Analysis
-
max time kernel
111s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2023 14:57
Static task
static1
Behavioral task
behavioral1
Sample
c3ebb846c61392cedd3dcca8f083f8bf.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
c3ebb846c61392cedd3dcca8f083f8bf.exe
Resource
win10v2004-20230915-en
General
-
Target
c3ebb846c61392cedd3dcca8f083f8bf.exe
-
Size
296KB
-
MD5
c3ebb846c61392cedd3dcca8f083f8bf
-
SHA1
22d9e275ca2da6c8340c5f6149b9357d382dba04
-
SHA256
c7c27c7e360b66c7a5841b9da0bf4a45811ce0716613234616a7f447bb41f28c
-
SHA512
cdb3a00750dae32ec54553c20d7afe29ae68f9247d5594501d0f9c4f8d561bd6839527d10cea4be442606e35bab7766994625b2a0710a4aa073a0cb25640221b
-
SSDEEP
6144:It0Ycr4maH8w5893Oc5kbAgnKAOAURhwwYLn5:q01rJacwS3BFlmwYF
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
magia
77.91.124.55:19071
Extracted
amadey
3.89
http://77.91.124.1/theme/index.php
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
Extracted
redline
lutyr
77.91.124.55:19071
Extracted
smokeloader
up3
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Extracted
redline
6012068394_99
https://pastebin.com/raw/8baCJyMF
Extracted
stealc
http://5.42.65.39
-
url_path
/bed95ea4798a5204.php
Signatures
-
DcRat 4 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe 3268 schtasks.exe 5796 schtasks.exe 1840 schtasks.exe -
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/memory/3928-74-0x0000000000200000-0x000000000020A000-memory.dmp healer behavioral2/files/0x000a00000002320e-72.dat healer behavioral2/files/0x000a00000002320e-71.dat healer -
Glupteba payload 4 IoCs
resource yara_rule behavioral2/memory/4412-354-0x0000000004750000-0x000000000503B000-memory.dmp family_glupteba behavioral2/memory/4412-379-0x0000000000400000-0x000000000266D000-memory.dmp family_glupteba behavioral2/memory/4412-409-0x0000000000400000-0x000000000266D000-memory.dmp family_glupteba behavioral2/memory/4412-497-0x0000000000400000-0x000000000266D000-memory.dmp family_glupteba -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" FD21.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" FD21.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" FD21.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" FD21.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" FD21.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection FD21.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral2/memory/3600-77-0x0000000000400000-0x000000000043E000-memory.dmp family_redline behavioral2/files/0x0006000000023207-99.dat family_redline behavioral2/files/0x0006000000023207-98.dat family_redline behavioral2/memory/4112-101-0x0000000000070000-0x00000000000AE000-memory.dmp family_redline behavioral2/memory/1396-412-0x0000000001FB0000-0x000000000200A000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 6 IoCs
description pid Process procid_target PID 5472 created 3228 5472 latestX.exe 48 PID 5472 created 3228 5472 latestX.exe 48 PID 5472 created 3228 5472 latestX.exe 48 PID 5472 created 3228 5472 latestX.exe 48 PID 5472 created 3228 5472 latestX.exe 48 PID 5148 created 3228 5148 updater.exe 48 -
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\hosts latestX.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1508 netsh.exe -
Stops running service(s) 3 TTPs
-
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation F7DF.bat Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation 10.exe Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation explothe.exe Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation 2F5E.exe Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation kos1.exe -
Executes dropped EXE 35 IoCs
pid Process 3988 F58B.exe 4444 F6F4.exe 2356 gt0aC2kl.exe 4848 Bf1Mm6wM.exe 1236 F7DF.bat 4844 Ra9hI4vN.exe 1120 fI4eZ4ii.exe 5008 1IQ76oz8.exe 908 FB0C.exe 3928 FD21.exe 4456 10.exe 2968 explothe.exe 4112 2QS669YZ.exe 2612 2F5E.exe 4800 toolspub2.exe 4412 31839b57a4f11171d6abc8bbc4451ee4.exe 3004 Setup.exe 1844 kos1.exe 5472 latestX.exe 5740 set16.exe 5628 powercfg.exe 1168 toolspub2.exe 3616 is-RBS63.tmp 1396 5EAC.exe 5164 611E.exe 5572 previewer.exe 372 previewer.exe 780 957E.exe 2908 31839b57a4f11171d6abc8bbc4451ee4.exe 5148 updater.exe 5488 explothe.exe 6132 csrss.exe 4588 injector.exe 1080 windefender.exe 6120 windefender.exe -
Loads dropped DLL 4 IoCs
pid Process 3616 is-RBS63.tmp 3616 is-RBS63.tmp 3616 is-RBS63.tmp 3368 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution 1 TTPs
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" FD21.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" Ra9hI4vN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" fI4eZ4ii.exe Set value (str) \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" F58B.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" gt0aC2kl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Bf1Mm6wM.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive Conhost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of SetThreadContext 7 IoCs
description pid Process procid_target PID 2896 set thread context of 4284 2896 c3ebb846c61392cedd3dcca8f083f8bf.exe 83 PID 4444 set thread context of 4236 4444 F6F4.exe 113 PID 5008 set thread context of 3680 5008 1IQ76oz8.exe 119 PID 908 set thread context of 3600 908 FB0C.exe 125 PID 4800 set thread context of 1168 4800 toolspub2.exe 174 PID 3004 set thread context of 3236 3004 Setup.exe 187 PID 780 set thread context of 1124 780 957E.exe 190 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 31839b57a4f11171d6abc8bbc4451ee4.exe -
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files (x86)\PA Previewer\is-GRCMM.tmp is-RBS63.tmp File created C:\Program Files (x86)\PA Previewer\is-OKAUU.tmp is-RBS63.tmp File opened for modification C:\Program Files (x86)\PA Previewer\unins000.dat is-RBS63.tmp File opened for modification C:\Program Files (x86)\PA Previewer\previewer.exe is-RBS63.tmp File created C:\Program Files\Google\Chrome\updater.exe latestX.exe File created C:\Program Files (x86)\PA Previewer\unins000.dat is-RBS63.tmp File created C:\Program Files (x86)\PA Previewer\is-36IRP.tmp is-RBS63.tmp File created C:\Program Files (x86)\PA Previewer\is-B3J6T.tmp is-RBS63.tmp -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rss 31839b57a4f11171d6abc8bbc4451ee4.exe File created C:\Windows\rss\csrss.exe 31839b57a4f11171d6abc8bbc4451ee4.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 11 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2100 sc.exe 3752 sc.exe 1584 sc.exe 5064 sc.exe 5280 sc.exe 1724 sc.exe 3076 sc.exe 5512 sc.exe 3820 sc.exe 4740 sc.exe 5144 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 5 IoCs
