Resubmissions
31/10/2024, 16:41
241031-t7k8lazkgs 1031/10/2024, 16:25
241031-twydsa1gpn 1031/10/2024, 16:05
241031-tjfyzasndj 10Analysis
-
max time kernel
793s -
max time network
795s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31/10/2024, 16:05
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/ByterCode/GameHackLoader/raw/refs/heads/main/GameHackLoader.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
https://github.com/ByterCode/GameHackLoader/raw/refs/heads/main/GameHackLoader.zip
Resource
win10ltsc2021-20241023-en
General
-
Target
https://github.com/ByterCode/GameHackLoader/raw/refs/heads/main/GameHackLoader.zip
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\RuntimeBroker.exe\", \"C:\\Users\\Default User\\fontdrvhost.exe\", \"C:\\Program Files (x86)\\MSBuild\\Microsoft\\dwm.exe\", \"C:\\Recovery\\WindowsRE\\unsecapp.exe\"" MpRunShellHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\RuntimeBroker.exe\", \"C:\\Users\\Default User\\fontdrvhost.exe\", \"C:\\Program Files (x86)\\MSBuild\\Microsoft\\dwm.exe\", \"C:\\Recovery\\WindowsRE\\unsecapp.exe\", \"C:\\Users\\Default\\NetHood\\RuntimeBroker.exe\"" MpRunShellHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\RuntimeBroker.exe\", \"C:\\Users\\Default User\\fontdrvhost.exe\", \"C:\\Program Files (x86)\\MSBuild\\Microsoft\\dwm.exe\", \"C:\\Recovery\\WindowsRE\\unsecapp.exe\", \"C:\\Users\\Default\\NetHood\\RuntimeBroker.exe\", \"C:\\Users\\Admin\\AppData\\Roaming\\Windows\\Defender\\MpRunShellHost.exe\"" MpRunShellHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\RuntimeBroker.exe\"" MpRunShellHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\RuntimeBroker.exe\", \"C:\\Users\\Default User\\fontdrvhost.exe\"" MpRunShellHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\RuntimeBroker.exe\", \"C:\\Users\\Default User\\fontdrvhost.exe\", \"C:\\Program Files (x86)\\MSBuild\\Microsoft\\dwm.exe\"" MpRunShellHost.exe -
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1852 3924 schtasks.exe 168 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3692 3924 schtasks.exe 168 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6072 3924 schtasks.exe 168 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3036 3924 schtasks.exe 168 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4236 3924 schtasks.exe 168 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5880 3924 schtasks.exe 168 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1892 3924 schtasks.exe 168 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1080 3924 schtasks.exe 168 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2332 3924 schtasks.exe 168 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4184 3924 schtasks.exe 168 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4740 3924 schtasks.exe 168 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4444 3924 schtasks.exe 168 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 528 3924 schtasks.exe 168 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5708 3924 schtasks.exe 168 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4760 3924 schtasks.exe 168 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3832 3924 schtasks.exe 168 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2796 3924 schtasks.exe 168 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3764 3924 schtasks.exe 168 -
resource yara_rule behavioral1/files/0x0008000000023ac0-191.dat dcrat behavioral1/memory/5616-382-0x0000000002C50000-0x0000000002D22000-memory.dmp family_dcrat_v2 behavioral1/files/0x0007000000023ce1-516.dat dcrat behavioral1/memory/3344-518-0x0000000000010000-0x0000000000188000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 5408 powershell.exe 5424 powershell.exe 2032 powershell.exe 1168 powershell.exe -
Checks computer location settings 2 TTPs 8 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation MpRunShellHost.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation MpCmdRun.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation MpCmdRun.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation WinHelper32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation WinHelper32.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WinHelper32.exe javaw.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WinHelper32.exe javaw.exe -
Executes dropped EXE 64 IoCs
pid Process 3248 WinHelper32.exe 3304 WinHelper32.exe 5616 MpRunShellHost.exe 1940 RuntimeBroker.exe 760 MpCmdRun.exe 3344 Runshell.exe 3592 Runshell.exe 784 MpCmdRun.exe 1864 Runshell.exe 3560 Runshell.exe 3912 Runshell.exe 1356 MpRunShellHost.exe 5180 dwm.exe 1008 unsecapp.exe 4364 Runshell.exe 3104 Runshell.exe 1636 Runshell.exe 3988 Runshell.exe 4276 Runshell.exe 4944 Runshell.exe 3200 Runshell.exe 5428 Runshell.exe 3776 Runshell.exe 5456 Runshell.exe 6132 Runshell.exe 5848 Runshell.exe 6136 Runshell.exe 4508 Runshell.exe 1748 Runshell.exe 4664 Runshell.exe 960 Runshell.exe 5824 Runshell.exe 5916 Runshell.exe 5852 Runshell.exe 5552 Runshell.exe 924 Runshell.exe 1772 Runshell.exe 5200 Runshell.exe 784 Runshell.exe 5840 Runshell.exe 3724 Runshell.exe 4796 Runshell.exe 1576 Runshell.exe 5620 Runshell.exe 4376 Runshell.exe 5564 Runshell.exe 4372 Runshell.exe 5492 Runshell.exe 1708 Runshell.exe 5288 Runshell.exe 4860 Runshell.exe 3144 Runshell.exe 1508 Runshell.exe 4268 Runshell.exe 5556 Runshell.exe 5180 Runshell.exe 2168 Runshell.exe 4296 Runshell.exe 3876 Runshell.exe 3868 Runshell.exe 5984 Runshell.exe 6028 Runshell.exe 4776 Runshell.exe 3180 Runshell.