Analysis
-
max time kernel
137s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
09-12-2023 17:38
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20231127-en
General
-
Target
file.exe
-
Size
234KB
-
MD5
f97c2cecc2d56339c15a2623bcfbcf5f
-
SHA1
45a834a6323cb1819198d0867169315ff184e8d6
-
SHA256
5560c9e714db97f1dc3970b9a7f4dd416355428cf1e2683ba5a6e67ac6b1eae3
-
SHA512
dd9e048f7a4dba7fc886d382a6ec6b74c9560ac550e1a5c7d0912d02c61d1031b1ff94a03bbd8d56b46b240f5aaf0867c1920e0d41fa4d860fd762df3711df65
-
SSDEEP
3072:kv2LcAcZSumMe5aoQX6hRbeI3XEggb29sHW1XLRRL4F+/HIf89/:BLcAcZhaaM1LEPb2aW1X4F7kp
Malware Config
Extracted
smokeloader
2022
http://onualituyrs.org/
http://sumagulituyo.org/
http://snukerukeutit.org/
http://lightseinsteniki.org/
http://liuliuoumumy.org/
http://stualialuyastrelia.net/
http://kumbuyartyty.net/
http://criogetikfenbut.org/
http://tonimiuyaytre.org/
http://tyiuiunuewqy.org/
http://humydrole.com/tmp/index.php
http://trunk-co.ru/tmp/index.php
http://weareelight.com/tmp/index.php
http://pirateking.online/tmp/index.php
http://piratia.pw/tmp/index.php
http://go-piratia.ru/tmp/index.php
Extracted
smokeloader
pub1
Extracted
redline
LogsDiller Cloud (Bot: @logsdillabot)
57.128.155.22:20154
Signatures
-
Glupteba payload 10 IoCs
Processes:
resource yara_rule behavioral2/memory/2240-71-0x0000000002E70000-0x000000000375B000-memory.dmp family_glupteba behavioral2/memory/2240-72-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2240-304-0x0000000002E70000-0x000000000375B000-memory.dmp family_glupteba behavioral2/memory/2240-308-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2240-342-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/3136-463-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1984-573-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1984-585-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1984-593-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1984-600-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
Raccoon Stealer V2 payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/1032-21-0x00000000008F0000-0x0000000000906000-memory.dmp family_raccoon_v2 behavioral2/memory/1032-22-0x0000000000400000-0x000000000085E000-memory.dmp family_raccoon_v2 behavioral2/memory/1032-75-0x0000000000400000-0x000000000085E000-memory.dmp family_raccoon_v2 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1784-303-0x0000000000400000-0x000000000043C000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
DB4D.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ DB4D.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
DB4D.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion DB4D.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion DB4D.exe -
Deletes itself 1 IoCs
Processes:
pid process 3232 -
Executes dropped EXE 16 IoCs
Processes:
D810.exeDB4D.exeEE1C.exeF234.exeFCB4.exeFCB4.tmp2B1.exevoiceassist.exevoiceassist.exeF234.execsrss.exeinjector.exewindefender.exewindefender.exegaisdjjhrisdjjpid process 1032 D810.exe 3628 DB4D.exe 2472 EE1C.exe 2240 F234.exe 3800 FCB4.exe 5004 FCB4.tmp 2488 2B1.exe 3828 voiceassist.exe 3396 voiceassist.exe 3136 F234.exe 1984 csrss.exe 5008 injector.exe 368 windefender.exe 572 windefender.exe 4692 gaisdjj 5036 hrisdjj -
Loads dropped DLL 4 IoCs
Processes:
regsvr32.exeFCB4.tmppid process 4360 regsvr32.exe 5004 FCB4.tmp 5004 FCB4.tmp 5004 FCB4.tmp -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\DB4D.exe themida C:\Users\Admin\AppData\Local\Temp\DB4D.exe themida behavioral2/memory/3628-36-0x0000000000DD0000-0x0000000001662000-memory.dmp themida -
Processes:
resource yara_rule C:\Windows\windefender.exe upx C:\Windows\windefender.exe upx C:\Windows\windefender.exe upx behavioral2/memory/368-586-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/572-594-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
svchost.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3028534956-1709433221-1313273668-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 svchost.exe Key opened \REGISTRY\USER\S-1-5-21-3028534956-1709433221-1313273668-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 svchost.exe Key opened \REGISTRY\USER\S-1-5-21-3028534956-1709433221-1313273668-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 svchost.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
