Analysis
-
max time kernel
261s -
max time network
265s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2024 12:50
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.mediafire.com/folder/3is42kz6mwjhj/Files
Resource
win10v2004-20241007-en
General
-
Target
https://www.mediafire.com/folder/3is42kz6mwjhj/Files
Malware Config
Extracted
vidar
11.1
467d1313a0fbcd97b65a6f1d261c288f
https://steamcommunity.com/profiles/76561199786602107
https://t.me/lpnjoke
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
Signatures
-
Detect Vidar Stealer 21 IoCs
resource yara_rule behavioral1/memory/4968-665-0x0000000000600000-0x0000000000876000-memory.dmp family_vidar_v7 behavioral1/memory/4968-668-0x0000000000600000-0x0000000000876000-memory.dmp family_vidar_v7 behavioral1/memory/4968-675-0x0000000000600000-0x0000000000876000-memory.dmp family_vidar_v7 behavioral1/memory/4968-676-0x0000000000600000-0x0000000000876000-memory.dmp family_vidar_v7 behavioral1/memory/4968-734-0x0000000000600000-0x0000000000876000-memory.dmp family_vidar_v7 behavioral1/memory/4968-741-0x0000000000600000-0x0000000000876000-memory.dmp family_vidar_v7 behavioral1/memory/4968-745-0x0000000000600000-0x0000000000876000-memory.dmp family_vidar_v7 behavioral1/memory/4968-746-0x0000000000600000-0x0000000000876000-memory.dmp family_vidar_v7 behavioral1/memory/4968-748-0x0000000000600000-0x0000000000876000-memory.dmp family_vidar_v7 behavioral1/memory/4968-749-0x0000000000600000-0x0000000000876000-memory.dmp family_vidar_v7 behavioral1/memory/4968-753-0x0000000000600000-0x0000000000876000-memory.dmp family_vidar_v7 behavioral1/memory/4968-754-0x0000000000600000-0x0000000000876000-memory.dmp family_vidar_v7 behavioral1/memory/4968-770-0x0000000000600000-0x0000000000876000-memory.dmp family_vidar_v7 behavioral1/memory/4968-771-0x0000000000600000-0x0000000000876000-memory.dmp family_vidar_v7 behavioral1/memory/4968-802-0x0000000000600000-0x0000000000876000-memory.dmp family_vidar_v7 behavioral1/memory/4968-803-0x0000000000600000-0x0000000000876000-memory.dmp family_vidar_v7 behavioral1/memory/4968-810-0x0000000000600000-0x0000000000876000-memory.dmp family_vidar_v7 behavioral1/memory/4968-811-0x0000000000600000-0x0000000000876000-memory.dmp family_vidar_v7 behavioral1/memory/2096-952-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/2096-956-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/2096-957-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 -
XMRig Miner payload 9 IoCs
resource yara_rule behavioral1/memory/2916-929-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2916-930-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2916-936-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2916-934-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2916-933-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2916-935-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2916-932-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2916-937-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2916-938-0x0000000140000000-0x0000000140848000-memory.dmp xmrig -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 968 powershell.exe 1848 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\system32\drivers\etc\hosts JEBFIIIEHC.exe File created C:\Windows\system32\drivers\etc\hosts Updater.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation AFBAFBKEGC.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation service.exe -
Executes dropped EXE 10 IoCs
pid Process 4264 S0FTWARE.exe 4552 JEBFIIIEHC.exe 4172 AFBAFBKEGC.exe 4176 Updater.exe 1372 S0FTWARE.exe 3624 service.exe 2588 S0FTWARE.exe 4088 S0FTWARE.exe 2532 S0FTWARE.exe 2912 S0FTWARE.exe -
Loads dropped DLL 2 IoCs
pid Process 4968 BitLockerToGo.exe 4968 BitLockerToGo.exe -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 355 bitbucket.org 356 bitbucket.org 379 pastebin.com 380 pastebin.com -
Power Settings 1 TTPs 8 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 2724 powercfg.exe 1440 powercfg.exe 4652 powercfg.exe 3908 powercfg.exe 1856 powercfg.exe 3548 powercfg.exe 4620 powercfg.exe 4080 powercfg.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\system32\MRT.exe Updater.exe File opened for modification C:\Windows\system32\MRT.exe JEBFIIIEHC.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 4264 set thread context of 4968 4264 S0FTWARE.exe 115 PID 4176 set thread context of 2880 4176 Updater.exe 176 PID 4176 set thread context of 2916 4176 Updater.exe 181 PID 1372 set thread context of 2096 1372 S0FTWARE.exe 183 PID 2588 set thread context of 1464 2588 S0FTWARE.exe 194 PID 4088 set thread context of 1388 4088 S0FTWARE.exe 195 -
resource yara_rule behavioral1/memory/2916-925-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2916-924-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2916-926-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2916-927-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2916-929-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2916-930-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2916-936-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2916-934-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2916-933-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2916-935-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2916-932-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2916-928-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2916-937-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2916-938-0x0000000140000000-0x0000000140848000-memory.dmp upx -