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Users\\Default\\NetHood\\RuntimeBroker.exe\"" MpRunShellHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Users\\Default\\NetHood\\RuntimeBroker.exe\"" MpRunShellHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MpRunShellHost = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows\\Defender\\MpRunShellHost.exe\"" MpRunShellHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\Users\\Default User\\fontdrvhost.exe\"" MpRunShellHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Program Files (x86)\\MSBuild\\Microsoft\\dwm.exe\"" MpRunShellHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Program Files (x86)\\MSBuild\\Microsoft\\dwm.exe\"" MpRunShellHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\unsecapp = "\"C:\\Recovery\\WindowsRE\\unsecapp.exe\"" MpRunShellHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\unsecapp = "\"C:\\Recovery\\WindowsRE\\unsecapp.exe\"" MpRunShellHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Recovery\\WindowsRE\\RuntimeBroker.exe\"" MpRunShellHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Recovery\\WindowsRE\\RuntimeBroker.exe\"" MpRunShellHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\Users\\Default User\\fontdrvhost.exe\"" MpRunShellHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MpRunShellHost = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows\\Defender\\MpRunShellHost.exe\"" MpRunShellHost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
flow ioc 57 raw.githubusercontent.com 58 raw.githubusercontent.com 105 raw.githubusercontent.com 31 raw.githubusercontent.com 32 raw.githubusercontent.com 33 raw.githubusercontent.com -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\Windows\System32\CSCC98FC9D379964DA78A85999D5ADC668E.TMP csc.exe File created \??\c:\Windows\System32\ovufcs.exe csc.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\MSBuild\Microsoft\dwm.exe MpRunShellHost.exe File created C:\Program Files (x86)\MSBuild\Microsoft\6cb0b6c459d5d3 MpRunShellHost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MpCmdRun.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GameHackLoader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GameHackLoader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinHelper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinHelper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MpCmdRun.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4376 PING.EXE -
Checks SCSI registry key(s) 3 TTPs 15 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings taskmgr.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings WinHelper32.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings taskmgr.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings taskmgr.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings MpCmdRun.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings WinHelper32.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings MpRunShellHost.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings MpCmdRun.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 5108 NOTEPAD.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4376 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4444 schtasks.exe 528 schtasks.exe 3832 schtasks.exe 1852 schtasks.exe 3692 schtasks.exe 4740 schtasks.exe 6072 schtasks.exe 1080 schtasks.exe 5708 schtasks.exe 5880 schtasks.exe 2332 schtasks.exe 4760 schtasks.exe 4184 schtasks.exe 2796 schtasks.exe 3764 schtasks.exe 3036 schtasks.exe 4236 schtasks.exe 1892 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2884 msedge.exe 2884 msedge.exe 3796 msedge.exe 3796 msedge.exe 3704 identity_helper.exe 3704 identity_helper.exe 3212 msedge.exe 3212 msedge.exe 5424 powershell.exe 5424 powershell.exe 5408 powershell.exe 5408 powershell.exe 5424 powershell.exe 5408 powershell.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 1168 powershell.exe 2032 powershell.exe 1168 powershell.exe 2032 powershell.exe 5616 MpRunShellHost.exe 5616 MpRunShellHost.exe 5616 MpRunShellHost.exe -
Suspicious behavior: GetForegroundWindowSpam 5 IoCs
pid Process 4920 7zFM.exe 1220 7zFM.exe 1940 RuntimeBroker.exe 1540 7zFM.exe 5540 7zFM.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 5424 powershell.exe Token: SeDebugPrivilege 5408 powershell.exe Token: SeDebugPrivilege 5652 taskmgr.exe Token: SeSystemProfilePrivilege 5652 taskmgr.exe Token: SeCreateGlobalPrivilege 5652 taskmgr.exe Token: SeRestorePrivilege 4920 7zFM.exe Token: 35 4920 7zFM.exe Token: 33 5652 taskmgr.exe Token: SeIncBasePriorityPrivilege 5652 taskmgr.exe Token: SeDebugPrivilege 2032 powershell.exe Token: SeDebugPrivilege 1168 powershell.exe Token: SeDebugPrivilege 5616 MpRunShellHost.exe Token: SeDebugPrivilege 4512 taskmgr.exe Token: SeSystemProfilePrivilege 4512 taskmgr.exe Token: SeCreateGlobalPrivilege 4512 taskmgr.exe Token: SeDebugPrivilege 1940 RuntimeBroker.exe Token: 33 4512 taskmgr.exe Token: SeIncBasePriorityPrivilege 4512 taskmgr.exe Token: SeDebugPrivilege 744 taskmgr.exe Token: SeSystemProfilePrivilege 744 taskmgr.exe Token: SeCreateGlobalPrivilege 744 taskmgr.exe Token: SeDebugPrivilege 3344 Runshell.exe Token: 33 