Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 15:33
Static task
static1
Behavioral task
behavioral1
Sample
b23c89dc98fb361f80ae25c1d3e22fc9084f85b5c566ccdfa32c2ca0b5990ff9.exe
Resource
win7-20230831-en
General
-
Target
b23c89dc98fb361f80ae25c1d3e22fc9084f85b5c566ccdfa32c2ca0b5990ff9.exe
-
Size
562KB
-
MD5
c00bb4f6743b66f820229cb1e7f366ea
-
SHA1
e54b697cf11d1478c9647794d1573800faa27109
-
SHA256
b23c89dc98fb361f80ae25c1d3e22fc9084f85b5c566ccdfa32c2ca0b5990ff9
-
SHA512
4b0a469a4a93fee2e0bbc92e0aaedba61be80f49bce71cceeb87c18f101306ae10a45d8ae7c776f430c9d716508e81ae0596000c721b25c4923c323fe8a4e0c0
-
SSDEEP
12288:b8fDjmNbowoN2tXXk6bEBuav0vBgWHfW+Ew+FKcmzaNlfUGv20:b8OdowCKqzwhWvczK+
Malware Config
Signatures
-
Glupteba payload 8 IoCs
resource yara_rule behavioral1/memory/2348-196-0x0000000000400000-0x0000000002663000-memory.dmp family_glupteba behavioral1/memory/1616-195-0x0000000000400000-0x0000000002663000-memory.dmp family_glupteba behavioral1/memory/1616-190-0x0000000004350000-0x0000000004C3B000-memory.dmp family_glupteba behavioral1/memory/1616-290-0x0000000000400000-0x0000000002663000-memory.dmp family_glupteba behavioral1/memory/2348-291-0x0000000000400000-0x0000000002663000-memory.dmp family_glupteba behavioral1/memory/1616-293-0x0000000004350000-0x0000000004C3B000-memory.dmp family_glupteba behavioral1/memory/1352-311-0x0000000000400000-0x0000000002663000-memory.dmp family_glupteba behavioral1/memory/1640-314-0x0000000000400000-0x0000000002663000-memory.dmp family_glupteba -
Suspicious use of NtCreateUserProcessOtherParentProcess 12 IoCs
description pid Process procid_target PID 2928 created 1192 2928 6813vZsynnMU17yOFl9Vef0q.exe 14 PID 2928 created 1192 2928 6813vZsynnMU17yOFl9Vef0q.exe 14 PID 2928 created 1192 2928 6813vZsynnMU17yOFl9Vef0q.exe 14 PID 2928 created 1192 2928 6813vZsynnMU17yOFl9Vef0q.exe 14 PID 2928 created 1192 2928 6813vZsynnMU17yOFl9Vef0q.exe 14 PID 2928 created 1192 2928 6813vZsynnMU17yOFl9Vef0q.exe 14 PID 1284 created 1192 1284 updater.exe 14 PID 1284 created 1192 1284 updater.exe 14 PID 1284 created 1192 1284 updater.exe 14 PID 1284 created 1192 1284 updater.exe 14 PID 1284 created 1192 1284 updater.exe 14 PID 1284 created 1192 1284 updater.exe 14 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" b23c89dc98fb361f80ae25c1d3e22fc9084f85b5c566ccdfa32c2ca0b5990ff9.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths b23c89dc98fb361f80ae25c1d3e22fc9084f85b5c566ccdfa32c2ca0b5990ff9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\b23c89dc98fb361f80ae25c1d3e22fc9084f85b5c566ccdfa32c2ca0b5990ff9.exe = "0" b23c89dc98fb361f80ae25c1d3e22fc9084f85b5c566ccdfa32c2ca0b5990ff9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" eJ3afC1Eh0EVJduDsn91EB8N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" eJ3afC1Eh0EVJduDsn91EB8N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" eJ3afC1Eh0EVJduDsn91EB8N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" eJ3afC1Eh0EVJduDsn91EB8N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" eJ3afC1Eh0EVJduDsn91EB8N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" eJ3afC1Eh0EVJduDsn91EB8N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\eJ3afC1Eh0EVJduDsn91EB8N.exe = "0" eJ3afC1Eh0EVJduDsn91EB8N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\4hRIrqLZFoMxXYMBcJCv5pSI.exe = "0" 4hRIrqLZFoMxXYMBcJCv5pSI.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\hosts 6813vZsynnMU17yOFl9Vef0q.exe File created C:\Windows\System32\drivers\etc\hosts updater.exe -
Modifies Windows Firewall 1 TTPs 2 IoCs
pid Process 2168 netsh.exe 2056 netsh.exe -
Stops running service(s) 3 TTPs
-
Drops startup file 7 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DevK9mf3qO4PRnYHajppgWw7.bat aspnet_regsql.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wiYb2csJf6VnpwqfRPLywSzb.bat aspnet_regsql.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a6sKSe7bIKPwGSd7hrl5d4nR.bat aspnet_regsql.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ddBk8Pi6IS6ckxQe4zNMnfKN.bat aspnet_regsql.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CrKwvRVWjD4P4cs4Toh9BKrL.bat aspnet_regsql.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cgh1H6QOOJIn4ohZSUxYg7AP.bat aspnet_regsql.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\jtp38JKcLpctE56Ybjz1GwA2.bat aspnet_regsql.exe -
Executes dropped EXE 12 IoCs
pid Process 1616 4hRIrqLZFoMxXYMBcJCv5pSI.exe 2348 eJ3afC1Eh0EVJduDsn91EB8N.exe 1792 ZfVpvLwjvq62mhwGRFdUOQ9Z.exe 2928 6813vZsynnMU17yOFl9Vef0q.exe 1388 3xkB64nufIWYdfgVG5wXX9HV.exe 1516 N3H7eyGRV99Y65MN8DvajlA5.exe 1640 4hRIrqLZFoMxXYMBcJCv5pSI.exe 1352 eJ3afC1Eh0EVJduDsn91EB8N.exe 1284 updater.exe 700 csrss.exe 2796 patch.exe 2476 injector.exe -
Loads dropped DLL 20 IoCs
pid Process 2752 aspnet_regsql.exe 2752 aspnet_regsql.exe 2752 aspnet_regsql.exe 2752 aspnet_regsql.exe 2752 aspnet_regsql.exe 2752 aspnet_regsql.exe 2752 aspnet_regsql.exe 2752 aspnet_regsql.exe 1388 3xkB64nufIWYdfgVG5wXX9HV.exe 1388 3xkB64nufIWYdfgVG5wXX9HV.exe 468 Process not Found 1352 eJ3afC1Eh0EVJduDsn91EB8N.exe 1352 eJ3afC1Eh0EVJduDsn91EB8N.exe 840 Process not Found 700 csrss.exe 2796 patch.exe 2796 patch.exe 2796 patch.exe 2796 patch.exe 2796 patch.exe -