Launches sc.exe 14 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3768 sc.exe 1628 sc.exe 3160 sc.exe 2276 sc.exe 4476 sc.exe 2964 sc.exe 3752 sc.exe 4468 sc.exe 1684 sc.exe 1052 sc.exe 436 sc.exe 3512 sc.exe 4008 sc.exe 4328 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 17 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AFBAFBKEGC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language S0FTWARE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language S0FTWARE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language S0FTWARE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language S0FTWARE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language S0FTWARE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language S0FTWARE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString BitLockerToGo.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 BitLockerToGo.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString BitLockerToGo.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 BitLockerToGo.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 404 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 52 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133731246292961002" chrome.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\ROOT explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings chrome.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1848 NOTEPAD.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4660 schtasks.exe 2992 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5092 chrome.exe 5092 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 4968 BitLockerToGo.exe 4968 BitLockerToGo.exe 4968 BitLockerToGo.exe 4968 BitLockerToGo.exe 4968 BitLockerToGo.exe 4968 BitLockerToGo.exe 4968 BitLockerToGo.exe 4968 BitLockerToGo.exe 4968 BitLockerToGo.exe 4968 BitLockerToGo.exe 4968 BitLockerToGo.exe 4968 BitLockerToGo.exe 4968 BitLockerToGo.exe 4968 BitLockerToGo.exe 4968 BitLockerToGo.exe 4968 BitLockerToGo.exe 4968 BitLockerToGo.exe 4968 BitLockerToGo.exe 4968 BitLockerToGo.exe 4968 BitLockerToGo.exe 4968 BitLockerToGo.exe 4968 BitLockerToGo.exe 4968 BitLockerToGo.exe 4968 BitLockerToGo.exe 4968 BitLockerToGo.exe 4968 BitLockerToGo.exe 4172 AFBAFBKEGC.exe 4172 AFBAFBKEGC.exe 4968 BitLockerToGo.exe 4968 BitLockerToGo.exe 4552 JEBFIIIEHC.exe 968 powershell.exe 968 powershell.exe 968 powershell.exe 4552 JEBFIIIEHC.exe 4552 JEBFIIIEHC.exe 4552 JEBFIIIEHC.exe 4552 JEBFIIIEHC.exe 4552 JEBFIIIEHC.exe 4552 JEBFIIIEHC.exe 4552 JEBFIIIEHC.exe 4552 JEBFIIIEHC.exe 4552 JEBFIIIEHC.exe 4552 JEBFIIIEHC.exe 4552 JEBFIIIEHC.exe 4552 JEBFIIIEHC.exe 4552 JEBFIIIEHC.exe 4552 JEBFIIIEHC.exe 4176 Updater.exe 1848 powershell.exe 1848 powershell.exe 1848 powershell.exe 4176 Updater.exe 4176 Updater.exe 4176 Updater.exe 4176 Updater.exe 4176 Updater.exe 4176 Updater.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 2260 7zG.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5092 wrote to memory of 1580 5092 chrome.exe 84 PID 5092 wrote to memory of 1580 5092 chrome.exe 84 PID 5092 wrote to memory of 232 5092 chrome.exe 85 PID 5092 wrote to memory of 232 5092 chrome.exe 85 PID 5092 wrote to memory of 232 5092 chrome.exe 85 PID 5092 wrote to memory of 232 5092 chrome.exe 85 PID 5092 wrote to memory of 232 5092 chrome.exe 85 PID 5092 wrote to memory of 232 5092 chrome.exe 85 PID 5092 wrote to memory of 232 5092 chrome.exe 85 PID 5092 wrote to memory of 232 5092 chrome.exe 85 PID 5092 wrote to memory of 232 5092 chrome.exe 85 PID 5092 wrote to memory of 232 5092 chrome.exe 85 PID 5092 wrote to memory of 232 5092 chrome.exe 85 PID 5092 wrote to memory of 232 5092 chrome.exe 85 PID 5092 wrote to memory of 232 5092 chrome.exe 85 PID 5092 wrote to memory of 232 5092 chrome.exe 85 PID 5092 wrote to memory of 232 5092 chrome.exe 85 PID 5092 wrote to memory of 232 5092 chrome.exe 85 PID 5092 wrote to memory of 232 5092 chrome.exe 85 PID 5092 wrote to memory of 232 5092 chrome.exe 85 PID 5092 wrote to memory of 232 5092 chrome.exe 85 PID 5092 wrote to memory of 232 5092 chrome.exe 85 PID 5092 wrote to memory of 232 5092 chrome.exe 85 PID 5092 wrote to memory of 232 5092 chrome.exe 85 PID 5092 wrote to memory of 232 5092 chrome.exe 85 PID 5092 wrote to memory of 232 5092 chrome.exe 85 PID 5092 wrote to memory of 232 5092 chrome.exe 85 PID 5092 wrote to memory of 232 5092 chrome.exe 85 PID 5092 wrote to memory of 232 5092 chrome.exe 85 PID 5092 wrote to memory of 232 5092 chrome.exe 85 PID 5092 wrote to memory of 232 5092 chrome.exe 85 PID 5092 wrote to memory of 232 5092 chrome.exe 85 PID 5092 wrote to memory of 1860 5092 chrome.exe 86 PID 5092 wrote to memory of 1860 5092 chrome.exe 86 PID 5092 wrote to memory of 3612 5092 chrome.exe 87 PID 5092 wrote to memory of 3612 5092 chrome.exe 87 PID 5092 wrote to memory of 3612 5092 chrome.exe 87 PID 5092 wrote to memory of 3612 5092 chrome.exe 87 PID 5092 wrote to memory of 3612 5092 chrome.exe 87 PID 5092 wrote to memory of 3612 5092 chrome.exe 87 PID 5092 wrote to memory of 3612 5092 chrome.exe 87 PID 5092 wrote to memory of 3612 5092 chrome.exe 87 PID 5092 wrote to memory of 3612 5092 chrome.exe 87 PID 5092 wrote to memory of 3612 5092 chrome.exe 87 PID 5092 wrote to memory of 3612 5092 chrome.exe 87 PID 5092 wrote to memory of 3612 5092 chrome.exe 