Analysis
-
max time kernel
88s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2023, 15:11
Static task
static1
Behavioral task
behavioral1
Sample
d99ad61e2c82cdee34498ec86c2eb31e39dd2be6c3469bf37f425f584b385bae_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
d99ad61e2c82cdee34498ec86c2eb31e39dd2be6c3469bf37f425f584b385bae_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
d99ad61e2c82cdee34498ec86c2eb31e39dd2be6c3469bf37f425f584b385bae_JC.exe
-
Size
877KB
-
MD5
c794c1734524efb42b38aff6557ddae2
-
SHA1
ee957749b72eef79cea5c8309390a95ccb05097b
-
SHA256
d99ad61e2c82cdee34498ec86c2eb31e39dd2be6c3469bf37f425f584b385bae
-
SHA512
e0da7e04136f0ae928c4ca218c51d82abbb40c7ef4c555c307faefe043ecade09b3ce47a7a245b6b27be3d8c35227781580777387a7465388974b91c0851d194
-
SSDEEP
24576:/yF9sHhSwNw51HZ+jchl713jR4lQmq6V:KMQwOE4vljRz
Malware Config
Extracted
redline
jordan
77.91.124.55:19071
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
gigant
77.91.124.55:19071
Extracted
amadey
3.89
http://77.91.124.1/theme/index.php
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
Extracted
smokeloader
up3
Extracted
redline
@ytlogsbot
176.123.4.46:33783
-
auth_value
295b226f1b63bcd55148625381b27b19
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Extracted
fabookie
http://app.nnnaajjjgc.com/check/safe
Signatures
-
DcRat 4 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d99ad61e2c82cdee34498ec86c2eb31e39dd2be6c3469bf37f425f584b385bae_JC.exe 5288 schtasks.exe 4436 schtasks.exe 1264 schtasks.exe -
Detect Fabookie payload 1 IoCs
resource yara_rule behavioral2/memory/5564-636-0x00000000039A0000-0x0000000003AD1000-memory.dmp family_fabookie -
Detects Healer an antivirus disabler dropper 6 IoCs
resource yara_rule behavioral2/files/0x0007000000023203-26.dat healer behavioral2/files/0x0007000000023203-27.dat healer behavioral2/memory/1536-28-0x00000000001E0000-0x00000000001EA000-memory.dmp healer behavioral2/files/0x000700000002328f-452.dat healer behavioral2/files/0x000700000002328f-450.dat healer behavioral2/memory/408-453-0x0000000000770000-0x000000000077A000-memory.dmp healer -
Glupteba payload 11 IoCs
resource yara_rule behavioral2/memory/5696-519-0x0000000004A20000-0x000000000530B000-memory.dmp family_glupteba behavioral2/memory/5696-549-0x0000000000400000-0x000000000298D000-memory.dmp family_glupteba behavioral2/memory/5696-633-0x0000000004A20000-0x000000000530B000-memory.dmp family_glupteba behavioral2/memory/5696-637-0x0000000000400000-0x000000000298D000-memory.dmp family_glupteba behavioral2/memory/5696-801-0x0000000000400000-0x000000000298D000-memory.dmp family_glupteba behavioral2/memory/5696-869-0x0000000000400000-0x000000000298D000-memory.dmp family_glupteba behavioral2/memory/3024-904-0x0000000000400000-0x000000000298D000-memory.dmp family_glupteba behavioral2/memory/3024-936-0x0000000000400000-0x000000000298D000-memory.dmp family_glupteba behavioral2/memory/1620-1025-0x0000000000400000-0x000000000298D000-memory.dmp family_glupteba behavioral2/memory/1620-1037-0x0000000000400000-0x000000000298D000-memory.dmp family_glupteba behavioral2/memory/1620-1049-0x0000000000400000-0x000000000298D000-memory.dmp family_glupteba -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1145.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1145.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 7315474.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1145.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 7315474.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 7315474.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 7315474.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1145.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1145.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 7315474.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 7315474.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 4 IoCs
resource yara_rule behavioral2/memory/3080-40-0x0000000000400000-0x000000000043E000-memory.dmp family_redline behavioral2/files/0x0006000000023267-314.dat family_redline behavioral2/files/0x0006000000023267-315.dat family_redline behavioral2/memory/3396-317-0x0000000000C60000-0x0000000000C9E000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 5644 netsh.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation explothe.exe Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation 1EF3.exe Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation kos1.exe Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation kos.exe Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation 13F5.exe -
Executes dropped EXE 35 IoCs
pid Process 1148 YH2De48.exe 4632 CE4nG93.exe 4692 gW2Lx82.exe 1536 7315474.exe 1608 7346535.exe 3024 ig709Td.exe 924 rg81xh9.exe 2932 zBv8so2.exe 1788 F647.exe 1432 Wa7CR8Ic.exe 4196 OC3qI2XR.exe 1556 gR3yW0Gp.exe 2992 Ag6mW0fO.exe 4540 1MR23lo7.exe 3396 2MO722us.exe 1928 192.exe 3608 1069.exe 408 1145.exe 1148 13F5.exe 5228 explothe.exe 5500 1EF3.exe 5564 ss41.exe 5620 toolspub2.exe 5696 31839b57a4f11171d6abc8bbc4451ee4.exe 5756 kos1.exe 5792 toolspub2.exe 5856 23C6.exe 5980 set16.exe 6088 kos.exe 6128 is-470QQ.tmp 5344 previewer.exe 5716 previewer.exe 3024 31839b57a4f11171d6abc8bbc4451ee4.exe 1620 csrss.exe 3732 explothe.exe -
Loads dropped DLL 3 IoCs
pid Process 6128 is-470QQ.tmp 6128 is-470QQ.tmp 6128 is-470QQ.tmp -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution 1 TTPs
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 7315474.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 1145.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d99ad61e2c82cdee34498ec86c2eb31e39dd2be6c3469bf37f425f584b385bae_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" YH2De48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" gW2Lx82.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" OC3qI2XR.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP005.TMP\\\"" Ag6mW0fO.exe Set value (str) \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" CE4nG93.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" F647.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Wa7CR8Ic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" gR3yW0Gp.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of SetThreadContext 8 IoCs