resource yara_rule behavioral1/files/0x0006000000015ef9-177.dat upx behavioral1/files/0x0006000000015ef9-186.dat upx behavioral1/memory/1388-194-0x00000000002C0000-0x000000000080D000-memory.dmp upx behavioral1/files/0x0006000000015ef9-193.dat upx behavioral1/memory/2752-181-0x000000000AC60000-0x000000000B1AD000-memory.dmp upx behavioral1/memory/1388-286-0x00000000002C0000-0x000000000080D000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\eJ3afC1Eh0EVJduDsn91EB8N.exe = "0" eJ3afC1Eh0EVJduDsn91EB8N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions b23c89dc98fb361f80ae25c1d3e22fc9084f85b5c566ccdfa32c2ca0b5990ff9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" eJ3afC1Eh0EVJduDsn91EB8N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" eJ3afC1Eh0EVJduDsn91EB8N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" eJ3afC1Eh0EVJduDsn91EB8N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" eJ3afC1Eh0EVJduDsn91EB8N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\4hRIrqLZFoMxXYMBcJCv5pSI.exe = "0" 4hRIrqLZFoMxXYMBcJCv5pSI.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths b23c89dc98fb361f80ae25c1d3e22fc9084f85b5c566ccdfa32c2ca0b5990ff9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\b23c89dc98fb361f80ae25c1d3e22fc9084f85b5c566ccdfa32c2ca0b5990ff9.exe = "0" b23c89dc98fb361f80ae25c1d3e22fc9084f85b5c566ccdfa32c2ca0b5990ff9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" eJ3afC1Eh0EVJduDsn91EB8N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" eJ3afC1Eh0EVJduDsn91EB8N.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" eJ3afC1Eh0EVJduDsn91EB8N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 4hRIrqLZFoMxXYMBcJCv5pSI.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA b23c89dc98fb361f80ae25c1d3e22fc9084f85b5c566ccdfa32c2ca0b5990ff9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" b23c89dc98fb361f80ae25c1d3e22fc9084f85b5c566ccdfa32c2ca0b5990ff9.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1080 set thread context of 2752 1080 b23c89dc98fb361f80ae25c1d3e22fc9084f85b5c566ccdfa32c2ca0b5990ff9.exe 30 PID 1516 set thread context of 2016 1516 N3H7eyGRV99Y65MN8DvajlA5.exe 45 PID 1284 set thread context of 1936 1284 updater.exe 103 PID 1284 set thread context of 1216 1284 updater.exe 104 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 4hRIrqLZFoMxXYMBcJCv5pSI.exe File opened (read-only) \??\VBoxMiniRdrDN eJ3afC1Eh0EVJduDsn91EB8N.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Google\Chrome\updater.exe 6813vZsynnMU17yOFl9Vef0q.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\Logs\CBS\CbsPersist_20231012055228.cab makecab.exe File opened for modification C:\Windows\rss eJ3afC1Eh0EVJduDsn91EB8N.exe File created C:\Windows\rss\csrss.exe eJ3afC1Eh0EVJduDsn91EB8N.exe File opened for modification C:\Windows\rss 4hRIrqLZFoMxXYMBcJCv5pSI.exe File created C:\Windows\rss\csrss.exe 4hRIrqLZFoMxXYMBcJCv5pSI.exe -
Launches sc.exe 10 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1244 sc.exe 2700 sc.exe 888 sc.exe 2696 sc.exe 1596 sc.exe 1780 sc.exe 920 sc.exe 1268 sc.exe 1264 sc.exe 1588 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 988 schtasks.exe 1456 schtasks.exe 2652 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-182 = "Mountain Standard Time (Mexico)" 4hRIrqLZFoMxXYMBcJCv5pSI.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-382 = "South Africa Standard Time" 4hRIrqLZFoMxXYMBcJCv5pSI.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-232 = "Hawaiian Standard Time" 4hRIrqLZFoMxXYMBcJCv5pSI.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-434 = "Georgian Daylight Time" 4hRIrqLZFoMxXYMBcJCv5pSI.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\dhcpqec.dll,-101 = "Provides DHCP based enforcement for NAP" netsh.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\NetTrace netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-831 = "SA Eastern Daylight Time" 4hRIrqLZFoMxXYMBcJCv5pSI.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-541 = "Myanmar Daylight Time" 4hRIrqLZFoMxXYMBcJCv5pSI.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-561 = "SE Asia Daylight Time" 4hRIrqLZFoMxXYMBcJCv5pSI.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-172 = "Central Standard Time (Mexico)" 4hRIrqLZFoMxXYMBcJCv5pSI.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-241 = "Samoa Daylight Time" 4hRIrqLZFoMxXYMBcJCv5pSI.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-932 = "Coordinated Universal Time" 4hRIrqLZFoMxXYMBcJCv5pSI.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\eapqec.dll,-102 = "1.0" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-334 = "Jordan Daylight Time" 4hRIrqLZFoMxXYMBcJCv5pSI.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" 4hRIrqLZFoMxXYMBcJCv5pSI.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-582 = "North Asia East Standard Time" 4hRIrqLZFoMxXYMBcJCv5pSI.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-332 = "E. Europe Standard Time" 4hRIrqLZFoMxXYMBcJCv5pSI.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-365 = "Middle East Standard Time" 4hRIrqLZFoMxXYMBcJCv5pSI.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-462 = "Afghanistan Standard Time" 4hRIrqLZFoMxXYMBcJCv5pSI.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-891 = "Morocco Daylight Time" 4hRIrqLZFoMxXYMBcJCv5pSI.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-191 = "Mountain Daylight Time" 4hRIrqLZFoMxXYMBcJCv5pSI.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-342 = "Egypt Standard Time" 4hRIrqLZFoMxXYMBcJCv5pSI.