Analysis
-
max time kernel
112s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2023 03:34
Static task
static1
Behavioral task
behavioral1
Sample
293c1e7a492952dfbea63aff32fd2b0135f8a9a7fbf0b29dcedc4b18485fbf1e.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
293c1e7a492952dfbea63aff32fd2b0135f8a9a7fbf0b29dcedc4b18485fbf1e.exe
Resource
win10v2004-20230915-en
General
-
Target
293c1e7a492952dfbea63aff32fd2b0135f8a9a7fbf0b29dcedc4b18485fbf1e.exe
-
Size
1.4MB
-
MD5
aa5d521e471f1c0facdb7692bf2e3d6e
-
SHA1
f64beac708b6582aaa6368cdd32a1662843a318e
-
SHA256
293c1e7a492952dfbea63aff32fd2b0135f8a9a7fbf0b29dcedc4b18485fbf1e
-
SHA512
5e6662a52807fd79ee4118939ffcec5badfd9ac507c5c4467bdbbabb367864d6f680582df21f42f6187ed3df9ed0037d470683dbcfb7257e9a7a403c5ac8b40d
-
SSDEEP
24576:k8zXcarXADZyWncSgzGGgDsEnYVPjoCfBfxk06B35aEGnG:pzXcVZLXgzPIHn2PjoCfBfgBJAnG
Malware Config
Extracted
amadey
3.89
http://77.91.68.52/mac/index.php
http://77.91.68.78/help/index.php
http://77.91.124.1/theme/index.php
-
install_dir
fefffe8cea
-
install_file
explonde.exe
-
strings_key
916aae73606d7a9e02a1d3b47c199688
Extracted
redline
monik
77.91.124.82:19071
-
auth_value
da7d9ea0878f5901f1f8319d34bdccea
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
breha
77.91.124.55:19071
Extracted
redline
kukish
77.91.124.55:19071
Extracted
redline
pixelscloud2.0
85.209.176.128:80
Extracted
redline
@ytlogsbot
185.216.70.238:37515
Extracted
redline
5141679758_99
https://pastebin.com/raw/8baCJyMF
Signatures
-
DcRat 5 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process 5472 schtasks.exe 3580 schtasks.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" AppLaunch.exe 1204 schtasks.exe 2156 schtasks.exe -
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral2/memory/3800-45-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/3800-46-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/3800-47-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/3800-49-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/3304-40-0x0000000000400000-0x000000000040A000-memory.dmp healer -
Glupteba payload 2 IoCs
resource yara_rule behavioral2/memory/4532-462-0x0000000000400000-0x0000000002FB8000-memory.dmp family_glupteba behavioral2/memory/4532-528-0x0000000000400000-0x0000000002FB8000-memory.dmp family_glupteba -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 7FAF.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 7FAF.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 7FAF.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 7FAF.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 7FAF.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 16 IoCs
resource yara_rule behavioral2/files/0x0007000000023252-153.dat family_redline behavioral2/files/0x0007000000023252-154.dat family_redline behavioral2/files/0x0006000000023251-157.dat family_redline behavioral2/files/0x0006000000023251-156.dat family_redline behavioral2/memory/3568-159-0x0000000000570000-0x00000000005AE000-memory.dmp family_redline behavioral2/memory/2224-161-0x0000000000830000-0x000000000086E000-memory.dmp family_redline behavioral2/files/0x000400000001e6fd-206.dat family_redline behavioral2/memory/440-220-0x00000000005F0000-0x000000000064A000-memory.dmp family_redline behavioral2/files/0x000400000001e6fd-229.dat family_redline behavioral2/memory/1388-231-0x0000000000CD0000-0x0000000000CEE000-memory.dmp family_redline behavioral2/files/0x000500000001e703-246.dat family_redline behavioral2/files/0x000500000001e703-247.dat family_redline behavioral2/memory/2016-251-0x00000000007E0000-0x000000000083A000-memory.dmp family_redline behavioral2/memory/4532-291-0x0000000000C60000-0x0000000000D7B000-memory.dmp family_redline behavioral2/memory/4584-292-0x0000000000A10000-0x0000000000A4E000-memory.dmp family_redline behavioral2/memory/4532-306-0x0000000000C60000-0x0000000000D7B000-memory.dmp family_redline -
SectopRAT payload 3 IoCs
resource yara_rule behavioral2/files/0x000400000001e6fd-206.dat family_sectoprat behavioral2/files/0x000400000001e6fd-229.dat family_sectoprat behavioral2/memory/1388-231-0x0000000000CD0000-0x0000000000CEE000-memory.dmp family_sectoprat -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4272 netsh.exe -
.NET Reactor proctector 20 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral2/memory/3812-169-0x00000000020B0000-0x00000000020D0000-memory.dmp net_reactor behavioral2/memory/3812-176-0x0000000002140000-0x000000000215E000-memory.dmp net_reactor behavioral2/memory/3812-182-0x0000000002140000-0x0000000002158000-memory.dmp net_reactor behavioral2/memory/3812-185-0x0000000002140000-0x0000000002158000-memory.dmp net_reactor behavioral2/memory/3812-180-0x0000000002140000-0x0000000002158000-memory.dmp net_reactor behavioral2/memory/3812-187-0x0000000002140000-0x0000000002158000-memory.dmp net_reactor behavioral2/memory/3812-189-0x0000000002140000-0x0000000002158000-memory.dmp net_reactor behavioral2/memory/3812-191-0x0000000002140000-0x0000000002158000-memory.dmp net_reactor behavioral2/memory/3812-193-0x0000000002140000-0x0000000002158000-memory.dmp net_reactor behavioral2/memory/3812-196-0x0000000002140000-0x0000000002158000-memory.dmp net_reactor behavioral2/memory/3812-199-0x0000000002140000-0x0000000002158000-memory.dmp net_reactor behavioral2/memory/3812-201-0x0000000002140000-0x0000000002158000-memory.dmp net_reactor behavioral2/memory/3812-208-0x0000000002140000-0x0000000002158000-memory.dmp net_reactor behavioral2/memory/3812-205-0x0000000002140000-0x0000000002158000-memory.dmp net_reactor behavioral2/memory/3812-215-0x0000000002140000-0x0000000002158000-memory.dmp net_reactor behavioral2/memory/3812-218-0x0000000002140000-0x0000000002158000-memory.dmp net_reactor behavioral2/memory/3812-221-0x0000000002140000-0x0000000002158000-memory.dmp net_reactor behavioral2/memory/3812-228-0x0000000002140000-0x0000000002158000-memory.dmp net_reactor behavioral2/memory/3812-225-0x0000000002140000-0x0000000002158000-memory.dmp net_reactor behavioral2/memory/2224-253-0x00000000076E0000-0x00000000076F0000-memory.dmp net_reactor -
Checks computer location settings 2 TTPs 7 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation w6029971.exe Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation legota.exe Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation C97F.exe Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation oldplayer.exe Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation t5284523.exe Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation explonde.exe -
