Analysis
-
max time kernel
151s -
max time network
161s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14/10/2023, 02:28
Static task
static1
Behavioral task
behavioral1
Sample
9330f9f0c77b4f474a4b98d2382811268c53ba598cf09b7f9a93b61f965bfc7c.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
9330f9f0c77b4f474a4b98d2382811268c53ba598cf09b7f9a93b61f965bfc7c.exe
Resource
win10v2004-20230915-en
General
-
Target
9330f9f0c77b4f474a4b98d2382811268c53ba598cf09b7f9a93b61f965bfc7c.exe
-
Size
1.3MB
-
MD5
593875f500bbf4580858ef939d6e6c38
-
SHA1
89cf3fa61f41bcc8dc6d955b25b52b3409ee899a
-
SHA256
9330f9f0c77b4f474a4b98d2382811268c53ba598cf09b7f9a93b61f965bfc7c
-
SHA512
37b011a21bd3fec163bc3ee263acf1cf87c0c978b4707e87d92d1c020e39b37e0162fdec1a057a517c56a133014f291ef277b5d38a68e80fa9fd6637452d32c3
-
SSDEEP
24576:siuBtZDI9WtTFL7JMnYqaF9hPjCcte0kvfETK00wISS7XJbcfF5AE9W6:7uBfAECYqaFflq500b7ZuT95
Malware Config
Extracted
amadey
3.89
http://77.91.68.52/mac/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explonde.exe
-
strings_key
916aae73606d7a9e02a1d3b47c199688
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
tako
77.91.124.82:19071
-
auth_value
16854b02cdb03e2ff7ae309c47b75f84
Extracted
redline
breha
77.91.124.55:19071
Extracted
redline
pixelscloud
85.209.176.171:80
Extracted
redline
@ytlogsbot
185.216.70.238:37515
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Detect Mystic stealer payload 6 IoCs
resource yara_rule behavioral1/memory/2796-87-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2796-88-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2796-89-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2796-91-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2796-93-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2796-99-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Detects Healer an antivirus disabler dropper 6 IoCs
resource yara_rule behavioral1/memory/2616-71-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral1/memory/2616-73-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral1/memory/2616-70-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral1/memory/2616-75-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral1/memory/2616-77-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral1/memory/2564-363-0x0000000000210000-0x000000000021A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 5065.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 5065.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 5065.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 5065.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 5065.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 11 IoCs
resource yara_rule behavioral1/memory/2412-135-0x0000000000400000-0x0000000000430000-memory.dmp family_redline behavioral1/memory/2412-136-0x0000000000400000-0x0000000000430000-memory.dmp family_redline behavioral1/memory/2412-138-0x0000000000400000-0x0000000000430000-memory.dmp family_redline behavioral1/memory/2412-149-0x0000000000400000-0x0000000000430000-memory.dmp family_redline behavioral1/memory/2412-142-0x0000000000400000-0x0000000000430000-memory.dmp family_redline behavioral1/memory/2180-271-0x0000000000220000-0x000000000027A000-memory.dmp family_redline behavioral1/memory/2340-309-0x0000000000400000-0x000000000043E000-memory.dmp family_redline behavioral1/memory/3048-323-0x0000000000130000-0x000000000014E000-memory.dmp family_redline behavioral1/memory/2484-340-0x0000000000F20000-0x0000000000F7A000-memory.dmp family_redline behavioral1/memory/2588-354-0x0000000000D70000-0x0000000000F5A000-memory.dmp family_redline behavioral1/memory/1092-361-0x0000000000400000-0x000000000043E000-memory.dmp family_redline -
SectopRAT payload 1 IoCs
resource yara_rule behavioral1/memory/3048-323-0x0000000000130000-0x000000000014E000-memory.dmp family_sectoprat -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 33 IoCs
pid Process 2180 z3439981.exe 2652 z5106446.exe 1148 z9125427.exe 2932 z5341759.exe 2760 q1109015.exe 1040 r1215803.exe 2604 s5291682.exe 884 t3698471.exe 1508 explonde.exe 2908 u5971905.exe 1616 w3918174.exe 2204 legota.exe 868 legota.exe 2168 explonde.exe 3044 4AB6.exe 1592 MM2oU6Qd.exe 1976 4C1E.exe 2148 vi4Gm0kP.exe 2768 4F5B.exe 2784 Dv1Pn2Wd.exe 2564 5065.exe 2608 ut9qK3JW.exe 2920 1EJ49RD9.exe 2956 518F.exe 2852 5A18.exe 2604 oneetx.exe 2180 76EC.exe 3048 AC3F.exe 2484 BDAD.exe 2588 CAD8.exe 296 oneetx.exe 2960 legota.exe 2456 explonde.exe -
Loads dropped DLL 55 IoCs
pid Process 2244 AppLaunch.exe 2180 z3439981.exe 2180 z3439981.exe 2652 z5106446.exe 2652 z5106446.exe 1148 z9125427.exe 1148 z9125427.exe 2932 z5341759.exe 2932 z5341759.exe 2760 q1109015.exe 2932 z5341759.exe 1040 r1215803.exe 1148 z9125427.exe 2604 s5291682.exe 2652 z5106446.exe 884 t3698471.exe 884 t3698471.exe 1508 explonde.exe 2180 z3439981.exe 2908 u5971905.exe 2244 AppLaunch.exe 1616 w3918174.exe 3044 4AB6.exe 3044 4AB6.exe 1592 MM2oU6Qd.exe 1592 MM2oU6Qd.exe 2148 vi4Gm0kP.exe 2148 vi4Gm0kP.exe 2784 Dv1Pn2Wd.exe 2784 Dv1Pn2Wd.exe 2608 ut9qK3JW.exe 2608 ut9qK3JW.exe 2608 ut9qK3JW.exe 2920 1EJ49RD9.exe 2852 5A18.exe 1696 WerFault.exe 1696 WerFault.exe 1696 WerFault.exe 1696 WerFault.exe 1048 WerFault.exe 1048 WerFault.exe 1048 WerFault.exe 108 WerFault.exe 108 WerFault.exe 108 WerFault.exe 1048 WerFault.exe 108 WerFault.exe 2300 rundll32.exe 2740 rundll32.exe 2740 rundll32.exe 2300 rundll32.exe 2300 rundll32.exe 2740 rundll32.exe 2300 rundll32.exe 2740 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution 1 TTPs