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-31 = "Mid-Atlantic Daylight Time" 4hRIrqLZFoMxXYMBcJCv5pSI.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-21 = "Cape Verde Daylight Time" 4hRIrqLZFoMxXYMBcJCv5pSI.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-51 = "Greenland Daylight Time" 4hRIrqLZFoMxXYMBcJCv5pSI.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-271 = "Greenwich Daylight Time" 4hRIrqLZFoMxXYMBcJCv5pSI.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-104 = "Central Brazilian Daylight Time" 4hRIrqLZFoMxXYMBcJCv5pSI.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-261 = "GMT Daylight Time" 4hRIrqLZFoMxXYMBcJCv5pSI.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-742 = "New Zealand Standard Time" 4hRIrqLZFoMxXYMBcJCv5pSI.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-212 = "Pacific Standard Time" 4hRIrqLZFoMxXYMBcJCv5pSI.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-32 = "Mid-Atlantic Standard Time" 4hRIrqLZFoMxXYMBcJCv5pSI.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-771 = "Montevideo Daylight Time" 4hRIrqLZFoMxXYMBcJCv5pSI.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-222 = "Alaskan Standard Time" 4hRIrqLZFoMxXYMBcJCv5pSI.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-391 = "Arab Daylight Time" 4hRIrqLZFoMxXYMBcJCv5pSI.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-411 = "E. Africa Daylight Time" 4hRIrqLZFoMxXYMBcJCv5pSI.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\dhcpqec.dll,-102 = "Microsoft Corporation" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-772 = "Montevideo Standard Time" 4hRIrqLZFoMxXYMBcJCv5pSI.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-2 = "Provides IPsec based enforcement for Network Access Protection" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-461 = "Afghanistan Daylight Time" 4hRIrqLZFoMxXYMBcJCv5pSI.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-402 = "Arabic Standard Time" 4hRIrqLZFoMxXYMBcJCv5pSI.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-661 = "Cen. Australia Daylight Time" 4hRIrqLZFoMxXYMBcJCv5pSI.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\eapqec.dll,-100 = "EAP Quarantine Enforcement Client" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-11 = "Azores Daylight Time" 4hRIrqLZFoMxXYMBcJCv5pSI.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-581 = "North Asia East Daylight Time" 4hRIrqLZFoMxXYMBcJCv5pSI.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-201 = "US Mountain Daylight Time" 4hRIrqLZFoMxXYMBcJCv5pSI.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-22 = "Cape Verde Standard Time" 4hRIrqLZFoMxXYMBcJCv5pSI.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-352 = "FLE Standard Time" 4hRIrqLZFoMxXYMBcJCv5pSI.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-372 = "Jerusalem Standard Time" 4hRIrqLZFoMxXYMBcJCv5pSI.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-385 = "Namibia Standard Time" 4hRIrqLZFoMxXYMBcJCv5pSI.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-792 = "SA Western Standard Time" 4hRIrqLZFoMxXYMBcJCv5pSI.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-1022 = "Bangladesh Standard Time" 4hRIrqLZFoMxXYMBcJCv5pSI.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-722 = "Central Pacific Standard Time" 4hRIrqLZFoMxXYMBcJCv5pSI.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-412 = "E. Africa Standard Time" 4hRIrqLZFoMxXYMBcJCv5pSI.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\dhcpqec.dll,-100 = "DHCP Quarantine Enforcement Client" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-384 = "Namibia Daylight Time" 4hRIrqLZFoMxXYMBcJCv5pSI.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\tsgqec.dll,-101 = "Provides RD Gateway enforcement for NAP" netsh.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\NetTrace\Session netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-671 = "AUS Eastern Daylight Time" 4hRIrqLZFoMxXYMBcJCv5pSI.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-511 = "Central Asia Daylight Time" 4hRIrqLZFoMxXYMBcJCv5pSI.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-502 = "Nepal Standard Time" 4hRIrqLZFoMxXYMBcJCv5pSI.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-592 = "Malay Peninsula Standard Time" 4hRIrqLZFoMxXYMBcJCv5pSI.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-448 = "Azerbaijan Daylight Time" 4hRIrqLZFoMxXYMBcJCv5pSI.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-1021 = "Bangladesh Daylight Time" 4hRIrqLZFoMxXYMBcJCv5pSI.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 patch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 patch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4 csrss.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 patch.