description pid Process procid_target PID 1608 set thread context of 1432 1608 7346535.exe 95 PID 3024 set thread context of 3080 3024 ig709Td.exe 100 PID 924 set thread context of 1928 924 rg81xh9.exe 105 PID 4540 set thread context of 4984 4540 1MR23lo7.exe 143 PID 1928 set thread context of 408 1928 192.exe 164 PID 3608 set thread context of 2656 3608 1069.exe 166 PID 5620 set thread context of 5792 5620 toolspub2.exe 185 PID 5856 set thread context of 5208 5856 23C6.exe 191 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 31839b57a4f11171d6abc8bbc4451ee4.exe -
Drops file in Program Files directory 7 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\PA Previewer\previewer.exe is-470QQ.tmp File created C:\Program Files (x86)\PA Previewer\unins000.dat is-470QQ.tmp File created C:\Program Files (x86)\PA Previewer\is-ES4C8.tmp is-470QQ.tmp File created C:\Program Files (x86)\PA Previewer\is-CM0OL.tmp is-470QQ.tmp File created C:\Program Files (x86)\PA Previewer\is-A8ED1.tmp is-470QQ.tmp File created C:\Program Files (x86)\PA Previewer\is-2NP21.tmp is-470QQ.tmp File opened for modification C:\Program Files (x86)\PA Previewer\unins000.dat is-470QQ.tmp -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss 31839b57a4f11171d6abc8bbc4451ee4.exe File created C:\Windows\rss\csrss.exe 31839b57a4f11171d6abc8bbc4451ee4.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5012 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 8 IoCs
pid pid_target Process procid_target 2360 1608 WerFault.exe 93 4916 3024 WerFault.exe 98 3244 924 WerFault.exe 103 4408 1928 WerFault.exe 105 1548 4540 WerFault.exe 141 4436 4984 WerFault.exe 143 2312 1928 WerFault.exe 149 5196 3608 WerFault.exe 162 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4436 schtasks.exe 1264 schtasks.exe 5288 schtasks.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2511 = "Lord Howe Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-652 = "AUS Central Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2791 = "Novosibirsk Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1501 = "Turkey Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-281 = "Central Europe Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-331 = "E. Europe Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-32 = "Mid-Atlantic Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2632 = "Norfolk Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2892 = "Sudan Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-342 = "Egypt Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-222 = "Alaskan Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2041 = "Eastern Daylight Time (Mexico)" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1841 = "Russia TZ 4 Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-212 = "Pacific Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-105 = "Central Brazilian Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-371 = "Jerusalem Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-572 = "China Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2571 = "Turks and Caicos Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2162 = "Altai Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-362 = "GTB Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-3052 = "Qyzylorda Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2532 = "Chatham Islands Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1721 = "Libya Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-182 = "Mountain Standard Time (Mexico)" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1931 = "Russia TZ 11 Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2841 = "Saratov Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-384 = "Namibia Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-871 = "Pakistan Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-571 = "China Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-492 = "India Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2412 = "Marquesas Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2792 = "Novosibirsk Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-502 = "Nepal Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1831 = "Russia TZ 2 Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1536 7315474.exe 1536 7315474.exe 1432 AppLaunch.exe 1432 AppLaunch.exe 1344 msedge.exe 1344 msedge.exe 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 408 msedge.exe 408 msedge.exe 3136 Process not Found 3136 Process not Found 2088 msedge.exe 2088 msedge.exe 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3136 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1432 AppLaunch.exe 5792 toolspub2.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1536 7315474.exe Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeDebugPrivilege 408 1145.exe Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2872 wrote to memory of 1148 2872 d99ad61e2c82cdee34498ec86c2eb31e39dd2be6c3469bf37f425f584b385bae_JC.exe 86 PID 2872 wrote to memory of 1148 2872 d99ad61e2c82cdee34498ec86c2eb31e39dd2be6c3469bf37f425f584b385bae_JC.exe 86 PID 2872 wrote to memory of 1148 2872 d99ad61e2c82cdee34498ec86c2eb31e39dd2be6c3469bf37f425f584b385bae_JC.exe 86 PID 1148 wrote to memory of 4632 1148 YH2De48.exe 87 PID 1148 wrote to memory of 4632 1148 YH2De48.exe 87 PID 1148 wrote to memory of 4632 1148 YH2De48.exe 87 PID 4632 wrote to memory of 4692 4632 CE4nG93.exe 88 PID 4632 wrote to memory of 4692 4632 CE4nG93.exe 88 PID 4632 wrote to memory of 4692 4632 CE4nG93.exe 88 PID 4692 wrote to memory of 1536 4692 gW2Lx82.exe 89 PID 4692 wrote to memory of 1536 4692 gW2Lx82.exe 89 PID 4692 wrote to memory of 1608 4692 gW2Lx82.exe 93 PID 4692 wrote to memory of 1608 4692 gW2Lx82.exe 93 PID 4692 wrote to memory of 1608 4692 gW2Lx82.exe 93 PID 1608 wrote to memory of 1432 1608 7346535.exe 95 PID 1608 wrote to memory of 1432 1608 7346535.exe 95 PID 1608 wrote to memory of 1432 1608 7346535.exe 95 PID 1608 wrote to memory of 1432 1608 7346535.exe 95 PID 1608 wrote to memory of 1432 1608 7346535.exe 95 PID 1608 wrote to memory of 1432 1608 7346535.exe 95 PID 4632 wrote to memory of 3024 4632 CE4nG93.exe 98 PID 4632 wrote to memory of 3024 4632 