Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17/11/2024, 19:44
Static task
static1
Behavioral task
behavioral1
Sample
4586378fb8e91587b6c436af567fa9cc9f44d88ff665ff4115d72d0983340e43.exe
Resource
win7-20240903-en
General
-
Target
4586378fb8e91587b6c436af567fa9cc9f44d88ff665ff4115d72d0983340e43.exe
-
Size
10KB
-
MD5
ed6b7fa2b46bebbeabc7dc7e0b01718d
-
SHA1
0a019805abb8542c37cb30796ef9c38ae1485086
-
SHA256
4586378fb8e91587b6c436af567fa9cc9f44d88ff665ff4115d72d0983340e43
-
SHA512
4d6d16438c72e23bb13cf0a26120cef042bd631382f80e3fb4ab38ff5bde7d9a0ec1e3b10ed4317906d2da38bf0a2b111d4de1df54fc645ff9fa506455ba3649
-
SSDEEP
192:xlwayyHOXGc20L7BIW12n/ePSjiTlzkGu8stYcFwVc03KYN:xlwwHe/20PKn/cLTlHuptYcFwVc03Km
Malware Config
Extracted
xworm
exonic-hacks.com:1920
87.120.112.33:8398
-
Install_directory
%Userprofile%
-
install_file
Windows.exe
Extracted
quasar
1.4.0
Office04
69.160.242.105:4782
69.160.242.105:11066
66661e0f-33c3-4f2f-88be-1634de535cd1
-
encryption_key
CBED6820557E8011D93BA51D49F569DE8C1F98B4
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
java updater
-
subdirectory
SubDir
Extracted
xworm
5.0
21.ip.gl.ply.gg:53668
7O2T2vhzLN6GgFLY
-
install_file
USB.exe
Extracted
quasar
1.4.1
Office04
192.168.43.241:4782
0517af80-95f0-4a6d-a904-5b7ee8faa157
-
encryption_key
6095BF6D5D58D02597F98370DFD1CCEB782F1EDD
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
svhost
-
subdirectory
SubDir
Signatures
-
Detect Xworm Payload 6 IoCs
resource yara_rule behavioral2/files/0x0013000000023b88-1164.dat family_xworm behavioral2/memory/3360-1171-0x00000000003E0000-0x00000000003FE000-memory.dmp family_xworm behavioral2/memory/4784-1184-0x0000000000660000-0x0000000000AE6000-memory.dmp family_xworm behavioral2/memory/4784-1185-0x0000000000660000-0x0000000000AE6000-memory.dmp family_xworm behavioral2/files/0x000500000001e5bd-3760.dat family_xworm behavioral2/memory/5500-3764-0x00000000002E0000-0x00000000002EE000-memory.dmp family_xworm -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" random.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection random.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" random.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" random.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" random.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" random.exe -
Quasar family
-
Quasar payload 4 IoCs
resource yara_rule behavioral2/files/0x0009000000023cee-2385.dat family_quasar behavioral2/memory/5300-2406-0x0000000000200000-0x0000000000284000-memory.dmp family_quasar behavioral2/files/0x000200000001e75c-3770.dat family_quasar behavioral2/memory/4584-3775-0x00000000006E0000-0x0000000000A04000-memory.dmp family_quasar -
Xworm family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ document.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ random.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3664 powershell.exe 3544 powershell.exe 3908 powershell.exe 2564 powershell.exe 2648 powershell.exe 5296 powershell.exe 1124 powershell.exe 3584 powershell.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion document.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion document.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion random.exe -
Checks computer location settings 2 TTPs 7 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation freedom.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 12.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation MePaxil.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4586378fb8e91587b6c436af567fa9cc9f44d88ff665ff4115d72d0983340e43.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation Opdxdyeul.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation document.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FreeYoutubeDownloader.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk document.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk document.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk freedom.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk freedom.exe -
Executes dropped EXE 27 IoCs
pid Process 2332 Opdxdyeul.exe 2800 Opdxdyeul.exe 3360 freedom.exe 4784 document.exe 3284 frdp.exe 3312 frdp.exe 5716 FreeYoutubeDownloader.exe 5300 Client-built.exe 5552 Free YouTube Downloader.exe 6072 Client.exe 336 Autoupdate.exe 4928 dos.exe 6000 frdp.exe 3888 Windows.exe 5276 j86piuq9.exe 5180 12.exe 1532 frdp.exe 4600 MePaxil.exe 5984 cayV0Deo9jSt417.exe 2784 taskhost.exe 4940 golden.exe 5296 golden.exe 5772 Legend.pif 5800 random.exe 3284 88aext0k.exe 5464 bildnewl.exe 4952 ConsoleApp3.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine random.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine document.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features random.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" random.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Yjlwuuys = "C:\\Users\\Admin\\AppData\\Roaming\\Yjlwuuys.exe" Opdxdyeul.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XClient = "C:\\Users\\Admin\\AppData\\Roaming\\XClient.exe" document.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Free Youtube Downloader = "C:\\Windows\\Free Youtube Downloader\\Free Youtube Downloader\\Free YouTube Downloader.exe" FreeYoutubeDownloader.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows = "C:\\Users\\Admin\\Windows.exe" freedom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\???-LDKG91 = "\"C:\\Users\\Admin\\AppData\\Roaming\\System32\\taskhost.exe\"" clip.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\OneDrive = "\"C:\\ProgramData\\OneDrive\\OneDrive.exe\"" bildnewl.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 46 raw.githubusercontent.com 47 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 58 ip-api.com -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\SubDir\Client.exe Client-built.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client-built.