Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
02/10/2023, 12:05
Behavioral task
behavioral1
Sample
28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe
Resource
win10v2004-20230915-en
General
-
Target
28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe
-
Size
4.7MB
-
MD5
28beb612df847efa371ba350bcee500b
-
SHA1
e72e2786bef4effa4cd5d4484ac31b414028bb8a
-
SHA256
28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9
-
SHA512
cfeb0d1de9ec002fde386ed884495c1c68958f432b7e0fd071a33d688240d0acaeb1cc8ce1249707d2c0971d8cacc9ffb89360a53addd9581bd59e860d39d87b
-
SSDEEP
98304:7G3pDySakKIA85/mrqJJ+KTOZTdoR3nDifBvymmsrJPTi6ZxK9:y3NyVkKIAnIh2WnWpvBmsrJPTi6vK9
Malware Config
Extracted
Protocol: ftp- Host:
download0.drp.su - Port:
21 - Username:
feedback - Password:
pq9KvdyeRVA6u
Signatures
-
Nirsoft 10 IoCs
resource yara_rule behavioral1/files/0x0006000000015cd5-37.dat Nirsoft behavioral1/files/0x0006000000015cd5-39.dat Nirsoft behavioral1/memory/2528-53-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral1/files/0x0006000000015caa-108.dat Nirsoft behavioral1/files/0x0006000000015caa-109.dat Nirsoft behavioral1/files/0x0006000000015caa-113.dat Nirsoft behavioral1/memory/1424-177-0x0000000000400000-0x000000000041E000-memory.dmp Nirsoft behavioral1/memory/1652-197-0x0000000000400000-0x0000000000422000-memory.dmp Nirsoft behavioral1/memory/696-204-0x0000000000400000-0x0000000000420000-memory.dmp Nirsoft behavioral1/files/0x0006000000015caa-352.dat Nirsoft -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate SIV64X.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion SIV64X.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion WinAudit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate WinAudit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion WinAudit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion SIV64X.exe -
Executes dropped EXE 25 IoCs
pid Process 1500 LastActivityView.exe 2528 CProcess.exe 372 SDI-drv.exe 2928 SIV64X.exe 2380 DriverView64.exe 1424 DevManView.exe 1616 AppCrashView.exe 1652 BlueScreenView.exe 696 WhatInStartup.exe 1576 WinAudit.exe 3040 hidec.exe 1604 devcon.exe 1956 devcon.exe 2376 devcon.exe 3012 devcon.exe 2720 devcon.exe 756 devcon.exe 2544 devcon.exe 2020 devcon.exe 336 hidec.exe 1540 7za.exe 1644 hidec.exe 2416 wput.exe 2912 hidec.exe 2444 wput.exe -
Loads dropped DLL 57 IoCs
pid Process 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 3048 cmd.exe 1604 devcon.exe 1604 devcon.exe 1604 devcon.exe 3048 cmd.exe 1956 devcon.exe 1956 devcon.exe 1956 devcon.exe 3048 cmd.exe 2376 devcon.exe 2376 devcon.exe 2376 devcon.exe 3048 cmd.exe 3012 devcon.exe 3012 devcon.exe 3012 devcon.exe 3048 cmd.exe 2720 devcon.exe 2720 devcon.exe 2720 devcon.exe 3048 cmd.exe 756 devcon.exe 756 devcon.exe 756 devcon.exe 3048 cmd.exe 2544 devcon.exe 2544 devcon.exe 2544 devcon.exe 3048 cmd.exe 2020 devcon.exe 2020 devcon.exe 2020 devcon.exe 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 336 hidec.exe 336 hidec.exe 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 1644 hidec.exe 1644 hidec.exe 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 2912 hidec.exe -
resource yara_rule behavioral1/memory/2472-0-0x0000000000400000-0x00000000004F9000-memory.dmp upx behavioral1/files/0x0006000000015c8a-42.dat upx behavioral1/files/0x0006000000015c8a-49.dat upx behavioral1/memory/2528-50-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral1/files/0x0006000000015c8a-47.dat upx behavioral1/files/0x0006000000015c8a-44.dat upx behavioral1/files/0x0006000000015c8a-51.dat upx behavioral1/memory/2528-53-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral1/memory/2472-68-0x0000000000400000-0x00000000004F9000-memory.dmp upx behavioral1/memory/2472-93-0x0000000000400000-0x00000000004F9000-memory.dmp upx behavioral1/files/0x0024000000014672-170.dat upx behavioral1/files/0x0024000000014672-174.dat upx behavioral1/memory/1424-177-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/files/0x0006000000015c6a-178.dat upx behavioral1/files/0x0006000000015c7a-190.dat upx behavioral1/files/0x0006000000015c6a-185.dat upx behavioral1/files/0x0006000000015c6a-181.dat upx behavioral1/files/0x0006000000015c6a-184.dat upx behavioral1/files/0x0006000000015c7a-194.dat upx behavioral1/memory/1652-197-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/files/0x0006000000015ef9-198.dat upx behavioral1/files/0x0006000000015ef9-202.dat upx behavioral1/memory/696-204-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/2472-263-0x0000000000400000-0x00000000004F9000-memory.dmp upx behavioral1/memory/2472-331-0x0000000000400000-0x00000000004F9000-memory.dmp upx behavioral1/memory/2472-378-0x0000000000400000-0x00000000004F9000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: DevManView.exe File opened (read-only) \??\F: DevManView.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 api.ipinfodb.com -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 DevManView.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\Logs\SysInfo\Tools\LastActivityView.exe 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe File created C:\Windows\Logs\SysInfo\Tools\pcidevs.txt 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe File opened for modification C:\Windows\Logs\SysInfo\Tools\boxcutter.exe 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe File created C:\Windows\Logs\SysInfo\Tools\DevManView.exe 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe File opened for modification C:\Windows\Logs\SysInfo\LOGs\KGPMNUDG\SIV_KGPMNUDG.txt 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe File opened for modification C:\Windows\Logs\SysInfo\Tools\7za.exe 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe File opened for modification C:\Windows\Logs\SysInfo\Tools\SysInf.bat 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe File created C:\Windows\Logs\SysInfo\Tools\SysInf.bat 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe File created C:\Windows\Logs\SysInfo\Tools\hidec.exe 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe File opened for modification C:\Windows\Logs\SysInfo\LOGs\KGPMNUDG\Process.htm 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe File opened for modification C:\Windows\Logs\SysInfo\Tools\CProcess.exe 