Executes dropped EXE 37 IoCs
pid Process 1156 z0276402.exe 4656 z8856128.exe 4936 z4190406.exe 568 z4726131.exe 1464 q1060145.exe 492 r1533487.exe 2580 s8225540.exe 1268 t5284523.exe 2668 explonde.exe 4696 u3516836.exe 4148 w6029971.exe 5000 legota.exe 2132 6F20.exe 2376 KN8Ko5rz.exe 4904 73D4.exe 1016 un0KB4vN.exe 1604 DP1DK1ZT.exe 492 lQ7NH7LX.exe 2784 1Lp64os2.exe 3568 7F11.exe 2224 2VI455hs.exe 3812 7FAF.exe 3104 81C3.exe 440 8629.exe 1388 977F.exe 2016 9C91.exe 3860 explonde.exe 5072 legota.exe 4532 A378.exe 100 C97F.exe 3216 CF0E.exe 4532 31839b57a4f11171d6abc8bbc4451ee4.exe 3764 oldplayer.exe 880 D8C3.exe 5140 DB16.exe 5176 oneetx.exe 5644 31839b57a4f11171d6abc8bbc4451ee4.exe -
Loads dropped DLL 4 IoCs
pid Process 440 8629.exe 440 8629.exe 5620 rundll32.exe 5908 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution 1 TTPs
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 7FAF.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 11 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z0276402.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z4190406.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z4726131.exe Set value (str) \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\socks5 = "powershell.exe -windowstyle hidden -Command \"& 'C:\\Users\\Admin\\AppData\\Local\\Temp\\DB16.exe'\"" DB16.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" AppLaunch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z8856128.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6F20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" KN8Ko5rz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" un0KB4vN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" DP1DK1ZT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP005.TMP\\\"" lQ7NH7LX.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 3184 set thread context of 5020 3184 293c1e7a492952dfbea63aff32fd2b0135f8a9a7fbf0b29dcedc4b18485fbf1e.exe 91 PID 1464 set thread context of 3304 1464 q1060145.exe 99 PID 492 set thread context of 3800 492 r1533487.exe 103 PID 2580 set thread context of 1476 2580 s8225540.exe 109 PID 4696 set thread context of 4024 4696 u3516836.exe 125 PID 4532 set thread context of 4584 4532 31839b57a4f11171d6abc8bbc4451ee4.exe 176 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2268 3800 WerFault.exe 103 4008 440 WerFault.exe 153 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1204 schtasks.exe 2156 schtasks.exe 5472 schtasks.exe 3580 schtasks.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-912 = "Mauritius Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-31 = "Mid-Atlantic Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-962 = "Paraguay Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-572 = "China Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2451 = "Saint Pierre Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2412 = "Marquesas Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1841 = "Russia TZ 4 Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1802 = "Line Islands Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-122 = "SA Pacific Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-281 = "Central Europe Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-41 = "E. South America Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-335 = "Jordan Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2512 = "Lord Howe Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-671 = "AUS Eastern Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2631 = "Norfolk Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-161 = "Central Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2341 = "Haiti Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-372 = "Jerusalem Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-961 = "Paraguay Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2002 = "Cabo Verde Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-351 = "FLE Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-621 = "Korea Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-162 = "Central Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-492 = "India Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1502 = "Turkey Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1501 = "Turkey Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1022 = "Bangladesh Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1911 = "Russia TZ 10 Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-461 = "Afghanistan Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1042 = "Ulaanbaatar Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-742 = "New Zealand Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2872 = "Magallanes Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-541 = "Myanmar Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-732 = "Fiji Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-791 = "SA Western Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-52 = "Greenland Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-12 = "Azores Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-141 = "Canada Central Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-681 = "E. Australia Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-491 = "India Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2511 = "Lord Howe Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2061 = "North Korea Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-132 = "US Eastern Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-651 = "AUS Central Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-341 = "Egypt Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-121 = "SA Pacific Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2751 = "Tomsk Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-332 = "E. Europe Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-3051 = "Qyzylorda Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-301 = "Romance Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1831 = "Russia TZ 2 Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-532 = "Sri Lanka Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2752 = "Tomsk Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2432 = "Cuba Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1476 AppLaunch.exe 1476 AppLaunch.exe 3304 AppLaunch.exe 3304 AppLaunch.exe 3116 Process not Found 3116 Process not Found 3116 Process not Found 3116 Process not Found 3116 Process not Found 3116 Process not Found 3116 Process not Found 3116 Process