Analysis
-
max time kernel
299s -
max time network
293s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
17-12-2023 22:34
Static task
static1
Behavioral task
behavioral1
Sample
ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe
Resource
win7-20231215-en
General
-
Target
ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe
-
Size
735KB
-
MD5
9f5cb3a9a4053a53063a9da9afbf6273
-
SHA1
b1ad9fe9cd4e8ddf11909751a2e0334c86ff206e
-
SHA256
ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1
-
SHA512
aaa720bb50f26f0508f1a3403da7189e7915c5663f08b35dd35299bfb6815c3f20bfb143d35cb57a0a95f623505809434ec28ecb7b90374e674a40381c079b26
-
SSDEEP
12288:xYRY4kQvFK/hSB8W5yWz2izHvqIknzbUtaD0Drt+/wQVbAV:/48SB8W5lzfqIknzCaoDWwWA
Malware Config
Signatures
-
Glupteba payload 16 IoCs
resource yara_rule behavioral1/memory/2900-131-0x0000000002AB0000-0x000000000339B000-memory.dmp family_glupteba behavioral1/memory/1524-147-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2900-305-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1524-317-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2900-340-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2900-341-0x0000000002AB0000-0x000000000339B000-memory.dmp family_glupteba behavioral1/memory/1524-343-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2196-352-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1524-366-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1352-371-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1352-380-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/3048-383-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2196-384-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/3048-430-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/3048-438-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/3048-439-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 44a9DTC2juXKXXN1UzfStvYO.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\44a9DTC2juXKXXN1UzfStvYO.exe = "0" 44a9DTC2juXKXXN1UzfStvYO.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 44a9DTC2juXKXXN1UzfStvYO.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 44a9DTC2juXKXXN1UzfStvYO.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 44a9DTC2juXKXXN1UzfStvYO.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 44a9DTC2juXKXXN1UzfStvYO.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\3HJk5Rtgz9Z8AIy5RAlnPyhK.exe = "0" 3HJk5Rtgz9Z8AIy5RAlnPyhK.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe = "0" ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 44a9DTC2juXKXXN1UzfStvYO.exe -
Modifies boot configuration data using bcdedit 14 IoCs
pid Process 2844 bcdedit.exe 2056 bcdedit.exe 1112 bcdedit.exe 1548 bcdedit.exe 312 bcdedit.exe 1744 bcdedit.exe 1960 bcdedit.exe 1652 bcdedit.exe 1484 bcdedit.exe 752 bcdedit.exe 1144 bcdedit.exe 1524 bcdedit.exe 2000 bcdedit.exe 2140 bcdedit.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\Winmon.sys csrss.exe -
Modifies Windows Firewall 1 TTPs 2 IoCs
pid Process 2516 netsh.exe 2424 netsh.exe -
Possible attempt to disable PatchGuard 2 TTPs
Rootkits can use kernel patching to embed themselves in an operating system.
-
Drops startup file 8 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qBnvgDSGIWNNYWkQycaHVHv4.bat InstallUtil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cwrIYrGiQtLwHcJDzlp78yO3.bat InstallUtil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\YxnIT5KJfLvDqw0XgtmjKskN.bat InstallUtil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Z95Fte23Ss5sJy3O2LAJQjT3.bat InstallUtil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CtPuOj9GvLPwnkytpY3M1Aar.bat InstallUtil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\KD8Sm2gKzFzbf0UkKldxC2sD.bat InstallUtil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LDvyXqtSB6RYjDZR3q3mPP1E.bat InstallUtil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wOaaGQZQ2sAGdR8mQPTKFZS5.bat InstallUtil.exe -
Executes dropped EXE 17 IoCs
pid Process 2172 MbUjeOZ73F7OhVaaBNfBU4aX.exe 2900 3HJk5Rtgz9Z8AIy5RAlnPyhK.exe 1516 jt5z7FgliaYvB5ifrWDc1rJL.exe 1524 44a9DTC2juXKXXN1UzfStvYO.exe 1484 UimZiAJPVK1OjEUmnE8FVbQ3.exe 2976 jt5z7FgliaYvB5ifrWDc1rJL.tmp 2660 kphonelib.exe 1920 ddDytu91Ba5WLM6th5clz2WM.exe 1924 kphonelib.exe 2196 3HJk5Rtgz9Z8AIy5RAlnPyhK.exe 1352 44a9DTC2juXKXXN1UzfStvYO.exe 3048 csrss.exe 2656 patch.exe 2672 injector.exe 2108 dsefix.exe 2268 windefender.exe 2860 windefender.exe -
Loads dropped DLL 33 IoCs
pid Process 2828 InstallUtil.exe 2828 InstallUtil.exe 2828 InstallUtil.exe 2828 InstallUtil.exe 2828 InstallUtil.exe 2828 InstallUtil.exe 2828 InstallUtil.exe 2828 InstallUtil.exe 1484 UimZiAJPVK1OjEUmnE8FVbQ3.exe 1516 jt5z7FgliaYvB5ifrWDc1rJL.exe 2976 jt5z7FgliaYvB5ifrWDc1rJL.tmp 2976 jt5z7FgliaYvB5ifrWDc1rJL.tmp 2976 jt5z7FgliaYvB5ifrWDc1rJL.tmp 2976 jt5z7FgliaYvB5ifrWDc1rJL.tmp 2976 jt5z7FgliaYvB5ifrWDc1rJL.tmp 2828 InstallUtil.exe 1920 ddDytu91Ba5WLM6th5clz2WM.exe 1920 ddDytu91Ba5WLM6th5clz2WM.exe 1484 UimZiAJPVK1OjEUmnE8FVbQ3.exe 1352 44a9DTC2juXKXXN1UzfStvYO.exe 1352 44a9DTC2juXKXXN1UzfStvYO.exe 848 Process not Found 2656 patch.exe 2656 patch.exe 2656 patch.exe 2656 patch.exe 2656 patch.exe 3048 csrss.exe 1920 ddDytu91Ba5WLM6th5clz2WM.exe 2656 patch.exe 2656 patch.exe 2656 patch.exe 3048 csrss.exe -
Registers COM server for autorun 1 TTPs 11 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\CLSID\{2ED1CAC3-5661-FFFE-2CE7-8D413F916553}\InProcServer32 ddDytu91Ba5WLM6th5clz2WM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1AD1CAC3-5661-FFFE-2CE7-8D413F916553}\InProcServer32\ = "C:\\Windows\\servicing\\Editions\\libzmq.dll" ddDytu91Ba5WLM6th5clz2WM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD1CAC3-5661-FFFE-2CE7-8D413F916553}\InProcServer32\ThreadingModel = "Apartment" ddDytu91Ba5WLM6th5clz2WM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2ED1CAC3-5661-FFFE-2CE7-8D413F916553}\InProcServer32\ThreadingModel = "Apartment" ddDytu91Ba5WLM6th5clz2WM.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2ED1CAC3-5661-FFFE-2CE7-8D413F916553}\InProcServer32 ddDytu91Ba5WLM6th5clz2WM.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\CLSID\{1FD1CAC3-5661-FFFE-2CE7-8D413F916553}\InProcServer32 ddDytu91Ba5WLM6th5clz2WM.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1AD1CAC3-5661-FFFE-2CE7-8D413F916553}\InProcServer32 ddDytu91Ba5WLM6th5clz2WM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1AD1CAC3-5661-FFFE-2CE7-8D413F916553}\InProcServer32\ThreadingModel = "Apartment" ddDytu91Ba5WLM6th5clz2WM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD1CAC3-5661-FFFE-2CE7-8D413F916553}\InProcServer32\ = "C:\\Windows\\servicing\\Editions\\libzmq.dll" ddDytu91Ba5WLM6th5clz2WM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2ED1CAC3-5661-FFFE-2CE7-8D413F916553}\InProcServer32\ = "C:\\Windows\\servicing\\Editions\\libzmq.dll" ddDytu91Ba5WLM6th5clz2WM.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD1CAC3-5661-FFFE-2CE7-8D413F916553}\InProcServer32 ddDytu91Ba5WLM6th5clz2WM.exe -
resource yara_rule behavioral1/files/0x000600000001753f-115.dat upx behavioral1/files/0x000600000001753f-119.dat upx behavioral1/files/0x000600000001753f-116.dat upx behavioral1/memory/1484-125-0x0000000000210000-0x0000000000738000-memory.dmp upx behavioral1/memory/1484-346-0x0000000000210000-0x0000000000738000-memory.dmp upx behavioral1/files/0x0005000000004ed7-714.dat upx behavioral1/memory/2268-716-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/files/0x0005000000004ed7-717.dat upx behavioral1/memory/2860-719-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/2268-721-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/2860-735-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\3HJk5Rtgz9Z8AIy5RAlnPyhK.exe = "0" 3HJk5Rtgz9Z8AIy5RAlnPyhK.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 44a9DTC2juXKXXN1UzfStvYO.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 44a9DTC2juXKXXN1UzfStvYO.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 44a9DTC2juXKXXN1UzfStvYO.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 44a9DTC2juXKXXN1UzfStvYO.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe = "0" ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 44a9DTC2juXKXXN1UzfStvYO.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 44a9DTC2juXKXXN1UzfStvYO.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\44a9DTC2juXKXXN1UzfStvYO.exe = "0" 44a9DTC2juXKXXN1UzfStvYO.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 44a9DTC2juXKXXN1UzfStvYO.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 3HJk5Rtgz9Z8AIy5RAlnPyhK.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Manipulates WinMon driver. 1 IoCs
Roottkits write to WinMon to hide PIDs from being detected.
