Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07-01-2024 19:59
Static task
static1
Behavioral task
behavioral1
Sample
2c009fefcf337b8b5e4f0249aeb1627d3a39934097cf5fea75b16c5aa9a7f374.exe
Resource
win7-20231215-en
General
-
Target
2c009fefcf337b8b5e4f0249aeb1627d3a39934097cf5fea75b16c5aa9a7f374.exe
-
Size
7.8MB
-
MD5
981fb98bb6fa845c67ed22349e91867d
-
SHA1
59ed889246126ea1b255b7bf391ef5198a4b6c7c
-
SHA256
2c009fefcf337b8b5e4f0249aeb1627d3a39934097cf5fea75b16c5aa9a7f374
-
SHA512
878d81e43347a1037c09295ca3d24b37826412442d81abc93db6d8b639939e45916480af8b471644dfdc00066604ef394a183612d823ea4fc5e09b13994ea120
-
SSDEEP
98304:zI1V5yYHMXoJ141kYqgK0GLKhemxQbTmRJ5QhIylxox9XNrqp5VBu:EyQy2IkNOemxyePn
Malware Config
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
DcRat 11 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\B8gGV2tfha0csUsaOSwX2rnz.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\0X3u15GjOTVOR8Dk1iAuZtUw.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Rcq5hbehMLFasnF21HKSV6R3.bat jsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths 2c009fefcf337b8b5e4f0249aeb1627d3a39934097cf5fea75b16c5aa9a7f374.exe 840 schtasks.exe 2004 schtasks.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\w4TBonVx69LkxUe3FvoBpPlp.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SPOlqGF4Sgoh9CDlIa9pQlNO.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\u6qHnxRL2yuhNW7dCaOhEXtO.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\USFyEbLgpFRr0Cij4whx9xPe.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gxMlerCcWHVoJeQoO2sc82vp.bat jsc.exe -
Glupteba payload 16 IoCs
resource yara_rule behavioral1/memory/2980-697-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2980-701-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2980-704-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2980-714-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2980-715-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2980-721-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2980-795-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1092-796-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1092-799-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1092-811-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1812-837-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1812-838-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1812-839-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1812-840-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2980-852-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1092-859-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
Modifies firewall policy service 2 TTPs 8 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 33k1gu53y1_1.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile 33k1gu53y1_1.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\EnableFirewall = "0" 33k1gu53y1_1.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" explorer.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\EnableFirewall = "0" explorer.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile 33k1gu53y1_1.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\ImagePath regedit.exe -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2c009fefcf337b8b5e4f0249aeb1627d3a39934097cf5fea75b16c5aa9a7f374.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths 2c009fefcf337b8b5e4f0249aeb1627d3a39934097cf5fea75b16c5aa9a7f374.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\2c009fefcf337b8b5e4f0249aeb1627d3a39934097cf5fea75b16c5aa9a7f374.exe = "0" 2c009fefcf337b8b5e4f0249aeb1627d3a39934097cf5fea75b16c5aa9a7f374.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\0wbxXoWwAx7STbdYwDjfk6d5.exe = "0" 0wbxXoWwAx7STbdYwDjfk6d5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\nR2LXei6PABdKD0MhQio33Sk.exe = "0" nR2LXei6PABdKD0MhQio33Sk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\3VaVC6Erfh3qIgwGaYErbFYb.exe = "0" 3VaVC6Erfh3qIgwGaYErbFYb.exe -
Enumerates VirtualBox registry keys 2 TTPs 10 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VBoxVideo 33k1gu53y1_1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VBoxVideo 33k1gu53y1_1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VBoxGuest 33k1gu53y1_1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VBoxMouse 33k1gu53y1_1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VBoxMouse 33k1gu53y1_1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VBoxService 33k1gu53y1_1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VBoxSF 33k1gu53y1_1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VBoxGuest 33k1gu53y1_1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VBoxService 33k1gu53y1_1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VBoxSF 33k1gu53y1_1.exe -
Disables taskbar notifications via registry modification
-
Disables use of System Restore points 1 TTPs
-
Downloads MZ/PE file
-
Looks for VMWare services registry key. 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VMware jsdomainkeylib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VMware jsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VMware oLqQHqsHmJMCRWCViNB0jE7W.tmp -
Modifies Windows Firewall 1 TTPs 3 IoCs
pid Process 1688 netsh.exe 2116 netsh.exe 672 netsh.exe -
Sets file execution options in registry 2 TTPs 20 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MRT.exe\Debugger = "ojamjpebwey.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mbamgui.exe\Debugger = "ljjgf.exe" 33k1gu53y1_1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Mrtstub.exe 33k1gu53y1_1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MRT.exe\Debugger = "mpgv.exe" 33k1gu53y1_1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\winmgr108.exe 33k1gu53y1_1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\winmgr108.exe\Debugger = "myyyembv.exe" 33k1gu53y1_1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\33k1gu53y1.exe\DisableExceptionChainValidation 33BD.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mbam.exe\Debugger = "bzix.exe" 33k1gu53y1_1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Mrtstub.exe\Debugger = "bndy.exe" 33k1gu53y1_1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe\Debugger = "okaihtwxphd.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MRT.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mrtstub.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Mrtstub.exe\Debugger = "rbotoracroo.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\33k1gu53y1.exe 33BD.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mbam.exe 33k1gu53y1_1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MRT.exe 33k1gu53y1_1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe\Debugger = "bfdkbgpsf.exe" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mbamgui.exe 33k1gu53y1_1.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\ImagePath regedit.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe -
Drops startup file 10 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SPOlqGF4Sgoh9CDlIa9pQlNO.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\u6qHnxRL2yuhNW7dCaOhEXtO.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\B8gGV2tfha0csUsaOSwX2rnz.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\USFyEbLgpFRr0Cij4whx9xPe.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\0X3u15GjOTVOR8Dk1iAuZtUw.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\r7f0BDkkhUOn85nSxMnTEUmh.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Rcq5hbehMLFasnF21HKSV6R3.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gxMlerCcWHVoJeQoO2sc82vp.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\w4TBonVx69LkxUe3FvoBpPlp.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\kwHACiUu8R0YmmtUnVbKFb9n.bat jsc.exe -
