Analysis
-
max time kernel
154s -
max time network
163s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
30-08-2021 04:30
Static task
static1
Behavioral task
behavioral1
Sample
30ac2fcde9afc55cd21098f4c8140019dbd200ae3d602b917b727678dc50b270.exe
Resource
win10v20210408
General
-
Target
30ac2fcde9afc55cd21098f4c8140019dbd200ae3d602b917b727678dc50b270.exe
-
Size
211KB
-
MD5
40aad8e367a339b58557b9bfcd01b8d6
-
SHA1
04640097102c8f77b7db9df4b83f294b99b326d8
-
SHA256
30ac2fcde9afc55cd21098f4c8140019dbd200ae3d602b917b727678dc50b270
-
SHA512
2c79b732862f484b42d09199cc34546e2c246c6822ab6fc4816ed1a823e7c08c3c235b0b6136db6ec701034d993ac3777d177fb6d1bfe9e6c608983e98a31cde
Malware Config
Extracted
C:\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT
buran
Extracted
smokeloader
2020
http://readinglistforaugust1.xyz/
http://readinglistforaugust2.xyz/
http://readinglistforaugust3.xyz/
http://readinglistforaugust4.xyz/
http://readinglistforaugust5.xyz/
http://readinglistforaugust6.xyz/
http://readinglistforaugust7.xyz/
http://readinglistforaugust8.xyz/
http://readinglistforaugust9.xyz/
http://readinglistforaugust10.xyz/
http://readinglistforaugust1.site/
http://readinglistforaugust2.site/
http://readinglistforaugust3.site/
http://readinglistforaugust4.site/
http://readinglistforaugust5.site/
http://readinglistforaugust6.site/
http://readinglistforaugust7.site/
http://readinglistforaugust8.site/
http://readinglistforaugust9.site/
http://readinglistforaugust10.site/
http://readinglistforaugust1.club/
http://readinglistforaugust2.club/
http://readinglistforaugust3.club/
http://readinglistforaugust4.club/
http://readinglistforaugust5.club/
http://readinglistforaugust6.club/
http://readinglistforaugust7.club/
http://readinglistforaugust8.club/
http://readinglistforaugust9.club/
http://readinglistforaugust10.club/
Extracted
raccoon
fe582536ec580228180f270f7cb80a867860e010
-
url4cnc
https://telete.in/xylichanjk
Extracted
redline
zz
185.167.97.37:30902
Extracted
redline
nn
135.181.49.56:47634
Extracted
raccoon
d02c5d65069fc7ce1993e7c52edf0c9c4c195c81
-
url4cnc
https://telete.in/open3entershift
Signatures
-
Buran
Ransomware-as-a-service based on the VegaLocker family first identified in 2019.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 41 IoCs
Processes:
resource yara_rule behavioral1/memory/3084-178-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral1/memory/3084-180-0x000000000041C5C6-mapping.dmp family_redline behavioral1/memory/3084-195-0x0000000005780000-0x0000000005D86000-memory.dmp family_redline behavioral1/memory/4060-206-0x000000000041C5C6-mapping.dmp family_redline behavioral1/memory/1868-208-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral1/memory/1868-213-0x000000000041C5C6-mapping.dmp family_redline behavioral1/memory/4124-253-0x000000000041C5C6-mapping.dmp family_redline behavioral1/memory/4124-269-0x0000000005340000-0x0000000005946000-memory.dmp family_redline behavioral1/memory/4512-281-0x000000000041C5C6-mapping.dmp family_redline behavioral1/memory/4512-299-0x00000000052B0000-0x00000000058B6000-memory.dmp family_redline behavioral1/memory/4824-313-0x000000000041C5C6-mapping.dmp family_redline behavioral1/memory/4824-336-0x0000000004C90000-0x0000000005296000-memory.dmp family_redline behavioral1/memory/5044-368-0x000000000041C5C6-mapping.dmp family_redline behavioral1/memory/5044-381-0x0000000004F80000-0x0000000005586000-memory.dmp family_redline behavioral1/memory/4464-418-0x000000000041C5C6-mapping.dmp family_redline behavioral1/memory/4464-443-0x0000000004FA0000-0x00000000055A6000-memory.dmp family_redline behavioral1/memory/2304-717-0x000000000041C5C6-mapping.dmp family_redline behavioral1/memory/2400-822-0x000000000041C5C6-mapping.dmp family_redline behavioral1/memory/2400-843-0x00000000053C0000-0x00000000059C6000-memory.dmp family_redline behavioral1/memory/4724-859-0x000000000041C5C6-mapping.dmp family_redline behavioral1/memory/4724-868-0x00000000050A0000-0x00000000056A6000-memory.dmp family_redline behavioral1/memory/5016-870-0x000000000041C5C6-mapping.dmp family_redline behavioral1/memory/1680-881-0x000000000041C5C6-mapping.dmp family_redline behavioral1/memory/1680-888-0x0000000005160000-0x0000000005766000-memory.dmp family_redline behavioral1/memory/5064-892-0x000000000041C5C6-mapping.dmp family_redline behavioral1/memory/5064-899-0x0000000004CD0000-0x00000000052D6000-memory.dmp family_redline behavioral1/memory/4244-903-0x000000000041C5C6-mapping.dmp family_redline behavioral1/memory/3864-914-0x000000000041C5C6-mapping.dmp family_redline behavioral1/memory/3864-923-0x00000000053C0000-0x00000000059C6000-memory.dmp family_redline behavioral1/memory/4504-925-0x000000000041C5C6-mapping.dmp family_redline behavioral1/memory/4504-934-0x0000000005260000-0x0000000005866000-memory.dmp family_redline behavioral1/memory/4796-938-0x000000000041C5C6-mapping.dmp family_redline behavioral1/memory/4796-947-0x0000000004E10000-0x0000000005416000-memory.dmp family_redline behavioral1/memory/8-950-0x000000000041C5C6-mapping.dmp family_redline behavioral1/memory/4444-961-0x000000000041C5C6-mapping.dmp family_redline behavioral1/memory/4444-970-0x0000000005160000-0x0000000005766000-memory.dmp family_redline behavioral1/memory/4460-972-0x000000000041C5C6-mapping.dmp family_redline behavioral1/memory/4668-983-0x000000000041C5C6-mapping.dmp family_redline behavioral1/memory/4260-994-0x000000000041C5C6-mapping.dmp family_redline behavioral1/memory/4880-1005-0x000000000041C5C6-mapping.dmp family_redline behavioral1/memory/4880-1014-0x0000000004FD0000-0x00000000055D6000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid Process procid_target PID 2676 created 2680 2676 WerFault.exe 80 -
Turns off Windows Defender SpyNet reporting 2 TTPs
-
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Nirsoft 3 IoCs
Processes:
resource yara_rule behavioral1/files/0x000100000001ab58-164.dat Nirsoft behavioral1/files/0x000100000001ab58-166.dat Nirsoft behavioral1/files/0x000100000001ab58-172.dat Nirsoft -
Downloads MZ/PE file
-
Executes dropped EXE 40 IoCs
Processes:
1CEF.exe1E09.exe7264.exe7776.exe78AF.exe7A47.exe7DA3.exeAdvancedRun.exe83BE.exeAdvancedRun.exe7264.exe7264.exe7264.exe7264.exe7264.exe7264.exe7264.exe7264.exe7264.exe7264.exe7264.exe7264.exe7264.exe7264.exe7264.exe7264.exe7264.exe7264.exe7264.exe7264.exe7264.exe7264.exe7264.exe7264.exe7264.exe7264.exe7264.exe7264.exe7264.exe7264.exepid Process 1420 1CEF.exe 2680 1E09.exe 2892 7264.exe 1308 7776.exe 3640 78AF.exe 3696 7A47.exe 4032 7DA3.exe 3036 AdvancedRun.exe 1812 83BE.exe 3032 AdvancedRun.exe 3084 7264.exe 4060 7264.exe 4124 7264.exe 4512 7264.exe 4824 7264.exe 5044 7264.exe 4464 7264.exe 3612 7264.exe 3984 7264.exe 2304 7264.exe 2400 7264.exe 188 7264.exe 4724 7264.exe 5016 7264.exe 1680 7264.exe 5064 7264.exe 4244 7264.exe 3864 7264.exe 4504 7264.exe 3996 7264.exe 4628 7264.exe 4796 7264.exe 2288 7264.exe 8 7264.exe 4444 7264.exe 4460 7264.exe 4668 7264.exe 4260 7264.exe 4880 7264.exe 636 7264.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
7776.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7776.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7776.exe -
Deletes itself 1 IoCs
Processes:
pid Process 3052 -
Loads dropped DLL 1 IoCs
Processes:
1E09.exepid Process 2680 1E09.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral1/files/0x000200000001ab53-136.dat themida behavioral1/files/0x000200000001ab53-137.dat themida behavioral1/memory/1308-151-0x0000000001390000-0x0000000001391000-memory.dmp themida -
Processes:
78AF.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths 78AF.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions 78AF.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Real-Time Protection 78AF.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 78AF.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet 78AF.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet\SubmitSamplesConsent = "0" 78AF.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 78AF.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 78AF.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\78AF.exe = "0" 78AF.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet\SpyNetReporting = "0" 78AF.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
7DA3.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run 7DA3.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\csrss.exe\" -start" 7DA3.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
78AF.exe7776.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 78AF.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 78AF.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 7776.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
csrss.exedescription ioc Process File opened (read-only) \??\P: csrss.exe File opened (read-only) \??\N: csrss.exe File opened (read-only) \??\M: csrss.exe File opened (read-only) \??\J: csrss.exe File opened (read-only) \??\X: csrss.exe File opened (read-only) \??\S: csrss.exe File opened (read-only) \??\T: csrss.exe File opened (read-only) \??\R: csrss.exe File opened (read-only) \??\I: csrss.exe File opened (read-only) \??\H: csrss.exe File opened (read-only) \??\G: csrss.exe File opened (read-only) \??\B: csrss.exe File opened (read-only) \??\V: csrss.exe File opened (read-only) \??\U: csrss.exe File opened (read-only) \??\Q: csrss.exe File opened (read-only) \??\L: csrss.exe File opened (read-only) \??\F: csrss.exe File opened (read-only) \??\Z: csrss.exe File opened (read-only) \??\Y: csrss.exe File opened (read-only) \??\K: csrss.exe File opened (read-only) \??\E: csrss.exe File opened (read-only) \??\A: csrss.exe File opened (read-only) \??\W: csrss.exe File opened (read-only) \??\O: csrss.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 31 geoiptool.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
7776.exe83BE.exepid Process 1308 7776.exe 1812 83BE.exe 1812 83BE.exe 1812 83BE.exe 1812 83BE.exe -
Suspicious use of SetThreadContext 26 IoCs
Processes:
30ac2fcde9afc55cd21098f4c8140019dbd200ae3d602b917b727678dc50b270.exe7264.exe78AF.exedescription pid Process procid_target PID 636 set thread context of 3520 636 30ac2fcde9afc55cd21098f4c8140019dbd200ae3d602b917b727678dc50b270.exe 77 PID 2892 set thread context of 3084 2892 7264.exe 102 PID 2892 set thread context of 4060 2892 7264.exe 110 PID 3640 set thread context of 1868 3640 78AF.exe 119 PID 2892 set thread context of 4124 2892 7264.exe 122 PID 2892 set thread context of 4512 2892 7264.exe 124 PID 2892 set thread context of 4824 2892 7264.exe 128 PID 2892 set thread context of 5044 2892 7264.exe 129 PID 2892 set thread context of 4464 2892 7264.exe 131 PID 2892 set thread context of 3984 2892 7264.exe 133 PID 2892 set thread context of 2304 2892 7264.exe 149 PID 2892 set thread context of 2400 2892 7264.exe 151 PID 2892 set thread context of 4724 2892 7264.exe 153 PID 2892 set thread context of 5016 2892 7264.exe 154 PID 2892 set thread context of 1680 2892 7264.exe 155 PID 2892 set thread context of 5064 2892 7264.exe 156 PID 2892 set thread context of 4244 2892 7264.exe 157 PID 2892 set thread context of 3864 2892 7264.exe 158 PID 2892 set thread context of 4504 2892 7264.exe 159 PID 2892 set thread context of 4796 2892 7264.exe 162 PID 2892 set thread context of 8 2892 7264.exe 164 PID 2892 set thread context of 4444 2892 7264.exe 165 PID 2892 set thread context of 4460 2892 7264.exe 166 PID 2892 set thread context of 4668 2892 7264.exe 167 PID 2892 set thread context of 4260 2892 7264.exe 168 PID 2892 set thread context of 4880 2892 7264.exe 169 -
Drops file in Program Files directory 64 IoCs
Processes:
