Analysis
-
max time kernel
164s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2023 14:21
Static task
static1
Behavioral task
behavioral1
Sample
84CDE533C8A2008332DD063502F8D07D.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
84CDE533C8A2008332DD063502F8D07D.exe
Resource
win10v2004-20230915-en
General
-
Target
84CDE533C8A2008332DD063502F8D07D.exe
-
Size
268KB
-
MD5
84cde533c8a2008332dd063502f8d07d
-
SHA1
f5a0fbc3e2982dca55180c41b9e02d9ba2dfaca6
-
SHA256
53c47e7856d0bde7775a505b8c712f07f00c9d296244d9be94ed6763e3be273e
-
SHA512
c2b96dca3f743758a42f794db8243ac7f06eb192b7e89a9a83ff077d0fb21695c42b1bf54a86f6129f25070d77033f590063aabe2065fa7688f817779350fa31
-
SSDEEP
6144:lmYQNFz5kyocx5/X/3SPl5MAOmQss4jH06:lmYczWyoWz4Q/6
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
amadey
3.89
http://77.91.124.1/theme/index.php
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
Extracted
redline
magia
77.91.124.55:19071
Extracted
redline
lutyr
77.91.124.55:19071
Extracted
smokeloader
up3
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Extracted
redline
6012068394_99
https://pastebin.com/raw/8baCJyMF
Extracted
stealc
http://5.42.65.39
-
url_path
/bed95ea4798a5204.php
Signatures
-
DcRat 4 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process 3728 schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe 412 schtasks.exe 1508 schtasks.exe -
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/files/0x000700000002320f-64.dat healer behavioral2/memory/3436-66-0x0000000000590000-0x000000000059A000-memory.dmp healer behavioral2/files/0x000700000002320f-65.dat healer -
Glupteba payload 5 IoCs
resource yara_rule behavioral2/memory/2864-391-0x0000000000400000-0x000000000266D000-memory.dmp family_glupteba behavioral2/memory/2864-394-0x00000000046D0000-0x0000000004FBB000-memory.dmp family_glupteba behavioral2/memory/2864-446-0x0000000000400000-0x000000000266D000-memory.dmp family_glupteba behavioral2/memory/2864-509-0x0000000000400000-0x000000000266D000-memory.dmp family_glupteba behavioral2/memory/2864-552-0x0000000000400000-0x000000000266D000-memory.dmp family_glupteba -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 17EC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 17EC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 17EC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 17EC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 17EC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 17EC.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral2/memory/4320-85-0x0000000000400000-0x000000000043E000-memory.dmp family_redline behavioral2/files/0x000600000002320d-103.dat family_redline behavioral2/files/0x000600000002320d-102.dat family_redline behavioral2/memory/656-106-0x0000000000390000-0x00000000003CE000-memory.dmp family_redline behavioral2/memory/5344-456-0x00000000020A0000-0x00000000020FA000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 11 IoCs
description pid Process procid_target PID 5504 created 3136 5504 powershell.exe 56 PID 5504 created 3136 5504 powershell.exe 56 PID 5504 created 3136 5504 powershell.exe 56 PID 5504 created 3136 5504 powershell.exe 56 PID 5504 created 3136 5504 powershell.exe 56 PID 5464 created 3136 5464 updater.exe 56 PID 5464 created 3136 5464 updater.exe 56 PID 5464 created 3136 5464 updater.exe 56 PID 5464 created 3136 5464 updater.exe 56 PID 5464 created 3136 5464 updater.exe 56 PID 5464 created 3136 5464 updater.exe 56 -
Downloads MZ/PE file
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\hosts powershell.exe File created C:\Windows\System32\drivers\etc\hosts updater.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 3652 netsh.exe -
Stops running service(s) 3 TTPs
-
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation kos.exe Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation 1589.bat Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation 1926.exe Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation explothe.exe Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation 4613.exe Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation kos1.exe -
Executes dropped EXE 37 IoCs
pid Process 2936 1316.exe 4560 Yh9MU0FV.exe 2680 14EB.exe 1344 gk5zL2ox.exe 3544 jy6EV5Ja.exe 5116 1589.bat 1668 La3xq2kI.exe 3576 1Hb57VN5.exe 3016 174F.exe 3436 17EC.exe 2392 1926.exe 2160 explothe.exe 656 2gJ151gY.exe 5832 explothe.exe 5924 4613.exe 3420 sc.exe 2864 31839b57a4f11171d6abc8bbc4451ee4.exe 5320 Setup.exe 5388 kos1.exe 5504 powershell.exe 5580 set16.exe 4872 kos.exe 4276 is-Q6239.tmp 3240 toolspub2.exe 5344 6FC3.exe 1484 previewer.exe 5588 7449.exe 2140 previewer.exe 2004 31839b57a4f11171d6abc8bbc4451ee4.exe 5464 updater.exe 5264 csrss.exe 5700 F021.exe 6124 injector.exe 5836 explothe.exe 1412 windefender.exe 5728 windefender.exe 5500 f801950a962ddba14caaa44bf084b55c.exe -
Loads dropped DLL 6 IoCs
pid Process 4276 is-Q6239.tmp 4276 is-Q6239.tmp 4276 is-Q6239.tmp 5344 6FC3.exe 5344 6FC3.exe 3728 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution 1 TTPs
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 17EC.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" gk5zL2ox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" jy6EV5Ja.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" La3xq2kI.exe Set value (str) \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1316.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Yh9MU0FV.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 10 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive cmd.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe -
Suspicious use of SetThreadContext 9 IoCs
description pid Process procid_target PID 3940 set thread context of 4124 3940 84CDE533C8A2008332DD063502F8D07D.exe 87 PID 2680 set thread context of 2244 2680 14EB.exe 113 PID 3576 set thread context of 3408 3576 1Hb57VN5.exe 145 PID 3016 set thread context of 4320 3016 174F.exe 125 PID 3420 set thread context of 3240 3420 sc.exe 170 PID 5320 set thread context of 6028 5320 Setup.exe 184 PID 5700 set thread context of 5020 5700 F021.exe 225 PID 5464 set thread context of 5772 5464 updater.exe 267 PID 5464 set thread context of 6116 5464 updater.exe 268 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 31839b57a4f11171d6abc8bbc4451ee4.exe -
Drops file in Program Files directory 9 IoCs