F234.execsrss.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3028534956-1709433221-1313273668-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" F234.exe Set value (str) \REGISTRY\USER\S-1-5-21-3028534956-1709433221-1313273668-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
DB4D.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DB4D.exe -
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
Processes:
csrss.exedescription ioc process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 6 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
DB4D.exepid process 3628 DB4D.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
2B1.exedescription pid process target process PID 2488 set thread context of 1784 2488 2B1.exe AppLaunch.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
F234.exedescription ioc process File opened (read-only) \??\VBoxMiniRdrDN F234.exe -
Drops file in Program Files directory 63 IoCs
Processes:
FCB4.tmpdescription ioc process File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-COFC7.tmp FCB4.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-MQ82M.tmp FCB4.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-BF0HG.tmp FCB4.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-PL1J6.tmp FCB4.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-TKALA.tmp FCB4.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-V3H6E.tmp FCB4.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-M0UQ1.tmp FCB4.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-FUJGU.tmp FCB4.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-LUA5B.tmp FCB4.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-O2MUA.tmp FCB4.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\plugins\internal\is-BHK2F.tmp FCB4.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-C0IDC.tmp FCB4.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-3QCFC.tmp FCB4.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-CP68C.tmp FCB4.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-D560M.tmp FCB4.tmp File created C:\Program Files (x86)\VoiceAssistant\uninstall\is-0L40Q.tmp FCB4.tmp File created C:\Program Files (x86)\VoiceAssistant\stuff\is-VKRUM.tmp FCB4.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-E4G5M.tmp FCB4.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-BJUUC.tmp FCB4.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-6R2JB.tmp FCB4.tmp File created C:\Program Files (x86)\VoiceAssistant\stuff\is-F71J0.tmp FCB4.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-80AKQ.tmp FCB4.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-TVELQ.tmp FCB4.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-PIB33.tmp FCB4.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-Q5J6R.tmp FCB4.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-I8FL3.tmp FCB4.tmp File created C:\Program Files (x86)\VoiceAssistant\is-FK8IJ.tmp FCB4.tmp File opened for modification C:\Program Files (x86)\VoiceAssistant\voiceassist.exe FCB4.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-3HGE8.tmp FCB4.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-S1HG6.tmp FCB4.tmp File opened for modification C:\Program Files (x86)\VoiceAssistant\uninstall\unins000.dat FCB4.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-5KKN4.tmp FCB4.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-L79JB.tmp FCB4.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-C3U4J.tmp FCB4.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-FHO96.tmp FCB4.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-P6QRC.tmp FCB4.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-LIDBI.tmp FCB4.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-VM4JI.tmp FCB4.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-MM8KP.tmp FCB4.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-SBFM2.tmp FCB4.tmp File created C:\Program Files (x86)\VoiceAssistant\uninstall\unins000.dat FCB4.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-9SQ23.tmp FCB4.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-Q5QT3.tmp FCB4.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-B2P9A.tmp FCB4.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-DB5IU.tmp FCB4.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-CFK1H.tmp FCB4.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\plugins\internal\is-GOMOA.tmp FCB4.tmp File created C:\Program Files (x86)\VoiceAssistant\stuff\is-RJF7C.tmp FCB4.tmp File created C:\Program Files (x86)\VoiceAssistant\stuff\is-ELVEG.tmp FCB4.