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe File opened for modification C:\Windows\Logs\SysInfo\Tools\hidec.exe 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe File created C:\Windows\Logs\SysInfo\www.SamLab.ws.url 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe File opened for modification C:\Windows\Logs\SysInfo\Tools\SDI-drv.exe 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe File created C:\Windows\Logs\SysInfo\LOGs\KGPMNUDG\Process.htm CProcess.exe File opened for modification C:\Windows\Logs\SysInfo\Tools\SIV_DBGOUT.log SIV64X.exe File created C:\Windows\Logs\SysInfo\Tools\logs\2023_10_02__12_12_12__KGPMNUDG_state.snp SDI-drv.exe File opened for modification C:\Windows\Logs\SysInfo\LOGs\KGPMNUDG\setupapi.dev.log 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe File opened for modification C:\Windows\Logs\SysInfo\LOGs\KGPMNUDG\ 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe File opened for modification C:\Windows\Logs\SysInfo\Tools\indexes\SDI\ 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe File opened for modification C:\Windows\Logs\SysInfo\Tools\wput.exe 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe File created C:\Windows\Logs\SysInfo\Tools\HWIDs.cmd 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe File created C:\Windows\Logs\SysInfo\Tools\SIV32X.exe 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe File opened for modification C:\Windows\Logs\SysInfo\LOGs\KGPMNUDG\dd_NDP472-KB4054530-x86-x64-AllOS-ENU_decompression_log.txt 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe File opened for modification C:\Windows\Logs\SysInfo\Tools\drivers\ 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe File opened for modification C:\Windows\Logs\SysInfo\LOGs\KGPMNUDG\KGPMNUDG.html 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe File created C:\Windows\Logs\SysInfo\LOGs\KGPMNUDG\Startup.htm WhatInStartup.exe File opened for modification C:\Windows\Logs\SysInfo\Tools\HWIDs.txt 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe File opened for modification C:\Windows\Logs\SysInfo\Tools\LastActivityView.exe 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe File opened for modification C:\Windows\Logs\SysInfo\Tools\KGPMNUDG.html 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe File created C:\Windows\Logs\SysInfo\LOGs\KGPMNUDG\Devices.htm DevManView.exe File created C:\Windows\Logs\SysInfo\LOGs\KGPMNUDG\Crashes.htm AppCrashView.exe File opened for modification C:\Windows\Logs\SysInfo\LOGs\KGPMNUDG\Actions.htm 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe File opened for modification C:\Windows\Logs\SysInfo\LOGs\KGPMNUDG\dd_vcredistMSI4EEE.txt 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe File opened for modification C:\Windows\Logs\SysInfo\Tools\devcon.exe 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe File created C:\Windows\Logs\SysInfo\LOGs\KGPMNUDG\SIV_KGPMNUDG.txt 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe File opened for modification C:\Windows\Logs\SysInfo\LOGs\KGPMNUDG\DxDiag.txt 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe File opened for modification C:\Windows\Logs\SysInfo\Tools\HWIDs.cmd 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe File opened for modification C:\Windows\Logs\SysInfo\Tools\usbdevs.txt 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe File created C:\Windows\Logs\SysInfo\Tools\AppCrashView.exe 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe File created C:\Windows\Logs\SysInfo\Tools\WinAudit.exe 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe File created C:\Windows\Logs\SysInfo\Tools\settings.cfg SDI-drv.exe File opened for modification C:\Windows\Logs\SysInfo\LOGs\KGPMNUDG\Drivers.htm 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe File opened for modification C:\Windows\Logs\SysInfo\LOGs\KGPMNUDG\Startup.htm 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe File opened for modification C:\Windows\Logs\SysInfo\Tools\DriverView64.exe 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe File opened for modification C:\Windows\Logs\SysInfo\Tools\SIV32X.exe 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe File created C:\Windows\Logs\SysInfo\Tools\devcon.exe 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe File created C:\Windows\Logs\SysInfo\LOGs\KGPMNUDG\DxDiag.txt dxdiag.exe File created C:\Windows\Logs\SysInfo\LOGs\KGPMNUDG\!BSOD!.htm BlueScreenView.exe File created C:\Windows\Logs\SysInfo\LOGs\KGPMNUDG\FXSAPIDebugLogFile.txt 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe File opened for modification C:\Windows\Logs\SysInfo\LOGs\KGPMNUDG\FXSAPIDebugLogFile.txt 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe File opened for modification C:\Windows\Logs\SysInfo\Tools\pnpdevs.txt 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe File created C:\Windows\Logs\SysInfo\Tools\pcmdevs.txt 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe File created C:\Windows\Logs\SysInfo\Tools\usbdevs.txt 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe File created C:\Windows\Logs\SysInfo\Tools\SIV_KGPMNUDG.txt SIV64X.exe File opened for modification C:\Windows\Logs\SysInfo\LOGs\KGPMNUDG\Crashes.htm 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe File opened for modification C:\Windows\Logs\SysInfo\Tools\mondevs.txt 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe File created C:\Windows\Logs\SysInfo\Tools\SIV64X.exe 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe File created C:\Windows\Logs\SysInfo\LOGs\KGPMNUDG\dd_vcredistMSI4E92.txt 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe File created C:\Windows\Logs\SysInfo\LOGs\KGPMNUDG\dd_SetupUtility.txt 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe File opened for modification C:\Windows\Logs\SysInfo\LOGs\ 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe File opened for modification C:\Windows\Logs\SysInfo\Tools\pcidevs.txt 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe File opened for modification C:\Windows\Logs\SysInfo\Tools\SIV_DBGOUT.log 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe File opened for modification C:\Windows\Logs\SysInfo\Tools\ 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 8 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI DevManView.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_Dell&Prod_THINAIR_DISK DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI SIV64X.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI SIV64X.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI SIV64X.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_Dell&Prod_THINAIR_DISK SIV64X.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI DevManView.exe -