description ioc Process File created C:\Program Files (x86)\PA Previewer\is-920ML.tmp is-Q6239.tmp File opened for modification C:\Program Files (x86)\PA Previewer\unins000.dat is-Q6239.tmp File opened for modification C:\Program Files (x86)\PA Previewer\previewer.exe is-Q6239.tmp File created C:\Program Files (x86)\PA Previewer\unins000.dat is-Q6239.tmp File created C:\Program Files (x86)\PA Previewer\is-FD8B2.tmp is-Q6239.tmp File created C:\Program Files (x86)\PA Previewer\is-LBKG9.tmp is-Q6239.tmp File created C:\Program Files (x86)\PA Previewer\is-OUIJN.tmp is-Q6239.tmp File created C:\Program Files\Google\Chrome\updater.exe powershell.exe File created C:\Program Files\Google\Libs\WR64.sys updater.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rss 31839b57a4f11171d6abc8bbc4451ee4.exe File created C:\Windows\rss\csrss.exe 31839b57a4f11171d6abc8bbc4451ee4.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 11 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5300 sc.exe 2564 sc.exe 1180 sc.exe 5416 sc.exe 5784 sc.exe 3180 sc.exe 5116 sc.exe 5268 sc.exe 1348 sc.exe 3420 sc.exe 5460 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 6 IoCs
pid pid_target Process procid_target 684 3940 WerFault.exe 41 624 2680 WerFault.exe 102 1768 3576 WerFault.exe 107 3208 3016 WerFault.exe 108 1236 3408 WerFault.exe 126 3952 5344 WerFault.exe 171 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3728 schtasks.exe 412 schtasks.exe 1508 schtasks.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-335 = "Jordan Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2451 = "Saint Pierre Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2512 = "Lord Howe Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-771 = "Montevideo Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2451 = "Saint Pierre Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-841 = "Argentina Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-12 = "Azores Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-832 = "SA Eastern Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-1871 = "Russia TZ 7 Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-841 = "Argentina Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-392 = "Arab Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2841 = "Saratov Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-292 = "Central European Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2431 = "Cuba Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2432 = "Cuba Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-211 = "Pacific Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-241 = "Samoa Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2752 = "Tomsk Standard Time" windefender.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs cmd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-434 = "Georgian Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-81 = "Atlantic Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2431 = "Cuba Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-342 = "Egypt Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2941 = "Sao Tome Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1502 = "Turkey Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2492 = "Aus Central W. Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1972 = "Belarus Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs explorer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-51 = "Greenland Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates cmd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-462 = "Afghanistan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-221 = "Alaskan Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2492 = "Aus Central W. Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-631 = "Tokyo Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-141 = "Canada Central Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-371 = "Jerusalem Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-741 = "New Zealand Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-272 = "Greenwich Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-192 = "Mountain Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2181 = "Astrakhan Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1801 = "Line Islands Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-385 = "Namibia Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4124 AppLaunch.exe 4124 AppLaunch.exe 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3136 Explorer.EXE -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 676 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4124 AppLaunch.exe 3240 toolspub2.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3036 msedge.exe 3036 msedge.exe 3036 msedge.exe 3036 msedge.exe 3036 msedge.exe 3036 msedge.exe 3036 msedge.exe 3036 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3436 17EC.exe Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeDebugPrivilege 4872 kos.exe Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3036 msedge.exe 3036 msedge.exe 3036 msedge.exe 3036 msedge.exe 3036 msedge.exe 3036 msedge.exe 3036 msedge.exe 3036 msedge.exe 3036 msedge.exe 3036 msedge.exe 3036 msedge.exe 3036 msedge.exe 3036 msedge.exe 3036 msedge.exe 3036 msedge.exe 3036 msedge.exe 3036 msedge.exe 3036 msedge.exe 3036 msedge.exe 3036 msedge.exe 3036 msedge.exe 3036 msedge.exe 3036 msedge.exe 3036 msedge.exe 3036 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3036 msedge.exe 3036 msedge.exe 3036 msedge.exe 3036 msedge.exe 3036 msedge.exe 3036 msedge.exe 3036 msedge.exe 3036 msedge.exe 3036 msedge.exe 3036 msedge.exe 3036 msedge.exe 3036 msedge.exe 3036 msedge.exe 3036 msedge.exe 3036 msedge.exe 3036 msedge.exe 3036 msedge.exe 3036 msedge.exe 3036 msedge.exe 3036 msedge.exe 3036 msedge.exe 3036 msedge.exe 3036 msedge.exe 3036 msedge.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3136 Explorer.