Executes dropped EXE 27 IoCs
pid Process 2748 BiyvJBxmsYIsj3w2Mg10se2t.exe 1720 oLqQHqsHmJMCRWCViNB0jE7W.exe 1180 oLqQHqsHmJMCRWCViNB0jE7W.tmp 568 jsdomainkeylib.exe 2496 3VaVC6Erfh3qIgwGaYErbFYb.exe 2980 3VaVC6Erfh3qIgwGaYErbFYb.exe 1128 0wbxXoWwAx7STbdYwDjfk6d5.exe 2312 jsdomainkeylib.exe 1092 0wbxXoWwAx7STbdYwDjfk6d5.exe 2328 nR2LXei6PABdKD0MhQio33Sk.exe 1812 nR2LXei6PABdKD0MhQio33Sk.exe 1840 33BD.exe 2024 3VaVC6Erfh3qIgwGaYErbFYb.exe 2044 0wbxXoWwAx7STbdYwDjfk6d5.exe 2028 3VaVC6Erfh3qIgwGaYErbFYb.exe 2672 0wbxXoWwAx7STbdYwDjfk6d5.exe 2648 nR2LXei6PABdKD0MhQio33Sk.exe 2508 nR2LXei6PABdKD0MhQio33Sk.exe 3048 96F3.exe 684 csrss.exe 2336 csrss.exe 2140 suqMkTkvixVaxWndpOa5DIMV.exe 2552 BroomSetup.exe 1084 FvO7TWEoaE7KuJHt3rug3fqw.exe 2640 patch.exe 2016 injector.exe 1636 33k1gu53y1_1.exe -
Loads dropped DLL 41 IoCs
pid Process 2088 jsc.exe 2088 jsc.exe 2088 jsc.exe 1720 oLqQHqsHmJMCRWCViNB0jE7W.exe 1180 oLqQHqsHmJMCRWCViNB0jE7W.tmp 1180 oLqQHqsHmJMCRWCViNB0jE7W.tmp 1180 oLqQHqsHmJMCRWCViNB0jE7W.tmp 1180 oLqQHqsHmJMCRWCViNB0jE7W.tmp 1180 oLqQHqsHmJMCRWCViNB0jE7W.tmp 2088 jsc.exe 2088 jsc.exe 2088 jsc.exe 2088 jsc.exe 2088 jsc.exe 2088 jsc.exe 2028 3VaVC6Erfh3qIgwGaYErbFYb.exe 2028 3VaVC6Erfh3qIgwGaYErbFYb.exe 2088 jsc.exe 2140 suqMkTkvixVaxWndpOa5DIMV.exe 2140 suqMkTkvixVaxWndpOa5DIMV.exe 2140 suqMkTkvixVaxWndpOa5DIMV.exe 2088 jsc.exe 1084 FvO7TWEoaE7KuJHt3rug3fqw.exe 1084 FvO7TWEoaE7KuJHt3rug3fqw.exe 864 Process not Found 2640 patch.exe 2640 patch.exe 2640 patch.exe 2640 patch.exe 2640 patch.exe 2336 csrss.exe 1628 WerFault.exe 1628 WerFault.exe 780 WerFault.exe 780 WerFault.exe 2120 explorer.exe 1628 WerFault.exe 780 WerFault.exe 2640 patch.exe 2640 patch.exe 2640 patch.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\nR2LXei6PABdKD0MhQio33Sk.exe = "0" nR2LXei6PABdKD0MhQio33Sk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths 2c009fefcf337b8b5e4f0249aeb1627d3a39934097cf5fea75b16c5aa9a7f374.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\2c009fefcf337b8b5e4f0249aeb1627d3a39934097cf5fea75b16c5aa9a7f374.exe = "0" 2c009fefcf337b8b5e4f0249aeb1627d3a39934097cf5fea75b16c5aa9a7f374.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\3VaVC6Erfh3qIgwGaYErbFYb.exe = "0" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\0wbxXoWwAx7STbdYwDjfk6d5.exe = "0" 0wbxXoWwAx7STbdYwDjfk6d5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions 2c009fefcf337b8b5e4f0249aeb1627d3a39934097cf5fea75b16c5aa9a7f374.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 3VaVC6Erfh3qIgwGaYErbFYb.exe -
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\Java Updater = "\"C:\\ProgramData\\Java Updater\\33k1gu53y1.exe\"" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 0wbxXoWwAx7STbdYwDjfk6d5.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\Java Updater = "\"C:\\ProgramData\\Java Updater\\33k1gu53y1.exe\"" jsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" nR2LXei6PABdKD0MhQio33Sk.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\Java Updater = "\"C:\\ProgramData\\Java Updater\\33k1gu53y1.exe\"" jsdomainkeylib.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Java Updater = "C:\\ProgramData\\Java Updater\\33k1gu53y1.exe" explorer.exe -
Checks for any installed AV software in registry 1 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\AntiVirService 33k1gu53y1_1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\avast! Antivirus 33k1gu53y1_1.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2c009fefcf337b8b5e4f0249aeb1627d3a39934097cf5fea75b16c5aa9a7f374.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 33BD.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oLqQHqsHmJMCRWCViNB0jE7W.tmp Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 33k1gu53y1_1.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA jsdomainkeylib.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BroomSetup.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2c009fefcf337b8b5e4f0249aeb1627d3a39934097cf5fea75b16c5aa9a7f374.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\ProgramData\Java Updater\desktop.ini explorer.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 53 api.ipify.org -
Maps connected drives based on registry 3 TTPs 6 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum jsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 jsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum oLqQHqsHmJMCRWCViNB0jE7W.tmp Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 oLqQHqsHmJMCRWCViNB0jE7W.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum jsdomainkeylib.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 jsdomainkeylib.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 24 IoCs
pid Process 1840 33BD.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2088 jsc.exe 2088 jsc.exe 2088 jsc.exe 2088 jsc.exe 2120 explorer.exe 1180 oLqQHqsHmJMCRWCViNB0jE7W.tmp 1180 oLqQHqsHmJMCRWCViNB0jE7W.tmp 1180 oLqQHqsHmJMCRWCViNB0jE7W.tmp 1180 oLqQHqsHmJMCRWCViNB0jE7W.tmp 2120 explorer.exe 2120 explorer.exe 1636 33k1gu53y1_1.exe 2312 jsdomainkeylib.exe 2312 jsdomainkeylib.exe 2312 jsdomainkeylib.exe 2312 jsdomainkeylib.exe -
Suspicious use of SetThreadContext 8 IoCs
description pid Process procid_target PID 1216 set thread context of 2088 1216 2c009fefcf337b8b5e4f0249aeb1627d3a39934097cf5fea75b16c5aa9a7f374.exe 30 PID 2496 set thread context of 2980 2496 3VaVC6Erfh3qIgwGaYErbFYb.exe 41 PID 1128 set thread context of 1092 1128 0wbxXoWwAx7STbdYwDjfk6d5.exe 44 PID 2328 set thread context of 1812 2328 nR2LXei6PABdKD0MhQio33Sk.exe 48 PID 2024 set thread context of 2028 2024 3VaVC6Erfh3qIgwGaYErbFYb.exe 54 PID 2044 set thread context of 2672 2044 0wbxXoWwAx7STbdYwDjfk6d5.exe 56 PID 2648 set thread context of 2508 2648 nR2LXei6PABdKD0MhQio33Sk.exe 58 PID 684 set thread context of 2336 684 csrss.exe 67 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 3 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 0wbxXoWwAx7STbdYwDjfk6d5.exe File opened (read-only) \??\VBoxMiniRdrDN nR2LXei6PABdKD0MhQio33Sk.exe File opened (read-only) \??\VBoxMiniRdrDN 3VaVC6Erfh3qIgwGaYErbFYb.exe -
Drops file in Windows directory 10 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\0f77e4b4.lnk explorer.exe File created C:\Windows\rss\csrss.exe 3VaVC6Erfh3qIgwGaYErbFYb.exe File created C:\Windows\rss\csrss.exe 0wbxXoWwAx7STbdYwDjfk6d5.exe File created C:\Windows\rss\csrss.exe nR2LXei6PABdKD0MhQio33Sk.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe explorer.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe explorer.exe File created C:\Windows\Logs\CBS\CbsPersist_20240107200035.cab makecab.exe File opened for modification C:\Windows\rss 3VaVC6Erfh3qIgwGaYErbFYb.exe File opened for modification C:\Windows\rss 0wbxXoWwAx7STbdYwDjfk6d5.exe File opened for modification C:\Windows\rss nR2LXei6PABdKD0MhQio33Sk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 780 2140 WerFault.exe 72 1628 1084 WerFault.exe 79 -
NSIS installer 4 IoCs
resource yara_rule behavioral1/files/0x000600000001a4a5-937.dat nsis_installer_2 behavioral1/files/0x000600000001a4a5-939.dat nsis_installer_2 behavioral1/files/0x000500000001ad31-1085.dat nsis_installer_1 behavioral1/files/0x000500000001ad31-1085.dat nsis_installer_2 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI BiyvJBxmsYIsj3w2Mg10se2t.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI BiyvJBxmsYIsj3w2Mg10se2t.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI BiyvJBxmsYIsj3w2Mg10se2t.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 33k1gu53y1_1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 33k1gu53y1_1.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 33BD.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 33BD.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString explorer.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 840 schtasks.exe 2004 schtasks.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer explorer.exe -
Modifies Internet Explorer Protected Mode 1 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" explorer.exe -
Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" explorer.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main explorer.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-281 = "Central Europe Daylight Time" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-161 = "Central Daylight Time" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-681 = "E. Australia Daylight Time" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-201 = "US Mountain Daylight Time" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-732 = "Fiji Standard Time" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-1472 = "Magadan Standard Time" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-282 = "Central Europe Standard Time" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-401 = "Arabic Daylight Time" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-511 = "Central Asia Daylight Time" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-521 = "N. Central Asia Daylight Time" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-122 = "SA Pacific Standard Time" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-601 = "Taipei Daylight Time" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-462 = "Afghanistan Standard Time" 3VaVC6Erfh3qIgwGaYErbFYb.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\NetTrace netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-302 = "Romance Standard Time" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-602 = "Taipei Standard Time" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-12 = "Azores Standard Time" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-661 = "Cen. Australia Daylight Time" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-342 = "Egypt Standard Time" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-981 = "Kamchatka Daylight Time" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-31 = "Mid-Atlantic Daylight Time" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-931 = "Coordinated Universal Time" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-82 = "Atlantic Standard Time" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-411 = "E. Africa Daylight Time" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-522 = "N. Central Asia Standard Time" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-221 = "Alaskan Daylight Time" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-81 = "Atlantic Daylight Time" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-721 = "Central Pacific Daylight Time" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-332 = "E. Europe Standard Time" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-91 = "Pacific SA Daylight Time" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-142 = "Canada Central Standard Time" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-722 = "Central Pacific Standard Time" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-502 = "Nepal Standard Time" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-331 = "E. Europe Daylight Time" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-111 = "Eastern Daylight Time" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-961 = "Paraguay Daylight Time" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-362 = "GTB Standard Time" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-842 = "Argentina Standard Time" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-72 = "Newfoundland Standard Time" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-581 = "North Asia East Daylight Time" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-1412 = "Syria Standard Time" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-751 = "Tonga Daylight Time" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-651 = "AUS Central Daylight Time" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-261 = "GMT Daylight Time" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-382 = "South Africa Standard Time" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-512 = "Central Asia Standard Time" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-271 = "Greenwich Daylight Time" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-431 = "Iran Daylight Time" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-121 = "SA Pacific Daylight Time" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-1 = "IPsec Relying Party" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-3 = "Microsoft Corporation" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-104 = "Central Brazilian Daylight Time" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-392 = "Arab Standard Time" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-41 = "E. South America Daylight Time" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-52 = "Greenland Standard Time" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-1471 = "Magadan Daylight Time" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-92 = "Pacific SA Standard Time" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 nR2LXei6PABdKD0MhQio33Sk.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-452 = "Caucasus Standard Time" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-662 = "Cen. Australia Standard Time" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-231 = "Hawaiian Daylight Time" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-541 = "Myanmar Daylight Time" 3VaVC6Erfh3qIgwGaYErbFYb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-131 = "US Eastern Daylight Time" 3VaVC6Erfh3qIgwGaYErbFYb.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 1400000001000000140000004e2254201895e6e36ee60ffafab912ed06178f39030000000100000014000000df3c24f9bfd666761b268073fe06d1cc8d4f82a40f00000001000000200000004b4eb4b074298b828b5c003095a10b4523fb951c0c88348b09c53e5baba408a32000000001000000920300003082038e30820276a0030201020210033af1e6a711a9a0bb2864b11d09fae5300d06092a864886f70d01010b05003061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f74204732301e170d3133303830313132303030305a170d3338303131353132303030305a3061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f7420473230820122300d06092a864886f70d01010105000382010f003082010a0282010100bb37cd34dc7b6bc9b26890ad4a75ff46ba210a088df51954c9fb88dbf3aef23a89913c7ae6ab061a6bcfac2de85e092444ba629a7ed6a3a87ee054752005ac50b79c631a6c30dcda1f19b1d71edefdd7e0cb948337aeec1f434edd7b2cd2bd2ea52fe4a9b8ad3ad499a4b625e99b6b00609260ff4f214918f76790ab61069c8ff2bae9b4e992326bb5f357e85d1bcd8c1dab95049549f3352d96e3496ddd77e3fb494bb4ac5507a98f95b3b423bb4c6d45f0f6a9b29530b4fd4c558c274a57147c829dcd7392d3164a060c8c50d18f1e09be17a1e621cafd83e510bc83a50ac46728f67314143d4676c387148921344daf0f450ca649a1babb9cc5b1338329850203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020186301d0603551d0e041604144e2254201895e6e36ee60ffafab912ed06178f39300d06092a864886f70d01010b05000382010100606728946f0e4863eb31ddea6718d5897d3cc58b4a7fe9bedb2b17dfb05f73772a3213398167428423f2456735ec88bff88fb0610c34a4ae204c84c6dbf835e176d9dfa642bbc74408867f3674245ada6c0d145935bdf249ddb61fc9b30d472a3d992fbb5cbbb5d420e1995f534615db689bf0f330d53e31e28d849ee38adada963e3513a55ff0f970507047411157194ec08fae06c49513172f1b259f75f2b18e99a16f13b14171fe882ac84f102055d7f31445e5e044f4ea879532930efe5346fa2c9dff8b22b94bd90945a4dea4b89a58dd1b7d529f8e59438881a49e26d56faddd0dc6377ded03921be5775f76ee3c8dc45d565ba2d9666eb33537e532b6 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 040000000100000010000000e4a68ac854ac5242460afd72481b2a440f00000001000000200000004b4eb4b074298b828b5c003095a10b4523fb951c0c88348b09c53e5baba408a3030000000100000014000000df3c24f9bfd666761b268073fe06d1cc8d4f82a41400000001000000140000004e2254201895e6e36ee60ffafab912ed06178f392000000001000000920300003082038e30820276a0030201020210033af1e6a711a9a0bb2864b11d09fae5300d06092a864886f70d01010b05003061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f74204732301e170d3133303830313132303030305a170d3338303131353132303030305a3061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f7420473230820122300d06092a864886f70d01010105000382010f003082010a0282010100bb37cd34dc7b6bc9b26890ad4a75ff46ba210a088df51954c9fb88dbf3aef23a89913c7ae6ab061a6bcfac2de85e092444ba629a7ed6a3a87ee054752005ac50b79c631a6c30dcda1f19b1d71edefdd7e0cb948337aeec1f434edd7b2cd2bd2ea52fe4a9b8ad3ad499a4b625e99b6b00609260ff4f214918f76790ab61069c8ff2bae9b4e992326bb5f357e85d1bcd8c1dab95049549f3352d96e3496ddd77e3fb494bb4ac5507a98f95b3b423bb4c6d45f0f6a9b29530b4fd4c558c274a57147c829dcd7392d3164a060c8c50d18f1e09be17a1e621cafd83e510bc83a50ac46728f67314143d4676c387148921344daf0f450ca649a1babb9cc5b1338329850203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020186301d0603551d0e041604144e2254201895e6e36ee60ffafab912ed06178f39300d06092a864886f70d01010b05000382010100606728946f0e4863eb31ddea6718d5897d3cc58b4a7fe9bedb2b17dfb05f73772a3213398167428423f2456735ec88bff88fb0610c34a4ae204c84c6dbf835e176d9dfa642bbc74408867f3674245ada6c0d145935bdf249ddb61fc9b30d472a3d992fbb5cbbb5d420e1995f534615db689bf0f330d53e31e28d849ee38adada963e3513a55ff0f970507047411157194ec08fae06c49513172f1b259f75f2b18e99a16f13b14171fe882ac84f102055d7f31445e5e044f4ea879532930efe5346fa2c9dff8b22b94bd90945a4dea4b89a58dd1b7d529f8e59438881a49e26d56faddd0dc6377ded03921be5775f76ee3c8dc45d565ba2d9666eb33537e532b6 patch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 patch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4 csrss.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 030000000100000014000000df3c24f9bfd666761b268073fe06d1cc8d4f82a42000000001000000920300003082038e30820276a0030201020210033af1e6a711a9a0bb2864b11d09fae5300d06092a864886f70d01010b05003061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f74204732301e170d3133303830313132303030305a170d3338303131353132303030305a3061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f7420473230820122300d06092a864886f70d01010105000382010f003082010a0282010100bb37cd34dc7b6bc9b26890ad4a75ff46ba210a088df51954c9fb88dbf3aef23a89913c7ae6ab061a6bcfac2de85e092444ba629a7ed6a3a87ee054752005ac50b79c631a6c30dcda1f19b1d71edefdd7e0cb948337aeec1f434edd7b2cd2bd2ea52fe4a9b8ad3ad499a4b625e99b6b00609260ff4f214918f76790ab61069c8ff2bae9b4e992326bb5f357e85d1bcd8c1dab95049549f3352d96e3496ddd77e3fb494bb4ac5507a98f95b3b423bb4c6d45f0f6a9b29530b4fd4c558c274a57147c829dcd7392d3164a060c8c50d18f1e09be17a1e621cafd83e510bc83a50ac46728f67314143d4676c387148921344daf0f450ca649a1babb9cc5b1338329850203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020186301d0603551d0e041604144e2254201895e6e36ee60ffafab912ed06178f39300d06092a864886f70d01010b05000382010100606728946f0e4863eb31ddea6718d5897d3cc58b4a7fe9bedb2b17dfb05f73772a3213398167428423f2456735ec88bff88fb0610c34a4ae204c84c6dbf835e176d9dfa642bbc74408867f3674245ada6c0d145935bdf249ddb61fc9b30d472a3d992fbb5cbbb5d420e1995f534615db689bf0f330d53e31e28d849ee38adada963e3513a55ff0f970507047411157194ec08fae06c49513172f1b259f75f2b18e99a16f13b14171fe882ac84f102055d7f31445e5e044f4ea879532930efe5346fa2c9dff8b22b94bd90945a4dea4b89a58dd1b7d529f8e59438881a49e26d56faddd0dc6377ded03921be5775f76ee3c8dc45d565ba2d9666eb33537e532b6 csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 patch.exe -
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\33k1gu53y1_1.exe:1BB7FB68 explorer.exe File created C:\Users\Admin\AppData\Local\Temp\33k1gu53y1_1.exe:1BB7FB68 explorer.exe -
Runs net.exe
-
Runs regedit.exe 1 IoCs
pid Process 1660 regedit.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2312 powershell.exe 2748 BiyvJBxmsYIsj3w2Mg10se2t.exe 2748 BiyvJBxmsYIsj3w2Mg10se2t.exe 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE -
Suspicious behavior: MapViewOfSection 19 IoCs
pid Process 2748 BiyvJBxmsYIsj3w2Mg10se2t.exe 1840 33BD.exe 1840 33BD.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 1636 33k1gu53y1_1.exe 1636 33k1gu53y1_1.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2088 jsc.exe Token: SeDebugPrivilege 2312 powershell.exe Token: SeDebugPrivilege 2980 3VaVC6Erfh3qIgwGaYErbFYb.exe Token: SeDebugPrivilege 1092 0wbxXoWwAx7STbdYwDjfk6d5.exe Token: SeImpersonatePrivilege 1092 0wbxXoWwAx7STbdYwDjfk6d5.exe Token: SeImpersonatePrivilege 2980 3VaVC6Erfh3qIgwGaYErbFYb.exe Token: SeDebugPrivilege 1840 33BD.exe Token: SeRestorePrivilege 1840 33BD.exe Token: SeBackupPrivilege 1840 33BD.exe Token: SeLoadDriverPrivilege 1840 33BD.exe Token: SeCreatePagefilePrivilege 1840 33BD.exe Token: SeShutdownPrivilege 1840 33BD.exe Token: SeTakeOwnershipPrivilege 1840 33BD.exe Token: SeChangeNotifyPrivilege 1840 33BD.exe Token: SeCreateTokenPrivilege 1840 33BD.exe Token: SeMachineAccountPrivilege 1840 33BD.exe Token: SeSecurityPrivilege 1840 33BD.exe Token: SeAssignPrimaryTokenPrivilege 1840 33BD.exe Token: SeCreateGlobalPrivilege 1840 33BD.exe Token: 33 1840 33BD.exe Token: SeDebugPrivilege 2120 explorer.exe Token: SeRestorePrivilege 2120 explorer.exe Token: SeBackupPrivilege 2120 explorer.exe Token: SeLoadDriverPrivilege 2120 explorer.exe Token: SeCreatePagefilePrivilege 2120 explorer.exe Token: SeShutdownPrivilege 2120 explorer.exe Token: SeTakeOwnershipPrivilege 2120 explorer.exe Token: SeChangeNotifyPrivilege 2120 explorer.exe Token: SeCreateTokenPrivilege 2120 explorer.exe Token: SeMachineAccountPrivilege 2120 explorer.exe Token: SeSecurityPrivilege 2120 explorer.exe Token: SeAssignPrimaryTokenPrivilege 2120 explorer.exe Token: SeCreateGlobalPrivilege 2120 explorer.exe Token: 33 2120 explorer.exe Token: SeDebugPrivilege 1812 nR2LXei6PABdKD0MhQio33Sk.exe Token: SeImpersonatePrivilege 1812 nR2LXei6PABdKD0MhQio33Sk.exe Token: SeShutdownPrivilege 1264 Explorer.EXE Token: SeSystemEnvironmentPrivilege 2336 csrss.exe Token: SeDebugPrivilege 1636 33k1gu53y1_1.exe Token: SeRestorePrivilege 1636 33k1gu53y1_1.exe Token: SeBackupPrivilege 1636 33k1gu53y1_1.exe Token: SeLoadDriverPrivilege 1636 33k1gu53y1_1.exe Token: SeCreatePagefilePrivilege 1636 33k1gu53y1_1.exe Token: SeShutdownPrivilege 1636 33k1gu53y1_1.exe Token: SeTakeOwnershipPrivilege 1636 33k1gu53y1_1.exe Token: SeChangeNotifyPrivilege 1636 33k1gu53y1_1.exe Token: SeCreateTokenPrivilege 1636 33k1gu53y1_1.exe Token: SeMachineAccountPrivilege 1636 33k1gu53y1_1.exe Token: SeSecurityPrivilege 1636 33k1gu53y1_1.exe Token: SeAssignPrimaryTokenPrivilege 1636 33k1gu53y1_1.exe Token: SeCreateGlobalPrivilege 1636 33k1gu53y1_1.exe Token: 33 1636 33k1gu53y1_1.exe Token: SeShutdownPrivilege 1264 Explorer.EXE Token: SeShutdownPrivilege 1264 Explorer.EXE Token: SeCreatePagefilePrivilege 1636 33k1gu53y1_1.exe Token: SeCreatePagefilePrivilege 1636 33k1gu53y1_1.exe Token: SeCreatePagefilePrivilege 1636 33k1gu53y1_1.exe Token: SeCreatePagefilePrivilege 1636 33k1gu53y1_1.exe Token: SeCreatePagefilePrivilege 1636 33k1gu53y1_1.exe Token: SeDebugPrivilege 1660 regedit.exe Token: SeRestorePrivilege 1660 regedit.exe Token: SeBackupPrivilege 1660 regedit.exe Token: SeLoadDriverPrivilege 1660 regedit.exe Token: SeCreatePagefilePrivilege 1660 regedit.