description ioc Process File opened for modification \??\WinMon csrss.exe -
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1320 set thread context of 2828 1320 ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe 32 PID 2172 set thread context of 1664 2172 MbUjeOZ73F7OhVaaBNfBU4aX.exe 54 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 3HJk5Rtgz9Z8AIy5RAlnPyhK.exe File opened (read-only) \??\VBoxMiniRdrDN 44a9DTC2juXKXXN1UzfStvYO.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\KPhoneLib\bin\x86\is-NPVK5.tmp jt5z7FgliaYvB5ifrWDc1rJL.tmp File created C:\Program Files (x86)\ClocX\Lang\Estonian.lng ddDytu91Ba5WLM6th5clz2WM.exe File created C:\Program Files (x86)\ClocX\Presets\dsaqua.bmp ddDytu91Ba5WLM6th5clz2WM.exe File created C:\Program Files (x86)\ClocX\Presets\iSink.bmp ddDytu91Ba5WLM6th5clz2WM.exe File created C:\Program Files (x86)\ClocX\Sounds\ring2.mp3 ddDytu91Ba5WLM6th5clz2WM.exe File created C:\Program Files (x86)\KPhoneLib\bin\x86\is-HTBG4.tmp jt5z7FgliaYvB5ifrWDc1rJL.tmp File created C:\Program Files (x86)\KPhoneLib\stuff\is-7J7L4.tmp jt5z7FgliaYvB5ifrWDc1rJL.tmp File opened for modification C:\Program Files (x86)\KPhoneLib\unins000.dat jt5z7FgliaYvB5ifrWDc1rJL.tmp File created C:\Program Files (x86)\ClocX\Presets\AquaB.png ddDytu91Ba5WLM6th5clz2WM.exe File created C:\Program Files (x86)\ClocX\Presets\BallClockAmber.bmp ddDytu91Ba5WLM6th5clz2WM.exe File created C:\Program Files (x86)\ClocX\Presets\Kirchenuhr.png ddDytu91Ba5WLM6th5clz2WM.exe File created C:\Program Files (x86)\ClocX\Lang\English.lng ddDytu91Ba5WLM6th5clz2WM.exe File created C:\Program Files (x86)\ClocX\Presets\MickeyClock.ini ddDytu91Ba5WLM6th5clz2WM.exe File created C:\Program Files (x86)\ClocX\Lang\Hungarian.lng ddDytu91Ba5WLM6th5clz2WM.exe File created C:\Program Files (x86)\ClocX\Lang\Turkce.lng ddDytu91Ba5WLM6th5clz2WM.exe File created C:\Program Files (x86)\ClocX\Presets\BallClockAqua.bmp ddDytu91Ba5WLM6th5clz2WM.exe File created C:\Program Files (x86)\ClocX\Presets\GroenneKugler.ini ddDytu91Ba5WLM6th5clz2WM.exe File created C:\Program Files (x86)\KPhoneLib\bin\x86\is-NGK0L.tmp jt5z7FgliaYvB5ifrWDc1rJL.tmp File created C:\Program Files (x86)\ClocX\Lang\Indonesian.lng ddDytu91Ba5WLM6th5clz2WM.exe File created C:\Program Files (x86)\ClocX\Presets\earth.png ddDytu91Ba5WLM6th5clz2WM.exe File created C:\Program Files (x86)\ClocX\Presets\iSink.png ddDytu91Ba5WLM6th5clz2WM.exe File created C:\Program Files (x86)\ClocX\Presets\klokje.png ddDytu91Ba5WLM6th5clz2WM.exe File created C:\Program Files (x86)\ClocX\Presets\roman2\roman2minute.png ddDytu91Ba5WLM6th5clz2WM.exe File created C:\Program Files (x86)\KPhoneLib\bin\x86\is-K4ABV.tmp jt5z7FgliaYvB5ifrWDc1rJL.tmp File created C:\Program Files (x86)\ClocX\Presets\AJ-CityHall-500-hour.hpng ddDytu91Ba5WLM6th5clz2WM.exe File created C:\Program Files (x86)\ClocX\Presets\MClkminHand.hpng ddDytu91Ba5WLM6th5clz2WM.exe File created C:\Program Files (x86)\ClocX\Presets\Negro.ini ddDytu91Ba5WLM6th5clz2WM.exe File created C:\Program Files (x86)\ClocX\Presets\White_Apple_Clock.bmp ddDytu91Ba5WLM6th5clz2WM.exe File created C:\Program Files (x86)\KPhoneLib\bin\x86\is-3Q5KN.tmp jt5z7FgliaYvB5ifrWDc1rJL.tmp File created C:\Program Files (x86)\KPhoneLib\bin\x86\is-7196V.tmp jt5z7FgliaYvB5ifrWDc1rJL.tmp File created C:\Program Files (x86)\ClocX\Lang\Suomi.lng ddDytu91Ba5WLM6th5clz2WM.exe File created C:\Program Files (x86)\ClocX\Presets\Aqua_Apple_Clock.bmp ddDytu91Ba5WLM6th5clz2WM.exe File created C:\Program Files (x86)\ClocX\Presets\UniversalAccessClock.bmp ddDytu91Ba5WLM6th5clz2WM.exe File created C:\Program Files (x86)\ClocX\Lang\Greek.lng ddDytu91Ba5WLM6th5clz2WM.exe File created C:\Program Files (x86)\ClocX\Presets\BubbleClock.png ddDytu91Ba5WLM6th5clz2WM.exe File created C:\Program Files (x86)\ClocX\Presets\Citizen.png ddDytu91Ba5WLM6th5clz2WM.exe File created C:\Program Files (x86)\ClocX\Presets\MilkClock.bmp ddDytu91Ba5WLM6th5clz2WM.exe File created C:\Program Files (x86)\ClocX\Presets\weemsplath.png ddDytu91Ba5WLM6th5clz2WM.exe File created C:\Program Files (x86)\KPhoneLib\bin\x86\is-42VMO.tmp jt5z7FgliaYvB5ifrWDc1rJL.tmp File created C:\Program Files (x86)\KPhoneLib\bin\x86\is-KP5P7.tmp jt5z7FgliaYvB5ifrWDc1rJL.tmp File created C:\Program Files (x86)\ClocX\Lang\Arabic.lng ddDytu91Ba5WLM6th5clz2WM.exe File created C:\Program Files (x86)\ClocX\Lang\Bulgarian.lng ddDytu91Ba5WLM6th5clz2WM.exe File created C:\Program Files (x86)\ClocX\Presets\klokje.ini ddDytu91Ba5WLM6th5clz2WM.exe File created C:\Program Files (x86)\ClocX\Presets\domeclock\domemin.png ddDytu91Ba5WLM6th5clz2WM.exe File created C:\Program Files (x86)\ClocX\Presets\Adler.png ddDytu91Ba5WLM6th5clz2WM.exe File created C:\Program Files (x86)\ClocX\Presets\BallClockIce.bmp ddDytu91Ba5WLM6th5clz2WM.exe File created C:\Program Files (x86)\ClocX\Presets\DarkCrystalBall.ini ddDytu91Ba5WLM6th5clz2WM.exe File created C:\Program Files (x86)\ClocX\Presets\MickeyMouse.png ddDytu91Ba5WLM6th5clz2WM.exe File created C:\Program Files (x86)\ClocX\Presets\Nvidia.png ddDytu91Ba5WLM6th5clz2WM.exe File created C:\Program Files (x86)\ClocX\uninst.exe ddDytu91Ba5WLM6th5clz2WM.exe File created C:\Program Files (x86)\KPhoneLib\bin\x86\is-L9H90.tmp jt5z7FgliaYvB5ifrWDc1rJL.tmp File created C:\Program Files (x86)\ClocX\Lang\Polish.lng ddDytu91Ba5WLM6th5clz2WM.exe File created C:\Program Files (x86)\ClocX\Lang\Thai.lng ddDytu91Ba5WLM6th5clz2WM.exe File created C:\Program Files (x86)\ClocX\Lang\Traditional_Chinese.lng ddDytu91Ba5WLM6th5clz2WM.exe File created C:\Program Files (x86)\ClocX\Presets\Octopye2.ini ddDytu91Ba5WLM6th5clz2WM.exe File created C:\Program Files (x86)\ClocX\Presets\VioletteKugler.png ddDytu91Ba5WLM6th5clz2WM.exe File created C:\Program Files (x86)\KPhoneLib\bin\x86\is-IGA8L.tmp jt5z7FgliaYvB5ifrWDc1rJL.tmp File created C:\Program Files (x86)\ClocX\Presets\AJ-CityHall-500-minute.hpng ddDytu91Ba5WLM6th5clz2WM.exe File created C:\Program Files (x86)\ClocX\Presets\GroenneKugler.png ddDytu91Ba5WLM6th5clz2WM.exe File created C:\Program Files (x86)\KPhoneLib\bin\x86\is-3ME0O.tmp jt5z7FgliaYvB5ifrWDc1rJL.tmp File created C:\Program Files (x86)\KPhoneLib\bin\x86\is-UQ0R3.tmp jt5z7FgliaYvB5ifrWDc1rJL.tmp File created C:\Program Files (x86)\ClocX\Presets\BlueBallOnlyDots.ini ddDytu91Ba5WLM6th5clz2WM.exe File created C:\Program Files (x86)\ClocX\Presets\CarpeDiem.png ddDytu91Ba5WLM6th5clz2WM.exe File created C:\Program Files (x86)\ClocX\Presets\Holzuhr.png ddDytu91Ba5WLM6th5clz2WM.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File opened for modification C:\Windows\rss 3HJk5Rtgz9Z8AIy5RAlnPyhK.exe File created C:\Windows\rss\csrss.exe 3HJk5Rtgz9Z8AIy5RAlnPyhK.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe File created C:\Windows\servicing\Editions\libzmq.dll ddDytu91Ba5WLM6th5clz2WM.exe File created C:\Windows\Logs\CBS\CbsPersist_20231217223540.cab makecab.exe File opened for modification C:\Windows\rss 44a9DTC2juXKXXN1UzfStvYO.exe File created C:\Windows\rss\csrss.exe 44a9DTC2juXKXXN1UzfStvYO.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2196 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 8 IoCs