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3940 wrote to memory of 4124 3940 84CDE533C8A2008332DD063502F8D07D.exe 87 PID 3940 wrote to memory of 4124 3940 84CDE533C8A2008332DD063502F8D07D.exe 87 PID 3940 wrote to memory of 4124 3940 84CDE533C8A2008332DD063502F8D07D.exe 87 PID 3940 wrote to memory of 4124 3940 84CDE533C8A2008332DD063502F8D07D.exe 87 PID 3940 wrote to memory of 4124 3940 84CDE533C8A2008332DD063502F8D07D.exe 87 PID 3940 wrote to memory of 4124 3940 84CDE533C8A2008332DD063502F8D07D.exe 87 PID 3136 wrote to memory of 2936 3136 Explorer.EXE 100 PID 3136 wrote to memory of 2936 3136 Explorer.EXE 100 PID 3136 wrote to memory of 2936 3136 Explorer.EXE 100 PID 2936 wrote to memory of 4560 2936 1316.exe 101 PID 2936 wrote to memory of 4560 2936 1316.exe 101 PID 2936 wrote to memory of 4560 2936 1316.exe 101 PID 3136 wrote to memory of 2680 3136 Explorer.EXE 102 PID 3136 wrote to memory of 2680 3136 Explorer.EXE 102 PID 3136 wrote to memory of 2680 3136 Explorer.EXE 102 PID 4560 wrote to memory of 1344 4560 Yh9MU0FV.exe 103 PID 4560 wrote to memory of 1344 4560 Yh9MU0FV.exe 103 PID 4560 wrote to memory of 1344 4560 Yh9MU0FV.exe 103 PID 1344 wrote to memory of 3544 1344 gk5zL2ox.exe 104 PID 1344 wrote to memory of 3544 1344 gk5zL2ox.exe 104 PID 1344 wrote to memory of 3544 1344 gk5zL2ox.exe 104 PID 3136 wrote to memory of 5116 3136 Explorer.EXE 105 PID 3136 wrote to memory of 5116 3136 Explorer.EXE 105 PID 3136 wrote to memory of 5116 3136 Explorer.EXE 105 PID 3544 wrote to memory of 1668 3544 jy6EV5Ja.exe 106 PID 3544 wrote to memory of 1668 3544 jy6EV5Ja.exe 106 PID 3544 wrote to memory of 1668 3544 jy6EV5Ja.exe 106 PID 1668 wrote to memory of 3576 1668 La3xq2kI.exe 107 PID 1668 wrote to memory of 3576 1668 La3xq2kI.exe 107 PID 1668 wrote to memory of 3576 1668 La3xq2kI.exe 107 PID 3136 wrote to memory of 3016 3136 Explorer.EXE 108 PID 3136 wrote to memory of 3016 3136 Explorer.EXE 108 PID 3136 wrote to memory of 3016 3136 Explorer.EXE 108 PID 3136 wrote to memory of 3436 3136 Explorer.EXE 109 PID 3136 wrote to memory of 3436 3136 Explorer.EXE 109 PID 5116 wrote to memory of 1352 5116 1589.bat 111 PID 5116 wrote to memory of 1352 5116 1589.bat 111 PID 3136 wrote to memory of 2392 3136 Explorer.EXE 112 PID 3136 wrote to memory of 2392 3136 Explorer.EXE 112 PID 3136 wrote to memory of 2392 3136 Explorer.EXE 112 PID 2680 wrote to memory of 2244 2680 14EB.exe 113 PID 2680 wrote to memory of 2244 2680 14EB.exe 113 PID 2680 wrote to memory of 2244 2680 14EB.exe 113 PID 2680 wrote to memory of 2244 2680 14EB.exe 113 PID 2680 wrote to memory of 2244 2680 14EB.exe 113 PID 2680 wrote to memory of 2244 2680 14EB.exe 113 PID 2680 wrote to memory of 2244 2680 14EB.exe 113 PID 2680 wrote to memory of 2244 2680 14EB.exe 113 PID 2680 wrote to memory of 2244 2680 14EB.exe 113 PID 2680 wrote to memory of 2244 2680 14EB.exe 113 PID 3576 wrote to memory of 4876 3576 1Hb57VN5.exe 115 PID 3576 wrote to memory of 4876 3576 1Hb57VN5.exe 115 PID 3576 wrote to memory of 4876 3576 1Hb57VN5.exe 115 PID 3576 wrote to memory of 3408 3576 1Hb57VN5.exe 145 PID 3576 wrote to memory of 3408 3576 1Hb57VN5.exe 145 PID 3576 wrote to memory of 3408 3576 1Hb57VN5.exe 145 PID 3576 wrote to memory of 3408 3576 1Hb57VN5.exe 145 PID 3576 wrote to memory of 3408 3576 1Hb57VN5.exe 145 PID 3576 wrote to memory of 3408 3576 1Hb57VN5.exe 145 PID 3576 wrote to memory of 3408 3576 1Hb57VN5.exe 145 PID 3576 wrote to memory of 3408 3576 1Hb57VN5.exe 145 PID 3576 wrote to memory of 3408 3576 1Hb57VN5.exe 145 PID 3576 wrote to memory of 3408 3576 1Hb57VN5.exe 145 PID 3016 wrote to memory of 4320 3016 174F.exe 125 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\84CDE533C8A2008332DD063502F8D07D.exe"C:\Users\Admin\AppData\Local\Temp\84CDE533C8A2008332DD063502F8D07D.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- DcRat
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3940 -s 1482⤵
- Program crash
PID:684
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Users\Admin\AppData\Local\Temp\1316.exeC:\Users\Admin\AppData\Local\Temp\1316.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Yh9MU0FV.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Yh9MU0FV.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\gk5zL2ox.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\gk5zL2ox.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jy6EV5Ja.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jy6EV5Ja.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\La3xq2kI.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\La3xq2kI.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Hb57VN5.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Hb57VN5.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵PID:4876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3576 -s 5928⤵
- Program crash
PID:1768
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵PID:3408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3408 -s 5409⤵
- Program crash
PID:1236
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2gJ151gY.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2gJ151gY.exe7⤵
- Executes dropped EXE
PID:656
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\14EB.exeC:\Users\Admin\AppData\Local\Temp\14EB.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:2244
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 3883⤵
- Program crash
PID:624
-
-
-
C:\Users\Admin\AppData\Local\Temp\1589.bat"C:\Users\Admin\AppData\Local\Temp\1589.bat"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1604.tmp\1605.tmp\1606.bat C:\Users\Admin\AppData\Local\Temp\1589.bat"3⤵PID:1352
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/4⤵PID:5112
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff86d6246f8,0x7ff86d624708,0x7ff86d6247185⤵PID:4080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,14623736616675386531,16024027213285806374,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:25⤵PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,14623736616675386531,16024027213285806374,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:35⤵PID:2732
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/login4⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3036 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff86d6246f8,0x7ff86d624708,0x7ff86d6247185⤵PID:2804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1456,14638447256867796709,15319123380506729817,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2820 /prefetch:15⤵PID:3024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1456,14638447256867796709,15319123380506729817,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3016 /prefetch:85⤵PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1456,14638447256867796709,15319123380506729817,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3004 /prefetch:35⤵PID:2836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1456,14638447256867796709,15319123380506729817,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2960 /prefetch:25⤵PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1456,14638447256867796709,15319123380506729817,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=3 