Checks processor information in registry 2 TTPs 15 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\1 SIV64X.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString SIV64X.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString SIV64X.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz SIV64X.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier SIV64X.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 SIV64X.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet SIV64X.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\2 SIV64X.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier SIV64X.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier SIV64X.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature SIV64X.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz SIV64X.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet SIV64X.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Signature SIV64X.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier SIV64X.exe -
Enumerates system info in registry 2 TTPs 5 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier SIV64X.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VirtualAddressBits SIV64X.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\PhysicalAddressBits SIV64X.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosDate SIV64X.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosDate WinAudit.exe -
Modifies registry class 34 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject\CLSID\ = "{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject\CurVer dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject\CurVer\ = "DxDiag.DxDiagClassObject.1" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider.1 dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider\ = "DxDiagProvider Class" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject\ = "DxDiagClassObject Class" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject.1\CLSID dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject\CLSID dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\ProgID dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\InprocServer32\ = "C:\\Windows\\SysWOW64\\dxdiagn.dll" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider.1\CLSID dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider\CLSID dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A65B8071-3BFE-4213-9A5B-491DA4461CA7}\VersionIndependentProgID dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject.1 dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject.1\ = "DxDiagClassObject Class" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\ForceRemove dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\ForceRemove\ = "Programmable" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A65B8071-3BFE-4213-9A5B-491DA4461CA7} dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A65B8071-3BFE-4213-9A5B-491DA4461CA7}\InprocServer32 dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\VersionIndependentProgID dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider.1\ = "DxDiagProvider Class" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A65B8071-3BFE-4213-9A5B-491DA4461CA7}\ProgID dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject.1\CLSID\ = "{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B} dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\ = "DxDiagClassObject Class" dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\ProgID\ = "DxDiag.DxDiagClassObject.1" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\InprocServer32 dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\InprocServer32\ThreadingModel = "Apartment" dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\VersionIndependentProgID\ = "DxDiag.DxDiagClassObject" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider\CurVer dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider\CurVer\ = "DxDiag.DxDiagClassObject.1" dxdiag.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 2396 dxdiag.exe 2396 dxdiag.exe 2528 CProcess.exe 2528 CProcess.exe 2928 SIV64X.exe 2928 SIV64X.exe 696 WhatInStartup.exe 696 WhatInStartup.exe 1576 WinAudit.exe 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe -
Suspicious behavior: LoadsDriver 7 IoCs
pid Process 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeBackupPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe Token: SeBackupPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe Token: SeBackupPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe Token: SeSecurityPrivilege 1500 LastActivityView.exe -
Suspicious use of FindShellTrayWindow 10 IoCs
pid Process 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2396 dxdiag.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2472 wrote to memory of 1688 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 28 PID 2472 wrote to memory of 1688 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 28 PID 2472 wrote to memory of 1688 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 28 PID 2472 wrote to memory of 1688 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 28 PID 1688 wrote to memory of 2396 1688 dxdiag.exe 29 PID 1688 wrote to memory of 2396 1688 dxdiag.exe 29 PID 1688 wrote to memory of 2396 1688 dxdiag.exe 29 PID 1688 wrote to memory of 2396 1688 dxdiag.exe 29 PID 2472 wrote to memory of 1500 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 31 PID 2472 wrote to memory of 1500 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 31 PID 2472 wrote to memory of 1500 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 31 PID 2472 wrote to memory of 1500 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 31 PID 2472 wrote to memory of 2528 