resource yara_rule behavioral1/files/0x000500000001a3f8-279.dat nsis_installer_1 behavioral1/files/0x000500000001a3f8-279.dat nsis_installer_2 behavioral1/files/0x000500000001a3f8-277.dat nsis_installer_1 behavioral1/files/0x000500000001a3f8-277.dat nsis_installer_2 behavioral1/files/0x000500000001a3f8-280.dat nsis_installer_1 behavioral1/files/0x000500000001a3f8-280.dat nsis_installer_2 behavioral1/files/0x000500000001a3f8-281.dat nsis_installer_1 behavioral1/files/0x000500000001a3f8-281.dat nsis_installer_2 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2916 schtasks.exe 280 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-122 = "SA Pacific Standard Time" 3HJk5Rtgz9Z8AIy5RAlnPyhK.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-652 = "AUS Central Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-91 = "Pacific SA Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-2 = "Provides IPsec based enforcement for Network Access Protection" netsh.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\NetTrace netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-111 = "Eastern Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-521 = "N. Central Asia Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-292 = "Central European Standard Time" 3HJk5Rtgz9Z8AIy5RAlnPyhK.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-361 = "GTB Daylight Time" 3HJk5Rtgz9Z8AIy5RAlnPyhK.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-1412 = "Syria Standard Time" 3HJk5Rtgz9Z8AIy5RAlnPyhK.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-692 = "Tasmania Standard Time" 3HJk5Rtgz9Z8AIy5RAlnPyhK.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\tsgqec.dll,-102 = "1.0" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-434 = "Georgian Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-632 = "Tokyo Standard Time" 3HJk5Rtgz9Z8AIy5RAlnPyhK.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-1042 = "Ulaanbaatar Standard Time" 3HJk5Rtgz9Z8AIy5RAlnPyhK.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-292 = "Central European Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-541 = "Myanmar Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-22 = "Cape Verde Standard Time" 3HJk5Rtgz9Z8AIy5RAlnPyhK.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-451 = "Caucasus Daylight Time" 3HJk5Rtgz9Z8AIy5RAlnPyhK.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-371 = "Jerusalem Daylight Time" 3HJk5Rtgz9Z8AIy5RAlnPyhK.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-471 = "Ekaterinburg Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-215 = "Pacific Standard Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-741 = "New Zealand Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-731 = "Fiji Daylight Time" 3HJk5Rtgz9Z8AIy5RAlnPyhK.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-332 = "E. Europe Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-1021 = "Bangladesh Daylight Time" 3HJk5Rtgz9Z8AIy5RAlnPyhK.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-421 = "Russian Daylight Time" 3HJk5Rtgz9Z8AIy5RAlnPyhK.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-222 = "Alaskan Standard Time" 3HJk5Rtgz9Z8AIy5RAlnPyhK.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-602 = "Taipei Standard Time" 3HJk5Rtgz9Z8AIy5RAlnPyhK.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-201 = "US Mountain Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-182 = "Mountain Standard Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-552 = "North Asia Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-681 = "E. Australia Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-731 = "Fiji Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-202 = "US Mountain Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-462 = "Afghanistan Standard Time" 3HJk5Rtgz9Z8AIy5RAlnPyhK.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-4 = "1.0" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-162 = "Central Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-42 = "E. South America Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-448 = "Azerbaijan Daylight Time" 3HJk5Rtgz9Z8AIy5RAlnPyhK.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-462 = "Afghanistan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-142 = "Canada Central Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-151 = "Central America Daylight Time" 3HJk5Rtgz9Z8AIy5RAlnPyhK.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-501 = "Nepal Daylight Time" 3HJk5Rtgz9Z8AIy5RAlnPyhK.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-221 = "Alaskan Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-722 = "Central Pacific Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-721 = "Central Pacific Daylight Time" 3HJk5Rtgz9Z8AIy5RAlnPyhK.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-41 = "E. South America Daylight Time" 3HJk5Rtgz9Z8AIy5RAlnPyhK.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-12 = "Azores Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-104 = "Central Brazilian Daylight Time" 3HJk5Rtgz9Z8AIy5RAlnPyhK.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-741 = "New Zealand Daylight Time" 3HJk5Rtgz9Z8AIy5RAlnPyhK.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-961 = "Paraguay Daylight Time" 3HJk5Rtgz9Z8AIy5RAlnPyhK.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-301 = "Romance Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-152 = "Central America Standard Time" 3HJk5Rtgz9Z8AIy5RAlnPyhK.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-32 = "Mid-Atlantic Standard Time" 3HJk5Rtgz9Z8AIy5RAlnPyhK.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-3 = "Microsoft Corporation" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-282 = "Central Europe Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-384 = "Namibia Daylight Time" 3HJk5Rtgz9Z8AIy5RAlnPyhK.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-911 = "Mauritius Daylight Time" 3HJk5Rtgz9Z8AIy5RAlnPyhK.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-121 = "SA Pacific Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" 3HJk5Rtgz9Z8AIy5RAlnPyhK.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-241 = "Samoa Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-201 = "US Mountain Daylight Time" 3HJk5Rtgz9Z8AIy5RAlnPyhK.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-1021 = "Bangladesh Daylight Time" windefender.exe -
Modifies registry class 22 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD1CAC3-5661-FFFE-2CE7-8D413F916553}\InProcServer32 ddDytu91Ba5WLM6th5clz2WM.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD1CAC3-5661-FFFE-2CE7-8D413F916553} ddDytu91Ba5WLM6th5clz2WM.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\CLSID\{1FD1CAC3-5661-FFFE-2CE7-8D413F916553} ddDytu91Ba5WLM6th5clz2WM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1AD1CAC3-5661-FFFE-2CE7-8D413F916553}\InProcServer32\ = "C:\\Windows\\servicing\\Editions\\libzmq.dll" ddDytu91Ba5WLM6th5clz2WM.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\CopyHookHandlers\FileSystemEx ddDytu91Ba5WLM6th5clz2WM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2ED1CAC3-5661-FFFE-2CE7-8D413F916553}\InProcServer32\ = "C:\\Windows\\servicing\\Editions\\libzmq.dll" ddDytu91Ba5WLM6th5clz2WM.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID ddDytu91Ba5WLM6th5clz2WM.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2ED1CAC3-5661-FFFE-2CE7-8D413F916553}\InProcServer32 ddDytu91Ba5WLM6th5clz2WM.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\CLSID\{2ED1CAC3-5661-FFFE-2CE7-8D413F916553}\InProcServer32 ddDytu91Ba5WLM6th5clz2WM.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1AD1CAC3-5661-FFFE-2CE7-8D413F916553}\InProcServer32 ddDytu91Ba5WLM6th5clz2WM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD1CAC3-5661-FFFE-2CE7-8D413F916553}\InProcServer32\ = "C:\\Windows\\servicing\\Editions\\libzmq.dll" ddDytu91Ba5WLM6th5clz2WM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD1CAC3-5661-FFFE-2CE7-8D413F916553}\InProcServer32\ThreadingModel = "Apartment" ddDytu91Ba5WLM6th5clz2WM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1AD1CAC3-5661-FFFE-2CE7-8D413F916553}\InProcServer32\ThreadingModel = "Apartment" ddDytu91Ba5WLM6th5clz2WM.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\ShellEx\{e357fccd-a995-4576-b01f-234630154e96} ddDytu91Ba5WLM6th5clz2WM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\{e357fccd-a995-4576-b01f-234630154e96}\ = "{1AD1CAC3-5661-FFFE-2CE7-8D413F916553}" ddDytu91Ba5WLM6th5clz2WM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2ED1CAC3-5661-FFFE-2CE7-8D413F916553}\InProcServer32\ThreadingModel = "Apartment" ddDytu91Ba5WLM6th5clz2WM.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\CLSID\{1FD1CAC3-5661-FFFE-2CE7-8D413F916553}\InProcServer32 ddDytu91Ba5WLM6th5clz2WM.