Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
10/12/2022, 10:44
221210-mta25sab8x 1009/12/2022, 20:12
221209-yza5waha7v 1004/12/2022, 13:12
221204-qfsa2sbh74 1001/12/2022, 14:04
221201-rda5esef46 1030/11/2022, 14:19
221130-rms2lagf28 1029/11/2022, 15:31
221129-syd79afa3z 1029/11/2022, 09:15
221129-k73m7shf6s 1029/11/2022, 09:08
221129-k31caahc7x 10Analysis
-
max time kernel
1215s -
max time network
1317s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 09:15
Static task
static1
Behavioral task
behavioral1
Sample
ee1d1018f825ffa2d507f0d58a3a2c9d14a2b4a9c351e7d3fa05d29063488b9e.exe
Resource
win10v2004-20221111-en
General
-
Target
ee1d1018f825ffa2d507f0d58a3a2c9d14a2b4a9c351e7d3fa05d29063488b9e.exe
-
Size
146KB
-
MD5
2c6e6e290972fcd5e556efccfd51f174
-
SHA1
ec3de0785e4ccd0282e92e35c915ddb72832fd83
-
SHA256
ee1d1018f825ffa2d507f0d58a3a2c9d14a2b4a9c351e7d3fa05d29063488b9e
-
SHA512
a7077bf87ad233413322dd55d4c1ed684d5ebd70e9451307d9f70ba1888688fa5b375a6006803da9e9cc800be7bc928230ad26a889e88c907854a8bc73ad539f
-
SSDEEP
1536:KQsw8LQ+Z9DjjSD60zzeE2G95Vz6B6yRTj9AU44YxSs2gdIuV8Vm3PkO0v0RDQBK:KjiSd/LHG9516B6cv44WdX80/VDmGp
Malware Config
Extracted
djvu
http://fresherlights.com/lancer/get.php
-
extension
.kcbu
-
offline_id
hlqzhQ6w5SquNDF4Ul2XBDJQkSIKbAT6rmRBTit1
-
payload_url
http://uaery.top/dl/build2.exe
http://fresherlights.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-lj5qINGbTc Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0608Jhyjd
Extracted
amadey
3.50
193.56.146.194/h49vlBP/index.php
62.204.41.252/nB8cWack3/index.php
Extracted
vidar
55.9
517
https://t.me/headshotsonly
https://steamcommunity.com/profiles/76561199436777531
-
profile_id
517
Extracted
redline
Lege
31.41.244.14:4694
-
auth_value
096090aaf3ba0872338140cec5689868
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Detect Amadey credential stealer module 4 IoCs
resource yara_rule behavioral1/files/0x000a000000022e94-289.dat amadey_cred_module behavioral1/memory/1948-292-0x00000000009D0000-0x00000000009F4000-memory.dmp amadey_cred_module behavioral1/files/0x000a000000022e94-291.dat amadey_cred_module behavioral1/files/0x000a000000022e94-290.dat amadey_cred_module -
Detected Djvu ransomware 10 IoCs
resource yara_rule behavioral1/memory/2456-155-0x0000000002210000-0x000000000232B000-memory.dmp family_djvu behavioral1/memory/2112-158-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2112-160-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2112-162-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2112-172-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2112-224-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/3232-232-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/3232-233-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/3232-239-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/3232-243-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Detects Smokeloader packer 4 IoCs
resource yara_rule behavioral1/memory/3116-133-0x00000000005D0000-0x00000000005D9000-memory.dmp family_smokeloader behavioral1/memory/3116-136-0x00000000005D0000-0x00000000005D9000-memory.dmp family_smokeloader behavioral1/memory/3076-177-0x00000000005D0000-0x00000000005D9000-memory.dmp family_smokeloader behavioral1/memory/4424-191-0x00000000004A0000-0x00000000004A9000-memory.dmp family_smokeloader -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0006000000022ea2-311.dat family_redline behavioral1/files/0x0006000000022ea2-313.dat family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Blocklisted process makes network request 44 IoCs
flow pid Process 205 1948 rundll32.exe 222 3744 rundll32.exe 230 3744 rundll32.exe 239 3932 rundll32.exe 241 3440 powershell.exe 288 3744 rundll32.exe 307 3744 rundll32.exe 342 3744 rundll32.exe 343 3744 rundll32.exe 344 3744 rundll32.exe 345 3744 rundll32.exe 346 3744 rundll32.exe 347 3744 rundll32.exe 348 3744 rundll32.exe 350 3744 rundll32.exe 354 3744 rundll32.exe 355 3744 rundll32.exe 360 3744 rundll32.exe 363 3744 rundll32.exe 366 3744 rundll32.exe 369 3744 rundll32.exe 370 3744 rundll32.exe 372 3744 rundll32.exe 377 3744 rundll32.exe 381 3744 rundll32.exe 382 3744 rundll32.exe 384 3744 rundll32.exe 387 3744 rundll32.exe 390 3744 rundll32.exe 398 3744 rundll32.exe 399 3744 rundll32.exe 400 3744 rundll32.exe 401 3744 rundll32.exe 402 3744 rundll32.exe 404 3744 rundll32.exe 405 3744 rundll32.exe 406 3744 rundll32.exe 408 3744 rundll32.exe 409 3744 rundll32.exe 411 3744 rundll32.exe 414 3744 rundll32.exe 415 3744 rundll32.exe 419 3744 rundll32.exe 421 3744 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 38 IoCs
pid Process 4816 edvuvsv 2456 1DA.exe 552 42D.exe 644 660.exe 2112 1DA.exe 3076 1E4E.exe 4884 rovwer.exe 4816 rovwer.exe 5116 2053.exe 4424 265F.exe 3940 3331.exe 3100 1DA.exe 3232 1DA.exe 4644 edvuvsv 180 BD24.exe 3632 rovwer.exe 3200 revuvsv 3516 shvuvsv 2732 D61B.exe 4092 EADD.exe 720 build2.exe 4032 gntuud.exe 3292 build3.exe 316 build2.exe 1640 Lege.exe 3020 linda5.exe 5068 gntuud.exe 3116 mstsca.exe 2424 rovwer.exe 2732 gntuud.exe 1392 Lege.exe 4848 Lege.exe 688 rovwer.exe 3580 gntuud.exe 824 rovwer.exe 4044 gntuud.exe 5064 rovwer.exe 688 gntuud.exe -
Sets DLL path for service in the registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\add_reviewer\Parameters\ServiceDll = "C:\\Program Files (x86)\\MSBuild\\Microsoft\\add_reviewer.dll" rundll32.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\add_reviewer\Parameters\ServiceDll = "C:\\Program Files (x86)\\MSBuild\\Microsoft\\add_reviewer.dll\uf200" rundll32.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\add_reviewer\ImagePath = "C:\\Windows\\system32\\svchost.exe -k LocalService" rundll32.exe -
Checks computer location settings 2 TTPs 10 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 660.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation rovwer.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation build2.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation BD24.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation gntuud.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation linda5.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 42D.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 1DA.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 1DA.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation EADD.exe -
Loads dropped DLL 11 IoCs
pid Process 4456 regsvr32.exe 3744 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 316 build2.exe 316 build2.exe 4792 msiexec.exe 3932 rundll32.exe 4796 svchost.exe 4796 svchost.exe 884 rundll32.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 3872 icacls.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts rundll32.exe -
Accesses Microsoft Outlook profiles 1 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\socks_powershell = "Powershell.exe -windowstyle hidden -ExecutionPolicy Bypass -File \"C:\\Users\\Admin\\AppData\\Local\\Temp\\RarSFX0\\socks5-clean.ps1\"" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\48c3be4e-c22e-455f-bcdf-3ff086e17c08\\1DA.exe\" --AutoStart" 1DA.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Lege.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000005001\\Lege.exe" gntuud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\linda5.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000006001\\linda5.exe" gntuud.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 128 api.2ip.ua 129 api.2ip.ua 163 api.2ip.ua -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2456 set thread context of 2112 2456 1DA.exe 116 PID 3100 set thread context of 3232 3100 1DA.exe 142 PID 720 set thread context of 316 720 build2.exe 164 PID 3744 set thread context of 1632 3744 rundll32.exe 190 -