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 3152 tasklist.exe 2260 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4784 document.exe 5800 random.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 2332 set thread context of 2800 2332 Opdxdyeul.exe 99 PID 3284 set thread context of 3312 3284 frdp.exe 112 PID 6000 set thread context of 1532 6000 frdp.exe 297 PID 5984 set thread context of 6132 5984 cayV0Deo9jSt417.exe 318 PID 4940 set thread context of 5296 4940 golden.exe 331 -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Uninstall.ini FreeYoutubeDownloader.exe File created C:\Windows\Tasks\Test Task17.job Opdxdyeul.exe File opened for modification C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Free YouTube Downloader.exe FreeYoutubeDownloader.exe File opened for modification C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Box.exe FreeYoutubeDownloader.exe File opened for modification C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Uninstall.exe FreeYoutubeDownloader.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4148 5180 WerFault.exe 288 -
System Location Discovery: System Language Discovery 1 TTPs 37 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language clip.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language golden.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Opdxdyeul.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Opdxdyeul.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Legend.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 12.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language j86piuq9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MePaxil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4586378fb8e91587b6c436af567fa9cc9f44d88ff665ff4115d72d0983340e43.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language document.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FreeYoutubeDownloader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language golden.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ConsoleApp3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cayV0Deo9jSt417.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 dos.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dos.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 12.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 12.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1360 timeout.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dos.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName dos.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2908 schtasks.exe 816 schtasks.exe 5664 schtasks.exe 5560 schtasks.exe 2720 schtasks.exe 5880 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4784 document.exe 3360 freedom.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3972 powershell.exe 3972 powershell.exe 4784 document.exe 4784 document.exe 3908 powershell.exe 3908 powershell.exe 2564 powershell.exe 2564 powershell.exe 2648 powershell.exe 2648 powershell.exe 5296 powershell.exe 5296 powershell.exe 4784 document.exe 1124 powershell.exe 1124 powershell.exe 1124 powershell.exe 3584 powershell.exe 3584 powershell.exe 3584 powershell.exe 3664 powershell.exe 3664 powershell.exe 3544 powershell.exe 3544 powershell.exe 3544 powershell.exe 336 Autoupdate.exe 336 Autoupdate.exe 4928 dos.exe 4928 dos.exe 4928 dos.exe 4928 dos.exe 3360 freedom.exe 4928 dos.exe 4928 dos.exe 4928 dos.exe 4928 dos.exe 4928 dos.exe 4928 dos.exe 4928 dos.exe 4928 dos.exe 4928 dos.exe 4928 dos.exe 4928 dos.exe 4928 dos.exe 4928 dos.exe 4928 dos.exe 4928 dos.exe 4928 dos.exe 4928 dos.exe 4928 dos.exe 4928 dos.exe 4928 dos.exe 4928 dos.exe 4928 dos.exe 4928 dos.exe 4928 dos.exe 4928 dos.exe 4928 dos.exe 4928 dos.exe 4928 dos.exe 4928 dos.exe 4928 dos.exe 4928 dos.exe 4928 dos.exe 4928 dos.exe -
Suspicious use of AdjustPrivilegeToken 29 IoCs
description pid Process Token: SeDebugPrivilege 3008 4586378fb8e91587b6c436af567fa9cc9f44d88ff665ff4115d72d0983340e43.exe Token: SeDebugPrivilege 2332 Opdxdyeul.exe Token: SeDebugPrivilege 3972 powershell.exe Token: SeDebugPrivilege 2332 Opdxdyeul.exe Token: SeDebugPrivilege 3360 freedom.exe Token: SeDebugPrivilege 4784 document.exe Token: SeDebugPrivilege 3908 powershell.exe Token: SeDebugPrivilege 3284 frdp.exe Token: SeDebugPrivilege 2564 powershell.exe Token: SeDebugPrivilege 2648 powershell.exe Token: SeDebugPrivilege 5296 powershell.exe Token: SeDebugPrivilege 4784 document.exe Token: SeDebugPrivilege 3284 frdp.exe Token: SeDebugPrivilege 5300 Client-built.exe Token: SeDebugPrivilege 6072 Client.exe Token: SeDebugPrivilege 1124 powershell.exe Token: SeDebugPrivilege 3584 powershell.exe Token: SeDebugPrivilege 3664 powershell.exe Token: SeDebugPrivilege 3544 powershell.exe Token: SeDebugPrivilege 336 Autoupdate.exe Token: SeDebugPrivilege 3360 freedom.exe Token: SeDebugPrivilege 6000 frdp.exe Token: SeDebugPrivilege 3888 Windows.exe Token: SeDebugPrivilege 6000 frdp.exe Token: SeDebugPrivilege 2260 tasklist.exe Token: SeDebugPrivilege 3152 tasklist.exe Token: SeDebugPrivilege 5800 random.exe Token: SeDebugPrivilege 5464 bildnewl.exe Token: SeDebugPrivilege 4952 ConsoleApp3.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 5552 Free YouTube Downloader.exe 6072 Client.exe 5772 Legend.pif 5772 Legend.pif 5772 Legend.pif -
Suspicious use of SendNotifyMessage 5 IoCs