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 32 PID 2472 wrote to memory of 2528 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 32 PID 2472 wrote to memory of 2528 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 32 PID 2472 wrote to memory of 2528 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 32 PID 2472 wrote to memory of 372 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 33 PID 2472 wrote to memory of 372 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 33 PID 2472 wrote to memory of 372 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 33 PID 2472 wrote to memory of 372 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 33 PID 2472 wrote to memory of 2928 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 35 PID 2472 wrote to memory of 2928 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 35 PID 2472 wrote to memory of 2928 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 35 PID 2472 wrote to memory of 2928 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 35 PID 2472 wrote to memory of 2380 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 38 PID 2472 wrote to memory of 2380 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 38 PID 2472 wrote to memory of 2380 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 38 PID 2472 wrote to memory of 2380 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 38 PID 2472 wrote to memory of 1424 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 39 PID 2472 wrote to memory of 1424 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 39 PID 2472 wrote to memory of 1424 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 39 PID 2472 wrote to memory of 1424 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 39 PID 2472 wrote to memory of 1616 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 40 PID 2472 wrote to memory of 1616 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 40 PID 2472 wrote to memory of 1616 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 40 PID 2472 wrote to memory of 1616 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 40 PID 2472 wrote to memory of 1652 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 41 PID 2472 wrote to memory of 1652 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 41 PID 2472 wrote to memory of 1652 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 41 PID 2472 wrote to memory of 1652 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 41 PID 2472 wrote to memory of 696 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 42 PID 2472 wrote to memory of 696 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 42 PID 2472 wrote to memory of 696 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 42 PID 2472 wrote to memory of 696 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 42 PID 2472 wrote to memory of 1576 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 43 PID 2472 wrote to memory of 1576 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 43 PID 2472 wrote to memory of 1576 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 43 PID 2472 wrote to memory of 1576 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 43 PID 2472 wrote to memory of 3040 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 44 PID 2472 wrote to memory of 3040 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 44 PID 2472 wrote to memory of 3040 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 44 PID 2472 wrote to memory of 3040 2472 28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe 44 PID 3040 wrote to memory of 3048 3040 hidec.exe 45 PID 3040 wrote to memory of 3048 3040 hidec.exe 45 PID 3040 wrote to memory of 3048 3040 hidec.exe 45 PID 3040 wrote to memory of 3048 3040 hidec.exe 45 PID 3048 wrote to memory of 1604 3048 cmd.exe 47 PID 3048 wrote to memory of 1604 3048 cmd.exe 47 PID 3048 wrote to memory of 1604 3048 cmd.exe 47 PID 3048 wrote to memory of 1604 3048 cmd.exe 47 PID 3048 wrote to memory of 1604 3048 cmd.exe 47 PID 3048 wrote to memory of 1604 3048 cmd.exe 47 PID 3048 wrote to memory of 1604 3048 cmd.exe 47 PID 3048 wrote to memory of 1956 3048 cmd.exe 48
Processes
-
C:\Users\Admin\AppData\Local\Temp\28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe"C:\Users\Admin\AppData\Local\Temp\28522a9ee5a4307497066d9c3c586773f8a7c936f1cbfef6aac4b02264e0c3b9.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\system32\dxdiag.exedxdiag /t C:\Windows\Logs\SysInfo\LOGs\KGPMNUDG\DxDiag.txt2⤵
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\SysWOW64\dxdiag.exe"C:\Windows\SysWOW64\dxdiag.exe" /t C:\Windows\Logs\SysInfo\LOGs\KGPMNUDG\DxDiag.txt3⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2396
-
-
-
C:\Windows\Logs\SysInfo\Tools\LastActivityView.exeC:\Windows\Logs\SysInfo\Tools\LastActivityView.exe /shtml C:\Windows\Logs\SysInfo\LOGs\KGPMNUDG\Actions.htm2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1500
-
-
C:\Windows\Logs\SysInfo\Tools\CProcess.exeC:\Windows\Logs\SysInfo\Tools\CProcess.exe /shtml C:\Windows\Logs\SysInfo\LOGs\KGPMNUDG\Process.htm2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:2528
-
-
C:\Windows\Logs\SysInfo\Tools\SDI-drv.exeC:\Windows\Logs\SysInfo\Tools\SDI-drv.exe -nogui -autoclose2⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:372
-
-
C:\Windows\Logs\SysInfo\Tools\SIV64X.exeC:\Windows\Logs\SysInfo\Tools\SIV64X.exe -SAVE[devices][device-ids][dimms][driver-vsn][environment][hw-status][interfaces][my-ip-address][overview][pnp-dev][processes][startup][software][system][uaa-dev]2⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:2928
-
-
C:\Windows\Logs\SysInfo\Tools\DriverView64.exeC:\Windows\Logs\SysInfo\Tools\DriverView64.exe /shtml C:\Windows\Logs\SysInfo\LOGs\KGPMNUDG\Drivers.htm2⤵
- Executes dropped EXE
PID:2380
-
-
C:\Windows\Logs\SysInfo\Tools\DevManView.exeC:\Windows\Logs\SysInfo\Tools\DevManView.exe /shtml C:\Windows\Logs\SysInfo\LOGs\KGPMNUDG\Devices.htm2⤵
- Executes dropped EXE
- Enumerates connected drives
- Maps connected drives based on registry
- Drops file in Windows directory
- Checks SCSI registry key(s)
PID:1424
-
-
C:\Windows\Logs\SysInfo\Tools\AppCrashView.exeC:\Windows\Logs\SysInfo\Tools\AppCrashView.exe /shtml C:\Windows\Logs\SysInfo\LOGs\KGPMNUDG\Crashes.htm2⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1616