Drops file in Program Files directory 34 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\natives_blob.bin rundll32.exe File opened for modification C:\Program Files\7-Zip\Lang\hy.txt rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\Redact_R_RHP.aapp rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\turnOnNotificationInAcrobat.gif rundll32.exe File created C:\Program Files (x86)\MSBuild\Microsoft\DirectInk.dll rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ADelRCP.exe rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\PDDom.api rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\TrackedSend.aapp rundll32.exe File created C:\Program Files (x86)\MSBuild\Microsoft\ADelRCP.exe rundll32.exe File created C:\Program Files (x86)\MSBuild\Microsoft\s_shared_multi_filetype.svg rundll32.exe File created C:\Program Files (x86)\MSBuild\Microsoft\turnOnNotificationInAcrobat.gif rundll32.exe File created C:\Program Files (x86)\MSBuild\Microsoft\PDDom.api rundll32.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-core-timezone-l1-1-0.dll rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ahclient.dll rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\br.gif rundll32.exe File created C:\Program Files (x86)\MSBuild\Microsoft\br.gif rundll32.exe File opened for modification C:\Program Files\7-Zip\Lang\io.txt rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AdobeLinguistic.dll rundll32.exe File created C:\Program Files (x86)\MSBuild\Microsoft\ahclient.dll rundll32.exe File created C:\Program Files (x86)\MSBuild\Microsoft\AdobeLinguistic.dll rundll32.exe File created C:\Program Files (x86)\MSBuild\Microsoft\TrackedSend.aapp rundll32.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-convert-l1-1-0.dll rundll32.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\[email protected] rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\selection-actions2x.png rundll32.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Redact_R_RHP.aapp rundll32.exe File created C:\Program Files (x86)\MSBuild\Microsoft\add_reviewer.dll rundll32.exe File opened for modification C:\Program Files\Mozilla Firefox\AccessibleHandler.dll rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\s_shared_multi_filetype.svg rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\download.svg rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\DirectInk.dll rundll32.exe File created C:\Program Files (x86)\MSBuild\Microsoft\selection-actions2x.png rundll32.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe rundll32.exe File opened for modification C:\Program Files\7-Zip\Lang\el.txt rundll32.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-private-l1-1-0.dll rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 11 IoCs
pid pid_target Process procid_target 4916 552 WerFault.exe 114 4912 644 WerFault.exe 115 3080 5116 WerFault.exe 123 4632 4884 WerFault.exe 118 3996 3200 WerFault.exe 146 744 3632 WerFault.exe 145 1764 2732 WerFault.exe 150 3180 2424 WerFault.exe 195 2836 688 WerFault.exe 213 4696 824 WerFault.exe 223 3352 3744 WerFault.exe 157 -
Checks SCSI registry key(s) 3 TTPs 18 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ee1d1018f825ffa2d507f0d58a3a2c9d14a2b4a9c351e7d3fa05d29063488b9e.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1E4E.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI shvuvsv Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI shvuvsv Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI edvuvsv Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3331.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3331.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI edvuvsv Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI shvuvsv Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI edvuvsv Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1E4E.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1E4E.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3331.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI edvuvsv Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ee1d1018f825ffa2d507f0d58a3a2c9d14a2b4a9c351e7d3fa05d29063488b9e.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ee1d1018f825ffa2d507f0d58a3a2c9d14a2b4a9c351e7d3fa05d29063488b9e.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI edvuvsv Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI edvuvsv -
Checks processor information in registry 2 TTPs 64 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 svchost.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Status rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Status rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString build2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Previous Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 build2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data rundll32.exe -
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1136 schtasks.exe 4356 schtasks.exe 4996 schtasks.exe 3512 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4608 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Process not Found Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Toolbar Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" Process not Found -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 = 820074001c004346534616003100000000006b557d6c120041707044617461000000741a595e96dfd3488d671733bcee28bac5cdfadf9f6756418947c5c76bc0b67f400009000400efbe6b557d6c7d5512522e00000089e1010000000100000000000000000000000000000020f30e004100700070004400610074006100000042000000 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\MRUListEx = 00000000ffffffff Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 56003100000000006b558770100057696e646f777300400009000400efbe874f77487d550b522e00000000060000000001000000000000000000000000000000ab602200570069006e0064006f0077007300000016000000 Process not Found Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Rev = "0" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Rev = "0" Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\MRUListEx = 00000000ffffffff Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\ShowCmd = "1" Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots Process not Found Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\SniffedFolderType = "Generic" Process not Found Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff Process not Found Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Process not Found Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202 Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\0\NodeSlot = "2" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616193" Process not Found Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 Process not Found Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell Process not Found Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\WorkFolders Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Vid = "{137E7700-3573-11CF-AE69-08002B2E1262}" Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff Process not Found Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0 Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616209" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 