csrss.exedescription ioc Process File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\modules\com-sun-tools-visualvm-sampler.jar csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp5-ppd.xrm-ms.payfast.797-5DF-F38 csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PublisherVL_KMS_Client-ul.xrm-ms.payfast.797-5DF-F38 csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogo.contrast-black_scale-80.png csrss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.e4.ui.model.workbench.nl_ja_4.4.0.v20140623020002.jar csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL093.XML.payfast.797-5DF-F38 csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGMN105.XML csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\AccessVL_KMS_Client-ppd.xrm-ms csrss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-modules-javahelp_ja.jar.payfast.797-5DF-F38 csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioStdXC2RVL_KMS_ClientC2R-ul-oob.xrm-ms.payfast.797-5DF-F38 csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_Subscription5-ul-oob.xrm-ms.payfast.797-5DF-F38 csrss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-api-progress.xml csrss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.osgi.nl_zh_4.4.0.v20140623020002.jar csrss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\uarrow.gif.payfast.797-5DF-F38 csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_Subscription1-ppd.xrm-ms csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019VL_KMS_Client_AE-ppd.xrm-ms csrss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.greychart.ui.ja_5.5.0.165303.jar.payfast.797-5DF-F38 csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlusDemoR_BypassTrial180-ppd.xrm-ms.payfast.797-5DF-F38 csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\POWERPNT_F_COL.HXK csrss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-modules-spi-actions.xml csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Orange Red.xml.payfast.797-5DF-F38 csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Access2019R_OEM_Perp-ul-oob.xrm-ms.payfast.797-5DF-F38 csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\OriginResume.Dotx csrss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-core_ja.jar.payfast.797-5DF-F38 csrss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.apache.felix.gogo.command_0.10.0.v201209301215.jar csrss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-openide-awt.xml csrss.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\resources.jar.payfast.797-5DF-F38 csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Effects\Milk Glass.eftx csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PerfBoost.exe.payfast.797-5DF-F38 csrss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\include\win32\jni_md.h csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\OFFSYMSB.TTF.payfast.797-5DF-F38 csrss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.osgi_3.10.1.v20140909-1633.jar.payfast.797-5DF-F38 csrss.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\plugin.jar csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Excel2019R_Grace-ul-oob.xrm-ms.payfast.797-5DF-F38 csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeStudentDemoR_BypassTrial180-ppd.xrm-ms.payfast.797-5DF-F38 csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\BORDERS\MSART2.BDR.payfast.797-5DF-F38 csrss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-openide-loaders_zh_CN.jar csrss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.engine.nl_ja_4.4.0.v20140623020002.jar.payfast.797-5DF-F38 csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019XC2RVL_KMS_ClientC2R-ul-oob.xrm-ms csrss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.frameworkadmin.equinox.nl_zh_4.4.0.v20140623020002.jar csrss.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\tzmappings csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PowerPointR_Retail-ul-oob.xrm-ms.payfast.797-5DF-F38 csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdR_Grace-ul-oob.xrm-ms csrss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui_3.106.0.v20140812-1751.jar.payfast.797-5DF-F38 csrss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.event_1.3.100.v20140115-1647.jar csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL112.XML.payfast.797-5DF-F38 csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Slipstream.xml.payfast.797-5DF-F38 csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.PPT csrss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-modules-queries_zh_CN.jar.payfast.797-5DF-F38 csrss.exe File opened for modification C:\Program Files\TraceInitialize.asf.payfast.797-5DF-F38 csrss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-openide-io_ja.jar csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019VL_MAK_AE-ppd.xrm-ms csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSZIP.DIC csrss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-openide-dialogs.xml.payfast.797-5DF-F38 csrss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\modules\com-sun-tools-visualvm-host-remote.jar.payfast.797-5DF-F38 csrss.exe File opened for modification C:\Program Files\Microsoft Office\Office16\OSPP.HTM.payfast.797-5DF-F38 csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\SETLANG_K_COL.HXK.payfast.797-5DF-F38 csrss.exe File opened for modification C:\Program Files\ConfirmGet.png csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\PersonalMonthlyBudget.xltx csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\Library\Analysis\FUNCRES.XLAM.payfast.797-5DF-F38 csrss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.diagnostic_5.5.0.165303.jar csrss.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-0115-0409-1000-0000000FF1CE.xml.payfast.797-5DF-F38 csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PersonalR_Grace-ul-oob.xrm-ms csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_OEM_Perp2-ul-phn.xrm-ms.payfast.797-5DF-F38 csrss.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 15 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target Process procid_target 1928 2680 WerFault.exe 80 3264 2680 WerFault.exe 80 3680 2680 WerFault.exe 80 2256 2680 WerFault.exe 80 4032 2680 WerFault.exe 80 2356 2680 WerFault.exe 80 504 2680 WerFault.exe 80 772 2680 WerFault.exe 80 3404 2680 WerFault.exe 80 3980 2680 WerFault.exe 80 3952 2680 WerFault.exe 80 4068 2680 WerFault.exe 80 368 2680 WerFault.exe 80 2676 2680 WerFault.exe 80 4836 3984 WerFault.exe 133 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