pid Process 5552 Free YouTube Downloader.exe 6072 Client.exe 5772 Legend.pif 5772 Legend.pif 5772 Legend.pif -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4784 document.exe 6072 Client.exe 3360 freedom.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3008 wrote to memory of 2332 3008 4586378fb8e91587b6c436af567fa9cc9f44d88ff665ff4115d72d0983340e43.exe 88 PID 3008 wrote to memory of 2332 3008 4586378fb8e91587b6c436af567fa9cc9f44d88ff665ff4115d72d0983340e43.exe 88 PID 3008 wrote to memory of 2332 3008 4586378fb8e91587b6c436af567fa9cc9f44d88ff665ff4115d72d0983340e43.exe 88 PID 2332 wrote to memory of 3972 2332 Opdxdyeul.exe 93 PID 2332 wrote to memory of 3972 2332 Opdxdyeul.exe 93 PID 2332 wrote to memory of 3972 2332 Opdxdyeul.exe 93 PID 2332 wrote to memory of 2800 2332 Opdxdyeul.exe 99 PID 2332 wrote to memory of 2800 2332 Opdxdyeul.exe 99 PID 2332 wrote to memory of 2800 2332 Opdxdyeul.exe 99 PID 2332 wrote to memory of 2800 2332 Opdxdyeul.exe 99 PID 2332 wrote to memory of 2800 2332 Opdxdyeul.exe 99 PID 2332 wrote to memory of 2800 2332 Opdxdyeul.exe 99 PID 2332 wrote to memory of 2800 2332 Opdxdyeul.exe 99 PID 2332 wrote to memory of 2800 2332 Opdxdyeul.exe 99 PID 3008 wrote to memory of 3360 3008 4586378fb8e91587b6c436af567fa9cc9f44d88ff665ff4115d72d0983340e43.exe 101 PID 3008 wrote to memory of 3360 3008 4586378fb8e91587b6c436af567fa9cc9f44d88ff665ff4115d72d0983340e43.exe 101 PID 3008 wrote to memory of 4784 3008 4586378fb8e91587b6c436af567fa9cc9f44d88ff665ff4115d72d0983340e43.exe 102 PID 3008 wrote to memory of 4784 3008 4586378fb8e91587b6c436af567fa9cc9f44d88ff665ff4115d72d0983340e43.exe 102 PID 3008 wrote to memory of 4784 3008 4586378fb8e91587b6c436af567fa9cc9f44d88ff665ff4115d72d0983340e43.exe 102 PID 4784 wrote to memory of 3908 4784 document.exe 103 PID 4784 wrote to memory of 3908 4784 document.exe 103 PID 4784 wrote to memory of 3908 4784 document.exe 103 PID 4784 wrote to memory of 2564 4784 document.exe 106 PID 4784 wrote to memory of 2564 4784 document.exe 106 PID 4784 wrote to memory of 2564 4784 document.exe 106 PID 4784 wrote to memory of 2648 4784 document.exe 108 PID 4784 wrote to memory of 2648 4784 document.exe 108 PID 4784 wrote to memory of 2648 4784 document.exe 108 PID 4784 wrote to memory of 5296 4784 document.exe 110 PID 4784 wrote to memory of 5296 4784 document.exe 110 PID 4784 wrote to memory of 5296 4784 document.exe 110 PID 3284 wrote to memory of 3312 3284 frdp.exe 112 PID 3284 wrote to memory of 3312 3284 frdp.exe 112 PID 3284 wrote to memory of 3312 3284 frdp.exe 112 PID 3284 wrote to memory of 3312 3284 frdp.exe 112 PID 3284 wrote to memory of 3312 3284 frdp.exe 112 PID 3284 wrote to memory of 3312 3284 frdp.exe 112 PID 3284 wrote to memory of 3312 3284 frdp.exe 112 PID 3284 wrote to memory of 3312 3284 frdp.exe 112 PID 3008 wrote to memory of 5716 3008 4586378fb8e91587b6c436af567fa9cc9f44d88ff665ff4115d72d0983340e43.exe 113 PID 3008 wrote to memory of 5716 3008 4586378fb8e91587b6c436af567fa9cc9f44d88ff665ff4115d72d0983340e43.exe 113 PID 3008 wrote to memory of 5716 3008 4586378fb8e91587b6c436af567fa9cc9f44d88ff665ff4115d72d0983340e43.exe 113 PID 3008 wrote to memory of 5300 3008 4586378fb8e91587b6c436af567fa9cc9f44d88ff665ff4115d72d0983340e43.exe 114 PID 3008 wrote to memory of 5300 3008 4586378fb8e91587b6c436af567fa9cc9f44d88ff665ff4115d72d0983340e43.exe 114 PID 5716 wrote to memory of 5552 5716 FreeYoutubeDownloader.exe 115 PID 5716 wrote to memory of 5552 5716 FreeYoutubeDownloader.exe 115 PID 5300 wrote to memory of 2720 5300 Client-built.exe 117 PID 5300 wrote to memory of 2720 5300 Client-built.exe 117 PID 5300 wrote to memory of 6072 5300 Client-built.exe 119 PID 5300 wrote to memory of 6072 5300 Client-built.exe 119 PID 6072 wrote to memory of 5880 6072 Client.exe 120 PID 6072 wrote to memory of 5880 6072 Client.exe 120 PID 3360 wrote to memory of 1124 3360 freedom.exe 122 PID 3360 wrote to memory of 1124 3360 freedom.exe 122 PID 3360 wrote to memory of 3584 3360 freedom.exe 124 PID 3360 wrote to memory of 3584 3360 freedom.exe 124 PID 3360 wrote to memory of 3664 3360 freedom.exe 126 PID 3360 wrote to memory of 3664 3360 freedom.exe 126 PID 3360 wrote to memory of 3544 3360 freedom.exe 129 PID 3360 wrote to memory of 3544 3360 freedom.exe 129 PID 3008 wrote to memory of 336 3008 4586378fb8e91587b6c436af567fa9cc9f44d88ff665ff4115d72d0983340e43.exe 128 PID 3008 wrote to memory of 336 3008 4586378fb8e91587b6c436af567fa9cc9f44d88ff665ff4115d72d0983340e43.exe 128 PID 3008 wrote to memory of 4928 3008 4586378fb8e91587b6c436af567fa9cc9f44d88ff665ff4115d72d0983340e43.exe 131 PID 3008 wrote to memory of 4928 3008 4586378fb8e91587b6c436af567fa9cc9f44d88ff665ff4115d72d0983340e43.exe 131 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\4586378fb8e91587b6c436af567fa9cc9f44d88ff665ff4115d72d0983340e43.exe"C:\Users\Admin\AppData\Local\Temp\4586378fb8e91587b6c436af567fa9cc9f44d88ff665ff4115d72d0983340e43.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\Files\Opdxdyeul.exe"C:\Users\Admin\AppData\Local\Temp\Files\Opdxdyeul.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwAXABUAGUAbQBwAFwARgBpAGwAZQBzAFwATwBwAGQAeABkAHkAZQB1AGwALgBlAHgAZQA7ACAAQQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUAByAG8AYwBlAHMAcwAgAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwAXABUAGUAbQBwAFwARgBpAGwAZQBzAFwATwBwAGQAeABkAHkAZQB1AGwALgBlAHgAZQA7AEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABDADoAXABVAHMAZQByAHMAXABBAGQAbQBpAG4AXABBAHAAcABEAGEAdABhAFwAUgBvAGEAbQBpAG4AZwBcAFkAagBsAHcAdQB1AHkAcwAuAGUAeABlADsAIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAHIAbwBjAGUAcwBzACAAQwA6AFwAVQBzAGUAcgBzAFwAQQBkAG0AaQBuAFwAQQBwAHAARABhAHQAYQBcAFIAbwBhAG0AaQBuAGcAXABZAGoAbAB3AHUAdQB5AHMALgBlAHgAZQA=3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3972
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Opdxdyeul.exe"C:\Users\Admin\AppData\Local\Temp\Files\Opdxdyeul.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2800
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\freedom.exe"C:\Users\Admin\AppData\Local\Temp\Files\freedom.exe"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Files\freedom.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1124
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'freedom.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3584
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\Windows.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3664
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Windows.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3544
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Windows" /tr "C:\Users\Admin\Windows.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2908