5a003100000000006b5589701000537973574f5736340000420009000400efbe874fdb497d55a8532e0000001213000000000100000000000000000000000000000022d3750053007900730057004f00570036003400000018000000 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = ffffffff Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\HotKey = "0" Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0 = 50003100000000007d55da5310004c6f63616c003c0009000400efbe6b557d6c7d55e1532e0000009ce10100000001000000000000000000000000000000146795004c006f00630061006c00000014000000 Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\NodeSlot = "1" Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 = 3a001f44471a0359723fa74489c55595fe6b30ee260001002600efbe10000000274bcb87d2f5d801eecce0a6d7f5d801e86d79d5dd03d90114000000 Process not Found Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2 Process not Found Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Vid = "{137E7700-3573-11CF-AE69-08002B2E1262}" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\WFlags = "0" Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\MRUListEx = 00000000ffffffff Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\0\MRUListEx = ffffffff Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" Process not Found Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616193" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" Process not Found Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = 00000000ffffffff Process not Found Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" Process not Found -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\E487E70F21D23BE753A03B31673E70DE87203014 rundll32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\E487E70F21D23BE753A03B31673E70DE87203014\Blob = 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 rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 388 Process not Found 388 Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3116 ee1d1018f825ffa2d507f0d58a3a2c9d14a2b4a9c351e7d3fa05d29063488b9e.exe 3116 ee1d1018f825ffa2d507f0d58a3a2c9d14a2b4a9c351e7d3fa05d29063488b9e.exe 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 388 Process not Found -
Suspicious behavior: MapViewOfSection 64 IoCs
pid Process 3116 ee1d1018f825ffa2d507f0d58a3a2c9d14a2b4a9c351e7d3fa05d29063488b9e.exe 4816 edvuvsv 3076 1E4E.exe 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 3940 3331.exe 4644 edvuvsv 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 3516 shvuvsv 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 3032 explorer.exe 3032 explorer.exe 3032 explorer.exe 3032 explorer.exe 4732 explorer.exe 4732 explorer.exe 3032 explorer.exe 3032 explorer.exe 4732 explorer.exe 4732 explorer.exe 3032 explorer.exe 3032 explorer.exe 4732 explorer.exe 4732 explorer.exe 4732 explorer.exe 4732 explorer.exe 3032 explorer.exe 3032 explorer.exe 3032 explorer.exe 3032 explorer.exe 4732 explorer.exe 4732 explorer.exe 4732 explorer.exe 4732 explorer.exe 3032 explorer.exe 3032 explorer.exe 3032 explorer.exe 3032 explorer.exe 4732 explorer.exe 4732 explorer.exe 3032 explorer.exe 3032 explorer.exe 4732 explorer.exe 4732 explorer.exe 4732 explorer.exe 4732 explorer.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 388 Process not Found Token: SeCreatePagefilePrivilege 388 Process not Found Token: SeShutdownPrivilege 388 Process not Found Token: SeCreatePagefilePrivilege 388 Process not Found Token: SeShutdownPrivilege 388 Process not Found Token: SeCreatePagefilePrivilege 388 Process not Found Token: SeShutdownPrivilege 388 Process not Found Token: SeCreatePagefilePrivilege 388 Process not Found Token: SeShutdownPrivilege 388 Process not Found Token: SeCreatePagefilePrivilege 388 Process not Found Token: SeShutdownPrivilege 388 Process not Found Token: SeCreatePagefilePrivilege 388 Process not Found Token: SeShutdownPrivilege 388 Process not Found Token: SeCreatePagefilePrivilege 388 Process not Found Token: SeShutdownPrivilege 388 Process not Found Token: SeCreatePagefilePrivilege 388 Process not Found Token: SeShutdownPrivilege 388 Process not Found Token: SeCreatePagefilePrivilege 388 Process not Found Token: SeShutdownPrivilege 388 Process not Found Token: SeCreatePagefilePrivilege 388 Process not Found Token: SeShutdownPrivilege 388 Process not Found Token: SeCreatePagefilePrivilege 388 Process not Found Token: SeShutdownPrivilege 388 Process not Found Token: SeCreatePagefilePrivilege 388 Process not Found Token: SeShutdownPrivilege 388 Process not Found Token: SeCreatePagefilePrivilege 388 Process not Found Token: SeShutdownPrivilege 388 Process not Found Token: SeCreatePagefilePrivilege 388 Process not Found Token: SeShutdownPrivilege 388 Process not Found Token: SeCreatePagefilePrivilege 388 Process not Found Token: SeShutdownPrivilege 388 Process not Found Token: SeCreatePagefilePrivilege 388 Process not Found Token: SeShutdownPrivilege 388 Process not Found Token: SeCreatePagefilePrivilege 388 Process not Found Token: SeShutdownPrivilege 388 Process not Found Token: SeCreatePagefilePrivilege 388 Process not Found Token: SeShutdownPrivilege 388 Process not Found Token: SeCreatePagefilePrivilege 388 Process not Found Token: SeShutdownPrivilege 388 Process not Found Token: SeCreatePagefilePrivilege 388 Process not Found Token: SeShutdownPrivilege 388 Process not Found Token: SeCreatePagefilePrivilege 388 Process not Found Token: SeShutdownPrivilege 388 Process not Found Token: SeCreatePagefilePrivilege 388 Process not Found Token: SeShutdownPrivilege 388 Process not Found Token: SeCreatePagefilePrivilege 388 Process not Found Token: SeShutdownPrivilege 388 Process not Found Token: SeCreatePagefilePrivilege 388 Process not Found Token: SeShutdownPrivilege 388 Process not Found Token: SeCreatePagefilePrivilege 388 Process not Found Token: SeShutdownPrivilege 388 Process not Found Token: SeCreatePagefilePrivilege 388 Process not Found Token: SeShutdownPrivilege 388 Process not Found Token: SeCreatePagefilePrivilege 388 Process not Found Token: SeShutdownPrivilege 388 Process not Found Token: SeCreatePagefilePrivilege 388 Process not Found Token: SeShutdownPrivilege 388 Process not Found Token: SeCreatePagefilePrivilege 388 Process not Found Token: SeShutdownPrivilege 388 Process not Found Token: SeCreatePagefilePrivilege 388 Process not Found Token: SeShutdownPrivilege 388 Process not Found Token: SeCreatePagefilePrivilege 388 Process not Found Token: SeShutdownPrivilege 388 Process not Found Token: SeCreatePagefilePrivilege 388 Process not Found -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1632 rundll32.