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\CLSID ddDytu91Ba5WLM6th5clz2WM.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2ED1CAC3-5661-FFFE-2CE7-8D413F916553} ddDytu91Ba5WLM6th5clz2WM.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\CLSID\{2ED1CAC3-5661-FFFE-2CE7-8D413F916553} ddDytu91Ba5WLM6th5clz2WM.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1AD1CAC3-5661-FFFE-2CE7-8D413F916553} ddDytu91Ba5WLM6th5clz2WM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\CopyHookHandlers\FileSystemEx\ = "{2ED1CAC3-5661-FFFE-2CE7-8D413F916553}" ddDytu91Ba5WLM6th5clz2WM.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 1400000001000000140000004e2254201895e6e36ee60ffafab912ed06178f39030000000100000014000000df3c24f9bfd666761b268073fe06d1cc8d4f82a40f00000001000000200000004b4eb4b074298b828b5c003095a10b4523fb951c0c88348b09c53e5baba408a32000000001000000920300003082038e30820276a0030201020210033af1e6a711a9a0bb2864b11d09fae5300d06092a864886f70d01010b05003061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f74204732301e170d3133303830313132303030305a170d3338303131353132303030305a3061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f7420473230820122300d06092a864886f70d01010105000382010f003082010a0282010100bb37cd34dc7b6bc9b26890ad4a75ff46ba210a088df51954c9fb88dbf3aef23a89913c7ae6ab061a6bcfac2de85e092444ba629a7ed6a3a87ee054752005ac50b79c631a6c30dcda1f19b1d71edefdd7e0cb948337aeec1f434edd7b2cd2bd2ea52fe4a9b8ad3ad499a4b625e99b6b00609260ff4f214918f76790ab61069c8ff2bae9b4e992326bb5f357e85d1bcd8c1dab95049549f3352d96e3496ddd77e3fb494bb4ac5507a98f95b3b423bb4c6d45f0f6a9b29530b4fd4c558c274a57147c829dcd7392d3164a060c8c50d18f1e09be17a1e621cafd83e510bc83a50ac46728f67314143d4676c387148921344daf0f450ca649a1babb9cc5b1338329850203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020186301d0603551d0e041604144e2254201895e6e36ee60ffafab912ed06178f39300d06092a864886f70d01010b05000382010100606728946f0e4863eb31ddea6718d5897d3cc58b4a7fe9bedb2b17dfb05f73772a3213398167428423f2456735ec88bff88fb0610c34a4ae204c84c6dbf835e176d9dfa642bbc74408867f3674245ada6c0d145935bdf249ddb61fc9b30d472a3d992fbb5cbbb5d420e1995f534615db689bf0f330d53e31e28d849ee38adada963e3513a55ff0f970507047411157194ec08fae06c49513172f1b259f75f2b18e99a16f13b14171fe882ac84f102055d7f31445e5e044f4ea879532930efe5346fa2c9dff8b22b94bd90945a4dea4b89a58dd1b7d529f8e59438881a49e26d56faddd0dc6377ded03921be5775f76ee3c8dc45d565ba2d9666eb33537e532b6 patch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 patch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4 csrss.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 040000000100000010000000e4a68ac854ac5242460afd72481b2a440f00000001000000200000004b4eb4b074298b828b5c003095a10b4523fb951c0c88348b09c53e5baba408a3030000000100000014000000df3c24f9bfd666761b268073fe06d1cc8d4f82a41400000001000000140000004e2254201895e6e36ee60ffafab912ed06178f392000000001000000920300003082038e30820276a0030201020210033af1e6a711a9a0bb2864b11d09fae5300d06092a864886f70d01010b05003061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f74204732301e170d3133303830313132303030305a170d3338303131353132303030305a3061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f7420473230820122300d06092a864886f70d01010105000382010f003082010a0282010100bb37cd34dc7b6bc9b26890ad4a75ff46ba210a088df51954c9fb88dbf3aef23a89913c7ae6ab061a6bcfac2de85e092444ba629a7ed6a3a87ee054752005ac50b79c631a6c30dcda1f19b1d71edefdd7e0cb948337aeec1f434edd7b2cd2bd2ea52fe4a9b8ad3ad499a4b625e99b6b00609260ff4f214918f76790ab61069c8ff2bae9b4e992326bb5f357e85d1bcd8c1dab95049549f3352d96e3496ddd77e3fb494bb4ac5507a98f95b3b423bb4c6d45f0f6a9b29530b4fd4c558c274a57147c829dcd7392d3164a060c8c50d18f1e09be17a1e621cafd83e510bc83a50ac46728f67314143d4676c387148921344daf0f450ca649a1babb9cc5b1338329850203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020186301d0603551d0e041604144e2254201895e6e36ee60ffafab912ed06178f39300d06092a864886f70d01010b05000382010100606728946f0e4863eb31ddea6718d5897d3cc58b4a7fe9bedb2b17dfb05f73772a3213398167428423f2456735ec88bff88fb0610c34a4ae204c84c6dbf835e176d9dfa642bbc74408867f3674245ada6c0d145935bdf249ddb61fc9b30d472a3d992fbb5cbbb5d420e1995f534615db689bf0f330d53e31e28d849ee38adada963e3513a55ff0f970507047411157194ec08fae06c49513172f1b259f75f2b18e99a16f13b14171fe882ac84f102055d7f31445e5e044f4ea879532930efe5346fa2c9dff8b22b94bd90945a4dea4b89a58dd1b7d529f8e59438881a49e26d56faddd0dc6377ded03921be5775f76ee3c8dc45d565ba2d9666eb33537e532b6 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 030000000100000014000000df3c24f9bfd666761b268073fe06d1cc8d4f82a42000000001000000920300003082038e30820276a0030201020210033af1e6a711a9a0bb2864b11d09fae5300d06092a864886f70d01010b05003061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f74204732301e170d3133303830313132303030305a170d3338303131353132303030305a3061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f7420473230820122300d06092a864886f70d01010105000382010f003082010a0282010100bb37cd34dc7b6bc9b26890ad4a75ff46ba210a088df51954c9fb88dbf3aef23a89913c7ae6ab061a6bcfac2de85e092444ba629a7ed6a3a87ee054752005ac50b79c631a6c30dcda1f19b1d71edefdd7e0cb948337aeec1f434edd7b2cd2bd2ea52fe4a9b8ad3ad499a4b625e99b6b00609260ff4f214918f76790ab61069c8ff2bae9b4e992326bb5f357e85d1bcd8c1dab95049549f3352d96e3496ddd77e3fb494bb4ac5507a98f95b3b423bb4c6d45f0f6a9b29530b4fd4c558c274a57147c829dcd7392d3164a060c8c50d18f1e09be17a1e621cafd83e510bc83a50ac46728f67314143d4676c387148921344daf0f450ca649a1babb9cc5b1338329850203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020186301d0603551d0e041604144e2254201895e6e36ee60ffafab912ed06178f39300d06092a864886f70d01010b05000382010100606728946f0e4863eb31ddea6718d5897d3cc58b4a7fe9bedb2b17dfb05f73772a3213398167428423f2456735ec88bff88fb0610c34a4ae204c84c6dbf835e176d9dfa642bbc74408867f3674245ada6c0d145935bdf249ddb61fc9b30d472a3d992fbb5cbbb5d420e1995f534615db689bf0f330d53e31e28d849ee38adada963e3513a55ff0f970507047411157194ec08fae06c49513172f1b259f75f2b18e99a16f13b14171fe882ac84f102055d7f31445e5e044f4ea879532930efe5346fa2c9dff8b22b94bd90945a4dea4b89a58dd1b7d529f8e59438881a49e26d56faddd0dc6377ded03921be5775f76ee3c8dc45d565ba2d9666eb33537e532b6 csrss.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1320 ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe 1320 ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe 1320 ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe 1320 ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe 2480 powershell.exe 1920 ddDytu91Ba5WLM6th5clz2WM.exe 1920 ddDytu91Ba5WLM6th5clz2WM.exe 1920 ddDytu91Ba5WLM6th5clz2WM.exe 1920 ddDytu91Ba5WLM6th5clz2WM.exe 1920 ddDytu91Ba5WLM6th5clz2WM.exe 1920 ddDytu91Ba5WLM6th5clz2WM.exe 1920 ddDytu91Ba5WLM6th5clz2WM.exe 1920 ddDytu91Ba5WLM6th5clz2WM.exe 2900 3HJk5Rtgz9Z8AIy5RAlnPyhK.exe 1524 44a9DTC2juXKXXN1UzfStvYO.exe 1524 44a9DTC2juXKXXN1UzfStvYO.exe 2196 3HJk5Rtgz9Z8AIy5RAlnPyhK.exe 2196 3HJk5Rtgz9Z8AIy5RAlnPyhK.exe 2196 3HJk5Rtgz9Z8AIy5RAlnPyhK.exe 2196 3HJk5Rtgz9Z8AIy5RAlnPyhK.exe 2196 3HJk5Rtgz9Z8AIy5RAlnPyhK.exe 1352 44a9DTC2juXKXXN1UzfStvYO.exe 1352 44a9DTC2juXKXXN1UzfStvYO.exe 1352 44a9DTC2juXKXXN1UzfStvYO.exe 1352 44a9DTC2juXKXXN1UzfStvYO.exe 1352 44a9DTC2juXKXXN1UzfStvYO.exe 2672 injector.exe 2672 injector.exe 2672 injector.exe 2672 injector.exe 2672 injector.exe 2672 injector.exe 2672 injector.exe 2672 injector.exe 2672 injector.exe 2672 injector.exe 2672 injector.exe 2672 injector.exe 2672 injector.exe 2672 injector.exe 2672 injector.exe 2672 injector.exe 2672 injector.exe 2672 injector.exe 2672 injector.exe 2672 injector.exe 2672 injector.exe 2672 injector.exe 2672 injector.exe 2672 injector.exe 2672 injector.exe 2672 injector.exe 2672 injector.exe 2672 injector.exe 2672 injector.exe 2672 injector.exe 2672 injector.exe 2672 injector.exe 2672 injector.exe 2672 injector.exe 2672 injector.exe 2672 injector.exe 2672 injector.exe 2672 injector.