744 taskmgr.exe Token: SeIncBasePriorityPrivilege 744 taskmgr.exe Token: SeRestorePrivilege 1220 7zFM.exe Token: 35 1220 7zFM.exe Token: SeDebugPrivilege 3592 Runshell.exe Token: SeDebugPrivilege 1864 Runshell.exe Token: SeDebugPrivilege 3560 Runshell.exe Token: SeDebugPrivilege 3912 Runshell.exe Token: SeDebugPrivilege 1356 MpRunShellHost.exe Token: SeDebugPrivilege 5588 taskmgr.exe Token: SeSystemProfilePrivilege 5588 taskmgr.exe Token: SeCreateGlobalPrivilege 5588 taskmgr.exe Token: 33 5588 taskmgr.exe Token: SeIncBasePriorityPrivilege 5588 taskmgr.exe Token: SeDebugPrivilege 5180 dwm.exe Token: SeDebugPrivilege 1008 unsecapp.exe Token: SeRestorePrivilege 1540 7zFM.exe Token: 35 1540 7zFM.exe Token: SeSecurityPrivilege 1540 7zFM.exe Token: SeDebugPrivilege 4364 Runshell.exe Token: SeSecurityPrivilege 1540 7zFM.exe Token: SeDebugPrivilege 3104 Runshell.exe Token: SeSecurityPrivilege 1540 7zFM.exe Token: SeDebugPrivilege 1636 Runshell.exe Token: SeDebugPrivilege 3988 Runshell.exe Token: SeDebugPrivilege 4276 Runshell.exe Token: SeDebugPrivilege 4944 Runshell.exe Token: SeDebugPrivilege 3200 Runshell.exe Token: SeDebugPrivilege 5428 Runshell.exe Token: SeDebugPrivilege 3776 Runshell.exe Token: SeDebugPrivilege 5456 Runshell.exe Token: SeDebugPrivilege 6132 Runshell.exe Token: SeDebugPrivilege 5848 Runshell.exe Token: SeDebugPrivilege 6136 Runshell.exe Token: SeDebugPrivilege 4508 Runshell.exe Token: SeDebugPrivilege 1748 Runshell.exe Token: SeDebugPrivilege 4664 Runshell.exe Token: SeDebugPrivilege 960 Runshell.exe Token: SeDebugPrivilege 5824 Runshell.exe Token: SeDebugPrivilege 5916 Runshell.exe Token: SeDebugPrivilege 5852 Runshell.exe Token: SeDebugPrivilege 5552 Runshell.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe 5652 taskmgr.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3828 GameHackLoader.exe 5164 javaw.exe 3248 WinHelper32.exe 1144 GameHackLoader.exe 3284 javaw.exe 3304 WinHelper32.exe 760 MpCmdRun.exe 784 MpCmdRun.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3796 wrote to memory of 4548 3796 msedge.exe 86 PID 3796 wrote to memory of 4548 3796 msedge.exe 86 PID 3796 wrote to memory of 2036 3796 msedge.exe 87 PID 3796 wrote to memory of 2036 3796 msedge.exe 87 PID 3796 wrote to memory of 2036 3796 msedge.exe 87 PID 3796 wrote to memory of 2036 3796 msedge.exe 87 PID 3796 wrote to memory of 2036 3796 msedge.exe 87 PID 3796 wrote to memory of 2036 3796 msedge.exe 87 PID 3796 wrote to memory of 2036 3796 msedge.exe 87 PID 3796 wrote to memory of 2036 3796 msedge.exe 87 PID 3796 wrote to memory of 2036 3796 msedge.exe 87 PID 3796 wrote to memory of 2036 3796 msedge.exe 87 PID 3796 wrote to memory of 2036 3796 msedge.exe 87 PID 3796 wrote to memory of 2036 3796 msedge.exe 87 PID 3796 wrote to memory of 2036 3796 msedge.exe 87 PID 3796 wrote to memory of 2036 3796 msedge.exe 87 PID 3796 wrote to memory of 2036 3796 msedge.exe 87 PID 3796 wrote to memory of 2036 3796 msedge.exe 87 PID 3796 wrote to memory of 2036 3796 msedge.exe 87 PID 3796 wrote to memory of 2036 3796 msedge.exe 87 PID 3796 wrote to memory of 2036 3796 msedge.exe 87 PID 3796 wrote to memory of 2036 3796 msedge.exe 87 PID 3796 wrote to memory of 2036 3796 msedge.exe 87 PID 3796 wrote to memory of 2036 3796 msedge.exe 87 PID 3796 wrote to memory of 2036 3796 msedge.exe 87 PID 3796 wrote to memory of 2036 3796 msedge.exe 87 PID 3796 wrote to memory of 2036 3796 msedge.exe 87 PID 3796 wrote to memory of 2036 3796 msedge.exe 87 PID 3796 wrote to memory of 2036 3796 msedge.exe 87 PID 3796 wrote to memory of 2036 3796 msedge.exe 87 PID 3796 wrote to memory of 2036 3796 msedge.exe 87 PID 3796 wrote to memory of 2036 3796 msedge.exe 87 PID 3796 wrote to memory of 2036 3796 msedge.exe 87 PID 3796 wrote to memory of 2036 3796 msedge.exe 87 PID 3796 wrote to memory of 2036 3796 msedge.exe 87 PID 3796 wrote to memory of 2036 3796 msedge.exe 87 PID 3796 wrote to memory of 2036 3796 msedge.exe 87 PID 3796 wrote to memory of 2036 3796 msedge.exe 87 PID 3796 wrote to memory of 2036 3796 msedge.exe 87 PID 3796 wrote to memory of 2036 3796 msedge.exe 87 PID 3796 wrote to memory of 2036 3796 msedge.exe 87 PID 3796 wrote to memory of 2036 3796 msedge.exe 87 PID 3796 wrote to memory of 2884 3796 msedge.exe 88 PID 3796 wrote to memory of 2884 3796 msedge.exe 88 PID 3796 wrote to memory of 4872 3796 msedge.exe 89 PID 3796 wrote to memory of 4872 3796 msedge.exe 89 PID 3796 wrote to memory of 4872 3796 msedge.exe 89 PID 3796 wrote to memory of 4872 3796 msedge.exe 89 PID 3796 wrote to memory of 4872 3796 msedge.exe 89 PID 3796 wrote to memory of 4872 3796 msedge.exe 89 PID 3796 wrote to memory of 4872 3796 msedge.exe 89 PID 3796 wrote to memory of 4872 3796 msedge.exe 89 PID 3796 wrote to memory of 4872 3796 msedge.exe 89 PID 3796 wrote to memory of 4872 3796 msedge.exe 89 PID 3796 wrote to memory of 4872 3796 msedge.exe 89 PID 3796 wrote to memory of 4872 3796 msedge.exe 89 PID 3796 wrote to memory of 4872 3796 msedge.exe 89 PID 3796 wrote to memory of 4872 3796 msedge.exe 89 PID 3796 wrote to memory of 4872 3796 msedge.exe 89 PID 3796 wrote to memory of 4872 3796 msedge.exe 89 PID 3796 wrote to memory of 4872 3796 msedge.exe 89 PID 3796 wrote to memory of 4872 3796 msedge.exe 89 PID 3796 wrote to memory of 4872 3796 msedge.exe 89 PID 3796 wrote to memory of 4872 3796 msedge.exe 89 