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2836 /prefetch:15⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1456,14638447256867796709,15319123380506729817,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3868 /prefetch:15⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1456,14638447256867796709,15319123380506729817,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4952 /prefetch:15⤵PID:5124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1456,14638447256867796709,15319123380506729817,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5380 /prefetch:85⤵PID:5856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1456,14638447256867796709,15319123380506729817,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5380 /prefetch:85⤵PID:5872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1456,14638447256867796709,15319123380506729817,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:15⤵PID:6008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1456,14638447256867796709,15319123380506729817,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:15⤵PID:6000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1456,14638447256867796709,15319123380506729817,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6004 /prefetch:15⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1456,14638447256867796709,15319123380506729817,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:15⤵PID:5512
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\174F.exeC:\Users\Admin\AppData\Local\Temp\174F.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3016 -s 4083⤵
- Program crash
PID:3208
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:4320
-
-
-
C:\Users\Admin\AppData\Local\Temp\17EC.exeC:\Users\Admin\AppData\Local\Temp\17EC.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious use of AdjustPrivilegeToken
PID:3436
-
-
C:\Users\Admin\AppData\Local\Temp\1926.exeC:\Users\Admin\AppData\Local\Temp\1926.exe2⤵
- Checks computer location settings
- Executes dropped EXE
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
PID:2160 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F4⤵
- DcRat
- Creates scheduled task(s)
PID:3728
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit4⤵PID:336
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:964
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:N"5⤵PID:1188
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:R" /E5⤵PID:4304
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3276
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"5⤵PID:2788
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E5⤵PID:4496
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3728
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\4613.exeC:\Users\Admin\AppData\Local\Temp\4613.exe2⤵
- Checks computer location settings
- Executes dropped EXE
PID:5924 -
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"3⤵PID:3420
-
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3240
-
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"3⤵
- Executes dropped EXE
PID:2864 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:3900
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:2004 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:5308
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:6020
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:3652
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:5596
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4920
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
PID:5264 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
PID:5504
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- DcRat
- Creates scheduled task(s)
PID:412
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f6⤵PID:5976
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:5480
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:5776
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll6⤵
- Executes dropped EXE
PID:6124
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- DcRat
- Creates scheduled task(s)
PID:1508
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"6⤵
- Executes dropped EXE
PID:1412 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵PID:1856
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)8⤵
- Launches sc.exe
PID:3180
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exeC:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exe6⤵
- Executes dropped EXE
PID:5500 -
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn "csrss" /f7⤵PID:5656
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5320 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"4⤵PID:6028
-
-
-
C:\Users\Admin\AppData\Local\Temp\kos1.exe"C:\Users\Admin\AppData\Local\Temp\kos1.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
PID:5388 -
C:\Users\Admin\AppData\Local\Temp\set16.exe"C:\Users\Admin\AppData\Local\Temp\set16.exe"4⤵
- Executes dropped EXE
PID:5580 -
C:\Users\Admin\AppData\Local\Temp\is-HVSOI.tmp\is-Q6239.tmp"C:\Users\Admin\AppData\Local\Temp\is-HVSOI.tmp\is-Q6239.tmp" /SL4 $50234 "C:\Users\Admin\AppData\Local\Temp\set16.exe" 1232936 522245⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
PID:4276 -
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 86⤵PID:5972
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 87⤵PID:5600
-
-
-
C:\Program Files (x86)\PA Previewer\previewer.exe"C:\Program Files (x86)\PA Previewer\previewer.exe" -i6⤵
- Executes dropped EXE
PID:1484
-
-
C:\Program Files (x86)\PA Previewer\previewer.exe"C:\Program Files (x86)\PA Previewer\previewer.exe" -s6⤵
- Executes dropped EXE
PID:2140
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\kos.exe"C:\Users\Admin\AppData\Local\Temp\kos.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4872
-
-
-
C:\Users\Admin\AppData\Local\Temp\latestX.exe"C:\Users\Admin\AppData\Local\Temp\latestX.exe"3⤵PID:5504
-
-
-
C:\Users\Admin\AppData\Local\Temp\6FC3.exeC:\Users\Admin\AppData\Local\Temp\6FC3.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5344 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5344 -s 7763⤵
- Program crash
PID:3952
-
-
-
C:\Users\Admin\AppData\Local\Temp\7449.exeC:\Users\Admin\AppData\Local\Temp\7449.exe2⤵
- Executes dropped EXE
PID:5588
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵PID:5328
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:5432
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:5416