pid pid_target Process procid_target 4740 2896 WerFault.exe 81 4232 4444 WerFault.exe 105 4416 5008 WerFault.exe 110 4924 3680 WerFault.exe 119 4292 908 WerFault.exe 115 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3268 schtasks.exe 5796 schtasks.exe 1840 schtasks.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-41 = "E. South America Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2792 = "Novosibirsk Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-502 = "Nepal Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2062 = "North Korea Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-12 = "Azores Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2372 = "Easter Island Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-731 = "Fiji Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-451 = "Caucasus Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-342 = "Egypt Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-151 = "Central America Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2061 = "North Korea Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-142 = "Canada Central Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2002 = "Cabo Verde Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-252 = "Dateline Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1822 = "Russia TZ 1 Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-301 = "Romance Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2871 = "Magallanes Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2751 = "Tomsk Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-571 = "China Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-182 = "Mountain Standard Time (Mexico)" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-542 = "Myanmar Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-592 = "Malay Peninsula Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2452 = "Saint Pierre Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-241 = "Samoa Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-3141 = "South Sudan Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-661 = "Cen. Australia Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-192 = "Mountain Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1842 = "Russia TZ 4 Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4284 AppLaunch.exe 4284 AppLaunch.exe 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3228 Explorer.EXE -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4284 AppLaunch.exe 1168 toolspub2.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3228 Explorer.EXE Token: SeCreatePagefilePrivilege 3228 Explorer.EXE Token: SeShutdownPrivilege 3228 Explorer.EXE Token: SeCreatePagefilePrivilege 3228 Explorer.EXE Token: SeShutdownPrivilege 3228 Explorer.EXE Token: SeCreatePagefilePrivilege 3228 Explorer.EXE Token: SeShutdownPrivilege 3228 Explorer.EXE Token: SeCreatePagefilePrivilege 3228 Explorer.EXE Token: SeDebugPrivilege 3928 FD21.exe Token: SeShutdownPrivilege 3228 Explorer.EXE Token: SeCreatePagefilePrivilege 3228 Explorer.EXE Token: SeShutdownPrivilege 3228 Explorer.EXE Token: SeCreatePagefilePrivilege 3228 Explorer.EXE Token: SeShutdownPrivilege 3228 Explorer.EXE Token: SeCreatePagefilePrivilege 3228 Explorer.EXE Token: SeShutdownPrivilege 3228 Explorer.EXE Token: SeCreatePagefilePrivilege 3228 Explorer.EXE Token: SeShutdownPrivilege 3228 Explorer.EXE Token: SeCreatePagefilePrivilege 3228 Explorer.EXE Token: SeShutdownPrivilege 3228 Explorer.EXE Token: SeCreatePagefilePrivilege 3228 Explorer.EXE Token: SeShutdownPrivilege 3228 Explorer.EXE Token: SeCreatePagefilePrivilege 3228 Explorer.EXE Token: SeShutdownPrivilege 3228 Explorer.EXE Token: SeCreatePagefilePrivilege 3228 Explorer.EXE Token: SeShutdownPrivilege 3228 Explorer.EXE Token: SeCreatePagefilePrivilege 3228 Explorer.EXE Token: SeShutdownPrivilege 3228 Explorer.EXE Token: SeCreatePagefilePrivilege 3228 Explorer.EXE Token: SeShutdownPrivilege 3228 Explorer.EXE Token: SeCreatePagefilePrivilege 3228 Explorer.EXE Token: SeShutdownPrivilege 3228 Explorer.EXE Token: SeCreatePagefilePrivilege 3228 Explorer.EXE Token: SeShutdownPrivilege 3228 Explorer.EXE Token: SeCreatePagefilePrivilege 3228 Explorer.EXE Token: SeShutdownPrivilege 3228 Explorer.EXE Token: SeCreatePagefilePrivilege 3228 Explorer.EXE Token: SeDebugPrivilege 5628 powercfg.exe Token: SeShutdownPrivilege 3228 Explorer.EXE Token: SeCreatePagefilePrivilege 3228 Explorer.EXE Token: SeShutdownPrivilege 3228 Explorer.EXE Token: SeCreatePagefilePrivilege 3228 Explorer.EXE Token: SeShutdownPrivilege 3228 Explorer.EXE Token: SeCreatePagefilePrivilege 3228 Explorer.EXE Token: SeShutdownPrivilege 3228 Explorer.EXE Token: SeCreatePagefilePrivilege 3228 Explorer.EXE Token: SeShutdownPrivilege 3228 Explorer.EXE Token: SeCreatePagefilePrivilege 3228 Explorer.EXE Token: SeShutdownPrivilege 3228 Explorer.EXE Token: SeCreatePagefilePrivilege 3228 Explorer.EXE Token: SeShutdownPrivilege 3228 Explorer.EXE Token: SeCreatePagefilePrivilege 3228 Explorer.EXE Token: SeShutdownPrivilege 3228 Explorer.EXE Token: SeCreatePagefilePrivilege 3228 Explorer.EXE Token: SeShutdownPrivilege 3228 Explorer.EXE Token: SeCreatePagefilePrivilege 3228 Explorer.EXE Token: SeShutdownPrivilege 3228 Explorer.EXE Token: SeCreatePagefilePrivilege 3228 Explorer.EXE Token: SeShutdownPrivilege 3228 Explorer.EXE Token: SeCreatePagefilePrivilege 3228 Explorer.EXE Token: SeShutdownPrivilege 3228 Explorer.EXE Token: SeCreatePagefilePrivilege 3228 Explorer.EXE Token: SeShutdownPrivilege 3228 Explorer.EXE Token: SeCreatePagefilePrivilege 3228 Explorer.EXE -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe -
Suspicious use of SendNotifyMessage 27 IoCs
pid Process 3228 Explorer.EXE 3228 Explorer.EXE 3228 Explorer.EXE 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3228 Explorer.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2896 wrote to memory of 4284 2896 c3ebb846c61392cedd3dcca8f083f8bf.exe 83 PID 2896 wrote to memory of 4284 2896 c3ebb846c61392cedd3dcca8f083f8bf.exe 83 PID 2896 wrote to memory of 4284 2896 c3ebb846c61392cedd3dcca8f083f8bf.exe 83 PID 2896 wrote to memory of 4284 2896 c3ebb846c61392cedd3dcca8f083f8bf.exe 83 PID 2896 wrote to memory of 4284 2896 c3ebb846c61392cedd3dcca8f083f8bf.exe 83 PID 2896 wrote to memory of 4284 2896 c3ebb846c61392cedd3dcca8f083f8bf.exe 83 PID 3228 wrote to memory of 3988 3228 Explorer.EXE 104 PID 3228 wrote to memory of 3988 3228 Explorer.EXE 104 PID 3228 wrote to memory of 3988 3228 Explorer.EXE 104 PID 3228 wrote to memory of 4444 3228 Explorer.EXE 105 PID 3228 wrote to memory of 4444 3228 Explorer.EXE 105 PID 3228 wrote to memory of 4444 3228 Explorer.EXE 105 PID 3988 wrote to memory of 2356 3988 F58B.exe 106 PID 3988 wrote to memory of 2356 3988 F58B.exe 106 PID 3988 wrote to memory of 2356 3988 F58B.exe 106 PID 2356 wrote to memory of 4848 2356 gt0aC2kl.exe 107 PID 2356 wrote to memory of 4848 2356 gt0aC2kl.exe 107 PID 2356 wrote to memory of 4848 2356 gt0aC2kl.exe 107 PID 3228 wrote to memory of 1236 3228 Explorer.EXE 108 PID 3228 wrote to memory of 1236 3228 Explorer.EXE 108 PID 3228 wrote to memory of 1236 3228 Explorer.EXE 108 PID 4848 wrote to memory of 4844 4848 Bf1Mm6wM.exe 109 PID 4848 wrote to memory of 4844 4848 Bf1Mm6wM.exe 109 PID 4848 wrote to memory of 4844 4848 Bf1Mm6wM.exe 109 PID 4844 wrote to memory of 1120 4844 Ra9hI4vN.exe 111 PID 4844 wrote to memory of 1120 4844 Ra9hI4vN.exe 111 PID 4844 wrote to memory of 1120 4844 Ra9hI4vN.exe 111 PID 1120 wrote to memory of 5008 1120 fI4eZ4ii.exe 110 PID 1120 wrote to memory of 5008 1120 fI4eZ4ii.exe 110 PID 1120 wrote to memory of 5008 1120 fI4eZ4ii.exe 110 PID 4444 wrote to memory of 4840 4444 F6F4.exe 112 PID 4444 wrote to memory of 4840 4444 F6F4.exe 112 PID 4444 wrote to memory of 4840 4444 F6F4.exe 112 PID 4444 wrote to memory of 4236 4444 F6F4.exe 113 PID 4444 wrote to memory of 4236 4444 F6F4.exe 113 PID 4444 wrote to memory of 4236 4444 F6F4.exe 113 PID 4444 wrote to memory of 4236 4444 F6F4.exe 113 PID 4444 wrote to memory of 4236 4444 F6F4.exe 113 PID 4444 wrote to memory of 4236 4444 F6F4.exe 113 PID 4444 wrote to memory of 4236 4444 F6F4.exe 113 PID 4444 wrote to memory of 4236 4444 F6F4.exe 113 PID 4444 wrote to memory of 4236 4444 F6F4.exe 113 PID 4444 wrote to memory of 4236 4444 F6F4.exe 113 PID 3228 wrote to memory of 908 3228 Explorer.EXE 115 PID 3228 wrote to memory of 908 3228 Explorer.EXE 115 PID 3228 wrote to memory of 908 3228 Explorer.EXE 115 PID 1236 wrote to memory of 1408 1236 F7DF.bat 150 PID 1236 wrote to memory of 1408 1236 F7DF.bat 150 PID 5008 wrote to memory of 3680 5008 1IQ76oz8.exe 119 PID 5008 wrote to memory of 3680 5008 1IQ76oz8.exe 119 PID 5008 wrote to memory of 3680 5008 1IQ76oz8.exe 119 PID 5008 wrote to memory of 3680 5008 1IQ76oz8.exe 119 PID 5008 wrote to memory of 3680 5008 1IQ76oz8.exe 119 PID 5008 wrote to memory of 3680 5008 1IQ76oz8.exe 119 PID 5008 wrote to memory of 3680 5008 1IQ76oz8.exe 119 PID 5008 wrote to memory of 3680 5008 1IQ76oz8.exe 119 PID 5008 wrote to memory of 3680 5008 1IQ76oz8.exe 119 PID 5008 wrote to memory of 3680 5008 1IQ76oz8.exe 119 PID 3228 wrote to memory of 3928 3228 Explorer.EXE 120 PID 3228 wrote to memory of 3928 3228 Explorer.EXE 120 PID 908 wrote to memory of 3600 908 FB0C.exe 125 PID 908 wrote to memory of 3600 908 FB0C.exe 125 PID 908 wrote to memory of 3600 908 FB0C.exe 125 PID 908 wrote to memory of 3600 908 FB0C.exe 125 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Users\Admin\AppData\Local\Temp\c3ebb846c61392cedd3dcca8f083f8bf.exe"C:\Users\Admin\AppData\Local\Temp\c3ebb846c61392cedd3dcca8f083f8bf.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- DcRat
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4284
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2896 -s 4043⤵
- Program crash
PID:4740
-
-
-
C:\Users\Admin\AppData\Local\Temp\F58B.exeC:\Users\Admin\AppData\Local\Temp\F58B.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gt0aC2kl.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gt0aC2kl.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Bf1Mm6wM.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Bf1Mm6wM.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Ra9hI4vN.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Ra9hI4vN.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\fI4eZ4ii.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\fI4eZ4ii.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2QS669YZ.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2QS669YZ.exe7⤵
- Executes dropped EXE
PID:4112
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\F6F4.exeC:\Users\Admin\AppData\Local\Temp\F6F4.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:4840
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:4236
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4444 -s 4043⤵
- Program crash
PID:4232
-
-
-
C:\Users\Admin\AppData\Local\Temp\F7DF.bat"C:\Users\Admin\AppData\Local\Temp\F7DF.bat"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\F964.tmp\F965.tmp\F966.bat C:\Users\Admin\AppData\Local\Temp\F7DF.bat"3⤵PID:1408
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/4⤵PID:5020
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7fff531746f8,0x7fff53174708,0x7fff531747185⤵PID:2764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,17096795614815221474,16988518850592847771,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:25⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,17096795614815221474,16988518850592847771,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:35⤵PID:4616
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/login4⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1468 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff531746f8,0x7fff53174708,0x7fff531747185⤵PID:632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1448,11420641237852700273,13366637092984918211,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:35⤵PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1448,11420641237852700273,13366637092984918211,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:25⤵PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1448,11420641237852700273,13366637092984918211,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2564 /prefetch:85⤵PID:1408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1448,11420641237852700273,13366637092984918211,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:15⤵PID:5152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1448,11420641237852700273,13366637092984918211,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:15⤵PID:5216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1448,11420641237852700273,13366637092984918211,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3924 /prefetch:15⤵PID:5532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1448,11420641237852700273,13366637092984918211,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4576 /prefetch:15⤵PID:5784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1448,11420641237852700273,13366637092984918211,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 /prefetch:85⤵PID:5812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1448,11420641237852700273,13366637092984918211,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 /prefetch:85⤵PID:1360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1448,11420641237852700273,13366637092984918211,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:15⤵PID:5296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1448,11420641237852700273,13366637092984918211,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:15⤵PID:5280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1448,11420641237852700273,13366637092984918211,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:15⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1448,11420641237852700273,13366637092984918211,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:15⤵PID:1688
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\FB0C.exeC:\Users\Admin\AppData\Local\Temp\FB0C.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:3600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 908 -s 3843⤵
- Program crash
PID:4292
-
-
-
C:\Users\Admin\AppData\Local\Temp\FD21.exeC:\Users\Admin\AppData\Local\Temp\FD21.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious use of AdjustPrivilegeToken
PID:3928
-
-
C:\Users\Admin\AppData\Local\Temp\10.exeC:\Users\Admin\AppData\Local\Temp\10.exe2⤵
- Checks computer location settings
- Executes dropped EXE
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
PID:2968 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F4⤵
- DcRat
- Creates scheduled task(s)
PID:3268
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit4⤵PID:2612
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4332
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:N"5⤵PID:368
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:R" /E5⤵PID:4292
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1300
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"5⤵PID:4520
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E5⤵PID:5000
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3368
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2F5E.exeC:\Users\Admin\AppData\Local\Temp\2F5E.exe2⤵
- Checks computer location settings
- Executes dropped EXE
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1168
-
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"3⤵
- Executes dropped EXE
PID:4412 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:5716
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:2908 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1692
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:5432
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:1508
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:516
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:952
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
PID:6132 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1948
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- DcRat
- Creates scheduled task(s)
PID:5796
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f6⤵PID:4204
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4620
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4064
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll6⤵
- Executes dropped EXE
PID:4588
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- DcRat
- Creates scheduled task(s)
PID:1840
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"6⤵
- Executes dropped EXE
PID:1080 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵PID:5492
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)8⤵
- Launches sc.exe
PID:1724
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3004 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"4⤵PID:3236
-
-
-
C:\Users\Admin\AppData\Local\Temp\kos1.exe"C:\Users\Admin\AppData\Local\Temp\kos1.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\set16.exe"C:\Users\Admin\AppData\Local\Temp\set16.exe"4⤵
- Executes dropped EXE
PID:5740 -
C:\Users\Admin\AppData\Local\Temp\is-CNQIE.tmp\is-RBS63.tmp"C:\Users\Admin\AppData\Local\Temp\is-CNQIE.tmp\is-RBS63.tmp" /SL4 $1E0028 "C:\Users\Admin\AppData\Local\Temp\set16.exe" 1232936 522245⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
PID:3616 -
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 86⤵PID:2332
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 87⤵PID:4368
-
-
-
C:\Program Files (x86)\PA Previewer\previewer.exe"C:\Program Files (x86)\PA Previewer\previewer.exe" -i6⤵
- Executes dropped EXE
PID:5572
-
-
C:\Program Files (x86)\PA Previewer\previewer.exe"C:\Program Files (x86)\PA Previewer\previewer.exe" -s6⤵
- Executes dropped EXE
PID:372
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\kos.exe"C:\Users\Admin\AppData\Local\Temp\kos.exe"4⤵PID:5628
-
-
-
C:\Users\Admin\AppData\Local\Temp\latestX.exe"C:\Users\Admin\AppData\Local\Temp\latestX.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Program Files directory
PID:5472
-
-
-
C:\Users\Admin\AppData\Local\Temp\5EAC.exeC:\Users\Admin\AppData\Local\Temp\5EAC.exe2⤵
- Executes dropped EXE
PID:1396
-
-
C:\Users\Admin\AppData\Local\Temp\611E.exeC:\Users\Admin\AppData\Local\Temp\611E.exe2⤵
- Executes dropped EXE
PID:5164
-
-
C:\Users\Admin\AppData\Local\Temp\957E.exeC:\Users\Admin\AppData\Local\Temp\957E.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:780 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵PID:1124
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵PID:1104
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:4116
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:5064
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:5144
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:2100
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:5280
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:3752
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:5640
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:4100
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:5804
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5628
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:952
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵PID:6056
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:6112
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Modifies data under HKEY_USERS
PID:1308 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:516
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:1632
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:3076
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:5512
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:1584
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:3820
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:4740
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:5360
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:2756
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:676
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:5748
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:3004
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵PID:5896
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:5316
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:5304
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 2896 -ip 28961⤵PID:4860
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1IQ76oz8.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1IQ76oz8.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:3680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3680 -s 5403⤵
- Program crash
PID:4924
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5008 -s 5802⤵
- Program crash
PID:4416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4444 -ip 44441⤵PID:4520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 5008 -ip 50081⤵PID:4800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 3680 -ip 36801⤵PID:4164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 908 -ip 9081⤵PID:2464
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5692
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5768
-
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
PID:5148
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:5488
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
PID:6120
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵PID:1144
-
C:\Users\Admin\AppData\Roaming\btaivrgC:\Users\Admin\AppData\Roaming\btaivrg1⤵PID:516
-
C:\Users\Admin\AppData\Roaming\jeaivrgC:\Users\Admin\AppData\Roaming\jeaivrg1⤵PID:5496
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Defense Evasion
Impair Defenses
3Disable or Modify Tools
2Modify Registry
3Scripting
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dc1545f40e709a9447a266260fdc751e
SHA18afed6d761fb82c918c1d95481170a12fe94af51
SHA2563dadfc7e0bd965d4d61db057861a84761abf6af17b17250e32b7450c1ddc4d48
SHA512ed0ae5280736022a9ef6c5878bf3750c2c5473cc122a4511d3fb75eb6188a2c3931c8fa1eaa01203a7748f323ed73c0d2eb4357ac230d14b65d18ac2727d020f
-
Filesize
152B
MD51222f8c867acd00b1fc43a44dacce158
SHA1586ba251caf62b5012a03db9ba3a70890fc5af01
SHA2561e451cb9ffe74fbd34091a1b8d0ab2158497c19047b3416d89e55f498aae264a
SHA512ef3f2fc1cedfc28fb530c710219b8e9eb833a2f344b91d3ffb2d82d7bbedbc223f4b60a38bea35b72eb706e4880ffcbb9256a9768f39bae95c5544be0f503916
-
Filesize
152B
MD51222f8c867acd00b1fc43a44dacce158
SHA1586ba251caf62b5012a03db9ba3a70890fc5af01
SHA2561e451cb9ffe74fbd34091a1b8d0ab2158497c19047b3416d89e55f498aae264a
SHA512ef3f2fc1cedfc28fb530c710219b8e9eb833a2f344b91d3ffb2d82d7bbedbc223f4b60a38bea35b72eb706e4880ffcbb9256a9768f39bae95c5544be0f503916
-
Filesize
152B
MD51222f8c867acd00b1fc43a44dacce158
SHA1586ba251caf62b5012a03db9ba3a70890fc5af01
SHA2561e451cb9ffe74fbd34091a1b8d0ab2158497c19047b3416d89e55f498aae264a
SHA512ef3f2fc1cedfc28fb530c710219b8e9eb833a2f344b91d3ffb2d82d7bbedbc223f4b60a38bea35b72eb706e4880ffcbb9256a9768f39bae95c5544be0f503916
-
Filesize
152B
MD51222f8c867acd00b1fc43a44dacce158
SHA1586ba251caf62b5012a03db9ba3a70890fc5af01
SHA2561e451cb9ffe74fbd34091a1b8d0ab2158497c19047b3416d89e55f498aae264a
SHA512ef3f2fc1cedfc28fb530c710219b8e9eb833a2f344b91d3ffb2d82d7bbedbc223f4b60a38bea35b72eb706e4880ffcbb9256a9768f39bae95c5544be0f503916
-
Filesize
152B
MD51222f8c867acd00b1fc43a44dacce158
SHA1586ba251caf62b5012a03db9ba3a70890fc5af01
SHA2561e451cb9ffe74fbd34091a1b8d0ab2158497c19047b3416d89e55f498aae264a
SHA512ef3f2fc1cedfc28fb530c710219b8e9eb833a2f344b91d3ffb2d82d7bbedbc223f4b60a38bea35b72eb706e4880ffcbb9256a9768f39bae95c5544be0f503916
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1008B
MD5e6662fcf0228f6354ec2a49ac2372c0f
SHA1803f9bfa5db5172c23424c1f965126daecbf8e63
SHA256b9c05a34eb8c5847d2f4ac556718c1d0cf929fdc170661ec0cf0beb0c4d9742c
SHA5120380eb7314c686b7fc16593fe2fa888e4e4a052ede88b6ba68136aafdadc0e92852bc0d05659fad06946dc0969e9a4844657e98afeeea0d606fb4fa1381d6420
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
1KB
MD5e473f6fa519d348ea5e5d7847761e3fe
SHA1ff9a647de467b1fdf93d26130c312e226be2bdba
SHA25629f747a34e2ca5dc2f6d6001115ab85f0fbba8b8db4e2e5be665b254f7b2da7f
SHA512fe4ddde397eb5e84ade3955ae5c9ec17cd4e0953082502d1eef3aae611e89039d93082b876dddeda0973a5e79f606a1ed75d966f428e6e48f198bcbd2d5c622e
-
Filesize
6KB
MD597b1f81c72f8cd49d88f7a19b8d3847b
SHA1387ce7a4a0472785b6c27deab72a149c39eabb80
SHA25686fee51bf08e228e411bd14fdf60fa08c3343de742027081d4b336864e31fe96
SHA5123f44070e9ad149367a5d3a487def009d0167e79ca3d1a03d29c8538766677bd63997ede3fb47a89325eb122e4daf4e68f2820aea71786edf5b1e0605bb6e1529
-
Filesize
6KB
MD5c4e73282857f849e41d55fe89cf6f7c3
SHA10544426d8ba2a004b2bc928d588e1d8d1b2d1931
SHA2560f3719ee8c40738beabeaed46747f1b4ec43d62a717856d54895821af572d535
SHA51221811242ebdccdb023497761bffbb76184cc4a7ec2721178120ff11e84c4f2d2aeebc4ed51162c05c7f61b10cb2a9e9a86ff3b53b1b5c1796d18df544439c61c
-
Filesize
5KB
MD5b872795e660be3344933b6c1a645da8a
SHA1a09d4556fb7aa5c19de50422de218f6b4aa48823
SHA256f3cf5358c1ad3e275597ff2d15b4359b843b52e34f9970d78479f632c6634afc
SHA51219331760de1f89c7d8e8fdecc439bd38c413d5739e7931cc6d3feee781512c0fe726b4a3da339e56c612e70a0e49780abc2810f24388e2c9284ff06611515776
-
Filesize
24KB
MD515ad31a14e9a92d2937174141e80c28d
SHA1b09e8d44c07123754008ba2f9ff4b8d4e332d4e5
SHA256bf983e704839ef295b4c957f1adeee146aaf58f2dbf5b1e2d4b709cec65eccde
SHA512ec744a79ccbfca52357d4f0212e7afd26bc93efd566dd5d861bf0671069ba5cb7e84069e0ea091c73dee57e9de9bb412fb68852281ae9bd84c11a871f5362296
-
Filesize
872B
MD5d71887057a237eca8ad2a3712d9fc033
SHA13823f8e2c4adcff5bde05b61ab93d3e9ecda1df0
SHA2560e5c9a62b71b4fc047863370faeeb10102f68305538906e9c57028a3c37f90de
SHA512e1fb7d4c4aaf304e934dfdff016644314e44026ff9389e2c9c01cdadd33a70a0b9f2c7355f3fe8f49a730a7d2f13e11e71ac0ff0d1f76146de63ccf7230bf0d2
-
Filesize
872B
MD5525024816bec65b8d6dbcae53884b779
SHA19360a2f2ddf7fbf7e23a2ca739bba9ce2b82ed94
SHA2566f1673fe72532e09389febd7f00d060e9b749eb1a4622214e1e69cd8348c9f74
SHA5127129b596407cc153450caa315f802b858eb1a9b77d3df2085c07bded7deec12d28655114269f314be3a398fc4ad3a60768a078e72b68da7cdaac30cbcd3b6ca9
-
Filesize
872B
MD56680840350f91f01462a840e825331c7
SHA1287517c91d4b399fb3e404126f09be5a844ae916
SHA25659cda662968b80f7db75751eea36fd2610487d74e4835b3ea503c0304eb1c607
SHA512e32d33cf6dec7cdee63e56e6b2f33f91a5e76cf1777e4283039d84be5b51e6e485ef8d33d0bb577b65ef75a21370c1351eccfd2c51e4199dc76f69b954438e81
-
Filesize
371B
MD5fb097517c34f3406ddfecdf520d98cbd
SHA1383cb19199d42543db76c58e1b97b7274c48a920
SHA2565416b0d7ef98cb36ff2f32383ff77c4ab73fc316cd75b78ee3970a3a2dd99768
SHA5124ae78e4a8b8e9fd1b1c7f8336b3249aac06be7d0eedfcd4f39d928e7ca9d1de192a07a7fddaabfb48eefd997a416748391decca3c08763d0cb17ad86d547ebe8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD55d932cdf7b47772c58007142b920e7df
SHA1a339332a9dadc26d6de0c293fa85bc04fb67ca7b
SHA256ae4a73635b4052dff24c1d29eaf69993974da061513b8ef4ad762739eaf7360e
SHA512ec89250f97d5b570537dc35e0310c8cb7d83066558bdc62a396d0ed277d564c07f7a64d9ada16815d83cfc0d9222a770bc8aba792db0f9389aecd20fa3328bf0
-
Filesize
10KB
MD5a90f2ae19924c007c5406c670cb362c3
SHA19d1c00b2036b5579a5f1ce972a1ba2ca25102448
SHA256b6b97dc17997844c0025f7e8191863761e0e0ce2dbe3964d2f9e28c3f2d53de3
SHA512ed73a8f4f2a985cb9ca763bb54380fb42ec79bd5b80ce99d4b155adc642296492b9118faf96cd63a447f8e189e304bfec23338d379c9a7972433a7b52b39750f
-
Filesize
2KB
MD53cec0a34c36a8261cb46b823f2681eb3
SHA141e5b0d58627ae9c2acd2a1a09f3dfc9fd2265df
SHA2560d17c2760ba3106849c10b49008ee1b1eb7aaabebbf9669626e00ec8042cb425
SHA512c9b4859173613236fef0418653b7b2c3254ccf97f480948cda35a7e8ef3feba83294d8c596be0435f8df3a0aab35d49c5f386b1058597c27624991cb4de03aba
-
Filesize
10KB
MD5b7e34ce8a5deb657802dfe8d74a76f46
SHA155740277ba475fdcb3a0f3b83bb6e607a0cc22f8
SHA2560c90712f77c45c14f5bf1fc5e341f5f65d7b4fea48fce12e3e6cc1a1e3643232
SHA5127118619ecf155ce5f3aca65e9dce9693b32e730ad75c1b9ac195390ce53660ae8ebb69d3cdc46c98e87d1dc74322fbf091cdee15c17d85a28b1a347f0216ee34
-
Filesize
2KB
MD53cec0a34c36a8261cb46b823f2681eb3
SHA141e5b0d58627ae9c2acd2a1a09f3dfc9fd2265df
SHA2560d17c2760ba3106849c10b49008ee1b1eb7aaabebbf9669626e00ec8042cb425
SHA512c9b4859173613236fef0418653b7b2c3254ccf97f480948cda35a7e8ef3feba83294d8c596be0435f8df3a0aab35d49c5f386b1058597c27624991cb4de03aba
-
Filesize
229KB
MD578e5bc5b95cf1717fc889f1871f5daf6
SHA165169a87dd4a0121cd84c9094d58686be468a74a
SHA2567d2e2e4f369bcdbbe4a1d9acd299e230adc522d46e54f59e321622d80da02966
SHA512d97bc87809e5f52cd015ced62488f738ea24a16c31d1fb836091b72112b200e304f0d8fab3ef762411b662ed60df0ca5fc24d4e98adb22b79e5e74a9292c1500
-
Filesize
229KB
MD578e5bc5b95cf1717fc889f1871f5daf6
SHA165169a87dd4a0121cd84c9094d58686be468a74a
SHA2567d2e2e4f369bcdbbe4a1d9acd299e230adc522d46e54f59e321622d80da02966
SHA512d97bc87809e5f52cd015ced62488f738ea24a16c31d1fb836091b72112b200e304f0d8fab3ef762411b662ed60df0ca5fc24d4e98adb22b79e5e74a9292c1500
-
Filesize
13.5MB
MD5355cb70b6f919ab1fb3cab522a2e3617
SHA111ded46db86b738a7fcb3a29bf49e7cb35a0bbfd
SHA25689b23431a3fd1b1932a26c626dbf5ad39d5a82fcc10ca4fd20e4d90f635bda42
SHA5120a866fbe6363a5010d80817dede70a64c8eaa50d38315706041428a4489a0fa298b217753b566713751d975ebc1c0b0db6a0a5af3140c949e155595bfeaedb34
-
Filesize
13.5MB
MD5355cb70b6f919ab1fb3cab522a2e3617
SHA111ded46db86b738a7fcb3a29bf49e7cb35a0bbfd
SHA25689b23431a3fd1b1932a26c626dbf5ad39d5a82fcc10ca4fd20e4d90f635bda42
SHA5120a866fbe6363a5010d80817dede70a64c8eaa50d38315706041428a4489a0fa298b217753b566713751d975ebc1c0b0db6a0a5af3140c949e155595bfeaedb34
-
Filesize
4.2MB
MD5ef8d69e99b8eb73af2486dae908b9d7e
SHA118050ae9a587ba0531f92bb660af3bfcf61639a5
SHA256cf022461fa758bceea357a5a25fe28199a30d1b13d5fcf42270205d29ec9b132
SHA512af08a978c523a90e64fbd64aeaf3c3bfad72f70eaeec280e96fb750b49493337c99b8d23e61ab3a1c3479eadcb72554dfc1be7ae3153c780a95626b461eb9126
-
Filesize
4.2MB
MD5ef8d69e99b8eb73af2486dae908b9d7e
SHA118050ae9a587ba0531f92bb660af3bfcf61639a5
SHA256cf022461fa758bceea357a5a25fe28199a30d1b13d5fcf42270205d29ec9b132
SHA512af08a978c523a90e64fbd64aeaf3c3bfad72f70eaeec280e96fb750b49493337c99b8d23e61ab3a1c3479eadcb72554dfc1be7ae3153c780a95626b461eb9126
-
Filesize
4.2MB
MD5ef8d69e99b8eb73af2486dae908b9d7e
SHA118050ae9a587ba0531f92bb660af3bfcf61639a5
SHA256cf022461fa758bceea357a5a25fe28199a30d1b13d5fcf42270205d29ec9b132
SHA512af08a978c523a90e64fbd64aeaf3c3bfad72f70eaeec280e96fb750b49493337c99b8d23e61ab3a1c3479eadcb72554dfc1be7ae3153c780a95626b461eb9126
-
Filesize
1.3MB
MD5e19af8058d1c10695db59ff06382095c
SHA174879eca322c96e26ccc9d52b87c3f47d54cedf4
SHA2562598a435594fc87df1b99231c77f9f38793dd1d59b7f06388b1b60d59d0bbecf
SHA5122985aac9377a1d12090a1db16137338715ff9c5e857096f4b33b37f6f2af9463346e0ce859324c5c1f15eee83885f1c1d2ceb6ec9d3d00a6033e437d11af9dee
-
Filesize
1.3MB
MD5e19af8058d1c10695db59ff06382095c
SHA174879eca322c96e26ccc9d52b87c3f47d54cedf4
SHA2562598a435594fc87df1b99231c77f9f38793dd1d59b7f06388b1b60d59d0bbecf
SHA5122985aac9377a1d12090a1db16137338715ff9c5e857096f4b33b37f6f2af9463346e0ce859324c5c1f15eee83885f1c1d2ceb6ec9d3d00a6033e437d11af9dee
-
Filesize
446KB
MD5f72f7ce68786940e325b04efb37eed20
SHA1be0f1b14cb6770468b549c9529c80107ea6bf3e3
SHA2564f681293759a743adbd7f803fbe4875cb48f90657054c01cf1abb9400452f9a4
SHA512e7ce5ecefa1e70956ff4b795cac039432f65ce593277f08feb633edccb285d2357cf0b119685d117230607ccd76489b1d934cb72615f3d25b38542dddfffaa4d
-
Filesize
446KB
MD5f72f7ce68786940e325b04efb37eed20
SHA1be0f1b14cb6770468b549c9529c80107ea6bf3e3
SHA2564f681293759a743adbd7f803fbe4875cb48f90657054c01cf1abb9400452f9a4
SHA512e7ce5ecefa1e70956ff4b795cac039432f65ce593277f08feb633edccb285d2357cf0b119685d117230607ccd76489b1d934cb72615f3d25b38542dddfffaa4d
-
Filesize
97KB
MD59db53ae9e8af72f18e08c8b8955f8035
SHA150ae5f80c1246733d54db98fac07380b1b2ff90d
SHA256d1d32c30e132d6348bd8e8baff51d1b706e78204b7f5775874946a7019a92b89
SHA5123cfb3104befbb5d60b5844e3841bf7c61baed8671191cfc42e0666c6ce92412ab235c70be718f52cfbd0e338c9f6f04508e0fd07b30f9bbda389e2e649c199d1
-
Filesize
97KB
MD59db53ae9e8af72f18e08c8b8955f8035
SHA150ae5f80c1246733d54db98fac07380b1b2ff90d
SHA256d1d32c30e132d6348bd8e8baff51d1b706e78204b7f5775874946a7019a92b89
SHA5123cfb3104befbb5d60b5844e3841bf7c61baed8671191cfc42e0666c6ce92412ab235c70be718f52cfbd0e338c9f6f04508e0fd07b30f9bbda389e2e649c199d1
-
Filesize
97KB
MD59db53ae9e8af72f18e08c8b8955f8035
SHA150ae5f80c1246733d54db98fac07380b1b2ff90d
SHA256d1d32c30e132d6348bd8e8baff51d1b706e78204b7f5775874946a7019a92b89
SHA5123cfb3104befbb5d60b5844e3841bf7c61baed8671191cfc42e0666c6ce92412ab235c70be718f52cfbd0e338c9f6f04508e0fd07b30f9bbda389e2e649c199d1
-
Filesize
88B
MD50ec04fde104330459c151848382806e8
SHA13b0b78d467f2db035a03e378f7b3a3823fa3d156
SHA2561ee0a6f7c4006a36891e2fd72a0257e89fd79ad811987c0e17f847fe99ea695f
SHA5128b928989f17f09282e008da27e8b7fd373c99d5cafb85b5f623e02dbb6273f0ed76a9fbbfef0b080dbba53b6de8ee491ea379a38e5b6ca0763b11dd4de544b40
-
Filesize
485KB
MD591d59743099d1173afd14e8ab2a1d3cc
SHA1ccf3b6261d1cce5b4e52f22a275a4756544ed68a
SHA256c40d71f996f895b99b613c79b37cf05f9c979ebc2bcb65fdf20b7f4e6956d59a
SHA51202b808a9f62cc20dc9a3d41b52a3f48a87ea08466918a1ef773b4e4d9fcccd9f9afe423370123451fa4b8397b3c8a410c8cbf946f6a50a2b5868d888873f1c52
-
Filesize
485KB
MD591d59743099d1173afd14e8ab2a1d3cc
SHA1ccf3b6261d1cce5b4e52f22a275a4756544ed68a
SHA256c40d71f996f895b99b613c79b37cf05f9c979ebc2bcb65fdf20b7f4e6956d59a
SHA51202b808a9f62cc20dc9a3d41b52a3f48a87ea08466918a1ef773b4e4d9fcccd9f9afe423370123451fa4b8397b3c8a410c8cbf946f6a50a2b5868d888873f1c52
-
Filesize
21KB
MD557543bf9a439bf01773d3d508a221fda
SHA15728a0b9f1856aa5183d15ba00774428be720c35
SHA25670d2e4df54793d08b8e76f1bb1db26721e0398da94dca629ab77bd41cc27fd4e
SHA51228f2eb1fef817df513568831ca550564d490f7bd6c46ada8e06b2cd81bbc59bc2d7b9f955dbfc31c6a41237d0d0f8aa40aaac7ae2fabf9902228f6b669b7fe20
-
Filesize
21KB
MD557543bf9a439bf01773d3d508a221fda
SHA15728a0b9f1856aa5183d15ba00774428be720c35
SHA25670d2e4df54793d08b8e76f1bb1db26721e0398da94dca629ab77bd41cc27fd4e
SHA51228f2eb1fef817df513568831ca550564d490f7bd6c46ada8e06b2cd81bbc59bc2d7b9f955dbfc31c6a41237d0d0f8aa40aaac7ae2fabf9902228f6b669b7fe20
-
Filesize
1.1MB
MD56abc100af2fb0c5195db4c82bea69717
SHA13b257d9569562df3cfbffd17be6bc34ad050d6d8
SHA256fde683fd96f5a0e9298acfea737879915d85a5f645de46bdb6b08d12a9cbcdae
SHA51217348c5514db27897639fa9bc1862b8faf2c34aee32af9a49d5b710ed2e791a454a5e2ce7329ca42d1fd96ad1d95c25bd98124e07802278220503e0c4d7ed461
-
Filesize
1.1MB
MD56abc100af2fb0c5195db4c82bea69717
SHA13b257d9569562df3cfbffd17be6bc34ad050d6d8
SHA256fde683fd96f5a0e9298acfea737879915d85a5f645de46bdb6b08d12a9cbcdae
SHA51217348c5514db27897639fa9bc1862b8faf2c34aee32af9a49d5b710ed2e791a454a5e2ce7329ca42d1fd96ad1d95c25bd98124e07802278220503e0c4d7ed461
-
Filesize
949KB
MD5a53015d8b49d63a2d4cadf2195557ca6
SHA1fad7dcb400c2557be3b7e41edcd3735ea5b0a38a
SHA256bd90e58a7ee36f53ee8f63b183e89de46942c29b576c5bd1ec68fb150a61520f
SHA512af63453c8f8af221de59a84744b53777b89863faab9bef5e7700c98a4d28cde8352587ba8ead814d54011370ed3447cc41a305f00687726b3ea4d4125b1a11a9
-
Filesize
949KB
MD5a53015d8b49d63a2d4cadf2195557ca6
SHA1fad7dcb400c2557be3b7e41edcd3735ea5b0a38a
SHA256bd90e58a7ee36f53ee8f63b183e89de46942c29b576c5bd1ec68fb150a61520f
SHA512af63453c8f8af221de59a84744b53777b89863faab9bef5e7700c98a4d28cde8352587ba8ead814d54011370ed3447cc41a305f00687726b3ea4d4125b1a11a9
-
Filesize
645KB
MD5e80114723fe4b6b164b6b6e3c8a7ba82
SHA1ca76fc7c25f54403419c065f610094363e3961b4
SHA256da5f73535ed945a679a2cc6f0aa477da7e52e290ae147e4e0ac5e84031f1c59b
SHA512dbf4afdd735f8377d36845a1300902295bd7b954f06e8237637b14c885ebc74c2eb2aa227600a07fa759744604f4e7c6667797ac0cb2358dd46670b205622699
-
Filesize
645KB
MD5e80114723fe4b6b164b6b6e3c8a7ba82
SHA1ca76fc7c25f54403419c065f610094363e3961b4
SHA256da5f73535ed945a679a2cc6f0aa477da7e52e290ae147e4e0ac5e84031f1c59b
SHA512dbf4afdd735f8377d36845a1300902295bd7b954f06e8237637b14c885ebc74c2eb2aa227600a07fa759744604f4e7c6667797ac0cb2358dd46670b205622699
-
Filesize
449KB
MD555694bc98ddf85201c32ec8b2903766a
SHA1781918266d8b400e1faa12c2339ed844009666e5
SHA25643da2a0a11ae463cef4f0ea5a162a007c32808b89661468853d837c638e01e37
SHA5124ae556fd775f74f642c4248ffb2f3865eaa25025c101473a3d27c05af45ced26f17d68b0c57402a39b859b36921363f93eb68df0a00ad3b81ac7d4ae0e4818bd
-
Filesize
449KB
MD555694bc98ddf85201c32ec8b2903766a
SHA1781918266d8b400e1faa12c2339ed844009666e5
SHA25643da2a0a11ae463cef4f0ea5a162a007c32808b89661468853d837c638e01e37
SHA5124ae556fd775f74f642c4248ffb2f3865eaa25025c101473a3d27c05af45ced26f17d68b0c57402a39b859b36921363f93eb68df0a00ad3b81ac7d4ae0e4818bd
-
Filesize
446KB
MD5f72f7ce68786940e325b04efb37eed20
SHA1be0f1b14cb6770468b549c9529c80107ea6bf3e3
SHA2564f681293759a743adbd7f803fbe4875cb48f90657054c01cf1abb9400452f9a4
SHA512e7ce5ecefa1e70956ff4b795cac039432f65ce593277f08feb633edccb285d2357cf0b119685d117230607ccd76489b1d934cb72615f3d25b38542dddfffaa4d
-
Filesize
446KB
MD5f72f7ce68786940e325b04efb37eed20
SHA1be0f1b14cb6770468b549c9529c80107ea6bf3e3
SHA2564f681293759a743adbd7f803fbe4875cb48f90657054c01cf1abb9400452f9a4
SHA512e7ce5ecefa1e70956ff4b795cac039432f65ce593277f08feb633edccb285d2357cf0b119685d117230607ccd76489b1d934cb72615f3d25b38542dddfffaa4d
-
Filesize
446KB
MD5f72f7ce68786940e325b04efb37eed20
SHA1be0f1b14cb6770468b549c9529c80107ea6bf3e3
SHA2564f681293759a743adbd7f803fbe4875cb48f90657054c01cf1abb9400452f9a4
SHA512e7ce5ecefa1e70956ff4b795cac039432f65ce593277f08feb633edccb285d2357cf0b119685d117230607ccd76489b1d934cb72615f3d25b38542dddfffaa4d
-
Filesize
222KB
MD5781c6c4fb67b356ff62d815ce87a6de9
SHA1f4a40a32f2f5a23b1e50df44c6a4479cf72459cd
SHA256def9310e23962509bdfc9c6d3cc3a4d88cb2c2fea955a37deced707fa6d57cab
SHA5127b0877a213357fdf70bb6f69e929b27eca77dd8077b75e1b73256d63bd0fc71a9916da750f7e1a9a017e70cccc7bce4dd0ae463edc06b4d1103a9be8a176420e
-
Filesize
222KB
MD5781c6c4fb67b356ff62d815ce87a6de9
SHA1f4a40a32f2f5a23b1e50df44c6a4479cf72459cd
SHA256def9310e23962509bdfc9c6d3cc3a4d88cb2c2fea955a37deced707fa6d57cab
SHA5127b0877a213357fdf70bb6f69e929b27eca77dd8077b75e1b73256d63bd0fc71a9916da750f7e1a9a017e70cccc7bce4dd0ae463edc06b4d1103a9be8a176420e
-
Filesize
116B
MD5ec6aae2bb7d8781226ea61adca8f0586
SHA1d82b3bad240f263c1b887c7c0cc4c2ff0e86dfe3
SHA256b02fffaba9e664ff7840c82b102d6851ec0bb148cec462cef40999545309e599
SHA512aa62a8cd02a03e4f462f76ae6ff2e43849052ce77cca3a2ccf593f6669425830d0910afac3cf2c46dd385454a6fb3b4bd604ae13b9586087d6f22de644f9dfc7
-
Filesize
1.9MB
MD54c7efd165af03d720ce4a9d381bfb29a
SHA192b14564856155487a57db57b8a222b7f57a81e9
SHA256f5bbe3fdc27074249c6860b8959a155e6c79571daa86e7a574656a3c5c6326b8
SHA51238a26722e2669e7432b5a068b08ff852988a26ed875e8aa23156ea4bd0e852686ccabe6e685d5b0e888cb5755cbe424189fb8033ada37994417d3549b10637dd
-
Filesize
1.9MB
MD54c7efd165af03d720ce4a9d381bfb29a
SHA192b14564856155487a57db57b8a222b7f57a81e9
SHA256f5bbe3fdc27074249c6860b8959a155e6c79571daa86e7a574656a3c5c6326b8
SHA51238a26722e2669e7432b5a068b08ff852988a26ed875e8aa23156ea4bd0e852686ccabe6e685d5b0e888cb5755cbe424189fb8033ada37994417d3549b10637dd
-
Filesize
1.9MB
MD54c7efd165af03d720ce4a9d381bfb29a
SHA192b14564856155487a57db57b8a222b7f57a81e9
SHA256f5bbe3fdc27074249c6860b8959a155e6c79571daa86e7a574656a3c5c6326b8
SHA51238a26722e2669e7432b5a068b08ff852988a26ed875e8aa23156ea4bd0e852686ccabe6e685d5b0e888cb5755cbe424189fb8033ada37994417d3549b10637dd
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