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-S2KTC.tmp FCB4.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-FOGH2.tmp FCB4.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-N8IBN.tmp FCB4.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-R733S.tmp FCB4.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-VTC03.tmp FCB4.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\lessmsi\is-FJGU9.tmp FCB4.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-MB6U8.tmp FCB4.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-F127K.tmp FCB4.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-9ANJD.tmp FCB4.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-L5MQ1.tmp FCB4.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-0RJRI.tmp FCB4.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-IBUFH.tmp FCB4.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-UAN2F.tmp FCB4.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-RSNM6.tmp FCB4.tmp -
Drops file in Windows directory 4 IoCs
Processes:
F234.execsrss.exedescription ioc process File opened for modification C:\Windows\rss F234.exe File created C:\Windows\rss\csrss.exe F234.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 4596 sc.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3096 1032 WerFault.exe D810.exe 872 5036 WerFault.exe hrisdjj -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
gaisdjjfile.exeEE1C.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI gaisdjj Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI gaisdjj Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI EE1C.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI gaisdjj Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI EE1C.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI EE1C.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 1308 schtasks.exe 4156 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
F234.exepowershell.exewindefender.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1662 = "Bahia Standard Time" F234.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1822 = "Russia TZ 1 Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-832 = "SA Eastern Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2491 = "Aus Central W. Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2372 = "Easter Island Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2061 = "North Korea Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-112 = "Eastern Standard Time" F234.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-432 = "Iran Standard Time" F234.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1801 = "Line Islands Daylight Time" F234.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-201 = "US Mountain Daylight Time" F234.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-201 = "US Mountain Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2531 = "Chatham Islands Daylight Time" F234.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-351 = "FLE Daylight Time" F234.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1931 = "Russia TZ 11 Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1932 = "Russia TZ 11 Standard Time" F234.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2532 = "Chatham Islands Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2942 = "Sao Tome Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-491 = "India Daylight Time" F234.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-32 = "Mid-Atlantic Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-442 = "Arabian Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2062 = "North Korea Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2571 = "Turks and Caicos Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-492 = "India Standard Time" F234.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-435 = "Georgian Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2632 = "Norfolk Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-334 = "Jordan Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-302 = "Romance Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2391 = "Aleutian Daylight Time" F234.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-332 = "E. Europe Standard Time" F234.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2411 = "Marquesas Daylight Time" F234.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2451 = "Saint Pierre Daylight Time" F234.