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:5784
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:5268
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:1348
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Launches sc.exe
PID:3420
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:5612
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:3528
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:4164
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:1856
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:3732
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵PID:552
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:5796
-
-
C:\Users\Admin\AppData\Local\Temp\F021.exeC:\Users\Admin\AppData\Local\Temp\F021.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5700 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵PID:5020
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:5092
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:5776 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:5116
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:5300
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:5460
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:2564
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:1180
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:3796
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:3628
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:4140
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:6036
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:5364
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4104
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:5772
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵
- Modifies data under HKEY_USERS
PID:6116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3940 -ip 39401⤵PID:5064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2680 -ip 26801⤵PID:3184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3576 -ip 35761⤵PID:4692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 3408 -ip 34081⤵PID:4184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 3016 -ip 30161⤵PID:4496
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1396
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3628
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:5832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 5344 -ip 53441⤵PID:5776
-
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
PID:5464
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:5836
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:5728
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Defense Evasion
Impair Defenses
3Disable or Modify Tools
2Modify Registry
3Scripting
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56351be8b63227413881e5dfb033459cc
SHA1f24489be1e693dc22d6aac7edd692833c623d502
SHA256e24cda01850900bdb3a4ae5f590a76565664d7689026c146eb96bcd197dac88b
SHA51266e249488a2f9aa020834f3deca7e4662574dcab0cbb684f21f295f46d71b11f9494b075288189d9df29e4f3414d4b86c27bf8823005d400a5946d7b477f0aef
-
Filesize
152B
MD516c2a9f4b2e1386aab0e353614a63f0d
SHA16edd3be593b653857e579cbd3db7aa7e1df3e30f
SHA2560f7c58a653ae1f3999627721bad03793edc1e9d12e8f5253c30b61b8478f5c81
SHA512aba1ed22c7b9ae1942d69a7cd7a618597300ae5c56be88187ddec6227df056f81c1d9217778d87fa8c36402bce7275d707118ff62d3a241297738da434556e06
-
Filesize
152B
MD516c2a9f4b2e1386aab0e353614a63f0d
SHA16edd3be593b653857e579cbd3db7aa7e1df3e30f
SHA2560f7c58a653ae1f3999627721bad03793edc1e9d12e8f5253c30b61b8478f5c81
SHA512aba1ed22c7b9ae1942d69a7cd7a618597300ae5c56be88187ddec6227df056f81c1d9217778d87fa8c36402bce7275d707118ff62d3a241297738da434556e06
-
Filesize
152B
MD516c2a9f4b2e1386aab0e353614a63f0d
SHA16edd3be593b653857e579cbd3db7aa7e1df3e30f
SHA2560f7c58a653ae1f3999627721bad03793edc1e9d12e8f5253c30b61b8478f5c81
SHA512aba1ed22c7b9ae1942d69a7cd7a618597300ae5c56be88187ddec6227df056f81c1d9217778d87fa8c36402bce7275d707118ff62d3a241297738da434556e06
-
Filesize
152B
MD516c2a9f4b2e1386aab0e353614a63f0d
SHA16edd3be593b653857e579cbd3db7aa7e1df3e30f
SHA2560f7c58a653ae1f3999627721bad03793edc1e9d12e8f5253c30b61b8478f5c81
SHA512aba1ed22c7b9ae1942d69a7cd7a618597300ae5c56be88187ddec6227df056f81c1d9217778d87fa8c36402bce7275d707118ff62d3a241297738da434556e06
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1008B
MD575e2902ab5cbca43864558c612512c97
SHA1b383d1de4dbde28ec518d588825706ed5fd3ccbd
SHA256f15c924a78cb7290c7258fef0508aa52c531188c7c0782d312a0e2787b5b6e63
SHA5124a363d4b7173c38779ace9253e3e9e81e851a064c78f40ebd5ad0f1eb459a8e5dd817f1e78715a2f981ba73a7a1fb7d5aa594e2c24e72a5b8879c9b1bafa17e6
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
1KB
MD5ca4141bb0ff4d3c591f9672fd71b489d
SHA192b5fa85087c2aef47313960096320bb6fa24497
SHA2564c5d541ebe69e7871f47142dc6c42923e96f66f7c210233e33983f39749c8834
SHA512a09999473cbeea5d60157e42282fb739be836aeb7bfd52848f5b186be256f61408dc947209b8c729b6895a7e608029e9eed131f4081b99d065d204fcdd4fdfca
-
Filesize
5KB
MD51cd03c5b09fe89b2dfc62a78e9df6682
SHA12d9f069914234f2b63f36a4686c79449deb58fb4
SHA256dcde9cb16f6acd3b3e06deb4e7e62ca6f6f2779167f60091a7e92e78b26e22c9
SHA5127128cd7c066bd46f58b02b6d9e7c5bb656b7570dd68186d1c6d6e15015d11b2f9e1c8d479d69a1ca5d96e17f6abac925915c9b6417a7af26a226b18b2891fcf8
-
Filesize
6KB
MD5979f22f11283a0a0a4f3b5ef752b169a
SHA10d5d1c02fb022ab5b2a5a51e7adde22f85ff35e6
SHA256e45067412712dfaa97149d3e59a41409246cf3cb86f28b391f4dabc2ea337029
SHA512e3570b2cacc699005d047377654e80ee8bca41da43859caad9181af5401a374a50ff5b04b2eb60f587135165bac45b1864411df336fd6cacd000a71dd85fdd2f
-
Filesize
24KB
MD5699e3636ed7444d9b47772e4446ccfc1
SHA1db0459ca6ceeea2e87e0023a6b7ee06aeed6fded
SHA2569205233792628ecf0d174de470b2986abf3adfed702330dc54c4a76c9477949a
SHA512d5d4c08b6aec0f3e3506e725decc1bdf0b2e2fb50703c36d568c1ea3c3ab70720f5aec9d49ad824505731eb64db399768037c9f1be655779ed77331a7bab1d51
-
Filesize
872B
MD526a5bf4e879df3da979feddc39539b7c
SHA1ffccf6a1c53df18009779bc2920d2fe1d1dbf762
SHA25696ef4833fb89b04bc0d8be6a99c332e6fdd9e1d22e0a23e21cfb7f7fefd998ac
SHA512e2fb757e825f53f778e006af2bdbf84bfcd08e41bffaf6cb49b673652e84eb33624678679b340a200ebf41f1731b6acb45c613e84cb51b2c88e9f3f89dcf1bbc
-
Filesize
872B
MD5d862c9ac176775295bd804762b1a15d0
SHA1261ca3632b82e2e55a648f30094570dcacbc0b1c
SHA256038dbbc1dbe76c5cdcf770594bb2535ce96b618a2c736d311feec0dc6d696839
SHA51234eb5c10f7a72f921c4f5c15f351bf6682df0ba6b2cc3c135e0cd8190008957e9d9fb01e35d1620e2a637e5f82f2fa82034dd7b27009b0b7a04efe7641e5a01b