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1180 oLqQHqsHmJMCRWCViNB0jE7W.tmp -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2552 BroomSetup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1216 wrote to memory of 2312 1216 2c009fefcf337b8b5e4f0249aeb1627d3a39934097cf5fea75b16c5aa9a7f374.exe 28 PID 1216 wrote to memory of 2312 1216 2c009fefcf337b8b5e4f0249aeb1627d3a39934097cf5fea75b16c5aa9a7f374.exe 28 PID 1216 wrote to memory of 2312 1216 2c009fefcf337b8b5e4f0249aeb1627d3a39934097cf5fea75b16c5aa9a7f374.exe 28 PID 1216 wrote to memory of 2312 1216 2c009fefcf337b8b5e4f0249aeb1627d3a39934097cf5fea75b16c5aa9a7f374.exe 28 PID 1216 wrote to memory of 2088 1216 2c009fefcf337b8b5e4f0249aeb1627d3a39934097cf5fea75b16c5aa9a7f374.exe 30 PID 1216 wrote to memory of 2088 1216 2c009fefcf337b8b5e4f0249aeb1627d3a39934097cf5fea75b16c5aa9a7f374.exe 30 PID 1216 wrote to memory of 2088 1216 2c009fefcf337b8b5e4f0249aeb1627d3a39934097cf5fea75b16c5aa9a7f374.exe 30 PID 1216 wrote to memory of 2088 1216 2c009fefcf337b8b5e4f0249aeb1627d3a39934097cf5fea75b16c5aa9a7f374.exe 30 PID 1216 wrote to memory of 2088 1216 2c009fefcf337b8b5e4f0249aeb1627d3a39934097cf5fea75b16c5aa9a7f374.exe 30 PID 1216 wrote to memory of 2088 1216 2c009fefcf337b8b5e4f0249aeb1627d3a39934097cf5fea75b16c5aa9a7f374.exe 30 PID 1216 wrote to memory of 2088 1216 2c009fefcf337b8b5e4f0249aeb1627d3a39934097cf5fea75b16c5aa9a7f374.exe 30 PID 1216 wrote to memory of 2088 1216 2c009fefcf337b8b5e4f0249aeb1627d3a39934097cf5fea75b16c5aa9a7f374.exe 30 PID 1216 wrote to memory of 2088 1216 2c009fefcf337b8b5e4f0249aeb1627d3a39934097cf5fea75b16c5aa9a7f374.exe 30 PID 2088 wrote to memory of 2748 2088 jsc.exe 31 PID 2088 wrote to memory of 2748 2088 jsc.exe 31 PID 2088 wrote to memory of 2748 2088 jsc.exe 31 PID 2088 wrote to memory of 2748 2088 jsc.exe 31 PID 2088 wrote to memory of 1720 2088 jsc.exe 32 PID 2088 wrote to memory of 1720 2088 jsc.exe 32 PID 2088 wrote to memory of 1720 2088 jsc.exe 32 PID 2088 wrote to memory of 1720 2088 jsc.exe 32 PID 2088 wrote to memory of 1720 2088 jsc.exe 32 PID 2088 wrote to memory of 1720 2088 jsc.exe 32 PID 2088 wrote to memory of 1720 2088 jsc.exe 32 PID 1720 wrote to memory of 1180 1720 oLqQHqsHmJMCRWCViNB0jE7W.exe 33 PID 1720 wrote to memory of 1180 1720 oLqQHqsHmJMCRWCViNB0jE7W.exe 33 PID 1720 wrote to memory of 1180 1720 oLqQHqsHmJMCRWCViNB0jE7W.exe 33 PID 1720 wrote to memory of 1180 1720 oLqQHqsHmJMCRWCViNB0jE7W.exe 33 PID 1720 wrote to memory of 1180 1720 oLqQHqsHmJMCRWCViNB0jE7W.exe 33 PID 1720 wrote to memory of 1180 1720 oLqQHqsHmJMCRWCViNB0jE7W.exe 33 PID 1720 wrote to memory of 1180 1720 oLqQHqsHmJMCRWCViNB0jE7W.exe 33 PID 1180 wrote to memory of 2652 1180 oLqQHqsHmJMCRWCViNB0jE7W.tmp 34 PID 1180 wrote to memory of 2652 1180 oLqQHqsHmJMCRWCViNB0jE7W.tmp 34 PID 1180 wrote to memory of 2652 1180 oLqQHqsHmJMCRWCViNB0jE7W.tmp 34 PID 1180 wrote to memory of 2652 1180 oLqQHqsHmJMCRWCViNB0jE7W.tmp 34 PID 1180 wrote to memory of 568 1180 oLqQHqsHmJMCRWCViNB0jE7W.tmp 37 PID 1180 wrote to memory of 568 1180 oLqQHqsHmJMCRWCViNB0jE7W.tmp 37 PID 1180 wrote to memory of 568 1180 oLqQHqsHmJMCRWCViNB0jE7W.tmp 37 PID 1180 wrote to memory of 568 1180 oLqQHqsHmJMCRWCViNB0jE7W.tmp 37 PID 2652 wrote to memory of 3060 2652 net.exe 36 PID 2652 wrote to memory of 3060 2652 net.exe 36 PID 2652 wrote to memory of 3060 2652 net.exe 36 PID 2652 wrote to memory of 3060 2652 net.exe 36 PID 2088 wrote to memory of 2496 2088 jsc.exe 39 PID 2088 wrote to memory of 2496 2088 jsc.exe 39 PID 2088 wrote to memory of 2496 2088 jsc.exe 39 PID 2088 wrote to memory of 2496 2088 jsc.exe 39 PID 2496 wrote to memory of 2980 2496 3VaVC6Erfh3qIgwGaYErbFYb.exe 41 PID 2496 wrote to memory of 2980 2496 3VaVC6Erfh3qIgwGaYErbFYb.exe 41 PID 2496 wrote to memory of 2980 2496 3VaVC6Erfh3qIgwGaYErbFYb.exe 41 PID 2496 wrote to memory of 2980 2496 3VaVC6Erfh3qIgwGaYErbFYb.exe 41 PID 2496 wrote to memory of 2980 2496 3VaVC6Erfh3qIgwGaYErbFYb.exe 41 PID 2496 wrote to memory of 2980 2496 3VaVC6Erfh3qIgwGaYErbFYb.exe 41 PID 2496 wrote to memory of 2980 2496 3VaVC6Erfh3qIgwGaYErbFYb.exe 41 PID 2496 wrote to memory of 2980 2496 3VaVC6Erfh3qIgwGaYErbFYb.exe 41 PID 2496 wrote to memory of 2980 2496 3VaVC6Erfh3qIgwGaYErbFYb.exe 41 PID 2496 wrote to memory of 2980 2496 3VaVC6Erfh3qIgwGaYErbFYb.exe 41 PID 2496 wrote to memory of 2980 2496 3VaVC6Erfh3qIgwGaYErbFYb.exe 41 PID 2496 wrote to memory of 2980 2496 3VaVC6Erfh3qIgwGaYErbFYb.exe 41 PID 2088 wrote to memory of 1128 2088 jsc.exe 42 PID 2088 wrote to memory of 1128 2088 jsc.exe 42 PID 2088 wrote to memory of 1128 2088 jsc.exe 42 PID 2088 wrote to memory of 1128 2088 jsc.exe 42 PID 1180 wrote to memory of 2312 1180 oLqQHqsHmJMCRWCViNB0jE7W.tmp 43 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2c009fefcf337b8b5e4f0249aeb1627d3a39934097cf5fea75b16c5aa9a7f374.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1264 -
C:\Users\Admin\AppData\Local\Temp\2c009fefcf337b8b5e4f0249aeb1627d3a39934097cf5fea75b16c5aa9a7f374.exe"C:\Users\Admin\AppData\Local\Temp\2c009fefcf337b8b5e4f0249aeb1627d3a39934097cf5fea75b16c5aa9a7f374.exe"2⤵
- DcRat
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1216 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\2c009fefcf337b8b5e4f0249aeb1627d3a39934097cf5fea75b16c5aa9a7f374.exe" -Force3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2312
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"3⤵
- DcRat
- Looks for VMWare services registry key.
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\Pictures\BiyvJBxmsYIsj3w2Mg10se2t.exe"C:\Users\Admin\Pictures\BiyvJBxmsYIsj3w2Mg10se2t.exe"4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2748
-
-
C:\Users\Admin\Pictures\oLqQHqsHmJMCRWCViNB0jE7W.exe"C:\Users\Admin\Pictures\oLqQHqsHmJMCRWCViNB0jE7W.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\is-POPML.tmp\oLqQHqsHmJMCRWCViNB0jE7W.tmp"C:\Users\Admin\AppData\Local\Temp\is-POPML.tmp\oLqQHqsHmJMCRWCViNB0jE7W.tmp" /SL5="$9015C,4774704,351744,C:\Users\Admin\Pictures\oLqQHqsHmJMCRWCViNB0jE7W.exe"5⤵
- Looks for VMWare services registry key.
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 1736⤵
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 1737⤵PID:3060
-
-
-
C:\Users\Admin\AppData\Local\JS DomainKey lib\jsdomainkeylib.exe"C:\Users\Admin\AppData\Local\JS DomainKey lib\jsdomainkeylib.exe" -i6⤵
- Executes dropped EXE
PID:568
-
-
C:\Users\Admin\AppData\Local\JS DomainKey lib\jsdomainkeylib.exe"C:\Users\Admin\AppData\Local\JS DomainKey lib\jsdomainkeylib.exe" -s6⤵
- Looks for VMWare services registry key.