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1332 powershell.exe 2928 6813vZsynnMU17yOFl9Vef0q.exe 2928 6813vZsynnMU17yOFl9Vef0q.exe 1616 4hRIrqLZFoMxXYMBcJCv5pSI.exe 2348 eJ3afC1Eh0EVJduDsn91EB8N.exe 2928 6813vZsynnMU17yOFl9Vef0q.exe 2928 6813vZsynnMU17yOFl9Vef0q.exe 2928 6813vZsynnMU17yOFl9Vef0q.exe 2928 6813vZsynnMU17yOFl9Vef0q.exe 2928 6813vZsynnMU17yOFl9Vef0q.exe 2928 6813vZsynnMU17yOFl9Vef0q.exe 2928 6813vZsynnMU17yOFl9Vef0q.exe 2928 6813vZsynnMU17yOFl9Vef0q.exe 1640 4hRIrqLZFoMxXYMBcJCv5pSI.exe 1640 4hRIrqLZFoMxXYMBcJCv5pSI.exe 1640 4hRIrqLZFoMxXYMBcJCv5pSI.exe 1640 4hRIrqLZFoMxXYMBcJCv5pSI.exe 1640 4hRIrqLZFoMxXYMBcJCv5pSI.exe 1352 eJ3afC1Eh0EVJduDsn91EB8N.exe 1352 eJ3afC1Eh0EVJduDsn91EB8N.exe 1352 eJ3afC1Eh0EVJduDsn91EB8N.exe 1352 eJ3afC1Eh0EVJduDsn91EB8N.exe 1352 eJ3afC1Eh0EVJduDsn91EB8N.exe 2928 6813vZsynnMU17yOFl9Vef0q.exe 2928 6813vZsynnMU17yOFl9Vef0q.exe 2016 RegSvcs.exe 2016 RegSvcs.exe 2476 injector.exe 2476 injector.exe 2016 RegSvcs.exe 2016 RegSvcs.exe 2476 injector.exe 2476 injector.exe 2476 injector.exe 2016 RegSvcs.exe 2016 RegSvcs.exe 2476 injector.exe 2476 injector.exe 2016 RegSvcs.exe 2016 RegSvcs.exe 1284 updater.exe 1284 updater.exe 2476 injector.exe 2476 injector.exe 2476 injector.exe 2476 injector.exe 2476 injector.exe 2476 injector.exe 2016 RegSvcs.exe 2016 RegSvcs.exe 2016 RegSvcs.exe 2016 RegSvcs.exe 2476 injector.exe 2476 injector.exe 2016 RegSvcs.exe 2016 RegSvcs.exe 2476 injector.exe 2016 RegSvcs.exe 2016 RegSvcs.exe 2016 RegSvcs.exe 2016 RegSvcs.exe 2016 RegSvcs.exe 2016 RegSvcs.exe 2476 injector.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 468 Process not Found -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: SeDebugPrivilege 2752 aspnet_regsql.exe Token: SeDebugPrivilege 1332 powershell.exe Token: SeDebugPrivilege 1516 N3H7eyGRV99Y65MN8DvajlA5.exe Token: SeDebugPrivilege 1792 ZfVpvLwjvq62mhwGRFdUOQ9Z.exe Token: SeDebugPrivilege 1616 4hRIrqLZFoMxXYMBcJCv5pSI.exe Token: SeImpersonatePrivilege 1616 4hRIrqLZFoMxXYMBcJCv5pSI.exe Token: SeDebugPrivilege 2348 eJ3afC1Eh0EVJduDsn91EB8N.exe Token: SeImpersonatePrivilege 2348 eJ3afC1Eh0EVJduDsn91EB8N.exe Token: SeShutdownPrivilege 1524 powercfg.exe Token: SeShutdownPrivilege 1624 powercfg.exe Token: SeShutdownPrivilege 2144 powercfg.exe Token: SeShutdownPrivilege 1688 powercfg.exe Token: SeSystemEnvironmentPrivilege 700 csrss.exe Token: SeDebugPrivilege 2708 powershell.exe Token: SeShutdownPrivilege 3028 powercfg.exe Token: SeShutdownPrivilege 2144 powercfg.exe Token: SeShutdownPrivilege 1572 powercfg.exe Token: SeShutdownPrivilege 1944 powercfg.exe Token: SeDebugPrivilege 1284 updater.exe Token: SeLockMemoryPrivilege 1216 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1080 wrote to memory of 1332 1080 b23c89dc98fb361f80ae25c1d3e22fc9084f85b5c566ccdfa32c2ca0b5990ff9.exe 28 PID 1080 wrote to memory of 1332 1080 b23c89dc98fb361f80ae25c1d3e22fc9084f85b5c566ccdfa32c2ca0b5990ff9.exe 28 PID 1080 wrote to memory of 1332 1080 b23c89dc98fb361f80ae25c1d3e22fc9084f85b5c566ccdfa32c2ca0b5990ff9.exe 28 PID 1080 wrote to memory of 1332 1080 b23c89dc98fb361f80ae25c1d3e22fc9084f85b5c566ccdfa32c2ca0b5990ff9.exe 28 PID 1080 wrote to memory of 2752 1080 b23c89dc98fb361f80ae25c1d3e22fc9084f85b5c566ccdfa32c2ca0b5990ff9.exe 30 PID 1080 wrote to memory of 2752 1080 b23c89dc98fb361f80ae25c1d3e22fc9084f85b5c566ccdfa32c2ca0b5990ff9.exe 30 PID 1080 wrote to memory of 2752 1080 b23c89dc98fb361f80ae25c1d3e22fc9084f85b5c566ccdfa32c2ca0b5990ff9.exe 30 PID 1080 wrote to memory of 2752 1080 b23c89dc98fb361f80ae25c1d3e22fc9084f85b5c566ccdfa32c2ca0b5990ff9.exe 30 PID 1080 wrote to memory of 2752 1080 b23c89dc98fb361f80ae25c1d3e22fc9084f85b5c566ccdfa32c2ca0b5990ff9.exe 30 PID 1080 wrote to memory of 2752 1080 b23c89dc98fb361f80ae25c1d3e22fc9084f85b5c566ccdfa32c2ca0b5990ff9.exe 30 PID 1080 wrote to memory of 2752 1080 b23c89dc98fb361f80ae25c1d3e22fc9084f85b5c566ccdfa32c2ca0b5990ff9.exe 30 PID 1080 wrote to memory of 2752 1080 b23c89dc98fb361f80ae25c1d3e22fc9084f85b5c566ccdfa32c2ca0b5990ff9.exe 30 PID 1080 wrote to memory of 2752 1080 b23c89dc98fb361f80ae25c1d3e22fc9084f85b5c566ccdfa32c2ca0b5990ff9.exe 30 PID 2752 wrote to memory of 1616 2752 aspnet_regsql.exe 31 PID 2752 wrote to memory of 1616 2752 aspnet_regsql.exe 31 PID 2752 wrote to memory of 1616 2752 aspnet_regsql.exe 31 PID 2752 wrote to memory of 1616 2752 aspnet_regsql.exe 31 PID 2752 wrote to memory of 2348 2752 aspnet_regsql.exe 32 PID 2752 wrote to memory of 2348 2752 aspnet_regsql.exe 32 PID 2752 wrote to memory of 2348 2752 aspnet_regsql.exe 32 PID 2752 wrote to memory of 2348 2752 aspnet_regsql.exe 32 PID 2752 wrote to memory of 1792 2752 aspnet_regsql.exe 33 PID 2752 wrote to memory of 1792 2752 aspnet_regsql.exe 33 PID 2752 wrote to memory of 1792 2752 aspnet_regsql.exe 33 PID 2752 wrote to memory of 1792 2752 aspnet_regsql.exe 33 PID 2752 wrote to memory of 1388 2752 aspnet_regsql.exe 34 PID 2752 wrote to memory of 1388 2752 aspnet_regsql.exe 34 PID 2752 wrote to memory of 1388 2752 aspnet_regsql.exe 34 PID 2752 wrote to memory of 1388 2752 aspnet_regsql.exe 34 PID 2752 wrote to memory of 1388 2752 aspnet_regsql.exe 34 PID 2752 wrote to memory of 1388 2752 aspnet_regsql.exe 34 PID 2752 wrote to memory of 1388 2752 aspnet_regsql.exe 34 PID 2752 wrote to memory of 2928 2752 aspnet_regsql.exe 36 PID 2752 wrote to memory of 2928 2752 aspnet_regsql.exe 36 PID 2752 wrote to memory of 2928 2752 aspnet_regsql.exe 36 PID 2752 wrote to memory of 2928 2752 aspnet_regsql.exe 36 PID 2752 wrote to memory of 1516 2752 aspnet_regsql.exe 35 PID 2752 wrote to memory of 1516 2752 aspnet_regsql.exe 35 PID 2752 wrote to memory of 1516 2752 aspnet_regsql.exe 35 PID 2752 wrote to memory of 1516 2752 aspnet_regsql.exe 35 PID 1516 wrote to memory of 2016 1516 N3H7eyGRV99Y65MN8DvajlA5.exe 45 PID 1516 wrote to memory of 2016 1516 N3H7eyGRV99Y65MN8DvajlA5.exe 45 PID 1516 wrote to memory of 2016 1516 N3H7eyGRV99Y65MN8DvajlA5.exe 45 PID 1516 wrote to memory