CE4nG93.exe 98 PID 4632 wrote to memory of 3024 4632 CE4nG93.exe 98 PID 3024 wrote to memory of 3080 3024 ig709Td.exe 100 PID 3024 wrote to memory of 3080 3024 ig709Td.exe 100 PID 3024 wrote to memory of 3080 3024 ig709Td.exe 100 PID 3024 wrote to memory of 3080 3024 ig709Td.exe 100 PID 3024 wrote to memory of 3080 3024 ig709Td.exe 100 PID 3024 wrote to memory of 3080 3024 ig709Td.exe 100 PID 3024 wrote to memory of 3080 3024 ig709Td.exe 100 PID 3024 wrote to memory of 3080 3024 ig709Td.exe 100 PID 1148 wrote to memory of 924 1148 YH2De48.exe 103 PID 1148 wrote to memory of 924 1148 YH2De48.exe 103 PID 1148 wrote to memory of 924 1148 YH2De48.exe 103 PID 924 wrote to memory of 1928 924 rg81xh9.exe 105 PID 924 wrote to memory of 1928 924 rg81xh9.exe 105 PID 924 wrote to memory of 1928 924 rg81xh9.exe 105 PID 924 wrote to memory of 1928 924 rg81xh9.exe 105 PID 924 wrote to memory of 1928 924 rg81xh9.exe 105 PID 924 wrote to memory of 1928 924 rg81xh9.exe 105 PID 924 wrote to memory of 1928 924 rg81xh9.exe 105 PID 924 wrote to memory of 1928 924 rg81xh9.exe 105 PID 924 wrote to memory of 1928 924 rg81xh9.exe 105 PID 924 wrote to memory of 1928 924 rg81xh9.exe 105 PID 2872 wrote to memory of 2932 2872 d99ad61e2c82cdee34498ec86c2eb31e39dd2be6c3469bf37f425f584b385bae_JC.exe 110 PID 2872 wrote to memory of 2932 2872 d99ad61e2c82cdee34498ec86c2eb31e39dd2be6c3469bf37f425f584b385bae_JC.exe 110 PID 2872 wrote to memory of 2932 2872 d99ad61e2c82cdee34498ec86c2eb31e39dd2be6c3469bf37f425f584b385bae_JC.exe 110 PID 2932 wrote to memory of 4808 2932 zBv8so2.exe 112 PID 2932 wrote to memory of 4808 2932 zBv8so2.exe 112 PID 4808 wrote to memory of 2564 4808 cmd.exe 113 PID 4808 wrote to memory of 2564 4808 cmd.exe 113 PID 4808 wrote to memory of 2088 4808 cmd.exe 115 PID 4808 wrote to memory of 2088 4808 cmd.exe 115 PID 2088 wrote to memory of 3728 2088 msedge.exe 116 PID 2088 wrote to memory of 3728 2088 msedge.exe 116 PID 2564 wrote to memory of 2668 2564 msedge.exe 117 PID 2564 wrote to memory of 2668 2564 msedge.exe 117 PID 2088 wrote to memory of 1936 2088 msedge.exe 119 PID 2088 wrote to memory of 1936 2088 msedge.exe 119 PID 2088 wrote to memory of 1936 2088 msedge.exe 119 PID 2088 wrote to memory of 1936 2088 msedge.exe 119 PID 2088 wrote to memory of 1936 2088 msedge.exe 119 PID 2088 wrote to memory of 1936 2088 msedge.exe 119 PID 2088 wrote to memory of 1936 2088 msedge.exe 119 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d99ad61e2c82cdee34498ec86c2eb31e39dd2be6c3469bf37f425f584b385bae_JC.exe"C:\Users\Admin\AppData\Local\Temp\d99ad61e2c82cdee34498ec86c2eb31e39dd2be6c3469bf37f425f584b385bae_JC.exe"1⤵
- DcRat
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\YH2De48.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\YH2De48.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\CE4nG93.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\CE4nG93.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gW2Lx82.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gW2Lx82.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\7315474.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\7315474.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1536
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\7346535.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\7346535.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1608 -s 5966⤵
- Program crash
PID:2360
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ig709Td.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ig709Td.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:3080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3024 -s 1525⤵
- Program crash
PID:4916
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rg81xh9.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rg81xh9.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:1928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1928 -s 5405⤵
- Program crash
PID:4408
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 924 -s 1524⤵
- Program crash
PID:3244
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zBv8so2.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zBv8so2.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\A2E7.tmp\A2E8.tmp\A2E9.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zBv8so2.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/login4⤵
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffe465646f8,0x7ffe46564708,0x7ffe465647185⤵PID:2668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,909177216586753820,9617294049927129648,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:25⤵PID:3872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,909177216586753820,9617294049927129648,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:408
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/4⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ffe465646f8,0x7ffe46564708,0x7ffe465647185⤵PID:3728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1948,7901028729109395979,7667506549284250982,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:1344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1948,7901028729109395979,7667506549284250982,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:25⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1948,7901028729109395979,7667506549284250982,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:85⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,7901028729109395979,7667506549284250982,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:15⤵PID:820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,7901028729109395979,7667506549284250982,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:15⤵PID:2660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,7901028729109395979,7667506549284250982,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3876 /prefetch:15⤵PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1948,7901028729109395979,7667506549284250982,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5356 /prefetch:85⤵PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1948,7901028729109395979,7667506549284250982,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5356 /prefetch:85⤵PID:1464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,7901028729109395979,7667506549284250982,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=164 /prefetch:15⤵PID:924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,7901028729109395979,7667506549284250982,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:15⤵PID:2800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,7901028729109395979,7667506549284250982,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5720 /prefetch:15⤵PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,7901028729109395979,7667506549284250982,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5752 /prefetch:15⤵PID:444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,7901028729109395979,7667506549284250982,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5772 /prefetch:15⤵PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,7901028729109395979,7667506549284250982,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:15⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,7901028729109395979,7667506549284250982,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3896 /prefetch:15⤵PID:6108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,7901028729109395979,7667506549284250982,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:15⤵PID:6136
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 1608 -ip 16081⤵PID:1676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3024 -ip 30241⤵PID:916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 924 -ip 9241⤵PID:4904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1928 -ip 19281⤵PID:3660
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4412
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3440
-
C:\Users\Admin\AppData\Local\Temp\F647.exeC:\Users\Admin\AppData\Local\Temp\F647.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Wa7CR8Ic.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Wa7CR8Ic.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\OC3qI2XR.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\OC3qI2XR.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4196 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\gR3yW0Gp.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\gR3yW0Gp.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\Ag6mW0fO.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\Ag6mW0fO.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\1MR23lo7.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\1MR23lo7.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4540 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:4984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4984 -s 5528⤵
- Program crash
PID:4436
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 1527⤵
- Program crash
PID:1548
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\2MO722us.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\2MO722us.exe6⤵
- Executes dropped EXE
PID:3396
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 4540 -ip 45401⤵PID:4560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 4984 -ip 49841⤵PID:3652
-
C:\Users\Admin\AppData\Local\Temp\192.exeC:\Users\Admin\AppData\Local\Temp\192.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1928 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1928 -s 1482⤵
- Program crash
PID:2312
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\32A.bat" "1⤵PID:2064
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/login2⤵PID:2588
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ffe465646f8,0x7ffe46564708,0x7ffe465647183⤵PID:3532
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/2⤵PID:1592
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffe465646f8,0x7ffe46564708,0x7ffe465647183⤵PID:5088
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1928 -ip 19281⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\1069.exeC:\Users\Admin\AppData\Local\Temp\1069.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3608 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:2656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3608 -s 1522⤵
- Program crash
PID:5196
-
-
C:\Users\Admin\AppData\Local\Temp\1145.exeC:\Users\Admin\AppData\Local\Temp\1145.exe1⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious use of AdjustPrivilegeToken
PID:408
-
C:\Users\Admin\AppData\Local\Temp\13F5.exeC:\Users\Admin\AppData\Local\Temp\13F5.exe1⤵
- Checks computer location settings
- Executes dropped EXE
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:5228 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F3⤵
- DcRat
- Creates scheduled task(s)
PID:5288
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit3⤵PID:5336
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:5384
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:N"4⤵PID:5400
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:R" /E4⤵PID:5416
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"4⤵PID:5444
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E4⤵PID:5464
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:5432
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main3⤵PID:5732
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3608 -ip 36081⤵PID:5140
-
C:\Users\Admin\AppData\Local\Temp\1EF3.exeC:\Users\Admin\AppData\Local\Temp\1EF3.exe1⤵
- Checks computer location settings
- Executes dropped EXE
PID:5500 -
C:\Users\Admin\AppData\Local\Temp\ss41.exe"C:\Users\Admin\AppData\Local\Temp\ss41.exe"2⤵
- Executes dropped EXE
PID:5564
-
-
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5620 -
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:5792
-
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"2⤵
- Executes dropped EXE
PID:5696 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵PID:6060
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:3024 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:772
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵PID:2800
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
- Modifies Windows Firewall
PID:5644
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:5512
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4240
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵
- Executes dropped EXE
PID:1620 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4484
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- DcRat
- Creates scheduled task(s)
PID:4436
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4932
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f5⤵PID:3108
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Modifies data under HKEY_USERS
PID:4916
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵PID:5516
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- DcRat
- Creates scheduled task(s)
PID:1264
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"5⤵PID:1832
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵PID:4392
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵
- Launches sc.exe
PID:5012
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\kos1.exe"C:\Users\Admin\AppData\Local\Temp\kos1.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:5756 -
C:\Users\Admin\AppData\Local\Temp\set16.exe"C:\Users\Admin\AppData\Local\Temp\set16.exe"3⤵
- Executes dropped EXE
PID:5980 -
C:\Users\Admin\AppData\Local\Temp\is-DFVDV.tmp\is-470QQ.tmp"C:\Users\Admin\AppData\Local\Temp\is-DFVDV.tmp\is-470QQ.tmp" /SL4 $3024E "C:\Users\Admin\AppData\Local\Temp\set16.exe" 1232936 522244⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
PID:6128 -
C:\Program Files (x86)\PA Previewer\previewer.exe"C:\Program Files (x86)\PA Previewer\previewer.exe" -i5⤵
- Executes dropped EXE
PID:5344
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 85⤵PID:5360
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 86⤵PID:5732
-
-
-
C:\Program Files (x86)\PA Previewer\previewer.exe"C:\Program Files (x86)\PA Previewer\previewer.exe" -s5⤵
- Executes dropped EXE
PID:5716
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\kos.exe"C:\Users\Admin\AppData\Local\Temp\kos.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
PID:6088
-
-
-
C:\Users\Admin\AppData\Local\Temp\23C6.exeC:\Users\Admin\AppData\Local\Temp\23C6.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5856 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵PID:5208
-
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:3732
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵PID:628
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵PID:4220
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Scripting
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53d5af55f794f9a10c5943d2f80dde5c5
SHA15252adf87d6bd769f2c39b9e8eba77b087a0160d
SHA25643e50edafcaaeae9fcd4dce5b99bf14fe79dae1401019443f31aa9ff81347764
SHA5122e2e09a00db732ff934da1e6ab8617fb3c8de482f9667a2c987435d0a5d67550b4bfd66e8b4475012b60908c24e39dff58e2f2ffa55f13ffc55caae1be630c71
-
Filesize
152B
MD53d5af55f794f9a10c5943d2f80dde5c5
SHA15252adf87d6bd769f2c39b9e8eba77b087a0160d
SHA25643e50edafcaaeae9fcd4dce5b99bf14fe79dae1401019443f31aa9ff81347764
SHA5122e2e09a00db732ff934da1e6ab8617fb3c8de482f9667a2c987435d0a5d67550b4bfd66e8b4475012b60908c24e39dff58e2f2ffa55f13ffc55caae1be630c71
-
Filesize
152B
MD57a602869e579f44dfa2a249baa8c20fe
SHA1e0ac4a8508f60cb0408597eb1388b3075e27383f
SHA2569ecfb98abb311a853f6b532b8eb6861455ca3f0cc3b4b6b844095ad8fb28dfa5
SHA5121f611034390aaeb815d92514cdeea68c52ceb101ad8ac9f0ae006226bebc15bfa283375b88945f38837c2423d2d397fbf832b85f7db230af6392c565d21f8d10
-
Filesize
152B
MD53d5af55f794f9a10c5943d2f80dde5c5
SHA15252adf87d6bd769f2c39b9e8eba77b087a0160d
SHA25643e50edafcaaeae9fcd4dce5b99bf14fe79dae1401019443f31aa9ff81347764
SHA5122e2e09a00db732ff934da1e6ab8617fb3c8de482f9667a2c987435d0a5d67550b4bfd66e8b4475012b60908c24e39dff58e2f2ffa55f13ffc55caae1be630c71
-
Filesize
152B
MD53d5af55f794f9a10c5943d2f80dde5c5
SHA15252adf87d6bd769f2c39b9e8eba77b087a0160d
SHA25643e50edafcaaeae9fcd4dce5b99bf14fe79dae1401019443f31aa9ff81347764
SHA5122e2e09a00db732ff934da1e6ab8617fb3c8de482f9667a2c987435d0a5d67550b4bfd66e8b4475012b60908c24e39dff58e2f2ffa55f13ffc55caae1be630c71
-
Filesize
152B
MD53d5af55f794f9a10c5943d2f80dde5c5
SHA15252adf87d6bd769f2c39b9e8eba77b087a0160d
SHA25643e50edafcaaeae9fcd4dce5b99bf14fe79dae1401019443f31aa9ff81347764
SHA5122e2e09a00db732ff934da1e6ab8617fb3c8de482f9667a2c987435d0a5d67550b4bfd66e8b4475012b60908c24e39dff58e2f2ffa55f13ffc55caae1be630c71
-
Filesize
152B
MD53d5af55f794f9a10c5943d2f80dde5c5
SHA15252adf87d6bd769f2c39b9e8eba77b087a0160d
SHA25643e50edafcaaeae9fcd4dce5b99bf14fe79dae1401019443f31aa9ff81347764
SHA5122e2e09a00db732ff934da1e6ab8617fb3c8de482f9667a2c987435d0a5d67550b4bfd66e8b4475012b60908c24e39dff58e2f2ffa55f13ffc55caae1be630c71
-
Filesize
152B
MD53d5af55f794f9a10c5943d2f80dde5c5
SHA15252adf87d6bd769f2c39b9e8eba77b087a0160d
SHA25643e50edafcaaeae9fcd4dce5b99bf14fe79dae1401019443f31aa9ff81347764
SHA5122e2e09a00db732ff934da1e6ab8617fb3c8de482f9667a2c987435d0a5d67550b4bfd66e8b4475012b60908c24e39dff58e2f2ffa55f13ffc55caae1be630c71
-
Filesize
152B
MD53d5af55f794f9a10c5943d2f80dde5c5
SHA15252adf87d6bd769f2c39b9e8eba77b087a0160d
SHA25643e50edafcaaeae9fcd4dce5b99bf14fe79dae1401019443f31aa9ff81347764
SHA5122e2e09a00db732ff934da1e6ab8617fb3c8de482f9667a2c987435d0a5d67550b4bfd66e8b4475012b60908c24e39dff58e2f2ffa55f13ffc55caae1be630c71
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5cf9223397071b38a6d2052cb4c8e13ed
SHA11a01890da884c5b2a2e931d38cce4f4c50f77bd5
SHA25697747a12f55e2b2a21aeb2216e6dab2da4d569d7edd9bc1953bec14159662daa
SHA5128eaaa2356b1d501e957ab2c809977431e09c02a13c9fd64b577980dfa8a14cf81399c8030545a013e869f8fc06e834b2d996dee80fcf4b48555199993504fdc9
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
1KB
MD5a5d2951e568f906712750facfcade19c
SHA1d89796907b06480c466e5bcc3427f05060009c5a
SHA256b36b91a48878a4b7dcc219f64d82b5045d26732d09a5ed053f911f90121c51a5
SHA5124aedc9d78664b7ec0bb80087cc4ea5126fd15a0da57b7a9a5615241917e1317c684c1159eb12295c1def5c29d26b7b29c2601ce9819ab754cf94c1e44af451c0
-
Filesize
6KB
MD54ba5cf326270ee3e1850c4c7da4ecbc5
SHA1a311f2d4322d0d9304bd5b29c0dc51424391670d
SHA256194132437d2701ca6d9d333c0cad5403ca0c235f903010c20a582147fcca316d
SHA5129a417bef9da1e21721ef55885713dbb75727c9445b6eeea500eebf799493a3f7788cccdeba7d17d4caf36d23b6259f54311b3579bd8fbd622a34b058dd5682f1
-
Filesize
7KB
MD59a53cc3fef3292e34a81cfa62ca3a59d
SHA1b26302d4d5284e020b1699a73b421e31a6873e41
SHA2564abdf283cc4786b99053c856e58066dc8c05533a3a4098d2c4934281bf9de079
SHA512c43034216718e69678471cfa4fe4e2612222c06d0ed470a14cf250001b9a465cd9e37bf929b7cbcafa8956c95b13536ab5b086072d4f581d67af16c3a586df67
-
Filesize
5KB
MD563a041fbd667e7b67b8943c8e2d50c56
SHA1e321479952c70c941dfe38c3040a9fa9e4b9e32d
SHA256581684b4b744d8ffc2b744e1626623d7987ed10b232abad70c6e9668f8dbd81c
SHA512862b38e113880bfcb97163f97b0223fc3cd711a01da7a12ec410838105197e33db15f2b43c3e5abf9f3c2d5a569bf4fe66aa80df18ded01c02f2d98bedfa1ed6
-
Filesize
6KB
MD57850e8cadfb7c85b464a7a16d62db7db
SHA18615126c87ae9251d6f9dd483de64702477aa7aa
SHA25602bb3082eacbd2e1aa291e57325c903677c678675d046def577073f2e77e6d2f
SHA512ebd4fa1bfcee4a00c3c8c940159ba509cb0f7539fd19c7589733352eb37465966443f1624a806cbec66cb78145b654e2112a1c2f1d6e5d75ea5dac946cd86a2c
-
Filesize
24KB
MD510f5b64000466c1e6da25fb5a0115924
SHA1cb253bacf2b087c4040eb3c6a192924234f68639
SHA256d818b1cebb2d1e2b269f2e41654702a0df261e63ba2a479f34b75563265ee46b
SHA5128a8d230594d6fade63ecd63ba60985a7ccd1353de8d0a119543985bf182fdbb45f38ccc96441c24f0792ea1c449de69563c38348c2bedb2845522a2f83a149db
-
Filesize
872B
MD59d93d11f31a8dc145206048570d7dc03
SHA1f28aa037fdfe5d0719ea779e5e6734bd62f040ef
SHA256795e737e944e7dcafb4d84b0db92de4763c56547a5f10c92f33b1c87ee0b5b69
SHA51284e43c345045074be9bf76f8e21fb16fbee4ee2bf4d059b64e714d12c6e344cf8825ae5014b8e2ec1f5cb5800cf1bc774cdea582e50fad11687ce941fee71148
-
Filesize
872B
MD509afa744d638722aeb7dad239c7de5d4
SHA1992a096bfbae747850bc91723ee7eb94482f5e76
SHA256c705ba9e0e9da004143105104b81e4484fcfc51c52b3aea23e51483902525d14
SHA51296f19213ae09595d4059d97fc0e310169ce4bcc4ff48dd4755dec3f30d7a80e985de4156d378e1e987877d124269a144689b0c02536373ac4a9ecf8cc92495ec
-
Filesize
872B
MD50ef94147da955573edb50799fe792a8f
SHA14b1a5d4b8a5c4c729555442c412b9469e5a5b49f
SHA256bb1abcd4d10e4c377edeb19bf82701da8a3c6c0db5976bfdb64ea892f9a98441
SHA512b2f9db467a444c61a148528c9779c63c22b04297f81de9ed4fa7620be51abe1399ba1e682d8ea3aaa87c5c005e7689765fd6d44f21eaab25a2b590ac2623405a
-
Filesize
872B
MD5eac20bf055096089c87c94e93aa6360d
SHA14b8b619ecb6e4fa9ebe160b53b426b1ad25ae769
SHA2560cb8d921a583288b24a4605f240254d6c4cece1ceb25957b693226b9355bad88
SHA5123192c619aba02416c53868c532a11dc53283fc380b8c00ef1a763581653bfc4c32020c9c00acddbdf4de9e33162af5e3a4111c413443666b4279a915be485639
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD532f33bf29212a4ab3e4b2570ac0df34e
SHA1bf5574ca9141774f4ac10923f6771ff604de6a52
SHA256e44dd43f9e8f991836ec23a81b500128dc84865340b91b3d8ddc7a2cc30487d4
SHA5124ff708828778e291341a398fdab817c9e031c6da88c43b3e58e536e39f41ace2e905ea29df5bf96f485a628747c0ed2b4d0762b5be24955255d4f14a0dc34265
-
Filesize
10KB
MD5837c31d91a2300eb68d0016f8642af6f
SHA132477c530ed8d4418ec34c2048a2f5b3dd7edd11
SHA2565d9d626ba77ffb5b746d19226247e786bad56f6c66d934cc7a641b2db5850435
SHA5124624bfe6f5de5664461f238709a75b5a875e28484298ab65bc85988072ce49904156b25871bf4fbdb57a6ff9d0ed5f48c82b1fa6286fc74a1b88be69aa7684fe
-
Filesize
2KB
MD5e764d5a5d8c483fea33c6d3d29700bdc
SHA1453e9cb331dd1fdc86e462400a4ffa942d674ea8
SHA25649e5e4435ecf1543c36ba07a75b21785c8d84fc072790ce992fa10b8ec174633
SHA51292554e95e13d5f4a343146bfba0bcf0bd8842026116d71d5cba619ed427b65abe7459f27da6947aa864459304ed3723420e96db32d5378961b106dd553ac571c
-
Filesize
2KB
MD5e764d5a5d8c483fea33c6d3d29700bdc
SHA1453e9cb331dd1fdc86e462400a4ffa942d674ea8
SHA25649e5e4435ecf1543c36ba07a75b21785c8d84fc072790ce992fa10b8ec174633
SHA51292554e95e13d5f4a343146bfba0bcf0bd8842026116d71d5cba619ed427b65abe7459f27da6947aa864459304ed3723420e96db32d5378961b106dd553ac571c
-
Filesize
1.5MB
MD539c7c229c3886eebf0c32b3584af9a27
SHA154c9a3cbd209d1fa75830e06b372d04c8fbcc077
SHA256ae05f6a1edae31206bb180f5862b2276b9f1f65a9d03573e25c3372774b5a2c6
SHA512783a0cce5f6711e3e310ece425e70aef6f4329f8a7132e39ecfbb4977bc1c1a68dfc7051b002522f9c68f5753b5f9e1eed3dc3d9a20565447a1ac9dba3fdd489
-
Filesize
1.5MB
MD539c7c229c3886eebf0c32b3584af9a27
SHA154c9a3cbd209d1fa75830e06b372d04c8fbcc077
SHA256ae05f6a1edae31206bb180f5862b2276b9f1f65a9d03573e25c3372774b5a2c6
SHA512783a0cce5f6711e3e310ece425e70aef6f4329f8a7132e39ecfbb4977bc1c1a68dfc7051b002522f9c68f5753b5f9e1eed3dc3d9a20565447a1ac9dba3fdd489
-
Filesize
19KB
MD5cb71132b03f15b037d3e8a5e4d9e0285
SHA195963fba539b45eb6f6acbd062c48976733519a1
SHA2567f7d4ba0b7b46eff509b3aa2105d10d25f79e13ef3c1b1ec9c889cf2f0f1d373
SHA512d140809bcac5b6b47f710c18ca1df1a3dd9b9adb95dbc368049cdc91874070c9a9f67137941ab17147143ebfabb81de7f1e697e42b0a28d51776b2f9c48cba4a
-
Filesize
19KB
MD5cb71132b03f15b037d3e8a5e4d9e0285
SHA195963fba539b45eb6f6acbd062c48976733519a1
SHA2567f7d4ba0b7b46eff509b3aa2105d10d25f79e13ef3c1b1ec9c889cf2f0f1d373
SHA512d140809bcac5b6b47f710c18ca1df1a3dd9b9adb95dbc368049cdc91874070c9a9f67137941ab17147143ebfabb81de7f1e697e42b0a28d51776b2f9c48cba4a
-
Filesize
227KB
MD569d468f64dc451287c4d2af9e7e1e649
SHA17799b32a7a3c0e8679dade16ff97e60324e8b93c
SHA256e88701f5f2bc931ade631c04c5d2d50e21ba0e64217c022d75b9c38fb132f451
SHA512b8dc99a347a6d4fb7492830221bc89384f44f0f13cb17ef884e6b27e8fa7da5c7dda74bd276f9a3a6ff87373d01a11ed13243cb670cf372955270a558bc6f2bd
-
Filesize
227KB
MD569d468f64dc451287c4d2af9e7e1e649
SHA17799b32a7a3c0e8679dade16ff97e60324e8b93c
SHA256e88701f5f2bc931ade631c04c5d2d50e21ba0e64217c022d75b9c38fb132f451
SHA512b8dc99a347a6d4fb7492830221bc89384f44f0f13cb17ef884e6b27e8fa7da5c7dda74bd276f9a3a6ff87373d01a11ed13243cb670cf372955270a558bc6f2bd
-
Filesize
1.4MB
MD53f1a76337cfb740ee90d715a106852d3
SHA14a849b0eafe7393c9ebba8a30df452c1ea9165d1
SHA256fd1431544e22a95a6adc5257b3ce64f64806d187f8dd9c74cc6fcea7c33b5fed
SHA5128afdd0364756c21d7c981824b3d80b237515e462e19a96bb4cf72ef789c9725676e6885500bfd08f26bde6fed491aebca441c55634f511574e43cfa4d001975a
-
Filesize
1.4MB
MD53f1a76337cfb740ee90d715a106852d3
SHA14a849b0eafe7393c9ebba8a30df452c1ea9165d1
SHA256fd1431544e22a95a6adc5257b3ce64f64806d187f8dd9c74cc6fcea7c33b5fed
SHA5128afdd0364756c21d7c981824b3d80b237515e462e19a96bb4cf72ef789c9725676e6885500bfd08f26bde6fed491aebca441c55634f511574e43cfa4d001975a
-
Filesize
4.2MB
MD57ea584dc49967de03bebdacec829b18d
SHA13d47f0e88c7473bedeed2f14d7a8db1318b93852
SHA25679232c763bddf5c7fc4ca2e1597b8a5cd38902241d689ac1e69f7418a8077a53
SHA512ed57aca6b892cb0229708690df16739e0a976ce28112128c9b4f4e4f06019c4fbe6675cb82a639837ae3374acdc0ee9fdb86b5b28151ccc8c7ed2aeff350fcb0
-
Filesize
79B
MD5403991c4d18ac84521ba17f264fa79f2
SHA1850cc068de0963854b0fe8f485d951072474fd45
SHA256ef6e942aefe925fefac19fa816986ea25de6935c4f377c717e29b94e65f9019f
SHA512a20aaa77065d30195e5893f2ff989979383c8d7f82d9e528d4833b1c1236aef4f85284f5250d0f190a174790b650280ffe1fbff7e00c98024ccf5ca746e5b576
-
Filesize
90B
MD55a115a88ca30a9f57fdbb545490c2043
SHA167e90f37fc4c1ada2745052c612818588a5595f4
SHA25652c4113e7f308faa933ae6e8ff5d1b955ba62d1edac0eb7c972caa26e1ae4e2d
SHA51217c399dad7b7343d5b16156e4d83de78ff5755d12add358bd2987ed4216dd13d24cfec9ecdb92d9d6723bb1d20d8874c0bad969dbec69eed95beb7a2817eb4fe
-
Filesize
1.5MB
MD52099f1da6474a4497c49445aa789e990
SHA1ff121ae47677bc11688d2c2995f46a4b1ff9e19e
SHA256ea29b702e1a47676347176f270c64f1fb905a765b5afad7c537977a4118cfe8b
SHA5122e4bafbeaef3d212480557733142e44ab7a4b34a27ef7c89b19c8edc07a5552bc4d1f299c5bfc9ee74e70630ede2fb5515bfc9c568bd959f29e64e43fcb1bc37
-
Filesize
1.5MB
MD52099f1da6474a4497c49445aa789e990
SHA1ff121ae47677bc11688d2c2995f46a4b1ff9e19e
SHA256ea29b702e1a47676347176f270c64f1fb905a765b5afad7c537977a4118cfe8b
SHA5122e4bafbeaef3d212480557733142e44ab7a4b34a27ef7c89b19c8edc07a5552bc4d1f299c5bfc9ee74e70630ede2fb5515bfc9c568bd959f29e64e43fcb1bc37
-
Filesize
1.3MB
MD50375afe9a1b38ba3dcc6acca933b60fe
SHA1e67e945b38da466a3898ea0877644f677f011d14
SHA25618b5466fdf7e2ed9fff5e89d815465321300130ee53d0dfb1912880b0131efc8
SHA51203b5b2372bc2c6401f18b2741b0f1241f8912708053deb2c9eba07f47b84013300d035065136e4640cdd4bfb24acbed9bb96fa5e362eb1b2c8529c1dbd96f5ee
-
Filesize
1.3MB
MD50375afe9a1b38ba3dcc6acca933b60fe
SHA1e67e945b38da466a3898ea0877644f677f011d14
SHA25618b5466fdf7e2ed9fff5e89d815465321300130ee53d0dfb1912880b0131efc8
SHA51203b5b2372bc2c6401f18b2741b0f1241f8912708053deb2c9eba07f47b84013300d035065136e4640cdd4bfb24acbed9bb96fa5e362eb1b2c8529c1dbd96f5ee
-
Filesize
737KB
MD5bac191d9092f5cd48d17748021c3f05a
SHA111854a3ee67e06a31a238b7fca6aa02ad65aa765
SHA256fbdd420632ef63b2c34c8d724e07a8883f30ccd4dd7ef947f1e739597c69ffee
SHA51262af50f7a2b19bbe1543c7838eed1ae21b228ab8a8bbc25ef781533979a9c8f4cde2952e6615665aafe0935c041efe47249b21939f9e046fdf22d506d7584a3e
-
Filesize
737KB
MD5bac191d9092f5cd48d17748021c3f05a
SHA111854a3ee67e06a31a238b7fca6aa02ad65aa765
SHA256fbdd420632ef63b2c34c8d724e07a8883f30ccd4dd7ef947f1e739597c69ffee
SHA51262af50f7a2b19bbe1543c7838eed1ae21b228ab8a8bbc25ef781533979a9c8f4cde2952e6615665aafe0935c041efe47249b21939f9e046fdf22d506d7584a3e
-
Filesize
89KB
MD579bf241d7774e2161a90d4ce4a61baef
SHA196f7d6185b724e9a894b278e385f823e230cd972
SHA25691929517780a1960593a742ecd08b3a2f584de906a63aadb11f3c549ae168e8c
SHA512058b6d498442ae5a6d582fa43d46981fba0cae4969e66bcfbe12bb5969138178d1836d9051e66a6642a497e1b7eda5a80ffffe242a637b6e55de11144b713678
-
Filesize
89KB
MD579bf241d7774e2161a90d4ce4a61baef
SHA196f7d6185b724e9a894b278e385f823e230cd972
SHA25691929517780a1960593a742ecd08b3a2f584de906a63aadb11f3c549ae168e8c
SHA512058b6d498442ae5a6d582fa43d46981fba0cae4969e66bcfbe12bb5969138178d1836d9051e66a6642a497e1b7eda5a80ffffe242a637b6e55de11144b713678
-
Filesize
495KB
MD52f4a803ffce4bdd06f171ca88779e5c0
SHA1550a3afe1a9860e466bb60dffd856c32743369bd
SHA25664089c2fdec642c52efdf30f52cafff4f510d8d938df1c6931aa201162595047
SHA51294f1d7bb00ed552ec2e05cc158c0b34129e4b7edff167b0e0cdbe9776db404fb9a517068f92bbe0efb49362f2b0222d4ccd766c2b6ef51ebf79d163cc919db10
-
Filesize
495KB
MD52f4a803ffce4bdd06f171ca88779e5c0
SHA1550a3afe1a9860e466bb60dffd856c32743369bd
SHA25664089c2fdec642c52efdf30f52cafff4f510d8d938df1c6931aa201162595047
SHA51294f1d7bb00ed552ec2e05cc158c0b34129e4b7edff167b0e0cdbe9776db404fb9a517068f92bbe0efb49362f2b0222d4ccd766c2b6ef51ebf79d163cc919db10
-
Filesize
1.1MB
MD5f11007afa4a7da5973d63b2758619d5c
SHA1e74089128f2c6c093682b0bbebf8e3ccb4c04114
SHA256305599256bae27deaeba0f4fa2122b36801fd63fcb28dd103179434b8815a82a
SHA512a1a001b6cd65b295437dd20a3c95116dc784b9b60727185a524f0113294e11e7ad3a167a55de8405c5ee3c14ec637b363e707cab26816a5b3e772d946834a6af
-
Filesize
1.1MB
MD5f11007afa4a7da5973d63b2758619d5c
SHA1e74089128f2c6c093682b0bbebf8e3ccb4c04114
SHA256305599256bae27deaeba0f4fa2122b36801fd63fcb28dd103179434b8815a82a
SHA512a1a001b6cd65b295437dd20a3c95116dc784b9b60727185a524f0113294e11e7ad3a167a55de8405c5ee3c14ec637b363e707cab26816a5b3e772d946834a6af
-
Filesize
285KB
MD5b5af9a046cc2d43271fab31877fcf4c9
SHA12c2dc5eeabf4b56c9cc1dc597fbd198899c595af
SHA256b85f8b81a9cd39a5849e2397b22dc549e7722ad27120c4f2aab17c13353b8c85
SHA51286911196768dd46a80e296e00fbf1af0e174894cbf0fcaf939167c169de09515d3a64080006e39c17147ca0b7c4433c3eb59e8699568413396086a904f7cb92b
-
Filesize
285KB
MD5b5af9a046cc2d43271fab31877fcf4c9
SHA12c2dc5eeabf4b56c9cc1dc597fbd198899c595af
SHA256b85f8b81a9cd39a5849e2397b22dc549e7722ad27120c4f2aab17c13353b8c85
SHA51286911196768dd46a80e296e00fbf1af0e174894cbf0fcaf939167c169de09515d3a64080006e39c17147ca0b7c4433c3eb59e8699568413396086a904f7cb92b
-
Filesize
248KB
MD5c9eeea3c34abe3c0c00bd1e32d9aeaab
SHA116d06c391449ec3258677a11ad9390f8b233aa19
SHA256fce41a372a63023bd25b106345a0957113b8841222a7743806ba857af12f2127
SHA5120a5df9824854da3eabe73fa591a84de7a7981cf71ef93320f15838b204d0a8acef83346cccba8cbd5b99a61cfc25fac32e1e3f5a0e316ea8362343268e8501f2
-
Filesize
248KB
MD5c9eeea3c34abe3c0c00bd1e32d9aeaab
SHA116d06c391449ec3258677a11ad9390f8b233aa19
SHA256fce41a372a63023bd25b106345a0957113b8841222a7743806ba857af12f2127
SHA5120a5df9824854da3eabe73fa591a84de7a7981cf71ef93320f15838b204d0a8acef83346cccba8cbd5b99a61cfc25fac32e1e3f5a0e316ea8362343268e8501f2
-
Filesize
367KB
MD59d7b7c2b23d02dcb05f40e354f3383ed
SHA15799a1b8f60f9696f8ff4b7188feee803ab996d6
SHA256a31ce693f666a7c8ba486e083f0481328bf285d27496e03626c1ef5c239bb12b
SHA512082c5cccf8f59ff46e1375ad7d5a0121c7f78e58c412e4c347635cd57ff83ec978f3ce7b44fb0e6996e9a481348d6fae37d4d4623a2782375a1ea001cda109cb
-
Filesize
367KB
MD59d7b7c2b23d02dcb05f40e354f3383ed
SHA15799a1b8f60f9696f8ff4b7188feee803ab996d6
SHA256a31ce693f666a7c8ba486e083f0481328bf285d27496e03626c1ef5c239bb12b
SHA512082c5cccf8f59ff46e1375ad7d5a0121c7f78e58c412e4c347635cd57ff83ec978f3ce7b44fb0e6996e9a481348d6fae37d4d4623a2782375a1ea001cda109cb
-
Filesize
12KB
MD56011b3e4c57b5469011aa444617729be
SHA14e41e2865bcb32e7e89f03f48ed9b6866bdbc776
SHA256ecce9ba68e667200976332686d037b7f2ca645a3a75cddd6fe884c21c472a610