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/ByterCode/GameHackLoader/raw/refs/heads/main/GameHackLoader.zip1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xb4,0x108,0x7ffd747d46f8,0x7ffd747d4708,0x7ffd747d47182⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,8343352735318056841,16384587587805708359,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2008,8343352735318056841,16384587587805708359,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2008,8343352735318056841,16384587587805708359,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,8343352735318056841,16384587587805708359,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:2968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,8343352735318056841,16384587587805708359,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,8343352735318056841,16384587587805708359,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4908 /prefetch:82⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,8343352735318056841,16384587587805708359,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4908 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2008,8343352735318056841,16384587587805708359,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5504 /prefetch:82⤵PID:1340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,8343352735318056841,16384587587805708359,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:1756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2008,8343352735318056841,16384587587805708359,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3508 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,8343352735318056841,16384587587805708359,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4820 /prefetch:12⤵PID:4648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,8343352735318056841,16384587587805708359,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4884 /prefetch:12⤵PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,8343352735318056841,16384587587805708359,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:12⤵PID:5224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,8343352735318056841,16384587587805708359,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:12⤵PID:5400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,8343352735318056841,16384587587805708359,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4020
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1516
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4088
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1536
-
C:\Users\Admin\Desktop\GameHack.yzz.me\GameHackLoader.exe"C:\Users\Admin\Desktop\GameHack.yzz.me\GameHackLoader.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3828 -
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\Desktop\GameHack.yzz.me\GameHackLoader.exe"2⤵
- Drops startup file
- Suspicious use of SetWindowsHookEx
PID:5164 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:SystemDrive) -Force3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5408
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:SystemDrive) -Force3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5424
-
-
C:\Users\Admin\AppData\Roaming\WinSFXConnectDevicesPlatform\WinHelper32.exeC:\Users\Admin\AppData\Roaming\WinSFXConnectDevicesPlatform\WinHelper32.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3248 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Windows\Defender\H0zpRbXU6jPg3zmkSR7UImalwM4yhxNmZN2bwGQzbVCPIePONY9dMNjctIP.vbe"4⤵
- System Location Discovery: System Language Discovery
PID:4784
-
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5652
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WinHelper32.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:4920
-
C:\Users\Admin\Desktop\GameHack.yzz.me\GameHackLoader.exe"C:\Users\Admin\Desktop\GameHack.yzz.me\GameHackLoader.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1144 -
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\Desktop\GameHack.yzz.me\GameHackLoader.exe"2⤵
- Drops startup file
- Suspicious use of SetWindowsHookEx
PID:3284 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:SystemDrive) -Force3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1168
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:SystemDrive) -Force3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2032
-
-
C:\Users\Admin\AppData\Roaming\WinSFXConnectDevicesPlatform\WinHelper32.exeC:\Users\Admin\AppData\Roaming\WinSFXConnectDevicesPlatform\WinHelper32.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3304 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Windows\Defender\OcfrTK8JDARDlvaB1VtYtk.vbe"4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3808 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Windows\Defender\GRgVeTdXAWm7.bat" "5⤵
- System Location Discovery: System Language Discovery
PID:5460 -
C:\Users\Admin\AppData\Roaming\Windows\Defender\MpRunShellHost.exe"C:\Users\Admin\AppData\Roaming\Windows/Defender/MpRunShellHost.exe"6⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5616 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\pumuwnsv\pumuwnsv.cmdline"7⤵
- Drops file in System32 directory
PID:3048 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESACF7.tmp" "c:\Windows\System32\CSCC98FC9D379964DA78A85999D5ADC668E.TMP"8⤵PID:4880
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\AUxNpavUTI.bat"7⤵PID:4080