of 2016 1516 N3H7eyGRV99Y65MN8DvajlA5.exe 45 PID 1516 wrote to memory of 2016 1516 N3H7eyGRV99Y65MN8DvajlA5.exe 45 PID 1516 wrote to memory of 2016 1516 N3H7eyGRV99Y65MN8DvajlA5.exe 45 PID 1516 wrote to memory of 2016 1516 N3H7eyGRV99Y65MN8DvajlA5.exe 45 PID 1516 wrote to memory of 2016 1516 N3H7eyGRV99Y65MN8DvajlA5.exe 45 PID 1516 wrote to memory of 2016 1516 N3H7eyGRV99Y65MN8DvajlA5.exe 45 PID 1516 wrote to memory of 2016 1516 N3H7eyGRV99Y65MN8DvajlA5.exe 45 PID 1516 wrote to memory of 2016 1516 N3H7eyGRV99Y65MN8DvajlA5.exe 45 PID 1516 wrote to memory of 2016 1516 N3H7eyGRV99Y65MN8DvajlA5.exe 45 PID 1516 wrote to memory of 2016 1516 N3H7eyGRV99Y65MN8DvajlA5.exe 45 PID 592 wrote to memory of 1244 592 cmd.exe 50 PID 592 wrote to memory of 1244 592 cmd.exe 50 PID 592 wrote to memory of 1244 592 cmd.exe 50 PID 592 wrote to memory of 2700 592 cmd.exe 51 PID 592 wrote to memory of 2700 592 cmd.exe 51 PID 592 wrote to memory of 2700 592 cmd.exe 51 PID 592 wrote to memory of 888 592 cmd.exe 52 PID 592 wrote to memory of 888 592 cmd.exe 52 PID 592 wrote to memory of 888 592 cmd.exe 52 PID 592 wrote to memory of 2696 592 cmd.exe 53 PID 592 wrote to memory of 2696 592 cmd.exe 53 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" b23c89dc98fb361f80ae25c1d3e22fc9084f85b5c566ccdfa32c2ca0b5990ff9.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\b23c89dc98fb361f80ae25c1d3e22fc9084f85b5c566ccdfa32c2ca0b5990ff9.exe"C:\Users\Admin\AppData\Local\Temp\b23c89dc98fb361f80ae25c1d3e22fc9084f85b5c566ccdfa32c2ca0b5990ff9.exe"2⤵
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1080 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\b23c89dc98fb361f80ae25c1d3e22fc9084f85b5c566ccdfa32c2ca0b5990ff9.exe" -Force3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1332
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regsql.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regsql.exe"3⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\Pictures\4hRIrqLZFoMxXYMBcJCv5pSI.exe"C:\Users\Admin\Pictures\4hRIrqLZFoMxXYMBcJCv5pSI.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1616 -
C:\Users\Admin\Pictures\4hRIrqLZFoMxXYMBcJCv5pSI.exe"C:\Users\Admin\Pictures\4hRIrqLZFoMxXYMBcJCv5pSI.exe"5⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:1640 -
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"6⤵PID:3064
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes7⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:2168
-
-
-
-
-
C:\Users\Admin\Pictures\eJ3afC1Eh0EVJduDsn91EB8N.exe"C:\Users\Admin\Pictures\eJ3afC1Eh0EVJduDsn91EB8N.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2348 -
C:\Users\Admin\Pictures\eJ3afC1Eh0EVJduDsn91EB8N.exe"C:\Users\Admin\Pictures\eJ3afC1Eh0EVJduDsn91EB8N.exe"5⤵
- Windows security bypass
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1352 -
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"6⤵PID:1868
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes7⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:2056
-
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:700 -
C:\Windows\system32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F7⤵
- Creates scheduled task(s)
PID:2652
-
-
C:\Windows\system32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f7⤵PID:2512
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
PID:2796
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2476
-
-
-
-
-
C:\Users\Admin\Pictures\ZfVpvLwjvq62mhwGRFdUOQ9Z.exe"C:\Users\Admin\Pictures\ZfVpvLwjvq62mhwGRFdUOQ9Z.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1792
-
-
C:\Users\Admin\Pictures\3xkB64nufIWYdfgVG5wXX9HV.exe"C:\Users\Admin\Pictures\3xkB64nufIWYdfgVG5wXX9HV.exe" --silent --allusers=04⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1388
-
-
C:\Users\Admin\Pictures\N3H7eyGRV99Y65MN8DvajlA5.exe"C:\Users\Admin\Pictures\N3H7eyGRV99Y65MN8DvajlA5.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2016
-
-
-
C:\Users\Admin\Pictures\6813vZsynnMU17yOFl9Vef0q.exe"C:\Users\Admin\Pictures\6813vZsynnMU17yOFl9Vef0q.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:2928
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵PID:1936
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:1244
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:2700
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:888
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:2696
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:1268
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:1216
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1524
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1624
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2144
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1688
-
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /delete /f /tn "GoogleUpdateTaskMachineQC"2⤵PID:2296
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /create /f /ru "System" /tn "GoogleUpdateTaskMachineQC" /xml "C:\Users\Admin\AppData\Local\Temp\iacrcjwhmdyc.xml"2⤵
- Creates scheduled task(s)
PID:1456
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:2404
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2708
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:1620
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:1596
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:1780
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:920