30ac2fcde9afc55cd21098f4c8140019dbd200ae3d602b917b727678dc50b270.exedescription ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 30ac2fcde9afc55cd21098f4c8140019dbd200ae3d602b917b727678dc50b270.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 30ac2fcde9afc55cd21098f4c8140019dbd200ae3d602b917b727678dc50b270.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 30ac2fcde9afc55cd21098f4c8140019dbd200ae3d602b917b727678dc50b270.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid Process 1432 vssadmin.exe -
Processes:
7DA3.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 7DA3.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 7DA3.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
30ac2fcde9afc55cd21098f4c8140019dbd200ae3d602b917b727678dc50b270.exepid Process 3520 30ac2fcde9afc55cd21098f4c8140019dbd200ae3d602b917b727678dc50b270.exe 3520 30ac2fcde9afc55cd21098f4c8140019dbd200ae3d602b917b727678dc50b270.exe 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid Process 3052 -
Suspicious behavior: MapViewOfSection 19 IoCs
Processes:
30ac2fcde9afc55cd21098f4c8140019dbd200ae3d602b917b727678dc50b270.exepid Process 3520 30ac2fcde9afc55cd21098f4c8140019dbd200ae3d602b917b727678dc50b270.exe 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeAdvancedRun.exeAdvancedRun.exe78AF.exepowershell.exepowershell.exe7776.exe83BE.exengentask.exeWMIC.exedescription pid Process Token: SeShutdownPrivilege 3052 Token: SeCreatePagefilePrivilege 3052 Token: SeShutdownPrivilege 3052 Token: SeCreatePagefilePrivilege 3052 Token: SeRestorePrivilege 1928 WerFault.exe Token: SeBackupPrivilege 1928 WerFault.exe Token: SeDebugPrivilege 1928 WerFault.exe Token: SeDebugPrivilege 3264 WerFault.exe Token: SeDebugPrivilege 3680 WerFault.exe Token: SeDebugPrivilege 2256 WerFault.exe Token: SeDebugPrivilege 2356 WerFault.exe Token: SeDebugPrivilege 504 WerFault.exe Token: SeDebugPrivilege 772 WerFault.exe Token: SeDebugPrivilege 3404 WerFault.exe Token: SeDebugPrivilege 3980 WerFault.exe Token: SeDebugPrivilege 3952 WerFault.exe Token: SeDebugPrivilege 4068 WerFault.exe Token: SeDebugPrivilege 368 WerFault.exe Token: SeDebugPrivilege 2676 WerFault.exe Token: SeShutdownPrivilege 3052 Token: SeCreatePagefilePrivilege 3052 Token: SeShutdownPrivilege 3052 Token: SeCreatePagefilePrivilege 3052 Token: SeShutdownPrivilege 3052 Token: SeCreatePagefilePrivilege 3052 Token: SeShutdownPrivilege 3052 Token: SeCreatePagefilePrivilege 3052 Token: SeShutdownPrivilege 3052 Token: SeCreatePagefilePrivilege 3052 Token: SeShutdownPrivilege 3052 Token: SeCreatePagefilePrivilege 3052 Token: SeShutdownPrivilege 3052 Token: SeCreatePagefilePrivilege 3052 Token: SeShutdownPrivilege 3052 Token: SeCreatePagefilePrivilege 3052 Token: SeShutdownPrivilege 3052 Token: SeCreatePagefilePrivilege 3052 Token: SeDebugPrivilege 3036 AdvancedRun.exe Token: SeImpersonatePrivilege 3036 AdvancedRun.exe Token: SeShutdownPrivilege 3052 Token: SeCreatePagefilePrivilege 3052 Token: SeShutdownPrivilege 3052 Token: SeCreatePagefilePrivilege 3052 Token: SeDebugPrivilege 3032 AdvancedRun.exe Token: SeImpersonatePrivilege 3032 AdvancedRun.exe Token: SeShutdownPrivilege 3052 Token: SeCreatePagefilePrivilege 3052 Token: SeDebugPrivilege 3640 78AF.exe Token: SeDebugPrivilege 2320 powershell.exe Token: SeDebugPrivilege 1248 powershell.exe Token: SeDebugPrivilege 1308 7776.exe Token: SeDebugPrivilege 1812 83BE.exe Token: SeDebugPrivilege 1868 ngentask.exe Token: SeIncreaseQuotaPrivilege 4212 WMIC.exe Token: SeSecurityPrivilege 4212 WMIC.exe Token: SeTakeOwnershipPrivilege 4212 WMIC.exe Token: SeLoadDriverPrivilege 4212 WMIC.exe Token: SeSystemProfilePrivilege 4212 WMIC.exe Token: SeSystemtimePrivilege 4212 WMIC.exe Token: SeProfSingleProcessPrivilege 4212 WMIC.exe Token: SeIncBasePriorityPrivilege 4212 WMIC.exe Token: SeCreatePagefilePrivilege 4212 WMIC.exe Token: SeBackupPrivilege 4212 WMIC.exe Token: SeRestorePrivilege 4212 WMIC.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
1CEF.exe83BE.exepid Process 1420 1CEF.exe 1812 83BE.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid Process 3052 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
30ac2fcde9afc55cd21098f4c8140019dbd200ae3d602b917b727678dc50b270.exe7264.exe78AF.exeAdvancedRun.exedescription pid Process procid_target PID 636 wrote to memory of 3520 636 30ac2fcde9afc55cd21098f4c8140019dbd200ae3d602b917b727678dc50b270.exe 77 PID 636 wrote to memory of 3520 636 30ac2fcde9afc55cd21098f4c8140019dbd200ae3d602b917b727678dc50b270.exe 77 PID 636 wrote to memory of 3520 636 30ac2fcde9afc55cd21098f4c8140019dbd200ae3d602b917b727678dc50b270.exe 77 PID 636 wrote to memory of 3520 636 30ac2fcde9afc55cd21098f4c8140019dbd200ae3d602b917b727678dc50b270.exe 77 PID 636 wrote to memory of 3520 636 30ac2fcde9afc55cd21098f4c8140019dbd200ae3d602b917b727678dc50b270.exe 77 PID 636 wrote to memory of 3520 636 30ac2fcde9afc55cd21098f4c8140019dbd200ae3d602b917b727678dc50b270.exe 77 PID 3052 wrote to memory of 1420 3052 79 PID 3052 wrote to memory of 1420 3052 79 PID 3052 wrote to memory of 1420 3052 79 PID 3052 wrote to memory of 2680 3052 80 PID 3052 wrote to memory of 2680 3052 80 PID 3052 wrote to memory of 2680 3052 80 PID 3052 wrote to memory of 2892 3052 96 PID 3052 wrote to memory of 2892 3052 96 PID 3052 wrote to memory of 2892 3052 96 PID 3052 wrote to memory of 1308 3052 98 PID 3052 wrote to memory of 1308 3052 98 PID 3052 wrote to memory of 1308 3052 98 PID 3052 wrote to memory of 3640 3052 100 PID 3052 wrote to memory of 3640 3052 100 PID 3052 wrote to memory of 3640 3052 100 PID 3052 wrote to memory of 3696 3052 101 PID 3052 wrote to memory of 3696 3052 101 PID 3052 wrote to memory of 3696 3052 101 PID 2892 wrote to memory of 3084 2892 7264.exe 102 PID 2892 wrote to memory of 3084 2892 7264.exe 102 PID 2892 wrote to memory of 3084 2892 7264.exe 102 PID 3052 wrote to memory of 4032 3052 103 PID 3052 wrote to memory of 4032 3052 103 PID 3052 wrote to memory of 4032 3052 103 PID 3640 wrote to memory of 3036 3640 78AF.exe 104 PID 3640 wrote to memory of 3036 3640 78AF.exe 104 PID 3640 wrote to memory of 3036 3640 78AF.exe 104 PID 3036 wrote to memory of 3032 3036 AdvancedRun.exe 105 PID 3036 wrote to memory of 3032 3036 AdvancedRun.exe 105 PID 3036 wrote to memory of 3032 3036 AdvancedRun.exe 105 PID 3052 wrote to