Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2024 10:33
Behavioral task
behavioral1
Sample
neverlose2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
neverlose2.exe
Resource
win10v2004-20241007-en
General
-
Target
neverlose2.exe
-
Size
2.7MB
-
MD5
ad307f1d5d8ef57303dcacee3e6239ef
-
SHA1
de201f9cc87388ffdfd3bc9a5cb1001547eb489d
-
SHA256
bdf6e01b3727a3cb37e08088614031fc847248ceee1f5eeb3cfd22498df24931
-
SHA512
446d79f10705df234900f8abf7bb291f1345c86bdeed194fb4b5c37853721321169b3f00eaaa469278c616fd726430306342ab06b103104da21158441c10537d
-
SSDEEP
49152:TT2bA3jHZLMGaxfSIkbO+7+KrktBibbg8LU7x/5uzMk4:TT2b4Z4Bxqg4rkvibb1Yt5u14
Malware Config
Signatures
-
DcRat 59 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process 1100 schtasks.exe 1880 schtasks.exe 4832 schtasks.exe 4252 schtasks.exe 3944 schtasks.exe 1328 schtasks.exe 3640 schtasks.exe 3092 schtasks.exe 404 schtasks.exe 4324 schtasks.exe 1600 schtasks.exe 2004 schtasks.exe 632 schtasks.exe 4160 schtasks.exe 2052 schtasks.exe 764 schtasks.exe 4128 schtasks.exe 2964 schtasks.exe 4716 schtasks.exe 4428 schtasks.exe 2888 schtasks.exe 3676 schtasks.exe 4008 schtasks.exe 456 schtasks.exe 2436 schtasks.exe 2192 schtasks.exe 1684 schtasks.exe 1988 schtasks.exe 2084 schtasks.exe 720 schtasks.exe 5068 schtasks.exe 3132 schtasks.exe 5012 schtasks.exe 4320 schtasks.exe 3136 schtasks.exe 2984 schtasks.exe 1340 schtasks.exe 3076 schtasks.exe 2012 schtasks.exe 1692 schtasks.exe 1816 schtasks.exe 4772 schtasks.exe 2220 schtasks.exe File created C:\Program Files\WindowsPowerShell\Modules\ebf1f9fa8afd6d Winmonitordhcp.exe 1656 schtasks.exe 1756 schtasks.exe 1792 schtasks.exe 1396 schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language neverlose2.exe 4936 schtasks.exe 3168 schtasks.exe 3904 schtasks.exe 4536 schtasks.exe 3912 schtasks.exe 1864 schtasks.exe 3104 schtasks.exe 3748 schtasks.exe 3084 schtasks.exe 2328 schtasks.exe -
Dcrat family
-
Modifies WinLogon for persistence 2 TTPs 19 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\WindowsPowerShell\\Modules\\cmd.exe\", \"C:\\Windows\\ServiceProfiles\\NetworkService\\Music\\fontdrvhost.exe\", \"C:\\Windows\\DigitalLocker\\fontdrvhost.exe\", \"C:\\Users\\Default User\\lsass.exe\", \"C:\\Program Files\\VideoLAN\\VLC\\skins\\sppsvc.exe\", \"C:\\Program Files (x86)\\Common Files\\Services\\RuntimeBroker.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\WindowsPowerShell\\Modules\\cmd.exe\", \"C:\\Windows\\ServiceProfiles\\NetworkService\\Music\\fontdrvhost.exe\", \"C:\\Windows\\DigitalLocker\\fontdrvhost.exe\", \"C:\\Users\\Default User\\lsass.exe\", \"C:\\Program Files\\VideoLAN\\VLC\\skins\\sppsvc.exe\", \"C:\\Program Files (x86)\\Common Files\\Services\\RuntimeBroker.exe\", \"C:\\Recovery\\WindowsRE\\conhost.exe\", \"C:\\Users\\Default\\System.exe\", \"C:\\Windows\\ShellExperiences\\SppExtComObj.exe\", \"C:\\Users\\Admin\\Videos\\OfficeClickToRun.exe\", \"C:\\Recovery\\WindowsRE\\dwm.exe\", \"C:\\mIIccrosoft\\OfficeClickToRun.exe\", \"C:\\Windows\\schemas\\AvailableNetwork\\TextInputHost.exe\", \"C:\\Windows\\SoftwareDistribution\\DataStore\\Logs\\TextInputHost.exe\", \"C:\\mIIccrosoft\\explorer.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\WindowsPowerShell\\Modules\\cmd.exe\", \"C:\\Windows\\ServiceProfiles\\NetworkService\\Music\\fontdrvhost.exe\", \"C:\\Windows\\DigitalLocker\\fontdrvhost.exe\", \"C:\\Users\\Default User\\lsass.exe\", \"C:\\Program Files\\VideoLAN\\VLC\\skins\\sppsvc.exe\", \"C:\\Program Files (x86)\\Common Files\\Services\\RuntimeBroker.exe\", \"C:\\Recovery\\WindowsRE\\conhost.exe\", \"C:\\Users\\Default\\System.exe\", \"C:\\Windows\\ShellExperiences\\SppExtComObj.exe\", \"C:\\Users\\Admin\\Videos\\OfficeClickToRun.exe\", \"C:\\Recovery\\WindowsRE\\dwm.exe\", \"C:\\mIIccrosoft\\OfficeClickToRun.exe\", \"C:\\Windows\\schemas\\AvailableNetwork\\TextInputHost.exe\", \"C:\\Windows\\SoftwareDistribution\\DataStore\\Logs\\TextInputHost.exe\", \"C:\\mIIccrosoft\\explorer.exe\", \"C:\\Users\\Admin\\Saved Games\\SppExtComObj.exe\", \"C:\\Program Files (x86)\\Windows Mail\\System.exe\", \"C:\\Users\\Default\\smss.exe\", \"C:\\Program Files\\VideoLAN\\csrss.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\WindowsPowerShell\\Modules\\cmd.exe\", \"C:\\Windows\\ServiceProfiles\\NetworkService\\Music\\fontdrvhost.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\WindowsPowerShell\\Modules\\cmd.exe\", \"C:\\Windows\\ServiceProfiles\\NetworkService\\Music\\fontdrvhost.exe\", \"C:\\Windows\\DigitalLocker\\fontdrvhost.exe\", \"C:\\Users\\Default User\\lsass.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\WindowsPowerShell\\Modules\\cmd.exe\", \"C:\\Windows\\ServiceProfiles\\NetworkService\\Music\\fontdrvhost.exe\", \"C:\\Windows\\DigitalLocker\\fontdrvhost.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\WindowsPowerShell\\Modules\\cmd.exe\", \"C:\\Windows\\ServiceProfiles\\NetworkService\\Music\\fontdrvhost.exe\", \"C:\\Windows\\DigitalLocker\\fontdrvhost.exe\", \"C:\\Users\\Default User\\lsass.exe\", \"C:\\Program Files\\VideoLAN\\VLC\\skins\\sppsvc.exe\", \"C:\\Program Files (x86)\\Common Files\\Services\\RuntimeBroker.exe\", \"C:\\Recovery\\WindowsRE\\conhost.exe\", \"C:\\Users\\Default\\System.exe\", \"C:\\Windows\\ShellExperiences\\SppExtComObj.exe\", \"C:\\Users\\Admin\\Videos\\OfficeClickToRun.exe\", \"C:\\Recovery\\WindowsRE\\dwm.exe\", \"C:\\mIIccrosoft\\OfficeClickToRun.exe\", \"C:\\Windows\\schemas\\AvailableNetwork\\TextInputHost.exe\", \"C:\\Windows\\SoftwareDistribution\\DataStore\\Logs\\TextInputHost.exe\", \"C:\\mIIccrosoft\\explorer.exe\", \"C:\\Users\\Admin\\Saved Games\\SppExtComObj.exe\", \"C:\\Program Files (x86)\\Windows Mail\\System.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\WindowsPowerShell\\Modules\\cmd.exe\", \"C:\\Windows\\ServiceProfiles\\NetworkService\\Music\\fontdrvhost.exe\", \"C:\\Windows\\DigitalLocker\\fontdrvhost.exe\", \"C:\\Users\\Default User\\lsass.exe\", \"C:\\Program Files\\VideoLAN\\VLC\\skins\\sppsvc.exe\", \"C:\\Program Files (x86)\\Common Files\\Services\\RuntimeBroker.exe\", \"C:\\Recovery\\WindowsRE\\conhost.exe\", \"C:\\Users\\Default\\System.exe\", \"C:\\Windows\\ShellExperiences\\SppExtComObj.exe\", \"C:\\Users\\Admin\\Videos\\OfficeClickToRun.exe\", \"C:\\Recovery\\WindowsRE\\dwm.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\WindowsPowerShell\\Modules\\cmd.exe\", \"C:\\Windows\\ServiceProfiles\\NetworkService\\Music\\fontdrvhost.exe\", \"C:\\Windows\\DigitalLocker\\fontdrvhost.exe\", \"C:\\Users\\Default User\\lsass.exe\", \"C:\\Program Files\\VideoLAN\\VLC\\skins\\sppsvc.exe\", \"C:\\Program Files (x86)\\Common Files\\Services\\RuntimeBroker.exe\", \"C:\\Recovery\\WindowsRE\\conhost.exe\", \"C:\\Users\\Default\\System.exe\", \"C:\\Windows\\ShellExperiences\\SppExtComObj.exe\", \"C:\\Users\\Admin\\Videos\\OfficeClickToRun.exe\", \"C:\\Recovery\\WindowsRE\\dwm.exe\", \"C:\\mIIccrosoft\\OfficeClickToRun.exe\", \"C:\\Windows\\schemas\\AvailableNetwork\\TextInputHost.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\WindowsPowerShell\\Modules\\cmd.exe\", \"C:\\Windows\\ServiceProfiles\\NetworkService\\Music\\fontdrvhost.exe\", \"C:\\Windows\\DigitalLocker\\fontdrvhost.exe\", \"C:\\Users\\Default User\\lsass.exe\", \"C:\\Program Files\\VideoLAN\\VLC\\skins\\sppsvc.exe\", \"C:\\Program Files (x86)\\Common Files\\Services\\RuntimeBroker.exe\", \"C:\\Recovery\\WindowsRE\\conhost.exe\", \"C:\\Users\\Default\\System.exe\", \"C:\\Windows\\ShellExperiences\\SppExtComObj.exe\", \"C:\\Users\\Admin\\Videos\\OfficeClickToRun.exe\", \"C:\\Recovery\\WindowsRE\\dwm.exe\", \"C:\\mIIccrosoft\\OfficeClickToRun.exe\", \"C:\\Windows\\schemas\\AvailableNetwork\\TextInputHost.exe\", \"C:\\Windows\\SoftwareDistribution\\DataStore\\Logs\\TextInputHost.exe\", \"C:\\mIIccrosoft\\explorer.exe\", \"C:\\Users\\Admin\\Saved Games\\SppExtComObj.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\WindowsPowerShell\\Modules\\cmd.exe\", \"C:\\Windows\\ServiceProfiles\\NetworkService\\Music\\fontdrvhost.exe\", \"C:\\Windows\\DigitalLocker\\fontdrvhost.exe\", \"C:\\Users\\Default User\\lsass.exe\", \"C:\\Program Files\\VideoLAN\\VLC\\skins\\sppsvc.exe\", \"C:\\Program Files (x86)\\Common Files\\Services\\RuntimeBroker.exe\", \"C:\\Recovery\\WindowsRE\\conhost.exe\", \"C:\\Users\\Default\\System.exe\", \"C:\\Windows\\ShellExperiences\\SppExtComObj.exe\", \"C:\\Users\\Admin\\Videos\\OfficeClickToRun.exe\", \"C:\\Recovery\\WindowsRE\\dwm.exe\", \"C:\\mIIccrosoft\\OfficeClickToRun.exe\", \"C:\\Windows\\schemas\\AvailableNetwork\\TextInputHost.exe\", \"C:\\Windows\\SoftwareDistribution\\DataStore\\Logs\\TextInputHost.exe\", \"C:\\mIIccrosoft\\explorer.exe\", \"C:\\Users\\Admin\\Saved Games\\SppExtComObj.exe\", \"C:\\Program Files (x86)\\Windows Mail\\System.exe\", \"C:\\Users\\Default\\smss.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\WindowsPowerShell\\Modules\\cmd.exe\", \"C:\\Windows\\ServiceProfiles\\NetworkService\\Music\\fontdrvhost.exe\", \"C:\\Windows\\DigitalLocker\\fontdrvhost.exe\", \"C:\\Users\\Default User\\lsass.exe\", \"C:\\Program Files\\VideoLAN\\VLC\\skins\\sppsvc.exe\", \"C:\\Program Files (x86)\\Common Files\\Services\\RuntimeBroker.exe\", \"C:\\Recovery\\WindowsRE\\conhost.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\WindowsPowerShell\\Modules\\cmd.exe\", \"C:\\Windows\\ServiceProfiles\\NetworkService\\Music\\fontdrvhost.exe\", \"C:\\Windows\\DigitalLocker\\fontdrvhost.exe\", \"C:\\Users\\Default User\\lsass.exe\", \"C:\\Program Files\\VideoLAN\\VLC\\skins\\sppsvc.exe\", \"C:\\Program Files (x86)\\Common Files\\Services\\RuntimeBroker.exe\", \"C:\\Recovery\\WindowsRE\\conhost.exe\", \"C:\\Users\\Default\\System.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\WindowsPowerShell\\Modules\\cmd.exe\", \"C:\\Windows\\ServiceProfiles\\NetworkService\\Music\\fontdrvhost.exe\", \"C:\\Windows\\DigitalLocker\\fontdrvhost.exe\", \"C:\\Users\\Default User\\lsass.exe\", \"C:\\Program Files\\VideoLAN\\VLC\\skins\\sppsvc.exe\", \"C:\\Program Files (x86)\\Common Files\\Services\\RuntimeBroker.exe\", \"C:\\Recovery\\WindowsRE\\conhost.exe\", \"C:\\Users\\Default\\System.exe\", \"C:\\Windows\\ShellExperiences\\SppExtComObj.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\WindowsPowerShell\\Modules\\cmd.exe\", \"C:\\Windows\\ServiceProfiles\\NetworkService\\Music\\fontdrvhost.exe\", \"C:\\Windows\\DigitalLocker\\fontdrvhost.exe\", \"C:\\Users\\Default User\\lsass.exe\", \"C:\\Program Files\\VideoLAN\\VLC\\skins\\sppsvc.exe\", \"C:\\Program Files (x86)\\Common Files\\Services\\RuntimeBroker.exe\", \"C:\\Recovery\\WindowsRE\\conhost.exe\", \"C:\\Users\\Default\\System.exe\", \"C:\\Windows\\ShellExperiences\\SppExtComObj.exe\", \"C:\\Users\\Admin\\Videos\\OfficeClickToRun.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\WindowsPowerShell\\Modules\\cmd.exe\", \"C:\\Windows\\ServiceProfiles\\NetworkService\\Music\\fontdrvhost.exe\", \"C:\\Windows\\DigitalLocker\\fontdrvhost.exe\", \"C:\\Users\\Default User\\lsass.exe\", \"C:\\Program Files\\VideoLAN\\VLC\\skins\\sppsvc.exe\", \"C:\\Program Files (x86)\\Common Files\\Services\\RuntimeBroker.exe\", \"C:\\Recovery\\WindowsRE\\conhost.exe\", \"C:\\Users\\Default\\System.exe\", \"C:\\Windows\\ShellExperiences\\SppExtComObj.exe\", \"C:\\Users\\Admin\\Videos\\OfficeClickToRun.exe\", \"C:\\Recovery\\WindowsRE\\dwm.exe\", \"C:\\mIIccrosoft\\OfficeClickToRun.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\WindowsPowerShell\\Modules\\cmd.exe\", \"C:\\Windows\\ServiceProfiles\\NetworkService\\Music\\fontdrvhost.exe\", \"C:\\Windows\\DigitalLocker\\fontdrvhost.exe\", \"C:\\Users\\Default User\\lsass.exe\", \"C:\\Program Files\\VideoLAN\\VLC\\skins\\sppsvc.exe\", \"C:\\Program Files (x86)\\Common Files\\Services\\RuntimeBroker.exe\", \"C:\\Recovery\\WindowsRE\\conhost.exe\", \"C:\\Users\\Default\\System.exe\", \"C:\\Windows\\ShellExperiences\\SppExtComObj.exe\", \"C:\\Users\\Admin\\Videos\\OfficeClickToRun.exe\", \"C:\\Recovery\\WindowsRE\\dwm.exe\", \"C:\\mIIccrosoft\\OfficeClickToRun.exe\", \"C:\\Windows\\schemas\\AvailableNetwork\\TextInputHost.exe\", \"C:\\Windows\\SoftwareDistribution\\DataStore\\Logs\\TextInputHost.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\WindowsPowerShell\\Modules\\cmd.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\WindowsPowerShell\\Modules\\cmd.exe\", \"C:\\Windows\\ServiceProfiles\\NetworkService\\Music\\fontdrvhost.exe\", \"C:\\Windows\\DigitalLocker\\fontdrvhost.exe\", \"C:\\Users\\Default User\\lsass.exe\", \"C:\\Program Files\\VideoLAN\\VLC\\skins\\sppsvc.exe\"" Winmonitordhcp.exe -
Process spawned unexpected child process 57 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3912 2980 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1692 2980 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3132 2980 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2964 2980 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 720 2980 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4832 2980 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2084 2980 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 764 2980 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3676 2980 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5068 2980 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1396 2980 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1792 2980 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3076 2980 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4160 2980 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4128 2980 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4008 2980 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3084 2980 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1864 2980 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3168 2980 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3136 2980 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1600 2980 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2012 2980 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2328 2980 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1100 2980 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2220 2980 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4936 2980 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4772 2980 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5012 2980 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1880 2980 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2052 2980 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3104 2980 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1816 2980 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3748 2980 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2004 2980 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4716 2980 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4428 2980 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1340 2980 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3640 2980 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 404 2980 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1656 2980 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2436 2980 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1684 2980 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1988 2980 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3904 2980 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2192 2980 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2984 2980 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4252 2980 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3092 2980 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1756 2980 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2888 2980 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3944 2980 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4320 2980 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4324 2980 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 632 2980 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1328 2980 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4536 2980 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 456 2980 schtasks.exe 92 -
resource yara_rule behavioral2/files/0x000a000000023ba8-9.dat dcrat behavioral2/memory/868-12-0x0000000000400000-0x00000000006C0000-memory.dmp dcrat behavioral2/files/0x000a000000023bad-25.dat dcrat behavioral2/memory/3540-27-0x0000000000F40000-0x0000000001190000-memory.dmp dcrat -
Disables Task Manager via registry modification
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation neverlose2.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation Neverlose.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation Winmonitordhcp.exe -
Executes dropped EXE 3 IoCs
pid Process 1956 Neverlose.exe 3540 Winmonitordhcp.exe 980 fontdrvhost.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 38 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Program Files (x86)\\Common Files\\Services\\RuntimeBroker.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\conhost = "\"C:\\Recovery\\WindowsRE\\conhost.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SppExtComObj = "\"C:\\Windows\\ShellExperiences\\SppExtComObj.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\mIIccrosoft\\explorer.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SppExtComObj = "\"C:\\Users\\Admin\\Saved Games\\SppExtComObj.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SppExtComObj = "\"C:\\Users\\Admin\\Saved Games\\SppExtComObj.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\Windows\\DigitalLocker\\fontdrvhost.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Users\\Default User\\lsass.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cmd = "\"C:\\Program Files\\WindowsPowerShell\\Modules\\cmd.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TextInputHost = "\"C:\\Windows\\schemas\\AvailableNetwork\\TextInputHost.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\conhost = "\"C:\\Recovery\\WindowsRE\\conhost.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\mIIccrosoft\\explorer.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System = "\"C:\\Program Files (x86)\\Windows Mail\\System.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Program Files\\VideoLAN\\csrss.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\Windows\\ServiceProfiles\\NetworkService\\Music\\fontdrvhost.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\Program Files\\VideoLAN\\VLC\\skins\\sppsvc.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Program Files\\VideoLAN\\csrss.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System = "\"C:\\Users\\Default\\System.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OfficeClickToRun = "\"C:\\Users\\Admin\\Videos\\OfficeClickToRun.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System = "\"C:\\Users\\Default\\System.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\Program Files\\VideoLAN\\VLC\\skins\\sppsvc.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Program Files (x86)\\Common Files\\Services\\RuntimeBroker.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cmd = "\"C:\\Program Files\\WindowsPowerShell\\Modules\\cmd.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Users\\Default User\\lsass.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TextInputHost = "\"C:\\Windows\\schemas\\AvailableNetwork\\TextInputHost.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TextInputHost = "\"C:\\Windows\\SoftwareDistribution\\DataStore\\Logs\\TextInputHost.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System = "\"C:\\Program Files (x86)\\Windows Mail\\System.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Users\\Default\\smss.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Recovery\\WindowsRE\\dwm.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OfficeClickToRun = "\"C:\\mIIccrosoft\\OfficeClickToRun.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SppExtComObj = "\"C:\\Windows\\ShellExperiences\\SppExtComObj.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OfficeClickToRun = "\"C:\\Users\\Admin\\Videos\\OfficeClickToRun.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Recovery\\WindowsRE\\dwm.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OfficeClickToRun = "\"C:\\mIIccrosoft\\OfficeClickToRun.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TextInputHost = "\"C:\\Windows\\SoftwareDistribution\\DataStore\\Logs\\TextInputHost.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Users\\Default\\smss.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\Windows\\ServiceProfiles\\NetworkService\\Music\\fontdrvhost.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\Windows\\DigitalLocker\\fontdrvhost.exe\"" Winmonitordhcp.exe -
Drops file in Program Files directory 11 IoCs
description ioc Process File created C:\Program Files\WindowsPowerShell\Modules\cmd.exe Winmonitordhcp.exe File created C:\Program Files (x86)\Common Files\Services\9e8d7a4ca61bd9 Winmonitordhcp.exe File created C:\Program Files (x86)\Windows Mail\27d1bcfc3c54e0 Winmonitordhcp.exe File created C:\Program Files\VideoLAN\csrss.exe Winmonitordhcp.exe File created C:\Program Files\VideoLAN\886983d96e3d3e Winmonitordhcp.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\cmd.exe Winmonitordhcp.exe File created C:\Program Files\WindowsPowerShell\Modules\ebf1f9fa8afd6d Winmonitordhcp.exe File created C:\Program Files\VideoLAN\VLC\skins\sppsvc.exe Winmonitordhcp.exe File created C:\Program Files\VideoLAN\VLC\skins\0a1fd5f707cd16 Winmonitordhcp.exe File created C:\Program Files (x86)\Common Files\Services\RuntimeBroker.exe Winmonitordhcp.exe File created C:\Program Files (x86)\Windows Mail\System.exe Winmonitordhcp.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\schemas\AvailableNetwork\22eafd247d37c3 Winmonitordhcp.exe File created C:\Windows\SoftwareDistribution\DataStore\Logs\TextInputHost.exe Winmonitordhcp.exe File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe File created C:\Windows\ServiceProfiles\NetworkService\Music\5b884080fd4f94 Winmonitordhcp.exe File created C:\Windows\DigitalLocker\fontdrvhost.exe Winmonitordhcp.exe File created C:\Windows\ShellExperiences\e1ef82546f0b02 Winmonitordhcp.exe File created C:\Windows\WinSxS\RuntimeBroker.exe Winmonitordhcp.exe File created C:\Windows\schemas\AvailableNetwork\TextInputHost.exe Winmonitordhcp.exe File created C:\Windows\SoftwareDistribution\DataStore\Logs\22eafd247d37c3 Winmonitordhcp.exe File created C:\Windows\ServiceProfiles\NetworkService\Music\fontdrvhost.exe Winmonitordhcp.exe File created C:\Windows\DigitalLocker\5b884080fd4f94 Winmonitordhcp.exe File created C:\Windows\ShellExperiences\SppExtComObj.exe Winmonitordhcp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language neverlose2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mspaint.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Neverlose.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings neverlose2.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings Neverlose.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings Winmonitordhcp.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 724 reg.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 57 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3748 schtasks.exe 2436 schtasks.exe 1756 schtasks.exe 3676 schtasks.exe 1340 schtasks.exe 4252 schtasks.exe 4320 schtasks.exe 1396 schtasks.exe 2012 schtasks.exe 5012 schtasks.exe 2004 schtasks.exe 3640 schtasks.exe 2984 schtasks.exe 1692 schtasks.exe 1100 schtasks.exe 4716 schtasks.exe 3904 schtasks.exe 1988 schtasks.exe 1328 schtasks.exe 4008 schtasks.exe 1684 schtasks.exe 1864 schtasks.exe 2328 schtasks.exe 1880 schtasks.exe 4832 schtasks.exe 764 schtasks.exe 4128 schtasks.exe 3136 schtasks.exe 3944 schtasks.exe 2084 schtasks.exe 4536 schtasks.exe 456 schtasks.exe 3132 schtasks.exe 720 schtasks.exe 1792 schtasks.exe 3084 schtasks.exe 2052 schtasks.exe 3104 schtasks.exe 4428 schtasks.exe 1656 schtasks.exe 4772 schtasks.exe 404 schtasks.exe 4160 schtasks.exe 2220 schtasks.exe 4936 schtasks.exe 2888 schtasks.exe 5068 schtasks.exe 1600 schtasks.exe 2964 schtasks.exe 3076 schtasks.exe 1816 schtasks.exe 4324 schtasks.exe 632 schtasks.exe 3912 schtasks.exe 3168 schtasks.exe 2192 schtasks.exe 3092 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4868 mspaint.exe 4868 mspaint.exe 3540 Winmonitordhcp.exe 3540 Winmonitordhcp.exe 3540 Winmonitordhcp.exe 3540 Winmonitordhcp.exe 3540 Winmonitordhcp.exe 980 fontdrvhost.exe 980 fontdrvhost.exe 980 fontdrvhost.exe 980 fontdrvhost.exe 980 fontdrvhost.exe 980 fontdrvhost.exe 980 fontdrvhost.exe 980 fontdrvhost.exe 980 fontdrvhost.exe 980 fontdrvhost.exe 980 fontdrvhost.exe 980 fontdrvhost.exe 980 fontdrvhost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 980 fontdrvhost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3540 Winmonitordhcp.exe Token: SeDebugPrivilege 980 fontdrvhost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4868 mspaint.exe 4868 mspaint.exe 4868 mspaint.exe 4868 mspaint.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 868 wrote to memory of 4868 868 neverlose2.exe 83 PID 868 wrote to memory of 4868 868 neverlose2.exe 83 PID 868 wrote to memory of 4868 868 neverlose2.exe 83 PID 868 wrote to memory of 1956 868 neverlose2.exe 84 PID 868 wrote to memory of 1956 868 neverlose2.exe 84 PID 868 wrote to memory of 1956 868 neverlose2.exe 84 PID 1956 wrote to memory of 2904 1956 Neverlose.exe 88 PID 1956 wrote to memory of 2904 1956 Neverlose.exe 88 PID 1956 wrote to memory of 2904 1956 Neverlose.exe 88 PID 2904 wrote to memory of 1460 2904 WScript.exe 89 PID 2904 wrote to memory of 1460 2904 WScript.exe 89 PID 2904 wrote to memory of 1460 2904 WScript.exe 89 PID 1460 wrote to memory of 3540 1460 cmd.exe 91 PID 1460 wrote to memory of 3540 1460 cmd.exe 91 PID 3540 wrote to memory of 1324 3540 Winmonitordhcp.exe 151 PID 3540 wrote to memory of 1324 3540 Winmonitordhcp.exe 151 PID 1460 wrote to memory of 724 1460 cmd.exe 153 PID 1460 wrote to memory of 724 1460 cmd.exe 153 PID 1460 wrote to memory of 724 1460 cmd.exe 153 PID 1324 wrote to memory of 1820 1324 cmd.exe 154 PID 1324 wrote to memory of 1820 1324 cmd.exe 154 PID 1324 wrote to memory of 980 1324 cmd.exe 161 PID 1324 wrote to memory of 980 1324 cmd.exe 161 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\neverlose2.exe"C:\Users\Admin\AppData\Local\Temp\neverlose2.exe"1⤵
- DcRat
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Windows\SysWOW64\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\NL.jpg" /ForceBootstrapPaint3D2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4868
-
-
C:\Users\Admin\AppData\Local\Temp\Neverlose.exe"C:\Users\Admin\AppData\Local\Temp\Neverlose.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\mIIccrosoft\VeA0JL7xlD4tfYfCo.vbe"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\mIIccrosoft\XqamRZ1Xoz1ZjGFCXqY6WSXlph.bat" "4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\mIIccrosoft\Winmonitordhcp.exe"C:\mIIccrosoft\Winmonitordhcp.exe"5⤵
- DcRat
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\p52YCronXd.bat"6⤵
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵PID:1820
-
-
C:\Windows\ServiceProfiles\NetworkService\Music\fontdrvhost.exe"C:\Windows\ServiceProfiles\NetworkService\Music\fontdrvhost.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:980
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f5⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:724
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:4480
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 6 /tr "'C:\Program Files\WindowsPowerShell\Modules\cmd.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3912
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Program Files\WindowsPowerShell\Modules\cmd.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1692
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 10 /tr "'C:\Program Files\WindowsPowerShell\Modules\cmd.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3132
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 9 /tr "'C:\Windows\ServiceProfiles\NetworkService\Music\fontdrvhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2964
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Windows\ServiceProfiles\NetworkService\Music\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:720
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 14 /tr "'C:\Windows\ServiceProfiles\NetworkService\Music\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4832
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 5 /tr "'C:\Windows\DigitalLocker\fontdrvhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2084
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Windows\DigitalLocker\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:764
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 5 /tr "'C:\Windows\DigitalLocker\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3676
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 6 /tr "'C:\Users\Default User\lsass.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5068
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Users\Default User\lsass.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1396
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 7 /tr "'C:\Users\Default User\lsass.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1792
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 9 /tr "'C:\Program Files\VideoLAN\VLC\skins\sppsvc.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3076
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files\VideoLAN\VLC\skins\sppsvc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4160
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 8 /tr "'C:\Program Files\VideoLAN\VLC\skins\sppsvc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4128
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Common Files\Services\RuntimeBroker.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4008
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files (x86)\Common Files\Services\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3084
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Common Files\Services\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1864
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\conhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3168
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\conhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3136
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\conhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1600
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 6 /tr "'C:\Users\Default\System.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2012
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Users\Default\System.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2328
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 11 /tr "'C:\Users\Default\System.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1100
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 13 /tr "'C:\Windows\ShellExperiences\SppExtComObj.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2220
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Windows\ShellExperiences\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4936
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 11 /tr "'C:\Windows\ShellExperiences\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4772
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 10 /tr "'C:\Users\Admin\Videos\OfficeClickToRun.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5012
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Users\Admin\Videos\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1880
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 13 /tr "'C:\Users\Admin\Videos\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2052
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\dwm.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3104
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\dwm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1816
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\dwm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3748
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 9 /tr "'C:\mIIccrosoft\OfficeClickToRun.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2004
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\mIIccrosoft\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4716
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 14 /tr "'C:\mIIccrosoft\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4428
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 8 /tr "'C:\Windows\schemas\AvailableNetwork\TextInputHost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1340
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Windows\schemas\AvailableNetwork\TextInputHost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3640
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 14 /tr "'C:\Windows\schemas\AvailableNetwork\TextInputHost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:404
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 5 /tr "'C:\Windows\SoftwareDistribution\DataStore\Logs\TextInputHost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1656
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Windows\SoftwareDistribution\DataStore\Logs\TextInputHost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2436
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 6 /tr "'C:\Windows\SoftwareDistribution\DataStore\Logs\TextInputHost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1684
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 7 /tr "'C:\mIIccrosoft\explorer.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1988
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\mIIccrosoft\explorer.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3904
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 9 /tr "'C:\mIIccrosoft\explorer.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2192
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 7 /tr "'C:\Users\Admin\Saved Games\SppExtComObj.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2984
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Users\Admin\Saved Games\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4252
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 14 /tr "'C:\Users\Admin\Saved Games\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3092
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Mail\System.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1756
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Mail\System.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2888
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Mail\System.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3944
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 6 /tr "'C:\Users\Default\smss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4320
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Users\Default\smss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4324
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 11 /tr "'C:\Users\Default\smss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:632
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Program Files\VideoLAN\csrss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1328
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\VideoLAN\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4536
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Program Files\VideoLAN\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:456
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
131KB
MD57a9e39b9b88b3390df2445c9c65fb94b
SHA14ef857fc6f68059246825a3c71f3ee6801f6f37f
SHA256ba9a1c324f36918805b64e93b37e30a53b74898f0c46309bab60a125673f460b
SHA51204595c3d086aec464b12d9a3eacc9f50e189753c10ff1535319907636d7b394447f23c755736b32938b723bcaaec52d27abf9edd98ece16734e550a0914962a5
-
Filesize
2.6MB
MD51924cb0ae8b7ccca9e8030087ecc5a94
SHA1a1f4565cb089b27fd3deacd0fd93733f8f0f4c32
SHA256ffc00ef9763576969540d6f2d16a929bad4c3ffc9f4e97cf60206f56a2a7718d
SHA51246ac86ae174c77cd3c81a63a6bce589260a4412d29d4704caa8bc4a064d62859f37fdfb2f5dea48e3c415c5db074f964af732c34b0e2e2ea56db6505124d33ad
-
Filesize
228B
MD5eee7b23f5506f8df14bde1869cae0d06
SHA1d45dd1675677509622552f65739e22ab39e7a38a
SHA25691c1c449f38b23dc0bdcd2db4177a86073594f3997f9735d29e8bcfdd64564f3
SHA51264a68d800cc9adac40b434ac51a3e18332d2380b67035782e644eacd96e82ef1bc70ebd8599b40e7694df5560f8ca115e6bb274ade55e632a20e67cdb066653f
-
Filesize
214B
MD5e955b2ec1be8959f39d773b8c8417732
SHA151a89326d1425d8b8bf9db97c2db4dc73ded184e
SHA256741f26d85e76dcba0b82c0ca409cb8222ff1a11faff2e5240f4cc5802d5fb882
SHA51297f8610cd350239ed2363b3bd1ff561daff629754536154940401d2f46080bc3660ec71fc74df25a6e0392f5e4c70d7afad031384fd373899b240801da379ea1
-
Filesize
2.3MB
MD5988542961c81da353a3dc109c65b8408
SHA1424508109934444e670a5a3565d83ffa0c7ac9ec
SHA2561f25153fef26a01656b3b31dc0e84d85a24571d06308029c13a8b2ac4977e22c
SHA512d63b8032ad1cec921e857985b73d918026d40b998b26e21d7b3fbefce3dd3dee060a5ce2e609db44894422897f25816597f0c70005bcee4f2749f7cc6a0a8091
-
Filesize
147B
MD5b6b458cde945cc0c95245c764a82eabf
SHA1d8f0ddb6bf54e07f88f12e7efa92c1709ef25463
SHA256a98a5c09761c4ec2465434b70a052e8141e16195f8aa884984da0cf41601789d
SHA512301e603aaf53f9778e799baba419318d87c5e69058c878f2fa6e76dd68e35e76b49b334c1fa46cc2754c4b339f0bcc507bdbb76294b0ff3d24685563b3ca5395