not Found 3116 Process not Found 3116 Process not Found 3116 Process not Found 3116 Process not Found 3116 Process not Found 3116 Process not Found 3116 Process not Found 3116 Process not Found 3116 Process not Found 3116 Process not Found 3116 Process not Found 3116 Process not Found 3116 Process not Found 3116 Process not Found 3116 Process not Found 3116 Process not Found 3116 Process not Found 3116 Process not Found 3116 Process not Found 3116 Process not Found 3116 Process not Found 3116 Process not Found 3116 Process not Found 3116 Process not Found 3116 Process not Found 3116 Process not Found 3116 Process not Found 3116 Process not Found 3116 Process not Found 3116 Process not Found 3116 Process not Found 3116 Process not Found 3116 Process not Found 3116 Process not Found 3116 Process not Found 3116 Process not Found 3116 Process not Found 3116 Process not Found 3116 Process not Found 3116 Process not Found 3116 Process not Found 3116 Process not Found 3116 Process not Found 3116 Process not Found 3116 Process not Found 3116 Process not Found 3116 Process not Found 3116 Process not Found 3116 Process not Found 3116 Process not Found 3116 Process not Found 3116 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3116 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1476 AppLaunch.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3304 AppLaunch.exe Token: SeShutdownPrivilege 3116 Process not Found Token: SeCreatePagefilePrivilege 3116 Process not Found Token: SeDebugPrivilege 3812 7FAF.exe Token: SeShutdownPrivilege 3116 Process not Found Token: SeCreatePagefilePrivilege 3116 Process not Found Token: SeShutdownPrivilege 3116 Process not Found Token: SeCreatePagefilePrivilege 3116 Process not Found Token: SeShutdownPrivilege 3116 Process not Found Token: SeCreatePagefilePrivilege 3116 Process not Found Token: SeShutdownPrivilege 3116 Process not Found Token: SeCreatePagefilePrivilege 3116 Process not Found Token: SeShutdownPrivilege 3116 Process not Found Token: SeCreatePagefilePrivilege 3116 Process not Found Token: SeShutdownPrivilege 3116 Process not Found Token: SeCreatePagefilePrivilege 3116 Process not Found Token: SeShutdownPrivilege 3116 Process not Found Token: SeCreatePagefilePrivilege 3116 Process not Found Token: SeShutdownPrivilege 3116 Process not Found Token: SeCreatePagefilePrivilege 3116 Process not Found Token: SeDebugPrivilege 1388 977F.exe Token: SeShutdownPrivilege 3116 Process not Found Token: SeCreatePagefilePrivilege 3116 Process not Found Token: SeShutdownPrivilege 3116 Process not Found Token: SeCreatePagefilePrivilege 3116 Process not Found Token: SeShutdownPrivilege 3116 Process not Found Token: SeCreatePagefilePrivilege 3116 Process not Found Token: SeShutdownPrivilege 3116 Process not Found Token: SeCreatePagefilePrivilege 3116 Process not Found Token: SeShutdownPrivilege 3116 Process not Found Token: SeCreatePagefilePrivilege 3116 Process not Found Token: SeShutdownPrivilege 3116 Process not Found Token: SeCreatePagefilePrivilege 3116 Process not Found Token: SeShutdownPrivilege 3116 Process not Found Token: SeCreatePagefilePrivilege 3116 Process not Found Token: SeShutdownPrivilege 3116 Process not Found Token: SeCreatePagefilePrivilege 3116 Process not Found Token: SeShutdownPrivilege 3116 Process not Found Token: SeCreatePagefilePrivilege 3116 Process not Found Token: SeDebugPrivilege 2016 9C91.exe Token: SeShutdownPrivilege 3116 Process not Found Token: SeCreatePagefilePrivilege 3116 Process not Found Token: SeShutdownPrivilege 3116 Process not Found Token: SeCreatePagefilePrivilege 3116 Process not Found Token: SeShutdownPrivilege 3116 Process not Found Token: SeCreatePagefilePrivilege 3116 Process not Found Token: SeShutdownPrivilege 3116 Process not Found Token: SeCreatePagefilePrivilege 3116 Process not Found Token: SeShutdownPrivilege 3116 Process not Found Token: SeCreatePagefilePrivilege 3116 Process not Found Token: SeShutdownPrivilege 3116 Process not Found Token: SeCreatePagefilePrivilege 3116 Process not Found Token: SeDebugPrivilege 3216 CF0E.exe Token: SeShutdownPrivilege 3116 Process not Found Token: SeCreatePagefilePrivilege 3116 Process not Found Token: SeShutdownPrivilege 3116 Process not Found Token: SeCreatePagefilePrivilege 3116 Process not Found Token: SeShutdownPrivilege 3116 Process not Found Token: SeCreatePagefilePrivilege 3116 Process not Found Token: SeShutdownPrivilege 3116 Process not Found Token: SeCreatePagefilePrivilege 3116 Process not Found Token: SeShutdownPrivilege 3116 Process not Found Token: SeCreatePagefilePrivilege 3116 Process not Found Token: SeShutdownPrivilege 3116 Process not Found -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 3764 oldplayer.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3116 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3184 wrote to memory of 5020 3184 293c1e7a492952dfbea63aff32fd2b0135f8a9a7fbf0b29dcedc4b18485fbf1e.exe 91 PID 3184 wrote to memory of 5020 3184 293c1e7a492952dfbea63aff32fd2b0135f8a9a7fbf0b29dcedc4b18485fbf1e.exe 91 PID 3184 wrote to memory of 5020 3184 293c1e7a492952dfbea63aff32fd2b0135f8a9a7fbf0b29dcedc4b18485fbf1e.exe 91 PID 3184 wrote to memory of 5020 3184 293c1e7a492952dfbea63aff32fd2b0135f8a9a7fbf0b29dcedc4b18485fbf1e.exe 91 PID 3184 wrote to memory of 5020 3184 293c1e7a492952dfbea63aff32fd2b0135f8a9a7fbf0b29dcedc4b18485fbf1e.exe 91 PID 3184 wrote to memory of 5020 3184 293c1e7a492952dfbea63aff32fd2b0135f8a9a7fbf0b29dcedc4b18485fbf1e.exe 91 PID 3184 wrote to memory of 5020 3184 293c1e7a492952dfbea63aff32fd2b0135f8a9a7fbf0b29dcedc4b18485fbf1e.exe 91 PID 3184 wrote to memory of 5020 3184 293c1e7a492952dfbea63aff32fd2b0135f8a9a7fbf0b29dcedc4b18485fbf1e.exe 91 PID 3184 wrote to memory of 5020 3184 293c1e7a492952dfbea63aff32fd2b0135f8a9a7fbf0b29dcedc4b18485fbf1e.exe 91 PID 3184 wrote to memory of 5020 3184 293c1e7a492952dfbea63aff32fd2b0135f8a9a7fbf0b29dcedc4b18485fbf1e.exe 91 PID 5020 wrote to memory of 1156 5020 AppLaunch.exe 92 PID 5020 wrote to memory of 1156 5020 AppLaunch.exe 92 PID 5020 wrote to memory of 1156 5020 AppLaunch.exe 92 PID 1156 wrote to memory of 4656 1156 z0276402.exe 94 PID 1156 wrote to memory of 4656 1156 z0276402.exe 94 PID 1156 wrote to memory of 4656 1156 z0276402.exe 94 PID 4656 wrote to memory of 4936 4656 z8856128.exe 95 PID 4656 wrote to memory of 4936 4656 z8856128.exe 95 PID 4656 wrote to memory of 4936 4656 z8856128.exe 95 PID 4936 wrote to memory of 568 4936 z4190406.exe 96 PID 4936 wrote to memory of 568 4936 z4190406.exe 96 PID 4936 wrote to memory of 568 4936 z4190406.exe 96 PID 568 wrote to memory of 1464 568 z4726131.exe 97 PID 568 wrote to memory of 1464 568 z4726131.exe 97 PID 568 wrote to memory of 1464 568 z4726131.exe 97 PID 1464 wrote to memory of 3304 1464 q1060145.exe 99 PID 1464 wrote to memory of 3304 1464 q1060145.exe 99 PID 1464 wrote to memory of 3304 1464 q1060145.exe 99 PID 1464 wrote to memory of 3304 1464 q1060145.exe 99 PID 1464 wrote to memory of 3304 1464 q1060145.exe 99 PID 1464 wrote to memory of 3304 1464 q1060145.exe 99 PID 1464 wrote to memory of 3304 1464 q1060145.exe 99 PID 1464 wrote to memory of 3304 1464 q1060145.exe 99 PID 568 wrote to memory of 492 568 z4726131.exe 100 PID 568 wrote to memory of 492 568 z4726131.exe 100 PID 568 wrote to memory of 492 568 z4726131.exe 100 PID 492 wrote to memory of 3848 492 r1533487.exe 102 PID 492 wrote to memory of 3848 492 r1533487.exe 102 PID 492 wrote to memory of 3848 492 r1533487.exe 102 PID 492 wrote to memory of 3800 492 r1533487.exe 103 PID 492 wrote to memory of 3800 492 r1533487.exe 103 PID 492 wrote to memory of 3800 492 r1533487.exe 103 PID 492 wrote to memory of 3800 492 r1533487.exe 103 PID 492 wrote to memory of 3800 492 r1533487.exe 103 PID 492 wrote to memory of 3800 492 r1533487.exe 103 PID 492 wrote to memory of 3800 492 r1533487.exe 103 PID 492 wrote to memory of 3800 492 r1533487.exe 103 PID 492 wrote to memory of 3800 492 r1533487.exe 103 PID 492 wrote to memory of 3800 492 r1533487.exe 103 PID 4936 wrote to memory of 2580 4936 z4190406.exe 104 PID 4936 wrote to memory of 2580 4936 z4190406.exe 104 PID 4936 wrote to memory of 2580 4936 z4190406.exe 104 PID 2580 wrote to memory of 1476 2580 s8225540.exe 109 PID 2580 wrote to memory of 1476 2580 s8225540.exe 109 PID 2580 wrote to memory of 1476 2580 s8225540.exe 109 PID 2580 wrote to memory of 1476 2580 s8225540.exe 109 PID 2580 wrote to memory of 1476 2580 s8225540.exe 109 PID 2580 wrote to memory of 1476 2580 s8225540.exe 109 PID 4656 wrote to memory of 1268 4656 z8856128.exe 110 PID 4656 wrote to memory of 1268 4656 z8856128.exe 110 PID 4656 wrote to memory of 1268 4656 z8856128.exe 110 PID 1268 wrote to memory of 2668 1268 t5284523.exe 111 PID 1268 wrote to memory of 2668 1268 t5284523.exe 111 PID 1268 wrote to memory of 2668 1268 t5284523.exe 111 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\293c1e7a492952dfbea63aff32fd2b0135f8a9a7fbf0b29dcedc4b18485fbf1e.exe"C:\Users\Admin\AppData\Local\Temp\293c1e7a492952dfbea63aff32fd2b0135f8a9a7fbf0b29dcedc4b18485fbf1e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- DcRat
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0276402.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0276402.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8856128.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8856128.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4190406.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4190406.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z4726131.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z4726131.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1060145.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1060145.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3304
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r1533487.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r1533487.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:492 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵PID:3848
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵PID:3800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3800 -s 5409⤵
- Program crash
PID:2268
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s8225540.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s8225540.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1476
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t5284523.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t5284523.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
PID:2668 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explonde.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe" /F7⤵
- DcRat
- Creates scheduled task(s)
PID:1204
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explonde.exe" /P "Admin:N"&&CACLS "explonde.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit7⤵PID:4660
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:2824
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:N"8⤵PID:184
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:R" /E8⤵PID:4244
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"8⤵PID:456
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4028
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E8⤵PID:1224
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:5620
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u3516836.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u3516836.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4696 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:632
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:4024
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w6029971.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w6029971.exe3⤵
- Checks computer location settings
- Executes dropped EXE
PID:4148 -
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
PID:5000 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- DcRat
- Creates scheduled task(s)
PID:2156
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵PID:4800
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:528
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵PID:1744
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵PID:1636
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:8
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵PID:4768
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵PID:4676
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
PID:5908
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3800 -ip 38001⤵PID:3908
-
C:\Users\Admin\AppData\Local\Temp\6F20.exeC:\Users\Admin\AppData\Local\Temp\6F20.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\KN8Ko5rz.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\KN8Ko5rz.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\un0KB4vN.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\un0KB4vN.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1016 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\DP1DK1ZT.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\DP1DK1ZT.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\lQ7NH7LX.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\lQ7NH7LX.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
PID:492 -
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\1Lp64os2.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\1Lp64os2.exe6⤵
- Executes dropped EXE
PID:2784
-
-
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\2VI455hs.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\2VI455hs.exe6⤵
- Executes dropped EXE
PID:2224
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\73D4.exeC:\Users\Admin\AppData\Local\Temp\73D4.exe1⤵
- Executes dropped EXE
PID:4904
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7AF9.bat" "1⤵PID:4688
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/login2⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4308 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffe4e6a46f8,0x7ffe4e6a4708,0x7ffe4e6a47183⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2180,4842492448310669905,539544550090319924,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2348 /prefetch:33⤵PID:4160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,4842492448310669905,539544550090319924,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2268 /prefetch:23⤵PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2180,4842492448310669905,539544550090319924,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:83⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,4842492448310669905,539544550090319924,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:13⤵PID:4648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,4842492448310669905,539544550090319924,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:13⤵PID:3872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,4842492448310669905,539544550090319924,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4192 /prefetch:13⤵PID:1484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,4842492448310669905,539544550090319924,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4916 /prefetch:13⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,4842492448310669905,539544550090319924,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5444 /prefetch:83⤵PID:1636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,4842492448310669905,539544550090319924,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5444 /prefetch:83⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,4842492448310669905,539544550090319924,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5828 /prefetch:13⤵PID:4688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,4842492448310669905,539544550090319924,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5820 /prefetch:13⤵PID:1340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,4842492448310669905,539544550090319924,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6136 /prefetch:13⤵PID:5264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,4842492448310669905,539544550090319924,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5884 /prefetch:13⤵PID:5272
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/2⤵PID:5032
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe4e6a46f8,0x7ffe4e6a4708,0x7ffe4e6a47183⤵PID:656
-
-
-
C:\Users\Admin\AppData\Local\Temp\7F11.exeC:\Users\Admin\AppData\Local\Temp\7F11.exe1⤵
- Executes dropped EXE
PID:3568
-
C:\Users\Admin\AppData\Local\Temp\7FAF.exeC:\Users\Admin\AppData\Local\Temp\7FAF.exe1⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious use of AdjustPrivilegeToken
PID:3812
-
C:\Users\Admin\AppData\Local\Temp\81C3.exeC:\Users\Admin\AppData\Local\Temp\81C3.exe1⤵
- Executes dropped EXE
PID:3104
-
C:\Users\Admin\AppData\Local\Temp\8629.exeC:\Users\Admin\AppData\Local\Temp\8629.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:440 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 440 -s 7762⤵
- Program crash
PID:4008
-
-
C:\Users\Admin\AppData\Local\Temp\977F.exeC:\Users\Admin\AppData\Local\Temp\977F.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1388
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:3860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 440 -ip 4401⤵PID:928
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:5072
-
C:\Users\Admin\AppData\Local\Temp\9C91.exeC:\Users\Admin\AppData\Local\Temp\9C91.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2016
-
C:\Users\Admin\AppData\Local\Temp\A378.exeC:\Users\Admin\AppData\Local\Temp\A378.exe1⤵
- Executes dropped EXE
PID:4532 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵PID:4584
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4064
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3764
-
C:\Users\Admin\AppData\Local\Temp\C97F.exeC:\Users\Admin\AppData\Local\Temp\C97F.exe1⤵
- Checks computer location settings
- Executes dropped EXE
PID:100 -
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4532 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵PID:5972
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"3⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:5644 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Modifies data under HKEY_USERS
PID:5784 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:5748
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵PID:2216
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
- Modifies Windows Firewall
PID:4272
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:3532
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:4380
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵PID:1800
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:6128
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- DcRat
- Creates scheduled task(s)
PID:3580
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f5⤵PID:4244
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:5220
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:3740
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵PID:3112
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\oldplayer.exe"C:\Users\Admin\AppData\Local\Temp\oldplayer.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:3764 -
C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
PID:5176 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe" /F4⤵
- DcRat
- Creates scheduled task(s)
PID:5472
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\207aa4515d" /P "Admin:N"&&CACLS "..\207aa4515d" /P "Admin:R" /E&&Exit4⤵PID:5512
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:5656
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:5676
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:5728
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:5748
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\207aa4515d" /P "Admin:N"5⤵PID:5760
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\207aa4515d" /P "Admin:R" /E5⤵PID:5796
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CF0E.exeC:\Users\Admin\AppData\Local\Temp\CF0E.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3216
-
C:\Users\Admin\AppData\Local\Temp\D8C3.exeC:\Users\Admin\AppData\Local\Temp\D8C3.exe1⤵
- Executes dropped EXE
PID:880
-
C:\Users\Admin\AppData\Local\Temp\DB16.exeC:\Users\Admin\AppData\Local\Temp\DB16.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5140
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵PID:5924
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵PID:2508
-
C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exeC:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe1⤵PID:6060
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Scripting
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
152B
MD53d5af55f794f9a10c5943d2f80dde5c5
SHA15252adf87d6bd769f2c39b9e8eba77b087a0160d
SHA25643e50edafcaaeae9fcd4dce5b99bf14fe79dae1401019443f31aa9ff81347764
SHA5122e2e09a00db732ff934da1e6ab8617fb3c8de482f9667a2c987435d0a5d67550b4bfd66e8b4475012b60908c24e39dff58e2f2ffa55f13ffc55caae1be630c71
-
Filesize
152B
MD53d5af55f794f9a10c5943d2f80dde5c5
SHA15252adf87d6bd769f2c39b9e8eba77b087a0160d
SHA25643e50edafcaaeae9fcd4dce5b99bf14fe79dae1401019443f31aa9ff81347764
SHA5122e2e09a00db732ff934da1e6ab8617fb3c8de482f9667a2c987435d0a5d67550b4bfd66e8b4475012b60908c24e39dff58e2f2ffa55f13ffc55caae1be630c71
-
Filesize
152B
MD53d5af55f794f9a10c5943d2f80dde5c5
SHA15252adf87d6bd769f2c39b9e8eba77b087a0160d
SHA25643e50edafcaaeae9fcd4dce5b99bf14fe79dae1401019443f31aa9ff81347764
SHA5122e2e09a00db732ff934da1e6ab8617fb3c8de482f9667a2c987435d0a5d67550b4bfd66e8b4475012b60908c24e39dff58e2f2ffa55f13ffc55caae1be630c71
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD5e848109fc5eecb0802f7fdbc559126bf
SHA1377f0a68b7e69c8bfa749ba16ce79a662390e2c5
SHA25664f7ce1b60996c8881078f1644033589f307e8d946854467b1560896bc7019a4
SHA512ff42138c83f77f6445a28ea247643c37ada192d04e60cbff22dcfcb5e02a9e20de11496fbaca377735a32d3bfee78915984449279d1dd92ece9cfc7a8026cc15
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD5a1933b38f1b80442713447ed27f6edd8
SHA1f9bd99a7ade08056ea3f251ca9a57ef6180388fd
SHA256f16718438cab04b6a2fe70395f7b21b0d54540358a0e6c0a8d26eb0ad91ddf2d
SHA5122083568f84c5f8363446ecc6a5b5d8fa1db370f5d02a3f7bdf2d80581d10f54fbf9a13fcd8bd4d6719f9fdccfb8ff27a9b1dee5c5d72306897cb78ee15a0dd0e
-
Filesize
5KB
MD5ef40e243c73ad430a61cdd79d0446421
SHA1e19a7940146ec97482b353d5aecb95a7e8b95e12
SHA25657bf9fde315ed366af6ba944a1802e9db76f72b5271aa9ccd3f1049a8cbf6e04
SHA5125b0499a140cffe7e8c1c63cfdfe9c261dce17939fcccc7b33b891949a06ee0be6f448e961b12a410b5c1193111a7f5760fd315554dc8a90f19566397115e623c
-
Filesize
24KB
MD510f5b64000466c1e6da25fb5a0115924
SHA1cb253bacf2b087c4040eb3c6a192924234f68639
SHA256d818b1cebb2d1e2b269f2e41654702a0df261e63ba2a479f34b75563265ee46b
SHA5128a8d230594d6fade63ecd63ba60985a7ccd1353de8d0a119543985bf182fdbb45f38ccc96441c24f0792ea1c449de69563c38348c2bedb2845522a2f83a149db
-
Filesize
872B
MD53ad0242f7ff14f3247af7b3806821a40
SHA165330118f32869cd1739259b1ea164af7654f869
SHA256b252aeea99ab762199f7a852eb1c9237bd135027d0199ab60afacbf4dae15a1f
SHA512b2b193ec8990e1f1f05a2864dcac119007c735b661588287429fab1415008eabf0502e001bcb5bbad5e4a3b615cefc8be5b5a1c58f20ce079ae8eff7f36b5953
-
Filesize
369B
MD5e6e1782fe390a866dbf36a04d35ec512
SHA15d2de74434c5ddd818331050ce26af0dea800b96
SHA256c64d04b03f41e6b36589a18a4912ce4055937d90cd40ab2cb83f977e5edc7d0e
SHA51240818ee807e36c313897f6ea98fdfc6240bb4fa845b8b16c1c294db786efc2373cad5f4701af0f68ce21c83e285d9f2ae6ce491edaae29b0333b9f40388441d0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5f0a5663e458292d1798f1e2039a5a3ff
SHA128ece59ca1c690bc04e7139313468485d1d295d1
SHA2562298f66034ce393932dc0a0d4dd803a2a4b10ab4a65b7617b2e996c9cba28fa3
SHA5126f9185859bef9f866cbfeeb37318deaeb8f038b1d566eb67cf1aa508d380bc2a12c89c7bc2c8798c5835c402d1bf7b7c4ea2e20589f17737f9d067e1d69cb34b
-
Filesize
10KB
MD51e7bb5f16b432f66fec881210b888d47
SHA141b19ac21f895af8e978970cbb17148239ef8aac
SHA2568ea6f496c05b2190398bd2af8bb200cbe33034b007476ae590948dfe3839674c
SHA512eb18b8a9caa148eb7cd4ec2c81da9b3b7a2b6e348cfdadf4f1e69731da917669868a58685fcd0861de94f4ccd3fddc355dc28676f120e3ce5c076abb7c633ae1
-
Filesize
4.1MB
MD581e4fc7bd0ee078ccae9523fa5cb17a3
SHA14d25ca2e8357dc2688477b45247d02a3967c98a4
SHA256c867c3bda7b6f6bd228a4d7656c069bd6cf4f67ba4b075cf4113f5b109e7d9ee
SHA5124cfc68d7450ecdeaa56db50297bd233857b8a92265f57bfadb33ab9eb8bafbd77d8db609f8419a48f20ba0e7f8ad62063fd338536cd6319d1ed830405100ed22
-
Filesize
1017KB
MD59e9aca6a67d9c9891c8226e463c10790
SHA1200cbbde16124cfcb4cc8f2325c6f9966c297728
SHA2561b690090ad4dd3a2e84ed7fdff1be603bfbd2208be96e42bcc540c73a524653b
SHA51201517d1a2a6d78bd80e4fa992e2f8f06a485198a3b2f71304dd1677de7eed80d450874e8a4d6f99b3e99d5eacb613b9d8c627ecc97b0d2cc2b67e4b7a81f69b4
-
Filesize
1017KB
MD59e9aca6a67d9c9891c8226e463c10790
SHA1200cbbde16124cfcb4cc8f2325c6f9966c297728
SHA2561b690090ad4dd3a2e84ed7fdff1be603bfbd2208be96e42bcc540c73a524653b
SHA51201517d1a2a6d78bd80e4fa992e2f8f06a485198a3b2f71304dd1677de7eed80d450874e8a4d6f99b3e99d5eacb613b9d8c627ecc97b0d2cc2b67e4b7a81f69b4
-
Filesize
180KB
MD553e28e07671d832a65fbfe3aa38b6678
SHA16f9ea0ed8109030511c2c09c848f66bd0d16d1e1
SHA2565c59db3277aefb761d4b814aaf5f5acd1fd1a0ea154dc565c78b082a3df4566e
SHA512053f8048230583e741c34f6714c9684ed1312c064cd0c81d99f09e20192b7ddecb53c9c55e4aceac774315315be7e13de98f2cea4e5487f2d9e9dfa2ce3979c9
-
Filesize
180KB
MD553e28e07671d832a65fbfe3aa38b6678
SHA16f9ea0ed8109030511c2c09c848f66bd0d16d1e1
SHA2565c59db3277aefb761d4b814aaf5f5acd1fd1a0ea154dc565c78b082a3df4566e
SHA512053f8048230583e741c34f6714c9684ed1312c064cd0c81d99f09e20192b7ddecb53c9c55e4aceac774315315be7e13de98f2cea4e5487f2d9e9dfa2ce3979c9
-
Filesize
79B
MD5403991c4d18ac84521ba17f264fa79f2
SHA1850cc068de0963854b0fe8f485d951072474fd45
SHA256ef6e942aefe925fefac19fa816986ea25de6935c4f377c717e29b94e65f9019f
SHA512a20aaa77065d30195e5893f2ff989979383c8d7f82d9e528d4833b1c1236aef4f85284f5250d0f190a174790b650280ffe1fbff7e00c98024ccf5ca746e5b576
-
Filesize
221KB
MD58905918bd7e4f4aeda3a804d81f9ee40
SHA13c488a81539116085a1c22df26085f798f7202c8
SHA2560978a728ad05915e0be6a7283d30acca18893ef7a4b0939d316de70415e0efde
SHA5126530c4209651aa34f4c91fe5b737dc933f02a8ea3710a6f3fa0bff3130720740de4bec308b35cb31255cec6c85e585036af849ace6e6268ef1d9f9a761fe6a56
-
Filesize
221KB
MD58905918bd7e4f4aeda3a804d81f9ee40
SHA13c488a81539116085a1c22df26085f798f7202c8
SHA2560978a728ad05915e0be6a7283d30acca18893ef7a4b0939d316de70415e0efde
SHA5126530c4209651aa34f4c91fe5b737dc933f02a8ea3710a6f3fa0bff3130720740de4bec308b35cb31255cec6c85e585036af849ace6e6268ef1d9f9a761fe6a56
-
Filesize
188KB
MD5425e2a994509280a8c1e2812dfaad929
SHA14d5eff2fb3835b761e2516a873b537cbaacea1fe
SHA2566f40f29ad16466785dfbe836dd375400949ff894e8aa03e2805ab1c1ac2d6f5a
SHA512080a41e7926122e14b38901f2e1eb8100a08c5068a9a74099f060c5e601f056a66e607b4e006820276834bb01d913a3894de98e6d9ba62ce843df14058483aa0
-
Filesize
188KB
MD5425e2a994509280a8c1e2812dfaad929
SHA14d5eff2fb3835b761e2516a873b537cbaacea1fe
SHA2566f40f29ad16466785dfbe836dd375400949ff894e8aa03e2805ab1c1ac2d6f5a
SHA512080a41e7926122e14b38901f2e1eb8100a08c5068a9a74099f060c5e601f056a66e607b4e006820276834bb01d913a3894de98e6d9ba62ce843df14058483aa0
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
434KB
MD516028051f2cff284062da8666b55f3be
SHA1ba3f5f9065ecb57c0f1404d5e1751a9512844d1c
SHA25604ec519ce641c6986f15134d8c49fb1ccf21debab72b65e165cc8cb158ba7ec0
SHA512a100c9811c1e9a2e91be476d93569fb4275d218aab6b8688aed882e5d9acf543fc394d08fa2f8fe48a3bb4b89f86881c048891926aa546632980d469950542c8
-
Filesize
434KB
MD516028051f2cff284062da8666b55f3be
SHA1ba3f5f9065ecb57c0f1404d5e1751a9512844d1c
SHA25604ec519ce641c6986f15134d8c49fb1ccf21debab72b65e165cc8cb158ba7ec0
SHA512a100c9811c1e9a2e91be476d93569fb4275d218aab6b8688aed882e5d9acf543fc394d08fa2f8fe48a3bb4b89f86881c048891926aa546632980d469950542c8
-
Filesize
434KB
MD516028051f2cff284062da8666b55f3be
SHA1ba3f5f9065ecb57c0f1404d5e1751a9512844d1c
SHA25604ec519ce641c6986f15134d8c49fb1ccf21debab72b65e165cc8cb158ba7ec0
SHA512a100c9811c1e9a2e91be476d93569fb4275d218aab6b8688aed882e5d9acf543fc394d08fa2f8fe48a3bb4b89f86881c048891926aa546632980d469950542c8
-
Filesize
434KB
MD516028051f2cff284062da8666b55f3be
SHA1ba3f5f9065ecb57c0f1404d5e1751a9512844d1c
SHA25604ec519ce641c6986f15134d8c49fb1ccf21debab72b65e165cc8cb158ba7ec0
SHA512a100c9811c1e9a2e91be476d93569fb4275d218aab6b8688aed882e5d9acf543fc394d08fa2f8fe48a3bb4b89f86881c048891926aa546632980d469950542c8
-
Filesize
95KB
MD57f28547a6060699461824f75c96feaeb
SHA1744195a7d3ef1aa32dcb99d15f73e26a20813259
SHA256ba3b1b5a5e8a3f8c2564d2f90cfdf293a4f75fd366d7b8af12f809acdcac7bff
SHA512eb53cfc30d0a19fcbddcf36a3abc66860325d9ff029fd83e9363f9274b76f87ac444bc693f43031b5d2f4b53a594bc557036ce6dc31d052d467c75ccc1040239
-
Filesize
95KB
MD57f28547a6060699461824f75c96feaeb
SHA1744195a7d3ef1aa32dcb99d15f73e26a20813259
SHA256ba3b1b5a5e8a3f8c2564d2f90cfdf293a4f75fd366d7b8af12f809acdcac7bff
SHA512eb53cfc30d0a19fcbddcf36a3abc66860325d9ff029fd83e9363f9274b76f87ac444bc693f43031b5d2f4b53a594bc557036ce6dc31d052d467c75ccc1040239
-
Filesize
341KB
MD520e21e63bb7a95492aec18de6aa85ab9
SHA16cbf2079a42d86bf155c06c7ad5360c539c02b15
SHA25696a9eeeaa9aace1dd6eb0ba2789bb155b64f7c45dc9bcd34b8cd34a1f33e7d17
SHA51273eb9426827ba05a432d66d750b5988e4bb9c58b34de779163a61727c3df8d272ef455d5f27684f0054bb3af725106f1fadbae3afa3f1f6de655b8d947a82b33
-
Filesize
341KB
MD520e21e63bb7a95492aec18de6aa85ab9
SHA16cbf2079a42d86bf155c06c7ad5360c539c02b15
SHA25696a9eeeaa9aace1dd6eb0ba2789bb155b64f7c45dc9bcd34b8cd34a1f33e7d17
SHA51273eb9426827ba05a432d66d750b5988e4bb9c58b34de779163a61727c3df8d272ef455d5f27684f0054bb3af725106f1fadbae3afa3f1f6de655b8d947a82b33
-
Filesize
1.1MB
MD5a8eb605b301ac27461ce89d51a4d73ce
SHA1f3e2120787f20577963189b711567cc5d7b19d4e
SHA2567ed107b061c998c5c5c69d16282f63a64f65d46656cad2b98320ed3303b9fe61
SHA512372fbba38af7f4d571e8c22c773057e472ade25892268dc071cbfa0b18ebbf867c366f691033ad375f304b4d05735925c82bb1f82bc45e53400b31497813be6a
-
Filesize
878KB
MD581f73cb1cfdd7e05665558319383739a
SHA157cf7e16de71f0e650d419aa6d1a19b927f1f341
SHA256d009256cd67ec70100b56dc3527b3cc4e1014d949eaee781e3cf522a2ed50962
SHA51206de7b0d02414414812ffaf5d55ac9383539eb463394e1606b2bf4c71b8fe1ce6576aca557d4fb995f4a0a96fcd09d992c644035db6c4db4dd383a80d9aa919e
-
Filesize
878KB
MD581f73cb1cfdd7e05665558319383739a
SHA157cf7e16de71f0e650d419aa6d1a19b927f1f341
SHA256d009256cd67ec70100b56dc3527b3cc4e1014d949eaee781e3cf522a2ed50962
SHA51206de7b0d02414414812ffaf5d55ac9383539eb463394e1606b2bf4c71b8fe1ce6576aca557d4fb995f4a0a96fcd09d992c644035db6c4db4dd383a80d9aa919e
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
1019KB
MD554b5b4a61ef0849fffbab207685024bc
SHA1ba7304053409afa34b944cd1c35c8952ee947b9c
SHA25686c98f667d416fbfda91c64c7d23de54aa07633817a44a03a34d6747d8026e03
SHA512ad448ce0a959ca935093092f1edd6b2160ac66854d15650779ebbbb33f942be3c99c26c3c413ca45a556eba581b3a797bce48055899b17d9b088b812905b55f5
-
Filesize
1019KB
MD554b5b4a61ef0849fffbab207685024bc
SHA1ba7304053409afa34b944cd1c35c8952ee947b9c
SHA25686c98f667d416fbfda91c64c7d23de54aa07633817a44a03a34d6747d8026e03
SHA512ad448ce0a959ca935093092f1edd6b2160ac66854d15650779ebbbb33f942be3c99c26c3c413ca45a556eba581b3a797bce48055899b17d9b088b812905b55f5
-
Filesize
392KB
MD5e7eef6b325129ccf30083f0b398cbcb4
SHA1e1369d8e23ab1346024b46154c8e595c9b0f59bb
SHA256d60bb6917c907914c2af91f6c8fcc8815a08892c62250a7610bf68ca91035b66
SHA5126faa3b6e7d626bbf07f65bd68301781fe2d325dda8275422ff4a7cb3cf400c294175ec79e5fea1bf607752d0258b809ca2e38b8c461d6eea80dd054c16ea835e
-
Filesize
392KB
MD5e7eef6b325129ccf30083f0b398cbcb4
SHA1e1369d8e23ab1346024b46154c8e595c9b0f59bb
SHA256d60bb6917c907914c2af91f6c8fcc8815a08892c62250a7610bf68ca91035b66
SHA5126faa3b6e7d626bbf07f65bd68301781fe2d325dda8275422ff4a7cb3cf400c294175ec79e5fea1bf607752d0258b809ca2e38b8c461d6eea80dd054c16ea835e
-
Filesize
755KB
MD51dda36615a742816fcec5d26b881003e
SHA15e065e8bceadce3073ee9477918596c4f764d78d
SHA25667a2727bd55e73ebd1a98fe35126fd65f4831aeba3c9f1e7397029db45b53c29
SHA512796c1d116a459fb5401d9a9d9d8c51ce37a3ec882e854d67c4762a7d29ab016d8bddb68e5eed5f3f201fde76923ba58f58ef19e304e1706f97999e63b5a05c62
-
Filesize
755KB
MD51dda36615a742816fcec5d26b881003e
SHA15e065e8bceadce3073ee9477918596c4f764d78d
SHA25667a2727bd55e73ebd1a98fe35126fd65f4831aeba3c9f1e7397029db45b53c29
SHA512796c1d116a459fb5401d9a9d9d8c51ce37a3ec882e854d67c4762a7d29ab016d8bddb68e5eed5f3f201fde76923ba58f58ef19e304e1706f97999e63b5a05c62
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
689KB
MD51c4bdd7bf80eff0c2acb408df95cb06f
SHA12e048a38f5b264342a86fcf3b02fb46c65c6abab
SHA256cf82a0870007938b590368f4e0001652d3670d67210781e4d78b3344155ccefe
SHA512544dfcfb61af196e2baa0973359aae3fce6e3e3b775dfe603e703a22217d490cd1e3e1a3f536496d71e1d9c8d132f4c25991fa606e8b5be48b7967c9eac60a33
-
Filesize
689KB
MD51c4bdd7bf80eff0c2acb408df95cb06f
SHA12e048a38f5b264342a86fcf3b02fb46c65c6abab
SHA256cf82a0870007938b590368f4e0001652d3670d67210781e4d78b3344155ccefe
SHA512544dfcfb61af196e2baa0973359aae3fce6e3e3b775dfe603e703a22217d490cd1e3e1a3f536496d71e1d9c8d132f4c25991fa606e8b5be48b7967c9eac60a33
-
Filesize
572KB
MD5295b3c941d825cc4549de6ce9d341db5
SHA160601e2f850e1f4b4afd3b0096b7a72748e9b9d6
SHA256418d14d8100fde8cf67ba6a8cce2ec658e285b6e92635fcd0561d9783be2a3a1
SHA512790774ceefcf057a9a14b3269a2d92e5cb213e51973e14b59540cd328fd095634d3d0cebe804b15eaa7c5e2aa2e6f066589db67287231f002bc54324e6739b2f
-
Filesize
572KB
MD5295b3c941d825cc4549de6ce9d341db5
SHA160601e2f850e1f4b4afd3b0096b7a72748e9b9d6
SHA256418d14d8100fde8cf67ba6a8cce2ec658e285b6e92635fcd0561d9783be2a3a1
SHA512790774ceefcf057a9a14b3269a2d92e5cb213e51973e14b59540cd328fd095634d3d0cebe804b15eaa7c5e2aa2e6f066589db67287231f002bc54324e6739b2f
-
Filesize
514KB
MD57530f2ccc18a6324621adced0ee68876
SHA17233ceb1d7a3e5cbbb7093cb7b80209eac5a4a0f
SHA256a437917b5e3825475a319c42609cefdbf2ac6ad8eb8081e6cb51962e9134859a
SHA5120f49f056deb7c1f95a7d1c0c4667881f69d9e3f593fe979d4e4e49f7b6533335750082614d71923b2668d0897f0c3364b89460bb38d7b75f13ad78da084886b2
-
Filesize
514KB
MD57530f2ccc18a6324621adced0ee68876
SHA17233ceb1d7a3e5cbbb7093cb7b80209eac5a4a0f
SHA256a437917b5e3825475a319c42609cefdbf2ac6ad8eb8081e6cb51962e9134859a
SHA5120f49f056deb7c1f95a7d1c0c4667881f69d9e3f593fe979d4e4e49f7b6533335750082614d71923b2668d0897f0c3364b89460bb38d7b75f13ad78da084886b2
-
Filesize
248KB
MD51f06c0e120063a27f90542c3961b865b
SHA13ad854489eba6acf63ac04952dd25762c70c19f5
SHA256cfb4ac3a2068cc4df156b1591b21567629d7efac0f25ee53a123724c8444037e
SHA51263661d2915fbc1c7762ff3a6db93169d6fb5424ebebc869502b1ebacbd3501118185fa1732fe3ae01dbe48105a22c89364eec8c6cba3fae4ab00f3e6465c4663
-
Filesize
248KB
MD51f06c0e120063a27f90542c3961b865b
SHA13ad854489eba6acf63ac04952dd25762c70c19f5
SHA256cfb4ac3a2068cc4df156b1591b21567629d7efac0f25ee53a123724c8444037e
SHA51263661d2915fbc1c7762ff3a6db93169d6fb5424ebebc869502b1ebacbd3501118185fa1732fe3ae01dbe48105a22c89364eec8c6cba3fae4ab00f3e6465c4663
-
Filesize
340KB
MD59e912bb2ac3659395f5f7b67b168d6a7
SHA14ab3d23aa224fd17c1bfc2f32f740696cf6285c1
SHA256f418a2f37fbb7f9e99da6515c7358f773b6ff26ea1f6d887c994d129900662da
SHA512998e1d5a4f8960a8a0acb0a717567029957899f6060dbb59e7161cb0c4f8f5933f5d9df88d086e3d64c52694b1bc1ab760eacbdc848a256bcf43fb270b2b0c96
-
Filesize
340KB
MD59e912bb2ac3659395f5f7b67b168d6a7
SHA14ab3d23aa224fd17c1bfc2f32f740696cf6285c1
SHA256f418a2f37fbb7f9e99da6515c7358f773b6ff26ea1f6d887c994d129900662da
SHA512998e1d5a4f8960a8a0acb0a717567029957899f6060dbb59e7161cb0c4f8f5933f5d9df88d086e3d64c52694b1bc1ab760eacbdc848a256bcf43fb270b2b0c96
-
Filesize
319KB
MD5ab4b6c72595f291311b2deeaed4068e9
SHA1fe32b43812bff808079166843f1f85e4ad661bb2
SHA256bf1a734f05e325771a9facebc6c438f64fd00782ceef72f75adf96c2d0c75a28
SHA512c797982a4a07365cc428b30707d0f29d3bb8a9c2e5bffa9e1fe207905b25aec017e19d1bb8c65c05c560fa65a2c4031048efb7e8f868c81a15fa14321fb03051
-
Filesize
319KB
MD5ab4b6c72595f291311b2deeaed4068e9
SHA1fe32b43812bff808079166843f1f85e4ad661bb2
SHA256bf1a734f05e325771a9facebc6c438f64fd00782ceef72f75adf96c2d0c75a28
SHA512c797982a4a07365cc428b30707d0f29d3bb8a9c2e5bffa9e1fe207905b25aec017e19d1bb8c65c05c560fa65a2c4031048efb7e8f868c81a15fa14321fb03051
-
Filesize
229KB
MD52c6243c26fff422db889f0f9fef06534
SHA1620297f774c69b2f8438c53801e40f44d71dd877
SHA256aa40a30568d814bd890b464e727fe6a0352bcea4ed2401f9e7c65a28b9882950
SHA512b770fa1d0e6e8469bdb14007883d8b92d0237a40f7e8816340159ef9dc5e138128f47da82b9696b0f6686656e4715a8443a097c60175a29e77674df043d1873a
-
Filesize
229KB
MD52c6243c26fff422db889f0f9fef06534
SHA1620297f774c69b2f8438c53801e40f44d71dd877
SHA256aa40a30568d814bd890b464e727fe6a0352bcea4ed2401f9e7c65a28b9882950
SHA512b770fa1d0e6e8469bdb14007883d8b92d0237a40f7e8816340159ef9dc5e138128f47da82b9696b0f6686656e4715a8443a097c60175a29e77674df043d1873a
-
Filesize
358KB
MD5017bb8fbf2bf80d8f546232e8b2b428c
SHA1949ce9f550021aa8eae0231ccec0d7025bf7dabd
SHA256eaa32576cf879961f3d8ffafc84711d4b68cff6d850d673f33556438e82518d4
SHA51250d227a79934066dda134dcc39884a23fab4c4a7d0a56c67ed17966d9418254dc5a10af2c26a6d3a265ad080af2f4ad3d8edc655b2a7ec712e9a27e31eeed010
-
Filesize
358KB
MD5017bb8fbf2bf80d8f546232e8b2b428c
SHA1949ce9f550021aa8eae0231ccec0d7025bf7dabd
SHA256eaa32576cf879961f3d8ffafc84711d4b68cff6d850d673f33556438e82518d4
SHA51250d227a79934066dda134dcc39884a23fab4c4a7d0a56c67ed17966d9418254dc5a10af2c26a6d3a265ad080af2f4ad3d8edc655b2a7ec712e9a27e31eeed010
-
Filesize
180KB
MD553e28e07671d832a65fbfe3aa38b6678
SHA16f9ea0ed8109030511c2c09c848f66bd0d16d1e1
SHA2565c59db3277aefb761d4b814aaf5f5acd1fd1a0ea154dc565c78b082a3df4566e
SHA512053f8048230583e741c34f6714c9684ed1312c064cd0c81d99f09e20192b7ddecb53c9c55e4aceac774315315be7e13de98f2cea4e5487f2d9e9dfa2ce3979c9
-
Filesize
180KB
MD553e28e07671d832a65fbfe3aa38b6678
SHA16f9ea0ed8109030511c2c09c848f66bd0d16d1e1
SHA2565c59db3277aefb761d4b814aaf5f5acd1fd1a0ea154dc565c78b082a3df4566e
SHA512053f8048230583e741c34f6714c9684ed1312c064cd0c81d99f09e20192b7ddecb53c9c55e4aceac774315315be7e13de98f2cea4e5487f2d9e9dfa2ce3979c9
-
Filesize
180KB
MD553e28e07671d832a65fbfe3aa38b6678
SHA16f9ea0ed8109030511c2c09c848f66bd0d16d1e1
SHA2565c59db3277aefb761d4b814aaf5f5acd1fd1a0ea154dc565c78b082a3df4566e
SHA512053f8048230583e741c34f6714c9684ed1312c064cd0c81d99f09e20192b7ddecb53c9c55e4aceac774315315be7e13de98f2cea4e5487f2d9e9dfa2ce3979c9
-
Filesize
222KB
MD5ae9945041c030efd697cf2d2bace82ed
SHA1ca4dcf948e15510dc3cbcb78ed0f8afce2146d6a
SHA256d607bab1a1602e999cd7b9fb40ec2fa597b2e41c2e9621dca4ad15049a6d3b30
SHA51280b82db82e7e17c931c2174c210183cd4a958feb10c29e94c22997ad941fea9dab191b36d392631a633ae128f288cd3f6a521b7213538d625a407f814f715a70
-
Filesize
222KB
MD5ae9945041c030efd697cf2d2bace82ed
SHA1ca4dcf948e15510dc3cbcb78ed0f8afce2146d6a
SHA256d607bab1a1602e999cd7b9fb40ec2fa597b2e41c2e9621dca4ad15049a6d3b30
SHA51280b82db82e7e17c931c2174c210183cd4a958feb10c29e94c22997ad941fea9dab191b36d392631a633ae128f288cd3f6a521b7213538d625a407f814f715a70
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
273B
MD50c459e65bcc6d38574f0c0d63a87088a
SHA141e53d5f2b3e7ca859b842a1c7b677e0847e6d65
SHA256871c61d5f7051d6ddcf787e92e92d9c7e36747e64ea17b8cffccac549196abc4
SHA512be1ca1fa525dfea57bc14ba41d25fb904c8e4c1d5cb4a5981d3173143620fb8e08277c0dfc2287b792e365871cc6805034377060a84cfef81969cd3d3ba8f90d
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0