Analysis
-
max time kernel
146s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 12:56
Static task
static1
Behavioral task
behavioral1
Sample
50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe
Resource
win10v2004-20220901-en
General
-
Target
50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe
-
Size
220KB
-
MD5
a5b0e92b1b747f414a537db898b335d0
-
SHA1
b6ad79bcc29e96aa3338ab06b9610491736318bf
-
SHA256
50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8
-
SHA512
57bb29206f48856fc23a02eb85a8bc08ad460dde82adb1f2e572912b9ed72fa1fc461bcdcbc4fcae57c58424fd2be77737551ae42b1474c4dbaff056a81cc150
-
SSDEEP
3072:vo8L5tpV+CSA1AAPoCpxW5ATBfUNvS1svkTVC9FieYTTLprx/m3qT4S826guKqhG:htpvoCpcNK1jQdiF
Malware Config
Signatures
-
Modifies system executable filetype association 2 TTPs 20 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\NeverShowExt = "1" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\NeverShowExt = "1" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt = "1" system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\NeverShowExt = "1" system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\NeverShowExt = "1" 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\NeverShowExt = "1" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\NeverShowExt = "1" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt = "1" system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\NeverShowExt = "1" Global.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt = "1" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt = "1" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\NeverShowExt = "1" system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\NeverShowExt = "1" system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt = "1" 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt = "1" Global.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt = "1" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt = "1" system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt = "1" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt = "1" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\NeverShowExt = "1" svchost.exe -
Adds policy Run key to start application 2 TTPs 20 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sys = "C:\\WINDOWS\\Fonts\\Fonts.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sys = "C:\\WINDOWS\\Fonts\\Fonts.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sys = "C:\\WINDOWS\\Fonts\\Fonts.exe" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sys = "C:\\WINDOWS\\Fonts\\Fonts.exe" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sys = "C:\\WINDOWS\\Fonts\\Fonts.exe" 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sys = "C:\\WINDOWS\\Fonts\\Fonts.exe" system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Global.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sys = "C:\\WINDOWS\\Fonts\\Fonts.exe" Global.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sys = "C:\\WINDOWS\\Fonts\\Fonts.exe" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sys = "C:\\WINDOWS\\Fonts\\Fonts.exe" system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sys = "C:\\WINDOWS\\Fonts\\Fonts.exe" system.exe -
Drops file in Drivers directory 9 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\drivers\drivers.cab.exe svchost.exe File created C:\WINDOWS\SysWOW64\drivers\drivers.cab.exe svchost.exe File created C:\WINDOWS\SysWOW64\drivers\drivers.cab.exe svchost.exe File created C:\WINDOWS\SysWOW64\drivers\drivers.cab.exe system.exe File created C:\WINDOWS\SysWOW64\drivers\drivers.cab.exe 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe File opened for modification C:\WINDOWS\SysWOW64\drivers\drivers.cab.exe Global.exe File created C:\WINDOWS\SysWOW64\drivers\drivers.cab.exe system.exe File created C:\WINDOWS\SysWOW64\drivers\drivers.cab.exe svchost.exe File created C:\WINDOWS\SysWOW64\drivers\drivers.cab.exe svchost.exe -
Executes dropped EXE 12 IoCs
pid Process 1092 Global.exe 900 svchost.exe 872 svchost.exe 840 svchost.exe 816 svchost.exe 1780 svchost.exe 1944 svchost.exe 588 system.exe 596 system.exe 1876 system.exe 1532 system.exe 1380 system.exe -
Sets file execution options in registry 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe\Debugger = "C:\\WINDOWS\\pchealth\\helpctr\\binaries\\HelpHost.com" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "C:\\WINDOWS\\Fonts\\Fonts.exe" system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\auto.exe\Debugger = "C:\\WINDOWS\\system32\\drivers\\drivers.cab.exe" system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autorun.exe\Debugger = "C:\\WINDOWS\\system32\\drivers\\drivers.cab.exe" system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe\Debugger = "C:\\WINDOWS\\pchealth\\helpctr\\binaries\\HelpHost.com" system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autorun.exe svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\boot.exe svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autoruns.exe system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\auto.exe system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "C:\\WINDOWS\\Fonts\\Fonts.exe" 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "C:\\WINDOWS\\Media\\rndll32.pif" system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe\Debugger = "C:\\WINDOWS\\pchealth\\helpctr\\binaries\\HelpHost.com" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe\Debugger = "C:\\WINDOWS\\pchealth\\helpctr\\binaries\\HelpHost.com" system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "C:\\WINDOWS\\Fonts\\tskmgr.exe" Global.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autoruns.exe\Debugger = "C:\\WINDOWS\\system32\\drivers\\drivers.cab.exe" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\boot.exe svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autoruns.exe\Debugger = "C:\\WINDOWS\\system32\\drivers\\drivers.cab.exe" 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe\Debugger = "C:\\WINDOWS\\pchealth\\helpctr\\binaries\\HelpHost.com" 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autoruns.exe system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autoruns.exe\Debugger = "C:\\WINDOWS\\system32\\drivers\\drivers.cab.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "C:\\WINDOWS\\Media\\rndll32.pif" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\boot.exe\Debugger = "C:\\WINDOWS\\Fonts\\fonts.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "C:\\WINDOWS\\Fonts\\Fonts.exe" Global.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\auto.exe\Debugger = "C:\\WINDOWS\\system32\\drivers\\drivers.cab.exe" Global.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autorun.exe\Debugger = "C:\\WINDOWS\\system32\\drivers\\drivers.cab.exe" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autoruns.exe svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "C:\\WINDOWS\\Fonts\\Fonts.exe" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autoruns.exe\Debugger = "C:\\WINDOWS\\system32\\drivers\\drivers.cab.exe" system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "C:\\WINDOWS\\Media\\rndll32.pif" 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autorun.exe Global.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "C:\\WINDOWS\\Media\\rndll32.pif" system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe\Debugger = "C:\\WINDOWS\\pchealth\\helpctr\\binaries\\HelpHost.com" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autorun.exe svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\auto.exe svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\boot.exe svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe\Debugger = "C:\\WINDOWS\\pchealth\\helpctr\\binaries\\HelpHost.com" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\auto.exe\Debugger = "C:\\WINDOWS\\system32\\drivers\\drivers.cab.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "C:\\WINDOWS\\Fonts\\Fonts.exe" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autorun.exe system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\auto.exe\Debugger = "C:\\WINDOWS\\system32\\drivers\\drivers.cab.exe" system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autorun.exe 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "C:\\WINDOWS\\Fonts\\tskmgr.exe" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autoruns.exe svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\boot.exe svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autoruns.exe\Debugger = "C:\\WINDOWS\\system32\\drivers\\drivers.cab.exe" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\auto.exe svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "C:\\WINDOWS\\Media\\rndll32.pif" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autorun.exe\Debugger = "C:\\WINDOWS\\system32\\drivers\\drivers.cab.exe" 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe Global.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\auto.exe svchost.exe -
Loads dropped DLL 29 IoCs
pid Process 1116 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe 1116 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe 1092 Global.exe 1092 Global.exe 1092 Global.exe 1092 Global.exe 1092 Global.exe 1092 Global.exe 1092 Global.exe 1092 Global.exe 1092 Global.exe 1092 Global.exe 1092 Global.exe 1092 Global.exe 872 svchost.exe 816 svchost.exe 900 svchost.exe 840 svchost.exe 872 svchost.exe 816 svchost.exe 840 svchost.exe 900 svchost.exe 1944 svchost.exe 1944 svchost.exe 1756 WerFault.exe 1756 WerFault.exe 1756 WerFault.exe 1756 WerFault.exe 1756 WerFault.exe -
Adds Run key to start application 2 TTPs 60 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "C:\\WINDOWS\\system\\KEYBOARD.exe" 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ = "C:\\WINDOWS\\system32\\dllcache\\Default.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ = "C:\\WINDOWS\\system32\\dllcache\\Default.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "C:\\WINDOWS\\system\\KEYBOARD.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "C:\\WINDOWS\\system\\KEYBOARD.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ = "C:\\WINDOWS\\system32\\dllcache\\Default.exe" system.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\ = "C:\\WINDOWS\\system32\\dllcache\\Default.exe" 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "C:\\WINDOWS\\system\\KEYBOARD.exe" Global.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "C:\\WINDOWS\\system\\KEYBOARD.exe" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce svchost.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce Global.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\ = "C:\\WINDOWS\\system32\\dllcache\\Default.exe" system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "C:\\WINDOWS\\system\\KEYBOARD.exe" system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\ = "C:\\WINDOWS\\system32\\dllcache\\Default.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ = "C:\\WINDOWS\\system32\\dllcache\\Default.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ = "C:\\WINDOWS\\system32\\dllcache\\Default.exe" system.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ = "C:\\WINDOWS\\system32\\dllcache\\Default.exe" svchost.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\ = "C:\\WINDOWS\\system32\\dllcache\\Default.exe" Global.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\ = "C:\\WINDOWS\\system32\\dllcache\\Default.exe" svchost.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce system.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ = "C:\\WINDOWS\\system32\\dllcache\\Default.exe" Global.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce svchost.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "C:\\WINDOWS\\system\\KEYBOARD.exe" system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\ = "C:\\WINDOWS\\system32\\dllcache\\Default.exe" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\ = "C:\\WINDOWS\\system32\\dllcache\\Default.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "C:\\WINDOWS\\system\\KEYBOARD.exe" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "C:\\WINDOWS\\system\\KEYBOARD.exe" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce Global.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\ = "C:\\WINDOWS\\system32\\dllcache\\Default.exe" system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\ = "C:\\WINDOWS\\system32\\dllcache\\Default.exe" system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run Global.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\ = "C:\\WINDOWS\\system32\\dllcache\\Default.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "C:\\WINDOWS\\system\\KEYBOARD.exe" system.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ = "C:\\WINDOWS\\system32\\dllcache\\Default.exe" system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce system.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ = "C:\\WINDOWS\\system32\\dllcache\\Default.exe" svchost.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ = "C:\\WINDOWS\\system32\\dllcache\\Default.exe" 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run svchost.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce svchost.exe -
Drops autorun.inf file 1 TTPs 14 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\autorun.inf Global.exe File created D:\autorun.inf Global.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\autorun.inf svchost.exe File created C:\WINDOWS\SysWOW64\dllcache\autorun.inf 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\autorun.inf Global.exe File opened for modification D:\autorun.inf Global.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\autorun.inf svchost.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\autorun.inf svchost.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\autorun.inf svchost.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\autorun.inf svchost.exe File created C:\autorun.inf Global.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\autorun.inf system.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\autorun.inf 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\autorun.inf system.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\dllcache\Global.exe svchost.exe File created C:\WINDOWS\SysWOW64\regedit.exe svchost.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\autorun.inf svchost.exe File created C:\WINDOWS\SysWOW64\dllcache\Default.exe svchost.exe File created C:\WINDOWS\SysWOW64\regedit.exe system.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\svchost.exe svchost.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache svchost.exe File created C:\WINDOWS\SysWOW64\dllcache\Global.exe system.exe File created C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\Global.exe svchost.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\Global.exe system.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\svchost.exe system.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\autorun.inf system.exe File created C:\WINDOWS\SysWOW64\dllcache\svchost.exe svchost.exe File created C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\system.exe svchost.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\svchost.exe svchost.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\Global.exe svchost.exe File created C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\system.exe svchost.exe File created C:\WINDOWS\SysWOW64\dllcache\svchost.exe svchost.exe File created C:\WINDOWS\SysWOW64\dllcache\Global.exe svchost.exe File created C:\WINDOWS\SysWOW64\dllcache\Default.exe system.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe File created C:\WINDOWS\SysWOW64\dllcache\Default.exe 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\ Global.exe File created C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\Global.exe 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe File created C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\system.exe system.exe File created C:\WINDOWS\SysWOW64\dllcache\Global.exe 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe File created C:\WINDOWS\SysWOW64\dllcache\svchost.exe 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache svchost.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\autorun.inf 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe File created C:\WINDOWS\SysWOW64\regedit.exe svchost.exe File created C:\WINDOWS\SysWOW64\dllcache\svchost.exe svchost.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\ svchost.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\Global.exe svchost.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\system.exe 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\Default.exe Global.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\svchost.exe svchost.exe File created C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\svchost.exe svchost.exe File created C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\Global.exe svchost.exe File created C:\WINDOWS\SysWOW64\dllcache\svchost.exe system.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E} 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe File created C:\WINDOWS\SysWOW64\dllcache\autorun.inf 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache svchost.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\svchost.exe svchost.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\Global.exe system.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\autorun.inf system.exe File created C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\svchost.exe 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe File created C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\system.exe 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe File created C:\WINDOWS\SysWOW64\dllcache\tskmgr.exe Global.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\autorun.inf svchost.exe File created C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\svchost.exe svchost.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E)\Global.exe 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\svchost.exe svchost.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\ svchost.exe File created C:\WINDOWS\SysWOW64\dllcache\svchost.exe svchost.exe File created C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\svchost.exe system.exe File created C:\WINDOWS\SysWOW64\regedit.exe Global.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\Global.exe svchost.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\ system.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\tskmgr.exe Global.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\system.exe Global.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\Global.exe Global.exe File created C:\WINDOWS\SysWOW64\dllcache\svchost.exe system.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\svchost.exe 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe File created C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\Global.exe svchost.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\WINDOWS\Media\rndll32.pif 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe File opened for modification C:\WINDOWS\Cursors\Boom.vbs Global.exe File created C:\WINDOWS\system\KEYBOARD.exe svchost.exe File created C:\WINDOWS\Cursors\Boom.vbs svchost.exe File created C:\WINDOWS\pchealth\Global.exe system.exe File created C:\WINDOWS\system\KEYBOARD.exe 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe File created C:\WINDOWS\pchealth\helpctr\binaries\HelpHost.com svchost.exe File opened for modification C:\WINDOWS\Cursors\Boom.vbs system.exe File opened for modification C:\WINDOWS\Help\microsoft.hlp Global.exe File created C:\WINDOWS\Cursors\Boom.vbs Global.exe File opened for modification C:\WINDOWS\Cursors\Boom.vbs svchost.exe File created C:\WINDOWS\Fonts\Fonts.exe system.exe File created C:\WINDOWS\Fonts\Fonts.exe system.exe File created C:\WINDOWS\Help\microsoft.hlp system.exe File created C:\WINDOWS\Fonts\tskmgr.exe system.exe File created C:\WINDOWS\pchealth\Global.exe 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe File created C:\WINDOWS\Cursors\Boom.vbs 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe File opened for modification C:\WINDOWS\Media\rndll32.pif Global.exe File created C:\WINDOWS\Fonts\tskmgr.exe svchost.exe File created C:\WINDOWS\Help\microsoft.hlp svchost.exe File created C:\WINDOWS\Fonts\wav.wav 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe File created C:\WINDOWS\Help\microsoft.hlp 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe File opened for modification C:\WINDOWS\pchealth\Global.exe Global.exe File created C:\WINDOWS\Fonts\tskmgr.exe svchost.exe File opened for modification C:\WINDOWS\Cursors\Boom.vbs system.exe File created C:\WINDOWS\pchealth\helpctr\binaries\HelpHost.com Global.exe File created C:\WINDOWS\pchealth\Global.exe svchost.exe File opened for modification C:\WINDOWS\Cursors\Boom.vbs svchost.exe File created C:\WINDOWS\Help\microsoft.hlp svchost.exe File created C:\WINDOWS\Fonts\tskmgr.exe system.exe File created C:\WINDOWS\Cursors\Boom.vbs system.exe File opened for modification C:\WINDOWS\Fonts\wav.wav 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe File created C:\WINDOWS\pchealth\helpctr\binaries\HelpHost.com svchost.exe File created C:\WINDOWS\Cursors\Boom.vbs svchost.exe File created C:\WINDOWS\Help\microsoft.hlp svchost.exe File created C:\WINDOWS\pchealth\helpctr\binaries\HelpHost.com system.exe File created C:\WINDOWS\Media\rndll32.pif svchost.exe File created C:\WINDOWS\Media\rndll32.pif svchost.exe File created C:\WINDOWS\Fonts\Fonts.exe 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe File created C:\WINDOWS\Fonts\Fonts.exe svchost.exe File created C:\WINDOWS\Media\rndll32.pif svchost.exe File created C:\WINDOWS\Fonts\tskmgr.exe svchost.exe File created C:\WINDOWS\pchealth\Global.exe svchost.exe File created C:\WINDOWS\pchealth\helpctr\binaries\HelpHost.com svchost.exe File opened for modification C:\WINDOWS\system\KEYBOARD.exe Global.exe File opened for modification C:\WINDOWS\Fonts\tskmgr.exe Global.exe File created C:\WINDOWS\pchealth\Global.exe svchost.exe File created C:\WINDOWS\system\KEYBOARD.exe svchost.exe File created C:\WINDOWS\system\KEYBOARD.exe svchost.exe File opened for modification C:\WINDOWS\Cursors\Boom.vbs 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe File created C:\WINDOWS\Help\microsoft.hlp svchost.exe File opened for modification C:\WINDOWS\Cursors\Boom.vbs svchost.exe File created C:\WINDOWS\Help\microsoft.hlp system.exe File opened for modification C:\WINDOWS\Fonts\Fonts.exe Global.exe File created C:\WINDOWS\Fonts\tskmgr.exe svchost.exe File created C:\WINDOWS\pchealth\helpctr\binaries\HelpHost.com svchost.exe File created C:\WINDOWS\Media\rndll32.pif svchost.exe File created C:\WINDOWS\Help\microsoft.hlp svchost.exe File created C:\WINDOWS\Fonts\tskmgr.exe 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe File opened for modification C:\WINDOWS\Cursors\Boom.vbs svchost.exe File created C:\WINDOWS\Fonts\Fonts.exe svchost.exe File created C:\WINDOWS\Cursors\Boom.vbs svchost.exe File created C:\WINDOWS\system\KEYBOARD.exe system.exe File created C:\WINDOWS\Media\rndll32.pif system.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1756 596 WerFault.exe 35 -
Modifies Control Panel 40 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\WINDOWS\\pchealth\\helpctr\\binaries\\HelpHost.com" 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Control Panel\Desktop\AutoEndTasks = "1" 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Control Panel\Desktop\AutoEndTasks = "1" svchost.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Control Panel\Desktop system.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\WINDOWS\\pchealth\\helpctr\\binaries\\HelpHost.com" system.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Control Panel\Desktop\ScreenSaveTimeOut = "30" 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Control Panel\Desktop\ScreenSaveTimeOut = "30" system.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Control Panel\Desktop system.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Control Panel\Desktop\AutoEndTasks = "1" system.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\WINDOWS\\pchealth\\helpctr\\binaries\\HelpHost.com" Global.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Control Panel\Desktop\ScreenSaveTimeOut = "30" Global.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Control Panel\Desktop\ScreenSaveTimeOut = "30" svchost.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Control Panel\Desktop svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\WINDOWS\\pchealth\\helpctr\\binaries\\HelpHost.com" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Control Panel\Desktop\AutoEndTasks = "1" Global.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\WINDOWS\\pchealth\\helpctr\\binaries\\HelpHost.com" svchost.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Control Panel\Desktop svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Control Panel\Desktop\AutoEndTasks = "1" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Control Panel\Desktop\AutoEndTasks = "1" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Control Panel\Desktop\ScreenSaveTimeOut = "30" system.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Control Panel\Desktop\ScreenSaveTimeOut = "30" system.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\WINDOWS\\pchealth\\helpctr\\binaries\\HelpHost.com" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Control Panel\Desktop\ScreenSaveTimeOut = "30" svchost.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Control Panel\Desktop system.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Control Panel\Desktop Global.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Control Panel\Desktop svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Control Panel\Desktop\AutoEndTasks = "1" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\WINDOWS\\pchealth\\helpctr\\binaries\\HelpHost.com" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Control Panel\Desktop\ScreenSaveTimeOut = "30" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\WINDOWS\\pchealth\\helpctr\\binaries\\HelpHost.com" system.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Control Panel\Desktop\AutoEndTasks = "1" system.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Control Panel\Desktop 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Control Panel\Desktop\ScreenSaveTimeOut = "30" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Control Panel\Desktop\ScreenSaveTimeOut = "30" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Control Panel\Desktop\AutoEndTasks = "1" svchost.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Control Panel\Desktop svchost.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Control Panel\Desktop svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\WINDOWS\\pchealth\\helpctr\\binaries\\HelpHost.com" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\WINDOWS\\pchealth\\helpctr\\binaries\\HelpHost.com" system.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Control Panel\Desktop\AutoEndTasks = "1" system.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\Shell\Open\Command svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\shell\open\command\ = "C:\\WINDOWS\\pchealth\\Global.exe" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSCFile\Shell\Open\Command svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\shell\open\command\ = "C:\\WINDOWS\\pchealth\\Global.exe" system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\shell\open\command\ = "C:\\WINDOWS\\pchealth\\Global.exe" Global.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt = "1" system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSCFile\Shell\Open\Command system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt = "1" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\shell\open\command\ = "C:\\WINDOWS\\pchealth\\Global.exe" system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "VBSFile" Global.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt = "1" Global.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mscfile\shell\open\command\ = "C:\\WINDOWS\\pchealth\\Global.exe" system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\NeverShowExt = "1" system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt = "1" system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mscfile\shell\open\command\ = "C:\\WINDOWS\\Fonts\\Fonts.exe" 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mscfile\shell\open\command\ = "C:\\WINDOWS\\Fonts\\Fonts.exe" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSCFile\Shell\Open\Command system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mscfile\shell\open\command\ = "C:\\WINDOWS\\Fonts\\Fonts.exe" system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\Shell\Open\Command 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mscfile\shell\open\command\ = "C:\\WINDOWS\\Fonts\\Fonts.exe" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\Shell\Open\Command svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\shell\open\command\ = "C:\\WINDOWS\\pchealth\\Global.exe" system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mscfile\shell\open\command\ = "C:\\WINDOWS\\pchealth\\Global.exe" Global.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mscfile\shell\open\command\ = "C:\\WINDOWS\\pchealth\\Global.exe" system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\NeverShowExt = "1" system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mscfile\shell\open\command\ = "C:\\WINDOWS\\pchealth\\Global.exe" 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSCFile\Shell\Open\Command svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\NeverShowExt = "1" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt = "1" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\NeverShowExt = "1" Global.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSCFile\Shell\Open\Command svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\NeverShowExt = "1" system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\Shell\Open\Command system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mscfile\shell\open\command\ = "C:\\WINDOWS\\Fonts\\Fonts.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "VBSFile" system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mscfile\shell\open\command\ = "C:\\WINDOWS\\pchealth\\Global.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "VBSFile" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mscfile\shell\open\command\ = "C:\\WINDOWS\\pchealth\\Global.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\NeverShowExt = "1" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt = "1" system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "VBSFile" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "VBSFile" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile Global.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt = "1" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSCFile\Shell\Open\Command system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\Shell\Open\Command system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\Shell\Open\Command svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\Shell\Open\Command system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\Shell\Open\Command svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\NeverShowExt = "1" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mscfile\shell\open\command\ = "C:\\WINDOWS\\Fonts\\Fonts.exe" svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1116 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe 1092 Global.exe 900 svchost.exe 872 svchost.exe 840 svchost.exe 816 svchost.exe 1780 svchost.exe 1944 svchost.exe 588 system.exe 1380 system.exe 596 system.exe 1532 system.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 1116 wrote to memory of 1092 1116 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe 28 PID 1116 wrote to memory of 1092 1116 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe 28 PID 1116 wrote to memory of 1092 1116 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe 28 PID 1116 wrote to memory of 1092 1116 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe 28 PID 1092 wrote to memory of 900 1092 Global.exe 29 PID 1092 wrote to memory of 900 1092 Global.exe 29 PID 1092 wrote to memory of 900 1092 Global.exe 29 PID 1092 wrote to memory of 900 1092 Global.exe 29 PID 1092 wrote to memory of 872 1092 Global.exe 30 PID 1092 wrote to memory of 872 1092 Global.exe 30 PID 1092 wrote to memory of 872 1092 Global.exe 30 PID 1092 wrote to memory of 872 1092 Global.exe 30 PID 1092 wrote to memory of 840 1092 Global.exe 31 PID 1092 wrote to memory of 840 1092 Global.exe 31 PID 1092 wrote to memory of 840 1092 Global.exe 31 PID 1092 wrote to memory of 840 1092 Global.exe 31 PID 1092 wrote to memory of 816 1092 Global.exe 32 PID 1092 wrote to memory of 816 1092 Global.exe 32 PID 1092 wrote to memory of 816 1092 Global.exe 32 PID 1092 wrote to memory of 816 1092 Global.exe 32 PID 1092 wrote to memory of 1780 1092 Global.exe 33 PID 1092 wrote to memory of 1780 1092 Global.exe 33 PID 1092 wrote to memory of 1780 1092 Global.exe 33 PID 1092 wrote to memory of 1780 1092 Global.exe 33 PID 1092 wrote to memory of 1944 1092 Global.exe 34 PID 1092 wrote to memory of 1944 1092 Global.exe 34 PID 1092 wrote to memory of 1944 1092 Global.exe 34 PID 1092 wrote to memory of 1944 1092 Global.exe 34 PID 872 wrote to memory of 588 872 svchost.exe 36 PID 872 wrote to memory of 588 872 svchost.exe 36 PID 872 wrote to memory of 588 872 svchost.exe 36 PID 872 wrote to memory of 588 872 svchost.exe 36 PID 816 wrote to memory of 596 816 svchost.exe 35 PID 816 wrote to memory of 596 816 svchost.exe 35 PID 816 wrote to memory of 596 816 svchost.exe 35 PID 816 wrote to memory of 596 816 svchost.exe 35 PID 840 wrote to memory of 1876 840 svchost.exe 37 PID 840 wrote to memory of 1876 840 svchost.exe 37 PID 840 wrote to memory of 1876 840 svchost.exe 37 PID 840 wrote to memory of 1876 840 svchost.exe 37 PID 900 wrote to memory of 1532 900 svchost.exe 38 PID 900 wrote to memory of 1532 900 svchost.exe 38 PID 900 wrote to memory of 1532 900 svchost.exe 38 PID 900 wrote to memory of 1532 900 svchost.exe 38 PID 1944 wrote to memory of 1380 1944 svchost.exe 39 PID 1944 wrote to memory of 1380 1944 svchost.exe 39 PID 1944 wrote to memory of 1380 1944 svchost.exe 39 PID 1944 wrote to memory of 1380 1944 svchost.exe 39 PID 596 wrote to memory of 1756 596 system.exe 40 PID 596 wrote to memory of 1756 596 system.exe 40 PID 596 wrote to memory of 1756 596 system.exe 40 PID 596 wrote to memory of 1756 596 system.exe 40 -
System policy modification 1 TTPs 20 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Global.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableStatusMessages = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableStatusMessages = "1" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableStatusMessages = "1" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System system.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableStatusMessages = "1" system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableStatusMessages = "1" 50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System system.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableStatusMessages = "1" system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System system.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableStatusMessages = "1" system.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableStatusMessages = "1" Global.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableStatusMessages = "1" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableStatusMessages = "1" svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe"C:\Users\Admin\AppData\Local\Temp\50718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8.exe"1⤵
- Modifies system executable filetype association
- Adds policy Run key to start application
- Drops file in Drivers directory
- Sets file execution options in registry
- Loads dropped DLL
- Adds Run key to start application
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1116 -
C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\Global.exe"C:\WINDOWS\system32\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\Global.exe"2⤵
- Modifies system executable filetype association
- Adds policy Run key to start application
- Drops file in Drivers directory
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Adds Run key to start application
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1092 -
C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\svchost.exe"C:\WINDOWS\system32\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\svchost.exe"3⤵
- Modifies system executable filetype association
- Adds policy Run key to start application
- Drops file in Drivers directory
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Adds Run key to start application
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:900 -
C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\system.exe"C:\WINDOWS\system32\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\system.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1532
-
-
-
C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\svchost.exe"C:\WINDOWS\system32\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\svchost.exe"3⤵
- Modifies system executable filetype association
- Adds policy Run key to start application
- Drops file in Drivers directory
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Adds Run key to start application
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:872 -
C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\system.exe"C:\WINDOWS\system32\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\system.exe"4⤵
- Modifies system executable filetype association
- Adds policy Run key to start application
- Drops file in Drivers directory
- Executes dropped EXE
- Sets file execution options in registry
- Adds Run key to start application
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:588
-
-
-
C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\svchost.exe"C:\WINDOWS\system32\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\svchost.exe"3⤵
- Modifies system executable filetype association
- Adds policy Run key to start application
- Drops file in Drivers directory
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Adds Run key to start application
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:840 -
C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\system.exe"C:\WINDOWS\system32\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\system.exe"4⤵
- Executes dropped EXE
PID:1876
-
-
-
C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\svchost.exe"C:\WINDOWS\system32\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\svchost.exe"3⤵
- Modifies system executable filetype association
- Adds policy Run key to start application
- Drops file in Drivers directory
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Adds Run key to start application
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:816 -
C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\system.exe"C:\WINDOWS\system32\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\system.exe"4⤵
- Modifies system executable filetype association
- Adds policy Run key to start application
- Executes dropped EXE
- Sets file execution options in registry
- Adds Run key to start application
- Modifies Control Panel
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:596 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 596 -s 3805⤵
- Loads dropped DLL
- Program crash
PID:1756
-
-
-
-
C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\svchost.exe"C:\WINDOWS\system32\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\svchost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1780
-
-
C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\svchost.exe"C:\WINDOWS\system32\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\svchost.exe"3⤵
- Modifies system executable filetype association
- Adds policy Run key to start application
- Drops file in Drivers directory
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Adds Run key to start application
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1944 -
C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\system.exe"C:\WINDOWS\system32\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\system.exe"4⤵
- Modifies system executable filetype association
- Adds policy Run key to start application
- Drops file in Drivers directory
- Executes dropped EXE
- Sets file execution options in registry
- Adds Run key to start application
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1380
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5e72c9789ac7232e3b36766eb2a8f8da6
SHA1a37a9f18e227d103bb4e1ecac0834c2cdf99d112
SHA2567b03603cbc56105470b4bfb250d0ef18fa93126475e2872d63dc52c35866d2a9
SHA512666a2592c5303a1f42a8bbddc2a8e5d3289c612be7401e3530a3afd70d8243276645bad00a82f3254674307583dabae49c16204e790200a34b0707813265f6d0
-
Filesize
220KB
MD5a5b0e92b1b747f414a537db898b335d0
SHA1b6ad79bcc29e96aa3338ab06b9610491736318bf
SHA25650718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8
SHA51257bb29206f48856fc23a02eb85a8bc08ad460dde82adb1f2e572912b9ed72fa1fc461bcdcbc4fcae57c58424fd2be77737551ae42b1474c4dbaff056a81cc150
-
Filesize
220KB
MD5a5b0e92b1b747f414a537db898b335d0
SHA1b6ad79bcc29e96aa3338ab06b9610491736318bf
SHA25650718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8
SHA51257bb29206f48856fc23a02eb85a8bc08ad460dde82adb1f2e572912b9ed72fa1fc461bcdcbc4fcae57c58424fd2be77737551ae42b1474c4dbaff056a81cc150
-
Filesize
220KB
MD5a5b0e92b1b747f414a537db898b335d0
SHA1b6ad79bcc29e96aa3338ab06b9610491736318bf
SHA25650718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8
SHA51257bb29206f48856fc23a02eb85a8bc08ad460dde82adb1f2e572912b9ed72fa1fc461bcdcbc4fcae57c58424fd2be77737551ae42b1474c4dbaff056a81cc150
-
Filesize
220KB
MD5a5b0e92b1b747f414a537db898b335d0
SHA1b6ad79bcc29e96aa3338ab06b9610491736318bf
SHA25650718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8
SHA51257bb29206f48856fc23a02eb85a8bc08ad460dde82adb1f2e572912b9ed72fa1fc461bcdcbc4fcae57c58424fd2be77737551ae42b1474c4dbaff056a81cc150
-
Filesize
220KB
MD5a5b0e92b1b747f414a537db898b335d0
SHA1b6ad79bcc29e96aa3338ab06b9610491736318bf
SHA25650718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8
SHA51257bb29206f48856fc23a02eb85a8bc08ad460dde82adb1f2e572912b9ed72fa1fc461bcdcbc4fcae57c58424fd2be77737551ae42b1474c4dbaff056a81cc150
-
Filesize
220KB
MD5a5b0e92b1b747f414a537db898b335d0
SHA1b6ad79bcc29e96aa3338ab06b9610491736318bf
SHA25650718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8
SHA51257bb29206f48856fc23a02eb85a8bc08ad460dde82adb1f2e572912b9ed72fa1fc461bcdcbc4fcae57c58424fd2be77737551ae42b1474c4dbaff056a81cc150
-
Filesize
220KB
MD5a5b0e92b1b747f414a537db898b335d0
SHA1b6ad79bcc29e96aa3338ab06b9610491736318bf
SHA25650718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8
SHA51257bb29206f48856fc23a02eb85a8bc08ad460dde82adb1f2e572912b9ed72fa1fc461bcdcbc4fcae57c58424fd2be77737551ae42b1474c4dbaff056a81cc150
-
Filesize
220KB
MD5a5b0e92b1b747f414a537db898b335d0
SHA1b6ad79bcc29e96aa3338ab06b9610491736318bf
SHA25650718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8
SHA51257bb29206f48856fc23a02eb85a8bc08ad460dde82adb1f2e572912b9ed72fa1fc461bcdcbc4fcae57c58424fd2be77737551ae42b1474c4dbaff056a81cc150
-
Filesize
220KB
MD5a5b0e92b1b747f414a537db898b335d0
SHA1b6ad79bcc29e96aa3338ab06b9610491736318bf
SHA25650718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8
SHA51257bb29206f48856fc23a02eb85a8bc08ad460dde82adb1f2e572912b9ed72fa1fc461bcdcbc4fcae57c58424fd2be77737551ae42b1474c4dbaff056a81cc150
-
Filesize
220KB
MD5a5b0e92b1b747f414a537db898b335d0
SHA1b6ad79bcc29e96aa3338ab06b9610491736318bf
SHA25650718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8
SHA51257bb29206f48856fc23a02eb85a8bc08ad460dde82adb1f2e572912b9ed72fa1fc461bcdcbc4fcae57c58424fd2be77737551ae42b1474c4dbaff056a81cc150
-
Filesize
118B
MD54eb846be89a1520b7d0181f0736f9a96
SHA1869a156f9bd21b06d896cafa66db628f7b5e9679
SHA2565bf2d22daa1c82872df820f2e5d12fdc60e131f20782cc5e566a04343bfdf6d8
SHA512ee444365384528857a68672a0b1ae1a3b62f7a4b05038d894bc33f603291defdc03a2a3a2849054aa13f4f2def783fdce8f88a5896fd64f11a3f7c9b19c4008c
-
Filesize
118B
MD54eb846be89a1520b7d0181f0736f9a96
SHA1869a156f9bd21b06d896cafa66db628f7b5e9679
SHA2565bf2d22daa1c82872df820f2e5d12fdc60e131f20782cc5e566a04343bfdf6d8
SHA512ee444365384528857a68672a0b1ae1a3b62f7a4b05038d894bc33f603291defdc03a2a3a2849054aa13f4f2def783fdce8f88a5896fd64f11a3f7c9b19c4008c
-
Filesize
118B
MD54eb846be89a1520b7d0181f0736f9a96
SHA1869a156f9bd21b06d896cafa66db628f7b5e9679
SHA2565bf2d22daa1c82872df820f2e5d12fdc60e131f20782cc5e566a04343bfdf6d8
SHA512ee444365384528857a68672a0b1ae1a3b62f7a4b05038d894bc33f603291defdc03a2a3a2849054aa13f4f2def783fdce8f88a5896fd64f11a3f7c9b19c4008c
-
Filesize
118B
MD54eb846be89a1520b7d0181f0736f9a96
SHA1869a156f9bd21b06d896cafa66db628f7b5e9679
SHA2565bf2d22daa1c82872df820f2e5d12fdc60e131f20782cc5e566a04343bfdf6d8
SHA512ee444365384528857a68672a0b1ae1a3b62f7a4b05038d894bc33f603291defdc03a2a3a2849054aa13f4f2def783fdce8f88a5896fd64f11a3f7c9b19c4008c
-
Filesize
118B
MD54eb846be89a1520b7d0181f0736f9a96
SHA1869a156f9bd21b06d896cafa66db628f7b5e9679
SHA2565bf2d22daa1c82872df820f2e5d12fdc60e131f20782cc5e566a04343bfdf6d8
SHA512ee444365384528857a68672a0b1ae1a3b62f7a4b05038d894bc33f603291defdc03a2a3a2849054aa13f4f2def783fdce8f88a5896fd64f11a3f7c9b19c4008c
-
Filesize
118B
MD54eb846be89a1520b7d0181f0736f9a96
SHA1869a156f9bd21b06d896cafa66db628f7b5e9679
SHA2565bf2d22daa1c82872df820f2e5d12fdc60e131f20782cc5e566a04343bfdf6d8
SHA512ee444365384528857a68672a0b1ae1a3b62f7a4b05038d894bc33f603291defdc03a2a3a2849054aa13f4f2def783fdce8f88a5896fd64f11a3f7c9b19c4008c
-
Filesize
118B
MD54eb846be89a1520b7d0181f0736f9a96
SHA1869a156f9bd21b06d896cafa66db628f7b5e9679
SHA2565bf2d22daa1c82872df820f2e5d12fdc60e131f20782cc5e566a04343bfdf6d8
SHA512ee444365384528857a68672a0b1ae1a3b62f7a4b05038d894bc33f603291defdc03a2a3a2849054aa13f4f2def783fdce8f88a5896fd64f11a3f7c9b19c4008c
-
Filesize
118B
MD54eb846be89a1520b7d0181f0736f9a96
SHA1869a156f9bd21b06d896cafa66db628f7b5e9679
SHA2565bf2d22daa1c82872df820f2e5d12fdc60e131f20782cc5e566a04343bfdf6d8
SHA512ee444365384528857a68672a0b1ae1a3b62f7a4b05038d894bc33f603291defdc03a2a3a2849054aa13f4f2def783fdce8f88a5896fd64f11a3f7c9b19c4008c
-
Filesize
118B
MD54eb846be89a1520b7d0181f0736f9a96
SHA1869a156f9bd21b06d896cafa66db628f7b5e9679
SHA2565bf2d22daa1c82872df820f2e5d12fdc60e131f20782cc5e566a04343bfdf6d8
SHA512ee444365384528857a68672a0b1ae1a3b62f7a4b05038d894bc33f603291defdc03a2a3a2849054aa13f4f2def783fdce8f88a5896fd64f11a3f7c9b19c4008c
-
Filesize
220KB
MD5a5b0e92b1b747f414a537db898b335d0
SHA1b6ad79bcc29e96aa3338ab06b9610491736318bf
SHA25650718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8
SHA51257bb29206f48856fc23a02eb85a8bc08ad460dde82adb1f2e572912b9ed72fa1fc461bcdcbc4fcae57c58424fd2be77737551ae42b1474c4dbaff056a81cc150
-
Filesize
220KB
MD5a5b0e92b1b747f414a537db898b335d0
SHA1b6ad79bcc29e96aa3338ab06b9610491736318bf
SHA25650718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8
SHA51257bb29206f48856fc23a02eb85a8bc08ad460dde82adb1f2e572912b9ed72fa1fc461bcdcbc4fcae57c58424fd2be77737551ae42b1474c4dbaff056a81cc150
-
Filesize
220KB
MD5a5b0e92b1b747f414a537db898b335d0
SHA1b6ad79bcc29e96aa3338ab06b9610491736318bf
SHA25650718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8
SHA51257bb29206f48856fc23a02eb85a8bc08ad460dde82adb1f2e572912b9ed72fa1fc461bcdcbc4fcae57c58424fd2be77737551ae42b1474c4dbaff056a81cc150
-
Filesize
220KB
MD5a5b0e92b1b747f414a537db898b335d0
SHA1b6ad79bcc29e96aa3338ab06b9610491736318bf
SHA25650718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8
SHA51257bb29206f48856fc23a02eb85a8bc08ad460dde82adb1f2e572912b9ed72fa1fc461bcdcbc4fcae57c58424fd2be77737551ae42b1474c4dbaff056a81cc150
-
Filesize
220KB
MD5a5b0e92b1b747f414a537db898b335d0
SHA1b6ad79bcc29e96aa3338ab06b9610491736318bf
SHA25650718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8
SHA51257bb29206f48856fc23a02eb85a8bc08ad460dde82adb1f2e572912b9ed72fa1fc461bcdcbc4fcae57c58424fd2be77737551ae42b1474c4dbaff056a81cc150
-
Filesize
220KB
MD5a5b0e92b1b747f414a537db898b335d0
SHA1b6ad79bcc29e96aa3338ab06b9610491736318bf
SHA25650718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8
SHA51257bb29206f48856fc23a02eb85a8bc08ad460dde82adb1f2e572912b9ed72fa1fc461bcdcbc4fcae57c58424fd2be77737551ae42b1474c4dbaff056a81cc150
-
Filesize
220KB
MD5a5b0e92b1b747f414a537db898b335d0
SHA1b6ad79bcc29e96aa3338ab06b9610491736318bf
SHA25650718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8
SHA51257bb29206f48856fc23a02eb85a8bc08ad460dde82adb1f2e572912b9ed72fa1fc461bcdcbc4fcae57c58424fd2be77737551ae42b1474c4dbaff056a81cc150
-
Filesize
220KB
MD5a5b0e92b1b747f414a537db898b335d0
SHA1b6ad79bcc29e96aa3338ab06b9610491736318bf
SHA25650718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8
SHA51257bb29206f48856fc23a02eb85a8bc08ad460dde82adb1f2e572912b9ed72fa1fc461bcdcbc4fcae57c58424fd2be77737551ae42b1474c4dbaff056a81cc150
-
Filesize
220KB
MD5a5b0e92b1b747f414a537db898b335d0
SHA1b6ad79bcc29e96aa3338ab06b9610491736318bf
SHA25650718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8
SHA51257bb29206f48856fc23a02eb85a8bc08ad460dde82adb1f2e572912b9ed72fa1fc461bcdcbc4fcae57c58424fd2be77737551ae42b1474c4dbaff056a81cc150
-
Filesize
220KB
MD5a5b0e92b1b747f414a537db898b335d0
SHA1b6ad79bcc29e96aa3338ab06b9610491736318bf
SHA25650718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8
SHA51257bb29206f48856fc23a02eb85a8bc08ad460dde82adb1f2e572912b9ed72fa1fc461bcdcbc4fcae57c58424fd2be77737551ae42b1474c4dbaff056a81cc150
-
Filesize
220KB
MD5a5b0e92b1b747f414a537db898b335d0
SHA1b6ad79bcc29e96aa3338ab06b9610491736318bf
SHA25650718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8
SHA51257bb29206f48856fc23a02eb85a8bc08ad460dde82adb1f2e572912b9ed72fa1fc461bcdcbc4fcae57c58424fd2be77737551ae42b1474c4dbaff056a81cc150
-
Filesize
220KB
MD5a5b0e92b1b747f414a537db898b335d0
SHA1b6ad79bcc29e96aa3338ab06b9610491736318bf
SHA25650718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8
SHA51257bb29206f48856fc23a02eb85a8bc08ad460dde82adb1f2e572912b9ed72fa1fc461bcdcbc4fcae57c58424fd2be77737551ae42b1474c4dbaff056a81cc150
-
Filesize
220KB
MD5a5b0e92b1b747f414a537db898b335d0
SHA1b6ad79bcc29e96aa3338ab06b9610491736318bf
SHA25650718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8
SHA51257bb29206f48856fc23a02eb85a8bc08ad460dde82adb1f2e572912b9ed72fa1fc461bcdcbc4fcae57c58424fd2be77737551ae42b1474c4dbaff056a81cc150
-
Filesize
220KB
MD5a5b0e92b1b747f414a537db898b335d0
SHA1b6ad79bcc29e96aa3338ab06b9610491736318bf
SHA25650718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8
SHA51257bb29206f48856fc23a02eb85a8bc08ad460dde82adb1f2e572912b9ed72fa1fc461bcdcbc4fcae57c58424fd2be77737551ae42b1474c4dbaff056a81cc150
-
Filesize
220KB
MD5a5b0e92b1b747f414a537db898b335d0
SHA1b6ad79bcc29e96aa3338ab06b9610491736318bf
SHA25650718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8
SHA51257bb29206f48856fc23a02eb85a8bc08ad460dde82adb1f2e572912b9ed72fa1fc461bcdcbc4fcae57c58424fd2be77737551ae42b1474c4dbaff056a81cc150
-
Filesize
220KB
MD5a5b0e92b1b747f414a537db898b335d0
SHA1b6ad79bcc29e96aa3338ab06b9610491736318bf
SHA25650718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8
SHA51257bb29206f48856fc23a02eb85a8bc08ad460dde82adb1f2e572912b9ed72fa1fc461bcdcbc4fcae57c58424fd2be77737551ae42b1474c4dbaff056a81cc150
-
Filesize
220KB
MD5a5b0e92b1b747f414a537db898b335d0
SHA1b6ad79bcc29e96aa3338ab06b9610491736318bf
SHA25650718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8
SHA51257bb29206f48856fc23a02eb85a8bc08ad460dde82adb1f2e572912b9ed72fa1fc461bcdcbc4fcae57c58424fd2be77737551ae42b1474c4dbaff056a81cc150
-
Filesize
220KB
MD5a5b0e92b1b747f414a537db898b335d0
SHA1b6ad79bcc29e96aa3338ab06b9610491736318bf
SHA25650718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8
SHA51257bb29206f48856fc23a02eb85a8bc08ad460dde82adb1f2e572912b9ed72fa1fc461bcdcbc4fcae57c58424fd2be77737551ae42b1474c4dbaff056a81cc150