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 388 wrote to memory of 2456 388 Process not Found 113 PID 388 wrote to memory of 2456 388 Process not Found 113 PID 388 wrote to memory of 2456 388 Process not Found 113 PID 388 wrote to memory of 552 388 Process not Found 114 PID 388 wrote to memory of 552 388 Process not Found 114 PID 388 wrote to memory of 552 388 Process not Found 114 PID 388 wrote to memory of 644 388 Process not Found 115 PID 388 wrote to memory of 644 388 Process not Found 115 PID 388 wrote to memory of 644 388 Process not Found 115 PID 2456 wrote to memory of 2112 2456 1DA.exe 116 PID 2456 wrote to memory of 2112 2456 1DA.exe 116 PID 2456 wrote to memory of 2112 2456 1DA.exe 116 PID 2456 wrote to memory of 2112 2456 1DA.exe 116 PID 2456 wrote to memory of 2112 2456 1DA.exe 116 PID 2456 wrote to memory of 2112 2456 1DA.exe 116 PID 2456 wrote to memory of 2112 2456 1DA.exe 116 PID 2456 wrote to memory of 2112 2456 1DA.exe 116 PID 2456 wrote to memory of 2112 2456 1DA.exe 116 PID 2456 wrote to memory of 2112 2456 1DA.exe 116 PID 388 wrote to memory of 3076 388 Process not Found 117 PID 388 wrote to memory of 3076 388 Process not Found 117 PID 388 wrote to memory of 3076 388 Process not Found 117 PID 644 wrote to memory of 4884 644 660.exe 118 PID 644 wrote to memory of 4884 644 660.exe 118 PID 644 wrote to memory of 4884 644 660.exe 118 PID 552 wrote to memory of 4816 552 42D.exe 119 PID 552 wrote to memory of 4816 552 42D.exe 119 PID 552 wrote to memory of 4816 552 42D.exe 119 PID 388 wrote to memory of 5116 388 Process not Found 123 PID 388 wrote to memory of 5116 388 Process not Found 123 PID 388 wrote to memory of 5116 388 Process not Found 123 PID 388 wrote to memory of 4424 388 Process not Found 128 PID 388 wrote to memory of 4424 388 Process not Found 128 PID 388 wrote to memory of 4424 388 Process not Found 128 PID 388 wrote to memory of 3940 388 Process not Found 129 PID 388 wrote to memory of 3940 388 Process not Found 129 PID 388 wrote to memory of 3940 388 Process not Found 129 PID 4816 wrote to memory of 4996 4816 rovwer.exe 133 PID 4816 wrote to memory of 4996 4816 rovwer.exe 133 PID 4816 wrote to memory of 4996 4816 rovwer.exe 133 PID 388 wrote to memory of 3692 388 Process not Found 135 PID 388 wrote to memory of 3692 388 Process not Found 135 PID 388 wrote to memory of 1976 388 Process not Found 136 PID 388 wrote to memory of 1976 388 Process not Found 136 PID 388 wrote to memory of 1976 388 Process not Found 136 PID 388 wrote to memory of 1976 388 Process not Found 136 PID 2112 wrote to memory of 3872 2112 1DA.exe 137 PID 2112 wrote to memory of 3872 2112 1DA.exe 137 PID 2112 wrote to memory of 3872 2112 1DA.exe 137 PID 388 wrote to memory of 2260 388 Process not Found 138 PID 388 wrote to memory of 2260 388 Process not Found 138 PID 388 wrote to memory of 2260 388 Process not Found 138 PID 3692 wrote to memory of 4456 3692 regsvr32.exe 139 PID 3692 wrote to memory of 4456 3692 regsvr32.exe 139 PID 3692 wrote to memory of 4456 3692 regsvr32.exe 139 PID 2112 wrote to memory of 3100 2112 1DA.exe 140 PID 2112 wrote to memory of 3100 2112 1DA.exe 140 PID 2112 wrote to memory of 3100 2112 1DA.exe 140 PID 3100 wrote to memory of 3232 3100 1DA.exe 142 PID 3100 wrote to memory of 3232 3100 1DA.exe 142 PID 3100 wrote to memory of 3232 3100 1DA.exe 142 PID 3100 wrote to memory of 3232 3100 1DA.exe 142 PID 3100 wrote to memory of 3232 3100 1DA.exe 142 PID 3100 wrote to memory of 3232 3100 1DA.exe 142 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee1d1018f825ffa2d507f0d58a3a2c9d14a2b4a9c351e7d3fa05d29063488b9e.exe"C:\Users\Admin\AppData\Local\Temp\ee1d1018f825ffa2d507f0d58a3a2c9d14a2b4a9c351e7d3fa05d29063488b9e.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3116
-
C:\Users\Admin\AppData\Roaming\edvuvsvC:\Users\Admin\AppData\Roaming\edvuvsv1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4816
-
C:\Users\Admin\AppData\Local\Temp\1DA.exeC:\Users\Admin\AppData\Local\Temp\1DA.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\1DA.exeC:\Users\Admin\AppData\Local\Temp\1DA.exe2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\48c3be4e-c22e-455f-bcdf-3ff086e17c08" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:3872
-
-
C:\Users\Admin\AppData\Local\Temp\1DA.exe"C:\Users\Admin\AppData\Local\Temp\1DA.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Users\Admin\AppData\Local\Temp\1DA.exe"C:\Users\Admin\AppData\Local\Temp\1DA.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
- Checks computer location settings
PID:3232 -
C:\Users\Admin\AppData\Local\53626750-9bc5-4520-b9c7-f276a17873c1\build2.exe"C:\Users\Admin\AppData\Local\53626750-9bc5-4520-b9c7-f276a17873c1\build2.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:720 -
C:\Users\Admin\AppData\Local\53626750-9bc5-4520-b9c7-f276a17873c1\build2.exe"C:\Users\Admin\AppData\Local\53626750-9bc5-4520-b9c7-f276a17873c1\build2.exe"6⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Checks processor information in registry
PID:316 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\53626750-9bc5-4520-b9c7-f276a17873c1\build2.exe" & exit7⤵PID:5064
-
C:\Windows\SysWOW64\timeout.exetimeout /t 68⤵
- Delays execution with timeout.exe
PID:4608
-
-
-
-
-
C:\Users\Admin\AppData\Local\53626750-9bc5-4520-b9c7-f276a17873c1\build3.exe"C:\Users\Admin\AppData\Local\53626750-9bc5-4520-b9c7-f276a17873c1\build3.exe"5⤵
- Executes dropped EXE
PID:3292
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\42D.exeC:\Users\Admin\AppData\Local\Temp\42D.exe1⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe"C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe" /F3⤵
- Creates scheduled task(s)
PID:4996
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\bf045808586a24\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
PID:1948
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 552 -s 8962⤵
- Program crash
PID:4916
-
-
C:\Users\Admin\AppData\Local\Temp\660.exeC:\Users\Admin\AppData\Local\Temp\660.exe1⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe"C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe"2⤵
- Executes dropped EXE
PID:4884 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4884 -s 4523⤵
- Program crash
PID:4632
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 644 -s 8602⤵
- Program crash
PID:4912
-
-
C:\Users\Admin\AppData\Local\Temp\1E4E.exeC:\Users\Admin\AppData\Local\Temp\1E4E.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 644 -ip 6441⤵PID:3612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 552 -ip 5521⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\2053.exeC:\Users\Admin\AppData\Local\Temp\2053.exe1⤵
- Executes dropped EXE
PID:5116 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5116 -s 3402⤵
- Program crash
PID:3080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4884 -ip 48841⤵PID:4708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 5116 -ip 51161⤵PID:3924
-
C:\Users\Admin\AppData\Local\Temp\265F.exeC:\Users\Admin\AppData\Local\Temp\265F.exe1⤵
- Executes dropped EXE
PID:4424
-
C:\Users\Admin\AppData\Local\Temp\3331.exeC:\Users\Admin\AppData\Local\Temp\3331.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 4424 -ip 44241⤵PID:4328
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\46F9.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\46F9.dll2⤵
- Loads dropped DLL
PID:4456
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Accesses Microsoft Outlook profiles
PID:1976
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\BD24.exeC:\Users\Admin\AppData\Local\Temp\BD24.exe1⤵
- Executes dropped EXE
- Checks computer location settings
PID:180 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -ExecutionPolicy Bypass -File socks5-clean.ps12⤵
- Blocklisted process makes network request
- Adds Run key to start application
PID:3440
-
-
C:\Users\Admin\AppData\Roaming\edvuvsvC:\Users\Admin\AppData\Roaming\edvuvsv1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4644
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵
- Executes dropped EXE
PID:3632 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 4202⤵
- Program crash
PID:744
-
-
C:\Users\Admin\AppData\Roaming\revuvsvC:\Users\Admin\AppData\Roaming\revuvsv1⤵
- Executes dropped EXE
PID:3200 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3200 -s 3442⤵
- Program crash
PID:3996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 392 -p 3632 -ip 36321⤵PID:4624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 3200 -ip 32001⤵PID:1604
-
C:\Users\Admin\AppData\Roaming\shvuvsvC:\Users\Admin\AppData\Roaming\shvuvsv1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3516
-
C:\Users\Admin\AppData\Local\Temp\D61B.exeC:\Users\Admin\AppData\Local\Temp\D61B.exe1⤵
- Executes dropped EXE
PID:2732 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\Serpodtudpwhhta.dll,start2⤵
- Blocklisted process makes network request
- Sets DLL path for service in the registry
- Sets service image path in registry
- Loads dropped DLL
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Checks processor information in registry
- Modifies system certificate store
- outlook_office_path
- outlook_win_path
PID:3744 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 136863⤵
- Suspicious use of FindShellTrayWindow
PID:1632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3744 -s 36203⤵
- Program crash
PID:3352
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /End /tn \Microsoft\Windows\Wininet\CacheTask3⤵PID:2488
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask3⤵PID:2344
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 6802⤵
- Program crash
PID:1764
-
-
C:\Users\Admin\AppData\Local\Temp\EADD.exeC:\Users\Admin\AppData\Local\Temp\EADD.exe1⤵
- Executes dropped EXE
- Checks computer location settings
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe"C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
PID:4032 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe" /F3⤵
- Creates scheduled task(s)
PID:1136
-
-
C:\Users\Admin\AppData\Local\Temp\1000005001\Lege.exe"C:\Users\Admin\AppData\Local\Temp\1000005001\Lege.exe"3⤵
- Executes dropped EXE
PID:1640
-
-
C:\Users\Admin\AppData\Local\Temp\1000006001\linda5.exe"C:\Users\Admin\AppData\Local\Temp\1000006001\linda5.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
PID:3020 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" /Y .\yOAL3.qUV4⤵
- Loads dropped DLL
PID:4792
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
PID:3932
-
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2732 -ip 27321⤵PID:2696
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
PID:3032
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"1⤵
- Creates scheduled task(s)
PID:3512
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3288
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
PID:4732
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1556
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3992
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3556
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:2108
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3384
-
C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exeC:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe1⤵
- Executes dropped EXE
PID:5068
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Executes dropped EXE
PID:3116 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"2⤵
- Creates scheduled task(s)
PID:4356
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:456
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵PID:5044
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff851994f50,0x7ff851994f60,0x7ff851994f702⤵PID:4340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1696,4888294724799692476,2683570116989191841,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1732 /prefetch:22⤵PID:2456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1696,4888294724799692476,2683570116989191841,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=2052 /prefetch:82⤵PID:2216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:540 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7ff851994f50,0x7ff851994f60,0x7ff851994f702⤵PID:2308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1680,694175944483101344,16388776907720265031,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1724 /prefetch:22⤵PID:2212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1680,694175944483101344,16388776907720265031,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1984 /prefetch:82⤵PID:384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1680,694175944483101344,16388776907720265031,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 /prefetch:82⤵PID:3420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1680,694175944483101344,16388776907720265031,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2864 /prefetch:12⤵PID:1064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1680,694175944483101344,16388776907720265031,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2828 /prefetch:12⤵PID:5108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1680,694175944483101344,16388776907720265031,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4336 /prefetch:82⤵PID:4852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1680,694175944483101344,16388776907720265031,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4520 /prefetch:12⤵PID:1156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1680,694175944483101344,16388776907720265031,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3148 /prefetch:82⤵PID:872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1680,694175944483101344,16388776907720265031,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2608 /prefetch:82⤵PID:768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1680,694175944483101344,16388776907720265031,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4840 /prefetch:82⤵PID:4028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1680,694175944483101344,16388776907720265031,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:1600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1680,694175944483101344,16388776907720265031,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4344 /prefetch:22⤵PID:1768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1680,694175944483101344,16388776907720265031,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2604 /prefetch:82⤵PID:456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1680,694175944483101344,16388776907720265031,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:12⤵PID:1580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1680,694175944483101344,16388776907720265031,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5076 /prefetch:82⤵PID:3144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1680,694175944483101344,16388776907720265031,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:1236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1680,694175944483101344,16388776907720265031,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4020 /prefetch:12⤵PID:5032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1680,694175944483101344,16388776907720265031,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4112 /prefetch:12⤵PID:4812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1680,694175944483101344,16388776907720265031,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3280 /prefetch:82⤵PID:4176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1680,694175944483101344,16388776907720265031,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3076 /prefetch:82⤵PID:1936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1680,694175944483101344,16388776907720265031,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3092 /prefetch:12⤵PID:1248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1680,694175944483101344,16388776907720265031,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:2160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1680,694175944483101344,16388776907720265031,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6100 /prefetch:82⤵PID:3200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1680,694175944483101344,16388776907720265031,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6256 /prefetch:82⤵PID:1500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1680,694175944483101344,16388776907720265031,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6260 /prefetch:12⤵PID:3292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1680,694175944483101344,16388776907720265031,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6200 /prefetch:12⤵PID:5072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1680,694175944483101344,16388776907720265031,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:3204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1680,694175944483101344,16388776907720265031,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6124 /prefetch:12⤵PID:3940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1680,694175944483101344,16388776907720265031,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:12⤵PID:3456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1680,694175944483101344,16388776907720265031,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4332 /prefetch:82⤵PID:3428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1680,694175944483101344,16388776907720265031,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4744 /prefetch:82⤵PID:2440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1680,694175944483101344,16388776907720265031,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6420 /prefetch:82⤵PID:4860
-
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵
- Executes dropped EXE
PID:2424 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2424 -s 4202⤵
- Program crash
PID:3180
-
-
C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exeC:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe1⤵
- Executes dropped EXE
PID:2732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 2424 -ip 24241⤵PID:448
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\1000005001\Lege.exe"C:\Users\Admin\AppData\Local\Temp\1000005001\Lege.exe"1⤵
- Executes dropped EXE
PID:1392
-
C:\Users\Admin\AppData\Local\Temp\1000005001\Lege.exe"C:\Users\Admin\AppData\Local\Temp\1000005001\Lege.exe"1⤵
- Executes dropped EXE
PID:4848
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵
- Executes dropped EXE
PID:688 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 688 -s 4202⤵
- Program crash
PID:2836
-
-
C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exeC:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe1⤵
- Executes dropped EXE
PID:3580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 688 -ip 6881⤵PID:2768
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k LocalService1⤵
- Loads dropped DLL
- Checks processor information in registry
PID:4796 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" "c:\program files (x86)\msbuild\microsoft\add_reviewer.dll",SjUVeA==2⤵
- Loads dropped DLL
- Checks processor information in registry
PID:884
-
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵
- Executes dropped EXE
PID:824 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 824 -s 4202⤵
- Program crash
PID:4696
-
-
C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exeC:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe1⤵
- Executes dropped EXE
PID:4044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 824 -ip 8241⤵PID:4280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3744 -ip 37441⤵PID:2292
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵
- Executes dropped EXE
PID:5064
-
C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exeC:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe1⤵
- Executes dropped EXE
PID:688
-
C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exeC:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe1⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exeC:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe1⤵PID:4544
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize2KB
MD576e7d5bf61b2e80d159f88aa9798ce91
SHA132a46de50c9c02b068e39cf49b78c7e2d5ace20d
SHA256280fd6ae3ad21323199759814c4dd82329eb8f9847ed1fa2be145e83b4c88bf3
SHA5125efd8c64ac40ae006d2ce4509eb9e5f1448fb1156e914d303e8bc4dcfe1d94c57c7eae216b362877e7b644876656cc9e5c4cebfc905bab3f8b09cb1a051d69c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize1KB
MD5916c512d221c683beeea9d5cb311b0b0
SHA1bf0db4b1c4566275b629efb095b6ff8857b5748e
SHA25664a36c1637d0a111152002a2c0385b0df9dd81b616b3f2073fbbe3f2975aa4d8
SHA512af32cffea722438e9b17b08062dc2e209edc5417418964ead0b392bd502e1a647a8456b2ee2ea59faf69f93d0c6ea6f15949b6c30924db7da65b91cb18e8dc6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize488B
MD5cefd7355f3e7631bb23db96b89269aac
SHA10e6ae0a1b02872560d2cb20f577ad9ca3c9a4d82
SHA2562e8c260c3fa613e18a5a052d0f98759c3b79d28b0d6511f2f925877fbc8b7898
SHA512d5cda36f90d708f34a1768e6cc1b854772c9a4870271904a7f4026a40882c2b73767306ed48b44162510989158fffc2b6bfcc98b285274d3ab0db9fc0245ee59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize482B
MD5846f86deaca397c1526f120d3201af25
SHA1af3640122b56fc1660d5148459b991ef77099158
SHA256a6b6ee0906ee3c126f9786452e88a2ceb51ed68fb31c0d03d8a272c1688e0ec6
SHA512592f65aed1e7368b5db929ce261e09937964ab2e89ffc92a80f2457930e49d0888a585f8eb72b01d998fb8edaeb66d162ade886b44b081cd19ec2857eb508153
-
Filesize
666KB
MD548d297bfd2e885dc24ecb4905db4482a
SHA1208f24f50ae748a002a5497f88abecf0e9f1dc3e
SHA256e237ff774cc5374a2ca6d281835cc7dcedcc3f9edbe60f9a0cab7432a8349af2
SHA512e1cc0850bb18cc1bd6116c0472a24b54d694319930cbe0468ee2face51f3890077aa32807d4c33d5efec94fd2b1b1eee3dc0193efb64762587354e047d84fe42
-
Filesize
299KB
MD503ddc9dc7312d33ad1c5f6ed2d167645
SHA1e75de38aee3b0beb5cc91334ecbd8a876c8351a6
SHA25660724da01de35adee6cb34317cd2947fbcb791a8381386d79072857a19a58708
SHA5129a23eb681563719a6ad9202038a307e842b9a60c16aec2f01ce422feca11ac8d6e1d0e9a30e110e17bec4421121643ac87f075eae8bf127dca2213f7a2c6f1aa
-
Filesize
299KB
MD503ddc9dc7312d33ad1c5f6ed2d167645
SHA1e75de38aee3b0beb5cc91334ecbd8a876c8351a6
SHA25660724da01de35adee6cb34317cd2947fbcb791a8381386d79072857a19a58708
SHA5129a23eb681563719a6ad9202038a307e842b9a60c16aec2f01ce422feca11ac8d6e1d0e9a30e110e17bec4421121643ac87f075eae8bf127dca2213f7a2c6f1aa
-
Filesize
299KB
MD503ddc9dc7312d33ad1c5f6ed2d167645
SHA1e75de38aee3b0beb5cc91334ecbd8a876c8351a6
SHA25660724da01de35adee6cb34317cd2947fbcb791a8381386d79072857a19a58708
SHA5129a23eb681563719a6ad9202038a307e842b9a60c16aec2f01ce422feca11ac8d6e1d0e9a30e110e17bec4421121643ac87f075eae8bf127dca2213f7a2c6f1aa
-
Filesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
Filesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
Filesize
137KB
MD50a793a6b9941c49675a47a2bc91cb420
SHA1ff051cc2d9cf081e863f5bb8c3d2449c28f12c7f
SHA2563bb977fda504647a2f21a19b67c3edf91ea1eb35166258164eb89b8ae1603c60
SHA512fd695f62ef32f79f3b4e5c57c68056b004355d5a16e6558bfb310f8ded03c837fe5f505f5a4f433a740fa0b980a71962571c3dd4ed86d95146a22f126850dc36
-
Filesize
137KB
MD50a793a6b9941c49675a47a2bc91cb420
SHA1ff051cc2d9cf081e863f5bb8c3d2449c28f12c7f
SHA2563bb977fda504647a2f21a19b67c3edf91ea1eb35166258164eb89b8ae1603c60
SHA512fd695f62ef32f79f3b4e5c57c68056b004355d5a16e6558bfb310f8ded03c837fe5f505f5a4f433a740fa0b980a71962571c3dd4ed86d95146a22f126850dc36
-
Filesize
1.6MB
MD556d796d657d40eb5fb70d7e7b97f80ec
SHA1c2fef8dffa4927937fda13488e0167cc07954516
SHA256df6c0df677312fe12b419f3ef89872fac7bb0f6ac96fad0850f9269b8c3f2127
SHA512fa57fc116b42f07585b4fd83d24d225f9135a4d50f94306ad48290fbd1ae9ac75a9958b14fdf726d1fea788ae28a1a23c45bd2a24b0189e23b3026e99df7a5e3
-
Filesize
1.6MB
MD556d796d657d40eb5fb70d7e7b97f80ec
SHA1c2fef8dffa4927937fda13488e0167cc07954516
SHA256df6c0df677312fe12b419f3ef89872fac7bb0f6ac96fad0850f9269b8c3f2127
SHA512fa57fc116b42f07585b4fd83d24d225f9135a4d50f94306ad48290fbd1ae9ac75a9958b14fdf726d1fea788ae28a1a23c45bd2a24b0189e23b3026e99df7a5e3
-
Filesize
666KB
MD548d297bfd2e885dc24ecb4905db4482a
SHA1208f24f50ae748a002a5497f88abecf0e9f1dc3e
SHA256e237ff774cc5374a2ca6d281835cc7dcedcc3f9edbe60f9a0cab7432a8349af2
SHA512e1cc0850bb18cc1bd6116c0472a24b54d694319930cbe0468ee2face51f3890077aa32807d4c33d5efec94fd2b1b1eee3dc0193efb64762587354e047d84fe42
-
Filesize
666KB
MD548d297bfd2e885dc24ecb4905db4482a
SHA1208f24f50ae748a002a5497f88abecf0e9f1dc3e
SHA256e237ff774cc5374a2ca6d281835cc7dcedcc3f9edbe60f9a0cab7432a8349af2
SHA512e1cc0850bb18cc1bd6116c0472a24b54d694319930cbe0468ee2face51f3890077aa32807d4c33d5efec94fd2b1b1eee3dc0193efb64762587354e047d84fe42
-
Filesize
666KB
MD548d297bfd2e885dc24ecb4905db4482a
SHA1208f24f50ae748a002a5497f88abecf0e9f1dc3e
SHA256e237ff774cc5374a2ca6d281835cc7dcedcc3f9edbe60f9a0cab7432a8349af2
SHA512e1cc0850bb18cc1bd6116c0472a24b54d694319930cbe0468ee2face51f3890077aa32807d4c33d5efec94fd2b1b1eee3dc0193efb64762587354e047d84fe42
-
Filesize
666KB
MD548d297bfd2e885dc24ecb4905db4482a
SHA1208f24f50ae748a002a5497f88abecf0e9f1dc3e
SHA256e237ff774cc5374a2ca6d281835cc7dcedcc3f9edbe60f9a0cab7432a8349af2
SHA512e1cc0850bb18cc1bd6116c0472a24b54d694319930cbe0468ee2face51f3890077aa32807d4c33d5efec94fd2b1b1eee3dc0193efb64762587354e047d84fe42
-
Filesize
666KB
MD548d297bfd2e885dc24ecb4905db4482a
SHA1208f24f50ae748a002a5497f88abecf0e9f1dc3e
SHA256e237ff774cc5374a2ca6d281835cc7dcedcc3f9edbe60f9a0cab7432a8349af2
SHA512e1cc0850bb18cc1bd6116c0472a24b54d694319930cbe0468ee2face51f3890077aa32807d4c33d5efec94fd2b1b1eee3dc0193efb64762587354e047d84fe42
-
Filesize
147KB
MD53263d61f8af971ff8075127914428925
SHA1b6c313710957fe5579bd9239b16fe41ce4aaf0fa
SHA256dc5a51c4d06211c4eb1e816f416c7bcd4d02dc16862cce3f180868168af3110d
SHA512d854390afabdf8e6558371ce7eef0521942804e358285e45a60a31d537916ae642d504f9a5283615aa06b92aabca08782062b35e07254088617c23458c529ddb
-
Filesize
147KB
MD53263d61f8af971ff8075127914428925
SHA1b6c313710957fe5579bd9239b16fe41ce4aaf0fa
SHA256dc5a51c4d06211c4eb1e816f416c7bcd4d02dc16862cce3f180868168af3110d
SHA512d854390afabdf8e6558371ce7eef0521942804e358285e45a60a31d537916ae642d504f9a5283615aa06b92aabca08782062b35e07254088617c23458c529ddb
-
Filesize
274KB
MD526ab12af334137fedf1961a421294abc
SHA1f96fa14d035e6408d47093a85be5f6224ee250ed
SHA256dc0c9b8a82e97a0275bae25dff21b46f3e8521a235cf7fea929fe3d2d4609e67
SHA512c92afc703a810ed694f5d53c2f23225fc90698387ee9ab8d007bd27240a3c694b42517015b331f487c041dff4bd52684bc16f1bbdfe3a7ac5851a7627529ef25
-
Filesize
274KB
MD526ab12af334137fedf1961a421294abc
SHA1f96fa14d035e6408d47093a85be5f6224ee250ed
SHA256dc0c9b8a82e97a0275bae25dff21b46f3e8521a235cf7fea929fe3d2d4609e67
SHA512c92afc703a810ed694f5d53c2f23225fc90698387ee9ab8d007bd27240a3c694b42517015b331f487c041dff4bd52684bc16f1bbdfe3a7ac5851a7627529ef25
-
Filesize
146KB
MD579c6bd3770029995e98f4b8816008485
SHA14cab178f8bb093ad98c482616600195c6e256aee
SHA256a738a8b6ba54a5ce95e936b963ed8ca8faff681a19f9d7411bf983705ce86646
SHA51234ec52ee5d7c58b24e48318c2eedb4c15e422bcf45abe1b04a3cc56adb67feca040b0ee563c725f288ea4d2afdae5dfd1f1e966bc448ddea3a6513695dbf3100
-
Filesize
146KB
MD579c6bd3770029995e98f4b8816008485
SHA14cab178f8bb093ad98c482616600195c6e256aee
SHA256a738a8b6ba54a5ce95e936b963ed8ca8faff681a19f9d7411bf983705ce86646
SHA51234ec52ee5d7c58b24e48318c2eedb4c15e422bcf45abe1b04a3cc56adb67feca040b0ee563c725f288ea4d2afdae5dfd1f1e966bc448ddea3a6513695dbf3100
-
Filesize
274KB
MD529a373c2434df5c3203864edadf0142e
SHA106eeaf59c220156007f491e6d5c158ef8cbe39da
SHA256278234b6fac8082ce18f4898067337c0933d8b604a90694c8d30e7d7eab23d48
SHA5122580ecc59623888e9de48a2a3dda5ab6d89d3f8e4f9ba6e0a6e1f8fe6bc9d9bccb2d4f7f6278f362e8bc5993135ed19dad99231f854971cb2a9d5163d7a5cd03
-
Filesize
274KB
MD529a373c2434df5c3203864edadf0142e
SHA106eeaf59c220156007f491e6d5c158ef8cbe39da
SHA256278234b6fac8082ce18f4898067337c0933d8b604a90694c8d30e7d7eab23d48
SHA5122580ecc59623888e9de48a2a3dda5ab6d89d3f8e4f9ba6e0a6e1f8fe6bc9d9bccb2d4f7f6278f362e8bc5993135ed19dad99231f854971cb2a9d5163d7a5cd03
-
Filesize
204KB
MD532f096faa72cb8466f9c84a543874f47
SHA1966cd93218feec921105176a522e556764ff4c48
SHA25647b8bd1c1c84fe394d7928db10e73412bc8fb0c5b6c8ed300fffa0734c1ececf
SHA512179ab29e2676f593f94ed6906518dad9e5deabd0c0ebc770b938e6b882aac7ab29af5214eef63db8978e6fcba9c27335449428522532aa404d19f71858e0eacd
-
Filesize
204KB
MD532f096faa72cb8466f9c84a543874f47
SHA1966cd93218feec921105176a522e556764ff4c48
SHA25647b8bd1c1c84fe394d7928db10e73412bc8fb0c5b6c8ed300fffa0734c1ececf
SHA512179ab29e2676f593f94ed6906518dad9e5deabd0c0ebc770b938e6b882aac7ab29af5214eef63db8978e6fcba9c27335449428522532aa404d19f71858e0eacd
-
Filesize
2.2MB
MD5c5b915ef4725ee4ad0229e053dad05d4
SHA1032fb4cef8ee63d527e98dadf4cdf94c707e1005
SHA2567a1505d85c64361dfded962e654d6293bf610cd18a3c2683f2ea24bcf99d61db
SHA512763abbadec6389c9421730f21217b18fc3136147885c91f04ea236bbe346e250e87589599499c339d502e71d69c85612b0469d00a198eac41dad50f9c33d8603
-
Filesize
2.2MB
MD5c5b915ef4725ee4ad0229e053dad05d4
SHA1032fb4cef8ee63d527e98dadf4cdf94c707e1005
SHA2567a1505d85c64361dfded962e654d6293bf610cd18a3c2683f2ea24bcf99d61db
SHA512763abbadec6389c9421730f21217b18fc3136147885c91f04ea236bbe346e250e87589599499c339d502e71d69c85612b0469d00a198eac41dad50f9c33d8603
-
Filesize
204KB
MD532f096faa72cb8466f9c84a543874f47
SHA1966cd93218feec921105176a522e556764ff4c48
SHA25647b8bd1c1c84fe394d7928db10e73412bc8fb0c5b6c8ed300fffa0734c1ececf
SHA512179ab29e2676f593f94ed6906518dad9e5deabd0c0ebc770b938e6b882aac7ab29af5214eef63db8978e6fcba9c27335449428522532aa404d19f71858e0eacd
-
Filesize
204KB
MD532f096faa72cb8466f9c84a543874f47
SHA1966cd93218feec921105176a522e556764ff4c48
SHA25647b8bd1c1c84fe394d7928db10e73412bc8fb0c5b6c8ed300fffa0734c1ececf
SHA512179ab29e2676f593f94ed6906518dad9e5deabd0c0ebc770b938e6b882aac7ab29af5214eef63db8978e6fcba9c27335449428522532aa404d19f71858e0eacd
-
Filesize
204KB
MD532f096faa72cb8466f9c84a543874f47
SHA1966cd93218feec921105176a522e556764ff4c48
SHA25647b8bd1c1c84fe394d7928db10e73412bc8fb0c5b6c8ed300fffa0734c1ececf
SHA512179ab29e2676f593f94ed6906518dad9e5deabd0c0ebc770b938e6b882aac7ab29af5214eef63db8978e6fcba9c27335449428522532aa404d19f71858e0eacd
-
Filesize
204KB
MD532f096faa72cb8466f9c84a543874f47
SHA1966cd93218feec921105176a522e556764ff4c48
SHA25647b8bd1c1c84fe394d7928db10e73412bc8fb0c5b6c8ed300fffa0734c1ececf
SHA512179ab29e2676f593f94ed6906518dad9e5deabd0c0ebc770b938e6b882aac7ab29af5214eef63db8978e6fcba9c27335449428522532aa404d19f71858e0eacd
-
Filesize
313KB
MD5c42d13fbc2efd907113054c91ff86130
SHA16dc92133c1410be4d4911b7ae934e8c4a6d050af
SHA25676153e0e8d619392a7b5dd5334cd7900e2fcfac29e23d64489d167321ff9eee0
SHA5126a5e8c3437638423a7ff354970ea93fd840c1c840843f0c7168ef517e53d63d9712f1972ece0a9c3d0abca7c1e6d2cbbe72fcfaf4296cee9a9b6a83eaeb7a552
-
Filesize
313KB
MD5c42d13fbc2efd907113054c91ff86130
SHA16dc92133c1410be4d4911b7ae934e8c4a6d050af
SHA25676153e0e8d619392a7b5dd5334cd7900e2fcfac29e23d64489d167321ff9eee0
SHA5126a5e8c3437638423a7ff354970ea93fd840c1c840843f0c7168ef517e53d63d9712f1972ece0a9c3d0abca7c1e6d2cbbe72fcfaf4296cee9a9b6a83eaeb7a552
-
Filesize
241KB
MD5b6957e4ed8fe1cd100b9b52dfefb9a7a
SHA1f886edefe8980a61b730a998285a3086955cb800
SHA25693fa1f55b57510de437b7cd4edd12a59122ab2e9463c866ad6558c470de0950e
SHA512155bbccd4b94bd3e27ebab872925938c44f958d27cca2ab1ecc02dc777dfcb880491c73ab3618b990015b9bfa33aa1ce58bb78af010a44c94850d5474b9a96e2
-
Filesize
241KB
MD5b6957e4ed8fe1cd100b9b52dfefb9a7a
SHA1f886edefe8980a61b730a998285a3086955cb800
SHA25693fa1f55b57510de437b7cd4edd12a59122ab2e9463c866ad6558c470de0950e
SHA512155bbccd4b94bd3e27ebab872925938c44f958d27cca2ab1ecc02dc777dfcb880491c73ab3618b990015b9bfa33aa1ce58bb78af010a44c94850d5474b9a96e2
-
Filesize
241KB
MD5b6957e4ed8fe1cd100b9b52dfefb9a7a
SHA1f886edefe8980a61b730a998285a3086955cb800
SHA25693fa1f55b57510de437b7cd4edd12a59122ab2e9463c866ad6558c470de0950e
SHA512155bbccd4b94bd3e27ebab872925938c44f958d27cca2ab1ecc02dc777dfcb880491c73ab3618b990015b9bfa33aa1ce58bb78af010a44c94850d5474b9a96e2
-
Filesize
268KB
MD521eaa1da67a8d9f3b76b4a63a1da1442
SHA1677a156ca20cabf46fce1085e8743344ce075e9f
SHA25676d658bfc9ccc2e74cd4e4ef834506828072c49db03cac869f3b7d4146391335
SHA512f031d2746248b956246f2addc433160f1e677bb313e27eba33c6f0f3bccb7c2d7a2a0f9ef6e5474f867a57067c1ae06767e2fd9dd575618397cfc0997a2f43d1
-
Filesize
268KB
MD521eaa1da67a8d9f3b76b4a63a1da1442
SHA1677a156ca20cabf46fce1085e8743344ce075e9f
SHA25676d658bfc9ccc2e74cd4e4ef834506828072c49db03cac869f3b7d4146391335
SHA512f031d2746248b956246f2addc433160f1e677bb313e27eba33c6f0f3bccb7c2d7a2a0f9ef6e5474f867a57067c1ae06767e2fd9dd575618397cfc0997a2f43d1
-
Filesize
3.6MB
MD57cd8d476b3d12f4325f93f876a51ee86
SHA1c1704a2780f87906bf570ac8b31f3e7aa78bd544
SHA256d6e9ea70e230ce78d05c34e472527b0aa1966615b703995c847d8e49761ccd66
SHA5124c932bd1e581091a267bf597b8d0139949b376cb8673607927a3737c8e6697fc940dd9d45a1c5de39a1830baaf761caa6000823f769da11c78aa76f2a7b702c2
-
Filesize
3.6MB
MD57cd8d476b3d12f4325f93f876a51ee86
SHA1c1704a2780f87906bf570ac8b31f3e7aa78bd544
SHA256d6e9ea70e230ce78d05c34e472527b0aa1966615b703995c847d8e49761ccd66
SHA5124c932bd1e581091a267bf597b8d0139949b376cb8673607927a3737c8e6697fc940dd9d45a1c5de39a1830baaf761caa6000823f769da11c78aa76f2a7b702c2
-
Filesize
241KB
MD5b6957e4ed8fe1cd100b9b52dfefb9a7a
SHA1f886edefe8980a61b730a998285a3086955cb800
SHA25693fa1f55b57510de437b7cd4edd12a59122ab2e9463c866ad6558c470de0950e
SHA512155bbccd4b94bd3e27ebab872925938c44f958d27cca2ab1ecc02dc777dfcb880491c73ab3618b990015b9bfa33aa1ce58bb78af010a44c94850d5474b9a96e2
-
Filesize
241KB
MD5b6957e4ed8fe1cd100b9b52dfefb9a7a
SHA1f886edefe8980a61b730a998285a3086955cb800
SHA25693fa1f55b57510de437b7cd4edd12a59122ab2e9463c866ad6558c470de0950e
SHA512155bbccd4b94bd3e27ebab872925938c44f958d27cca2ab1ecc02dc777dfcb880491c73ab3618b990015b9bfa33aa1ce58bb78af010a44c94850d5474b9a96e2
-
Filesize
14KB
MD58e8a2af56c10a83cf0859b9c69b6d6af
SHA1ec6ddf4db8c8e77c154a039783c11fbfa9be0f1c
SHA256f6ec97aada7c02f8de0ec4b0859d1cb522b688085ccb5579fd913200b7d9220d
SHA512c4cd6a1955a9fc9d10f9a4237793b7d3ddf126b26fc15f772609dc5beb70da076a8315160f3f8ff3cae5668506f218eab256d5083fbba210e96f3b4ab2fb5b23
-
Filesize
4.3MB
MD5e1bae4293618ba8d90be0decd8e2eeec
SHA148400f533c427a7c8cffaeba12faa3008066f17a
SHA256742ed354fcc571123308a092b29ffcb93d8aedc05ca0ee038b2a6ab9cf9f3293
SHA51217eef7d579a4f42803e9d72d7af3510fec581620d40dfb6d1e7a5fdb719b7a1604b7d5d591a7dbfdbf6e983becd4d911b0e60d15f3178b8536b9db42d0fc227e
-
Filesize
4.3MB
MD5e1bae4293618ba8d90be0decd8e2eeec
SHA148400f533c427a7c8cffaeba12faa3008066f17a
SHA256742ed354fcc571123308a092b29ffcb93d8aedc05ca0ee038b2a6ab9cf9f3293
SHA51217eef7d579a4f42803e9d72d7af3510fec581620d40dfb6d1e7a5fdb719b7a1604b7d5d591a7dbfdbf6e983becd4d911b0e60d15f3178b8536b9db42d0fc227e
-
Filesize
1.4MB
MD569f26b88d941a8d4f4c74191211d9e5a
SHA12d0580b72f60492f2c1d638000d16349f36734e9
SHA256c52462aa43c9190daa5105743cdc27bf6247885eba276c0a593faed6a0f7546d
SHA512114f4aa9b12dcbc202d1fb6d7186745645c9d07bf006e24632500a725aebabd128ab9885d77590ff6a113d99897a6906419c4b3153a39f148efd87ca619f808b
-
Filesize
1.4MB
MD569f26b88d941a8d4f4c74191211d9e5a
SHA12d0580b72f60492f2c1d638000d16349f36734e9
SHA256c52462aa43c9190daa5105743cdc27bf6247885eba276c0a593faed6a0f7546d
SHA512114f4aa9b12dcbc202d1fb6d7186745645c9d07bf006e24632500a725aebabd128ab9885d77590ff6a113d99897a6906419c4b3153a39f148efd87ca619f808b
-
Filesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
Filesize
126KB
MD5674cec24e36e0dfaec6290db96dda86e
SHA1581e3a7a541cc04641e751fc850d92e07236681f
SHA256de81531468982b689451e85d249214d0aa484e2ffedfd32c58d43cf879f29ded
SHA5126d9898169073c240fe454bd45065fd7dc8458f1d323925b57eb58fa4305bb0d5631bbceb61835593b225e887e0867186ef637c440460279378cb29e832066029
-
Filesize
126KB
MD5674cec24e36e0dfaec6290db96dda86e
SHA1581e3a7a541cc04641e751fc850d92e07236681f
SHA256de81531468982b689451e85d249214d0aa484e2ffedfd32c58d43cf879f29ded
SHA5126d9898169073c240fe454bd45065fd7dc8458f1d323925b57eb58fa4305bb0d5631bbceb61835593b225e887e0867186ef637c440460279378cb29e832066029
-
Filesize
126KB
MD5674cec24e36e0dfaec6290db96dda86e
SHA1581e3a7a541cc04641e751fc850d92e07236681f
SHA256de81531468982b689451e85d249214d0aa484e2ffedfd32c58d43cf879f29ded
SHA5126d9898169073c240fe454bd45065fd7dc8458f1d323925b57eb58fa4305bb0d5631bbceb61835593b225e887e0867186ef637c440460279378cb29e832066029
-
Filesize
146KB
MD52c6e6e290972fcd5e556efccfd51f174
SHA1ec3de0785e4ccd0282e92e35c915ddb72832fd83
SHA256ee1d1018f825ffa2d507f0d58a3a2c9d14a2b4a9c351e7d3fa05d29063488b9e
SHA512a7077bf87ad233413322dd55d4c1ed684d5ebd70e9451307d9f70ba1888688fa5b375a6006803da9e9cc800be7bc928230ad26a889e88c907854a8bc73ad539f
-
Filesize
146KB
MD52c6e6e290972fcd5e556efccfd51f174
SHA1ec3de0785e4ccd0282e92e35c915ddb72832fd83
SHA256ee1d1018f825ffa2d507f0d58a3a2c9d14a2b4a9c351e7d3fa05d29063488b9e
SHA512a7077bf87ad233413322dd55d4c1ed684d5ebd70e9451307d9f70ba1888688fa5b375a6006803da9e9cc800be7bc928230ad26a889e88c907854a8bc73ad539f
-
Filesize
146KB
MD52c6e6e290972fcd5e556efccfd51f174
SHA1ec3de0785e4ccd0282e92e35c915ddb72832fd83
SHA256ee1d1018f825ffa2d507f0d58a3a2c9d14a2b4a9c351e7d3fa05d29063488b9e
SHA512a7077bf87ad233413322dd55d4c1ed684d5ebd70e9451307d9f70ba1888688fa5b375a6006803da9e9cc800be7bc928230ad26a889e88c907854a8bc73ad539f
-
Filesize
147KB
MD53263d61f8af971ff8075127914428925
SHA1b6c313710957fe5579bd9239b16fe41ce4aaf0fa
SHA256dc5a51c4d06211c4eb1e816f416c7bcd4d02dc16862cce3f180868168af3110d
SHA512d854390afabdf8e6558371ce7eef0521942804e358285e45a60a31d537916ae642d504f9a5283615aa06b92aabca08782062b35e07254088617c23458c529ddb
-
Filesize
147KB
MD53263d61f8af971ff8075127914428925
SHA1b6c313710957fe5579bd9239b16fe41ce4aaf0fa
SHA256dc5a51c4d06211c4eb1e816f416c7bcd4d02dc16862cce3f180868168af3110d
SHA512d854390afabdf8e6558371ce7eef0521942804e358285e45a60a31d537916ae642d504f9a5283615aa06b92aabca08782062b35e07254088617c23458c529ddb
-
Filesize
274KB
MD529a373c2434df5c3203864edadf0142e
SHA106eeaf59c220156007f491e6d5c158ef8cbe39da
SHA256278234b6fac8082ce18f4898067337c0933d8b604a90694c8d30e7d7eab23d48
SHA5122580ecc59623888e9de48a2a3dda5ab6d89d3f8e4f9ba6e0a6e1f8fe6bc9d9bccb2d4f7f6278f362e8bc5993135ed19dad99231f854971cb2a9d5163d7a5cd03
-
Filesize
274KB
MD529a373c2434df5c3203864edadf0142e
SHA106eeaf59c220156007f491e6d5c158ef8cbe39da
SHA256278234b6fac8082ce18f4898067337c0933d8b604a90694c8d30e7d7eab23d48
SHA5122580ecc59623888e9de48a2a3dda5ab6d89d3f8e4f9ba6e0a6e1f8fe6bc9d9bccb2d4f7f6278f362e8bc5993135ed19dad99231f854971cb2a9d5163d7a5cd03