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 464 Process not Found -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 1320 ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe Token: SeDebugPrivilege 2828 InstallUtil.exe Token: SeDebugPrivilege 2480 powershell.exe Token: SeDebugPrivilege 2900 3HJk5Rtgz9Z8AIy5RAlnPyhK.exe Token: SeImpersonatePrivilege 2900 3HJk5Rtgz9Z8AIy5RAlnPyhK.exe Token: SeDebugPrivilege 1524 44a9DTC2juXKXXN1UzfStvYO.exe Token: SeImpersonatePrivilege 1524 44a9DTC2juXKXXN1UzfStvYO.exe Token: SeDebugPrivilege 1524 44a9DTC2juXKXXN1UzfStvYO.exe Token: SeImpersonatePrivilege 1524 44a9DTC2juXKXXN1UzfStvYO.exe Token: SeSystemEnvironmentPrivilege 3048 csrss.exe Token: SeSecurityPrivilege 2196 sc.exe Token: SeSecurityPrivilege 2196 sc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2976 jt5z7FgliaYvB5ifrWDc1rJL.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1320 wrote to memory of 2480 1320 ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe 28 PID 1320 wrote to memory of 2480 1320 ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe 28 PID 1320 wrote to memory of 2480 1320 ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe 28 PID 1320 wrote to memory of 2480 1320 ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe 28 PID 1320 wrote to memory of 2732 1320 ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe 30 PID 1320 wrote to memory of 2732 1320 ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe 30 PID 1320 wrote to memory of 2732 1320 ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe 30 PID 1320 wrote to memory of 2732 1320 ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe 30 PID 1320 wrote to memory of 2752 1320 ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe 31 PID 1320 wrote to memory of 2752 1320 ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe 31 PID 1320 wrote to memory of 2752 1320 ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe 31 PID 1320 wrote to memory of 2752 1320 ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe 31 PID 1320 wrote to memory of 2828 1320 ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe 32 PID 1320 wrote to memory of 2828 1320 ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe 32 PID 1320 wrote to memory of 2828 1320 ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe 32 PID 1320 wrote to memory of 2828 1320 ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe 32 PID 1320 wrote to memory of 2828 1320 ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe 32 PID 1320 wrote to memory of 2828 1320 ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe 32 PID 1320 wrote to memory of 2828 1320 ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe 32 PID 1320 wrote to memory of 2828 1320 ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe 32 PID 1320 wrote to memory of 2828 1320 ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe 32 PID 1320 wrote to memory of 2828 1320 ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe 32 PID 1320 wrote to memory of 2828 1320 ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe 32 PID 1320 wrote to memory of 2828 1320 ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe 32 PID 2828 wrote to memory of 2172 2828 InstallUtil.exe 33 PID 2828 wrote to memory of 2172 2828 InstallUtil.exe 33 PID 2828 wrote to memory of 2172 2828 InstallUtil.exe 33 PID 2828 wrote to memory of 2172 2828 InstallUtil.exe 33 PID 2828 wrote to memory of 2900 2828 InstallUtil.exe 34 PID 2828 wrote to memory of 2900 2828 InstallUtil.exe 34 PID 2828 wrote to memory of 2900 2828 InstallUtil.exe 34 PID 2828 wrote to memory of 2900 2828 InstallUtil.exe 34 PID 2828 wrote to memory of 1516 2828 InstallUtil.exe 35 PID 2828 wrote to memory of 1516 2828 InstallUtil.exe 35 PID 2828 wrote to memory of 1516 2828 InstallUtil.exe 35 PID 2828 wrote to memory of 1516 2828 InstallUtil.exe 35 PID 2828 wrote to memory of 1516 2828 InstallUtil.exe 35 PID 2828 wrote to memory of 1516 2828 InstallUtil.exe 35 PID 2828 wrote to memory of 1516 2828 InstallUtil.exe 35 PID 2828 wrote to memory of 1524 2828 InstallUtil.exe 36 PID 2828 wrote to memory of 1524 2828 InstallUtil.exe 36 PID 2828 wrote to memory of 1524 2828 InstallUtil.exe 36 PID 2828 wrote to memory of 1524 2828 InstallUtil.exe 36 PID 2828 wrote to memory of 1484 2828 InstallUtil.exe 37 PID 2828 wrote to memory of 1484 2828 InstallUtil.exe 37 PID 2828 wrote to memory of 1484 2828 InstallUtil.exe 37 PID 2828 wrote to memory of 1484 2828 InstallUtil.exe 37 PID 2828 wrote to memory of 1484 2828 InstallUtil.exe 37 PID 2828 wrote to memory of 1484 2828 InstallUtil.exe 37 PID 2828 wrote to memory of 1484 2828 InstallUtil.exe 37 PID 1516 wrote to memory of 2976 1516 jt5z7FgliaYvB5ifrWDc1rJL.exe 38 PID 1516 wrote to memory of 2976 1516 jt5z7FgliaYvB5ifrWDc1rJL.exe 38 PID 1516 wrote to memory of 2976 1516 jt5z7FgliaYvB5ifrWDc1rJL.exe 38 PID 1516 wrote to memory of 2976 1516 jt5z7FgliaYvB5ifrWDc1rJL.exe 38 PID 1516 wrote to memory of 2976 1516 jt5z7FgliaYvB5ifrWDc1rJL.exe 38 PID 1516 wrote to memory of 2976 1516 jt5z7FgliaYvB5ifrWDc1rJL.exe 38 PID 1516 wrote to memory of 2976 1516 jt5z7FgliaYvB5ifrWDc1rJL.exe 38 PID 2976 wrote to memory of 2596 2976 jt5z7FgliaYvB5ifrWDc1rJL.tmp 42 PID 2976 wrote to memory of 2596 2976 jt5z7FgliaYvB5ifrWDc1rJL.tmp 42 PID 2976 wrote to memory of 2596 2976 jt5z7FgliaYvB5ifrWDc1rJL.tmp 42 PID 2976 wrote to memory of 2596 2976 jt5z7FgliaYvB5ifrWDc1rJL.tmp 42 PID 2976 wrote to memory of 2660 2976 jt5z7FgliaYvB5ifrWDc1rJL.tmp 41 PID 2976 wrote to memory of 2660 2976 jt5z7FgliaYvB5ifrWDc1rJL.tmp 41 PID 2976 wrote to memory of 2660 2976 jt5z7FgliaYvB5ifrWDc1rJL.tmp 41 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe"C:\Users\Admin\AppData\Local\Temp\ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe"1⤵
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1320 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2480
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"2⤵PID:2732
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵PID:2752
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Users\Admin\Pictures\MbUjeOZ73F7OhVaaBNfBU4aX.exe"C:\Users\Admin\Pictures\MbUjeOZ73F7OhVaaBNfBU4aX.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2172 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:1664
-
-
-
C:\Users\Admin\Pictures\3HJk5Rtgz9Z8AIy5RAlnPyhK.exe"C:\Users\Admin\Pictures\3HJk5Rtgz9Z8AIy5RAlnPyhK.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2900 -
C:\Users\Admin\Pictures\3HJk5Rtgz9Z8AIy5RAlnPyhK.exe"C:\Users\Admin\Pictures\3HJk5Rtgz9Z8AIy5RAlnPyhK.exe"4⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2196 -
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:1336
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:2424
-
-
-
-
-
C:\Users\Admin\Pictures\jt5z7FgliaYvB5ifrWDc1rJL.exe"C:\Users\Admin\Pictures\jt5z7FgliaYvB5ifrWDc1rJL.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\is-94OQ3.tmp\jt5z7FgliaYvB5ifrWDc1rJL.tmp"C:\Users\Admin\AppData\Local\Temp\is-94OQ3.tmp\jt5z7FgliaYvB5ifrWDc1rJL.tmp" /SL5="$8012C,6500912,54272,C:\Users\Admin\Pictures\jt5z7FgliaYvB5ifrWDc1rJL.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Program Files (x86)\KPhoneLib\kphonelib.exe"C:\Program Files (x86)\KPhoneLib\kphonelib.exe" -i5⤵
- Executes dropped EXE
PID:2660
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 175⤵PID:2596
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 176⤵PID:2648
-
-
-
C:\Program Files (x86)\KPhoneLib\kphonelib.exe"C:\Program Files (x86)\KPhoneLib\kphonelib.exe" -s5⤵
- Executes dropped EXE
PID:1924
-
-
-
-
C:\Users\Admin\Pictures\44a9DTC2juXKXXN1UzfStvYO.exe"C:\Users\Admin\Pictures\44a9DTC2juXKXXN1UzfStvYO.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1524 -
C:\Users\Admin\Pictures\44a9DTC2juXKXXN1UzfStvYO.exe"C:\Users\Admin\Pictures\44a9DTC2juXKXXN1UzfStvYO.exe"4⤵
- Windows security bypass
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1352 -
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:1828
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:2516
-
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe5⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Manipulates WinMon driver.