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-261 = "GMT Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-561 = "SE Asia Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1822 = "Russia TZ 1 Standard Time" F234.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-562 = "SE Asia Standard Time" F234.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1412 = "Syria Standard Time" F234.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-292 = "Central European Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2342 = "Haiti Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-391 = "Arab Daylight Time" F234.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-385 = "Namibia Standard Time" F234.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2631 = "Norfolk Daylight Time" F234.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-791 = "SA Western Daylight Time" F234.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2182 = "Astrakhan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1022 = "Bangladesh Standard Time" F234.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-632 = "Tokyo Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-962 = "Paraguay Standard Time" windefender.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
file.exepid process 1392 file.exe 1392 file.exe 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3232 -
Suspicious behavior: MapViewOfSection 7 IoCs
Processes:
file.exeEE1C.exegaisdjjpid process 1392 file.exe 3232 3232 2472 EE1C.exe 3232 3232 4692 gaisdjj -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exeF234.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.execsrss.exesc.exedescription pid process Token: SeDebugPrivilege 1432 powershell.exe Token: SeShutdownPrivilege 3232 Token: SeCreatePagefilePrivilege 3232 Token: SeShutdownPrivilege 3232 Token: SeCreatePagefilePrivilege 3232 Token: SeShutdownPrivilege 3232 Token: SeCreatePagefilePrivilege 3232 Token: SeShutdownPrivilege 3232 Token: SeCreatePagefilePrivilege 3232 Token: SeShutdownPrivilege 3232 Token: SeCreatePagefilePrivilege 3232 Token: SeShutdownPrivilege 3232 Token: SeCreatePagefilePrivilege 3232 Token: SeShutdownPrivilege 3232 Token: SeCreatePagefilePrivilege 3232 Token: SeShutdownPrivilege 3232 Token: SeCreatePagefilePrivilege 3232 Token: SeShutdownPrivilege 3232 Token: SeCreatePagefilePrivilege 3232 Token: SeShutdownPrivilege 3232 Token: SeCreatePagefilePrivilege 3232 Token: SeShutdownPrivilege 3232 Token: SeCreatePagefilePrivilege 3232 Token: SeShutdownPrivilege 3232 Token: SeCreatePagefilePrivilege 3232 Token: SeShutdownPrivilege 3232 Token: SeCreatePagefilePrivilege 3232 Token: SeDebugPrivilege 2240 F234.exe Token: SeImpersonatePrivilege 2240 F234.exe Token: SeDebugPrivilege 2252 powershell.exe Token: SeDebugPrivilege 3628 Token: SeShutdownPrivilege 3232 Token: SeCreatePagefilePrivilege 3232 Token: SeShutdownPrivilege 3232 Token: SeCreatePagefilePrivilege 3232 Token: SeDebugPrivilege 3456 powershell.exe Token: SeShutdownPrivilege 3232 Token: SeCreatePagefilePrivilege 3232 Token: SeShutdownPrivilege 3232 Token: SeCreatePagefilePrivilege 3232 Token: SeDebugPrivilege 2000 powershell.exe Token: SeShutdownPrivilege 3232 Token: SeCreatePagefilePrivilege 3232 Token: SeShutdownPrivilege 3232 Token: SeCreatePagefilePrivilege 3232 Token: SeDebugPrivilege 2984 powershell.exe Token: SeShutdownPrivilege 3232 Token: SeCreatePagefilePrivilege 3232 Token: SeDebugPrivilege 2168 powershell.exe Token: SeShutdownPrivilege 3232 Token: SeCreatePagefilePrivilege 3232 Token: SeDebugPrivilege 3456 powershell.exe Token: SeShutdownPrivilege 3232 Token: SeCreatePagefilePrivilege 3232 Token: SeSystemEnvironmentPrivilege 1984 csrss.exe Token: SeSecurityPrivilege 4596 sc.exe Token: SeSecurityPrivilege 4596 sc.exe Token: SeShutdownPrivilege 3232 Token: SeCreatePagefilePrivilege 3232 Token: SeShutdownPrivilege 3232 Token: SeCreatePagefilePrivilege 3232 Token: SeShutdownPrivilege 3232 Token: SeCreatePagefilePrivilege 3232 Token: SeShutdownPrivilege 3232 -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
FCB4.tmppid process 5004 FCB4.tmp -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3232 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
