pps.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\PCHunter64_pps\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\a\\PCHunter64_pps.sys" PCHunter64_pps.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\uldvpbymcqlswtb\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\a\\uldvpbymcqlswtb.sys" PCHunter64_pps.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\gglikjlgbhwcjwij\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\a\\gglikjlgbhwcjwij.sys" PCHunter64_pps.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\PCHunter64_newas\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\a\\PCHunter64_newas.sys" PCHunter64_new.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\PCHunter64_new\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\a\\PCHunter64_new.sys" PCHunter64_new.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\faysugkfgeuwhjza\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\a\\faysugkfgeuwhjza.sys" PCHunter64_new.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\ojsutidesvhtzucqi\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\a\\ojsutidesvhtzucqi.sys" PCHunter64_new.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\xwqguhazqqiezlf\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\a\\xwqguhazqqiezlf.sys" PCHunter64_pps.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion PCHunter64_new.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion PCHunter64_pps.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion PCHunter64_pps.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion PCHunter64_new.exe -
Executes dropped EXE 49 IoCs
pid Process 4788 lomik.exe 2308 eee01.exe 1460 update.exe 2972 hjv.exe 1000 HJCL.exe 4396 HJCL.exe 560 HJCL.exe 1028 HJCL.exe 3016 HJCL.exe 2052 HJCL.exe 2592 HJCL.exe 1576 HJCL.exe 4140 AnyDesk.exe 2504 AnyDesk.exe 2976 AnyDesk.exe 4128 060.exe 1580 060.tmp 4436 cdstudio32.exe 5004 cdstudio32.exe 3740 cryptography_module_windows.exe 2780 cryptography_module_windows.exe 2900 ngrok.exe 32 Discord.exe 2436 artifact.exe 1016 ProjectE_5.exe 3484 %E7%A6%81%E6%AD%A2%E6%B3%A8%E9%94%[email protected] 3324 %E7%A6%81%E6%AD%A2%E6%B3%A8%E9%94%[email protected] 4928 %E7%A6%81%E6%AD%A2%E6%B3%A8%E9%94%[email protected] 4160 %E7%A6%81%E6%AD%A2%E6%B3%A8%E9%94%[email protected] 4500 %E5%85%81%E8%AE%B8%E6%B3%A8%E9%94%[email protected] 848 %E7%A6%81%E6%AD%A2%E6%B3%A8%E9%94%[email protected] 2568 %E5%85%81%E8%AE%B8%E6%B3%A8%E9%94%[email protected] 2784 PH32.exe 4188 dControl.exe 2848 dControl.exe 3120 VmManagedSetup.exe 1048 dControl.exe 2384 PCHunter64_pps.exe 2368 PCHunter64_new.exe 8 140.exe 1780 158.exe 4440 crazyCore.exe 1532 73.exe 4980 142.exe 688 libcef.sfx.exe 3560 libcef.exe 3116 svcyr.exe 2884 qiwuiu.exe 1476 ebmhghbpxvappzw.exe -
Loads dropped DLL 33 IoCs
pid Process 2972 hjv.exe 2972 hjv.exe 3616 hjv.exe 2976 AnyDesk.exe 2504 AnyDesk.exe 1580 060.tmp 2780 cryptography_module_windows.exe 2780 cryptography_module_windows.exe 2780 cryptography_module_windows.exe 2780 cryptography_module_windows.exe 2780 cryptography_module_windows.exe 2780 cryptography_module_windows.exe 2780 cryptography_module_windows.exe 2780 cryptography_module_windows.exe 2780 cryptography_module_windows.exe 2780 cryptography_module_windows.exe 2780 cryptography_module_windows.exe 2780 cryptography_module_windows.exe 2780 cryptography_module_windows.exe 2780 cryptography_module_windows.exe 2780 cryptography_module_windows.exe 2780 cryptography_module_windows.exe 2780 cryptography_module_windows.exe 2780 cryptography_module_windows.exe 2780 cryptography_module_windows.exe 2780 cryptography_module_windows.exe 2780 cryptography_module_windows.exe 2780 cryptography_module_windows.exe 2780 cryptography_module_windows.exe 2780 cryptography_module_windows.exe 2780 cryptography_module_windows.exe 2780 cryptography_module_windows.exe 3560 libcef.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x000400000002aa6d-1486.dat themida behavioral2/memory/2384-1492-0x0000000140000000-0x0000000141242000-memory.dmp themida behavioral2/files/0x000500000002aa6f-1503.dat themida behavioral2/memory/2368-1511-0x0000000140000000-0x000000014118D000-memory.dmp themida behavioral2/memory/2384-1664-0x0000000140000000-0x0000000141242000-memory.dmp themida behavioral2/memory/2368-1675-0x0000000140000000-0x000000014118D000-memory.dmp themida -
resource yara_rule behavioral2/files/0x000300000002aa6b-1370.dat upx behavioral2/memory/4188-1379-0x0000000000400000-0x00000000004CD000-memory.dmp upx behavioral2/memory/2848-1430-0x0000000000400000-0x00000000004CD000-memory.dmp upx behavioral2/memory/1048-1431-0x0000000000400000-0x00000000004CD000-memory.dmp upx behavioral2/memory/4188-1407-0x0000000000400000-0x00000000004CD000-memory.dmp upx behavioral2/memory/2848-1405-0x0000000000400000-0x00000000004CD000-memory.dmp upx behavioral2/memory/1048-1561-0x0000000000400000-0x00000000004CD000-memory.dmp upx behavioral2/memory/3560-2129-0x000000006E910000-0x000000006EB77000-memory.dmp upx behavioral2/memory/3560-2200-0x000000006E910000-0x000000006EB77000-memory.dmp upx -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2551177587-3778486488-1329702901-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts HJCL.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2551177587-3778486488-1329702901-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 lomik.exe Key opened \REGISTRY\USER\S-1-5-21-2551177587-3778486488-1329702901-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 lomik.exe Key opened \REGISTRY\USER\S-1-5-21-2551177587-3778486488-1329702901-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 lomik.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2551177587-3778486488-1329702901-1000\Software\Microsoft\Windows\CurrentVersion\Run\socks5 = "powershell.exe -windowstyle hidden -Command \"& 'C:\\Users\\Admin\\AppData\\Local\\Temp\\a\\VmManagedSetup.exe'\"" VmManagedSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2551177587-3778486488-1329702901-1000\Software\Microsoft\Windows\CurrentVersion\Run\RageMP131 = "C:\\Users\\Admin\\AppData\\Local\\RageMP131\\RageMP131.exe" lomik.exe Set value (str) \REGISTRY\USER\S-1-5-21-2551177587-3778486488-1329702901-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Public\\Documents\\libcef.exe" libcef.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA PCHunter64_pps.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA PCHunter64_new.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 23 IoCs
flow ioc 293 pastebin.com 323 pastebin.com 369 pastebin.com 424 pastebin.com 451 2.tcp.eu.ngrok.io 471 pastebin.com 114 pastebin.com 51 raw.githubusercontent.com 123 pastebin.com 293 2.tcp.eu.ngrok.io 332 pastebin.com 413 pastebin.com 3 raw.githubusercontent.com 88 2.tcp.eu.ngrok.io 94 2.tcp.eu.ngrok.io 116 pastebin.com 119 2.tcp.eu.ngrok.io 213 pastebin.com 221 pastebin.com 378 2.tcp.eu.ngrok.io 11 2.tcp.eu.ngrok.io 463 pastebin.com 376 pastebin.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 94 ipinfo.io 208 ipinfo.io -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 eee01.exe -
AutoIT Executable 4 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/2848-1430-0x0000000000400000-0x00000000004CD000-memory.dmp autoit_exe behavioral2/memory/1048-1431-0x0000000000400000-0x00000000004CD000-memory.dmp autoit_exe behavioral2/memory/4188-1407-0x0000000000400000-0x00000000004CD000-memory.dmp autoit_exe behavioral2/memory/1048-1561-0x0000000000400000-0x00000000004CD000-memory.dmp autoit_exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 3616 hjv.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 38 IoCs
pid Process 4788 lomik.exe 4788 lomik.exe 2972 hjv.exe 4788 lomik.exe 3616 hjv.exe 4788 lomik.exe 4788 lomik.exe 4788 lomik.exe 4788 lomik.exe 4788 lomik.exe 4788 lomik.exe 4788 lomik.exe 4788 lomik.exe 4788 lomik.exe 4788 lomik.exe 4788 lomik.exe 4788 lomik.exe 4788 lomik.exe 4788 lomik.exe 4788 lomik.exe 4788 lomik.exe 2384 PCHunter64_pps.exe 2368 PCHunter64_new.exe 4788 lomik.exe 4788 lomik.exe 4788 lomik.exe 4788 lomik.exe 4788 lomik.exe 4788 lomik.exe 4788 lomik.exe 4788 lomik.exe 4788 lomik.exe 4788 lomik.exe 4788 lomik.exe 4788 lomik.exe 4788 lomik.exe 4788 lomik.exe 4788 lomik.exe -
Suspicious use of SetThreadContext 12 IoCs
description pid Process procid_target PID 2972 set thread context of 3616 2972 hjv.exe 88 PID 1000 set thread context of 4396 1000 HJCL.exe 93 PID 4396 set thread context of 560 4396 HJCL.exe 94 PID 4396 set thread context of 2052 4396 HJCL.exe 97 PID 4396 set thread context of 1576 4396 HJCL.exe 99 PID 3616 set thread context of 3976 3616 hjv.exe 76 PID 3616 set thread context of 916 3616 hjv.exe 100 PID 916 set thread context of 3976 916 EhStorAuthn.exe 76 PID 916 set thread context of 756 916 EhStorAuthn.exe 101 PID 8 set thread context of 1732 8 140.exe 143 PID 1532 set thread context of 4260 1532 73.exe 151 PID 4980 set thread context of 4844 4980 142.exe 153 -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Xhx0ly\ebmhghbpxvappzw.exe EhStorAuthn.exe File opened for modification C:\Program Files (x86)\Xhx0ly\ebmhghbpxvappzw.exe New Text Document mod.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\qiwuiu.exe svcyr.exe File opened for modification C:\Windows\qiwuiu.exe svcyr.exe -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral2/files/0x000100000002aa3c-1069.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 12 IoCs
pid pid_target Process procid_target 4508 1460 WerFault.exe 80 1040 1460 WerFault.exe 80 4548 2308 WerFault.exe 79 3396 1780 WerFault.exe 140 2528 2308 WerFault.exe 79 2200 2308 WerFault.exe 79 4616 2308 WerFault.exe 79 484 4788 WerFault.exe 78 4916 2308 WerFault.exe 79 1776 2308 WerFault.exe 79 1660 2308 WerFault.exe 79 4948 2308 WerFault.exe 79 -
NSIS installer 2 IoCs
resource yara_rule behavioral2/files/0x000100000002aa15-38.dat nsis_installer_1 behavioral2/files/0x000100000002aa15-38.dat nsis_installer_2 -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 qiwuiu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz qiwuiu.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AnyDesk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString AnyDesk.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 lomik.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString lomik.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4520 schtasks.exe 2712 schtasks.exe 3672 schtasks.exe -
description ioc Process Key created \Registry\User\S-1-5-21-2551177587-3778486488-1329702901-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 EhStorAuthn.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 PH32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 040000000100000010000000d474de575c39b2d39c8583c5c065498a0f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b060105050703086200000001000000200000007431e5f4c3c1ce4690774f0b61e05440883ba9a01ed00ba6abd7806ed3b118cf140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc30b00000001000000120000004400690067006900430065007200740000001d00000001000000100000008f76b981d528ad4770088245e2031b630300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc25190000000100000010000000ba4f3972e7aed9dccdc210db59da13c92000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a PH32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 PH32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1000 HJCL.exe 1000 HJCL.exe 4816 powershell.exe 4816 powershell.exe 560 HJCL.exe 560 HJCL.exe 1576 HJCL.exe 1576 HJCL.exe 560 HJCL.exe 560 HJCL.exe 3616 hjv.exe 3616 hjv.exe 3616 hjv.exe 3616 hjv.exe 3616 hjv.exe 3616 hjv.exe 3616 hjv.exe 3616 hjv.exe 916 EhStorAuthn.exe 916 EhStorAuthn.exe 916 EhStorAuthn.exe 916 EhStorAuthn.exe 916 EhStorAuthn.exe 916 EhStorAuthn.exe 916 EhStorAuthn.exe 916 EhStorAuthn.exe 2504 AnyDesk.exe 2504 AnyDesk.exe 2900 ngrok.exe 2900 ngrok.exe 2900 ngrok.exe 2900 ngrok.exe 4188 dControl.exe 4188 dControl.exe 4188 dControl.exe 4188 dControl.exe 4188 dControl.exe 4188 dControl.exe 2848 dControl.exe 2848 dControl.exe 2848 dControl.exe 2848 dControl.exe 2848 dControl.exe 2848 dControl.exe 1048 dControl.exe 1048 dControl.exe 1732 RegAsm.exe 2784 PH32.exe 2784 PH32.exe 2784 PH32.exe 2784 PH32.exe 2784 PH32.exe 2784 PH32.exe 2784 PH32.exe 2784 PH32.exe 2784 PH32.exe 2784 PH32.exe 2784 PH32.exe 2784 PH32.exe 2784 PH32.exe 2784 PH32.exe 2784 PH32.exe 2784 PH32.exe 2784 PH32.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 1048 dControl.exe 2784 PH32.exe 4396 HJCL.exe -
Suspicious behavior: LoadsDriver 64 IoCs
pid Process 2368 PCHunter64_new.exe 2368 PCHunter64_new.exe 2368 PCHunter64_new.exe 2368 PCHunter64_new.exe 2368 PCHunter64_new.exe 2368 PCHunter64_new.exe 2368 PCHunter64_new.exe 2368 PCHunter64_new.exe 2368 PCHunter64_new.exe 2368 PCHunter64_new.exe 2368 PCHunter64_new.exe 2368 PCHunter64_new.exe 2368 PCHunter64_new.exe 2368 PCHunter64_new.exe 2368 PCHunter64_new.exe 2368 PCHunter64_new.exe 2368 PCHunter64_new.exe 2368 PCHunter64_new.exe 2368 PCHunter64_new.exe 2368 PCHunter64_new.exe 2368 PCHunter64_new.exe 2368 PCHunter64_new.exe 2368 PCHunter64_new.exe 2368 PCHunter64_new.exe 2368 PCHunter64_new.exe 2368 PCHunter64_new.exe 2368 PCHunter64_new.exe 2368 PCHunter64_new.exe 2368 PCHunter64_new.exe 2368 PCHunter64_new.exe 2368 PCHunter64_new.exe 2368 PCHunter64_new.exe 2384 PCHunter64_pps.exe 2384 PCHunter64_pps.exe 2384 PCHunter64_pps.exe 2384 PCHunter64_pps.exe 2384 PCHunter64_pps.exe 2384 PCHunter64_pps.exe 2384 PCHunter64_pps.exe 2384 PCHunter64_pps.exe 2384 PCHunter64_pps.exe 2384 PCHunter64_pps.exe 2384 PCHunter64_pps.exe 2384 PCHunter64_pps.exe 2384 PCHunter64_pps.exe 2384 PCHunter64_pps.exe 2384 PCHunter64_pps.exe 2384 PCHunter64_pps.exe 2384 PCHunter64_pps.exe 2384 PCHunter64_pps.exe 2384 PCHunter64_pps.exe 2384 PCHunter64_pps.exe 2384 PCHunter64_pps.exe 2384 PCHunter64_pps.exe 2384 PCHunter64_pps.exe 2384 PCHunter64_pps.exe 2384 PCHunter64_pps.exe 2384 PCHunter64_pps.exe 2384 PCHunter64_pps.exe 2384 PCHunter64_pps.exe 2384 PCHunter64_pps.exe 2384 PCHunter64_pps.exe 2384 PCHunter64_pps.exe 2384 PCHunter64_pps.exe -
Suspicious behavior: MapViewOfSection 14 IoCs
pid Process 2972 hjv.exe 4396 HJCL.exe 4396 HJCL.exe 4396 HJCL.exe 4396 HJCL.exe 4396 HJCL.exe 4396 HJCL.exe 3616 hjv.exe 3976 New Text Document mod.exe 3976 New Text Document mod.exe 916 EhStorAuthn.exe 916 EhStorAuthn.exe 916 EhStorAuthn.exe 916 EhStorAuthn.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3976 New Text Document mod.exe Token: SeDebugPrivilege 1000 HJCL.exe Token: SeDebugPrivilege 4816 powershell.exe Token: SeDebugPrivilege 1576 HJCL.exe Token: SeDebugPrivilege 32 Discord.exe Token: SeDebugPrivilege 3484 %E7%A6%81%E6%AD%A2%E6%B3%A8%E9%94%[email protected] Token: SeBackupPrivilege 3484 %E7%A6%81%E6%AD%A2%E6%B3%A8%E9%94%[email protected] Token: SeRestorePrivilege 3484 %E7%A6%81%E6%AD%A2%E6%B3%A8%E9%94%[email protected] Token: SeDebugPrivilege 3324 %E7%A6%81%E6%AD%A2%E6%B3%A8%E9%94%[email protected] Token: SeBackupPrivilege 3324 %E7%A6%81%E6%AD%A2%E6%B3%A8%E9%94%[email protected] Token: SeRestorePrivilege 3324 %E7%A6%81%E6%AD%A2%E6%B3%A8%E9%94%[email protected] Token: SeDebugPrivilege 4928 %E7%A6%81%E6%AD%A2%E6%B3%A8%E9%94%[email protected] Token: SeBackupPrivilege 4928 %E7%A6%81%E6%AD%A2%E6%B3%A8%E9%94%[email protected] Token: SeRestorePrivilege 4928 %E7%A6%81%E6%AD%A2%E6%B3%A8%E9%94%[email protected] Token: SeDebugPrivilege 4160 %E7%A6%81%E6%AD%A2%E6%B3%A8%E9%94%[email protected] Token: SeBackupPrivilege 4160 %E7%A6%81%E6%AD%A2%E6%B3%A8%E9%94%[email protected] Token: SeRestorePrivilege 4160 %E7%A6%81%E6%AD%A2%E6%B3%A8%E9%94%[email protected] Token: SeDebugPrivilege 4500 %E5%85%81%E8%AE%B8%E6%B3%A8%E9%94%[email protected] Token: SeBackupPrivilege 4500 %E5%85%81%E8%AE%B8%E6%B3%A8%E9%94%[email protected] Token: SeRestorePrivilege 4500 %E5%85%81%E8%AE%B8%E6%B3%A8%E9%94%[email protected] Token: SeDebugPrivilege 848 %E7%A6%81%E6%AD%A2%E6%B3%A8%E9%94%[email protected] Token: SeBackupPrivilege 848 %E7%A6%81%E6%AD%A2%E6%B3%A8%E9%94%[email protected] Token: SeRestorePrivilege 848 %E7%A6%81%E6%AD%A2%E6%B3%A8%E9%94%[email protected] Token: SeDebugPrivilege 2568 %E5%85%81%E8%AE%B8%E6%B3%A8%E9%94%[email protected] Token: SeBackupPrivilege 2568 %E5%85%81%E8%AE%B8%E6%B3%A8%E9%94%[email protected] Token: SeRestorePrivilege 2568 %E5%85%81%E8%AE%B8%E6%B3%A8%E9%94%[email protected] Token: SeDebugPrivilege 2784 PH32.exe Token: SeIncBasePriorityPrivilege 2784 PH32.exe Token: 33 2784 PH32.exe Token: SeLoadDriverPrivilege 2784 PH32.exe Token: SeProfSingleProcessPrivilege 2784 PH32.exe Token: SeRestorePrivilege 2784 PH32.exe Token: SeShutdownPrivilege 2784 PH32.exe Token: SeTakeOwnershipPrivilege 2784 PH32.exe Token: SeDebugPrivilege 4188 dControl.exe Token: SeAssignPrimaryTokenPrivilege 4188 dControl.exe Token: SeIncreaseQuotaPrivilege 4188 dControl.exe Token: 0 4188 dControl.exe Token: SeDebugPrivilege 2848 dControl.exe Token: SeAssignPrimaryTokenPrivilege 2848 dControl.exe Token: SeIncreaseQuotaPrivilege 2848 dControl.exe Token: SeDebugPrivilege 2384 PCHunter64_pps.exe Token: SeDebugPrivilege 2368 PCHunter64_new.exe Token: SeDebugPrivilege 1732 RegAsm.exe Token: SeLoadDriverPrivilege 2368 PCHunter64_new.exe Token: SeLoadDriverPrivilege 2368 PCHunter64_new.exe Token: SeLoadDriverPrivilege 2368 PCHunter64_new.exe Token: SeLoadDriverPrivilege 2368 PCHunter64_new.exe Token: SeLoadDriverPrivilege 2368 PCHunter64_new.exe Token: SeLoadDriverPrivilege 2368 PCHunter64_new.exe Token: SeLoadDriverPrivilege 2368 PCHunter64_new.exe Token: SeLoadDriverPrivilege 2368 PCHunter64_new.exe Token: SeLoadDriverPrivilege 2368 PCHunter64_new.exe Token: SeLoadDriverPrivilege 2368 PCHunter64_new.exe Token: SeLoadDriverPrivilege 2368 PCHunter64_new.exe Token: SeLoadDriverPrivilege 2368 PCHunter64_new.exe Token: SeLoadDriverPrivilege 2368 PCHunter64_new.exe Token: SeLoadDriverPrivilege 2368 PCHunter64_new.exe Token: SeLoadDriverPrivilege 2368 PCHunter64_new.exe Token: SeLoadDriverPrivilege 2368 PCHunter64_new.exe Token: SeLoadDriverPrivilege 2368 PCHunter64_new.exe Token: SeLoadDriverPrivilege 2368 PCHunter64_new.exe Token: SeLoadDriverPrivilege 2368 PCHunter64_new.exe Token: SeLoadDriverPrivilege 2368 PCHunter64_new.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2976 AnyDesk.exe 2976 AnyDesk.exe 2976 AnyDesk.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2976 AnyDesk.exe 2976 AnyDesk.exe 2976 AnyDesk.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe 1048 dControl.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 4788 lomik.exe 4396 HJCL.exe 2384 PCHunter64_pps.exe 2368 PCHunter64_new.exe 2368 PCHunter64_new.exe 2384 PCHunter64_pps.exe 3560 libcef.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3976 wrote to memory of 4788 3976 New Text Document mod.exe 78 PID 3976 wrote to memory of 4788 3976 New Text Document mod.exe 78 PID 3976 wrote to memory of 4788 3976 New Text Document mod.exe 78 PID 3976 wrote to memory of 2308 3976 New Text Document mod.exe 79 PID 3976 wrote to memory of 2308 3976 New Text Document mod.exe 79 PID 3976 wrote to memory of 2308 3976 New Text Document mod.exe 79 PID 3976 wrote to memory of 1460 3976 New Text Document mod.exe 80 PID 3976 wrote to memory of 1460 3976 New Text Document mod.exe 80 PID 3976 wrote to memory of 1460 3976 New Text Document mod.exe 80 PID 3976 wrote to memory of 2972 3976 New Text Document mod.exe 81 PID 3976 wrote to memory of 2972 3976 New Text Document mod.exe 81 PID 3976 wrote to memory of 2972 3976 New Text Document mod.exe 81 PID 3976 wrote to memory of 1000 3976 New Text Document mod.exe 82 PID 3976 wrote to memory of 1000 3976 New Text Document mod.exe 82 PID 3976 wrote to memory of 1000 3976 New Text Document mod.exe 82 PID 2972 wrote to memory of 3616 2972 hjv.exe 88 PID 2972 wrote to memory of 3616 2972 hjv.exe 88 PID 2972 wrote to memory of 3616 2972 hjv.exe 88 PID 2972 wrote to memory of 3616 2972 hjv.exe 88 PID 2972 wrote to memory of 3616 2972 hjv.exe 88 PID 1000 wrote to memory of 4816 1000 HJCL.exe 89 PID 1000 wrote to memory of 4816 1000 HJCL.exe 89 PID 1000 wrote to memory of 4816 1000 HJCL.exe 89 PID 1000 wrote to memory of 4520 1000 HJCL.exe 91 PID 1000 wrote to memory of 4520 1000 HJCL.exe 91 PID 1000 wrote to memory of 4520 1000 HJCL.exe 91 PID 1000 wrote to memory of 4396 1000 HJCL.exe 93 PID 1000 wrote to memory of 4396 1000 HJCL.exe 93 PID 1000 wrote to memory of 4396 1000 HJCL.exe 93 PID 1000 wrote to memory of 4396 1000 HJCL.exe 93 PID 1000 wrote to memory of 4396 1000 HJCL.exe 93 PID 1000 wrote to memory of 4396 1000 HJCL.exe 93 PID 1000 wrote to memory of 4396 1000 HJCL.exe 93 PID 1000 wrote to memory of 4396 1000 HJCL.exe 93 PID 1000 wrote to memory of 4396 1000 HJCL.exe 93 PID 1000 wrote to memory of 4396 1000 HJCL.exe 93 PID 1000 wrote to memory of 4396 1000 HJCL.exe 93 PID 1000 wrote to memory of 4396 1000 HJCL.exe 93 PID 4396 wrote to memory of 560 4396 HJCL.exe 94 PID 4396 wrote to memory of 560 4396 HJCL.exe 94 PID 4396 wrote to memory of 560 4396 HJCL.exe 94 PID 4396 wrote to memory of 560 4396 HJCL.exe 94 PID 4396 wrote to memory of 3016 4396 HJCL.exe 95 PID 4396 wrote to memory of 3016 4396 HJCL.exe 95 PID 4396 wrote to memory of 3016 4396 HJCL.exe 95 PID 4396 wrote to memory of 1028 4396 HJCL.exe 96 PID 4396 wrote to memory of 1028 4396 HJCL.exe 96 PID 4396 wrote to memory of 1028 4396 HJCL.exe 96 PID 4396 wrote to memory of 2052 4396 HJCL.exe 97 PID 4396 wrote to memory of 2052 4396 HJCL.exe 97 PID 4396 wrote to memory of 2052 4396 HJCL.exe 97 PID 4396 wrote to memory of 2052 4396 HJCL.exe 97 PID 4396 wrote to memory of 2592 4396 HJCL.exe 98 PID 4396 wrote to memory of 2592 4396 HJCL.exe 98 PID 4396 wrote to memory of 2592 4396 HJCL.exe 98 PID 4396 wrote to memory of 1576 4396 HJCL.exe 99 PID 4396 wrote to memory of 1576 4396 HJCL.exe 99 PID 4396 wrote to memory of 1576 4396 HJCL.exe 99 PID 4396 wrote to memory of 1576 4396 HJCL.exe 99 PID 3976 wrote to memory of 916 3976 New Text Document mod.exe 100 PID 3976 wrote to memory of 916 3976 New Text Document mod.exe 100 PID 3976 wrote to memory of 916 3976 New Text Document mod.exe 100 PID 916 wrote to memory of 756 916 EhStorAuthn.exe 101 PID 916 wrote to memory of 756 916 EhStorAuthn.exe 101 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2551177587-3778486488-1329702901-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 lomik.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2551177587-3778486488-1329702901-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 lomik.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\New Text Document mod.exe"C:\Users\Admin\AppData\Local\Temp\New Text Document mod.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Users\Admin\AppData\Local\Temp\a\lomik.exe"C:\Users\Admin\AppData\Local\Temp\a\lomik.exe"2⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:4788 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:2712
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:3672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4788 -s 16883⤵
- Program crash
PID:484
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\eee01.exe"C:\Users\Admin\AppData\Local\Temp\a\eee01.exe"2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:2308 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2308 -s 6683⤵
- Program crash
PID:4548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2308 -s 8083⤵
- Program crash
PID:2528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2308 -s 8283⤵
- Program crash
PID:2200
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2308 -s 8363⤵
- Program crash
PID:4616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2308 -s 6603⤵
- Program crash
PID:4916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2308 -s 8163⤵
- Program crash
PID:1776
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2308 -s 7443⤵
- Program crash
PID:1660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2308 -s 8203⤵
- Program crash
PID:4948
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\update.exe"C:\Users\Admin\AppData\Local\Temp\a\update.exe"2⤵
- Executes dropped EXE
PID:1460 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1460 -s 4043⤵
- Program crash
PID:4508
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1460 -s 11403⤵
- Program crash
PID:1040
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\hjv.exe"C:\Users\Admin\AppData\Local\Temp\a\hjv.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\a\hjv.exe"C:\Users\Admin\AppData\Local\Temp\a\hjv.exe"3⤵
- Loads dropped DLL
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3616
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\HJCL.exe"C:\Users\Admin\AppData\Local\Temp\a\HJCL.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\ButRGiQXIZcKdy.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4816
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ButRGiQXIZcKdy" /XML "C:\Users\Admin\AppData\Local\Temp\tmp76B6.tmp"3⤵
- Creates scheduled task(s)
PID:4520
-
-
C:\Users\Admin\AppData\Local\Temp\a\HJCL.exe"C:\Users\Admin\AppData\Local\Temp\a\HJCL.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\a\HJCL.exeC:\Users\Admin\AppData\Local\Temp\a\HJCL.exe /stext "C:\Users\Admin\AppData\Local\Temp\xzjfbmaqgfbradcatizumqgraiawfmhkic"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:560
-
-
C:\Users\Admin\AppData\Local\Temp\a\HJCL.exeC:\Users\Admin\AppData\Local\Temp\a\HJCL.exe /stext "C:\Users\Admin\AppData\Local\Temp\zcoycek"4⤵
- Executes dropped EXE
PID:3016
-
-
C:\Users\Admin\AppData\Local\Temp\a\HJCL.exeC:\Users\Admin\AppData\Local\Temp\a\HJCL.exe /stext "C:\Users\Admin\AppData\Local\Temp\zcoycek"4⤵
- Executes dropped EXE
PID:1028
-
-
C:\Users\Admin\AppData\Local\Temp\a\HJCL.exeC:\Users\Admin\AppData\Local\Temp\a\HJCL.exe /stext "C:\Users\Admin\AppData\Local\Temp\zcoycek"4⤵
- Executes dropped EXE
- Accesses Microsoft Outlook accounts
PID:2052
-
-
C:\Users\Admin\AppData\Local\Temp\a\HJCL.exeC:\Users\Admin\AppData\Local\Temp\a\HJCL.exe /stext "C:\Users\Admin\AppData\Local\Temp\kwtidpvmiv"4⤵
- Executes dropped EXE
PID:2592
-
-
C:\Users\Admin\AppData\Local\Temp\a\HJCL.exeC:\Users\Admin\AppData\Local\Temp\a\HJCL.exe /stext "C:\Users\Admin\AppData\Local\Temp\kwtidpvmiv"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1576
-
-
-
-
C:\Windows\SysWOW64\EhStorAuthn.exe"C:\Windows\SysWOW64\EhStorAuthn.exe"2⤵
- Adds policy Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:756
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\a\AnyDesk.exe"2⤵
- Executes dropped EXE
- Checks processor information in registry
PID:4140 -
C:\Users\Admin\AppData\Local\Temp\a\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\a\AnyDesk.exe" --local-service3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2504
-
-
C:\Users\Admin\AppData\Local\Temp\a\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\a\AnyDesk.exe" --local-control3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2976
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\060.exe"C:\Users\Admin\AppData\Local\Temp\a\060.exe"2⤵
- Executes dropped EXE
PID:4128 -
C:\Users\Admin\AppData\Local\Temp\is-TEVC9.tmp\060.tmp"C:\Users\Admin\AppData\Local\Temp\is-TEVC9.tmp\060.tmp" /SL5="$100024,4328255,54272,C:\Users\Admin\AppData\Local\Temp\a\060.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1580 -
C:\Users\Admin\AppData\Local\CD Studio\cdstudio32.exe"C:\Users\Admin\AppData\Local\CD Studio\cdstudio32.exe" -i4⤵
- Executes dropped EXE
PID:4436
-
-
C:\Users\Admin\AppData\Local\CD Studio\cdstudio32.exe"C:\Users\Admin\AppData\Local\CD Studio\cdstudio32.exe" -s4⤵
- Executes dropped EXE
PID:5004
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\cryptography_module_windows.exe"C:\Users\Admin\AppData\Local\Temp\a\cryptography_module_windows.exe"2⤵
- Executes dropped EXE
PID:3740 -
C:\Users\Admin\AppData\Local\Temp\a\cryptography_module_windows.exe"C:\Users\Admin\AppData\Local\Temp\a\cryptography_module_windows.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2780
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\ngrok.exe"C:\Users\Admin\AppData\Local\Temp\a\ngrok.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2900
-
-
C:\Users\Admin\AppData\Local\Temp\a\Discord.exe"C:\Users\Admin\AppData\Local\Temp\a\Discord.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:32
-
-
C:\Users\Admin\AppData\Local\Temp\a\artifact.exe"C:\Users\Admin\AppData\Local\Temp\a\artifact.exe"2⤵
- Executes dropped EXE
PID:2436
-
-
C:\Users\Admin\AppData\Local\Temp\a\ProjectE_5.exe"C:\Users\Admin\AppData\Local\Temp\a\ProjectE_5.exe"2⤵
- Executes dropped EXE
PID:1016
-
-
C:\Users\Admin\AppData\Local\Temp\a\%E7%A6%81%E6%AD%A2%E6%B3%A8%E9%94%[email protected]"C:\Users\Admin\AppData\Local\Temp\a\%E7%A6%81%E6%AD%A2%E6%B3%A8%E9%94%[email protected]"2⤵
- Sets file execution options in registry
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3484
-
-
C:\Users\Admin\AppData\Local\Temp\a\%E7%A6%81%E6%AD%A2%E6%B3%A8%E9%94%[email protected]"C:\Users\Admin\AppData\Local\Temp\a\%E7%A6%81%E6%AD%A2%E6%B3%A8%E9%94%[email protected]"2⤵
- Sets file execution options in registry
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3324
-
-
C:\Users\Admin\AppData\Local\Temp\a\%E7%A6%81%E6%AD%A2%E6%B3%A8%E9%94%[email protected]"C:\Users\Admin\AppData\Local\Temp\a\%E7%A6%81%E6%AD%A2%E6%B3%A8%E9%94%[email protected]"2⤵
- Sets file execution options in registry
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4928
-
-
C:\Users\Admin\AppData\Local\Temp\a\%E7%A6%81%E6%AD%A2%E6%B3%A8%E9%94%[email protected]"C:\Users\Admin\AppData\Local\Temp\a\%E7%A6%81%E6%AD%A2%E6%B3%A8%E9%94%[email protected]"2⤵
- Sets file execution options in registry
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4160
-
-
C:\Users\Admin\AppData\Local\Temp\a\%E5%85%81%E8%AE%B8%E6%B3%A8%E9%94%[email protected]"C:\Users\Admin\AppData\Local\Temp\a\%E5%85%81%E8%AE%B8%E6%B3%A8%E9%94%[email protected]"2⤵
- Sets file execution options in registry
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4500
-
-
C:\Users\Admin\AppData\Local\Temp\a\%E7%A6%81%E6%AD%A2%E6%B3%A8%E9%94%[email protected]"C:\Users\Admin\AppData\Local\Temp\a\%E7%A6%81%E6%AD%A2%E6%B3%A8%E9%94%[email protected]"2⤵
- Sets file execution options in registry
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:848
-
-
C:\Users\Admin\AppData\Local\Temp\a\%E5%85%81%E8%AE%B8%E6%B3%A8%E9%94%[email protected]"C:\Users\Admin\AppData\Local\Temp\a\%E5%85%81%E8%AE%B8%E6%B3%A8%E9%94%[email protected]"2⤵
- Sets file execution options in registry
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2568
-
-
C:\Users\Admin\AppData\Local\Temp\a\PH32.exe"C:\Users\Admin\AppData\Local\Temp\a\PH32.exe"2⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2784
-
-
C:\Users\Admin\AppData\Local\Temp\a\dControl.exe"C:\Users\Admin\AppData\Local\Temp\a\dControl.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4188 -
C:\Users\Admin\AppData\Local\Temp\a\dControl.exeC:\Users\Admin\AppData\Local\Temp\a\dControl.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\a\dControl.exe"C:\Users\Admin\AppData\Local\Temp\a\dControl.exe" /TI4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1048
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\VmManagedSetup.exe"C:\Users\Admin\AppData\Local\Temp\a\VmManagedSetup.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3120
-
-
C:\Users\Admin\AppData\Local\Temp\a\PCHunter64_pps.exe"C:\Users\Admin\AppData\Local\Temp\a\PCHunter64_pps.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Sets service image path in registry
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2384
-
-
C:\Users\Admin\AppData\Local\Temp\a\PCHunter64_new.exe"C:\Users\Admin\AppData\Local\Temp\a\PCHunter64_new.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Sets service image path in registry
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2368
-
-
C:\Users\Admin\AppData\Local\Temp\a\140.exe"C:\Users\Admin\AppData\Local\Temp\a\140.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:8 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:4152
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1732
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\158.exe"C:\Users\Admin\AppData\Local\Temp\a\158.exe"2⤵
- Executes dropped EXE
PID:1780 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1780 -s 12363⤵
- Program crash
PID:3396
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\crazyCore.exe"C:\Users\Admin\AppData\Local\Temp\a\crazyCore.exe"2⤵
- Executes dropped EXE
PID:4440
-
-
C:\Users\Admin\AppData\Local\Temp\a\73.exe"C:\Users\Admin\AppData\Local\Temp\a\73.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1532 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:4260
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\142.exe"C:\Users\Admin\AppData\Local\Temp\a\142.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4980 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:2748
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:4844
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\libcef.sfx.exe"C:\Users\Admin\AppData\Local\Temp\a\libcef.sfx.exe"2⤵
- Executes dropped EXE
PID:688 -
C:\Users\Public\Documents\libcef.exe"C:\Users\Public\Documents\libcef.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:3560
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\svcyr.exe"C:\Users\Admin\AppData\Local\Temp\a\svcyr.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3116
-
-
C:\Program Files (x86)\Xhx0ly\ebmhghbpxvappzw.exe"C:\Program Files (x86)\Xhx0ly\ebmhghbpxvappzw.exe"2⤵
- Executes dropped EXE
PID:1476
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1460 -ip 14601⤵PID:3596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1460 -ip 14601⤵PID:644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2308 -ip 23081⤵PID:1700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1780 -ip 17801⤵PID:1984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 396 -p 2308 -ip 23081⤵PID:2608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2308 -ip 23081⤵PID:1412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2308 -ip 23081⤵PID:4508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4788 -ip 47881⤵PID:4624
-
C:\Windows\qiwuiu.exeC:\Windows\qiwuiu.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
PID:2884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2308 -ip 23081⤵PID:2608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2308 -ip 23081⤵PID:4852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2308 -ip 23081⤵PID:240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2308 -ip 23081⤵PID:700
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
4Registry Run Keys / Startup Folder
4Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
4Registry Run Keys / Startup Folder
4Scheduled Task/Job
1Defense Evasion
Modify Registry
6Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
370B
MD53d4a67a116218dab70260a51723ab217
SHA1c513976cc79fe5de77063e0ffeb00f4ff7f0ff94
SHA256b0ad95a7432782f45d577a88d5d27bca5a49a324d79e04f8a1f6aff58b246153
SHA512cbef55ea21034de55b7eaa7765e673be7127069ffe7c0e7805f9fa63953066ced6331a503d54389363ccdb3f089d4bcd2541c05eff6a492dd4049dbe21a3227b
-
Filesize
438B
MD525c7d13e4d846c145f55f6c4010379b7
SHA15a9e8d3ea8b96623a45218a7aff502df0ac065ff
SHA256d7537d567b61ec0abc9d3f1cf67764e188565be2e9bc820005cb88add00d792f
SHA512a66ab1be41673874ad26f18cef8c10d68e680caba577e999683edd045e61876ceb8bb6cc3acf5f902555bf2e04a293e5f519e72ab0373f6dbcc789290c38e9a0
-
Filesize
440B
MD5c53342fb591b74cdb247d147a74071cc
SHA1d40a4138f14c11057c3b90db4802abae56562375
SHA2568ae8d883b6b5c607694674dc7c895410eda029d8cf8d4d6fbc35002cdbf07a47
SHA5126e7a3937ed2538524243a58562e4e99ea7c61ccfbb1d62c713b20d04394753bb89ba6128803a1947e59ba35e027364f551f4b36fffc6c83f5df8578520762b01
-
Filesize
212B
MD55a7887377cc4360606eb8c0e849db5c6
SHA103b270a50372837b6512d31d842b2cfedbdb7a9b
SHA25691fb8e27121ece39185db586aebafc0983ec1c7506842aec3d67de4624589fff
SHA51227367bee5119fad19d9414bd0f05b05631027a602adbbd53adf02b1c00bdffc7a858e070e9fa1204d598ff7fe3f741de5b42edc1d7d4a73b34b12eb2518bac56
-
Filesize
1.9MB
MD5aeb44632160f82be1ddd679feffca62a
SHA15d5a2be0283b77acac3c6270f1a68ee4d598cf62
SHA25698e752b4ceb1dbc5c256eeff698dd2c3f1738b8369f737f75acff718a0dc90a3
SHA512ea239d4ebb78c6c908a9df5bbda853b2a2aa2dd468cbcd8abdb559d18e2527792c0feacb78f77de799106990dab138de0623be2af02fa4191a115b0d38dd2f4b
-
Filesize
1.9MB
MD55fbd844a6ce26deb5337e8e6dd7c7b70
SHA15302e49b2027a07c7bb8f95d45510efc0d954cf8
SHA256f0d640c4e07c81c29f0ec2b603ec3017bdd4db0d0e26c3fa364a6bbf45826058
SHA512c383b5ec9fb9efd53cdf00c2b0940fe60a35a857f8be40ae0763647c3523712553910aca8504768cc86895b2168525fa6043d567e66e0ed5696e2c8e5e7b992d
-
Filesize
37KB
MD53bc9acd9c4b8384fb7ce6c08db87df6d
SHA1936c93e3a01d5ae30d05711a97bbf3dfa5e0921f
SHA256a3d7de3d70c7673e8af7275eede44c1596156b6503a9614c47bad2c8e5fa3f79
SHA512f8508376d9fb001bce10a8cc56da5c67b31ff220afd01fb57e736e961f3a563731e84d6a6c046123e1a5c16d31f39d9b07528b64a8f432eac7baa433e1d23375
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\a\%E5%85%81%E8%AE%B8%E6%B3%A8%E9%94%[email protected]
Filesize836KB
MD547786a876f5f43dc57548e51dd4a7391
SHA1816c2267106f518a974b2012c7ea5cbb710223ac
SHA256f1d5fb2c14e48c0709ddd24344ce11c80e25a464b633139c4b7c89e7c02ac699
SHA512b3e22a14b47ab1282e752a38b7847ecd4810bc8eb4092804dfefcece41760115faef2cafb08f59d538c9c80211373572b9164c8ad2d9d9d8fb8c75e010116eca
-
C:\Users\Admin\AppData\Local\Temp\a\%E7%A6%81%E6%AD%A2%E6%B3%A8%E9%94%[email protected]
Filesize837KB
MD55433ce5f372e78ea0feac807b5e80cf0
SHA194cf39d63be2da0a86126c2d31e2d94ce1f29c32
SHA256d65fecea3682295083a14185d4c448d22dd676bb4172ae78cf67554212497cbf
SHA512cd2abe7ccff9359aa2116ba3e4927fb748f106010158b46727fca7f8e882a7f38faea47ca1f880f11cfc72e3b18770ac3d84d951b90ac2caf93c1b2a5ac573ae
-
Filesize
4.4MB
MD52386fa1c47559d7476c2a19cc1318948
SHA19bcbef03898c8ec63e0908cfb6b86687de1c3a43
SHA25656524d4ae4da27978cb1e4010ccc3b88e1402bce821205129fa71d6440d1261a
SHA5129bb37b10b529dd2f3cd6048da326812eff9d8b6fa401de69ee76bfb690633238d6241e944117bcb6777083bbf6352265549b953c9c87f2ed437b16190cc5f70f
-
Filesize
267KB
MD5c39839f7ed291ea111048795dd5be6f7
SHA1e3162bfc28faede95ef05e4dc3a4889e6c2c1cc9
SHA25689e8a15dca11e1ba0705bfeb2380a2304ea0b103e31a733a46165965be4ecae6
SHA512367d2c3ecce821c2cf673757f773d56dc499556a971519d0c1e1a93bb48afe575491eaf9e2bfde17436d7491881296885a22a1e3711153fc46a9a9f1fbcef8aa
-
Filesize
267KB
MD5a9d7aa932e7f023f31dff684a3832b4c
SHA1d2289c56b1c563baa0ff4754fc075985287c0939
SHA256bec9ff074cfa6ad1a5d1d9e657fb3e012507c48f1f755e56e774ddafee31d7e5
SHA512d58a42b47898ae1ed726a8d3e84568fe34403bee866a07f57307ccc6c2a47d50190dd059b086d6fcfc22cebdbc4217d93ebc944bfcc4ff6b887b6cd3caba8d5f
-
Filesize
278KB
MD5f700c7059dcb4db8b23e7f31ec135b7b
SHA15f396e6e296ad01765c0e090dbb0130698531b91
SHA256b5e6dde637ff9dbc4dc8602c2340a4697009e2e4f1d876b9aaa6d7d0608cfcc6
SHA51293f98687c55f6d1d6e58a42b8fe8de9ef8e5a7b0d9cefc9987d3d94b5332f1ea3672aefb97ae8aaf37a8b078a4206d83c4550f7fc2a0e58105d55f9fd3afc256
-
Filesize
267KB
MD521585d1f0793891f553ceee58631c939
SHA13ba1d7e77d4c3d29cc62515c1644c98faa04a218
SHA256277b983ca2bea29b713461039a39535fa4d3647055ebc52cf990221d5db36b5b
SHA5126b5f112b508f1c98e670ea9e3acd0b3f0826f3c978bbb24a6626933c4ee56947c14c080794a30de99e39742fabf6c218aadb207f5023239f2e7833e1b06911b6
-
Filesize
5.3MB
MD575eecc3a8b215c465f541643e9c4f484
SHA13ad1f800b63640128bfdcc8dbee909554465ee11
SHA256ec33d8ee9c3881b8fcea18f9f862d5926d994553aec1b65081d925afd3e8b028
SHA512b3a48230fc6f20038c938e5295b68a3f020b94e220ca2fab6a894d126dc41f6f1021c239613bf9d6de84370ad7df9d9a91baf716a87d43eb101ee3e48578e5ff
-
Filesize
47KB
MD5f0d723bcc3e6a9b9c2bce6662d7c5075
SHA120351c296e09300073a7172eba2c5b83b63af5ef
SHA256c2581f5f80995248435855de78cc4821630ae367d05fe204f032dda3e65abda8
SHA5122fc7bb4c3496328f678766ad230529049f90f4f98c5338de79d7d7a7e3546c5a0e430cb337c2bfb833f6dc67cb69f61c14e5b5b91d9e0ba917b9c32468ee2dbc
-
Filesize
1.4MB
MD541865f7b2afe5058e695579cbed1e92f
SHA19814e78d809e260e294ae85bbe69fe21916f6f7b
SHA2567e6ba6f340da6ec5121f2c910b376fe4a23adeed64ab239a295864c136eb40b1
SHA512cd64b5468afb9cbab925c7da671726e54d00872eaee60f346f03ebbbc8b955689249e688e11177fcaa9e7451d085628c0bad2ee24e0632d7362258ee2b3117b6
-
Filesize
3.6MB
MD5b2e838d70bfc9472589febec641cf393
SHA12a7136ab2ace40f73e0374f14a1ab1d873dc9b36
SHA256fc850a0a686b268379e84d6adf1c570b9fa10c3d9b4d979fce68bfe9b3536499
SHA512e3de93e3e262e66584c0add82ec91c3cf987d0655cda0d9c40d08316ef94650ab4688c2784cffea4401cf17294fccba10ec5dcb5fef4154bc8dd69ab6a9b74e7
-
Filesize
5.4MB
MD51a3802554c422e3780dc748750e74335
SHA14403bf4b4232f3c183b7377094e5078bd62625e5
SHA25651c02883ebbe5e5d03fb5ad91b8de736d9dc2deaf6f271f9f7fe229a264cd77f
SHA5124119196992896087576c1d41037820ec51451f6028a11c097e2993567d31b6daaeb2b19481ec32b8a3b87be399c89de3989838f6b5adc10ac6a28ef9a418cdaf
-
Filesize
1.4MB
MD568f9b52895f4d34e74112f3129b3b00d
SHA1c5e2018bf7c0f314fed4fd7fe7e69fa2e648359e
SHA256d4a0fe56316a2c45b9ba9ac1005363309a3edc7acf9e4df64d326a0ff273e80f
SHA5121cd875f9d0301b14645ea608fe61560a229ee395fa061f32675c3d84e41916998f887278d8497a5e875be22ba8fcbcfcbd878a5e2ed1746dc75430b7aed5fede
-
Filesize
1.1MB
MD5aabe25c748360f1575c09d77cc281e07
SHA11148798644722e1c8f762ff07e9f586118fe18cf
SHA2566e3fa62d5c15ce8b5bc8766edba80407099d78e20d9ff25b8733809064faae54
SHA51234a59cdd8cd5a6175b957fe48aaef964707e55c0a381265074fa8b841930938001a7dec9c6fe899e33e043d50e75ce02df0d6583e0f072123164409b3c93e09e
-
Filesize
16KB
MD57ee103ee99b95c07cc4a024e4d0fdc03
SHA1885fc76ba1261a1dcce87f183a2385b2b99afd96
SHA256cc4960939a41d6a281ddad307b107e16214f4aeda261c9b5037f26e60dc7bba2
SHA512ad3189d8ba4be578b13b81d50d1bd361f30fc001ebe27d365483858b3d78db38b6b54c1464f816b589c01407674ffcaae96d34b923ec15d0808cfed2bfa8ce21
-
Filesize
17KB
MD53a87727e80537e3d27798bc4af55a54b
SHA1b0382a36de85f88a4adf23eaa7a0c779f9bf3e1f
SHA256bac119d2db4efdad6c6b264942e0e10ec5c3d919480b8ed2b25a747ad4e8a96e
SHA5124e8d393bfda66d220a81edac93912a78d7893920773bd5f6c1dfc5a4edbc2fc8488688da984272d1b16b167bb1c233b7579c0ff78ef0a872df7bb95e4561b7c9
-
Filesize
7.8MB
MD5ec69806113c382160f37a6ace203e280
SHA14b6610e4003d5199bfe07647c0f01bea0a2b917a
SHA256779a5fe11a1db6a3b4a064a57106c126b306a027b89200c72744eeac0db0bfe2
SHA512694d1a907abe03bef1d0f39679b920fdb8e14ebf3443d56defedbf31f8fa7458a89d547c9e9c315cdd226f614d1e436afd52622c119cb9d83d9751ff7854c946
-
Filesize
447KB
MD558008524a6473bdf86c1040a9a9e39c3
SHA1cb704d2e8df80fd3500a5b817966dc262d80ddb8
SHA2561ef6c1a4dfdc39b63bfe650ca81ab89510de6c0d3d7c608ac5be80033e559326
SHA5128cf492584303523bf6cdfeb6b1b779ee44471c91e759ce32fd4849547b6245d4ed86af5b38d1c6979729a77f312ba91c48207a332ae1589a6e25de67ffb96c31
-
Filesize
2KB
MD5fea20d1e0a07862e79d89138c57b8503
SHA16536505c88f4a654cbf4b90505446cc4d34fc30f
SHA25645aeb478b29f4bccb55dff6143f91d27b3b1af48958eaf5550126b6ec4694ed4
SHA512d48959bcad462badebc278a6371d63da19096b08623228ceda049f8a5d99ebee116505eb99dc9e09e2bda595050d340a27bcb003590e69e0c1af28e31305abd1
-
Filesize
932KB
MD59ccfada387a7c19d884ca41b7a78b14d
SHA151d4f0fd507a119f87fafc6c342ad9780c6a16b3
SHA25655371c7e07003d5fcfe5cf3187b1ba865cbe5ad4b015db5d1bf06195c995080a
SHA51246dd7f2fd6dc1594aea510c7361a16510cf515e914d5776b0f581e1d5431bfad232da4315374e5cc06600f9a1e754d5a0c3fad3f24cbe1952a56f9bc37d9b1f7
-
Filesize
624KB
MD55eb2f44651d3e4b90664bab3070409ff
SHA16d71d69243bc2495a107ca45d5989a6fc1545570
SHA25632726fa33be861472d0b26286073b49500e3fd3bd1395f63bc114746a9195efb
SHA51255eef39a6845567c8bf64d04e5414537837ae7937229849f7bb1f28e4ddc22428aa1d56af177606c1ea31dd8799ff96d1dfa0f80cb266afe31ca1b43fe9313b5
-
Filesize
502KB
MD569568a88abae198f5ab9ae1578383cc2
SHA18465bb8304fcc90bc1fd0dd3da28d959258f4107
SHA25606ec46f6d1f609aeafb8e8f5be8d12f8874902661394ce04094249558237c29d
SHA5121bfaf5241bc2c16dd1d75363c6437b526f7d59066ab7fe88734c04e17e3fc5555a2732476586814dc131aa7cfee630597587a66ff08d1a2c67b8b6b43beca3f7
-
Filesize
1.8MB
MD59086dc170ca5e4763e6658db1931e678
SHA14988ecf058deea292d21e99b8552a379f6e21edc
SHA25615485127b4f1c4bd92fc6e302ddbb998e1d966a8603534a47da80cb2e73f35c2
SHA512b6aeb0ab81dd4fbbc914797d6a839d3bcebd884e31468ca0a02705e86d0753cd16a39a3119066825fa6970f13c62b51d626520c1a1157f50596be211217acff4
-
Filesize
3.1MB
MD5d81c636dceec056448766c41f95c70bd
SHA1c96b12739c67bf3ea9889e0d28c783d9597ee2c7
SHA2566cfad9496a2bee32a0f4dda1de58005c6592a59e7365623f5314ccae417b1055
SHA5127632d9bf30cc28d3d33465a356f3aff2297792db2cc2ef17e24de7adfaa55057a4acee06c206d8b531cc2b3bc870b301fe1befda12b953ee1d7c4dc4e4ffabb4
-
Filesize
24.2MB
MD5d028e35142a32bb77301ea582548c71a
SHA18e15de99d64578469e27baea8000509d98ac6d82
SHA256f7d772465d27fc379f08681b2ee532baad91c50a6bdd7ecd6faaf0d11adb77dc
SHA5125bc232960fbaafc22bc6b42f1a160bace23f0ff8061969f66488de7ae376e961428840c946a56f61dc0064848f601dbfa78ae22b8b1ed27f02ca65e9ee9b50c6
-
Filesize
104KB
MD57edc4b4b6593bd68c65cd155b8755f26
SHA12e189c82b6b082f2853c7293af0fa1b6b94bd44b
SHA256dcd92ec043cb491b3de3e4f73fbe35041274a9b81d48b4377c8c9a8157c95590
SHA512509b4630cf02fd7ef02893367a281bb2a361e527ea6279bf19477b2fcde5f477f5a3f8c4f1fb692406df472a52fb000aa55875469ddf5ea8ee9c411b37c1f979
-
Filesize
312KB
MD5eb9ccfe6044b46b7ee313c3dc9ffe966
SHA104e5c7dca38b2a78e8c21ea83f4b359ec5a46657
SHA2564a4d61eb977b43d044573d215a6a112562960969288b170e8c7ab22c635c234c
SHA5122a81bb17adb11abd51894d4918ac48830cf434e0fa34ceda54d92f6337724f2e61eaadd47f002fed2a682081494abce4b69e22679ac7dbbda8374c48cba55637
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
696KB
MD52e2f983fe7fcf3751ff06afb8842a41d
SHA1e7296f13ab8b7a0ba6ee1d2dee180a3eb345815f
SHA2568e9f8ccf8a70e815a29dc9e0057b0ad7d43a5e9d9671a50e1c14d48344f76dea
SHA51279f0eddfb107724d5a16d678e8ead3a8c10881d1486b5cb8b3fb8fa1ad96a864d4c45075be865c8f5637c3a9258630ff816d7253b5ce984f24f7602851243174
-
Filesize
62B
MD5903e0572b61353c5e9e2f94582bd26d9
SHA1bf6d18b2607a519c4486e845921b7070e53cb8eb
SHA256fcc0de8ebc57a00f3f48bc8ba2e93cedc7efe9ecc9600ad63cdd1ba1d6c4fdea
SHA5123857e85783aa8af1cd075e91729bfd471c3df9d93d944501bf8bd663df9ad1348ee9d81403505851d468beaea9a3ac0ad6799eb4b2e328176c27d32cdf206b94
-
Filesize
74B
MD516d513397f3c1f8334e8f3e4fc49828f
SHA14ee15afca81ca6a13af4e38240099b730d6931f0
SHA256d3c781a1855c8a70f5aca88d9e2c92afffa80541334731f62caa9494aa8a0c36
SHA5124a350b790fdd2fe957e9ab48d5969b217ab19fc7f93f3774f1121a5f140ff9a9eaaa8fa30e06a9ef40ad776e698c2e65a05323c3adf84271da1716e75f5183c3
-
Filesize
10B
MD59a53fc1d7126c5e7c81bb5c15b15537b
SHA1e2d13e0fa37de4c98f30c728210d6afafbb2b000
SHA256a7de06c22e4e67908840ec3f00ab8fe9e04ae94fb16a74136002afbaf607ff92
SHA512b0bffbb8072dbdcfc68f0e632f727c08fe3ef936b2ef332c08486553ff2cef7b0bcdb400e421a117e977bb0fac17ce4706a8097e32d558a918433646b6d5f1a1
-
Filesize
11KB
MD5883eff06ac96966270731e4e22817e11
SHA1523c87c98236cbc04430e87ec19b977595092ac8
SHA25644e5dfd551b38e886214bd6b9c8ee913c4c4d1f085a6575d97c3e892b925da82
SHA51260333253342476911c84bbc1d9bf8a29f811207787fdd6107dce8d2b6e031669303f28133ffc811971ed7792087fe90fb1faabc0af4e91c298ba51e28109a390
-
Filesize
52B
MD55d04a35d3950677049c7a0cf17e37125
SHA1cafdd49a953864f83d387774b39b2657a253470f
SHA256a9493973dd293917f3ebb932ab255f8cac40121707548de100d5969956bb1266
SHA512c7b1afd95299c0712bdbc67f9d2714926d6ec9f71909af615affc400d8d2216ab76f6ac35057088836435de36e919507e1b25be87b07c911083f964eb67e003b
-
Filesize
56B
MD536e0479ee530f7fb7372245abe498442
SHA173034ade516c6bf060b6e97cc3c89fa2cf70b993
SHA256bdedfa3075b3e133c71a5abeec7ab86880dd5ca8503cc6a5fac86b257dc5f1cf
SHA512bfae6ca6bf4b014759c8030fe6e413b8a92c7361e00395b63b7100aaf0646eab6b751674c37b9fd92bc0eb600b48f33a071ccf5e684eecaf4cb0be2fb95bf0d5
-
Filesize
30B
MD5f15bfdebb2df02d02c8491bde1b4e9bd
SHA193bd46f57c3316c27cad2605ddf81d6c0bde9301
SHA256c87f2ff45bb530577fb8856df1760edaf1060ae4ee2934b17fdd21b7d116f043
SHA5121757ed4ae4d47d0c839511c18be5d75796224d4a3049e2d8853650ace2c5057c42040de6450bf90dd4969862e9ebb420cd8a34f8dd9c970779ed2e5459e8f2f1
-
Filesize
60B
MD5b5a9b50b4278f31cf8e8ad052b2c39f6
SHA1f1c88c09bad1aafaf5cd0de9eb29e9092f119a51
SHA25658441afb24ac1fe610a47e89d0848865842be2383ab88c06d31fd70eec7ce470
SHA512b00baeeb3332e66724077ee2430cd43f2a39041b7b7d43d195199e2465d272f16b49711ef6c34c3617f3f815097e80f48b574ef7ac37b6de75ec777f5f9cb447
-
Filesize
7B
MD567cfa7364c4cf265b047d87ff2e673ae
SHA156e27889277981a9b63fcf5b218744a125bbc2fa
SHA256639b68bd180b47d542dd001d03557ee2d5b3065c3c783143bc9fb548f3fd7713
SHA51217f28a136b20b89e9c3a418b08fd8e6fcaac960872dc33b2481af2d872efc44228f420759c57724f5d953c7ba98f2283e2acc7dfe5a58cbf719c6480ec7a648b
-
Filesize
9B
MD52b3884fe02299c565e1c37ee7ef99293
SHA1d8e2ef2a52083f6df210109fea53860ea227af9c
SHA256ae789a65914ed002efb82dad89e5a4d4b9ec8e7faae30d0ed6e3c0d20f7d3858
SHA512aeb9374a52d0ad99336bfd4ec7bb7c5437b827845b8784d9c21f7d96a931693604689f6adc3ca25fad132a0ad6123013211ff550f427fa86e4f26c122ac6a0fe
-
Filesize
13B
MD5968d5ad691d2a0ccc23d4e410546d745
SHA1cd5f5f16097f4ced99c2e11f75c3c3b4b891416a
SHA256bebca67508315817f99b0580d446f7c1e89f6ae4d56b362d2ebb446046104dcc
SHA512e1f2d970247ae1f749b6561855006748fc0c7d0b58949d58186e423324ef77f381485e9a6603027366d67454cf6b20d40fb03da385da56a5f5336c7847d0e6c6
-
Filesize
22B
MD57b381311a78901489326c8a317ddf8cd
SHA137d010f4fb37e77310effc7625dadbbbb36e8fe4
SHA25659813bc6f04b4d5a16bd89d01602f4308759a60a579022a6bd209c1c0e8b463b
SHA512626e1a6b65a7909b365f1b8623d9589889ac92f118f9c56d379af6e66e689075a70a82f76a790512203840506d8400c17f8afbd8a60540c14042c35e622a76e6
-
Filesize
73B
MD5b80ef50d0f02b0e60035ddab237b744e
SHA1addac470421ca09efee0c0718d805e1312246086
SHA256d26183d8122f1a8b4a98c5716a0520bdf9b28b95fa3baac4af25c49d39bd1da9
SHA512ccf91989bb62dfd85144b5b85528921f2a134515797fbe6be348852bca34e6e7bc27a7d6a17e7ba28b62a8c644581a092a892957c84853cbb29eea8cb6792820
-
Filesize
66B
MD53a055708070979e7bf5088d9471320ba
SHA1cb4e803ae05765ee43787cbd3abb91166bbf8fd7
SHA256cc1c32ae1abcb46fd4871832a8b7a51a440905d97709c53e66d16a0cd33276ee
SHA5123f3b5c9c1fdca9e76fda76ff601d11320b4866ee0b0358b014699e33be79252cb94390fb589fa5099b68d00491a207f3fe6223b955a5a4be6f1df1b389fd613e
-
Filesize
11B
MD59234653ab7a15a6a77df6d71833b2863
SHA140bced20128597a1a694eeb78cfeb926b606a9cf
SHA256cb9399842dd29519b6a475e7496610bf77edb3c59b56b4a708f0304632c909a8
SHA5120245b93f0b052ea70e7f5aa2c2b139f833ad40e67eaafa8c1b51421b87f67e7ef8218df07d397e862d6210f941930e71e21c2159e01fbd415a42c5eec9c48c34
-
Filesize
20B
MD53bb6070b3e4cbc844c6cee699666f746
SHA1eaeb87f3175746d3c8a0896e35f5f2d3ad4f2d7b
SHA2568678054a5a992d44bb69e4ab770e4d17cd1530511f044754ba3a15e59121cba4
SHA512cf53f306a00ef5ed498c1dcaa426b013a64520938f492d77cd0f1cc15dffe37d465f30b9e15d451e1f85ed8e67f2ebed0930302ddb94b2f7172dd9e4fd6c52f7
-
Filesize
100KB
MD5f41313027e007e8110c7ea9908ab5aac
SHA1e36a4121ba9d9dc35dbc37d6574a203f5f50fa47
SHA25634b9c5f8f3680de7b036da6e03cf6a7f08d28327d4f083cb1bdfef53bb96c654
SHA5127cbde14eda28093acf119298719e7bfc9fa6e2baf20fa1c263da5719fad3997ed54c371959298661807750bce1d1ca237e03af8aed81bdc34eaefe63b5af4c83
-
Filesize
46KB
MD58f5942354d3809f865f9767eddf51314
SHA120be11c0d42fc0cef53931ea9152b55082d1a11e
SHA256776ecf8411b1b0167bea724409ac9d3f8479973df223ecc6e60e3302b3b2b8ea
SHA512fde8dfae8a862cf106b0cb55e02d73e4e4c0527c744c20886681245c8160287f722612a6de9d0046ed1156b1771229c8950b9ac036b39c988d75aa20b7bac218
-
Filesize
112KB
MD587210e9e528a4ddb09c6b671937c79c6
SHA13c75314714619f5b55e25769e0985d497f0062f2
SHA256eeb23424586eb7bc62b51b19f1719c6571b71b167f4d63f25984b7f5c5436db1
SHA512f8cb8098dc8d478854cddddeac3396bc7b602c4d0449491ecacea7b9106672f36b55b377c724dc6881bee407c6b6c5c3352495ed4b852dd578aa3643a43e37c0
-
Filesize
1KB
MD5d71dedeeb4d5ef6e05636dd32f6df60d
SHA1af8fb26deb21686c214ff31e344ca2d426ffca0a
SHA2563a4871bbc22f3c07c0f708f73e9566c7a2b0eeeed0c2abe2acfc1f3ce419ea71
SHA512bff2afc545fde8c73a2519cd065f1c99a29a6b1b0583d81987872223a2a90636420d6ad697dd563419dad162bdd2eb85a255fa8d31a0eb426be3fcd4ebd7299d
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
8KB
MD51771c6e94ab1c5823bad7bcea0fc1ac5
SHA11e012b7709646ba3e97793a61f483c601d3396d5
SHA25629a688c0605d38f376d11ded507de9900bbd81f20ad1f8bdda0143e1d3734341
SHA51232fe5f72bc2a0d15885c4dd8257bebeff673e2c1b744ab299dc46fd7209e8d0e57b693fae5a83133ba9af0319accac66d3f6114713f97c8b1f0641d88e89d51d
-
Filesize
2KB
MD5968adc80ffe9277aa0201aab5b6cdbce
SHA1e65ba89e184e1a81f22be9dde1e2a1ba3ccd4a68
SHA256b70a5c5573ba0150f6602921a884a7ebe376af2183b39c74e99146d35a84602c
SHA512c70344c0d6526126637a45061055a7ee0dda404a215a82ea266763f983039ca725f90a30f58b2ed604f439ad070cab2ca4173a8af59e0c63919796937a4f5798
-
Filesize
2KB
MD52e3b9ea816a25a8ab0c7b4058e687df0
SHA17da0834fd8d65c7ca055666b8f0a5b037cb42416
SHA256bb49534f09abc79f99563c2ac1b33b59b2d8de95714567b28bd1d10520c1b2b3
SHA512e17801ed378f243722923e80c3d0970478b680ce621470cce415be8c44710a514636582cdbf803a0394fdc15eee74ebe2cbd330779a585258d4d0b7d5c2939e2
-
Filesize
312B
MD50c04ad1083dc5c7c45e3ee2cd344ae38
SHA1f1cf190f8ca93000e56d49732e9e827e2554c46f
SHA2566452273c017db7cbe0ffc5b109bbf3f8d3282fb91bfa3c5eabc4fb8f1fc98cb0
SHA5126c414b39bbc1f1f08446c6c6da6f6e1ceb9303bbf183ae279c872d91641ea8d67ec5e5c4e0824da3837eca73ec29fe70e92b72c09458c8ce50fa6f08791d1492
-
Filesize
424B
MD5a8ebcc7172d5a56cd4bdbb708600f384
SHA19f8b728f2c9058f9a2e63f6422e8c5fd4b8ab10f
SHA25637752276d85d77da215f378e83ebcb308aa4cb6174f3f4a8ae61d63f57cc3422
SHA512a4042ef57a4bce86cdb174b9921122acd06825c97c0522f7a7046cb36ab2113688322355f127d6e0f3e8c79c8b6a39871921f97f2a9ec885fcb400232bff017a
-
Filesize
681B
MD557be78f2384d7ccba3526b082feaa419
SHA1965566c1346240a2c9a6875d1e9f958349a7acad
SHA256e7c5cfe4a82392026052337d043383b6d9d80d14262b348785d8ffe8f9c1f6e5
SHA512e3779c3d29131b64b186bf1b5097e30960f00f0b4a4bd7303f331f5ad60341ae701a49394c26db909b96c9fcf4c1aab3ece7c887a9c9cfd5425b3ca6a74f0595
-
Filesize
802B
MD56cf5238173925267b1cd220151b079ae
SHA14f2ea6b73f89861100b2f297adee02882afe7bc3
SHA2566604fd4d956ddeafe2414418288ed48f22fd0f6352535586696dd38b561146b1
SHA512601ff22a4cb0872098379a79035064caeb3d92bbce9830608a57dfc3a47d4fb707a71e5c16fe84828b16a7edf6cacd9298bbf9e904394b80f735817e9b508b7f
-
Filesize
1KB
MD53f71961d272772ff2170e920b5040196
SHA1fd0f66035ac5d73ef0676aa57e9f45a49621dc66
SHA2566bdf3ab23a8c684c475cfecdf22c27f03ddb0c387469ea4dfbd0417033917547
SHA5123488ecac51b56f353f8b9a8a21accfef7bf7b7440f3881aa2e0fd66abd9e1c411c8156d23523c8e68f69b773773062bfb2824cc04086b0caeecea36241d79bc2
-
Filesize
1KB
MD5fa79b06f77671d76ff59adcb28ce590a
SHA1454ed33d74705cd1178e13cb6d8b3fc27e3f0027
SHA256eba20b12b59dec9d4e9eb0869f5752324b031e1158e4abb3489a9e869cc4246b
SHA5122d5b85c0ae8d3727446610928d31e21d8d05bd05ebfa7769ae13657f61ca94597dafab4fb462ed515e193f0060b2d801a5377e35163852c28722404dfb237fcf
-
Filesize
6KB
MD55e3ee0a6691c106ab1b92c23d2547d41
SHA1a3fcc877773a5b338d07af4e5dff4316255cffda
SHA256b80daf571cca31da732e20eef9976dc755560136256db1d9b3e58cf6d5ea8242
SHA51215e7f8d12c5c669928e8733e86b3b037125c03a95e0e1a6b455be8fbd27d238dd373cec41e3ac5788ca54f7bf3d04a03e3db3d0611a7bbec7a53661ad174bd90
-
Filesize
6KB
MD5fc97dcd50bca646beb1c9cb8e426eac3
SHA1931a7f427a76c66251fd748e6dbd118d5737fd62
SHA256519307a2de83dba06963554a5c1da963ed66b89ac8653500bb0f2335ecbb9e26
SHA5129a21d80e59b31833a76206eb623b8ff219926ac41cc7c626577c1c490779bb951898f14b7476af78429bb4c3c52903708dec49f4e452f53d316701f23415daf6
-
Filesize
895KB
MD599232c6ae4570778d2069f9567e3b4f1
SHA10dce35d4b2d15be839999ba00cd1f829c4a2dac0
SHA25661e1379a27b0c5d73db6302ffd1f8522a47080554866b9c99b1eb771c60cd83c
SHA51286e940cf2f44c8c3ea5d83b02a4db5e0926ceea5d5ca2ae9a44fdbe14333393bf3b267c0d755d42ca2efdc083c1bd975eb446b2d34187879dabe3d03a0780a5b
-
Filesize
14KB
MD59d5a0ef18cc4bb492930582064c5330f
SHA12ec4168fd3c5ea9f2b0ab6acd676a5b4a95848c8
SHA2568f5bbcc572bc62feb13a669f856d21886a61888fd6288afd066272a27ea79bb3
SHA5121dc3387790b051c3291692607312819f0967848961bc075799b5a2353efadd65f54db54ddf47c296bb6a9f48e94ec83086a4f8bf7200c64329a73fc7ec4340a4
-
Filesize
12KB
MD5efe44d9f6e4426a05e39f99ad407d3e7
SHA1637c531222ee6a56780a7fdcd2b5078467b6e036
SHA2565ea3b26c6b1b71edaef17ce365d50be963ae9f4cb79b39ec723fe6e9e4054366
SHA5128014b60cef62ff5c94bf6338ee3385962cfc62aaa6c101a607c592ba00aea2d860f52e5f52be2a2a3b35310f135548e8d0b00211bfcf32d6b71198f5d3046b63
-
Filesize
7KB
MD5ecffd3e81c5f2e3c62bcdc122442b5f2
SHA1d41567acbbb0107361c6ee1715fe41b416663f40
SHA2569874ab363b07dcc7e9cd6022a380a64102c1814343642295239a9f120cb941c5
SHA5127f84899b77e3e2c0a35fb4973f4cd57f170f7a22f862b08f01938cf7537c8af7c442ef2ae6e561739023f6c9928f93a59b50d463af6373ed344f68260bc47c76