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features 5065.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 5065.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z3439981.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z5106446.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z5341759.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" MM2oU6Qd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP005.TMP\\\"" vi4Gm0kP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP006.TMP\\\"" Dv1Pn2Wd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" AppLaunch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z9125427.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" 4AB6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP007.TMP\\\"" ut9qK3JW.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 9 IoCs
description pid Process procid_target PID 1420 set thread context of 2244 1420 9330f9f0c77b4f474a4b98d2382811268c53ba598cf09b7f9a93b61f965bfc7c.exe 30 PID 2760 set thread context of 2616 2760 q1109015.exe 37 PID 1040 set thread context of 2796 1040 r1215803.exe 40 PID 2604 set thread context of 2896 2604 s5291682.exe 43 PID 2908 set thread context of 2412 2908 u5971905.exe 55 PID 1976 set thread context of 1816 1976 4C1E.exe 109 PID 2768 set thread context of 2340 2768 4F5B.exe 112 PID 2920 set thread context of 2388 2920 1EJ49RD9.exe 111 PID 2588 set thread context of 1092 2588 CAD8.exe 127 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 6 IoCs
pid pid_target Process procid_target 2884 2796 WerFault.exe 40 1696 1976 WerFault.exe 81 108 2768 WerFault.exe 86 1948 2388 WerFault.exe 111 1048 2920 WerFault.exe 91 2080 1816 WerFault.exe 109 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 108 schtasks.exe 2376 schtasks.exe 340 schtasks.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002bccc567d90a0b479b49b1b2d43318c300000000020000000000106600000001000020000000a7332e9d44dc85b4e9adb5ef8006e597c24cb601c2507891e0694b88d6e288b1000000000e8000000002000020000000f6e992c1ade5413ae6de287e9115ee24bb2ed913bb0d6aeb0e0b307bdc2c36e420000000f64201af980b8f31e8d9c74e6c87a2328af7df01b61d3483d43d31ac22ac679440000000fcaae8874d999976a33408d10be7566ed7821969797daabc59ec2ed6512f1bca7064623d868a3af43a1521ea4f3fc90f4cd962cf6157d2d6f8a23136b12804d1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d09323f6b6fed901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1F7CB091-6AAA-11EE-829B-7AF708EF84A9} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2896 AppLaunch.exe 2896 AppLaunch.exe 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1196 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2896 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeShutdownPrivilege 1196 Process not Found Token: SeDebugPrivilege 2616 AppLaunch.exe Token: SeShutdownPrivilege 1196 Process not Found Token: SeShutdownPrivilege 1196 Process not Found Token: SeShutdownPrivilege 1196 Process not Found Token: SeShutdownPrivilege 1196 Process not Found Token: SeShutdownPrivilege 1196 Process not Found Token: SeShutdownPrivilege 1196 Process not Found Token: SeShutdownPrivilege 1196 Process not Found Token: SeShutdownPrivilege 1196 Process not Found Token: SeShutdownPrivilege 1196 Process not Found Token: SeShutdownPrivilege 1196 Process not Found Token: SeDebugPrivilege 3048 AC3F.exe Token: SeShutdownPrivilege 1196 Process not Found Token: SeShutdownPrivilege 1196 Process not Found Token: SeShutdownPrivilege 1196 Process not Found Token: SeShutdownPrivilege 1196 Process not Found Token: SeShutdownPrivilege 1196 Process not Found Token: SeShutdownPrivilege 1196 Process not Found Token: SeShutdownPrivilege 1196 Process not Found Token: SeDebugPrivilege 2484 BDAD.exe Token: SeDebugPrivilege 2564 5065.exe Token: SeDebugPrivilege 1092 vbc.exe Token: SeShutdownPrivilege 1196 Process not Found -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 2852 5A18.exe 2552 iexplore.exe 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2552 iexplore.exe 2552 iexplore.exe 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1420 wrote to memory of 2500 1420 9330f9f0c77b4f474a4b98d2382811268c53ba598cf09b7f9a93b61f965bfc7c.exe 29 PID 1420 wrote to memory of 2500 1420 9330f9f0c77b4f474a4b98d2382811268c53ba598cf09b7f9a93b61f965bfc7c.exe 29 PID 1420 wrote to memory of 2500 1420 9330f9f0c77b4f474a4b98d2382811268c53ba598cf09b7f9a93b61f965bfc7c.exe 29 PID 1420 wrote to memory of 2500 1420 9330f9f0c77b4f474a4b98d2382811268c53ba598cf09b7f9a93b61f965bfc7c.exe 29 PID 1420 wrote to memory of 2500 1420 9330f9f0c77b4f474a4b98d2382811268c53ba598cf09b7f9a93b61f965bfc7c.exe 29 PID 1420 wrote to memory of 2500 1420 9330f9f0c77b4f474a4b98d2382811268c53ba598cf09b7f9a93b61f965bfc7c.exe 29 PID 1420 wrote to memory of 2500 1420 9330f9f0c77b4f474a4b98d2382811268c53ba598cf09b7f9a93b61f965bfc7c.exe 29 PID 1420 wrote to memory of 2244 1420 9330f9f0c77b4f474a4b98d2382811268c53ba598cf09b7f9a93b61f965bfc7c.exe 30 PID 1420 wrote to memory of 2244 1420 9330f9f0c77b4f474a4b98d2382811268c53ba598cf09b7f9a93b61f965bfc7c.exe 30 PID 1420 wrote to memory of 2244 1420 9330f9f0c77b4f474a4b98d2382811268c53ba598cf09b7f9a93b61f965bfc7c.exe 30 PID 1420 wrote to memory of 2244 1420 9330f9f0c77b4f474a4b98d2382811268c53ba598cf09b7f9a93b61f965bfc7c.exe 30 PID 1420 wrote to memory of 2244 1420 9330f9f0c77b4f474a4b98d2382811268c53ba598cf09b7f9a93b61f965bfc7c.exe 30 PID 1420 wrote to memory of 2244 1420 9330f9f0c77b4f474a4b98d2382811268c53ba598cf09b7f9a93b61f965bfc7c.exe 30 PID 1420 wrote to memory of 2244 1420 9330f9f0c77b4f474a4b98d2382811268c53ba598cf09b7f9a93b61f965bfc7c.exe 30 PID 1420 wrote to memory of 2244 1420 9330f9f0c77b4f474a4b98d2382811268c53ba598cf09b7f9a93b61f965bfc7c.exe 30 PID 1420 wrote to memory of 2244 1420 9330f9f0c77b4f474a4b98d2382811268c53ba598cf09b7f9a93b61f965bfc7c.exe 30 PID 1420 wrote to memory of 2244 1420 9330f9f0c77b4f474a4b98d2382811268c53ba598cf09b7f9a93b61f965bfc7c.exe 30 PID 1420 wrote to memory of 2244 1420 9330f9f0c77b4f474a4b98d2382811268c53ba598cf09b7f9a93b61f965bfc7c.exe 30 PID 1420 wrote to memory of 2244 1420 9330f9f0c77b4f474a4b98d2382811268c53ba598cf09b7f9a93b61f965bfc7c.exe 30 PID 1420 wrote to memory of 2244 1420 9330f9f0c77b4f474a4b98d2382811268c53ba598cf09b7f9a93b61f965bfc7c.exe 30 PID 1420 wrote to memory of 2244 1420 9330f9f0c77b4f474a4b98d2382811268c53ba598cf09b7f9a93b61f965bfc7c.exe 30 PID 2244 wrote to memory of 2180 2244 AppLaunch.exe 31 PID 2244 wrote to memory of 2180 2244 AppLaunch.exe 31 PID 2244 wrote to memory of 2180 2244 AppLaunch.exe 31 PID 2244 wrote to memory of 2180 2244 AppLaunch.exe 31 PID 2244 wrote to memory of 2180 2244 AppLaunch.exe 31 PID 2244 wrote to memory of 2180 2244 AppLaunch.exe 31 PID 2244 wrote to memory of 2180 2244 AppLaunch.exe 31 PID 2180 wrote to memory of 2652 2180 z3439981.exe 32 PID 2180 wrote to memory of 2652 2180 z3439981.exe 32 PID 2180 wrote to memory of 2652 2180 z3439981.exe 32 PID 2180 wrote to memory of 2652 2180 z3439981.exe 32 PID 2180 wrote to memory of 2652 2180 z3439981.exe 32 PID 2180 wrote to memory of 2652 2180 z3439981.exe 32 PID 2180 wrote to memory of 2652 2180 z3439981.exe 32 PID 2652 wrote to memory of 1148 2652 z5106446.exe 33 PID 2652 wrote to memory of 1148 2652 z5106446.exe 33 PID 2652 wrote to memory of 1148 2652 z5106446.exe 33 PID 2652 wrote to memory of 1148 2652 z5106446.exe 33 PID 2652 wrote to memory of 1148 2652 z5106446.exe 33 PID 2652 wrote to memory of 1148 2652 z5106446.exe 33 PID 2652 wrote to memory of 1148 2652 z5106446.exe 33 PID 1148 wrote to memory of 2932 1148 z9125427.exe 34 PID 1148 wrote to memory of 2932 1148 z9125427.exe 34 PID 1148 wrote to memory of 2932 1148 z9125427.exe 34 PID 1148 wrote to memory of 2932 1148 z9125427.exe 34 PID 1148 wrote to memory of 2932 1148 z9125427.exe 34 PID 1148 wrote to memory of 2932 1148 z9125427.exe 34 PID 1148 wrote to memory of 2932 1148 z9125427.exe 34 PID 2932 wrote to memory of 2760 2932 z5341759.exe 35 PID 2932 wrote to memory of 2760 2932 z5341759.exe 35 PID 2932 wrote to memory of 2760 2932 z5341759.exe 35 PID 2932 wrote to memory of 2760 2932 z5341759.exe 35 PID 2932 wrote to memory of 2760 2932 z5341759.exe 35 PID 2932 wrote to memory of 2760 2932 z5341759.exe 35 PID 2932 wrote to memory of 2760 2932 z5341759.exe 35 PID 2760 wrote to memory of 2616 2760 q1109015.exe 37 PID 2760 wrote to memory of 2616 2760 q1109015.exe 37 PID 2760 wrote to memory of 2616 2760 q1109015.exe 37 PID 2760 wrote to memory of 2616 2760 q1109015.exe 37 PID 2760 wrote to memory of 2616 2760 q1109015.exe 37 PID 2760 wrote to memory of 2616 2760 q1109015.exe 37 PID 2760 wrote to memory of 2616 2760 q1109015.exe 37 PID 2760 wrote to memory of 2616 2760 q1109015.exe 37 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\9330f9f0c77b4f474a4b98d2382811268c53ba598cf09b7f9a93b61f965bfc7c.exe"C:\Users\Admin\AppData\Local\Temp\9330f9f0c77b4f474a4b98d2382811268c53ba598cf09b7f9a93b61f965bfc7c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:2500
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3439981.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3439981.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5106446.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5106446.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9125427.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9125427.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z5341759.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z5341759.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1109015.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1109015.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious use of AdjustPrivilegeToken
PID:2616
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r1215803.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r1215803.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1040 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵PID:2796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2796 -s 2689⤵
- Program crash
PID:2884
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s5291682.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s5291682.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2604 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2896
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t3698471.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t3698471.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:884 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1508 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explonde.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe" /F7⤵
- Creates scheduled task(s)
PID:108
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explonde.exe" /P "Admin:N"&&CACLS "explonde.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit7⤵PID:2276
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:N"8⤵PID:1696
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:1208
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:R" /E8⤵PID:312
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:2164
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"8⤵PID:1604
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E8⤵PID:1028
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:2740
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u5971905.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u5971905.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2908 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:2412
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w3918174.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w3918174.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Executes dropped EXE
PID:2204 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
PID:2376
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵PID:1312
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:2388
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵PID:1856
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵PID:1940
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:2072
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵PID:3028
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵PID:2264
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
PID:2300
-
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {82AFD19E-706D-4FCD-A50A-F6919A0A6BE2} S-1-5-21-607259312-1573743425-2763420908-1000:NGTQGRML\Admin:Interactive:[1]1⤵PID:544
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe2⤵
- Executes dropped EXE
PID:868
-
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe2⤵
- Executes dropped EXE
PID:2168
-
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe2⤵
- Executes dropped EXE
PID:2960
-
-
C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exeC:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe2⤵
- Executes dropped EXE
PID:296
-
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe2⤵
- Executes dropped EXE
PID:2456
-
-
C:\Users\Admin\AppData\Local\Temp\4AB6.exeC:\Users\Admin\AppData\Local\Temp\4AB6.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\MM2oU6Qd.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\MM2oU6Qd.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\vi4Gm0kP.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\vi4Gm0kP.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\Dv1Pn2Wd.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\Dv1Pn2Wd.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\IXP006.TMP\ut9qK3JW.exeC:\Users\Admin\AppData\Local\Temp\IXP006.TMP\ut9qK3JW.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\IXP007.TMP\1EJ49RD9.exeC:\Users\Admin\AppData\Local\Temp\IXP007.TMP\1EJ49RD9.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2920 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:2388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2388 -s 2688⤵
- Program crash
PID:1948
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2920 -s 2687⤵
- Loads dropped DLL
- Program crash
PID:1048
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\4C1E.exeC:\Users\Admin\AppData\Local\Temp\4C1E.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1976 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:1816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1816 -s 1963⤵
- Program crash
PID:2080
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1976 -s 922⤵
- Loads dropped DLL
- Program crash
PID:1696
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\4D67.bat" "1⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\4F5B.exeC:\Users\Admin\AppData\Local\Temp\4F5B.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2768 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:2340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2768 -s 922⤵
- Loads dropped DLL
- Program crash
PID:108
-
-
C:\Users\Admin\AppData\Local\Temp\5065.exeC:\Users\Admin\AppData\Local\Temp\5065.exe1⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious use of AdjustPrivilegeToken
PID:2564
-
C:\Users\Admin\AppData\Local\Temp\518F.exeC:\Users\Admin\AppData\Local\Temp\518F.exe1⤵
- Executes dropped EXE
PID:2956
-
C:\Users\Admin\AppData\Local\Temp\5A18.exeC:\Users\Admin\AppData\Local\Temp\5A18.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe"2⤵
- Executes dropped EXE
PID:2604 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe" /F3⤵
- Creates scheduled task(s)
PID:340
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\207aa4515d" /P "Admin:N"&&CACLS "..\207aa4515d" /P "Admin:R" /E&&Exit3⤵PID:2528
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"4⤵PID:1736
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E4⤵PID:2880
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\207aa4515d" /P "Admin:R" /E4⤵PID:2632
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\207aa4515d" /P "Admin:N"4⤵PID:2840
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:1668
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:1728
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\76EC.exeC:\Users\Admin\AppData\Local\Temp\76EC.exe1⤵
- Executes dropped EXE
PID:2180 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=76EC.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.02⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2552 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2552 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2216
-
-
-
C:\Users\Admin\AppData\Local\Temp\AC3F.exeC:\Users\Admin\AppData\Local\Temp\AC3F.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3048
-
C:\Users\Admin\AppData\Local\Temp\BDAD.exeC:\Users\Admin\AppData\Local\Temp\BDAD.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2484
-
C:\Users\Admin\AppData\Local\Temp\CAD8.exeC:\Users\Admin\AppData\Local\Temp\CAD8.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2588 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1092
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
4Scripting
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffb27f541b4ef232905217ee641e1bf7
SHA11daefed0f997703a58043767381b1d6378cdda62
SHA2568037f3fb801e6858edb71fb43bc261246543be70d2ab182b151aa30107adfcbf
SHA51283046e7ac8c05e54f72d97156277bba0c8295f347adfe41f82fe0fe8509e6a403399972d503c9934f3a7dd26d55d562b42261dd7348b0f71e0eef670626d335e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57883034e63542b0fb2f8e443868312e2
SHA1675d7a66bc8f4b03d900f1ab8fcb42d0a9002a9b
SHA2563a407f5d1b66b6136f41ea61603b3909b8624f8a98ea6efced9d122d38718810
SHA5127a7e19b17cdb7c677153d90d12489b590cbd8cfb030ac4e388e55a0d6e08e91c9bead610bac09fc923caf1483c800f7266a6385bfa08b21a0adaf1f379caef90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5faf7cd38ea6087ef6f712e07f7a27d50
SHA15dc79ac92217c58fcd89aa54a76b3d4241d8bb5a
SHA2561259ba572baa28b94c664c22d2130fe02f44bc01b5a75df197ed6a32dc76c444
SHA512895c610e4b711a8a8795cd72856b17e37bcb425f8e98e72ae9386b05a8a509b95da4fb4a832e23d3207e34e93e195ec53ea3530f09be8be79e97742678cf3435
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e24d03b709489df13c6a8c59b6540aa4
SHA1747f0685dcc1c143f4aea231d31b7dc7159ddc3f
SHA25652bff84ba9573df4c45dc8de2784f9d9e2849a4335fc614f79634298b344390c
SHA51234e404504f038c3c53ca8226c6fa49c1955fc400333e5e60aa145fc09f80fdfd6cdfafcd97891fecd9f1ef7e647d06bca9c1727e0db77d43df87bc172881a153
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b63d6e785d447c394c390cf908ed053
SHA16ac9fcc2dbf63eeddcda170c7a29c68116629ba2
SHA2560399448f699fd3d4a9601e68606badbf144cfff6abd441f980f3cb9260f0fbe7
SHA512d4089e2093494fea29ba823f553692145ecc726f943ebf3aa120473e88acf24d1d6b47322cbe407fd35f40ddb2f1914710ae7617e8f83e049503c090cf9a647a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5705f2af30528c57c57235daffbe367d5
SHA14bc2552c51c5e3eb1df9ebce671e6a98c867663f
SHA256f60942b245b407f6c2ecd9847e87cda2ce7a40ca1d38c926d82745ea702c4a97
SHA51212c87f417ef9c0e162b4143dfd0f1a7294f7d14e448cee90ae26df2a8bc0c3213a1e8a28da1ab398c22bc7e533f56d4234ea37cc9089226b559f25d3f7790103
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa6ebd82923a66f62ce91a43d5c12f7a
SHA1a4a43f79dcbb6c26854836873f94dea716e66d51
SHA256015cf18b6ccad78ed9ea92d97f0c41fda647bbea3004a67f2ccb8d561e40a9d4
SHA5124801fc5e26064e99a0692163154be56d29e2737360ca9240840ce8cc12ed27c2148e7e16aee59483f784144701b6f4cabafd4a9ef78b7cdb82f947bb418d6eeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56fa7fb2e81d598e644d1d40b24ca38ef
SHA154da44d1a56ce545857b5974ca0453bd317159d5
SHA256e69331a0c6854a8c85dd51c6d51d1c1da181677c9afb3fe0dc9c3f252fd7ff6b
SHA512c4e105cac10f944d1ec1d222b99ca6954a7b61a05e1f2c802c29e86b49452e02ce82f02ce1bc0ad45a2fa3e3b59c5d0b754f4e3f0f26fa519b54fbe63881dcb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502b23fdc534dc177b96e2027e1b2a348
SHA1cee88d4de2d69a8ace174fd2032b8927c3c73148
SHA256279bbd889bf6626df17dcca77b04bf32a80b900b5c8e157d6af4148ca383d70b
SHA512d02d5fae72ee78093f6b0684621810291e8336570aaafcaeecffb34396818e086e7362606611ab6212d5a7b52482d197c7e5694cbf428e22c48b5d8e4c260fa1
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
1.1MB
MD560f1b03512cc232799f78e3c10d45166
SHA1d2a41bbbf15d4d3eb0a4e23c14d1a24dcae2677e
SHA256dff819f7dd3305841256a52252b454fe71d4a74c92582d22c63283a6ecbf5080
SHA512fbbf117845bbdb62e5b166ad493ade0eaced1ebaf8017dbc5bacffd93bfed09091797206b6d78505c21e0791e15d6cb9806781188ba6a29eecd139ce10f861e2
-
Filesize
1.1MB
MD560f1b03512cc232799f78e3c10d45166
SHA1d2a41bbbf15d4d3eb0a4e23c14d1a24dcae2677e
SHA256dff819f7dd3305841256a52252b454fe71d4a74c92582d22c63283a6ecbf5080
SHA512fbbf117845bbdb62e5b166ad493ade0eaced1ebaf8017dbc5bacffd93bfed09091797206b6d78505c21e0791e15d6cb9806781188ba6a29eecd139ce10f861e2
-
Filesize
298KB
MD5b51208368de3010e050d25a4bafe7e37
SHA1c981fd3f9bd82bac57af389ee889b977bd297101
SHA25698a1b9c5fa3628e14bccd66ab4396bc050b7c15f4f87c505ba0c10a51ba1703b
SHA5124b64391775dbd110c0f8deac7121f48ae116fbb2687eb1c76a63ad6438d4dd685e97b53b2bd89f257ba9a1afdc1e5a5b5008b08bf090fa222bbee92df1676eeb
-
Filesize
298KB
MD5b51208368de3010e050d25a4bafe7e37
SHA1c981fd3f9bd82bac57af389ee889b977bd297101
SHA25698a1b9c5fa3628e14bccd66ab4396bc050b7c15f4f87c505ba0c10a51ba1703b
SHA5124b64391775dbd110c0f8deac7121f48ae116fbb2687eb1c76a63ad6438d4dd685e97b53b2bd89f257ba9a1afdc1e5a5b5008b08bf090fa222bbee92df1676eeb
-
Filesize
79B
MD5403991c4d18ac84521ba17f264fa79f2
SHA1850cc068de0963854b0fe8f485d951072474fd45
SHA256ef6e942aefe925fefac19fa816986ea25de6935c4f377c717e29b94e65f9019f
SHA512a20aaa77065d30195e5893f2ff989979383c8d7f82d9e528d4833b1c1236aef4f85284f5250d0f190a174790b650280ffe1fbff7e00c98024ccf5ca746e5b576
-
Filesize
79B
MD5403991c4d18ac84521ba17f264fa79f2
SHA1850cc068de0963854b0fe8f485d951072474fd45
SHA256ef6e942aefe925fefac19fa816986ea25de6935c4f377c717e29b94e65f9019f
SHA512a20aaa77065d30195e5893f2ff989979383c8d7f82d9e528d4833b1c1236aef4f85284f5250d0f190a174790b650280ffe1fbff7e00c98024ccf5ca746e5b576
-
Filesize
339KB
MD55602040bea3504fefab3ea4b09ff2c2a
SHA1853c3e1994984d22d6daf9f344b50dba276ef456
SHA256b437af35bb50dc89f824c302a107a4db1bcef655e5f4451a2a21cdc5d2b57221
SHA512a4ed87568569dd0b8bcddd2557c73cac7c0f2cf5f94abfc88ccb6bcf7e2a94181bdaa69efaf0021e3cc580e925778cda24902e1a99b0f60a2737b12f001aff63
-
Filesize
339KB
MD55602040bea3504fefab3ea4b09ff2c2a
SHA1853c3e1994984d22d6daf9f344b50dba276ef456
SHA256b437af35bb50dc89f824c302a107a4db1bcef655e5f4451a2a21cdc5d2b57221
SHA512a4ed87568569dd0b8bcddd2557c73cac7c0f2cf5f94abfc88ccb6bcf7e2a94181bdaa69efaf0021e3cc580e925778cda24902e1a99b0f60a2737b12f001aff63
-
Filesize
430KB
MD57eecd42ad359759986f6f0f79862bf16
SHA12b60f8e46f456af709207b805de1f90f5e3b5fc4
SHA25630499d8288a38c428dd0f99390955f1ae753210c382d58b86f29030fbdb04625
SHA512e05cba6e7b07db297d666ad908a5a7c749d2a62b511973be62cc0a812763fcdecc3c4bd2933c905831245a9d3ce64767cbf59136c5b26bee635b367c06e52597
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
990KB
MD567e6202eafd98d5498b92a1edda494a6
SHA1b853b81e3318fcbbf470eadf3c7f3ea0d455dc9e
SHA256bb7b7cc59021a91127ec834aa44ec4c2cdb347b5337eddf7a64daf81e4c54578
SHA51223db72689a88435fae7d815da4d0133284ecf3acb5fc7ff4c62e4dd5e574ebce517e1c8fa98d6d9789068fd871d996fda5f934fd2e8290f1d304d59808523e92
-
Filesize
990KB
MD567e6202eafd98d5498b92a1edda494a6
SHA1b853b81e3318fcbbf470eadf3c7f3ea0d455dc9e
SHA256bb7b7cc59021a91127ec834aa44ec4c2cdb347b5337eddf7a64daf81e4c54578
SHA51223db72689a88435fae7d815da4d0133284ecf3acb5fc7ff4c62e4dd5e574ebce517e1c8fa98d6d9789068fd871d996fda5f934fd2e8290f1d304d59808523e92
-
Filesize
376KB
MD57b8d63576ff72a0af7094015be8aaa33
SHA17279901572536a266ecc6d4322e9cd1bf18b87dd
SHA2565f09584dfce0ab62739e5ebf311f3c5e036b1d59666dbc6b2de0f04d5d643f59
SHA5127c49ab8f1f6386cc6bc40d700dba7f3dfbe9dcfa4f4754de48cef4d92317c8d6b8fc13056af57721849204f9113cbb46ea475de6525ed4016ff53bc3c55a99d1
-
Filesize
376KB
MD57b8d63576ff72a0af7094015be8aaa33
SHA17279901572536a266ecc6d4322e9cd1bf18b87dd
SHA2565f09584dfce0ab62739e5ebf311f3c5e036b1d59666dbc6b2de0f04d5d643f59
SHA5127c49ab8f1f6386cc6bc40d700dba7f3dfbe9dcfa4f4754de48cef4d92317c8d6b8fc13056af57721849204f9113cbb46ea475de6525ed4016ff53bc3c55a99d1
-
Filesize
734KB
MD5c3e64609979036fff22f16270d0bdc2f
SHA12741ebc462f354ba8373cde676a4ecdd8b7b99e3
SHA256cf034dd8cb80604dac71796ad8daf90bd73e69d16b124c113699dcde911882b8
SHA512d039f4ccd9b4aa51fcd9ea4bf1531a6a2a106feeb12cec948b29c40d95137ecc14f7b4d2b3bfbb01e0e088b8c1aea0c5d9d7fc765ae7dda790e9632dbfc31cc0
-
Filesize
734KB
MD5c3e64609979036fff22f16270d0bdc2f
SHA12741ebc462f354ba8373cde676a4ecdd8b7b99e3
SHA256cf034dd8cb80604dac71796ad8daf90bd73e69d16b124c113699dcde911882b8
SHA512d039f4ccd9b4aa51fcd9ea4bf1531a6a2a106feeb12cec948b29c40d95137ecc14f7b4d2b3bfbb01e0e088b8c1aea0c5d9d7fc765ae7dda790e9632dbfc31cc0
-
Filesize
1009KB
MD55b2d8b2d45a97e1edbd3173789e0862b
SHA1daa181d08851bd68a3133b659fc4063e9a19d13c
SHA256902e6dbef5c456f036a4915adeaeaf19eecf3be76f25a7cac8efe8153192b36e
SHA51232eba12314695264c47af1198c952c414dbfe59c094df555524cfbc39829e9e33f160ef64808ab5302b1bb6316ee4a00e04de4106ca8618dadcec88e4c04f916
-
Filesize
1009KB
MD55b2d8b2d45a97e1edbd3173789e0862b
SHA1daa181d08851bd68a3133b659fc4063e9a19d13c
SHA256902e6dbef5c456f036a4915adeaeaf19eecf3be76f25a7cac8efe8153192b36e
SHA51232eba12314695264c47af1198c952c414dbfe59c094df555524cfbc39829e9e33f160ef64808ab5302b1bb6316ee4a00e04de4106ca8618dadcec88e4c04f916
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
551KB
MD5caf2831a7b0b49adfc06a1c7c8577c50
SHA1af7c1779e3a0c3f456ed08527f6545b6f5d51ab0
SHA25699308691cbf084e708f5dc98201fb3c3e5bff256a1dcf8996f650b6ce747dd03
SHA51260c6ab42c9630451192592ce9e5f97b124f9bf0f5cfdc1feb0f524320f05ed9d9047fa3ff0e0d4fb3d6ca0f7ac0a2fcaffd459a1c8ca5792f40837b69d7e42a4
-
Filesize
551KB
MD5caf2831a7b0b49adfc06a1c7c8577c50
SHA1af7c1779e3a0c3f456ed08527f6545b6f5d51ab0
SHA25699308691cbf084e708f5dc98201fb3c3e5bff256a1dcf8996f650b6ce747dd03
SHA51260c6ab42c9630451192592ce9e5f97b124f9bf0f5cfdc1feb0f524320f05ed9d9047fa3ff0e0d4fb3d6ca0f7ac0a2fcaffd459a1c8ca5792f40837b69d7e42a4
-
Filesize
232KB
MD5b39c1c0c057debaa714830bed1cbb5e7
SHA13bd842331b8d066b2ba6743fab677d57dc37ea76
SHA25635f86d86ca741bea9015f75bd47a2fe724805283ae7a8968c5d953228ac5ac16
SHA5127b84152d83f4196842bff3dee37e51ef64cd92bffdc3ac0e3cffe429a32ef57913a5f78a42a1502abbacc5b3c7f020cd01b7f8288b696dc954378b22597c7ded
-
Filesize
232KB
MD5b39c1c0c057debaa714830bed1cbb5e7
SHA13bd842331b8d066b2ba6743fab677d57dc37ea76
SHA25635f86d86ca741bea9015f75bd47a2fe724805283ae7a8968c5d953228ac5ac16
SHA5127b84152d83f4196842bff3dee37e51ef64cd92bffdc3ac0e3cffe429a32ef57913a5f78a42a1502abbacc5b3c7f020cd01b7f8288b696dc954378b22597c7ded
-
Filesize
819KB
MD53befbb820676b725ef765d9a7871569c
SHA13ed095865b0ca2330275439567eea65c2f37955c
SHA256b9c3c7b8311c12e8dc97f77f1fa855be4a54623240c6469d17240283f363ef2b
SHA5124f7171608528715a10ae47df66ccb97922a0ff1ba6587f88d2f38a0f7921dd08f220d46c2432c014bfb2150c9e41d814af153eeddb25ba8632446fb4226e95ec
-
Filesize
819KB
MD53befbb820676b725ef765d9a7871569c
SHA13ed095865b0ca2330275439567eea65c2f37955c
SHA256b9c3c7b8311c12e8dc97f77f1fa855be4a54623240c6469d17240283f363ef2b
SHA5124f7171608528715a10ae47df66ccb97922a0ff1ba6587f88d2f38a0f7921dd08f220d46c2432c014bfb2150c9e41d814af153eeddb25ba8632446fb4226e95ec
-
Filesize
328KB
MD5fdd37f558da14a9392c4a50c1ad1edcb
SHA15ccb1549a52add56684b29c9d1d816fc978f16e5
SHA2563b6cb31a522b34c6c8f54e11664775e15c650762c813c54dbbee02c578cc33e3
SHA512810846ea82863c905f6712d8f4359800f9af2e733d940c22da87add5c29bb1398f73149901e692b6915f5107855fc385bfbd28fd2264f29102d666ef6de4c23b
-
Filesize
328KB
MD5fdd37f558da14a9392c4a50c1ad1edcb
SHA15ccb1549a52add56684b29c9d1d816fc978f16e5
SHA2563b6cb31a522b34c6c8f54e11664775e15c650762c813c54dbbee02c578cc33e3
SHA512810846ea82863c905f6712d8f4359800f9af2e733d940c22da87add5c29bb1398f73149901e692b6915f5107855fc385bfbd28fd2264f29102d666ef6de4c23b
-
Filesize
213KB
MD53449a2fe589c42a66fc07716ea1e0d81
SHA115cb764875185ecca838cd1ca19e8e39b6b8b396
SHA2560640d8b64d282ce490de79e76c72fc938a1560106efba4247a1514111cfe73d2
SHA51299e29ea8d35716003abb10e0fc3dc8669eec8a4515975aca9b46790c36fa27f34c5ff37fb3fd4e624820c08f86c1c35e4054df17cd7bd0c53584c1c97c19d66e
-
Filesize
213KB
MD53449a2fe589c42a66fc07716ea1e0d81
SHA115cb764875185ecca838cd1ca19e8e39b6b8b396
SHA2560640d8b64d282ce490de79e76c72fc938a1560106efba4247a1514111cfe73d2
SHA51299e29ea8d35716003abb10e0fc3dc8669eec8a4515975aca9b46790c36fa27f34c5ff37fb3fd4e624820c08f86c1c35e4054df17cd7bd0c53584c1c97c19d66e
-
Filesize
342KB
MD527990feea5ecb1fcf26300ea89d1d9fc
SHA118802f50ee23ee8e553573c01405565a7fff6626
SHA2563bc69e5e22ea6cdd4994115009424dfb1f5ea2514aad489605115e2015b33410
SHA512c03794f429af531af936a644d770fbed26f389eb64a63ac7b662a22ceef9f621929d45e362a3cf5986b6a301b7a211d0a6dbe5bb1649ea872ec233ca56ce8ed0
-
Filesize
342KB
MD527990feea5ecb1fcf26300ea89d1d9fc
SHA118802f50ee23ee8e553573c01405565a7fff6626
SHA2563bc69e5e22ea6cdd4994115009424dfb1f5ea2514aad489605115e2015b33410
SHA512c03794f429af531af936a644d770fbed26f389eb64a63ac7b662a22ceef9f621929d45e362a3cf5986b6a301b7a211d0a6dbe5bb1649ea872ec233ca56ce8ed0
-
Filesize
584KB
MD5ab0116e8fc430555bd5b6a7c7c89b5a3
SHA11364d841a4cb1aac3591cfdb36a1a744a05a2729
SHA256e54a0107ef302b89f1e6609aba2dbaf622755d8bd0e8ed8b95544114a13e44f0
SHA5124d46bdb42325c92ab82ba57247dd615bb3f0a092e679498f384374ea0c5c2820260fc3d6bde8db8d43a4aca62e8fd7f3a28c2c49b82f97676dd635ae9805a908
-
Filesize
298KB
MD5d2d7bdbf6cc6bdc2c6050a44328e4571
SHA163fd42947cf177647441d6b64fb3ebc2e5cf2eb0
SHA256b57ce7423ba02dc1f8be41497ad6ead13c36d062717cce7f99a27a64ea448aa9
SHA512c51a9a78ada02d68d5e3ee9e6eb9d7df0db7644e87034dfbd978402b403f54914a35a2be38662cbe77e1ba2f0e3487ef7b8b261b4481970fba0055e3466c67e3
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
273B
MD50c459e65bcc6d38574f0c0d63a87088a
SHA141e53d5f2b3e7ca859b842a1c7b677e0847e6d65
SHA256871c61d5f7051d6ddcf787e92e92d9c7e36747e64ea17b8cffccac549196abc4
SHA512be1ca1fa525dfea57bc14ba41d25fb904c8e4c1d5cb4a5981d3173143620fb8e08277c0dfc2287b792e365871cc6805034377060a84cfef81969cd3d3ba8f90d
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0
-
Filesize
1.1MB
MD560f1b03512cc232799f78e3c10d45166
SHA1d2a41bbbf15d4d3eb0a4e23c14d1a24dcae2677e
SHA256dff819f7dd3305841256a52252b454fe71d4a74c92582d22c63283a6ecbf5080
SHA512fbbf117845bbdb62e5b166ad493ade0eaced1ebaf8017dbc5bacffd93bfed09091797206b6d78505c21e0791e15d6cb9806781188ba6a29eecd139ce10f861e2
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
990KB
MD567e6202eafd98d5498b92a1edda494a6
SHA1b853b81e3318fcbbf470eadf3c7f3ea0d455dc9e
SHA256bb7b7cc59021a91127ec834aa44ec4c2cdb347b5337eddf7a64daf81e4c54578
SHA51223db72689a88435fae7d815da4d0133284ecf3acb5fc7ff4c62e4dd5e574ebce517e1c8fa98d6d9789068fd871d996fda5f934fd2e8290f1d304d59808523e92
-
Filesize
990KB
MD567e6202eafd98d5498b92a1edda494a6
SHA1b853b81e3318fcbbf470eadf3c7f3ea0d455dc9e
SHA256bb7b7cc59021a91127ec834aa44ec4c2cdb347b5337eddf7a64daf81e4c54578
SHA51223db72689a88435fae7d815da4d0133284ecf3acb5fc7ff4c62e4dd5e574ebce517e1c8fa98d6d9789068fd871d996fda5f934fd2e8290f1d304d59808523e92
-
Filesize
376KB
MD57b8d63576ff72a0af7094015be8aaa33
SHA17279901572536a266ecc6d4322e9cd1bf18b87dd
SHA2565f09584dfce0ab62739e5ebf311f3c5e036b1d59666dbc6b2de0f04d5d643f59
SHA5127c49ab8f1f6386cc6bc40d700dba7f3dfbe9dcfa4f4754de48cef4d92317c8d6b8fc13056af57721849204f9113cbb46ea475de6525ed4016ff53bc3c55a99d1
-
Filesize
376KB
MD57b8d63576ff72a0af7094015be8aaa33
SHA17279901572536a266ecc6d4322e9cd1bf18b87dd
SHA2565f09584dfce0ab62739e5ebf311f3c5e036b1d59666dbc6b2de0f04d5d643f59
SHA5127c49ab8f1f6386cc6bc40d700dba7f3dfbe9dcfa4f4754de48cef4d92317c8d6b8fc13056af57721849204f9113cbb46ea475de6525ed4016ff53bc3c55a99d1
-
Filesize
734KB
MD5c3e64609979036fff22f16270d0bdc2f
SHA12741ebc462f354ba8373cde676a4ecdd8b7b99e3
SHA256cf034dd8cb80604dac71796ad8daf90bd73e69d16b124c113699dcde911882b8
SHA512d039f4ccd9b4aa51fcd9ea4bf1531a6a2a106feeb12cec948b29c40d95137ecc14f7b4d2b3bfbb01e0e088b8c1aea0c5d9d7fc765ae7dda790e9632dbfc31cc0
-
Filesize
734KB
MD5c3e64609979036fff22f16270d0bdc2f
SHA12741ebc462f354ba8373cde676a4ecdd8b7b99e3
SHA256cf034dd8cb80604dac71796ad8daf90bd73e69d16b124c113699dcde911882b8
SHA512d039f4ccd9b4aa51fcd9ea4bf1531a6a2a106feeb12cec948b29c40d95137ecc14f7b4d2b3bfbb01e0e088b8c1aea0c5d9d7fc765ae7dda790e9632dbfc31cc0
-
Filesize
1009KB
MD55b2d8b2d45a97e1edbd3173789e0862b
SHA1daa181d08851bd68a3133b659fc4063e9a19d13c
SHA256902e6dbef5c456f036a4915adeaeaf19eecf3be76f25a7cac8efe8153192b36e
SHA51232eba12314695264c47af1198c952c414dbfe59c094df555524cfbc39829e9e33f160ef64808ab5302b1bb6316ee4a00e04de4106ca8618dadcec88e4c04f916
-
Filesize
1009KB
MD55b2d8b2d45a97e1edbd3173789e0862b
SHA1daa181d08851bd68a3133b659fc4063e9a19d13c
SHA256902e6dbef5c456f036a4915adeaeaf19eecf3be76f25a7cac8efe8153192b36e
SHA51232eba12314695264c47af1198c952c414dbfe59c094df555524cfbc39829e9e33f160ef64808ab5302b1bb6316ee4a00e04de4106ca8618dadcec88e4c04f916
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
551KB
MD5caf2831a7b0b49adfc06a1c7c8577c50
SHA1af7c1779e3a0c3f456ed08527f6545b6f5d51ab0
SHA25699308691cbf084e708f5dc98201fb3c3e5bff256a1dcf8996f650b6ce747dd03
SHA51260c6ab42c9630451192592ce9e5f97b124f9bf0f5cfdc1feb0f524320f05ed9d9047fa3ff0e0d4fb3d6ca0f7ac0a2fcaffd459a1c8ca5792f40837b69d7e42a4
-
Filesize
551KB
MD5caf2831a7b0b49adfc06a1c7c8577c50
SHA1af7c1779e3a0c3f456ed08527f6545b6f5d51ab0
SHA25699308691cbf084e708f5dc98201fb3c3e5bff256a1dcf8996f650b6ce747dd03
SHA51260c6ab42c9630451192592ce9e5f97b124f9bf0f5cfdc1feb0f524320f05ed9d9047fa3ff0e0d4fb3d6ca0f7ac0a2fcaffd459a1c8ca5792f40837b69d7e42a4
-
Filesize
232KB
MD5b39c1c0c057debaa714830bed1cbb5e7
SHA13bd842331b8d066b2ba6743fab677d57dc37ea76
SHA25635f86d86ca741bea9015f75bd47a2fe724805283ae7a8968c5d953228ac5ac16
SHA5127b84152d83f4196842bff3dee37e51ef64cd92bffdc3ac0e3cffe429a32ef57913a5f78a42a1502abbacc5b3c7f020cd01b7f8288b696dc954378b22597c7ded
-
Filesize
232KB
MD5b39c1c0c057debaa714830bed1cbb5e7
SHA13bd842331b8d066b2ba6743fab677d57dc37ea76
SHA25635f86d86ca741bea9015f75bd47a2fe724805283ae7a8968c5d953228ac5ac16
SHA5127b84152d83f4196842bff3dee37e51ef64cd92bffdc3ac0e3cffe429a32ef57913a5f78a42a1502abbacc5b3c7f020cd01b7f8288b696dc954378b22597c7ded
-
Filesize
819KB
MD53befbb820676b725ef765d9a7871569c
SHA13ed095865b0ca2330275439567eea65c2f37955c
SHA256b9c3c7b8311c12e8dc97f77f1fa855be4a54623240c6469d17240283f363ef2b
SHA5124f7171608528715a10ae47df66ccb97922a0ff1ba6587f88d2f38a0f7921dd08f220d46c2432c014bfb2150c9e41d814af153eeddb25ba8632446fb4226e95ec
-
Filesize
819KB
MD53befbb820676b725ef765d9a7871569c
SHA13ed095865b0ca2330275439567eea65c2f37955c
SHA256b9c3c7b8311c12e8dc97f77f1fa855be4a54623240c6469d17240283f363ef2b
SHA5124f7171608528715a10ae47df66ccb97922a0ff1ba6587f88d2f38a0f7921dd08f220d46c2432c014bfb2150c9e41d814af153eeddb25ba8632446fb4226e95ec
-
Filesize
328KB
MD5fdd37f558da14a9392c4a50c1ad1edcb
SHA15ccb1549a52add56684b29c9d1d816fc978f16e5
SHA2563b6cb31a522b34c6c8f54e11664775e15c650762c813c54dbbee02c578cc33e3
SHA512810846ea82863c905f6712d8f4359800f9af2e733d940c22da87add5c29bb1398f73149901e692b6915f5107855fc385bfbd28fd2264f29102d666ef6de4c23b
-
Filesize
328KB
MD5fdd37f558da14a9392c4a50c1ad1edcb
SHA15ccb1549a52add56684b29c9d1d816fc978f16e5
SHA2563b6cb31a522b34c6c8f54e11664775e15c650762c813c54dbbee02c578cc33e3
SHA512810846ea82863c905f6712d8f4359800f9af2e733d940c22da87add5c29bb1398f73149901e692b6915f5107855fc385bfbd28fd2264f29102d666ef6de4c23b
-
Filesize
213KB
MD53449a2fe589c42a66fc07716ea1e0d81
SHA115cb764875185ecca838cd1ca19e8e39b6b8b396
SHA2560640d8b64d282ce490de79e76c72fc938a1560106efba4247a1514111cfe73d2
SHA51299e29ea8d35716003abb10e0fc3dc8669eec8a4515975aca9b46790c36fa27f34c5ff37fb3fd4e624820c08f86c1c35e4054df17cd7bd0c53584c1c97c19d66e
-
Filesize
213KB
MD53449a2fe589c42a66fc07716ea1e0d81
SHA115cb764875185ecca838cd1ca19e8e39b6b8b396
SHA2560640d8b64d282ce490de79e76c72fc938a1560106efba4247a1514111cfe73d2
SHA51299e29ea8d35716003abb10e0fc3dc8669eec8a4515975aca9b46790c36fa27f34c5ff37fb3fd4e624820c08f86c1c35e4054df17cd7bd0c53584c1c97c19d66e
-
Filesize
342KB
MD527990feea5ecb1fcf26300ea89d1d9fc
SHA118802f50ee23ee8e553573c01405565a7fff6626
SHA2563bc69e5e22ea6cdd4994115009424dfb1f5ea2514aad489605115e2015b33410
SHA512c03794f429af531af936a644d770fbed26f389eb64a63ac7b662a22ceef9f621929d45e362a3cf5986b6a301b7a211d0a6dbe5bb1649ea872ec233ca56ce8ed0
-
Filesize
342KB
MD527990feea5ecb1fcf26300ea89d1d9fc
SHA118802f50ee23ee8e553573c01405565a7fff6626
SHA2563bc69e5e22ea6cdd4994115009424dfb1f5ea2514aad489605115e2015b33410
SHA512c03794f429af531af936a644d770fbed26f389eb64a63ac7b662a22ceef9f621929d45e362a3cf5986b6a301b7a211d0a6dbe5bb1649ea872ec233ca56ce8ed0
-
Filesize
584KB
MD5ab0116e8fc430555bd5b6a7c7c89b5a3
SHA11364d841a4cb1aac3591cfdb36a1a744a05a2729
SHA256e54a0107ef302b89f1e6609aba2dbaf622755d8bd0e8ed8b95544114a13e44f0
SHA5124d46bdb42325c92ab82ba57247dd615bb3f0a092e679498f384374ea0c5c2820260fc3d6bde8db8d43a4aca62e8fd7f3a28c2c49b82f97676dd635ae9805a908
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a