-
Filesize
872B
MD595f631d0daaab6accea375d6f5346cc4
SHA1d7f4191ea3424e74e7a9d42e693cb49ec9d4525d
SHA256048f61f50c35e687b20f4501973734bbc3ea0ee9c4f97b7960ba2a082826b1fa
SHA512a652535273457cafd5b13e1335bf663e313e20ef2bf4f9a9dbc14eb087156e57e366e1cd72e854c108680c0ff5902520e32277f68c07319f0720f3abe27b13ef
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD530774758142ac57d874218eddb02e0a6
SHA17f824048a705176ab47842504e2a669acff28f23
SHA2561a4a70beaf15302e8b19edde3d7f21d0b7b55adc4190fa7ec20a5bb55ec8ec59
SHA5122d245e1386a9366db4bfa28685ac9b3fe22172bc3f2a6ac249083b2d8f88d39fa3f62217e937d5f5229055786a2ae46cbcf832bb78da2561d2856784bc980e43
-
Filesize
10KB
MD5bd96011c1168cbfc4811dd4d85659324
SHA1d18cf553a960f7b0e83d2fbebeb7bff76a905c6c
SHA256a446260648a359eecca011bd6d4be5dbf99aee9bd3ee578f74c8b6f55659e804
SHA5125d7ad5368598e25d3739e0801e1fa98b7e82e800da3b759498a22b5872111610dcd46c6c260f7b6d1be413a8fe02dfd1989e675dac07a6b469b410f5a55aff74
-
Filesize
2KB
MD57c16cdff2e4a8be18dd2a51bb0e38574
SHA16204a94d86b211049a16851b931ac01e13b3b6d1
SHA2560d3b0c57cf2c8f85c1bdecea23cd0a960d2f3cec684fe82f4e5c2f89c606266f
SHA512849a0524d1f83d08418714d9d248fea76634c60bc2656a126404c476aea90f6b3b0af11d433299abd3049e96a4c0d3795355094b989da45cac457ff381220cb1
-
Filesize
10KB
MD5141bee0b64c5cadc587b46598f0866ac
SHA1da9708ad8fcc6dccec2be5aa7309d685dee82be4
SHA2568edd9905e2a5d3351fac1a65e5caa2f0cdbd5aa693c50e4718ec0348a4460be9
SHA51263715b6cccb793f4d6453318a3002df5a73c44eef6f3fb4f909f55f64079a473be7443b67b8b8281e4e628b2723886a6f041280d4d946cee37f3cfad89c9f243
-
Filesize
1.3MB
MD5012ca3bb921127d3d1a911eea661865c
SHA17d501b9fbea43bd72183f453644d21d640dc05d0
SHA256d94de96a769e587ba62c2c86584e2c37fb932fd3484c95ddf180d27ee27895c0
SHA5124ef1dc954a2b4022a9d2b0940b812aac13767afe8a92051912315d66d3976f64db3cc6122714c545ec37f2cddc72c813459290a6838ff3f8a31e48b7e83db1af
-
Filesize
1.3MB
MD5012ca3bb921127d3d1a911eea661865c
SHA17d501b9fbea43bd72183f453644d21d640dc05d0
SHA256d94de96a769e587ba62c2c86584e2c37fb932fd3484c95ddf180d27ee27895c0
SHA5124ef1dc954a2b4022a9d2b0940b812aac13767afe8a92051912315d66d3976f64db3cc6122714c545ec37f2cddc72c813459290a6838ff3f8a31e48b7e83db1af
-
Filesize
450KB
MD5d3c0cb7eb05940894c4404079441acbb
SHA1a2aa7126bda4deb3b9ac07c264dcdfacdca8d031
SHA256d6ad380132538d63aeee704ee52fd55dc3f8f6ba11b20ac29017c1912bf48bc6
SHA512057039da3f6eead65184e2173dadac66f1ada844268abe08e37d7beee4fe767ffd252e9a1f28a346787ddf2e24e7046edd858ea75d34ed2b4dc1dbdd616abd9e
-
Filesize
450KB
MD5d3c0cb7eb05940894c4404079441acbb
SHA1a2aa7126bda4deb3b9ac07c264dcdfacdca8d031
SHA256d6ad380132538d63aeee704ee52fd55dc3f8f6ba11b20ac29017c1912bf48bc6
SHA512057039da3f6eead65184e2173dadac66f1ada844268abe08e37d7beee4fe767ffd252e9a1f28a346787ddf2e24e7046edd858ea75d34ed2b4dc1dbdd616abd9e
-
Filesize
97KB
MD59db53ae9e8af72f18e08c8b8955f8035
SHA150ae5f80c1246733d54db98fac07380b1b2ff90d
SHA256d1d32c30e132d6348bd8e8baff51d1b706e78204b7f5775874946a7019a92b89
SHA5123cfb3104befbb5d60b5844e3841bf7c61baed8671191cfc42e0666c6ce92412ab235c70be718f52cfbd0e338c9f6f04508e0fd07b30f9bbda389e2e649c199d1
-
Filesize
97KB
MD59db53ae9e8af72f18e08c8b8955f8035
SHA150ae5f80c1246733d54db98fac07380b1b2ff90d
SHA256d1d32c30e132d6348bd8e8baff51d1b706e78204b7f5775874946a7019a92b89
SHA5123cfb3104befbb5d60b5844e3841bf7c61baed8671191cfc42e0666c6ce92412ab235c70be718f52cfbd0e338c9f6f04508e0fd07b30f9bbda389e2e649c199d1
-
Filesize
97KB
MD59db53ae9e8af72f18e08c8b8955f8035
SHA150ae5f80c1246733d54db98fac07380b1b2ff90d
SHA256d1d32c30e132d6348bd8e8baff51d1b706e78204b7f5775874946a7019a92b89
SHA5123cfb3104befbb5d60b5844e3841bf7c61baed8671191cfc42e0666c6ce92412ab235c70be718f52cfbd0e338c9f6f04508e0fd07b30f9bbda389e2e649c199d1
-
Filesize
88B
MD50ec04fde104330459c151848382806e8
SHA13b0b78d467f2db035a03e378f7b3a3823fa3d156
SHA2561ee0a6f7c4006a36891e2fd72a0257e89fd79ad811987c0e17f847fe99ea695f
SHA5128b928989f17f09282e008da27e8b7fd373c99d5cafb85b5f623e02dbb6273f0ed76a9fbbfef0b080dbba53b6de8ee491ea379a38e5b6ca0763b11dd4de544b40
-
Filesize
490KB
MD5a7e313b4f2c61e613da104bf87de659e
SHA1b679605ac768977a8d58a86cc733c6874fce8986
SHA2560b6be487dbc8f46791431c835488799f617248f45f9c674679664cc1675d8f78
SHA5123acad3ddcf752b022d7531088e9527cfa28b7b7c257feb48386869e2678368b77ce0c9b48586d6c7f8425f9405b928c545d54f33ee43418833dd3d8ba92f9b28
-
Filesize
490KB
MD5a7e313b4f2c61e613da104bf87de659e
SHA1b679605ac768977a8d58a86cc733c6874fce8986
SHA2560b6be487dbc8f46791431c835488799f617248f45f9c674679664cc1675d8f78
SHA5123acad3ddcf752b022d7531088e9527cfa28b7b7c257feb48386869e2678368b77ce0c9b48586d6c7f8425f9405b928c545d54f33ee43418833dd3d8ba92f9b28
-
Filesize
21KB
MD557543bf9a439bf01773d3d508a221fda
SHA15728a0b9f1856aa5183d15ba00774428be720c35
SHA25670d2e4df54793d08b8e76f1bb1db26721e0398da94dca629ab77bd41cc27fd4e
SHA51228f2eb1fef817df513568831ca550564d490f7bd6c46ada8e06b2cd81bbc59bc2d7b9f955dbfc31c6a41237d0d0f8aa40aaac7ae2fabf9902228f6b669b7fe20
-
Filesize
21KB
MD557543bf9a439bf01773d3d508a221fda
SHA15728a0b9f1856aa5183d15ba00774428be720c35
SHA25670d2e4df54793d08b8e76f1bb1db26721e0398da94dca629ab77bd41cc27fd4e
SHA51228f2eb1fef817df513568831ca550564d490f7bd6c46ada8e06b2cd81bbc59bc2d7b9f955dbfc31c6a41237d0d0f8aa40aaac7ae2fabf9902228f6b669b7fe20
-
Filesize
229KB
MD578e5bc5b95cf1717fc889f1871f5daf6
SHA165169a87dd4a0121cd84c9094d58686be468a74a
SHA2567d2e2e4f369bcdbbe4a1d9acd299e230adc522d46e54f59e321622d80da02966
SHA512d97bc87809e5f52cd015ced62488f738ea24a16c31d1fb836091b72112b200e304f0d8fab3ef762411b662ed60df0ca5fc24d4e98adb22b79e5e74a9292c1500
-
Filesize
229KB
MD578e5bc5b95cf1717fc889f1871f5daf6
SHA165169a87dd4a0121cd84c9094d58686be468a74a
SHA2567d2e2e4f369bcdbbe4a1d9acd299e230adc522d46e54f59e321622d80da02966
SHA512d97bc87809e5f52cd015ced62488f738ea24a16c31d1fb836091b72112b200e304f0d8fab3ef762411b662ed60df0ca5fc24d4e98adb22b79e5e74a9292c1500
-
Filesize
4.2MB
MD5ef8d69e99b8eb73af2486dae908b9d7e
SHA118050ae9a587ba0531f92bb660af3bfcf61639a5
SHA256cf022461fa758bceea357a5a25fe28199a30d1b13d5fcf42270205d29ec9b132
SHA512af08a978c523a90e64fbd64aeaf3c3bfad72f70eaeec280e96fb750b49493337c99b8d23e61ab3a1c3479eadcb72554dfc1be7ae3153c780a95626b461eb9126
-
Filesize
4.2MB
MD5ef8d69e99b8eb73af2486dae908b9d7e
SHA118050ae9a587ba0531f92bb660af3bfcf61639a5
SHA256cf022461fa758bceea357a5a25fe28199a30d1b13d5fcf42270205d29ec9b132
SHA512af08a978c523a90e64fbd64aeaf3c3bfad72f70eaeec280e96fb750b49493337c99b8d23e61ab3a1c3479eadcb72554dfc1be7ae3153c780a95626b461eb9126
-
Filesize
4.2MB
MD5ef8d69e99b8eb73af2486dae908b9d7e