memory of 1812 3052 106 PID 3052 wrote to memory of 1812 3052 106 PID 3052 wrote to memory of 1812 3052 106 PID 3052 wrote to memory of 3896 3052 109 PID 3052 wrote to memory of 3896 3052 109 PID 3052 wrote to memory of 3896 3052 109 PID 3052 wrote to memory of 3896 3052 109 PID 2892 wrote to memory of 3084 2892 7264.exe 102 PID 2892 wrote to memory of 3084 2892 7264.exe 102 PID 2892 wrote to memory of 3084 2892 7264.exe 102 PID 2892 wrote to memory of 3084 2892 7264.exe 102 PID 2892 wrote to memory of 3084 2892 7264.exe 102 PID 2892 wrote to memory of 4060 2892 7264.exe 110 PID 2892 wrote to memory of 4060 2892 7264.exe 110 PID 2892 wrote to memory of 4060 2892 7264.exe 110 PID 3052 wrote to memory of 1248 3052 114 PID 3052 wrote to memory of 1248 3052 114 PID 3052 wrote to memory of 1248 3052 114 PID 3052 wrote to memory of 2132 3052 112 PID 3052 wrote to memory of 2132 3052 112 PID 3052 wrote to memory of 2132 3052 112 PID 3052 wrote to memory of 2132 3052 112 PID 3640 wrote to memory of 2320 3640 78AF.exe 113 PID 3640 wrote to memory of 2320 3640 78AF.exe 113 PID 3640 wrote to memory of 2320 3640 78AF.exe 113 PID 3640 wrote to memory of 1248 3640 78AF.exe 114 PID 3640 wrote to memory of 1248 3640 78AF.exe 114 PID 3640 wrote to memory of 1248 3640 78AF.exe 114 -
System policy modification 1 TTPs 1 IoCs
Processes:
78AF.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 78AF.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\30ac2fcde9afc55cd21098f4c8140019dbd200ae3d602b917b727678dc50b270.exe"C:\Users\Admin\AppData\Local\Temp\30ac2fcde9afc55cd21098f4c8140019dbd200ae3d602b917b727678dc50b270.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Users\Admin\AppData\Local\Temp\30ac2fcde9afc55cd21098f4c8140019dbd200ae3d602b917b727678dc50b270.exe"C:\Users\Admin\AppData\Local\Temp\30ac2fcde9afc55cd21098f4c8140019dbd200ae3d602b917b727678dc50b270.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3520
-
-
C:\Users\Admin\AppData\Local\Temp\1CEF.exeC:\Users\Admin\AppData\Local\Temp\1CEF.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1420
-
C:\Users\Admin\AppData\Local\Temp\1E09.exeC:\Users\Admin\AppData\Local\Temp\1E09.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2680 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 7362⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:1928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 8482⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3264
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 8362⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 8722⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 11882⤵
- Program crash
PID:4032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 12042⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 12482⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:504
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 11602⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 13202⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 12882⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 12122⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 12762⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 12282⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 12922⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2676
-
-
C:\Users\Admin\AppData\Local\Temp\7264.exeC:\Users\Admin\AppData\Local\Temp\7264.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\7264.exeC:\Users\Admin\AppData\Local\Temp\7264.exe2⤵
- Executes dropped EXE
PID:3084
-
-
C:\Users\Admin\AppData\Local\Temp\7264.exeC:\Users\Admin\AppData\Local\Temp\7264.exe2⤵
- Executes dropped EXE
PID:4060
-
-
C:\Users\Admin\AppData\Local\Temp\7264.exeC:\Users\Admin\AppData\Local\Temp\7264.exe2⤵
- Executes dropped EXE
PID:4124
-
-
C:\Users\Admin\AppData\Local\Temp\7264.exeC:\Users\Admin\AppData\Local\Temp\7264.exe2⤵
- Executes dropped EXE
PID:4512
-
-
C:\Users\Admin\AppData\Local\Temp\7264.exeC:\Users\Admin\AppData\Local\Temp\7264.exe2⤵
- Executes dropped EXE
PID:4824
-
-
C:\Users\Admin\AppData\Local\Temp\7264.exeC:\Users\Admin\AppData\Local\Temp\7264.exe2⤵
- Executes dropped EXE
PID:5044
-
-
C:\Users\Admin\AppData\Local\Temp\7264.exeC:\Users\Admin\AppData\Local\Temp\7264.exe2⤵
- Executes dropped EXE
PID:4464
-
-
C:\Users\Admin\AppData\Local\Temp\7264.exeC:\Users\Admin\AppData\Local\Temp\7264.exe2⤵
- Executes dropped EXE
PID:3612
-
-
C:\Users\Admin\AppData\Local\Temp\7264.exeC:\Users\Admin\AppData\Local\Temp\7264.exe2⤵
- Executes dropped EXE
PID:3984 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3984 -s 243⤵
- Program crash
PID:4836
-
-
-
C:\Users\Admin\AppData\Local\Temp\7264.exeC:\Users\Admin\AppData\Local\Temp\7264.exe2⤵
- Executes dropped EXE
PID:2304
-
-
C:\Users\Admin\AppData\Local\Temp\7264.exeC:\Users\Admin\AppData\Local\Temp\7264.exe2⤵
- Executes dropped EXE
PID:2400
-
-
C:\Users\Admin\AppData\Local\Temp\7264.exeC:\Users\Admin\AppData\Local\Temp\7264.exe2⤵
- Executes dropped EXE
PID:188
-
-
C:\Users\Admin\AppData\Local\Temp\7264.exeC:\Users\Admin\AppData\Local\Temp\7264.exe2⤵
- Executes dropped EXE
PID:4724
-
-
C:\Users\Admin\AppData\Local\Temp\7264.exeC:\Users\Admin\AppData\Local\Temp\7264.exe2⤵
- Executes dropped EXE
PID:5016
-
-
C:\Users\Admin\AppData\Local\Temp\7264.exeC:\Users\Admin\AppData\Local\Temp\7264.exe2⤵
- Executes dropped EXE
PID:1680
-
-
C:\Users\Admin\AppData\Local\Temp\7264.exeC:\Users\Admin\AppData\Local\Temp\7264.exe2⤵
- Executes dropped EXE
PID:5064
-
-
C:\Users\Admin\AppData\Local\Temp\7264.exeC:\Users\Admin\AppData\Local\Temp\7264.exe2⤵
- Executes dropped EXE
PID:4244
-
-
C:\Users\Admin\AppData\Local\Temp\7264.exeC:\Users\Admin\AppData\Local\Temp\7264.exe2⤵
- Executes dropped EXE
PID:3864
-
-
C:\Users\Admin\AppData\Local\Temp\7264.exeC:\Users\Admin\AppData\Local\Temp\7264.exe2⤵
- Executes dropped EXE
PID:4504
-
-
C:\Users\Admin\AppData\Local\Temp\7264.exeC:\Users\Admin\AppData\Local\Temp\7264.exe2⤵
- Executes dropped EXE
PID:3996
-
-
C:\Users\Admin\AppData\Local\Temp\7264.exeC:\Users\Admin\AppData\Local\Temp\7264.exe2⤵
- Executes dropped EXE
PID:4628
-
-