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:3048 -
C:\Windows\system32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f6⤵PID:1856
-
-
C:\Windows\system32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:2916
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
PID:2656 -
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -create {71A3C7FC-F751-4982-AEC1-E958357E6813} -d "Windows Fast Mode" -application OSLOADER7⤵
- Modifies boot configuration data using bcdedit
PID:2844
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} device partition=C:7⤵
- Modifies boot configuration data using bcdedit
PID:2056
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} osdevice partition=C:7⤵
- Modifies boot configuration data using bcdedit
PID:1112
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} systemroot \Windows7⤵
- Modifies boot configuration data using bcdedit
PID:1548
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} path \Windows\system32\osloader.exe7⤵
- Modifies boot configuration data using bcdedit
PID:312
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} kernel ntkrnlmp.exe7⤵
- Modifies boot configuration data using bcdedit
PID:1744
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} recoveryenabled 07⤵
- Modifies boot configuration data using bcdedit
PID:1960
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nx OptIn7⤵
- Modifies boot configuration data using bcdedit
PID:1652
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nointegritychecks 17⤵
- Modifies boot configuration data using bcdedit
PID:1484
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} inherit {bootloadersettings}7⤵
- Modifies boot configuration data using bcdedit
PID:752
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -displayorder {71A3C7FC-F751-4982-AEC1-E958357E6813} -addlast7⤵
- Modifies boot configuration data using bcdedit
PID:1144
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -timeout 07⤵
- Modifies boot configuration data using bcdedit
PID:1524
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -default {71A3C7FC-F751-4982-AEC1-E958357E6813}7⤵
- Modifies boot configuration data using bcdedit
PID:2000
-
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2672
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\Sysnative\bcdedit.exe /v6⤵
- Modifies boot configuration data using bcdedit
PID:2140
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exeC:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe6⤵
- Executes dropped EXE
PID:2108
-
-
C:\Windows\system32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:280
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"6⤵
- Executes dropped EXE
PID:2268 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵PID:2692
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)8⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:2196
-
-
-
-
-
-
-
C:\Users\Admin\Pictures\UimZiAJPVK1OjEUmnE8FVbQ3.exe"C:\Users\Admin\Pictures\UimZiAJPVK1OjEUmnE8FVbQ3.exe" --silent --allusers=03⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1484
-
-
C:\Users\Admin\Pictures\ddDytu91Ba5WLM6th5clz2WM.exe"C:\Users\Admin\Pictures\ddDytu91Ba5WLM6th5clz2WM.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1920
-
-
-
C:\Windows\system32\makecab.exe"C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20231217223540.log C:\Windows\Logs\CBS\CbsPersist_20231217223540.cab1⤵
- Drops file in Windows directory
PID:2668
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:2860
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
922KB
MD5fa54e9be14054762f3c3e915c1194377
SHA1db198caff63ea297e4d0a633db85d376290ea732
SHA256db33ff8168bf790598407e536fbe305bfae1a88e136e010cdb3160c6aa743d8a
SHA512d320e13058a7ac2d43a1808fc8a8d5679f52557b44ca28e18ce8aa8df4f6a19d478c646dc43d443a1694e8680e677c81f8ea4a3056dfa00b1b65313642343495
-
Filesize
127KB
MD57262afb8a82b09c850fd834a49c3e983
SHA15829f6fa8d2c21f777439d20c95c8effa3767a9c
SHA2563d8a93eb3bd8fcbafe8ff244dd2dd4c5e34a44d353fd9b0ed1ccf420acffebce
SHA51226cfe8f2ab4c4ecdf5cd45690e8be991abba9ab6cf2364db100203f42d4fdebb635bb9873319fc25e1ac78378a1ed4da119db5fb7c5c39abf92f8e215e303cf9
-
Filesize
133KB
MD5d10503842fa49fb6cf993aa843a801f5
SHA17ea4b9a705786222d56c2219778a2ce7c2ca1ed4
SHA256c52d096d8e7d7b4f88a2938e4010fe9d8815b7440efc77b7fb3ee3a03822cad5
SHA512f58c4032f1d7613cb105c5b2a6df528302f8f2bd86e3ed060b4bf8c66ea17d03c9077934df34749c2236c24b63050cce972b9e89571a080d454228105c194b03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf7ab6481127ef56a4add4314dc9d022
SHA1ea2ec94b1493e948f096df9c6f69f45fe6363864
SHA2566062aeb4be4f8d1dc03f54a5fafdf22416a8c383c69ce3b669d38dfaf3465bc6
SHA5123c92a3b3ccc4a16338f08ae35517142c5a78e8f3ba8e373bab91ca4bd3bfba29ed0d3ffa3ce84c10d1461d5f4a1dae4ce6073fb4957d3f4e9d6ad06cd89468be
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\AAF33CF37E194E98957768CF9C02DE8E2\download.error
Filesize8.3MB
MD5fd2727132edd0b59fa33733daa11d9ef
SHA163e36198d90c4c2b9b09dd6786b82aba5f03d29a
SHA2563a72dbedc490773f90e241c8b3b839383a63ce36426a4f330a0f754b14b4d23e
SHA5123e251be7d0e8db92d50092a4c4be3c74f42f3d564c72981f43a8e0fe06427513bfa0f67821a61a503a4f85741f0b150280389f8f4b4f01cdfd98edce5af29e6e
-
C:\Users\Admin\AppData\Local\Temp\Symbols\winload_prod.pdb\768283CA443847FB8822F9DB1F36ECC51\download.error
Filesize395KB
MD55da3a881ef991e8010deed799f1a5aaf
SHA1fea1acea7ed96d7c9788783781e90a2ea48c1a53
SHA256f18fdb9e03546bfb98397bcb8378b505eaf4ac061749229a7ee92a1c3cf156e4
SHA51224fbcb5353a3d51ee01f1de1bbb965f9e40e0d00e52c42713d446f12edceeb8d08b086a8687a6188decaa8f256899e24a06c424d8d73adaad910149a9c45ef09
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
99KB
MD5261f905891f4c7abbe6f361fd21d42f6
SHA1ccc9a5abf6c31265b3d8e9a7b3f72884b80ba894
SHA256caa4d44c8294a9091083a7251d86c7615a8dc5abee4f6d3d7149142727098294
SHA5129d4a4376daad13980b6b3f5d5060cce07d4a4be59fb56fedf565b7781ffe31b0b12780535921ab2ed003fa8ad4107335508b4937d2a59a61375c0e43974f6961
-
Filesize
41KB
MD5edba22862c1f4356a90d898c929136e3
SHA13787fb3b063de117bb2db49676e7ee3f427abf12
SHA256b6c7645e1fdcb4b532faaa154db6340b9593059404cb9bc0d520425905bf2556
SHA512114098388791d0c1b8a08981be34b941fc778d052ac9ebed1099ab67154442d5ffbd5daa70590f06b9c568cce68f63177e9e34e990b21ac72ae9d4341979c744
-
Filesize
76KB
MD5fc1d046fca3c023617ca31b7713b4f13
SHA1c6093e07ad6a193c69e317bc3489012e1603fe3f