-
C:\Windows\system32\chcp.comchcp 650018⤵PID:3168
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost8⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4376
-
-
C:\Users\Default\NetHood\RuntimeBroker.exe"C:\Users\Default\NetHood\RuntimeBroker.exe"8⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1940
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1852
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3692
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:6072
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 11 /tr "'C:\Users\Default User\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3036
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Users\Default User\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4236
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 8 /tr "'C:\Users\Default User\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5880
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1892
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Program Files (x86)\MSBuild\Microsoft\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1080
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2332
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\unsecapp.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4184
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4740
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4444
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 12 /tr "'C:\Users\Default\NetHood\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:528
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Users\Default\NetHood\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5708
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 10 /tr "'C:\Users\Default\NetHood\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4760
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MpRunShellHostM" /sc MINUTE /mo 6 /tr "'C:\Users\Admin\AppData\Roaming\Windows\Defender\MpRunShellHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3832
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MpRunShellHost" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Roaming\Windows\Defender\MpRunShellHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2796
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MpRunShellHostM" /sc MINUTE /mo 12 /tr "'C:\Users\Admin\AppData\Roaming\Windows\Defender\MpRunShellHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3764
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4512
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:744
-
C:\Users\Admin\AppData\Roaming\Windows\Defender\MpCmdRun.exe"C:\Users\Admin\AppData\Roaming\Windows\Defender\MpCmdRun.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:760 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Windows\W8d8GM.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4944 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Windows\O7elasEl3dWnDF4z.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:4280 -
C:\Users\Admin\AppData\Roaming\Windows\Runshell.exe"C:\Users\Admin\AppData\Roaming\Windows\Runshell.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3344
-
-
-
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Desktop\GameHack.yzz.me\GameHackLoader.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1220
-
C:\Users\Admin\AppData\Roaming\Windows\Runshell.exe"C:\Users\Admin\AppData\Roaming\Windows\Runshell.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3592
-
C:\Users\Admin\AppData\Roaming\Windows\Defender\MpCmdRun.exe"C:\Users\Admin\AppData\Roaming\Windows\Defender\MpCmdRun.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:784 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Windows\W8d8GM.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2176 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Windows\O7elasEl3dWnDF4z.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:1048 -
C:\Users\Admin\AppData\Roaming\Windows\Runshell.exe"C:\Users\Admin\AppData\Roaming\Windows\Runshell.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3560
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Windows\Defender\O7elasEl3dWnDF4z.bat" "1⤵PID:2944
-
C:\Users\Admin\AppData\Roaming\Windows\Runshell.exe"C:\Users\Admin\AppData\Roaming\Windows\Runshell.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1864
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Windows\Defender\O7elasEl3dWnDF4z.bat" "1⤵PID:1472
-
C:\Users\Admin\AppData\Roaming\Windows\Runshell.exe"C:\Users\Admin\AppData\Roaming\Windows\Runshell.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3912
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Windows\Defender\GRgVeTdXAWm7.bat" "1⤵PID:544
-
C:\Users\Admin\AppData\Roaming\Windows\Defender\MpRunShellHost.exe"C:\Users\Admin\AppData\Roaming\Windows/Defender/MpRunShellHost.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1356
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:5588
-
C:\Program Files (x86)\MSBuild\Microsoft\dwm.exe"C:\Program Files (x86)\MSBuild\Microsoft\dwm.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5180
-
C:\Recovery\WindowsRE\unsecapp.exeC:\Recovery\WindowsRE\unsecapp.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1008
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Roaming\Windows\Defender\MpCmdRun.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\7zO406814B2\Runshell.exe"C:\Users\Admin\AppData\Local\Temp\7zO406814B2\Runshell.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4364
-
-
C:\Users\Admin\AppData\Local\Temp\7zO40698CB2\Runshell.exe"C:\Users\Admin\AppData\Local\Temp\7zO40698CB2\Runshell.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3104
-
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1636
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3988
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4276
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4944
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3200
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5428
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3776
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5456
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:6132
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5848
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:6136
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4508
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1748
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4664
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:960
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5824
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5916
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5852
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5552
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵
- Executes dropped EXE
PID:924
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵
- Executes dropped EXE
PID:1772
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵
- Executes dropped EXE
PID:5200
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵
- Executes dropped EXE
PID:784
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵
- Executes dropped EXE
PID:5840
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵
- Executes dropped EXE
PID:3724
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵
- Executes dropped EXE
PID:4796
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵
- Executes dropped EXE
PID:1576
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵
- Executes dropped EXE
PID:5620
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵
- Executes dropped EXE
PID:4376
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵
- Executes dropped EXE
PID:5564
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵
- Executes dropped EXE
PID:4372
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵
- Executes dropped EXE
PID:5492
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵
- Executes dropped EXE
PID:1708
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵
- Executes dropped EXE
PID:5288
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵
- Executes dropped EXE
PID:4860
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵
- Executes dropped EXE
PID:3144
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵
- Executes dropped EXE
PID:1508
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵
- Executes dropped EXE
PID:4268
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵
- Executes dropped EXE
PID:5556
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵
- Executes dropped EXE
PID:5180
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵
- Executes dropped EXE
PID:2168
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵
- Executes dropped EXE
PID:4296
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵
- Executes dropped EXE
PID:3876
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵
- Executes dropped EXE
PID:3868
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵
- Executes dropped EXE
PID:5984
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵
- Executes dropped EXE
PID:6028
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵
- Executes dropped EXE
PID:4776
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵
- Executes dropped EXE
PID:3180
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵PID:4112
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵PID:5752
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵PID:3740
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵PID:4416
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵PID:3588
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SDRSVC1⤵PID:216
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵PID:3484
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵PID:636
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵PID:2028
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵PID:4244
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵PID:3104
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵PID:368
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵PID:6104
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵PID:4016
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵PID:1144
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵PID:3036
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵PID:5552
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
PID:4440
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵PID:3900
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵PID:3076
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵PID:5480
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵PID:5876
-
C:\Users\Admin\Desktop\Runshell.exe"C:\Users\Admin\Desktop\Runshell.exe"1⤵PID:5340
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Desktop\Runshell.exe"1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:5540 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\7zO4A5795D3\version.txt2⤵
- Opens file in notepad (likely ransom note)
PID:5108
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Peripheral Device Discovery
1Query Registry
5Remote System Discovery
1System Information Discovery
5System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5d2fb266b97caff2086bf0fa74eddb6b2
SHA12f0061ce9c51b5b4fbab76b37fc6a540be7f805d
SHA256b09f68b61d9ff5a7c7c8b10eee9447d4813ee0e866346e629e788cd4adecb66a
SHA512c3ba95a538c1d266beb83334af755c34ce642a4178ab0f2e5f7822fd6821d3b68862a8b58f167a9294e6d913b08c1054a69b5d7aec2efdb3cf9796ed84de21a8
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
944B
MD56bd369f7c74a28194c991ed1404da30f
SHA10f8e3f8ab822c9374409fe399b6bfe5d68cbd643
SHA256878947d0ec814fe7c343cdebc05eebf00eb14f3023bdb3809a559e17f399fe5d
SHA5128fc5f073dc9fa1e1ae47c60a5f06e0a48709fd6a4302dffaa721858409e7bde64bc6856d3fb28891090516d1a7afc542579de287778b5755eafe75cc67d45d93
-
Filesize
1KB
MD55cb90c90e96a3b36461ed44d339d02e5
SHA15508281a22cca7757bc4fbdb0a8e885c9f596a04
SHA25634c15d8e79fef4bddec7e34f3426df3b68f8fc6deac29ea12d110f6c529fe3bb
SHA51263735938c841c28824e3482559df18839930acc5ea8600b1074439b70a2f600a92f41593568e49991f25f079e7f7361b4f1678feadbf004f6e9e4d51d36598d4
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
Filesize
124KB
MD5416a3fa1fe2d811b8517f76a5c5300b8
SHA1f6a87528a0c64c578180d0255ef3391221055e67
SHA25620ee52a2fe3a4857953adb0c92d93458c9a9a94c43fe04838946ba1b3540bf12
SHA512c43b867c1dd8f381c5ee7b060b2d13e1d1151d5b19617421830e16023b953276431bf98cf084e7db23c60c19ae58f4995c5eb956933dbf477f98f910cc7bfd69
-
Filesize
8KB
MD5619d144201b3327c1b24a335ab4f9d23
SHA12aee2763d9c51a44703c9d14217445563504564f
SHA25630ddbe04ab37748101fa6af335e61692786c1bba320f72cc4e4f436019b171cb
SHA5120551669f3b5cde9ebe56e2f6875a1fa17e73c776da3d6c381decdc1bb1b31a10d84e42f34d73f0aa1afe30a6e5965d6dbafd41e63d45ae5631785030d138704f
-
Filesize
261B
MD52c2e6472d05e3832905f0ad4a04d21c3
SHA1007edbf35759af62a5b847ab09055e7d9b86ffcc
SHA256283d954fa21caa1f3b4aba941b154fab3e626ff27e7b8029f5357872c48cbe03
SHA5128c4ce1ea02da6ffb7e7041c50528da447d087d9ee3c9f4a8c525d2d856cf48e46f5dd9a1fedd23dd047634e719c8886457f7e7240aa3cc36f1a6216e4c00ee37
-
Filesize
5KB
MD524f96b38d360974eef90c56facebffbf
SHA1d9eceee5c790144faa9d890aecbcb6e29e928712
SHA256f37013b2e8ea41a7fb7d47d8784681df4a27bb78a499a91eaf79f6981433a519
SHA512ffe72b8f34c4145340d573a811b66629c5c0c42b62ca1fa873260adf8be66b779510271b56e8fa0049d57851f26f464a88b8ef382f3d4d94a3e30ab25ffc8be3
-
Filesize
6KB
MD52befd9f6fae49b54d4cffa2dc226bb47
SHA110dcf2f22b8a7efebb54e9163f35b181e8b934ab
SHA25659b6bb542b2e3e485b8f0a36bcee13bd56d2c1e34a497932187221a32e9fe69c
SHA5123e01b429e7d0d1f48b974accc8d81fc8c49cc8e25bebbdc42bc2693d248b479e6eddf2f267a2f17914e8cd428da99534f9e1cdfede229778bed476498d775f4e
-
Filesize
6KB
MD53c1bbb12e94d414d5c83bcb5a27e9f55
SHA1e5737ebb5332a2b96e03f46f81386dab36dc0360
SHA25662ec95cec856f87a5aa4bb1c924739fcbde64d1f211dde3041203903b6348d41
SHA512e84caff230ea0c1dc3e3d518f108120e8ba73e76548496497c7a64f05aebc6b37b9c70defe78f723a030d7d18a68d7ea470a1705a984aba47b429044f9be84b9
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5ee2bb1023d1baac48ea674c60aaa54d8
SHA155342875a9de2e381210984370e769b1f37261f8
SHA25628d2f93589eeeee30d97486fdf9f533111fd5c6895325196260530bbd327d858
SHA512adf04beb4b8120e58be056ab741bc3f7b76ecd8b003bd146a34f388ba052ac61b66516c1cd88c5d949996b60f2e9278fd9fdf3be1afd019f314187606dd88e3a
-
Filesize
12KB
MD50e01996c0cfb6dabe7af3becd2be1439
SHA11c0c95f66b8dbda2fe1baa576a27ea1aa545f826
SHA256110f86bddb8af3adc1ca328c7034ab7f7d9be363029dad349e81b3a50a70e51f
SHA51282f347d726ae4296bf4cc5514ff14e06edf136d0107cb750347a75965f63508e0437ec391a4c65851832bf8941b90bfa2b40efc6e3d37889034d300a22d13569
-
Filesize
11KB
MD5d297a7e8840da87294fe88195e083b2e
SHA10c99f8f8dbbb39a822b4ca90e6cc788531d255fc
SHA256a191e189fb6ba15720f108b7db09ce818b35cb9c64fe312a12cb9de526679940
SHA51266b3234cb5f29a5d350ffe7f31ccc5c580aa28573fcb4e7341ad3412f18c9cf4117c218b6278502875a543bfbfaacf6bbf45f385ea26c1224bca67e3e3a4cb9f
-
Filesize
20KB
MD549693267e0adbcd119f9f5e02adf3a80
SHA13ba3d7f89b8ad195ca82c92737e960e1f2b349df
SHA256d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f
SHA512b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2
-
Filesize
944B
MD5d28a889fd956d5cb3accfbaf1143eb6f
SHA1157ba54b365341f8ff06707d996b3635da8446f7
SHA25621e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45
SHA5120b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c
-
Filesize
944B
MD522310ad6749d8cc38284aa616efcd100
SHA1440ef4a0a53bfa7c83fe84326a1dff4326dcb515
SHA25655b1d8021c4eb4c3c0d75e3ed7a4eb30cd0123e3d69f32eeb596fe4ffec05abf
SHA5122ef08e2ee15bb86695fe0c10533014ffed76ececc6e579d299d3365fafb7627f53e32e600bb6d872b9f58aca94f8cb7e1e94cdfd14777527f7f0aa019d9c6def
-
Filesize
170B
MD5253ad038f28072b18b854ef34c2b9056
SHA15186951ac85d3a77691ceedaa9e69347775b7f7a
SHA256dc39729c613230679304d3d923005b36ebf791ed48c091b8b9bb6cff09429250
SHA51287d07a29eaf1571664314fd00314ed419700abac4891cfbfc99df0c44741b80971b4b6975396f303e132a22b355dc1c66e72855ef0798ffa63037bc040086f26
-
Filesize
1KB
MD538e67216ee4660c764cf753ddf216a5c
SHA1c190e72a53f8205491d2f5a8ed5541e2d6741c37
SHA25610452d5bb9c4eb3de504175f5c195f82a34b8ea0c7adf32b16343c226083faac
SHA512cb77368aa8e1d990a4bbedd9a5d740a69ffe9516d25160b3bbbf75f975878f223493d0e2f49b54953b7b61e8a8dfdd847321ea410594db516e5a15b023d26426
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2045521122-590294423-3465680274-1000\83aa4cc77f591dfc2374580bbd95f6ba_896de533-e5fb-4eb9-8f2b-d363f3584dc5
Filesize45B
MD5c8366ae350e7019aefc9d1e6e6a498c6
SHA15731d8a3e6568a5f2dfbbc87e3db9637df280b61
SHA25611e6aca8e682c046c83b721eeb5c72c5ef03cb5936c60df6f4993511ddc61238
SHA51233c980d5a638bfc791de291ebf4b6d263b384247ab27f261a54025108f2f85374b579a026e545f81395736dd40fa4696f2163ca17640dd47f1c42bc9971b18cd
-
Filesize
1.8MB
MD5cc2bb304a262f33452dbaed45e24bd40
SHA1568622e64072dfdc6853dd2d130fd8d96a8171f1
SHA256f05a53c49476919f4d566a1feed4222f4118f911d92d4605935ce68e1fd6ce58
SHA512f0f97efffce381065a0a9cbd668f556e9e56d61d4bedd6040914eb65e7d25648484f6b65bd45ebc572b3231b0fe37e652c0dd7d7476fc3f101a500ce674e512a
-
Filesize
692KB
MD55625311cdda11da2045f26c0a496241a
SHA134b6667608e39ae3b6b0eb077cfa76d458b89c3a
SHA256d19190871739cb8f5f2af7a00f2d294f45e35744f4e82942c511f80ccff3a5b8
SHA512b78df6af856aeecf1f88ebcf7bb480823e61bdddf373fe4a1369ccede2ba4c0f124a105aa69955e83d96da51f348abf8b94d7ccfa6637965abc5bfc07db6c5fc
-
Filesize
99B
MD59f357e45b5c57e60f387556c09e596a8
SHA1783837c6b1bf2c1fe065ee74fee37c7b5945bc87
SHA2563febc2554bcd8b0bdcc23e2cd562f8ca677952409a1206416191ca51b638b639
SHA512960d43f979afba3761e12684010ff6333b4a66f161660d868437eca2d4bc0c7d71b19be8b439b62e3b401747f3c8f6641aaeb3f22ee63a0c1bbea2a290fb3254
-
C:\Users\Admin\AppData\Roaming\Windows\Defender\H0zpRbXU6jPg3zmkSR7UImalwM4yhxNmZN2bwGQzbVCPIePONY9dMNjctIP.vbe
Filesize224B
MD573bb7fe2f7a1b68796ea47f711ca1f0f
SHA1a5662896a6b43c575b63bf24dec179f8610ffe70
SHA256cac83b617c73c7511fd7d6c4cbf542908f46e9b2985824b8159d80e5ff2e10c4
SHA5125668c5d27336d83c921409b727e82c2f20ef16c51857d0b78c41f06aa7cf6e123ae062f8786acde11694198495fdb64bd47c591ab1a992d43111fe04a3e665d3
-
Filesize
1.7MB
MD55789b5cf11da7873759a102ce81f2032
SHA1e958d6d64cc697f0d18f936efcb0b78a04afc3c0
SHA256ccd0f3eba90be96a783bae88b4f5c54f230a6d7cd1e8bd7e0f85b438a00db437
SHA51281db526a1324a423ed431218bfe45f014b41e9e114f4cd649192fabe016319a9709fe23dca267916f1ebb56d9740d4e9c212acb6109a04c4787e87c9f7b04fa2
-
Filesize
427KB
MD5a94844d2397d7f8eade44d49aec77604
SHA1c621ec440a0ac83e28d773fccbe0823d0ae9a524
SHA256724c1654485154722b9f0a62f3e715e7bf5cd6350b608f7625adaa1f7c7e0b18
SHA5125d4addee99a9658b27f4da8693109614f97ebd858716822068944b13de84bb1e0e261571d2d6c375d57c85d74f465bf79dcf43ebe27de875679305ace6c0b711
-
Filesize
213B
MD5033ff360bc76eab6f5244c3c72b5a482
SHA1c0263cfa047fdfec3bf5172c16936f58e0d988ba
SHA256b4bc4976e1f76f5dcace5a80c7a20e9e5b7e211d95953afc326bb6fe328b499e
SHA512ec85cff873f23983b7346ddf87cdb29bfae495e009a72b22986223600777f6dacf6e114652e39d19105d10a09b3c505e63138b288b7f91265bc77e6514c46d05
-
Filesize
32B
MD564f9985e25e8115699a33ada3580ffbb
SHA19b69b675fefb75c152615d84cb83b34b0209240b
SHA25691ca2956029bffa4db1aeb6b66cc15385783f8ec31ef5f837b2a342066a78cdd
SHA512183036066078cda11e3b1f8a33e6e0e1eab1552cbcf530cb1d11ad5a0ab85646415c632efdb840b6f5e48499ef9e931e4c6830dba49027dfa015ad64f1493045
-
Filesize
1.4MB
MD5f4774081e6d11d87879d2bc19b98ab3e
SHA11d503b6faf0cd0163a455ebefbf6f12acd1b8453
SHA25660b2ad21643404d73890c15f8cb583bfc6a950f6e44145d40078cb5a2b85d918
SHA512e5ed8eac7f53c016b9f995c505bc0921ef2b370f2552981e94d8148baffdc3de0395918f9f6cbf77d26c25f79f5fb0dd779572c521b760599a1eb7dbaee4406c
-
Filesize
207B
MD5115404d9f4ba25c13ad6ec57d05db084
SHA134db11f0c17e99034dad366039ba3715cee91c4d
SHA2567d13c98006268e49d8314a585ffc430c85bd6b15ba94c2a634d6a51ea493c796
SHA51274019bc6e4dd30ec294020cfc7a23a874d72347ed5e2f912c1465592bec5ff373199cc24462847dc736152e8154ca6ecb03b3ead17f1f70077185fa4f5bb3104
-
Filesize
2.4MB
MD5ba6c31647c5a5eccf9b535dd59e5069f
SHA1445cfd5725f22c286c6ab6b950559e240528e4dd
SHA256500160c555f21bc39acc78ab1379f5156cf89abf02d0f6b66cfc3d809ae98f5b
SHA512a1cf93a3732467eb41961567af8a9778e6cd72e1f5b1219c7a7e34b88e2fa31b04e7b4cb1fd89fc166b507b558c25a1d3511cf19b3fa901a7eeda87263bc93f2
-
Filesize
4KB
MD55798eaf41b98800fbe87fa4916a96505
SHA198398960f3d824463160add53994ffa1a938d771
SHA2567bcb74be308695574a1c28e335789fcdf0cf164c03d741117c05120dfd889739
SHA51233a0def7a166ce0834d49dfa8bbb2cddf69e34f45a67373f46807d398d52401ad68ddc3fe7088e623e70f22ef2fbd54e5bab6f30cebfc76fbf7aa56106825f81
-
Filesize
371B
MD526de5e0928a15b82cf0b9a9926222bae
SHA1ea4a4b8ddce9f62febd6b4678bcd82f418dc2448
SHA2569b449bbcb02d27b47218dd7c15a400b5685a22c9ee9e54f68dcd44072978460e
SHA512d81fb0213586a602cfed09344353b493f324031a7bb582e131770c53aa3eadfb366c8609337efa90a6aaf27ee2f59bd47c0801b0634d269a2355387df060488a
-
Filesize
235B
MD581e80b10515d27af605b42a372fbe5ae
SHA1269fb4e5d6fc08f0425ca0fabf73069778bbe5bf
SHA2568c3623351bcc596b7e7075c4a3e9cb29d7aba85e4975c13c56b1c2a3392785ac
SHA512f754a8cb8cbfbd931d070780c15491085d5f1216559ea5c7bb73f85b13f774b2e7fc379f8d6d00ac8a33240041334f9b2935aad449c32df3e7b4206b05dc63f8
-
Filesize
1KB
MD51c519e4618f2b468d0f490d4a716da11
SHA11a693d0046e48fa813e4fa3bb94ccd20d43e3106
SHA2564dbf16e3b3bb06c98eeaf27d0a25d9f34ee0ceac51e6365218ef7cd09edb3438
SHA51299f293878a08b56db6ff2297f243f5f5b85864e6925a1d6af61a65369f7eb323ae1b75fe5f1465fac0b982ac9f49b9e0a295b5dac947da40f61991c4411233fd