87 PID 5092 wrote to memory of 3612 5092 chrome.exe 87 PID 5092 wrote to memory of 3612 5092 chrome.exe 87 PID 5092 wrote to memory of 3612 5092 chrome.exe 87 PID 5092 wrote to memory of 3612 5092 chrome.exe 87 PID 5092 wrote to memory of 3612 5092 chrome.exe 87 PID 5092 wrote to memory of 3612 5092 chrome.exe 87 PID 5092 wrote to memory of 3612 5092 chrome.exe 87 PID 5092 wrote to memory of 3612 5092 chrome.exe 87 PID 5092 wrote to memory of 3612 5092 chrome.exe 87 PID 5092 wrote to memory of 3612 5092 chrome.exe 87 PID 5092 wrote to memory of 3612 5092 chrome.exe 87 PID 5092 wrote to memory of 3612 5092 chrome.exe 87 PID 5092 wrote to memory of 3612 5092 chrome.exe 87 PID 5092 wrote to memory of 3612 5092 chrome.exe 87 PID 5092 wrote to memory of 3612 5092 chrome.exe 87 PID 5092 wrote to memory of 3612 5092 chrome.exe 87 PID 5092 wrote to memory of 3612 5092 chrome.exe 87 PID 5092 wrote to memory of 3612 5092 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.mediafire.com/folder/3is42kz6mwjhj/Files1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff90b92cc40,0x7ff90b92cc4c,0x7ff90b92cc582⤵PID:1580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1916,i,16180116536077392113,12482748896227845908,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1912 /prefetch:22⤵PID:232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1652,i,16180116536077392113,12482748896227845908,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2176 /prefetch:32⤵PID:1860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2184,i,16180116536077392113,12482748896227845908,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2256 /prefetch:82⤵PID:3612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3108,i,16180116536077392113,12482748896227845908,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3144 /prefetch:12⤵PID:4188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3116,i,16180116536077392113,12482748896227845908,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:3868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4748,i,16180116536077392113,12482748896227845908,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4704 /prefetch:82⤵PID:1360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4644,i,16180116536077392113,12482748896227845908,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4836 /prefetch:12⤵PID:1424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=3204,i,16180116536077392113,12482748896227845908,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3788 /prefetch:12⤵PID:472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4832,i,16180116536077392113,12482748896227845908,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4848 /prefetch:12⤵PID:1208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=5324,i,16180116536077392113,12482748896227845908,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5332 /prefetch:12⤵PID:2888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=5376,i,16180116536077392113,12482748896227845908,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5500 /prefetch:12⤵PID:1636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=5788,i,16180116536077392113,12482748896227845908,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5852 /prefetch:12⤵PID:860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=6128,i,16180116536077392113,12482748896227845908,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6084 /prefetch:12⤵PID:2044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=5876,i,16180116536077392113,12482748896227845908,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5660 /prefetch:12⤵PID:1040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=6076,i,16180116536077392113,12482748896227845908,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5504 /prefetch:12⤵PID:1432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=6388,i,16180116536077392113,12482748896227845908,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6456 /prefetch:82⤵PID:4496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=6576,i,16180116536077392113,12482748896227845908,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5884 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3716,i,16180116536077392113,12482748896227845908,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3720 /prefetch:32⤵PID:1620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5104,i,16180116536077392113,12482748896227845908,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5744 /prefetch:32⤵PID:1180
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:860
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4176
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5044
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\S0FTWARE\" -spe -an -ai#7zMap29187:78:7zEvent326091⤵
- Suspicious use of FindShellTrayWindow
PID:2260
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\S0FTWARE\Readme.txt1⤵
- Opens file in notepad (likely ransom note)
PID:1848
-
C:\Users\Admin\Downloads\S0FTWARE\S0FTWARE.exe"C:\Users\Admin\Downloads\S0FTWARE\S0FTWARE.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4264 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4968 -
C:\ProgramData\JEBFIIIEHC.exe"C:\ProgramData\JEBFIIIEHC.exe"3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:4552 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:968
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart4⤵PID:3752
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart5⤵PID:1180
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc4⤵
- Launches sc.exe
PID:4008
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc4⤵
- Launches sc.exe
PID:1052
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv4⤵
- Launches sc.exe
PID:436
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits4⤵
- Launches sc.exe
PID:4476
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc4⤵
- Launches sc.exe
PID:1628
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 04⤵
- Power Settings
PID:4080
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 04⤵
- Power Settings
PID:2724
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 04⤵
- Power Settings
PID:4652
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 04⤵
- Power Settings
PID:1440
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "GoogleUpdateTaskMachineK"4⤵
- Launches sc.exe
PID:2964
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "GoogleUpdateTaskMachineK" binpath= "C:\ProgramData\GoogleUP\Chrome\Updater.exe" start= "auto"4⤵
- Launches sc.exe
PID:3160
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog4⤵
- Launches sc.exe
PID:3512
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "GoogleUpdateTaskMachineK"4⤵
- Launches sc.exe
PID:4328
-
-
-
C:\ProgramData\AFBAFBKEGC.exe"C:\ProgramData\AFBAFBKEGC.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4172 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C schtasks /create /tn MyApp /tr %APPDATA%\service.exe /st 00:00 /du 9999:59 /sc daily /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
PID:1860 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn MyApp /tr C:\Users\Admin\AppData\Roaming\service.exe /st 00:00 /du 9999:59 /sc daily /ri 1 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4660
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\GCGDHJDAFHJE" & exit3⤵
- System Location Discovery: System Language Discovery
PID:704 -
C:\Windows\SysWOW64\timeout.exetimeout /t 104⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:404
-
-
-
-
C:\ProgramData\GoogleUP\Chrome\Updater.exeC:\ProgramData\GoogleUP\Chrome\Updater.exe1⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:4176 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:1848
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵PID:184
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵PID:3552
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc2⤵
- Launches sc.exe
PID:2276
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:3768
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv2⤵
- Launches sc.exe
PID:3752
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits2⤵
- Launches sc.exe
PID:4468
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc2⤵
- Launches sc.exe
PID:1684
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Power Settings
PID:3908
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Power Settings
PID:1856
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Power Settings
PID:3548
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Power Settings
PID:4620
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:2880
-
-
C:\Windows\explorer.exeexplorer.exe2⤵
- Modifies data under HKEY_USERS
PID:2916
-
-
C:\Users\Admin\Downloads\S0FTWARE\S0FTWARE.exe"C:\Users\Admin\Downloads\S0FTWARE\S0FTWARE.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1372 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:2096
-
-
C:\Users\Admin\AppData\Roaming\service.exeC:\Users\Admin\AppData\Roaming\service.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3624 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C schtasks /create /tn MyApp /tr %APPDATA%\service.exe /st 00:00 /du 9999:59 /sc daily /ri 1 /f2⤵
- System Location Discovery: System Language Discovery
PID:3176 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn MyApp /tr C:\Users\Admin\AppData\Roaming\service.exe /st 00:00 /du 9999:59 /sc daily /ri 1 /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2992
-
-
-
C:\Users\Admin\Downloads\S0FTWARE\S0FTWARE.exe"C:\Users\Admin\Downloads\S0FTWARE\S0FTWARE.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2588 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1464
-
-
C:\Users\Admin\Downloads\S0FTWARE\S0FTWARE.exe"C:\Users\Admin\Downloads\S0FTWARE\S0FTWARE.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4088 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"2⤵PID:1388
-
-
C:\Users\Admin\Downloads\S0FTWARE\S0FTWARE.exe"C:\Users\Admin\Downloads\S0FTWARE\S0FTWARE.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2532 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"2⤵PID:3588
-
-
C:\Users\Admin\Downloads\S0FTWARE\S0FTWARE.exe"C:\Users\Admin\Downloads\S0FTWARE\S0FTWARE.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2912 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"2⤵PID:1508
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Create or Modify System Process
2Windows Service
2Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.2MB
MD59fb8cc095e016caf986f28f61a4334ca
SHA12fb9680927038e17e9a12880fd59194936c611d0
SHA256369a92d10be574e4e96680100bba4bb8f1b94f23a129d04ce0cef93dbb4d92a1
SHA512305859908a8dbf87cfd09a12190469cf70f100992b72d04a335c5bbe284d1641e9294e1af26e49d2dafd3c4cd27e19f8216f8bd78d9bf225c6899496881904bb
-
Filesize
5.8MB
MD56c5765152f9720727f9693288b34a8b6
SHA1eabde5cbe6cd8de622dab56e892cd5f7a7373143