229KB
MD578e5bc5b95cf1717fc889f1871f5daf6
SHA165169a87dd4a0121cd84c9094d58686be468a74a
SHA2567d2e2e4f369bcdbbe4a1d9acd299e230adc522d46e54f59e321622d80da02966
SHA512d97bc87809e5f52cd015ced62488f738ea24a16c31d1fb836091b72112b200e304f0d8fab3ef762411b662ed60df0ca5fc24d4e98adb22b79e5e74a9292c1500
-
Filesize
229KB
MD578e5bc5b95cf1717fc889f1871f5daf6
SHA165169a87dd4a0121cd84c9094d58686be468a74a
SHA2567d2e2e4f369bcdbbe4a1d9acd299e230adc522d46e54f59e321622d80da02966
SHA512d97bc87809e5f52cd015ced62488f738ea24a16c31d1fb836091b72112b200e304f0d8fab3ef762411b662ed60df0ca5fc24d4e98adb22b79e5e74a9292c1500
-
Filesize
229KB
MD578e5bc5b95cf1717fc889f1871f5daf6
SHA165169a87dd4a0121cd84c9094d58686be468a74a
SHA2567d2e2e4f369bcdbbe4a1d9acd299e230adc522d46e54f59e321622d80da02966
SHA512d97bc87809e5f52cd015ced62488f738ea24a16c31d1fb836091b72112b200e304f0d8fab3ef762411b662ed60df0ca5fc24d4e98adb22b79e5e74a9292c1500
-
Filesize
647KB
MD52fba5642cbcaa6857c3995ccb5d2ee2a
SHA191fe8cd860cba7551fbf78bc77cc34e34956e8cc
SHA256ddec51f3741f3988b9cc792f6f8fc0dfa2098ef0eb84c6a2af7f8da5a72b40fa
SHA51230613b43427d17115134798506f197c0f5f8b2b9f247668fa25b9dd4853bbd97ac1e27f4e3325dec4f6dfc0e448ebbddb2969ad1a1781aa59ebf522d436aed7c
-
Filesize
647KB
MD52fba5642cbcaa6857c3995ccb5d2ee2a
SHA191fe8cd860cba7551fbf78bc77cc34e34956e8cc
SHA256ddec51f3741f3988b9cc792f6f8fc0dfa2098ef0eb84c6a2af7f8da5a72b40fa
SHA51230613b43427d17115134798506f197c0f5f8b2b9f247668fa25b9dd4853bbd97ac1e27f4e3325dec4f6dfc0e448ebbddb2969ad1a1781aa59ebf522d436aed7c
-
Filesize
32KB
MD5b4786eb1e1a93633ad1b4c112514c893
SHA1734750b771d0809c88508e4feb788d7701e6dada
SHA2562ae4169f721beb389a661e6dbb18bc84ef38556af1f46807da9d87aec2a6f06f
SHA5120882d2aa163ece22796f837111db0d55158098035005e57cd2e9b8d59dc2e582207840bf98bee534b81c368acf60ab5d8ecbe762209273bda067a215cdb2c0c6
-
Filesize
8KB
MD5076ab7d1cc5150a5e9f8745cc5f5fb6c
SHA17b40783a27a38106e2cc91414f2bc4d8b484c578
SHA256d1b71081d7ba414b589338329f278ba51c6ccf542d74f131f96c2337ee0a4c90
SHA51275e274a654e88feb0d66156f387bc5e420811f4f62939396a7455d12e835d7e134b2579ab59976c591b416d1ec1acdf05e9eb290c8f01383c6a50bf43854420b
-
Filesize
8KB
MD5076ab7d1cc5150a5e9f8745cc5f5fb6c
SHA17b40783a27a38106e2cc91414f2bc4d8b484c578
SHA256d1b71081d7ba414b589338329f278ba51c6ccf542d74f131f96c2337ee0a4c90
SHA51275e274a654e88feb0d66156f387bc5e420811f4f62939396a7455d12e835d7e134b2579ab59976c591b416d1ec1acdf05e9eb290c8f01383c6a50bf43854420b
-
Filesize
8KB
MD5076ab7d1cc5150a5e9f8745cc5f5fb6c
SHA17b40783a27a38106e2cc91414f2bc4d8b484c578
SHA256d1b71081d7ba414b589338329f278ba51c6ccf542d74f131f96c2337ee0a4c90
SHA51275e274a654e88feb0d66156f387bc5e420811f4f62939396a7455d12e835d7e134b2579ab59976c591b416d1ec1acdf05e9eb290c8f01383c6a50bf43854420b
-
Filesize
1.4MB
MD585b698363e74ba3c08fc16297ddc284e
SHA1171cfea4a82a7365b241f16aebdb2aad29f4f7c0
SHA25678efcbb0c6eb6a4c76c036adc65154b8ff028849f79d508e45babfb527cb7cfe
SHA5127e4816c43e0addba088709948e8aedc9e39d6802c74a75cfbc2a0e739b44c5b5eef2bb2453b7032c758b0bdb38e4e7a598aa29be015796361b81d7f9e8027796
-
Filesize
1.4MB
MD585b698363e74ba3c08fc16297ddc284e
SHA1171cfea4a82a7365b241f16aebdb2aad29f4f7c0
SHA25678efcbb0c6eb6a4c76c036adc65154b8ff028849f79d508e45babfb527cb7cfe
SHA5127e4816c43e0addba088709948e8aedc9e39d6802c74a75cfbc2a0e739b44c5b5eef2bb2453b7032c758b0bdb38e4e7a598aa29be015796361b81d7f9e8027796
-
Filesize
1.4MB
MD585b698363e74ba3c08fc16297ddc284e
SHA1171cfea4a82a7365b241f16aebdb2aad29f4f7c0
SHA25678efcbb0c6eb6a4c76c036adc65154b8ff028849f79d508e45babfb527cb7cfe
SHA5127e4816c43e0addba088709948e8aedc9e39d6802c74a75cfbc2a0e739b44c5b5eef2bb2453b7032c758b0bdb38e4e7a598aa29be015796361b81d7f9e8027796
-
Filesize
5.6MB
MD5bae29e49e8190bfbbf0d77ffab8de59d
SHA14a6352bb47c7e1666a60c76f9b17ca4707872bd9
SHA256f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87
SHA5129e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2
-
Filesize
5.6MB
MD5bae29e49e8190bfbbf0d77ffab8de59d
SHA14a6352bb47c7e1666a60c76f9b17ca4707872bd9
SHA256f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87
SHA5129e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2
-
Filesize
1.4MB
MD522d5269955f256a444bd902847b04a3b
SHA141a83de3273270c3bd5b2bd6528bdc95766aa268
SHA256ab16986253bd187e3134f27495ef0db4b648f769721bc8c84b708c7ba69156fd
SHA512d85ada5d8c2c02932a79241a484b088ba70bda0497fd8ad638300935a16841d7cbc8258be93055907cb533bc534fdd48c7c91109fa22f87e65a6b374cd51055c
-
Filesize
1.4MB
MD522d5269955f256a444bd902847b04a3b
SHA141a83de3273270c3bd5b2bd6528bdc95766aa268
SHA256ab16986253bd187e3134f27495ef0db4b648f769721bc8c84b708c7ba69156fd
SHA512d85ada5d8c2c02932a79241a484b088ba70bda0497fd8ad638300935a16841d7cbc8258be93055907cb533bc534fdd48c7c91109fa22f87e65a6b374cd51055c
-
Filesize
1.4MB
MD522d5269955f256a444bd902847b04a3b
SHA141a83de3273270c3bd5b2bd6528bdc95766aa268
SHA256ab16986253bd187e3134f27495ef0db4b648f769721bc8c84b708c7ba69156fd
SHA512d85ada5d8c2c02932a79241a484b088ba70bda0497fd8ad638300935a16841d7cbc8258be93055907cb533bc534fdd48c7c91109fa22f87e65a6b374cd51055c
-
Filesize
293KB
MD57e0ee1034905c7054593f4635d93949d
SHA1d8762239e7662ac7ff9b410802d2a6d457e49432
SHA2568d59073ef6e74c855f8a3f88945550b372c1e6fd6aeba4c74bda55e232919435
SHA512a65b7e44dd577ac4a75e4d2b7e7f0e768668a58d74ca10632b818bc0845c26741de5fe74e85665aba7d636d1066f32aaa1847d6e1697a77a651ea777fdc51652
-
Filesize
293KB
MD57e0ee1034905c7054593f4635d93949d
SHA1d8762239e7662ac7ff9b410802d2a6d457e49432
SHA2568d59073ef6e74c855f8a3f88945550b372c1e6fd6aeba4c74bda55e232919435
SHA512a65b7e44dd577ac4a75e4d2b7e7f0e768668a58d74ca10632b818bc0845c26741de5fe74e85665aba7d636d1066f32aaa1847d6e1697a77a651ea777fdc51652
-
Filesize
293KB
MD57e0ee1034905c7054593f4635d93949d
SHA1d8762239e7662ac7ff9b410802d2a6d457e49432
SHA2568d59073ef6e74c855f8a3f88945550b372c1e6fd6aeba4c74bda55e232919435
SHA512a65b7e44dd577ac4a75e4d2b7e7f0e768668a58d74ca10632b818bc0845c26741de5fe74e85665aba7d636d1066f32aaa1847d6e1697a77a651ea777fdc51652
-
Filesize
293KB
MD57e0ee1034905c7054593f4635d93949d
SHA1d8762239e7662ac7ff9b410802d2a6d457e49432
SHA2568d59073ef6e74c855f8a3f88945550b372c1e6fd6aeba4c74bda55e232919435
SHA512a65b7e44dd577ac4a75e4d2b7e7f0e768668a58d74ca10632b818bc0845c26741de5fe74e85665aba7d636d1066f32aaa1847d6e1697a77a651ea777fdc51652
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
273B
MD5a5b509a3fb95cc3c8d89cd39fc2a30fb
SHA15aff4266a9c0f2af440f28aa865cebc5ddb9cd5c
SHA2565f3c80056c7b1104c15d6fee49dac07e665c6ffd0795ad486803641ed619c529
SHA5123cc58d989c461a04f29acbfe03ed05f970b3b3e97e6819962fc5c853f55bce7f7aba0544a712e3a45ee52ab31943c898f6b3684d755b590e3e961ae5ecd1edb9