SHA2567529bf54ff2568df4a8c6ed9754d1e44a625403fb3b9d58abe223983b4e98ac8
SHA5121fc29f0c23b1b6c5d37ab5aa32934c28014ca73130f0b82031d00ed6ea8959da78ef2ab917eb87b94c5391a823ede2a4101beee6806c374300f6b6a45faea35e
-
Filesize
401KB
MD55bf6897c7f95721baf986bc2bef24930
SHA1c2d81b0135292a7711da5637050e2cc66ece7923
SHA2569fee2ec241f68765e53a4df557de4281c98a949b8fee0220cced08c003490df4
SHA512051cc36cb9bfe880dd86c3c4259759f645d34ff43e1d835cda22337bff55778b57591a4908f561c2150ed80ca449ef7704121d27cfa5931ee5bd2ee7f2199ba5
-
Filesize
914KB
MD55e3a7b3a99e7aaff25a4f7461b78ad4d
SHA131cd597d0cc88a3db8c17ff93c459e0333e59698
SHA2563aee0417f43c9b5f8b769fe41eef9502f1c04cf46b2ba59cd851d0e3f898717d
SHA51298c6d01ac52118cf8f25fafd53fcff63a12d7d0204b01802cd97e790ecf4193e17411479e90e96b2ad208d75cc8636d049b84087d3062a6f3eccf39c05ea0fa6
-
Filesize
1.3MB
MD52073f9895803d3e0a76c7b81673b6cdd
SHA1c4e0968ae2aa1cbbb16c9a44371f4126b7f30670
SHA2560f646cc8580c3ae4363d8c4449199d06f3e30111763fa91cd36b3fbe19fa2418
SHA5128ebc4617dd77a4d7f88e23021a5a56b1e0e45c464cb45cd50aab99a2e8d5d92b1d4024e93dd1fd6598f957f2f982a7d8335af3d1a2cb248d8007161b314c8353
-
Filesize
456KB
MD5876f67f73488f889e809892f4dc0da16
SHA128b9301872249baf333d2a7c080cd88b5f1110c2
SHA256ae42e5a9656883134b74dcf43a7a117ded784c127bc5e936de3baf5d7a85cf0c
SHA512d036edb351b7442bb1871c1df8eb3dc9a77b1462a36c211153ecb9163fbe0c71585b295cf69edc76e64462ebeae0b775ebda00b2337e03a4d3f855a305a3bf91
-
Filesize
372KB
MD5f4371c1a5d9d97ecc3baed439a322274
SHA11328a67d581f2355844c7870aea3556fdf522f50
SHA256cbb7b790c6862ea12a377ade5402b21e4a00ce22e7dfec5729a82d044d1f4394
SHA51237e4b86e9ac247dda05993088045e43c6d1bf3e772905d200f4c1017d6006b889c33286bd32f1e3ac740c3cbe7d1637fe992addd34fb0da6f7038c0a3d05dcc7
-
Filesize
64KB
MD55b8919bd15bfb26b07a8f8f0afe53496
SHA1514c674ce3b6c1f095ad6a9152a75079fb94e251
SHA256876f1ca29453a9689a298cfb780d605ff074be84067262fae897d881e6005668
SHA512a90f53bb9272cdadbfb274699aed983e009eb77767e946d11bf07d20d7bb56e7c1646f7620d36c5f72d52a1ae4bb62591d865e0da58e0a333e2a6655a54d8757
-
Filesize
1.4MB
MD53c2a4d554932e7ca2e6dae027b625672
SHA149bc55126c9ec4f47666cb21c2e846d3f634f4ce
SHA256d026f48de42b7ec8feac0f0dca1e6c14abad88075df75ec0235b1174fceb4a82
SHA512d11de89805b849ea1348452fc04040de940162f76e0ded2953e20d9e350d2c59978b6d2720edbb6ab1c3bb5c0cf4c59b1ac91aba2c7a7bac1f355b76f4b08846
-
Filesize
430KB
MD5870ddec1badf405be12eeaee4e03a9e4
SHA1c501f1f98bb05f764fc6352898414629386963de
SHA256c02862eceb02778bf5b7e684a331a872d20a792a1af2e9829c9cf141fd9c49ff
SHA512910cbf68d9c581356da77bbfa7e29409a5f72d4b26ae32f3f1627f743b561845e49e835f618ca8166c9d124fb10c0a0041fb64f1dad26f20fab3627aeeba5263
-
Filesize
1.1MB
MD5f140ab6a64d391cbec69d1147f7de11d
SHA1b125c0b0088b404ded01604f367d6a2d7ce392cd
SHA25617f0fbc5242a922a4ba00600a95e12a10b911d04c16bb15398f355bf4fe724b6
SHA5126fea01e2dfbef3d921fd9dceca37d4198e9e18e2f4ac3a9cb67113caa0178dcd0a55a096f7582bec712cc138151c8d91529d7c70039956264e5bcaa0373b2f1b
-
Filesize
490KB
MD5dc3d90bbae4ef9894a462f3949217d52
SHA1c2f1345469934176469269c56e0ad3c0490e28e1
SHA256e3001b54f212a6fe317bc0af495a69099c1e9d96695490912e9a9a888b0e027e
SHA5124095cf2022aa3f1b4029834be9c28f147c1309057fe5b838688c83c0ed1b31a0f427dd262a42010a6f8cc71b5e3765c147c76d8e0e67861de43aa5c5ca97dd0a
-
Filesize
1.7MB
MD5242d53f34abf6a318022070a3d0b641f
SHA1bb858d3987f752c534b90f16bed6e75ad7b3b334
SHA2564ad6df79541c1495d0116a8968d56e768cc8274a8625f99f49877a00520b0dab
SHA512172494373be0b3bc7181f3006b6a6467b29da769c3348f043ab5516b3e0f28269304e636308671a27e51233e3fc32f24953cbfc4687a5d45a09d2ae8fbe8acd4
-
Filesize
2.0MB
MD51a1e35dccd22a6ebaacbeb5f277e4569
SHA11952876a81cf08ef07d67ccf38db268ddeb40e74
SHA256d1ccfddabd2346ce63245cb350cff9e7d6549b543feff55ffb87fe4f89deee20
SHA512db902f11ff24aa7cccb58a1caf411568567d491b2454c0f4f7ac1573b6b86a61b6674e1578c81cf1b26634c87354cbea4383d7d47fadea98bed9929909c66e22
-
Filesize
551KB
MD56ad4b464dc9e05d4a945cfafd7b57592
SHA148060b3d57c4d277dd684a0d69ca6187eb7746df
SHA2561b9196b230f50cc45753d3e59511eec102cd95e386f53a078a923c0d72ec870b
SHA512cd15d754dcb062298e7ae7c861777ea0d3fd642ec8b3c2c808a1dbb3728dc14593fc42124f5314db5f5e5b21c89877251abb4180cad4f943ab077ce04252febd
-
Filesize
913KB
MD5f9afe0efbdb588c735acdff7bfc03643
SHA166ee4d6479bad6cb58853c1dda69954c2cfea98c
SHA2568ca91456f25d7a258189ab0f422dddcd04e9e5dfbdd6f3d5c516a1d9202d7d15
SHA512e680263adc6ff3b3a9c9c04f7c40ad5f5454d7aabaad148cebe8b838c22f92a136aef539eb1d50e08a27ef61db79d170df6b0d167543ff8746f256ed6fa11c6b
-
Filesize
715KB
MD50ddbf2c0fa9ba8bebd418a36cfb720dc
SHA1a874b962f696fa1bfb8b0144430c15c26ad80765
SHA25655977d6fad66c825a325136c72755627c32d60db48ced0c31da4e1fbc926d553
SHA5123bf97191c12c0a212a74285ee6b1b871643a274ad76ca872b1c197911f6ba459dfbbdb84afbca91dea827ff456de20a763a8f98d0e147241d42cbb5944540a15
-
Filesize
1.6MB
MD58db87c42b405e74b0570a0cb758c9777
SHA141763e98aa9fe5008187a5360604a5c260544b09
SHA25663ee8c0430066bb1fc8ec24727fa4259073a075ac23ed126016c89d28113a6c5
SHA512422fed5e4c975bc5a0c3d770d2977cf2021026d70f34f9279f7a079030ce58db3859d1b4b715a0dc78c2b070cf09b50894e455c61ba5676a3ae18d9304029347
-
Filesize
1.8MB
MD54b232a109d5b37f9638abaa174be2ec1
SHA1b5b7faa037784faee04044a25e3404c24e49291b
SHA256a1e460701f7bd5537dad70cfabe1c845b5ebacf99512d40f7bf63ff1e95451b8
SHA512e8a3b90bdaee45786abc55f8e1fde7ce4bfd860a3da91a9a1db380ca1e6aeab1705ed30e50b7e4918824fa5c3c4da3448a056865a98082125e17ffce239bf53b
-
Filesize
1.4MB
MD5fa338189d27a638de77759622d0e35bb
SHA1cea54ea90b6f331d750d3be94d421e28a75b118e
SHA25687008cc093ee420b47d46e069d38ce74e03e4986bb7aa6b3823959a3460fd2e4
SHA5121438976d2cf37811cde3f390e712be1328cf54a913aca2d2a992147ce4a0e874eaf40239c504400b752c60d133afaf39889938736a569162833d0e3e121bcee0
-
Filesize
96KB
MD524742163ca8722cdec23b3fdc278c761
SHA1be3e5f89d71e267d583567c65c14e4345d5a62bd
SHA256617e62cc180820fa671f2dae10594ceb8c7c5c6821eaeacd9c93f2bb6fe2387d
SHA5126ef541a732307eb829a11c8397aff817c44a30e6a6dda831a94b251796dab8eead13074900b601e0f47f0579a492f3e4c2ac9d2c4240af1c57140521315f7ed0
-
Filesize
319KB
MD5a02afb250588554ed1e4aa39faf3f379
SHA18699fa18892e4a379346e1fd0bde28f437f192ce
SHA256ae33eb632d68873fb4d4ecf42c20944933e63eb0820bd2a2ca5185c4ef5f6790
SHA5127b4fac6d20fdc59c8756746628cb444996eaec0d2bc304c8cd81df6ecf1c8c082c1fa4ee2d8bd3686d67bf64af575cf52fece5ddadb6825ddcde793bbf24471d
-
Filesize
1.5MB
MD56966a09e267feb9d3f5aee8c153f4587