SHA256e2cbf154467a2592dfa9e86d6563f0d0d07ac148140ab2eac81790e916b1c4fb
SHA5129ecedd98e13dd27a92025e6e58cebfdc4f578cc97a2fc0daa3d2e4b13de08bf1f36f00cdee8c0ffb7de203a116f915e5d5cd067d8d3954c00a8a4b8c6378ccf4
-
Filesize
40B
MD5980ebd34ef8cdfa9900dba4fe367d2f7
SHA135955645e6324fce99a971a5a80ecae0fc21d971
SHA256d5384308d29f2f9478f0d1354e9f94053300496f3b7cd2f88f5f8d00dbe1482e
SHA512470cce060f4dcca34b26c8c3b2d3d4024c12fb4631ed8251e942e7e992149a422f30526b27f9f55c13d5d9581f022d3b18439893c6b0455180ae70c0fb24430a
-
Filesize
44KB
MD5001da4cdd5ff235dd773902993957dfa
SHA15e7218bcd914489a29dd971729d8bc6c7e0c9ef5
SHA2561805906e56d4f78d002c8593fb591de7aaa99cc80d56d520bd368de9c95f7d1c
SHA51205246933ce0aff7acce5278c87ad52b318d1bd7c7c42eeb7bcd5c53206be61818b6dd6e0ccdf1f0e795e51d207188c16ca781fa01fccc8618c5927dfeef7b432
-
Filesize
264KB
MD52c3654554d8918a28720f7eddc326564
SHA134530e4ab8c7e8e2953da1089e52c67c49623efa
SHA25681e130814564a00a220c5c4def52d6de5e5cca783f5b488b3f30793e4960ed17
SHA5127357fdb02967b5b27f0777350bc4b28b21c498cbae52710af29485692f49e90e9e0073fcf956f12608cbabf874c238abb7e99a77e7ce87395a0488c4637fd920
-
Filesize
1.0MB
MD550c9f9be2f804afa9a88ec1f56aa254f
SHA1636f2a8a9a1d9e740c45f02593c8886c557a83fe
SHA256dd6de04a1c92609d9512b5ec70a702de0e7743c437fd6e9751f8ae80339c6cd5
SHA5120694b26cf1c74bccb590e3fac32eec1514d1ae7210f17b79accf0c539a2b1b1180c8a9a2873cf18d6b375903dc4b86428ef59f4f2bbb7e7398994e4991b72da2
-
Filesize
4.0MB
MD5614766e101547da77c7e707e1d9a87d4
SHA18403fce9587336791e3ab77bacfddce14e9cb8ba
SHA256764fafe3ae964824cb4e1d78cf914edf7eafbf3c1781f1e1965dbc7d9e7a0f17
SHA5127e5e8d8ad8093b88225fc420e8d67287e3bed354d517af6c2cb0bf3aa183e76a3acd3a24cc41554f728257b01fb204911e63f16b66ceed8ad38120474b0ae5bc
-
Filesize
33KB
MD5d989f35706c62ce4a5c561586c55566e
SHA1d32e7958e5765609bf08dcdefd0b2c2a8714ce34
SHA256375dfe942a03ee024b5cc827b3efda5550d13df7530281f50862ce3b33fcb716
SHA51284b9347471279e53ec5f151caf47fd125b9c137d4bf550a873c8f46e269098ea5e2882b1dc1fe3b44095308df78f56d53674928f44a1e76d3bd7dc9d888d91dd
-
Filesize
25KB
MD5de75537657569aafb42c34c206ae3718
SHA178f01120164fd92a95d0af66953e47c7fd8e69f0
SHA256d30bf80f64d79da9417fd06b72ebf3826985fbd7e55bc69bb3fbe2790765fae2
SHA512a6d52b995085f68e832c9ab9865c056639e116925ad242a1773aada7ec334869deb501390ddd3426afe68afa7030319972a49114ed25adb30c4378f03eacc142
-
Filesize
51KB
MD55a7091bb1c4982bde3f9d3901587c11a
SHA12c990a8d38797d5dbcb8322219fc9d828aeeff29
SHA25641c8fb1312e45d8c38f20cce6e9b922f39ad22728366566aa135bfca41e8e725
SHA5121a8628e84210a47deb5d626d0f3c3ae39113e72a71df7ef90c6bcf857cff336248bc2a07a3b9be4cc66bf90587636dd34213eab52ac27d273c74c6005b3f7e4c
-
Filesize
42KB
MD5c18ac29cb1e1afeda67dcee7b8fa497f
SHA12e2fca9619705de092131991d0129594aea866e2
SHA256f5f3e3e947878d45fefe0b0a2f895a13010d3121eba5e9d07bd1d79e01ddc3a0
SHA5125dcae0c20e115715b382792e9b6293e644d44b644dad8a2960a9815beca0ba1ff2697118d282580c473643f97442b61380bd59a5ff92eb50bad11e96dc81a48c
-
Filesize
47KB
MD5015c126a3520c9a8f6a27979d0266e96
SHA12acf956561d44434a6d84204670cf849d3215d5f
SHA2563c4d6a1421c7ddb7e404521fe8c4cd5be5af446d7689cd880be26612eaad3cfa
SHA51202a20f2788bb1c3b2c7d3142c664cdec306b6ba5366e57e33c008edb3eb78638b98dc03cdf932a9dc440ded7827956f99117e7a3a4d55acadd29b006032d9c5c
-
Filesize
148KB
MD57e7ae79453361bdbbc333a4e55379729
SHA1f6fbaea64fe2494ed08b85658c817a4567cce0f9
SHA256ca6ababe505d8c82b9456470cfadf491de6d5e1599ecb74ba0344a7df32dfe2d
SHA5127e5120ac8d3f2760a21c36b0c765340f63438322b37301afe684298c58ad6e3e6087cc2b2bb62c410938da2ac5ffd261c4652374c4e26bbc39440000b37437e8
-
Filesize
74KB
MD5806a30c157339f8ce8f37da3e999bf12
SHA16daac64e52babad6d4e78b8354e1ec115fd9d294
SHA256fbd67a879b3fa1100f910ace2e5606588a4decf2e3d4292b62ff1e6df5a9510c
SHA5124de229f12f31b1a26aaa465c658d55eaa3e04bd889e5f1d764647ad7fbdec60f557260f642c34907edd51f6ff99ea52bf6cac04189f6824332e9c24d5808d065
-
Filesize
21KB
MD5660c3b546f2a131de50b69b91f26c636
SHA170f80e7f10e1dd9180efe191ce92d28296ec9035
SHA256fd91362b7111a0dcc85ef6bd9bc776881c7428f8631d5a32725711dce678bff9
SHA5126be1e881fbb4a112440883aecb232c1afc28d0f247276ef3285b17b925ea0a5d3bac8eac6db906fc6ac64a4192dd740f5743ba62ba36d8204ff3e8669b123db2
-
Filesize
86KB
MD5397bfe7ecc6719e318d35add10d54958
SHA18a49ac62f40673f30fe6d37226287375a519c6a0
SHA256be6effeca5ca168a85cea992ec7f4e4c4661c2233828da5460545f1cf673acf8
SHA512fbc4dfc2ac60ab0514960b629f0d55cdb5d4e88a04b14d7f621e1b9eb3acd38d2c063e711ba0aafbaad711b8edcc874d1787a09c5da8e674acac9f0bc37d08f6
-
Filesize
215KB
MD51585c4c0ffdb55b2a4fdc0b0f5c317be
SHA1aac0e0f12332063c75c690458b2cfe5acb800d0a
SHA25618a1cfc3b339903a71e6a68791cde83fca626a4c1a22be5cb7755c9f2343e2a5
SHA5127021ed87f0c97edc3a8ff838202fa444841eafcbfa4e00e722b723393a1ac679279aa744e8edde237a05be6060527a0c7e64a36148bd2d1316d5589d78d08e23
-
Filesize
111KB
MD5038977db91e79b05fddf14c6afa35d9e
SHA19aae7fe9df3156498c8458955d54eaa368054eae
SHA2569d22a47ffae95aa5265c11f8f05b7c6e838154c34ca8cfaca413a062a1aabdf9
SHA512e78258bb59b01e1e5ec34af2d40d2e956d4120d4f83088ba25a104df5c4c2fca9798e9f5205263b51671d0d0271a2007f58a1d2d2faa7f44a38b376382459933
-
Filesize
20KB
MD587e8230a9ca3f0c5ccfa56f70276e2f2
SHA1eb116c8fd20cb2f85b7a942c7dae3b0ed6d27fe7
SHA256e18d7214e7d3d47d913c0436f5308b9296ca3c6cd34059bf9cbf03126bafafe9
SHA51237690a81a9e48b157298080746aa94289a4c721c762b826329e70b41ba475bb0261d048f9ab8e7301e43305c5ebf53246c20da8cd001130bf156e8b3bd38b9b8
-
Filesize
80KB
MD583b6311e44a95a9109cfdd5c9a664b5e
SHA199c4456193455722ab0e2ba497aa3b13c816ed11