netsh.exeF234.exeFCB4.exeFCB4.tmp2B1.exeConhost.exeF234.exedescription pid process target process PID 3232 wrote to memory of 1032 3232 D810.exe PID 3232 wrote to memory of 1032 3232 D810.exe PID 3232 wrote to memory of 1032 3232 D810.exe PID 3232 wrote to memory of 3628 3232 DB4D.exe PID 3232 wrote to memory of 3628 3232 DB4D.exe PID 3232 wrote to memory of 3628 3232 DB4D.exe PID 3232 wrote to memory of 3168 3232 netsh.exe PID 3232 wrote to memory of 3168 3232 netsh.exe PID 3168 wrote to memory of 4360 3168 netsh.exe regsvr32.exe PID 3168 wrote to memory of 4360 3168 netsh.exe regsvr32.exe PID 3168 wrote to memory of 4360 3168 netsh.exe regsvr32.exe PID 3232 wrote to memory of 2472 3232 EE1C.exe PID 3232 wrote to memory of 2472 3232 EE1C.exe PID 3232 wrote to memory of 2472 3232 EE1C.exe PID 3232 wrote to memory of 2240 3232 F234.exe PID 3232 wrote to memory of 2240 3232 F234.exe PID 3232 wrote to memory of 2240 3232 F234.exe PID 2240 wrote to memory of 1432 2240 F234.exe powershell.exe PID 2240 wrote to memory of 1432 2240 F234.exe powershell.exe PID 2240 wrote to memory of 1432 2240 F234.exe powershell.exe PID 3232 wrote to memory of 3800 3232 FCB4.exe PID 3232 wrote to memory of 3800 3232 FCB4.exe PID 3232 wrote to memory of 3800 3232 FCB4.exe PID 3800 wrote to memory of 5004 3800 FCB4.exe FCB4.tmp PID 3800 wrote to memory of 5004 3800 FCB4.exe FCB4.tmp PID 3800 wrote to memory of 5004 3800 FCB4.exe FCB4.tmp PID 3232 wrote to memory of 2488 3232 2B1.exe PID 3232 wrote to memory of 2488 3232 2B1.exe PID 3232 wrote to memory of 2488 3232 2B1.exe PID 3232 wrote to memory of 2944 3232 svchost.exe PID 3232 wrote to memory of 2944 3232 svchost.exe PID 3232 wrote to memory of 2944 3232 svchost.exe PID 3232 wrote to memory of 2944 3232 svchost.exe PID 5004 wrote to memory of 220 5004 FCB4.tmp schtasks.exe PID 5004 wrote to memory of 220 5004 FCB4.tmp schtasks.exe PID 5004 wrote to memory of 220 5004 FCB4.tmp schtasks.exe PID 5004 wrote to memory of 3828 5004 FCB4.tmp voiceassist.exe PID 5004 wrote to memory of 3828 5004 FCB4.tmp voiceassist.exe PID 5004 wrote to memory of 3828 5004 FCB4.tmp voiceassist.exe PID 3232 wrote to memory of 2444 3232 explorer.exe PID 3232 wrote to memory of 2444 3232 explorer.exe PID 3232 wrote to memory of 2444 3232 explorer.exe PID 5004 wrote to memory of 4048 5004 FCB4.tmp Conhost.exe PID 5004 wrote to memory of 4048 5004 FCB4.tmp Conhost.exe PID 5004 wrote to memory of 4048 5004 FCB4.tmp Conhost.exe PID 5004 wrote to memory of 3396 5004 FCB4.tmp voiceassist.exe PID 5004 wrote to memory of 3396 5004 FCB4.tmp voiceassist.exe PID 5004 wrote to memory of 3396 5004 FCB4.tmp voiceassist.exe PID 2488 wrote to memory of 1784 2488 2B1.exe AppLaunch.exe PID 2488 wrote to memory of 1784 2488 2B1.exe AppLaunch.exe PID 2488 wrote to memory of 1784 2488 2B1.exe AppLaunch.exe PID 2488 wrote to memory of 1784 2488 2B1.exe AppLaunch.exe PID 2488 wrote to memory of 1784 2488 2B1.exe AppLaunch.exe PID 2488 wrote to memory of 1784 2488 2B1.exe AppLaunch.exe PID 2488 wrote to memory of 1784 2488 2B1.exe AppLaunch.exe PID 2488 wrote to memory of 1784 2488 2B1.exe AppLaunch.exe PID 4048 wrote to memory of 4952 4048 Conhost.exe net1.exe PID 4048 wrote to memory of 4952 4048 Conhost.exe net1.exe PID 4048 wrote to memory of 4952 4048 Conhost.exe net1.exe PID 3136 wrote to memory of 2252 3136 F234.exe powershell.exe PID 3136 wrote to memory of 2252 3136 F234.exe powershell.exe PID 3136 wrote to memory of 2252 3136 F234.exe powershell.exe PID 3136 wrote to memory of 4720 3136 F234.exe cmd.exe PID 3136 wrote to memory of 4720 3136 F234.exe cmd.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
Processes:
svchost.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3028534956-1709433221-1313273668-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 svchost.exe -
outlook_win_path 1 IoCs
Processes:
svchost.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3028534956-1709433221-1313273668-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1392
-
C:\Users\Admin\AppData\Local\Temp\D810.exeC:\Users\Admin\AppData\Local\Temp\D810.exe1⤵
- Executes dropped EXE
PID:1032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1032 -s 79522⤵
- Program crash
PID:3096
-
C:\Users\Admin\AppData\Local\Temp\DB4D.exeC:\Users\Admin\AppData\Local\Temp\DB4D.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3628
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\E11B.dll1⤵PID:3168
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\E11B.dll2⤵
- Loads dropped DLL
PID:4360
-
C:\Users\Admin\AppData\Local\Temp\EE1C.exeC:\Users\Admin\AppData\Local\Temp\EE1C.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2472
-