SHA1fe08576c3aca44d30c4ec806bd75bb447739a4e9
SHA256b246186bc8a9822e9abe831aad3ccc24efba44b79a1af9e6e0511bdcc84bdc04
SHA51289b108d729e49c20fa284c1fceaba1eebc7178817c755bfb38971c78be114bfcebb6d56f5dc112bd5d2b33c6bd16922ac1a49450c7598899c40a8f4d6a7f4778
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
Filesize
2.0MB
MD52943a5a31664a8183e993d480b8709bc
SHA1e7c28c1692073cf3769b61a8b298d09497d2a635
SHA256282397f5efc6b5a517881350736901620649c3cf0a692423cf77b9093f933e8b
SHA512f6dfa47d02dc9d1d874b5618c354961ea70e7c5223c27efeb530dbcead610aa8255dfeefe3a68325db9b00ac9df6a5519c885f91ecb82e582bbfa34364cd3518
-
Filesize
831KB
MD5d098bd16e2616ab0ff79422a24b5aeef
SHA14b962df6165e44a04b8364e9f091de8a15aa1156
SHA2560b214510b093069c4330f4f806dea732ad9b9162f3a127ef16c138032bcd5afd
SHA5122649296e6e9b6ece2381ea4da77e97f8cd338631a8466182686c59aa48b8b2f76c4a48bdd45362dfae0a863d5554306b81b350f6736e3471ac6785f059cbe97e
-
Filesize
2.5MB
MD51efe48cc2ae77f6376493e23de1fb511
SHA1bbf23f9a7b08702fb97ecbdb0f0230fa793d7275
SHA2568351a25ca36b9b1790f2c2b66d62a974e31ef70140ee0515df859e559584ea3b
SHA5127b8a107267aada8a8511eab9ea9007ffc35d58a97f06e3045b0d4075159ad6f80ebe41470694d974146ff25f9b0fa0fb5cf24da06d9cd00bb699c6dd6375ce83
-
Filesize
94KB
MD5d98e78fd57db58a11f880b45bb659767
SHA1ab70c0d3bd9103c07632eeecee9f51d198ed0e76
SHA256414035cc96d8bcc87ed173852a839ffbb45882a98c7a6f7b821e1668891deef0
SHA512aafbd3eee102d0b682c4c854d69d50bac077e48f7f0dd8a5f913c6c73027aed7231d99fc9d716511759800da8c4f0f394b318821e9e47f6e62e436c8725a7831
-
Filesize
138KB
MD5521536c8ca84b84b2b40d93d47363203
SHA111b389978fd25d970327ae3f23aaa1f4f7ef4def
SHA256d3c6b41505752b7a4faaaa4fad1292f4ee1836fe415473e5d7872d9d40b38f07
SHA51273ab50f3a80fc8115fe870db38d3ada0e690769839051cb4e9fe48b150becdfbaa1cd3be2f82bd752ae7c42b52287ea2b9bf26d86b4182c49b685531ce15e7fc
-
Filesize
687KB
MD5dc768c91e97b42f218028efa028c41cc
SHA163e5b917e7eb1fe94707cde664875b71b247eeb5
SHA256a0991507c9da2c3e21dda334920fc6c36a7fa1595d4c865c6c200c05128f2efe
SHA512956d9b9b092b030d99ed6ff9673a0c132ff0565bd80c7ac63bfac1e3d80062bc641585776ba0d86e2f39df0d2cdd6ded403979e9caa65bbb42ec01a0d4106459
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
19KB
MD53adaa386b671c2df3bae5b39dc093008
SHA1067cf95fbdb922d81db58432c46930f86d23dded
SHA25671cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38
SHA512bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
632KB
MD5c58bafcb49b10b249ac4b30de4bfe061
SHA149797928fc8f59a2380bc998f5f82c066a350ecf
SHA256a7777aa79d40daef9151339b72e0b30d4dcf272b8debd848b61a64081fa1625e
SHA512944987314b535fa9f95b152b5908d5a0c94a53d5839208c1b064885312bdd59d0bbce26adec5b842f950b140f48c4bd83a7033bf6409218df4c500165d2794fb
-
Filesize
713KB
MD5cf319209e1f48faf364b03a460648305
SHA1c98c9c46275fb6757138561ca4f70ae21b8dd9a2
SHA2564b58d7ac1723021f68b1fb968e01d3b24af928b34708ed174fe1e081d6cde5ba
SHA51230069fed3a7c7aa64e545465a8979497afd32bd2d1302101ff33efbce99c1d4f311fb4080300447b64cae2afc09fd553d1a3f9531536ba1cbf912943b33ceba4
-
Filesize
439KB
MD54bdf0600b20b96d697de328993d95a1e
SHA178f338e72e0895ddbcc921744f52edb4e9dd3f3c
SHA25633da0393fd0cf81a243039b585cbd8162d21eae35f485eb5cbe6ca31e538113f
SHA5128277df8cbb549e28502570007c47af115563671fe75955aac56f1aff30db7bba9e57b7fc6fac67dbdf44300a9d2426e2f45662e71971616e1f52639f549d8d60
-
Filesize
591KB
MD5e2f68dc7fbd6e0bf031ca3809a739346
SHA19c35494898e65c8a62887f28e04c0359ab6f63f5
SHA256b74cd24cef07f0226e7b777f7862943faee4cf288178b423d5344b0769dc15d4
SHA51226256a12b5b8b3a40b34f18e081cdb45ea11845589c9d458a79385a4b8178f32164b417ddc9346fab8299bc6d4b9fedb620274c4edf9321424f37a2e2a6de579
-
Filesize
356KB
MD5b60e657d95411f8af2fe5f392728faeb
SHA196088f269d2544c7bf1eaa21671cde10f3bef34d
SHA256144bf49bfacb24fa2d841167af1a87bbec44d759ecfd468b7b36555bd415d32f
SHA512db8371fffc57ae038c666f24f742ea1ca863da4f6e5094181621418566d7979adc129e33162576cf9312655825780ff845b4ca8e3eaf41d1eaee07417ea46ae5
-
Filesize
597KB
MD585fd4c794f4a35cb7014022b76b4641a
SHA173978204abf4c8471ac8ab064f608ddccf1cb630
SHA256c1ee7a231c349b96cdb65598b16a338b3b28c72215c536771d840c0a45fd84af
SHA512fadca5698486982e18eabf3fd48d21fc7ee517df27b273bb09001bce92561eea191705b4d885d3ba3ac58877ef048edff92c3106d5c41392bc40f68e0bb0c457
-
Filesize
1.2MB
MD5916d30150d6254d09392e7bde1b36dc4
SHA13ff083be686683c733848d73735e8f87b6815eee
SHA256ea77e073b2fe467da2bfb80dd22d3c347514ab2711b61fc762e34d0cd1dc1e8e
SHA5123b6959c58b70e107dda378ec59e418cfd3d0e1617635139ff26b22bbe80f9d79000d7198cecbc88a3b087be355e4e9a7ae4d4bb79494eeaf0f55e41e257df05e
-
Filesize
254KB
MD5f000da4b3fc83f6bc86da348d829ad1a
SHA1f8d6e808af729f8cef6cac12d2ac19dcb6b745d8
SHA2560124d32e644320a7f78d1a04ffd6e9f7a6b5626420c59cecd4aa260060bf9ce6
SHA51274c6d6ef94205301042d55e60e8aa924e08c9d52437927a10829fe6d35a91f4b35e78d49e3ae44e03e1672f2090e0153bf6becfd225f7c02dc79c57694136474
-
Filesize
2.7MB
MD53e2f867b85de3af46b97e3e1844c9a27
SHA162272351c076edae6a16ffac95d028fe09f49668
SHA2562150f05abc061f86b95c45ac890106d48ae3ba8c83bb63980393f2ab0d9b6b65
SHA512f1e143c7de67bc80958a65aa5b9dbfbde94796ec73a85104843357fe71bf69e9191a98eecd1b6cb2ed1a773e3a4effeef84f400e6c8c4a7a2455d2f01acb33a6
-
Filesize
561KB
MD58dedea836d4e526e02669acfbb393c33
SHA16ba89bbc0f238a3208cd8870c0ff2165b20ee48f
SHA256f23c9e04bc0561ff69362955817949bf89dfea2adf38c7e68c4bdec170e28419
SHA51291e02bf9201767827838f71d8f427f5f9ebbc90c0a20fa68e8c9c31b61d506b880c2204e311fa7b219e4c9bf48bbe1f2dda084962a9da642172fa398d5f78f04
-
Filesize
2.4MB
MD5d31e5536655bb70050e27fbe0003353d
SHA14b6abe790221392af20196490a956efd84fc5ad5
SHA25638c3d9faacf71dad332cc3a4cd97d9c258e7ddf802c7698c8ba8e1664923d856
SHA512c56a8cfcb8872bee97d332b171c2ef6fdfb0f8e3e9de723ec7fbf78725e5cb98d21cabb00a6f2de6a0e703ab9f498f2c37773919f3bc6d5ece221f00925cbd91
-
Filesize
866KB
MD546fa1106b2bfd6238a771283b4fead21
SHA18f0b611781ca782d269ddd6b2f785da56efcb82d
SHA256055db2c3bc09dcb9409e5650a77aab343558fac84e0c16324c829283d08c1b1e
SHA5129aec33303192240f77decb720a510dd7142e3be989162e6f415e5dd1f529e80d09d722d0f204dcb49065e7b47428a6c82e059dd4f4cfb3244c515c9d53b47554
-
Filesize
168KB
MD53f4dd8386dc81f6735a377b233121de8
SHA1eaabf379c96ad6667ac2bc4738a90bda15bd565e
SHA25673632351bf75dd2bbbc05e11006277be53fefaebbc6634d18764b2faa2aee2a7
SHA51286aead9ffaab3ffeb611e6a84618f82acd250a38992fce17ff74018bbb4dc753cb9bdb71d4e1ca88b7094ba43b24cf8d519f7ee5d2f9183e130022c0df9090bc