C:\Users\Admin\AppData\Local\Temp\7264.exeC:\Users\Admin\AppData\Local\Temp\7264.exe2⤵
- Executes dropped EXE
PID:4796
-
-
C:\Users\Admin\AppData\Local\Temp\7264.exeC:\Users\Admin\AppData\Local\Temp\7264.exe2⤵
- Executes dropped EXE
PID:2288
-
-
C:\Users\Admin\AppData\Local\Temp\7264.exeC:\Users\Admin\AppData\Local\Temp\7264.exe2⤵
- Executes dropped EXE
PID:8
-
-
C:\Users\Admin\AppData\Local\Temp\7264.exeC:\Users\Admin\AppData\Local\Temp\7264.exe2⤵
- Executes dropped EXE
PID:4444
-
-
C:\Users\Admin\AppData\Local\Temp\7264.exeC:\Users\Admin\AppData\Local\Temp\7264.exe2⤵
- Executes dropped EXE
PID:4460
-
-
C:\Users\Admin\AppData\Local\Temp\7264.exeC:\Users\Admin\AppData\Local\Temp\7264.exe2⤵
- Executes dropped EXE
PID:4668
-
-
C:\Users\Admin\AppData\Local\Temp\7264.exeC:\Users\Admin\AppData\Local\Temp\7264.exe2⤵
- Executes dropped EXE
PID:4260
-
-
C:\Users\Admin\AppData\Local\Temp\7264.exeC:\Users\Admin\AppData\Local\Temp\7264.exe2⤵
- Executes dropped EXE
PID:4880
-
-
C:\Users\Admin\AppData\Local\Temp\7264.exeC:\Users\Admin\AppData\Local\Temp\7264.exe2⤵
- Executes dropped EXE
PID:636
-
-
C:\Users\Admin\AppData\Local\Temp\7264.exeC:\Users\Admin\AppData\Local\Temp\7264.exe2⤵PID:3952
-
-
C:\Users\Admin\AppData\Local\Temp\7776.exeC:\Users\Admin\AppData\Local\Temp\7776.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:1308
-
C:\Users\Admin\AppData\Local\Temp\78AF.exeC:\Users\Admin\AppData\Local\Temp\78AF.exe1⤵
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3640 -
C:\Users\Admin\AppData\Local\Temp\50b72d01-63ee-4444-9f13-d69f8d3c7c19\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\50b72d01-63ee-4444-9f13-d69f8d3c7c19\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\50b72d01-63ee-4444-9f13-d69f8d3c7c19\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\50b72d01-63ee-4444-9f13-d69f8d3c7c19\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\50b72d01-63ee-4444-9f13-d69f8d3c7c19\AdvancedRun.exe" /SpecialRun 4101d8 30363⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3032
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\78AF.exe" -Force2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2320
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\78AF.exe" -Force2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1248
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe2⤵PID:1216
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1868
-
-
C:\Users\Admin\AppData\Local\Temp\7A47.exeC:\Users\Admin\AppData\Local\Temp\7A47.exe1⤵
- Executes dropped EXE
PID:3696
-
C:\Users\Admin\AppData\Local\Temp\7DA3.exeC:\Users\Admin\AppData\Local\Temp\7DA3.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies system certificate store
PID:4032 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\csrss.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\csrss.exe" -start2⤵
- Enumerates connected drives
PID:4264 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wmic shadowcopy delete3⤵PID:4576
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4212
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} recoveryenabled no3⤵PID:2220
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wbadmin delete catalog -quiet3⤵PID:4772
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C vssadmin delete shadows /all /quiet3⤵PID:4840
-
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:1432
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\csrss.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\csrss.exe" -agent 03⤵
- Drops file in Program Files directory
PID:4804
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵PID:4712
-
-
-
C:\Users\Admin\AppData\Local\Temp\83BE.exeC:\Users\Admin\AppData\Local\Temp\83BE.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1812
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3896
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1248
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2132
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:3068
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4252
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4392
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4496
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4652
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4744
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:5112
Network
MITRE ATT&CK Enterprise v6
Defense Evasion
Bypass User Account Control
1Disabling Security Tools
4File Deletion
2Install Root Certificate
1Modify Registry
7Virtualization/Sandbox Evasion
1Web Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
1c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
MD5
e6195d652cb02c89ebd5f3699114ffdc
SHA1dcfa0894da754fa017cbca8a7f4c921829a6b6a4
SHA256ecba305ff0590ab13c548246f12b14626d296ac6f4bb48242de03138f0bf9ef0
SHA51262bd3d19c39e94c47d4d0e769393c57d871d353efa6631c6f4a95778e6920c353b091324d4cce4be49516ecd8a4b183bf54ba390c33cb0059634a9259949f2f4
-
MD5
a69e12607d01237460808fa1709e5e86
SHA14a12f82aee1c90e70cdf6be863ce1a749c8ae411
SHA256188e05efb42c1f7fdb5c910a6614f710a87ae642b23ac9ffe3f75246744865bc
SHA5127533e6da6bac0405fc8b608da8020b54b6ee02592e6fd40ea342e130a8a876ae5ef4a1fd636d95e76339dbf8be45cecbd22ca2d0a4635b055ffafec3d7e15284
-
MD5
a69e12607d01237460808fa1709e5e86
SHA14a12f82aee1c90e70cdf6be863ce1a749c8ae411
SHA256188e05efb42c1f7fdb5c910a6614f710a87ae642b23ac9ffe3f75246744865bc
SHA5127533e6da6bac0405fc8b608da8020b54b6ee02592e6fd40ea342e130a8a876ae5ef4a1fd636d95e76339dbf8be45cecbd22ca2d0a4635b055ffafec3d7e15284
-
MD5
14dfa9c86b1b0bdcd19d30d9c96d47de
SHA138fd9625aa540d0df4c590ee1b7d7c0098e1b097
SHA256e679d71215bde948d62ddb4b1789bcba99246a9252b88c83298d726114a62096
SHA512be72e2620d8e524dcb426ac97c77ae60f643ea5dd58940928486a3d9e16d21a1cced96e1a04b6a29976a4067bb9fd351fd89cb200ce5ca17e9bedd53fbb6b7e0
-
MD5
14dfa9c86b1b0bdcd19d30d9c96d47de
SHA138fd9625aa540d0df4c590ee1b7d7c0098e1b097
SHA256e679d71215bde948d62ddb4b1789bcba99246a9252b88c83298d726114a62096
SHA512be72e2620d8e524dcb426ac97c77ae60f643ea5dd58940928486a3d9e16d21a1cced96e1a04b6a29976a4067bb9fd351fd89cb200ce5ca17e9bedd53fbb6b7e0
-
MD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