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:1264
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:1588
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:1684
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:3028
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2144
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1572
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1944
-
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /create /f /ru "System" /tn "GoogleUpdateTaskMachineQC" /xml "C:\Windows\TEMP\iacrcjwhmdyc.xml"2⤵
- Creates scheduled task(s)
PID:988
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:1936
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1216
-
-
C:\Windows\system32\makecab.exe"C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20231012055228.log C:\Windows\Logs\CBS\CbsPersist_20231012055228.cab1⤵
- Drops file in Windows directory
PID:2504
-
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1284
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.2MB
MD5df280925e135481b26e921dd1221e359
SHA1877737c142fdcc03c33e20d4f17c48a741373c9e
SHA256710a3e1beda67e1c543ba04423bfb0ba643815582310c0b3d03d03e071c894b8
SHA5123da682a655a9df0ad0fcc6f28953f104383f3abe695afdd7a236d9ea0f05ef4de210da7c46139f3ce01e3e7dde9abf02b3665d1289e20426ba9164468807f487
-
Filesize
5.2MB
MD5df280925e135481b26e921dd1221e359
SHA1877737c142fdcc03c33e20d4f17c48a741373c9e
SHA256710a3e1beda67e1c543ba04423bfb0ba643815582310c0b3d03d03e071c894b8
SHA5123da682a655a9df0ad0fcc6f28953f104383f3abe695afdd7a236d9ea0f05ef4de210da7c46139f3ce01e3e7dde9abf02b3665d1289e20426ba9164468807f487
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52615629b33a107d9fc3d020d795fca12
SHA177be7388eb9c594704c88443f1ea2de7d2a71eed
SHA25678d095ab8e008e0d375531ce9d205bfabc80a9de8ac55e657583259504cab998
SHA512fc4e83c26738ec497008fe572bc95a906da6e0da189886b80b3590fa2c5c5233dc57c02b010a50797dde18d02ef1bdc798b35092dfe77665ee6c84ae51b2d9ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd077fc076970777da7cee32f3363aa4
SHA138a6816735da3c4307af903938ae62cac0cc8f25
SHA256a745de6a7b6d49d9c8d2c638f5b5bfcc851d1b978d8ca7eb4ee1adf99f933e9e
SHA512c9edc5d8ee36ba632967db7baca506d6002014f6f863c0242578c33367ae7fd9bac4880c8878ec8179d0a1f4ebdbc3be50a94ac8a7ee1fe06afc5e941ac2583c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d25966e693b9034b6e115aaef266022a
SHA139fcec310e18b781c5710a8c52d8267be7f83f4f
SHA256303e02c82a72266f2c3937d7389fb037cab75c51a896a25e5cbc46ed5b133e98
SHA512ee2146180b97ac286cda5e92339c647491b3606bd192188eac7d3cc5c44d357f72a7d3593d9f63381c30c9a83051fb39f46f972fe2fbf4ed72d35b7c3a6e04f3
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
1.7MB
MD513aaafe14eb60d6a718230e82c671d57
SHA1e039dd924d12f264521b8e689426fb7ca95a0a7b
SHA256f44a7deb678ae7bbaaadf88e4c620d7cdf7e6831a1656c456545b1c06feb4ef3
SHA512ade02218c0fd1ef9290c3113cf993dd89e87d4fb66fa1b34afdc73c84876123cd742d2a36d8daa95e2a573d2aa7e880f3c8ba0c5c91916ed15e7c4f6ff847de3
-
Filesize
1KB
MD5546d67a48ff2bf7682cea9fac07b942e
SHA1a2cb3a9a97fd935b5e62d4c29b3e2c5ab7d5fc90
SHA256eff7edc19e6c430aaeca7ea8a77251c74d1e9abb79b183a9ee1f58c2934b4b6a
SHA51210d90edf31c0955bcec52219d854952fd38768bd97e8e50d32a1237bccaf1a5eb9f824da0f81a7812e0ce62c0464168dd0201d1c0eb61b9fe253fe7c89de05fe
-
Filesize
5.3MB
MD51afff8d5352aecef2ecd47ffa02d7f7d
SHA18b115b84efdb3a1b87f750d35822b2609e665bef
SHA256c41acc53cde89b94d55d6932ddd55a212ba910e1fade3da138670bb5b18ae4e1
SHA512e5dc54c60be702e11772dc729eec5ec7140f293545aa3d57282adacddf686483393b0c940bbd397a9d50a6cda093865b143ae00c51ce3bf5d6b00241f97b3cdb
-
Filesize
2.8MB
MD5be7554f945ca77a78bd9d365f1b049a7
SHA1aa86da6182211f6bd1fbba33b4008ccec5ce220f
SHA2565500f119b3d15cc11c41f4ce0b2337e84a94cccd85222229a4cfcfc45a11decb
SHA5128fbe8a1a3b787a0346addff5493d0fa8efecca8a8c70a49dc9801f015c9f54c5fb84bc8dba89edd98214f52eb09293c45941f6a15843f7aa2eae6a8cd79b9672
-
Filesize
2.8MB
MD5be7554f945ca77a78bd9d365f1b049a7
SHA1aa86da6182211f6bd1fbba33b4008ccec5ce220f
SHA2565500f119b3d15cc11c41f4ce0b2337e84a94cccd85222229a4cfcfc45a11decb
SHA5128fbe8a1a3b787a0346addff5493d0fa8efecca8a8c70a49dc9801f015c9f54c5fb84bc8dba89edd98214f52eb09293c45941f6a15843f7aa2eae6a8cd79b9672
-
Filesize
4.1MB
MD5117a6639c7dea1aa489f6e678f077c10
SHA1b9e4788889f043806e9eb355ccda274de7af7aa7
SHA256b1696a5dfe3e9a4877a61f9a8cd16b37ce4ae6c6fdb30c467c865ecba5700fe2
SHA512d7ecc0a7f47202fd2dbc6768eb1732fbe52a3b6cd69ac947da2a22acdf809e57daa69cf05519ab5025330fe1335a2279a93f6979e1eed199ea998709735597fc
-
Filesize
4.1MB
MD5117a6639c7dea1aa489f6e678f077c10
SHA1b9e4788889f043806e9eb355ccda274de7af7aa7
SHA256b1696a5dfe3e9a4877a61f9a8cd16b37ce4ae6c6fdb30c467c865ecba5700fe2
SHA512d7ecc0a7f47202fd2dbc6768eb1732fbe52a3b6cd69ac947da2a22acdf809e57daa69cf05519ab5025330fe1335a2279a93f6979e1eed199ea998709735597fc
-
Filesize
4.1MB
MD5117a6639c7dea1aa489f6e678f077c10
SHA1b9e4788889f043806e9eb355ccda274de7af7aa7
SHA256b1696a5dfe3e9a4877a61f9a8cd16b37ce4ae6c6fdb30c467c865ecba5700fe2
SHA512d7ecc0a7f47202fd2dbc6768eb1732fbe52a3b6cd69ac947da2a22acdf809e57daa69cf05519ab5025330fe1335a2279a93f6979e1eed199ea998709735597fc
-
Filesize
4.1MB
MD5117a6639c7dea1aa489f6e678f077c10
SHA1b9e4788889f043806e9eb355ccda274de7af7aa7
SHA256b1696a5dfe3e9a4877a61f9a8cd16b37ce4ae6c6fdb30c467c865ecba5700fe2
