Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
23-09-2023 23:59
Static task
static1
Behavioral task
behavioral1
Sample
436433b28ed3f1193f8fbcd52a80edde7ee113277c2d1f12a598a7b6709fd881.exe
Resource
win10v2004-20230915-en
General
-
Target
436433b28ed3f1193f8fbcd52a80edde7ee113277c2d1f12a598a7b6709fd881.exe
-
Size
1.0MB
-
MD5
e0a9a9f2fed093d1edfac215a6a9f972
-
SHA1
436829decacbc7a11ea2bbed13e74e8052301904
-
SHA256
436433b28ed3f1193f8fbcd52a80edde7ee113277c2d1f12a598a7b6709fd881
-
SHA512
50fe0e1631d92d467ed45eb5bc9452f5e09b4ffd8124ccd60a35601adb88d6ff19311514290136d61ef84e7bd4c3eb6136370f864f8608d80aa8f18bcc571282
-
SSDEEP
24576:CyS4VmGer7Nd/3lwx4CGjvNSXwp2xb2GAB:plA9r7b/Gx4jjvNSQG
Malware Config
Extracted
redline
nanya
77.91.124.82:19071
-
auth_value
640aa5afe54f566d8795f0dc723f8b52
Extracted
amadey
3.89
http://77.91.68.52/mac/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explonde.exe
-
strings_key
916aae73606d7a9e02a1d3b47c199688
Extracted
smokeloader
2022
http://servermlogs27.xyz/statweb255/
http://servmblog45.xyz/statweb255/
http://demblog575.xyz/statweb255/
http://admlogs85x.xyz/statweb255/
http://blogmstat389.xyz/statweb255/
http://blogmstat255.xyz/statweb255/
Extracted
C:\info.hta
class='mark'>[email protected]</span></div>
http://www.w3.org/TR/html4/strict.dtd'>
Signatures
-
Ammyy Admin
Remote admin tool with various capabilities.
-
AmmyyAdmin payload 2 IoCs
Processes:
resource yara_rule behavioral1/files/0x0006000000023297-8598.dat family_ammyyadmin behavioral1/files/0x0006000000023297-8995.dat family_ammyyadmin -
Detect rhadamanthys stealer shellcode 5 IoCs
Processes:
resource yara_rule behavioral1/memory/4548-122-0x00000000031D0000-0x00000000035D0000-memory.dmp family_rhadamanthys behavioral1/memory/4548-125-0x00000000031D0000-0x00000000035D0000-memory.dmp family_rhadamanthys behavioral1/memory/4548-124-0x00000000031D0000-0x00000000035D0000-memory.dmp family_rhadamanthys behavioral1/memory/4548-126-0x00000000031D0000-0x00000000035D0000-memory.dmp family_rhadamanthys behavioral1/memory/4548-135-0x00000000031D0000-0x00000000035D0000-memory.dmp family_rhadamanthys -
Detects Healer an antivirus disabler dropper 1 IoCs
Processes:
resource yara_rule behavioral1/memory/452-35-0x0000000000400000-0x000000000040A000-memory.dmp healer -
FlawedAmmyy RAT
Remote-access trojan based on leaked code for the Ammyy remote admin software.
-
Processes:
AppLaunch.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe -
Phobos
Phobos ransomware appeared at the beginning of 2019.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/4356-48-0x0000000000400000-0x0000000000430000-memory.dmp family_redline -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
rh111.exedescription pid Process procid_target PID 4548 created 2568 4548 rh111.exe 44 -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 4 IoCs
Processes:
bcdedit.exebcdedit.exebcdedit.exebcdedit.exepid Process 4992 bcdedit.exe 4876 bcdedit.exe 5524 bcdedit.exe 5564 bcdedit.exe -
Renames multiple (470) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Processes:
wbadmin.exewbadmin.exepid Process 3388 wbadmin.exe 5604 wbadmin.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 1 TTPs 2 IoCs
-
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
t6979127.exeexplonde.exeu4772192.exelegota.exesvchost.exeU`Y4C.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation t6979127.exe Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation explonde.exe Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation u4772192.exe Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation legota.exe Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation U`Y4C.exe -
Drops startup file 2 IoCs
Processes:
U`Y4C.exedescription ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini U`Y4C.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id[0F40F3B1-3483].[[email protected]].8base U`Y4C.exe -
Executes dropped EXE 32 IoCs
Processes:
z0099674.exez0893874.exez2626359.exez9232830.exeq5059515.exer9881150.exes1984230.exet6979127.exeexplonde.exeu4772192.exelegota.exew7749071.exerh111.exerh111.exerh111.exerh111.exeU`Y4C.exe`iisMzWUXO.exeU`Y4C.exe`iisMzWUXO.exeU`Y4C.exeU`Y4C.exeexplonde.exelegota.exeAD04.exeAE9B.exeAD04.exeBB10.exesvchost.exeAE9B.exeexplonde.exelegota.exepid Process 2400 z0099674.exe 1704 z0893874.exe 4772 z2626359.exe 5112 z9232830.exe 3436 q5059515.exe 4560 r9881150.exe 4500 s1984230.exe 1636 t6979127.exe 4956 explonde.exe 464 u4772192.exe 5088 legota.exe 536 w7749071.exe 2912 rh111.exe 4252 rh111.exe 3240 rh111.exe 4548 rh111.exe 2912 U`Y4C.exe 3884 `iisMzWUXO.exe 4948 U`Y4C.exe 3224 `iisMzWUXO.exe 3380 U`Y4C.exe 4680 U`Y4C.exe 4132 explonde.exe 4240 legota.exe 3296 AD04.exe 5040 AE9B.exe 1560 AD04.exe 4136 BB10.exe 740 svchost.exe 4424 AE9B.exe 5464 explonde.exe 5712 legota.exe -
Loads dropped DLL 3 IoCs
Processes:
rundll32.exerundll32.exerundll32.exepid Process 4608 rundll32.exe 964 rundll32.exe 2108 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 9 IoCs
Processes:
explorer.execertreq.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Software\Microsoft\Office\10.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Software\Microsoft\Office\11.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Software\Microsoft\Office\12.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Adds Run key to start application 2 TTPs 7 IoCs
Processes:
z2626359.exez9232830.exeU`Y4C.exe436433b28ed3f1193f8fbcd52a80edde7ee113277c2d1f12a598a7b6709fd881.exez0099674.exez0893874.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z2626359.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z9232830.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\U`Y4C = "C:\\Users\\Admin\\AppData\\Local\\U`Y4C.exe" U`Y4C.exe Set value (str) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\U`Y4C = "C:\\Users\\Admin\\AppData\\Local\\U`Y4C.exe" U`Y4C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 436433b28ed3f1193f8fbcd52a80edde7ee113277c2d1f12a598a7b6709fd881.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z0099674.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z0893874.exe -
Drops desktop.ini file(s) 64 IoCs
Processes:
U`Y4C.exedescription ioc Process File opened for modification C:\Users\Public\Libraries\desktop.ini U`Y4C.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini U`Y4C.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini U`Y4C.exe File opened for modification C:\Users\Admin\Searches\desktop.ini U`Y4C.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini U`Y4C.exe File opened for modification C:\Users\Public\Pictures\desktop.ini U`Y4C.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini U`Y4C.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Application Shortcuts\desktop.ini U`Y4C.exe File opened for modification C:\Users\Admin\Videos\desktop.ini U`Y4C.exe File opened for modification C:\Users\Public\Downloads\desktop.ini U`Y4C.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini U`Y4C.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini U`Y4C.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini U`Y4C.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini U`Y4C.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini U`Y4C.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini U`Y4C.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini U`Y4C.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI U`Y4C.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini U`Y4C.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini U`Y4C.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini U`Y4C.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini U`Y4C.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\desktop.ini U`Y4C.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\desktop.ini U`Y4C.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini U`Y4C.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini U`Y4C.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini U`Y4C.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini U`Y4C.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-3027552071-446050021-1254071215-1000\desktop.ini U`Y4C.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-3027552071-446050021-1254071215-1000\desktop.ini U`Y4C.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini U`Y4C.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini U`Y4C.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn2\desktop.ini U`Y4C.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini U`Y4C.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini U`Y4C.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini U`Y4C.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini U`Y4C.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\System Tools\desktop.ini U`Y4C.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn1\desktop.ini U`Y4C.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini U`Y4C.exe File opened for modification C:\Users\Public\Desktop\desktop.ini U`Y4C.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini U`Y4C.exe File opened for modification C:\Users\Public\desktop.ini U`Y4C.exe File opened for modification C:\Users\Admin\Links\desktop.ini U`Y4C.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini U`Y4C.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini U`Y4C.exe File opened for modification C:\Users\Admin\Documents\desktop.ini U`Y4C.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini U`Y4C.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AccountPictures\desktop.ini U`Y4C.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini U`Y4C.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini U`Y4C.exe File opened for modification C:\Users\Public\Documents\desktop.ini U`Y4C.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini U`Y4C.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini U`Y4C.exe File opened for modification C:\Users\Admin\3D Objects\desktop.ini U`Y4C.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini U`Y4C.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini U`Y4C.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini U`Y4C.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini U`Y4C.exe File opened for modification C:\Program Files\desktop.ini U`Y4C.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\desktop.ini U`Y4C.exe File opened for modification C:\Users\Public\Videos\desktop.ini U`Y4C.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini U`Y4C.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini U`Y4C.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
svchost.exedescription ioc Process File opened for modification \??\PhysicalDrive0 svchost.exe -
Suspicious use of SetThreadContext 9 IoCs
Processes:
q5059515.exer9881150.exes1984230.exerh111.exeU`Y4C.exe`iisMzWUXO.exeU`Y4C.exeAD04.exeAE9B.exedescription pid Process procid_target PID 3436 set thread context of 452 3436 q5059515.exe 92 PID 4560 set thread context of 4672 4560 r9881150.exe 102 PID 4500 set thread context of 4356 4500 s1984230.exe 108 PID 2912 set thread context of 4548 2912 rh111.exe 140 PID 2912 set thread context of 4948 2912 U`Y4C.exe 155 PID 3884 set thread context of 3224 3884 `iisMzWUXO.exe 156 PID 3380 set thread context of 4680 3380 U`Y4C.exe 159 PID 3296 set thread context of 1560 3296 AD04.exe 184 PID 5040 set thread context of 4424 5040 AE9B.exe 192 -
Drops file in Program Files directory 64 IoCs
Processes:
U`Y4C.exedescription ioc Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\pdf-ownership-rdr-fr_fr_2x.gif.id[0F40F3B1-3483].[[email protected]].8base U`Y4C.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.PowerShell.PSReadline.dll U`Y4C.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\Assets\GamesXboxHubAppList.targetsize-60.png U`Y4C.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\AdjacencyResume.dotx U`Y4C.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftEdge.Stable_92.0.902.67_neutral__8wekyb3d8bbwe\AppxBlockMap.xml U`Y4C.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\root\ui-strings.js U`Y4C.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\css\main-selector.css U`Y4C.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\plugin.js.id[0F40F3B1-3483].[[email protected]].8base U`Y4C.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019VL_KMS_Client_AE-ppd.xrm-ms U`Y4C.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PowerPointR_Retail-ul-oob.xrm-ms.id[0F40F3B1-3483].[[email protected]].8base U`Y4C.exe File created C:\Program Files\VideoLAN\VLC\lua\http\dialogs\browse_window.html.id[0F40F3B1-3483].[[email protected]].8base U`Y4C.exe File opened for modification C:\Program Files (x86)\Microsoft.NET\RedistList\AssemblyList_4_client.xml U`Y4C.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\modules\locale\org-netbeans-modules-profiler-selector-ui_zh_CN.jar U`Y4C.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\C2RManifest.onenotemui.msi.16.en-us.xml U`Y4C.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\manifest.json.id[0F40F3B1-3483].[[email protected]].8base U`Y4C.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\en-gb\ui-strings.js.id[0F40F3B1-3483].[[email protected]].8base U`Y4C.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\modules\com-sun-tools-visualvm-profiler.jar U`Y4C.exe File created C:\Program Files\Java\jre1.8.0_66\lib\javaws.jar.id[0F40F3B1-3483].[[email protected]].8base U`Y4C.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_neutral_split.scale-100_8wekyb3d8bbwe\AppxSignature.p7x U`Y4C.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\WideTile.scale-100.png U`Y4C.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-72_altform-unplated_contrast-white.png U`Y4C.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\Assets\WindowsIcons\WindowsCameraSmallTile.scale-100.png U`Y4C.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\PointerIndicatorVertexShader.cso U`Y4C.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-coredump_ja.jar U`Y4C.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PersonaSpy\PersonaSpy.html U`Y4C.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fr\System.Data.Services.Design.resources.dll U`Y4C.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Transit\contrast-black\MedTile.scale-125.png U`Y4C.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\org-netbeans-modules-favorites.jar.id[0F40F3B1-3483].[[email protected]].8base U`Y4C.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\ca-es\ui-strings.js.id[0F40F3B1-3483].[[email protected]].8base U`Y4C.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\ja-jp\ui-strings.js.id[0F40F3B1-3483].[[email protected]].8base U`Y4C.exe File opened for modification C:\Program Files (x86)\Common Files\System\msadc\es-ES\msdaprsr.dll.mui U`Y4C.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\LargeTile.scale-200.png U`Y4C.exe File created C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000049\index.win32.bundle.map.id[0F40F3B1-3483].[[email protected]].8base U`Y4C.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\Assets\ScreenSketchSquare44x44Logo.targetsize-48_altform-unplated_contrast-white.png U`Y4C.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\org-netbeans-modules-masterfs-nio2.jar U`Y4C.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\OFFICE16\ADALPREVIOUS.DLL U`Y4C.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Analysis Services\AS OLEDB\140\dbghelp.dll U`Y4C.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\OutlookAccount.scale-100.png U`Y4C.exe File created C:\Program Files\VideoLAN\VLC\locale\zh_TW\LC_MESSAGES\vlc.mo.id[0F40F3B1-3483].[[email protected]].8base U`Y4C.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeStudentR_Trial-ul-oob.xrm-ms U`Y4C.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppPackageSmallTile.scale-100_contrast-white.png U`Y4C.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\manifests\BuiltinResearcher.xml U`Y4C.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-64_contrast-black.png U`Y4C.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\ja-jp\ui-strings.js.id[0F40F3B1-3483].[[email protected]].8base U`Y4C.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\is\LC_MESSAGES\vlc.mo U`Y4C.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Standard2019R_Retail-ul-oob.xrm-ms U`Y4C.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\MSOUC_K_COL.HXK U`Y4C.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\QUAD\QUAD.ELM.id[0F40F3B1-3483].[[email protected]].8base U`Y4C.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ga\LC_MESSAGES\vlc.mo U`Y4C.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\Assets\MixedRealityPortalAppList.targetsize-60_altform-lightunplated.png U`Y4C.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_2019.807.41.0_neutral_~_8wekyb3d8bbwe\AppxSignature.p7x U`Y4C.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\LargeTile.scale-100.png U`Y4C.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\check.cur.id[0F40F3B1-3483].[[email protected]].8base U`Y4C.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\AppStore_icon.svg.id[0F40F3B1-3483].[[email protected]].8base U`Y4C.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\pl.pak.id[0F40F3B1-3483].[[email protected]].8base U`Y4C.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\license.html.id[0F40F3B1-3483].[[email protected]].8base U`Y4C.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.publisher.nl_zh_4.4.0.v20140623020002.jar U`Y4C.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\IRIS\IRIS.INF.id[0F40F3B1-3483].[[email protected]].8base U`Y4C.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsFeedbackHub_1.1907.3152.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\InsiderHubLargeTile.scale-125.png U`Y4C.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\RTL\contrast-white\SmallTile.scale-200.png U`Y4C.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Excel2019R_OEM_Perp-ul-phn.xrm-ms.id[0F40F3B1-3483].[[email protected]].8base U`Y4C.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\OneNote\SendToOneNote-manifest.ini U`Y4C.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.YourPhone_0.19051.7.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\AppTiles\BadgeLogo.scale-125.png U`Y4C.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherIcons\30x30\195.png U`Y4C.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 6 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target Process procid_target 1160 3436 WerFault.exe 90 3812 4560 WerFault.exe 96 2912 4672 WerFault.exe 102 1748 4500 WerFault.exe 107 276 4136 WerFault.exe 185 2916 4136 WerFault.exe 185 -
Checks SCSI registry key(s) 3 TTPs 7 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
vds.exe`iisMzWUXO.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI `iisMzWUXO.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI `iisMzWUXO.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI `iisMzWUXO.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName vds.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
certreq.exedescription ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 certreq.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString certreq.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid Process 5024 schtasks.exe 628 schtasks.exe -
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid Process 3168 vssadmin.exe 4208 vssadmin.exe -
Modifies registry class 3 IoCs
Processes:
Explorer.EXEU`Y4C.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings U`Y4C.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
AppLaunch.exerh111.exerh111.execertreq.exe`iisMzWUXO.exeExplorer.EXEU`Y4C.exepid Process 452 AppLaunch.exe 452 AppLaunch.exe 2912 rh111.exe 2912 rh111.exe 2912 rh111.exe 2912 rh111.exe 2912 rh111.exe 4548 rh111.exe 4548 rh111.exe 4548 rh111.exe 4548 rh111.exe 3352 certreq.exe 3352 certreq.exe 3352 certreq.exe 3352 certreq.exe 3224 `iisMzWUXO.exe 3224 `iisMzWUXO.exe 2568 Explorer.EXE 2568 Explorer.EXE 2568 Explorer.EXE 2568 Explorer.EXE 4948 U`Y4C.exe 4948 U`Y4C.exe 2568 Explorer.EXE 2568 Explorer.EXE 2568 Explorer.EXE 2568 Explorer.EXE 2568 Explorer.EXE 2568 Explorer.EXE 2568 Explorer.EXE 2568 Explorer.EXE 2568 Explorer.EXE 2568 Explorer.EXE 4948 U`Y4C.exe 4948 U`Y4C.exe 2568 Explorer.EXE 2568 Explorer.EXE 2568 Explorer.EXE 2568 Explorer.EXE 2568 Explorer.EXE 2568 Explorer.EXE 2568 Explorer.EXE 2568 Explorer.EXE 2568 Explorer.EXE 2568 Explorer.EXE 2568 Explorer.EXE 2568 Explorer.EXE 4948 U`Y4C.exe 4948 U`Y4C.exe 2568 Explorer.EXE 2568 Explorer.EXE 2568 Explorer.EXE 2568 Explorer.EXE 2568 Explorer.EXE 2568 Explorer.EXE 2568 Explorer.EXE 2568 Explorer.EXE 2568 Explorer.EXE 2568 Explorer.EXE 4948 U`Y4C.exe 4948 U`Y4C.exe 2568 Explorer.EXE 2568 Explorer.EXE 2568 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid Process 2568 Explorer.EXE -
Suspicious behavior: MapViewOfSection 33 IoCs
Processes:
`iisMzWUXO.exeExplorer.EXEexplorer.exepid Process 3224 `iisMzWUXO.exe 2568 Explorer.EXE 2568 Explorer.EXE 2568 Explorer.EXE 2568 Explorer.EXE 2568 Explorer.EXE 2568 Explorer.EXE 2568 Explorer.EXE 2568 Explorer.EXE 2568 Explorer.EXE 2568 Explorer.EXE 2568 Explorer.EXE 2568 Explorer.EXE 2568 Explorer.EXE 2568 Explorer.EXE 2568 Explorer.EXE 2568 Explorer.EXE 2568 Explorer.EXE 2568 Explorer.EXE 2568 Explorer.EXE 2568 Explorer.EXE 2568 Explorer.EXE 2568 Explorer.EXE 2568 Explorer.EXE 2568 Explorer.EXE 2568 Explorer.EXE 2568 Explorer.EXE 2568 Explorer.EXE 2568 Explorer.EXE 2568 Explorer.EXE 2568 Explorer.EXE 2616 explorer.exe 2616 explorer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
AppLaunch.exerh111.exeU`Y4C.exe`iisMzWUXO.exeU`Y4C.exeU`Y4C.exevssvc.exeWMIC.exewbengine.exeExplorer.EXEAD04.exeAE9B.exeBB10.exedescription pid Process Token: SeDebugPrivilege 452 AppLaunch.exe Token: SeDebugPrivilege 2912 rh111.exe Token: SeDebugPrivilege 2912 U`Y4C.exe Token: SeDebugPrivilege 3884 `iisMzWUXO.exe Token: SeDebugPrivilege 3380 U`Y4C.exe Token: SeDebugPrivilege 4948 U`Y4C.exe Token: SeBackupPrivilege 864 vssvc.exe Token: SeRestorePrivilege 864 vssvc.exe Token: SeAuditPrivilege 864 vssvc.exe Token: SeIncreaseQuotaPrivilege 3312 WMIC.exe Token: SeSecurityPrivilege 3312 WMIC.exe Token: SeTakeOwnershipPrivilege 3312 WMIC.exe Token: SeLoadDriverPrivilege 3312 WMIC.exe Token: SeSystemProfilePrivilege 3312 WMIC.exe Token: SeSystemtimePrivilege 3312 WMIC.exe Token: SeProfSingleProcessPrivilege 3312 WMIC.exe Token: SeIncBasePriorityPrivilege 3312 WMIC.exe Token: SeCreatePagefilePrivilege 3312 WMIC.exe Token: SeBackupPrivilege 3312 WMIC.exe Token: SeRestorePrivilege 3312 WMIC.exe Token: SeShutdownPrivilege 3312 WMIC.exe Token: SeDebugPrivilege 3312 WMIC.exe Token: SeSystemEnvironmentPrivilege 3312 WMIC.exe Token: SeRemoteShutdownPrivilege 3312 WMIC.exe Token: SeUndockPrivilege 3312 WMIC.exe Token: SeManageVolumePrivilege 3312 WMIC.exe Token: 33 3312 WMIC.exe Token: 34 3312 WMIC.exe Token: 35 3312 WMIC.exe Token: 36 3312 WMIC.exe Token: SeIncreaseQuotaPrivilege 3312 WMIC.exe Token: SeSecurityPrivilege 3312 WMIC.exe Token: SeTakeOwnershipPrivilege 3312 WMIC.exe Token: SeLoadDriverPrivilege 3312 WMIC.exe Token: SeSystemProfilePrivilege 3312 WMIC.exe Token: SeSystemtimePrivilege 3312 WMIC.exe Token: SeProfSingleProcessPrivilege 3312 WMIC.exe Token: SeIncBasePriorityPrivilege 3312 WMIC.exe Token: SeCreatePagefilePrivilege 3312 WMIC.exe Token: SeBackupPrivilege 3312 WMIC.exe Token: SeRestorePrivilege 3312 WMIC.exe Token: SeShutdownPrivilege 3312 WMIC.exe Token: SeDebugPrivilege 3312 WMIC.exe Token: SeSystemEnvironmentPrivilege 3312 WMIC.exe Token: SeRemoteShutdownPrivilege 3312 WMIC.exe Token: SeUndockPrivilege 3312 WMIC.exe Token: SeManageVolumePrivilege 3312 WMIC.exe Token: 33 3312 WMIC.exe Token: 34 3312 WMIC.exe Token: 35 3312 WMIC.exe Token: 36 3312 WMIC.exe Token: SeBackupPrivilege 4680 wbengine.exe Token: SeRestorePrivilege 4680 wbengine.exe Token: SeSecurityPrivilege 4680 wbengine.exe Token: SeShutdownPrivilege 2568 Explorer.EXE Token: SeCreatePagefilePrivilege 2568 Explorer.EXE Token: SeShutdownPrivilege 2568 Explorer.EXE Token: SeCreatePagefilePrivilege 2568 Explorer.EXE Token: SeDebugPrivilege 3296 AD04.exe Token: SeDebugPrivilege 5040 AE9B.exe Token: SeDebugPrivilege 4136 BB10.exe Token: SeShutdownPrivilege 2568 Explorer.EXE Token: SeCreatePagefilePrivilege 2568 Explorer.EXE Token: SeShutdownPrivilege 2568 Explorer.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
svchost.exepid Process 740 svchost.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid Process 2568 Explorer.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
436433b28ed3f1193f8fbcd52a80edde7ee113277c2d1f12a598a7b6709fd881.exez0099674.exez0893874.exez2626359.exez9232830.exeq5059515.exer9881150.exes1984230.exet6979127.exeexplonde.exedescription pid Process procid_target PID 4292 wrote to memory of 2400 4292 436433b28ed3f1193f8fbcd52a80edde7ee113277c2d1f12a598a7b6709fd881.exe 86 PID 4292 wrote to memory of 2400 4292 436433b28ed3f1193f8fbcd52a80edde7ee113277c2d1f12a598a7b6709fd881.exe 86 PID 4292 wrote to memory of 2400 4292 436433b28ed3f1193f8fbcd52a80edde7ee113277c2d1f12a598a7b6709fd881.exe 86 PID 2400 wrote to memory of 1704 2400 z0099674.exe 87 PID 2400 wrote to memory of 1704 2400 z0099674.exe 87 PID 2400 wrote to memory of 1704 2400 z0099674.exe 87 PID 1704 wrote to memory of 4772 1704 z0893874.exe 88 PID 1704 wrote to memory of 4772 1704 z0893874.exe 88 PID 1704 wrote to memory of 4772 1704 z0893874.exe 88 PID 4772 wrote to memory of 5112 4772 z2626359.exe 89 PID 4772 wrote to memory of 5112 4772 z2626359.exe 89 PID 4772 wrote to memory of 5112 4772 z2626359.exe 89 PID 5112 wrote to memory of 3436 5112 z9232830.exe 90 PID 5112 wrote to memory of 3436 5112 z9232830.exe 90 PID 5112 wrote to memory of 3436 5112 z9232830.exe 90 PID 3436 wrote to memory of 1968 3436 q5059515.exe 91 PID 3436 wrote to memory of 1968 3436 q5059515.exe 91 PID 3436 wrote to memory of 1968 3436 q5059515.exe 91 PID 3436 wrote to memory of 452 3436 q5059515.exe 92 PID 3436 wrote to memory of 452 3436 q5059515.exe 92 PID 3436 wrote to memory of 452 3436 q5059515.exe 92 PID 3436 wrote to memory of 452 3436 q5059515.exe 92 PID 3436 wrote to memory of 452 3436 q5059515.exe 92 PID 3436 wrote to memory of 452 3436 q5059515.exe 92 PID 3436 wrote to memory of 452 3436 q5059515.exe 92 PID 3436 wrote to memory of 452 3436 q5059515.exe 92 PID 5112 wrote to memory of 4560 5112 z9232830.exe 96 PID 5112 wrote to memory of 4560 5112 z9232830.exe 96 PID 5112 wrote to memory of 4560 5112 z9232830.exe 96 PID 4560 wrote to memory of 4672 4560 r9881150.exe 102 PID 4560 wrote to memory of 4672 4560 r9881150.exe 102 PID 4560 wrote to memory of 4672 4560 r9881150.exe 102 PID 4560 wrote to memory of 4672 4560 r9881150.exe 102 PID 4560 wrote to memory of 4672 4560 r9881150.exe 102 PID 4560 wrote to memory of 4672 4560 r9881150.exe 102 PID 4560 wrote to memory of 4672 4560 r9881150.exe 102 PID 4560 wrote to memory of 4672 4560 r9881150.exe 102 PID 4560 wrote to memory of 4672 4560 r9881150.exe 102 PID 4560 wrote to memory of 4672 4560 r9881150.exe 102 PID 4772 wrote to memory of 4500 4772 z2626359.exe 107 PID 4772 wrote to memory of 4500 4772 z2626359.exe 107 PID 4772 wrote to memory of 4500 4772 z2626359.exe 107 PID 4500 wrote to memory of 4356 4500 s1984230.exe 108 PID 4500 wrote to memory of 4356 4500 s1984230.exe 108 PID 4500 wrote to memory of 4356 4500 s1984230.exe 108 PID 4500 wrote to memory of 4356 4500 s1984230.exe 108 PID 4500 wrote to memory of 4356 4500 s1984230.exe 108 PID 4500 wrote to memory of 4356 4500 s1984230.exe 108 PID 4500 wrote to memory of 4356 4500 s1984230.exe 108 PID 4500 wrote to memory of 4356 4500 s1984230.exe 108 PID 1704 wrote to memory of 1636 1704 z0893874.exe 111 PID 1704 wrote to memory of 1636 1704 z0893874.exe 111 PID 1704 wrote to memory of 1636 1704 z0893874.exe 111 PID 1636 wrote to memory of 4956 1636 t6979127.exe 112 PID 1636 wrote to memory of 4956 1636 t6979127.exe 112 PID 1636 wrote to memory of 4956 1636 t6979127.exe 112 PID 2400 wrote to memory of 464 2400 z0099674.exe 113 PID 2400 wrote to memory of 464 2400 z0099674.exe 113 PID 2400 wrote to memory of 464 2400 z0099674.exe 113 PID 4956 wrote to memory of 5024 4956 explonde.exe 114 PID 4956 wrote to memory of 5024 4956 explonde.exe 114 PID 4956 wrote to memory of 5024 4956 explonde.exe 114 PID 4956 wrote to memory of 1832 4956 explonde.exe 116 PID 4956 wrote to memory of 1832 4956 explonde.exe 116 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
outlook_office_path 1 IoCs
Processes:
explorer.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
Processes:
explorer.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\436433b28ed3f1193f8fbcd52a80edde7ee113277c2d1f12a598a7b6709fd881.exe"C:\Users\Admin\AppData\Local\Temp\436433b28ed3f1193f8fbcd52a80edde7ee113277c2d1f12a598a7b6709fd881.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0099674.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0099674.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0893874.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0893874.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2626359.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2626359.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9232830.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9232830.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5059515.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5059515.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵PID:1968
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3436 -s 5728⤵
- Program crash
PID:1160
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r9881150.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r9881150.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵PID:4672
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4672 -s 5409⤵
- Program crash
PID:2912
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4560 -s 5528⤵
- Program crash
PID:3812
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s1984230.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s1984230.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:4356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4500 -s 5807⤵
- Program crash
PID:1748
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t6979127.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t6979127.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explonde.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe" /F7⤵
- Creates scheduled task(s)
PID:5024
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explonde.exe" /P "Admin:N"&&CACLS "explonde.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit7⤵PID:1832
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:3296
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:N"8⤵PID:2188
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:R" /E8⤵PID:4180
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"8⤵PID:2532
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:8
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E8⤵PID:3340
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:4608
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u4772192.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u4772192.exe4⤵
- Checks computer location settings
- Executes dropped EXE
PID:464 -
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
PID:5088 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F6⤵
- Creates scheduled task(s)
PID:628
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit6⤵PID:1492
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4816
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"7⤵PID:2744
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E7⤵PID:2124
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:1172
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"7⤵PID:3312
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E7⤵PID:2932
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000058001\rh111.exe"C:\Users\Admin\AppData\Local\Temp\1000058001\rh111.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\1000058001\rh111.exeC:\Users\Admin\AppData\Local\Temp\1000058001\rh111.exe7⤵
- Executes dropped EXE
PID:4252
-
-
C:\Users\Admin\AppData\Local\Temp\1000058001\rh111.exeC:\Users\Admin\AppData\Local\Temp\1000058001\rh111.exe7⤵
- Executes dropped EXE
PID:3240
-
-
C:\Users\Admin\AppData\Local\Temp\1000058001\rh111.exeC:\Users\Admin\AppData\Local\Temp\1000058001\rh111.exe7⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4548
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main6⤵
- Loads dropped DLL
PID:964
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w7749071.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w7749071.exe3⤵
- Executes dropped EXE
PID:536
-
-
-
C:\Windows\system32\certreq.exe"C:\Windows\system32\certreq.exe"2⤵
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3352
-
-
C:\Users\Admin\AppData\Local\Temp\AD04.exeC:\Users\Admin\AppData\Local\Temp\AD04.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:3296 -
C:\Users\Admin\AppData\Local\Temp\AD04.exeC:\Users\Admin\AppData\Local\Temp\AD04.exe3⤵
- Executes dropped EXE
PID:1560
-
-
-
C:\Users\Admin\AppData\Local\Temp\AE9B.exeC:\Users\Admin\AppData\Local\Temp\AE9B.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\AE9B.exe"C:\Users\Admin\AppData\Local\Temp\AE9B.exe"3⤵
- Executes dropped EXE
PID:4424
-
-
-
C:\Users\Admin\AppData\Local\Temp\BB10.exeC:\Users\Admin\AppData\Local\Temp\BB10.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4136 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 19163⤵
- Program crash
PID:276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 19163⤵
- Program crash
PID:2916
-
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:4940
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:3460
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:904
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:2712
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:4420
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:4304
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:1804
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:2912
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:3716
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:812
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:2916
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:2188
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:4144
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:1832
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵
- Suspicious behavior: MapViewOfSection
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\F8D2.tmp\svchost.exeC:\Users\Admin\AppData\Local\Temp\F8D2.tmp\svchost.exe -debug3⤵
- Checks computer location settings
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of FindShellTrayWindow
PID:740 -
C:\Windows\SYSTEM32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\F8D2.tmp\aa_nts.dll",run4⤵
- Loads dropped DLL
PID:2108
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3436 -ip 34361⤵PID:2296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4560 -ip 45601⤵PID:2796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 372 -p 4672 -ip 46721⤵PID:2404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 4500 -ip 45001⤵PID:4348
-
C:\Users\Admin\AppData\Local\Microsoft\U`Y4C.exe"C:\Users\Admin\AppData\Local\Microsoft\U`Y4C.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2912 -
C:\Users\Admin\AppData\Local\Microsoft\U`Y4C.exeC:\Users\Admin\AppData\Local\Microsoft\U`Y4C.exe2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4948 -
C:\Users\Admin\AppData\Local\Microsoft\U`Y4C.exe"C:\Users\Admin\AppData\Local\Microsoft\U`Y4C.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:3380 -
C:\Users\Admin\AppData\Local\Microsoft\U`Y4C.exeC:\Users\Admin\AppData\Local\Microsoft\U`Y4C.exe4⤵
- Executes dropped EXE
PID:4680
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵PID:2288
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:3168
-
-
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3312
-
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures4⤵
- Modifies boot configuration data using bcdedit
PID:4992
-
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled no4⤵
- Modifies boot configuration data using bcdedit
PID:4876
-
-
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet4⤵
- Deletes backup catalog
PID:3388
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵PID:1788
-
C:\Windows\system32\netsh.exenetsh advfirewall set currentprofile state off4⤵
- Modifies Windows Firewall
PID:436
-
-
C:\Windows\system32\netsh.exenetsh firewall set opmode mode=disable4⤵
- Modifies Windows Firewall
PID:2440
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\info.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}3⤵PID:1756
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\users\public\desktop\info.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}3⤵PID:2984
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\info.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}3⤵PID:5400
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "F:\info.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}3⤵PID:5276
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵PID:5768
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:4208
-
-
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete4⤵PID:5484
-
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures4⤵
- Modifies boot configuration data using bcdedit
PID:5524
-
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled no4⤵
- Modifies boot configuration data using bcdedit
PID:5564
-
-
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet4⤵
- Deletes backup catalog
PID:5604
-
-
-
-
C:\Users\Admin\AppData\Local\Microsoft\`iisMzWUXO.exe"C:\Users\Admin\AppData\Local\Microsoft\`iisMzWUXO.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:3884 -
C:\Users\Admin\AppData\Local\Microsoft\`iisMzWUXO.exeC:\Users\Admin\AppData\Local\Microsoft\`iisMzWUXO.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3224
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:864
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4680
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:4132
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Checks SCSI registry key(s)
PID:4412
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:4240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 4136 -ip 41361⤵PID:4280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4136 -ip 41361⤵PID:544
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:5464
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:5712
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Defense Evasion
Impair Defenses
1Disable or Modify Tools
1Indicator Removal
3File Deletion
3Modify Registry
2Pre-OS Boot
1Bootkit
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Common Files\microsoft shared\ClickToRun\AppvIsvSubsystems32.dll.id[0F40F3B1-3483].[[email protected]].8base
Filesize2.7MB
MD515c25be045cf0098694603a8d002bab2
SHA148baa29384e7679615249a8a07ac2be0102cfad0
SHA256193311a935c127ea9f651d40d1d55b9dab218e98492e7b1c76fd6c053aaf1675
SHA512b4aad21364af1c28d7af7ec2eeb34425d94553c9f298ca3fbea39a0283b7ada8ee6d8f71cd0b1338f5d9cd55713c440a83c4f23ac0cdba26d331adc7aae6f768
-
Filesize
927B
MD54a911455784f74e368a4c2c7876d76f4
SHA1a1700a0849ffb4f26671eb76da2489946b821c34
SHA256264098e15b5b33d425f3b76e45b7976b58f917048125041135f7e60d8151108c
SHA5124617591400409e1930195795a55e20d5f063042bb3e9fd1955099066e507b6ac8a1e3ae54cc42418e2639149b31bf7e58cd5743670d9030a15e29f14d813815d
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
927B
MD54a911455784f74e368a4c2c7876d76f4
SHA1a1700a0849ffb4f26671eb76da2489946b821c34
SHA256264098e15b5b33d425f3b76e45b7976b58f917048125041135f7e60d8151108c
SHA5124617591400409e1930195795a55e20d5f063042bb3e9fd1955099066e507b6ac8a1e3ae54cc42418e2639149b31bf7e58cd5743670d9030a15e29f14d813815d
-
Filesize
927B
MD54a911455784f74e368a4c2c7876d76f4
SHA1a1700a0849ffb4f26671eb76da2489946b821c34
SHA256264098e15b5b33d425f3b76e45b7976b58f917048125041135f7e60d8151108c
SHA5124617591400409e1930195795a55e20d5f063042bb3e9fd1955099066e507b6ac8a1e3ae54cc42418e2639149b31bf7e58cd5743670d9030a15e29f14d813815d
-
Filesize
927B
MD54a911455784f74e368a4c2c7876d76f4
SHA1a1700a0849ffb4f26671eb76da2489946b821c34
SHA256264098e15b5b33d425f3b76e45b7976b58f917048125041135f7e60d8151108c
SHA5124617591400409e1930195795a55e20d5f063042bb3e9fd1955099066e507b6ac8a1e3ae54cc42418e2639149b31bf7e58cd5743670d9030a15e29f14d813815d
-
Filesize
262KB
MD55d2b3f808075ab6e605f4242d9c7a398
SHA12b0d4edf8ab7b84e7f8b5e05a18b39bf3ee5cf5b
SHA25632d1458fb5c0c08156568a658f30143786336a73dea1d76bef9becf4a55c0964
SHA512901a107dd865c14752cc61cfe9a08c5b50729a49d47b7010a03f44f5f3d51d9909c162bdd330771d9aa27f462f085fb2307543a8a28a62b46ed68ac7c037f797
-
Filesize
262KB
MD55d2b3f808075ab6e605f4242d9c7a398
SHA12b0d4edf8ab7b84e7f8b5e05a18b39bf3ee5cf5b
SHA25632d1458fb5c0c08156568a658f30143786336a73dea1d76bef9becf4a55c0964
SHA512901a107dd865c14752cc61cfe9a08c5b50729a49d47b7010a03f44f5f3d51d9909c162bdd330771d9aa27f462f085fb2307543a8a28a62b46ed68ac7c037f797
-
Filesize
262KB
MD55d2b3f808075ab6e605f4242d9c7a398
SHA12b0d4edf8ab7b84e7f8b5e05a18b39bf3ee5cf5b
SHA25632d1458fb5c0c08156568a658f30143786336a73dea1d76bef9becf4a55c0964
SHA512901a107dd865c14752cc61cfe9a08c5b50729a49d47b7010a03f44f5f3d51d9909c162bdd330771d9aa27f462f085fb2307543a8a28a62b46ed68ac7c037f797
-
Filesize
262KB
MD55d2b3f808075ab6e605f4242d9c7a398
SHA12b0d4edf8ab7b84e7f8b5e05a18b39bf3ee5cf5b
SHA25632d1458fb5c0c08156568a658f30143786336a73dea1d76bef9becf4a55c0964
SHA512901a107dd865c14752cc61cfe9a08c5b50729a49d47b7010a03f44f5f3d51d9909c162bdd330771d9aa27f462f085fb2307543a8a28a62b46ed68ac7c037f797
-
Filesize
262KB
MD55d2b3f808075ab6e605f4242d9c7a398
SHA12b0d4edf8ab7b84e7f8b5e05a18b39bf3ee5cf5b
SHA25632d1458fb5c0c08156568a658f30143786336a73dea1d76bef9becf4a55c0964
SHA512901a107dd865c14752cc61cfe9a08c5b50729a49d47b7010a03f44f5f3d51d9909c162bdd330771d9aa27f462f085fb2307543a8a28a62b46ed68ac7c037f797
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Caches\{3DA71D5A-20CC-432F-A115-DFE92379E91F}.3.ver0x0000000000000026.db.id[0F40F3B1-3483].[[email protected]].8base
Filesize92KB
MD515d9e49287bb5629ccd106b02fe3d0d4
SHA11fa4790ac2056a9d5c20d4396a8963adcdb35ce1
SHA2567f40a0f612f7179f94eedc1d59f2efc0e8af2cbdb3180eafcdd665ffc2bffb23
SHA51243c34ba6f48f919ef52e91a9ccb450da29e132831dfc889b5be32a12b879f6e41bd3d196a403453505c173d5150c90216a725e8eabe11c140917ae19c746b08a
-
Filesize
2.6MB
MD5da5b9806aea6346221df3cf8c76814f8
SHA1fd177d2e9ca22b6329f73d908e21a4c7de639f3d
SHA256d3fde9b1b31dd3c14eceb149fddb8caf4965fd11fa8adbfcb672e0ea0b502839
SHA512b66af8a9bc9818ddcefe8156aa904c3afab286f9873a5ad282c4d32e0e5e58219a251721a1003acf85607e5b3395e21a371a0181a93bfa4eb95c1f197449cf84
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
250KB
MD5f303bcd11ab0d3f55980064dee528ab5
SHA1815aaa887d7991ec9dcda8f0e1adea12f76aa789
SHA25621fb9e94c2c0cd34955a9315539053cf736135254de72bfab497c88d01ee76f0
SHA512371cc13d036b31ac71cd19c308d4e608e3225380c57de9d8448fb5849ad1c465ea51de1c9bd39d8570a807f5222c2853e5c10a59583ffcc96cffe52765741cf6
-
Filesize
250KB
MD5f303bcd11ab0d3f55980064dee528ab5
SHA1815aaa887d7991ec9dcda8f0e1adea12f76aa789
SHA25621fb9e94c2c0cd34955a9315539053cf736135254de72bfab497c88d01ee76f0
SHA512371cc13d036b31ac71cd19c308d4e608e3225380c57de9d8448fb5849ad1c465ea51de1c9bd39d8570a807f5222c2853e5c10a59583ffcc96cffe52765741cf6
-
Filesize
250KB
MD5f303bcd11ab0d3f55980064dee528ab5
SHA1815aaa887d7991ec9dcda8f0e1adea12f76aa789
SHA25621fb9e94c2c0cd34955a9315539053cf736135254de72bfab497c88d01ee76f0
SHA512371cc13d036b31ac71cd19c308d4e608e3225380c57de9d8448fb5849ad1c465ea51de1c9bd39d8570a807f5222c2853e5c10a59583ffcc96cffe52765741cf6
-
Filesize
1.9MB
MD51b87684768db892932be3f0661c54251
SHA1e5acdb93f6eb75656c9a8242e21b01bf978dc7cf
SHA25665fcd66d75c64db0f8b7819431d77f83a421e9fd210ff6bdf74c47e7a4c39636
SHA5120fc3cc6ed99e45a3d1ca7cd2dd4d7bfc2f5f11ee7cf0e3d58bfbb4db26f16599cae45b96fc032cd6a050c1ea70bfd02291537088168dd149eee85b38d2527a82
-
Filesize
1.9MB
MD51b87684768db892932be3f0661c54251
SHA1e5acdb93f6eb75656c9a8242e21b01bf978dc7cf
SHA25665fcd66d75c64db0f8b7819431d77f83a421e9fd210ff6bdf74c47e7a4c39636
SHA5120fc3cc6ed99e45a3d1ca7cd2dd4d7bfc2f5f11ee7cf0e3d58bfbb4db26f16599cae45b96fc032cd6a050c1ea70bfd02291537088168dd149eee85b38d2527a82
-
Filesize
1.9MB
MD51b87684768db892932be3f0661c54251
SHA1e5acdb93f6eb75656c9a8242e21b01bf978dc7cf
SHA25665fcd66d75c64db0f8b7819431d77f83a421e9fd210ff6bdf74c47e7a4c39636
SHA5120fc3cc6ed99e45a3d1ca7cd2dd4d7bfc2f5f11ee7cf0e3d58bfbb4db26f16599cae45b96fc032cd6a050c1ea70bfd02291537088168dd149eee85b38d2527a82
-
Filesize
1.9MB
MD51b87684768db892932be3f0661c54251
SHA1e5acdb93f6eb75656c9a8242e21b01bf978dc7cf
SHA25665fcd66d75c64db0f8b7819431d77f83a421e9fd210ff6bdf74c47e7a4c39636
SHA5120fc3cc6ed99e45a3d1ca7cd2dd4d7bfc2f5f11ee7cf0e3d58bfbb4db26f16599cae45b96fc032cd6a050c1ea70bfd02291537088168dd149eee85b38d2527a82
-
Filesize
1.9MB
MD51b87684768db892932be3f0661c54251
SHA1e5acdb93f6eb75656c9a8242e21b01bf978dc7cf
SHA25665fcd66d75c64db0f8b7819431d77f83a421e9fd210ff6bdf74c47e7a4c39636
SHA5120fc3cc6ed99e45a3d1ca7cd2dd4d7bfc2f5f11ee7cf0e3d58bfbb4db26f16599cae45b96fc032cd6a050c1ea70bfd02291537088168dd149eee85b38d2527a82
-
Filesize
1.9MB
MD51b87684768db892932be3f0661c54251
SHA1e5acdb93f6eb75656c9a8242e21b01bf978dc7cf
SHA25665fcd66d75c64db0f8b7819431d77f83a421e9fd210ff6bdf74c47e7a4c39636
SHA5120fc3cc6ed99e45a3d1ca7cd2dd4d7bfc2f5f11ee7cf0e3d58bfbb4db26f16599cae45b96fc032cd6a050c1ea70bfd02291537088168dd149eee85b38d2527a82
-
Filesize
262KB
MD55d2b3f808075ab6e605f4242d9c7a398
SHA12b0d4edf8ab7b84e7f8b5e05a18b39bf3ee5cf5b
SHA25632d1458fb5c0c08156568a658f30143786336a73dea1d76bef9becf4a55c0964
SHA512901a107dd865c14752cc61cfe9a08c5b50729a49d47b7010a03f44f5f3d51d9909c162bdd330771d9aa27f462f085fb2307543a8a28a62b46ed68ac7c037f797
-
Filesize
262KB
MD55d2b3f808075ab6e605f4242d9c7a398
SHA12b0d4edf8ab7b84e7f8b5e05a18b39bf3ee5cf5b
SHA25632d1458fb5c0c08156568a658f30143786336a73dea1d76bef9becf4a55c0964
SHA512901a107dd865c14752cc61cfe9a08c5b50729a49d47b7010a03f44f5f3d51d9909c162bdd330771d9aa27f462f085fb2307543a8a28a62b46ed68ac7c037f797
-
Filesize
262KB
MD55d2b3f808075ab6e605f4242d9c7a398
SHA12b0d4edf8ab7b84e7f8b5e05a18b39bf3ee5cf5b
SHA25632d1458fb5c0c08156568a658f30143786336a73dea1d76bef9becf4a55c0964
SHA512901a107dd865c14752cc61cfe9a08c5b50729a49d47b7010a03f44f5f3d51d9909c162bdd330771d9aa27f462f085fb2307543a8a28a62b46ed68ac7c037f797
-
Filesize
262KB
MD55d2b3f808075ab6e605f4242d9c7a398
SHA12b0d4edf8ab7b84e7f8b5e05a18b39bf3ee5cf5b
SHA25632d1458fb5c0c08156568a658f30143786336a73dea1d76bef9becf4a55c0964
SHA512901a107dd865c14752cc61cfe9a08c5b50729a49d47b7010a03f44f5f3d51d9909c162bdd330771d9aa27f462f085fb2307543a8a28a62b46ed68ac7c037f797
-
Filesize
468KB
MD520bb118569b859e64feaaf30227e04b8
SHA13fb2c608529575ad4b06770e130eb9d2d0750ed7
SHA256c1d2e8b7b961e48a1ee4877d3f527f038697e0dfcda69b8cd470900b73e1e674
SHA512567906d7b98058ec24c1455d5167ee13127ce6739350f1f38954c01e46f96ba0851d6c88ef49a192edb53c5f759ab8663c7ac9fcc795c35db98165d11259587c
-
Filesize
468KB
MD520bb118569b859e64feaaf30227e04b8
SHA13fb2c608529575ad4b06770e130eb9d2d0750ed7
SHA256c1d2e8b7b961e48a1ee4877d3f527f038697e0dfcda69b8cd470900b73e1e674
SHA512567906d7b98058ec24c1455d5167ee13127ce6739350f1f38954c01e46f96ba0851d6c88ef49a192edb53c5f759ab8663c7ac9fcc795c35db98165d11259587c
-
Filesize
1.5MB
MD5400261992d812b24ecd3bfe79700443c
SHA1f4f0d341cc860f046b2713939c70da32944f7eda
SHA256222a5af34881bb68ffc370491a0f8d67b550cd368c49927715946365bbe8038f
SHA512ed25f5d636658f629625614a95d4bc7a999b10cb2689c38159afa5ff24afd5136119500d00ebe83d880702f9b8e560fb570d92199f56e865eccca9695b8582f9
-
Filesize
1.5MB
MD5400261992d812b24ecd3bfe79700443c
SHA1f4f0d341cc860f046b2713939c70da32944f7eda
SHA256222a5af34881bb68ffc370491a0f8d67b550cd368c49927715946365bbe8038f
SHA512ed25f5d636658f629625614a95d4bc7a999b10cb2689c38159afa5ff24afd5136119500d00ebe83d880702f9b8e560fb570d92199f56e865eccca9695b8582f9
-
Filesize
902KB
MD5480a66902e6e7cdafaa6711e8697ff8c
SHA16ac730962e7c1dba9e2ecc5733a506544f3c8d11
SHA2567eaaaa6010bbcd6bb8c9ad08d4b0966c7aedc9b2ac24758f170012ac36e508b5
SHA5127d010cd47b7d1adf66f9c97afc6c3805997aa5c7cc6ff13eddee81f24cf2b95a3fe375ec5b3d6185c0bc8840b4ad91ae143c73a39af26391cc182ab6a1793ba5
-
Filesize
902KB
MD5480a66902e6e7cdafaa6711e8697ff8c
SHA16ac730962e7c1dba9e2ecc5733a506544f3c8d11
SHA2567eaaaa6010bbcd6bb8c9ad08d4b0966c7aedc9b2ac24758f170012ac36e508b5
SHA5127d010cd47b7d1adf66f9c97afc6c3805997aa5c7cc6ff13eddee81f24cf2b95a3fe375ec5b3d6185c0bc8840b4ad91ae143c73a39af26391cc182ab6a1793ba5
-
Filesize
46B
MD53f05819f995b4dafa1b5d55ce8d1f411
SHA1404449b79a16bfc4f64f2fd55cd73d5d27a85d71
SHA2567e0bf0cbd06a087500a9c3b50254df3a8a2c2980921ab6a62ab1121941c80fc0
SHA51234abb7df8b3a68e1649ff0d2762576a4d4e65da548e74b1aa65c2b82c1b89f90d053ecddac67c614ca6084dc5b2cb552949250fb70f49b536f1bcb0057717026
-
Filesize
798KB
MD590aadf2247149996ae443e2c82af3730
SHA1050b7eba825412b24e3f02d76d7da5ae97e10502
SHA256ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a
SHA512eec32bb82b230dd309c29712e72d4469250e651449e127479d178eddbafd5a46ec8048a753bc2c1a0fdf1dc3ed72a9453ca66fb49cbf0f95a12704e5427182be
-
Filesize
798KB
MD590aadf2247149996ae443e2c82af3730
SHA1050b7eba825412b24e3f02d76d7da5ae97e10502
SHA256ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a
SHA512eec32bb82b230dd309c29712e72d4469250e651449e127479d178eddbafd5a46ec8048a753bc2c1a0fdf1dc3ed72a9453ca66fb49cbf0f95a12704e5427182be
-
Filesize
19KB
MD50fdce418bade6666b3e723b3d55d85dd
SHA1adcaad293baeeed11523f04d9f9ae9efac5f43d3
SHA256f3811b24278f849e30a675ee9b582f0787894946e002c5ed5600a81de9f38575
SHA512d80f0a9cd4020a4b39e6aedfe48f7759f7734bbe7c75bf1535e4cfbabbdb9b80f8d5a101dfeedcacfd4e03d7990426aede1a5b05a4f0994a1572d428586f26e0
-
Filesize
19KB
MD50fdce418bade6666b3e723b3d55d85dd
SHA1adcaad293baeeed11523f04d9f9ae9efac5f43d3
SHA256f3811b24278f849e30a675ee9b582f0787894946e002c5ed5600a81de9f38575
SHA512d80f0a9cd4020a4b39e6aedfe48f7759f7734bbe7c75bf1535e4cfbabbdb9b80f8d5a101dfeedcacfd4e03d7990426aede1a5b05a4f0994a1572d428586f26e0
-
Filesize
968KB
MD5ae79849236d42721859d27de957aeb3a
SHA1282fac3f4cca6c539b181261ae95724f279c3a3a
SHA25697f51996e37ea1850540a7c13d7f5333f1e35328a629b07a6f99d555cdd7dd8b
SHA512c670d372c1b9b8d8df0c2b674932fecff4835d53b446f84c2c660f0cf96d38699b71e4674197535599cd5f6516aad5b3bb6d27947ab29776db1886ea2be90d17
-
Filesize
968KB
MD5ae79849236d42721859d27de957aeb3a
SHA1282fac3f4cca6c539b181261ae95724f279c3a3a
SHA25697f51996e37ea1850540a7c13d7f5333f1e35328a629b07a6f99d555cdd7dd8b
SHA512c670d372c1b9b8d8df0c2b674932fecff4835d53b446f84c2c660f0cf96d38699b71e4674197535599cd5f6516aad5b3bb6d27947ab29776db1886ea2be90d17
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
785KB
MD50e73462e8df3509c2b0cb282d8818b48
SHA184ef7ab8bb27f60eb8d48eeef32ca382aae168af
SHA256cacb16675788a395b6d4aba5abc7f100b465a04f79699912873ffcc63b46dbaf
SHA5129f8e7cb1e7adaff549178677f1a124e0bad32f6ad3d31001b433e3c8dbf26939fd86d89e02aa29276646873f54016f801e156c5b705e35aad598a76a7ef96616
-
Filesize
785KB
MD50e73462e8df3509c2b0cb282d8818b48
SHA184ef7ab8bb27f60eb8d48eeef32ca382aae168af
SHA256cacb16675788a395b6d4aba5abc7f100b465a04f79699912873ffcc63b46dbaf
SHA5129f8e7cb1e7adaff549178677f1a124e0bad32f6ad3d31001b433e3c8dbf26939fd86d89e02aa29276646873f54016f801e156c5b705e35aad598a76a7ef96616
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
603KB
MD5390754c221e661ff91f03bb19a088103
SHA1163e849496642df60356b5f8a98921dba9159ada
SHA2569818d3e291d988eb203b182038101b07f55fe0dea28b61f590659174f2b2e711
SHA5120ed87e0c70e30b34e92336730340cb631872eb234eeff9f46043cf6349d6ee0f844078e6f1155fac8e4dc02f2df5830a614e6ea54af5ac25d0a0ce8a67ea1325
-
Filesize
603KB
MD5390754c221e661ff91f03bb19a088103
SHA1163e849496642df60356b5f8a98921dba9159ada
SHA2569818d3e291d988eb203b182038101b07f55fe0dea28b61f590659174f2b2e711
SHA5120ed87e0c70e30b34e92336730340cb631872eb234eeff9f46043cf6349d6ee0f844078e6f1155fac8e4dc02f2df5830a614e6ea54af5ac25d0a0ce8a67ea1325
-
Filesize
383KB
MD5f087377c3b133c87182cc95d159562fd
SHA1a11fd2c9a6c35911a5faba41ba385721c53c8181
SHA256c099666080ef9a984f009cde96eac60dee5fa216deb267f355d5146f4ba658dc
SHA512d24a43a12f2bb0499ac5f69823feeaff89cc5b71a44157c3559e636be6fb300cb3c32e34929085a1cdd5569931d092ad43a84ff944b6fa07714215d2f1ba9d9c
-
Filesize
383KB
MD5f087377c3b133c87182cc95d159562fd
SHA1a11fd2c9a6c35911a5faba41ba385721c53c8181
SHA256c099666080ef9a984f009cde96eac60dee5fa216deb267f355d5146f4ba658dc
SHA512d24a43a12f2bb0499ac5f69823feeaff89cc5b71a44157c3559e636be6fb300cb3c32e34929085a1cdd5569931d092ad43a84ff944b6fa07714215d2f1ba9d9c
-
Filesize
343KB
MD5dc505aaf41cc412e28304277da94dcf1
SHA1fa42e886938d87fb76caa2b334fd6506fadd6f8f
SHA256072383ae5dc901e494b5f0d586823826a8aac74965dadd68d8c7a5590da80f1e
SHA512f4390a5341deea69f9209a3bffcd43106e0749ccc6cd1ce4655a3a55a34fdaf4e2b4577004b5b4501357707b41ea6f6b76544ccbd07d99850679ec03234455d6
-
Filesize
343KB
MD5dc505aaf41cc412e28304277da94dcf1
SHA1fa42e886938d87fb76caa2b334fd6506fadd6f8f
SHA256072383ae5dc901e494b5f0d586823826a8aac74965dadd68d8c7a5590da80f1e
SHA512f4390a5341deea69f9209a3bffcd43106e0749ccc6cd1ce4655a3a55a34fdaf4e2b4577004b5b4501357707b41ea6f6b76544ccbd07d99850679ec03234455d6
-
Filesize
220KB
MD5b52554aea644d08513f4691b9a33de07
SHA180f14d1aa3b15f29540ea674c60b6929736c97f6
SHA256882d1cc81e549b3b7cacbae2deb8ffdbdc49510bb2b2488837c045b14507701e
SHA512d757c29c2082d0654a969e064f29592d2737aba1b9e045ac7565c51eaece0e7ae5fb5898cdd76b3dcde0f5631588d7b74cecadafe7f644808a18ee4bd9499d57
-
Filesize
220KB
MD5b52554aea644d08513f4691b9a33de07
SHA180f14d1aa3b15f29540ea674c60b6929736c97f6
SHA256882d1cc81e549b3b7cacbae2deb8ffdbdc49510bb2b2488837c045b14507701e
SHA512d757c29c2082d0654a969e064f29592d2737aba1b9e045ac7565c51eaece0e7ae5fb5898cdd76b3dcde0f5631588d7b74cecadafe7f644808a18ee4bd9499d57
-
Filesize
364KB
MD56959b71418a4c832362cb5be239343d7
SHA19f7fa9187b98433527d530e19843dfaf2248a797
SHA256e00b40ccf90c3765b881f3defffcfba3984fe27f2eddbce14b27cf7302aa09b6
SHA512d51cc27a4526cffbfbab898a875569bd5ddb414610879f68b7a023eedbe17d0c8f9a8bfcbfa89c95a7871228c8443905b4677bfbc304fcc0e06c06b95ff897c2
-
Filesize
364KB
MD56959b71418a4c832362cb5be239343d7
SHA19f7fa9187b98433527d530e19843dfaf2248a797
SHA256e00b40ccf90c3765b881f3defffcfba3984fe27f2eddbce14b27cf7302aa09b6
SHA512d51cc27a4526cffbfbab898a875569bd5ddb414610879f68b7a023eedbe17d0c8f9a8bfcbfa89c95a7871228c8443905b4677bfbc304fcc0e06c06b95ff897c2
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
273B
MD50c459e65bcc6d38574f0c0d63a87088a
SHA141e53d5f2b3e7ca859b842a1c7b677e0847e6d65
SHA256871c61d5f7051d6ddcf787e92e92d9c7e36747e64ea17b8cffccac549196abc4
SHA512be1ca1fa525dfea57bc14ba41d25fb904c8e4c1d5cb4a5981d3173143620fb8e08277c0dfc2287b792e365871cc6805034377060a84cfef81969cd3d3ba8f90d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\b7jtu2fw.default-release\cookies.sqlite.id[0F40F3B1-3483].[[email protected]].8base
Filesize96KB
MD555faddfe0b2ac01c0a0be515fc39f1fb
SHA14e70295d8ba40a8454c4ad135f3edc31dad3e371
SHA256674e172b14247742074556af708afd267a5f23c696e58e327218512ae240abc6
SHA51286824a110689b55c40b9030af8e2c819eba52d36e52c0be20f0cf387af627cf4740a4830a96285272758893f9c9e91981e6dc3b394eb168f2985fe70b768b530
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0
-
Filesize
5KB
MD503d728180c69a311e978d066de0a362b
SHA196f7c5333e02703f0bdb184a3fa50459a23c3964
SHA25698fbcfcc10f199bf9d98be4a0dfb1c143f27504b46a2cb7e1eb045cdf0c8cb3f
SHA5122d06f89b9d8789fd458b8dce49e651ab47bf1af56fd52a7b9c54889f93938255f05ffcc5d3918d9ad8a3ba46d51cb797fd19a1d1795dee6e67720069d974fe10