-
Filesize
220KB
MD5a5b0e92b1b747f414a537db898b335d0
SHA1b6ad79bcc29e96aa3338ab06b9610491736318bf
SHA25650718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8
SHA51257bb29206f48856fc23a02eb85a8bc08ad460dde82adb1f2e572912b9ed72fa1fc461bcdcbc4fcae57c58424fd2be77737551ae42b1474c4dbaff056a81cc150
-
Filesize
220KB
MD5a5b0e92b1b747f414a537db898b335d0
SHA1b6ad79bcc29e96aa3338ab06b9610491736318bf
SHA25650718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8
SHA51257bb29206f48856fc23a02eb85a8bc08ad460dde82adb1f2e572912b9ed72fa1fc461bcdcbc4fcae57c58424fd2be77737551ae42b1474c4dbaff056a81cc150
-
Filesize
220KB
MD5a5b0e92b1b747f414a537db898b335d0
SHA1b6ad79bcc29e96aa3338ab06b9610491736318bf
SHA25650718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8
SHA51257bb29206f48856fc23a02eb85a8bc08ad460dde82adb1f2e572912b9ed72fa1fc461bcdcbc4fcae57c58424fd2be77737551ae42b1474c4dbaff056a81cc150
-
Filesize
220KB
MD5a5b0e92b1b747f414a537db898b335d0
SHA1b6ad79bcc29e96aa3338ab06b9610491736318bf
SHA25650718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8
SHA51257bb29206f48856fc23a02eb85a8bc08ad460dde82adb1f2e572912b9ed72fa1fc461bcdcbc4fcae57c58424fd2be77737551ae42b1474c4dbaff056a81cc150
-
Filesize
220KB
MD5a5b0e92b1b747f414a537db898b335d0
SHA1b6ad79bcc29e96aa3338ab06b9610491736318bf
SHA25650718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8
SHA51257bb29206f48856fc23a02eb85a8bc08ad460dde82adb1f2e572912b9ed72fa1fc461bcdcbc4fcae57c58424fd2be77737551ae42b1474c4dbaff056a81cc150
-
Filesize
220KB
MD5a5b0e92b1b747f414a537db898b335d0
SHA1b6ad79bcc29e96aa3338ab06b9610491736318bf
SHA25650718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8
SHA51257bb29206f48856fc23a02eb85a8bc08ad460dde82adb1f2e572912b9ed72fa1fc461bcdcbc4fcae57c58424fd2be77737551ae42b1474c4dbaff056a81cc150
-
Filesize
220KB
MD5a5b0e92b1b747f414a537db898b335d0
SHA1b6ad79bcc29e96aa3338ab06b9610491736318bf
SHA25650718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8
SHA51257bb29206f48856fc23a02eb85a8bc08ad460dde82adb1f2e572912b9ed72fa1fc461bcdcbc4fcae57c58424fd2be77737551ae42b1474c4dbaff056a81cc150
-
Filesize
220KB
MD5a5b0e92b1b747f414a537db898b335d0
SHA1b6ad79bcc29e96aa3338ab06b9610491736318bf
SHA25650718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8
SHA51257bb29206f48856fc23a02eb85a8bc08ad460dde82adb1f2e572912b9ed72fa1fc461bcdcbc4fcae57c58424fd2be77737551ae42b1474c4dbaff056a81cc150
-
Filesize
220KB
MD5a5b0e92b1b747f414a537db898b335d0
SHA1b6ad79bcc29e96aa3338ab06b9610491736318bf
SHA25650718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8
SHA51257bb29206f48856fc23a02eb85a8bc08ad460dde82adb1f2e572912b9ed72fa1fc461bcdcbc4fcae57c58424fd2be77737551ae42b1474c4dbaff056a81cc150
-
Filesize
220KB
MD5a5b0e92b1b747f414a537db898b335d0
SHA1b6ad79bcc29e96aa3338ab06b9610491736318bf
SHA25650718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8
SHA51257bb29206f48856fc23a02eb85a8bc08ad460dde82adb1f2e572912b9ed72fa1fc461bcdcbc4fcae57c58424fd2be77737551ae42b1474c4dbaff056a81cc150
-
Filesize
220KB
MD5a5b0e92b1b747f414a537db898b335d0
SHA1b6ad79bcc29e96aa3338ab06b9610491736318bf
SHA25650718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8
SHA51257bb29206f48856fc23a02eb85a8bc08ad460dde82adb1f2e572912b9ed72fa1fc461bcdcbc4fcae57c58424fd2be77737551ae42b1474c4dbaff056a81cc150
-
Filesize
220KB
MD5a5b0e92b1b747f414a537db898b335d0
SHA1b6ad79bcc29e96aa3338ab06b9610491736318bf
SHA25650718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8
SHA51257bb29206f48856fc23a02eb85a8bc08ad460dde82adb1f2e572912b9ed72fa1fc461bcdcbc4fcae57c58424fd2be77737551ae42b1474c4dbaff056a81cc150
-
Filesize
220KB
MD5a5b0e92b1b747f414a537db898b335d0
SHA1b6ad79bcc29e96aa3338ab06b9610491736318bf
SHA25650718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8
SHA51257bb29206f48856fc23a02eb85a8bc08ad460dde82adb1f2e572912b9ed72fa1fc461bcdcbc4fcae57c58424fd2be77737551ae42b1474c4dbaff056a81cc150
-
Filesize
220KB
MD5a5b0e92b1b747f414a537db898b335d0
SHA1b6ad79bcc29e96aa3338ab06b9610491736318bf
SHA25650718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8
SHA51257bb29206f48856fc23a02eb85a8bc08ad460dde82adb1f2e572912b9ed72fa1fc461bcdcbc4fcae57c58424fd2be77737551ae42b1474c4dbaff056a81cc150
-
Filesize
220KB
MD5a5b0e92b1b747f414a537db898b335d0
SHA1b6ad79bcc29e96aa3338ab06b9610491736318bf
SHA25650718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8
SHA51257bb29206f48856fc23a02eb85a8bc08ad460dde82adb1f2e572912b9ed72fa1fc461bcdcbc4fcae57c58424fd2be77737551ae42b1474c4dbaff056a81cc150
-
Filesize
220KB
MD5a5b0e92b1b747f414a537db898b335d0
SHA1b6ad79bcc29e96aa3338ab06b9610491736318bf
SHA25650718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8
SHA51257bb29206f48856fc23a02eb85a8bc08ad460dde82adb1f2e572912b9ed72fa1fc461bcdcbc4fcae57c58424fd2be77737551ae42b1474c4dbaff056a81cc150
-
Filesize
220KB
MD5a5b0e92b1b747f414a537db898b335d0
SHA1b6ad79bcc29e96aa3338ab06b9610491736318bf
SHA25650718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8
SHA51257bb29206f48856fc23a02eb85a8bc08ad460dde82adb1f2e572912b9ed72fa1fc461bcdcbc4fcae57c58424fd2be77737551ae42b1474c4dbaff056a81cc150
-
Filesize
220KB
MD5a5b0e92b1b747f414a537db898b335d0
SHA1b6ad79bcc29e96aa3338ab06b9610491736318bf
SHA25650718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8
SHA51257bb29206f48856fc23a02eb85a8bc08ad460dde82adb1f2e572912b9ed72fa1fc461bcdcbc4fcae57c58424fd2be77737551ae42b1474c4dbaff056a81cc150
-
Filesize
220KB
MD5a5b0e92b1b747f414a537db898b335d0
SHA1b6ad79bcc29e96aa3338ab06b9610491736318bf
SHA25650718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8
SHA51257bb29206f48856fc23a02eb85a8bc08ad460dde82adb1f2e572912b9ed72fa1fc461bcdcbc4fcae57c58424fd2be77737551ae42b1474c4dbaff056a81cc150
-
Filesize
220KB
MD5a5b0e92b1b747f414a537db898b335d0
SHA1b6ad79bcc29e96aa3338ab06b9610491736318bf
SHA25650718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8
SHA51257bb29206f48856fc23a02eb85a8bc08ad460dde82adb1f2e572912b9ed72fa1fc461bcdcbc4fcae57c58424fd2be77737551ae42b1474c4dbaff056a81cc150
-
Filesize
220KB
MD5a5b0e92b1b747f414a537db898b335d0
SHA1b6ad79bcc29e96aa3338ab06b9610491736318bf
SHA25650718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8
SHA51257bb29206f48856fc23a02eb85a8bc08ad460dde82adb1f2e572912b9ed72fa1fc461bcdcbc4fcae57c58424fd2be77737551ae42b1474c4dbaff056a81cc150
-
Filesize
220KB
MD5a5b0e92b1b747f414a537db898b335d0
SHA1b6ad79bcc29e96aa3338ab06b9610491736318bf
SHA25650718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8
SHA51257bb29206f48856fc23a02eb85a8bc08ad460dde82adb1f2e572912b9ed72fa1fc461bcdcbc4fcae57c58424fd2be77737551ae42b1474c4dbaff056a81cc150
-
Filesize
220KB
MD5a5b0e92b1b747f414a537db898b335d0
SHA1b6ad79bcc29e96aa3338ab06b9610491736318bf
SHA25650718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8
SHA51257bb29206f48856fc23a02eb85a8bc08ad460dde82adb1f2e572912b9ed72fa1fc461bcdcbc4fcae57c58424fd2be77737551ae42b1474c4dbaff056a81cc150
-
Filesize
220KB
MD5a5b0e92b1b747f414a537db898b335d0
SHA1b6ad79bcc29e96aa3338ab06b9610491736318bf
SHA25650718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8
SHA51257bb29206f48856fc23a02eb85a8bc08ad460dde82adb1f2e572912b9ed72fa1fc461bcdcbc4fcae57c58424fd2be77737551ae42b1474c4dbaff056a81cc150
-
Filesize
220KB
MD5a5b0e92b1b747f414a537db898b335d0
SHA1b6ad79bcc29e96aa3338ab06b9610491736318bf
SHA25650718e9347cf2d29d0b48529fbfc25e57a58fff7ae64c7c1bbde28d9a1cdd5c8
SHA51257bb29206f48856fc23a02eb85a8bc08ad460dde82adb1f2e572912b9ed72fa1fc461bcdcbc4fcae57c58424fd2be77737551ae42b1474c4dbaff056a81cc150