SHA2560696c9b1e851bc00e34184b437da7246079233d5afe0b5c1e6f4f7e7dd392cd0
SHA5128b75ca727f8e5c8639ab23e0882b0af50313b6a1ee44901c09a1f729e1530ee19bfebb44d35a2dad5b28de032aa81a0672466fbb519e9a28ccce5f5d4c176cc0
-
Filesize
67KB
MD59624fd0c4cc285cebbbedb6efcd2e3fe
SHA1eaf831d4443162050e781ef826c36ce6b75e33e5
SHA2568683b9fc4f602c0992debf64f3dac9961431911d97d7188188dcda17c71f9f9d
SHA5128a80822dcb918c5a9a002738b1a2fc9b6be9964dc56bb7fb4dfa0ef9bb9563e56a7d916d83721a59836ee6be02b2f8d371838f26b69d73ad69fe103becfe0f26
-
Filesize
72KB
MD50588fcc19144810045e686e66812950b
SHA1b7f27f0b66cd873a73fbb5ee9bdf1c47ca4403cf
SHA256523a2aea1e7f182f5ddd29031f07c2bbc83fd40c81039035d0f4ee4dd2f5456b
SHA5122f1ab886f779bb946051f831ee2c5ecf8b6c9c4240197ccf423519dfadc758ad85d2d10d6deef5d0f0d3f92e3d7eac7224031c2d60540a2022657053bc4abcd2
-
Filesize
72KB
MD51e93f759f4d2daf0d424cea72f425c91
SHA12cab5476683b84f86a797fe375b141f87c11bb5c
SHA25654b7893b0206da4f181b74868d15c43989e120523469c509b5b8bbdb29e7f0f7
SHA51254e64772427c35206a983a4d4dc4f63c1089b8360e5099fb1f125bc2b27b129ad87a2a50f3d25be3684dafede59dd819024da54df7589723dc3f153ea50bf1ae
-
Filesize
96KB
MD5d32e36e9b1024ec2467edd585638da0e
SHA18defcc5e5a34a37b5c60ea9fa0c79d81361e038b
SHA256e5867fbba21bc439860430837f2297cc6b91fbfb2df73023e8fafd538ee6ae13
SHA5124c5a9cde0673126158af5ce7ca98fe69734584d64bb81028d9e225e8c65023b7698d40ac31cd27561bd528f60d8acf59e48d5038fcae3dad475b954ce8257b6b
-
Filesize
19KB
MD54a16f187304032b0f4ce790c8028b3ad
SHA19cd01d66eed91a7efa273d2e1df7ef9908d15cdc
SHA256641067fca9fbe6daa4838507c4776c14217999c8ca800f5b968841db84fc431b
SHA5121bf96f3798ca57789cfc9ebffd30d28f3e68d5a02f48be8c4945341fa05f9a0b12bbcf1312c278622adef358b6804b0d0fc38db07585194bfad824edaca1febf
-
Filesize
43KB
MD58197298a67bab8c56526a894a0845295
SHA165bd3b5f7592293109aeb419a3f6fdde6a61a88a
SHA256b033cada26a60144ed6dd748823a56014a87132aade417061c713d28a23da13e
SHA512c248426f7dfc4d9f0a984f4e569ff1b6afe4b6ec2d5424cbb1c331d763b654d668db4699cf711a99bb86791b520d68f10a60cdd60c45b5abcbd50eb35c3390e8
-
Filesize
39KB
MD52d85ae805a0616d87f37457125873d93
SHA1f7f1bb021e75f9c92b3746a97f91150f44778f95
SHA2562b87f9e6b75603a49402d2a3e6ca56b9048e65fd71f247d2f932fb64650c51d0
SHA5125c02c1f43dc27abd2f045632cc6b894805e142486b23bb94236c1fae9e9ec1336e31c7bb8feb28009483a90940e6850cc26cb3c3d39bb85d87299a95be59c2ee
-
Filesize
54KB
MD5ea2237b576d605135f02d4cd2f54ae93
SHA177ac42f79b4ce265af81c107ab18f289efd1fd73
SHA25615d9468c1fdbfd1420e179fab3baacc21047d816668181ae93d9667994faa973
SHA512cb0549aa43a66d63307616dfd94fd800b048fb4e1a5ee0467c1214f1bda044dcbb2289bd52050b27de817283bbdb13683446b09690f23ad8be62652d6cfcc8e8
-
Filesize
28KB
MD5b27bd243fac59df8188e28f8841731ea
SHA1682bc3bd95ba1d3ee74b29e5e3908e68f855f34f
SHA25675dd51ad6afa0a47d392a6ce4b8bdd4ef8b8649eea31d9b1acaacb0f3a723bdc
SHA512c8a419c39ffbc32e1d6e03176957e8f5cc05a8a323201c8d60c07ab780a8838b7d6c620236f8f01936c85e0b2068ee087f745a18c64958da290513cd1285a9ca
-
Filesize
16KB
MD597d6abaaf3c52e39c3dfa119110d7e53
SHA18174a996716608a3b69fb6a37a321d3ef995b802
SHA256d914a46cda45359389894c8b151596fb4ebf2bbf6d12ccda2491bd148f426787
SHA512e57241b65a2fb7261646c5feddc4aaf8e63e3049702a578738a268694fa5d7054660c7723b189e19bf45866bb18a55e0f4bef96ee1b4d60f0bc95c2b259fa5df
-
Filesize
210KB
MD5de1c2e99264f09594b68cfe966afecdd
SHA138972b02e6cb96d5e952f4d8c9a54c15a7b769d1
SHA2562089bd20a8077e80b9ae841730d779988756c949881bb2e7148060e78cab904b
SHA51255ccfbd8a0a3df2c1d7bdc2a6a057a69ae964e7c616597797772caf26cd1c3df46f057e352f592b5dba3f37e999d0abd717e4f1e647e310d1efa30dc17affe8b
-
Filesize
78KB
MD5fa081c054a486b85254da982cfd75abf
SHA170b162f9729196a3efe3c9a06768fd8f694e8f63
SHA256474081144877b4f1b222d9c4fa46be5dd9377221a2f1dfb532e9fcf66890068b
SHA512f61f9eed9a6dec55ef7ba6f6eede508d9136df8ea0aed3b7f0e26a2993fc8a319598d1914ecf474435e62550f05665bf714471975a3149442893e03377a61a78
-
Filesize
23KB
MD5b78d2ab0306e2d481901d9d6f018b1af
SHA16c58614e32c100596b9bb813c66dfa3675922362
SHA2561fe6cd9476e0448e559c46e55f814257fbeb861e774828423c8e8d1ab364991f
SHA5128c670ef4c3a2b1b9d14707d2d2bd11e67be2f0c976ab0c9b11277c40bddea3c361f0e3e33a9467b5924bfb7f2cd29cf5b2199235321669ef068dc97773d7e8fe
-
Filesize
51KB
MD5a5ebe0472d38fa83558d7c8cbdcfcec5
SHA1558b41dd25a8da78a8828382970d758e2030349e
SHA2567f070c591008e6d9ecc16bcb6d6d8ede77e74ee46214d2b62907bd03f0a04df5
SHA51229b0a404733b1c31ac74e14a956d6f2422f653c653636b3ea6c8545ecb8a42b277e08a2c5096b980355eaa367de2b0d67fceb19dc191619a504cee5445ea430a
-
Filesize
32KB
MD5e1ef301258d1a183a9236a0ee7272747
SHA13d1fe51382123ddc68e7ca58cd33181d2b8eb023
SHA256c282c0c0c5ac313dc8ff47da4beff4b0730150fdb533f8efeef2bc40d3f600f6
SHA5123a75588cb7dc5d4c9a3c1efab7de34e23c15f9b162c1bd5872afa86e8db358fb0e81057185aa9e6da27c1b0cb36b3132ad994d6b750452b4acf4b4559e0ca1f3
-
Filesize
139KB
MD54ea3e5941d038f91468c9f60ae40bca2
SHA1507ed13a2ee03f43041368640efc9b071becbb81
SHA25627d14b41e0cca01d290378d6b4d1cf8dada4ddc8f592bfb84d077406e3d2f9cd
SHA5122891dd7c0318b8cf66f24224a98a73dbaa0273a12ac41af1fb89b73562c8ff039c0fa103859ce2807ed9beaeaa7fb70fb8055841893ce2e839b68275978e16c6
-
Filesize
149KB
MD52e5422d6125eec1319bcff9e46c7dfee
SHA1b04bc0dc327207593054dae6f8dd514079dba08b
SHA2569e960c1fefa047b528c9e68fc7f1a98caab6e69071c90811df85a7651974ac44
SHA5128a3dc495e44bef181382e3534b2e8e3b6f933de3f9b7f1bbbb1255fabea6d8643a96976dcfa652118e79df8563cc642019b03483feebeea76e35ced6aa63e3e2
-
Filesize
20KB
MD5c115e615bb3c2709322079e46d6719a8
SHA1d5066fc2d54f99dd607345e582412178b1ec691f
SHA256394a642a0e6a19db28018f3622fe129aca7bfaf0f63cbe294b51b71841eb1d3e
SHA51230c5cf95acf5322ed6ae12df4e8b74396b56a4cbea30ea6334b50a362aa13bf94019c1d9ba69215b30aa34609d0a996d372472e90a7909aa63ec2e7e02ee4d2b
-
Filesize
19KB
MD59e3a6bda90436c44d4cb34ba0b64ffb7
SHA1b424c0ef7bea93743960f1ef3cec827f182d0be2
SHA256b10d4a965aeaa6b128b860908b2e3a8f137f8667b09eb6b6820eb3b4ccc2e669
SHA512c3acefc5d0c4566483c58526afbbe002888f0654d1ea44d58a22fb52e917742b96274881fbe2505aa656e3a49106fec4daa16bb63531ecc2c5e742ffcbd23d18
-
Filesize
16KB
MD59af4122fc6163bce796cddc50af3af59
SHA18147ca377b9f9031b445523fc18556e3738981eb
SHA256eef032cc567426430e8f9de25cdb7dbc324a0971ad768e722db48736125dbadf
SHA5123c77d1a3e70dfa366b9beff650ef503ac68663d74357c54c927e2f76ff9f8ba2ee615e6c1484ae947ae71082cf7816140cb0f7a4d8d55e03bd2ee42e5db06f12
-
Filesize
29KB
MD5d282dcd597f66dac0f31c4ee7af6cda4
SHA10f0b5264bee1af813f5e1d0e60a5fe75a874261b
SHA25673bfeaff1ddb8b4966d2bc310731a2e7049569cac0cb4e35d2480f41fb585bb7
SHA5125bacb750e9123af91971d7c0d02613e14b5779b7efbb847ce59059ac6820d70cd3adf6c977b510e047fca1ae84fde4f9e5a8b75135aedd5f2759f9cdc9396326
-
Filesize
68KB
MD555209677f4e9a188b7833f1c0bb97fc0
SHA164ea2f76d5c8f4b8a1b6a7cc5957390487c862bf
SHA2567e4dbbfe63baf0a3e37c886d373904a6c836db23c65e147a69dc95ef14ec8447
SHA512289761cd2e5f0481d05bf73b3d4704b5aeba3b512c350b3028e907387ffdd0a1e41765f6324f3aa4fc908060173a4489f1214b7bdd48a8bc08a2f8d1a9015c8f
-
Filesize
32KB
MD5babb037c08218b9d6ca0ac25b8d921ce
SHA1cc1bfc59212292dd97744504e0222c81996ff668
SHA2565d2b7805610eebe5034071f302c9099794f5114fe18a441e1d9ab71d135909dc
SHA512aae54a6d63a0f13244a1c1009f8842f3f8f2aaed207574053b2cb8d2ae62638f28d369a84a51a93bffa50fcb4beaeba3a8e5ee4884df96ebaa9c690bcbf18b7c
-
Filesize
80KB
MD5cf51b2c0c58fade156cdec2daf861535
SHA118643e1c8955e8c748b5b92d24f7bc05c18f2cf9
SHA256afc09b1d8dd3ab11c1ca99e835cd4dec80a4c92c26bf5779adbde50a4f40260f
SHA512255430d7eb64c06796147d3b35a92534f48112017222703caa56b8f0607e0bcc8553f69e6ef1d8f140e8c18e78319b92fffe7cec8000f43df21151f4b49a5d2a
-
Filesize
1KB
MD52c64ffa1fbfd030d93abcda16ff7f606
SHA1851e202c3bb361a6f6eb738c217fd2a7686c349b
SHA25680330bf9abd6c6c2017131369f607b5f922285efbf2ded6a397c76bfc648c121
SHA51273c217430fe5f208f762866c0bb2836cd9025ad0e7afe331dc608ca453fe01d84e829d2f1e674087ecd3ab9f43ba053a2f5ce1b4aba50eaa44c1434399a5729d
-
Filesize
48KB
MD5e1cd9b140f9f2b0387f95c3cae9101a7
SHA16f1cdd9e19089c03ef4d9d2cd7f82efed73fe325
SHA2563d1f5f2550d484379171d68531c76fc53c0210c134cd78399e453f546190ea02
SHA512f6933e923d2bfcd537bc0bd25d7ae7e1c02fb598394d3f72191c85e59923cf76bfc0622009295e7a04d7a5d2806e95ffb2b2c2209cc77d59abbd81b492463f12
-
Filesize
19KB
MD5d23667f8691c68931e5949f076e0ddc5
SHA17a3abfa849aede853a743b612c5527b22c8e877e
SHA25664cfd7ff28d4de275c9cd0225e3524f50f2102e293036dbfc22c3e83eb40805e
SHA512629c84a58ebd4c2849bdd80313031b7d9bed3f0360136c4a9377450c741ec7be101964e10f0288af003b1198c70e7975294e281f15f20452cdf163262bf0bc02
-
Filesize
18KB
MD54a062e9514f25acff9a4ee1f3357afbb
SHA1f73c2375ab521326a5d3ae97a015b47ea3cc3b01
SHA256c5b87a2888111c76815ca5c7aeeec38ea7c958f6dd96504b141fa1eb0ecfecf4
SHA512b23156b57d262d72d2ac3a5f51fdfd637edc59dfc167b2159eb53c226551f0318bccc64493e7a630c110390e297ca0c27e2dea567e415fe23c27f54f93e2562e
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
2KB
MD5c80dfc4de78073e2f267eb95fa33c8b8
SHA170256729eb167859b6d6957891b4f28519c23e0b
SHA256afa5d2c78c3b20b1c3dc63df3acec2b2958ebfd69c90aa386a2c14a625bb8f9d
SHA512be698dc98aa3a81687bf4b5c02abd4a1adef550efcc27cc18e449181d0860267b265473590749687301a29631e1eca8a7b987268f4ffe923102a9b2af958f1ad
-
Filesize
2KB
MD59443e19b0d352a70effd3be85d191ae1
SHA1d46b8eb92f94497c0add2842bb2e38517998cd82
SHA2561a0be276a1edc895b9e15753ea35019bff35e63d9e281b66efeb0110c049495b
SHA51259bbea8b6247bd0aec6a1b4d2bb9a95842748aa6817e9f4a22ecaee84a1eaf2c3c576006635e284fca5f830e1d3481dab57a05e76059db3b0add415108e0405d
-
Filesize
10KB
MD53facab087dc9f9fd01d61e271cbbde85
SHA126393576675c14bacc433f9bd5d9838688b85234
SHA2569ccdbff7a91033979dbd73f143302d1c8ba87f88288bd69542f3c2b8ba581bc5
SHA512767ea024d71a2461d838b544aab848a62e6301a83cb6855ef63f3dd7cfcb6fdc7a666779e4a723cbedcee3ebb8a5504fabee0d9c16964fdc9bcaf9f06cd05ff9
-
Filesize
10KB
MD5575423582f4b309159a0e325eec8d1c1
SHA1021ff5aa293ae7dc93004d27d082d840ec9c0550
SHA256f60e403896da8de6244e6c74e4aaa16b0dff00206e87f973457914969b03a6b4
SHA51275597785e138a69ccee8192cc0b02cfbadcd0fdf251b51618032d81b0278a27cb60873f48f56b8eeab694bceb34a7156981fc905104bc69b8c4b43ce36d3d39b
-
Filesize
8KB
MD5648435eaf521e085c96b04c0555009ee
SHA10540374f26d231808666d13ac7514dafd3d7d821
SHA256d1590c054a8391d94f05a3c0b94495e7bfe7dfeed23c6624d6f7913042297563
SHA5128dd52578e796e782ceb867335de491652fad58842a682117d5cbe62f3982bcdb90ee44c1cd325da33de7d990459b866ea2280d10d2d6d06746cdf8f8b2a0d2b0
-
Filesize
10KB
MD5e7595cd7a908016c8e93b40eb21f7f94
SHA14129440fa72299f96f5856aa39471e190dd2ac16
SHA2563e8b1ca487399f15246faa2aa3f58fb012cfbfdd11e8b41041d0dbea9820cb4e
SHA512869dfbe974bfb63833e18b391ef2b4a0c436f1a0cb4a92c933afd95319899e415de406d0cd8df1ffe695e52e62c6d1dd255e0e54a15bf718167c0cb1331d4f4e
-
Filesize
10KB
MD54ecb1a9b006bb7df0418d0bf6a4d1da9
SHA13294adcf26fb8a2df087bb41f9a55623f123796d
SHA25617e22f799bf035ef7d4645ccfd32b8f0f7ab3b405e2b27f16577009af119c4f8
SHA512190d69950a1555dee8f4e3838d2e555462ea73424c2d906ce59647dd77170581eb0a304ddb4ad4fb470593d8f0b1f81d154841c280fe9abcc3c05c45be3bd687
-
Filesize
10KB
MD55944051992247413d270b50154ef5d6d
SHA1b6304168c1ac8c828b57a924b0e163a09d439a4a
SHA25671872abc8a17c968dee6cba4b2bc358bdf9c6d3f6e1bdcaf4c64dc4075e1fd8c
SHA512449393ad65535c14e58f89fe25dbb526bead460888fce15ba52691aa3dfb6854d542ba818cf5382bff48269c811af4f3caec3fa42d7de42c4880e36d146b21e7
-
Filesize
10KB
MD55c019cca862663bf28db1880638dacf7
SHA1524104694db32c524a0687259c023d596f97e6d0
SHA256e348c175e8903ca623e4ef0db0b1eadfab986e1f766e4df9dcd0720e524b45d0
SHA512c4ea28153367282a82159591e0d12a4c7ab155e998f8edfd480a6646f177073159da6238e4b93ad87845347c7b1c8782049ad5d225b51f2ef955a248411b83c1
-
Filesize
10KB
MD5ef6ce717174e3a8f8165609ceb263836
SHA181738903aa630ba15ba2e5ce1cec10ca9d9c6a24
SHA256e2e4046ec06047b57b3949aa8dad89a9a33a48ce2aabe3c6783e2bf2c2a790de
SHA512f3a348ffeb7925671845467bd9ccc383cf8a653f81d4a5a1b079da0f9905aae8341436f70d6322237af282f9fcbaed0d1efc5e09d3acdab3db0dc6e7cc946950
-
Filesize
10KB
MD5f9074ba16d6f1d41c5556109079e8ae0
SHA125c4083a78d1eb8634edb86c3aaeba50a6ce844a
SHA25662619033f1c2aae62e92e30e5899c289178ade1820119a28f9800ec000a995bd
SHA512bc6db64b9280e2affced4ebcb17fd3f034d7694a56245527053dc71a31a09a728c5b18de32dbdf96a22c4643d7faa1fd6107ad7f70d4f52bcf68311db09ca021
-
Filesize
10KB
MD55d37fa1b4f626fb8810c33837b53b312
SHA17a3a17929524a473c64bca0d461d59511a5d7c98
SHA2565cb801e8b7308ad4a74909b6ef81f1b10bd1618d76b2c99c1df2616189da20dd
SHA5120a402df9b44419ea2d2d908c5593ea0e229088f5ace1473998e32ddad2e0877d84c600b79201b46f10d3314ebb6378f0b37b32298dde1ffd96d44b4eca6fa761
-
Filesize
10KB
MD5540b531694f65ac7b177f1c3a30d1a0c
SHA12cc110e9145422b9474ea7d6433f698e8bf1fded
SHA256fedfc3000a59abbc35f0234a11771deb1fbd6b356fd5d9275b266103490dc710
SHA51258e96f45763c4e649e89719facde0fbeef777e8d2f453c853f34450f33dc89c74b80b0da12723a135c00d892c8d9457c1355b97626636abcc3f1d8ee8fcc935e
-
Filesize
10KB
MD5e2061b92d8d1e592405923c593a3c8b7
SHA10f0a490ad8796ce2262b9d0400e1b6d4ef9323af
SHA2565d08338ac74ec268925e4e65f9a4fc2e87304c7379ce98323ba2d4cdf9d27d8f
SHA5124d02969a39f3f1be006951f2b135361f3ad9919b5157560809bf6babf52c5f4e6cbd8b32768612f2384ccfa01e0be8570e555d0c043aa6b95e840d54a7b34a21
-
Filesize
10KB
MD525b685bf6adc87ba96c718d2c4ccde31
SHA1c5cb8d51731089c9864ec1eef33101a74cc45bd5
SHA256160bfcc3947772188526ab35c73d7d74df212dc2d72343f67e9aa4f1f41f988e
SHA512e0f45e1d58a7f899bf97194410578df2551d0952cddf18c2b1184252c0dad7bd1d35a985ce9eeb7772346ccc90a6567688f035155aee3b2d47d7a5ea131798aa
-
Filesize
10KB
MD5e106af9d08115f58c1c2890799094e23
SHA15a380fefafb1d1a3953cbd0099721b51590430b1
SHA25610b39979dbc85dba07be40e802d18645b7d24a3449b63bec3d08e166d1d82dd0
SHA512b62c1c120f5f039dc5964fb67862ddc932a974d3265d4f775e886f953f7d6ec826678b7b126d0fd072a6c79af8d04b2822f3bf5684695ffa13ed91ad13a798f4
-
Filesize
10KB
MD5d8965ff63e0e2b778234e9014da0d5b7
SHA1f01a51244f9289044090641b3d5c93f7e9672351
SHA256780b2cc4994e103656a847c06180e1edebbe7f6f62188a5fc3f5f7867c1bf88d
SHA5127db7ecd64da236d5fcc70462b300c41027ccfb013cf35175b6d7607c0d30b1d7fa28d9c8e97a1b2c0d05d775126ecbec43ca03296926c061050de562685f3246
-
Filesize
10KB
MD5299070635319927ff1ae3ad09341bca3
SHA1d8080b4aa44f8d152325359c5ad927367284d52f
SHA256f2d25c647382d8a8eeedf11bb617bb0b59771a89c59d072a708b1f25feaa22c8
SHA512435c9783211b1bcaf642f464a03e21989ceea7b1964f931b4354f711ba8719f6e872a6a74375ed02619fc9db3940b5a3f46ebbba67ffeb0c3d27e566092a8eec
-
Filesize
10KB
MD5b02414d4fb55534e72793cb121d8176b
SHA12a66b79e92e542715cef06a99228941f9e3a84ba
SHA256d02fcac5aea75eeb4bcc6932260bcc65c30b8b620cfc7dec277c350bcde840c8
SHA5125d4d7d7c30e39662ed31ffa441337056ef536575a63e8997f4f65091b68e877ad81b6fa3ba742c7558cf82ddfc8f452b5d6181d6960446603fc03964c89d407e
-
Filesize
116KB
MD56cc18f8d8098e3162623b734916262e5
SHA1f0b0dfa51ece6bb96b3b04508c6c1e5f17c16eff
SHA256f84e4f711013ff7d66c24f786bb2c1c320ac821a87e1f08cc9e991af885cbbce
SHA512239f27630907151244be8d15c2e96d49cbcc54ba3c01bae8fb01a582a3bf8817bb046054f0230d1b4a73c9b7858e8dcd951467107063b432caf2885b6a283629
-
Filesize
116KB
MD52599fa6a1349074ee0feccb8248226bf
SHA12f8b57f5b50c6bbf1407f919add98bc130fd5e34
SHA256668050a1f125ff4c1a480f602953019a4067f458297a4f4878ca09b1d4bb2fe5
SHA51208d2a4c8e35b475cbbfcc6f85b6c4945f5ef90a529de16fe04ea7a391f510b711d77e86bb70b9d4bd68b84ff20c5a042e68d1c8f7fc31494a08344b8e803252a
-
Filesize
116KB
MD5db7134c90f2d4905d466186de03bfed8
SHA14f6645f6ae4db57936e07cdb9a377af1f4fd294d
SHA2564d1544a82bef87a0df946bbc274ad72ba30960d930858afad683ac146510ac94
SHA512bb30de04dca373a0a69eeabf37e7d9af3a06ff45bc17118377e0dd28a9c1631d96f58481b6dd01b03621656f5fd32b137ac0bf91bd1349ca94be3f5c63caf0e3
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
19.4MB
MD572bc876677a80374dc8244bd38597fd4
SHA14f803b343b61851fd763741af37e3690caee0770
SHA2563c016adc1f9eb00be9e640014e53ebc9dcd01e934c8cafed54de6249ea82901d
SHA5128ee959f2744b2be78b050632735163c059a7d8b33858622ae30a9ad80575bd2d1bfe49eb331bfdcfd3fae3234a7ed6137686db918b276165660d1d1dfd18a80c
-
Filesize
244B
MD582d0a343d06f3aaa16c594284d6b1f6d
SHA19294bb014a3a8be3fc5c533f525ac7270b09bf51
SHA2561a0655b5aa5b6d037e25893bd191323091025f1df92e6f8b4392b1889171da10
SHA512de024359f7c3e247dfd61b3ef3be0f3bc65855e4863966345bfe99a9e7c21659e2d0e08ba50ee46cccd0e569633b4edf68e30050c8956005adb56500d263ad53
-
Filesize
9.1MB
MD5de40920ceb6061d4a5b62fd03a9438c5
SHA1eb3d3f46aad57e868b9d4b2c07d24410bfd2ca85
SHA256959e47ec654acce16b8df4466da97f8479d65b9a69a2c3603c3cb6856ceaecc0
SHA512fa0ea73440e794092045fdada16fb702ae7e5962a09d2fa62d7873a1c211c9b55037cb34c15477cdaf6052a0d7443ce413cebe35e4785032718666246af712f6