SHA512d7ecc0a7f47202fd2dbc6768eb1732fbe52a3b6cd69ac947da2a22acdf809e57daa69cf05519ab5025330fe1335a2279a93f6979e1eed199ea998709735597fc
-
Filesize
5.2MB
MD5df280925e135481b26e921dd1221e359
SHA1877737c142fdcc03c33e20d4f17c48a741373c9e
SHA256710a3e1beda67e1c543ba04423bfb0ba643815582310c0b3d03d03e071c894b8
SHA5123da682a655a9df0ad0fcc6f28953f104383f3abe695afdd7a236d9ea0f05ef4de210da7c46139f3ce01e3e7dde9abf02b3665d1289e20426ba9164468807f487
-
Filesize
5.2MB
MD5df280925e135481b26e921dd1221e359
SHA1877737c142fdcc03c33e20d4f17c48a741373c9e
SHA256710a3e1beda67e1c543ba04423bfb0ba643815582310c0b3d03d03e071c894b8
SHA5123da682a655a9df0ad0fcc6f28953f104383f3abe695afdd7a236d9ea0f05ef4de210da7c46139f3ce01e3e7dde9abf02b3665d1289e20426ba9164468807f487
-
Filesize
4.9MB
MD5f7f4c10dd56dd175ed57b936d3ae87d1
SHA1df2c485537f84ab875071c431a21f2cdf477605c
SHA256a39eba51e56a3038058473c7d625e3331961938985451ff4120a518a80fa09ce
SHA5127dc0909929e4cac8daeb0e36fb481a43a36004c36bc26565f2a442e26edb1c3bc9882e370be1ed16f715df77541879e4a444aa7ef53d80fb284745e89eeb7171
-
Filesize
4.9MB
MD5f7f4c10dd56dd175ed57b936d3ae87d1
SHA1df2c485537f84ab875071c431a21f2cdf477605c
SHA256a39eba51e56a3038058473c7d625e3331961938985451ff4120a518a80fa09ce
SHA5127dc0909929e4cac8daeb0e36fb481a43a36004c36bc26565f2a442e26edb1c3bc9882e370be1ed16f715df77541879e4a444aa7ef53d80fb284745e89eeb7171
-
Filesize
4.9MB
MD5f7f4c10dd56dd175ed57b936d3ae87d1
SHA1df2c485537f84ab875071c431a21f2cdf477605c
SHA256a39eba51e56a3038058473c7d625e3331961938985451ff4120a518a80fa09ce
SHA5127dc0909929e4cac8daeb0e36fb481a43a36004c36bc26565f2a442e26edb1c3bc9882e370be1ed16f715df77541879e4a444aa7ef53d80fb284745e89eeb7171
-
Filesize
3.1MB
MD5823b5fcdef282c5318b670008b9e6922
SHA1d20cd5321d8a3d423af4c6dabc0ac905796bdc6d
SHA256712f5bb403ca4ade2d3fa47b050aac51a9f573142fd8ba8bf18f5f8144214d8d
SHA5124377d06a71291be3e52c28a2ada0b89ff185a8887c4a75972cdc5e85d95da6538d1776bc49fb190c67b8e6497225f1d63b86793f4095c8fb990a5f6659216472
-
Filesize
3.1MB
MD5823b5fcdef282c5318b670008b9e6922
SHA1d20cd5321d8a3d423af4c6dabc0ac905796bdc6d
SHA256712f5bb403ca4ade2d3fa47b050aac51a9f573142fd8ba8bf18f5f8144214d8d
SHA5124377d06a71291be3e52c28a2ada0b89ff185a8887c4a75972cdc5e85d95da6538d1776bc49fb190c67b8e6497225f1d63b86793f4095c8fb990a5f6659216472
-
Filesize
3.1MB
MD5823b5fcdef282c5318b670008b9e6922
SHA1d20cd5321d8a3d423af4c6dabc0ac905796bdc6d
SHA256712f5bb403ca4ade2d3fa47b050aac51a9f573142fd8ba8bf18f5f8144214d8d
SHA5124377d06a71291be3e52c28a2ada0b89ff185a8887c4a75972cdc5e85d95da6538d1776bc49fb190c67b8e6497225f1d63b86793f4095c8fb990a5f6659216472
-
Filesize
4.1MB
MD59846ad11236ad0694dcf5c43a19883fa
SHA128819763c055060734c86518234067ca19fe3817
SHA2569518db3b907b1b238384091f597c801c4c8b23df86c0f67dae5c4b9ac9834285
SHA512a0c13d483e19573383c170c3a27715dc3b6e7ba222cd8ef9356bf129454c68e4f97fb9ba9f3ba49d5c26b957c7b176f7aead79e69e3b93a476e2f62ba6f80884
-
Filesize
4.1MB
MD59846ad11236ad0694dcf5c43a19883fa
SHA128819763c055060734c86518234067ca19fe3817
SHA2569518db3b907b1b238384091f597c801c4c8b23df86c0f67dae5c4b9ac9834285
SHA512a0c13d483e19573383c170c3a27715dc3b6e7ba222cd8ef9356bf129454c68e4f97fb9ba9f3ba49d5c26b957c7b176f7aead79e69e3b93a476e2f62ba6f80884
-
Filesize
4.1MB
MD59846ad11236ad0694dcf5c43a19883fa
SHA128819763c055060734c86518234067ca19fe3817
SHA2569518db3b907b1b238384091f597c801c4c8b23df86c0f67dae5c4b9ac9834285
SHA512a0c13d483e19573383c170c3a27715dc3b6e7ba222cd8ef9356bf129454c68e4f97fb9ba9f3ba49d5c26b957c7b176f7aead79e69e3b93a476e2f62ba6f80884
-
Filesize
4.1MB
MD59846ad11236ad0694dcf5c43a19883fa
SHA128819763c055060734c86518234067ca19fe3817
SHA2569518db3b907b1b238384091f597c801c4c8b23df86c0f67dae5c4b9ac9834285
SHA512a0c13d483e19573383c170c3a27715dc3b6e7ba222cd8ef9356bf129454c68e4f97fb9ba9f3ba49d5c26b957c7b176f7aead79e69e3b93a476e2f62ba6f80884
-
Filesize
2KB
MD53e9af076957c5b2f9c9ce5ec994bea05
SHA1a8c7326f6bceffaeed1c2bb8d7165e56497965fe
SHA256e332ebfed27e0bb08b84dfda05acc7f0fa1b6281678e0120c5b7c893a75df47e
SHA512933ba0d69e7b78537348c0dc1bf83fb069f98bb93d31c638dc79c4a48d12d879c474bd61e3cbde44622baef5e20fb92ebf16c66128672e4a6d4ee20afbf9d01f
-
Filesize
1KB
MD5546d67a48ff2bf7682cea9fac07b942e
SHA1a2cb3a9a97fd935b5e62d4c29b3e2c5ab7d5fc90
SHA256eff7edc19e6c430aaeca7ea8a77251c74d1e9abb79b183a9ee1f58c2934b4b6a
SHA51210d90edf31c0955bcec52219d854952fd38768bd97e8e50d32a1237bccaf1a5eb9f824da0f81a7812e0ce62c0464168dd0201d1c0eb61b9fe253fe7c89de05fe
-
Filesize
4.1MB
MD59846ad11236ad0694dcf5c43a19883fa
SHA128819763c055060734c86518234067ca19fe3817
SHA2569518db3b907b1b238384091f597c801c4c8b23df86c0f67dae5c4b9ac9834285
SHA512a0c13d483e19573383c170c3a27715dc3b6e7ba222cd8ef9356bf129454c68e4f97fb9ba9f3ba49d5c26b957c7b176f7aead79e69e3b93a476e2f62ba6f80884
-
Filesize
4.1MB
MD59846ad11236ad0694dcf5c43a19883fa
SHA128819763c055060734c86518234067ca19fe3817
SHA2569518db3b907b1b238384091f597c801c4c8b23df86c0f67dae5c4b9ac9834285
SHA512a0c13d483e19573383c170c3a27715dc3b6e7ba222cd8ef9356bf129454c68e4f97fb9ba9f3ba49d5c26b957c7b176f7aead79e69e3b93a476e2f62ba6f80884
-
Filesize
5.2MB
MD5df280925e135481b26e921dd1221e359
SHA1877737c142fdcc03c33e20d4f17c48a741373c9e
SHA256710a3e1beda67e1c543ba04423bfb0ba643815582310c0b3d03d03e071c894b8
SHA5123da682a655a9df0ad0fcc6f28953f104383f3abe695afdd7a236d9ea0f05ef4de210da7c46139f3ce01e3e7dde9abf02b3665d1289e20426ba9164468807f487
-
Filesize
4.7MB
MD59e0d1f5e1b19e6f5c5041e6228185374
SHA15abc65f947c88a51949707cf3dd44826d3877f4e
SHA2562f7174e4db37dc516fd222c3331a266cb75dca9c3914bdc93b6000d119e566b6