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2312
-
-
-
-
C:\Users\Admin\Pictures\3VaVC6Erfh3qIgwGaYErbFYb.exe"C:\Users\Admin\Pictures\3VaVC6Erfh3qIgwGaYErbFYb.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\Pictures\3VaVC6Erfh3qIgwGaYErbFYb.exe"C:\Users\Admin\Pictures\3VaVC6Erfh3qIgwGaYErbFYb.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2980 -
C:\Users\Admin\Pictures\3VaVC6Erfh3qIgwGaYErbFYb.exe"C:\Users\Admin\Pictures\3VaVC6Erfh3qIgwGaYErbFYb.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2024 -
C:\Users\Admin\Pictures\3VaVC6Erfh3qIgwGaYErbFYb.exe"C:\Users\Admin\Pictures\3VaVC6Erfh3qIgwGaYErbFYb.exe"7⤵
- Windows security bypass
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:2028 -
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"8⤵PID:1924
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes9⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:1688
-
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:684 -
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:2336 -
C:\Windows\system32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F10⤵
- DcRat
- Creates scheduled task(s)
PID:840
-
-
C:\Windows\system32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f10⤵PID:2032
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
PID:2640
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll10⤵
- Executes dropped EXE
PID:2016
-
-
-
-
-
-
-
-
C:\Users\Admin\Pictures\0wbxXoWwAx7STbdYwDjfk6d5.exe"C:\Users\Admin\Pictures\0wbxXoWwAx7STbdYwDjfk6d5.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1128 -
C:\Users\Admin\Pictures\0wbxXoWwAx7STbdYwDjfk6d5.exe"C:\Users\Admin\Pictures\0wbxXoWwAx7STbdYwDjfk6d5.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1092 -
C:\Users\Admin\Pictures\0wbxXoWwAx7STbdYwDjfk6d5.exe"C:\Users\Admin\Pictures\0wbxXoWwAx7STbdYwDjfk6d5.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2044 -
C:\Users\Admin\Pictures\0wbxXoWwAx7STbdYwDjfk6d5.exe"C:\Users\Admin\Pictures\0wbxXoWwAx7STbdYwDjfk6d5.exe"7⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
PID:2672 -
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"8⤵PID:2640
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes9⤵
- Modifies Windows Firewall
PID:2116
-
-
-
-
-
-
-
C:\Users\Admin\Pictures\nR2LXei6PABdKD0MhQio33Sk.exe"C:\Users\Admin\Pictures\nR2LXei6PABdKD0MhQio33Sk.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2328 -
C:\Users\Admin\Pictures\nR2LXei6PABdKD0MhQio33Sk.exe"C:\Users\Admin\Pictures\nR2LXei6PABdKD0MhQio33Sk.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1812 -
C:\Users\Admin\Pictures\nR2LXei6PABdKD0MhQio33Sk.exe"C:\Users\Admin\Pictures\nR2LXei6PABdKD0MhQio33Sk.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2648 -
C:\Users\Admin\Pictures\nR2LXei6PABdKD0MhQio33Sk.exe"C:\Users\Admin\Pictures\nR2LXei6PABdKD0MhQio33Sk.exe"7⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:2508 -
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"8⤵PID:600
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes9⤵
- Modifies Windows Firewall
PID:672
-
-
-
-
-
-
-
C:\Users\Admin\Pictures\suqMkTkvixVaxWndpOa5DIMV.exe"C:\Users\Admin\Pictures\suqMkTkvixVaxWndpOa5DIMV.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\BroomSetup.exeC:\Users\Admin\AppData\Local\Temp\BroomSetup.exe5⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetWindowsHookEx
PID:2552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2140 -s 10165⤵
- Loads dropped DLL
- Program crash
PID:780
-
-
-
C:\Users\Admin\Pictures\FvO7TWEoaE7KuJHt3rug3fqw.exe"C:\Users\Admin\Pictures\FvO7TWEoaE7KuJHt3rug3fqw.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1084 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1084 -s 4925⤵
- Loads dropped DLL
- Program crash
PID:1628
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\33BD.exeC:\Users\Admin\AppData\Local\Temp\33BD.exe2⤵
- Sets file execution options in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1840 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Modifies firewall policy service
- Sets file execution options in registry
- Checks BIOS information in registry
- Loads dropped DLL
- Adds Run key to start application
- Drops desktop.ini file(s)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- NTFS ADS
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\33k1gu53y1_1.exe/suac4⤵
- Modifies firewall policy service
- Enumerates VirtualBox registry keys
- Sets file execution options in registry
- Executes dropped EXE
- Checks for any installed AV software in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1636 -
C:\Windows\SysWOW64\regedit.exe"C:\Windows\SysWOW64\regedit.exe"5⤵
- Modifies security service
- Sets file execution options in registry
- Sets service image path in registry
- Runs regedit.exe
- Suspicious use of AdjustPrivilegeToken
PID:1660
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /SC ONLOGON /TN "Windows Update Check - 0x1BB70478" /TR "C:\PROGRA~3\JAVAUP~1\33K1GU~1.EXE" /RL HIGHEST5⤵
- DcRat
- Creates scheduled task(s)
PID:2004
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\96F3.exeC:\Users\Admin\AppData\Local\Temp\96F3.exe2⤵
- Executes dropped EXE
PID:3048
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1228
-
C:\Windows\system32\makecab.exe"C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20240107200035.log C:\Windows\Logs\CBS\CbsPersist_20240107200035.cab1⤵
- Drops file in Windows directory
PID:968
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1976
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1492
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
13Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5253a693049314fb1fd51bab405bf2c49
SHA16da60a85d957dc361353314c6c8763579b67dd9f
SHA256147e3454e04fb0ac806e50936be352478b484a4806860e14650505ff8a93f598
SHA5123bc807226d6b699ead4486f6d343596cee170e8c6b48f15f144f7ee9db99ad91a0b21f8c684046156d254b075f9a37ad8ae5d1714503ffc39673f53ada4f1c9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bdf3c5b2d67751cf1c71e1445b5f253e
SHA180c5a823e368bb6aba63f987124f1e5be84fa282
SHA256b1f04038a0a816d15ee9d54daa545e8d19267595bd2ffca9d0691a729dd7223e
SHA512980cf18483d60dccd45681da2edff7a9f3d24f14a123860e7cab779086e0a0b02e92e2f40442d534572f47dc4f1fde20b1dbfc3f6a6be3fa78c9c1ec2ec4053e
-
Filesize
1.4MB
MD5309ace9f187d7379846bfe51178f6508
SHA127a359c540b9134e927bc0593e091f000a7d84a4
SHA25656a19dfed4fe2a6d273a9385ac757e7245487bc236d0c3c83c2f00f5016f388e
SHA512d76ecbaf32a80f827d0feab37d10b7ad8efbdd64477b86f23a668170162e51bab42b118c7ed6f07998ef6dbd78ca1b9b771d57a41436fa801ef7598ea85185fa
-
Filesize
360KB
MD580c413180b6bd0dd664adc4e0665b494
SHA1e791e4a3391fc6b7bcb58399cd4fa3c52a06b940
SHA2566d99cec56614b6b8a23dfa84a50c6bbfde535411c6366ac2bcc20c9f5af62880
SHA512347f4ae6f308b37d055a6177478e45ab3838d7020abed70c7aa138d2c3771e709de204da8550aebdcaa6139d869dc7328cc7e645c4dd48d1066f9ad70225644a
-
Filesize
64KB
MD52f54dbcfa506309d89f25ca13d4803a2
SHA1e149abc0cd2cdf25c67e4b88e1bbe0cb6ed1afb3
SHA256720bbff1fce95f63d4ca9c8b4653844ea87eb884e130e749a2838bef4ae933ec
SHA5126f706a5a2ba98468c5839cc2d3de6fb2f51a7851abfcd69b69d572b8b0d0b499adf1bf30099f30fb5a185aa859e2857e8146ca19a8e4ecb3205c96e63398ee9d
-
Filesize
5.6MB
MD5f7c6d870f0de20c40388b493d2b315d2
SHA11b25397776ae0481184f151ec3e608f3b65ac8e6
SHA2564e07a3356bb6ffaa23224884b2ec5d79b6f956acc186475adac89867c0d623d9
SHA5120619a22579ee70745034c547c53180d4319c3dc5db326dfecc275cd3b3025f354a3e6fac093a925611a5e0cca5ff9dbcfbfe246d376bb173829f332b670f5655
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
688KB
MD5a7662827ecaeb4fc68334f6b8791b917
SHA1f93151dd228d680aa2910280e51f0a84d0cad105
SHA25605f159722d6905719d2d6f340981a293f40ab8a0d2d4a282c948066809d4af6d
SHA512e9880b3f3ec9201e59114850e9c570d0ad6d3b0e04c60929a03cf983c62c505fcb6bb9dc3adeee88c78d43bd484159626b4a2f000a34b8883164c263f21e6f4a
-
Filesize
41KB
MD5f523a939094cc8681a3636db2c8ff809
SHA1608d175fa2c86b724f8137fead60aca3fc364265
SHA25682ab2915f0c86cbdc4acc8ce4efd85af374b19d0d9f5c06006b20ba7bff56383
SHA512520551b6840cfcd397d879b7b5947c3c730f6e0accc5a138eabbfe1faa11724f8c041b9af194c42b2bd36cc872b6ec271e1d5f504cbb58214508c5592ef75e1f
-
Filesize
5.3MB
MD51afff8d5352aecef2ecd47ffa02d7f7d
SHA18b115b84efdb3a1b87f750d35822b2609e665bef
SHA256c41acc53cde89b94d55d6932ddd55a212ba910e1fade3da138670bb5b18ae4e1
SHA512e5dc54c60be702e11772dc729eec5ec7140f293545aa3d57282adacddf686483393b0c940bbd397a9d50a6cda093865b143ae00c51ce3bf5d6b00241f97b3cdb
-
Filesize
591KB
MD5e2f68dc7fbd6e0bf031ca3809a739346
SHA19c35494898e65c8a62887f28e04c0359ab6f63f5
SHA256b74cd24cef07f0226e7b777f7862943faee4cf288178b423d5344b0769dc15d4
SHA51226256a12b5b8b3a40b34f18e081cdb45ea11845589c9d458a79385a4b8178f32164b417ddc9346fab8299bc6d4b9fedb620274c4edf9321424f37a2e2a6de579
-
Filesize
212B
MD5963da09532e9758adedf9745c76ec700
SHA1bc976476358cffdbc3f22b6e491f94ccbf15308d
SHA2568720b9487cee7dae6db3f8f73273bcbbc56377400b830ca0f089473ebc9603f2
SHA5122da299bd10de6d425ee84fc2d17f514d003995f489946cdebafa0dcea4058419bcc38beabc2cbbd4546c2117fcf502292b97edffd57da555017762c4f05122f6
-
Filesize
4.2MB
MD5112c84a4b96a3fa53e90c686c3b7e006
SHA193ab939350dabd85fa3c9d9b0120da40d427a5e5
SHA2563b28beed24fa83e0d66858c5f8ba00f5d16872253c2a23743e8ee602fe8582bc
SHA512920860227d47db453fb290446260e16429e28ca0e43f56c4df1a534e1340c5c13c65d384692720a5c4e602cfca2e5a87cf713a8fb5a4ac96a163454ee16b4297
-
Filesize
2.9MB
MD5256bcf6f2438679eb411f7fa4a84261c
SHA1f7da58f94dc14ea7d2b4eb6686d45f6fdbb6f91b
SHA2562dc320d1c8f47b215ba237cdaa9b75c61911e194b0f2f8973fed7f919be27926
SHA5126c8a4497c54eaaa1d6b65c3565a0f70452710e2d60b9cb49a76af72a90835643538afd1adf37820cf2391c1e6a7c96976d761d372344facc6ff927f441547f4d
-
Filesize
640KB
MD54b112636d6e76b9b8077b9c3cc110346
SHA1fbc224560fc8d8128ddd8dde4faf878b758db1cd
SHA2569d8a41d98ffa72199ef6e442dfcab9eee3fe11e1c612e04c12cf6c6d62adc7d0
SHA512f72064a60532ce3d692bb4456347170078af318f2b2e28ff73c04d4434821d2a2cac324086c4a9ae5f4c16f9a961c7bfba59dbf74135d6af29afcb00eb270b58
-
Filesize
384KB
MD5e2beafc5189496e1f3757dc333fa30d3
SHA1d324422f48e46c4ca4dd5d83ea2e5875c983a381
SHA256e2a1cd7a374258050b5289b899f0cbcb81ad2a384ee220dad9b70b651a739db8
SHA5123bf17c4a3bcd7a654ff8fa464fc5c9037326906b9737756fb2a2fd1caea4d558414f4023fcbee4437cd37102fe07f604209a613ac6ca3251aac94041b652966e
-
Filesize
3.3MB
MD5d030095bf8e592981eb7ceed575bc095
SHA16aee57076bd9b86a02df7fbf695f7ac8f10b6a60
SHA256eda3a32c6bdd76fb9a9569902215cee504461ea676f2a19c0c242971bb815ef5
SHA512fa7b8c0480ace231227deff6624268d52241d949f29305464c1086ea40ea441253da89f49900efb2b008f14e312f35f951f73df7306ba7013d8518b8156a5e36
-
Filesize
3.0MB
MD5f029fcd7e4e9dfc7145f2fdb5125652c
SHA1824887bf9338059291ff2e77e5f348626c7f3499
SHA25685f8c5579be0384054cc84023c4b147d97e10265ac350050675a3df64636b3a3
SHA51209af94928a94d73cab7c17beadae1a9145c850daf41172d70a24ac1c6e4b77c96c7efad0b9117f63a66ec16b4f06db40e442405d59974256cceec8d438a89582
-
Filesize
768KB
MD5753f78712cac63c08fa1596977ab3633
SHA1aff5a94170d979f845e16cc781bec2523f9c63e3
SHA256ae3b0705163ed885feadc1dabdeec12c85a8b897249050df8fe8220e92775e58
SHA5120145eaf89aa224e2fbe77d09e29771eaca05ca30b75b061b78238bb0b00010d936d05c9f3f9670b14c48ca2deb0a4c0d6ffdb4d544d3b14eaacdef5a28dfa3d1
-
Filesize
640KB
MD57afd528daac4c3f0a14c9d6a1840414e
SHA15dacaddfa677774b85b9e15e9bbc2101446ccc1c
SHA256719b5637995c793f0cf227a39791f1cf6a5ba7273bf1694eb9edc7cfec13cdd6
SHA5120f76399e4039a52c1896753ec732eb8d90fa6d42b2a23633e587726488103028fa53411c1296f516fc7ad4a302a52fa30b7ca15ad10f74328346aad3f3258822
-
Filesize
4.3MB
MD576f62b8e582b16c9a0e944e6e0ec4416
SHA1e1da6c8e9eca8013267a34b2a7522326b33dd442
SHA256679a262683269630fd0a597ca8a8495766d6a2950c406e12c821c9b19c290d23
SHA5126e60df2b5ecd59dfa5485f64c42e7a1fba59760f132fa5e2685a72ab380c3661c65ff8b9ba5ec0eb81b5d9fb6737322f7954b9fc91f44f78dfb1848ae76111d5
-
Filesize
2.6MB
MD5e7aec5ac278ca1ce0f3a7cf7f56ba2da
SHA150d301fa40d8a98ba77042bfbb13ae36e09f0f87
SHA256b054682be2b38fd150e6e263e5e575600c9c55aa25b6fb8c44e2f686d086fcfc
SHA512746d4429d7f387b67d2d21d566a0bdb387fa9b86cf315b812518a822cbe3cf25046fdbbd9495dc0d7d1eecef72a0f937a74a2fe960ef19df69215f3efcfd6fc5
-
Filesize
1.1MB
MD5614d1f4a73fa3903e21f2f3f8512332c
SHA119c611fcfd2ddc6491abec5c13a03e45941b68fa
SHA256b0d09984237da1c61dd706e0cb356e226952811e439872cd49bdc587fdc65a7f
SHA512cf228d37cd104cdb44c5cbc468350be2c78036e6172b8ade93febcc6c6de644aeff247eb8421fc9c313a64991266723396de117161e51f30e7cb2db29c580c12
-
Filesize
960KB
MD53b086a669a2002a5e02a9fe2f112e4fc
SHA1cb9aabee67ccaf7f5819bb5cc14e7b03104370f0
SHA2562400a7073f4b07be1df8ed378fbde182549f8d2bf53371cae839f9c1602b782b
SHA5120d1141be6120f5c3ba64a344ad79f2729f0171e0483d664d47fb4a1d84cc85dfd2a9600ed73d328da74a883404f771c46b8abb345c729fc3b3ce7b1f7386900b
-
Filesize
3.3MB
MD5c906574f8c048189d90015da65beda42
SHA1e7df0c87849627466ec853883cbccc8f282eac4f
SHA256c4d1ef7de602fa613dbbf7c8208954f4d4894838039acbca58e95ff6e5c02656
SHA512d8533e77d5052c828bce2748b40c412f1db04eb62588a7ae76851c799c66eedaa33b608fbd38a4a248d1e4fe62f7afed4baf5e6aad7ddf4327d8fabdc043cd53
-
Filesize
1.4MB
MD5c29292c6386900e2fabfda099a70f4a6
SHA1c4a9ee496a64c9ce9c5291d7147ec2f53eac868f
SHA25699d852bbc5d2df92d3f811a024f132aec325c017f178d1889bcf121fbf7647fa
SHA51239410e93b33128f58a25bcbc4d23bc0cf73fdfa2f2207a4cbefa6065e1f397860826febadaaff3be8f15ccc9e6d4862e676b1f1693a08a02a3a20ac63a43dcb4
-
Filesize
3.1MB
MD5a84badc9328110e9ada3f8ea06c07505
SHA1da40d0dbe7835e005d8f2ca744a7ccaf5294cdc0
SHA256227e6963b40c3e7af2555596674895cb0de3c1abed2c3ec0de1a29817e66df86
SHA5128aaab1ee85bac9b55642d2b3fa466762a50daeb43ed681098e703e59f36f04b38e62d741dd8c90b936f0b8178d5ca29188134588d8fd51994492d38487ca2eeb
-
Filesize
4.8MB
MD59faee03e11cff74f2087046b60364e65
SHA1ac82cd5483315b260278d8033fce6723058ded53
SHA256e8ba8ac403faa98437d491dd4e832f0c93f941ea3c12d2e91b05c9046646186b
SHA5129dfd5eddd55cb5b57d577d33b2ae225f0096c73dfe350a59f1d23e9f8f4c76658560f632dbe136a8209b3b39db2cda32acaaf7f573bad648e8b030358b25e2dd
-
Filesize
2.4MB
MD584639d9af474995726fab9b7c3d02275
SHA1213cabba00dfa3b5e223a9bf2f7551e83b7714bc
SHA256af6ff8354e09faeb9176f009033b136853a92d2e67eb049449ce9a0f849e66f5
SHA51249934ea84355d13c0e5649910530b630cdd001613aba64d0bdfea109a5bb5cde975fe34058e38dd868ac973cbc03d7862086df6d6c23f3dc85a70f30320ebdf7
-
Filesize
1.9MB
MD54608c2c3d4ec46bd1d09e6acc327cc88
SHA10c6eebe9a6e4332b3b5cbb5b5db8a8acea5d3a25
SHA25617561d43ed6b0650a415572f70a8646b815d8252d1ec7d672187fb10efb62386
SHA5127adb823002bc8182f1c361a54f9b85490a7194825b40be66118d019ae9806c1d0cb91e085e4b5c4c7cda45c284f67eb208e1ffc28028b813803c9f898c3e09ea
-
Filesize
768KB
MD54d357d7807248a5d1db3e829626ccae8
SHA18aece518f5b4ab65328fe2d71c0fdd00d224b42d
SHA2565a9a856c3592e39ea7bd4ce734d3697a5da5bb626043879d602d9d54c4c0da5e
SHA512d620e58c886513ccdbb80b41a438499c2ba5f01d422112ecce4f59b87641505cb49a0c1732ee7debf34acdab0652777a6d2c321be843ad4807dbc4093b685d30
-
Filesize
5.3MB
MD500e93456aa5bcf9f60f84b0c0760a212
SHA16096890893116e75bd46fea0b8c3921ceb33f57d
SHA256ff3025f9cf19323c5972d14f00f01296d6d7a71547eca7e4016bfd0e1f27b504
SHA512abd2be819c7d93bd6097155cf84eaf803e3133a7e0ca71f9d9cbc3c65e4e4a26415d2523a36adafdd19b0751e25ea1a99b8d060cad61cdfd1f79adf9cd4b4eca
-
Filesize
1.7MB
MD513aaafe14eb60d6a718230e82c671d57
SHA1e039dd924d12f264521b8e689426fb7ca95a0a7b
SHA256f44a7deb678ae7bbaaadf88e4c620d7cdf7e6831a1656c456545b1c06feb4ef3
SHA512ade02218c0fd1ef9290c3113cf993dd89e87d4fb66fa1b34afdc73c84876123cd742d2a36d8daa95e2a573d2aa7e880f3c8ba0c5c91916ed15e7c4f6ff847de3
-
Filesize
1.5MB
MD5f0616fa8bc54ece07e3107057f74e4db
SHA1b33995c4f9a004b7d806c4bb36040ee844781fca
SHA2566e58fcf4d763022b1f79a3c448eb2ebd8ad1c15df3acf58416893f1cbc699026
SHA51215242e3f5652d7f1d0e31cebadfe2f238ca3222f0e927eb7feb644ab2b3d33132cf2316ee5089324f20f72f1650ad5bb8dd82b96518386ce5b319fb5ceb8313c
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
19KB
MD53adaa386b671c2df3bae5b39dc093008
SHA1067cf95fbdb922d81db58432c46930f86d23dded
SHA25671cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38
SHA512bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
25KB
MD540d7eca32b2f4d29db98715dd45bfac5
SHA1124df3f617f562e46095776454e1c0c7bb791cc7
SHA25685e03805f90f72257dd41bfdaa186237218bbb0ec410ad3b6576a88ea11dccb9
SHA5125fd4f516ce23fb7e705e150d5c1c93fc7133694ba495fb73101674a528883a013a34ab258083aa7ce6072973b067a605158316a4c9159c1b4d765761f91c513d
-
Filesize
76KB
MD5b6ffd4a7812b0608b18c8665cf3b4b5b
SHA11a486e8281b80ddb0060a28e43ab14ee90ea4e91
SHA25623dfb2a6b53106509444bec24b9c3893a82f8f04520f03f6b1696f53d19170c5
SHA512dcb62682bd7bc0f869ae270a16062f952a96f29cfda36ac7dc82e1a1516f75c61be1f8c435cf2765172432cfab70a6ef0eda7b6db44517b063c4fae16f554c0a
-
Filesize
163KB
MD55c399d34d8dc01741269ff1f1aca7554
SHA1e0ceed500d3cef5558f3f55d33ba9c3a709e8f55
SHA256e11e0f7804bfc485b19103a940be3d382f31c1378caca0c63076e27797d7553f
SHA5128ff9d38b22d73c595cc417427b59f5ca8e1fb7b47a2fa6aef25322bf6e614d6b71339a752d779bd736b4c1057239100ac8cc62629fd5d6556785a69bcdc3d73d
-
Filesize
3.2MB
MD5f6e3eda0704a1237e7c007b1aba9794a
SHA1aed1918b9d4b6475a1056763318a4d40a5dabc2b
SHA2563513b896fe8199b587c13a3c4b2df65ce797d70c17457cd0dbfc0074afb61fa8
SHA51240155b2d3c05727634cb405dae7fd94b585edd0050c104b7c6296da5519710db12880b35f3985cb2bcca6d2d3e7c222ebcdce299e310bb05a769d064027e3e4a
-
Filesize
4.2MB
MD54ffe00ec649af72764bd012367f91e3a
SHA1898a143b533c9ded545fba7ed7d76117692ce06e
SHA2566e9970a3c8c0ca2030f8580b34686a1b853191a3b8af770c70722b89bc8542a2
SHA51225fc5df526f0ac67e79fb914b71b784c67607a5cac52f50cab01c41d8a53d5e2294cbb0cdc9f7465ca88cd59f4a02b8bedb24f4b15798effd7f0ae77c18fe314
-
Filesize
3.9MB
MD54b867655c52d79289b84310321c35380
SHA1e6ef70295df52e9b7fb423c99f2642e5a8683825
SHA256698227c6403c4c8830344931a32a36d61bc55df6140eb539cebc61d0d7c7f0f3
SHA5124bc721d168bf5b62a00286a43b39a9d4a14771df2ab8bdd4462830e85a06b148635cd1cccd49c324ce9bc47b8f033d2798d5a9b395f5bc9411cd01a184574946
-
Filesize
311KB
MD5cf5a70c2f7978229efebcca70f6d2053
SHA1b2eb3eb28b89c31ccd4f4c89edaa1ed6d5a233a4
SHA2560faa7c27d8cedbb19af0586a236ce4eca6b151509e526bedcc970606e391ce74
SHA5127f16690701912b9d043113783827dfbfd2b89fee0b74e4a0bc38ee73535bd7a4bc23014eee1632196926109d4b5e37cb076df975149b422df7719db0af8f000b
-
Filesize
3.4MB
MD5b8e5172f0d666d17fa4f9e9d51a0353e
SHA181fb44b2d0c2f62d3e342de4f18bb66cdab8b3be
SHA2560df1a4c47dc135c8f3a161e728cfc6378645490ca9376c2db96c4306296d6375
SHA512a18df28bc67ab2c2539059183633af169033954ea0df7918391d8f7be6d4310f7af193eec1ef3eeab761a76e864f6ebf419bdbccc4776ec05949d22bcb795bcc
-
Filesize
1.6MB
MD5cd3445a9ce38b93d7bb6825157965dd6
SHA116504439f573a7ad86dcc31d6f3fd95f8acfef9e
SHA256aacada8ff6c6329483a2077e3a41e40364045b094b7bfe7c4fad3b82238d7cf4
SHA512ec0b1faddb1298e4719e1410ce55663bf10a3a566290d6c95d2b39f91f468a490476978428363adabdecc9d52b95bfd3d5ee5370e65d461be9fe0acba31fe66f
-
Filesize
1.4MB
MD53ee24d5e5d3bcdbc61bc48ce7c8cbfa4
SHA192074764d6f38039766bd63f6d8f8ed2ddb6ac75
SHA2560bda5c2188461189bc9fec4084e21c3827bc262755f84465c450bfd3d1e1a4af
SHA5126a01424326f48f268ac73c787df526e5762e17d257012db91688d7f05852b363d7dba3b4937404cd61a6af5fbb3e70361768938396af394894432a515a50b2a2
-
Filesize
1.6MB
MD5fc5ac3897b59e05d33021f0271ca3314
SHA1b6d4169ac6e6a0e87a1be9915cd009a5e13330e2
SHA2569a9a1fe008c0a09f3b182d8f878b11264a24ac86f0674fa10e01bb81f31a8964
SHA512c959ab38fcc1f52877b3589e83bdb6c749b73e346ddaf03edc20913992e212e2e4fd21432da8590b65d4b216f3a1d9c610e33a6d079223dc2834d9add24aed2c