SHA512770c3b09ac466dfb528c8deb0977d41640dfb637de7bf8ebff183ea37853cb16b637702a731d36b3ca2a3373e7ecf73f036aa5fdf8bd1a55be7c5e2970fa30e4
-
Filesize
12KB
MD56011b3e4c57b5469011aa444617729be
SHA14e41e2865bcb32e7e89f03f48ed9b6866bdbc776
SHA256ecce9ba68e667200976332686d037b7f2ca645a3a75cddd6fe884c21c472a610
SHA512770c3b09ac466dfb528c8deb0977d41640dfb637de7bf8ebff183ea37853cb16b637702a731d36b3ca2a3373e7ecf73f036aa5fdf8bd1a55be7c5e2970fa30e4
-
Filesize
175KB
MD50c058e08239dd1dd2e91e19803d962a2
SHA11596c4a1106e3bad62fafa840793cad6a7880678
SHA256f1be6dfa78aa6993990d2683cef3f7b06ff9181823929837b73406833d591977
SHA51256abd2b4d06dd0e608dc9b05aa11bfe3d063b95c7a811cf09a6e1ed46e7e5b4643a122ef1b0ec44f76b2f31760a0ed964639acbc569bda8860bb79f390618399
-
Filesize
175KB
MD50c058e08239dd1dd2e91e19803d962a2
SHA11596c4a1106e3bad62fafa840793cad6a7880678
SHA256f1be6dfa78aa6993990d2683cef3f7b06ff9181823929837b73406833d591977
SHA51256abd2b4d06dd0e608dc9b05aa11bfe3d063b95c7a811cf09a6e1ed46e7e5b4643a122ef1b0ec44f76b2f31760a0ed964639acbc569bda8860bb79f390618399
-
Filesize
735KB
MD572c97dd4e04b68e04827ebde70d085fd
SHA1efda9a1c148d69bc3f91f61a7d524fd1e5ac3807
SHA256f6064ab049eda63d535559dade6057b74665899b071933194aaaf72f330a46b2
SHA512b280c3830982f4ebe5c145cfb690869424d8589eccca120fa55a05961baffa4d6a6de4fdc84532cb8856d6cc7503489ced5619b9669a30edc8a2187b60f18b85
-
Filesize
735KB
MD572c97dd4e04b68e04827ebde70d085fd
SHA1efda9a1c148d69bc3f91f61a7d524fd1e5ac3807
SHA256f6064ab049eda63d535559dade6057b74665899b071933194aaaf72f330a46b2
SHA512b280c3830982f4ebe5c145cfb690869424d8589eccca120fa55a05961baffa4d6a6de4fdc84532cb8856d6cc7503489ced5619b9669a30edc8a2187b60f18b85
-
Filesize
563KB
MD5ecfad44776350ae3047c3029d144ba7f
SHA17842be773df8d94e69308bc51307c4c39ea2e441
SHA25698ff73d84e5d2e82641785629774314631445f5b6368cab1ad1609026903e9d1
SHA51275e2628f5f57696c1341eaaeaa9a7153b879c4e79ffada1dca1bbc0e50bd7870b96f6d652df918249370b21e34aec6db024e1924f5c8ae59bd86854650e0e544
-
Filesize
563KB
MD5ecfad44776350ae3047c3029d144ba7f
SHA17842be773df8d94e69308bc51307c4c39ea2e441
SHA25698ff73d84e5d2e82641785629774314631445f5b6368cab1ad1609026903e9d1
SHA51275e2628f5f57696c1341eaaeaa9a7153b879c4e79ffada1dca1bbc0e50bd7870b96f6d652df918249370b21e34aec6db024e1924f5c8ae59bd86854650e0e544
-
Filesize
1.4MB
MD5e982d366a9bef3d6904291826368f082
SHA131e60900b9b4e8ed2267c18a695f7ffc9c9bbcaa
SHA256ffe8cb46e50b29e03bf4aa4cc2ff766dd513ec3c2bede123524e2074b821fcac
SHA512aa721fec1c66ee11bb285e8e8a182251948b77ca6a485756f1dfe9fd99c73aaa1875cab9ac4b7e32260e923ad564894d5b5c75334303767f7b1ce22126f3defa
-
Filesize
1.4MB
MD5e982d366a9bef3d6904291826368f082
SHA131e60900b9b4e8ed2267c18a695f7ffc9c9bbcaa
SHA256ffe8cb46e50b29e03bf4aa4cc2ff766dd513ec3c2bede123524e2074b821fcac
SHA512aa721fec1c66ee11bb285e8e8a182251948b77ca6a485756f1dfe9fd99c73aaa1875cab9ac4b7e32260e923ad564894d5b5c75334303767f7b1ce22126f3defa
-
Filesize
230KB
MD56fdf6b26760b57450aa2a83c5b317f48
SHA19ae4823af07d4b83027a3850bf0a639b8eb8bc21
SHA256d012c8971272f2aedb117e26fccbba17dffa126c1a4afe60ab6e071dba372989
SHA5122422879a158e9a42861f3ba7b5db95fa8c5480578f996465dbcf537120a6049e56a339a7ac222a61439f2f20ca1e36874ad9bbfc1834bd62f11e994342e1ffad
-
Filesize
230KB
MD56fdf6b26760b57450aa2a83c5b317f48
SHA19ae4823af07d4b83027a3850bf0a639b8eb8bc21
SHA256d012c8971272f2aedb117e26fccbba17dffa126c1a4afe60ab6e071dba372989
SHA5122422879a158e9a42861f3ba7b5db95fa8c5480578f996465dbcf537120a6049e56a339a7ac222a61439f2f20ca1e36874ad9bbfc1834bd62f11e994342e1ffad
-
Filesize
116B
MD5ec6aae2bb7d8781226ea61adca8f0586
SHA1d82b3bad240f263c1b887c7c0cc4c2ff0e86dfe3
SHA256b02fffaba9e664ff7840c82b102d6851ec0bb148cec462cef40999545309e599
SHA512aa62a8cd02a03e4f462f76ae6ff2e43849052ce77cca3a2ccf593f6669425830d0910afac3cf2c46dd385454a6fb3b4bd604ae13b9586087d6f22de644f9dfc7
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
227KB
MD569d468f64dc451287c4d2af9e7e1e649
SHA17799b32a7a3c0e8679dade16ff97e60324e8b93c
SHA256e88701f5f2bc931ade631c04c5d2d50e21ba0e64217c022d75b9c38fb132f451
SHA512b8dc99a347a6d4fb7492830221bc89384f44f0f13cb17ef884e6b27e8fa7da5c7dda74bd276f9a3a6ff87373d01a11ed13243cb670cf372955270a558bc6f2bd
-
Filesize
227KB
MD569d468f64dc451287c4d2af9e7e1e649
SHA17799b32a7a3c0e8679dade16ff97e60324e8b93c
SHA256e88701f5f2bc931ade631c04c5d2d50e21ba0e64217c022d75b9c38fb132f451
SHA512b8dc99a347a6d4fb7492830221bc89384f44f0f13cb17ef884e6b27e8fa7da5c7dda74bd276f9a3a6ff87373d01a11ed13243cb670cf372955270a558bc6f2bd
-
Filesize
8KB
MD5076ab7d1cc5150a5e9f8745cc5f5fb6c
SHA17b40783a27a38106e2cc91414f2bc4d8b484c578
SHA256d1b71081d7ba414b589338329f278ba51c6ccf542d74f131f96c2337ee0a4c90
SHA51275e274a654e88feb0d66156f387bc5e420811f4f62939396a7455d12e835d7e134b2579ab59976c591b416d1ec1acdf05e9eb290c8f01383c6a50bf43854420b
-
Filesize
1.4MB
MD585b698363e74ba3c08fc16297ddc284e
SHA1171cfea4a82a7365b241f16aebdb2aad29f4f7c0
SHA25678efcbb0c6eb6a4c76c036adc65154b8ff028849f79d508e45babfb527cb7cfe
SHA5127e4816c43e0addba088709948e8aedc9e39d6802c74a75cfbc2a0e739b44c5b5eef2bb2453b7032c758b0bdb38e4e7a598aa29be015796361b81d7f9e8027796
-
Filesize
1.4MB
MD522d5269955f256a444bd902847b04a3b
SHA141a83de3273270c3bd5b2bd6528bdc95766aa268
SHA256ab16986253bd187e3134f27495ef0db4b648f769721bc8c84b708c7ba69156fd
SHA512d85ada5d8c2c02932a79241a484b088ba70bda0497fd8ad638300935a16841d7cbc8258be93055907cb533bc534fdd48c7c91109fa22f87e65a6b374cd51055c
-
Filesize
416KB
MD583330cf6e88ad32365183f31b1fd3bda
SHA11c5b47be2b8713746de64b39390636a81626d264
SHA2567ce942cdc58ba5fa628d97f991c8a794294c2acfb724efbf0ac887c47942a31e
SHA512e28a9c47f690b0b0f0dd3b946d9cd59c761803f3826a382208a5b92be1293067b37a39f1141ddda13247b96138a108ce2f85b83de0143d48d4acc94f69a11908
-
Filesize
338KB
MD5528b5dc5ede359f683b73a684b9c19f6
SHA18bff4feae6dbdaafac1f9f373f15850d08e0a206
SHA2563a53bd59537190f8dc2c1ce266eb3b6c699c96ee929e2d4f90555fea5c6441f9
SHA51287cb867d3f47346730ee04b8b611afeac60616040a84c85b1369b739df217a528aa148a807d653d543bcb4ed25dac42ab98ad38d705331725a71ec2d6f010cbb
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
273B
MD5a5b509a3fb95cc3c8d89cd39fc2a30fb
SHA15aff4266a9c0f2af440f28aa865cebc5ddb9cd5c
SHA2565f3c80056c7b1104c15d6fee49dac07e665c6ffd0795ad486803641ed619c529
SHA5123cc58d989c461a04f29acbfe03ed05f970b3b3e97e6819962fc5c853f55bce7f7aba0544a712e3a45ee52ab31943c898f6b3684d755b590e3e961ae5ecd1edb9