-
-
C:\Windows\Logs\SysInfo\Tools\BlueScreenView.exeC:\Windows\Logs\SysInfo\Tools\BlueScreenView.exe /shtml C:\Windows\Logs\SysInfo\LOGs\KGPMNUDG\!BSOD!.htm2⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1652
-
-
C:\Windows\Logs\SysInfo\Tools\WhatInStartup.exeC:\Windows\Logs\SysInfo\Tools\WhatInStartup.exe /shtml C:\Windows\Logs\SysInfo\LOGs\KGPMNUDG\Startup.htm2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:696
-
-
C:\Windows\Logs\SysInfo\Tools\WinAudit.exeC:\Windows\Logs\SysInfo\Tools\WinAudit.exe /r=gz /o=HTML2⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:1576
-
-
C:\Windows\Logs\SysInfo\Tools\hidec.exeC:\Windows\Logs\SysInfo\Tools\hidec.exe /W C:\Windows\Logs\SysInfo\Tools\HWIDs.cmd2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\Logs\SysInfo\Tools\HWIDs.cmd3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\Logs\SysInfo\Tools\devcon.exeDEVCON find pci*4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1604
-
-
C:\Windows\Logs\SysInfo\Tools\devcon.exeDEVCON find =net4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1956
-
-
C:\Windows\Logs\SysInfo\Tools\devcon.exeDEVCON find hdaudio*4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2376
-
-
C:\Windows\Logs\SysInfo\Tools\devcon.exeDEVCON hwids *CC_01* *Raid*4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3012
-
-
C:\Windows\Logs\SysInfo\Tools\devcon.exeDEVCON find hid*4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2720
-
-
C:\Windows\Logs\SysInfo\Tools\devcon.exeDEVCON find usb*4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:756
-
-
C:\Windows\Logs\SysInfo\Tools\devcon.exeDEVCON find acpi*4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2544
-
-
C:\Windows\Logs\SysInfo\Tools\devcon.exeDEVCON status *4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2020
-
-
-
-
C:\Windows\Logs\SysInfo\Tools\hidec.exeC:\Windows\Logs\SysInfo\Tools\hidec.exe /W C:\Windows\Logs\SysInfo\Tools\7za a -t7z C:\Windows\Logs\SysInfo\SysInfo.7z C:\Windows\Logs\SysInfo\LOGs\2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:336 -
C:\Windows\Logs\SysInfo\Tools\7za.exeC:\Windows\Logs\SysInfo\Tools\7za a -t7z C:\Windows\Logs\SysInfo\SysInfo.7z C:\Windows\Logs\SysInfo\LOGs\3⤵
- Executes dropped EXE
PID:1540
-
-
-
C:\Windows\Logs\SysInfo\Tools\hidec.exeC:\Windows\Logs\SysInfo\Tools\hidec.exe /W C:\Windows\Logs\SysInfo\Tools\wput.exe --output-file=C:\Windows\Temp\KGPMNUDG_2023.10.02_r418.log "C:\Windows\Logs\SysInfo\KGPMNUDG_2023.10.02_r418.7z" "ftp://feedback:[email protected]/logs/14.8/KGPMNUDG_2023.10.02_r418.7z"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1644 -
C:\Windows\Logs\SysInfo\Tools\wput.exeC:\Windows\Logs\SysInfo\Tools\wput.exe --output-file=C:\Windows\Temp\KGPMNUDG_2023.10.02_r418.log "C:\Windows\Logs\SysInfo\KGPMNUDG_2023.10.02_r418.7z" "ftp://feedback:[email protected]/logs/14.8/KGPMNUDG_2023.10.02_r418.7z"3⤵
- Executes dropped EXE
PID:2416
-
-
-
C:\Windows\Logs\SysInfo\Tools\hidec.exeC:\Windows\Logs\SysInfo\Tools\hidec.exe /W C:\Windows\Logs\SysInfo\Tools\wput.exe "C:\Windows\Logs\SysInfo\KGPMNUDG_2023.10.02_r418.txt" "ftp://feedback:[email protected]/logs/14.8/KGPMNUDG_2023.10.02_r418.txt"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2912 -
C:\Windows\Logs\SysInfo\Tools\wput.exeC:\Windows\Logs\SysInfo\Tools\wput.exe "C:\Windows\Logs\SysInfo\KGPMNUDG_2023.10.02_r418.txt" "ftp://feedback:[email protected]/logs/14.8/KGPMNUDG_2023.10.02_r418.txt"3⤵
- Executes dropped EXE
PID:2444
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a436db0c473a087eb61ff5c53c34ba27
SHA165ea67e424e75f5065132b539c8b2eda88aa0506
SHA25675ed40311875312617d6711baed0be29fcaee71031ca27a8d308a72b15a51e49
SHA512908f46a855480af6eacb2fb64de0e60b1e04bbb10b23992e2cf38a4cbebdcd7d3928c4c022d7ad9f7479265a8f426b93eef580afec95570e654c360d62f5e08d
-
Filesize
4KB
MD505450face243b3a7472407b999b03a72
SHA1ffd88af2e338ae606c444390f7eaaf5f4aef2cd9
SHA25695fe9d92512ff2318cc2520311ef9145b2cee01209ab0e1b6e45c7ce1d4d0e89
SHA512f4cbe30166aff20a226a7150d93a876873ba699d80d7e9f46f32a9b4753fa7966c3113a3124340b39ca67a13205463a413e740e541e742903e3f89af5a53ad3b
-
Filesize
41KB
MD57cc675104c7c3c322ea3bc6d2454a480
SHA13bd1e2d6d557ab450e3ba378241db8b5661099f2
SHA256aa08153919522e001a96fcd30046435458611ee9aa294e9a04b5597ab3c36a0f
SHA512b6bf75db6a3f14ec56a6f5fc21515ed9a87b54602bc7331018fe3a650feae6095e47045d113ca1b61a8cbdc924da8b3ad7ff610ebb89fdbe361763372d79ed8c
-
Filesize
41KB
MD57cc675104c7c3c322ea3bc6d2454a480
SHA13bd1e2d6d557ab450e3ba378241db8b5661099f2
SHA256aa08153919522e001a96fcd30046435458611ee9aa294e9a04b5597ab3c36a0f
SHA512b6bf75db6a3f14ec56a6f5fc21515ed9a87b54602bc7331018fe3a650feae6095e47045d113ca1b61a8cbdc924da8b3ad7ff610ebb89fdbe361763372d79ed8c
-
Filesize
59KB
MD52d57a236f64156ef89f2c5e0ec68775b
SHA1117519cbe1064f0291690643c0d466e614e33e7e
SHA256c3cdb8552a61df083055d76d891d81e171d1e1756a74f9cfbdb51a135bbd01e2
SHA512932b4e21a1507b9b3bdd2ba29d49d0cb3b8fae5a09e1dc80dd07612965f8c78132e8fc12425e6bde58c997f9bfce44be1384a300b706ab962ee4f4a4ef9d2724
-
Filesize
35KB
MD55af6b376e660805759683865437acbc0
SHA175f61ab72f67c53553ef87c655777c430c3c91c2
SHA256f0cf25602f19d5b2f2c0050180815eb5c727427142639fa1c177b5d1dc078a1b
SHA512faf2750a1dcfa6bbac2fc0162f14977ac7b145fe4361e58e880ac727902fc90afe1e92c7107c5096050c2e8a5dae1aab322c84851fbd30542f35e6e846d16e63
-
Filesize
35KB
MD55af6b376e660805759683865437acbc0
SHA175f61ab72f67c53553ef87c655777c430c3c91c2
SHA256f0cf25602f19d5b2f2c0050180815eb5c727427142639fa1c177b5d1dc078a1b
SHA512faf2750a1dcfa6bbac2fc0162f14977ac7b145fe4361e58e880ac727902fc90afe1e92c7107c5096050c2e8a5dae1aab322c84851fbd30542f35e6e846d16e63
-
Filesize
35KB
MD55af6b376e660805759683865437acbc0
SHA175f61ab72f67c53553ef87c655777c430c3c91c2
SHA256f0cf25602f19d5b2f2c0050180815eb5c727427142639fa1c177b5d1dc078a1b
SHA512faf2750a1dcfa6bbac2fc0162f14977ac7b145fe4361e58e880ac727902fc90afe1e92c7107c5096050c2e8a5dae1aab322c84851fbd30542f35e6e846d16e63
-
Filesize
53KB
MD58d0a076a6e19f37d10e85fb79a704548
SHA1dd8e60c443d08ba231b08e52cfda574f47e0fd3b
SHA25618cb75d12a28bb9182f83cabfa3ec62eebc1efe4bac3999434606c688c08529c
SHA51253b20e80de3edd63eb549859a893614c737d067df6112691b9e7036829459bfef653c58b3102cd7a33a3f43d79f00f7d41c57abf9141b85bf1f9ab6cbc190eec