MD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
MD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
MD5
cd9841fd759299a5fd2e4536fd40c378
SHA163c2b77f595e6a49bcbfc7f1f076721d5265fb7a
SHA2567cf5279923daf2aeec6ed6869d75088fdf63449838db99d6440118feb8360293
SHA51227b9dfa933c4d606b9edd64220cab14601d5e37f16c6d9a93fdc9cf8019baaa96d4c66777ef9120af934e0d50fa7cf7b400db05028cc40ae74c2a09d9a99b20f
-
MD5
cd9841fd759299a5fd2e4536fd40c378
SHA163c2b77f595e6a49bcbfc7f1f076721d5265fb7a
SHA2567cf5279923daf2aeec6ed6869d75088fdf63449838db99d6440118feb8360293
SHA51227b9dfa933c4d606b9edd64220cab14601d5e37f16c6d9a93fdc9cf8019baaa96d4c66777ef9120af934e0d50fa7cf7b400db05028cc40ae74c2a09d9a99b20f
-
MD5
cd9841fd759299a5fd2e4536fd40c378
SHA163c2b77f595e6a49bcbfc7f1f076721d5265fb7a
SHA2567cf5279923daf2aeec6ed6869d75088fdf63449838db99d6440118feb8360293
SHA51227b9dfa933c4d606b9edd64220cab14601d5e37f16c6d9a93fdc9cf8019baaa96d4c66777ef9120af934e0d50fa7cf7b400db05028cc40ae74c2a09d9a99b20f
-
MD5
cd9841fd759299a5fd2e4536fd40c378
SHA163c2b77f595e6a49bcbfc7f1f076721d5265fb7a
SHA2567cf5279923daf2aeec6ed6869d75088fdf63449838db99d6440118feb8360293
SHA51227b9dfa933c4d606b9edd64220cab14601d5e37f16c6d9a93fdc9cf8019baaa96d4c66777ef9120af934e0d50fa7cf7b400db05028cc40ae74c2a09d9a99b20f
-
MD5
cd9841fd759299a5fd2e4536fd40c378
SHA163c2b77f595e6a49bcbfc7f1f076721d5265fb7a
SHA2567cf5279923daf2aeec6ed6869d75088fdf63449838db99d6440118feb8360293
SHA51227b9dfa933c4d606b9edd64220cab14601d5e37f16c6d9a93fdc9cf8019baaa96d4c66777ef9120af934e0d50fa7cf7b400db05028cc40ae74c2a09d9a99b20f
-
MD5
cd9841fd759299a5fd2e4536fd40c378
SHA163c2b77f595e6a49bcbfc7f1f076721d5265fb7a
SHA2567cf5279923daf2aeec6ed6869d75088fdf63449838db99d6440118feb8360293
SHA51227b9dfa933c4d606b9edd64220cab14601d5e37f16c6d9a93fdc9cf8019baaa96d4c66777ef9120af934e0d50fa7cf7b400db05028cc40ae74c2a09d9a99b20f
-
MD5
cd9841fd759299a5fd2e4536fd40c378
SHA163c2b77f595e6a49bcbfc7f1f076721d5265fb7a
SHA2567cf5279923daf2aeec6ed6869d75088fdf63449838db99d6440118feb8360293
SHA51227b9dfa933c4d606b9edd64220cab14601d5e37f16c6d9a93fdc9cf8019baaa96d4c66777ef9120af934e0d50fa7cf7b400db05028cc40ae74c2a09d9a99b20f
-
MD5
cd9841fd759299a5fd2e4536fd40c378
SHA163c2b77f595e6a49bcbfc7f1f076721d5265fb7a
SHA2567cf5279923daf2aeec6ed6869d75088fdf63449838db99d6440118feb8360293
SHA51227b9dfa933c4d606b9edd64220cab14601d5e37f16c6d9a93fdc9cf8019baaa96d4c66777ef9120af934e0d50fa7cf7b400db05028cc40ae74c2a09d9a99b20f
-
MD5
cd9841fd759299a5fd2e4536fd40c378
SHA163c2b77f595e6a49bcbfc7f1f076721d5265fb7a
SHA2567cf5279923daf2aeec6ed6869d75088fdf63449838db99d6440118feb8360293
SHA51227b9dfa933c4d606b9edd64220cab14601d5e37f16c6d9a93fdc9cf8019baaa96d4c66777ef9120af934e0d50fa7cf7b400db05028cc40ae74c2a09d9a99b20f
-
MD5
cd9841fd759299a5fd2e4536fd40c378
SHA163c2b77f595e6a49bcbfc7f1f076721d5265fb7a
SHA2567cf5279923daf2aeec6ed6869d75088fdf63449838db99d6440118feb8360293
SHA51227b9dfa933c4d606b9edd64220cab14601d5e37f16c6d9a93fdc9cf8019baaa96d4c66777ef9120af934e0d50fa7cf7b400db05028cc40ae74c2a09d9a99b20f
-
MD5
cd9841fd759299a5fd2e4536fd40c378
SHA163c2b77f595e6a49bcbfc7f1f076721d5265fb7a
SHA2567cf5279923daf2aeec6ed6869d75088fdf63449838db99d6440118feb8360293
SHA51227b9dfa933c4d606b9edd64220cab14601d5e37f16c6d9a93fdc9cf8019baaa96d4c66777ef9120af934e0d50fa7cf7b400db05028cc40ae74c2a09d9a99b20f
-
MD5
cd9841fd759299a5fd2e4536fd40c378
SHA163c2b77f595e6a49bcbfc7f1f076721d5265fb7a
SHA2567cf5279923daf2aeec6ed6869d75088fdf63449838db99d6440118feb8360293
SHA51227b9dfa933c4d606b9edd64220cab14601d5e37f16c6d9a93fdc9cf8019baaa96d4c66777ef9120af934e0d50fa7cf7b400db05028cc40ae74c2a09d9a99b20f
-
MD5
cd9841fd759299a5fd2e4536fd40c378
SHA163c2b77f595e6a49bcbfc7f1f076721d5265fb7a
SHA2567cf5279923daf2aeec6ed6869d75088fdf63449838db99d6440118feb8360293
SHA51227b9dfa933c4d606b9edd64220cab14601d5e37f16c6d9a93fdc9cf8019baaa96d4c66777ef9120af934e0d50fa7cf7b400db05028cc40ae74c2a09d9a99b20f
-
MD5
cd9841fd759299a5fd2e4536fd40c378
SHA163c2b77f595e6a49bcbfc7f1f076721d5265fb7a
SHA2567cf5279923daf2aeec6ed6869d75088fdf63449838db99d6440118feb8360293
SHA51227b9dfa933c4d606b9edd64220cab14601d5e37f16c6d9a93fdc9cf8019baaa96d4c66777ef9120af934e0d50fa7cf7b400db05028cc40ae74c2a09d9a99b20f
-
MD5
cd9841fd759299a5fd2e4536fd40c378
SHA163c2b77f595e6a49bcbfc7f1f076721d5265fb7a
SHA2567cf5279923daf2aeec6ed6869d75088fdf63449838db99d6440118feb8360293
SHA51227b9dfa933c4d606b9edd64220cab14601d5e37f16c6d9a93fdc9cf8019baaa96d4c66777ef9120af934e0d50fa7cf7b400db05028cc40ae74c2a09d9a99b20f
-
MD5
cd9841fd759299a5fd2e4536fd40c378
SHA163c2b77f595e6a49bcbfc7f1f076721d5265fb7a
SHA2567cf5279923daf2aeec6ed6869d75088fdf63449838db99d6440118feb8360293
SHA51227b9dfa933c4d606b9edd64220cab14601d5e37f16c6d9a93fdc9cf8019baaa96d4c66777ef9120af934e0d50fa7cf7b400db05028cc40ae74c2a09d9a99b20f
-
MD5
cd9841fd759299a5fd2e4536fd40c378
SHA163c2b77f595e6a49bcbfc7f1f076721d5265fb7a
SHA2567cf5279923daf2aeec6ed6869d75088fdf63449838db99d6440118feb8360293
SHA51227b9dfa933c4d606b9edd64220cab14601d5e37f16c6d9a93fdc9cf8019baaa96d4c66777ef9120af934e0d50fa7cf7b400db05028cc40ae74c2a09d9a99b20f
-
MD5
cd9841fd759299a5fd2e4536fd40c378
SHA163c2b77f595e6a49bcbfc7f1f076721d5265fb7a
SHA2567cf5279923daf2aeec6ed6869d75088fdf63449838db99d6440118feb8360293
SHA51227b9dfa933c4d606b9edd64220cab14601d5e37f16c6d9a93fdc9cf8019baaa96d4c66777ef9120af934e0d50fa7cf7b400db05028cc40ae74c2a09d9a99b20f
-
MD5
cd9841fd759299a5fd2e4536fd40c378
SHA163c2b77f595e6a49bcbfc7f1f076721d5265fb7a
SHA2567cf5279923daf2aeec6ed6869d75088fdf63449838db99d6440118feb8360293
SHA51227b9dfa933c4d606b9edd64220cab14601d5e37f16c6d9a93fdc9cf8019baaa96d4c66777ef9120af934e0d50fa7cf7b400db05028cc40ae74c2a09d9a99b20f
-
MD5
cd9841fd759299a5fd2e4536fd40c378
SHA163c2b77f595e6a49bcbfc7f1f076721d5265fb7a
SHA2567cf5279923daf2aeec6ed6869d75088fdf63449838db99d6440118feb8360293
SHA51227b9dfa933c4d606b9edd64220cab14601d5e37f16c6d9a93fdc9cf8019baaa96d4c66777ef9120af934e0d50fa7cf7b400db05028cc40ae74c2a09d9a99b20f
-
MD5
cd9841fd759299a5fd2e4536fd40c378
SHA163c2b77f595e6a49bcbfc7f1f076721d5265fb7a
SHA2567cf5279923daf2aeec6ed6869d75088fdf63449838db99d6440118feb8360293
SHA51227b9dfa933c4d606b9edd64220cab14601d5e37f16c6d9a93fdc9cf8019baaa96d4c66777ef9120af934e0d50fa7cf7b400db05028cc40ae74c2a09d9a99b20f
-
MD5
cd9841fd759299a5fd2e4536fd40c378
SHA163c2b77f595e6a49bcbfc7f1f076721d5265fb7a
SHA2567cf5279923daf2aeec6ed6869d75088fdf63449838db99d6440118feb8360293
SHA51227b9dfa933c4d606b9edd64220cab14601d5e37f16c6d9a93fdc9cf8019baaa96d4c66777ef9120af934e0d50fa7cf7b400db05028cc40ae74c2a09d9a99b20f
-
MD5
cd9841fd759299a5fd2e4536fd40c378
SHA163c2b77f595e6a49bcbfc7f1f076721d5265fb7a
SHA2567cf5279923daf2aeec6ed6869d75088fdf63449838db99d6440118feb8360293
SHA51227b9dfa933c4d606b9edd64220cab14601d5e37f16c6d9a93fdc9cf8019baaa96d4c66777ef9120af934e0d50fa7cf7b400db05028cc40ae74c2a09d9a99b20f
-
MD5
cd9841fd759299a5fd2e4536fd40c378
SHA163c2b77f595e6a49bcbfc7f1f076721d5265fb7a
SHA2567cf5279923daf2aeec6ed6869d75088fdf63449838db99d6440118feb8360293
SHA51227b9dfa933c4d606b9edd64220cab14601d5e37f16c6d9a93fdc9cf8019baaa96d4c66777ef9120af934e0d50fa7cf7b400db05028cc40ae74c2a09d9a99b20f
-
MD5
cd9841fd759299a5fd2e4536fd40c378
SHA163c2b77f595e6a49bcbfc7f1f076721d5265fb7a
SHA2567cf5279923daf2aeec6ed6869d75088fdf63449838db99d6440118feb8360293
SHA51227b9dfa933c4d606b9edd64220cab14601d5e37f16c6d9a93fdc9cf8019baaa96d4c66777ef9120af934e0d50fa7cf7b400db05028cc40ae74c2a09d9a99b20f
-
MD5
cd9841fd759299a5fd2e4536fd40c378
SHA163c2b77f595e6a49bcbfc7f1f076721d5265fb7a
SHA2567cf5279923daf2aeec6ed6869d75088fdf63449838db99d6440118feb8360293
SHA51227b9dfa933c4d606b9edd64220cab14601d5e37f16c6d9a93fdc9cf8019baaa96d4c66777ef9120af934e0d50fa7cf7b400db05028cc40ae74c2a09d9a99b20f
-
MD5
cd9841fd759299a5fd2e4536fd40c378
SHA163c2b77f595e6a49bcbfc7f1f076721d5265fb7a
SHA2567cf5279923daf2aeec6ed6869d75088fdf63449838db99d6440118feb8360293
SHA51227b9dfa933c4d606b9edd64220cab14601d5e37f16c6d9a93fdc9cf8019baaa96d4c66777ef9120af934e0d50fa7cf7b400db05028cc40ae74c2a09d9a99b20f
-
MD5
cd9841fd759299a5fd2e4536fd40c378
SHA163c2b77f595e6a49bcbfc7f1f076721d5265fb7a
SHA2567cf5279923daf2aeec6ed6869d75088fdf63449838db99d6440118feb8360293
SHA51227b9dfa933c4d606b9edd64220cab14601d5e37f16c6d9a93fdc9cf8019baaa96d4c66777ef9120af934e0d50fa7cf7b400db05028cc40ae74c2a09d9a99b20f
-
MD5
cd9841fd759299a5fd2e4536fd40c378
SHA163c2b77f595e6a49bcbfc7f1f076721d5265fb7a
SHA2567cf5279923daf2aeec6ed6869d75088fdf63449838db99d6440118feb8360293
SHA51227b9dfa933c4d606b9edd64220cab14601d5e37f16c6d9a93fdc9cf8019baaa96d4c66777ef9120af934e0d50fa7cf7b400db05028cc40ae74c2a09d9a99b20f
-
MD5
cd9841fd759299a5fd2e4536fd40c378
SHA163c2b77f595e6a49bcbfc7f1f076721d5265fb7a
SHA2567cf5279923daf2aeec6ed6869d75088fdf63449838db99d6440118feb8360293
SHA51227b9dfa933c4d606b9edd64220cab14601d5e37f16c6d9a93fdc9cf8019baaa96d4c66777ef9120af934e0d50fa7cf7b400db05028cc40ae74c2a09d9a99b20f
-
MD5
cd9841fd759299a5fd2e4536fd40c378
SHA163c2b77f595e6a49bcbfc7f1f076721d5265fb7a
SHA2567cf5279923daf2aeec6ed6869d75088fdf63449838db99d6440118feb8360293
SHA51227b9dfa933c4d606b9edd64220cab14601d5e37f16c6d9a93fdc9cf8019baaa96d4c66777ef9120af934e0d50fa7cf7b400db05028cc40ae74c2a09d9a99b20f
-
MD5
cd9841fd759299a5fd2e4536fd40c378
SHA163c2b77f595e6a49bcbfc7f1f076721d5265fb7a
SHA2567cf5279923daf2aeec6ed6869d75088fdf63449838db99d6440118feb8360293
SHA51227b9dfa933c4d606b9edd64220cab14601d5e37f16c6d9a93fdc9cf8019baaa96d4c66777ef9120af934e0d50fa7cf7b400db05028cc40ae74c2a09d9a99b20f
-
MD5
067a8002b76c49e820a9421fa3029c86
SHA1fbf589bf5e44768d9ed07f6b361472e3b54bcb58
SHA2569fdf1b38392cacb2490a8093fc910e2af3817e92ab459304d721919a63cbfe64
SHA5124986054c30b069cc145dde03244589eb06513211723ca11cd97204c748b43c07b6f16bab7b9203c3d53a20176879eb467debf90bde43a5a66d23587243fed03a
-
MD5
067a8002b76c49e820a9421fa3029c86
SHA1fbf589bf5e44768d9ed07f6b361472e3b54bcb58
SHA2569fdf1b38392cacb2490a8093fc910e2af3817e92ab459304d721919a63cbfe64
SHA5124986054c30b069cc145dde03244589eb06513211723ca11cd97204c748b43c07b6f16bab7b9203c3d53a20176879eb467debf90bde43a5a66d23587243fed03a
-
MD5
6a2d7f7373c59ff8be992d223b17f97f
SHA1e4bfe1e9fdb7560968da08e1dfe6ed8005a97223
SHA2563b8cef83d5f3b667281c3c8512b2e21d06e34a3fe7952d171854a36f557f80a9
SHA512f8719c97f97ceb16ce63b832bd393edb3ef87d8d7aac1d975243cd4aac62e2775eae2b1fd2d0314348144c1b38d19b31222f70c33fdd3133a483e9392d2de0c6
-
MD5
6a2d7f7373c59ff8be992d223b17f97f
SHA1e4bfe1e9fdb7560968da08e1dfe6ed8005a97223
SHA2563b8cef83d5f3b667281c3c8512b2e21d06e34a3fe7952d171854a36f557f80a9
SHA512f8719c97f97ceb16ce63b832bd393edb3ef87d8d7aac1d975243cd4aac62e2775eae2b1fd2d0314348144c1b38d19b31222f70c33fdd3133a483e9392d2de0c6
-
MD5
e99afcbb149ba6dfbdd90c034b88fe73
SHA1be974111ad0a8f3870d09706ea07b5438f418798
SHA256924b9935b1f2be85aa36e0158f0a55c1200cdf9046077a5b491f1aeb034c2353
SHA512bf8b1f544ab9e689068f94b7ee5cfbe304b3756308d022be2e487216dd01aed0fcc2ac76e5d6b4c2f434a1125a88d5c71a2ecdafdb7bddd82447e77601c6b4a9
-
MD5
e99afcbb149ba6dfbdd90c034b88fe73
SHA1be974111ad0a8f3870d09706ea07b5438f418798
SHA256924b9935b1f2be85aa36e0158f0a55c1200cdf9046077a5b491f1aeb034c2353
SHA512bf8b1f544ab9e689068f94b7ee5cfbe304b3756308d022be2e487216dd01aed0fcc2ac76e5d6b4c2f434a1125a88d5c71a2ecdafdb7bddd82447e77601c6b4a9
-
MD5
e70ceaf1fc7771d3d791aedc0c2068a7
SHA197912679527c910bdf4c97265656f4c2527245db
SHA2560e7b9aae7306cdb8cca2a7fa6552fd6cd03f3e2ab2e2d4ae51dfe325ff2016e5
SHA5126a4c8a424e87f4a622aa20e4fd37060919cf686c32c0432eea026c12af372ffc6714c6baff46d0590a78fddf62ea7ca3eac3240846e1781d090d3867cfc2cd58
-
MD5
3242c783cee6fb3e589e6d3e9bad0281
SHA1fdbf09b5a42d9a93a6515cf65630b033e0ec8dce
SHA25671b23e033bd17225d74d832b3a4d243fb4bfc72b7f864248191443d9c1023026
SHA512d3d06c35c737c190a2939869b126a494c6ec05b6608ffb59b15f09d93a61a23fb28176330c512650c0611bb4155ea1b098be3a157d5a85826635ed6602175994
-
MD5
3242c783cee6fb3e589e6d3e9bad0281
SHA1fdbf09b5a42d9a93a6515cf65630b033e0ec8dce
SHA25671b23e033bd17225d74d832b3a4d243fb4bfc72b7f864248191443d9c1023026
SHA512d3d06c35c737c190a2939869b126a494c6ec05b6608ffb59b15f09d93a61a23fb28176330c512650c0611bb4155ea1b098be3a157d5a85826635ed6602175994
-
MD5
f964811b68f9f1487c2b41e1aef576ce
SHA1b423959793f14b1416bc3b7051bed58a1034025f
SHA25683bc57dcf282264f2b00c21ce0339eac20fcb7401f7c5472c0cd0c014844e5f7
SHA512565b1a7291c6fcb63205907fcd9e72fc2e11ca945afc4468c378edba882e2f314c2ac21a7263880ff7d4b84c2a1678024c1ac9971ac1c1de2bfa4248ec0f98c4