C:\Users\Admin\AppData\Local\Temp\F234.exeC:\Users\Admin\AppData\Local\Temp\F234.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\F234.exe"C:\Users\Admin\AppData\Local\Temp\F234.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2252 -
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵PID:4720
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵PID:3456
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2000 -
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1984 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2984 -
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4156 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2168 -
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:4004
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3456 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
PID:5008 -
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:1308 -
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵
- Executes dropped EXE
PID:368 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵PID:4040
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:4596
-
C:\Users\Admin\AppData\Local\Temp\FCB4.exeC:\Users\Admin\AppData\Local\Temp\FCB4.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\is-M7CC9.tmp\FCB4.tmp"C:\Users\Admin\AppData\Local\Temp\is-M7CC9.tmp\FCB4.tmp" /SL5="$B0184,7429766,54272,C:\Users\Admin\AppData\Local\Temp\FCB4.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Program Files (x86)\VoiceAssistant\voiceassist.exe"C:\Program Files (x86)\VoiceAssistant\voiceassist.exe" -i3⤵
- Executes dropped EXE
PID:3828 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Query3⤵PID:220
-
C:\Program Files (x86)\VoiceAssistant\voiceassist.exe"C:\Program Files (x86)\VoiceAssistant\voiceassist.exe" -s3⤵
- Executes dropped EXE
PID:3396 -
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 93⤵PID:4048
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 94⤵PID:4952
-
C:\Users\Admin\AppData\Local\Temp\2B1.exeC:\Users\Admin\AppData\Local\Temp\2B1.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:1784
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2944
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:2444
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon1⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:2944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1032 -ip 10321⤵PID:2364
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:572
-
C:\Users\Admin\AppData\Roaming\gaisdjjC:\Users\Admin\AppData\Roaming\gaisdjj1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4692
-
C:\Users\Admin\AppData\Roaming\hrisdjjC:\Users\Admin\AppData\Roaming\hrisdjj1⤵
- Executes dropped EXE
PID:5036 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5036 -s 4682⤵
- Program crash
PID:872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 5036 -ip 50361⤵PID:2744
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5ef9b854c3bf29138d9d24292a50def6e
SHA18d498781213415902226843bde3b008266ebb5f5
SHA256d7a6209bc976788cc6c3f4480d0db0c824f63320cdf3b5717bb7f4741fe8ea84
SHA512401e66c92b92d99514f9e9ee8daec74b14a0ceab17458067dda282f3f1bd251e67f2cb27ea7066ffdac3710925033c4ea4a1e9b929fe2d73208638b8fafb93ef
-
Filesize
2.6MB
MD5ef9b854c3bf29138d9d24292a50def6e
SHA18d498781213415902226843bde3b008266ebb5f5
SHA256d7a6209bc976788cc6c3f4480d0db0c824f63320cdf3b5717bb7f4741fe8ea84
SHA512401e66c92b92d99514f9e9ee8daec74b14a0ceab17458067dda282f3f1bd251e67f2cb27ea7066ffdac3710925033c4ea4a1e9b929fe2d73208638b8fafb93ef
-
Filesize
2.6MB
MD5ef9b854c3bf29138d9d24292a50def6e
SHA18d498781213415902226843bde3b008266ebb5f5
SHA256d7a6209bc976788cc6c3f4480d0db0c824f63320cdf3b5717bb7f4741fe8ea84
SHA512401e66c92b92d99514f9e9ee8daec74b14a0ceab17458067dda282f3f1bd251e67f2cb27ea7066ffdac3710925033c4ea4a1e9b929fe2d73208638b8fafb93ef
-
Filesize
1.9MB
MD55251ab2960cc14aa925735a84fce288c
SHA16e6080511b0ad8a68729b190b1597a65d5ab867b
SHA256fa7f8898a16a926ef1df7f9560a3a16847d8e7e7ba14da99198c9548ad939319
SHA51208225b3319ea576ccffa1e97a27ad37cd0bf7d8427b587a13f4412a6ec8e834cb2564d1587f678e352022ee07e423df6ba19dab7dba47d1cf88d24368439b289
-
Filesize
1.9MB
MD55251ab2960cc14aa925735a84fce288c
SHA16e6080511b0ad8a68729b190b1597a65d5ab867b
SHA256fa7f8898a16a926ef1df7f9560a3a16847d8e7e7ba14da99198c9548ad939319
SHA51208225b3319ea576ccffa1e97a27ad37cd0bf7d8427b587a13f4412a6ec8e834cb2564d1587f678e352022ee07e423df6ba19dab7dba47d1cf88d24368439b289
-
Filesize
237KB
MD522a51b329fa194d51f68705a25d7396d