-
Filesize
92KB
MD5394ae47a85784cc150dba8e23baf50b7
SHA129fbf7b25d43e64cc0c05b633bdadfac8edd0eaf
SHA256b59c3d14968a9d7d90baa0df624339aa977dc98e5de1c7f6b71bef23606db769
SHA51295d62f45a8db256c3f434b66488e81cef6a47f5995b7290c2bae0d8e95806ba9aa4748f556c72cdb2bef078afd5d9143b94b62f689b247cce72d627344db6cf2
-
Filesize
92KB
MD5394ae47a85784cc150dba8e23baf50b7
SHA129fbf7b25d43e64cc0c05b633bdadfac8edd0eaf
SHA256b59c3d14968a9d7d90baa0df624339aa977dc98e5de1c7f6b71bef23606db769
SHA51295d62f45a8db256c3f434b66488e81cef6a47f5995b7290c2bae0d8e95806ba9aa4748f556c72cdb2bef078afd5d9143b94b62f689b247cce72d627344db6cf2
-
Filesize
1KB
MD5303dd5852f8ef2d2e3bb75a1c797c196
SHA180e83a3ce04853572a73b07880b784af023c9ed3
SHA2561fc7e5639a2d7fa4b65f092ae4919d897a6d9c80bf8cb45dc8bf1564fde14318
SHA5125b65ab5e4b77b4eedee17d4c1c6ff04916f5f164fc91935e4a92d29e6933f235a38c8d1278058725aaacf332b8ed3bc904dcd7284a66c3daee0e900fd3ce37ad
-
Filesize
5KB
MD58da4421ccbf4a516eb70d54ce05c8045
SHA1ef02ac38d9b392b36405f978e55459459a26906d
SHA25661edadd9a9ac42af3be3791ed0e1c31a9eafdb954cc3bc8f39047f8e1113384b
SHA5121edce4cba833a2a1a62cfbd4d92143ff18c17bd3ea4578db37dfcac4c568c74ddde83a793776500e0bdcb9dd707b43c1b54e1ffd31013c55be007abe0069dc8c
-
Filesize
99KB
MD55b597f9b789d017242074b6c66a227d6
SHA1a033e13fd0447a0f00614371ac675fcfde0f2459
SHA25663719f049ef9ef1fd537d1374b361e311768ae06fafd90bf20f30a28fee4e53c
SHA512ad50bc3f93c2b89f03068a221c97d5ebb7a952fa3871659ebc3c9e5ce20badfa3cb381905143ef86a9198c2ad21aa972bd267b25502a1f6716d596f38260ed27
-
Filesize
301KB
MD5054bc928926224f9cd7b05f7eebd49dc
SHA1f0b5f03e9734c4048ef5852496bb4b2419be35f3
SHA25674a3dc706927d9509b11b284b114c22d92e7d4df69227c8feb528e917f612e1f
SHA5128c59e9b96d0ad32111d16985031127670709d2bc1c2bb31f4a08b64adb64b47ef262429acece01a9f820795b235624359cba2ff44a5efb049db1cf15dba953ae
-
Filesize
2.8MB
MD5798e458ea4c4e818ab6de622be899e7c
SHA13637065f6a9dddde6f119f81d2d8b92989d418b7
SHA2562bab75b0036ba14bffd04f89d426eaedd7e2c42f170b4917204fc07bdaed4b9b
SHA512b004a2a232ba9f3b97592c058571990620afd76ee1bef4d6768d15a04da38493771ba8d7e2949e827d6e1607858004f419d77218ba207f8c1a78c10c80deff75
-
Filesize
98KB
MD5c65c127a2d7be693ab213d5fc1cd7fa9
SHA1fc91fcc14fb7dabed59faa26270e5bcd7e5a492f
SHA256789b736fca991613fde9fe43fa3ded934b77ad5a6b93202679ea0a578746ad44
SHA5125b01a5708ed7fa4a21d9283f94b79187b986a9358b349a5699c92f32a8974d0145611426411143204a9f205e1020189d2db79e45a00fe100118490f692313f5d
-
Filesize
100KB
MD568002313bc89669f9945a0735246cfc5
SHA1e69c4b8e08b903436635f85de95b8aa4b6f1eb40
SHA25698a8dbf18e877ce2731e428598fd098bffb5e45268f4986c2c14ea1f17068a58
SHA512d52639c1900c9c191a0e260ebdb41fbddbf4492505c6cb489e60d90b1b5f387cac84a3fe37858c2ec6b71a63da5836360c3971ba6b9672b941cbba002211b8a1
-
Filesize
1.2MB
MD529eff8321ffbef1b5a28bb2213ea1478
SHA15947e06e7d890473bdf52cb36899de84f1430f0e
SHA2561aea0b192c3d654231185a9648bcd6fba5a89ceaac806689e6754d4475f6a6ab
SHA5125f116222af74eb1237f825b75dda480629a22c7f34dc083637dc487ea58a9fc56a1c60d5940cdeb7b9d574b8b913027cf7b713db4ad6a62b3b2b3edec33eef72
-
Filesize
4.2MB
MD56a711f46e5522e30685afcc8145ba0e6
SHA17c8e965d615b8e833f6b992fc64abd8ba4721d36
SHA256fed106c7aeba4f6720483cfd072d6e3e396066f0b38de4bfb7010ff9ac8f9f84
SHA512266afbb1721a97b6b9c8fb78079a3d2cce434c2e2dac042dc385bc3a874ac8dd9f084bf804d04854cabe428d15cba78dc8e8e9c00d3820d09fd3be4bf5e17764
-
Filesize
1.4MB
MD500e27c8569c1e0945837513cf5ee7179
SHA19154b24c2b24800fa28cb7002ee23618bef7c874
SHA2567996c56a965145be7a658426cad1797246ad7aa729caafee6d1a6c8a5b11929c
SHA5125a5fcfb6a683dac21cbdc28682f9351e043d6018e78c937710d085e735dd3a079c85ccc910c4b6b0cd74412822dc1ce8bcd7c06d4c111901bd29903bbe119c0c
-
Filesize
52KB
MD5d2a2a0ce38faa12254fbba8c0467ac46
SHA1fbb7b582ea66642c8ac774696e150526f2cc8fa4
SHA2567d8e7090d53098f029abd9f98d1a9f1afcdc02d4439ed6a167c53e877a35cff9
SHA512625fb26cc03da58e98cf640550196aafd48413b16698673bedfd279c6dae16b2cb566b9f703e4bb07860fb2f3bc06247d6f4d0241b786a2bbaf261276db6c036
-
Filesize
1.6MB
MD592ade3b6212b1e6ec3ee3a140cbf80ac
SHA12a6fe60418f85d42c04204063be3b23e23722b60
SHA25656f4763af00801c5eb80c39f141a563069669def9f98c1798c0f4b4094f34821
SHA512ec5bf40c6674959c2754ad72ef66b44b04d6dcf6c3a57d96416553e82fd54d241e16995a65dbd2c2c87b5e6724f0a9e2b09d7492cc9b3e109d62705c4b9d7ec0
-
Filesize
54KB
MD5c4b470269324517ee838789c7cf5e606
SHA17005597d55fb26c6260e0772f301c79f030e6d56
SHA2565f9b898315ad8192e87e21a499fd87d31b886513bb39d368476174aaa89a2bf9
SHA512dbadca544434a847238bf107e59aa84bf8df9df899d0c2da2ee62cc28e12d175a81d4e4e0f85d7c394323bf66fb4ac0f413c949700ecdec9a73ed5cf9340aebb
-
Filesize
54KB
MD5c4b470269324517ee838789c7cf5e606
SHA17005597d55fb26c6260e0772f301c79f030e6d56
SHA2565f9b898315ad8192e87e21a499fd87d31b886513bb39d368476174aaa89a2bf9
SHA512dbadca544434a847238bf107e59aa84bf8df9df899d0c2da2ee62cc28e12d175a81d4e4e0f85d7c394323bf66fb4ac0f413c949700ecdec9a73ed5cf9340aebb
-
Filesize
54KB
MD5c4b470269324517ee838789c7cf5e606
SHA17005597d55fb26c6260e0772f301c79f030e6d56
SHA2565f9b898315ad8192e87e21a499fd87d31b886513bb39d368476174aaa89a2bf9
SHA512dbadca544434a847238bf107e59aa84bf8df9df899d0c2da2ee62cc28e12d175a81d4e4e0f85d7c394323bf66fb4ac0f413c949700ecdec9a73ed5cf9340aebb
-
Filesize
54KB
MD5c4b470269324517ee838789c7cf5e606
SHA17005597d55fb26c6260e0772f301c79f030e6d56
SHA2565f9b898315ad8192e87e21a499fd87d31b886513bb39d368476174aaa89a2bf9
SHA512dbadca544434a847238bf107e59aa84bf8df9df899d0c2da2ee62cc28e12d175a81d4e4e0f85d7c394323bf66fb4ac0f413c949700ecdec9a73ed5cf9340aebb
-
Filesize
54KB
MD5c4b470269324517ee838789c7cf5e606
SHA17005597d55fb26c6260e0772f301c79f030e6d56
SHA2565f9b898315ad8192e87e21a499fd87d31b886513bb39d368476174aaa89a2bf9
SHA512dbadca544434a847238bf107e59aa84bf8df9df899d0c2da2ee62cc28e12d175a81d4e4e0f85d7c394323bf66fb4ac0f413c949700ecdec9a73ed5cf9340aebb
-
Filesize
54KB
MD5c4b470269324517ee838789c7cf5e606
SHA17005597d55fb26c6260e0772f301c79f030e6d56
SHA2565f9b898315ad8192e87e21a499fd87d31b886513bb39d368476174aaa89a2bf9
SHA512dbadca544434a847238bf107e59aa84bf8df9df899d0c2da2ee62cc28e12d175a81d4e4e0f85d7c394323bf66fb4ac0f413c949700ecdec9a73ed5cf9340aebb
-
Filesize
54KB
MD5c4b470269324517ee838789c7cf5e606
SHA17005597d55fb26c6260e0772f301c79f030e6d56
SHA2565f9b898315ad8192e87e21a499fd87d31b886513bb39d368476174aaa89a2bf9
SHA512dbadca544434a847238bf107e59aa84bf8df9df899d0c2da2ee62cc28e12d175a81d4e4e0f85d7c394323bf66fb4ac0f413c949700ecdec9a73ed5cf9340aebb
-
Filesize
1KB
MD5abc6379205de2618851c4fcbf72112eb
SHA11ed7b1e965eab56f55efda975f9f7ade95337267
SHA25622e7528e56dffaa26cfe722994655686c90824b13eb51184abfe44d4e95d473f
SHA512180c7f400dd13092b470e3a91bf02e98ef6247c1193bf349e3710e8d1e9003f3bc9b792bb776eacb746e9c67b3041f2333cc07f28c5f046d59274742230fb7c1
-
Filesize
1KB
MD5abc6379205de2618851c4fcbf72112eb
SHA11ed7b1e965eab56f55efda975f9f7ade95337267
SHA25622e7528e56dffaa26cfe722994655686c90824b13eb51184abfe44d4e95d473f
SHA512180c7f400dd13092b470e3a91bf02e98ef6247c1193bf349e3710e8d1e9003f3bc9b792bb776eacb746e9c67b3041f2333cc07f28c5f046d59274742230fb7c1
-
Filesize
11KB
MD5a436db0c473a087eb61ff5c53c34ba27
SHA165ea67e424e75f5065132b539c8b2eda88aa0506
SHA25675ed40311875312617d6711baed0be29fcaee71031ca27a8d308a72b15a51e49
SHA512908f46a855480af6eacb2fb64de0e60b1e04bbb10b23992e2cf38a4cbebdcd7d3928c4c022d7ad9f7479265a8f426b93eef580afec95570e654c360d62f5e08d
-
Filesize
4KB
MD505450face243b3a7472407b999b03a72
SHA1ffd88af2e338ae606c444390f7eaaf5f4aef2cd9
SHA25695fe9d92512ff2318cc2520311ef9145b2cee01209ab0e1b6e45c7ce1d4d0e89
SHA512f4cbe30166aff20a226a7150d93a876873ba699d80d7e9f46f32a9b4753fa7966c3113a3124340b39ca67a13205463a413e740e541e742903e3f89af5a53ad3b
-
Filesize
41KB
MD57cc675104c7c3c322ea3bc6d2454a480
SHA13bd1e2d6d557ab450e3ba378241db8b5661099f2
SHA256aa08153919522e001a96fcd30046435458611ee9aa294e9a04b5597ab3c36a0f
SHA512b6bf75db6a3f14ec56a6f5fc21515ed9a87b54602bc7331018fe3a650feae6095e47045d113ca1b61a8cbdc924da8b3ad7ff610ebb89fdbe361763372d79ed8c
-
Filesize
41KB
MD57cc675104c7c3c322ea3bc6d2454a480
SHA13bd1e2d6d557ab450e3ba378241db8b5661099f2
SHA256aa08153919522e001a96fcd30046435458611ee9aa294e9a04b5597ab3c36a0f
SHA512b6bf75db6a3f14ec56a6f5fc21515ed9a87b54602bc7331018fe3a650feae6095e47045d113ca1b61a8cbdc924da8b3ad7ff610ebb89fdbe361763372d79ed8c
-
Filesize
59KB
MD52d57a236f64156ef89f2c5e0ec68775b
SHA1117519cbe1064f0291690643c0d466e614e33e7e
SHA256c3cdb8552a61df083055d76d891d81e171d1e1756a74f9cfbdb51a135bbd01e2
SHA512932b4e21a1507b9b3bdd2ba29d49d0cb3b8fae5a09e1dc80dd07612965f8c78132e8fc12425e6bde58c997f9bfce44be1384a300b706ab962ee4f4a4ef9d2724
-
Filesize
35KB
MD55af6b376e660805759683865437acbc0
SHA175f61ab72f67c53553ef87c655777c430c3c91c2
SHA256f0cf25602f19d5b2f2c0050180815eb5c727427142639fa1c177b5d1dc078a1b
SHA512faf2750a1dcfa6bbac2fc0162f14977ac7b145fe4361e58e880ac727902fc90afe1e92c7107c5096050c2e8a5dae1aab322c84851fbd30542f35e6e846d16e63
-
Filesize
35KB
MD55af6b376e660805759683865437acbc0
SHA175f61ab72f67c53553ef87c655777c430c3c91c2
SHA256f0cf25602f19d5b2f2c0050180815eb5c727427142639fa1c177b5d1dc078a1b
SHA512faf2750a1dcfa6bbac2fc0162f14977ac7b145fe4361e58e880ac727902fc90afe1e92c7107c5096050c2e8a5dae1aab322c84851fbd30542f35e6e846d16e63
-
Filesize
53KB
MD58d0a076a6e19f37d10e85fb79a704548
SHA1dd8e60c443d08ba231b08e52cfda574f47e0fd3b
SHA25618cb75d12a28bb9182f83cabfa3ec62eebc1efe4bac3999434606c688c08529c
SHA51253b20e80de3edd63eb549859a893614c737d067df6112691b9e7036829459bfef653c58b3102cd7a33a3f43d79f00f7d41c57abf9141b85bf1f9ab6cbc190eec
-
Filesize
92KB
MD5394ae47a85784cc150dba8e23baf50b7
SHA129fbf7b25d43e64cc0c05b633bdadfac8edd0eaf
SHA256b59c3d14968a9d7d90baa0df624339aa977dc98e5de1c7f6b71bef23606db769
SHA51295d62f45a8db256c3f434b66488e81cef6a47f5995b7290c2bae0d8e95806ba9aa4748f556c72cdb2bef078afd5d9143b94b62f689b247cce72d627344db6cf2
-
Filesize
92KB
MD5394ae47a85784cc150dba8e23baf50b7
SHA129fbf7b25d43e64cc0c05b633bdadfac8edd0eaf
SHA256b59c3d14968a9d7d90baa0df624339aa977dc98e5de1c7f6b71bef23606db769
SHA51295d62f45a8db256c3f434b66488e81cef6a47f5995b7290c2bae0d8e95806ba9aa4748f556c72cdb2bef078afd5d9143b94b62f689b247cce72d627344db6cf2
-
Filesize
99KB
MD55b597f9b789d017242074b6c66a227d6
SHA1a033e13fd0447a0f00614371ac675fcfde0f2459
SHA25663719f049ef9ef1fd537d1374b361e311768ae06fafd90bf20f30a28fee4e53c
SHA512ad50bc3f93c2b89f03068a221c97d5ebb7a952fa3871659ebc3c9e5ce20badfa3cb381905143ef86a9198c2ad21aa972bd267b25502a1f6716d596f38260ed27
-
Filesize
1.2MB
MD529eff8321ffbef1b5a28bb2213ea1478
SHA15947e06e7d890473bdf52cb36899de84f1430f0e
SHA2561aea0b192c3d654231185a9648bcd6fba5a89ceaac806689e6754d4475f6a6ab
SHA5125f116222af74eb1237f825b75dda480629a22c7f34dc083637dc487ea58a9fc56a1c60d5940cdeb7b9d574b8b913027cf7b713db4ad6a62b3b2b3edec33eef72
-
Filesize
4.2MB
MD56a711f46e5522e30685afcc8145ba0e6
SHA17c8e965d615b8e833f6b992fc64abd8ba4721d36
SHA256fed106c7aeba4f6720483cfd072d6e3e396066f0b38de4bfb7010ff9ac8f9f84
SHA512266afbb1721a97b6b9c8fb78079a3d2cce434c2e2dac042dc385bc3a874ac8dd9f084bf804d04854cabe428d15cba78dc8e8e9c00d3820d09fd3be4bf5e17764
-
Filesize
52KB
MD5d2a2a0ce38faa12254fbba8c0467ac46
SHA1fbb7b582ea66642c8ac774696e150526f2cc8fa4
SHA2567d8e7090d53098f029abd9f98d1a9f1afcdc02d4439ed6a167c53e877a35cff9
SHA512625fb26cc03da58e98cf640550196aafd48413b16698673bedfd279c6dae16b2cb566b9f703e4bb07860fb2f3bc06247d6f4d0241b786a2bbaf261276db6c036
-
Filesize
1.6MB
MD592ade3b6212b1e6ec3ee3a140cbf80ac
SHA12a6fe60418f85d42c04204063be3b23e23722b60
SHA25656f4763af00801c5eb80c39f141a563069669def9f98c1798c0f4b4094f34821
SHA512ec5bf40c6674959c2754ad72ef66b44b04d6dcf6c3a57d96416553e82fd54d241e16995a65dbd2c2c87b5e6724f0a9e2b09d7492cc9b3e109d62705c4b9d7ec0
-
Filesize
54KB
MD5c4b470269324517ee838789c7cf5e606
SHA17005597d55fb26c6260e0772f301c79f030e6d56
SHA2565f9b898315ad8192e87e21a499fd87d31b886513bb39d368476174aaa89a2bf9
SHA512dbadca544434a847238bf107e59aa84bf8df9df899d0c2da2ee62cc28e12d175a81d4e4e0f85d7c394323bf66fb4ac0f413c949700ecdec9a73ed5cf9340aebb
-
Filesize
54KB
MD5c4b470269324517ee838789c7cf5e606
SHA17005597d55fb26c6260e0772f301c79f030e6d56
SHA2565f9b898315ad8192e87e21a499fd87d31b886513bb39d368476174aaa89a2bf9
SHA512dbadca544434a847238bf107e59aa84bf8df9df899d0c2da2ee62cc28e12d175a81d4e4e0f85d7c394323bf66fb4ac0f413c949700ecdec9a73ed5cf9340aebb
-
Filesize
54KB
MD5c4b470269324517ee838789c7cf5e606
SHA17005597d55fb26c6260e0772f301c79f030e6d56
SHA2565f9b898315ad8192e87e21a499fd87d31b886513bb39d368476174aaa89a2bf9
SHA512dbadca544434a847238bf107e59aa84bf8df9df899d0c2da2ee62cc28e12d175a81d4e4e0f85d7c394323bf66fb4ac0f413c949700ecdec9a73ed5cf9340aebb
-
Filesize
54KB
MD5c4b470269324517ee838789c7cf5e606
SHA17005597d55fb26c6260e0772f301c79f030e6d56
SHA2565f9b898315ad8192e87e21a499fd87d31b886513bb39d368476174aaa89a2bf9
SHA512dbadca544434a847238bf107e59aa84bf8df9df899d0c2da2ee62cc28e12d175a81d4e4e0f85d7c394323bf66fb4ac0f413c949700ecdec9a73ed5cf9340aebb
-
Filesize
54KB
MD5c4b470269324517ee838789c7cf5e606
SHA17005597d55fb26c6260e0772f301c79f030e6d56
SHA2565f9b898315ad8192e87e21a499fd87d31b886513bb39d368476174aaa89a2bf9
SHA512dbadca544434a847238bf107e59aa84bf8df9df899d0c2da2ee62cc28e12d175a81d4e4e0f85d7c394323bf66fb4ac0f413c949700ecdec9a73ed5cf9340aebb
-
Filesize
54KB
MD5c4b470269324517ee838789c7cf5e606
SHA17005597d55fb26c6260e0772f301c79f030e6d56
SHA2565f9b898315ad8192e87e21a499fd87d31b886513bb39d368476174aaa89a2bf9
SHA512dbadca544434a847238bf107e59aa84bf8df9df899d0c2da2ee62cc28e12d175a81d4e4e0f85d7c394323bf66fb4ac0f413c949700ecdec9a73ed5cf9340aebb
-
Filesize
54KB
MD5c4b470269324517ee838789c7cf5e606
SHA17005597d55fb26c6260e0772f301c79f030e6d56
SHA2565f9b898315ad8192e87e21a499fd87d31b886513bb39d368476174aaa89a2bf9
SHA512dbadca544434a847238bf107e59aa84bf8df9df899d0c2da2ee62cc28e12d175a81d4e4e0f85d7c394323bf66fb4ac0f413c949700ecdec9a73ed5cf9340aebb
-
Filesize
54KB
MD5c4b470269324517ee838789c7cf5e606
SHA17005597d55fb26c6260e0772f301c79f030e6d56
SHA2565f9b898315ad8192e87e21a499fd87d31b886513bb39d368476174aaa89a2bf9
SHA512dbadca544434a847238bf107e59aa84bf8df9df899d0c2da2ee62cc28e12d175a81d4e4e0f85d7c394323bf66fb4ac0f413c949700ecdec9a73ed5cf9340aebb
-
Filesize
54KB
MD5c4b470269324517ee838789c7cf5e606
SHA17005597d55fb26c6260e0772f301c79f030e6d56
SHA2565f9b898315ad8192e87e21a499fd87d31b886513bb39d368476174aaa89a2bf9
SHA512dbadca544434a847238bf107e59aa84bf8df9df899d0c2da2ee62cc28e12d175a81d4e4e0f85d7c394323bf66fb4ac0f413c949700ecdec9a73ed5cf9340aebb
-
Filesize
54KB
MD5c4b470269324517ee838789c7cf5e606
SHA17005597d55fb26c6260e0772f301c79f030e6d56
SHA2565f9b898315ad8192e87e21a499fd87d31b886513bb39d368476174aaa89a2bf9
SHA512dbadca544434a847238bf107e59aa84bf8df9df899d0c2da2ee62cc28e12d175a81d4e4e0f85d7c394323bf66fb4ac0f413c949700ecdec9a73ed5cf9340aebb
-
Filesize
54KB
MD5c4b470269324517ee838789c7cf5e606
SHA17005597d55fb26c6260e0772f301c79f030e6d56
SHA2565f9b898315ad8192e87e21a499fd87d31b886513bb39d368476174aaa89a2bf9
SHA512dbadca544434a847238bf107e59aa84bf8df9df899d0c2da2ee62cc28e12d175a81d4e4e0f85d7c394323bf66fb4ac0f413c949700ecdec9a73ed5cf9340aebb
-
Filesize
54KB
MD5c4b470269324517ee838789c7cf5e606
SHA17005597d55fb26c6260e0772f301c79f030e6d56
SHA2565f9b898315ad8192e87e21a499fd87d31b886513bb39d368476174aaa89a2bf9
SHA512dbadca544434a847238bf107e59aa84bf8df9df899d0c2da2ee62cc28e12d175a81d4e4e0f85d7c394323bf66fb4ac0f413c949700ecdec9a73ed5cf9340aebb
-
Filesize
54KB
MD5c4b470269324517ee838789c7cf5e606
SHA17005597d55fb26c6260e0772f301c79f030e6d56
SHA2565f9b898315ad8192e87e21a499fd87d31b886513bb39d368476174aaa89a2bf9
SHA512dbadca544434a847238bf107e59aa84bf8df9df899d0c2da2ee62cc28e12d175a81d4e4e0f85d7c394323bf66fb4ac0f413c949700ecdec9a73ed5cf9340aebb
-
Filesize
54KB
MD5c4b470269324517ee838789c7cf5e606
SHA17005597d55fb26c6260e0772f301c79f030e6d56
SHA2565f9b898315ad8192e87e21a499fd87d31b886513bb39d368476174aaa89a2bf9
SHA512dbadca544434a847238bf107e59aa84bf8df9df899d0c2da2ee62cc28e12d175a81d4e4e0f85d7c394323bf66fb4ac0f413c949700ecdec9a73ed5cf9340aebb
-
Filesize
54KB
MD5c4b470269324517ee838789c7cf5e606
SHA17005597d55fb26c6260e0772f301c79f030e6d56
SHA2565f9b898315ad8192e87e21a499fd87d31b886513bb39d368476174aaa89a2bf9
SHA512dbadca544434a847238bf107e59aa84bf8df9df899d0c2da2ee62cc28e12d175a81d4e4e0f85d7c394323bf66fb4ac0f413c949700ecdec9a73ed5cf9340aebb
-
Filesize
54KB
MD5c4b470269324517ee838789c7cf5e606
SHA17005597d55fb26c6260e0772f301c79f030e6d56
SHA2565f9b898315ad8192e87e21a499fd87d31b886513bb39d368476174aaa89a2bf9
SHA512dbadca544434a847238bf107e59aa84bf8df9df899d0c2da2ee62cc28e12d175a81d4e4e0f85d7c394323bf66fb4ac0f413c949700ecdec9a73ed5cf9340aebb
-
Filesize
54KB
MD5c4b470269324517ee838789c7cf5e606
SHA17005597d55fb26c6260e0772f301c79f030e6d56
SHA2565f9b898315ad8192e87e21a499fd87d31b886513bb39d368476174aaa89a2bf9
SHA512dbadca544434a847238bf107e59aa84bf8df9df899d0c2da2ee62cc28e12d175a81d4e4e0f85d7c394323bf66fb4ac0f413c949700ecdec9a73ed5cf9340aebb
-
Filesize
54KB
MD5c4b470269324517ee838789c7cf5e606
SHA17005597d55fb26c6260e0772f301c79f030e6d56
SHA2565f9b898315ad8192e87e21a499fd87d31b886513bb39d368476174aaa89a2bf9
SHA512dbadca544434a847238bf107e59aa84bf8df9df899d0c2da2ee62cc28e12d175a81d4e4e0f85d7c394323bf66fb4ac0f413c949700ecdec9a73ed5cf9340aebb
-
Filesize
54KB
MD5c4b470269324517ee838789c7cf5e606
SHA17005597d55fb26c6260e0772f301c79f030e6d56
SHA2565f9b898315ad8192e87e21a499fd87d31b886513bb39d368476174aaa89a2bf9
SHA512dbadca544434a847238bf107e59aa84bf8df9df899d0c2da2ee62cc28e12d175a81d4e4e0f85d7c394323bf66fb4ac0f413c949700ecdec9a73ed5cf9340aebb
-
Filesize
54KB
MD5c4b470269324517ee838789c7cf5e606
SHA17005597d55fb26c6260e0772f301c79f030e6d56
SHA2565f9b898315ad8192e87e21a499fd87d31b886513bb39d368476174aaa89a2bf9
SHA512dbadca544434a847238bf107e59aa84bf8df9df899d0c2da2ee62cc28e12d175a81d4e4e0f85d7c394323bf66fb4ac0f413c949700ecdec9a73ed5cf9340aebb
-
Filesize
54KB
MD5c4b470269324517ee838789c7cf5e606
SHA17005597d55fb26c6260e0772f301c79f030e6d56
SHA2565f9b898315ad8192e87e21a499fd87d31b886513bb39d368476174aaa89a2bf9
SHA512dbadca544434a847238bf107e59aa84bf8df9df899d0c2da2ee62cc28e12d175a81d4e4e0f85d7c394323bf66fb4ac0f413c949700ecdec9a73ed5cf9340aebb
-
Filesize
54KB
MD5c4b470269324517ee838789c7cf5e606
SHA17005597d55fb26c6260e0772f301c79f030e6d56
SHA2565f9b898315ad8192e87e21a499fd87d31b886513bb39d368476174aaa89a2bf9
SHA512dbadca544434a847238bf107e59aa84bf8df9df899d0c2da2ee62cc28e12d175a81d4e4e0f85d7c394323bf66fb4ac0f413c949700ecdec9a73ed5cf9340aebb
-
Filesize
1KB
MD5abc6379205de2618851c4fcbf72112eb
SHA11ed7b1e965eab56f55efda975f9f7ade95337267
SHA25622e7528e56dffaa26cfe722994655686c90824b13eb51184abfe44d4e95d473f
SHA512180c7f400dd13092b470e3a91bf02e98ef6247c1193bf349e3710e8d1e9003f3bc9b792bb776eacb746e9c67b3041f2333cc07f28c5f046d59274742230fb7c1
-
Filesize
1KB
MD5abc6379205de2618851c4fcbf72112eb
SHA11ed7b1e965eab56f55efda975f9f7ade95337267
SHA25622e7528e56dffaa26cfe722994655686c90824b13eb51184abfe44d4e95d473f
SHA512180c7f400dd13092b470e3a91bf02e98ef6247c1193bf349e3710e8d1e9003f3bc9b792bb776eacb746e9c67b3041f2333cc07f28c5f046d59274742230fb7c1