SHA512a17185c7460e2e15858581a86d6ec35acbf48a20d680eafd2bc0ac809e58fa3645e1d29ee8d936d89bcab67bfe86889a59f69a26c90a0ca68e13df70713afcd4
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
1.7MB
MD513aaafe14eb60d6a718230e82c671d57
SHA1e039dd924d12f264521b8e689426fb7ca95a0a7b
SHA256f44a7deb678ae7bbaaadf88e4c620d7cdf7e6831a1656c456545b1c06feb4ef3
SHA512ade02218c0fd1ef9290c3113cf993dd89e87d4fb66fa1b34afdc73c84876123cd742d2a36d8daa95e2a573d2aa7e880f3c8ba0c5c91916ed15e7c4f6ff847de3
-
Filesize
1.5MB
MD5f0616fa8bc54ece07e3107057f74e4db
SHA1b33995c4f9a004b7d806c4bb36040ee844781fca
SHA2566e58fcf4d763022b1f79a3c448eb2ebd8ad1c15df3acf58416893f1cbc699026
SHA51215242e3f5652d7f1d0e31cebadfe2f238ca3222f0e927eb7feb644ab2b3d33132cf2316ee5089324f20f72f1650ad5bb8dd82b96518386ce5b319fb5ceb8313c
-
Filesize
5.3MB
MD51afff8d5352aecef2ecd47ffa02d7f7d
SHA18b115b84efdb3a1b87f750d35822b2609e665bef
SHA256c41acc53cde89b94d55d6932ddd55a212ba910e1fade3da138670bb5b18ae4e1
SHA512e5dc54c60be702e11772dc729eec5ec7140f293545aa3d57282adacddf686483393b0c940bbd397a9d50a6cda093865b143ae00c51ce3bf5d6b00241f97b3cdb
-
Filesize
5.3MB
MD51afff8d5352aecef2ecd47ffa02d7f7d
SHA18b115b84efdb3a1b87f750d35822b2609e665bef
SHA256c41acc53cde89b94d55d6932ddd55a212ba910e1fade3da138670bb5b18ae4e1
SHA512e5dc54c60be702e11772dc729eec5ec7140f293545aa3d57282adacddf686483393b0c940bbd397a9d50a6cda093865b143ae00c51ce3bf5d6b00241f97b3cdb
-
Filesize
5.3MB
MD51afff8d5352aecef2ecd47ffa02d7f7d
SHA18b115b84efdb3a1b87f750d35822b2609e665bef
SHA256c41acc53cde89b94d55d6932ddd55a212ba910e1fade3da138670bb5b18ae4e1
SHA512e5dc54c60be702e11772dc729eec5ec7140f293545aa3d57282adacddf686483393b0c940bbd397a9d50a6cda093865b143ae00c51ce3bf5d6b00241f97b3cdb
-
Filesize
163KB
MD55c399d34d8dc01741269ff1f1aca7554
SHA1e0ceed500d3cef5558f3f55d33ba9c3a709e8f55
SHA256e11e0f7804bfc485b19103a940be3d382f31c1378caca0c63076e27797d7553f
SHA5128ff9d38b22d73c595cc417427b59f5ca8e1fb7b47a2fa6aef25322bf6e614d6b71339a752d779bd736b4c1057239100ac8cc62629fd5d6556785a69bcdc3d73d
-
Filesize
2.8MB
MD5be7554f945ca77a78bd9d365f1b049a7
SHA1aa86da6182211f6bd1fbba33b4008ccec5ce220f
SHA2565500f119b3d15cc11c41f4ce0b2337e84a94cccd85222229a4cfcfc45a11decb
SHA5128fbe8a1a3b787a0346addff5493d0fa8efecca8a8c70a49dc9801f015c9f54c5fb84bc8dba89edd98214f52eb09293c45941f6a15843f7aa2eae6a8cd79b9672
-
Filesize
4.1MB
MD5117a6639c7dea1aa489f6e678f077c10
SHA1b9e4788889f043806e9eb355ccda274de7af7aa7
SHA256b1696a5dfe3e9a4877a61f9a8cd16b37ce4ae6c6fdb30c467c865ecba5700fe2
SHA512d7ecc0a7f47202fd2dbc6768eb1732fbe52a3b6cd69ac947da2a22acdf809e57daa69cf05519ab5025330fe1335a2279a93f6979e1eed199ea998709735597fc
-
Filesize
4.1MB
MD5117a6639c7dea1aa489f6e678f077c10
SHA1b9e4788889f043806e9eb355ccda274de7af7aa7
SHA256b1696a5dfe3e9a4877a61f9a8cd16b37ce4ae6c6fdb30c467c865ecba5700fe2
SHA512d7ecc0a7f47202fd2dbc6768eb1732fbe52a3b6cd69ac947da2a22acdf809e57daa69cf05519ab5025330fe1335a2279a93f6979e1eed199ea998709735597fc
-
Filesize
5.2MB
MD5df280925e135481b26e921dd1221e359
SHA1877737c142fdcc03c33e20d4f17c48a741373c9e
SHA256710a3e1beda67e1c543ba04423bfb0ba643815582310c0b3d03d03e071c894b8
SHA5123da682a655a9df0ad0fcc6f28953f104383f3abe695afdd7a236d9ea0f05ef4de210da7c46139f3ce01e3e7dde9abf02b3665d1289e20426ba9164468807f487
-
Filesize
4.9MB
MD5f7f4c10dd56dd175ed57b936d3ae87d1
SHA1df2c485537f84ab875071c431a21f2cdf477605c
SHA256a39eba51e56a3038058473c7d625e3331961938985451ff4120a518a80fa09ce
SHA5127dc0909929e4cac8daeb0e36fb481a43a36004c36bc26565f2a442e26edb1c3bc9882e370be1ed16f715df77541879e4a444aa7ef53d80fb284745e89eeb7171
-
Filesize
4.7MB
MD59e0d1f5e1b19e6f5c5041e6228185374
SHA15abc65f947c88a51949707cf3dd44826d3877f4e
SHA2562f7174e4db37dc516fd222c3331a266cb75dca9c3914bdc93b6000d119e566b6
SHA512a17185c7460e2e15858581a86d6ec35acbf48a20d680eafd2bc0ac809e58fa3645e1d29ee8d936d89bcab67bfe86889a59f69a26c90a0ca68e13df70713afcd4
-
Filesize
3.1MB
MD5823b5fcdef282c5318b670008b9e6922
SHA1d20cd5321d8a3d423af4c6dabc0ac905796bdc6d
SHA256712f5bb403ca4ade2d3fa47b050aac51a9f573142fd8ba8bf18f5f8144214d8d
SHA5124377d06a71291be3e52c28a2ada0b89ff185a8887c4a75972cdc5e85d95da6538d1776bc49fb190c67b8e6497225f1d63b86793f4095c8fb990a5f6659216472
-
Filesize
4.1MB
MD59846ad11236ad0694dcf5c43a19883fa
SHA128819763c055060734c86518234067ca19fe3817
SHA2569518db3b907b1b238384091f597c801c4c8b23df86c0f67dae5c4b9ac9834285
SHA512a0c13d483e19573383c170c3a27715dc3b6e7ba222cd8ef9356bf129454c68e4f97fb9ba9f3ba49d5c26b957c7b176f7aead79e69e3b93a476e2f62ba6f80884
-
Filesize
4.1MB
MD59846ad11236ad0694dcf5c43a19883fa
SHA128819763c055060734c86518234067ca19fe3817
SHA2569518db3b907b1b238384091f597c801c4c8b23df86c0f67dae5c4b9ac9834285
SHA512a0c13d483e19573383c170c3a27715dc3b6e7ba222cd8ef9356bf129454c68e4f97fb9ba9f3ba49d5c26b957c7b176f7aead79e69e3b93a476e2f62ba6f80884
-
Filesize
4.1MB
MD59846ad11236ad0694dcf5c43a19883fa
SHA128819763c055060734c86518234067ca19fe3817
SHA2569518db3b907b1b238384091f597c801c4c8b23df86c0f67dae5c4b9ac9834285
SHA512a0c13d483e19573383c170c3a27715dc3b6e7ba222cd8ef9356bf129454c68e4f97fb9ba9f3ba49d5c26b957c7b176f7aead79e69e3b93a476e2f62ba6f80884
-
Filesize
4.1MB
MD59846ad11236ad0694dcf5c43a19883fa
SHA128819763c055060734c86518234067ca19fe3817
SHA2569518db3b907b1b238384091f597c801c4c8b23df86c0f67dae5c4b9ac9834285
SHA512a0c13d483e19573383c170c3a27715dc3b6e7ba222cd8ef9356bf129454c68e4f97fb9ba9f3ba49d5c26b957c7b176f7aead79e69e3b93a476e2f62ba6f80884