SHA1aada03d8b7f1e28dbf6d72c1503981ccc5bb94da
SHA25682857c5bbab91ba9c66bcd07c9f25c1b140e94fa892e97cc97db82fe06439742
SHA5120d9a8a6b1df054a84bea0c4d38fd3c702f95c7d372bf2255c29611aec38fca5c81b972a2d45135a6488ba313d5674cf5e60e5bc7bdc888bb3524739e473ff821
-
Filesize
237KB
MD522a51b329fa194d51f68705a25d7396d
SHA1aada03d8b7f1e28dbf6d72c1503981ccc5bb94da
SHA25682857c5bbab91ba9c66bcd07c9f25c1b140e94fa892e97cc97db82fe06439742
SHA5120d9a8a6b1df054a84bea0c4d38fd3c702f95c7d372bf2255c29611aec38fca5c81b972a2d45135a6488ba313d5674cf5e60e5bc7bdc888bb3524739e473ff821
-
Filesize
3.0MB
MD5f4cb9c8b7e02e8084008cd61e1899390
SHA1af1a95a823a8c24cab9d8e8aaf46d69b3612dd4b
SHA256a9ef0a36e9924f9742af01b648d7c89624e1e360716adb8fe7f58a6f28c4865e
SHA512e808e95a5f57a13e61f8b77502f0f01c7faf66f2663d4de0b61a308f39520da8d649f32ed886edf446eefd88cf324854bcca059f8c0a6f46148388242e6b65b6
-
Filesize
3.0MB
MD5f4cb9c8b7e02e8084008cd61e1899390
SHA1af1a95a823a8c24cab9d8e8aaf46d69b3612dd4b
SHA256a9ef0a36e9924f9742af01b648d7c89624e1e360716adb8fe7f58a6f28c4865e
SHA512e808e95a5f57a13e61f8b77502f0f01c7faf66f2663d4de0b61a308f39520da8d649f32ed886edf446eefd88cf324854bcca059f8c0a6f46148388242e6b65b6
-
Filesize
3.0MB
MD518356cbd55de61190244f9be22cf2f6d
SHA198510c90b004e98090a1462bf056fa916f1f2e0a
SHA256fdf19145c1592639e437eeca85b1538afb20835d0c87684378089fd03bc6d0f8
SHA5125c043e414428d03a71f61512b2f18a5b1392296830c21d00276ad03578c7614456615cdf8bf96a8201925bd5520cdddd6b1dfeb1dd93c1f649d7a4a89a14fdbe
-
Filesize
3.0MB
MD518356cbd55de61190244f9be22cf2f6d
SHA198510c90b004e98090a1462bf056fa916f1f2e0a
SHA256fdf19145c1592639e437eeca85b1538afb20835d0c87684378089fd03bc6d0f8
SHA5125c043e414428d03a71f61512b2f18a5b1392296830c21d00276ad03578c7614456615cdf8bf96a8201925bd5520cdddd6b1dfeb1dd93c1f649d7a4a89a14fdbe
-
Filesize
235KB
MD5978caea5fe7279c24794f42246a1a774
SHA117690eb0d1e7db21ac2c3fe0aa4d8fed1e47978f
SHA25606c997761e32a22d6ce1ea25a64f44bc0d05ad4ec005018b78da6c2aaf09f459
SHA5120aadcb648c772d2359fed4c28b1325075e96fdf3114b26cd62db5805a79dd804475c581a8bec432ea18dbf4279b40914006b64e89182308f2813f0018ab26930
-
Filesize
235KB
MD5978caea5fe7279c24794f42246a1a774
SHA117690eb0d1e7db21ac2c3fe0aa4d8fed1e47978f
SHA25606c997761e32a22d6ce1ea25a64f44bc0d05ad4ec005018b78da6c2aaf09f459
SHA5120aadcb648c772d2359fed4c28b1325075e96fdf3114b26cd62db5805a79dd804475c581a8bec432ea18dbf4279b40914006b64e89182308f2813f0018ab26930
-
Filesize
4.1MB
MD5cfe24ff51110f378c8d7d8c5c422795b
SHA10f8b51c6a49fa3984dc2a17523471d9676f055e2
SHA2563db2b39fea5b8881c24cf0bce3902865fa24f745a05d3d563ecfbeee598dcd39
SHA512e6201b362bfd56dac40e0d0f39f315487dc43c07af9b1a36a1d7a75aa82c06301eeea1cc9a71fb576d68965b1979560c5684b6e16b80244c0cd12b48cdcaff9d
-
Filesize
4.1MB
MD5cfe24ff51110f378c8d7d8c5c422795b
SHA10f8b51c6a49fa3984dc2a17523471d9676f055e2
SHA2563db2b39fea5b8881c24cf0bce3902865fa24f745a05d3d563ecfbeee598dcd39
SHA512e6201b362bfd56dac40e0d0f39f315487dc43c07af9b1a36a1d7a75aa82c06301eeea1cc9a71fb576d68965b1979560c5684b6e16b80244c0cd12b48cdcaff9d
-
Filesize
4.1MB
MD5cfe24ff51110f378c8d7d8c5c422795b
SHA10f8b51c6a49fa3984dc2a17523471d9676f055e2
SHA2563db2b39fea5b8881c24cf0bce3902865fa24f745a05d3d563ecfbeee598dcd39
SHA512e6201b362bfd56dac40e0d0f39f315487dc43c07af9b1a36a1d7a75aa82c06301eeea1cc9a71fb576d68965b1979560c5684b6e16b80244c0cd12b48cdcaff9d
-
Filesize
7.3MB
MD5a5875b40b1ca5ba3ad160e0f86a68241
SHA17fcd834fc2cc0542e59434786afa30bb9116605b
SHA256cd7756a6ae8338ac026b9d7f15e90bb9894108e43a975e16eb6d19a29fd1040f
SHA512828d45c44084bf4f278253b71d4ede6e43c71d66fac6a81874cf0aa101a05cbc0ca22e85de03521a13e152d5124295d0b3055455d4ee0aa3df8a68eb279f63c7
-
Filesize
7.3MB
MD5a5875b40b1ca5ba3ad160e0f86a68241
SHA17fcd834fc2cc0542e59434786afa30bb9116605b
SHA256cd7756a6ae8338ac026b9d7f15e90bb9894108e43a975e16eb6d19a29fd1040f
SHA512828d45c44084bf4f278253b71d4ede6e43c71d66fac6a81874cf0aa101a05cbc0ca22e85de03521a13e152d5124295d0b3055455d4ee0aa3df8a68eb279f63c7
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
19KB
MD53adaa386b671c2df3bae5b39dc093008
SHA1067cf95fbdb922d81db58432c46930f86d23dded
SHA25671cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38
SHA512bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303
-
Filesize
19KB
MD53adaa386b671c2df3bae5b39dc093008
SHA1067cf95fbdb922d81db58432c46930f86d23dded
SHA25671cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38
SHA512bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303
-
Filesize
687KB
MD5f448d7f4b76e5c9c3a4eaff16a8b9b73