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\document.exe"C:\Users\Admin\AppData\Local\Temp\Files\document.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Files\document.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3908
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'document.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2564
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2648
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5296
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\FreeYoutubeDownloader.exe"C:\Users\Admin\AppData\Local\Temp\Files\FreeYoutubeDownloader.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5716 -
C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Free YouTube Downloader.exe"C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Free YouTube Downloader.exe"3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5552
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Files\Client-built.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5300 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\Files\Client-built.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2720
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:6072 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:5880
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Autoupdate.exe"C:\Users\Admin\AppData\Local\Temp\Files\Autoupdate.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:336
-
-
C:\Users\Admin\AppData\Local\Temp\Files\dos.exe"C:\Users\Admin\AppData\Local\Temp\Files\dos.exe"2⤵
- Executes dropped EXE
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:4928 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:1568
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c <!DOCTYPE html> <!--[if lt IE 7]> <html class="no-js ie6 oldie" lang="en-US"> <![endif]--> <!--[if IE 7]> <html class="no-js ie7 oldie" lang="en-US"> <![endif]--> <!--[if IE 8]> <html class="no-js ie8 oldie" lang="en-US"> <![endif]--> <!--[if gt IE 8]><!--> <html class="no-js" lang="en-US"> <!--<![endif]--> <head> <title>Suspected phishing site | Cloudflare</title> <meta charset="UTF-8" /> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /> <meta http-equiv="X-UA-Compatible" content="IE=Edge" /> <meta name="robots" content="noindex, nofollow" /> <meta name="viewport" content="width=device-width,initial-scale=1" /> <link rel="stylesheet" id="cf_styles-css" href="/cdn-cgi/styles/cf.errors.css" /> <!--[if lt IE 9]><link rel="stylesheet" id='cf_styles-ie-css' href="/cdn-c3⤵PID:2540
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:2724
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c gi/styles/cf.errors.ie.css" /><![endif]--> <style>body{margin:0;padding:0}</style> <!--[if gte IE 10]><!--> <script> if (!navigator.cookieEnabled) { window.addEventListener('DOMContentLoaded', function () { var cookieEl = document.getElementById('cookie-alert'); cookieEl.style.display = 'block'; }) } </script> <!--<![endif]--> </head> <body> <div id="cf-wrapper"> <div class="cf-alert cf-alert-error cf-cookie-error" id="cookie-alert" data-translate="enable_cookies">Please enable cookies.</div> <div id="cf-error-details" class="cf-error-details-wrapper"> <div class="cf-section cf-wrapper" style="margin-top: 100px;margin-bottom:200px;"> <div class="cf-columns one"> <div class="cf-column"> <h4 class="cf-text-error"><i class="cf-icon-exclamation-sign" style="background-size: 18px; height: 18px; width: 18px; margin-bottom: 2px;"></i> Warning</h4> <h2 style="margin: 16px 0;">Suspected Phishing</h2> <strong>This website has been reported for potential phishing.</strong> <p>Phishing is when a site attempts to steal sensitive information by falsely presenting as a safe source.</p> <p> <a href="https://www.cloudflare.com/learning/acce3⤵PID:3648
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c ss-management/phishing-attack/" class="cf-btn" style="background-color: #404040; color: #fff; border: 0;">Learn More</a> <form action="/cdn-cgi/phish-bypass" method="GET" enctype="text/plain"> <input type="hidden" name="atok" value="XR5LB6NlrBnF3cfMXhhsna4KY88E.eg0r.WDPtkmltA-1731872796-0.0.1.1-/json.php?token=ewogICJjcHVDb3JlcyI6ICI4IiwKICAidG90YWxNZW1vcnkiOiAiODE5MiBNQiIsCiAgInBsYXRmb3JtIjogIldpbmRvd3MiLAogICJhcmNoIjogIng2NCIsCiAgIm1vZGVsIjogIkdZSEFTT0xTIiwKICAib3NWZXJzaW9uIjogIk1pY3Jvc29mdCBXaW5kb3dzIDEwIiwKICAicHJvY2Vzc29yTmFtZSI6ICJJbnRlbCBDb3JlIFByb2Nlc3NvciAoQnJvYWR3ZWxsKSIsCiAgInN5c3RlbU1vZGVsIjogIlVua25vd24gTW9kZWwiLAogICJjb25maWd1cmF0aW9uIjogIjMiLAogICJ0b2tlbiI6ICJZb3VyX1NlY3JldF9Ub2tlbiIKfQ=="> <button type="submit" class="cf-btn cf-btn-danger" style="color: #bd2426; background: transparent;" data-translate="dismiss_and_enter">Ignore & Proceed</button> </form> </p> </div> </div> </div><!-- /.section --> <div id="ts-blocks" style="display:none;"></div> <div class="cf-error-footer cf-wrapper w-240 lg:w-full py-10 sm:py-4 sm:px-8 mx-auto text-center sm:text-left border-solid border-0 border-t border-gray-300"> <p class="text-13"> <span class="cf-footer-item sm:block sm:mb3⤵PID:5472
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c -1">Cloudflare Ray ID: <strong class="font-semibold">8e423a52cbf2ed0c</strong></span> <span class="cf-footer-separator sm:hidden">•</span> <span id="cf-footer-item-ip" class="cf-footer-item hidden sm:block sm:mb-1"> Your IP: <button type="button" id="cf-footer-ip-reveal" class="cf-footer-ip-reveal-btn">Click to reveal</button> <span class="hidden" id="cf-footer-ip">181.215.176.83</span> <span class="cf-footer-separator sm:hidden">•</span> </span> <span class="cf-footer-item sm:block sm:mb-1"><span>Performance & security by</span> <a rel="noopener noreferrer" href="https://www.cloudflare.com/5xx-error-landing" id="brand_link" target="_blank">Cloudflare</a></span> </p> <script>(function(){function d(){var b=a.getElementById("cf-footer-item-ip"),c=a.getElementById("cf-footer-ip-reveal");b&&"classList"in b&&(b.classList.remove("hidden"),c.addEventListener("click",function(){c.classList.add("hidden");a.getElementById("cf-footer-ip").classList.remove("hidden")}))}var a=document;document.addEventListener&&a.addEventListener("DOMContentLoaded",d)})();</script> </div><!-- /.error-footer --> </div><!-- /#cf-error-details --> </div><!-- /#cf-wrapper --> <script> window._cf_translation = {}; </script> </body> </html>3⤵PID:1980
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:4264
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:1716
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:5240
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:5156
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:5184
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:5564
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:5608
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:6032
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:5436
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:1852
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:5844
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:5904
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:5868
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:6112
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:460
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:1632
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:1056
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:1624
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:392
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:1804
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:4868
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:4972
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:1008
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:4560
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:1900
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:4336
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:3680
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:632
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:4256
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:3048
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:3300
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:5180
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:5272
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:4440
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:1160
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:4332
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:1312
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:3632
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:5520
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:5240
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:5752
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:5184
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:5276
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:5668
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:5324
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:5884
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:5784
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:5924
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:1688
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:2280
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:5928
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:5304
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:1632
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:3976
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:1424
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:1476
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:4348
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:3820
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:428
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:4688
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:1008
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:4520
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:1892
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:2360
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:2792
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:5472
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:3972
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:3120
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:5076
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:3392
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:5428
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:5908
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:5752
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:4264
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:2140
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:6124
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:5860
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:4496
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:3588
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:1476
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:6128
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:1868
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:4564
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:4972
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:5024
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:3892
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:180
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:5612
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:5564
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:1692
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:2864
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:5608
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:1860
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:2400
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:5812
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:4700
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:6136
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:4908
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:3936
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:4204
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:5768
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:6040
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:2784
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:1904
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:1636
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:1760
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:1892
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:5128
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:5760
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Windows\System32\svhost.exe"3⤵PID:3104
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\j86piuq9.exe"C:\Users\Admin\AppData\Local\Temp\Files\j86piuq9.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5276
-
-
C:\Users\Admin\AppData\Local\Temp\Files\12.exe"C:\Users\Admin\AppData\Local\Temp\Files\12.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:5180 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\Files\12.exe" & del "C:\ProgramData\*.dll"" & exit3⤵
- System Location Discovery: System Language Discovery
PID:5780 -
C:\Windows\SysWOW64\timeout.exetimeout /t 54⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1360
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5180 -s 14723⤵
- Program crash
PID:4148
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\MePaxil.exe"C:\Users\Admin\AppData\Local\Temp\Files\MePaxil.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4600 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k move Offensive Offensive.cmd & Offensive.cmd & exit3⤵
- System Location Discovery: System Language Discovery
PID:5484 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2260
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe opssvc.exe"4⤵
- System Location Discovery: System Language Discovery
PID:1028
-
-
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3152
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe bdservicehost.exe ekrn.exe nswscsvc.exe sophoshealth.exe"4⤵
- System Location Discovery: System Language Discovery
PID:5448
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 5436484⤵
- System Location Discovery: System Language Discovery
PID:5272
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "BiddingVeRoutinesFilms" Bowling4⤵
- System Location Discovery: System Language Discovery
PID:1160
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Suzuki + ..\Major + ..\Tit + ..\Adjust + ..\Invest + ..\Severe + ..\Sony + ..\Prefers E4⤵
- System Location Discovery: System Language Discovery
PID:1596
-
-
C:\Users\Admin\AppData\Local\Temp\543648\Legend.pifLegend.pif E4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5772 -
C:\Windows\SysWOW64\cmd.execmd /c schtasks.exe /create /tn "Keyboard" /tr "wscript //B 'C:\Users\Admin\AppData\Local\ThreatGuard Innovations\ScanGuard.js'" /sc daily /mo 1 /ri 3 /du 23:57 /F /RL HIGHEST5⤵
- System Location Discovery: System Language Discovery
PID:224 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "Keyboard" /tr "wscript //B 'C:\Users\Admin\AppData\Local\ThreatGuard Innovations\ScanGuard.js'" /sc daily /mo 1 /ri 3 /du 23:57 /F /RL HIGHEST6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5664
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "ScanGuard" /tr "wscript //B 'C:\Users\Admin\AppData\Local\ThreatGuard Innovations\ScanGuard.js'" /sc onlogon /F /RL HIGHEST5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:816
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 154⤵
- System Location Discovery: System Language Discovery
PID:5492
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\cayV0Deo9jSt417.exe"C:\Users\Admin\AppData\Local\Temp\Files\cayV0Deo9jSt417.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5984 -
C:\Windows\SysWOW64\clip.exe"C:\Windows\SysWOW64\clip.exe"3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:6132 -
C:\Users\Admin\AppData\Roaming\System32\taskhost.exe"C:\Users\Admin\AppData\Roaming\System32\taskhost.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2784
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\golden.exe"C:\Users\Admin\AppData\Local\Temp\Files\golden.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\Files\golden.exe"C:\Users\Admin\AppData\Local\Temp\Files\golden.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5296
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\random.exe"C:\Users\Admin\AppData\Local\Temp\Files\random.exe"2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5800
-
-
C:\Users\Admin\AppData\Local\Temp\Files\88aext0k.exe"C:\Users\Admin\AppData\Local\Temp\Files\88aext0k.exe"2⤵
- Executes dropped EXE
PID:3284
-
-
C:\Users\Admin\AppData\Local\Temp\Files\bildnewl.exe"C:\Users\Admin\AppData\Local\Temp\Files\bildnewl.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:5464
-
-
C:\Users\Admin\AppData\Local\Temp\Files\ConsoleApp3.exe"C:\Users\Admin\AppData\Local\Temp\Files\ConsoleApp3.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4952
-
-
C:\Users\Admin\AppData\Local\Temp\Files\XClient.exe"C:\Users\Admin\AppData\Local\Temp\Files\XClient.exe"2⤵PID:5500
-
-
C:\Users\Admin\AppData\Local\Temp\Files\discord.exe"C:\Users\Admin\AppData\Local\Temp\Files\discord.exe"2⤵PID:4584
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:5560
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"3⤵PID:220
-
-
-
C:\ProgramData\rtdmxlb\frdp.exeC:\ProgramData\rtdmxlb\frdp.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\ProgramData\rtdmxlb\frdp.exe"C:\ProgramData\rtdmxlb\frdp.exe"2⤵
- Executes dropped EXE
PID:3312
-
-
C:\ProgramData\rtdmxlb\frdp.exeC:\ProgramData\rtdmxlb\frdp.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6000 -
C:\ProgramData\rtdmxlb\frdp.exe"C:\ProgramData\rtdmxlb\frdp.exe"2⤵
- Executes dropped EXE
PID:1532
-
-
C:\Users\Admin\Windows.exeC:\Users\Admin\Windows.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 5180 -ip 51801⤵PID:1460
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD5200581450bac64a79cb1f832556f478d
SHA1eea290ec114604e4004168a8e4c4610b3b88073b
SHA25611d5ed23304ac1f164c63592209113f57e187c6a6043d677e0de95630f4025ed
SHA512a78a826dae9d5e48e7a153ef27edba1af13765e08c23873e21d9cb3427275afc7e7e2233653f5b003cb229d53c956ba97c14f877444c56d0ad59b1d3dbd13a17
-
Filesize
18KB
MD56c44d3bf9a7f6123dcec1e266d638a3b
SHA198b6075c639e0a6e6ec724440bbe14947f1f817c
SHA256ba2c826363808e37cde8a0c2c26d86f2003d6ca78baaf7e3398efcaa462e1a93
SHA512c62200a07aae516abaf805cc4df22cc0b7f58a6921fbc93ee38835582a21617bcf11612eeaa87b59961d2ddff5974d3dc354774e9312bffd072318ce1e47ece4
-
Filesize
18KB
MD594492fb9f7a57a18011f8999294505bd
SHA1a67251c293ae4af190460ec67446b8fa1d050c10
SHA256b36d62933ee0663b0d6457f889c71d48fb37ae7d6d2ad28ccfa6e7850457207e
SHA5121b92001988b288e1dfa3e30e63bb85776c91e271a37cc5d2cbd58ab7e06cbd2fbab7adcfa565e12638ce4102245015c04809082f26c709dc50dfb64cd6ac2032
-
Filesize
18KB
MD5c8f45f04e5476d60270ebe845aed366b
SHA1a99d2c6785447e5a13658535dc2037b7262bf09f
SHA2563811d328d18811742cde5b3c26958f699b206b69ff18ea221bcb74cb616cb927
SHA512b729459819a626cd77fefdbe275d5bdb95063631851d93399d44fb21916aedacbfd21214867f25b5e9a572c16ca52435597e861c222a54e9f7a8413e60809e9c
-
Filesize
18KB
MD5bdba0240f6acea2968360ac61b23c051
SHA121528945a7edfcee0af4bf755e8a3f9e7e3d2d69
SHA256e4de8a064cd1bab871c7e50705510494e35d0aaf914c0202c9b76a90c65fae4b
SHA512f05c94087777ac1909bb6aee49f18a82d5c557ac07d6681045e60729d9f8e6599bc7d8310ab125342376868850b6d9ca5bd16988ddb1fb2cd2db044099b08aec
-
Filesize
944B
MD59b80cd7a712469a4c45fec564313d9eb
SHA16125c01bc10d204ca36ad1110afe714678655f2d
SHA2565a9e4969c6cdb5d522c81ce55799effb7255c1b0a9966a936d1dc3ff8fe2112d
SHA512ac280d2623c470c9dec94726a7af0612938723f3c7d60d727eb3c21f17be2f2049f97bc8303558be8b01f94406781ece0ada9a3bc51e930aff20bebb6ca17584
-
Filesize
944B
MD5d8cb3e9459807e35f02130fad3f9860d
SHA15af7f32cb8a30e850892b15e9164030a041f4bd6
SHA2562b139c74072ccbdaa17b950f32a6dbc934dfb7af9973d97c9b0d9c498012ba68
SHA512045239ba31367fbdd59e883f74eafc05724e23bd6e8f0c1e7171ea2496a497eb9e0cfcb57285bb81c4d569daadba43d6ef64c626ca48f1e2a59e8d97f0cc9184
-
Filesize
538KB
MD5f8e0529fb48efca8c0eede34c01e0033
SHA185a42f025ae9a2227f2649df6652c929400a4aac
SHA25668b1bbcf0f6f6270afb451b41f81f6f5691759493640f6e2735276877c024dcb
SHA512b6192ad0efe9c04f803a5a14c09480d573ff94d6d50135ff85b2fa4e9ef52c4c04fcb99207be0e7fa4f3a2dba27b6d0b336e111cc3ae678a05761132dadf8f54
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
50KB
MD535e5ab29f9dc36806b7db16d46ed7ede
SHA1527d6aa79dca3a83dca41245240507996a1b0ae3
SHA256c6ab18d27ef2d0e9b01a3502b9ef292ac9d5a4bd045db792d8d3b4188c30f8c1
SHA512754c57e8fcd56f149dbfd6606c029071cae23bd9d658961b853c03830cb8150d444f1e365ed8651ab5accf4b6e5fc1184c42f5e1d1cead261eee04268152309b
-
Filesize
608B
MD51100e2dc0abbc946984508a57c2dcc6a
SHA1a46249d3d6aebb480f6c948aff6f065ad3ce6721
SHA25687cf4bc82402b0ee787dd23867496ee383cc24c397fe54372a0e2fcc1c6bf206
SHA512c2c4cb619a76ee8f6ccefeb712b11a25c1c475db088aeab5dad6978536a2eca710f31a73d183062c83ce272cf0534b53c2d4f40db203a4b7a3b8bfa5e9390fd7
-
Filesize
872KB
MD5be7ece0a176b5396ed2e80dfd1c7d424
SHA1ea19b37edc7d7cef563094860af09900898fe467
SHA2564d448ab30a84c345178b92911192046923db0badece1146f0adda3f0af1417d8
SHA512ef006bad40449dca5569f113d8eebcef718f3754a5455b1bd31ef61ab59c5b096b24663da60173edb1741bd045f588823144e63b2e62b681abd7e5b95f2c906b
-
Filesize
383KB
MD5b38d20c6267b77ca35a55e11fb4124b7
SHA1bf17ad961951698789fa867d2e07099df34cdc7d
SHA25692281aaffbb198760aacd304df932fd58ba230d0927839d85db71dc7ae6f7d71
SHA51217fc8504582edc41db8b62ca1e5238427ddea19b24d2efceb7c765903b8395b3276e4f4dc9df55c60a77b47e0d09491e16dbda18e82a4d6bfa6ed7cad5b8947e
-
Filesize
4.9MB
MD53d375d10b594f69c51b80948ec0e4c03
SHA1439779b78363df27d5874efb256aa5e415e0b8b3
SHA2568f861c2089520549eb6c1eb3cba713a8316ffe9f3573199e27cb48bd5e1ca704
SHA512635d39a32aa3c01cf2d7c5910639da9dbc7f661daba92d0b6c6d543123aa84bfac86dc7c72d6f88ace93d4d2b520e5020094d11f8d78c6859ea68265e8dad560
-
Filesize
1.6MB
MD53042ed65ba02e9446143476575115f99
SHA1283742fd4ada6d03dec9454fbe740569111eaaaa
SHA25648f456ecc6360511504e7c3021d968ad647226115e9a5b2eb3aa5f21e539dca9
SHA512c847a171dad32dfb4acee102300a770500a18af5e086b61c348305d1d81af7525d7d62ca5b88c7c298884ad408137c5d9c2efb1e8294b29084fd8b5dd6b4ee3c
-
Filesize
502KB
MD505aa0a6d16f1dabf72b4c880a5d357d0
SHA14a3ebaa010ba5306cd09c07eb26bbe99ff46496f
SHA256fdba9e9d51c62d59de744a179a50ce9f5838af549f30f5b87c8175dace024fee
SHA512931a147bf27a8a14db99b8f6480dddfa2bd1e0b4aaa59092552ef93e9f93adddbcb71d7d9c7a1f45f7854e32d16555dc7f3be701a2df9578a9e99349e972758a
-
Filesize
15KB
MD5eb2e78bbb601facb768bd61a8e38b372
SHA1d51b9b3a138ae1bf345e768ee94efdced4853ff7
SHA25609d97363cb679a12a09d9795569b38193991362c3b6981d7154b17d34f36f8cf
SHA5125c2ce80953a39393a6a63c772390709e2140bf9b7e7a7765767bc5ae6fb27e52fa7f9237a918dd8060a83667f29ed47e12adef26127f183bea58859e93c3b9f4
-
Filesize
396KB
MD513f4b868603cf0dd6c32702d1bd858c9
SHA1a595ab75e134f5616679be5f11deefdfaae1de15
SHA256cae57a60c4d269cd1ca43ef143aedb8bfc4c09a7e4a689544883d05ce89406e7
SHA512e0d7a81c9cdd15a4ef7c8a9492fffb2c520b28cebc54a139e1bffa5c523cf17dfb9ffe57188cf8843d74479df402306f4f0ce9fc09d87c7cca92aea287e5ff24
-
Filesize
1.1MB
MD5bbe6311c3e2fab459f729dc8cd6e3519
SHA1b71993aafd6627e55657819826c67f64f764c77f
SHA25695fb9ca82017f2a6bc59df0d72fc6f90043e135799d25e9922d4943da4c36874
SHA51233fb4936db966d0f285a48b09700716eadcdc19212c3e234f34dc0e497e55f01f493956aa86de438a3c65ba8e112d6ee1f3cd0ff9aee3cda1f686cc68dc77a47
-
Filesize
894KB
MD5cee58644e824d57927fe73be837b1418
SHA1698d1a11ab58852be004fd4668a6f25371621976
SHA2564235c78ffaf12c4e584666da54cfc5dc56412235f5a2d313dcac07d1314dd52e
SHA512ab9e9083ed107b5600f802ec66dab71f1064377749b6c874f8ce6e9ce5b2718a1dc45372b883943a8eae99378d1151ce15983d4c9be67d559cd72b28b9f55fb5
-
Filesize
36KB
MD5909278699c09e6801b038d7089e68151
SHA1036bf462815304c97f06814f6327150095996be9
SHA256ca1af3b2a9b340be96e06d6ab18b3e21be455780b242cf395978eabc124e8d0c
SHA512b1af108e01d27c0481db58f2b4b847458bdc26484a91a30b31ce9afb82660cbd8b41874a7e1d951a3f9be4211522e39b1024c846b33e8656820361da451ece7c
-
Filesize
270KB
MD5a1264b7a67771b5d0224d179edcd5a50
SHA156a87bc817e8ccff749c27bdf997eab1f5930174
SHA256ab18f8db9ae857fe8a663d968223a605bfdc3a268b501a5d46eefa4495cbed6a
SHA51239662f4edfd298220c97a8c621cf7bf2beeca91ce2694052138715cd5ed6c3702182dd9cee1c0ec746ca80efc9001e9e20d289649f2b65c1c2c10459f52ba2a0
-
Filesize
958KB
MD5aa3cdd5145d9fb980c061d2d8653fa8d
SHA1de696701275b01ddad5461e269d7ab15b7466d6a
SHA25641376827ba300374727d29048920ca2a2d9f20b929e964098181981581e47af2
SHA5124be32b5e9eaffa8d3f4cce515717faa6259373e8dbd258b9ebc2534fd0b62aaa7043093204e43627983fe332f63d8f998a90dc1cbb74f54a18c55f67e42a8a32
-
Filesize
3.1MB
MD56a0bb84dcd837e83638f4292180bf5ab
SHA120e31ccffe1ac806e75ea839ea90b4c91e4322c5
SHA256e119fe767f3d10a387df1951d4b356384c5a9d0441b4034ddf7293c389a410b4
SHA512d0d61815c1ca73e4d1b8d5c3ea61e0572bfa9f6e984247b8e66c22e5591d61f766c6476c2686ce611917a56f2d4d8b8ddb4efcdbed707855e4190a2404eedcc5
-
Filesize
1.8MB
MD51a76cd545f61ab6f965ae5993b17ce2f
SHA1900c219ab0607cec8bbf66db64c66e73272060e4
SHA25644f611726336cec3fa65ba287bf135af2cd43c6441ead65ce4a54c154ea80f90
SHA51278515c77b7d93f23203269771a2f75a47910070c3173516e541c6c566f8e016eb96d53cbf4850b5ba5d33c81d59f99f47400e2fffe0c479ef5e77532731993c9
-
Filesize
420KB
MD5a2163bf270762a1deec37145f2ef5267
SHA1b6082a92aeea2d0687f21c42f2c7032db900ce8e
SHA256e0d09374471bb956744258603669a06473cc5920b6096928ac345c640d089403
SHA51203a06efc6289688fcca8a1f832c84823d26b329b753a8d67656effb18d24422a34aca876232f36e44f50599df295ea2064f42df26d390f4d41456b9d5535bef9
-
Filesize
94KB
MD5db5717fd494495eea3c8f7d4ab29d6b0
SHA139ba82340121d9b08e9cf3d4ba6dfcb12eb6c559
SHA2566b59309ab12f1859a94fb2ce1c98639b2a538e6e098ffac127e45c29733bd993
SHA512b16c7bffc8418a0349e5189d61439df325d2ab33a42c720380a305decde00348f83d96b6c263a95dc253128eb0e47b1a3dc96f8f115da868ff9227b9a40882de
-
Filesize
541KB
MD5f98be4f384d18834c9f4c22c7046a5ff
SHA1b977887e63969e90102cfa716246cc9957349241
SHA25603b8845707f2c1c31d9a756e7f46323b032037bc92bf3dc3243d07c013062eda
SHA512f47e4708f63d5c451fb4c01e90ab3436a05b136c2605d6957d43f030a008415a918c750b2530eb3256c8552c799b7f8034e2b7ce90881386f44bb65bcdba8755
-
Filesize
5.3MB
MD506283d3cde5addad32a1ad13cfc125a8
SHA16a271f81f09c66dfb3618d304b34a7335a9d0584
SHA2561ed77857300416e4e4ea9177637598e7000bf53ba8c4194aec4ccc61ea29106f
SHA512260ac791f05b69a3f0d08abdceb31346652a8250e11e750452869955f60125decedcdd765eecd72a696d60809db4d1281a7facdd05eac761ca8aa11e0c6a0268
-
Filesize
2.6MB
MD5fe75f0e739e3889f3169358abc660e60
SHA17956287cd78f9823a1bbf9aa9b3d5121cd55785b
SHA256f9726e10c350b4199dde3b4bdaa6716a35fd1817a2659192762d1463e511d308
SHA512cccaaef343f6659f719062b0819a7304f05cf526251826548200d06dc9809cb48ead0b939abc0f6139a4877b9234e9dacf8a756c40cd607ddef692d256676f19
-
Filesize
90KB
MD52650bd0e98cced157856b15c55a48398
SHA1b8b509ad22f350d600cd4ac612a5eb3d61db3f02
SHA256f6b5de9758a1baa8f31e584bb5e5427365a7d08679931328d6ae9ddf1b6c99ec
SHA512db3693cc106df3b097b8b3b97236819792bb04afead5e13679fdcc21765fd348502dae64eade646815fb7cd3745f190ed8d8a071f6d5f29cb36ffd08c9193e14
-
Filesize
97KB
MD55365ad26fbf55fbb238379160f3819ae
SHA16e33efe060d8fc424f5c850107ad4794c66daec1
SHA2565749f6b429f9fbd508b810c6e99504e19036a93374d83eabd7171cb625627ae6
SHA512861b76e0f60d055c7cf2b51d5a4aa21848664b57fa387d83e9c36c23dd0044bacb0bb8e5a8630062604871197b7050e82101c91dd2b809e8c5208eb86fa22e52
-
Filesize
10KB
MD5ba741ea1fd350411ba286e3807deb915
SHA1885f5b96f704a4e5fbefbb6c8b82274ead6ffeb0
SHA256adcf5ed9c2a1ab99e0e91306fa3e2d828902c989046d7cff497a4b864ffac5f3
SHA512e4f9ea218752cfe4f8a4241c7bfa8d87f2fb0fcc1c5ca679105f42a4c1bb9c692b70cea3e60cfb50cc24af2eefc2bfe80bfecd54cbcec51ef523199251efaf9b
-
Filesize
32KB
MD53800b719c54c939f9c41642d3f0c0dc9
SHA12f4e8b5ad282ff727f23ff8b98f82427bc88d263
SHA256d2fafbf46e5741896ca37681386c1af4f847d2bae11592be569ed41d7e50702b
SHA512b0f73c110f28091ae5c786ce9c5970ea2d4c728abfc4aacb926892712d04a0d5bb0d912ef5cf27a19b529cfcae2bf5f63ddaa77f4e39e49f7d67ce240d9f35e5
-
Filesize
50KB
MD5af2b7ee3e48e5404c5b8e4af9767ab3d
SHA118b0119b67a01719b7e968e2296676565a273264
SHA2565748c19741e9877d8abeb2f593a158bd39195c9c1433129ebdb6858381283aee
SHA5122472c62e1c65d3a03a293daae3eb162b42bdfc536907f4b1bb63d86315e3540cc8fd641d2b26183cc230884b6cc74cafb805c913c09b991ba3d4699ed8ed4129
-
Filesize
62KB
MD5bbdea5ac69d32176c7cf0af7749cdf12
SHA139c66e4bcad18e9bb4400a579d44f177daf63ecc
SHA2568d1c9abd9b4a2f0a19f9a003280e1ffaddfd4c55b3fbef43b4aa97c7d3d280e3
SHA512e6021102ecba902d998601f4f857f973ff24edd7012fb1c3f9fef557f966a023ab241ac3f54aeaaf887e19560a805eaf77d593cfa7efd659a137faf4dbf53704
-
Filesize
87KB
MD5c4cf8fa43e79df7fa6259198175880f4
SHA1e9097784729e777188629e9c7c59cb0a0c6c6cd8
SHA256f40e0aa9ee1be08178cde5ff9c25253e70c4c08cd7311722a749be0ebfcb49eb
SHA512786cf3a41fa4d55999fd15ce6b1f89c1189f3212b181e2e0f2b3262e24669453cc99d587b3c70ddbf098117d5b5d3e4b7bf034e288bec61672bcdc29a131642e
-
Filesize
70KB
MD59ff7f4f0f216def9dd325d9b667be06e
SHA1f2cc8a82c99dc8bc38624e7aaa31fd29047f19dd
SHA2567639decc3f03f22ed96230e5bfb619419d2523a56cb0b6cccf6ad6c66d5219e8
SHA51283984918784fb08d6392d5a565578d9caa60218aba2ecfe255e3d809e0f7a48f36da68aea87fbca19a12d6bd83cbcc9aa24f021b14bafda68a2b90fb58ac4b30
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
24KB
MD5e40cb198ebcd20cd16739f670d4d7b74
SHA1e898a3b321bd6734c5a676382b5c0dfd42be377d
SHA2566cdc8d3c147dcf7253c0fb7bb552b4ae918aba4058cc072a2320a7297d4fbed7
SHA5121e5a68b2ae30c7d16a0a74807fa069be2d1b8adcfcbcde777217b9420a987196af13fb05177e476157029a1f7916e6948a1286cdb8957cdd142756da3c42beef
-
Filesize
153KB
MD5f33a4e991a11baf336a2324f700d874d
SHA19da1891a164f2fc0a88d0de1ba397585b455b0f4
SHA256a87524035509ff7aa277788e1a9485618665b7da35044d70c41ec0f118f3dfd7
SHA512edf066968f31451e21c7c21d3f54b03fd5827a8526940c1e449aad7f99624577cbc6432deba49bb86e96ac275f5900dcef8d7623855eb3c808e084601ee1df20