SHA118050ae9a587ba0531f92bb660af3bfcf61639a5
SHA256cf022461fa758bceea357a5a25fe28199a30d1b13d5fcf42270205d29ec9b132
SHA512af08a978c523a90e64fbd64aeaf3c3bfad72f70eaeec280e96fb750b49493337c99b8d23e61ab3a1c3479eadcb72554dfc1be7ae3153c780a95626b461eb9126
-
Filesize
13.5MB
MD5355cb70b6f919ab1fb3cab522a2e3617
SHA111ded46db86b738a7fcb3a29bf49e7cb35a0bbfd
SHA25689b23431a3fd1b1932a26c626dbf5ad39d5a82fcc10ca4fd20e4d90f635bda42
SHA5120a866fbe6363a5010d80817dede70a64c8eaa50d38315706041428a4489a0fa298b217753b566713751d975ebc1c0b0db6a0a5af3140c949e155595bfeaedb34
-
Filesize
13.5MB
MD5355cb70b6f919ab1fb3cab522a2e3617
SHA111ded46db86b738a7fcb3a29bf49e7cb35a0bbfd
SHA25689b23431a3fd1b1932a26c626dbf5ad39d5a82fcc10ca4fd20e4d90f635bda42
SHA5120a866fbe6363a5010d80817dede70a64c8eaa50d38315706041428a4489a0fa298b217753b566713751d975ebc1c0b0db6a0a5af3140c949e155595bfeaedb34
-
Filesize
1.1MB
MD56c4c560a7197d92bcfe632dc3bf7f8f5
SHA179cafc7a10e7e69c6c55d41260bbddb2e57c8fd2
SHA25689c772630197d7ff1a880369d04458233051daf273b00fd8fdddb74520a269c8
SHA5128e90b0386298eeff0ee8f50abc1b948fbf13fe5501d314b8c56872a115f2305759f37acfda1f4b738b644ef430131d318e5ad982799bb1511f5cede9002da4ea
-
Filesize
1.1MB
MD56c4c560a7197d92bcfe632dc3bf7f8f5
SHA179cafc7a10e7e69c6c55d41260bbddb2e57c8fd2
SHA25689c772630197d7ff1a880369d04458233051daf273b00fd8fdddb74520a269c8
SHA5128e90b0386298eeff0ee8f50abc1b948fbf13fe5501d314b8c56872a115f2305759f37acfda1f4b738b644ef430131d318e5ad982799bb1511f5cede9002da4ea
-
Filesize
953KB
MD5972504c555163431f74eefc5d01c4d1f
SHA14b1060b128a27e43527b4dce42fbc67731576779
SHA2565e753c0fb2efaba6155098796bc5e9172dbf32902b854e5947ea66f05fbb5975
SHA512483e5275bb9da11e933657fd5d123e57af784ebe9e6245cdae7f9ca5a17ffce479047a0d3ba461a9d58db26165002e18a74bcf40cb335f248ee8d7422562db08
-
Filesize
953KB
MD5972504c555163431f74eefc5d01c4d1f
SHA14b1060b128a27e43527b4dce42fbc67731576779
SHA2565e753c0fb2efaba6155098796bc5e9172dbf32902b854e5947ea66f05fbb5975
SHA512483e5275bb9da11e933657fd5d123e57af784ebe9e6245cdae7f9ca5a17ffce479047a0d3ba461a9d58db26165002e18a74bcf40cb335f248ee8d7422562db08
-
Filesize
648KB
MD5c5193da482bfe976dc99e47272d17717
SHA1f29feb6cbe7f17ef18926c18e07b60425cb8ba22
SHA2569bcb8d90d4d270e8a7fac5c858e8141180847c06b6c20d48282d27d26552ee10
SHA512fc0fca5edd2bb3540186b0f6501fdcf8d13ccf6326bca957f04abf2441f2bc1e0fd77fe40f7f8b2b77c9d1bc4ebab018921e4706d7147aa8fc3f4ff41afaea63
-
Filesize
648KB
MD5c5193da482bfe976dc99e47272d17717
SHA1f29feb6cbe7f17ef18926c18e07b60425cb8ba22
SHA2569bcb8d90d4d270e8a7fac5c858e8141180847c06b6c20d48282d27d26552ee10
SHA512fc0fca5edd2bb3540186b0f6501fdcf8d13ccf6326bca957f04abf2441f2bc1e0fd77fe40f7f8b2b77c9d1bc4ebab018921e4706d7147aa8fc3f4ff41afaea63
-
Filesize
452KB
MD5c1438c93c93975f13d0bc9aaa6c69569
SHA197c7e55930cd9b275a1021554de475ed7c902db2
SHA25610649d374e6390f8a3a6f06acb908cb114018a02a1d5213307f1bd021f2922c1
SHA5123b30febec3c813c1af24b6d8aa139b6a056dd833785c1a64d8a019f1cfe346437a7ad08192a71fa9fab1bd0bfad13c37cde110b2037b1e78fb2900c7ee7428b5
-
Filesize
452KB
MD5c1438c93c93975f13d0bc9aaa6c69569
SHA197c7e55930cd9b275a1021554de475ed7c902db2
SHA25610649d374e6390f8a3a6f06acb908cb114018a02a1d5213307f1bd021f2922c1
SHA5123b30febec3c813c1af24b6d8aa139b6a056dd833785c1a64d8a019f1cfe346437a7ad08192a71fa9fab1bd0bfad13c37cde110b2037b1e78fb2900c7ee7428b5
-
Filesize
450KB
MD5d3c0cb7eb05940894c4404079441acbb
SHA1a2aa7126bda4deb3b9ac07c264dcdfacdca8d031
SHA256d6ad380132538d63aeee704ee52fd55dc3f8f6ba11b20ac29017c1912bf48bc6
SHA512057039da3f6eead65184e2173dadac66f1ada844268abe08e37d7beee4fe767ffd252e9a1f28a346787ddf2e24e7046edd858ea75d34ed2b4dc1dbdd616abd9e
-
Filesize
450KB
MD5d3c0cb7eb05940894c4404079441acbb
SHA1a2aa7126bda4deb3b9ac07c264dcdfacdca8d031
SHA256d6ad380132538d63aeee704ee52fd55dc3f8f6ba11b20ac29017c1912bf48bc6
SHA512057039da3f6eead65184e2173dadac66f1ada844268abe08e37d7beee4fe767ffd252e9a1f28a346787ddf2e24e7046edd858ea75d34ed2b4dc1dbdd616abd9e
-
Filesize
450KB
MD5d3c0cb7eb05940894c4404079441acbb
SHA1a2aa7126bda4deb3b9ac07c264dcdfacdca8d031
SHA256d6ad380132538d63aeee704ee52fd55dc3f8f6ba11b20ac29017c1912bf48bc6
SHA512057039da3f6eead65184e2173dadac66f1ada844268abe08e37d7beee4fe767ffd252e9a1f28a346787ddf2e24e7046edd858ea75d34ed2b4dc1dbdd616abd9e
-
Filesize
222KB
MD59bda68496b2b4b62b270e89f745404ca
SHA165ca0be65d0dde5e7db0b725e65a3c12c03c5ad6
SHA2569327b89241812f608b38f007520a416c3f3072846c074f58e3c3e7820c513894
SHA5121702197b363f378875d5b4ef4adf30ec7fc96e117a15acb0ec45cfc39e7244dcb9e2c7ce4d7f223ca15fb11164813cac75aee83ba49fe85d844101608bd9428a
-
Filesize
222KB
MD59bda68496b2b4b62b270e89f745404ca
SHA165ca0be65d0dde5e7db0b725e65a3c12c03c5ad6
SHA2569327b89241812f608b38f007520a416c3f3072846c074f58e3c3e7820c513894
SHA5121702197b363f378875d5b4ef4adf30ec7fc96e117a15acb0ec45cfc39e7244dcb9e2c7ce4d7f223ca15fb11164813cac75aee83ba49fe85d844101608bd9428a
-
Filesize
116B
MD5ec6aae2bb7d8781226ea61adca8f0586
SHA1d82b3bad240f263c1b887c7c0cc4c2ff0e86dfe3
SHA256b02fffaba9e664ff7840c82b102d6851ec0bb148cec462cef40999545309e599
SHA512aa62a8cd02a03e4f462f76ae6ff2e43849052ce77cca3a2ccf593f6669425830d0910afac3cf2c46dd385454a6fb3b4bd604ae13b9586087d6f22de644f9dfc7
-
Filesize
1.9MB
MD54c7efd165af03d720ce4a9d381bfb29a
SHA192b14564856155487a57db57b8a222b7f57a81e9
SHA256f5bbe3fdc27074249c6860b8959a155e6c79571daa86e7a574656a3c5c6326b8
SHA51238a26722e2669e7432b5a068b08ff852988a26ed875e8aa23156ea4bd0e852686ccabe6e685d5b0e888cb5755cbe424189fb8033ada37994417d3549b10637dd
-
Filesize
1.9MB
MD54c7efd165af03d720ce4a9d381bfb29a
SHA192b14564856155487a57db57b8a222b7f57a81e9
SHA256f5bbe3fdc27074249c6860b8959a155e6c79571daa86e7a574656a3c5c6326b8
SHA51238a26722e2669e7432b5a068b08ff852988a26ed875e8aa23156ea4bd0e852686ccabe6e685d5b0e888cb5755cbe424189fb8033ada37994417d3549b10637dd
-
Filesize
1.9MB
MD54c7efd165af03d720ce4a9d381bfb29a
SHA192b14564856155487a57db57b8a222b7f57a81e9
SHA256f5bbe3fdc27074249c6860b8959a155e6c79571daa86e7a574656a3c5c6326b8
SHA51238a26722e2669e7432b5a068b08ff852988a26ed875e8aa23156ea4bd0e852686ccabe6e685d5b0e888cb5755cbe424189fb8033ada37994417d3549b10637dd
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
229KB
MD578e5bc5b95cf1717fc889f1871f5daf6
SHA165169a87dd4a0121cd84c9094d58686be468a74a
SHA2567d2e2e4f369bcdbbe4a1d9acd299e230adc522d46e54f59e321622d80da02966
SHA512d97bc87809e5f52cd015ced62488f738ea24a16c31d1fb836091b72112b200e304f0d8fab3ef762411b662ed60df0ca5fc24d4e98adb22b79e5e74a9292c1500
-
Filesize
229KB
MD578e5bc5b95cf1717fc889f1871f5daf6
SHA165169a87dd4a0121cd84c9094d58686be468a74a
SHA2567d2e2e4f369bcdbbe4a1d9acd299e230adc522d46e54f59e321622d80da02966
SHA512d97bc87809e5f52cd015ced62488f738ea24a16c31d1fb836091b72112b200e304f0d8fab3ef762411b662ed60df0ca5fc24d4e98adb22b79e5e74a9292c1500
-
Filesize
229KB
MD578e5bc5b95cf1717fc889f1871f5daf6
SHA165169a87dd4a0121cd84c9094d58686be468a74a
SHA2567d2e2e4f369bcdbbe4a1d9acd299e230adc522d46e54f59e321622d80da02966
SHA512d97bc87809e5f52cd015ced62488f738ea24a16c31d1fb836091b72112b200e304f0d8fab3ef762411b662ed60df0ca5fc24d4e98adb22b79e5e74a9292c1500
-
Filesize
229KB
MD578e5bc5b95cf1717fc889f1871f5daf6
SHA165169a87dd4a0121cd84c9094d58686be468a74a
SHA2567d2e2e4f369bcdbbe4a1d9acd299e230adc522d46e54f59e321622d80da02966
SHA512d97bc87809e5f52cd015ced62488f738ea24a16c31d1fb836091b72112b200e304f0d8fab3ef762411b662ed60df0ca5fc24d4e98adb22b79e5e74a9292c1500
-
Filesize
647KB
MD52fba5642cbcaa6857c3995ccb5d2ee2a
SHA191fe8cd860cba7551fbf78bc77cc34e34956e8cc
SHA256ddec51f3741f3988b9cc792f6f8fc0dfa2098ef0eb84c6a2af7f8da5a72b40fa
SHA51230613b43427d17115134798506f197c0f5f8b2b9f247668fa25b9dd4853bbd97ac1e27f4e3325dec4f6dfc0e448ebbddb2969ad1a1781aa59ebf522d436aed7c
-
Filesize
647KB
MD52fba5642cbcaa6857c3995ccb5d2ee2a
SHA191fe8cd860cba7551fbf78bc77cc34e34956e8cc
SHA256ddec51f3741f3988b9cc792f6f8fc0dfa2098ef0eb84c6a2af7f8da5a72b40fa
SHA51230613b43427d17115134798506f197c0f5f8b2b9f247668fa25b9dd4853bbd97ac1e27f4e3325dec4f6dfc0e448ebbddb2969ad1a1781aa59ebf522d436aed7c
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
32KB
MD5b4786eb1e1a93633ad1b4c112514c893
SHA1734750b771d0809c88508e4feb788d7701e6dada
SHA2562ae4169f721beb389a661e6dbb18bc84ef38556af1f46807da9d87aec2a6f06f
SHA5120882d2aa163ece22796f837111db0d55158098035005e57cd2e9b8d59dc2e582207840bf98bee534b81c368acf60ab5d8ecbe762209273bda067a215cdb2c0c6
-
Filesize
32KB
MD5b4786eb1e1a93633ad1b4c112514c893
SHA1734750b771d0809c88508e4feb788d7701e6dada
SHA2562ae4169f721beb389a661e6dbb18bc84ef38556af1f46807da9d87aec2a6f06f
SHA5120882d2aa163ece22796f837111db0d55158098035005e57cd2e9b8d59dc2e582207840bf98bee534b81c368acf60ab5d8ecbe762209273bda067a215cdb2c0c6
-
Filesize
8KB
MD5076ab7d1cc5150a5e9f8745cc5f5fb6c
SHA17b40783a27a38106e2cc91414f2bc4d8b484c578
SHA256d1b71081d7ba414b589338329f278ba51c6ccf542d74f131f96c2337ee0a4c90
SHA51275e274a654e88feb0d66156f387bc5e420811f4f62939396a7455d12e835d7e134b2579ab59976c591b416d1ec1acdf05e9eb290c8f01383c6a50bf43854420b
-
Filesize
8KB
MD5076ab7d1cc5150a5e9f8745cc5f5fb6c
SHA17b40783a27a38106e2cc91414f2bc4d8b484c578
SHA256d1b71081d7ba414b589338329f278ba51c6ccf542d74f131f96c2337ee0a4c90
SHA51275e274a654e88feb0d66156f387bc5e420811f4f62939396a7455d12e835d7e134b2579ab59976c591b416d1ec1acdf05e9eb290c8f01383c6a50bf43854420b
-
Filesize
8KB
MD5076ab7d1cc5150a5e9f8745cc5f5fb6c
SHA17b40783a27a38106e2cc91414f2bc4d8b484c578
SHA256d1b71081d7ba414b589338329f278ba51c6ccf542d74f131f96c2337ee0a4c90
SHA51275e274a654e88feb0d66156f387bc5e420811f4f62939396a7455d12e835d7e134b2579ab59976c591b416d1ec1acdf05e9eb290c8f01383c6a50bf43854420b
-
Filesize
1.4MB
MD585b698363e74ba3c08fc16297ddc284e
SHA1171cfea4a82a7365b241f16aebdb2aad29f4f7c0
SHA25678efcbb0c6eb6a4c76c036adc65154b8ff028849f79d508e45babfb527cb7cfe
SHA5127e4816c43e0addba088709948e8aedc9e39d6802c74a75cfbc2a0e739b44c5b5eef2bb2453b7032c758b0bdb38e4e7a598aa29be015796361b81d7f9e8027796
-
Filesize
1.4MB
MD585b698363e74ba3c08fc16297ddc284e
SHA1171cfea4a82a7365b241f16aebdb2aad29f4f7c0
SHA25678efcbb0c6eb6a4c76c036adc65154b8ff028849f79d508e45babfb527cb7cfe
SHA5127e4816c43e0addba088709948e8aedc9e39d6802c74a75cfbc2a0e739b44c5b5eef2bb2453b7032c758b0bdb38e4e7a598aa29be015796361b81d7f9e8027796
-
Filesize
1.4MB
MD585b698363e74ba3c08fc16297ddc284e
SHA1171cfea4a82a7365b241f16aebdb2aad29f4f7c0
SHA25678efcbb0c6eb6a4c76c036adc65154b8ff028849f79d508e45babfb527cb7cfe
SHA5127e4816c43e0addba088709948e8aedc9e39d6802c74a75cfbc2a0e739b44c5b5eef2bb2453b7032c758b0bdb38e4e7a598aa29be015796361b81d7f9e8027796
-
Filesize
5.6MB
MD5bae29e49e8190bfbbf0d77ffab8de59d
SHA14a6352bb47c7e1666a60c76f9b17ca4707872bd9
SHA256f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87
SHA5129e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2
-
Filesize
5.6MB
MD5bae29e49e8190bfbbf0d77ffab8de59d
SHA14a6352bb47c7e1666a60c76f9b17ca4707872bd9
SHA256f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87
SHA5129e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2
-
Filesize
1.4MB
MD522d5269955f256a444bd902847b04a3b
SHA141a83de3273270c3bd5b2bd6528bdc95766aa268
SHA256ab16986253bd187e3134f27495ef0db4b648f769721bc8c84b708c7ba69156fd
SHA512d85ada5d8c2c02932a79241a484b088ba70bda0497fd8ad638300935a16841d7cbc8258be93055907cb533bc534fdd48c7c91109fa22f87e65a6b374cd51055c
-
Filesize
1.4MB
MD522d5269955f256a444bd902847b04a3b
SHA141a83de3273270c3bd5b2bd6528bdc95766aa268
SHA256ab16986253bd187e3134f27495ef0db4b648f769721bc8c84b708c7ba69156fd
SHA512d85ada5d8c2c02932a79241a484b088ba70bda0497fd8ad638300935a16841d7cbc8258be93055907cb533bc534fdd48c7c91109fa22f87e65a6b374cd51055c
-
Filesize
1.4MB
MD522d5269955f256a444bd902847b04a3b
SHA141a83de3273270c3bd5b2bd6528bdc95766aa268
SHA256ab16986253bd187e3134f27495ef0db4b648f769721bc8c84b708c7ba69156fd
SHA512d85ada5d8c2c02932a79241a484b088ba70bda0497fd8ad638300935a16841d7cbc8258be93055907cb533bc534fdd48c7c91109fa22f87e65a6b374cd51055c
-
Filesize
293KB
MD57e0ee1034905c7054593f4635d93949d
SHA1d8762239e7662ac7ff9b410802d2a6d457e49432
SHA2568d59073ef6e74c855f8a3f88945550b372c1e6fd6aeba4c74bda55e232919435
SHA512a65b7e44dd577ac4a75e4d2b7e7f0e768668a58d74ca10632b818bc0845c26741de5fe74e85665aba7d636d1066f32aaa1847d6e1697a77a651ea777fdc51652
-
Filesize
293KB
MD57e0ee1034905c7054593f4635d93949d
SHA1d8762239e7662ac7ff9b410802d2a6d457e49432
SHA2568d59073ef6e74c855f8a3f88945550b372c1e6fd6aeba4c74bda55e232919435
SHA512a65b7e44dd577ac4a75e4d2b7e7f0e768668a58d74ca10632b818bc0845c26741de5fe74e85665aba7d636d1066f32aaa1847d6e1697a77a651ea777fdc51652
-
Filesize
293KB
MD57e0ee1034905c7054593f4635d93949d
SHA1d8762239e7662ac7ff9b410802d2a6d457e49432
SHA2568d59073ef6e74c855f8a3f88945550b372c1e6fd6aeba4c74bda55e232919435
SHA512a65b7e44dd577ac4a75e4d2b7e7f0e768668a58d74ca10632b818bc0845c26741de5fe74e85665aba7d636d1066f32aaa1847d6e1697a77a651ea777fdc51652
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
273B
MD5a5b509a3fb95cc3c8d89cd39fc2a30fb
SHA15aff4266a9c0f2af440f28aa865cebc5ddb9cd5c
SHA2565f3c80056c7b1104c15d6fee49dac07e665c6ffd0795ad486803641ed619c529
SHA5123cc58d989c461a04f29acbfe03ed05f970b3b3e97e6819962fc5c853f55bce7f7aba0544a712e3a45ee52ab31943c898f6b3684d755b590e3e961ae5ecd1edb9