SHA131808f1ffa84c954376975b7cdb0007e6b762488
SHA2567233b85eb0f8b3aa5cae3811d727aa8742fec4d1091c120a0fe15006f424cc49
SHA512f8197458cd2764c0b852dac34f9bf361110a7dc86903024a97c7bcd3f77b148342bf45e3c2b60f6af8198ae3b83938dbaad5e007d71a0f88006f3a0618cf36f4
-
Filesize
687KB
MD5f448d7f4b76e5c9c3a4eaff16a8b9b73
SHA131808f1ffa84c954376975b7cdb0007e6b762488
SHA2567233b85eb0f8b3aa5cae3811d727aa8742fec4d1091c120a0fe15006f424cc49
SHA512f8197458cd2764c0b852dac34f9bf361110a7dc86903024a97c7bcd3f77b148342bf45e3c2b60f6af8198ae3b83938dbaad5e007d71a0f88006f3a0618cf36f4
-
Filesize
234KB
MD5f97c2cecc2d56339c15a2623bcfbcf5f
SHA145a834a6323cb1819198d0867169315ff184e8d6
SHA2565560c9e714db97f1dc3970b9a7f4dd416355428cf1e2683ba5a6e67ac6b1eae3
SHA512dd9e048f7a4dba7fc886d382a6ec6b74c9560ac550e1a5c7d0912d02c61d1031b1ff94a03bbd8d56b46b240f5aaf0867c1920e0d41fa4d860fd762df3711df65
-
Filesize
234KB
MD5f97c2cecc2d56339c15a2623bcfbcf5f
SHA145a834a6323cb1819198d0867169315ff184e8d6
SHA2565560c9e714db97f1dc3970b9a7f4dd416355428cf1e2683ba5a6e67ac6b1eae3
SHA512dd9e048f7a4dba7fc886d382a6ec6b74c9560ac550e1a5c7d0912d02c61d1031b1ff94a03bbd8d56b46b240f5aaf0867c1920e0d41fa4d860fd762df3711df65
-
Filesize
235KB
MD5978caea5fe7279c24794f42246a1a774
SHA117690eb0d1e7db21ac2c3fe0aa4d8fed1e47978f
SHA25606c997761e32a22d6ce1ea25a64f44bc0d05ad4ec005018b78da6c2aaf09f459
SHA5120aadcb648c772d2359fed4c28b1325075e96fdf3114b26cd62db5805a79dd804475c581a8bec432ea18dbf4279b40914006b64e89182308f2813f0018ab26930
-
Filesize
235KB
MD5978caea5fe7279c24794f42246a1a774
SHA117690eb0d1e7db21ac2c3fe0aa4d8fed1e47978f
SHA25606c997761e32a22d6ce1ea25a64f44bc0d05ad4ec005018b78da6c2aaf09f459
SHA5120aadcb648c772d2359fed4c28b1325075e96fdf3114b26cd62db5805a79dd804475c581a8bec432ea18dbf4279b40914006b64e89182308f2813f0018ab26930
-
Filesize
235KB
MD5978caea5fe7279c24794f42246a1a774
SHA117690eb0d1e7db21ac2c3fe0aa4d8fed1e47978f
SHA25606c997761e32a22d6ce1ea25a64f44bc0d05ad4ec005018b78da6c2aaf09f459
SHA5120aadcb648c772d2359fed4c28b1325075e96fdf3114b26cd62db5805a79dd804475c581a8bec432ea18dbf4279b40914006b64e89182308f2813f0018ab26930
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5fe8a5dd9c732a7e7cb36836c6fb515b7
SHA1a5ac1edac4873719efc80d58e5070ff4ea468179
SHA256809edf47b281269cca1d8f17eaa9972ae7e3d8d9012b731a7b5f52a8121a9b24
SHA5128ffd0f22cc33050f8a1ee9ca13c9a159aae60f9296a6f7b9582841b8ba2c6cc19d89ccf6d9151d0bc3ad92378ac72679be67ba54f56356c42955d6521946492a
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5a895ad0cbfa82a6179b66c53f11ba216
SHA1e935f80660b71ca32d9fe01e850d2c991a7ee99f
SHA256fe1cd43acae0db2af2b40f549948e9ad49c9b5ad1fd12619f1388303889e0bed
SHA5129ad9bbf007b964a11907a2bddc71177a972601a6b41a8c4f079c3c46c8279aef7104fa38c5b99656ee5b736da0579f215199fab9fd3df1b571dc53e3bd694dc6
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD534dcf49ee453d9786c60499768f8e6a3
SHA117208b746088a2f66b17a5e28505843c002a0c1d
SHA2565c3aa2f813cbea33bb553d62c22d3b10ab97602a63ca884a2be988085727e748
SHA51273a5f2fbe0ced7dd784df952c5dfc53bed2e8adb041e01a38f3ba630994e9cc558afd6e4609e8e3fe36c90b2cca999d9458269658af20a2ef28a681ee50146bd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD571fe2f8d6a4898d01535862f198b4f66
SHA1dd1cf9c8bede45f5259707ce2df62c34bf768a54
SHA256b396aafc74772e5872ff0f83ce976a6862f33ad59fb3f21973e700a1ce68812e
SHA51230e95849a3e1c01ffafa7d75e2666f27f4a7706d0d8633f1f51a2406cb39d7fa2515d4228fa4e1610553c10265ac1f33331718d9a09252822765c56729b4df35
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD590301a832d7db98798165afbffb69f84
SHA1dea60bd172ce6c734ac598490b0e78b0301a5d0e
SHA2562fe09be1aa986a32f08e6e0bf174ad44db89ee444058eb1d8284411f2ff39871
SHA512f1209910e99c6abdcda5d8832956d1a28e066b20de4869aacc585b66ea6ed2ab874ec4fc83f79a54cfbfe04e24204e18bda59afeb134e52e63b8e4507e00c458
-
Filesize
4.1MB
MD5cfe24ff51110f378c8d7d8c5c422795b
SHA10f8b51c6a49fa3984dc2a17523471d9676f055e2
SHA2563db2b39fea5b8881c24cf0bce3902865fa24f745a05d3d563ecfbeee598dcd39
SHA512e6201b362bfd56dac40e0d0f39f315487dc43c07af9b1a36a1d7a75aa82c06301eeea1cc9a71fb576d68965b1979560c5684b6e16b80244c0cd12b48cdcaff9d
-
Filesize
4.1MB
MD5cfe24ff51110f378c8d7d8c5c422795b
SHA10f8b51c6a49fa3984dc2a17523471d9676f055e2
SHA2563db2b39fea5b8881c24cf0bce3902865fa24f745a05d3d563ecfbeee598dcd39
SHA512e6201b362bfd56dac40e0d0f39f315487dc43c07af9b1a36a1d7a75aa82c06301eeea1cc9a71fb576d68965b1979560c5684b6e16b80244c0cd12b48cdcaff9d
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec